Capability and Fidelity of Mote-class Wireless Sniffers
|
|
|
- Constance George
- 10 years ago
- Views:
Transcription
1 Capability and Fidelity of Mote-class Wireless Sniffers Jordan Cote, Bing Wang, Wei Zeng, Zhijie Shi Computer Science & Engineering Department University of Connecticut, Storrs, CT USA Abstract Monitoring the health of a sensor network is important for maintaining the health and normal operation of the network. For large-scale cost-effective monitoring, using inexpensive motes as sniffers is an attractive choice. In this paper, we quantify the capability and fidelity of mote-class sniffers for sensor network monitoring. In particular, we experimentally quantify the sustainable workload and the accuracy of delay and loss measurements by these types of sniffers. We find that (1) a sniffer can monitor traffic at the rate of 60 packets per second with little buffer overflow, (2) per-hop loss measurements from sniffers exhibit variations but are comparable to those at the receiver and (3) per-hop delay measurements from a sniffer are accurate (the errors are up to 300 µs). Our results indicate that measurement quality by mote-class sniffers is satisfactory for many monitoring purposes. I. INTRODUCTION Wireless sensor networks are used for many applications, including environmental monitoring, health care, emergency or medical response and military reconnaissance. Monitoring the health of a sensor network to quickly detect faulty behaviors and take corrective actions is important for maintaining the health and effective operation of the network. Excessive delay in a sensor network may result in sensor data being irrelevant by the time it reaches the destination. Existing studies use in-band and out-of-band approaches for sensor network monitoring. In-band monitoring uses sensor nodes to monitor themselves and their neighbors (e.g., [1], [2], [3], [4], [5], [6]). Out-of-band monitoring uses dedicated monitoring nodes that are attached to sensor nodes [7], [8] or placed inside the sensor network to monitor nearby sensor nodes [9], [10], [11]. Out-of-band monitoring has several advantages over in-band monitoring: (1) it does not require instrumenting sensor nodes, and hence requires no change to the application; (2) it does not consume scarce resources (e.g., CPU, memory, storage) of the sensor nodes; and (3) it provides a convenient way to monitor per-hop delays and detect abnormal delays without the need for clock synchronization [11], which is critical for time-sensitive applications such as health monitoring and military intelligence 1. For cost-effective large-scale out-of-band monitoring, using inexpensive motes as sniffers is an attractive choice. On the other hand, since motes are simple embedded devices with stringent resources, the amount of workload a 1 Although measuring per-hop delay is straightforward when clocks are synchronized, clock synchronization schemes typically require a large number of message exchanges, which can be very resource consuming [12]. sniffer can handle and the accuracy of the monitoring results is of critical importance. In this paper, we evaluate the capability and fidelity of moteclass sniffers (henceforth simply referred to as sniffers). In particular, we answer the following questions: What workload can a sniffer sustain? How accurate are the loss and delay measurements from a sniffer? Through a combination of experimental and analytical study, we find that (1) a sniffer can monitor traffic at the rate of 60 packets per second with little buffer overflow, (2) per-hop loss measurements from sniffers exhibit variations but are comparable to those at the receiver, and (3) per-hop delay measurements from a sniffer are accurate (the errors are up to 300 μs). To the best of our knowledge, our study is the first quantifying the capability and fidelity of motes for monitoring wireless sensor networks. As related work, the study in [11] proposes a monitoring architecture that uses sniffers to monitor delays in a wireless sensor network. The measurements, however, are coarsegrained (with granularity in milliseconds), and are compared to measurements obtained from sensor nodes (by instrumenting those nodes). In this study, measurements from the sniffers are of much finer granularity (to 30.5 μs), and the results are compared to those from a logical analyzer with accuracy to 100 ns. Furthermore, this study covers a broader scope including quantifying the sustainable workload and the accuracy of delay and loss measurements. In this regard, our study also differs from [13] which focuses on characterizing per-hop and endto-end delays in a sensor network. Several studies investigate the accuracy and fidelity of IEEE sniffers [14], [15]. Our study differs from them in that we focus on mote-class sniffers using IEEE The rest of the paper is organized as follows. Section II describes our methodology. Section III presents our results starting with sustainable workload, followed by the accuracy of loss and delay measurements. Finally, Section IV concludes the paper. II. METHODOLOGY We experimentally evaluate the capability and fidelity of mote-class sniffers using a testbed. In the testbed, sensor nodes and sniffers are TelosB motes that use CC2420 wireless transceivers (IEEE ), and run on TinyOS We first describe experimental settings for measuring sustainable workload, and then describe the settings for evaluating the accuracy of loss and delay measurements.
2 (a) (b) TABLE I: Network packet payload structure. Bytes Data 2 Original Sender ID 2 Current Sender ID 2 Sequence Number 1 Number of Hops Traveled 4 Timestamp (c) Fig. 1: Experimental testbed layouts: (a) setting to measure sustainable workload, (b) setting to evaluate the fidelity of loss measurements, and (c) setting to evaluate the fidelity of delay measurements. In the figure, M 1 and M 2 are sniffers, BG TX, BG RX, N 1, N 2 and N 3 are motes, PC 1 and PC 2 are computers, and LA is a logical analyzer. A. Sustainable Workload Measurements Fig. 1(a) shows the experimental setting for measuring sustainable workload at the sniffers. It consists of a transmitter and receiver, BG TX and BG RX, two sniffers, M 1 and M 2, and two PCs. Each sniffer is connected to a PC via USB. The transmitter sends packets to the receiver with inter-sending times following an exponential distribution (i.e., creating a Poisson arrival process at the sniffers). This traffic is referred to as background traffic. It simulates traffic from a large number of virtual nodes. These virtual nodes may be generating packets or simply relaying already transmitted packets to other nodes. To ensure exponential transmission interval, retransmission and CSMA (Carrier Sense Multiple Access) were disabled in BG TX. The minimum sending time of the motes imposes a lower bound on the effective distribution of inter-packet arrival times. The sniffers passively listen to packet transmissions in their neighborhoods. Upon overhearing a packet from N 1 or BG TX, a sniffer modifies the timestamp field to contain the current time and passes the packet over USB into a data log stored at the connected PC. The sniffer cannot use internal flash memory to store the data log because it takes roughly 20 ms to commit a packet to flash, while the inter-arrival time of packets at the sniffer can be smaller than 20 ms. The granularity of the timestamps is approximately 30.5 μs (by using a 32 khz clock). Using two sniffers allows us to validate whether the measurements by the sniffers are consistent (to avoid measurement errors caused by hardware or software inconsistencies of the sniffers). Our goal is to measure the workload that can be sustained by the sniffers. For this purpose, we gradually increase the sending rate of BG TX from 5 packets to around 60 packets per second (by decreasing the mean inter-sending time from 200 ms to 15 ms), and measure the corresponding loss rate at the sniffer. The losses at the sniffer are mainly due to receiver buffer overflow (there is a single traffic source in our testbed and the testbed is in an isolated lab with little other sources of interference). The receiver buffer uses FIFO (first-in-firstout) scheduling. It overflows when a packet arrives and cannot be accommodated in the buffer. Interestingly, we find that, according to the TinyOS source code, when buffer overflow occurs, the buffer is flushed along with all the frames that are in the buffer. We verify that indeed multiple packets are lost when the buffer overflows through a program that signals when the overflow event occurs. This flushing behavior differs from common queuing models, a point we will return to in Section III. B. Loss Measurements Fig. 1(b) shows the experimental setting for evaluating the fidelity of loss measurements by the sniffers. It extends the setting in Fig. 1(a) to include two network nodes, N 1 and N 2. These two nodes form a one-hop network running Collection Tree Protocol (CTP) [16], a widely used routing protocol for data collection in sensor networks. Node N 1 transmits one packet per second to the sink N 2 ; each packet carries an 11- byte payload with the fields shown in Table I. We refer to the traffic from N 1 to N 2 as foreground traffic. The two monitors, M 1 and M 2 passively log the foreground and background traffic, and count the number of packets lost in the foreground traffic. In this case, we do not connect the sniffers to PCs as in Fig. 1(a) to eliminate the overhead of sending logs from the sniffers to the PCs. Losses are determined by the absence of expected sequence numbers. At the end of the experiment, we download the number of foreground packet losses observed by the sniffers, and we compare them to the number of losses observed by the receiver N 2. We vary the
3 Fig. 2: MCU pin logical timing pattern for the two-hop network as shown in Fig.1(c). intensity of background traffic to evaluate the accuracy of loss measurements by the sniffers under different workloads. C. Delay Measurement For a network path, a sniffer can obtain a relative delay on the first hop and the absolute delays on all later hops [11]. We experimentally evaluate the fidelity of the delay measurements using the setting shown in Fig. 1(c). This setting adds one more sensor node, N 3, and a logic analyzer to the setting in Fig. 1(b). The three network nodes, N 1, N 2 and N 3,forma two-hop network running CTP. Node N 1 sends one packet per second to N 3 through N 2. All three nodes are connected to the logic analyzer via probes, and the logical analyzer is connected to a PC using USB. Sniffers M 1 and M 2 obtain the delays on the first hop (N 1,N 2 ), and the second hop (N 2,N 3 ) from the overheard foreground traffic and transmit this information via USB to PC 1 and PC 2, respectively, in an online fashion. By varying the rate of background traffic, we evaluate the accuracy of delay measurements by the sniffers under different workloads. The logic analyzer is a 34-channel Intronix LA1034 device. It provides a sampling rate of 10 MHz, giving 100 ns accuracy, much finer than the accuracy of the sniffers. Furthermore, by connecting the analyzer to multiple motes, we obtain timestamp events from the motes based on a single clock. These timestamps, as to be described, can be conveniently used to obtain objective and accurate per-hop delays. We therefore use the delay measurements from the logical analyzer as the ground truth to evaluate the delay measurements from the sniffers. We next describe how the logical analyzer obtains timestamps and per-hop delays in more detail. The Logicport application is used with the logic analyzer to record the timestamps of packet events in the sensor nodes. This is accomplished by using the MCU pin 2.6 of the MSP430 microprocessor on the motes (as in [13]). More specifically, N 1 raises the pin to a logical high when it begins to transmit, and lowers it to a logical low when it finishes transmitting. N 2 raises the pin when a packet is received and lowers it when it completes transmission. For N 2, the CTP code was augmented in order to accomplish this. In particular, the SubSend.sendDone event was modified. For N 3, the pin is also raised upon receiving a packet, and lowered again when the packet information is committed to flash memory. Fig. 2 shows the logical pattern for these pins, where t 1 and t 1 represent respectively the time when a packet is being sent from N 1 at the application level and when it is done transmitting; t 2 and t 2 represent respectively the time when N 2 receives the packet and finishes forwarding; t 3 and t 3 represent respectively the time when N 3 receives the packet and finishes committing to the flash memory. All the timing events are transmitted to a PC that is connected to the logical analyzer via USB. Using the recorded timestamps at the logical analyzer, we can easily obtain per-hop delays. More specifically, we use (t 1 t 1 ) as the delay on the first hop (since radio propagation delay is negligible, t 1 is also the time that the packet reaches N 2 ). For the second hop, we can use (t 2 t 1), (t 3 t 2 ),or (t 2 t 2 ) as the delay on that hop. M 1 and M 2 can obtain a relative delay on the first hop, which can be used to detect abnormal delays [11]. This relative delay differs from the absolute delay by a constant. M 1 and M 2 can obtain the absolute delay on the second hop as follows. Suppose the sniffer overhears the transmission of a packet from N 1 at time s 1 (according to the sniffer s local clock), and overhears the forwarding of the packet from N 2 at time s 2. Then it obtains the delay on the second hop as (s 2 s 1 ). 2 In Section III-C, we evaluate the measured delays from the sniffers with the various delays measured from the logical analyzer. Each data log file at the logical analyzer contains a series of timestamps along with the associated state of all probes at that time. Logicport automatically compresses the entries so that the only entries in the log are ones for which some signal has changed. Note that although each packet carries a unique sequence number, the logic analyzer only records logical highs and lows, and cannot record the sequence number for a given packet event. On the other hand, since the logical analyzer is connected to N 1 (the source node) through probes, we expect it to record the transmission of all the packets from N 1, which can than be used to sequence the timing logs. To verify this, we program the sink, N 3 to raise a separate pin (MCU pin 2.3) on even packet numbers only (based on the sequence number embedded in the packets). Each log file is checked to be in order by comparing the expected sequence number with the even signal. If the signal does not match, a warning is issued to indicate that a packet was lost from N 1. During compilation of our resultant data set, this warning did not occur. The expected signal pattern is then checked with regular expressions to retrieve timestamps. If the pattern is not satisfied, then the analysis code tries to determine what happened. If N 3 s signal was never raised, then the packet was lost. It is then checked whether or not N 1 s signal remained high until the end of the log. If so, then it did not complete sending the packet and the loss is marked at hop one. Otherwise, the packet is marked lost on the second hop. 2 This is because, since radio propagation delay is negligible, N 2 receives the packet at s 1, starts to forward it at s 1,andN 3 receives the packet at s 2, and hence (s 2 s 1 ) represents the delay from sending the packet from N 2 to N 3.
4 III. RESULTS We now present experimental results on sustainable workload and accuracy of loss and delay observations at the sniffers. Each experiment runs for 20 minutes. Unless otherwise specified, we use the measurements from sniffer M 1 (the measurements from M 2 are similar). A. Sustainable Workload We first quantify how much workload a sniffer can sustain. For this purpose, we increase the average sending rates from 5 to around 60 packets per second in the setting shown in Fig. 1(a). Table II 3 records the number of lost packets in each experiment (the third column). We observe very few losses even when the average sending rate is 60 packets per second, indicating that the sniffer is reliable for capturing the traffic. Furthermore, the loss count for both sniffers is the same. The losses seem to be due to buffer overflows at the sniffer. To gain additional insights, we use a queuing model to approximate the number of losses at the sniffer. To achieve this, we first measure the processing time of a packet at the sniffer. In particular, we want to know the length of time from when a packet arrives at the buffer to when the packet is removed from the buffer. We use a modified sniffer program to clock this length of time by subtracting two timestamps: the first is taken when the CC2420 wireless chip sets the SFD (start of frame delimiter) pin high, and the second timestamp is taken when the receive event is triggered by the CC2420 driver code. Our measurements show that this duration is typically 4.4 ms with little variance. We next calculate the maximum number of packets that can fit inside the receive buffer at the sniffer (which serves as the queue length). Our background packets carry a payload of 20 bytes. With the added MAC and PHY layer data of 18 bytes [13], the total size of one packet stored in the RXFIFO buffer is 38 bytes. Given that the size of the RXFIFO buffer is 128 bytes on a Chipcon CC2420 wireless transceiver, only three packets may reside in the queue before it overflows. Because the arrival process follows a Poisson distribution, the processing time at the sniffer is constant, and the buffer at the sniffer can hold three packets, we model the sniffer as an M/D/1/3 queue. We then obtain the probability of buffer overflow from the queuing model [17]. The analytical results from the model are also shown in Table II (the fourth column). They tend to match well with the experimental results for varying sending rates. It may seem that the experiment should produce more losses, since the RXFIFO buffer is flushed on overflow - causing two more losses each time. However, this is overcome by the fact that the model s state does not return to the empty state of the queue after loss (it remains in state 3). Because of this, losses are more likely in the model until the service unit has time to clear the queue. 3 The table shows measured inter-sending time. Due to random delays at the sender, the measured delay does not coincide exactly with the value we set. TABLE II: Sustainable workload measurement results. Inter-sending time Total Packets Lost Packets Lost Packets (M 1 = M 2 ) (analysis) 16.2 ms ms ms ms ms ms ms ms ms TABLE III: Number of foreground packet losses. (1101 total packets) Inter-sending Lost Pkts. Lost Pkts. Lost Pkts. Collisions time (background) (N 2 ) (M 1 ) (M 2 ) (analysis) 200 ms ms ms B. Accuracy of Loss Measurements We next evaluate the accuracy of loss measurements by the sniffers. For this purpose, we increase the average sending rate of the background traffic from 5 to 20 packets per second in the setting shown in Fig. 1(b), and compare the number of foreground losses seen by the receiver and the two sniffers in each experiment. In addition, we calculate the number of collisions between foreground and background packets as follows. Let λ denote the average arrival rate of background traffic, and t denote the duration during which a foreground packet is propagating through the air. Since the generation of background packets follows a Poisson distribution, the probability that a foreground packet collides with background packets is 1 e λt (i.e., the probability that a background packet is transmitted during interval t), and hence the average number of collisions for n foreground packets is n(1 e λt ). In our experiments, the total frame size of a foreground packet is = 29 bytes, or 232 bits. The maximum transmission rate of the CC2420 is 250 kbps. We therefore approximate t as 232/250 ms. Table III shows the number of foreground packet losses at the receiver (i.e., node N 2 ) and the sniffers, and the number of estimated collisions. We observe that the numbers of losses observed by the receiver and the two sniffers are comparable. Furthermore, they are close to the number of estimated collisions, indicating that foreground losses are mainly due to packet collisions. On the other hand, we observe variations between the measurements of the two sniffers, and the receiver. This is due to many reasons, e.g., different location, different interference level, and different properties of the devices, as has been reported in the context of wireless LAN measurements [14], [15]. As expected, in general the number of lost packets increases as the rate of the
5 0.5 M 1 - (t 1 - t 1 ) 0.5 M 1 - M pdf pdf Delay (ms) Fig. 3: Distribution of the first-hop delay measurement errors from sniffer M Delay (ms) Fig. 5: Difference of delay measurements from M 1 and M 2 for the second hop. pdf M 1 - (t 2 - t 1 ) M 1 - (t 3 - t 2 ) M 1 - (t 2 - t 2 ) Delay (ms) Fig. 4: Distribution of the second-hop delay measurement errors from sniffer M 1. background traffic increases. However, this is not always the case, again indicating that loss measurements can be affected by many factors. C. Accuracy of Delay Measurements We evaluate the accuracy of per-hop delay measurements from the sniffer by comparing them with those obtained by the logical analyzer. More specifically, for a network hop, let {d i } denote the sequence of delay measurements from the sniffer, where d i is the delay for the ith packet on this hop. Let {d i } denote the corresponding delay measurements from the logical analyzer. Then the sequence {d i d i } represents the measurement errors of the sniffer. In the following, we present measurement results with no background traffic. We also vary the average sending rate of the background traffic from 5 to 20 packets per second; the findings are similar to those without background traffic, indicating that the delay measurement accuracy is not much affected by the workload at the sniffer. Therefore, those graphs are omitted. Fig. 3 plots the distribution of the measurement errors on the first hop, where the relative delay measurements by the sniffer are based on the approach in [11], and the delays from the logical analyzer are the duration from just before a packet is sent from N 1 to when it is actually sent into the air (i.e., (t 1 t 1 ) in Fig. 2). From the figure, we see that the difference is indeed close to a constant (the distribution is concentrated in a narrow range of around 350 μs, from 7.35 ms to 7.0 ms). On the second hop, we compare the delay measurements from the sniffer with three forms of measurements from the logical analyzer: (i) from when N 1 finishes transmitting the packet to when N 2 finishes transmitting the packet (since radio propagation delay can be ignored, the former corresponds to the time that N 2 receives the packet and the latter corresponds to the time that N 3 receives the packet; this is (t 2 t 1) in Fig. 2), (ii) from when N 2 receives / starts to transmit the packet to when N 3 receives the packet (i.e., (t 3 t 2 ) in Fig. 2), and (iii) from when N 2 receives / starts to transmit the packet to when it finishes transmitting the packet (i.e., (t 2 t 2 ) in Fig. 2). Fig. 4 plots the distributions of the measurement errors. We observe that the delay measurements from the sniffer are closer to the first two forms of measurements from the logical analyzer (with errors up to 300 μs), while errors are larger compared to the third form of measurements. This is because the third form of measurements neglects the delay due to N 3 s post-receive processing, and hence leads to lower (and less accurate) delay values. We also observe from Fig. 4 that the errors are biased towards being positive (i.e., the delays measured by the sniffer are typically larger than the corresponding delays from the logical analyzer). This is because the sniffer needs to process each captured packet (e.g., adding timestamp, placing it into a USB packet, and transmitting it to the PC), which incurs additional delay. When this delay occurs after receiving the first hop transmission, the mote may not be able to finish before the second hop transmission arrives. In this case, the delay is artificially
6 increased because the microprocessor is busy. So far, we have only presented the results from sniffer M 1. We now compare the delay measurements of the two sniffers. Fig. 5 plots the distribution of the relative difference of the second-hop delays measured from the two sniffers. We observe a symmetric distribution in a narrow range of [-100,100] μs, indicating that the measurements at the two sniffers are close to each other. On the first hop, the delay measurements from these two sniffers are off by a constant (which is related to clock skews of these two sniffers) [11]. We verify that the relative difference is indeed in a narrow range, close to a constant (figure omitted). IV. CONCLUSIONS In this paper, we experimentally explored the capability and fidelity of mote-class sniffers for sensor network monitoring. We quantified the sustainable workload experimentally, and approximated the buffer overflow probability using a queuing model. Furthermore, we compared per-hop loss measurements by the sniffers and the receivers. Last, we compared fine-grain timing measurements from the sniffers to those from a logic analyzer to evaluate the accuracy of delay measurements. We find that a sniffer can monitor traffic at the rate of 60 packets per second with little buffer overflow. We also showed that per-hop loss measurements from sniffers exhibit variations but are comparable to those at the receiver and that per-hop delay measurements from a sniffer are accurate (with errors up to 300 μs). Our results indicate that measurement quality by mote-class sniffers is satisfactory for many monitoring purposes. As future work, we will pursue in three directions: (1) conduct experiments over other mote platforms, e.g., MicaZ, Imote2, and compare the loss and delay characteristics as well as capability and fidelity of different mote platforms, (2) conduct experiments over large-scale networks (instead of using simulated background traffic), and (3) conduct similar experiments in conjunction with electromagnetic interference from other consumer or industrial devices. V. ACKNOWLEDGMENTS This work was supported in part by NSF CAREER Awards and It was additionally supported by DOE GAANN Program Award P200A We would like to thank W. Wei and M. Zink for helpful discussion, as well as the anonymous reviewers for their comments and suggestions. REFERENCES [1] J. Zhao, R. Govindan, and D. Estrin, Residual energy scans for monitoring wireless sensor networks, in Proc. of IEEE Wireless Communications and Networking Conference (WCNC), March [2] G. Tolle and D. Culler, Design of an application-cooperative management system for wireless sensor networks, in Proc. of European Workshop on Sensor Networks (EWSN), January [3] N. Ramanathan, K. Chang, R. Kapur, L. Girod, E. Kohler, and D. Estrin, Sympathy for the sensor network debugger, in SenSys, November [4] S. Rost and H. Balakrishnan, Memento: A health monitoring system for wireless sensor networks, in IEEE SECON, September [5] M. Wachs, J. I. Choi, J. W. Lee, K. Srinivasan, Z. Chen, M. Jain, and P. Levis, Visibility: A new metric for protocol design, in SenSys, November [6] V. Krunic, E. Trumpler, and R. Han, NodeMD: diagnosing node-level faults in remote wireless sensor systems, in MobiSys, June [7] M. Dyer, J. Beutel, T. Kalt, P. Oehen, L. Thiele, K. Martin, and P. Blum, Deployment Support Network - a toolkit for the development of WSNs, in European Conference on Wireless Sensor Networks, January [8] N. Sharma, J. Gummeson, D. Irwin, and P. Shenoy, SRCP: Simple remote control for perpetual high-power sensor networks, in European Conference on Wireless Sensor Networks, February [9] F. Dressler, R. Nebel, and A. Awad, Distributed passive monitoring in sensor networks, in Proc. of IEEE INFOCOM, May poster. [10] M. Ringwald, K. Romer, and A. Vitaletti, Passive inspection of sensor networks, in Conference on Distributed Computing in Sensor Systems, June [11] W. Zeng, X. Chen, Y.-A. Kim, Z. Bu, W. Wei, B. Wang, and Z. J. Shi, Delay monitoring for wireless sensor networks: An architecture using air sniffers, in Proceedings of IEEE MILCOM, (Boston, MA), October [12] F. Sivrikaya and B. Yener, Time synchronization in sensor networks: a survey, IEEE Network, vol. 18, no. 4, [13] A. Ageev, D. Macii, and D. Petri, Experimental characterization of communication latencies in wireless sensor networks, in Symposium on Electrical Measurements and Instrumentation, (Florence, Italy), pp , April [14] P. Serrano, M. Zink, and J. Kurose, Assessing the fidelity of COTS sniffers, in Proc. IEEE INFOCOM, (Rio de Janeiro, Brazil), April [15] D. C. Salyers, A. D. Striegel, and C. Poellabauer, Wireless reliability: Rethinking packet loss, in International Symposium on a World of Wireless, Mobile and Multimedia Networks, (Washington, DC, USA), pp. 1 4, IEEE Computer Society, June [16] R. Fonseca, O. Gnawali, K. Jamieson, S. Kim, P. Levis, and A. Woo, Tep 123: The collection tree protocol, August [17] O. Brun and J.-M. Garcia, Analytical solution of finite capacity M/D/1 queues, Journal of Applied Probability, vol. 37, no. 4, pp , 2000.
How To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
DAG based In-Network Aggregation for Sensor Network Monitoring
DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks
Journal of Information Processing Systems, Vol.6, No.4, December 2010 DOI : 10.3745/JIPS.2010.6.4.501 Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Dae-Suk Yoo* and Seung
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation
Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
RT-QoS for Wireless ad-hoc Networks of Embedded Systems
RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
EPMOSt: An Energy-Efficient Passive Monitoring System for Wireless Sensor Networks
Sensors 2014, 14, 10804-10828; doi:10.3390/s140610804 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors EPMOSt: An Energy-Efficient Passive Monitoring System for Wireless Sensor Networks
QoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
Figure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
Performance Monitoring and Control in Contention- Based Wireless Sensor Networks
Performance Monitoring and Control in Contention- Based Wireless Sensor Networks Thomas Lindh #1, Ibrahim Orhan #2 # School of Technology and Health, KTH Royal Institute of Technology Marinens vag 30,
How To Create A Time Synchronization Protocol With Low Latency Data Collection
Time Synchronization for Predictable and Secure Data Collection in Wireless Sensor Networks Shujuan Chen, Adam Dunkels, Fredrik Österlind, Thiemo Voigt Swedish Institute of Computer Science {shujuan,adam,fros,thiemo}@sics.se
Latency on a Switched Ethernet Network
Application Note 8 Latency on a Switched Ethernet Network Introduction: This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
A Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
Introduction VOIP in an 802.11 Network VOIP 3
Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
Performance of Symmetric Neighbor Discovery in Bluetooth Ad Hoc Networks
Performance of Symmetric Neighbor Discovery in Bluetooth Ad Hoc Networks Diego Bohman, Matthias Frank, Peter Martini, Christoph Scholz Institute of Computer Science IV, University of Bonn, Römerstraße
Implementation and Performance Evaluation of nanomac: A Low-Power MAC Solution for High Density Wireless Sensor Networks
Implementation and Performance Evaluation of nanomac: A Low-Power MAC Solution for High Density Wireless Sensor Networks Junaid Ansari, Janne Riihijärvi and Petri Mähönen Department of Wireless Networks
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
Mac Protocols for Wireless Sensor Networks
Mac Protocols for Wireless Sensor Networks Hans-Christian Halfbrodt Advisor: Pardeep Kumar Institute of Computer Science Freie Universität Berlin, Germany [email protected] January 2010 Contents
TinySDN: Enabling TinyOS to Software-Defined Wireless Sensor Networks
TinySDN: Enabling TinyOS to Software-Defined Wireless Sensor Networks Bruno T. de Oliveira 1, Cíntia B. Margi 1 1 Escola Politécnica Universidade de São Paulo Departamento de Engenharia de Computação e
How To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
How To Determine The Capacity Of An 802.11B Network
Capacity of an IEEE 802.11b Wireless LAN supporting VoIP To appear in Proc. IEEE Int. Conference on Communications (ICC) 2004 David P. Hole and Fouad A. Tobagi Dept. of Electrical Engineering, Stanford
CSC 774 Advanced Network Security. Outline. Related Work
CC 77 Advanced Network ecurity Topic 6.3 ecure and Resilient Time ynchronization in Wireless ensor Networks 1 Outline Background of Wireless ensor Networks Related Work TinyeRync: ecure and Resilient Time
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks
ENSC 427: Communication Networks Spring 2010 OPNET Final Project Analysis of Voice over IP performance on Wi-Fi networks Group 14 members: Farzad Abasi ([email protected]) Ehsan Arman ([email protected]) http://www.sfu.ca/~faa6
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks
Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks Jian Chen and Victor C.M. Leung Department of Electrical and Computer Engineering The
Chapter 3 ATM and Multimedia Traffic
In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very
A Non-beaconing ZigBee Network Implementation and Performance Study
A Non-beaconing ZigBee Network Implementation and Performance Study Magnus Armholt Email: [email protected] Sakari Junnila Email: [email protected] Irek Defee Email: [email protected] Abstract
The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications
The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications Joshua Ellul [email protected] Overview Brief introduction to Body Sensor Networks BSN Hardware
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless
An experimental test bed for the evaluation of the hidden terminal problems on the IEEE 802.15.5 standard
ITU Kaleidoscope 2014 Living in a converged world - impossible without standards? An experimental test bed for the evaluation of the hidden terminal problems on the IEEE 802.15.5 standard David Rodenas-Herraiz,
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK
Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,
Real-Time (Paradigms) (51)
Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major
Controlled Random Access Methods
Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu [email protected] Communications Laboratory 09.03.2004 Content of Presentation
Voice Service Support over Cognitive Radio Networks
Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,
WiseMAC: An Ultra Low Power MAC Protocol for Multi-hop Wireless Sensor Networks
WiseMAC: An Ultra Low Power MAC Protocol for Multi-hop Wireless Sensor Networks Amre El-Hoiydi and Jean-Dominique Decotignie CSEM, Swiss Center for Electronics and Microtechnology, Inc, Rue Jaquet-Droz
Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph
Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights
Performance Evaluation of The Split Transmission in Multihop Wireless Networks
Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually
other. A B AP wired network
1 Routing and Channel Assignment in Multi-Channel Multi-Hop Wireless Networks with Single-NIC Devices Jungmin So + Nitin H. Vaidya Department of Computer Science +, Department of Electrical and Computer
A NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
Network Performance Monitoring at Small Time Scales
Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA [email protected] Electrical and Computer Engineering Department University
A Multiple Access Protocol for Multimedia Transmission over Wireless Networks
A Multiple Access Protocol for Multimedia Transmission over Wireless Networks Hong Yu and Mohammed Arozullah Department of Electrical Engineering and Computer Science Capitol College, Maryland, USA [email protected]
QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data
QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data Md. Golam Shagadul Amin Talukder and Al-Mukaddim Khan Pathan* Department of Computer Science and Engineering, Metropolitan University, Sylhet,
Image Transmission over IEEE 802.15.4 and ZigBee Networks
MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Image Transmission over IEEE 802.15.4 and ZigBee Networks Georgiy Pekhteryev, Zafer Sahinoglu, Philip Orlik, and Ghulam Bhatti TR2005-030 May
- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of
An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science
2.0 System Description
2.0 System Description The wireless alarm system consists of two or more alarm units within a specified range of one another. Each alarm unit employs a radio transceiver, allowing it to communicate with
AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS
AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,
EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers
EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776
An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 802.11b Networks
An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 82.11b Networks Sachin Garg [email protected] Avaya Labs Research Basking Ridge, NJ USA Martin Kappes [email protected] Avaya Labs Research
A Link-state QoS Routing Protocol for Ad Hoc Networks
A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,
IJMIE Volume 2, Issue 7 ISSN: 2249-0558
Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed
A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed Dmitrii Dugaev, Eduard Siemens Anhalt University of Applied Sciences - Faculty of Electrical,
PERFORMANCE ANALYSIS OF THE IEEE 802.15.4 BASED ECG MONITORING NETWORK
PERFORMANCE ANALYSIS OF THE IEEE 802.15.4 BASED ECG MONITORING NETWORK Xuedong Liang 1,2 1 Department of Informatics University of Oslo Oslo, Norway email: [email protected] Ilangko Balasingham 2 2 The
Duty-Cycle MAC Protocols and Networking Overhaul
RMAC: A Routing-Enhanced Duty-Cycle MAC Protocol for Wireless Sensor Networks Shu Du Amit Kumar Saha David B. Johnson Department of Computer Science, Rice University, Houston, TX, USA Abstract Duty-cycle
IN THIS PAPER, we study the delay and capacity trade-offs
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness
Robust protocols for the Industrial Internet of Things
Robust protocols for the Industrial Internet of Things Elvis Vogli Politecnico di Bari,Telematics Lab - Dipartimento di Ingegneria Elettrica e dell Informazione Via Edoardo Orabona 4, 70125 Bari, Italy
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Analysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
Data Collection in Wireless Sensor Networks for Noise Pollution Monitoring
Data Collection in Wireless Sensor Networks for Noise Pollution Monitoring Luca Filipponi 1, Silvia Santini 2, and Andrea Vitaletti 1 1 Dipartimento di Informatica e Sistemistica A. Ruberti SAPIENZA Università
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps
4 Internet QoS Management
4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control
Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks
Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks Technical Report, December 4 Pradeep Kyasanur Dept. of Computer Science, and Coordinated Science Laboratory, University of Illinois at
Effects of Interrupt Coalescence on Network Measurements
Effects of Interrupt Coalescence on Network Measurements Ravi Prasad, Manish Jain, and Constantinos Dovrolis College of Computing, Georgia Tech., USA ravi,jain,[email protected] Abstract. Several
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
Bluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks
: Deuce-Based Fast Handoff Scheme in IEEE 82.11 Wireless Networks Yuh-Shyan Chen, Chung-Kai Chen, and Ming-Chin Chuang Department of Computer Science and Information Engineering National Chung Cheng University,
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
A Dynamic Reputation Management System for Mobile Ad Hoc Networks
A Dynamic Reputation Management System for Mobile Ad Hoc Networks Eric Chiejina School of Computer Science University of Hertfordshire Hatfield, UK [email protected] Hannan Xiao School of Computer
How To Compare Available Bandwidth On A Network With A Powerline To A Network On A Testbed On A Computer Or Network On An Ipad Or Ipad On A 2Mbb (Or Ipad) On A 4Ghz Network On The
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Path-F3: Improving Accuracy and Network Load in Available Estimation
Cooperative Handoff in Wireless Networks
Cooperative Handoff in Wireless Networks George Athanasiou, Thanasis Korakis and Leandros Tassiulas Dept. of Computer and Communications Engineering, University of Thessaly, Greece Email: [email protected]
Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.
Delay Need for a Delay Budget The end-to-end delay in a VoIP network is known as the delay budget. Network administrators must design a network to operate within an acceptable delay budget. This topic
Internet Infrastructure Measurement: Challenges and Tools
Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with
Technote. SmartNode Quality of Service for VoIP on the Internet Access Link
Technote SmartNode Quality of Service for VoIP on the Internet Access Link Applies to the following products SmartNode 1000 Series SmartNode 2000 Series SmartNode 4520 Series Overview Initially designed
Asynchronous Bypass Channels
Asynchronous Bypass Channels Improving Performance for Multi-Synchronous NoCs T. Jain, P. Gratz, A. Sprintson, G. Choi, Department of Electrical and Computer Engineering, Texas A&M University, USA Table
VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications
VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK [email protected]
