Campus da FEUP Rua Dr. Roberto Frias, 378 4200 - 465 Porto Portugal T +351 222 094 000 F +351 222 094 050 © 2009 Communication.

Slides:



Advertisements
Similar presentations
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 9 Fundamentals.
Advertisements

Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
TDMA Scheduling in Wireless Sensor Networks
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
IT 644: Mobile Computing Instructor: Sridhar Iyer Course Page Lecture Hours Tue:
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Madhavi W. SubbaraoWCTG - NIST Dynamic Power-Conscious Routing for Mobile Ad-Hoc Networks Madhavi W. Subbarao Wireless Communications Technology Group.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Summary and Further Reading Part I of 13th.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Lightweight Key Establishment and Management Protocol (KEMP) in Dynamic Sensor Networks draft-qiu-6lowpan-secure-router-01 Ying QIU, Jianying ZHOU, Feng.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
August 18-19, 2002 UCSC Baskin School of Engineering1 UCSC PERC COMPONENT: Protocols for Wireless Internetworks J.J. Garcia-Luna-Aceves Computer Communication.
Topics in Internet Research
1 Last Class! Today: r what have we learned? r where is the networking world going? r question and answers r evaluation.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
Chapter 5 outline 5.1 Introduction and services
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
AD HOC WIRELESS MUTICAST ROUTING. Multicasting in wired networks In wired networks changes in network topology is rare In wired networks changes in network.
VIT UNIVERSITY :: VELLORE
CS 381 Final Exam Study Guide Final Exam Date: Tuesday, May 12 th Time: 10:30am -12:30pm Room: SB 105 Exam aid: 8 ½ x 11 page of notes front and back.
Multicast Routing in Mobile Ad Hoc Networks (MANETs)
Mobile Networking Challenges1 5.6 Mobile Ad Hoc Networks  Ad hoc network does not have any preexisting centralized server nodes to perform packet routing,
1/28/2010 Network Plus Network Device Review. Physical Layer Devices Repeater –Repeats all signals or bits from one port to the other –Can be used extend.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
 Network Segments  NICs  Repeaters  Hubs  Bridges  Switches  Routers and Brouters  Gateways 2.
Apartado Porto Codexwww.inescporto.pt tel (351) fax (351) /April/2005 Research Activities in 4G Networks at INESC Porto.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
Floodless in SEATTLE : A Scalable Ethernet ArchiTecTure for Large Enterprises. Changhoon Kim, Matthew Caesar and Jenifer Rexford. Princeton University.
AKARI New Generation Network Architecture SeungHo Lee.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Routing Protocols in Ad-hoc Networks, OLSR Self configuring systems (SCS) TTM3 – Høst 2004 Jørn Andre Berntzen 22/10/2004.
1 Mobile ad hoc networking: imperatives and challenges Imrich Chlamtac, Marco Conti, Jennifer J.N. Liu MMLAB, Seongil Han
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
Multiuser Receiver Aware Multicast in CDMA-based Multihop Wireless Ad-hoc Networks Parmesh Ramanathan Department of ECE University of Wisconsin-Madison.
Ad Hoc Network.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Wireless Mesh Networks Myungchul Kim
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
PART1: NETWORK COMPONENTS AND TRANSMISSION MEDIUM Wired and Wireless network management 1.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
© Saravanan Kandasamy, Ricardo Morla, and Manuel Ricardo,INESC Porto 1 Improving the Performance of IEEE802.11s Networks using Directional Antennas over.
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Assignment 1  Chapter 1:  Question 11  Question 13  Question 14  Question 33  Question 34  Chapter 2:  Question 6  Question 39  Chapter 3: 
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
Contention-based protocols with Reservation Mechanisms
UNIT-V Transport Layer protocols for Ad Hoc Wireless Networks
Network Layer Goals: Overview:
CSE 4340/5349 Mobile Systems Engineering
Network Virtualization
Mobile ad hoc networking: imperatives and challenges
Data and Computer Communications
Chapter 1. Introduction Data Communications
Subject Name: Adhoc Networks Subject Code: 10CS841
Presentation transcript:

Campus da FEUP Rua Dr. Roberto Frias, Porto Portugal T F © 2009 Communication Networks for Critical Infrastructures - topics under research at INESC Porto Manuel Ricardo DEEC, Faculdade de Engenharia, Universidade do Porto 1Telecommunications and Multimedia Unit

© 2008 Outline What is it? “Sistemas ciber-físicos para inteligência ambiente: redes de sensores em infra-estruturas criticas“ Related research INESC Porto 2Telecommunications and Multimedia Unit

© 2008 Critical infrastructure Critical infrastructure – term used by governments to describe assets essential for functioning of society /economy Infrastructures commonly associated with the term –electricity, gas, oil –telecommunications –water –agriculture, food –public health –transportation –financial services –security services 3Telecommunications and Multimedia Unit

© 2008 Ambient Intelligence Embedding intelligence in everyday objects Object gains the ability to –Gather information from its environment possibly react by adapting its function –Process information –Exchange information with neighbour objects or Internet 4Telecommunications and Multimedia Unit

© 2008 The Intelligent Object Computers are becoming small Common object becoming also a computer 5Telecommunications and Multimedia Unit

© 2008 Ambient Intelligence in Critical Infrastructures Objects of critical infrastructures will become computers New objects (criticality related) will be added to infrastructure As a result, critical infrastructures expected to become efficient, reliable, secure 6Telecommunications and Multimedia Unit

© 2008 The Challenges of Interconnecting Objects Thousands of computing-objects to be interconnected through wireless, auto-configurable, high-bitrate, secure networks –Scalable auto-configurable networks –Intermittent connectivity / mobility –Enabling high bitrates –Network congestion control –Information aware networks –Moving PAN –Secure Networks 7Telecommunications and Multimedia Unit

© 2008 Scalable and Auto-Configurable Networks Plug & play network –Ethernet like network –Big network = big LAN Some network services –DHCP, ARP, IPv6 link local –Routing protocols –Generate broacast traffic  Network becomes congested –Re-design network services to avoid broadcast traffic Using prune + data suppression/compression techniques –Design large virtual Ethernet networks over existing technologies 8Telecommunications and Multimedia Unit Node ARP REQUEST Shortest Path Link Eliminated by STP Node

© 2008 Intermittent Connectivity and Mobility in Large Networks 9Telecommunications and Multimedia Unit Global frequent routing update leads to excessive overhead Ad-hoc routing protocols inadequate for large networks –New routing techniques for wireless and mobile networks –New/lost links reported only to relevant nodes

© 2008 Enabling High Bitrates - Directional Antenna 10Telecommunications and Multimedia Unit Bitrate of a wireless link depends on Bandwidth, Rx power, SINR Directional antenna enables –More received power /longer links –Less interference –More links –What criteria use to form beams? –How to combine on demand-links and routing techniques? beams with multichannel?

© 2008 Enabling High Bitrates – Avoiding Hidden Nodes Wireless networks rely on CSMA/CA shared access mechanisms CSMA/CA performance depends on –Number of nodes –Number of hidden nodes Network topology control reduce number of hidden nodes for less collisions dynamic selection of radio channels 11Telecommunications and Multimedia Unit

© 2008 Network Congestion Control Current congestion control mechanisms –inadequate for variable bitrate media shared media / variable bitrate links –unfair for real-time /short traffic flows –Use of explicit control techniques network nodes control the sources rate –Feedback signal considers nodes congestion and energy –Management of traffic priorities 12Telecommunications and Multimedia Unit

© 2008 Information Aware Networks Application and physical networks are different e.g. P2P application over ad-hoc networks –Define network paths based on link quality, node energy type of information –Network topology constrained by application 13Telecommunications and Multimedia Unit

© 2008 Moving Personal Area Networks Multi-technology PAN Intra/extra PAN connectivity Porto –PoA selected based on user-defined policies –Centralized single tree routing –Adaptive IP autoconfiguration 14Telecommunications and Multimedia Unit

© 2008 Secure Networks Networks need to be secure Security between any pair of nodes –Hierarchical distributed PKI Ephemeral certificates Used to authenticate a node Short public keys  low processing power No revocation lists  support of intermittent connectivity –Secure group communications Authentication by certificates Short symmetric keys Key distribution using multicast techniques 15Telecommunications and Multimedia Unit Cert 2.2  N2.2.1 ({id 2.2.1, pk 2.2.1, t a, t b } pkCA2.2 ) CA 1 CA 2.1 N N N CA 2.2 N Auth ({id 2.2.1, pk 2.2.1, t a, t b } pkCA2.2 ) Network 2.1 Network 2.2 Receiver