A Transport Protocol for Multimedia Wireless Sensor Networks
|
|
- Myles Vincent Benson
- 8 years ago
- Views:
Transcription
1 A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless Sensor Networks Typically a high number of autonomous nodes with sensors and RF communications. Cooperate in a common task retrieving sensor data such as: temperature, humidity, light, image, video, etc. Data is normally forwarded wirelessly to a sink node Used in surveillance and security, industrial process control, military applications, domotics, monitoring, etc. Other networks Mobile devices 2 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks
2 Motivation Protection of critical infrastructures, namely electrical energy distribution infrastructures Multimedia data from cameras is routed multi-hop to the sink WSN advantages: ease of installation, configuration, flexibility, low power TCP: end-to-end, loss assumed as congestion, RTT delays New transport protocol tailored for WSN: DTSN. 3 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Objectives Transport protocol for WSN with the following characteristics: Adapted to embedded systems Battery operated Runs on Linux Support reliability Optimize multimedia data transfers, particularly real-time video Support several simultaneous applications Support security mechanisms Ease of use through an API 4 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks
3 Transport Protocols for WSN Purpose: Reliability Guarantee and/or Congestion Control Several different characteristics and mechanisms: upstream/downstream communication Loss feedback through: ACK, NACK, iack Lost segment detection: sequence number continuity or timers for each segment end-to-end or hop-by-hop recovery Two types of target applications: sending events or sending large data volumes 5 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks DTSN Sessions identified by a Session Number, Application ID, source and destination addresses Feedback when requested by the source through an Explicit Acknowledgement Request (EAR) Losses detected through the sequence number continuity Selective Repeat retransmission hopby-hop: intermediate nodes cache packets t EAR Timeout Flow Control Timeout Node 1 Node 2 Node 3 DATA 0 DATA 1 DATA 2 DATA 3 DATA 4 DATA 5 DATA 6 DATA 7 + EAR DATA 8 DATA 9 DATA 10 DATA 11 DATA 12 DATA 13 DATA 14 DATA 15 + EAR EAR 15 DATA 0 DATA 1 DATA 8 DATA 15 EAR 15 DATA 16 DATA 17 DATA 18 DATA 19 DATA 20 DATA 21 NACK 0, <0,1,8,15> NACK 7, <> DATA 2 DATA 3 DATA 4 DATA 5 DATA 6 DATA 7 + EAR DATA 9 DATA 10 DATA 11 DATA 12 DATA 13 DATA 14 EAR 15 DATA 0 DATA 1 DATA 8 DATA 15 EAR 15 6 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks NACK 0, <0,1,2> NACK 0, <0,1,2,8,9,15> NACK 7, <8,12> DATA 3 DATA 4 DATA 5 DATA 6 DATA 7 + EAR DATA 3 DATA 10 DATA 11 DATA 12 DATA 13 DATA 14 EAR 15 DATA 10 DATA 12 DATA 2 DATA 9 DATA 2 DATA 9 DATA 0 DATA 1 DATA 15 EAR 15 DATA 10 DATA 8 DATA 12 DATA 8 DATA 12 DATA 16 DATA 17 DATA 18 DATA 19 DATA 16 DATA 17 DATA 18 DATA 19 NACK 0, <0,1,2,3> NACK 0, <0,1,2,8,9,10,12,15> NACK 7, <8,10,12> Node 4
4 Probabilistic Model Expected number of links crossed: Success probability: Expected number of transmissions per packet: Generalized formulas for different losses in each link: 7 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Probabilistic model 2 Expected number of transmissions when packets are cached with 50% probability: 8 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks
5 Development Platform The protocol is generic: can work over several wireless technologies and hardware The Silex SX-560 was used. Supports Wi-Fi a/b/g. 200 MHz 32-bit ARM processor 16 MB RAM 8MB Flash Runs Linux 792 mw average power 49.6 x 34.3 x 9.65 mm Developer s daughtercard with USB, serial, SPI, GPIO, Ethernet, power 9 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks General Architecture DTSN implemented as a single daemon process for all node types: source, receiver and intermediate nodes. Clients use the protocol through a library that connects to the daemon through UNIX sockets Several configuration parameters may be adjusted in a configuration file 10 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks
6 API Dynamic library Interface similar to the Unix sockets interface Simple operation, with most work done centrally in the daemon The application can receive asynchronous events Threads, blocking and exclusive access implemented through the pthread library 11 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks DTSN Sessions 1 Header present in all packets: Bit Flag 0 ACK 1 NACK 2 EAR 3 DATA 4 RESEND 5 ENDSESSION 6 (not used 7 (not used) Soft unidirectional sessions, identified by <App ID, Session No, Src Addr, Dest Addr>. No connection establishment: the applications just creates the session and start sending packets A complete session description is maintained with buffers, timers, ID, mode, etc. The session can be kept internally after being closed by the application 12 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks
7 359 DTSN Sessions 2 Sliding windows mapped into circular buffers Both windows synchronized. Simple flow control by limiting the number of unconfirmed packets sender receiver Aplication Aplication DTSN 360 DTSN Where the next segment will be placed Last segment received Oldest unconfirmed segment Last segment sent Next segment to be read by the application Next expected segment 13 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Cache Intermediate nodes participate in packet recovery Space uniformly divided through existing sessions Packets kept in linked lists FIFO for each session Other caching policies for future work Packets eliminated with ACK/NACK/ENDSESSION received if security is not used 14 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks
8 Timers There are 5 timers with different periods and purposes. There is always a single one active at each time for each session. sender receiver Activity Timeout: used when the sender window is not empty or full, and no new data is received from the application, to trigger sending an EAR. EAR Timeout: used when an EAR was sent and the sender is waiting for a NACK/ACK. Wait Timeout: used when the sender window is empty to destroy a session without activity. Flow control Timeout: Active when the sender window is full Receiver Activity Timeout: only timer used by the receiver, restarted every time a packet is received from the source. 15 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Security 1 Most WSN protocols ignore the security issues, assuming it is assured by lower layers (e.g. MAC). This may be energetically inefficient, as only some (important) packets require security Attacks possible by packet replication or injection Purpose: denial of service, data manipulation, reduce node lifetime Security requires some overhead, increasing energy spent Security is optional: the application decides The DTSN security extension uses symmetric cryptographic functions (HMAC based on the SHA-2 hash function). 16 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks
9 Security 2 Message Integrity Code (MIC) and key computation: ACK master key AppId per packet ACK key n <packet contents> masterkey HMAC HMAC ACK master key NACK master key HMAC HMAC K (n) ACK K (n) NACK HMAC HMAC MIC ACK (n) MIC NACK (n) NACK master key AppId per packet NACK key n <packet contents> Packet format: 17 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Multimedia M-DTSN functionality implemented, allows restarting a session. The following actions are performed: Discard all packets in the sender window and change the session nr. Intermediate nodes also discard cached packets The receiver eliminates data from the window and notifies the application A new session is implicitly started without additional overhead The idea is to give up on sending data from a frame after a temporal limit set by the application. 18 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks
10 Simulation A module to simulate a sensor network over a LAN was developed Routing is made based on DTSN addresses Arbitrary bit error rates can be configured A 1.95 MB file was transmitted over 7 hops 5 situations tested: 512 bytes payload with and without cache 512, 350 and 200 bytes payload with security and cache Single hop between a PC and a Silex to measure throughput 19 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Results 1 20 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks
11 Results 2 Comparing the 5 tested scenarios: NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Results 3 22 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks
12 Results MB file transfer over a 10Mbps Ethernet 1 hop, no link errors Performance results: PC Silex Silex PC DTSN s (1.51 Mbps) 8.03 s (1.94 Mbps) DTSN with security s (1.42 Mbps) 8.22 s (1.90 Mbps) DTSN without delivery to application on Silex 4.69 s (3.33 Mbps) 8.03 s (1.94 Mbps) TFTP (UDP) 12.0 s (1.30 Mbps) 79.9 s (0.20 Mbps) FTP (TCP) 3.00 s (5.20 Mbps) 5.17 s (3.02 Mbps) High overhead in the communication between the protocol and application The security option impact on performance is not significant 23 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Results 5 Optimized version performance results: PC -> PC (Fast Ethernet) [Mbps] PC -> Silex (802.11b) [Mbps] Silex -> PC (802.11b) [Mbps] Silex -> Silex (802.11b) [Mbps] DTSN DTSN with security FTP TFTP Much better performance Silex CPU performance is a limitation 24 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks
13 Conclusion A transport protocol for real-time streaming in WMSN was successfully implemented and tested. Tests prove the correct operation and show that DTSN is efficient in reducing the number of transmissions in WMSN, thus saving energy. Future work: Dynamic parameters, such as timeouts, window and cache sizes New caching policies, for instance by storing packets with probability less than 1, according to the distance to destination, etc. raw sockets BeagleBoard 25 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks 26 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationNames & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding
Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)
More informationTCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationComputer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationTiny Web Services: Design and Implementation of Interoperable and Evolvable Sensor Networks (Priyantha, Kansal, Goraczko, Zhao, 2008)
Tiny Web Services: Design and Implementation of Interoperable and Evolvable Sensor Networks (Priyantha, Kansal, Goraczko, Zhao, 2008) Dominique Im Obersteg Distributed Systems Seminar 2011, ETH Zurich
More informationMobile Computing/ Mobile Networks
Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple
More informationICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A
More informationA Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied
More informationAccess Control: Firewalls (1)
Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception
More informationNetwork-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2
Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation
More informationBased on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
More informationFigure 1.Block diagram of inventory management system using Proximity sensors.
Volume 1, Special Issue, March 2015 Impact Factor: 1036, Science Central Value: 2654 Inventory Management System Using Proximity ensors 1)Jyoti KMuluk 2)Pallavi H Shinde3) Shashank VShinde 4)Prof VRYadav
More informationA Secure Distributed Transport Protocol for Wireless Sensor Networks
A Secure Distributed Transport Protocol for Wireless Sensor Networks Levente Buttyan Laboratory of Cryptography and System Security (CrySyS) Budapest University of Techlogy and Ecomics, Hungary http://www.crysys.hu/
More informationCOMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination
COMP 361 Computer Communications Networks Fall Semester 2003 Midterm Examination Date: October 23, 2003, Time 18:30pm --19:50pm Name: Student ID: Email: Instructions: 1. This is a closed book exam 2. This
More informationWhat is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.
What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir noubir@ccs.neu.edu CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms
More informationQuestion: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
More informationDistributed Systems 3. Network Quality of Service (QoS)
Distributed Systems 3. Network Quality of Service (QoS) Paul Krzyzanowski pxk@cs.rutgers.edu 1 What factors matter for network performance? Bandwidth (bit rate) Average number of bits per second through
More informationEINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
More informationEasy H.264 video streaming with Freescale's i.mx27 and Linux
Libre Software Meeting 2009 Easy H.264 video streaming with Freescale's i.mx27 and Linux July 8th 2009 LSM, Nantes: Easy H.264 video streaming with i.mx27 and Linux 1 Presentation plan 1) i.mx27 & H.264
More informationApplication Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade
Application Note Windows 2000/XP TCP Tuning for High Bandwidth Networks mguard smart mguard PCI mguard blade mguard industrial mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489
More informationCommunication Systems Internetworking (Bridges & Co)
Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: wolf@ibr.cs.tu-bs.de
More informationImproving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
More informationHigh-Level Data Link Control
High-Level Data Link Control This class of data link layer protocols includes High-level Data Link Control (HDLC), Link Access Procedure Balanced (LAPB) for X.25, Link Access Procedure for D-channel (LAPD)
More informationLecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)
Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including
More informationRT-QoS for Wireless ad-hoc Networks of Embedded Systems
RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results
More informationSPI I2C LIN Ethernet. u Today: Wired embedded networks. u Next lecture: CAN bus u Then: 802.15.4 wireless embedded network
u Today: Wired embedded networks Ø Characteristics and requirements Ø Some embedded LANs SPI I2C LIN Ethernet u Next lecture: CAN bus u Then: 802.15.4 wireless embedded network Network from a High End
More informationMeasure wireless network performance using testing tool iperf
Measure wireless network performance using testing tool iperf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability,
More informationTCP for Wireless Networks
TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted
More informationRF Monitor and its Uses
RF Monitor and its Uses Pradipta De prade@cs.sunysb.edu Outline RF Monitoring Basics RF Monitoring Installation Using RF Monitoring RF Monitoring on WRT54GS Extending RF Monitoring UDP Lite Comments on
More informationCSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013
CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60
More informationNetwork Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
More informationFirst Midterm for ECE374 03/09/12 Solution!!
1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
More informationCSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture
Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote
More informationTransport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
More informationAd hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service
Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service António Grilo Courtesy: Holger Karl, UPB Overview Dependability requirements Delivering single packets Delivering blocks of
More informationAN1066. MiWi Wireless Networking Protocol Stack CONSIDERATIONS INTRODUCTION TERMINOLOGY FEATURES
MiWi Wireless Networking Protocol Stack Author: INTRODUCTION Implementing applications with wireless networking is becoming commonplace. From consumer devices to industrial applications, there is a growing
More informationInternet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
More informationStrategies. Addressing and Routing
Strategies Circuit switching: carry bit streams original telephone network Packet switching: store-and-forward messages Internet Spring 2007 CSE 30264 14 Addressing and Routing Address: byte-string that
More informationBasic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
More informationFrequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
More informationIP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
More informationIntroduction VOIP in an 802.11 Network VOIP 3
Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11
More informationWireless Sensor Networks Chapter 3: Network architecture
Wireless Sensor Networks Chapter 3: Network architecture António Grilo Courtesy: Holger Karl, UPB Goals of this chapter Having looked at the individual nodes in the previous chapter, we look at general
More informationAPPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
More informationHow To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
More informationAdvanced Computer Networks Project 2: File Transfer Application
1 Overview Advanced Computer Networks Project 2: File Transfer Application Assigned: April 25, 2014 Due: May 30, 2014 In this assignment, you will implement a file transfer application. The application
More informationUPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
More informationThe OSI & Internet layering models
CSE 123 Computer Networks Fall 2009 Lecture 2: Protocols & Layering Today What s a protocol? Organizing protocols via layering Encoding layers in packets The OSI & Internet layering models The end-to-end
More informationPerformance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More informationNetwork layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "
1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! Network layer" goals: "! understand principles behind layer services:" " layer service models" " forwarding versus routing" " how a
More informationTransport Layer. Chapter 3.4. Think about
Chapter 3.4 La 4 Transport La 1 Think about 2 How do MAC addresses differ from that of the network la? What is flat and what is hierarchical addressing? Who defines the IP Address of a device? What is
More informationIP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
More informationDisfer. Sink - Sensor Connectivity and Sensor Android Application. Protocol implementation: Charilaos Stais (stais AT aueb.gr)
Disfer Sink - Sensor Connectivity and Sensor Android Application Protocol implementation: Charilaos Stais (stais AT aueb.gr) Android development: Dimitri Balerinas (dimi.balerinas AT gmail.com) Supervised
More informationNetworking Overview. (as usual, thanks to Dave Wagner and Vern Paxson)
Networking Overview (as usual, thanks to Dave Wagner and Vern Paxson) Focus For This Lecture Sufficient background in networking to then explore security issues in next few lectures Networking = the Internet
More information15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs
15 th TF-Mobility Meeting Sensor Networks Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs Overview 2 Ubiquitous Computing > Vision defined by Mark Weiser in 1991 Seamless integration
More informationHow To Design A Layered Network In A Computer Network
A Layered Approach to Computer Networks Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Different layer of abstraction Different error control
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More informationProtocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
More informationLecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
More informationPrefix AggregaNon. Company X and Company Y connect to the same ISP, and they are assigned the prefixes:
Data Transfer Consider transferring an enormous file of L bytes from Host A to B using a MSS of 1460 bytes and a 66 byte header. What is the maximum value of L such that TCP sequence numbers are not exhausted?
More informationData Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions
More informationCSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
More informationOverview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
More informationService and Resource Discovery in Smart Spaces Composed of Low Capacity Devices
Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationGlobus Striped GridFTP Framework and Server. Raj Kettimuthu, ANL and U. Chicago
Globus Striped GridFTP Framework and Server Raj Kettimuthu, ANL and U. Chicago Outline Introduction Features Motivation Architecture Globus XIO Experimental Results 3 August 2005 The Ohio State University
More informationInternet Packets. Forwarding Datagrams
Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed
More informationDynamic Source Routing in Ad Hoc Wireless Networks
Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 dbj@cs.cmu.edu Abstract
More informationNetwork Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
More informationProtocol Security Where?
IPsec: AH and ESP 1 Protocol Security Where? Application layer: (+) easy access to user credentials, extend without waiting for OS vendor, understand data; (-) design again and again; e.g., PGP, ssh, Kerberos
More informationIP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
More informationNetwork Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
More informationComputer Networks. Data Link Layer
Computer Networks The Data Link Layer 1 Data Link Layer Application Transport Network DLL PHY 2 What does it do? What functions it performs? Typically: Handling transmission errors, a.k.a., error control.
More informationEffect of Packet-Size over Network Performance
International Journal of Electronics and Computer Science Engineering 762 Available Online at www.ijecse.org ISSN: 2277-1956 Effect of Packet-Size over Network Performance Abhi U. Shah 1, Daivik H. Bhatt
More informationThe BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications
The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications Joshua Ellul jellul@imperial.ac.uk Overview Brief introduction to Body Sensor Networks BSN Hardware
More informationOutline. TCP connection setup/data transfer. 15-441 Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics
Outline 15-441 Computer Networking Lecture 8 TCP & Congestion Control TCP connection setup/data transfer TCP Reliability Congestion sources and collapse Congestion control basics Lecture 8: 09-23-2002
More informationComputer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
More information[Prof. Rupesh G Vaishnav] Page 1
Basics The function of transport layer is to provide a reliable end-to-end communications service. It also provides data transfer service for the user layers above and shield the upper layers from the
More informationTCP Offload Engines. As network interconnect speeds advance to Gigabit. Introduction to
Introduction to TCP Offload Engines By implementing a TCP Offload Engine (TOE) in high-speed computing environments, administrators can help relieve network bottlenecks and improve application performance.
More informationLecture 8 Performance Measurements and Metrics. Performance Metrics. Outline. Performance Metrics. Performance Metrics Performance Measurements
Outline Lecture 8 Performance Measurements and Metrics Performance Metrics Performance Measurements Kurose-Ross: 1.2-1.4 (Hassan-Jain: Chapter 3 Performance Measurement of TCP/IP Networks ) 2010-02-17
More informationThis sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio).
Client App Network Server App 25-May-13 15:32 (Page 1) This sequence diagram was generated with EventStudio System Designer (http://www.eventhelix.com/eventstudio). TCP is an end to end protocol which
More informationTCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the
More informationProtocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
More informationComputer Networks - Xarxes de Computadors
Computer Networks - Xarxes de Computadors Teacher: Llorenç Cerdà Slides: http://studies.ac.upc.edu/fib/grau/xc Outline Course Syllabus Unit 2. IP Networks Unit 3. TCP Unit 4. LANs Unit 5. Network applications
More informationWe will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
More informationLecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage
Lecture 15: Congestion Control CSE 123: Computer Networks Stefan Savage Overview Yesterday: TCP & UDP overview Connection setup Flow control: resource exhaustion at end node Today: Congestion control Resource
More informationUG103.5 EMBER APPLICATION DEVELOPMENT FUNDAMENTALS: SECURITY
EMBER APPLICATION DEVELOPMENT FUNDAMENTALS: SECURITY This document introduces some basic security concepts, including network layer security, trust centers, and application support layer security features.
More informationTopics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components
Topics Use of networks Network structure Implementation of networks Computer Networks Introduction Let s Get Started! Networking today: Where are they? Powerful computers are cheap Networks are everywhere
More informationThe Problem with TCP. Overcoming TCP s Drawbacks
White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,
More informationHow To Understand The Internet Of S (Netware)
Summer Workshop on Cyber Security Computer s Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University August 12-16, 2013 Supported by National Science Foundation
More informationWhat is LOG Storm and what is it useful for?
What is LOG Storm and what is it useful for? LOG Storm is a high-speed digital data logger used for recording and analyzing the activity from embedded electronic systems digital bus and data lines. It
More informationwww.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
More informationTCP in Wireless Mobile Networks
TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer
More informationFirewall Implementation
CS425: Computer Networks Firewall Implementation Ankit Kumar Y8088 Akshay Mittal Y8056 Ashish Gupta Y8410 Sayandeep Ghosh Y8465 October 31, 2010 under the guidance of Prof. Dheeraj Sanghi Department of
More information2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
More information