Achieving Network Consistency. Octav Chipara
|
|
- Elmer McDaniel
- 6 years ago
- Views:
Transcription
1 Achieving Network Consistency Octav Chipara
2 Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2
3 Next few lectures Start building a wireless stack from the ground up already covered phy properties mac layer today: network consistency next class: Prof. Ted Herman will talk about timesync future lectures network consistency link estimation topology control routing 3
4 Problem formulation Consistency is a foundation for many network protocols routing tree maintenance => next hop has lower cost network configuration => all nodes have the most recent configuration neighborhood maintenance => a node in all its neighbor s lists Goal: when a node updates/generates a new piece of data, this information must be relayed to all other nodes minimize the number of redundant transmissions (i.e., a node should receive a packet only once) scales well with network size and density 4
5 Basic approach - Flooding Upon hearing new data a node rebroadcasts it eventual consistency Challenge: wireless is a broadcast medium broadcast storm 5
6 Basic approach - Flooding Upon hearing new data a node rebroadcasts it eventual consistency Challenge: wireless is a broadcast medium broadcast storm 5
7 Basic approach - Flooding Upon hearing new data a node rebroadcasts it eventual consistency Challenge: wireless is a broadcast medium broadcast storm 5
8 Basic approach - Flooding Upon hearing new data a node rebroadcasts it eventual consistency Challenge: wireless is a broadcast medium broadcast storm 5
9 Basic approach - Flooding Upon hearing new data a node rebroadcasts it eventual consistency Challenge: wireless is a broadcast medium broadcast storm Broadcast storm: every tries to transmit at the same time resulting in numerous collisions 5
10 Mitigating the broadcast storm problem Randomized delays: introduce delays before packet transmissions reduces the likelihood of packet collisions however, it is often hard to determine the optimal delays depends on the the local node density Transmission suppression: some nodes do not need to transmit a node that hears the same data from several neighbors stops transmitting reduces the number of contending nodes however, it may prolong the time to propagate the message 6
11 Randomized delays C A Reduces likelihood of collisions nodes A, B, C, D transmit at different times B Still inefficient node C and D should not transmit node A and B share many neighbors D 7
12 Transmission suppression C A Transmission suppression reduces the number of contenders potential for significant savings B Knowing more information may help you make better decisions e.g., two hop neighborhood info D 8
13 Transmission suppression C A Transmission suppression reduces the number of contenders potential for significant savings B Knowing more information may help you make better decisions e.g., two hop neighborhood info D 8
14 Transmission suppression C A Transmission suppression reduces the number of contenders potential for significant savings B Knowing more information may help you make better decisions e.g., two hop neighborhood info D 8
15 Transmission suppression C A B Suppressing wrong transmissions will increase propagation delays e.g., suppressing A and B stops progress D 9
16 Trickle - algorithm outline Divides the time into intervals, nodes are synchronized a node transmits metadata in each interval In response to a change in metadata a node picks a random time in its current interval t to transmit its data let c be the number of times a node hears a data item if c < threshold, then node transmits the data item else, transmission is suppressed 1
17 Example k=1 c A t A1 t A2 B t B1 t B2 C τ t C1 t C2 time transmission suppressed transmission reception k = 1 11
18 Example counter k=1 c A t A1 t A2 B t B1 t B2 C τ t C1 t C2 time transmission suppressed transmission reception k = 1 11
19 Example counter k=1 c A t A1 t A2 B t B1 t B2 C τ t C1 t C2 time transmission suppressed transmission reception suppression k = 1 threshold 11
20 Example c A t A1 t A2 B 1 t B1 t B2 C τ t C1 t C2 time transmission suppressed transmission reception k = 1 12
21 Example k=1 c A t A1 t A2 B 2 t B1 t B2 C τ t C1 t C2 time transmission suppressed transmission reception IETF 74 8 k = 1 13
22 Example k=1 c A t A1 t A2 B 2 t B1 t B2 C τ t C1 t C2 time transmission suppressed transmission reception k = 1 14
23 Example c A t A1 t A2 B t B1 t B2 C τ t C1 t C2 time transmission suppressed transmission reception k = 1 15
24 Example k=1 c A 1 t A1 t A2 B t B1 t B2 C 1 τ t C1 t C2 time transmission suppressed transmission reception k = 1 16
25 Example k=1 c A 1 t A1 t A2 B t B1 t B2 C 1 τ t C1 t C2 time transmission suppressed transmission reception 12 k = 1 17
26 Example k=1 c A 1 t A1 t A2 B t B1 t B2 C 1 τ t C1 t C2 time transmission suppressed transmission reception k = 1 18
27 Trickle - features Managing protocol overhead it is wasteful to transmit state information when nothing changes insight: upon a change metadata should be transmitted fast after a change rate of transmitting metadata should decrease solution: exponentially decrease the metadata when state is consistent reset the rate of transmitting metadata upon hearing new data Suppression based on number of overhead packets relies on minimal topological information tolerates frequent changes in topology 19
28 Impact of packet losses [Single hop network] The number of rounds scale with O(log(n)) 2
29 Tickle without synchronization Remove the requirement of nodes operating synchronized each node operates independently the intervals are not aligned anymore New problem: short-listening 21
30 Short-listening problem B transmits soon after the start of each interval reduce likelihood for its transmissions to be suppressed 22
31 Solution to the short-listen problem Divide a slot in two parts listen only - nodes only listen during this part of the interval transmit part - nodes transmit randomly within this interval 2 listen transmit 23
32 Simulation results 5 spacing, 6 hops 2 spacing, 4 hops 24
33 How could we improve Trickle? Take advantage of the spatial correlation of packets Differentiate between stable and unstable neighbors 25
Mobile and Sensor Systems. Lecture 6: Sensor Network Reprogramming and Mobile Sensors Dr Cecilia Mascolo
Mobile and Sensor Systems Lecture 6: Sensor Network Reprogramming and Mobile Sensors Dr Cecilia Mascolo In this lecture We will describe techniques to reprogram a sensor network while deployed. We describe
More informationData Dissemination in Wireless Sensor Networks
Data Dissemination in Wireless Sensor Networks Philip Levis UC Berkeley Intel Research Berkeley Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Sensor Networks Sensor networks
More informationA survey on broadcast protocols in multihop cognitive radio ad hoc network
A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels
More informationIncreasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More informationCS649 Sensor Networks IP Lecture 9: Synchronization
CS649 Sensor Networks IP Lecture 9: Synchronization I-Jeng Wang http://hinrg.cs.jhu.edu/wsn06/ Spring 2006 CS 649 1 Outline Description of the problem: axes, shortcomings Reference-Broadcast Synchronization
More informationFast and efficient randomized flooding on lattice sensor networks
Fast and efficient randomized flooding on lattice sensor networks Ananth Kini, Vilas Veeraraghavan, Steven Weber Department of Electrical and Computer Engineering Drexel University November 19, 2004 presentation
More informationOptimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer
Optimal Clock Synchronization in Networks Christoph Lenzen Philipp Sommer Roger Wattenhofer Time in Sensor Networks Synchronized clocks are essential for many applications: Sensing TDMA Localization Duty-
More informationEvaluation of the 6TiSCH Network Formation
Evaluation of the 6TiSCH Network Formation Dario Fanucchi 1 Barbara Staehle 2 Rudi Knorr 1,3 1 Department of Computer Science University of Augsburg, Germany 2 Department of Computer Science University
More informationChapter 4: Directional and Smart Antennas. Prof. Yuh-Shyan Chen Department of CSIE National Taipei University
Chapter 4: Directional and Smart Antennas Prof. Yuh-Shyan Chen Department of CSIE National Taipei University 1 Outline Antennas background Directional antennas MAC and communication problems Using Directional
More informationolsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra
olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra www.scii.nl/~elektra Introduction Olsr.org is aiming to an efficient opensource routing solution for wireless networks Work
More informationAS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks
AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks By Beakcheol Jang, Jun Bum Lim, Mihail Sichitiu, NC State University 1 Presentation by Andrew Keating for CS577 Fall 2009 Outline
More informationMathematical Problems in Networked Embedded Systems
Mathematical Problems in Networked Embedded Systems Miklós Maróti Institute for Software Integrated Systems Vanderbilt University Outline Acoustic ranging TDMA in globally asynchronous locally synchronous
More informationWireless Communication
Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Fine-Grained Channel Access in Wireless LAN (SIGCOMM 10) Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Physical-Layer Data Rate PHY
More informationUltra-Low Duty Cycle MAC with Scheduled Channel Polling
Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye and John Heidemann CS577 Brett Levasseur 12/3/2013 Outline Introduction Scheduled Channel Polling (SCP-MAC) Energy Performance Analysis Implementation
More informationOutline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review
EEC-484/584 Computer Networks Lecture 8 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Homework #1 Review Protocol verification Example
More informationDiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers
DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers Kwang-il Hwang, Kyung-tae Kim, and Doo-seop Eom Department of Electronics and Computer Engineering, Korea University 5-1ga,
More informationMultiple Access Methods
Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Multiple Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 16.11.2004 Content of presentation Protocol
More informationVulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR
5 th Scandinavian Workshop on Wireless Ad-hoc Networks May 3-4, 2005 Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR Mikael Fredin - Ericsson Microwave Systems, Sweden
More informationTSIN01 Information Networks Lecture 9
TSIN01 Information Networks Lecture 9 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 26 th, 2017 Danyo Danev TSIN01 Information
More informationSMACK - A SMart ACKnowledgement Scheme for Broadcast Messages in Wireless Networks. COMP Paper Presentation Junhua Yan Nov.
SMACK - A SMart ACKnowledgement Scheme for Broadcast Messages in Wireless Networks COMP635 -- Paper Presentation Junhua Yan Nov. 28, 2017 1 Reliable Transmission in Wireless Network Transmit at the lowest
More informationWirelessHART Modeling and Performance Evaluation
WirelessHART Modeling and Performance Evaluation Anne Remke and Xian Wu October 24, 2013 A. Remke and X. Wu (University of Twente) WirelessHART October 24, 2013 1 / 21 WirelessHART [www.hartcomm.org] A.
More informationEnergy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks
Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wendi B. Heinzelman Department of Electrical and Computer
More informationFine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012
Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel
More informationSimple, Optimal, Fast, and Robust Wireless Random Medium Access Control
Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Jianwei Huang Department of Information Engineering The Chinese University of Hong Kong KAIST-CUHK Workshop July 2009 J. Huang (CUHK)
More informationCS434/534: Topics in Networked (Networking) Systems
CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/
More informationOverview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network
Ad Hoc and Wireless Mesh Networking Laura Marie Feeney lmfeeney@sics.se Datakommunikation III, HT 00 Overview Ad hoc and wireless mesh networks Ad hoc network (MANet) operates independently of network
More informationECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III
ECE 333: Introduction to Communication Networks Fall 200 Lecture 5: Medium Access Control III CSMA CSMA/CD Carrier Sense Multiple Access (CSMA) In studying Aloha, we assumed that a node simply transmitted
More informationPapers. Ad Hoc Routing. Outline. Motivation
CS 15-849E: Wireless Networks (Spring 2006) Ad Hoc Routing Discussion Leads: Abhijit Deshmukh Sai Vinayak Srinivasan Seshan Dave Andersen Papers Outdoor Experimental Comparison of Four Ad Hoc Routing Algorithms
More informationUtilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks
Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,
More informationUnderstanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø
Understanding and Mitigating the Impact of Interference on 802.11 Networks By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø 1 Outline Background Contributions 1. Quantification & Classification
More informationScheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks
Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks Wenbo Zhao and Xueyan Tang School of Computer Engineering, Nanyang Technological University, Singapore 639798 Email:
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer
Politecnico di Milano Advanced Network Technologies Laboratory Beyond Standard 802.15.4 MAC Sublayer MAC Design Approaches o Conten&on based n Allow collisions n O2en CSMA based (SMAC, STEM, Z- MAC, GeRaF,
More informationStarvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks
Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Jingpu Shi Theodoros Salonidis Edward Knightly Networks Group ECE, University Simulation in single-channel multi-hop
More informationINTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster
INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise
More informationDesign of an energy efficient Medium Access Control protocol for wireless sensor networks. Thesis Committee
Design of an energy efficient Medium Access Control protocol for wireless sensor networks Thesis Committee Masters Thesis Defense Kiran Tatapudi Dr. Chansu Yu, Dr. Wenbing Zhao, Dr. Yongjian Fu Organization
More informationWireless Internet Routing. IEEE s
Wireless Internet Routing IEEE 802.11s 1 Acknowledgments Cigdem Sengul, Deutsche Telekom Laboratories 2 Outline Introduction Interworking Topology discovery Routing 3 IEEE 802.11a/b/g /n /s IEEE 802.11s:
More informationDISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. Yi Song
DISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS by Yi Song A dissertation submitted to the faculty of The University of North Carolina at Charlotte in partial fulfillment
More informationEnergy-Efficient MANET Routing: Ideal vs. Realistic Performance
Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Paper by: Thomas Knuz IEEE IWCMC Conference Aug. 2008 Presented by: Farzana Yasmeen For : CSE 6590 2013.11.12 Contents Introduction Review:
More informationA Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks
A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks Elisabeth M. Royer, Chai-Keong Toh IEEE Personal Communications, April 1999 Presented by Hannu Vilpponen 1(15) Hannu_Vilpponen.PPT
More informationTIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS
TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering
More informationMobile Communications
COMP61242 Mobile Communications Lecture 7 Multiple access & medium access control (MAC) Barry Cheetham 16/03/2018 Lecture 7 1 Multiple access Communication links by wire or radio generally provide access
More informationEnergy Efficient MAC Protocol with Localization scheme for Wireless Sensor Networks using Directional Antennas
Energy Efficient MAC Protocol with Localization scheme for Wireless Sensor Networks using Directional Antennas Anique Akhtar Department of Electrical Engineering aakhtar13@ku.edu.tr Buket Yuksel Department
More informationSourceSync. Exploiting Sender Diversity
SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored
More informationCognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks
Cognitive Wireless Network 15-744: Computer Networking L-19 Cognitive Wireless Networks Optimize wireless networks based context information Assigned reading White spaces Online Estimation of Interference
More informationIntroduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1
ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS Xiang Ji and Hongyuan Zha Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley,
More informationAdvanced Modeling and Simulation of Mobile Ad-Hoc Networks
Advanced Modeling and Simulation of Mobile Ad-Hoc Networks Prepared For: UMIACS/LTS Seminar March 3, 2004 Telcordia Contact: Stephanie Demers Robert A. Ziegler ziegler@research.telcordia.com 732.758.5494
More informationMobility Tolerant Broadcast in Mobile Ad Hoc Networks
Mobility Tolerant Broadcast in Mobile Ad Hoc Networks Pradip K Srimani 1 and Bhabani P Sinha 2 1 Department of Computer Science, Clemson University, Clemson, SC 29634 0974 2 Electronics Unit, Indian Statistical
More informationCooperation in Random Access Wireless Networks
Cooperation in Random Access Wireless Networks Presented by: Frank Prihoda Advisor: Dr. Athina Petropulu Communications and Signal Processing Laboratory (CSPL) Electrical and Computer Engineering Department
More informationDynamic Zonal Broadcasting for Effective Data Dissemination in VANET
Dynamic Zonal Broadcasting for Effective Data Dissemination in VANET Masters Project Final Report Author: Madhukesh Wali Email: mwali@cs.odu.edu Project Advisor: Dr. Michele Weigle Email: mweigle@cs.odu.edu
More informationDistance-Vector Routing
Distance-Vector Routing Antonio Carzaniga Faculty of Informatics University of Lugano June 8, 2007 c 2005 2007 Antonio Carzaniga 1 Recap on link-state routing Distance-vector routing Bellman-Ford equation
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University
More informationLecture 8 Link-State Routing
6998-02: Internet Routing Lecture 8 Link-State Routing John Ioannidis AT&T Labs Research ji+ir@cs.columbia.edu Copyright 2002 by John Ioannidis. All Rights Reserved. Announcements Lectures 1-5, 7-8 are
More informationGeoMAC: Geo-backoff based Co-operative MAC for V2V networks.
GeoMAC: Geo-backoff based Co-operative MAC for V2V networks. Sanjit Kaul and Marco Gruteser WINLAB, Rutgers University. Ryokichi Onishi and Rama Vuyyuru Toyota InfoTechnology Center. ICVES 08 Sep 24 th
More informationChannel Sensing Order in Multi-user Cognitive Radio Networks
2012 IEEE International Symposium on Dynamic Spectrum Access Networks Channel Sensing Order in Multi-user Cognitive Radio Networks Jie Zhao and Xin Wang Department of Electrical and Computer Engineering
More informationData Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1
Data Gathering Chapter 4 Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Environmental Monitoring (PermaSense) Understand global warming in alpine environment Harsh environmental conditions Swiss made
More informationFiber Distributed Data Interface
Fiber istributed ata Interface FI: is a 100 Mbps fiber optic timed token ring LAN Standard, over distance up to 200 km with up to 1000 stations connected, and is useful as backbone Token bus ridge FI uses
More informationFrom Shared Memory to Message Passing
From Shared Memory to Message Passing Stefan Schmid T-Labs / TU Berlin Some parts of the lecture, parts of the Skript and exercises will be based on the lectures of Prof. Roger Wattenhofer at ETH Zurich
More informationWireless Network Security Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like
More informationSAFETY-MESSAGE ROUTING IN VEHICULAR AD HOC NETWORKS
SAFETY-MESSAGE ROUTING IN VEHICULAR AD HOC NETWORKS A Dissertation Presented to The Academic Faculty By Faisal Ahmad Khan In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy
More informationAPS Implementation over Vehicular Ad Hoc Networks
APS Implementation over Vehicular Ad Hoc Networks Soumen Kanrar Vehere Interactive Pvt Ltd Calcutta India Abstract: The real world scenario has changed from the wired connection to wireless connection.
More informationMultiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks
Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Bernhard Firner Chenren Xu Yanyong Zhang Richard Howard Rutgers University, Winlab May 10, 2011 Bernhard Firner (Winlab)
More informationPULSE: A MAC Protocol for RFID Networks
PULSE: A MAC Protocol for RFID Networks Shailesh M. Birari and Sridhar Iyer K. R. School of Information Technology Indian Institute of Technology, Powai, Mumbai, India 400 076. (e-mail: shailesh,sri@it.iitb.ac.in)
More informationScalable Routing Protocols for Mobile Ad Hoc Networks
Helsinki University of Technology T-79.300 Postgraduate Course in Theoretical Computer Science Scalable Routing Protocols for Mobile Ad Hoc Networks Hafeth Hourani hafeth.hourani@nokia.com Contents Overview
More informationMedium Access Methods. Lecture 9
Medium Access Methods Lecture 9 Medium Access Control Medium Access Control (MAC) is the method that defines a procedure a station should follow when it needs to send a frame or frames. The use of regulated
More informationContents. IEEE family of standards Protocol layering TDD frame structure MAC PDU structure
Contents Part 1: Part 2: IEEE 802.16 family of standards Protocol layering TDD frame structure MAC PDU structure Dynamic QoS management OFDM PHY layer S-72.3240 Wireless Personal, Local, Metropolitan,
More informationAutonomous Decentralized Synchronization System for Inter-Vehicle Communication in Ad-hoc Network
Autonomous Decentralized Synchronization System for Inter-Vehicle Communication in Ad-hoc etwork Young An Kim 1, Choong Seon Hong 1 1 Department of Electronics and Information, Kyung Hee University, 1
More informationCS 457 Lecture 16 Routing Continued. Spring 2010
CS 457 Lecture 16 Routing Continued Spring 2010 Scaling Link-State Routing Overhead of link-state routing Flooding link-state packets throughout the network Running Dijkstra s shortest-path algorithm Introducing
More informationMESSAGE BROADCASTING IN WIRELESS VEHICULAR AD HOC NETWORKS
MESSAGE BROADCASTING IN WIRELESS VEHICULAR AD HOC NETWORKS CARLA F. CHIASSERINI, ROSSANO GAETA, MICHELE GARETTO, MARCO GRIBAUDO, AND MATTEO SERENO Abstract. Message broadcasting is one of the fundamental
More informationSyed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University
Detecting Jamming Attacks in Ubiquitous Sensor Networks Networking Lab Kyung Hee University Date: February 11 th, 2008 Syed Obaid Amin obaid@networking.khu.ac.kr Contents Background Introduction USN (Ubiquitous
More informationLow-Latency Multi-Source Broadcast in Radio Networks
Low-Latency Multi-Source Broadcast in Radio Networks Scott C.-H. Huang City University of Hong Kong Hsiao-Chun Wu Louisiana State University and S. S. Iyengar Louisiana State University In recent years
More informationLecture 8: Media Access Control
Lecture 8: Media Access Control CSE 123: Computer Networks Alex C. Snoeren HW 2 due NEXT WEDNESDAY Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing
More informationCOSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section B
MAC: Scheduled Approaches 1. Reservation Systems 2. Polling Systems 3. Token Passing Systems Static Channelization: TDMA and FDMA COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of
More informationAnalysis and Design of Link Metrics for Quality Routing in Wireless Multi-hop Networks
Analysis and Design of Link Metrics for Quality Routing PhD Thesis Defense by Nadeem JAVAID Dec 15, 2010 Thesis Director Prof. Karim DJOUANI Jury : Rapporteur B.J. VAN WYK Prof. Tshwane University of Technology
More informationRFID Multi-hop Relay Algorithms with Active Relay Tags in Tag-Talks-First Mode
International Journal of Networking and Computing www.ijnc.org ISSN 2185-2839 (print) ISSN 2185-2847 (online) Volume 4, Number 2, pages 355 368, July 2014 RFID Multi-hop Relay Algorithms with Active Relay
More informationSecurity in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury
Security in Sensor Networks Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Mobile Ad-hoc Networks (MANET) Mobile Random and perhaps constantly changing
More informationBit Reversal Broadcast Scheduling for Ad Hoc Systems
Bit Reversal Broadcast Scheduling for Ad Hoc Systems Marcin Kik, Maciej Gebala, Mirosław Wrocław University of Technology, Poland IDCS 2013, Hangzhou How to broadcast efficiently? Broadcasting ad hoc systems
More informationROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724
ROUTING PROTOCOLS Dr. Ahmed Khattab EECE Department Cairo University Fall 2012 ELC 659/ELC724 Dr. Ahmed Khattab Fall 2012 2 Routing Network-wide process the determine the end to end paths that packets
More informationExploiting Overlapped Bands for Efficient Broadcast in Multi-channel Wireless Networks
1 Exploiting Overlapped Bands for Efficient Broadcast in Multi-channel Wireless Networks Jae-Han Lim, Katsuhiro Naito, Ji-Hoon Yun, and Mario Gerla Abstract In wireless networks, broadcasting is a fundamental
More informationLecture on Sensor Networks
Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU
More informationCricket: Location- Support For Wireless Mobile Networks
Cricket: Location- Support For Wireless Mobile Networks Presented By: Bill Cabral wcabral@cs.brown.edu Purpose To provide a means of localization for inbuilding, location-dependent applications Maintain
More informationMedium Access Control Protocol for WBANS
Medium Access Control Protocol for WBANS Using the slides presented by the following group: An Efficient Multi-channel Management Protocol for Wireless Body Area Networks Wangjong Lee *, Seung Hyong Rhee
More informationInterlayer routing issues for wireless networks
NRL Cross-Layer Workshop Interlayer routing issues for wireless networks June 2, 2004 Tom Henderson Marcelo Albuquerque Phil Spagnolo Jae H. Kim Boeing Phantom Works 1 Report Documentation Page Form Approved
More informationA Location-Based Algorithm for Multi-hopping State Estimates within a Distributed Robot Team
A Location-Based Algorithm for Multi-hopping State Estimates within a Distributed Robot Team Brian J. Julian, Mac Schwager, Michael Angermann, and Daniela Rus Abstract Mutual knowledge of state information
More informationChapter 2 Distributed Consensus Estimation of Wireless Sensor Networks
Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 2 Medium Access Control (MAC) Schemes Course Instructor: Dr. Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents Why Multiple Access Random Access Aloha Slotted
More informationSense in Order: Channel Selection for Sensing in Cognitive Radio Networks
Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,
More informationFoundations of Distributed Systems: Tree Algorithms
Foundations of Distributed Systems: Tree Algorithms Stefan Schmid @ T-Labs, 2011 Broadcast Why trees? E.g., efficient broadcast, aggregation, routing,... Important trees? E.g., breadth-first trees, minimal
More informationARCH: Prac+cal Channel Hopping for Reliable Home- Area Sensor Networks. Chenyang Lu
ARCH: Prac+cal Channel Hopping for Reliable Home- Area Sensor Networks Chenyang Lu Home Area Network for Smart Energy Connecting power meters, thermostats, HVAC, appliances. Source: AT&T Labs 2 Wireless
More informationLINK LAYER. Murat Demirbas SUNY Buffalo
LINK LAYER Murat Demirbas SUNY Buffalo Mistaken axioms of wireless research The world is flat A radio s transmission area is circular If I can hear you at all, I can hear you perfectly All radios have
More informationOSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP
OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP Agenda OSPF Principles Introduction The Dijkstra Algorithm Communication Procedures LSA Broadcast Handling Splitted Area
More informationOSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database
OSPF - Open Shortest Path First OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP distance vector protocols like RIP have several dramatic disadvantages: slow adaptation
More informationAdaptive Sensor Selection Algorithms for Wireless Sensor Networks. Silvia Santini PhD defense October 12, 2009
Adaptive Sensor Selection Algorithms for Wireless Sensor Networks Silvia Santini PhD defense October 12, 2009 Wireless Sensor Networks (WSNs) WSN: compound of sensor nodes Sensor nodes Computation Wireless
More informationLecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage
Lecture 8: Media Access Control CSE 123: Computer Networks Stefan Savage Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing mechanisms Contention-based
More informationICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa
ICT 5305 Mobile Communications Lecture - 4 April 2016 Dr. Hossen Asiful Mustafa Media Access Motivation Can we apply media access methods from fixed networks? Example CSMA/CD Carrier Sense Multiple Access
More informationChapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA
Mobile Communications Chapter 3 : Media Access Motivation Collision avoidance, MACA SDMA, FDMA, TDMA Polling Aloha CDMA Reservation schemes SAMA Comparison Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/
More informationChapter 2 Overview. Duplexing, Multiple Access - 1 -
Chapter 2 Overview Part 1 (2 weeks ago) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (last week) Modulation, Coding, Error Correction Part 3
More informationT. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University
Cross-layer design for video streaming over wireless ad hoc networks T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Outline Cross-layer
More informationAgenda. A short overview of the CITI lab. Wireless Sensor Networks : Key applications & constraints. Energy consumption and network lifetime
CITI Wireless Sensor Networks in a Nutshell Séminaire Internet du Futur, ASPROM Paris, 24 octobre 2012 Prof. Fabrice Valois, Université de Lyon, INSA-Lyon, INRIA fabrice.valois@insa-lyon.fr 1 Agenda A
More informationEnergy-Efficient Data Management for Sensor Networks
Energy-Efficient Data Management for Sensor Networks Al Demers, Cornell University ademers@cs.cornell.edu Johannes Gehrke, Cornell University Rajmohan Rajaraman, Northeastern University Niki Trigoni, Cornell
More informationSynchronization and Beaconing in IEEE s Mesh Networks
Synchronization and Beaconing in IEEE 80.s Mesh etworks Alexander Safonov and Andrey Lyakhov Institute for Information Transmission Problems E-mails: {safa, lyakhov}@iitp.ru Stanislav Sharov Moscow Institute
More information