Fractal Network Technology Tutorial

Size: px
Start display at page:

Download "Fractal Network Technology Tutorial"

Transcription

1 Verification of a MAC-Layer Protocol for Wireless Sensor Network Faranak Heydarian Faranak Heydarian Frits Vaandrager Radboud University Nijmegen

2 Outline Introduction Mac Model UPPAAL Model A Synchronized Network UPPAAL Numerical Results Theorem of having a Synchronized Network Conclusion & Future Work 2

3 Introduction A Wireless Sensor Network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, at different locations. 3

4 MAC Model Time is considered as a sequence of Time Frames. ATimeFrame Ati time frame is composed of a fixed number (C) of ftime Slots. tsn RX TX RX idle idle idle idle In a time slot the hardware clock of the sensor node ticks a fixed number (k ) of times. 4

5 Synchronization When the nodes are powered on, they are all unsynchronized. In order to get synchronized, a node needs information about the relative time frame start, called T moment. The clock synchronization is requested each time a node receives a message, keeping the internal oscillator to not drift from the given T moment. Whenever a message is received, the transmitter T moment is adopted by the receiver nodes. 5

6 Guard Time A is allocated at the beginning i of each TX slot to TX Time Slot accommodate timing skew among the oscillators of the nodes. It is also required after the message to Guard Time allow the transmitter to return to a quiescent state. t RX Time Slot Guard Time 6

7 UPPAAL Model A Wireless Sensor Node Clock START_TX clk[id]==guardtime start_message! SENDING X x<=max x>=min tick[id]! x:=, csn[id]==tsn[id] urg! csn[id]!=tsn[id] tick[id]? clk[id]==k -guardtime tick[id]! Synchronizer clk[id]:=(clk[id]+1)%k INIT WAIT S csn[id]<=n S 1 start_message? clk[id]== urg! csn[id]:=(csn[id]+1)%c tick[id]? clk[id]:=guardtime+1 7

8 A Synchronized Network A wireless sensor network is synchronized if no two nodes transmit, simultaneously and the receiver nodes are able to get the message of the transmitter in RX slots with the same slot number as the transmitter. A B C 1 2 TX 3 Colliison 1 TX only if: A fully-connected wireless sensor network is synchronized if and ( i, j Nodes)( NODE( i). SENDING csn[ i] = csn[ j]) 8

9 Numerical Results Nodes Nodes C C 6 n 4 n 4 k 1 k 1 g 2 g min min max max Nodes C 6 n 4 k g 2 min max

10 Theorem A fully-connected wireless sensor network is synchronized if and only if: ( C d) k g min < ( d = tsn ( ) k 1 max tsn max C d k min ) 1

11 Necessity Proof by Counter Example ( C d). Imagine: k g ( C d). k 1 min max Suppose a wireless sensor network in which there exist one very slow sensor node (clock tick length max) and one very fast node (clock tick length min): Fast g+1 g F End of Frame Slow g S 11

12 Necessity Proof Fast g+1 g F End of Frame Slow g S (( C d). 1) F = min. k max. ( ( C d). k g ) S = ) = ( C d). k ( C d). k g 1 min max max. (( C d). k g) min. (( C d). k 1) S F 12

13 Sufficiency Proof using Invariants We started t proving the necessity part of the theorem by describing the network of timed automata by primed formulas. We proved if ( C d ) k g ( C d) k 1 < min max holds, then is an Invariant. ( i, j )( WSN [ i]. SENDING csn [ i ] = csn [ j ]) 13

14 System Invariants 1. x[ i] max 2. clk[ i] k 3. csn [ i ] C 4. NODE [ i]. SENDING ( csn [ i ] = tsn [ i ] csn [ i] n ) ] 5. NODE[ i]. SENDING ( g clk[ i] k g) 14

15 System Invariants (cont.) t.k 1 g, t. k 1 If ( t;1 t ( C d ) ) then < min max ( i, j; i j)( NODE[ i]. WAITING clk[ i] = NODE[ j]. SENDING) Is an invariant: g+1 t.k -1 time units Sending the last synchronization point before the conflict g t.k -g time units 15

16 Proving Sufficiency We proved the sufficiency part of the theorem by induction on the length of the system execution. 16

17 A Fully-Connected Network vs. A non-fully-connected one A B A B C C C C n n k k g g min min max max ratio ratio

18 Theorem A chain-shape h wireless sensor network is synchronized, if and only if the formula below would be hold (C.k - g + N - (C.k -1) 2) min < max 4 2 n 1 3 n 1 n 2 18

19 Conclusion & Future Work We studied the fully-connected as well as chainshaped wireless sensor networks and obtained formulas showing what relation between network parameters should be to have a synchronized network. Our formulas don t describe the behavior of a wireless sensor network of a general topology. Our challenge is describing the synchronization process of a general wireless sensor network. 19

20 Thank You????

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

How To Make A Multi-User Communication Efficient

How To Make A Multi-User Communication Efficient Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

More information

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

MicroMag3 3-Axis Magnetic Sensor Module

MicroMag3 3-Axis Magnetic Sensor Module 1008121 R01 April 2005 MicroMag3 3-Axis Magnetic Sensor Module General Description The MicroMag3 is an integrated 3-axis magnetic field sensing module designed to aid in evaluation and prototyping of PNI

More information

Clock Synchronization

Clock Synchronization Clock Synchronization Henrik Lönn Electronics & Software Volvo Technological Development Contents General Types of Synchronisation Faults and problems to cope with Example algorithms Transmission delays

More information

Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012

Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012 Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation

More information

Homework 1 (Time, Synchronization and Global State) - 100 Points

Homework 1 (Time, Synchronization and Global State) - 100 Points Homework 1 (Time, Synchronization and Global State) - 100 Points CS25 Distributed Systems, Fall 2009, Instructor: Klara Nahrstedt Out: Thursday, September 3, Due Date: Thursday, September 17 Instructions:

More information

Elettronica dei Sistemi Digitali Costantino Giaconia SERIAL I/O COMMON PROTOCOLS

Elettronica dei Sistemi Digitali Costantino Giaconia SERIAL I/O COMMON PROTOCOLS SERIAL I/O COMMON PROTOCOLS RS-232 Fundamentals What is RS-232 RS-232 is a popular communications interface for connecting modems and data acquisition devices (i.e. GPS receivers, electronic balances,

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

A Transport Protocol for Multimedia Wireless Sensor Networks

A Transport Protocol for Multimedia Wireless Sensor Networks A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Comparison of FlexRay and CAN-bus for Real-Time Communication

Comparison of FlexRay and CAN-bus for Real-Time Communication Comparison of FlexRay and CAN-bus for Real-Time Communication Andreas Forsberg Mälardalen University Högskoleplan 1 721 23 Västerås +46 768011236 afg05001@student.mdh.se Johan Hedberg Mälardalen University

More information

Local Interconnect Network Training. Local Interconnect Network Training. Overview

Local Interconnect Network Training. Local Interconnect Network Training. Overview Overview Local Interconnect Network Training History and introduction Technical features The ISO/OSI reference model and LIN Frames Message Frames Communication concept of LIN Command Frames and Extended

More information

Timing Methodologies (cont d) Registers. Typical timing specifications. Synchronous System Model. Short Paths. System Clock Frequency

Timing Methodologies (cont d) Registers. Typical timing specifications. Synchronous System Model. Short Paths. System Clock Frequency Registers Timing Methodologies (cont d) Sample data using clock Hold data between clock cycles Computation (and delay) occurs between registers efinition of terms setup time: minimum time before the clocking

More information

Random Access Protocols

Random Access Protocols Lecture Today slotted vs unslotted ALOHA Carrier sensing multiple access Ethernet DataLink Layer 1 Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori

More information

- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of

- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science

More information

MAC Scheduling for High Throughput Underwater Acoustic Networks

MAC Scheduling for High Throughput Underwater Acoustic Networks MAC Scheduling for High Throughput Underwater Acoustic Networks Yang Guan Chien-Chung Shen Department of Computer and Information Sciences University of Delaware, Newark, DE, USA {yguan,cshen}@cis.udel.edu

More information

DT-WBAN: Disruption Tolerant Wireless Body Area Networks in Healthcare Applications

DT-WBAN: Disruption Tolerant Wireless Body Area Networks in Healthcare Applications Platzhalter für Bild, Bild auf Titelfolie hinter das Logo einsetzen DT-WBAN: Disruption Tolerant Wireless Body Area Networks in Healthcare Applications Felix Büsching, Maximiliano Bottazzi, Wolf-Bastian

More information

CSMA/CA. Information Networks p. 1

CSMA/CA. Information Networks p. 1 Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

A REMOTE HOME SECURITY SYSTEM BASED ON WIRELESS SENSOR NETWORK AND GSM TECHNOLOGY

A REMOTE HOME SECURITY SYSTEM BASED ON WIRELESS SENSOR NETWORK AND GSM TECHNOLOGY A REMOTE HOME SECURITY SYSTEM BASED ON WIRELESS SENSOR NETWORK AND GSM TECHNOLOGY AIM: The main aim of this project is to implement Remote Home Security System Based on Wireless Sensor Network and GSM

More information

Distributed Synchronization

Distributed Synchronization CIS 505: Software Systems Lecture Note on Physical Clocks Insup Lee Department of Computer and Information Science University of Pennsylvania Distributed Synchronization Communication between processes

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

Real-Time (Paradigms) (51)

Real-Time (Paradigms) (51) Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major

More information

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL 1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint

More information

SPINS: Security Protocols for Sensor Networks

SPINS: Security Protocols for Sensor Networks SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California

More information

DS1621 Digital Thermometer and Thermostat

DS1621 Digital Thermometer and Thermostat Digital Thermometer and Thermostat www.dalsemi.com FEATURES Temperature measurements require no external components Measures temperatures from 55 C to +125 C in 0.5 C increments. Fahrenheit equivalent

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless

More information

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical

More information

2.1 CAN Bit Structure The Nominal Bit Rate of the network is uniform throughout the network and is given by:

2.1 CAN Bit Structure The Nominal Bit Rate of the network is uniform throughout the network and is given by: Order this document by /D CAN Bit Timing Requirements by Stuart Robb East Kilbride, Scotland. 1 Introduction 2 CAN Bit Timing Overview The Controller Area Network (CAN) is a serial, asynchronous, multi-master

More information

Delay-Aware Big Data Collection Strategies for Sensor Cloud Services Dr. Chi-Tsun (Ben), Cheng

Delay-Aware Big Data Collection Strategies for Sensor Cloud Services Dr. Chi-Tsun (Ben), Cheng Delay-Aware Big Data Collection Strategies for Sensor Cloud Services Dr. Chi-Tsun (Ben), Cheng chi-tsun.cheng@polyu.edu.hk http://www.eie.polyu.edu.hk/~bcheng/ An Overview Introduction Wireless Sensor

More information

CS 640: Introduction to Computer Networks. Goals of This Class. Goal of Networking. Page 1. Understand principles and practice of networking

CS 640: Introduction to Computer Networks. Goals of This Class. Goal of Networking. Page 1. Understand principles and practice of networking CS 640: Introduction to Computer Networks Aditya Akella Lecture 1 Introduction http://www.cs.wisc.edu/~akella/cs640/f07 1 Goals of This Class Understand principles and practice of networking ow are modern

More information

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師 Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

More information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,

More information

DS1821 Programmable Digital Thermostat and Thermometer

DS1821 Programmable Digital Thermostat and Thermometer ma www.maxim-ic.com FEATURES Requires no external components Unique 1-Wire interface requires only one port pin for communication Operates over a -55 C to +125 C (67 F to +257 F) temperature range Functions

More information

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

RT-QoS for Wireless ad-hoc Networks of Embedded Systems RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results

More information

PACKAGE OUTLINE DALLAS DS2434 DS2434 GND. PR 35 PACKAGE See Mech. Drawings Section

PACKAGE OUTLINE DALLAS DS2434 DS2434 GND. PR 35 PACKAGE See Mech. Drawings Section PRELIMINARY DS2434 Battery Identification Chip FEATURES Provides unique ID number to battery packs PACKAGE OUTLINE Eliminates thermistors by sensing battery temperature on chip DALLAS DS2434 1 2 3 256

More information

4310/4320 Wireless Position Monitor Burst Configuration and Diagnostics

4310/4320 Wireless Position Monitor Burst Configuration and Diagnostics Instruction Manual Supplement 4310/4320 Wireless Position Monitor 4310/4320 Wireless Position Monitor Burst Configuration and Diagnostics This document applies to: Fisher 4320 Device Type 1308 (hex) 4872

More information

Real-Time Component Software. slide credits: H. Kopetz, P. Puschner

Real-Time Component Software. slide credits: H. Kopetz, P. Puschner Real-Time Component Software slide credits: H. Kopetz, P. Puschner Overview OS services Task Structure Task Interaction Input/Output Error Detection 2 Operating System and Middleware Applica3on So5ware

More information

APNT#1168 Modbus - Establishing Communications Hints

APNT#1168 Modbus - Establishing Communications Hints Application Note #1168: Modbus - Establishing Communications Hints Introduction This document provides supplemental information about configuring Pro-face Device/PLC drivers to communicate with your device.

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

Metrics for Detection of DDoS Attacks

Metrics for Detection of DDoS Attacks Chapter 3 Metrics for Detection of DDoS Attacks The DDoS attacks are trying to interfere with the physical transmission and reception of wireless communications. Attacks are caused by jamming, exhaustion,

More information

Chapter 14: Distributed Operating Systems

Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication

More information

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea

More information

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,

More information

Scheduling Enhanced Beacons in the IEEE 802.15.4e MAC for fast network formation

Scheduling Enhanced Beacons in the IEEE 802.15.4e MAC for fast network formation Scheduling Enhanced Beacons in the IEEE 802.15.4e MAC for fast network formation Elvis Vogli, Giuseppe Ribezzo, Luigi Alfredo Grieco, Gennaro Boggia Department of Electrical and Information Engineering

More information

Experiment # 9. Clock generator circuits & Counters. Eng. Waleed Y. Mousa

Experiment # 9. Clock generator circuits & Counters. Eng. Waleed Y. Mousa Experiment # 9 Clock generator circuits & Counters Eng. Waleed Y. Mousa 1. Objectives: 1. Understanding the principles and construction of Clock generator. 2. To be familiar with clock pulse generation

More information

Principles and characteristics of distributed systems and environments

Principles and characteristics of distributed systems and environments Principles and characteristics of distributed systems and environments Definition of a distributed system Distributed system is a collection of independent computers that appears to its users as a single

More information

Chapter 16: Distributed Operating Systems

Chapter 16: Distributed Operating Systems Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology

More information

DS1721 2-Wire Digital Thermometer and Thermostat

DS1721 2-Wire Digital Thermometer and Thermostat www.dalsemi.com FEATURES Temperature measurements require no external components with ±1 C accuracy Measures temperatures from -55 C to +125 C; Fahrenheit equivalent is -67 F to +257 F Temperature resolution

More information

Aperiodic Task Scheduling

Aperiodic Task Scheduling Aperiodic Task Scheduling Jian-Jia Chen (slides are based on Peter Marwedel) TU Dortmund, Informatik 12 Germany Springer, 2010 2014 年 11 月 19 日 These slides use Microsoft clip arts. Microsoft copyright

More information

CONVERGECAST, namely the collection of data from

CONVERGECAST, namely the collection of data from 1 Fast Data Collection in Tree-Based Wireless Sensor Networks Özlem Durmaz Incel, Amitabha Ghosh, Bhaskar Krishnamachari, and Krishnakant Chintalapudi Abstract We investigate the following fundamental

More information

Full and Complete Binary Trees

Full and Complete Binary Trees Full and Complete Binary Trees Binary Tree Theorems 1 Here are two important types of binary trees. Note that the definitions, while similar, are logically independent. Definition: a binary tree T is full

More information

Computer-System Architecture

Computer-System Architecture Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage Structure Storage Hierarchy Hardware Protection General System Architecture 2.1 Computer-System Architecture 2.2 Computer-System

More information

Controlled Random Access Methods

Controlled Random Access Methods Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 09.03.2004 Content of Presentation

More information

Energy Harvesting in Practical Applications. Roy Freeland President, Perpetuum Ltd

Energy Harvesting in Practical Applications. Roy Freeland President, Perpetuum Ltd Energy Harvesting in Practical Applications Roy Freeland President, Perpetuum Ltd Getting it out of the Lab Experiences from taking energy harvesting concepts to successful, practical applications rtt

More information

;l ~~! I!July 1993 Doc: IEEE P802.11-93/94a. Power Management. The importance of Power Management provisions in the MAC. By: Wim Diepstraten NCR.

;l ~~! I!July 1993 Doc: IEEE P802.11-93/94a. Power Management. The importance of Power Management provisions in the MAC. By: Wim Diepstraten NCR. ;l ~~! I I!July 1993 Doc: IEEE P802.11-93/94a I Power Management The importance of Power Management provisions in the MAC By: Wim Diepstraten NCR. IJuly 1993 Wireless Network Applications Mobile computing

More information

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,

More information

Protocol Design for Neighbor Discovery in AD-HOC Network

Protocol Design for Neighbor Discovery in AD-HOC Network International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 9 (2014), pp. 915-922 International Research Publication House http://www.irphouse.com Protocol Design for

More information

THE BANACH CONTRACTION PRINCIPLE. Contents

THE BANACH CONTRACTION PRINCIPLE. Contents THE BANACH CONTRACTION PRINCIPLE ALEX PONIECKI Abstract. This paper will study contractions of metric spaces. To do this, we will mainly use tools from topology. We will give some examples of contractions,

More information

Application Note 58 Crystal Considerations for Dallas Real-Time Clocks

Application Note 58 Crystal Considerations for Dallas Real-Time Clocks www.maxim-ic.com Application Note 58 Crystal Considerations for Dallas Real-Time Clocks OVERVIEW This application note describes crystal selection and layout techniques for connecting a 32,768Hz crystal

More information

Non-Data Aided Carrier Offset Compensation for SDR Implementation

Non-Data Aided Carrier Offset Compensation for SDR Implementation Non-Data Aided Carrier Offset Compensation for SDR Implementation Anders Riis Jensen 1, Niels Terp Kjeldgaard Jørgensen 1 Kim Laugesen 1, Yannick Le Moullec 1,2 1 Department of Electronic Systems, 2 Center

More information

Lecture 17: 802.11 Wireless Networking"

Lecture 17: 802.11 Wireless Networking Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion

More information

Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities. Dr. William Kao

Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities. Dr. William Kao Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities Dr. William Kao Agenda Introduction - Sensors, Actuators, Transducers Sensor Types, Classification Wireless Sensor Networks

More information

DATA COMMUNICATIONS AND NETWORKING. Solved Examples

DATA COMMUNICATIONS AND NETWORKING. Solved Examples Page 1 of 10 DATA COMMUNICATIONS AND NETWORKING Solved Examples References: STA: Stallings, Data and Computer Communications, 6 th ed. TAN: Tannenbaum, Computer Networks, 4 th ed.) 1. Given the following

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Einstein s Theory of Special Relativity Made Relatively Simple!

Einstein s Theory of Special Relativity Made Relatively Simple! Einstein s Theory of Special Relativity Made Relatively Simple! by Christopher P. Benton, PhD Young Einstein Albert Einstein was born in 1879 and died in 1955. He didn't start talking until he was three,

More information

Topology-Transparent Distributed Multicast and Broadcast Scheduling in Mobile Ad Hoc Networks

Topology-Transparent Distributed Multicast and Broadcast Scheduling in Mobile Ad Hoc Networks Topology-Transparent Distributed Multicast and Broadcast Scheduling in Mobile d Hoc Networks Yiming Liu, Victor O. K. Li, Ka-Cheong Leung, and Lin Zhang, Department of Electronic Engineering Tsinghua University,

More information

Energy-Efficient, Collision-Free Medium Access Control for Wireless Sensor Networks

Energy-Efficient, Collision-Free Medium Access Control for Wireless Sensor Networks Energy-Efficient, Collision-Free Medium Access Control for Wireless Sensor Networks Venkatesh Rajendran venkat@soe.ucsc.edu Katia Obraczka katia@soe.ucsc.edu Department of Computer Engineering University

More information

Mac Protocols for Wireless Sensor Networks

Mac Protocols for Wireless Sensor Networks Mac Protocols for Wireless Sensor Networks Hans-Christian Halfbrodt Advisor: Pardeep Kumar Institute of Computer Science Freie Universität Berlin, Germany halfbrodt@inf.fu-berlin.de January 2010 Contents

More information

Contents. Connection Guide. What is Dante?... 2. Connections... 4. Network Set Up... 6. System Examples... 9. Copyright 2015 ROLAND CORPORATION

Contents. Connection Guide. What is Dante?... 2. Connections... 4. Network Set Up... 6. System Examples... 9. Copyright 2015 ROLAND CORPORATION Contents What is Dante?............................................. 2 Outline.................................................. 2 Fundamental............................................ 3 Required Network

More information

MAC Algorithms in Wireless Networks

MAC Algorithms in Wireless Networks Department of Computing Science Master Thesis MAC Algorithms in Wireless Networks Applications, Issues and Comparisons Shoaib Tariq Supervisor: Dr. Jerry Eriksson Examiner: Dr. Per Lindström Dedicated

More information

Application of Wireless Sensor Network and GSM Technology: A Remote Home Security System

Application of Wireless Sensor Network and GSM Technology: A Remote Home Security System Application of Wireless Sensor Network and GSM Technology: A Remote Home Security System Atul Arora, Ankit Malik ABSTRACT In this paper, a low-power consumption remote home security alarm system developed

More information

Energy Efficiency of Wireless Sensor Networks

Energy Efficiency of Wireless Sensor Networks Microwave & RF, Olivier Berder, 20/03/14 1 / 23 Energy Efficiency of Wireless Sensor Networks O. BERDER, M. GAUTIER, O. SENTIEYS, A. CARER ENSSAT, Université de Rennes1 INRIA/IRISA EPC CAIRN March 20,

More information

I 2 S bus specification

I 2 S bus specification 1.0 INTOUCTION Many digital audio systems are being introduced into the consumer audio market, including compact disc, digital audio tape, digital sound processors, and digital TV-sound. The digital audio

More information

DS1621 Digital Thermometer and Thermostat

DS1621 Digital Thermometer and Thermostat www.maxim-ic.com FEATURES Temperature measurements require no external components Measures temperatures from -55 C to +125 C in 0.5 C increments. Fahrenheit equivalent is -67 F to 257 F in 0.9 F increments

More information

Math 55: Discrete Mathematics

Math 55: Discrete Mathematics Math 55: Discrete Mathematics UC Berkeley, Fall 2011 Homework # 5, due Wednesday, February 22 5.1.4 Let P (n) be the statement that 1 3 + 2 3 + + n 3 = (n(n + 1)/2) 2 for the positive integer n. a) What

More information

Using FPGAs to Design Gigabit Serial Backplanes. April 17, 2002

Using FPGAs to Design Gigabit Serial Backplanes. April 17, 2002 Using FPGAs to Design Gigabit Serial Backplanes April 17, 2002 Outline System Design Trends Serial Backplanes Architectures Building Serial Backplanes with FPGAs A1-2 Key System Design Trends Need for.

More information

Drahtlose Kommunikation. Sensornetze

Drahtlose Kommunikation. Sensornetze Drahtlose Kommunikation Sensornetze Übersicht Beispielanwendungen Sensorhardware und Netzarchitektur Herausforderungen und Methoden MAC-Layer-Fallstudie IEEE 802.15.4 Energieeffiziente MAC-Layer WSN-Programmierung

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

CMA5000 SPECIFICATIONS. 5710 Gigabit Ethernet Module

CMA5000 SPECIFICATIONS. 5710 Gigabit Ethernet Module CMA5000 5710 Gigabit Ethernet Module SPECIFICATIONS General Description The CMA5710 Gigabit Ethernet application is a single slot module that can be used in any CMA 5000. The Gigabit Ethernet test module

More information

Revision of Lecture Eighteen

Revision of Lecture Eighteen Revision of Lecture Eighteen Previous lecture has discussed equalisation using Viterbi algorithm: Note similarity with channel decoding using maximum likelihood sequence estimation principle It also discusses

More information

Scheduling. Yücel Saygın. These slides are based on your text book and on the slides prepared by Andrew S. Tanenbaum

Scheduling. Yücel Saygın. These slides are based on your text book and on the slides prepared by Andrew S. Tanenbaum Scheduling Yücel Saygın These slides are based on your text book and on the slides prepared by Andrew S. Tanenbaum 1 Scheduling Introduction to Scheduling (1) Bursts of CPU usage alternate with periods

More information

DS18B20 Programmable Resolution 1-Wire Digital Thermometer

DS18B20 Programmable Resolution 1-Wire Digital Thermometer www.dalsemi.com FEATURES Unique 1-Wire interface requires only one port pin for communication Multidrop capability simplifies distributed temperature sensing applications Requires no external components

More information

Halmstad University Post-Print

Halmstad University Post-Print Halmstad University Post-Print Wireless Sensor Networks for Surveillance Applications - A Comparative Survey of MAC Protocols Mahmood Ali, Annette Böhm and Magnus Jonsson N.B.: When citing this work, cite

More information

A survey on Spectrum Management in Cognitive Radio Networks

A survey on Spectrum Management in Cognitive Radio Networks A survey on Spectrum Management in Cognitive Radio Networks Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty Georgia Institute of Technology Communications Magazine, vol 46, April 2008,

More information

Adaptive MAC Protocol for Emergency Data Transmission in Wireless Body Sensor Networks

Adaptive MAC Protocol for Emergency Data Transmission in Wireless Body Sensor Networks , pp. 205-216 http://dx.doi.org/10.14257/ijseia.2015.9.9.18 Adaptive MAC Protocol for Emergency Data Transmission in Wireless Body Sensor Networks Rae Hyun Kim and Jeong Gon Kim 1 Department of Electronic

More information

802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak 802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture

More information

Lecture 10 Sequential Circuit Design Zhuo Feng. Z. Feng MTU EE4800 CMOS Digital IC Design & Analysis 2010

Lecture 10 Sequential Circuit Design Zhuo Feng. Z. Feng MTU EE4800 CMOS Digital IC Design & Analysis 2010 EE4800 CMOS igital IC esign & Analysis Lecture 10 Sequential Circuit esign Zhuo Feng 10.1 Z. Feng MTU EE4800 CMOS igital IC esign & Analysis 2010 Sequencing Outline Sequencing Element esign Max and Min-elay

More information

A Mobile Open Infrastructure Network Protocol (MOIN) for Localization and Data Communication in UWB Based Wireless Sensor Networks

A Mobile Open Infrastructure Network Protocol (MOIN) for Localization and Data Communication in UWB Based Wireless Sensor Networks A Mobile Open Infrastructure Network Protocol (MOIN) for Localization and Data Communication in UWB Based Wireless Sensor Networks 014 IEEE International Conference on Ultra-Wideband (ICUWB) Paris, France

More information

Distributed Real-Time Systems (TI-DRTS) Track 2. CAN-BUS Introduction. Version 9.11.2009 Ref. VECTOR application note & Motorola note

Distributed Real-Time Systems (TI-DRTS) Track 2. CAN-BUS Introduction. Version 9.11.2009 Ref. VECTOR application note & Motorola note Distributed Real-Time Systems (TI-DRTS) Track 2 CAN-BUS Introduction Version 9.11.2009 Ref. VECTOR application note & Motorola note What is CAN? Controller Area Network (CAN) is a common, small area network

More information

A New Paradigm for Synchronous State Machine Design in Verilog

A New Paradigm for Synchronous State Machine Design in Verilog A New Paradigm for Synchronous State Machine Design in Verilog Randy Nuss Copyright 1999 Idea Consulting Introduction Synchronous State Machines are one of the most common building blocks in modern digital

More information

LoRa FAQs. www.semtech.com 1 of 4 Semtech. Semtech Corporation LoRa FAQ

LoRa FAQs. www.semtech.com 1 of 4 Semtech. Semtech Corporation LoRa FAQ LoRa FAQs 1.) What is LoRa Modulation? LoRa (Long Range) is a modulation technique that provides significantly longer range than competing technologies. The modulation is based on spread-spectrum techniques

More information

Serial Communications

Serial Communications Serial Communications 1 Serial Communication Introduction Serial communication buses Asynchronous and synchronous communication UART block diagram UART clock requirements Programming the UARTs Operation

More information

Formal verification of contracts for synchronous software components using NuSMV

Formal verification of contracts for synchronous software components using NuSMV Formal verification of contracts for synchronous software components using NuSMV Tobias Polzer Lehrstuhl für Informatik 8 Bachelorarbeit 13.05.2014 1 / 19 Problem description and goals Problem description

More information

Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday

Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Lecture 14: Data transfer in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Data transfer over multiple wireless hops Many applications: TCP flow from a wireless node

More information

Sense Making in an IOT World: Sensor Data Analysis with Deep Learning

Sense Making in an IOT World: Sensor Data Analysis with Deep Learning Sense Making in an IOT World: Sensor Data Analysis with Deep Learning Natalia Vassilieva, PhD Senior Research Manager GTC 2016 Deep learning proof points as of today Vision Speech Text Other Search & information

More information

PROFINET the Industrial Ethernet standard. Siemens AG 2013. Alle Rechte vorbehalten.

PROFINET the Industrial Ethernet standard. Siemens AG 2013. Alle Rechte vorbehalten. the Industrial Ethernet standard is 100% Ethernet is Ethernet Ethernet is the established standard in the IT world for fast exchange of data (IEEE 802.3) is always full duplex simultaneous communication

More information