Evaluation of an Algorithm used in Routing and Service Discovery Protocols of Wireless Sensor Networks The Trickle Algorithm
|
|
|
- Justin Cooper
- 9 years ago
- Views:
Transcription
1 Evaluation of an Algorithm used in Routing and Service Discovery Protocols of Wireless Sensor Networks The Trickle Algorithm Markus Becker ComNets, TZI, University Bremen, Germany 19th of October 2012 Becker: FFV, TUHH, October / 29
2 Outline IETF Protocol Stack for Wireless Sensor Networks Routing Protocol for Low power and Lossy Networks Trickle Algorithm Simulation Analytical Model Evaluation Conclusions & Outlook Becker: FFV, TUHH, October / 29
3 The Internet Engineering Task Force protocol stack for Wireless Sensor Networks Becker: FFV, TUHH, October / 29
4 The Internet Engineering Task Force protocol stack for Wireless Sensor Networks USB WSN node Border Router Node Border Router Host Internet Host 6LoWPAN: IPv6 over Low power Wireless Personal Area Network AM: Active Messaging CoAP: Constrained Application Protocol IP: Internet Protocol MAC: Medium Access Control PHY: Physical Layer PPP: Point-to-Point Protocol RPL: Routing Protocol for Low power and Lossy Networks TCP: Transmission Control Protocol UDP: User Datagram Protocol WSN: Wireless Sensor Network Becker: FFV, TUHH, October / 29
5 The Internet Engineering Task Force protocol stack for Wireless Sensor Networks PPP Interface USB WSN node Border Router Node Border Router Host Internet Host 6LoWPAN: IPv6 over Low power Wireless Personal Area Network AM: Active Messaging CoAP: Constrained Application Protocol IP: Internet Protocol MAC: Medium Access Control PHY: Physical Layer PPP: Point-to-Point Protocol RPL: Routing Protocol for Low power and Lossy Networks TCP: Transmission Control Protocol UDP: User Datagram Protocol WSN: Wireless Sensor Network Becker: FFV, TUHH, October / 29
6 The Internet Engineering Task Force protocol stack for Wireless Sensor Networks PPP Interface USB WSN node Border Router Node Proxy Internet Host 6LoWPAN: IPv6 over Low power Wireless Personal Area Network AM: Active Messaging CoAP: Constrained Application Protocol IP: Internet Protocol MAC: Medium Access Control PHY: Physical Layer PPP: Point-to-Point Protocol RPL: Routing Protocol for Low power and Lossy Networks TCP: Transmission Control Protocol UDP: User Datagram Protocol WSN: Wireless Sensor Network Becker: FFV, TUHH, October / 29
7 Routing Protocol for Low power and Lossy Networks IETF RFC 6206 and RFC 6206: The Trickle Algorithm RFC 6550: Routing Protocol RPL RFC 6551: Routing Metrics RFC 6552: Objective Function RFC 6553: IPv6 Option for RPL RFC 6554: IPv6 Routing Header for RPL Low power and Lossy Networks (LLN) consist Border Router (BR), Router (R) and Host (H) nodes H choose only the default router RPL operates only within an LLN and terminates at BR Proactive distance-vector approach, uses graph structure Becker: FFV, TUHH, October / 29
8 RPL: Upward Routes DIO: Destination-Oriented Directed Acyclic Graph Information Object DIO announces upward routes (Routes to the BR) DIOs are sent using the Trickle algorithm (RFC 6206) Becker: FFV, TUHH, October / 29
9 Trickle Algorithm: Variables and Constants Variables τ Communication interval length T Timer value in range [τ/2, τ] C Communication counter Constants K Redundancy constant τ L Lowest τ τ H Highest τ Note: Notation according to the original Trickle paper: P. Levis, N. Patel, D. Culler, S. Shenker: Trickle: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks in NSDI 04 Proceedings. Becker: FFV, TUHH, October / 29
10 Trickle Algorithm: Rules τ expires Double τ, up to τ H, pick a new T from range [τ/2, τ] T expires If C < K, transmit Received consistent data Increment C Received inconsistent data Set τ to τ L. Reset C to 0, pick a new T from [τ/2, τ] Becker: FFV, TUHH, October / 29
11 Simulation Scenarios Line scenario with Closest Pattern Matching Propagation Model ( Line-CPM ) Grid scenario ( Grid ) Varying number of nodes Varying inter-node distances / scenario size Becker: FFV, TUHH, October / 29
12 Simulation Execution TinyOS application with 6LoWPAN implementation blip Simulation tool TOSSIM blip extended for simulations Monte-Carlo iterations for each scenario instance Becker: FFV, TUHH, October / 29
13 Analytical Models Number of Messages Consistency Time Becker: FFV, TUHH, October / 29
14 Analytical Models Number of Messages Consistency Time Becker: FFV, TUHH, October / 29
15 Trickle Algorithm Trickle algorithm in Line-Direct scenario: 0. Hop 1. Hop 2. Hop 3. Hop 0 τ L Becker: FFV, TUHH, October / 29
16 Analytical Model: Consistency Time Modelling consistency time for the Line scenario (1) 0. Hop: No Delay 1. Hop: Uniformly distributed delay 2. Hop: Addition of 2 uniformly distributed delays -> Triangle 3. Hop: Addition of 1 uniformly distributed delay and triangle τl 2τL 3τL τl 2τL 3τL τl 2τL 3τL τl 2τL 3τL Central limit theorem: mean of summation of i.i.d. random variables, each with finite mean and variance, will be approximately normally distributed Becker: FFV, TUHH, October / 29
17 Analytical Model: Consistency Time Modelling consistency time for the Line scenario (1) 0. Hop: No Delay 1. Hop: Uniformly distributed delay 2. Hop: Addition of 2 uniformly distributed delays -> Triangle 3. Hop: Addition of 1 uniformly distributed delay and triangle τl 2τL 3τL τl 2τL 3τL τl 2τL 3τL τl 2τL 3τL Central limit theorem: mean of summation of i.i.d. random variables, each with finite mean and variance, will be approximately normally distributed (1/4) 1/4 1/4 1/4 τl 2τL 3τL 1 τl 2τL 3τL Becker: FFV, TUHH, October / 29
18 Analytical Model: Consistency Time The probability density function (pdf) of the time to consistency scenario can be modeled in detail by p(t) = 1 N 1 C 1 N 1 N f h,c,a (t) p h,c,a (t), where h=0 c=0 a=1 h: hops c: Trickle cycle a: number of 1-hop ancestors closer to source N: total number of nodes C: maximum number of Trickle cycles to take into account Becker: FFV, TUHH, October / 29
19 Analytical Model: Consistency Time p(t) = 1 N N 1 C 1 N 1 h=0 c=0 a=1 f h,c,a (t) p h,c,a (t), where δ(t), h = 0, L 1 {L{Θ(t τ L 2 ) Θ(t τ L )} h }, h 1, c = 0 Θ(t τ L (2 c+1 1) τ L f h,c,a=1 (t) = 2 2 c ) Θ(t τ L (2 c+1 1)), h = 1, c 0 L 1 {L{Θ(t τ L 2 ) Θ(t τ L )} h c L{Θ(t 2τ L ) Θ(t 3τ L )} c }, h > 1, 0 < c < h. Θ( ) denotes the Heaviside step function. L denotes the Laplace transform and L 1 denotes the inverse Laplace transform. Becker: FFV, TUHH, October / 29
20 Analytical Model: Consistency Time f h,c,a (t) p(t) Distributions p h,c,a (t) h=1, a=0 c= p(t) Distributions p h,c,a (t) c=0, a=0 h= t [s] Time t [s] Becker: FFV, TUHH, October / 29
21 Analytical Model: Consistency Time f h,c,a (t) Distributions p h,c,a (t) c=0 p(t) h=0, a=0 h=0, a=1 h=0, a=2 h=1, a=0 h=1, a=1 h=1, a=2 h=2, a=0 h=2, a=1 h=2, a=2 h=3, a=0 h=3, a=1 h=3, a=2 h=4, a=0 h=4, a=1 h=4, a=2 h=5, a=0 h=5, a=1 h=5, a=2 h=6, a=0 h=6, a=1 h=6, a=2 h=7, a=0 h=7, a=1 h=7, a=2 h=8, a=0 h=8, a=1 h=8, a=2 The distribution for a 1 can be calculated from the cdf given by 1 (1 P(X x)) a of the cdf for a = Time t [s] Becker: FFV, TUHH, October / 29
22 Analytical Model: Consistency Time f h,c,a (t) Distributions p h,c,a (t) h=2, a=0 c= Distributions p h,c,a (t) h=3, a=0 c= p(t) p(t) Time t [s] Time t [s] Figure: Probability Density Function for h = 2, a = 0, c varied Figure: Probability Density Function for h = 3, a = 0, c varied Becker: FFV, TUHH, October / 29
23 Analytical Model: Consistency Time p h,c,a (t) Packet Receive Ratio 0.80 PRR1 PRR1 PRR PRR2 PRR3 PRR2 PRR Distance [m] Becker: FFV, TUHH, October / 29
24 Algorithm for Analytical Model calc_base_dists() calc_prr() calc_neigh(prr) calc_tx_outcomes(neighbors, prr) calc_hopcounts(prr, inject_node, trickle_k, neighbors, scenario) calc_hopcounts_next_cycles(hopcounts) calc_neighbors_hop_closer(hopcounts, prr, trickle_k) calc_prob_mix_from_hopcount(hopcounts) calc_timeseries(prob_mix, distributions) plot_graphs(timeseries) Becker: FFV, TUHH, October / 29
25 Simulation & Analytical Model: Parameters The Trickle settings for the following results are: τ L = 2 s τ H = 32 s K = 1, 3, or 9 Becker: FFV, TUHH, October / 29
26 Simulation & Analytical Model: Line 9, K = 1 Nodes consistent P(T t) Model Time to Consistency (cdf) (#Nodes: 9, K: 1) Model Time t [s] Distance [m] analytical simulated Becker: FFV, TUHH, October / 29
27 Simulation & Analytical Model: Line 9, K = 3 Nodes consistent P(T t) Model Time to Consistency (cdf) (#Nodes: 9, K: 3) Model Time t [s] Distance [m] analytical simulated Becker: FFV, TUHH, October / 29
28 Nodes consistent P(T t) Simulation & Analytical Model: Line 9, K = 9 Model Time to Consistency (cdf) (#Nodes: 9, K: 9) Model Time t [s] Distance [m] analytical simulated Becker: FFV, TUHH, October / 29
29 Simulation & Analytical Model: Line 16, K = 3 Nodes consistent P(T t) Model Time to Consistency (cdf) (#Nodes: 16, K: 3) Model Time t [s] Distance [m] analytical simulated Becker: FFV, TUHH, October / 29
30 Simulation & Analytical Model: Line 25, K = 3 Nodes consistent P(T t) Model Time to Consistency (cdf) (#Nodes: 25, K: 3) Model Time t [s] Distance [m] analytical simulated Becker: FFV, TUHH, October / 29
31 Simulation & Analytical Model: Grid 9, K = 3 Nodes consistent P(T t) Model Time to Consistency (cdf) (#Nodes: 9, K: 3) Model Time t [s] Distance [m] analytical simulated Becker: FFV, TUHH, October / 29
32 Simulation results and 95% confidence intervals Nodes consistent P(T t) Model Time to Consistency (cdf) (#Nodes: 9, K: 3) 95 % Confidence Interval Distance [m] Model Time t [s] Becker: FFV, TUHH, October / 29
33 Trickle/Push Comparison Trickle Push t push = 3 s t push = 5 s t push = 39 s t 95% 29.4 s 27.9 s 36.4 s s t max 34.9 s 33.0 s 47.0 s s Packets until consistent Packets in steady state s s 20 1 s s Trickle Settings: τ L = 2s, τ H = 32s, K =3 Scenario: Grid with 100 nodes Becker: FFV, TUHH, October / 29
34 Conclusions & Outlook Conclusions Implemented and studied the Trickle algorithm Important algorithm for RPL and distribution of other information Distributes faster and more-efficient than fixed-interval pushing First analytical model of Trickle algorithm Model for delay distribution was shown here Model for number of sent packets exists as well Analytical delay model fits simulation results Outlook Execute measurements and compare against simulation and analytical model Becker: FFV, TUHH, October / 29
www.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
ZigBee IP Network Performance, Part I Unicast Messaging under SEP2.0 HAN Messaging Profile
Document Part Number 53-301017 Rev 0.1 April 2013 ii Exegin Technologies Limited Printed in Canada The information in this document is subject to change without notice. No part of this document may be
Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph
Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
6LoWPAN: An Open IoT Networking Protocol
6LoWPAN: An Open IoT Networking Protocol OpenIoT Summit 2016 San Diego Stefan Schmidt [email protected] 1 6LoWPAN: An Open IoT Networking Protocol Open: Specified by the IETF Specifications available
Internet of Things based approach to Agriculture Monitoring
Internet of Things based approach to Agriculture Monitoring A. Paventhan ERNET India Regional Centre, Bangalore Asia-Pacific Advanced Network (APAN) 36th Meeting 20th August 2013 1 / 19 Outline 1 IP-based
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for
6PANview: A Network Monitoring System for the Internet of Things
6PANview: A Network Monitoring System for the Internet of Things 23-August-2011 Lohith Y S, Brinda M C, Anand SVR, Malati Hegde Department of ECE Indian Institute of Science Bangalore Funded by DIT, Government
Route Discovery Protocols
Route Discovery Protocols Columbus, OH 43210 [email protected] http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF
Overview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features
Overview Lecture 16: IP variations: IPv6, multicast, anycast Next generation IP: IPv6 6lowpan and the Internet of Things IP multicast IP anycast Practical considerations throughout I think we have a problem
Thingsquare Technology
Thingsquare Technology Thingsquare connects smartphone apps with things such as thermostats, light bulbs, and street lights. The devices have a programmable wireless chip that runs the Thingsquare firmware.
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents
VOL. 4, NO. 5, August 2014 ISSN 2222-9833 ARPN Journal of Systems and Software 2009-2012 AJSS Journal. All rights reserved
RPL Routing Protocol in Smart Grid Communication 1 Ahmad Reza Parnian, 2 Mohammad Rafie Kharazmi, 3 Reza Javidan 1, 2, 3 Computer Engineering and IT Department, Shiraz University of Technology, Iran ABSTRACT
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
Robust protocols for the Industrial Internet of Things
Robust protocols for the Industrial Internet of Things Elvis Vogli Politecnico di Bari,Telematics Lab - Dipartimento di Ingegneria Elettrica e dell Informazione Via Edoardo Orabona 4, 70125 Bari, Italy
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
CS335 Sample Questions for Exam #2
CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to
CSE331: Introduction to Networks and Security. Lecture 8 Fall 2006
CSE331: Introduction to Networks and Security Lecture 8 Fall 2006 Announcements Reminders: Project I is due on Monday, Sept. 25th. Homework 1 is due on Friday, Sept. 29th. CSE331 Fall 2004 2 Internet Protocol
Charter Text Network Design and Configuration
MIF Charter update proposal MIF WG Charter update proposal summary http://www.ietf.org/mail-archive/web/mif/current/msg02125.html Specific deliverables listed MPVD architecture document Requirement for
Smart Cities are the Internet of Things
June 20th, 2013 Smart Cities are the Internet of Things Zach Shelby, Chief Nerd 1 About Sensinode Vision The Internet of Things (IoT) is the next evolution of the Internet where devices of all types and
Internet of Things 2015/2016
Internet of Things 2015/2016 The Things Johan Lukkien John Carpenter, 1982 1 What makes up the IoT? IoT versus WSN What are examples? Guiding questions 2 Some definitions of IoT (march 2015) Whatis.com:
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF
Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.
Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City
Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City A. Lavric 1, V. Popa 2 PhD.,Computers, Department of Electronics and Automation,
NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP
Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses
Definition. A Historical Example
Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
BGP overview BGP operations BGP messages BGP decision algorithm BGP states
BGP overview BGP operations BGP messages BGP decision algorithm BGP states 1 BGP overview Currently in version 4. InterAS (or Interdomain) routing protocol for exchanging network reachability information
Computer Networks. Data Link Layer
Computer Networks The Data Link Layer 1 Data Link Layer Application Transport Network DLL PHY 2 What does it do? What functions it performs? Typically: Handling transmission errors, a.k.a., error control.
Routing Protocols (RIP, OSPF, BGP)
Chapter 13 Routing Protocols (RIP, OSPF, BGP) INTERIOR AND EXTERIOR ROUTING RIP OSPF BGP 1 The McGraw-Hill Companies, Inc., 2000 1 Introduction Packets may pass through several networks on their way to
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
Routing with OSPF. Introduction
Routing with OSPF Introduction The capabilities of an internet are largely determined by its routing protocol. An internet's scalability, its ability to quickly route around failures, and the consumption
Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)
School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit
Optimized Load Balancing Mechanism Using Carry Forward Distance
Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,
Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things
Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Johanna Nieminen (Nokia), Future Internet SHOK preconference 30.05.2012 IoT Taxonomy ZigBee 802.5.4 Bluetooth Video RFID
LOADng Routing Protocol Evaluation for Bidirectional Data flow in AMI Mesh Networks
Routing Protocol Evaluation for Bidirectional Data flow in AMI Mesh Networks Saida ELYENGUI, Riadh BOUHOUCHI 2, Tahar EZZEDINE 3.2.3 Communication System Laboratory Sys'Com, National Engineering School
OPNET Network Simulator
Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,
Load Balanced Routing for Low Power and Lossy Networks
MITUBIHI ELECTRIC REEARCH LABORATORIE http://www.merl.com Load Balanced Routing for Low Power and Lossy Networks Liu, X.; Guo, J.; Bhatti, G.; Orlik, P.; Parsons, K. TR13-37 April 13 Abstract The RPL routing
VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs
VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs Said El brak Mohammed Bouhorma Anouar A.Boudhir ABSTRACT Voice over IP (VoIP) has become a popular Internet
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather
IP Multicasting. Applications with multiple receivers
IP Multicasting Relates to Lab 10. It covers IP multicasting, including multicast addressing, IGMP, and multicast routing. 1 Applications with multiple receivers Many applications transmit the same data
Network (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 [email protected],
Key requirements for Interoperable IoT systems
Key requirements for Interoperable IoT systems Pratul Sharma Technical Marketing Manager, ARM Inc. May/08/2014 Agenda Why Interoperability? Open standards for interoperability Data Communication Standards
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Computer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
IP interconnect interface for SIP/SIP-I
Page INTERCONNECT SPECIFICATION Public 1 (7) IP interconnect interface for SIP/SIP-I 0 Document history... 2 1 Scope... 2 2 References... 2 3 Definitions/Acronyms... 3 4 IP Interconnect specification...
Isolines: Energy-efficient Mapping in Sensor Networks
Isolines: Energy-efficient Mapping in Sensor Networks Ignacio Solis and Katia Obraczka {isolis, katia}@cse.ucsc.edu Computer Engineering Department University of California, Santa Cruz April 15, 2005 Abstract
Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol
th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar
ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1
ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled
IoT for surveillance applications!
! IoT for surveillance applications!! (and how to connect & schedule them)! EU-SEA workshop and cooperation on IoT and open platforms! January 25th, 2015!! IEEE RIVF 2015, Can Tho, Vietnam! Prof. Congduc
Using IPv6 and 6LoWPAN for Home Automation Networks
Using IPv6 and 6LoWPAN for Home Automation Networks Thomas Scheffler / Bernd Dörge ICCE-Berlin Berlin, 06.09.2011 Overview IPv6 and 6LoWPAN for Home Automation Networks 6LoWPAN Application & Network Architecture
Intelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based
Internetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
Figure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
The OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
OPNET - Network Simulator
Simulations and Tools for Telecommunications 521365S: OPNET - Network Simulator Jarmo Prokkola Project Manager, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,
A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2
A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 Alex Ali Hamidian January 2003 Department of Communication Systems Lund Institute of Technology, Lund University Box 118 S-221 00 Lund
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins
IP Routing Features. Contents
7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................
Troubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
Reduce Cost and Complexity of M2M and IoT Solutions via Embedded IP and Application Layer Interoperability for Smart Objects
Reduce Cost and Complexity of M2M and IoT Solutions via Embedded IP and Application Layer Interoperability for Smart Objects Fabien Castanier STMicroelectronics IPSO Promoter M2M Forum - Milan, May 20,
TCP in Wireless Mobile Networks
TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer
REDUCING PACKET OVERHEAD IN MOBILE IPV6
REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran [email protected] [email protected] Common Mobile
Implementing Existing Management Protocols on Constrained Devices. IETF 81, Quebec, 2011-07-26
Implementing Existing Management Protocols on Constrained Devices Jürgen Schönwälder IETF 81, Quebec, 2011-07-26 1 / 22 SNMP on Constrained Devices 1 SNMP on Constrained Devices 2 NETCONF on Constrained
PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.
Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with
Performance Measurement of Wireless LAN Using Open Source
Performance Measurement of Wireless LAN Using Open Source Vipin M Wireless Communication Research Group AU KBC Research Centre http://comm.au-kbc.org/ 1 Overview General Network Why Network Performance
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor
Analysis of Mobile IP in Wireless LANs
ENSC 835: COMMUNICATION NETWORKS FINAL PROJECT PRESENTATIONS Spring 2011 Analysis of Mobile IP in Wireless LANs www.sfu.ca/~bshahabi Babak Shahabi ([email protected]( [email protected]) 301102998 Shaoyun Yang
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
Location Information Services in Mobile Ad Hoc Networks
Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent
CSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks
Flow-Based Real-Time Communication in Multi-Channel Wireless Sensor Networks Abstract. As many radio chips used in today s sensor mote hardware can work at different frequencies, several multi-channel
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Bluetooth Low Energy
Bluetooth Low Energy Responsable de l épreuve : L. Toutain Tous documents autorisés. Répondez uniquement sur la copie en annexe. Lisez bien tout le document avant de commencer à répondre 1 Bluetooth Low
Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices
Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer
