A note on the use of these ppt slides: We’re making these slides freely available to all, hoping they might be of use for researchers and/or students.

Slides:



Advertisements
Similar presentations
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs A note on the use of these ppt slides: Were making these slides freely available to all (faculty, students,
Advertisements

8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Dr. Philip Cannata 1 Computer Networking. Dr. Philip Cannata 2.
1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July A note on the use.
A note on the use of these ppt slides: We’re making these slides freely available to all, hoping they might be of use for researchers and/or students.
Department of Information Engineering University of Padova, Italy On the Impact of Fading and Inter-piconet Interference on Bluetooth Performance A note.
13 –Routing Protocols Network Layer4-1. Network Layer4-2 Chapter 4 Network Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd.
Department of Information Engineering University of Padova {fasoloel, zanella, An Effective Broadcast Scheme for Alert Message Propagation.
The Future r There will be a Wireshark TCP homework up on the wiki later today. It will be due Wednesday. r The next test is coming soon – next Wednesday????
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
WPMC 2003 Yokosuka, Kanagawa (Japan) October 2003 Department of Information Engineering University of Padova, ITALY On Providing Soft-QoS in Wireless.
CS 325 Computer Networks Sami Rollins Fall 2003.
Network Layer4-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley,
1 Day 01 - The Internet. 2 Chapter 1 Introduction Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
Network Layer4-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose, Keith Ross Addison-Wesley,
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
6: Wireless and Mobile Networks Wireless LANs.
WCNC 2008 March 31 - April 3 Las Vegas Department of Information Engineering University of Padova, ITALY Throughput and Energy Efficiency of Bluetooth.
Introduction1-1 CS 325 Computer Networks Sami Rollins Fall 2005.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
STOCHASTIC GEOMETRY AND RANDOM GRAPHS FOR THE ANALYSIS AND DESIGN OF WIRELESS NETWORKS Haenggi et al EE 360 : 19 th February 2014.
Chapter 1 Introduction Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
SignetLab 2 : a modular management architecture for wireless sensor networks A note on the use of these ppt slides: We’re making these slides freely available.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Introduction Chapter 1 Introduction Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley,
WPMC 2003 Yokosuka, Kanagawa (Japan) October 2003 Department of Information Engineering University of Padova, ITALY A Soft-QoS Scheduling Algorithm.
COST273, Barcelona, January, 2003 Department of Information Engineering University of Padova, Italy Mathematical Analysis of Bluetooth Energy Efficiency.
Department of Information Engineering University of Padova, Italy COST273 May 30-31, 2002 Helsinki TD (02)-062 A note on the use of these ppt slides: We’re.
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
Department of Information Engineering University of Padova, ITALY Performance Analysis of Limited–1 Polling in a Bluetooth Piconet A note on the use of.
Function Computation over Heterogeneous Wireless Sensor Networks Xuanyu Cao, Xinbing Wang, Songwu Lu Department of Electronic Engineering Shanghai Jiao.
Chapter 3 Transport Layer
Chapter 1 Introduction Circuit/Packet Switching Protocols Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley,
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Introduction1-1 Chapter 1 Computer Networks and the Internet Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose,
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 1 Omar Meqdadi Department of Computer Science and Software Engineering.
Transport Layer3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July A.
WPMC 2003 Yokosuka, Kanagawa (Japan) October 2003 Department of Information Engineering University of Padova, ITALY On Providing Soft-QoS in Wireless.
Self–localization of Wireless Sensor Nodes by means of Autonomous Mobile Robots A note on the use of these ppt slides: We’re making these slides freely.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Before The Canned Slides r What sort of things did you learn from Mikes talk on Friday? r Mini-homework this week: create a wiki page with cross-referenced.
Internet History CS 4244: Internet Programming Dr. Eli Tilevich.
Introduction1-1 Chapter 1 Computer Networks and the Internet Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose,
7 May Performance Comparison of Scheduling Algorithms for Multimedia Traffic over High-Rate WPANs A note on the use of these ppt slides: We’re making.
WPMC 2003 Yokosuka, Kanagawa (Japan) October 2003 Department of Information Engineering University of Padova, ITALY On Providing Soft-QoS in Wireless.
Department of Information Engineering University of Padova, ITALY Mathematical Analysis of IEEE Energy Efficiency. A note on the use of these ppt.
WPMC 2003 Yokosuka, Kanagawa (Japan) October 2003 Department of Information Engineering University of Padova, ITALY Mathematical Analysis of Bluetooth.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
University of Padova Department of Information Engineering On the Optimal Topology of Bluetooth Piconets: Roles Swapping Algorithms A note on the use of.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Chapter 9 Network Management
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Application Layer 2-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Application Layer 2-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A.
Application Layer 2-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Chapter 5 Link Layer A note on the use of these ppt slides:
Chapter 3 Transport Layer
Chapter 3 Transport Layer
Day 01 - The Internet.
Chapter 3 Transport Layer
Chapter 6 Wireless and Mobile Networks
Chapter 4 Network Layer A note on the use of these ppt slides:
Chapter 3 Transport Layer
Chapter 4 Network Layer A note on the use of these ppt slides:
Presentation transcript:

A note on the use of these ppt slides: We’re making these slides freely available to all, hoping they might be of use for researchers and/or students. They’re in PowerPoint form so you can add, modify, and delete slides (including this one) and slide content to suit your needs. In return for use, we only ask the following: If you use these slides (e.g., in a class, presentations, talks and so on) in substantially unaltered form, that you mention their source. If you post any slides in substantially unaltered form on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and put a link to the authors webpage: Thanks and enjoy! A note on the use of these ppt slides: We’re making these slides freely available to all, hoping they might be of use for researchers and/or students. They’re in PowerPoint form so you can add, modify, and delete slides (including this one) and slide content to suit your needs. In return for use, we only ask the following: If you use these slides (e.g., in a class, presentations, talks and so on) in substantially unaltered form, that you mention their source. If you post any slides in substantially unaltered form on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and put a link to the authors webpage: Thanks and enjoy!

Zanella Andrea – Pierobon Gianfranco – Merlin Simone Ad hoc linear networks Sensor networks Car Networks Optimum Broadcast strategy MCDS (Only nodes in a connected set of minimum cardinality rebroadcast packets) ‏ Linear nodes deployment modeled as an inhomogeneous Poisson arrivals minimized redundancy preserved connectivity Limiting performance: Minimum latency Minimum traffic Maximum reliability Drawback: Needed topologic information x=0 x s0s0s0s0 s1s1s1s1 s2s2s2s2 s8s8s8s8 s5s5s5s5 s6s6s6s6 s7s7s7s7 s3s3s3s3 s4s4s4s4 x { } = MCDS Broadcast source = Silent node = Transmitting node Dept. of Information Engineering, University of Padova, This work was supported by MIUR within the framework of the ”PRIMO” project FIRB RBNE018RFY ( Ideal channel Deterministic transmission radius (R) ‏ Hypothesis Notations w k = distance reached by the k-th rebroadcast P k = probability of the existence of the k-th rebroadcast f k (x ) = probability density function of w k, given that w k exists  (x ) = nodes density function Aim: mathematical characterization of the MCDS-broadcast propagation dynamic with inhomogeneous density of nodes The dynamic of the MCDS-broadcast propagation along the network is statistically determined by the family of functions f k (x), which can be recursively obtained as follows: Theorem where P k can, in turn, be recursively derived as * O. Dousse,et. al. “Connectivity in ad-hoc and hybrid networks” Proc. IEEE Infocom02 Example: nodes reached at each hop Homogeneous Case Results: Connection probability, Propagation statistics, … variable node density Inhomogeneous (general) Case Asymp. value* Connection Probability Number of hops Performance metrics C k (x) = Connection probability of x in k hops N k C = Mean number of nodes reached in k hop