Mobile ad hoc networks. Sources and sinks revisited. Singleg versus multiple-hops. apps) & multimedia (voice, video); i.e., humans in the loop
|
|
- Theodora Gordon
- 5 years ago
- Views:
Transcription
1 Mobile ad hoc networks 2 Wireless Sensor Architecture Nodes N d ttalking lki tto each h other th Nodes talking to some node in another network (Web server on the, ee.g.) g) GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO FORM A MEANINGFUL NETWORK Tpicall requires some connection to the fixed network Applications: Traditional data (http, (http ftp ftp, or collaborative apps) & multimedia (voice, video); i.e., humans in the loop Access Point s and sinks revisited Singleg versus multiple-hops p p 3 4 s: An entit that provides data/measurements s: Nodes where information is required Belongs to the sensor network as such Ù Is an external entit, e.g., a PDA, but directl connected to the WSN Main difference: comes and goes, often moves around, Ù Is part of an external network (e.g., internet), somehow connected to the WSN Ù One common problem: limited range of wireless communication Essentiall due to limited transmission power, path loss, obstacles Option: multi-hop networks Send packets to an intermediate node Intermediate node forwards packet to its destination Store and forward multi-hop Store-and-forward multi hop network Basic technique applies to both WSN and MANET Note: Store&forward multi-hopping possible solution pp g NOT the onl p E.g., collaborative networking, network coding Do not operate on a per-packet basis Obstacle
2 Hopping pp g in WSNs s of mobilit 5 6 Node mobilit A node participating as source/sink (or destination) or a rela node might move around Deliberatel, Deliberatel self self-propelled propelled or b external force; targeted or at random Happens in both WSN and MANET mobilit In WSN, a sink that is not part of the WSN might move Mobile requester Event mobilit In WSN, event that is to be observed moves around (or extends, shrinks) Different WSN become responsible for surveillance of such an event mobilit Event mobilit 7 8 q Request Propagation p g of answers Movement direction
3 Challenging g goals: QoS In MANET: Usual QoS interpretation Throughput/dela/jitter High perceived QoS for multimedia applications In WSN, more complicated 9 Event detection and/or reporting probabilit Event classification error Detection dela Probabilit of missing a periodic report Approximation accurac (e.g., when WSN constructs a temperature map) Tracking accurac (e.g., difference between true and conjectured position of the pink elephant) Related goal: robustness Network should withstand failure of some Challenging g goals: Efficienc Energ per correctl received bit Counting all the overheads, in intermediate, etc. Energ per reported (unique) event After all, information is important, not paload bits! Dela/energ tradeoffs Network lifetime Time to first node failure Network half-life (how long until 50% of the died?) Time to partition Time to loss of coverage Time to failure of first event notification 0 Challenging g goals: Scalabilit Network should be operational regardless of number of At high efficienc Tpical node counts difficult to guess MANETs: 0s to 00s WSNs: 0s to 000s, mabe more (possible?) Requiring to scale to large node numbers has serious consequences for network architecture Might not result in the most efficient solutions for small networks! Carefull consider the actual application i needs before looking for man solutions! Distributed organization In-network processing Aggregation Design principles p Distributed source coding and distributed compression Distributed and collaborative signal processing Mobile code/agent networking Adaptive fidelit Data centricit Address data, not Implementation options Overla networks and distributed hash tables Publish/subscribe Databases 2
4 Exploit: Location information Activit patterns Heterogeneit Design principles 2p Component-based protocol stacks and cross-laer optimization Service interfaces Gatewa concepts 3 Distributed organization Participants i t should cooperate in organizing i the network E.g., with respect to medium access, routing, Centralistic approach as alternative usuall not feasible hinders scalabilit, robustness Potential shortcomings 4 Not clear whether distributed or centralistic organization achieves better energ efficienc (when all overheads considered) Option: limited it centralized solution Elect for local coordination/control Perhaps rotate this function over time In-network processing MANETs are supposed to deliver bits from one end to the other WSNs, however, are expected to provide information, not necessaril original bits Additional options E.g., manipulate or process the data in the network Main example: aggregation 5 Appl composable aggregation functions to a converge cast tree in a network Tpical functions: minimum, maximum, average, sum, Not amenable functions: median In-network processing: Aggregation g Reduce number of transmitted bits/packets t b appling an aggregation function in the network 6 3 6
5 In-network processing: Distributed 7 Depending on application, more sophisticated processing of data can take place within the network Example edge detection: locall exchange raw data with neighboring, compute edges, onl communicate edge description to far awa data sinks Example tracking/angle detection of signal source: Conceive of sensor as a distributed microphone arra, use it to compute the angle of a single source, onl communicate this angle, not all the raw data Exploit temporal and spatial correlation Observed signals might var onl slowl in time! no need to transmit all data at full rate all the time Signals of neighboring are often quite similar! onl tr to transmit differences (details a bit complicated, see later) Seek other programming paradigms: mobile code, swarm intelligence Adaptive fidelit Adapt the effort with which h data is exchanged to the currentl required accurac/fidelit Example: event detection When there is no event, onl ver rarel send short all is well messages When event occurs, increase rate of message exchanges Example: temperature When temperature is in acceptable range, onl send temperature values at low resolution When temperature becomes high, increase resolution and thus message length 8 Data-centric networking In tpical networks (including ad hoc networks), network transactions are addressed to the identities of specific A node-centric or address-centric networking paradigm In a redundantl deploed sensor networks, specific source of an event, alarm, etc. might not be important Redundanc: e.g., several can observe the same area Thus: focus networking transactions on the data directl instead of their senders and transmitters! data-centric networking Principal design change 9 Implementation options Overla networks & distributed ib t d hash h tables (DHT) Hash table: content-addressable memor Retrieve data from an unknown source, like in peer-to-peer networking with efficient implementation Some disparities remain 20 Static ke in DHT, dnamic changes in WSN DHTs tpicall ignore issues like hop count or distance between when performing a lookup operation
6 Publish/subscribe b ib Implementation options 2 Different interaction paradigm 2 Nodes can publish data, can subscribe to an particular kind of data Once data of a certain tpe has been published, it is delivered to all subscribes Subscription and publication are decoupled in time; subscriber and published are agnostic of each other (decoupled in identit) Databases Matches with the idea of using a data-centric organization of the networking protocols Interested in certain aspects of data == formulating queries for a database Other design principles p Exploit location information Required anwas for man applications; can considerabl increase performance Exploit activit patterns Watch for event shower effect Exploit heterogeneit 22 B construction: of different tpes in the network B evolution: some had to perform more tasks and have less energ left; some received more solar energ than others; Cross-laer optimization of protocol stacks for WSN Goes against grain of standard networking; but promises big performance gains Also applicable to other networks like ad hoc; usuall at least worthwhile to consider for most wireless networks Service interfaces The world s all-purpose network interface: sockets Good for transmitting data from one sender to one receiver Not well matched to WSN needs (ok for ad hoc networks) Expressibilit requirements Support for simple request/response interactions Support for asnchronous event notification Different was for identifing addressee of data B location, b observed values, implicitl b some other form of group membership, b some semanticall meaningful form room 23 Eas accessibilit of in-network processing functions Formulate complex events events defined onl b several Allow to specif accurac & timeliness requirements Access node/network status information i (e.g., batter level) l) Securit, management functionalit, 23 Gatewa concepts in WSNs Necessar to the t for remote access to WSNs 24 Same is true for ad hoc networks; additional complications due to mobilit ( (change route to the gatewa; use different gatewas) WSN: Additionall bridge the gap between different interaction semantics (data vs. address-centric networking) in the gatewa Gatewa needs support for different radios/protocols, Gatewa node
7 WSN to communication to WSN communication Example: Deliver an alarm message to an host Issues: I Issues Need to find a gatewa (integrates routing & service discover) Choose h b best gatewa if severall are available il bl How to find Alice or Alice s IP? Alert Alice How to find the right WSN to answer a need? How to translate from IP protocols to WSN protocols, semantics? Remote requester Ali desktop Alice s d k Gatewa Gatewa Gatewa Alice s PDA WSN tunneling g Summar Use U the th I t t to t tunnel t l WSN packets k t b between t ttwo remote WSNs Network N t k architectures hit t ffor ad dh hoc networks t k are in i principle relativel straightforward and similar to standard networks Mobilit is compensated for b appropriate protocols, but interaction paradigms don t change too much WSNs, on the other hand, look quite different on man levels Gatewa Gatewa Data-centric D i paradigm, di the h need d and d the h possibilit ibili to manipulate i l data as it travels through the network opens new possibilities for protocol design Next, we will look at how these ideas are realized b actual protocols
Wireless Sensor Architecture GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO
Wireless Sensor Architecture 1 GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO FORM A MEANINGFUL NETWORK Mobile ad hoc networks Nodes talking to each other Nodes talking to some
More informationAd hoc and Sensor Networks Chapter 3: Network architecture
Ad hoc and Sensor Networks Chapter 3: Network architecture Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Having looked at the individual nodes in the previous chapter,
More informationAd hoc and Sensor Networks Chapter 3: Network architecture
Ad hoc and Sensor Networks Chapter 3: Network architecture Holger Karl, Andreas Willig, "Protocols and Architectures for Wireless Sensor Networks," Wiley 2005 Goals of this chapter Having looked at the
More informationAd hoc and Sensor Networks Chapter 3: Network architecture
Ad hoc and Sensor Networks Chapter 3: Network architecture Goals of this chapter Having looked at the individual nodes in the previous chapter, we look at general principles and architectures how to put
More informationCSC8223 Wireless Sensor Networks. Chapter 3 Network Architecture
CSC8223 Wireless Sensor Networks Chapter 3 Network Architecture Goals of this chapter General principles and architectures: how to put the nodes together to form a meaningful network Design approaches:
More informationAd hoc and Sensor Networks Chapter 3: Network architecture
Ad hoc and Sensor Networks Chapter 3: Network architecture Holger Karl Computer Networks Group Universität Paderborn Computer Networks Group Universität Paderborn Outline Design principles (skipped) Basic
More informationRouting protocols in WSN
Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can
More informationReferences. The vision of ambient intelligence. The missing component...
References Introduction 1 K. Sohraby, D. Minoli, and T. Znadi. Wireless Sensor Networks: Technology, Protocols, and Applications. John Wiley & Sons, 2007. H. Karl and A. Willig. Protocols and Architectures
More informationAd hoc and Sensor Networks Chapter 1: Motivation & Applications. Holger Karl
Ad hoc and Sensor Networks Chapter 1: Motivation & Applications Holger Karl Goals of this chapter ad hoc & sensor networks are good What their intended application areas are Commonalities and differences
More informationReferences. Introduction. Publish/Subscribe paradigm. In a wireless sensor network, a node is often interested in some information, but
References Content-based Networking H. Karl and A. Willing. Protocols and Architectures t for Wireless Sensor Networks. John Wiley & Sons, 2005. (Chapter 12) P. Th. Eugster, P. A. Felber, R. Guerraoui,
More informationChapter IV: Network Layer
Chapter IV: Network Laer UG3 Computer Communications & Networks (COMN) Mungjin Lee mungjin.lee@ed.ac.uk Slides copright of Kurose and Ross IP addresses: how to get one? Q: How does a host get IP address?
More informationWireless Embedded Systems ( x) Ad hoc and Sensor Networks
Wireless Embedded Systems (0120442x) Ad hoc and Sensor Networks Chaiporn Jaikaeo chaiporn.j@ku.ac.th Department of Computer Engineering Kasetsart University Materials taken from lecture slides by Karl
More informationDiscussion: Clustering Random Curves Under Spatial Dependence
Discussion: Clustering Random Curves Under Spatial Dependence Gareth M. James, Wenguang Sun and Xinghao Qiao Abstract We discuss the advantages and disadvantages of a functional approach to clustering
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationLecture 8 Wireless Sensor Networks: Overview
Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam
More informationROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols
ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric
More informationInternet Indirection Infrastructure
Ke Observation Internet Indirection Infrastructure Virtuall all previous proposals use indirection, e.g., Phsical indirection point mobile IP Logical indirection point IP multicast Ion Stoica UC Berkele
More informationRab Nawaz Jadoon DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology. Mobile Communication
Rab Nawaz Jadoon DCS Assistant Professor COMSATS IIT, Abbottabad Pakistan COMSATS Institute of Information Technology Mobile Communication WSN Wireless sensor networks consist of large number of sensor
More informationWireless Sensor Networks (WSN)
Wireless Sensor Networks (WSN) Introduction M. Schölzel Difference to existing wireless networks Infrastructure-based networks e.g., GSM, UMTS, Base stations connected to a wired backbone network Mobile
More informationCHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL
WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.
More informationUnsupervised Learning. Supervised learning vs. unsupervised learning. What is Cluster Analysis? Applications of Cluster Analysis
7 Supervised learning vs unsupervised learning Unsupervised Learning Supervised learning: discover patterns in the data that relate data attributes with a target (class) attribute These patterns are then
More informationPart I. Wireless Communication
1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable
More informationNetwork Layer: Routing
Network Laer: Routing Instructor: Anirban Mahanti Office: ICT 74 Email: mahanti@cpsc.ucalgar.ca Class Location: ICT Lectures: MWF :00 :0 hours Notes derived Computer Networking: A Top Down Approach Featuring
More informationAnnouncements. CS 5565 Network Architecture and Protocols. Count-To-Infinity. Poisoned Reverse. Distance Vector: Link Cost Changes.
Announcements CS 6 Network Architecture and Protocols Lecture 20 Project 2B Part/ due Wed Apr 27 :9pm Part/2 due Wed Ma :9pm Current reading assignment: Chapter.6.7, Chapter Final Ma 0, 3:2pm, MCB 26 Godmar
More informationAn Energy Efficient Location Service for Mobile Ad Hoc etworks
An Energ Efficient Location Service for Mobile Ad Hoc etworks Zijian Wang, Euphan Bulut and Boleslaw K. Szmanski, Department of Computer Science, Rensselaer Poltechnic Institute, Tro, NY 280 USA {wangz,
More informationOutline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2
CS5984 Mobile Computing Outline : a Survey Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech An Introduction to 1 2 1/2 Advances in micro-electro-mechanical systems technology, wireless communications,
More informationAgenda. distance-vector (what you invented last Friday) hierarchical routing routing in the Internet. v DNS assignment Q&A v Routing Algorithms
Agenda v DNS assignment Q&A v Routing Algorithms distance-vector (what ou invented last Frida) hierarchical routing routing in the Internet Network Laer 4- Chapter 4 Network Laer A note on the use of these
More informationData Gathering for Wireless Sensor Network using PEGASIS Protocol
Data Gathering for Wireless Sensor Network using PEGASIS Protocol Kumari Kalpna a, Kanu Gopal b, Navtej katoch c a Deptt. of ECE, College of Engg.& Mgmt.,Kapurthala, b Deptt. of CSE, College of Engg.&
More informationDISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES
DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES Dr. Jack Lange Computer Science Department University of Pittsburgh Fall 2015 Outline System Architectural Design Issues Centralized Architectures Application
More informationComputer Networks. Instructor: Niklas Carlsson
Computer Networks Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se Notes derived Computer Networking: A Top Down Approach, b Jim Kurose and Keith Ross, Addison-Wesle. The slides are adapted and
More informationIntroduction to Mobile Ad hoc Networks (MANETs)
Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device
More informationAdvanced Networking Technologies
Advanced Networking Technologies Chapter 4 Medium Access Control Protocols (Acknowledgement: These slides have been prepared by Prof. Dr. Holger Karl) Advanced Networking (SS 16): 04 Medium Access Control
More informationMobile Agents based Reliable and Energy Efficient Routing Protocol for MANET
110 Mobile Agents based Reliable and Energ Efficient Routing Protocol for MANET Saravanan Nallusam 1*, Subramani Appavupillai 2, Sivakumar Ponnusam 3 1 K. S. R. College of Engineering, Tiruchengode, Namakkal,
More informationGraph abstraction: costs. Graph abstraction 10/26/2018. Interplay between routing and forwarding
0/6/08 Interpla between routing and forwarding Routing Algorithms Link State Distance Vector BGP routing routing algorithm local forwarding table header value output link 000 00 0 00 value in arriving
More informationWireless Sensor Networks --- Concepts and Challenges
Outline Wireless Sensor Networks --- Concepts and Challenges Basic Concepts Applications Characteristics and Challenges 2 Traditional Sensing Method Basic Concepts Signal analysis Wired/Wireless Object
More informationChapter 4: Network Layer
Chapter 4: Network Laer 4. Introduction 4. Virtual circuit and datagram networks 4. What s inside a router 4.4 IP: Internet Protocol Datagram format IPv4 addressing ICMP IPv6 4. Routing algorithms Link
More informationCSCI 466 Midterm Networks Fall 2013
CSCI 466 Midterm Networks Fall 2013 Name: This exam consists of 6 problems on the following 7 pages. You may use your single-sided hand-written 8 ½ x 11 note sheet and a calculator during the exam. No
More informationAnnouncements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms
Announcements CS 6 Network Architecture and Protocols Lecture 8 Godmar Back Project A due Apr 8 (toda) Project B due in parts: Apr 9 and Ma 6 See link to NY Times article on RFC Project B Project B Highlevel
More informationLecture 9. Quality of Service in ad hoc wireless networks
Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement
More informationComputation of Multiple Node Disjoint Paths
Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes
More informationSystems and Methods for Mobile Communications
Universit of Central Florida UCF Patents Patent Sstems and Methods for Mobile Communications 3-3-215 Kien Hua Universit of Central Florida Find similar works at: http://stars.librar.ucf.edu/patents Universit
More informationLifetime Analysis of Random Event-Driven Clustered Wireless Sensor Networks. Presented by Yao Zheng
Lifetime Analysis of Random Event-Driven Clustered Wireless Sensor Networks Presented by Yao Zheng Contributions Analyzing the lifetime of WSN without knowing the lifetime of sensors Find a accurate approximation
More informationWireless Sensor Networks --- Concepts and Challenges
Wireless Sensor Networks --- Concepts and Challenges Outline Basic Concepts Applications Characteristics and Challenges 2 1 Basic Concepts Traditional Sensing Method Wired/Wireless Object Signal analysis
More informationPerformance Comparison of AODV and Soft AODV Routing Protocol
World Academ of Science, Engineering and Technolog Performance Comparison of AODV and Soft AODV Routing Protocol Abhishek, Seema Devi, Joti Ohri International Science Inde, Computer and Information Engineering
More informationLocation Awareness in Ad Hoc Wireless Mobile Neworks
Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,
More informationFault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network
Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network P.S Patheja, Akhilesh Waoo & Parul Shrivastava Dept.of Computer Science and Engineering, B.I.S.T, Anand Nagar,
More informationMajor Design Challenges. Sensor Network Characteristics. Crosslayer Design in Sensor Networks. Energy-Constrained Nodes. Wireless Sensor Networks
EE360: Lecture 14 Outline Sensor Networks Announcements Progress report deadline extended to 3/ (11:59pm) nd paper summary due March 7 (extended) Project poster session March 15 5pm? Overview of sensor
More informationClustering Part 2. A Partitional Clustering
Universit of Florida CISE department Gator Engineering Clustering Part Dr. Sanja Ranka Professor Computer and Information Science and Engineering Universit of Florida, Gainesville Universit of Florida
More informationReferences. K. Sohraby, D. Minoli, and T. Znati. Wireless Sensor Networks: Technology, Protocols, and
Middleware References K. Sohraby, D. Minoli, and T. Znati. Wireless Sensor Networks: Technology, Protocols, and Applications. John Wiley & Sons, 2007. (Chapter t 8) Y. Yu, B. Krishnamachari, and V. K.
More informationECE 586 Advanced Topics: Wireless Networking
ECE 586 Advanced Topics: Wireless Networking http://www.ece.rochester.edu/courses/ece586 Spring 2005 TR 2-3:15, CSB 523 Wendi Heinzelman OH: T 3:30-4:30 Hopeman 307 wheinzel@ece.rochester.edu Class information
More informationCS348: Computer Networks (SMTP, POP3, IMAP4); FTP
CS348: Computer Networks E-MAIL (SMTP, POP3, IMAP4); FTP Dr. Manas Khatua Assistant Professor Dept. of CSE, IIT Guwahati E-mail: manaskhatua@iitg.ac.in Electronic mail (E-mail) Allows users to exchange
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationData-Centric Query in Sensor Networks
Data-Centric Query in Sensor Networks Jie Gao Computer Science Department Stony Brook University 10/27/05 Jie Gao, CSE590-fall05 1 Papers Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin, Directed
More informationSelf-Organization in Sensor and Actor Networks
Self-Organization in Sensor and Actor Networks Falko Dressler University of Erlangen, Germany BICENTINNIAL BICINTINNIAL John Wiley & Sons, Ltd Contents Foreword Preface About the Author List of Abbreviations
More informationPeer entities. Protocol Layering. Protocols. Example
Peer entities Protocol Layering An Engineering Approach to Computer Networking Customer A and B are peers Postal worker A and B are peers Protocols A protocol is a set of rules and formats that govern
More informationAd hoc and Sensor Networks Chapter 13a: Protocols for dependable data transport
Ad hoc and Sensor Networks Chapter 13a: Protocols for dependable data transport Holger Karl Computer Networks Group Universität Paderborn Overview Dependability requirements Delivering single packets Delivering
More informationChapter 4 Network Layer
Chapter 4 Network Laer A note on the use of these ppt slides: The notes used in this course are substantiall based on powerpoint slides developed and coprighted b J.F. Kurose and K.W. Ross, 1996-2007 Computer
More informationNetwork Layer: Control Plane 5-2
Network Laer: Control Plane EECS34 8-03-05 4- Chapter 5: network laer control plane chapter goals: understand principles behind network control plane traditional routing algorithms SDN controlllers Internet
More informationAd Hoc Networks: Introduction
Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2
More informationSecure Routing with the AODV Protocol
2005 Asia-Pacific Conference on Communications, Perth, Western Australia, 3-5 October 2005. Secure Routing with the AODV Protocol Asad Amir Pirzada and Chris McDonald School of Computer Science & Software
More information11/13/2017 Network Layer (SSL) Network-layer functions. Recall the two network-layer functions:
Chapter 5: outline 5. introduction 5.2 routing protocols link state distance vector 5.3 intra-as routing in the Internet 5.4 inter-as routing: BGP 5.5 The SDN control 5.6 ICMP: The Internet Control Message
More informationWireless Networks (CSC-7602) Lecture 1 (27 Aug 2007)
Wireless Networks (CSC-7602) Lecture 1 (27 Aug 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Handouts Class information Schedule (check online frequently) 2 1 Goals Principles on Wireless
More informationInterdomain Routing Design for MobilityFirst
Interdomain Routing Design for MobilityFirst October 6, 2011 Z. Morley Mao, University of Michigan In collaboration with Mike Reiter s group 1 Interdomain routing design requirements Mobility support Network
More informationTerabit Satellite Systems and Gateway Diversity
ASMS /SPSC 2014, Livorno, Ital III Gatewa Handover Implications on Transport Laer Performance in Terabit Satellite Networks Giovanni Giambene, Doanh Kim Luong, Van Anh Le CNIT, Department of Information
More informationTelematics I. Chapter 1 A Quick Tour. Goals of this chapter Examples Direct connection between two devices Multiple devices Errors
Telematics I Chapter 1 A Quick Tour Goals of this chapter Examples Direct connection between two devices Multiple devices Errors (Acknowledgement: these slides have been edited from Prof. Karl s set of
More informationUsing Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks. Wang Wei Vikram Srinivasan Chua Kee-Chaing
Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wang Wei Vikram Srinivasan Chua Kee-Chaing Overview The motivation of mobile relay The performance analysis for mobile relay in the
More informationGame Aware Data Dissemination
Game Aware Data Dissemination Bettina Kemme School of Computer Science Cesar Cañas, Jörg Kienzle, Kaiwen Zhang, and Arno Jacobsen McGill University Multiplayer Online Games (MOG) From a few players up
More informationLecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT
Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet
More informationRouting Protocols in Mobile Ad-Hoc Network
International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana
More informationDr Markus Hagenbuchner CSCI319 SIM. Distributed Systems Chapter 4 - Communication
Dr Markus Hagenbuchner markus@uow.edu.au CSCI319 SIM Distributed Systems Chapter 4 - Communication CSCI319 Chapter 4 Page: 1 Communication Lecture notes based on the textbook by Tannenbaum Study objectives:
More informationCACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS
International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department
More informationDistributed Systems 26. Mobile Ad Hoc Mesh Networks
Distributed Systems 26. Mobile Ad Hoc Mesh Networks Paul Krzyzanowski pxk@cs.rutgers.edu 12/16/2011 1 Mesh Networks Mobile Ad-hoc networks, sensor networks, Decentralized networking No need for routers
More informationALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
e-issn 2455 1392 Volume 1 Issue 1, November 2015 pp. 1-7 http://www.ijcter.com ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS Komal Shah 1, Heena Sheth 2 1,2 M. S. University, Baroda Abstract--
More informationChapter 7. Telecommunications, the Internet, and Wireless Technology
Chapter 7 Telecommunications, the Internet, and Wireless Technology LEARNING OBJECTIVES What are the principal components of telecommunications networks and key networking technologies? What are the different
More informationA configuration-only approach to shrinking FIBs. Prof Paul Francis (Cornell)
A configuration-only approach to shrinking FIBs Prof Paul Francis (Cornell) 1 Virtual Aggregation An approach to shrinking FIBs (and RIBs) In routers, not in route reflectors Works with legacy routers
More informationInternational Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN
International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 106 Self-organizing behavior of Wireless Ad Hoc Networks T. Raghu Trivedi, S. Giri Nath Abstract Self-organization
More informationMobile Element Scheduling for Efficient Data Collection in Wireless Sensor Networks: A Survey
Journal of Computer Science 7 (1): 114-119, 2011 ISSN 1549-3636 2011 Science Publications Mobile Element Scheduling for Efficient Data Collection in Wireless Sensor Networks: A Survey K. Indra Gandhi and
More informationSecure Routing and Transmission Protocols for Ad Hoc Networks
MobiHoc 2002 Working Session on Security in Ad Hoc Networks Secure Routing and Transmission Protocols for Ad Hoc Networks Zygmunt J. Haas and P. Papadimitratos (Panos) Cornell University Wireless Networks
More informationInitial motivation: 32-bit address space soon to be completely allocated. Additional motivation:
IPv6 Initial motivation: 3-bit address space soon to be completel allocated. Additional motivation: Header format helps speed processing/forwarding Header changes to facilitate QoS (service classes) Reduction
More informationHIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORKS. A Thesis. Presented to. the Faculty of California Polytechnic State University
HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORKS A Thesis Presented to the Faculty of California Polytechnic State University San Luis Obispo In Partial Fulfillment of the Requirements for the
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 5, May ISSN
International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013 357 An Optimized Network Design System for Mobile Adhoc Networks ABSTRACT Mrs. D.Chitra, Ms. R.Poonguzhali (Department
More informationHIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson
HIP Host Identity Protocol October 2007 Patrik Salmela Ericsson Agenda What is the Host Identity Protocol (HIP) What does HIP try to solve HIP basics Architecture The HIP base exchange HIP basic features
More informationTAG: A TINY AGGREGATION SERVICE FOR AD-HOC SENSOR NETWORKS
TAG: A TINY AGGREGATION SERVICE FOR AD-HOC SENSOR NETWORKS SAMUEL MADDEN, MICHAEL J. FRANKLIN, JOSEPH HELLERSTEIN, AND WEI HONG Proceedings of the Fifth Symposium on Operating Systems Design and implementation
More informationSUMMERY, CONCLUSIONS AND FUTURE WORK
Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six
More information4.5.2 The Distance-Vector (DV) Routing Algorithm
4.5 ROUTING ALGORITHMS 371 highl congested (for eample, high-dela) links. Another solution is to ensure that not all routers run the LS algorithm at the same time. This seems a more reasonable solution,
More informationNetworks. Distributed Systems. Philipp Kupferschmied. Universität Karlsruhe, System Architecture Group. May 6th, 2009
Networks Distributed Systems Philipp Kupferschmied Universität Karlsruhe, System Architecture Group May 6th, 2009 Philipp Kupferschmied Networks 1/ 41 1 Communication Basics Introduction Layered Communication
More informationIntra-AS Routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
Intra-AS Routing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesle http://xkcd.com/85/ Some materials copright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved
More informationEuropean Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105
European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105 A Holistic Approach in the Development and Deployment of WSN-based
More informationCS 268: Internet Architecture & E2E Arguments. Today s Agenda. Scott Shenker and Ion Stoica (Fall, 2010) Design goals.
CS 268: Internet Architecture & E2E Arguments Scott Shenker and Ion Stoica (Fall, 2010) 1 Today s Agenda Design goals Layering (review) End-to-end arguments (review) 2 1 Internet Design Goals Goals 0 Connect
More informationScalable overlay Networks
overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent
More informationTime Synchronization in Wireless Sensor Networks: CCTS
Time Synchronization in Wireless Sensor Networks: CCTS 1 Nerin Thomas, 2 Smita C Thomas 1, 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: A time synchronization algorithm
More informationSecure Data Collection for Wireless Sensor Networks
Secure Data Collection for Wireless Sensor Networks Haengrae Cho 1 and Soo-Young Suck 2 1 Department of Computer Engineering, Yeungnam University, Republic of Korea 2 Department of R&D, Gyeongbuk Institute
More informationLocation Based Energy-Efficient Reliable Routing Protocol for Wireless Sensor Networks
Location Based Energy-Efficient Reliable Routing Protocol for Wireless Sensor Networks RAFE ALASEM 1, AHMED REDA 2 AND MAHMUD MANSOUR 3 (1) Computer Science Department Imam Muhammad ibn Saud Islamic University
More informationAn Ant-Based Routing Algorithm to Achieve the Lifetime Bound for Target Tracking Sensor Networks
An Ant-Based Routing Algorithm to Achieve the Lifetime Bound for Target Tracking Sensor Networks Peng Zeng Cuanzhi Zang Haibin Yu Shenyang Institute of Automation Chinese Academy of Sciences Target Tracking
More informationWireless and Mobile Networks
Monash University Department of Electrical and Computer Systems Engineering Wireless and Mobile Networks Present and Future Y. Ahmet Şekercioğlu August 2007wireless-nets.tex,v1.5 Y. Ahmet Şekercioğlu:
More informationStereo Matching! Christian Unger 1,2, Nassir Navab 1!! Computer Aided Medical Procedures (CAMP), Technische Universität München, Germany!!
Stereo Matching Christian Unger 12 Nassir Navab 1 1 Computer Aided Medical Procedures CAMP) Technische Universität München German 2 BMW Group München German Hardware Architectures. Microprocessors Pros:
More informationWireless Networking & Mobile Computing
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless
More informationA Novel Routing Protocol with High Energy Performance in Mobile Special Networks
Journal of Computer Science 7 (1): 108-113, 2011 ISSN 1549-3636 2011 Science Publications A Novel Routing Protocol with High Energy Performance in Mobile Special Networks Ali Norouzi and B. Berk Ustundag
More informationPart I: Introduction to Wireless Sensor Networks. Xenofon Fafoutis
Part I: Introduction to Wireless Sensor Networks Xenofon Fafoutis Sensors 2 DTU Informatics, Technical University of Denmark Wireless Sensor Networks Sink Sensor Sensed Area 3 DTU Informatics,
More informationUnicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks
Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on
More information