System Research Perspective - through a Sensys lens Sensys Soap Box David Culler UC Berkeley.

Slides:



Advertisements
Similar presentations
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Advertisements

A DISTRIBUTED CSMA ALGORITHM FOR THROUGHPUT AND UTILITY MAXIMIZATION IN WIRELESS NETWORKS.
PROMETHEUS Intelligent Multi-Stage Energy Transfer System for Near Perpetual Sensor Networks Xiaofan JiangJoseph PolastreDavid Culler Electrical Engineering.
Impact of Interference on Multi-hop Wireless Network Performance
Victor Bahl Joint work with Amer Hassan and Pierre de Vries Microsoft Corporation Spectrum Policy: Property or Commons Stanford Law School March 2, 2003.
All Rights Reserved © Alcatel-Lucent 2006, ##### Design Issues for Wireless Networks Across Diverse and Fragmented Spectrum Collaborators: Bell Labs India:
MultiNet: Connecting to Multiple IEEE Networks Using a Single Radio Ranveer Chandra, Cornell University joint work with: Victor Bahl (MSR) and Pradeep.
ZigBee & TinyOS TinyOS and ZigBee are not competitive
Doc.: IEEE /0046r0 Submission July 2009 Ari Ahtiainen, NokiaSlide 1 A Cooperation Mechanism for Coexistence between Secondary User Networks on.
Energy-Efficient Distributed Algorithms for Ad hoc Wireless Networks Gopal Pandurangan Department of Computer Science Purdue University.
and 6.855J Cycle Canceling Algorithm. 2 A minimum cost flow problem , $4 20, $1 20, $2 25, $2 25, $5 20, $6 30, $
Advanced Computer Networks Fall 2011
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
IEEE Overview 2007/11/28 Chia-Hung Tsai.
Computer Networking Components Chad DuBose ~ Assignment #3 ~ LTEC
anywhere and everywhere. omnipresent A sensor network is an infrastructure comprised of sensing (measuring), computing, and communication elements.
April, 2008, IEEE ISCE Taehong Kim; Sukbin Seo; Chong Poh Kit; Kimseyoo, Y.; Seong-eun Yoo; Daeyoung Kim Experiments on mobile sink application in ZigBee.
IE 2030 Lecture 5: Project Management Drawing Gantt Charts Time on horizontal axis, Activities on vertical axis. 1 bar per activity Length of bar = required.
Data Link Layer B. Konkoth. PDU  Protocol Data Unit  A unit of data which is specified in a protocol of a given layer  Layer 5, 6, 7 – Data  Layer.
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
110/6/2014CSE Suprakash Datta datta[at]cse.yorku.ca CSE 3101: Introduction to the Design and Analysis of Algorithms.
Reflective Practice: What, Who, When, Where, & How
1 Denial of Service in Sensor Networks Authors: Anthony D. Wood, John A. Stankovic Presented by: Aiyaz Amin Paniwala.
Global States.
Technical Guide For Mesh AP – MAP-3120 What’s the difference between Mesh Bridge and AP WDS Bridge?
1 ECE 776 Project Information-theoretic Approaches for Sensor Selection and Placement in Sensor Networks for Target Localization and Tracking Renita Machado.
Exploring Energy-Latency Tradeoffs for Broadcasts in Energy-Saving Sensor Networks AUTHOR: MATTHEW J. MILLER CIGDEM SENGUL INDRANIL GUPTA PRESENTER: WENYU.
Bilge Akdağ & M.Mert Kişman WELCOME TO OUR PRESENTATION.
6LoWPAN Extending IP to Low-Power WPAN 1 By: Shadi Janansefat CS441 Dr. Kemal Akkaya Fall 2011.
Transmission Power Control in Wireless Sensor Networks CS577 Project by Andrew Keating 1.
TDMA Scheduling in Wireless Sensor Networks
Trickle: Code Propagation and Maintenance Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Philip Levis UC Berkeley.
07/24/200769th IETF Meeting - 6LoWPAN WG1 6LoWPAN Interoperability Jonathan Hui Zach Shelby David Culler.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
HYDRO: A Hybrid Routing Protocol for Lossy and Low Power Networks draft-tavakoli-hydro-01 Stephen Dawson-Haggerty, Jonathan Hui, Arsalan Tavakoli.
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
1 Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
Distributed Regression: an Efficient Framework for Modeling Sensor Network Data Carlos Guestrin Peter Bodik Romain Thibaux Mark Paskin Samuel Madden.
Impact of Radio Irregularity on Wireless Sensor Networks
- 1 - Specialized Network Formation: Long-Thin WSNs National Chiao Tung University Department of Computer Science Yu-Chee Tseng 交通大學 / 資訊工程系 / 曾煜棋.
Power saving technique for multi-hop ad hoc wireless networks.
Wireless Video Sensor Networks Vijaya S Malla Harish Reddy Kottam Kirankumar Srilanka.
Empirical Analysis of Transmission Power Control Algorithms for Wireless Sensor Networks CENTS Retreat – May 26, 2005 Jaein Jeong (1), David Culler (1),
ZIGBEE PROTOCOL FOR WIRLEESS SENSOR NETWORK ZIGBEE PROTOCOL FOR WIRLEESS SENSOR NETWORK Research paper Lina kazem
ZigBee. Introduction Architecture Node Types Network Topologies Traffic Modes Frame Format Applications Conclusion Topics.
Efficient and Reliable Broadcast in ZigBee Networks Purdue University, Mitsubishi Electric Lab. To appear in SECON 2005.
中国科学院沈阳自动化研究所 High Reliable Industrial Wireless Sensor Network Shenyang Institute of Automation Chinese Academy of Sciences Haibin.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
WIRELESS COMMUNICATION NETWORKS Modeling and Simulation.
Energy Efficient Routing and Self-Configuring Networks Stephen B. Wicker Bart Selman Terrence L. Fine Carla Gomes Bhaskar KrishnamachariDepartment of CS.
An Introduction Table Of Context Sensor Network PreviewRouting in Sensor NetworksMobility in Sensor Networks Structure and characteristics of nodes and.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
Marginal Value of Multiple Channels in Real World WSNs Jorge Ortiz and David Culler CS262B Final Project.
CROSS-LAYER OPTIMIZATION PRESENTED BY M RAHMAN ID:
Collaborative Sampling in Wireless Sensor Networks Minglei Huang Yu Hen Hu 2010 IEEE Global Telecommunications Conference 1.
1 Deploying Wireless Sensors to Achieve Both Coverage and Connectivity Xiaole Bai*, Santosh Kumar*, Dong Xuan*, Ziqiu Yun +, Ten H. Lai* * Computer Science.
Copyright © 2006, UCD Dublin Systems Research Group School of Computer Science and Informatics UCD Dublin, Belfield, Dublin 4, Ireland
Improving Loss Resilience with Multi- Radio Diversity in Wireless Networks by Allen Miu, Hari Balakrishnan and C.E. Koksal Appeared in ACM MOBICOM 2005,
1 Presented by Jing Sun Computer Science and Engineering Department University of Conneticut.
Heterogeneous Wireless Access in Large Mesh Networks Haiping Liu, Xin Liu, Chen-Nee Chuah, Prasant Mohapatra University of California, Davis IEEE MASS.
Source : 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) Auther : Nacer Khalil, Mohamed.
Author : Peng Han, Jinkuan Wang, Yinghua Han, and Qiang Zhao Source : 2012 IEEE International Conference on Information Science and Technology Wuhan, Hubei,
Dominik Kaspar, Eunsook Kim, Carles Gomez, Carsten Bormann
Trickle: Code Propagation and Maintenance
CS 457 – Lecture 7 Wireless Networks
6LoWPAN Interoperability
November 18 July 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Task Group 4e definitions Date.
Ubiquitous Computing Vision - continued
Presentation transcript:

System Research Perspective - through a Sensys lens Sensys Soap Box David Culler UC Berkeley

11/8/2007Sensys Soapbox 2 A System Research formula Imagine a plausible future Create an approximation of that vision using technology that exists. Discover what is True in that world –Empirical experience »Bashing your head, stubbing your toe, rubbing your nose in it –Quantitative measurement and analysis –Analytics and Foundations

11/8/2007Sensys Soapbox 3 Sensys – Truths The idle listening problem! Distributed algorithms (e.g, routing) with bounded per- node state and non-trivial change and uncertainty Claim and hold the territory weve gained –areas of important incremental on-going improvement –Low Power MAC, Multihop Forwarding,.. Not enough to just improve from paper to paper Finish the job with standards that matter –Still not a solid dominant MAC –IEEE superframes/beacon broken, Zigbee punted, Wireless HART?, ISA 100 –6LoWPAN format done [RFC4944] but MAC interoperability island Where is the bar? –99% x 10uA + 1% x 10mA => 110 uA is baseline, 20 uA is research goal –99.5-9% reliability over multiple 70% link

11/8/2007Sensys Soapbox 4 Sensys – non-Truths (yet) Excess Redundancy –Given the excess of redundant WSN nodes… –Selective Coverage, Capacity spreading, … In-network processing –At source and dest, but IN? Placement by blowing in the wind –Capacity planning and placement should be easy, but they exist –Points of interest If you want to utilize the excess push the technology to make it real –SOC offerings –Beyond the mote If you want to enable in-network processing, develop and application that actually uses it –Beyond surge (sense and send) Placement assumptions should reflect placement reality

11/8/2007Sensys Soapbox 5 Imagine… The Mote future is already here We understand many of the truths and non-truths in that world Harvest that learning in defining the next future –bold, concise, revolutionary goals to shoot for are invaluable One More Element of Truth – Complexity constraints are even more critical than resource constraints Zillions of unattended, inaccessible networked devices connected to the physical world engaged in critical functions –The have to be simple, robust, reliable, resilient, provable, … Beware Complexity

11/8/2007Sensys Soapbox 6 One more thought Many of the beautiful ideas that necessity has mothered have tremendous value in the rest of the tiers of computing