Mobile Crowd-Sensing for E-Health Monitoring and Hot-Spot Detection. Basem Shihada Assistant Professor of Computer Science and Electrical Engineering

Size: px
Start display at page:

Download "Mobile Crowd-Sensing for E-Health Monitoring and Hot-Spot Detection. Basem Shihada Assistant Professor of Computer Science and Electrical Engineering"

Transcription

1 Mobile Crowd-Sensing for E-Health Monitoring and Hot-Spot Detection Basem Shihada Assistant Professor of Computer Science and Electrical Engineering Bell Canada Invited Seminar Tuesday Dec. 9 th, 2014

2 Computing and Networking Trends q Bell's Law * : Every decade sees a change in the class of computing devices q 1990s saw the emergence of the laptop; q saw the mobile phones q Next decade, desktops will disappear. End-user computers will be almost entirely laptops & tablets. q Data and applications will live in the cloud. q Ubiquitous high-speed wireless connectivity is a must. q Dense, small-range wireless access points (AP) will become more important than today. q Spectrum is limited, neighboring APs will likely have to operate on the same spectrum. q Interference between neighboring APs will become the dominating factor. q Small cells connectivity and load will fluctuate rapidly, both in space and time. * Bell's Law of Computer Classes formulated by Gordon Bell in 1972, describes how types of computing systems (referred to as computer classes) form, evolve and may eventually die out.

3 NetLab: Research Domains Applications Resource & Energy Allocation

4 Cellular and Wireless Packet Networks

5 Delays in Wireless Mesh Networks The objective is to optimize buffer sizes to balance the throughput and delay requirements 1,2,3. Proposed a distributed, neighborhood buffer, that is sized for saturating the channel while minimizing queueing delays. We proved that using small buffers (1-4 packets) improves delay by up to 10x 1 We implemented our scheme in a Linux testbed WMN deployed on the 4 th floor of Building A. Showail, K. Jamshaid, and B. Shihada, "WQM: An Aggregation-aware Queue Management Scheme for IEEE n based Networks", in Proc. ACM Sigcomm Capacity Sharing Workshop (CSWS), pp , B. Shihada and K. Jamshaid, "Buffer Sizing for Balancing Throughput and Delay Requirements in Multi-hop Wireless Networks," U.S. Patent No. 8,638, A. Showail, K. Jamshaid, B. Shihada, "An Empirical Evaluation of Bufferbloat in IEEE n Wireless Networks", in Proc. IEEE Wireless Communications and Networking Conference (WCNC), Accepted, 2014.

6 Energy Optimization in Wireless Multi-Hop Networks The objective is to minimize the energy consumption at the energycritical nodes and the overall network transmission delay 1,3. The transmission rates of energycritical nodes are adjusted according to its local packet queue size. We proved that there exists a threshold type control which is optimal 1. We implemented a decentralized algorithm to control the packets scheduling of these energy-critical nodes 2. 1 L. Xia and B. Shihada, Decentralized Transmission Scheduling in Energy-Critical Multi-Hop Wireless Networks" IEEE American Control Conference, L. Xia, B. Shihada, Max-Min Optimality of Service Rate Control in Closed Queueing Networks," IEEE Transactions on Automatic Control, Vol. 58, No. 4, pp , L. Xia, B. Shihada, and P-H. Ho, Power and Delay Optimization for Multi-Hop Wireless Networks", International Journal of Control, 2014.

7 Wireless Cognitive Radio Systems

8 CogWNet System Layers 1 1. Communication Layer 2. Decision-Making Layer (Repository and Parameter Mapper) 3. Policy Layer Application Transport Network Link Physical Requirements From CAPRI Interface ULLA Interface CCC Repository Sensory Input Form GENI Interface Configuration Sensory Input Form Configuration Shared info Command Utility Manager -KERNEL Space- Utility Registration (AAL) <<notify>> Store Flow Manager Cgwindow, Flow Type <<notify>> Store Physical Bandwidth/ Center Frequency/ delay/ BER <<notify>> Store Negotiator 2 push data 4 Push data Push data 1 -User Space- Sensory Processing <<AB. Push.data >> <<notify>> (Cross layer data) With unique identifier from each channel) (data stored from future prediction) SP 3 Action Module Data Base for Future Parameter Prediction <<Schedule Action >> <<notify>> Receive configuration parameters after Policy check AM Policy Architecture: Admin Push_data To Parameter Mapper (AB) Schedule Action From Parameter Mapper (AB) From Repository (Policy Server) Server Manager Data Base Copy of sensory data (Sensory Processing) SP2 1 (CCC) 4 Trigger Manager Detection Module Rules evaluation: <<push_data>> <<check_power>> <<Primary user signal>> <<If detected: trigger>> DM (Policy Engine) Data Base Engine Manager If detection trigger AB.pushdata Reasoner Policy Module <<PE. pushdata>> <<notify>> PM Policy Interface 3 2 TO PM Notification (Yes or No) 3 Decision Parameters from PM (AB) Action Schedule (Rep) if Policy reply is Yes Policy Query Policy Reply TM Sensory Dara (Rep) Receiver data from Repository (SP1): -Transfer sensory data to storage. -Request decision Algorithm. -Check Policy. -Schedule Action Store <<push_data>> <<Read>> Storage Parameter Mapper Reply (Config Parameters) Action Broker Algorithm Request (run) + Policy Feedback if No -Receive Running Request from AB. -Run (Algorithm) => decision Tree -Notify AB about decision (to check with policy) Parameter Mapper Decision Module 1 I. Qerm, B. Shihada, and K. Shin, "CogWnet: A Resource Management Architecture for Cognitive Radio Networks", in Proc. IEEE International Conference on Computer Communications and Networks (ICCCN), 2013.

9 Energy Efficient Cognitive Radio Utilizing Sensing Information The objective is to minimize the EPG metric subject to 1,2 : 1. Rate constraint. 2. Interference constraint. 3. Peak Power constraint. The optimal resource allocation is done while combining the soft sensing information. Soft sensing information is the knowledge we obtain about the PT before making the detection decision. We generalized the targeted scenarios into PU Exists and Absent with a certain probability 2. We proved the convexity of the problem. We utilized the calculus of variation theory to obtain an optimal and sub-optimal solutions. 1 A. AlAbbasi, Z. Rezki, and B. Shihada, "Energy Efficiency and SINR Maximization Beamformers for Spectrum Sharing with Sensing Information", IEEE Transactions on Wireless Communications, Vol. 13, No. 9, pp , A. AlAbbasi, Z. Rezki, and B. Shihada, "Energy Efficiency and SINR Maximization Beamformers for Cognitive Radio Utilizing Sensing Information", in Proc. IEEE International Symposium on Information Theory (ISIT), pp , 2014

10 Wireless Sensor Systems

11 Towards Optimal Event Detection and Localization We identify and solve the problem of Event Detection and Localization in Acyclic Flow Networks 1,2. We proved that Event Detection problem is NP hard and provide a heuristic algorithm to solve it. We presented Beacon Placement and Event Localization algorithms for Event Localization. We evaluated our algorithms in simulation. We developed a flow learning algorithm, and evaluated the algorithms on bigger graphs 1 M. Suresh, R. Stolern, E. Zechman, and B. Shihada, "On Event Detection and Localization in Acyclic Flow Networks", IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, Vol. 43, No. 3, pp , M. Suresh, R. Stolern, R. Denton, E. Zechman, and B. Shihada, "Towards Optimal Event Localization in Time-Varying Acyclic Flow Networks", in Proc. International Conference on Distributed computing and Networking (ICDCN), pp , 2012.

12 Green-Frag Energy efficient scheme that combines a frame fragmentation technique with an adaptive power mechanism 1,2. Green-Frag achieves the least energy consumption in all environment situations. It is capable of selecting the best transmit power according to the channel conditions. Data CRC 12 Bytes 1 Byte Time % Normal Channel Condition Combination of Different Block Modes Bytes Bad 1m Distance between Sender and Receiver 1 A. Showail, A. El-Rasad, A. Meer, A. Daghistani, K. Jamshaid, and B. Shihada, "ifrag: Dynamic Partial Packet Recovery for Sensor Systems", ACM Journal of Wireless Networks, Vol. 20, No. 4, pp. 1-18, A. Daghistani and B. Shihada, "Green-Frag: Energy-Efficient Frame Fragmentation Scheme for Wireless Sensor Networks", in Proc. IEEE International Conference on Wireless and Mobile Computing (WiMob), pp , (Received the Best Paper Award). Data 24 Bytes Block 4 25 Bytes Block 8 13 Bytes Data 48 Bytes Block 2 49 Bytes CRC 1 Byte Data 96 Bytes Block 1 97 Bytes CRC 1 Byte TailMap 1 Byte Data Frame 112 Bytes BlockMap 4 Bytes ACK Frame 6 Bytes CRC 1 Byte CRC 1 Byte Tail 14 7 Bytes 2.5m CRC 1 Byte 0 dbm 3 dbm 7 dbm 15 dbm 25 dbm

13 Smart Phone GPU

14 Energy Efficiency of Smartphone GPUs Adding GPUs to smartphones provided a big leap in the graphical experience: 3D Games, interactive and rich UI, high quality graphics applications. Smartphones resolution is rapidly increasing. Smartphone operating systems such as Android are fully hardware-accelerated. GPUs in smartphones are becoming more and more powerful by the day. Energy consumption of smartphone GPUs should be thoroughly investigated!

15 GPU Governors Total Energy Saving

16 Internet of Things: Crowdsourcing

17 What is Crowdsourcing? "The practice of obtaining needed services, ideas, or content by soliciting contributions from a large group of people and especially from the online community rather than from traditional employees or suppliers "

18 What is Crowdsourcing? An example of crowdsourcing all know and use? It has over 17M articles written collaboratively by the community and is the most popular reference site on the internet.

19 What is Mobile CrowdSourcing? The rise of mobile devices expands Crowdsourcing to be real-time, location-based, and contextual. Mobile application users are no longer passive consumers, they can share GPS data, photos, surveys, sensor data, and much more!

20 Mobile Crowd-Sensing (MCS) Mobile Crowd-Sensing (MCS) proposes a new framework for data collection based on the power of sensors installed in smartphones, wearable devices, and sensor-equipped vehicles. Taking advantage of such sensor-enabled devices which reside at the edge of the Internet in more real life disciplines will cause an evolution in the concept of Internet of Things (IoT). MCS enables collecting massive location-based sensor data in a feasible distributed manner for monitoring a specific phenomena.

21 Successful Examples Non-profit environmental and governmental causes Crises, disasters, and emergency management Traffic, Navigation, and Transportation Management

22 And Many More...

23 Why Would People Share Information? Acquiring similar information Common good Reward system (money, phone credit...)

24 Multidisciplinary Research Data Sensing, Collection, and Streaming (Networks) Real-Time Data Analysis and Prediction (AI) Data Storage and Processing (Cloud Computing) Energy Efficiency and Awareness (Mobile Computing) Privacy, Security, and Trust Issues (Security) Architecture/Framework Design (Systems)

25 Our Project! Mobile Crowd-Sensing for Real-Time Mass Pedestrian Monitoring and Hot-Spot Detection Managing crowds in large-scale mass gatherings can be a very critical and challenging task. History have shown, failing to manage pedestrian crowds could lead to injuries and even lost lifes.

26 Previous Solutions Computer vision techniques Stationary sensors Drawbacks: 1. Limited node coverage. 2. Inability to scale to reach every part of the crowd. 3. The need pre-hand deployment, which is not efficient in the case of emergencies and evacuations. 4. High deployment and maintenance cost. 5. Provide no interactivity with the crowds in terms of offering real-time instructions or guidelines.

27 Proposed Solution Why not using the crowd themselves in monitoring? We use opportunistic mobile crowd sensing to collect information from within the crowds in a distributed manner using the crowds themselves as mobile nodes in a spatialtemporal dynamic network.

28 Proposed Solution Rather than aiming to have a precise density estimation, this project monitors the environmental conditions and surrounding of crowds, such as humidity, temperature, CO 2 emission, speed of movement, and noise, to infer the crowd level and predict any future incident.

29 Proposed Solution Our incentive for participatory sensing: The framework will perform a full circle by providing a heat map and real-time location based recommendations for participants to show less crowded areas, shortest path to reach there, and the best time to perform a certain task when there are the least crowd.

30 Methodology: Mobile Application We developed Ssense 1.0 * an android application that logs the following information every defined interval: Time, Air Pressure, Temperature, Relative Humidity, Absolute Humidity, Longitude, Latitude, Speed, GPSAccuracy, BatteryLevel * Ssense v1.0, free BSD license,

31 Methodology: Mobile Application Obtaining Ground Truth: For data collection purposes, one of three crowd levels should be dynamically chosen on every change based on the Jacob's method. An illustration is provided for volunteers to help in visualizing.

32 Methodology: Data Collection Test Case: Al Mataf- Makkah

33 Methodology: Humidity factor Out of all measured features only two were chosen that showed significant deviation from the context: Humidity and Temperature

34 Methodology: Temprature Factor Out of all measured features only two were chosen that showed significant deviation from the context: Humidity and Temperature

35 Methodology: Spatial-Temporal Modeling Our problem changes over both Time and Space. We model the crowd nodes as a spatial temporal-network where topology and attributes change over time. We model the temporal dependency in each node using first order hidden Markov model (HMM). We train the HMM to use the transition probability between different crowd levels, and the emission probability of the observed data to predict a hotspot of an overcrowd. We model the spatial dependency between nodes using Markov Random Fields (MRFs) to represent the relations between adjacent nodes. Combining both models would generate a full spatial-temporal detection framework.

36 Methodology: Temporal Dependency Modeling & Detection The problem is modeled as HMM to detect the temporal dependence in each sensor reading and detect the crowds hidden state: Hidden states = {Normal CORWD, MEDIUM CROWD, OVERCROWDED} Observation 1 (Humidity Deviation)={High, Medium, Low} Observation 2 (Temperature Deviation)={High, Low} * Assume that the two observations (Humidity and Temperature) are conditionally independent given the crowd state:

37 Methodology: HMM Supervised learning To learn the parameter of the HMM transition, emission, and initial matrices, we trained the HMM using supervised learning which uses Maximum- Likelihood Estimation (MLE).

38 Methodology: HMM Supervised learning

39 Methodology: HMM State Prediction No available tool support HMM with multiple observation variable. Therefore, we modified HMMLearn library of SciKit to support HMM models of two observation variables. When a hotspot is detected, the GPS coordinates of that node is retrieved to get the exact location of the overcrowded incident. Appropriate measures can then be taken according to the congestion location.

40 Spatial Dependency Modeling & Detection (MRF) Split targeted area into a grid of patches, each patch would represent a node in a network. When a temporal event is detected in one patch, adjacent patches in the same clique are checked before declaring a spatial-temporal event to eliminate noise, sensor errors, and outliers.

41 Future Work Building a cloud server for processing and storing the sensing data, thus taking advantage of the cloud infrastructure for our online data analysis. Include participatory sensing as well the opportunistic, where users can upload images and related information, such as how much time it took them to stand in a queue or to perform a certain task to further more identify the rush hours and pedestrian patterns. Generate real time heat maps and recommendations provided to users depending on their current location.

42 Thanks!

WQM: Practical, Adaptive, and Lightweight Wireless Queue Management System

WQM: Practical, Adaptive, and Lightweight Wireless Queue Management System WQM: Practical, Adaptive, and Lightweight Wireless Queue Management System Basem Shihada Computer Science & Electrical Engineering CEMSE, KAUST University of Waterloo Seminar December 8 th, 2014 2 3 How

More information

INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT

INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT MOBILE OFFLOADING USING POWER BASED DECISION IN WIRELESS COMMUNICATION M.Nivethamani 1*, Soma Prathinha 2 1* PG Scholar, Student Member, IEEE, Sri Sairam Engineering College, Chennai 2 Associate Professor,

More information

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2 CS5984 Mobile Computing Outline : a Survey Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech An Introduction to 1 2 1/2 Advances in micro-electro-mechanical systems technology, wireless communications,

More information

5g Use Cases. Telefonaktiebolaget LM Ericsson 2015 Ericsson July 2015

5g Use Cases. Telefonaktiebolaget LM Ericsson 2015 Ericsson July 2015 5g Use Cases Telefonaktiebolaget LM Ericsson 2015 Ericsson July 2015 BROADBAND EXPERIENCE EVERYWHERE, ANYTIME 5g USE CASES SMART VEHICLES, TRANSPORT & INFRASTRUCTURE MEDIA EVERYWHERE CRITICAL CONTROL OF

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

Wireless Sensor Networks CS742

Wireless Sensor Networks CS742 Wireless Sensor Networks CS742 Outline Overview Environment Monitoring Medical application Data-dissemination schemes Media access control schemes Distributed algorithms for collaborative processing Architecture

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks c.buratti@unibo.it +39 051 20 93147 Office Hours: Tuesday 3 5 pm @ Main Building, second floor Credits: 6 Ouline 1. WS(A)Ns Introduction 2. Applications 3. Energy Efficiency Section

More information

Link Estimation and Tree Routing

Link Estimation and Tree Routing Network Embedded Systems Sensor Networks Link Estimation and Tree Routing 1 Marcus Chang, mchang@cs.jhu.edu Slides: Andreas Terzis Outline Link quality estimation Examples of link metrics Four-Bit Wireless

More information

NSF-RCN Workshop #2 Panel 2

NSF-RCN Workshop #2 Panel 2 NSF-RCN Workshop #2 Panel 2 Moonshot mmw Challenges and Opportunities for 2020, 2025, 2030 Tommy Svensson Department of Electrical Engineering, Communication Systems Group Professor, PhD, Leader Wireless

More information

Networking Cyber-physical Applications in a Data-centric World

Networking Cyber-physical Applications in a Data-centric World Networking Cyber-physical Applications in a Data-centric World Jie Wu Dept. of Computer and Information Sciences Temple University ICCCN 2015 Panel Computers weaving themselves into the fabric of everyday

More information

The Novel HWN on MANET Cellular networks using QoS & QOD

The Novel HWN on MANET Cellular networks using QoS & QOD The Novel HWN on MANET Cellular networks using QoS & QOD Abstract: - Boddu Swath 1 & M.Mohanrao 2 1 M-Tech Dept. of CSE Megha Institute of Engineering & Technology for Women 2 Assistant Professor Dept.

More information

On User-centric QoE Prediction for VoIP & Video Streaming based on Machine-Learning

On User-centric QoE Prediction for VoIP & Video Streaming based on Machine-Learning UNIVERSITY OF CRETE On User-centric QoE Prediction for VoIP & Video Streaming based on Machine-Learning Michalis Katsarakis, Maria Plakia, Paul Charonyktakis & Maria Papadopouli University of Crete Foundation

More information

SRA A Strategic Research Agenda for Future Network Technologies

SRA A Strategic Research Agenda for Future Network Technologies SRA A Strategic Research Agenda for Future Network Technologies Rahim Tafazolli,University of Surrey ETSI Future Network Technologies ARCHITECTURE 26th 27th Sep 2011 Sophia Antipolis, France Background

More information

Accelerating solutions for highway safety, renewal, reliability, and capacity. Connected Vehicles and the Future of Transportation

Accelerating solutions for highway safety, renewal, reliability, and capacity. Connected Vehicles and the Future of Transportation Accelerating solutions for highway safety, renewal, reliability, and capacity Regional Operations Forums Connected Vehicles and the Future of Transportation ti Session Overview What are connected and automated

More information

Lecture 8 Wireless Sensor Networks: Overview

Lecture 8 Wireless Sensor Networks: Overview Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam

More information

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

Mobile Ad Hoc Networks: Basic Concepts and Research Issues Mobile Ad Hoc s: Basic Concepts and Research Issues Ing. Alessandro Leonardi aleonardi@dieei.unict.it Wireless s Generations (1/3) Generation 1G 2G 2.5G 3G 4/5G Time 1980s 1990s Late1990s 2000s (2010 full

More information

Reliable Stream Analysis on the Internet of Things

Reliable Stream Analysis on the Internet of Things Reliable Stream Analysis on the Internet of Things ECE6102 Course Project Team IoT Submitted April 30, 2014 1 1. Introduction Team IoT is interested in developing a distributed system that supports live

More information

Cache and Forward Architecture

Cache and Forward Architecture Cache and Forward Architecture Shweta Jain Research Associate Motivation Conversation between computers connected by wires Wired Network Large content retrieval using wireless and mobile devices Wireless

More information

Distributed Sensing for Spectrum Agility: Incentives and Security Considerations

Distributed Sensing for Spectrum Agility: Incentives and Security Considerations Distributed Sensing for Spectrum Agility: Incentives and Security Considerations S. Arkoulis, P. Frangoudis, G. Marias, G. Polyzos Athens University of Economics and Business {arkoulistam,pfrag,marias,polyzos}@aueb.gr

More information

Mobile Millennium Using Smartphones as Traffic Sensors

Mobile Millennium Using Smartphones as Traffic Sensors Mobile Millennium Using Smartphones as Traffic Sensors Dan Work and Alex Bayen Systems Engineering, Civil and Environmental Engineering, UC Berkeley Intelligent Infrastructure, Center for Information Technology

More information

A SDN Approach to Spectrum Brokerage in Infrastructure-based Cognitive Radio Networks

A SDN Approach to Spectrum Brokerage in Infrastructure-based Cognitive Radio Networks A SDN Approach to Spectrum Brokerage in Infrastructure-based Cognitive Radio Networks Anatolij Zubow Jointly with Michael Döring, Mikolaj Chwalisz and Adam Wolisz Technical University Berlin, Germany Outline

More information

ITEE Journal. Information Technology & Electrical Engineering

ITEE Journal. Information Technology & Electrical Engineering An Overview of QoE for 5G Networks 1 Hajra Masood, 2 Safdar Rizvi, 3 Bilal Muhammad Iqbal Department of Computer Sciences, Bahria University, Karachi, Pakistan E-mail: 1 Hajra.cs@gmail.com, 2 dr.safdar@bimcs.edu.pk,

More information

Deployable Communication Systems and IoT for Public Safety. Professor Kamesh Namuduri Electrical Engineering, University of North Texas

Deployable Communication Systems and IoT for Public Safety. Professor Kamesh Namuduri Electrical Engineering, University of North Texas Deployable Communication Systems and IoT for Public Safety Professor Kamesh Namuduri Electrical Engineering, University of North Texas Outline Introduction building blocks for public-safety and challenges

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

Fig. 2: Architecture of sensor node

Fig. 2: Architecture of sensor node Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce

More information

An Introduction to Cyber-Physical Systems INF5910/INF9910

An Introduction to Cyber-Physical Systems INF5910/INF9910 An Introduction to Cyber-Physical Systems INF5910/INF9910 1 Outline What is Cyber Physical Systems (CPS)? Applications Challenges Cyber Physical CPS 2 Cyber Systems Cyber is More than just software More

More information

November, Qualcomm s 5G vision Qualcomm Technologies, Inc. and/or its affiliates.

November, Qualcomm s 5G vision Qualcomm Technologies, Inc. and/or its affiliates. November, 2014 Qualcomm s 5G vision 1 Mobile is the largest technology platform in history ~7 billion connections, almost as many as people on earth 1 Evolving into Internet of Everything: cars, meters,

More information

Lecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday

Lecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday Lecture 20: Future trends in mobile computing Mythili Vutukuru CS 653 Spring 2014 April 7, Monday Future topics Improving capacity Dynamic spectrum access Massive MIMO Heterogeneous networks Pervasive

More information

Part I: Introduction to Wireless Sensor Networks. Xenofon Fafoutis

Part I: Introduction to Wireless Sensor Networks. Xenofon Fafoutis Part I: Introduction to Wireless Sensor Networks Xenofon Fafoutis Sensors 2 DTU Informatics, Technical University of Denmark Wireless Sensor Networks Sink Sensor Sensed Area 3 DTU Informatics,

More information

Context-Aware Network Stack Optimization

Context-Aware Network Stack Optimization Context-Aware Network Stack Optimization Olivier Mehani 1,2 Roksana Boreli 2 Thierry Ernst 1 1 Institut National de Rercherche en Informatique et Automatique Équipe-projet Imara name.surname@inria.fr 2

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering

Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering Mobile Systems M Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering Mobile Systems M course (8 ECTS) II Term Academic Year 2016/2017 08 Application Domains

More information

Wireless Challenges and Resolutions

Wireless Challenges and Resolutions Wireless Challenges and Resolutions 1 Steven Shelton Senior Network Engineer Oak Ridge National Laboratory Oak Ridge, Tennessee ows@ornl.gov 2 Wireless Challenges and Resolutions Sections Common Problems

More information

APPLICATION NOTE. XCellAir s Wi-Fi Radio Resource Optimization Solution. Features, Test Results & Methodology

APPLICATION NOTE. XCellAir s Wi-Fi Radio Resource Optimization Solution. Features, Test Results & Methodology APPLICATION NOTE XCellAir s Wi-Fi Radio Resource Optimization Solution Features, Test Results & Methodology Introduction Multi Service Operators (MSOs) and Internet service providers have been aggressively

More information

USE CASES BROADBAND AND MEDIA EVERYWHERE SMART VEHICLES, TRANSPORT CRITICAL SERVICES AND INFRASTRUCTURE CONTROL CRITICAL CONTROL OF REMOTE DEVICES

USE CASES BROADBAND AND MEDIA EVERYWHERE SMART VEHICLES, TRANSPORT CRITICAL SERVICES AND INFRASTRUCTURE CONTROL CRITICAL CONTROL OF REMOTE DEVICES 5g Use Cases BROADBAND AND MEDIA EVERYWHERE 5g USE CASES SMART VEHICLES, TRANSPORT CRITICAL SERVICES AND INFRASTRUCTURE CONTROL CRITICAL CONTROL OF REMOTE DEVICES HUMAN MACHINE INTERACTION SENSOR NETWORKS

More information

Using Operator Interfaces to Optimize Performance of Industrial Wireless Networks

Using Operator Interfaces to Optimize Performance of Industrial Wireless Networks Using Operator Interfaces to Optimize Performance of Industrial Wireless Networks Jim Ralston, Wireless Sales Engineer ProSoft Technology, August 2007 Abstract The performance of wireless networks can

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks c.buratti@unibo.it +9 051 20 9147 Office Hours: Tuesday 5 pm @ Main Building, third fllor Credits: 6 Protocol Stack Time Synchronization Energy Efficiency Distributed Processing

More information

Resource Allocation Algorithms Design for 5G Wireless Networks

Resource Allocation Algorithms Design for 5G Wireless Networks Resource Allocation Algorithms Design for 5G Wireless Networks Vincent Wong Department of Electrical and Computer Engineering The University of British Columbia November 5, 2016 0 5G Overview User Data

More information

NTT DOCOMO s Views on 5G

NTT DOCOMO s Views on 5G NTT DOCOMO s Views on 5G NTT DOCOMO, INC. NTT DOCOMO, INC., Copyright 2014, All rights reserved. 1 Network/Communication Society in 2020 and Beyond Everything Connected by Wireless Monitor/collect information

More information

Design and Evaluation of a new MAC Protocol for Long- Distance Mesh Networks by Bhaskaran Raman & Kameswari Chebrolu ACM Mobicom 2005

Design and Evaluation of a new MAC Protocol for Long- Distance Mesh Networks by Bhaskaran Raman & Kameswari Chebrolu ACM Mobicom 2005 Design and Evaluation of a new MAC Protocol for Long- Distance 802.11 Mesh Networks by Bhaskaran Raman & Kameswari Chebrolu ACM Mobicom 2005 Reviewed by Anupama Guha Thakurta CS525M - Mobile and Ubiquitous

More information

ROUTING PROJECT LIST

ROUTING PROJECT LIST ROUTING PROJECT LIST Branches {Computer Science (CS), Information Science(IS), Software Engineering(SE),Electronics & Communication(EC), Telecommunication (TE),Information Technology(IT),Digital Communication(DCE),Digital

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks c.buratti@unibo.it +9 051 20 9147 Office Hours: Tuesday 5 pm @ Main Building, third fllor Credits: 6 Protocol Stack Time Synchronization Energy Efficiency Distributed Processing

More information

REAL TIME PUBLIC TRANSPORT INFORMATION SERVICE

REAL TIME PUBLIC TRANSPORT INFORMATION SERVICE Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 7, July 2015, pg.88

More information

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks S. Gokilarani 1, P. B. Pankajavalli 2 1 Research Scholar, Kongu Arts and Science College,

More information

Fog Computing. ICTN6875: Emerging Technology. Billy Short 7/20/2016

Fog Computing. ICTN6875: Emerging Technology. Billy Short 7/20/2016 Fog Computing ICTN6875: Emerging Technology Billy Short 7/20/2016 Abstract During my studies here at East Carolina University, I have studied and read about many different t types of emerging technologies.

More information

Research Directions in Low-Power Wireless Networks

Research Directions in Low-Power Wireless Networks Research Directions in Low-Power Wireless Networks Behnam Dezfouli [ dezfouli@ieee.org ] November 2014 1 q OBSERVING AND CHARACTERIZING THE EFFECT OF ENVIRONMENT ON WIRELESS COMMUNICATIONS For example,

More information

Overview of Wi-Fi. Dr. Srikanth Subramanian CKO, Nanocell Networks Wi-Fi A Wireless Success Story

Overview of Wi-Fi. Dr. Srikanth Subramanian CKO, Nanocell Networks  Wi-Fi A Wireless Success Story Overview of Wi-Fi Dr. Srikanth Subramanian CKO, Nanocell Networks www.nanocellnetworks.com Wi-Fi A Wireless Success Story Wi-Fi present in all laptops/aps Wi-Fi Traffic trends Source: Cisco percentage

More information

Distributed Pervasive Systems

Distributed Pervasive Systems Distributed Pervasive Systems CS677 Guest Lecture Tian Guo Lecture 26, page 1 Outline Distributed Pervasive Systems Popular Application domains Sensor nodes and networks Energy in Distributed Systems (Green

More information

Improving the latency of Hand-offs using Sentinel based Architecture

Improving the latency of Hand-offs using Sentinel based Architecture Improving the latency of 802.11 Hand-offs using Sentinel based Architecture Lenin Ravindranath, Fredrick Prashanth, Leo Prasath, Praveen Durairaj, Arul Siromoney Department of Computer Science and Engineering,

More information

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Research Manuscript Title A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Jaichitra.I, Aishwarya.K, P.G Student, Asst.Professor, CSE Department, Arulmigu Meenakshi Amman College of Engineering,

More information

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained

More information

The challenges, opportunities and setting the framework for 5G EMF and Health

The challenges, opportunities and setting the framework for 5G EMF and Health The challenges, opportunities and setting the framework for 5G EMF and Health 5G, EMF & Health 5 December 2017, Warsaw, Poland Mike Wood - General Manager Telstra EME Strategy, Governance and Risk Management

More information

White Paper: Next generation disaster data infrastructure CODATA LODGD Task Group 2017

White Paper: Next generation disaster data infrastructure CODATA LODGD Task Group 2017 White Paper: Next generation disaster data infrastructure CODATA LODGD Task Group 2017 Call for Authors This call for authors seeks contributions from academics and scientists who are in the fields of

More information

Cellular Learning Automata-based Channel Assignment Algorithms in Mobile Ad Hoc Network

Cellular Learning Automata-based Channel Assignment Algorithms in Mobile Ad Hoc Network ISBN 978-1-84626-xxx-x Proceedings of 2009 International Conference on Machine Learning and Computing Perth, Australia, 10-12 July, 2009, pp. xxx-xxx Cellular Learning Automata-based Channel Assignment

More information

A Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data

A Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data A Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data Wei Yang 1, Tinghua Ai 1, Wei Lu 1, Tong Zhang 2 1 School of Resource and Environment Sciences,

More information

Optimization on TEEN routing protocol in cognitive wireless sensor network

Optimization on TEEN routing protocol in cognitive wireless sensor network Ge et al. EURASIP Journal on Wireless Communications and Networking (2018) 2018:27 DOI 10.1186/s13638-018-1039-z RESEARCH Optimization on TEEN routing protocol in cognitive wireless sensor network Yanhong

More information

Green Partial Packet Recovery in Wireless Sensor Networks

Green Partial Packet Recovery in Wireless Sensor Networks 1 Green Partial Packet Recovery in Wireless Sensor Networks Anas Daghistani, Abderrahman Ben Khalifa +, Ahmad Showail, and Basem Shihada CEMSE Division, King Abdullah University of Science and Technology

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

Network Vision: Preparing Telefónica for the next generation of services. Enrique Blanco Systems and Network Global Director

Network Vision: Preparing Telefónica for the next generation of services. Enrique Blanco Systems and Network Global Director Network Vision: Preparing Telefónica for the next generation of services Enrique Blanco Systems and Network Global Director 19.09.2017 Mobile Access Vision Increasing 4G coverage, features and network

More information

Double-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs

Double-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs Double-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs Presented by: Hao Liang Broadband Communications Research (BBCR) Lab 2012.7.6 Outline Introduction and Related Work

More information

Vertical Handover in Vehicular Ad-hoc Networks A Survey

Vertical Handover in Vehicular Ad-hoc Networks A Survey Vertical Handover in Vehicular Ad-hoc Networks A Survey U. Kumaran Department of computer Applications Noorul Islam Center for Higher Education, Kumaracoil,Tamilnadu, India. Abstract- Vehicular Ad-hoc

More information

Comparison of Energy-Efficient Data Acquisition Techniques in WSN through Spatial Correlation

Comparison of Energy-Efficient Data Acquisition Techniques in WSN through Spatial Correlation Comparison of Energy-Efficient Data Acquisition Techniques in WSN through Spatial Correlation Paramvir Kaur * Sukhwinder Sharma # * M.Tech in CSE with specializationl in E-Security, BBSBEC,Fatehgarh sahib,

More information

Chapter-4. Simulation Design and Implementation

Chapter-4. Simulation Design and Implementation Chapter-4 Simulation Design and Implementation In this chapter, the design parameters of system and the various metrics measured for performance evaluation of the routing protocols are presented. An overview

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

T. P. Meenaa, A. Selvaraj Muthayammal Engineering College, Rasipuram, Rasipuram, Tamil Nadu, India

T. P. Meenaa, A. Selvaraj Muthayammal Engineering College, Rasipuram, Rasipuram, Tamil Nadu, India International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 2 ISSN : 2456-3307 Routing Protocol for Heterogeneous Wireless Mesh

More information

From heterogeneous wireless networks to sustainable efficient ICT infrastructures: How antenna and propagation simulation tools can help?

From heterogeneous wireless networks to sustainable efficient ICT infrastructures: How antenna and propagation simulation tools can help? From heterogeneous wireless networks to sustainable efficient ICT infrastructures: How antenna and propagation simulation tools can help? Yves Lostanlen SIRADEL April 9 th 2013, Gothenburg, Sweden EUCAP

More information

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network International Journal of Information and Computer Science (IJICS) Volume 5, 2016 doi: 10.14355/ijics.2016.05.002 www.iji-cs.org Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge

More information

Emergency Response: How dedicated short range communication will help in the future. Matthew Henchey and Tejswaroop Geetla, University at Buffalo

Emergency Response: How dedicated short range communication will help in the future. Matthew Henchey and Tejswaroop Geetla, University at Buffalo Emergency Response: How dedicated short range communication will help in the future. 1.0 Introduction Matthew Henchey and Tejswaroop Geetla, University at Buffalo Dedicated short range communication (DSRC)

More information

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India

More information

Wireless Mesh Networks

Wireless Mesh Networks Wireless Mesh Networks COS 463: Wireless Networks Lecture 6 Kyle Jamieson [Parts adapted from I. F. Akyildiz, B. Karp] Wireless Mesh Networks Describes wireless networks in which each node can communicate

More information

Business Case for the Cisco ASR 5500 Mobile Multimedia Core Solution

Business Case for the Cisco ASR 5500 Mobile Multimedia Core Solution Business Case for the Cisco ASR 5500 Mobile Multimedia Core Solution Executive Summary The scale, use and technologies of mobile broadband networks are changing rapidly. Mobile broadband growth continues

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

PRISM: Platform for Remote Sensing using Smartphones

PRISM: Platform for Remote Sensing using Smartphones PRISM: Platform for Remote Sensing using Smartphones Tathagata Das Microsoft Research India Bangalore 560080, India tathadas@microsoft.com Prashanth Mohan University of California, Berkeley Berkeley, CA

More information

Pervasive Computing. OpenLab Jan 14 04pm L Institute of Networked and Embedded Systems

Pervasive Computing. OpenLab Jan 14 04pm L Institute of Networked and Embedded Systems Pervasive Computing Institute of Networked and Embedded Systems OpenLab 2010 Jan 14 04pm L4.1.01 MISSION STATEMENT Founded in 2007, the Pervasive Computing Group at Klagenfurt University is part of the

More information

Route and Spectrum Selection in Dynamic Spectrum Networks

Route and Spectrum Selection in Dynamic Spectrum Networks Route and Spectrum Selection in Dynamic Spectrum Networks Qiwei Wang Tsinghua University Beijing, China wangqw04@mails.tsinghua.edu.cn Haitao Zheng Dept. of Computer Science Univ. of California, Santa

More information

Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning

Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Sapna B Kulkarni,B.E,MTech (PhD) Associate Prof, Dept of CSE RYM Engg.college, Bellari VTU Belgaum Shainaj.B

More information

Accelerating Innovation and Collaboration for the Next Stage

Accelerating Innovation and Collaboration for the Next Stage Accelerating Innovation and Collaboration for the Next Stage November 8, 2013 Smart Life & Smart Work in the Next Stage - ICT as an Enabler Transportation Intelligent Transportation Systems, Quick Charging

More information

Disruptive Innovation Demonstrating WiFi3 vs ac

Disruptive Innovation Demonstrating WiFi3 vs ac Edgewater Wireless February 2016 Disruptive Innovation Demonstrating WiFi3 vs 802.11ac Solving WiFi interference & capacity issues just got easier with 3 channels on a single radio WiFi3 technology. It

More information

An efficient trigger to improve intra-wifi handover performance

An efficient trigger to improve intra-wifi handover performance An efficient trigger to improve intra-wifi handover performance Roberta Fracchia, Guillaume Vivier Motorola Labs, Parc les Algorithmes, Saint-Aubin, 91193 Gif-sur-Yvette, France Abstract Seamless mobility

More information

Chapter 1. Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization. Revised: August 2011

Chapter 1. Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization. Revised: August 2011 Introduction ti Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient

More information

WHITE PAPER. LTE in Mining. Will it provide the predictability, capacity and speed you need for your mine?

WHITE PAPER. LTE in Mining. Will it provide the predictability, capacity and speed you need for your mine? WHITE PAPER LTE in Mining Will it provide the predictability, capacity and speed you need for your mine? Table of Contents I. Executive Overview 3 II. Methods of LTE Deployment Today 4 III. Availability

More information

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor [Nitnaware *, 5(11): November 218] ISSN 2348 834 DOI- 1.5281/zenodo.1495289 Impact Factor- 5.7 GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES INVESTIGATION OF DETECTION AND PREVENTION SCHEME FOR

More information

Funded Project Final Survey Report

Funded Project Final Survey Report Funded Project Final Survey Report Principal Investigator: Prof Andrea Goldsmith Project Title: Wireless Sensor Networks Technology for Smart Buildings 1. Project Description: This project sets forth a

More information

Hoover 5G Technology Dr. Kirti Gupta Vice President, Technology & Economic Strategy, Qualcomm Inc. January 10, 2019

Hoover 5G Technology Dr. Kirti Gupta Vice President, Technology & Economic Strategy, Qualcomm Inc. January 10, 2019 Hoover IP2 @Stanford 5G Technology Dr. Kirti Gupta Vice President, Technology & Economic Strategy, Qualcomm Inc. January 10, 2019 The views and opinions expressed in this presentation are those of the

More information

Running Reports. Choosing a Report CHAPTER

Running Reports. Choosing a Report CHAPTER 13 CHAPTER WCS reporting is necessary to monitor the system and network health as well as troubleshoot problems. A number of reports can be generated to run on an immediate and scheduled basis. Each report

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Analysis Range-Free Node Location Algorithm in WSN

Analysis Range-Free Node Location Algorithm in WSN International Conference on Education, Management and Computer Science (ICEMC 2016) Analysis Range-Free Node Location Algorithm in WSN Xiaojun Liu1, a and Jianyu Wang1 1 School of Transportation Huanggang

More information

An Energy Efficient and Delay Aware Data Collection Protocol in Heterogeneous Wireless Sensor Networks A Review

An Energy Efficient and Delay Aware Data Collection Protocol in Heterogeneous Wireless Sensor Networks A Review Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.934

More information

Converged Access: Wireless AP and RF

Converged Access: Wireless AP and RF This chapter describes the best recommendation or practices of Radio Resource Management (RRM), beam forming, Fast SSID, and Cisco CleanAir features. The examples provided in this chapter are sufficient

More information

Regulation and the Internet of Things

Regulation and the Internet of Things Regulation and the Internet of Things 15 th Global Symposium for Regulators (GSR15) Prof. Ian Brown The views expressed in this presentation are those of the author and do not necessarily reflect the opinions

More information

Performance Evaluation of Bluetooth Low Energy Communication

Performance Evaluation of Bluetooth Low Energy Communication SCITECH Volume 7, Issue 2 RESEARCH ORGANISATION April 28, 2018 Journal of Information Sciences and Computing Technologies www.scitecresearch.com/journals Performance Evaluation of Bluetooth Low Energy

More information

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK WSN NETWORK ARCHITECTURES AND PROTOCOL STACK Sensing is a technique used to gather information about a physical object or process, including the occurrence of events (i.e., changes in state such as a drop

More information

Ad Hoc Networks - Applications and System Design

Ad Hoc Networks - Applications and System Design Ad Hoc Networks - Applications and System Design Prof Sanjay Srivastava DA-IICT, Gandhinagar Modelling and Analysis Group of NeTworks (MAGNeT) Two day workshop on Ad Hoc Networks: Design, Applications,

More information

Mobile Edge Computing for 5G: The Communication Perspective

Mobile Edge Computing for 5G: The Communication Perspective Mobile Edge Computing for 5G: The Communication Perspective Kaibin Huang Dept. of Electrical & Electronic Engineering The University of Hong Kong Hong Kong Joint Work with Yuyi Mao (HKUST), Changsheng

More information

Wi-Fi 6 What s It All About?

Wi-Fi 6 What s It All About? WHITE PAPER Wi-Fi 6 What s It All About? By Cees Links, GM of Qorvo Wireless Connectivity Business Unit Formerly Founder & CEO of GreenPeak Technologies Is Wi-Fi Running Out of Steam? Despite that nobody

More information

Dr. Evaldas Stankevičius, Regulatory and Security Expert.

Dr. Evaldas Stankevičius, Regulatory and Security Expert. 2018-08-23 Dr. Evaldas Stankevičius, Regulatory and Security Expert Email: evaldas.stankevicius@tele2.com 1G: purely analog system. 2G: voice and SMS. 3G: packet switching communication. 4G: enhanced mobile

More information

Last Lecture: Data Link Layer

Last Lecture: Data Link Layer Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless

More information

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless

More information