Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices
|
|
|
- Jeffrey Nichols
- 10 years ago
- Views:
Transcription
1 Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer Science Eindhoven University of Technology
2 Outline duction and Problem Description Proposed Solution Experimental Results Conclusions and
3 Smart Spaces Smart Space: a (living) space with embedded technology... regular CE & computing devices smart nodes: sensing, actuating, communicating, computing...that is networked... wireless, mostly...designed to collaborate and share to interact with / serve users... maximum autonomous operation provide services with minimal user effort... and the electronics these users carry e.g. body sensor networks, personal electronics
4 Low Capacity Devices Sample specifications: CPU: 1-25 MHz clock frequency 1-10 kilobytes of RAM / kilobytes of programmable ROM Communication device: Frequency band 433 MHz 2.4 Ghz Ah for an AA size battery perhaps much smaller even sensors, actuators Example: Wireless Sensor Network networks of cheap and intelligent sensors. Representative of low-capacity device class Naturally pervasive: automatic operation, seamless integration, collaboration but: little energy and: small packet sizes, bit rates
5 Smart Space Architectures Many SS architectures are heavy-weight! layered architectural design for the sake of abstraction (suboptimal) messaging overheads, increased energy usage. State-of-the-art frameworks (e.g. OSGi, NoTA-M3) have high resource requirements. Execution platform, message (xml) size and interpretation overhead Implicit assumption: SS network is composed of relatively high capacity nodes (e.g. laptop computers, mobile phones, PDAs). Unusable directly with low capacity nodes (e.g. WSN nodes) energy, computational power, network bandwidth limitations. needs gateways/proxies configuration overhead, reliability latencies
6 Fundamental requirements Smart Space requirements programmable and configurable wished behavior can be imposed sharing of services by concurrent (distributed) applications separation of coordination and service separate application logic from device functions integration with the regular IP infra structure Basic functionalities provided by nodes to the network Code load to define services, configuration Discovery - detection of nodes, services, resources Service/Resource Monitoring & Management Service composition/coordination by third party Lightweight architecture: how to provide this with low-capacity nodes? This work focuses on example of service/resource discovery and monitoring: Node is discovered (registered to the system) Node is monitored (report introspection information)
7 Outline duction and Problem Description Proposed Solution Experimental Results Conclusions and
8 Baseline Architecture: OSAS Framework Open Service Architecture for Sensors (OSAS) language, to program the entire network ( macroprogramming ) with concepts of a service, eventing and subscription and content-based addressing runtime system contains virtual machine (byte code) has access to a set of system calls (OS-provided functions) message format Four components Compiler Loader Runtime system Simulator runs same runtime system Gateway
9 OSAS Framework: Programming Model Nodes run services: A service has event generators and event handlers. A link between a generator and a handler is called a subscription. Interaction between services by a asynchronous remote procedure call upon firing of the event or simply as part of a handler Supported by WASP Service Composition Language (WaSCoL) Specification of services with event-condition-action rules Composition of services (i.e. subscriptions) Use content-based addressing to associate node with service Programs can be developed and loaded incrementally
10 Run-time organization 15-Feb-10 10
11 Connection by subscriptions subscription, defines sampling rate and remote handler to call 15-Feb-10 11
12 OSAS Framework: Messaging and Communication Communication: SendToSubscribers(), in case event fires Send() i.e. arpc in local neighbordhood Two implicit routing methods: Flooding, to transmit installation messages Point-to-point: route is setup via a subscription application-level routing Message format asynchronous remote procedure call Header; (Handler, arguments) series can be bound to MAC, or other carriers (e.g. UDP)
13 Example: Smart Space Management Given: a network running an OSAS application A resource manager (RM, special node) wants to know which nodes exist which services these run and subscriptions they have which resources are available on these nodes memory, battery,... RM may make this information available again as a service, or use it for taking mapping decisions 15-Feb-10 13
14 Smart Space Management Architecture
15 Service/Resource Monitoring: Reporting Intervals & Triggers
16 Implementation Management functionality is implemented as (part of) an OSAS application Node discovery: RM regularly subscribes to a heartbeat service of all nodes (in fact: advertises itself in this way) result: RM receives regular heartbeat indicating nodes presence first is used to register node Path reconstruction due to mobility Regular subscription solves this RM may subscribe to specific node after some heartbeat misses or just reconstruct the route ( setroute ) Service & resource discovery: part of heartbeat response message frequency of resource reporting and service reporting as extra parameter of subscription, or as additional subscriptions RM may inject those services itself 15-Feb-10 16
17 Service Discovery & path maintenance - Periodic advertisement - Conditional route reconstruction
18 Outline Proposed Solution duction and Problem Description Proposed Solution Experimental Results Conclusions and Experimental Results
19 Example Scenario Example scenario with the following parameters: Parameter Value Proposed Solution HeartBeat Period Timeout Period Route Fix Trigger 1 second 6 seconds 3 seconds to timeout Experimental Results Max. Route Fix Frequency Refresh Registry Period Advertisement Period LowFrequencySubscription Period HighFrequencySubscription Period Triggering Conditions Check/Response Period every 3 seconds 1 second 10 seconds 60 minutes 30 seconds 1 second
20 Example Scenario: Messaging Calculations Proposed Solution Sent Messages Received Messages HeartBeat: 60 Advertisement: 6 Report Resources: 2 Resource Report Subscription: 2 Report Services: 1/60 Services Report Subscription: 1/60 Report Subscriptions: 1/60 Subscriptions Report Subscription: 1/60 Total: ~ 62 Total: ~ 8 Experimental Results Message Count of Regular Interval Messages (per minute) Sent Messages Received Messages Node Entry 3 3 Set Route 1 1 Node Departure 1 1 Service Mapping 2 2 Message Count of Triggering Conditions Messages (per occasion)
21 Deployment on Physical Nodes Proposed Solution Experimental Results ROM (in bytes) RAM (in bytes) TinyOS (w/o OSAS) TinyOS (w/ OSAS) Footprint of TinyOS and OSAS Service Size (in bytes) HeartBeatService 28 (14 ROM + 14 RAM) ReportServicesService 30 (16 ROM + 14 RAM) ReportResourcesService 30 (16 ROM + 14 RAM) ReportSubscriptionsService 30 (16 ROM + 14 RAM) Total 118 (62 ROM + 56 RAM) Footprint of Smart Space Application
22 Deployment on Physical Nodes Proposed Solution Experimental Results Message header size: MAC protocol (10 bytes) OSAS messaging protocol (5 bytes) Message payload sizes (assuming 8-bit encoding): Message HeartBeat Report 2 HeartBeat Subscription 17 Services Report Resources Report Subscriptions Report Services Report Subscription 17 Resources Report Subscription 17 Subscriptions Report Subscription 17 Service Mapping 9 Service Request Subscription 17 Size (in bytes) 3 + (# services) * (# resources) * (# subscriptions)
23 Outline Proposed Solution duction and Problem Description Proposed Solution Experimental Results Conclusions and Experimental Results
24 Proposed Solution Experimental Results Conclusion Platform for Smart Spaces, as well as for general sensor networks powerful primitives with little overhead runtime platform Node discovery, Service Discovery and Resource monitoring as just another application Heartbeat protocol with enhancements small overheads, given the platform exists Service/Resource Monitoring: Classification of information types and reporting intervals-triggers Low footprint values, fully operational
25 Proposed Solution Experimental Results Multiple RMs that synchronize reliability, distributed control Reduce footprint further remove OS can reduce ROM with 10k, RAM with 0.8K Monitoring mechanism: Remove redundant information delivery. Timing durations set by individual nodes. Timing adjustments according to the dynamicity of the network. Management mechanism: Implement service recovery (remapping). Provide advanced service mapping and arbitration. Use aggregation to reduce #messages.
Internet of Things 2015/2016
Internet of Things 2015/2016 The Things Johan Lukkien John Carpenter, 1982 1 What makes up the IoT? IoT versus WSN What are examples? Guiding questions 2 Some definitions of IoT (march 2015) Whatis.com:
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
A Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
JoramMQ, a distributed MQTT broker for the Internet of Things
JoramMQ, a distributed broker for the Internet of Things White paper and performance evaluation v1.2 September 214 mqtt.jorammq.com www.scalagent.com 1 1 Overview Message Queue Telemetry Transport () is
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
Thingsquare Technology
Thingsquare Technology Thingsquare connects smartphone apps with things such as thermostats, light bulbs, and street lights. The devices have a programmable wireless chip that runs the Thingsquare firmware.
SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1
SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1 Application Note: SAN/iQ Remote Copy Networking Requirements SAN/iQ Remote Copy provides the capability to take a point in time snapshot of
SIP Protocol as a Communication Bus to Control Embedded Devices
229 SIP Protocol as a Communication Bus to Control Embedded Devices Ramunas DZINDZALIETA Institute of Mathematics and Informatics Akademijos str. 4, Vilnius Lithuania [email protected] Abstract.
Key requirements for Interoperable IoT systems
Key requirements for Interoperable IoT systems Pratul Sharma Technical Marketing Manager, ARM Inc. May/08/2014 Agenda Why Interoperability? Open standards for interoperability Data Communication Standards
Data Management in Sensor Networks
Data Management in Sensor Networks Ellen Munthe-Kaas Jarle Søberg Hans Vatne Hansen INF5100 Autumn 2011 1 Outline Sensor networks Characteristics TinyOS TinyDB Motes Application domains Data management
APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Using IPv6 and 6LoWPAN for Home Automation Networks
Using IPv6 and 6LoWPAN for Home Automation Networks Thomas Scheffler / Bernd Dörge ICCE-Berlin Berlin, 06.09.2011 Overview IPv6 and 6LoWPAN for Home Automation Networks 6LoWPAN Application & Network Architecture
Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging
Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging In some markets and scenarios where competitive advantage is all about speed, speed is measured in micro- and even nano-seconds.
Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1
Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 1 1 Objectives Identify a router as a computer with an OS and hardware designed for the routing process. Demonstrate
A Systems of Systems. The Internet of Things. perspective on. Johan Lukkien. Eindhoven University
A Systems of Systems perspective on The Internet of Things Johan Lukkien Eindhoven University System applications platform In-vehicle network network Local Control Local Control Local Control Reservations,
LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0
LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does
www.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
EPMOSt: An Energy-Efficient Passive Monitoring System for Wireless Sensor Networks
Sensors 2014, 14, 10804-10828; doi:10.3390/s140610804 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors EPMOSt: An Energy-Efficient Passive Monitoring System for Wireless Sensor Networks
WAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
In-Vehicle Networking
In-Vehicle Networking SAE Network classification Class A networks Low Speed (
Voice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
IPv6 Challenges for Embedded Systems István Gyürki 30.08.2011
IPv6 Challenges for Embedded Systems István Gyürki 30.08.2011 AGENDA Introduction IPv6 why do we need it? Selecting the right TCP/IP stack Case study Conclusions Page 2 Company Profile Wireless Products
Figure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
High-Frequency Distributed Sensing for Structure Monitoring
High-Frequency Distributed Sensing for Structure Monitoring K. Mechitov, W. Kim, G. Agha and T. Nagayama* Department of Computer Science, University of Illinois at Urbana-Champaign 201 N. Goodwin Ave.,
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
HP LeftHand SAN Solutions
HP LeftHand SAN Solutions Support Document Application Notes SAN/iQ Remote Copy Networking Requirements Legal Notices Warranty The only warranties for HP products and services are set forth in the express
Software design (Cont.)
Package diagrams Architectural styles Software design (Cont.) Design modelling technique: Package Diagrams Package: A module containing any number of classes Packages can be nested arbitrarily E.g.: Java
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,
10 Gbps Line Speed Programmable Hardware for Open Source Network Applications*
10 Gbps Line Speed Programmable Hardware for Open Source Network Applications* Livio Ricciulli [email protected] (408) 399-2284 http://www.metanetworks.org *Supported by the Division of Design Manufacturing
Portable Wireless Mesh Networks: Competitive Differentiation
Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.
Resource Utilization of Middleware Components in Embedded Systems
Resource Utilization of Middleware Components in Embedded Systems 3 Introduction System memory, CPU, and network resources are critical to the operation and performance of any software system. These system
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
An experimental test bed for the evaluation of the hidden terminal problems on the IEEE 802.15.5 standard
ITU Kaleidoscope 2014 Living in a converged world - impossible without standards? An experimental test bed for the evaluation of the hidden terminal problems on the IEEE 802.15.5 standard David Rodenas-Herraiz,
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Management of VMware ESXi. on HP ProLiant Servers
Management of VMware ESXi on W H I T E P A P E R Table of Contents Introduction................................................................ 3 HP Systems Insight Manager.................................................
UPnP-Based Sensor Network Management Architecture
-Based Sensor Network Management Architecture Hyungjoo Song, Daeyoung Kim, Kangwoo Lee, Jongwoo Sung Real-time and Embedded Systems Lab Information and Communications University {iamhjoo, kimd, kangn2,
The proliferation of the raw processing
TECHNOLOGY CONNECTED Advances with System Area Network Speeds Data Transfer between Servers with A new network switch technology is targeted to answer the phenomenal demands on intercommunication transfer
INTRODUCTION TO WIRELESS SENSOR NETWORKS. Marco Zennaro, ICTP Trieste-Italy
INTRODUCTION TO WIRELESS SENSOR NETWORKS Marco Zennaro, ICTP Trieste-Italy Wireless sensor networks A Wireless Sensor Network is a self-configuring network of small sensor nodes communicating among themselves
Internet of Things based approach to Agriculture Monitoring
Internet of Things based approach to Agriculture Monitoring A. Paventhan ERNET India Regional Centre, Bangalore Asia-Pacific Advanced Network (APAN) 36th Meeting 20th August 2013 1 / 19 Outline 1 IP-based
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor
M2M I/O Modules. To view all of Advantech s M2M I/O Modules, please visit www.advantech.com/products.
M2M I/O Modules 14 M2M I/O Modules Overview 14-2 M2M I/O Modules Selection Guide 14-6 ADAM-2510Z Wireless Router Node 14-8 ADAM-2520Z Wireless Modbus RTU Gateway 14-9 ADAM-2031Z ADAM-2632Z ADAM-2017Z ADAM-2018Z
The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links. Filippo Costa on behalf of the ALICE DAQ group
The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links Filippo Costa on behalf of the ALICE DAQ group DATE software 2 DATE (ALICE Data Acquisition and Test Environment) ALICE is a
Safeguards Against Denial of Service Attacks for IP Phones
W H I T E P A P E R Denial of Service (DoS) attacks on computers and infrastructure communications systems have been reported for a number of years, but the accelerated deployment of Voice over IP (VoIP)
Wireless Sensor Networks Chapter 3: Network architecture
Wireless Sensor Networks Chapter 3: Network architecture António Grilo Courtesy: Holger Karl, UPB Goals of this chapter Having looked at the individual nodes in the previous chapter, we look at general
Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya [email protected]
Internet of things (IOT) applications covering industrial domain Dev Bhattacharya [email protected] Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
Definition. A Historical Example
Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
UAVNet: Prototype of a Highly Adaptive and Mobile Wireless Mesh Network using Unmanned Aerial Vehicles (UAVs) Simon Morgenthaler University of Bern
UAVNet: Prototype of a Highly Adaptive and Mobile Wireless Mesh Network using Unmanned Aerial Vehicles (UAVs) Simon Morgenthaler University of Bern Dez 19, 2011 Outline Introduction Related Work Mikrokopter
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Figure 1.Block diagram of inventory management system using Proximity sensors.
Volume 1, Special Issue, March 2015 Impact Factor: 1036, Science Central Value: 2654 Inventory Management System Using Proximity ensors 1)Jyoti KMuluk 2)Pallavi H Shinde3) Shashank VShinde 4)Prof VRYadav
SmartDiagnostics Application Note Wireless Interference
SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine
INTERNET OF THE THINGS (IoT): An introduction to wireless sensor networking middleware
1 INTERNET OF THE THINGS (IoT): An introduction to wireless sensor networking middleware Dr Antoine Bagula ISAT Laboratory, University of Cape Town, South Africa Goal of the lecture 2 The lecture intends
Secure data aggregation in mobile sink wireless sensor networks
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(6):2927-2933 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Secure data aggregation in mobile sink wireless
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
DT-WBAN: Disruption Tolerant Wireless Body Area Networks in Healthcare Applications
Platzhalter für Bild, Bild auf Titelfolie hinter das Logo einsetzen DT-WBAN: Disruption Tolerant Wireless Body Area Networks in Healthcare Applications Felix Büsching, Maximiliano Bottazzi, Wolf-Bastian
A Link Load Balancing Solution for Multi-Homed Networks
A Link Load Balancing Solution for Multi-Homed Networks Overview An increasing number of enterprises are using the Internet for delivering mission-critical content and applications. By maintaining only
VOIP over Space Networks
VOIP over Space Networks C. Okino, W. Kwong, J. Pang, J. Gao, and L. Clare Jet Propulsion Laboratory California Institute of Technology Presented at The Fifth Space Internetworking Workshop 2006 Hanover,
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California
M 2 M IWG. Eclipse, M2M and the Internet of Things. Overview. M 2 M Industry WorkGroup! M2M?
M 2 M IWG Eclipse, M2M and the Internet of Things Overview M2M? Technology that supports wired or wireless communication between machines. (TechTarget) M2M Market Opportunity Key Trends 1. New connected
Outline. Institute of Computer and Communication Network Engineering. Institute of Computer and Communication Network Engineering
Institute of Computer and Communication Network Engineering Institute of Computer and Communication Network Engineering Communication Networks Software Defined Networking (SDN) Prof. Dr. Admela Jukan Dr.
COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting 972 529-6395 [email protected]
COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES Gene Robinson E.A.Robinsson Consulting 972 529-6395 [email protected] 9 March 1999 IEEE802 N-WEST STANDARDS MEETING FOR BROADBAND WIRELESS ACCESS SYSTEMS
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather
Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks
Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks Mohammed A. Abdala & Alaa Mohammed Salih Department of Networks, College of Information Engineering, University
Objectives. Distributed Databases and Client/Server Architecture. Distributed Database. Data Fragmentation
Objectives Distributed Databases and Client/Server Architecture IT354 @ Peter Lo 2005 1 Understand the advantages and disadvantages of distributed databases Know the design issues involved in distributed
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
A Middleware for OSCAR and Wireless Sensor Network Environments
Federal University of Santa Catarina (UFSC) Santa Catarina - Brazil A Middleware for OSCAR and Wireless Sensor Network Environments D. J. Ferreira, M.A.R. Dantas (UFSC - INE) A. R. Pinto, C. Montez (UFSC
Cloud Operating Systems for Servers
Cloud Operating Systems for Servers Mike Day Distinguished Engineer, Virtualization and Linux August 20, 2014 [email protected] 1 What Makes a Good Cloud Operating System?! Consumes Few Resources! Fast
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
Automatic Configuration and Service Discovery for Networked Smart Devices
Automatic Configuration and Service Discovery for Networked Smart Devices Günter Obiltschnig Applied Informatics Software Engineering GmbH St. Peter 33 9184 St. Jakob im Rosental Austria Tel: +43 4253
TE in action. Some problems that TE tries to solve. Concept of Traffic Engineering (TE)
1/28 2/28 TE in action S-38.3192 Verkkopalvelujen tuotanto S-38.3192 Network Service Provisioning Networking laboratory 3/28 4/28 Concept of Traffic Engineering (TE) Traffic Engineering (TE) (Traffic Management)
in Health Care and Sensor Networks
16 th FFV Workshop Web Services in Health Care and Sensor Networks Fahad Aijaz Department of Communication Networks RWTH Aachen University, Germany FFV Workshop, March 13, 2009 Outline Wireless Sensor
Managing Mobile Devices Over Cellular Data Networks
Managing Mobile Devices Over Cellular Data Networks Best Practices Document Best Practices Document www.soti.net We Manage Mobility TABLE OF CONTENTS UNIQUE CHALLENGES OF MANAGING DEVICES OVER CELLULAR
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
RT-QoS for Wireless ad-hoc Networks of Embedded Systems
RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results
Runtime Verification for Real-Time Automotive Embedded Software
Runtime Verification for Real-Time Automotive Embedded Software S. Cotard, S. Faucou, J.-L. Béchennec, A. Queudet, Y. Trinquet 10th school of Modelling and Verifying Parallel processes (MOVEP) Runtime
Best Practices: Extending Enterprise Applications to Mobile Devices
Best Practices: Extending Enterprise Applications to Mobile Devices by Kulathumani Hariharan Summary: Extending enterprise applications to mobile devices is increasingly becoming a priority for organizations
Performance of Host Identity Protocol on Nokia Internet Tablet
Performance of Host Identity Protocol on Nokia Internet Tablet Andrey Khurri Helsinki Institute for Information Technology HIP Research Group IETF 68 Prague March 23, 2007
Repeat Success, Not Mistakes; Use DDS Best Practices to Design Your Complex Distributed Systems
WHITEPAPER Repeat Success, Not Mistakes; Use DDS Best Practices to Design Your Complex Distributed Systems Abstract RTI Connext DDS (Data Distribution Service) is a powerful tool that lets you efficiently
Ship to Shore Communications Management for MTN Satellite Communications Inc.
Ship to Shore Communications Management for MTN Satellite Communications Inc. with Distrix Software Defined Infrastructure A Distrix Networks Case Study November, 2015 2015 Distrix Networks Ltd. All Right
AdvOSS Session Border Controller
AdvOSS Session Border Controller Product Data Sheet Find latest copy of this document from http://www.advoss.com/pdf/advoss-sbc-productdatasheet.pdf Copyright AdvOSS.com, 2007-2011 All Rights Reserved
Introduction Page 2. Understanding Bandwidth Units Page 3. Internet Bandwidth V/s Download Speed Page 4. Optimum Utilization of Bandwidth Page 8
INDEX Introduction Page 2 Understanding Bandwidth Units Page 3 Internet Bandwidth V/s Download Speed Page 4 Factors Affecting Download Speed Page 5-7 Optimum Utilization of Bandwidth Page 8 Conclusion
Extending Networking to Fit the Cloud
VXLAN Extending Networking to Fit the Cloud Kamau WangŨ H Ũ Kamau Wangũhgũ is a Consulting Architect at VMware and a member of the Global Technical Service, Center of Excellence group. Kamau s focus at
