1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.

Slides:



Advertisements
Similar presentations
Approaches, Tools, and Applications Islam A. El-Shaarawy Shoubra Faculty of Eng.
Advertisements

anywhere and everywhere. omnipresent A sensor network is an infrastructure comprised of sensing (measuring), computing, and communication elements.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
CLUSTERING IN WIRELESS SENSOR NETWORKS B Y K ALYAN S ASIDHAR.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Xu Chen Xiaowen Gong Lei Yang Junshan Zhang
Prepared By: Kopila Sharma  Enables communication between two or more system.  Uses standard network protocols for communication.  Do.
Arsitektur Jaringan Terkini
Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.
1 Security and Privacy in Sensor Networks: Research Challenges Radha Poovendran University of Washington
CS 672 Paper Presentation Presented By Saif Iqbal “CarNet: A Scalable Ad Hoc Wireless Network System” Robert Morris, John Jannotti, Frans Kaashoek, Jinyang.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
Self-Organizing Adaptive Networks Hari Balakrishnan MIT Laboratory for Computer Science
01/16/2002 Reliable Query Reporting Project Participants: Rajgopal Kannan S. S. Iyengar Sudipta Sarangi Y. Rachakonda (Graduate Student) Sensor Networking.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
Ch. 1. The Third ICT Wave The Third ICT Wave.
Alex Galis University College London
Energy Efficient Routing and Self-Configuring Networks Stephen B. Wicker Bart Selman Terrence L. Fine Carla Gomes Bhaskar KrishnamachariDepartment of CS.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
COLLABORATIVE SPECTRUM MANAGEMENT FOR RELIABILITY AND SCALABILITY Heather Zheng Dept. of Computer Science University of California, Santa Barbara.
[1] B. Hull, K. Jamieson and H. Balakrishnan, “Mitigating Congestion in Wireless Sensor Networks,” Proceedings of the 2nd International Conference on Embedded.
Distributed Systems Principles and Paradigms
Distributed Computation in MANets Robot swarm developed by James Rice University.
Wireless Networks Breakout Session Summary September 21, 2012.
Campus da FEUP Rua Dr. Roberto Frias, Porto Portugal T F © 2009 Communication.
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
Jason Ernst, University of Guelph 1.  Introduction ◦ Background Information ◦ Motivation for Research / Current Problems  Proposed Solution ◦ Algorithm.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Wireless Sensor Network Wireless Sensor Network Based.
1 Wireless Networks and Services 10 Years Down the Road Ross Murch Professor, Electronic and Computer Engineering Director, Centre for Wireless Information.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Responding to the Unexpected Yigal Arens Paul Rosenbloom Information Sciences Institute University of Southern California.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks ChalermekRameshDeborah Intanagonwiwat Govindan Estrin Mobicom 2000.
What is a Sensor Web ? Abhinav Roongta Wireless Information Networking Group University of Florida March 3, 2004.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
CSC & IS Centrul pentru studiul complexit ă ii Intelligent Systems group ARIA – UBB csc.centre.ubbcluj.ro.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
Networked Embedded and Control Systems WP ICT Call 2 Objective ICT ICT National Contact Points Mercè Griera i Fisa Brussels, 23 May 2007.
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
1 Ubiquitous Computing Nov. 15, 2006 Ki-Joune Li.
High-integrity Sensor Networks Mani Srivastava UCLA.
1 Mobile Computing and Wireless Networking CS 851 Seminar 2002 Fall University of Virginia.
1 CALL 6 Key Action IV Introduction and Action Lines: IV.1.2, IV.2.1, IV.2.2, IV.2.4 Brussels, 16. Jan 2001 Colette Maloney European Commission.
Computer Architecture and Embedded Systems Paul Havinga University of Twente.
Neural Networks and Machine Learning Applications CSC 563 Prof. Mohamed Batouche Computer Science Department CCIS – King Saud University Riyadh, Saudi.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Modeling In-Network Processing and Aggregation in Sensor Networks Ajay Mahimkar The University of Texas at Austin March 24, 2004.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Pervasive Computing Parts of the slides are extracted from those of Profs. Mark Weiser, Deborah Estrin, Akbar Sayeed, Jack Stankovic, Mani Srivastava,
Mobile Computing and Wireless Communication Pisa 26 November 2002 Roberto Baldoni University of Roma “La Sapienza”
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Mobile Systems Availability Integrity and Confidentiality MoSAIC M.O.Killijian, D.Powell, M.Banâtre, P.Couderc, Y.Roudier LAAS-CNRS - IRISA- Eurécom.
Towards ‘Ubiquitous’ Ubiquitous Computing: an alliance with ‘the Grid’ Oliver Storz, Adrian Friday, and Nigel Davies Computing Department, Lancaster University,
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
In the name of God.
Presented by Edith Ngai MPhil Term 3 Presentation
Integrated Energy and Spectrum Harvesting for 5G Wireless Communications submitted by –SUMITH.MS(1KI12CS089) Guided by – BANUSHRI.S(ASST.PROF,Dept.Of.CSE)
COGNITIVE APPROACH TO ROBOT SPATIAL MAPPING
UNIT II –Part 2.
Peer-to-peer networking
A Network Virtual Machine for Real-Time Coordination Services
Net 435: Wireless sensor network (WSN)
TRUST:Team for Research in Ubiquitous Secure Technologies
Ad Hoc and Sensor Networks
Adhoc and Wireless Sensor Networks
A survey on Bio inspired Routing in MANETs
Speaker: Ao Weng Chon Advisor: Kwang-Cheng Chen
Overview: Chapter 2 Localization and Tracking
Presentation transcript:

1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva

PERAD 2007Jose Rolim2 Why sensor networks?  Invisible, everywhere computing  Invisible computing: Tiny Embedded Attached …  Everywhere computing: Wireless Dynamic Configurable Remote Access Adapting …  Sensor Networks seems to be the typical example

PERAD 2007Jose Rolim3 Definition  “Sensor networks are collections of wirelessly interconnected devices with sensing, computing and communication infrastructure that allow us to instrument, observe, and respond to phenomena in the natural environment and physical infrastructure.”

PERAD 2007Jose Rolim4 Some Goals of Pervasive Computing  Invisible technology  Integration of virtual and physical worlds throughout desks, rooms, building, life, society  Take the data out of the information, leaving just an enhanced ability to act

PERAD 2007Jose Rolim5 Situated Networking  Makes use of simple shared context:  Space  Time  Proximity  Participation in the context:  Physical  Out here with us  Many small and large places

PERAD 2007Jose Rolim6 Difficulties of Pervasive Networking  Network explosion  Impossibility of a centralized management  Network heterogeneity (not only sensors but also laptops, servers, etc..)  The use of adapted standard theoretical models, algorithms and protocols is impossible

PERAD 2007Jose Rolim7 Why the Standard Approaches Fail  At the modeling level (ex: limited energy)  At the networking level (ex: scalability)  At the management level (ex: radically distributed)  At the service level (ex: situated nature)

PERAD 2007Jose Rolim8 Our aim:  A communication system supporting millions of localized services in an networked society consisting of billions of heterogeneous nodes, intermittently connected and invisible

PERAD 2007Jose Rolim9 Issues for sensor networking -1  Technology independent models of sensor networking  Dynamic models of sensor distributed computing  Self-organization in sensor networks  Distributed cost sharing mechanisms  Energy management, balancing and complexity formulation  Models of collaboration and competition for resources

PERAD 2007Jose Rolim10 Issues for sensor networking -2  Nature inspired control and adaptation mechanisms  Global impact of the local sensor interactions  Models of ad-hoc deployment  Efficient approach to mobility

PERAD 2007Jose Rolim11 Issues for sensor networking -3  Energy aware algorithms and protocols for:  Self configuration, reconfiguration and localization of sensors  Long vs short range algorithms  Resilience and robustness mechanisms  Pervasive communication for routing, interference and congestion control  Achievement of global tasks via local, event driven interactions

PERAD 2007Jose Rolim12 How to tackle these issues?  Techniques from TCS  Techniques from Game Theory  Techniques from Natural Computing  Techniques from Networking Information Theory  Techniques from Distributed Computing  Most importantly: integration among those techniques

PERAD 2007Jose Rolim13 Techniques from TCS  Examples:  Extended Random Graphs Models  Geometric Approaches  Probabilistic Algorithms  Markov Chains

PERAD 2007Jose Rolim14 Techniques from Game Theory  Examples:  Nash Equilibrium  Game Theoretic Methods for Enforcing Cooperation  Security Issues  Evolutionary Game Theory  Reputation Systems

PERAD 2007Jose Rolim15 Techniques from Natural Computing  Examples:  Adaptation by evolution  Learning from experience  Evolutionary genetics  Biological networks  Complex ecosystems  Swarm intelligence

PERAD 2007Jose Rolim16 Techniques from Distributed Computing  Examples:  Approximate counting  Randomized methods with noisy information  Manets mechanisms- mobility  Obstacle avoidance  Power saving schemes

PERAD 2007Jose Rolim17 Example

PERAD 2007Jose Rolim18 Example 2

PERAD 2007Jose Rolim19 Ex

PERAD 2007Jose Rolim20

PERAD 2007Jose Rolim21

PERAD 2007Jose Rolim22

PERAD 2007Jose Rolim23  Energy cost:  Square of distance

PERAD 2007Jose Rolim24

PERAD 2007Jose Rolim25

PERAD 2007Jose Rolim26 The Problem

PERAD 2007Jose Rolim27 A distributed algorithm

PERAD 2007Jose Rolim28 Illustration

PERAD 2007Jose Rolim29 Stability  Markov Chain

PERAD 2007Jose Rolim30 Mix of techniques  Theory  Game  Natural computing  Network information  Distributed computing  Mix