Evaluation of an Algorithm used in Routing and Service Discovery Protocols of Wireless Sensor Networks The Trickle Algorithm
|
|
- Justin Cooper
- 7 years ago
- Views:
Transcription
1 Evaluation of an Algorithm used in Routing and Service Discovery Protocols of Wireless Sensor Networks The Trickle Algorithm Markus Becker ComNets, TZI, University Bremen, Germany 19th of October 2012 Becker: FFV, TUHH, October / 29
2 Outline IETF Protocol Stack for Wireless Sensor Networks Routing Protocol for Low power and Lossy Networks Trickle Algorithm Simulation Analytical Model Evaluation Conclusions & Outlook Becker: FFV, TUHH, October / 29
3 The Internet Engineering Task Force protocol stack for Wireless Sensor Networks Becker: FFV, TUHH, October / 29
4 The Internet Engineering Task Force protocol stack for Wireless Sensor Networks USB WSN node Border Router Node Border Router Host Internet Host 6LoWPAN: IPv6 over Low power Wireless Personal Area Network AM: Active Messaging CoAP: Constrained Application Protocol IP: Internet Protocol MAC: Medium Access Control PHY: Physical Layer PPP: Point-to-Point Protocol RPL: Routing Protocol for Low power and Lossy Networks TCP: Transmission Control Protocol UDP: User Datagram Protocol WSN: Wireless Sensor Network Becker: FFV, TUHH, October / 29
5 The Internet Engineering Task Force protocol stack for Wireless Sensor Networks PPP Interface USB WSN node Border Router Node Border Router Host Internet Host 6LoWPAN: IPv6 over Low power Wireless Personal Area Network AM: Active Messaging CoAP: Constrained Application Protocol IP: Internet Protocol MAC: Medium Access Control PHY: Physical Layer PPP: Point-to-Point Protocol RPL: Routing Protocol for Low power and Lossy Networks TCP: Transmission Control Protocol UDP: User Datagram Protocol WSN: Wireless Sensor Network Becker: FFV, TUHH, October / 29
6 The Internet Engineering Task Force protocol stack for Wireless Sensor Networks PPP Interface USB WSN node Border Router Node Proxy Internet Host 6LoWPAN: IPv6 over Low power Wireless Personal Area Network AM: Active Messaging CoAP: Constrained Application Protocol IP: Internet Protocol MAC: Medium Access Control PHY: Physical Layer PPP: Point-to-Point Protocol RPL: Routing Protocol for Low power and Lossy Networks TCP: Transmission Control Protocol UDP: User Datagram Protocol WSN: Wireless Sensor Network Becker: FFV, TUHH, October / 29
7 Routing Protocol for Low power and Lossy Networks IETF RFC 6206 and RFC 6206: The Trickle Algorithm RFC 6550: Routing Protocol RPL RFC 6551: Routing Metrics RFC 6552: Objective Function RFC 6553: IPv6 Option for RPL RFC 6554: IPv6 Routing Header for RPL Low power and Lossy Networks (LLN) consist Border Router (BR), Router (R) and Host (H) nodes H choose only the default router RPL operates only within an LLN and terminates at BR Proactive distance-vector approach, uses graph structure Becker: FFV, TUHH, October / 29
8 RPL: Upward Routes DIO: Destination-Oriented Directed Acyclic Graph Information Object DIO announces upward routes (Routes to the BR) DIOs are sent using the Trickle algorithm (RFC 6206) Becker: FFV, TUHH, October / 29
9 Trickle Algorithm: Variables and Constants Variables τ Communication interval length T Timer value in range [τ/2, τ] C Communication counter Constants K Redundancy constant τ L Lowest τ τ H Highest τ Note: Notation according to the original Trickle paper: P. Levis, N. Patel, D. Culler, S. Shenker: Trickle: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks in NSDI 04 Proceedings. Becker: FFV, TUHH, October / 29
10 Trickle Algorithm: Rules τ expires Double τ, up to τ H, pick a new T from range [τ/2, τ] T expires If C < K, transmit Received consistent data Increment C Received inconsistent data Set τ to τ L. Reset C to 0, pick a new T from [τ/2, τ] Becker: FFV, TUHH, October / 29
11 Simulation Scenarios Line scenario with Closest Pattern Matching Propagation Model ( Line-CPM ) Grid scenario ( Grid ) Varying number of nodes Varying inter-node distances / scenario size Becker: FFV, TUHH, October / 29
12 Simulation Execution TinyOS application with 6LoWPAN implementation blip Simulation tool TOSSIM blip extended for simulations Monte-Carlo iterations for each scenario instance Becker: FFV, TUHH, October / 29
13 Analytical Models Number of Messages Consistency Time Becker: FFV, TUHH, October / 29
14 Analytical Models Number of Messages Consistency Time Becker: FFV, TUHH, October / 29
15 Trickle Algorithm Trickle algorithm in Line-Direct scenario: 0. Hop 1. Hop 2. Hop 3. Hop 0 τ L Becker: FFV, TUHH, October / 29
16 Analytical Model: Consistency Time Modelling consistency time for the Line scenario (1) 0. Hop: No Delay 1. Hop: Uniformly distributed delay 2. Hop: Addition of 2 uniformly distributed delays -> Triangle 3. Hop: Addition of 1 uniformly distributed delay and triangle τl 2τL 3τL τl 2τL 3τL τl 2τL 3τL τl 2τL 3τL Central limit theorem: mean of summation of i.i.d. random variables, each with finite mean and variance, will be approximately normally distributed Becker: FFV, TUHH, October / 29
17 Analytical Model: Consistency Time Modelling consistency time for the Line scenario (1) 0. Hop: No Delay 1. Hop: Uniformly distributed delay 2. Hop: Addition of 2 uniformly distributed delays -> Triangle 3. Hop: Addition of 1 uniformly distributed delay and triangle τl 2τL 3τL τl 2τL 3τL τl 2τL 3τL τl 2τL 3τL Central limit theorem: mean of summation of i.i.d. random variables, each with finite mean and variance, will be approximately normally distributed (1/4) 1/4 1/4 1/4 τl 2τL 3τL 1 τl 2τL 3τL Becker: FFV, TUHH, October / 29
18 Analytical Model: Consistency Time The probability density function (pdf) of the time to consistency scenario can be modeled in detail by p(t) = 1 N 1 C 1 N 1 N f h,c,a (t) p h,c,a (t), where h=0 c=0 a=1 h: hops c: Trickle cycle a: number of 1-hop ancestors closer to source N: total number of nodes C: maximum number of Trickle cycles to take into account Becker: FFV, TUHH, October / 29
19 Analytical Model: Consistency Time p(t) = 1 N N 1 C 1 N 1 h=0 c=0 a=1 f h,c,a (t) p h,c,a (t), where δ(t), h = 0, L 1 {L{Θ(t τ L 2 ) Θ(t τ L )} h }, h 1, c = 0 Θ(t τ L (2 c+1 1) τ L f h,c,a=1 (t) = 2 2 c ) Θ(t τ L (2 c+1 1)), h = 1, c 0 L 1 {L{Θ(t τ L 2 ) Θ(t τ L )} h c L{Θ(t 2τ L ) Θ(t 3τ L )} c }, h > 1, 0 < c < h. Θ( ) denotes the Heaviside step function. L denotes the Laplace transform and L 1 denotes the inverse Laplace transform. Becker: FFV, TUHH, October / 29
20 Analytical Model: Consistency Time f h,c,a (t) p(t) Distributions p h,c,a (t) h=1, a=0 c= p(t) Distributions p h,c,a (t) c=0, a=0 h= t [s] Time t [s] Becker: FFV, TUHH, October / 29
21 Analytical Model: Consistency Time f h,c,a (t) Distributions p h,c,a (t) c=0 p(t) h=0, a=0 h=0, a=1 h=0, a=2 h=1, a=0 h=1, a=1 h=1, a=2 h=2, a=0 h=2, a=1 h=2, a=2 h=3, a=0 h=3, a=1 h=3, a=2 h=4, a=0 h=4, a=1 h=4, a=2 h=5, a=0 h=5, a=1 h=5, a=2 h=6, a=0 h=6, a=1 h=6, a=2 h=7, a=0 h=7, a=1 h=7, a=2 h=8, a=0 h=8, a=1 h=8, a=2 The distribution for a 1 can be calculated from the cdf given by 1 (1 P(X x)) a of the cdf for a = Time t [s] Becker: FFV, TUHH, October / 29
22 Analytical Model: Consistency Time f h,c,a (t) Distributions p h,c,a (t) h=2, a=0 c= Distributions p h,c,a (t) h=3, a=0 c= p(t) p(t) Time t [s] Time t [s] Figure: Probability Density Function for h = 2, a = 0, c varied Figure: Probability Density Function for h = 3, a = 0, c varied Becker: FFV, TUHH, October / 29
23 Analytical Model: Consistency Time p h,c,a (t) Packet Receive Ratio 0.80 PRR1 PRR1 PRR PRR2 PRR3 PRR2 PRR Distance [m] Becker: FFV, TUHH, October / 29
24 Algorithm for Analytical Model calc_base_dists() calc_prr() calc_neigh(prr) calc_tx_outcomes(neighbors, prr) calc_hopcounts(prr, inject_node, trickle_k, neighbors, scenario) calc_hopcounts_next_cycles(hopcounts) calc_neighbors_hop_closer(hopcounts, prr, trickle_k) calc_prob_mix_from_hopcount(hopcounts) calc_timeseries(prob_mix, distributions) plot_graphs(timeseries) Becker: FFV, TUHH, October / 29
25 Simulation & Analytical Model: Parameters The Trickle settings for the following results are: τ L = 2 s τ H = 32 s K = 1, 3, or 9 Becker: FFV, TUHH, October / 29
26 Simulation & Analytical Model: Line 9, K = 1 Nodes consistent P(T t) Model Time to Consistency (cdf) (#Nodes: 9, K: 1) Model Time t [s] Distance [m] analytical simulated Becker: FFV, TUHH, October / 29
27 Simulation & Analytical Model: Line 9, K = 3 Nodes consistent P(T t) Model Time to Consistency (cdf) (#Nodes: 9, K: 3) Model Time t [s] Distance [m] analytical simulated Becker: FFV, TUHH, October / 29
28 Nodes consistent P(T t) Simulation & Analytical Model: Line 9, K = 9 Model Time to Consistency (cdf) (#Nodes: 9, K: 9) Model Time t [s] Distance [m] analytical simulated Becker: FFV, TUHH, October / 29
29 Simulation & Analytical Model: Line 16, K = 3 Nodes consistent P(T t) Model Time to Consistency (cdf) (#Nodes: 16, K: 3) Model Time t [s] Distance [m] analytical simulated Becker: FFV, TUHH, October / 29
30 Simulation & Analytical Model: Line 25, K = 3 Nodes consistent P(T t) Model Time to Consistency (cdf) (#Nodes: 25, K: 3) Model Time t [s] Distance [m] analytical simulated Becker: FFV, TUHH, October / 29
31 Simulation & Analytical Model: Grid 9, K = 3 Nodes consistent P(T t) Model Time to Consistency (cdf) (#Nodes: 9, K: 3) Model Time t [s] Distance [m] analytical simulated Becker: FFV, TUHH, October / 29
32 Simulation results and 95% confidence intervals Nodes consistent P(T t) Model Time to Consistency (cdf) (#Nodes: 9, K: 3) 95 % Confidence Interval Distance [m] Model Time t [s] Becker: FFV, TUHH, October / 29
33 Trickle/Push Comparison Trickle Push t push = 3 s t push = 5 s t push = 39 s t 95% 29.4 s 27.9 s 36.4 s s t max 34.9 s 33.0 s 47.0 s s Packets until consistent Packets in steady state s s 20 1 s s Trickle Settings: τ L = 2s, τ H = 32s, K =3 Scenario: Grid with 100 nodes Becker: FFV, TUHH, October / 29
34 Conclusions & Outlook Conclusions Implemented and studied the Trickle algorithm Important algorithm for RPL and distribution of other information Distributes faster and more-efficient than fixed-interval pushing First analytical model of Trickle algorithm Model for delay distribution was shown here Model for number of sent packets exists as well Analytical delay model fits simulation results Outlook Execute measurements and compare against simulation and analytical model Becker: FFV, TUHH, October / 29
www.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
More informationZigBee IP Network Performance, Part I Unicast Messaging under SEP2.0 HAN Messaging Profile
Document Part Number 53-301017 Rev 0.1 April 2013 ii Exegin Technologies Limited Printed in Canada The information in this document is subject to change without notice. No part of this document may be
More informationAssignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph
Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More information6LoWPAN: An Open IoT Networking Protocol
6LoWPAN: An Open IoT Networking Protocol OpenIoT Summit 2016 San Diego Stefan Schmidt stefan@osg.samsung.com 1 6LoWPAN: An Open IoT Networking Protocol Open: Specified by the IETF Specifications available
More informationInternet of Things based approach to Agriculture Monitoring
Internet of Things based approach to Agriculture Monitoring A. Paventhan ERNET India Regional Centre, Bangalore Asia-Pacific Advanced Network (APAN) 36th Meeting 20th August 2013 1 / 19 Outline 1 IP-based
More informationChapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
More informationEITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for
More informationConnecting Low-Power and Lossy Networks to the Internet
IETF STANDARDS UPDATE Connecting Low-Power and Lossy Networks to the Internet JeongGil Ko and Andreas Terzis, Johns Hopkins University Stephen Dawson-Haggerty and David E. Culler, University of California
More information6PANview: A Network Monitoring System for the Internet of Things
6PANview: A Network Monitoring System for the Internet of Things 23-August-2011 Lohith Y S, Brinda M C, Anand SVR, Malati Hegde Department of ECE Indian Institute of Science Bangalore Funded by DIT, Government
More informationRoute Discovery Protocols
Route Discovery Protocols Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF
More informationOverview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features
Overview Lecture 16: IP variations: IPv6, multicast, anycast Next generation IP: IPv6 6lowpan and the Internet of Things IP multicast IP anycast Practical considerations throughout I think we have a problem
More informationAn On-demand Scheduling Routing Protocol for IPv6 Industrial Wireless Sensor Networks based on Deterministic Scheduling
An On-demand Scheduling Routing Protocol for IPv6 Industrial Wireless Sensor Networks based on Deterministic Scheduling 1 Ping Wang, 2 Fei Lan, 3 Heng Wang, 4 Min Xiang *1 Key Laboratory of Industrial
More informationSimulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2
Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Sulaiman Khalifa Yakhlef, Ismail Shrena, Nasaraldian Ambark Shashoa Azzaytuna University, Faculty of Engineering Tarhuna
More informationEnergy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks
Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks Karim Seada, Marco Zuniga, Ahmed Helmy, Bhaskar Krishnamachari Department of Electrical Engineering University
More informationThingsquare Technology
Thingsquare Technology Thingsquare connects smartphone apps with things such as thermostats, light bulbs, and street lights. The devices have a programmable wireless chip that runs the Thingsquare firmware.
More informationIntroduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationIRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents
More informationECE 555 Real-time Embedded System Real-time Communications in Wireless Sensor Network (WSN)
ECE 555 Real-time Embedded System Real-time Communications in Wireless Sensor Network (WSN) Yao, Yanjun 1 Papers Real-time Power-Aware Routing in Sensor Networks Real-Time Traffic Management in Sensor
More informationVOL. 4, NO. 5, August 2014 ISSN 2222-9833 ARPN Journal of Systems and Software 2009-2012 AJSS Journal. All rights reserved
RPL Routing Protocol in Smart Grid Communication 1 Ahmad Reza Parnian, 2 Mohammad Rafie Kharazmi, 3 Reza Javidan 1, 2, 3 Computer Engineering and IT Department, Shiraz University of Technology, Iran ABSTRACT
More informationMobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
More information13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
More informationRobust protocols for the Industrial Internet of Things
Robust protocols for the Industrial Internet of Things Elvis Vogli Politecnico di Bari,Telematics Lab - Dipartimento di Ingegneria Elettrica e dell Informazione Via Edoardo Orabona 4, 70125 Bari, Italy
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationCS335 Sample Questions for Exam #2
CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to
More informationCSE331: Introduction to Networks and Security. Lecture 8 Fall 2006
CSE331: Introduction to Networks and Security Lecture 8 Fall 2006 Announcements Reminders: Project I is due on Monday, Sept. 25th. Homework 1 is due on Friday, Sept. 29th. CSE331 Fall 2004 2 Internet Protocol
More informationCharter Text Network Design and Configuration
MIF Charter update proposal MIF WG Charter update proposal summary http://www.ietf.org/mail-archive/web/mif/current/msg02125.html Specific deliverables listed MPVD architecture document Requirement for
More informationSmart Cities are the Internet of Things
June 20th, 2013 Smart Cities are the Internet of Things Zach Shelby, Chief Nerd 1 About Sensinode Vision The Internet of Things (IoT) is the next evolution of the Internet where devices of all types and
More informationInternet of Things 2015/2016
Internet of Things 2015/2016 The Things Johan Lukkien John Carpenter, 1982 1 What makes up the IoT? IoT versus WSN What are examples? Guiding questions 2 Some definitions of IoT (march 2015) Whatis.com:
More informationPERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationPERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael
More informationA Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
More informationNetwork Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF
Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.
More informationPerformance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City
Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City A. Lavric 1, V. Popa 2 PhD.,Computers, Department of Electronics and Automation,
More informationNetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationMobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP
Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses
More informationDefinition. A Historical Example
Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,
More informationResearch on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
More informationBGP overview BGP operations BGP messages BGP decision algorithm BGP states
BGP overview BGP operations BGP messages BGP decision algorithm BGP states 1 BGP overview Currently in version 4. InterAS (or Interdomain) routing protocol for exchanging network reachability information
More informationComputer Networks. Data Link Layer
Computer Networks The Data Link Layer 1 Data Link Layer Application Transport Network DLL PHY 2 What does it do? What functions it performs? Typically: Handling transmission errors, a.k.a., error control.
More informationRouting Protocols (RIP, OSPF, BGP)
Chapter 13 Routing Protocols (RIP, OSPF, BGP) INTERIOR AND EXTERIOR ROUTING RIP OSPF BGP 1 The McGraw-Hill Companies, Inc., 2000 1 Introduction Packets may pass through several networks on their way to
More informationEINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
More informationP. van der Stok. Intended status: Informational February 14, 2014 Expires: August 18, 2014
roll P. van der Stok Internet-Draft Consultant Intended status: Informational February 14, 2014 Expires: August 18, 2014 Abstract MPL forwarder policy for multicast with admin-local scope draft-vanderstok-roll-admin-local-policy-00
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More informationRouting with OSPF. Introduction
Routing with OSPF Introduction The capabilities of an internet are largely determined by its routing protocol. An internet's scalability, its ability to quickly route around failures, and the consumption
More informationWide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)
School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit
More informationOptimized Load Balancing Mechanism Using Carry Forward Distance
Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,
More informationConnecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things
Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Johanna Nieminen (Nokia), Future Internet SHOK preconference 30.05.2012 IoT Taxonomy ZigBee 802.5.4 Bluetooth Video RFID
More informationLOADng Routing Protocol Evaluation for Bidirectional Data flow in AMI Mesh Networks
Routing Protocol Evaluation for Bidirectional Data flow in AMI Mesh Networks Saida ELYENGUI, Riadh BOUHOUCHI 2, Tahar EZZEDINE 3.2.3 Communication System Laboratory Sys'Com, National Engineering School
More informationOPNET Network Simulator
Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,
More informationLoad Balanced Routing for Low Power and Lossy Networks
MITUBIHI ELECTRIC REEARCH LABORATORIE http://www.merl.com Load Balanced Routing for Low Power and Lossy Networks Liu, X.; Guo, J.; Bhatti, G.; Orlik, P.; Parsons, K. TR13-37 April 13 Abstract The RPL routing
More informationVoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs
VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs Said El brak Mohammed Bouhorma Anouar A.Boudhir ABSTRACT Voice over IP (VoIP) has become a popular Internet
More informationCHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather
More informationIP Multicasting. Applications with multiple receivers
IP Multicasting Relates to Lab 10. It covers IP multicasting, including multicast addressing, IGMP, and multicast routing. 1 Applications with multiple receivers Many applications transmit the same data
More informationNetwork (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,
More informationKey requirements for Interoperable IoT systems
Key requirements for Interoperable IoT systems Pratul Sharma Technical Marketing Manager, ARM Inc. May/08/2014 Agenda Why Interoperability? Open standards for interoperability Data Communication Standards
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationComputer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
More informationIP interconnect interface for SIP/SIP-I
Page INTERCONNECT SPECIFICATION Public 1 (7) IP interconnect interface for SIP/SIP-I 0 Document history... 2 1 Scope... 2 2 References... 2 3 Definitions/Acronyms... 3 4 IP Interconnect specification...
More informationIsolines: Energy-efficient Mapping in Sensor Networks
Isolines: Energy-efficient Mapping in Sensor Networks Ignacio Solis and Katia Obraczka {isolis, katia}@cse.ucsc.edu Computer Engineering Department University of California, Santa Cruz April 15, 2005 Abstract
More informationStep by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol
th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar
More informationECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1
ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled
More informationIoT for surveillance applications!
! IoT for surveillance applications!! (and how to connect & schedule them)! EU-SEA workshop and cooperation on IoT and open platforms! January 25th, 2015!! IEEE RIVF 2015, Can Tho, Vietnam! Prof. Congduc
More informationUsing IPv6 and 6LoWPAN for Home Automation Networks
Using IPv6 and 6LoWPAN for Home Automation Networks Thomas Scheffler / Bernd Dörge ICCE-Berlin Berlin, 06.09.2011 Overview IPv6 and 6LoWPAN for Home Automation Networks 6LoWPAN Application & Network Architecture
More informationIntelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based
More informationInternetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
More informationBeyond Interoperability Pushing the Performance of Sensor Network IP Stacks
Beyond Interoperability Pushing the Performance of Sensor Network IP Stacks JeongGil Ko, Joakim Eriksson 2, Nicolas Tsiftes 2, Stephen Dawson-Haggerty 3, jgko@cs.jhu.edu, joakime@sics.se, nvt@sics.se,
More informationFigure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
More informationThe OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
More informationOPNET - Network Simulator
Simulations and Tools for Telecommunications 521365S: OPNET - Network Simulator Jarmo Prokkola Project Manager, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,
More informationA Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2
A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 Alex Ali Hamidian January 2003 Department of Communication Systems Lund Institute of Technology, Lund University Box 118 S-221 00 Lund
More informationFaculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List
More informationMedium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins
More informationIP Routing Features. Contents
7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................
More informationTroubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
More informationFormal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
More informationIndian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
More informationReduce Cost and Complexity of M2M and IoT Solutions via Embedded IP and Application Layer Interoperability for Smart Objects
Reduce Cost and Complexity of M2M and IoT Solutions via Embedded IP and Application Layer Interoperability for Smart Objects Fabien Castanier STMicroelectronics IPSO Promoter M2M Forum - Milan, May 20,
More informationTCP in Wireless Mobile Networks
TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer
More informationREDUCING PACKET OVERHEAD IN MOBILE IPV6
REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran hoppico@eng.ui.ac.ir hozo19@gmail.com Common Mobile
More informationImplementing Existing Management Protocols on Constrained Devices. IETF 81, Quebec, 2011-07-26
Implementing Existing Management Protocols on Constrained Devices Jürgen Schönwälder IETF 81, Quebec, 2011-07-26 1 / 22 SNMP on Constrained Devices 1 SNMP on Constrained Devices 2 NETCONF on Constrained
More informationPERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
More informationLAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
More informationLoad Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.
Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with
More informationPerformance Measurement of Wireless LAN Using Open Source
Performance Measurement of Wireless LAN Using Open Source Vipin M Wireless Communication Research Group AU KBC Research Centre http://comm.au-kbc.org/ 1 Overview General Network Why Network Performance
More informationCustomer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor
More informationAnalysis of Mobile IP in Wireless LANs
ENSC 835: COMMUNICATION NETWORKS FINAL PROJECT PRESENTATIONS Spring 2011 Analysis of Mobile IP in Wireless LANs www.sfu.ca/~bshahabi Babak Shahabi (bshahabi@sfu.ca( bshahabi@sfu.ca) 301102998 Shaoyun Yang
More informationSECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
More informationSIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
More informationLocation Information Services in Mobile Ad Hoc Networks
Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent
More informationCSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
More informationFlow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks
Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks Abstract. As many radio chips used in today s sensor mote hardware can work at different frequencies, several multi-channel
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationIsam Ishaq *, David Carels, Girum K. Teklemariam, Jeroen Hoebeke, Floris Van den Abeele, Eli De Poorter, Ingrid Moerman and Piet Demeester
J. Sens. Actuator Netw. 2013, 2, 235-287; doi:10.3390/jsan2020235 Review IETF Standardization in the Field of the Internet of Things (IoT): A Survey Journal of Sensor and Actuator Networks ISSN 2224-2708
More informationBluetooth Low Energy
Bluetooth Low Energy Responsable de l épreuve : L. Toutain Tous documents autorisés. Répondez uniquement sur la copie en annexe. Lisez bien tout le document avant de commencer à répondre 1 Bluetooth Low
More informationService and Resource Discovery in Smart Spaces Composed of Low Capacity Devices
Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer
More information