The increasing assortment of devices with IP connectivity contributes to the high popularity of video sharing over the Internet. High traffic generated by such applications at the source can be better distributed usin...
详细信息
The increasing assortment of devices with IP connectivity contributes to the high popularity of video sharing over the Internet. High traffic generated by such applications at the source can be better distributed using a peer-to-peer overlay, since every user forwards information to other users. Current implementations target either live or on demand video streaming. LiveShift is an application that combines both approaches. While video is transmitted through the peer-to-peer network in a live fashion, all peers participate in a distributed storage. This adds ability to replay time-shifted streams from other peers in a distributed and scalable manner. For the demonstration, a decentralized network is used, with peers running on EMANICSlab nodes and notebook computers.
The design of distributed, wireless, and embedded system is a tedious and error-prone process. Experiences from previous real-world wireless sensor network (WSN) deployments strongly indicate that it is vital to follo...
详细信息
The design of distributed, wireless, and embedded system is a tedious and error-prone process. Experiences from previous real-world wireless sensor network (WSN) deployments strongly indicate that it is vital to follow a systematic design approach to satisfy all design requirements including robustness and reliability. Such a design methodology needs to include an end-to-end testing methodology. The proposed framework for WSN testing allows to apply distributed unit testing concepts in the development process. The tool flow decreases test time and allows for monitoring the correctness of the implementation throughout the development process.
This paper describes the design and implementation of a high-reliability and low-power status monitoring protocol, e.g. for wireless alarm systems. The dual design approach followed consists of an in-depth device char...
详细信息
This paper describes the design and implementation of a high-reliability and low-power status monitoring protocol, e.g. for wireless alarm systems. The dual design approach followed consists of an in-depth device characterization with subsequent algorithm development. This allows to understand and leverage the correct design and implementation of the most critical components of the algorithms. The high-reliability status monitoring protocol operates based on monitoring windows with synchronous notification, subsequent acknowledgement rounds and periods of reduced activity, at regular intervals. This leads to deterministic and thus highly reliable operation of the status monitoring protocol implementation on the Tmote Sky platform.
This application track paper describes the key technology advances achieved through a component-based design process, meeting right on track all key requirements of management systems for biometric data, such as data ...
详细信息
ISBN:
(纸本)1424407982
This application track paper describes the key technology advances achieved through a component-based design process, meeting right on track all key requirements of management systems for biometric data, such as data protection acts, flexible user and device handling, installation, and operation functions, and grouping functionality for users and devices according to dedicated office environmental needs.
MLS is a distributed location service to track the position of mobile nodes and to route messages between any two nodes. The lookup of nodes is achieved by searching in a hierarchy of pointers that each node maintains...
详细信息
ISBN:
(纸本)1595933689
MLS is a distributed location service to track the position of mobile nodes and to route messages between any two nodes. The lookup of nodes is achieved by searching in a hierarchy of pointers that each node maintains. We show that MLS has constant stretch for lookup requests. In contrast to previous work, we consider a concurrent setup where nodes are truly mobile and move even while messages are being routed towards them. We prove correctness and efficiency of MLS and determine the maximum speed at which the nodes might move, which is up to 1/15 of the routing speed. To the best of our knowledge, this is the first work that bounds the node speed, a necessity to prove the success of a lookup algorithm. We verified our theoretical results through extensive simulation and show that the average lookup stretch is around 6. Copyright 2006 ACM.
作者:
Erlebach, ThomasFiala, JiříETH Zürich
Computer Engineering and Networks Lab. CH-8092 Zürich Switzerland Charles University
Department of Applied Mathematics Institute for Theoretical Computer Science Malostranské nám. 2/25 118 00 Prague Czech Republic
This chapter surveys on-line and approximation algorithms for the maximum independent set and coloring problems on intersection graphs of disks. It includes a more detailed treatment of recent upper and lower bounds o...
详细信息
We investigate to what extent flooding and routing is possible if the graph is allowed to change unpredictably at each time step. We study what minimal requirements are necessary so that a node may correctly flood or ...
详细信息
ISBN:
(纸本)1595930922
We investigate to what extent flooding and routing is possible if the graph is allowed to change unpredictably at each time step. We study what minimal requirements are necessary so that a node may correctly flood or route a message in a network whose links may change arbitrarily at any given point, subject to the condition that the underlying graph is connected. We look at algorithmic constraints such as limited storage, no knowledge of an upper bound on the number of nodes, and no usage of identifiers. We look at flooding as well as routing to some existing specified destination and give algorithms. Copyright 2005 ACM.
Design space exploration is introduced as one of the major tasks in embedded system design. After reviewing existing exploration methods at various layers of abstraction, a generic approach is described based on multi...
详细信息
Emerging network services such as transcoding and encryption need application-specific handling of data streams within the network, thus requiring enormous computational capabilities on routers to process packets at l...
详细信息
Emerging network services such as transcoding and encryption need application-specific handling of data streams within the network, thus requiring enormous computational capabilities on routers to process packets at link speed. Recently appeared network processors (NPs) are able to significantly increase the available processing capacities on a router by a chip-multi-processor architecture. Embedded within the network interface card, NPs provide several code-extensible processors with different capabilities located at various layers. However, the increase in processing capacity comes at the cost of a higher complexity to program and control various processor hierarchies provided on the router. We introduce the model of active network nodes built of a processor hierarchy together with a component-based service model. We present the architecture of PromethOS NP which is a modular framework that manages and controls a network node with a multitude of processors in a scalable way. Specifically, we describe the mechanisms required to dynamically configure multiple processors organized in a hierarchical fashion such that they provide a new network service on behalf of applications. As a proof of concept, we have implemented a service framework for PromethOS NP. Our implementation is based on a network interface card with an embedded IBM PowerNP 4GS3 and an Intel Xeon processor, offering programmability on a three-tier hierarchy of processors.
暂无评论