DOC PREVIEW
UCSD CSE 231 - Programming Ad-hoc Networks of Mobile and Resource-Constrained

This preview shows page 1-2-3-4 out of 12 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Programming Ad-hoc Networks of Mobile and Resource-Constrained DevicesSummaryMANETsProgramming for MANETsSpatialViewsSyntax and SemanticsSyntax and Semantics cont.ImplementationIteration TypesExtrasConclusionsQuestions???Programming Ad-hoc Programming Ad-hoc Networks of Mobile and Networks of Mobile and Resource-Constrained Resource-Constrained DevicesDevicesYang Ni, Ulrich Kremer, Adrian Stere, Liviu IftodeYang Ni, Ulrich Kremer, Adrian Stere, Liviu IftodeRutgers UniversityRutgers UniversityPresented at PLDI ‘05Presented at PLDI ‘05Presented by Troy TrimblePresented by Troy TrimbleSummarySummaryMANETsMANETsSpatialViewsSpatialViewsSyntax and SemanticsSyntax and SemanticsImplementationImplementationConclusion/QuestionsConclusion/QuestionsMANETsMANETsMobile Ad-hoc NetworksMobile Ad-hoc NetworksPDAs, Smart Phones, Laptops, CarsPDAs, Smart Phones, Laptops, CarsMultiple mediumsMultiple mediums802.11, bluetooth, radio802.11, bluetooth, radioForm networks around unstable linksForm networks around unstable linksExamples (Shameless Plug)Examples (Shameless Plug)Sensor Networks, RescueMesh (WIISARD)Sensor Networks, RescueMesh (WIISARD)Programming for MANETsProgramming for MANETsConcern is powerConcern is powerMANETs usually on low power devicesMANETs usually on low power devicesWhat can we give up?What can we give up?Quality of Result (QoR)Quality of Result (QoR)SpatialViewsSpatialViewsNodesNodesDefined by location in space, time and Defined by location in space, time and servicesservicesVirtual NetworkVirtual NetworkCollection of virtual nodesCollection of virtual nodesNetwork IteratorNetwork IteratorUsed to iterate through the nodes in the Used to iterate through the nodes in the networknetworkCan be a tool to control QoR vs. PowerCan be a tool to control QoR vs. PowerSyntax and SemanticsSyntax and SemanticsServicesServicesJava InterfacesJava InterfacesLocationLocationGPS, Cricket (MIT)GPS, Cricket (MIT)TimeTimeGranularity, limitGranularity, limitpublic interface LightSensor {public float read();...}public interface SpaceDefs {public static final Space CampusB=new Rectangle(...);...}public class AverageLighting {public void static main(String[] args) {sumreduction float s=0;sumreduction int n=0;spatialview sv=LightSensor @ SpaceDefs.CampusB % 320;visiteach x : sv every 1.0 forever{ s += x.read(); n++; }if (n>0)System.out.println(Float.toString(s/n));}}Syntax and Semantics cont.Syntax and Semantics cont.Program varsProgram varsLocal – r/w in defined iter, ro in nested itersLocal – r/w in defined iter, ro in nested itersContainer – r/w in defined iter, wo in nested Container – r/w in defined iter, wo in nested itersitersReduction – associated with specific operationReduction – associated with specific operationService varsService varsNever leave node, r/w in defined iterNever leave node, r/w in defined iterImplementationImplementationModified JavaModified JavaSmartMessagesSmartMessagesTransportTransportJava, KiloByte VM and CLDC libraryJava, KiloByte VM and CLDC libraryIteration TypesIteration TypesSerialSerialPoor failure modelPoor failure modelCan also do flooding to helpCan also do flooding to helpGeographic iterationGeographic iterationUses locations and greedy algorithmUses locations and greedy algorithmGeographic FloodGeographic FloodCloning based on quadtree, not network Cloning based on quadtree, not network topologytopologyExtrasExtrasLoop FlatteningLoop FlatteningOptimization for services on the same boxOptimization for services on the same boxSecurity Security Assumed AssumedConclusionsConclusionsMANETs pose a benefit to societyMANETs pose a benefit to societyNew programming challenges are given by New programming challenges are given by these environmentsthese environmentsRecognized by academic community with Recognized by academic community with conferences like International Conference for conferences like International Conference for Compilers, Architecture and Synthesis for Embedded Compilers, Architecture and Synthesis for Embedded SystemsSystemsSpatialViews supplies a good interface for SpatialViews supplies a good interface for dealing with these new problems on MANETsdealing with these new problems on


View Full Document

UCSD CSE 231 - Programming Ad-hoc Networks of Mobile and Resource-Constrained

Download Programming Ad-hoc Networks of Mobile and Resource-Constrained
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Programming Ad-hoc Networks of Mobile and Resource-Constrained and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Programming Ad-hoc Networks of Mobile and Resource-Constrained 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?