Software Defined Wireless Networks (SDWN): Unbridling SDNs

Size: px
Start display at page:

Download "Software Defined Wireless Networks (SDWN): Unbridling SDNs"

Transcription

1 Software Defined Wireless Networks (SDWN): Unbridling SDNs Leonardo Linguaglossa & thanks to Salvatore Costanzo, Laura Galluccio, Giacomo Morabito, Sergio Palazzo Università degli Studi di Catania Dipartimento di Ingegneria Elettrica, Elettronica, e Informatica Consorzio Nazionale Interuniversitario per le Telecomunicazioni (CNIT) April 30, 2013 L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

2 Lesson three: Software Defined Wireless Networks 1 Introduction 2 SDN in the wireless domain 3 SDN for Wireless Sensor Networks 4 SDN and Mobile Ad Hoc Networks 5 An empiric assessment 6 Conclusions and future work L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

3 Introduction and motivations L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

4 Motivations and contribution Increasing number of wireless and mobile communications companies are investing in SDN. Examples: Verizon, Nokia Siemens Networks, Ericsson, and Netgear are members of OpenNetworking Foundation. However, large effort is still required: What are the advantages of SDN in the most common wireless networking scenarios? How should the SDN concept be expanded to suit the characteristics of wireless and mobile communications? In this lecture we will: analyze the advantages of the SDN approach in low rate wireless personal area networks (LR-WPAN)s. Example: IEEE ; identify the differences in requirements between traditional wired networks and LR-WPANs; present Software Defined Wireless Network (SDWN) (98% implemented). show ongoing activities on SDN & Smartphones. L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

5 SDN in the wireless domain L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

6 Advantages of SDN in LR-WPANs SDN is about simplification and evolvability. This applies to any networking environment. Almost universal consensus on the first two layers of the protocol stack IEEE , but several alternative candidates often incompatible for the higher layers 1. For example: 6LOWPAN vs. ZigBee; Difficult for a node to move from one network to another. 1 This is valid for other relevant domains: vehicular networks, mesh networks,... L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

7 Advantages of SDN in LR-WPANs SDN solves this problem: allowing to change the behavior of a node on the fly. In most implementations SDN applies a centralized management through the controller: easier optimization in the use of network resources; crucial problems: which element(s) run the network control operations; how to communicate with such element(s). L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

8 Requirements for SDN solutions in LR-WPANs In traditional wired networks, transmission speed is the major performance measure rigid definition of rules. In LR-WPANs scenarios, priorities change: energy efficiency is the primary requirement for a Software Defined Wireless Network (SDWN) solution; Accordingly, SDWN must support: Duty cycles: an appropriate action 2 must be defined; In-network data aggregation: an appropriate module must be introduced in the protocol architecture and a new action must be defined; Flexible definition of the rules: this is achieved in two ways: Any byte of the packet should be considered as a possible part of the rule; Other relation operators (not just equivalence) can be considered for the matching of rules. Other obvious requirements: support of node mobility, link unreliability tolerance, robustness to the failure of generic nodes and the control node. 2 We use the OpenFlow approach and notations L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

9 Software Defined Wireless Networks (SDWN) L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

10 Architecture L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

11 Architecture - Example of our implementation L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

12 Generic node Standard IEEE (layers 1 and 2); Forwarding layer: treats arriving packets as specified in the flow table... Control packet: given to the Networking Operating System (NOS); Data packet: Two cases: Match in the flow table action; No match send to the NOS; Aggregation layer: Aggregates information flowing through the network. Currently, One of the possible actions is to include the packet in an aggregation equivalent flow (AEF) Concatenates packets of the same AEF. Network Operating System (NOS) layer: Collects and sends local information to the Controller; Controls the behavior of all layers as specified by the Controller; L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

13 Sink node Embedded system Adaptation layer: formats messages as needed by the device; Virtualizer: uses the local information collected by the generic nodes to build a consistent representation of network state; Topology, nodes battery level, link quality, etc Currently it is implemented as a Java Map; The Virtualizer allows several logical networks to run over one physical network. Device Controller(s): implements the desired network management policy. In our implementation Controllers interact with the Virtualizer through a UDP socket. Same as a generic node... L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

14 Flow table and flow table entries A flow table is composed by several flow table entries. A flow table entry contains the following information: A rule: description of the characteristics of all packets belonging to a flow and that must be treated by the node in the same way; An action: operation to be executed for all packets of the flow; Some statistic information: number of packets received for the flow; Further details later... L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

15 Some design and implementation details L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

16 Collection of topology information NOS in generic nodes need to communicate with the NOS in the sink how reach the sink without the controller intervention? The sink periodically generates a beacon packet, which is broadcast in the network The beacon packet contains information about the current distance (number of hops) from the sink and the battery level of the last relay node Generic nodes use information in the beacon to decide the most convenient next hop to reach the sink Information contained in the beacon is used to build the neighbors table: It contains the list of neighbors and the corresponding RSSI 3 values; It is periodically sent to the sink through a report packet. The sink receives the neighbor tables by all nodes and infers the global network topology (at the Virtualizer layer). 3 Received signal strength indication L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

17 Specification of rules and actions In our scenario: Major goal: flexibility; Major limitation: small memory; A rule operates on (up to) three windows of 1-2 bytes of the incoming packets Each flow table entry contains three group of blocks: 1 Window blocks: related to the three windows; For each window: size, operator, position of the first byte of the window, value 2 Action block: two fields Action type (e.g., forward, modify, drop, aggregate, turn off radio) and the Action value (meaning depends on the type of action) 3 Counter: number of packets received so far satisfying the rule. Figure: Exemplary table. Example: consider Entry 1 if bytes 2 and 3 are = 170 and 24 and bytes 4 and 5 are 170 and 11 forward to node packets have been classified with this rule L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

18 Packet format Entry 1: All packets generated by node and that are not directed to node must be forwarded to node Packet types: Type 0 - Data packet: packet generated by the application layer; Type 1 - Beacon packet: broadcast periodically by the sink; Type 2 - Report packet: generated periodically by generic nodes and sent to the sink; Type 3 - Rule/action request: generated by a generic node and sent to the sink upon receiving a packet not matching with any flow table entry; Rule/action Response: Generated by the sink in response to a Rule/action request. L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

19 A working Use Case L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

20 SDN and Mobile Ad Hoc Networks Challenging with Android s open features L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

21 Current Cellular Architecture L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

22 Why SDN and Smartphones? Let s think about: Data Sharing; Internet Connection Sharing; Service Sharing; L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

23 Why SDN and Smartphones? Data Sharing Figure: Current Mobile + Clouds Mobile Clouds for Opportunistic Networks; Green Mobile Clouds; L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

24 Why SDN and Smartphones? Internet Connection Sharing Fred has a 3GB per month connection; Jim should pay 2 to connect to the internet. Fred can share its connection! Maybe he ll gain some credits; Game Theory Approach It s ok for Users: they win. What about Operators? L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

25 Why SDN and Smartphones? Service Sharing We could use one (or more) controller(s) as a Service Manager: Operators: provides the infrastructure; Controller(s): third party; it manages services within its subnetwork Service Level Agreement with Providers; Users: they can subscribe to one or more services; Figure: Operators Figure: Service Managers L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

26 Why SDN and Smartphones? Service Sharing We could use one (or more) controller(s) as a Service Manager: Operators: provides the infrastructure; Controller(s): third party; it manages services within its subnetwork Service Level Agreement with Providers; Users: they can subscribe to one or more services; Figure: Users L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

27 Would SDN fit for Smartphones? L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

28 Simulator Class Diagram L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

29 Controller Class Diagram L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

30 Deployment Diagram L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

31 A simple Use Case Features: Multiple nodes (i.e. Smartphones); Single Cell; One SDN Controller, attached to the BTS; A Content Centric 4 Domain: each node advertises its contents! Behaviour: 1 A node can request one conent; 2 The request is forwarded to the Controller UMTS channel; 3 The controller look-up for this content within its maps. 4 If the item can be found inside the cell, it makes a path between the source and the destination node WiFi channel. 4 cfr. L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

32 Packet Format Control Packets L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

33 Packet Format Instruction Packets L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

34 Simulator Elements Simulator Main entry point: it creates the nodes of the simulated network: int id, posx, posy, mode; id=mode=0; posx=posy=77; MyNode node = new MyNode(id, posx, posy, mode); Simulator creates the Environment from an initial set of nodes: Environment env = new Environment(new ArrayList<MyNode>(){{ add(node); //... }}); Then it creates the Simulator Frame, and let nodes start their behaviour: SimFrame s = new SimFrame(); for (MyNode n : nodes){ n.start(); } L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

35 Simulator Elements Node(s) Main structure of nodes: /* Managers and executors */ MovementManager move; TransmissionManager transm; ExecutorService receiver = Executors.newCachedThreadPool(); /* Environment: is shared */ private Environment env; /* Physical Interfaces and lock objects*/ private UmtsInterface umts = new UmtsInterface(); private WiFiInterface wifi= new WiFiInterface(); private final Object lockumts = new Object(); private final Object lockwifi = new Object(); L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

36 Simulator Elements Node(s) /* Tables and related lock objects */ //Content table: Content Name -> Content Data Map<String, Content> contentstore = new HashMap<String, Content>(); private final Object lockcontent = new Object(); //Flow Table: Content Action NextHop(s) Map<String, FlowRule> flowtable = new HashMap<String, FlowRule>(); private final Object lockflow = new Object(); Start method: public void start(){ move= new MovementManager(this, mode); transm=new TransmissionManager(this, env); } L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

37 Simulator Elements Node(s) UMTS and WiFi APIs: public void umtssend(packet p){ synchronized(lockumts){ umts.send(this, p); } } public void wifisend(packet p){ synchronized (lockwifi) { wifi.send(this, p); } } L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

38 Simulator Elements Environment It acts as an Event handler. We can have two Event types: Uplink Event; Downlink Event; It is implemented with a (not yet) sophisticated Propagation Model. Thanks to this model, the Environment can dispatch Events (i.e. packets) only to the nodes that would be involved in the communication in the real world. Models: Isotropical Free space: L 1 200m Coverage Radius; d 2 ( Young model (large cities): L = G B G hb ) h 2 M M d 2 Okumura: L = log f 13.82log h t A(h r ) + ( log h t)log d By changing just the propagation model, we can develop algorhitms considering several kind of scenarios. We could even invent our model. L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

39 Controller Elements Controller Controller runs in a different process, within a different PC. It is connected with the Controller Entry Point within the simulator, to act as if it was connected to a Base Station inside a Cell of a Mobile Network. Controller sends: SETUP PACKET, INSTRUCTION PACKET; Controller receives: INFO PACKET, REQUEST PACKET. Thanks to our simple protocol, Controller is able to learn both topology of the physical network and the Content Map inside the Cell. Using these maps, controller is able to instruct nodes (in the SDN way using flows) and let nodes forward packets as requested. Forwarding and Routing are made by name and not by host. L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

40 Controller Elements Processes HelloSetupProcess Every 120 s, Controller sends a SETUP PACKET; It indicates it address, and so nodes will be aware about the presence of a Control Node. When nodes understand that there are no more controllers, they set the boolean hascontroller to false; NeighbourCalculationProcess It consists of two subprocesses: In addition to the Topology map, Controller builds also a neighbour map. This map needs to be pruned periodically. Two nodes that have been neighbours could have lost their connection. SteinerGridProcess Steiner Tree calculation; Multicast: multiple nodes can subscribe to the same content. It will reduce transmission rate. L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

41 Controller Elements Steiner Tree Problem description: N nodes; Connected by lines of minimum total length; Nodes should be connected to each other either directly or via other nodes. It may be shown that there may be points added to the tree: Steiner Points; They must have degree of 3, and angles of 120 deg. Open Source Algorhytms for Steiner Tree calculation: L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

42 Controller Elements Steiner Tree Our Steiner Tree Problem has some more constraints: Steiner points, which are not part of the original set, must be real nodes S1 and S2 should be nodes involved in communication even if they re not interested in that content. Links does have to make sense in the real world: a link between A and S1 could exist only if they are within the same coverage area otherwise, our custom steiner tree must involve other nodes as relays. L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

43 Controller Elements Steiner Tree Solution: Controller builds a steiner grid; In this matrix it stores the Nodes that currently are approximately in that range. r 200m A node can create a link with another node within a one-square distance. Approximated Steiner Tree: hop by hop, there should be a relay. L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

44 An empiric assessment L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

45 Challenging three students A simple assignment: write the SDWN controller for a sensor network imposing the following policy If the payload value is lower than x deliver the packet to node A If the payload value is higher than x deliver the packet to node B If the payload value is equal to x deliver the packet to B but avoid routes passing through C The challengers: Good Computer Engineering MSc students Two lessons about SDN and OpenFlow Good Java programming skills The rule: complete the assignment within 24 hours maximum vote (i.e., 30/30), no further exam! L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

46 Challenging three students A simple assignment: write the SDWN controller for a sensor network imposing the following policy If the payload value is lower than x deliver the packet to node A If the payload value is higher than x deliver the packet to node B If the payload value is equal to x deliver the packet to B but avoid routes passing through C The challengers: Good Computer Engineering MSc students Two lessons about SDN and OpenFlow Good Java programming skills The rule: complete the assignment within 24 hours maximum vote (i.e., 30/30), no further exam! Started on September 4, 2012 at 9.30 and...! L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

47 L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

48 Challenging three students A simple assignment: write the SDWN controller for a sensor network imposing the following policy If the payload value is lower than x deliver the packet to node A If the payload value is higher than x deliver the packet to node B If the payload value is equal to x deliver the packet to B but avoid routes passing through C The challengers: Good Computer Engineering MSc students Two lessons about SDN and OpenFlow Good Java programming skills The rule: complete the assignment within 24 hours maximum vote (i.e., 30/30), no further exam! Started on September 4, 2012 at 9.30 am and completed around 6.15 pm of the same day! L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

49 Conclusions and future work L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

50 Conclusions and future work Contributions First attempt to analyze the opportunities and challenges of SDN in LR-WPANs Definition and implementation of a prototype Future work Robustness against sink failure (multi-sink architectures?) Performance evaluation through simulation or experimentation Optimal setting of some protocol parameters (for example, size of tables, period of beacon and report generation, etc.) Implementation of a simulator of the generic nodes and interaction with a real controller Extension to the the hardware-in-the-loop simulation approach Towards a Software Defined Wireless Networking approach, using different technologies. L. Linguaglossa, S. Costanzo et al. Unbridling SDN April 30, / 47

Software Defined Wireless Networks: Unbridling SDNs

Software Defined Wireless Networks: Unbridling SDNs 2012 European Workshop on Software Defined Networking Software Defined Wireless Networks: Unbridling SDNs Salvatore Costanzo, Laura Galluccio, Giacomo Morabito, Sergio Palazzo DIEEI University of Catania

More information

Software Defined Wireless Networks (SDWNs): Unbridling SDNs

Software Defined Wireless Networks (SDWNs): Unbridling SDNs Software Defined Wireless Networks (SDWNs): Unbridling SDNs Salvatore Costanzo, Laura Galluccio, Giacomo Morabito, Sergio Palazzo Dipartimento di Ingegneria Elettrica, Elettronica, e Informatica University

More information

TinySDN: Enabling TinyOS to Software-Defined Wireless Sensor Networks

TinySDN: Enabling TinyOS to Software-Defined Wireless Sensor Networks TinySDN: Enabling TinyOS to Software-Defined Wireless Sensor Networks Bruno T. de Oliveira 1, Cíntia B. Margi 1 1 Escola Politécnica Universidade de São Paulo Departamento de Engenharia de Computação e

More information

www.mindteck.com 6LoWPAN Technical Overview

www.mindteck.com 6LoWPAN Technical Overview www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction

More information

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either

More information

Wireless Sensor Networks Chapter 3: Network architecture

Wireless Sensor Networks Chapter 3: Network architecture Wireless Sensor Networks Chapter 3: Network architecture António Grilo Courtesy: Holger Karl, UPB Goals of this chapter Having looked at the individual nodes in the previous chapter, we look at general

More information

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.

More information

An Overview of ZigBee Networks

An Overview of ZigBee Networks An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...

More information

SERVICE DISCOVERY AND MOBILITY MANAGEMENT

SERVICE DISCOVERY AND MOBILITY MANAGEMENT Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)

More information

Testing Protocols for the Internet of Things and Coexistence with Wi Fi Networks

Testing Protocols for the Internet of Things and Coexistence with Wi Fi Networks Testing Protocols for the Internet of Things and Coexistence with Wi Fi Networks Chiara Buratti, Andrea Stajkic, Danilo Abrignani Stefan Mijovic, Roberto Verdone DEI, Outline 1. EuWIn: Testing IoT Protocols

More information

Spontaneous Group Management in Mobile Ad Hoc Networks

Spontaneous Group Management in Mobile Ad Hoc Networks Wireless Networks 10, 423 438, 2004 2004 Kluwer Academic Publishers. Manufactured in The Netherlands. Spontaneous Group Management in Mobile Ad Hoc Networks LAURA GALLUCCIO, GIACOMO MORABITO and SERGIO

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

Introducing Basic MPLS Concepts

Introducing Basic MPLS Concepts Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding

More information

Demystifying Wireless for Real-World Measurement Applications

Demystifying Wireless for Real-World Measurement Applications Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,

More information

communication over wireless link handling mobile user who changes point of attachment to network

communication over wireless link handling mobile user who changes point of attachment to network Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet

More information

Wireless Software Defined Networks Ayaka Koshibe, Akash Baid and Ivan Seskar

Wireless Software Defined Networks Ayaka Koshibe, Akash Baid and Ivan Seskar Wireless Software Defined Networks Ayaka Koshibe, Akash Baid and Ivan Seskar Rutgers University 2014 Fall IAB December 12 th, 2014 Need for Inter-network Cooperation Interaction between managed wireless

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman 1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

Design Considerations for a Wireless Sensor Network Architecture Attached to a Cognitive Training System for the Elderly

Design Considerations for a Wireless Sensor Network Architecture Attached to a Cognitive Training System for the Elderly Design Considerations for a Wireless Sensor Network Architecture Attached to a Cognitive Training System for the Elderly Bruno Salgues, Jorge A. Pardiñas Mir Télécom TIC et Santé, Institut Mines Télécom,

More information

Wave Relay System and General Project Details

Wave Relay System and General Project Details Wave Relay System and General Project Details Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless bridging Emulates a wired switch over the wireless

More information

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

6LoWPAN: An Open IoT Networking Protocol

6LoWPAN: An Open IoT Networking Protocol 6LoWPAN: An Open IoT Networking Protocol OpenIoT Summit 2016 San Diego Stefan Schmidt stefan@osg.samsung.com 1 6LoWPAN: An Open IoT Networking Protocol Open: Specified by the IETF Specifications available

More information

ZigBee IP Network Performance, Part I Unicast Messaging under SEP2.0 HAN Messaging Profile

ZigBee IP Network Performance, Part I Unicast Messaging under SEP2.0 HAN Messaging Profile Document Part Number 53-301017 Rev 0.1 April 2013 ii Exegin Technologies Limited Printed in Canada The information in this document is subject to change without notice. No part of this document may be

More information

BSc (Hons.) Computer Science with Network Security. Examinations for 2011/2012 - Semester 2

BSc (Hons.) Computer Science with Network Security. Examinations for 2011/2012 - Semester 2 BSc (Hons.) Computer Science with Network Security BCNS/09/FT Examinations for 2011/2012 - Semester 2 MODULE: WIRELESS NETWORK SECURITY MODULE CODE: SECU 3105 Duration: 2 Hours 15 Minutes Reading time:

More information

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network

More information

Robust protocols for the Industrial Internet of Things

Robust protocols for the Industrial Internet of Things Robust protocols for the Industrial Internet of Things Elvis Vogli Politecnico di Bari,Telematics Lab - Dipartimento di Ingegneria Elettrica e dell Informazione Via Edoardo Orabona 4, 70125 Bari, Italy

More information

Image Transmission over IEEE 802.15.4 and ZigBee Networks

Image Transmission over IEEE 802.15.4 and ZigBee Networks MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Image Transmission over IEEE 802.15.4 and ZigBee Networks Georgiy Pekhteryev, Zafer Sahinoglu, Philip Orlik, and Ghulam Bhatti TR2005-030 May

More information

Mobile Communications

Mobile Communications October 21, 2009 Agenda Topic 2: Case Study: The GSM Network 1 GSM System General Architecture 2 GSM Access network. 3 Traffic Models for the Air interface 4 Models for the BSS design. 5 UMTS and the path

More information

Software Defined Networking (SDN) - Open Flow

Software Defined Networking (SDN) - Open Flow Software Defined Networking (SDN) - Open Flow Introduction Current Internet: egalitarian routing/delivery based on destination address, best effort. Future Internet: criteria based traffic management,

More information

Authentication and Security in IP based Multi Hop Networks

Authentication and Security in IP based Multi Hop Networks 7TH WWRF MEETING IN EINDHOVEN, THE NETHERLANDS 3RD - 4TH DECEMBER 2002 1 Authentication and Security in IP based Multi Hop Networks Frank Fitzek, Andreas Köpsel, Patrick Seeling Abstract Network security

More information

Technology White Paper Capacity Constrained Smart Grid Design

Technology White Paper Capacity Constrained Smart Grid Design Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I info@edx.com I www.edx.com Mark Chapman and Greg Leon EDX Wireless

More information

Multihop Wireless Networks

Multihop Wireless Networks Multihop Wireless Networks Ray-Guang Cheng Associate Professor Department of Electronic Engineering, National Taiwan Univ. of Science and Technology, Taipei, Taiwan Email: crg@mail.ntust.edu.tw Outline

More information

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental

More information

Open Source Network: Software-Defined Networking (SDN) and OpenFlow

Open Source Network: Software-Defined Networking (SDN) and OpenFlow Open Source Network: Software-Defined Networking (SDN) and OpenFlow Insop Song, Ericsson LinuxCon North America, Aug. 2012, San Diego CA Objectives Overview of OpenFlow Overview of Software Defined Networking

More information

Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012

Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012 Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012 Background While IP protocols are widely spread over broadband wireline and wireless communication means, transferring

More information

Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City

Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City A. Lavric 1, V. Popa 2 PhD.,Computers, Department of Electronics and Automation,

More information

The Wireless Network Road Trip

The Wireless Network Road Trip The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in

More information

Networking issues for the Internet of Things

Networking issues for the Internet of Things Networking issues for the Internet of Things Giacomo Morabito University of Catania 2015 IEEE SPS Italy Chapter Summer School on Signal Processing Acknowledgements The following are the results of the

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

CS335 Sample Questions for Exam #2

CS335 Sample Questions for Exam #2 CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to

More information

An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture

An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture 435 An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture Balamurugan.V School of Computing Science and Engineering, VIT University Chennai Campus, 600127, Tamilnadu, India. Abstract

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

About the Authors Preface Acknowledgements List of Acronyms

About the Authors Preface Acknowledgements List of Acronyms Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security

More information

IMPLEMENTATION AND EVALUATION OF THE MOBILITYFIRST PROTOCOL STACK ON SOFTWARE-DEFINED NETWORK PLATFORMS

IMPLEMENTATION AND EVALUATION OF THE MOBILITYFIRST PROTOCOL STACK ON SOFTWARE-DEFINED NETWORK PLATFORMS IMPLEMENTATION AND EVALUATION OF THE MOBILITYFIRST PROTOCOL STACK ON SOFTWARE-DEFINED NETWORK PLATFORMS BY ARAVIND KRISHNAMOORTHY A thesis submitted to the Graduate School New Brunswick Rutgers, The State

More information

Internet of #allthethings

Internet of #allthethings Internet of #allthethings GNURadio for IEEE 802.15.4 Networking Christopher Friedt Principle Embedded Firmware Engineer chris@mmbnetworks.com chrisfriedt@gmail.com code available at http://github.com/cfriedt

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Dr Cecilia Mascolo About Me In this course The course will include aspects related to general understanding of Mobile and ubiquitous

More information

APPLICATION NOTE. AVR2130: Lightweight Mesh Developer Guide. Atmel MCU Wireless. Features. Description

APPLICATION NOTE. AVR2130: Lightweight Mesh Developer Guide. Atmel MCU Wireless. Features. Description APPLICATION NOTE AVR2130: Lightweight Mesh Developer Guide Atmel MCU Wireless Features Atmel Lightweight Mesh stack specification and APIs Lightweight Mesh Software Development Kit (SDK) Description This

More information

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0 LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does

More information

Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things

Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Johanna Nieminen (Nokia), Future Internet SHOK preconference 30.05.2012 IoT Taxonomy ZigBee 802.5.4 Bluetooth Video RFID

More information

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks 1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166

More information

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257 Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy

More information

A Fuzzy Logic-Based Information Security Management for Software-Defined Networks

A Fuzzy Logic-Based Information Security Management for Software-Defined Networks A Fuzzy Logic-Based Information Security Management for Software-Defined Networks Sergei Dotcenko *, Andrei Vladyko *, Ivan Letenko * * The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

10. Wireless Networks

10. Wireless Networks Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

SDN and Data Center Networks

SDN and Data Center Networks SDN and Data Center Networks 10/9/2013 1 The Rise of SDN The Current Internet and Ethernet Network Technology is based on Autonomous Principle to form a Robust and Fault Tolerant Global Network (Distributed)

More information

Wireless Sensor Network: Challenges, Issues and Research

Wireless Sensor Network: Challenges, Issues and Research ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues

More information

LIST OF FIGURES. Figure No. Caption Page No.

LIST OF FIGURES. Figure No. Caption Page No. LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS

More information

Rapid Prototyping of a Frequency Hopping Ad Hoc Network System

Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Martin Braun, Nico Otterbach, Jens Elsner, and Friedrich K. Jondral Communications Engineering Lab, Karlsruhe Institute of Technology (KIT),

More information

INTERNET OF THINGS 1

INTERNET OF THINGS 1 INTERNET OF THINGS 1 OUTLINE Introduction to IoT Technologies Ubiquitous Network Network Management Technologies RFID WSN Embedded Nanotechnology IPv6 UPnP SNMP Challenging Problems Conclusions and Future

More information

AN1066. MiWi Wireless Networking Protocol Stack CONSIDERATIONS INTRODUCTION TERMINOLOGY FEATURES

AN1066. MiWi Wireless Networking Protocol Stack CONSIDERATIONS INTRODUCTION TERMINOLOGY FEATURES MiWi Wireless Networking Protocol Stack Author: INTRODUCTION Implementing applications with wireless networking is becoming commonplace. From consumer devices to industrial applications, there is a growing

More information

Towards an Internet of Things: Android meets NFC. Dipartimento di Scienze dell Informazione Università di Bologna

Towards an Internet of Things: Android meets NFC. Dipartimento di Scienze dell Informazione Università di Bologna Towards an Internet of Things: Android meets NFC Luca Bedogni Marco Di Felice Dipartimento di Scienze dell Informazione Università di Bologna Outline Internet of Things: History Internet of Things: Definition

More information

Disruption Tolerant Networks and its relevance to IOT/M2M. Extensible NMS Support for DTN Mesh Networks + Applications

Disruption Tolerant Networks and its relevance to IOT/M2M. Extensible NMS Support for DTN Mesh Networks + Applications Disruption Tolerant Networks and its relevance to IOT/M2M Extensible NMS Support for DTN Mesh Networks + Applications MAC80211+OpenWRT Framework for Proprietary Devices Representative SBC computers with

More information

MetroNet6 - Homeland Security IPv6 R&D over Wireless

MetroNet6 - Homeland Security IPv6 R&D over Wireless MetroNet6 - Homeland Security IPv6 R&D over Wireless By: George Usi, President, Sacramento Technology Group and Project Manager, California IPv6 Task Force gusi@sactechgroup.com Acknowledgement Reference:

More information

Disaster-Resilient Backbone and Access Networks

Disaster-Resilient Backbone and Access Networks The Workshop on Establishing Resilient Life-Space in the Cyber-Physical Integrated Society, March. 17, 2015, Sendai, Japan Disaster-Resilient Backbone and Access Networks Shigeki Yamada (shigeki@nii.ac.jp)

More information

SSVVP SIP School VVoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that

More information

Wireless Sensor Networks Database: Data Management and Implementation

Wireless Sensor Networks Database: Data Management and Implementation Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Wireless Sensor Networks Database: Data Management and Implementation Ping Liu Computer and Information Engineering Institute,

More information

Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network

Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network Ms.Hetal Surti PG Student, Electronics & Communication PIT, Vadodara E-mail Id:surtihetal99@gmail.com Mr.Ketan

More information

Application Note Gigabit Ethernet Port Modes

Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Table of Contents Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 7

More information

CS 91: Cloud Systems & Datacenter Networks Networks Background

CS 91: Cloud Systems & Datacenter Networks Networks Background CS 91: Cloud Systems & Datacenter Networks Networks Background Walrus / Bucket Agenda Overview of tradibonal network topologies IntroducBon to soeware- defined networks Layering and terminology Topology

More information

Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview

Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview 2114 West 7 th Street Tempe, AZ 85281 USA Voice +1.480.333.2200 E-mail sales@comtechefdata.com Web www.comtechefdata.com Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview January 2014 2014

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Wireless Mesh Networks under FreeBSD

Wireless Mesh Networks under FreeBSD Wireless Networks under FreeBSD Rui Paulo rpaulo@freebsd.org The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much

More information

VoIP-Kapazität im Relay erweiterten IEEE 802.16 System

VoIP-Kapazität im Relay erweiterten IEEE 802.16 System VoIP-Kapazität im Relay erweiterten IEEE 802.16 System 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Karsten Klagges ComNets Research Group RWTH Aachen University 16. März 2012 Karsten Klagges

More information

Reliability Trade-off Analysis of Deadline-Sensitive Wireless Messaging Systems

Reliability Trade-off Analysis of Deadline-Sensitive Wireless Messaging Systems Reliability Trade-off Analysis of Deadline-Sensitive Wireless Messaging Systems Debessay Fesehaye, Shameem Ahmed,Thadpong Pongthawornkamol, Klara Nahrstedt and Guijun Wang Dept. of Computer Science, University

More information

A Transport Protocol for Multimedia Wireless Sensor Networks

A Transport Protocol for Multimedia Wireless Sensor Networks A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless

More information

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks

More information

Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday

Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Lecture 14: Data transfer in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Data transfer over multiple wireless hops Many applications: TCP flow from a wireless node

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

Thingsquare Technology

Thingsquare Technology Thingsquare Technology Thingsquare connects smartphone apps with things such as thermostats, light bulbs, and street lights. The devices have a programmable wireless chip that runs the Thingsquare firmware.

More information

Using IPv6 and 6LoWPAN for Home Automation Networks

Using IPv6 and 6LoWPAN for Home Automation Networks Using IPv6 and 6LoWPAN for Home Automation Networks Thomas Scheffler / Bernd Dörge ICCE-Berlin Berlin, 06.09.2011 Overview IPv6 and 6LoWPAN for Home Automation Networks 6LoWPAN Application & Network Architecture

More information

The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications

The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications Joshua Ellul jellul@imperial.ac.uk Overview Brief introduction to Body Sensor Networks BSN Hardware

More information

Adoption of SDN: Progress Update

Adoption of SDN: Progress Update Adoption of SDN: Progress Update Stuart Elby VP, Network Architecture & Technology 17 April 2012 Services Migration to the Cloud Service intelligence distributed across dedicated network elements Opportunity:

More information

A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed

A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed Dmitrii Dugaev, Eduard Siemens Anhalt University of Applied Sciences - Faculty of Electrical,

More information

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually

More information

a new sdn-based control plane architecture for 5G

a new sdn-based control plane architecture for 5G a new sdn-based control plane architecture for 5G With a Case Study on Connectivity Management m. outline what is sdn? 5G proposed control plane connectivity control software-defined networking The needs

More information

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights

More information

IP Multicasting. Applications with multiple receivers

IP Multicasting. Applications with multiple receivers IP Multicasting Relates to Lab 10. It covers IP multicasting, including multicast addressing, IGMP, and multicast routing. 1 Applications with multiple receivers Many applications transmit the same data

More information

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved. MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead

More information

LoRa FAQs. www.semtech.com 1 of 4 Semtech. Semtech Corporation LoRa FAQ

LoRa FAQs. www.semtech.com 1 of 4 Semtech. Semtech Corporation LoRa FAQ LoRa FAQs 1.) What is LoRa Modulation? LoRa (Long Range) is a modulation technique that provides significantly longer range than competing technologies. The modulation is based on spread-spectrum techniques

More information

DEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING

DEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING DEMYSTIFYING ROUTING SERVICES IN STWAREDEFINED NETWORKING GAUTAM KHETRAPAL Engineering Project Manager, Aricent SAURABH KUMAR SHARMA Principal Systems Engineer, Technology, Aricent DEMYSTIFYING ROUTING

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

MPLS Concepts. Overview. Objectives

MPLS Concepts. Overview. Objectives MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label

More information