Vehicular cloud computing: from intelligent transport to urban surveillance

Size: px
Start display at page:

Download "Vehicular cloud computing: from intelligent transport to urban surveillance"

Transcription

1 Vehicular cloud computing: from intelligent transport to urban surveillance VCA 2012 Cyprus, June 19, 2012 Mario Gerla UCLA, Computer Science Dept

2 Mobile Cloud Computing (MCC) Workshop! Colocated with Sigcomm 2012, Helsinki! Workshop date: August 17, 2012! Organizers:! Mario Gerla (University of California Los Angeles)" Dijiang Huang (Arizona State University)"

3 Outline! From Internet Clouds to Mobile Clouds! Types of mobile clouds" Principles and Challenges" Mobile Computing platform design tools" The evolution of vehicular communications! Initial applications: safety and content distrinution" Two Vehicle Cloud Applications:! Urban surveillance" Vehicular Traffic Management" Tools for Mobile Computing Cloud support! UCLA Vehicle Campus Testbed! Future Directions!!

4 The Mobile Cloud! Internet Cloud (eg Amazon, Google etc)! Immense computer, storage resources" BroadBand Connectivity" Services, security" Mobile Cloud Computing (traditional)! What most researchers mean:" Access to the Internet Cloud from mobiles" Tradeoffs between local and cloud computing (eg m-health)" Recently, new Mobile Cloud paradigm:! Mobile nodes increasingly powerful (storage, process, sensors)" Emerging distributed applications not suited for Amazon" Enter: Mobile Computing Cloud (MCC)!

5 Several types of Mobile Clouds! Vehicular Cloud! Intelligent Transport applications" Surveillance" Opportunistic formation" Personal Cloud! Info and advertisment dissemination" Mobile health apps" Dependent on the Internet cloud" Influenced by social networks" Mission Oriented Cloud! Not opportunistic ; rather planned for a goal" Scouting of a particular terrain"

6 Observed trends: Vehicular Cloud 1. Vehicles perform increasingly more complex (sensor) data collection/processing road alarms (pedestrian crossing, electr. brake lights, etc) cooperative content downloading via P2P car- torrent surveillance (video, mechanical, chemical sensors) road mapping via crowd sourcing accident, crime witnessing (for forensic investigations, etc) 2. Spectrum is scarce => Internet upload expensive With Vehicular Cloud Computing: Keep and process data on vehicle cloud instead of uploading to Internet cloud

7 Example of Vehicular Cloud Vehicles in the same geographic domain form a P2P cloud and engage in collaborative activities P2P communications leveraging spectrum holes in the urban unlicensed spectrum Inter-cloud communications via Infrastructure (3G, WiFI) food and gas info. Related work: MobiCloud Dijian Huang Maui MSR Auton Vehi Clouds-S. Olariu IC Net On Wheels Fan Bai GM regulating entrance to the evacuation highway

8 Vehicle Cloud vs Internet Cloud Both offer a significant pool of resources:! computing, storage, communications" However:! Vehicular applications are mainly location relevant! Data Sources: Drivers or environment" Customers: generally the drivers " Vehicle cloud interacts with:! Internet cloud" Personal (smart phone) cloud" Exception: emergency VANET! During an emergency the infrastructure is destroyed"! Emergency cloud is isolated, works on its own power" Vehicles (especially E-vehicles) become the ONLY available computing/ comms resource"

9 Vehicle Cloud computing - classification Cloud computing classification: Sensing the environment Communications to exchange data Processing of on-board data Interaction with Internet Cloud (and edge cloud)

10 Vehicle Cloud Support Tools! Content Based Addressing! CCX, NDN, Haggle etc" Efficient Dissemination/propagation! Synchronization! Collaborative Team formation! Spectrum sensing; cog. frequency selection! Security/Privacy; authentication; revocation!

11 Roadmap ahead Evolution of Vehicular Communications Emerging Vehicle Cloud applications Surveillance Monitoring the environment events (natural or manmade) Urban Traffic management: From totally centralized to locally distributed to evacuation

12 The Vehicle Transport Challenge! Safety! 33,963 deaths/year (2009)" 5,800,000 crashes/year " Leading cause of death for ages 4 to 34! Mobility! 4.2 billion hours of travel delay" $78 billion cost of urban congestion" Environment! 2.9 billion gallons of wasted fuel" 22% CO 2 from vehicles"

13 In 2003 DOT launches: Vehicle Infrastr. Integration (VII)! VII Consortium: USDOT, automakers, suppliers,..! Goal: V2V and V2I comms protocols to prevent accidents! Technology validation;" Business Model Evaluation" Legal structure, policies" Testbeds: Michigan, Oakland (California)! However: 10 year to deploy 300,000 RSUs and install DSRC on 100% cars! Meanwhile: can do lots with 3G and smart phones! Can we speed up proof of concept?! Enter Connected Vehicle ( )!

14 The Connected Vehicle Program! Previous Veh Infrastr Integr (VII) Model (2003-9)! DSRC based for all applications" Start with V2I (for all application types) and evolve into V2V (safety) " Current DOT s Connected Vehicle Plan! Non-safety (mobility, environment)! Leverage existing data sources & communications; include DSRC as it becomes available" Safety DSRC! Aggressively pursue V2V; " Can leveraging of nomadic devices & retrofitting accelerate benefits?"

15 Standard: DSRC / IEEE p/ WAVE! Dedicated 5.9Ghz spectrum! Derived from a!! Three types of channels: V2V service, V2I service and control broadcast channel! IEEE 1609.x: channel allocation, channel estimation, power, data rate control, etc! Forward radar Display Event data recorder (EDR) Positioning system Computing platform Communication facility Rear radar

16 Emerging Application Areas! Safe Navigation! Location Relevant Content Distr.! Urban Sensing! Efficient, Intelligent, Clean Transport!

17 ! " V2V for Safe navigation! Forward Collision Warning,! Intersection Collision Warning.! Advisories to other vehicles about road perils! Ice on bridge, Congestion ahead,."!

18 Car to Car communications for Safe Driving! Vehicle type: Cadillac XLR Curb weight: 3,547 lbs Speed: 75 mph Acceleration: + 20m/sec^2 Coefficient of friction:.65 Driver Attention: Yes Etc. Alert Status: None Vehicle type: Cadillac XLR Curb weight: 3,547 lbs Speed: 65 mph Acceleration: - 5m/sec^2 Coefficient of friction:.65 Driver Attention: Yes Etc. Alert Status: None Alert Status: Inattentive Driver on Right Alert Status: Slowing vehicle ahead Alert Status: Passing vehicle on left Vehicle type: Cadillac XLR Curb weight: 3,547 lbs Speed: 75 mph Acceleration: + 10m/sec^2 Coefficient of friction:.65 Driver Attention: Yes Etc. Alert Status: Passing Vehicle on left Vehicle type: Cadillac XLR Curb weight: 3,547 lbs Speed: 45 mph Acceleration: - 20m/sec^2 Coefficient of friction:.65 Driver Attention: No Etc.

19 Location relevant content delivery! Traffic information! Local attractions, advertisements! Tourist information, etc!! CarTorrent : cooperative download of location multimedia files! " "

20 You are driving to Vegas You hear of this new show on the radio Video preview on the web (10MB)

21 One option: Highway Infostation download Internet file

22 Incentive for opportunistic ad hoc networking Problems: Stopping at gas station for full download is a nuisance Downloading from GPRS/3G too slow and quite expensive 3G broadcast services (MBMS, MediaFLO) only for TV Observation: many other drivers are interested in download sharing Solution: Co-operative P2P Downloading via Car-Torrent (like Bit Torrent in the Internet)!!!!!

23 CarTorrent: Basic Idea! Internet Download a piece Outside Range of Gateway Transferring Piece of File from Gateway

24 Co-operative Download: Car Torrent! Internet Vehicle-Vehicle Communication Exchanging Pieces of File Later

25 Simulation Results! Completion time density! 200 nodes 40% popularity Time (seconds)

26 Surveillance Scenario: storage and retrieval! Participating Cars ( busess, taxicabs, commuters):! Continuously collect images from the street (store data locally)" Process the data and detect an event" Classify the event as Meta-data (Type, Option, Loc, time,vehicle ID)" Question: how to access this info?! - Sensing - Processing Summary Harvesting CRASH Crash Summary Reporting Meta-data : Img, -. (10,10), V10

27 Mobility-assisted Meta-data Diffusion/ Harvesting (Mobeyes 2007)! HREP HREQ Agent harvests a set of missing meta-data from neighbors Periodical meta-data broadcasting + Broadcasting meta-data to neighbors + Listen/store received meta-data

28 MobEyes: Mobility-assisted Epidemic Dissemination! Mobeyes exploit mobility to disseminate metadata!! Source periodically broadcasts meta-data to neighbors! Only source can advertise meta-data" Neighbors store advertisements in their local memory" Drop stale data" A mobile agent (the police) harvests meta-data from vehicles by querying them (with Bloom filter)!

29 Urban Surveillance as a Service! Suppose a green truck was involved in a suicidal terrorist attack! The truck blows up " The Agency wants to find out the approach path of the vehicle" Wants to learn if any accomplices drove along with the truck up to the target" Conventional solution: road side video cameras! Sophisticated attacker can avoid video cameras, or disable them" Mobeyes based solution:! Reconstruct the path by using the other vehicles video cameras" We have run a simulation experiment in a 2kmx2km area, with 100 vehicles roaming! Vehicles watch each other and agent reconstructs all paths"

30 Trace Reconstruction!

31 Trace Reconstruction!

32 Intelligent navigation!! GPS Based Navigators! Dash Express (came to market in 2008):! Synergy between Navigator Server and City Transport Authority!

33 NAVOPT Navigator Assisted Route Optimization!! On Board Navigator! Interacts with the Server" Periodically transmits GPS and route" Receives route instructions" Manhattan grid (10x10)! 5 routes (F1~ F5) from source to destination" Link capacity: 14,925 [vehicles/h]" F2,5 F3,4 S F5 F2 Shortest path F1 F3 D F4

34 Analytic Results! Total average delay (h/veh)! 0.45" 0.4" 0.35" Average delay (hour)! 0.3" 0.25" 0.2" 0.15" shortest path" flow deviation" 0.1" 0.05" 0" 13500" 13600" 13700" 13800" 13900" 14000" 14100" 14200" 14300" 14400" 14500" 14600" 14700" 14800"

35 Analytic Results (cont)! Average speed (Km/h)! 70" 60" 50" Speed (Km/h)! 40" 30" shortest path" flow deviation" 20" 10" 0" 13500" 13600" 13700" 13800" 13900" 14000" 14100" 14200" 14300" 14400" 14500" 14600" 14700" 14800"

36 Sumo simulation results! Sumo-0.12! 10 X10 grid" Road segment: 400m" Length of vehicle: 4m" Max speed limit: 60Km/h" Average delay! Delay increases drastically around rate [veh/h] in case of shortest path" In NAVOPT, delay slightly increases around 20000"

37 What happens when the grid gets congested?! As density increases, flow decreases! Eventually the system comes to a stand still (bottleneck)" The gradient flow optimization (eg Flow Deviation) works only in free flow mode (below congestion density level)! Function no longer convex => many local minima" In congested mode, new techniques must be used" Question: how can the Navigator Server detect that the system is congested and how badly?! Must correlate and interpret the space-time probes obtained by vehicles"

38 Lessons Learned! When density increases beyond critical value, the mode changes from FREE FLOW to CONGESTED! Phase transition delayed by V2V communications" The Navigator Server can detect congestion because the velocity on the road segment is uneven:! Random, distributed slow down => Shockwaves" Localized traffic jam => backlog propagation" If the system is congested, basic gradient method optimization does not work:! Function is not convex => multiple local optima" Need to exercise FLOW CONTROL! "

39 Nav Opt Next Steps! Make the process {traffic measmt and route enforcement} iterativly! Deal with Free Flow as well as Backlogged! SUMO + Qualnet will be used as the simulation platform! Include pollution component based on engine regime! Include pollution costs in the optimization!

40 Distributed traffic management! Centralized traffic management cannot react promptly to local traffic perturbations! A doubled parked truck in the next block; A traffic accident; A sudden surge of traffic" Internet based Navigator Server cannot micro-manage traffic for scalability reasons " Enter distributed, v-cloud based traffic mgmt! Distributed approach a good complement of centralized supervision" On the Effectiveness of an Opportunistic Traffic Management System for Vehicular Networks, Leontiadis et al, IEEE Trans on ITS Dec 2011!!

41 CATE: Comp Assisted Travl Environment! Vehicles crowd source traffic information and traffic load data base:! 1) sensing traffic information from road segment travel time;" 2) sharing it with neighboring vehicles (in an ad hoc manner); and" 3) dynamically recomputing the best route to destination from the current position." The study was done by simulation:! QUALNET a popular event driven MANET simulator, and" MobiDense, a mobility simulator that combines topology and traffic flow information to generate a mobility trace." Case Study: Traffic pattern for Portland obtained from Los Alamos Lab" Potential limitations of CATE:! Delay in traffic loads propagation; lack of trip destination info"

42 Traffic loading w/o CATE! Green no congest Yellow moderate Red heavy congest"

43 Traffic loading with CATE! Green no congest Yellow moderate Red heavy congest"

44 Histogram of vehicle decreased trv time!

45 Information Propagation Speed! Two-dimensional Heatmap of age of received information (in seconds) about the link highlighted by the arrow (bridge)."

46 CATE tested on C-VET! Up to 8 vehicles roaming the Campus with GPS, WiFi radios and 250m range! Static throughput between two nodes = 30Mps! At 30km/h througput = 7Mbps! Propagation of a 2MB block (traffic sample) from one node to the other 7 nodes:! First vehicle received full block in 20s" Next four in < 72s" Last two in < 125s " C-VeT experiments are comparable with Portland simulation results!

47 Integrating Centralized and Distributed traffic management! Central Navigator Server (in the Amazon cloud):! Provides MACRO traffic instructions" Is aware of user destinations" Accounts for possible congestion fees" Can perform ECO-Routing (accounting for pollution)" Interacts with City Traffic/Planning Department (traffic lights, Green waves, access ramp control)" Distributed (CATE-like) traffic management in the Vehicular Cloud:! Can handle sudden traffic jams, accidents, other anomalies" Provides miopic traffic redirections w/o preempting Server" Can be a safety net when infrastructure fails" Amzon Cloud + Vehicle Cloud :! Improves scalability, reaction time, robustness to disasters"

48 Vehicle Cloud Support Tools! Content Based Addressing! CCX, NDN, Haggle etc" Efficient Dissemination! Synchronization! Collaborative Team formation! Spectrum sensing; cog. frequency selection! Security/Privacy!

49 CBMEN ENCODERS DARPA CBMEN Program Content Based MANET - Edge Networking Mark-Oliver Stehr, (SRI) David Anhalt, Hua Li (SET) José Joaquin Garcia-Luna-Aceves (UCSC)! Mario Gerla (UCLA) 49

50 Finding content in a MANET! MANET is ideally suited for emergency & tactical operations, but!! hard to find content" no search engine" Goal: Scalable, efficient content search in MANETs Content Based Networking! 50

51 Network Coding to assist content retrieval! File/1 Interest triggers download of content File/1 Content is encoded in three blocks File/2 File/3 File/2 File/3 File/1 File/2 File/3 File (coded) File (coded) File (coded) Get File/1, File/2, File/3 at once 51

52 Applying Cognitive Radios to Wi-Fi based Vehicular Networks

53 Real Time Surveillance in Urban Motorcade! Urban motorcade:! Surveillance video multicast!escort cars transmit video streams to agents in motorcade using WiFi! Problem: urban WiFi is becoming increasingly congested! Approach: Use Cognitive Radios to minimize impact on urban WiFI! presidential motorcade

54 Westwood experiment (4 blocks) IEEE b/g! 50 Mhz 227APs discovered using wireless card in automatic detection mode. Orthogonal channels 1,6,11 are predominant

55 Urban WiFi Spectrum Sharing Problem! Secondary users! Escorts generate surveillance video streams and multicast to patrollers" Store and forward within motorcade only" Primary network residential WiFi users! Dense WiFi access point deployment must minimize disruption of residential WiFi" In turn, minimize interference caused by residential traffic on motorcade"

56 On-Demand Multicast Routing Protocol (ODMRP)! S F F R F F On-demand mesh creation! A source initiates Join Query flooding when it has data to send." Intermediate nodes relay Join Query after recording the previous hop as backward pointer." Multicast subscribers send Join Reply messages, following backward pointers to the source." Upon receiving a Join Reply, a node declares itself as part of the forwarding group." R R R R mesh Join Query Join Reply

57 CoCast: Cognitive Multicast! Join Query flooding in the Common Control Channel! Cognitive nodes compute Active channels (two-way available) after receiving Join Queries that contain Available channels.! Available! 3, 6, 7! Available! 1, 5, 7! Active! Listen! Transmit! S" Available! 1, 2, 4, 5! Active! Listen! Transmit! 1,5,7 7 data channels (1~7), 1 common control channel (0) Available! 1, 2, 5, 6! Active! Listen! Transmit! 1, 5 F" 1, 2, 5 F" Available! 1, 2, 4, 6! Active! 1, 2, 6 Listen! Transmit! 1,2,5,6 F" F" Available! 2, 4, 6! Active! 2, 6 Listen! Transmit! 1,2,4,6 R" R" R" Active! 6 Listen! Transmit! Available! 1, 2, 6, 7! Active! 1, 2, 6 Listen! Transmit! Available! 1, 2, 6! Active! 2, 6 Listen! Transmit!

58 CoCast: Channel Allocation! Sending back Join Reply! Receiver selects Listen channel from Active channel list, and reports in JR" Forward nodes set own TX Channel to Listen channels of downstream node" Goal: minimize # of channel frequency switches along path" Available! 3, 6, 7! Available! 1, 5, 7! Active! Listen! Transmit! 1 S" Available! 1, 2, 4, 5! Active! 1, 5! Listen! Transmit! F" 2 Available! 1, 2, 5, 6! Active! 1, 2, 5! Listen! Transmit! 2 2, 6 F" 6 2 Available! 1, 2, 4, 6! Active! 1, 2, 6! Listen! Transmit! F" F" Available! 2, 4, 6! Active! 2, 6! Listen! Transmit! R" R" R" Active! 6! Listen! 6 Transmit! Available! 1, 2, 6, 7! Active! 1, 2, 6! Listen! 6 Transmit! Available! 1, 2, 6! Active! 2, 6! Listen! 2 Transmit!

59 Simulation Setup! Simulation configuration in QualNet 3.9! Parameter" Value" Number of Nodes! 100! Mobility! Switching delay (D switch )! Number of channels! Channel data rate! Packet size/rate! RGM model, 20m/s! 0~50 ms! 7 Data channels, 1 CCC! 2 Mbps! 512 Bytes, 4pps! Reference Group Mobility Model! Random way point motion within the motorcade" Each geographic area has different WiFi channel occupancies! Channel idle/busy state changes in space and time"

60 Simulation Results! Variable number of video sources! 2 ~ 10 source nodes within the same motorcade" Comparison between ODMRP and CoCast in terms of delivery ratio! Static case vs. mobile case "" CoCast scales better with increasing number of source nodes! Nice surprise: frequency switching along the path mitigates HIDDEN TERMINAL"

61 SORA SDR Kit High-performance Software Defined Radio kit from MSR Asia. Exploits multiple cores available in CPU. 3+ stations available. Plans Implementation of Cognitive Protocols OFDM channel measurements OFDM subcarrier assignment 61

62 C-Ve T Campus - Vehicular Testbed E. Giordano, A. Ghosh,! G. Marfia, S. Ho, J.S. Park, PhD! System Design: Giovanni Pau, PhD! Advisor: Mario Gerla, PhD!!

63 The Deployment! We plan to install our node equipment in:! 30 Campus operated vehicles (including shuttles and facility management trucks). " Exploit on a schedule and random campus fleet mobility patterns " 30 Commuting Vans: Measure urban pollution, traffic congestion etc" 12 Private Vehicles: controlled motion experiments " Cross campus connectivity:10 node WiFi Mesh + 2 WiMAX base stations" Support: NSF GENI, ARMY DURIP, CISCO!

64

65 C-VeT Goals! Provide:!! A shared virtualized environment to test new protocols! Full Virtualization! MadWiFi Virtualization (with on demand exclusive use)" Multiple OS support (Linux, Windows)" Assisted by:! Qualnet Simulator " VEMU fully virtualized Emulator" Enable:! Propagation experiments! Collection of mobility traces and network statistics! Use of platform for Urban Sensing, Geo routing etc! Deployment of innovative V2V/V2I applications!

66 Preliminary Experiments! Equipment:! Up to 6 cars roaming the UCLA Campus" abg radios" Routing protocol: OLSR" " Experiments:! Connectivity map computed by OLSR" Azureus P2P application" Propagation model validation" OLSR and AODV comparison" Crowd Sourcing to discover urban grid details (eg position of traffic lights, their cycle, etc)" "

67 Line of sight and Corner propagation models! Q. Sun et al, Analytical formulae for path loss prediction in urban street grid.., IEEE TVT, July 2005.

68 CORNER: fixed to mobile!

69 C-VeT Experiments in Progress!! Cognitive radios to improve spectrum utilization! Virtualized Router experiments! Multiple routing protocols (OLSR, AODV)" Multiple OS support (Linux, Windows). " Soft Handoff experiments (WiFI, WiMAX)! Multipath with Network Coding" Propagation model validation for 5.9 Ghz (DSRC frequency band)! Intelligent Navigation experiments! Dissemination delays"

70 Work ahead in Vehicle Cloud research Vehicle cloud formation and maintenance Subclouds with common social interests In-Cloud networking Cloud Content dissemination, storage, indexing, search (Content Centric Networking) Efficient spectrum usage (via cog radios) Exploit WiFi spectrum short range Exploit TV spectrum long range connections (to other vehicle clouds) User-centric security and privacy protection Interaction with Internet Cloud Interaction with pedestrian (people) clouds

71 The End! Thank You!

VANET Services and Mobile Vehicle Clouds

VANET Services and Mobile Vehicle Clouds VANET Services and Mobile Vehicle Clouds Université de Lyon, Lyon, March 25, 2015 Mario Gerla UCLA, Computer Science Dept Mobile Computing Cloud Internet Cloud (eg Amazon, Google etc) Data center model

More information

Technical Document on Vehicular Networks

Technical Document on Vehicular Networks Technical Document on Vehicular Networks GDD-06-18 GENI: Global Environment for Network Innovations September 15, 2006 Status: Draft (Version 2.0) Note to the reader: this document is a work in progress

More information

Research Projects in the Mobile Computing and Networking (MCN) Lab

Research Projects in the Mobile Computing and Networking (MCN) Lab Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University http://www.cse.psu.edu/~gcao Mobile Computing

More information

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- ABSTRACT INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- Bahidja Boukenadil¹ ¹Department Of Telecommunication, Tlemcen University, Tlemcen,Algeria Now in the world, the exchange of information between

More information

Vehicular Cloud. Fan Zhang

Vehicular Cloud. Fan Zhang Vehicular Cloud Fan Zhang Outline VANET Cloud computing Vehicular cloud: motivation and concept Application scenarios Challenges: architecture/security Data forwarding Questions VANET Deliver timely information

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

The Vision of Vehicle Infrastructure Integration (VII)

The Vision of Vehicle Infrastructure Integration (VII) The Vision of Vehicle Infrastructure Integration (VII) Ralph L. Robinson ITS Integration Office September, 2007 Cooperative Highways SAFETY MOBILITY Collision Avoidance Signal Control Emergency Alerts

More information

Demystifying Wireless for Real-World Measurement Applications

Demystifying Wireless for Real-World Measurement Applications Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,

More information

Automotive Communication via Mobile Broadband Networks

Automotive Communication via Mobile Broadband Networks Automotive Communication via Mobile Broadband Networks Dr. Joachim Sachs Ericsson Corporate Research, Aachen Contributors: René Rembarz, Mai-Anh Phan, Sabine Sories Where are we in telecommunications?

More information

Michael I. Shamos, Ph.D., J.D. School of Computer Science Carnegie Mellon University

Michael I. Shamos, Ph.D., J.D. School of Computer Science Carnegie Mellon University Michael I. Shamos, Ph.D., J.D. School of Computer Science Carnegie Mellon University Background Ph.D., Yale University (computer science, 1978) J.D., Duquesne University (law, 1981) Carnegie Mellon computer

More information

September 8th 8:30 AM 10:00 AM PL1: Reinventing Policy to Support the New ITS

September 8th 8:30 AM 10:00 AM PL1: Reinventing Policy to Support the New ITS September 8th 8:30 AM 10:00 AM PL1: Reinventing Policy to Support the New ITS September 8th 10:30 AM 12:00 PM AM01: Sustainable Transportation Performance Measures: Best Practices September 8th 10:30 AM

More information

The Future of the Automobile Vehicle Safety Communications. Stanford University ME302 Luca Delgrossi, Ph.D. April 1, 2014

The Future of the Automobile Vehicle Safety Communications. Stanford University ME302 Luca Delgrossi, Ph.D. April 1, 2014 The Future of the Automobile Vehicle Safety Communications Stanford University ME302 Luca Delgrossi, Ph.D. April 1, 2014 About your lecturer Luca Delgrossi, Ph. D. Born in Italy, I live in the US since

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

22 nd ITS World Congress Towards Intelligent Mobility Better Use of Space. GPS 2: Big Data The Real Value of Your Social Media Accounts

22 nd ITS World Congress Towards Intelligent Mobility Better Use of Space. GPS 2: Big Data The Real Value of Your Social Media Accounts 22 nd ITS World Congress Towards Intelligent Mobility Better Use of Space GPS 2: Big Data The Real Value of Your Social Media Accounts October 7, 2015 Kenneth Leonard Director, Intelligent Transportation

More information

M2M ATDI services. M2M project development, Business model, Connectivity.

M2M ATDI services. M2M project development, Business model, Connectivity. M2M ATDI services M2M project development, Business model, Connectivity. Introduction Thanks to our leadership in Spectrum management, Prospective planning, Network deployment, ATDI was/is involved in

More information

USDOT Connected Vehicle Overview

USDOT Connected Vehicle Overview USDOT Connected Vehicle Overview RWM Stakeholder Meeting August 8, 2012 Dale Thompson, Intelligent Transportation Systems Joint Program Office, RITA, U.S. DOT 1 Overview NHTSA Decision Safety Pilot Policy-Architecture

More information

Location Identification and Vehicle Tracking using VANET(VETRAC)

Location Identification and Vehicle Tracking using VANET(VETRAC) Location Identification and Vehicle Tracking using VANET(VETRAC) Supervisor Name: Md. Mosaddik Hasan Assistant Professor Dept. of CSE MBSTU Md. Al-Amin Nipu CE-10031 Dept. of CSE MBSTU Abstract: Large

More information

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Comparison of WCA with AODV and WCA with ACO using clustering algorithm Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks

More information

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

An Implementation of Secure Wireless Network for Avoiding Black hole Attack An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,

More information

Towards Efficient Routing in Vehicular Ad Hoc Networks

Towards Efficient Routing in Vehicular Ad Hoc Networks Towards Efficient Routing in Vehicular Ad Hoc Networks Moez Jerbi*, Sidi-Mohammed Senouci* and Yacine Ghamri-Doudane** *France Telecom R&D, Core Network Laboratories, Lannion, France **Networks and Multimedia

More information

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology [email protected] Abstract intrusion detection

More information

Networking Research: Trends and Issues

Networking Research: Trends and Issues 1 Networking Research: Trends and Issues Deep Medhi Networking & Telecommunication Research (NeTReL) Computer Science & Electrical Engineering Department School of Computing & Engineering University of

More information

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.

More information

Introduction to Wide-Area WiFi. AfNOG 2009 Wireless Tutorials Cairo

Introduction to Wide-Area WiFi. AfNOG 2009 Wireless Tutorials Cairo Introduction to Wide-Area WiFi AfNOG 2009 Wireless Tutorials Cairo Wireless networking protocols The 802.11 family of radio protocols are commonly referred to as WiFi. 802.11a supports up to 54 Mbps using

More information

Priority-Based Congestion Control Algorithm for Cross-Traffic Assistance on LTE Networks

Priority-Based Congestion Control Algorithm for Cross-Traffic Assistance on LTE Networks Priority-Based Congestion Control Algorithm for Cross-Traffic Assistance on LTE Networks Lung-Chih Tung, You Lu, Mario Gerla Department of Computer Science University of California, Los Angeles Los Angeles,

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

LIST OF FIGURES. Figure No. Caption Page No.

LIST OF FIGURES. Figure No. Caption Page No. LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET

More information

Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions

Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions Georgios Charalampopoulos 1,2 and Tasos Dagiuklas 1 1. Dept. of Computer Science, Hellenic Open University, Greece,

More information

Introduction to Computer Networking: Trends and Issues

Introduction to Computer Networking: Trends and Issues Introduction to Computer Networking: Trends and Issues Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Indo-US Collaboration in Engineering Education (IUCEE) Webinar,

More information

Wireless Technologies in Industrial Markets

Wireless Technologies in Industrial Markets SOLUTION PAPER Wireless Technologies in Industrial Markets An Examination of Mesh Technologies in Mining Executive Summary Consumers and enterprises around the globe use standards-based 802.11a/b/g/n WiFi

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

The Optimal Methods of IVC Routing Protocol for VANET

The Optimal Methods of IVC Routing Protocol for VANET The Optimal Methods of IVC Routing Protocol for VANET Bin TIAN, Kun-Mean HOU, Hongling SHI, Jianjin LI LIMOS Laboratory CNRS UMR 6158 Blaise Pascal University Clermont-Ferrand, France NICST2013: International

More information

Security Threats in Mobile Ad Hoc Networks

Security Threats in Mobile Ad Hoc Networks Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey [email protected], [email protected]

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

Rethinking the Small Cell Business Model

Rethinking the Small Cell Business Model CASE STUDY Intelligent Small Cell Trial Intel Architecture Rethinking the Small Cell Business Model In 2011 mobile data traffic experienced a 2.3 fold increase, reaching over 597 petabytes per month. 1

More information

WLAN Positioning Technology White Paper

WLAN Positioning Technology White Paper WLAN Positioning Technology White Paper Issue 1.0 Date 2014-04-24 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

LTE, WLAN, BLUETOOTHB

LTE, WLAN, BLUETOOTHB LTE, WLAN, BLUETOOTHB AND Aditya K. Jagannatham FUTURE Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver 4G LTE LTE (Long Term Evolution) is the 4G wireless cellular standard developed

More information

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products

More information

Wireless Broadband Access

Wireless Broadband Access Wireless Broadband Access (Brought to you by RMRoberts.com) Mobile wireless broadband is a term used to describe wireless connections based on mobile phone technology. Broadband is an electronics term

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

Monitoring Free Flow Traffic using Vehicular Networks

Monitoring Free Flow Traffic using Vehicular Networks Monitoring Free Flow Traffic using Vehicular Networks Hadi Arbabi and Michele C. Weigle Department of Computer Science Old Dominion University Norfolk, VA 23529 USA {marbabi, mweigle}@cs.odu.edu Abstract

More information

Università degli Studi di Catania Dipartimento di Ingegneria Informatica e delle Telecomunicazioni VANETs

Università degli Studi di Catania Dipartimento di Ingegneria Informatica e delle Telecomunicazioni VANETs VANETs Ing. Alessandro Leonardi VANETs Vehicular Ad-hoc NETworks (VANETs) can be considered as a subset of Mobile Ad hoc NETworks (MANETs) with unique characteristics. A typical VANET consists of vehicles

More information

Craig McWilliams Craig Burrell. Bringing Smarter, Safer Transport to NZ

Craig McWilliams Craig Burrell. Bringing Smarter, Safer Transport to NZ Craig McWilliams Craig Burrell Bringing Smarter, Safer Transport to NZ World Class Transport. Smarter, Stronger, Safer. Bringing Smarter Safer Transport to NZ Craig Burrell Infrastructure Advisory Director

More information

other. A B AP wired network

other. A B AP wired network 1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer

More information

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

Traffic System for Smart Cities. Empowering Mobility Consulting Solutions Managed Services

Traffic System for Smart Cities. Empowering Mobility Consulting Solutions Managed Services Traffic System for Smart Cities Empowering Mobility Consulting Solutions Managed Services About US Leading provider of Toll Collection and Intelligent Transport Management Systems (ITS) More than a decade

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic

More information

Securing Wireless Access for Vehicular Environments (WAVE)

Securing Wireless Access for Vehicular Environments (WAVE) Securing Wireless Access for Vehicular Environments (WAVE) May 7, 2009 CTST, New Orleans Tim Weil CISSP/CISA Security Architect ITS Engineering Booz Allen Hamilton 0 The concept of VII started upon the

More information

Intrusion Detection for Mobile Ad Hoc Networks

Intrusion Detection for Mobile Ad Hoc Networks Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems

More information

Using Wireless Mesh Networks for Video Surveillance Version: 1. Using Wireless Mesh Networks for Video Surveillance

Using Wireless Mesh Networks for Video Surveillance Version: 1. Using Wireless Mesh Networks for Video Surveillance Using Wireless Networks for Video Surveillance Version: 1 White Paper Using Wireless Networks for Video Surveillance Using Wireless Networks for Video Surveillance Version: 1 White Paper Table of Contents

More information

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: [email protected] UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014

More information

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael

More information

JEREMY SALINGER Innovation Program Manager Electrical & Control Systems Research Lab GM Global Research & Development

JEREMY SALINGER Innovation Program Manager Electrical & Control Systems Research Lab GM Global Research & Development JEREMY SALINGER Innovation Program Manager Electrical & Control Systems Research Lab GM Global Research & Development ROADMAP TO AUTOMATED DRIVING Autonomous Driving (Chauffeured Driving) Increasing Capability

More information

Output Power (without antenna) 5GHz 2.4GHz

Output Power (without antenna) 5GHz 2.4GHz Dual Band High- PoE AP Router Dual Band Concurrent AP Router 11a + 11a/b/g Hi- Radios 802.3af PoE Port 7 Wireless Operation Modes 5/10/20 Variable Channel Width Home Digital Network Application School,

More information

Improving Driving Safety Through Automation

Improving Driving Safety Through Automation Improving Driving Safety Through Automation Congressional Robotics Caucus John Maddox National Highway Traffic Safety Administration July 25, 2012 NHTSA s Missions Safety Save lives, prevent injuries and

More information

Energy Consumption analysis under Random Mobility Model

Energy Consumption analysis under Random Mobility Model DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network

More information

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战

Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战 Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战 Jiannong Cao Internet & Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Email: [email protected]

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

Optimized Load Balancing Mechanism Using Carry Forward Distance

Optimized Load Balancing Mechanism Using Carry Forward Distance Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,

More information

Current and Future Trends in Hybrid Cellular and Sensor Networks

Current and Future Trends in Hybrid Cellular and Sensor Networks 2010-10-19 Current and Future Trends in Hybrid Cellular and Sensor Networks Yongjun Liu, Bin Zhen, Yong Xu, Hui Yang, Betty Zhao [email protected] www.huawei.com ETSI TC M2M Workshop 19-20 October

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

AAA AUTOMOTIVE ENGINEERING

AAA AUTOMOTIVE ENGINEERING AAA AUTOMOTIVE ENGINEERING Evaluation of Blind Spot Monitoring and Blind Spot Intervention Technologies 2014 AAA conducted research on blind-spot monitoring systems in the third quarter of 2014. The research

More information

Municipal Mesh Network Design

Municipal Mesh Network Design White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. Marco Zennaro, ICTP Trieste-Italy

INTRODUCTION TO WIRELESS SENSOR NETWORKS. Marco Zennaro, ICTP Trieste-Italy INTRODUCTION TO WIRELESS SENSOR NETWORKS Marco Zennaro, ICTP Trieste-Italy Wireless sensor networks A Wireless Sensor Network is a self-configuring network of small sensor nodes communicating among themselves

More information

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing

More information

Basic Network Design

Basic Network Design Frequency Reuse and Planning Cellular Technology enables mobile communication because they use of a complex two-way radio system between the mobile unit and the wireless network. It uses radio frequencies

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

Intelligent Transportation System for Vehicular Ad-Hoc Networks

Intelligent Transportation System for Vehicular Ad-Hoc Networks Intelligent Transportation System for Vehicular Ad-Hoc Networks T. Sujitha 1, S. Punitha Devi 2 1,2 Department of CSE, P.A College of Engineering and Technology, Coimbatore, Tamilnadu Abstract - Vehicular

More information

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.

More information

Space-Based Position Navigation and Timing National Advisory Board

Space-Based Position Navigation and Timing National Advisory Board Space-Based Position Navigation and Timing National Advisory Board Intelligent Transportation System (ITS) Evolution GPS/GNSS Role in Emerging Vehicle Fleets and Highway Infrastructure Brian P. Cronin,

More information

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving

More information

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman 1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers

More information

Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture

Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture IEEE GLOBECOM Design and Developers Forum Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture Tim Weil CISSP, CISA Booz Allen Hamilton

More information

SECURITY AND EMERGENCY VEHICLE MANAGEMENT

SECURITY AND EMERGENCY VEHICLE MANAGEMENT SECURITY AND EMERGENCY VEHICLE MANAGEMENT Index Purpose Description Relevance for Large Scale Events Options Technologies Impacts Integration potential Implementation Best Cases and Examples 1 of 10 Purpose

More information

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,

More information

Remote Home Security System Based on Wireless Sensor Network Using NS2

Remote Home Security System Based on Wireless Sensor Network Using NS2 Remote Home Security System Based on Wireless Sensor Network Using NS2 #Rajesh Banala 1, Asst.Professor,E-mail: [email protected] #D.Upender 2, Asst.Professor, E mail: [email protected] #Department

More information