182 research outputs found
Poster Abstract: Opportunistic RPL
Sensor nodes constituting Wireless Sensor Networks (WSN) are often battery-
operated and have limited resources. To save energy, nodes sleep most of the
time, and wake up periodically to handle communication. Such radio duty cycling
poses a basic trade-off between energy and latency.
In previous work, we have shown that opportunistic routing is an efficient way
to achieve low-latency yet energy efficient data collection in WSN (ORW [3]).
In this paper, we extend this approach to the context of low-power IP networks,
where nodes need to be addressed individually and where traffic patterns are
irregular. We present ORPL, an opportunistic extension of RPL, the stan-
dard, state-of-the-art routing protocol for low-power IP networks. We discuss
our preliminary results obtained with Contiki in a 137-node testbed
Demo: Snap – Rapid Sensornet Deployment with a Sensornet Appstore
Despite ease of deployment being seen as a primary advantage
of sensor networks, deployment remains difficult.
We present Snap, a system for rapid sensornet deployment
that allows sensor networks to be deployed, positioned, and
reprogrammed through a sensornet appstore. Snap uses a
smartphone interface that uses QR codes for node identification, a map interface for node positioning, and dynamic loading of applications on the nodes. Snap nodes run the Contiki
operating system and its low-power IPv6 network stack that
provides direct access from nodes to the smartphone application.
We demonstrate rapid sensor node deployment, identification,
positioning, and node reprogramming within seconds, over
a multi-hop sensornet routing path with a WiFi-connected
smartphone
Let the Tree Bloom: Scalable Opportunistic Routing with ORPL
Routing in battery-operated wireless networks is challenging, posing a tradeoff between energy and latency. Previous work has shown that opportunistic routing can achieve low-latency data collection in duty-cycled networks. However, applications are now considered where nodes are not only periodic data sources, but rather addressable end points generating traffic with arbitrary patterns.
We present ORPL, an opportunistic routing protocol that supports any-to-any, on-demand traffic. ORPL builds upon RPL, the standard protocol for low-power IPv6 networks. By combining RPL's tree-like topology with opportunistic routing, ORPL forwards data to any destination based on the mere knowledge of the nodes' sub-tree. We use bitmaps and Bloom filters to represent and propagate this information in a space-efficient way, making ORPL scale to large networks of addressable nodes. Our results in a 135-node testbed show that ORPL outperforms a number of state-of-the-art solutions including RPL and CTP, conciliating a sub-second latency and a sub-percent duty cycle. ORPL also increases robustness and scalability, addressing the whole network reliably through a 64-byte Bloom filter, where RPL needs kilobytes of routing tables for the same task
A Low-Power CoAP for Contiki
Internet of Things devices will by and large
be battery-operated, but existing application protocols
have typically not been designed with power-efficiency in
mind. In low-power wireless systems, power-efficiency is
determined by the ability to maintain a low radio duty
cycle: keeping the radio off as much as possible. We
present an implementation of the IETF Constrained
Application Protocol (CoAP) for the Contiki operating system
that leverages the ContikiMAC low-power duty cycling
mechanism to provide power efficiency. We experimentally
evaluate our low-power CoAP, demonstrating that an
existing application layer protocol can be made power-efficient
through a generic radio duty cycling mechanism.
To the best of our knowledge, our CoAP implementation is
the first to provide power-efficient operation through radio
duty cycling. Our results question the need for specialized
low-power mechanisms at the application layer, instead
providing low-power operation only at the radio duty
cycling layer
Demo Abstract: Securing Communication in 6LoWPAN with Compressed IPsec
With the inception of IPv6 it is possible to assign
a unique ID to each device on planet. Recently, wireless sensor
networks and traditional IP networks are more tightly integrated
using IPv6 and 6LoWPAN. Real-world deployments of WSN
demand secure communication. The receiver should be able to
verify that sensor data is generated by trusted nodes and/or
it may also be necessary to encrypt sensor data in transit.
Available IPv6 protocol stacks can use IPsec to secure data
exchanges. Thus, it is desirable to extend 6LoWPAN such that
IPsec communication with IPv6 nodes is possible. It is beneficial
to use IPsec because the existing end-points on the Internet do
not need to be modified to communicate securely with the WSN.
Moreover, using IPsec, true end-to-end security is implemented
and the need for a trustworthy gateway is removed.
In this demo we will show the usage of our implemented
lightweight IPsec. We will show how IPsec ensures end-to-end
security between an IP enabled sensor networks and the
traditional Internet. This is the first compressed lightweight
design, implementation, and evaluation of a 6LoWPAN extension
for IPsec. This demo complements the full paper that will appear
in the parent conference, DCOSS’11
Low Power, Low Delay: Opportunistic Routing meets Duty Cycling
Traditionally, routing in wireless sensor networks consists of
two steps: First, the routing protocol selects a next hop,
and, second, the MAC protocol waits for the intended destination
to wake up and receive the data. This design makes
it difficult to adapt to link dynamics and introduces delays
while waiting for the next hop to wake up.
In this paper we introduce ORW, a practical opportunistic
routing scheme for wireless sensor networks. In a dutycycled
setting, packets are addressed to sets of potential receivers
and forwarded by the neighbor that wakes up first
and successfully receives the packet. This reduces delay and
energy consumption by utilizing all neighbors as potential
forwarders. Furthermore, this increases resilience to wireless
link dynamics by exploiting spatial diversity. Our results
show that ORW reduces radio duty-cycles on average
by 50% (up to 90% on individual nodes) and delays by 30%
to 90% when compared to the state of the art
Efficient Web Requests Scheduling Considering Resources Sharing
International audienceRequests scheduling in Web servers is a hot research topic. Many works aim at providing optimal algorithms according to various metrics. Most of these works are based on classical scheduling metrics, considering jobs completion times, but ignoring intermediate states. We claim that this choice conduces to the design of algorithm that do not efficiently share the system resources. Indeed, Web servers have some properties that make them different than the system considered in usual scheduling theory. The classical round-robin policy, used in most production Web servers, has intrinsic qualities: it shares equally the system resources and avoids any job starvation. We introduce a novel parameterizable algorithm proposing a compromise between the benefits of the round-robin and the policies that provide the best performances. Then, we discuss the appropriate choice of the parameter depending in the requirements and the context of the Web server
Formal Verification of a Memory Allocation Module of Contiki with Frama-C: a Case Study
International audienceFormal verification is still rarely applied to the IoT (InternetofThings)software, whereas IoT applications tend to become increasingly popular and critical.This short paper promotes the usage of formal verification to ensure safetyand security of software in this domain. We present a successful case study ondeductive verification of a memory allocation module of Contiki, a popular open-source operating system for IoT. We present the target module, describe how thecode has been specified and proven using Frama-C, a software analysis platformfor C code, and discuss lessons learned
The GL 569 Multiple System
We report the results of high spectral and angular resolution infrared
observations of the multiple system GL 569 A and B that were intended to
measure the dynamical masses of the brown dwarf binary believed to comprise GL
569 B. Our analysis did not yield this result but, instead, revealed two
surprises. First, at age ~100 Myr, the system is younger than had been reported
earlier. Second, our spectroscopic and photometric results provide support for
earlier indications that GL 569 B is actually a hierarchical brown dwarf triple
rather than a binary. Our results suggest that the three components of GL 569 B
have roughly equal mass, ~0.04 Msun.Comment: 29 pages, 10 figures, accepted for publication in the Astrophysical
Journal; minor corrections to Section 5.1; changed typo in 6.
- …