DIMACS Workshop on Pervasive Networking
May 21, 2001
DIMACS Center, Rutgers University, Piscataway, NJ
- Organizers:
- Badri Nath, Rutgers University, badri@cs.rutgers.edu
- Deborah Estrin, University of California at Los Angeles, destrin@cs.ucla.edu
Presented under the auspices of the Special Focus on Next Generation Networks Technologies and Applications.
Abstracts:
1.
Bluetooth Vs. 802.11b: State-Of-The-Art And Future Trends
Pravin Bhagwat, ReefEdge Networks
The promise of untethered computing in the workplace is becoming
a reality. IEEE 802.11b, the 11Mbps wireless LAN standard, has
finally arrived, and early market response has been positive.
As the WLAN market takes off, Bluetooth, another emerging standard
for short-range wireless networking, is also gathering force.
Several vendors have demonstrated Bluetooth products, including
cordless headsets, PCMCIA cards, and LAN access points. Both
standards are competing for the same airwaves, but are they also
chasing the same market? Will Bluetooth and 802.11b compliment
each other, or will one technology eventually displace the other?
2.
Distributed Query Planning In A Sensor Network
Philippe Bonnet, Chang Choi, Cornell University
Daniel Mosse, University of Pittsburgh
Large collections of sensors with computation and multi-hop
communications capabilities form the underlying computing
infrastructure for a new generation of area monitoring applications.
These applications rely on filtering, correlation and aggregation
queries to access sensor data regardless of the physical organization
of the underlying sensor network. Because each sensor disposes of
a finite amount of energy provided by its batteries and because
it has been shown that the energy cost of sending data is orders
of magnitude higher than the cost of processing data locally,
queries over a sensor network are best executed in a distributed
manner, within the sensor network.
In this talk, we will briefly review the data model and the query
language we have proposed for expressing queries over sensor
networks. We will then show that classical distributed query
processing techniques are challenged in this new environment and
we will introduce an architecture for distributed query processing
within a sensor network. We will detail the recent progresses we
have made concerning two aspects of distributed query processing
namely a sensor node index structure that can be used to route
query fragments without flooding the network and hierarchical
scheduling algorthims for planning distributed query execution
given delay constraints.
3.
PARO: Power-Aware Routing In Mobile Ad Hoc Networks
Andrew T. Campbell, Columbia University
Javier Gomez, IBM Research
Due to the fact that mobile ad hoc nodes have a critical need
to preserve battery power, MANET routing protocols need to
consider power saving techniques during operations. In this
talk we will discuss PARO, a Power-Aware Routing Optimization
protocol that minimizes the transmission power necessary to
forward packets between wireless devices. Using PARO, intermediate
nodes can forward packets between source-destination pairs thus
reducing the aggregate transmission power consumed by wireless
devices. An important property of PARO is that it outperforms
traditional broadcast-based routing protocols due to its
power efficient point-to-point on-demand nature. The protocol
is designed to operate as a stand-alone multihop routing
protocol for local-area wireless networks (e.g., single-hop
home networks, single-hop sensor networks, WLANS, etc.)
and as a power-aware enhancement for routing in wide-area
MANETs.
4.
Scalable And Adaptive Power Management For Multihop Ad Hoc
Networks
Benjie Chen, Kyle Jamieson, Hari Balakrishnan, Robert Morris, MIT
We present Span, a distributed coordination technique for multi-hop
ad hoc wireless networks that reduces energy consumption
without significantly diminishing the capacity or connectivity of
the network. Span builds on the observation that when a region of
a shared-channel network has a sufficient density of nodes, only
a small number of them need be on at any time to forward traffic
for active connections. This provides a way to save energy and
increase system lifetime by turning off "redundant" nodes, without
substantially altering the overall transit capacity of the network.
Span is a distributed, randomized algorithm where nodes make local
decisions on whether to sleep, or to join the forwarding backbone
as a coordinator. Each node adapts to its local topology, basing
its decision on an estimate of how many of its neighbors will
benefit from it being awake, and the amount of energy available
to it. We give a randomized algorithm where coordinators rotate
with time, demonstrating how localized node decisions lead to a
connected, capacity-preserving global topology. For example,
for a practical range of node densities, our simulations show
that the system lifetime with Span is more than a factor of two
better than without, while maintaining the forwarding capacity
of the original network. Span integrates nicely with 802.11--
when run in conjuction with the 802.11 power saving mode, Span
improves both communication latency and capacity without much
degradation in system lifetime.
5.
Autoconfiguration, Registration And Mobility Management For
Pervasive Computing
Subir Das and Anthonly Mcauley, Telcordia Technologies, Inc.
Archan Misra, IBM T.J. Watson
Sajal K. Das, University of Texas at Arlington
In the vision of pervasive computing, users will exchange information
and control their environments from anywhere using various wireline/
wireless networks and computing devices. We believe that current
protocols, such as DHCP, PPP and Mobile IP, must be enhanced to
support pervasivenetwork access.
In particular, this presentation identifies three fundamental
functions: autoconfiguration, registration, and mobility
management, that need such enhancements. Realizing that the IP
autoconfiguration capabilities must be extended to configure routers
and large dynamic networks, we first describe our autoconfiguration
solution based on the Dynamic Configuration and Distribution (DCDP).
Secondly, we discuss why providing user-specific services over a
common infrastructure needs a uniform registration protocol, independent
of the mobility and configuration mechanisms. We present an initial
version of the Basic User Registration Protocol (BURP), which
provides secure client-network registration and interfaces to
AAA protocols such as Diamter. Finally, we discuss the Dynamic
Mobility Agent (DMA) architecture, which provides a hierarchical
and scalable mobility management framework. The DMA approach
allows individual users to customize their own mobility-related
features, such as paging, fast handoffs and QoS support, over a
common access infrastructure and to select multiple globalbinding
protocols as appropriate.
6.
Prediction-Based Monitoring In Sensor Networks
Samir Goel, Tomasz Imielinski, Rutgers University
In this paper we discuss the problem of monitoring data
sensed in large sensor networks. A sensor typically runs a
better having a limited lifetime. In order to increase the
lifetime of a sensor it is important that the mechanisms used
in monitoring them be energy-efficient. In this paper, we
propose a new paradigm called Prediction-based monitoring
for energy-efficient monitoring. We show that the paradigm
can be visualized as a watching of a "sensor movie" and that
concepts from MPEG may be applied to it. We have implemented
the proposed algorithms in a testbed of Rene motes[Motes].
Experimental results show that the proposed solutions help
to significantly cut-down the number of data transmissions,
considerabley increasing sensor lifetimes, and thereby, the
lifetime of the networks formed from these sensors.
7.
Challenges In Geographic Routing:
Sparse Networks, Radio Obstacles, and Traffic Provisioning
Brad Karp, ICSI, Berkeley, California
Greedy Perimeter Stateless Routing (GPSR) has been shown to scale well
for networks of numerous rapidly moving routers, by virtue of its
small state storage requirements at routers, low routing protocol
overhead, and the robustness with which it delivers applications'
packets. The use of geographic information in packet forwarding
decisions is central to these properties. We identify three challenges
in the advancement of such geographic routing systems: sparse
topologies, where greedy forwarding is possible more rarely than
on dense ones; radio-attenuating obstacles, that introduce
non-uniformity in radio ranges; and traffic engineering for these
non-hierarchical routing systems. Using simulation, we describe
the role of network density in the performance of geographic routing
schemes, and show that GPSR performs well on sparse networks. We
describe the difficulties presented by non-uniform radion ranges.
Finally, we harness the correlation between geography and capacity
in wireless networks to propose a "geographic" approach to traffic
engineering that increases the capacity of a geographically routed
network by "spatially" distributing flows.
8.
Compiler Support For Power And Energy Management
Uli Kremer, Rutgers University
Effective power and energy management is important to prolong
batter life and to reduce heat dissipation. Developing compile-time
techniques for application specific power and energy management is
an exciting challenge. In this talk, I will discuss several possible
optimization techniques, with an emphasis on remote task execution.
Experiments to support the benefit analysis were performed on SKIFF,
a StrongARM based single board system developed at Compaq's Cambridge
Research Lan (CRL). An addition, we report performance numbers on
Compaq's iPAQ handheld PC.
9.
Hierarchical Power-Aware Routing In Sensor Networks
Qun Li, Javed Aslam, Daniela Rus
Department of Computer Science, Dartmouth College
This paper discusses online power-aware routing in large sensor
networks. We seek to optimize the lifetime of the network. We
develop an approximation algorithm called max-min zP_min that has
a good empirical competitive ratio. To ensure scalability, we
introduce a hierarchical algorithm, which is called zone-based
routing.
10.
Connection Establishment In The Bluetooth System
Ivana Maric, WINLAB, Rutgers University
Any communication between hosts in the Bluetooth system is preceded by a
connection establishment procedure comprising two steps. The first step,
referred to as Inquiry, enables hosts to learn about other hosts in their
range. Inquiry can be omitted when not needed. The second step in
which a host synchronizes and starts communication with the intended
host is called Page. The complexity of the connection establishment
procedure stems from the fact that hosts use different hopping sequences
before a connection is established. The set-up delay is also affected
by the requirement of low-power consumption and the possible connections
that hosts may already have. The delay introduced by the procedure may
impose constraints on applications such as ad hoc networking and LAN
access.
In this paper, the connection establishment procedure in the Bluetooth
system is modeled. The analytical results on mean page duration are
derived for paging modes defined by the Bluetooth Specification. In
a channel with packet errors, we derive analytical results for the average
page duration as a function of the length of a page scan interval.
Analytical and simulation results show the range of values for the average
page duration between two hosts.
11.
Communication Support For Location-Centric Collaborative
Signal Processing In Sensor Networks
P. Ramanathan, K.-C. Wang, K.K. Saluja, T. Clouqueur
University of Wisconsin-Madison
Smart, low-cost devices, containing multiple sensors integrated
with short-range wireless communication and significant embedded
processing capabilities are expected to be a technological reality
in the near future. These devices can be deployed in large numbers
to form a wireless ad hoc network with significant compute capabilities
to carry out mission-critical taskes such as monitoring, detection,
and tracking of threats in the deployed area. In such networks,
each device by itself may not be able to provide useful information
without collaboration with other devices. At the same time, due to
the large ad hoc nature of these networks, it is a formidable
challenge for a programmer to develop efficient distributed
algorithms and implementations without a simple, but flexible,
programming model.
This paper descibes an approach called location-centric computing
for addressing this challenge. The proposed approach is based on
the observation that distributed computations in sensor networks
typically require tight collaboration among devices in a certain
geographic area and not among an arbitrarily specified set of
devices. The paper describes a set of communication primitives
well-suited for such location-centric distributed computing.
The paper also compares the number of messages required for an
example collaborative signal processing application, namely
target tracking, in the proposed approach with that required
in other well-known approaches in literature. The comparison
shows that the proposed approach is better in terms of number
of messages required for this application.
12.
Cooperative Computing: A Computing Model For Large Networks
Of Embedded Systems
Phillip Stanley-Marbell, Cristian Borcea, Kiran Nagaraja,
Liviu Iftode, Rutgers University
To benefit from the aggregated computing resources deployed in
large networks of embedded systems, new computing models and
system architectures must be employed, which will necessarily
be different from the traditional distributed computing models.
Presented is a model and architecture for distributed computing over
large scale ad-hoc networks of embedded systems. In Cooperative
Computing, applications execute on a set of nodes identified by their
properties, and are responsible for the discovery of these nodes in
the network. The system architecture we propose to implement this
model is called Smart Messages. Smart messages are comprised of code
and data and execute on each hop in their path through the network.
Nodes support the execution of smart messages by providing a virtual
machine and a name-based memory region called the Tag Space.
We believe the Cooperative Computing and Smart Messages can provide
an adequate programmable infrastructure for pervasive networks of
embedded systems such as sensor networks and computational fabrics.
We are currently prototyping this architecture using uCsimm
microcontrollers, uCLinux, Sun Microsystem's KVM virtual machine
and Bluetooth wireless networking.
13.
Automatic Configuration Management In Dynamic Short-Lived Networks
Raj Rajagopalan, Telcordia Technologies
Today's network management techniques are designed for long-term
usage of networks and while this approach is acceptable for networks
in general, it is quite inadequate in some common network scenarios
where the network exists for a very small period of time. Such
networks are quire common in the military in forward-deployed networks
in combat or rescue situations as well as in the civilian sector,
examples being disaster areas, trade shows, touring groups,
and sporting events. We call networks with a defined lifetime
"Rapid Response Networks" or "Disposable Networks" and argue that
radically new management techniques are needed for success in
mission-critical tasks in such arenas. We propose that reseach
needs to be done on the question of what would we do for the
specified span of time. This turns out to be fertile ground with
many open questions, some that can be solved quickly and others
that need concerted and collaborative effort. This is joint work
with Badri Nath, Nick Maxemchuk, Muthu Muthukrishnan and Fred
Roberts. We will also briefly review some of the lessons learned
in creating new tools for configuration management in an ongoing
project at Telcordia Technologies that focuses on automating
security policy management.
.
.
.
.
.
.
.
.
.
.
.
.
Previous: Participation
Next: Registration
Workshop Index
DIMACS Homepage
Contacting the Center
Document last modified on May 29, 2001.