Evaluation of an Algorithm used in Routing and Service Discovery Protocols of Wireless Sensor Networks The Trickle Algorithm

Size: px
Start display at page:

Download "Evaluation of an Algorithm used in Routing and Service Discovery Protocols of Wireless Sensor Networks The Trickle Algorithm"

Transcription

1 Evaluation of an Algorithm used in Routing and Service Discovery Protocols of Wireless Sensor Networks The Trickle Algorithm Markus Becker ComNets, TZI, University Bremen, Germany 19th of October 2012 Becker: FFV, TUHH, October / 29

2 Outline IETF Protocol Stack for Wireless Sensor Networks Routing Protocol for Low power and Lossy Networks Trickle Algorithm Simulation Analytical Model Evaluation Conclusions & Outlook Becker: FFV, TUHH, October / 29

3 The Internet Engineering Task Force protocol stack for Wireless Sensor Networks Becker: FFV, TUHH, October / 29

4 The Internet Engineering Task Force protocol stack for Wireless Sensor Networks USB WSN node Border Router Node Border Router Host Internet Host 6LoWPAN: IPv6 over Low power Wireless Personal Area Network AM: Active Messaging CoAP: Constrained Application Protocol IP: Internet Protocol MAC: Medium Access Control PHY: Physical Layer PPP: Point-to-Point Protocol RPL: Routing Protocol for Low power and Lossy Networks TCP: Transmission Control Protocol UDP: User Datagram Protocol WSN: Wireless Sensor Network Becker: FFV, TUHH, October / 29

5 The Internet Engineering Task Force protocol stack for Wireless Sensor Networks PPP Interface USB WSN node Border Router Node Border Router Host Internet Host 6LoWPAN: IPv6 over Low power Wireless Personal Area Network AM: Active Messaging CoAP: Constrained Application Protocol IP: Internet Protocol MAC: Medium Access Control PHY: Physical Layer PPP: Point-to-Point Protocol RPL: Routing Protocol for Low power and Lossy Networks TCP: Transmission Control Protocol UDP: User Datagram Protocol WSN: Wireless Sensor Network Becker: FFV, TUHH, October / 29

6 The Internet Engineering Task Force protocol stack for Wireless Sensor Networks PPP Interface USB WSN node Border Router Node Proxy Internet Host 6LoWPAN: IPv6 over Low power Wireless Personal Area Network AM: Active Messaging CoAP: Constrained Application Protocol IP: Internet Protocol MAC: Medium Access Control PHY: Physical Layer PPP: Point-to-Point Protocol RPL: Routing Protocol for Low power and Lossy Networks TCP: Transmission Control Protocol UDP: User Datagram Protocol WSN: Wireless Sensor Network Becker: FFV, TUHH, October / 29

7 Routing Protocol for Low power and Lossy Networks IETF RFC 6206 and RFC 6206: The Trickle Algorithm RFC 6550: Routing Protocol RPL RFC 6551: Routing Metrics RFC 6552: Objective Function RFC 6553: IPv6 Option for RPL RFC 6554: IPv6 Routing Header for RPL Low power and Lossy Networks (LLN) consist Border Router (BR), Router (R) and Host (H) nodes H choose only the default router RPL operates only within an LLN and terminates at BR Proactive distance-vector approach, uses graph structure Becker: FFV, TUHH, October / 29

8 RPL: Upward Routes DIO: Destination-Oriented Directed Acyclic Graph Information Object DIO announces upward routes (Routes to the BR) DIOs are sent using the Trickle algorithm (RFC 6206) Becker: FFV, TUHH, October / 29

9 Trickle Algorithm: Variables and Constants Variables τ Communication interval length T Timer value in range [τ/2, τ] C Communication counter Constants K Redundancy constant τ L Lowest τ τ H Highest τ Note: Notation according to the original Trickle paper: P. Levis, N. Patel, D. Culler, S. Shenker: Trickle: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks in NSDI 04 Proceedings. Becker: FFV, TUHH, October / 29

10 Trickle Algorithm: Rules τ expires Double τ, up to τ H, pick a new T from range [τ/2, τ] T expires If C < K, transmit Received consistent data Increment C Received inconsistent data Set τ to τ L. Reset C to 0, pick a new T from [τ/2, τ] Becker: FFV, TUHH, October / 29

11 Simulation Scenarios Line scenario with Closest Pattern Matching Propagation Model ( Line-CPM ) Grid scenario ( Grid ) Varying number of nodes Varying inter-node distances / scenario size Becker: FFV, TUHH, October / 29

12 Simulation Execution TinyOS application with 6LoWPAN implementation blip Simulation tool TOSSIM blip extended for simulations Monte-Carlo iterations for each scenario instance Becker: FFV, TUHH, October / 29

13 Analytical Models Number of Messages Consistency Time Becker: FFV, TUHH, October / 29

14 Analytical Models Number of Messages Consistency Time Becker: FFV, TUHH, October / 29

15 Trickle Algorithm Trickle algorithm in Line-Direct scenario: 0. Hop 1. Hop 2. Hop 3. Hop 0 τ L Becker: FFV, TUHH, October / 29

16 Analytical Model: Consistency Time Modelling consistency time for the Line scenario (1) 0. Hop: No Delay 1. Hop: Uniformly distributed delay 2. Hop: Addition of 2 uniformly distributed delays -> Triangle 3. Hop: Addition of 1 uniformly distributed delay and triangle τl 2τL 3τL τl 2τL 3τL τl 2τL 3τL τl 2τL 3τL Central limit theorem: mean of summation of i.i.d. random variables, each with finite mean and variance, will be approximately normally distributed Becker: FFV, TUHH, October / 29

17 Analytical Model: Consistency Time Modelling consistency time for the Line scenario (1) 0. Hop: No Delay 1. Hop: Uniformly distributed delay 2. Hop: Addition of 2 uniformly distributed delays -> Triangle 3. Hop: Addition of 1 uniformly distributed delay and triangle τl 2τL 3τL τl 2τL 3τL τl 2τL 3τL τl 2τL 3τL Central limit theorem: mean of summation of i.i.d. random variables, each with finite mean and variance, will be approximately normally distributed (1/4) 1/4 1/4 1/4 τl 2τL 3τL 1 τl 2τL 3τL Becker: FFV, TUHH, October / 29

18 Analytical Model: Consistency Time The probability density function (pdf) of the time to consistency scenario can be modeled in detail by p(t) = 1 N 1 C 1 N 1 N f h,c,a (t) p h,c,a (t), where h=0 c=0 a=1 h: hops c: Trickle cycle a: number of 1-hop ancestors closer to source N: total number of nodes C: maximum number of Trickle cycles to take into account Becker: FFV, TUHH, October / 29

19 Analytical Model: Consistency Time p(t) = 1 N N 1 C 1 N 1 h=0 c=0 a=1 f h,c,a (t) p h,c,a (t), where δ(t), h = 0, L 1 {L{Θ(t τ L 2 ) Θ(t τ L )} h }, h 1, c = 0 Θ(t τ L (2 c+1 1) τ L f h,c,a=1 (t) = 2 2 c ) Θ(t τ L (2 c+1 1)), h = 1, c 0 L 1 {L{Θ(t τ L 2 ) Θ(t τ L )} h c L{Θ(t 2τ L ) Θ(t 3τ L )} c }, h > 1, 0 < c < h. Θ( ) denotes the Heaviside step function. L denotes the Laplace transform and L 1 denotes the inverse Laplace transform. Becker: FFV, TUHH, October / 29

20 Analytical Model: Consistency Time f h,c,a (t) p(t) Distributions p h,c,a (t) h=1, a=0 c= p(t) Distributions p h,c,a (t) c=0, a=0 h= t [s] Time t [s] Becker: FFV, TUHH, October / 29

21 Analytical Model: Consistency Time f h,c,a (t) Distributions p h,c,a (t) c=0 p(t) h=0, a=0 h=0, a=1 h=0, a=2 h=1, a=0 h=1, a=1 h=1, a=2 h=2, a=0 h=2, a=1 h=2, a=2 h=3, a=0 h=3, a=1 h=3, a=2 h=4, a=0 h=4, a=1 h=4, a=2 h=5, a=0 h=5, a=1 h=5, a=2 h=6, a=0 h=6, a=1 h=6, a=2 h=7, a=0 h=7, a=1 h=7, a=2 h=8, a=0 h=8, a=1 h=8, a=2 The distribution for a 1 can be calculated from the cdf given by 1 (1 P(X x)) a of the cdf for a = Time t [s] Becker: FFV, TUHH, October / 29

22 Analytical Model: Consistency Time f h,c,a (t) Distributions p h,c,a (t) h=2, a=0 c= Distributions p h,c,a (t) h=3, a=0 c= p(t) p(t) Time t [s] Time t [s] Figure: Probability Density Function for h = 2, a = 0, c varied Figure: Probability Density Function for h = 3, a = 0, c varied Becker: FFV, TUHH, October / 29

23 Analytical Model: Consistency Time p h,c,a (t) Packet Receive Ratio 0.80 PRR1 PRR1 PRR PRR2 PRR3 PRR2 PRR Distance [m] Becker: FFV, TUHH, October / 29

24 Algorithm for Analytical Model calc_base_dists() calc_prr() calc_neigh(prr) calc_tx_outcomes(neighbors, prr) calc_hopcounts(prr, inject_node, trickle_k, neighbors, scenario) calc_hopcounts_next_cycles(hopcounts) calc_neighbors_hop_closer(hopcounts, prr, trickle_k) calc_prob_mix_from_hopcount(hopcounts) calc_timeseries(prob_mix, distributions) plot_graphs(timeseries) Becker: FFV, TUHH, October / 29

25 Simulation & Analytical Model: Parameters The Trickle settings for the following results are: τ L = 2 s τ H = 32 s K = 1, 3, or 9 Becker: FFV, TUHH, October / 29

26 Simulation & Analytical Model: Line 9, K = 1 Nodes consistent P(T t) Model Time to Consistency (cdf) (#Nodes: 9, K: 1) Model Time t [s] Distance [m] analytical simulated Becker: FFV, TUHH, October / 29

27 Simulation & Analytical Model: Line 9, K = 3 Nodes consistent P(T t) Model Time to Consistency (cdf) (#Nodes: 9, K: 3) Model Time t [s] Distance [m] analytical simulated Becker: FFV, TUHH, October / 29

28 Nodes consistent P(T t) Simulation & Analytical Model: Line 9, K = 9 Model Time to Consistency (cdf) (#Nodes: 9, K: 9) Model Time t [s] Distance [m] analytical simulated Becker: FFV, TUHH, October / 29

29 Simulation & Analytical Model: Line 16, K = 3 Nodes consistent P(T t) Model Time to Consistency (cdf) (#Nodes: 16, K: 3) Model Time t [s] Distance [m] analytical simulated Becker: FFV, TUHH, October / 29

30 Simulation & Analytical Model: Line 25, K = 3 Nodes consistent P(T t) Model Time to Consistency (cdf) (#Nodes: 25, K: 3) Model Time t [s] Distance [m] analytical simulated Becker: FFV, TUHH, October / 29

31 Simulation & Analytical Model: Grid 9, K = 3 Nodes consistent P(T t) Model Time to Consistency (cdf) (#Nodes: 9, K: 3) Model Time t [s] Distance [m] analytical simulated Becker: FFV, TUHH, October / 29

32 Simulation results and 95% confidence intervals Nodes consistent P(T t) Model Time to Consistency (cdf) (#Nodes: 9, K: 3) 95 % Confidence Interval Distance [m] Model Time t [s] Becker: FFV, TUHH, October / 29

33 Trickle/Push Comparison Trickle Push t push = 3 s t push = 5 s t push = 39 s t 95% 29.4 s 27.9 s 36.4 s s t max 34.9 s 33.0 s 47.0 s s Packets until consistent Packets in steady state s s 20 1 s s Trickle Settings: τ L = 2s, τ H = 32s, K =3 Scenario: Grid with 100 nodes Becker: FFV, TUHH, October / 29

34 Conclusions & Outlook Conclusions Implemented and studied the Trickle algorithm Important algorithm for RPL and distribution of other information Distributes faster and more-efficient than fixed-interval pushing First analytical model of Trickle algorithm Model for delay distribution was shown here Model for number of sent packets exists as well Analytical delay model fits simulation results Outlook Execute measurements and compare against simulation and analytical model Becker: FFV, TUHH, October / 29

www.mindteck.com 6LoWPAN Technical Overview

www.mindteck.com 6LoWPAN Technical Overview www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction

More information

ZigBee IP Network Performance, Part I Unicast Messaging under SEP2.0 HAN Messaging Profile

ZigBee IP Network Performance, Part I Unicast Messaging under SEP2.0 HAN Messaging Profile Document Part Number 53-301017 Rev 0.1 April 2013 ii Exegin Technologies Limited Printed in Canada The information in this document is subject to change without notice. No part of this document may be

More information

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

6LoWPAN: An Open IoT Networking Protocol

6LoWPAN: An Open IoT Networking Protocol 6LoWPAN: An Open IoT Networking Protocol OpenIoT Summit 2016 San Diego Stefan Schmidt stefan@osg.samsung.com 1 6LoWPAN: An Open IoT Networking Protocol Open: Specified by the IETF Specifications available

More information

Internet of Things based approach to Agriculture Monitoring

Internet of Things based approach to Agriculture Monitoring Internet of Things based approach to Agriculture Monitoring A. Paventhan ERNET India Regional Centre, Bangalore Asia-Pacific Advanced Network (APAN) 36th Meeting 20th August 2013 1 / 19 Outline 1 IP-based

More information

Chapter 9. IP Secure

Chapter 9. IP Secure Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.

More information

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for

More information

Connecting Low-Power and Lossy Networks to the Internet

Connecting Low-Power and Lossy Networks to the Internet IETF STANDARDS UPDATE Connecting Low-Power and Lossy Networks to the Internet JeongGil Ko and Andreas Terzis, Johns Hopkins University Stephen Dawson-Haggerty and David E. Culler, University of California

More information

6PANview: A Network Monitoring System for the Internet of Things

6PANview: A Network Monitoring System for the Internet of Things 6PANview: A Network Monitoring System for the Internet of Things 23-August-2011 Lohith Y S, Brinda M C, Anand SVR, Malati Hegde Department of ECE Indian Institute of Science Bangalore Funded by DIT, Government

More information

Route Discovery Protocols

Route Discovery Protocols Route Discovery Protocols Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF

More information

Overview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features

Overview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features Overview Lecture 16: IP variations: IPv6, multicast, anycast Next generation IP: IPv6 6lowpan and the Internet of Things IP multicast IP anycast Practical considerations throughout I think we have a problem

More information

An On-demand Scheduling Routing Protocol for IPv6 Industrial Wireless Sensor Networks based on Deterministic Scheduling

An On-demand Scheduling Routing Protocol for IPv6 Industrial Wireless Sensor Networks based on Deterministic Scheduling An On-demand Scheduling Routing Protocol for IPv6 Industrial Wireless Sensor Networks based on Deterministic Scheduling 1 Ping Wang, 2 Fei Lan, 3 Heng Wang, 4 Min Xiang *1 Key Laboratory of Industrial

More information

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Sulaiman Khalifa Yakhlef, Ismail Shrena, Nasaraldian Ambark Shashoa Azzaytuna University, Faculty of Engineering Tarhuna

More information

Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks

Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks Karim Seada, Marco Zuniga, Ahmed Helmy, Bhaskar Krishnamachari Department of Electrical Engineering University

More information

Thingsquare Technology

Thingsquare Technology Thingsquare Technology Thingsquare connects smartphone apps with things such as thermostats, light bulbs, and street lights. The devices have a programmable wireless chip that runs the Thingsquare firmware.

More information

Introduction to IP v6

Introduction to IP v6 IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents

More information

ECE 555 Real-time Embedded System Real-time Communications in Wireless Sensor Network (WSN)

ECE 555 Real-time Embedded System Real-time Communications in Wireless Sensor Network (WSN) ECE 555 Real-time Embedded System Real-time Communications in Wireless Sensor Network (WSN) Yao, Yanjun 1 Papers Real-time Power-Aware Routing in Sensor Networks Real-Time Traffic Management in Sensor

More information

VOL. 4, NO. 5, August 2014 ISSN 2222-9833 ARPN Journal of Systems and Software 2009-2012 AJSS Journal. All rights reserved

VOL. 4, NO. 5, August 2014 ISSN 2222-9833 ARPN Journal of Systems and Software 2009-2012 AJSS Journal. All rights reserved RPL Routing Protocol in Smart Grid Communication 1 Ahmad Reza Parnian, 2 Mohammad Rafie Kharazmi, 3 Reza Javidan 1, 2, 3 Computer Engineering and IT Department, Shiraz University of Technology, Iran ABSTRACT

More information

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol

More information

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode 13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4

More information

Robust protocols for the Industrial Internet of Things

Robust protocols for the Industrial Internet of Things Robust protocols for the Industrial Internet of Things Elvis Vogli Politecnico di Bari,Telematics Lab - Dipartimento di Ingegneria Elettrica e dell Informazione Via Edoardo Orabona 4, 70125 Bari, Italy

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

CS335 Sample Questions for Exam #2

CS335 Sample Questions for Exam #2 CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to

More information

CSE331: Introduction to Networks and Security. Lecture 8 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 8 Fall 2006 CSE331: Introduction to Networks and Security Lecture 8 Fall 2006 Announcements Reminders: Project I is due on Monday, Sept. 25th. Homework 1 is due on Friday, Sept. 29th. CSE331 Fall 2004 2 Internet Protocol

More information

Charter Text Network Design and Configuration

Charter Text Network Design and Configuration MIF Charter update proposal MIF WG Charter update proposal summary http://www.ietf.org/mail-archive/web/mif/current/msg02125.html Specific deliverables listed MPVD architecture document Requirement for

More information

Smart Cities are the Internet of Things

Smart Cities are the Internet of Things June 20th, 2013 Smart Cities are the Internet of Things Zach Shelby, Chief Nerd 1 About Sensinode Vision The Internet of Things (IoT) is the next evolution of the Internet where devices of all types and

More information

Internet of Things 2015/2016

Internet of Things 2015/2016 Internet of Things 2015/2016 The Things Johan Lukkien John Carpenter, 1982 1 What makes up the IoT? IoT versus WSN What are examples? Guiding questions 2 Some definitions of IoT (march 2015) Whatis.com:

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.

More information

Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City

Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City A. Lavric 1, V. Popa 2 PhD.,Computers, Department of Electronics and Automation,

More information

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses

More information

Definition. A Historical Example

Definition. A Historical Example Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,

More information

Research on Errors of Utilized Bandwidth Measured by NetFlow

Research on Errors of Utilized Bandwidth Measured by NetFlow Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic

More information

BGP overview BGP operations BGP messages BGP decision algorithm BGP states

BGP overview BGP operations BGP messages BGP decision algorithm BGP states BGP overview BGP operations BGP messages BGP decision algorithm BGP states 1 BGP overview Currently in version 4. InterAS (or Interdomain) routing protocol for exchanging network reachability information

More information

Computer Networks. Data Link Layer

Computer Networks. Data Link Layer Computer Networks The Data Link Layer 1 Data Link Layer Application Transport Network DLL PHY 2 What does it do? What functions it performs? Typically: Handling transmission errors, a.k.a., error control.

More information

Routing Protocols (RIP, OSPF, BGP)

Routing Protocols (RIP, OSPF, BGP) Chapter 13 Routing Protocols (RIP, OSPF, BGP) INTERIOR AND EXTERIOR ROUTING RIP OSPF BGP 1 The McGraw-Hill Companies, Inc., 2000 1 Introduction Packets may pass through several networks on their way to

More information

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There

More information

P. van der Stok. Intended status: Informational February 14, 2014 Expires: August 18, 2014

P. van der Stok. Intended status: Informational February 14, 2014 Expires: August 18, 2014 roll P. van der Stok Internet-Draft Consultant Intended status: Informational February 14, 2014 Expires: August 18, 2014 Abstract MPL forwarder policy for multicast with admin-local scope draft-vanderstok-roll-admin-local-policy-00

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Routing with OSPF. Introduction

Routing with OSPF. Introduction Routing with OSPF Introduction The capabilities of an internet are largely determined by its routing protocol. An internet's scalability, its ability to quickly route around failures, and the consumption

More information

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007) School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit

More information

Optimized Load Balancing Mechanism Using Carry Forward Distance

Optimized Load Balancing Mechanism Using Carry Forward Distance Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,

More information

Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things

Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Johanna Nieminen (Nokia), Future Internet SHOK preconference 30.05.2012 IoT Taxonomy ZigBee 802.5.4 Bluetooth Video RFID

More information

LOADng Routing Protocol Evaluation for Bidirectional Data flow in AMI Mesh Networks

LOADng Routing Protocol Evaluation for Bidirectional Data flow in AMI Mesh Networks Routing Protocol Evaluation for Bidirectional Data flow in AMI Mesh Networks Saida ELYENGUI, Riadh BOUHOUCHI 2, Tahar EZZEDINE 3.2.3 Communication System Laboratory Sys'Com, National Engineering School

More information

OPNET Network Simulator

OPNET Network Simulator Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,

More information

Load Balanced Routing for Low Power and Lossy Networks

Load Balanced Routing for Low Power and Lossy Networks MITUBIHI ELECTRIC REEARCH LABORATORIE http://www.merl.com Load Balanced Routing for Low Power and Lossy Networks Liu, X.; Guo, J.; Bhatti, G.; Orlik, P.; Parsons, K. TR13-37 April 13 Abstract The RPL routing

More information

VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs

VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs Said El brak Mohammed Bouhorma Anouar A.Boudhir ABSTRACT Voice over IP (VoIP) has become a popular Internet

More information

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather

More information

IP Multicasting. Applications with multiple receivers

IP Multicasting. Applications with multiple receivers IP Multicasting Relates to Lab 10. It covers IP multicasting, including multicast addressing, IGMP, and multicast routing. 1 Applications with multiple receivers Many applications transmit the same data

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

Key requirements for Interoperable IoT systems

Key requirements for Interoperable IoT systems Key requirements for Interoperable IoT systems Pratul Sharma Technical Marketing Manager, ARM Inc. May/08/2014 Agenda Why Interoperability? Open standards for interoperability Data Communication Standards

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

IP interconnect interface for SIP/SIP-I

IP interconnect interface for SIP/SIP-I Page INTERCONNECT SPECIFICATION Public 1 (7) IP interconnect interface for SIP/SIP-I 0 Document history... 2 1 Scope... 2 2 References... 2 3 Definitions/Acronyms... 3 4 IP Interconnect specification...

More information

Isolines: Energy-efficient Mapping in Sensor Networks

Isolines: Energy-efficient Mapping in Sensor Networks Isolines: Energy-efficient Mapping in Sensor Networks Ignacio Solis and Katia Obraczka {isolis, katia}@cse.ucsc.edu Computer Engineering Department University of California, Santa Cruz April 15, 2005 Abstract

More information

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar

More information

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1 ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled

More information

IoT for surveillance applications!

IoT for surveillance applications! ! IoT for surveillance applications!! (and how to connect & schedule them)! EU-SEA workshop and cooperation on IoT and open platforms! January 25th, 2015!! IEEE RIVF 2015, Can Tho, Vietnam! Prof. Congduc

More information

Using IPv6 and 6LoWPAN for Home Automation Networks

Using IPv6 and 6LoWPAN for Home Automation Networks Using IPv6 and 6LoWPAN for Home Automation Networks Thomas Scheffler / Bernd Dörge ICCE-Berlin Berlin, 06.09.2011 Overview IPv6 and 6LoWPAN for Home Automation Networks 6LoWPAN Application & Network Architecture

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based

More information

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Internetworking. Problem: There is more than one network (heterogeneity & scale) Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication

More information

Beyond Interoperability Pushing the Performance of Sensor Network IP Stacks

Beyond Interoperability Pushing the Performance of Sensor Network IP Stacks Beyond Interoperability Pushing the Performance of Sensor Network IP Stacks JeongGil Ko, Joakim Eriksson 2, Nicolas Tsiftes 2, Stephen Dawson-Haggerty 3, jgko@cs.jhu.edu, joakime@sics.se, nvt@sics.se,

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

The OSI and TCP/IP Models. Lesson 2

The OSI and TCP/IP Models. Lesson 2 The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP

More information

OPNET - Network Simulator

OPNET - Network Simulator Simulations and Tools for Telecommunications 521365S: OPNET - Network Simulator Jarmo Prokkola Project Manager, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,

More information

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 Alex Ali Hamidian January 2003 Department of Communication Systems Lund Institute of Technology, Lund University Box 118 S-221 00 Lund

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins

More information

IP Routing Features. Contents

IP Routing Features. Contents 7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................

More information

Troubleshooting Tools

Troubleshooting Tools Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs

More information

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.

More information

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student

More information

Reduce Cost and Complexity of M2M and IoT Solutions via Embedded IP and Application Layer Interoperability for Smart Objects

Reduce Cost and Complexity of M2M and IoT Solutions via Embedded IP and Application Layer Interoperability for Smart Objects Reduce Cost and Complexity of M2M and IoT Solutions via Embedded IP and Application Layer Interoperability for Smart Objects Fabien Castanier STMicroelectronics IPSO Promoter M2M Forum - Milan, May 20,

More information

TCP in Wireless Mobile Networks

TCP in Wireless Mobile Networks TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer

More information

REDUCING PACKET OVERHEAD IN MOBILE IPV6

REDUCING PACKET OVERHEAD IN MOBILE IPV6 REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran hoppico@eng.ui.ac.ir hozo19@gmail.com Common Mobile

More information

Implementing Existing Management Protocols on Constrained Devices. IETF 81, Quebec, 2011-07-26

Implementing Existing Management Protocols on Constrained Devices. IETF 81, Quebec, 2011-07-26 Implementing Existing Management Protocols on Constrained Devices Jürgen Schönwälder IETF 81, Quebec, 2011-07-26 1 / 22 SNMP on Constrained Devices 1 SNMP on Constrained Devices 2 NETCONF on Constrained

More information

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a traditional NAT? Un article de Le wiki des TPs RSM. Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with

More information

Performance Measurement of Wireless LAN Using Open Source

Performance Measurement of Wireless LAN Using Open Source Performance Measurement of Wireless LAN Using Open Source Vipin M Wireless Communication Research Group AU KBC Research Centre http://comm.au-kbc.org/ 1 Overview General Network Why Network Performance

More information

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor

More information

Analysis of Mobile IP in Wireless LANs

Analysis of Mobile IP in Wireless LANs ENSC 835: COMMUNICATION NETWORKS FINAL PROJECT PRESENTATIONS Spring 2011 Analysis of Mobile IP in Wireless LANs www.sfu.ca/~bshahabi Babak Shahabi (bshahabi@sfu.ca( bshahabi@sfu.ca) 301102998 Shaoyun Yang

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

Location Information Services in Mobile Ad Hoc Networks

Location Information Services in Mobile Ad Hoc Networks Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent

More information

CSMA/CA. Information Networks p. 1

CSMA/CA. Information Networks p. 1 Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

More information

Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks

Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks Abstract. As many radio chips used in today s sensor mote hardware can work at different frequencies, several multi-channel

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Isam Ishaq *, David Carels, Girum K. Teklemariam, Jeroen Hoebeke, Floris Van den Abeele, Eli De Poorter, Ingrid Moerman and Piet Demeester

Isam Ishaq *, David Carels, Girum K. Teklemariam, Jeroen Hoebeke, Floris Van den Abeele, Eli De Poorter, Ingrid Moerman and Piet Demeester J. Sens. Actuator Netw. 2013, 2, 235-287; doi:10.3390/jsan2020235 Review IETF Standardization in the Field of the Internet of Things (IoT): A Survey Journal of Sensor and Actuator Networks ISSN 2224-2708

More information

Bluetooth Low Energy

Bluetooth Low Energy Bluetooth Low Energy Responsable de l épreuve : L. Toutain Tous documents autorisés. Répondez uniquement sur la copie en annexe. Lisez bien tout le document avant de commencer à répondre 1 Bluetooth Low

More information

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer

More information