Lab 3 Routing in Sensor Networks

Slides:



Advertisements
Similar presentations
Security and Sensor Networks By Andrew Malone and Bryan Absher.
Advertisements

* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Introduction to Ad-hoc & Sensor Networks Security In The Name of God ISC Student Branch in KNTU 4 th Workshop Ad-hoc & Sensor Networks.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
10 REASONS Why it makes a good option for your DB IN-MEMORY DATABASES Presenter #10: Robert Vitolo.
MiLAN: Middleware to Support Sensor Network Applications Wendi B. Heinzelman, Amy L. Murphy, Hervaldo S. Carvalho, Mark A. Perillo University of Rochester.
1 Introduction to Wireless Sensor Networks. 2 Learning Objectives Understand the basics of Wireless Sensor Networks (WSNs) –Applications –Constraints.
Urban Sensing Jonathan Yang UCLA CS194 Fall 2007 Jonathan Yang UCLA CS194 Fall 2007.
Generic Sensor Platform for Networked Sensors Haywood Ho.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
1 A Dynamic Clustering and Scheduling Approach to Energy Saving in Data Collection from Wireless Sensor Networks Chong Liu, Kui Wu and Jian Pei Computer.
TinyOS Software Engineering Sensor Networks for the Masses.
Wireless Sensor Network Security Anuj Nagar CS 590.
CS Dept, City Univ.1 Research Issues in Wireless Sensor Networks Prof. Xiaohua Jia Dept. of Computer Science City University of Hong Kong.
Key management in wireless sensor networks Kevin Wang.
Introduction To Wireless Sensor Networks Wireless Sensor Networks A wireless sensor network (WSN) is a wireless network consisting of spatially distributed.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
1 Panda Malware Radar Discovering hidden threats Technical Product Presentation Name Date.
MICA: A Wireless Platform for Deeply Embedded Networks
Gathering Data in Wireless Sensor Networks Madhu K. Jayaprakash.
KAIS T CS712 병렬처리 특강 - 차세대 무선네트워크 응용 및 보안 - Syllabus Network & Security Lab.
Introduction to Wireless Sensor Networks
Work in Progress for Wireless Sensor Networks Yonghe Liu Dept. of Computer Science and Engineering The University of Texas at Arlington.
Sensor Database System Sultan Alhazmi
한국기술교육대학교 컴퓨터 공학 김홍연 Habitat Monitoring with Sensor Networks DKE.
1 Extended Lifetime Sensor Networks Hong Huang, Eric Johnson Klipsch School of Electrical and Computer Engineering New Mexico State University December.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Lecture 8: Wireless Sensor Networks
Ben Miller.  A distributed algorithm is a type of parallel algorithm  They are designed to run on multiple interconnected processors  Separate parts.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Based on slides from Andreas Larsson Table from CY Chong, SP Kumar, BA Hamilton - Proceedings of the IEEE, 2003.
Introduction to Wireless Sensor Networks
788.11J Presentation Volcano Monitoring Deploying a Wireless Sensor Network on an Active Volcano Phani Arava.
Computer Performance. Hard Drive - HDD Stores your files, programs, and information. If it gets full, you can’t save any more. Measured in bytes (KB,
Wireless Sensor Network: A Promising Approach for Distributed Sensing Tasks.
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
- Pritam Kumat - TE(2) 1.  Introduction  Architecture  Routing Techniques  Node Components  Hardware Specification  Application 2.
Sensor Networks © M Jamshidi.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
In the name of God.
Presented by Edith Ngai MPhil Term 3 Presentation
Introduction to Wireless Sensor Networks
Salah A. Aly ,Moustafa Youssef, Hager S. Darwish ,Mahmoud Zidan
Overview of Wireless Networks:
Introduction to Wireless Sensor Networks
Weikuan Yu, Hui Cao, and Vineet Mittal The Ohio State University
Introduction
Wireless Sensor Network Architectures
Aziz Nasridinov and Young-Ho Park*
Introduction to Wireless Sensor Networks
WISENET Wireless Sensor Network
Meng Cao, Xiangqing Sun, Ziyue Chen May 28th, 2014
Wireless Ad-Hoc Networking
Adhoc and Wireless Sensor Networks
SNoD Sensor Networks on Defense Team Members: Kaustubh Supekar Gaurav Sharma Deepti Agarwal Aditya Barve Brijraj Vaghani Seema Joshi Debashis Haldar.
Securing Wireless Sensor Networks
Lecture 3: Wireless Sensor Networks
Lab 3 Routing in Sensor Networks
RM3G: Next Generation Recovery Manager
From Prototype to Production Grid
How New Hardware Has Affected Software Architecture
REED : Robust, Efficient Filtering and Event Detection
Protocols.
Lab 3 Routing in Sensor Networks
Lab 3 Routing in Sensor Networks
Overview: Chapter 2 Localization and Tracking
Protocols.
Presentation transcript:

Lab 3 Routing in Sensor Networks Andreas Larsson 2009-02-20

Part 1 Sensor Networks -- General * The idea of sensor networks - massive distributed system * Deployment * Setting up the network * The nodes themselves * Usage patterns of sensor networks * Examples of current uses

What is a sensor network? ”A sensor network, is a network of small computers placed in an area that we want to collect information from. The computers sense the environment and store, process and/or communicate this information” -------------- * The idea of sensor networks – A massive distributed system A general quick and easy introduction with some nice picture

Big range of Sensor Nodes Table from CY Chong, SP Kumar, BA Hamilton - Proceedings of the IEEE, 2003

Deployment “Sensor networks may be deployed in many different ways. A good way to see it is deployment from the air” The “worst” case => The “general” case We don’t know: Where they end up Which nodes can communicate with each other Which nodes end up in the network Can die in the fall Can end up in a position where they cannot communicate with anyone Battery changes tor practical (many cases): Battery life is very important (Often) Need of refilling the network ------------------------- How sensor networks are deployed. Picture of nodes being thrown out from a helicopter or something like that. Stressing that in the general case we cannot control exactly where nodes end up.

Setting up the network “So after deployment we have nodes over an area without knowing exactly which node is where. Therefore it is up to the nodes to set up a network among themselves and initialize the application they are going to run.” ----------------------------- Sensor Network = Ad Hoc Network

MicaZ Sensor Node CPU 7MHz Program Memory 128 kB RAM 4 kB Storage Memory 512 kB Bandwidth 250 kBps Indoor Range 20-30 m Outdoor Range 75-100 m Battery Life Full operation at all times 50 h Sensor limitations: Limited computation capacity Limited memory capacity Limited storage capacity Limited battery capacity => Normal algorithms often unpractical Ffew fewfe

Usage patterns Sleeping The Main Task Auxiliary Tasks Data gathering Data aggregation Data communication Auxiliary Tasks Synchronization Security

Examples of uses Utility Research Structural health monitoring Agriculture Parking space guidance/monitoring Research Volcanos Permafrost Animal behaviour

Permasense

COMMONSense

The Stork Bridge Transition: These are not only general examples. Detecting volcano eruptions, earthquakes, tsunamis, problems with important infrastructure are significant for crisis management whether there is a malicious intent behind it or not.