SlideShare a Scribd company logo
OLPC Mesh network improving



                 Arina Rudakova
  (Saint-Petersburg Elelectrotechnical University «LETI»)



              3rd FRUCT seminar


                  Saint-Petersburg
                   23 May 2008
Agenda
 Introduction
 Problem definition
 Domain analysis
 Solution
 Project timeline
I. Introduction
One Laptop Per Child
          
              Home: http://laptop.org


          
              The mission of the One Laptop
              per Child association is to
              develop a low-cost laptop—the
              "XO Laptop"— to revolutionize
              how we educate the world's
              children. Goal is to provide
              children around the world with
              new opportunities to explore,
              experiment, and express
              themselves.
XO laptops hardware

    Dimensions: 242mm × 228mm × 32mm

 CPU x86-compatible processor AMD Geode LX-700 433 Mhz, 64KB each L1 I and D
cache; at least 128KB L2 cache

    DRAM memory: 256 MiB dynamic RAM

    BIOS: 1024KiB SPI-interface flash ROM

    Mass storage: 1024 MiB SLC NAND flash, high-speed flash controller

    Display: Liquid-crystal display: 7.5” dual-mode TFT display

    Keyboard: 80+ keys, 1.0mm stroke; sealed rubber-membrane key-switch assembly

    Gamepad: Two sets of four-direction cursor-control keys

    Touchpad: Dual capacitance/resistive touchpad; supports written-input mode

    Audio: AC’97 compatible audio subsystem

    Integrated color video camera: 640 x 480 resolution at 30 FPS

 Wireless Networking: Integrated 802.11b/g (2.4GHz) interface; 802.11s (Mesh)
networking supported; dual adjustable, rotating antennas support diversity reception;
capable of mesh operation when CPU is powered down;
XO laptops software

    Operating system: Linux Kernel: Linux 2.6.22; Fedora 7 base environment.

    User environment: Sugar GUI, written in Python, on top of the X Window and the Matchbox WM

    Programming environments (main):

        −   Python (Version 2.5);
        −   JavaScript;
        −   Csound, music programming language;
        −   Etoys, an implementation of Squeak using Smalltalk, an object-based programming
            language;
        −   Turtle Art, a graphical programming environment;
        −   Adobe's Flash Player, Java, Gnash

    Libraries

        −       Mozilla Gecko/Xulrunner (the Firefox web engine);
        −       GUI toolkit (GTK+) (Gnome);
        −       Matchbox window manager;
        −       X Window System X.org Foundation;
        −       Multimedia framework: GStreamer and RealNetworks;
        −       Gettext, the GNU internationalization library
Neighborhood:
Collaboration interface
                The Neighbourhood view
                   displays all the connected
                   XO laptops within a child’s
                   community, and what
                   activities they are sharing.


                Each child is represented by a
                   different colour


                If there is a shared document
                   or activity being
                   collaborated on by a
                   number of children, it will
                   show up within this view.
XO Mesh goals

    Ability to act as a mesh point when laptop's main CPU is off.

    Support for asymmetric links/paths.

    Incremental releases—mesh networking is available immediately
    on XO; Upgrades will continue to improve functionality and
    adherence with standards.

    Simultaneously acts as a mesh point and an infrastructure node.

    Standards Compliance: follow 802.11s draft when possible.
II. Problem definition
Mesh network types

    Infrastructure wireless mesh networks: Mesh
    routers form an infrastructure for clients.

    Client wireless mesh networks: Client nodes
    constitute the actual network to perform routing
    and configuration functionalities.

    Hybrid wireless mesh networks: Mesh clients can
    perform mesh functions with other mesh clients as
    well as accessing the network
Distinguishing features

    dynamics

    structure
Routing mechanism in mesh

    Redundante links usage
    −   Fault tolerance
    −   Load sharing

    Traffic analysis

    Network diversity

    Route aggregation
Routing overhead reasons

    Nodes number influence on the amount
    of control traffic

    Network changes dynamics influence on
    the amount of control traffic

    Route length influence on the amount of
    control traffic
Project Goals

    Reducing Routing overhead

    OLPC implementation
III. Domain analysis
Ad-hoc Routing types

    Pro-active or Table-driven

    Reactive Routing or On-demand

    Flow Oriented

    Adaptive Routing or Situation-Aware

    Hybrid (Pro-Active and Reactive)
Industrial and open source
          implementations

    AWDS (Ad-hoc Wireless Distribution Service) http://awds.berlios.de/

    DSDV (Highly Dynamic Destination-Sequenced Distance Vector routing
    protocol) – based on Bellman-Ford Routing Protocol

    AODV (Ad-hoc On-demand Distance Vector)

    Mobile Ad-hoc On-Demand Data Delivery Protocol

    MPRDV (Multipoint Relay Distance Vector protocol)

    SSR (Signal Stability Routing protocol)

    PLBR (Preferred link based routing)

    TORA (Temporally-Ordered Routing Algorithm routing protocol)

    HRPLS (Hybrid Routing Protocol for Large Scale Mobile Ad-Hoc Networks
    with Mobile Backbones)

    HSLS (Hazy Sighted Link State routing protocol)

    ZRP (Zone Routing Protocol)
IV. Solution
Solution components

    Routing area restriction

    Dynamic selection of optimization radius

    External definition of routing overhead
Routing overhead chart

    m — tree arity

    n — nodes number

    R — dynamics
Possible reasons of
      routing overhead increase

    Number of nodes increase

    Network dynamics increase

    Network radius increase

    Using aggressive updating strategy
Routing area restriction
For effective routing area definition we should
 introduce some definitions.

G(t)=<V,E>, where V – set of nodes, E – arches
G(t) describes network topology
d(vi,vj) – distance between vi and vj
vi: Ri>0, G (vi , Ri ) ⊂ G (t ), d (vi , v j ) ≤ Ri
Choose Ri with regard to time needed for collection
 of information about G(vi,Ri)
G(vi,Ri) - effective routing area for vi, G (vi , Ri ) ≡ R(vi )
External and internal
             routing records

    External routing
    records (only in
    edge nodes)

    Internal routing
    records (always
    true)
Routing optimization area

    Local optimization

    Global optimization

    Optimization in restricted area
Local sample

    Information collection – 1 hop

    Route defining – 1 hop

    «Trust» zone – 1 hop

    Control traffic is minimum
Global sample

    Information collection –
    whole net

    Route defining – whole net

    «Trust» zone – whole net

    Control traffic is maximum
Restricted sample

    Information collection is
    restricted with R

    Route defining – within R
    radius

    «Trust» zone – within R
    radius

    Control traffic is restricted
Failure detection
               
                   At first only one
                   router knows
                   about a route
                   failure
               
                   After the
                   message to
                   sender about
                   the
                   impossibility of
                   passing, the
                   whole effective
                   routing area is
                   informed
               
                   The sender gets
                   informed when
                   its timer is over
Routing overhead analysis
V. Project timeline
Global plan
The past

    2007 Autumn, generic task definition, domain investigation

    2008 Winter, getting XO devices, experience XO system
    programming
The future

    2008 Summer, public presentation our of solution ideas
    (conference proceedings or paper)

    2008 Autumn, implement modules for NS2 and simulations

    2008 Winter, contribute some code for XO laptops

    2009 Spring, defence of the master thesises at LETI
Thank you.
Any questions?

More Related Content

What's hot

Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing Algorithms
Giancarlo Romeo
 
Mobility, traffic engineering and redundancy using RPL
Mobility, traffic engineering and redundancy using RPLMobility, traffic engineering and redundancy using RPL
Mobility, traffic engineering and redundancy using RPL
Maxime Denis
 
Backplane Technology Overview for AdvancedTCA
Backplane Technology Overview for AdvancedTCABackplane Technology Overview for AdvancedTCA
Backplane Technology Overview for AdvancedTCA
huichenphd
 
Introduction to Serial RapidIO® (SRIO) by IDT
Introduction to Serial RapidIO® (SRIO) by IDTIntroduction to Serial RapidIO® (SRIO) by IDT
Introduction to Serial RapidIO® (SRIO) by IDT
Integrated Device Technology
 
Ipmulticasting
IpmulticastingIpmulticasting
Ipmulticasting
Sachith Walpita
 
MARC ONERA Toulouse2012 Altreonic
MARC ONERA Toulouse2012 AltreonicMARC ONERA Toulouse2012 Altreonic
MARC ONERA Toulouse2012 Altreonic
Eric Verhulst
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
Raj Sikarwar
 
Internship end
Internship endInternship end
Internship end
Maxime Denis
 
Multicastingand multicast routing protocols
Multicastingand multicast routing protocolsMulticastingand multicast routing protocols
Multicastingand multicast routing protocols
Iffat Anjum
 
On-Demand Multicast Routing Protocol
On-Demand Multicast Routing ProtocolOn-Demand Multicast Routing Protocol
On-Demand Multicast Routing Protocol
Senthil Kanth
 
Multicastingand multicast routing protocols
Multicastingand multicast routing protocolsMulticastingand multicast routing protocols
Multicastingand multicast routing protocols
Iffat Anjum
 
Internet Of Things: Vision, Prerequisites and OpenSpime
Internet Of Things: Vision, Prerequisites and OpenSpimeInternet Of Things: Vision, Prerequisites and OpenSpime
Internet Of Things: Vision, Prerequisites and OpenSpime
Roberto Ostinelli
 
Mpls
MplsMpls
Multicast
MulticastMulticast
Multicast
Sagar Surve
 
V25112115
V25112115V25112115
V25112115
IJERA Editor
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
Darshan Rathi
 
Stefano Giordano
Stefano GiordanoStefano Giordano
Stefano Giordano
GoWireless
 
Performance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attackPerformance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attack
Mehedi
 
Address Interleaving in NoCs
Address Interleaving in NoCsAddress Interleaving in NoCs
Address Interleaving in NoCs
Kyprianos Papadimitriou (Papademetriou)
 

What's hot (19)

Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing Algorithms
 
Mobility, traffic engineering and redundancy using RPL
Mobility, traffic engineering and redundancy using RPLMobility, traffic engineering and redundancy using RPL
Mobility, traffic engineering and redundancy using RPL
 
Backplane Technology Overview for AdvancedTCA
Backplane Technology Overview for AdvancedTCABackplane Technology Overview for AdvancedTCA
Backplane Technology Overview for AdvancedTCA
 
Introduction to Serial RapidIO® (SRIO) by IDT
Introduction to Serial RapidIO® (SRIO) by IDTIntroduction to Serial RapidIO® (SRIO) by IDT
Introduction to Serial RapidIO® (SRIO) by IDT
 
Ipmulticasting
IpmulticastingIpmulticasting
Ipmulticasting
 
MARC ONERA Toulouse2012 Altreonic
MARC ONERA Toulouse2012 AltreonicMARC ONERA Toulouse2012 Altreonic
MARC ONERA Toulouse2012 Altreonic
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
Internship end
Internship endInternship end
Internship end
 
Multicastingand multicast routing protocols
Multicastingand multicast routing protocolsMulticastingand multicast routing protocols
Multicastingand multicast routing protocols
 
On-Demand Multicast Routing Protocol
On-Demand Multicast Routing ProtocolOn-Demand Multicast Routing Protocol
On-Demand Multicast Routing Protocol
 
Multicastingand multicast routing protocols
Multicastingand multicast routing protocolsMulticastingand multicast routing protocols
Multicastingand multicast routing protocols
 
Internet Of Things: Vision, Prerequisites and OpenSpime
Internet Of Things: Vision, Prerequisites and OpenSpimeInternet Of Things: Vision, Prerequisites and OpenSpime
Internet Of Things: Vision, Prerequisites and OpenSpime
 
Mpls
MplsMpls
Mpls
 
Multicast
MulticastMulticast
Multicast
 
V25112115
V25112115V25112115
V25112115
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
 
Stefano Giordano
Stefano GiordanoStefano Giordano
Stefano Giordano
 
Performance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attackPerformance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attack
 
Address Interleaving in NoCs
Address Interleaving in NoCsAddress Interleaving in NoCs
Address Interleaving in NoCs
 

Viewers also liked

N8xx olpc connectivity
N8xx olpc connectivityN8xx olpc connectivity
N8xx olpc connectivity
OSLL
 
[MDBCI] Mariadb continuous integration tool
[MDBCI] Mariadb continuous integration tool[MDBCI] Mariadb continuous integration tool
[MDBCI] Mariadb continuous integration tool
OSLL
 
Implementation of the new REST API for Open Source LBS-platform Geo2Tag
Implementation of the new REST API for Open Source LBS-platform Geo2TagImplementation of the new REST API for Open Source LBS-platform Geo2Tag
Implementation of the new REST API for Open Source LBS-platform Geo2Tag
OSLL
 
MOOCs Virtual Lab in Modern Education
MOOCs Virtual Lab in Modern EducationMOOCs Virtual Lab in Modern Education
MOOCs Virtual Lab in Modern Education
OSLL
 
Обзор файловой системы GlusterFS
Обзор файловой системы GlusterFSОбзор файловой системы GlusterFS
Обзор файловой системы GlusterFS
OSLL
 
Обзор Btrfs
Обзор BtrfsОбзор Btrfs
Обзор Btrfs
OSLL
 
SVG-player plugin for ns2 simulations
SVG-player plugin for ns2 simulationsSVG-player plugin for ns2 simulations
SVG-player plugin for ns2 simulations
OSLL
 
Fruct4 n8xx olpc-connectivity
Fruct4 n8xx olpc-connectivityFruct4 n8xx olpc-connectivity
Fruct4 n8xx olpc-connectivity
OSLL
 
E.Kalishenko, K.Krinkin, S.P.Shiva Prakash. Process Mining Approach for Traff...
E.Kalishenko, K.Krinkin, S.P.Shiva Prakash. Process Mining Approach for Traff...E.Kalishenko, K.Krinkin, S.P.Shiva Prakash. Process Mining Approach for Traff...
E.Kalishenko, K.Krinkin, S.P.Shiva Prakash. Process Mining Approach for Traff...
OSLL
 
Обзор архитектуры [файловой] системы Ceph
Обзор архитектуры [файловой] системы CephОбзор архитектуры [файловой] системы Ceph
Обзор архитектуры [файловой] системы Ceph
OSLL
 
Testing with Selenium
Testing with SeleniumTesting with Selenium
Testing with Selenium
OSLL
 
Работа с геоданными в MongoDb
Работа с геоданными в MongoDbРабота с геоданными в MongoDb
Работа с геоданными в MongoDb
OSLL
 
Обзор Linux Control Groups
Обзор Linux Control GroupsОбзор Linux Control Groups
Обзор Linux Control Groups
OSLL
 
Open Source implementation of ZigBee
Open Source implementation of ZigBeeOpen Source implementation of ZigBee
Open Source implementation of ZigBee
OSLL
 
Пространства имен Linux (linux namespaces)
Пространства имен Linux (linux namespaces)Пространства имен Linux (linux namespaces)
Пространства имен Linux (linux namespaces)
OSLL
 
Virtual-HSM: Virtualization of Hardware Security Modules in Linux Containers
Virtual-HSM: Virtualization of Hardware Security Modules in Linux ContainersVirtual-HSM: Virtualization of Hardware Security Modules in Linux Containers
Virtual-HSM: Virtualization of Hardware Security Modules in Linux Containers
OSLL
 
Кратчайшее введение в docker по-русски
Кратчайшее введение в docker по-русскиКратчайшее введение в docker по-русски
Кратчайшее введение в docker по-русски
OSLL
 
Linuxvirt seminar-csc-2015
Linuxvirt seminar-csc-2015Linuxvirt seminar-csc-2015
Linuxvirt seminar-csc-2015
OSLL
 
Fast Artificial Landmark Detection for indoor mobile robots AIMAVIG'2015
Fast Artificial Landmark Detection for indoor mobile robots AIMAVIG'2015Fast Artificial Landmark Detection for indoor mobile robots AIMAVIG'2015
Fast Artificial Landmark Detection for indoor mobile robots AIMAVIG'2015
OSLL
 
Geo2tag LBS platform training at FRUCT12
Geo2tag LBS platform training at FRUCT12Geo2tag LBS platform training at FRUCT12
Geo2tag LBS platform training at FRUCT12
OSLL
 

Viewers also liked (20)

N8xx olpc connectivity
N8xx olpc connectivityN8xx olpc connectivity
N8xx olpc connectivity
 
[MDBCI] Mariadb continuous integration tool
[MDBCI] Mariadb continuous integration tool[MDBCI] Mariadb continuous integration tool
[MDBCI] Mariadb continuous integration tool
 
Implementation of the new REST API for Open Source LBS-platform Geo2Tag
Implementation of the new REST API for Open Source LBS-platform Geo2TagImplementation of the new REST API for Open Source LBS-platform Geo2Tag
Implementation of the new REST API for Open Source LBS-platform Geo2Tag
 
MOOCs Virtual Lab in Modern Education
MOOCs Virtual Lab in Modern EducationMOOCs Virtual Lab in Modern Education
MOOCs Virtual Lab in Modern Education
 
Обзор файловой системы GlusterFS
Обзор файловой системы GlusterFSОбзор файловой системы GlusterFS
Обзор файловой системы GlusterFS
 
Обзор Btrfs
Обзор BtrfsОбзор Btrfs
Обзор Btrfs
 
SVG-player plugin for ns2 simulations
SVG-player plugin for ns2 simulationsSVG-player plugin for ns2 simulations
SVG-player plugin for ns2 simulations
 
Fruct4 n8xx olpc-connectivity
Fruct4 n8xx olpc-connectivityFruct4 n8xx olpc-connectivity
Fruct4 n8xx olpc-connectivity
 
E.Kalishenko, K.Krinkin, S.P.Shiva Prakash. Process Mining Approach for Traff...
E.Kalishenko, K.Krinkin, S.P.Shiva Prakash. Process Mining Approach for Traff...E.Kalishenko, K.Krinkin, S.P.Shiva Prakash. Process Mining Approach for Traff...
E.Kalishenko, K.Krinkin, S.P.Shiva Prakash. Process Mining Approach for Traff...
 
Обзор архитектуры [файловой] системы Ceph
Обзор архитектуры [файловой] системы CephОбзор архитектуры [файловой] системы Ceph
Обзор архитектуры [файловой] системы Ceph
 
Testing with Selenium
Testing with SeleniumTesting with Selenium
Testing with Selenium
 
Работа с геоданными в MongoDb
Работа с геоданными в MongoDbРабота с геоданными в MongoDb
Работа с геоданными в MongoDb
 
Обзор Linux Control Groups
Обзор Linux Control GroupsОбзор Linux Control Groups
Обзор Linux Control Groups
 
Open Source implementation of ZigBee
Open Source implementation of ZigBeeOpen Source implementation of ZigBee
Open Source implementation of ZigBee
 
Пространства имен Linux (linux namespaces)
Пространства имен Linux (linux namespaces)Пространства имен Linux (linux namespaces)
Пространства имен Linux (linux namespaces)
 
Virtual-HSM: Virtualization of Hardware Security Modules in Linux Containers
Virtual-HSM: Virtualization of Hardware Security Modules in Linux ContainersVirtual-HSM: Virtualization of Hardware Security Modules in Linux Containers
Virtual-HSM: Virtualization of Hardware Security Modules in Linux Containers
 
Кратчайшее введение в docker по-русски
Кратчайшее введение в docker по-русскиКратчайшее введение в docker по-русски
Кратчайшее введение в docker по-русски
 
Linuxvirt seminar-csc-2015
Linuxvirt seminar-csc-2015Linuxvirt seminar-csc-2015
Linuxvirt seminar-csc-2015
 
Fast Artificial Landmark Detection for indoor mobile robots AIMAVIG'2015
Fast Artificial Landmark Detection for indoor mobile robots AIMAVIG'2015Fast Artificial Landmark Detection for indoor mobile robots AIMAVIG'2015
Fast Artificial Landmark Detection for indoor mobile robots AIMAVIG'2015
 
Geo2tag LBS platform training at FRUCT12
Geo2tag LBS platform training at FRUCT12Geo2tag LBS platform training at FRUCT12
Geo2tag LBS platform training at FRUCT12
 

Similar to OLPC Mesh networking improvements

Wireless mesh networkk routing
Wireless mesh networkk routingWireless mesh networkk routing
Wireless mesh networkk routing
Abhishek Kona
 
Haystack Technology Overview
Haystack Technology OverviewHaystack Technology Overview
Haystack Technology Overview
Haystack Technologies
 
Wiki2010 Unit 4
Wiki2010 Unit 4Wiki2010 Unit 4
Wiki2010 Unit 4
Rebecca Buono
 
Ods chapter7
Ods chapter7Ods chapter7
Ods chapter7
JeroenDhondt
 
เทคโนโลยีสารสนเทศสำหรับครู
เทคโนโลยีสารสนเทศสำหรับครูเทคโนโลยีสารสนเทศสำหรับครู
เทคโนโลยีสารสนเทศสำหรับครู
Beauso English
 
Mba admission in india
Mba admission in indiaMba admission in india
Mba admission in india
Edhole.com
 
Spring sim 2010-riley
Spring sim 2010-rileySpring sim 2010-riley
Spring sim 2010-riley
Sopna Sumāto
 
Robot Operating Systems (Ros) Overview &amp; (1)
Robot Operating Systems (Ros) Overview &amp; (1)Robot Operating Systems (Ros) Overview &amp; (1)
Robot Operating Systems (Ros) Overview &amp; (1)
Piyush Chand
 
Robot operating systems (ros) overview & (1)
Robot operating systems (ros) overview & (1)Robot operating systems (ros) overview & (1)
Robot operating systems (ros) overview & (1)
Piyush Chand
 
Software defined network
Software defined networkSoftware defined network
Software defined network
Bogamoga1
 
Network the 4th layer
Network the 4th layerNetwork the 4th layer
Network the 4th layer
kachbourimed
 
TransPAC3/ACE Measurement & PerfSONAR Update
TransPAC3/ACE Measurement & PerfSONAR UpdateTransPAC3/ACE Measurement & PerfSONAR Update
TransPAC3/ACE Measurement & PerfSONAR Update
International Networking at Indiana University
 
A Process Oriented Development Flow for Wireless System Networks by Bernard P...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...A Process Oriented Development Flow for Wireless System Networks by Bernard P...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...
ESUG
 
Introduction to socket programming nbv
Introduction to socket programming nbvIntroduction to socket programming nbv
Introduction to socket programming nbv
Nagasuri Bala Venkateswarlu
 
Superfluid Deployment of Virtual Functions: Exploiting Mobile Edge Computing ...
Superfluid Deployment of Virtual Functions: Exploiting Mobile Edge Computing ...Superfluid Deployment of Virtual Functions: Exploiting Mobile Edge Computing ...
Superfluid Deployment of Virtual Functions: Exploiting Mobile Edge Computing ...
Stefano Salsano
 
NetSim Webinar on Cognitive Radio Networks
NetSim Webinar on Cognitive Radio NetworksNetSim Webinar on Cognitive Radio Networks
NetSim Webinar on Cognitive Radio Networks
SANJAY ANAND
 
PERFORMANCE STUDIES ON THE VARIOUS ROUTING PROTOCOLS IN AD-HOC NETWORKS
PERFORMANCE STUDIES ON THE  VARIOUS ROUTING PROTOCOLS IN AD-HOC NETWORKSPERFORMANCE STUDIES ON THE  VARIOUS ROUTING PROTOCOLS IN AD-HOC NETWORKS
PERFORMANCE STUDIES ON THE VARIOUS ROUTING PROTOCOLS IN AD-HOC NETWORKS
JYoTHiSH o.s
 
Manet algo
Manet algoManet algo
Manet algo
Arul Ganesh
 
Designing High-Performance and Scalable Middleware for HPC, AI and Data Science
Designing High-Performance and Scalable Middleware for HPC, AI and Data ScienceDesigning High-Performance and Scalable Middleware for HPC, AI and Data Science
Designing High-Performance and Scalable Middleware for HPC, AI and Data Science
Object Automation
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
Carlo Fonda
 

Similar to OLPC Mesh networking improvements (20)

Wireless mesh networkk routing
Wireless mesh networkk routingWireless mesh networkk routing
Wireless mesh networkk routing
 
Haystack Technology Overview
Haystack Technology OverviewHaystack Technology Overview
Haystack Technology Overview
 
Wiki2010 Unit 4
Wiki2010 Unit 4Wiki2010 Unit 4
Wiki2010 Unit 4
 
Ods chapter7
Ods chapter7Ods chapter7
Ods chapter7
 
เทคโนโลยีสารสนเทศสำหรับครู
เทคโนโลยีสารสนเทศสำหรับครูเทคโนโลยีสารสนเทศสำหรับครู
เทคโนโลยีสารสนเทศสำหรับครู
 
Mba admission in india
Mba admission in indiaMba admission in india
Mba admission in india
 
Spring sim 2010-riley
Spring sim 2010-rileySpring sim 2010-riley
Spring sim 2010-riley
 
Robot Operating Systems (Ros) Overview &amp; (1)
Robot Operating Systems (Ros) Overview &amp; (1)Robot Operating Systems (Ros) Overview &amp; (1)
Robot Operating Systems (Ros) Overview &amp; (1)
 
Robot operating systems (ros) overview & (1)
Robot operating systems (ros) overview & (1)Robot operating systems (ros) overview & (1)
Robot operating systems (ros) overview & (1)
 
Software defined network
Software defined networkSoftware defined network
Software defined network
 
Network the 4th layer
Network the 4th layerNetwork the 4th layer
Network the 4th layer
 
TransPAC3/ACE Measurement & PerfSONAR Update
TransPAC3/ACE Measurement & PerfSONAR UpdateTransPAC3/ACE Measurement & PerfSONAR Update
TransPAC3/ACE Measurement & PerfSONAR Update
 
A Process Oriented Development Flow for Wireless System Networks by Bernard P...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...A Process Oriented Development Flow for Wireless System Networks by Bernard P...
A Process Oriented Development Flow for Wireless System Networks by Bernard P...
 
Introduction to socket programming nbv
Introduction to socket programming nbvIntroduction to socket programming nbv
Introduction to socket programming nbv
 
Superfluid Deployment of Virtual Functions: Exploiting Mobile Edge Computing ...
Superfluid Deployment of Virtual Functions: Exploiting Mobile Edge Computing ...Superfluid Deployment of Virtual Functions: Exploiting Mobile Edge Computing ...
Superfluid Deployment of Virtual Functions: Exploiting Mobile Edge Computing ...
 
NetSim Webinar on Cognitive Radio Networks
NetSim Webinar on Cognitive Radio NetworksNetSim Webinar on Cognitive Radio Networks
NetSim Webinar on Cognitive Radio Networks
 
PERFORMANCE STUDIES ON THE VARIOUS ROUTING PROTOCOLS IN AD-HOC NETWORKS
PERFORMANCE STUDIES ON THE  VARIOUS ROUTING PROTOCOLS IN AD-HOC NETWORKSPERFORMANCE STUDIES ON THE  VARIOUS ROUTING PROTOCOLS IN AD-HOC NETWORKS
PERFORMANCE STUDIES ON THE VARIOUS ROUTING PROTOCOLS IN AD-HOC NETWORKS
 
Manet algo
Manet algoManet algo
Manet algo
 
Designing High-Performance and Scalable Middleware for HPC, AI and Data Science
Designing High-Performance and Scalable Middleware for HPC, AI and Data ScienceDesigning High-Performance and Scalable Middleware for HPC, AI and Data Science
Designing High-Performance and Scalable Middleware for HPC, AI and Data Science
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 

More from OSLL

SLAM Constructor Framework for ROS
SLAM Constructor Framework for ROSSLAM Constructor Framework for ROS
SLAM Constructor Framework for ROS
OSLL
 
Студентам и не только. Как выступить с докладом по своей научной работе
Студентам и не только. Как выступить с докладом по своей научной работеСтудентам и не только. Как выступить с докладом по своей научной работе
Студентам и не только. Как выступить с докладом по своей научной работе
OSLL
 
Full Automated Continuous Integration and Testing Infrastructure for Maxscale...
Full Automated Continuous Integration and Testing Infrastructure for Maxscale...Full Automated Continuous Integration and Testing Infrastructure for Maxscale...
Full Automated Continuous Integration and Testing Infrastructure for Maxscale...
OSLL
 
Microservice architecture for Geo2Tag
Microservice architecture for Geo2TagMicroservice architecture for Geo2Tag
Microservice architecture for Geo2Tag
OSLL
 
Block-level compression in Linux. Pro et contra
Block-level compression in Linux. Pro et contraBlock-level compression in Linux. Pro et contra
Block-level compression in Linux. Pro et contra
OSLL
 
Raspberry Pi robot with ROS
Raspberry Pi robot with ROSRaspberry Pi robot with ROS
Raspberry Pi robot with ROS
OSLL
 
Source code analyzer
Source code analyzer Source code analyzer
Source code analyzer
OSLL
 
Fruct14 sholokhova
Fruct14 sholokhovaFruct14 sholokhova
Fruct14 sholokhova
OSLL
 
SECR'13 Lightweight linux shared libraries profiling
SECR'13 Lightweight linux shared libraries profilingSECR'13 Lightweight linux shared libraries profiling
SECR'13 Lightweight linux shared libraries profiling
OSLL
 
Smart-M3 and Geo2Tag integration
Smart-M3 and Geo2Tag integrationSmart-M3 and Geo2Tag integration
Smart-M3 and Geo2Tag integration
OSLL
 
HTML5 Intro and Tizen Web API
HTML5 Intro and Tizen Web APIHTML5 Intro and Tizen Web API
HTML5 Intro and Tizen Web API
OSLL
 
Fruct13 geo2tag-training
Fruct13 geo2tag-trainingFruct13 geo2tag-training
Fruct13 geo2tag-training
OSLL
 
Json protocol, Geo2tag REST API fundamentals
Json protocol, Geo2tag REST API fundamentalsJson protocol, Geo2tag REST API fundamentals
Json protocol, Geo2tag REST API fundamentals
OSLL
 
Introduction to geo-tagging and geo2tag platform
Introduction to geo-tagging and geo2tag platformIntroduction to geo-tagging and geo2tag platform
Introduction to geo-tagging and geo2tag platform
OSLL
 
Detection pulse by video
Detection pulse by video Detection pulse by video
Detection pulse by video OSLL
 
Using Intel NAS-PT for testing NAS disks
Using Intel NAS-PT for testing NAS disksUsing Intel NAS-PT for testing NAS disks
Using Intel NAS-PT for testing NAS disksOSLL
 

More from OSLL (16)

SLAM Constructor Framework for ROS
SLAM Constructor Framework for ROSSLAM Constructor Framework for ROS
SLAM Constructor Framework for ROS
 
Студентам и не только. Как выступить с докладом по своей научной работе
Студентам и не только. Как выступить с докладом по своей научной работеСтудентам и не только. Как выступить с докладом по своей научной работе
Студентам и не только. Как выступить с докладом по своей научной работе
 
Full Automated Continuous Integration and Testing Infrastructure for Maxscale...
Full Automated Continuous Integration and Testing Infrastructure for Maxscale...Full Automated Continuous Integration and Testing Infrastructure for Maxscale...
Full Automated Continuous Integration and Testing Infrastructure for Maxscale...
 
Microservice architecture for Geo2Tag
Microservice architecture for Geo2TagMicroservice architecture for Geo2Tag
Microservice architecture for Geo2Tag
 
Block-level compression in Linux. Pro et contra
Block-level compression in Linux. Pro et contraBlock-level compression in Linux. Pro et contra
Block-level compression in Linux. Pro et contra
 
Raspberry Pi robot with ROS
Raspberry Pi robot with ROSRaspberry Pi robot with ROS
Raspberry Pi robot with ROS
 
Source code analyzer
Source code analyzer Source code analyzer
Source code analyzer
 
Fruct14 sholokhova
Fruct14 sholokhovaFruct14 sholokhova
Fruct14 sholokhova
 
SECR'13 Lightweight linux shared libraries profiling
SECR'13 Lightweight linux shared libraries profilingSECR'13 Lightweight linux shared libraries profiling
SECR'13 Lightweight linux shared libraries profiling
 
Smart-M3 and Geo2Tag integration
Smart-M3 and Geo2Tag integrationSmart-M3 and Geo2Tag integration
Smart-M3 and Geo2Tag integration
 
HTML5 Intro and Tizen Web API
HTML5 Intro and Tizen Web APIHTML5 Intro and Tizen Web API
HTML5 Intro and Tizen Web API
 
Fruct13 geo2tag-training
Fruct13 geo2tag-trainingFruct13 geo2tag-training
Fruct13 geo2tag-training
 
Json protocol, Geo2tag REST API fundamentals
Json protocol, Geo2tag REST API fundamentalsJson protocol, Geo2tag REST API fundamentals
Json protocol, Geo2tag REST API fundamentals
 
Introduction to geo-tagging and geo2tag platform
Introduction to geo-tagging and geo2tag platformIntroduction to geo-tagging and geo2tag platform
Introduction to geo-tagging and geo2tag platform
 
Detection pulse by video
Detection pulse by video Detection pulse by video
Detection pulse by video
 
Using Intel NAS-PT for testing NAS disks
Using Intel NAS-PT for testing NAS disksUsing Intel NAS-PT for testing NAS disks
Using Intel NAS-PT for testing NAS disks
 

Recently uploaded

How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 

Recently uploaded (20)

How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 

OLPC Mesh networking improvements

  • 1. OLPC Mesh network improving Arina Rudakova (Saint-Petersburg Elelectrotechnical University «LETI») 3rd FRUCT seminar Saint-Petersburg 23 May 2008
  • 2. Agenda  Introduction  Problem definition  Domain analysis  Solution  Project timeline
  • 4. One Laptop Per Child  Home: http://laptop.org  The mission of the One Laptop per Child association is to develop a low-cost laptop—the "XO Laptop"— to revolutionize how we educate the world's children. Goal is to provide children around the world with new opportunities to explore, experiment, and express themselves.
  • 5. XO laptops hardware  Dimensions: 242mm × 228mm × 32mm  CPU x86-compatible processor AMD Geode LX-700 433 Mhz, 64KB each L1 I and D cache; at least 128KB L2 cache  DRAM memory: 256 MiB dynamic RAM  BIOS: 1024KiB SPI-interface flash ROM  Mass storage: 1024 MiB SLC NAND flash, high-speed flash controller  Display: Liquid-crystal display: 7.5” dual-mode TFT display  Keyboard: 80+ keys, 1.0mm stroke; sealed rubber-membrane key-switch assembly  Gamepad: Two sets of four-direction cursor-control keys  Touchpad: Dual capacitance/resistive touchpad; supports written-input mode  Audio: AC’97 compatible audio subsystem  Integrated color video camera: 640 x 480 resolution at 30 FPS  Wireless Networking: Integrated 802.11b/g (2.4GHz) interface; 802.11s (Mesh) networking supported; dual adjustable, rotating antennas support diversity reception; capable of mesh operation when CPU is powered down;
  • 6. XO laptops software  Operating system: Linux Kernel: Linux 2.6.22; Fedora 7 base environment.  User environment: Sugar GUI, written in Python, on top of the X Window and the Matchbox WM  Programming environments (main): − Python (Version 2.5); − JavaScript; − Csound, music programming language; − Etoys, an implementation of Squeak using Smalltalk, an object-based programming language; − Turtle Art, a graphical programming environment; − Adobe's Flash Player, Java, Gnash  Libraries − Mozilla Gecko/Xulrunner (the Firefox web engine); − GUI toolkit (GTK+) (Gnome); − Matchbox window manager; − X Window System X.org Foundation; − Multimedia framework: GStreamer and RealNetworks; − Gettext, the GNU internationalization library
  • 7. Neighborhood: Collaboration interface The Neighbourhood view displays all the connected XO laptops within a child’s community, and what activities they are sharing. Each child is represented by a different colour If there is a shared document or activity being collaborated on by a number of children, it will show up within this view.
  • 8. XO Mesh goals  Ability to act as a mesh point when laptop's main CPU is off.  Support for asymmetric links/paths.  Incremental releases—mesh networking is available immediately on XO; Upgrades will continue to improve functionality and adherence with standards.  Simultaneously acts as a mesh point and an infrastructure node.  Standards Compliance: follow 802.11s draft when possible.
  • 10. Mesh network types  Infrastructure wireless mesh networks: Mesh routers form an infrastructure for clients.  Client wireless mesh networks: Client nodes constitute the actual network to perform routing and configuration functionalities.  Hybrid wireless mesh networks: Mesh clients can perform mesh functions with other mesh clients as well as accessing the network
  • 11. Distinguishing features  dynamics  structure
  • 12. Routing mechanism in mesh  Redundante links usage − Fault tolerance − Load sharing  Traffic analysis  Network diversity  Route aggregation
  • 13. Routing overhead reasons  Nodes number influence on the amount of control traffic  Network changes dynamics influence on the amount of control traffic  Route length influence on the amount of control traffic
  • 14. Project Goals  Reducing Routing overhead  OLPC implementation
  • 16. Ad-hoc Routing types  Pro-active or Table-driven  Reactive Routing or On-demand  Flow Oriented  Adaptive Routing or Situation-Aware  Hybrid (Pro-Active and Reactive)
  • 17. Industrial and open source implementations  AWDS (Ad-hoc Wireless Distribution Service) http://awds.berlios.de/  DSDV (Highly Dynamic Destination-Sequenced Distance Vector routing protocol) – based on Bellman-Ford Routing Protocol  AODV (Ad-hoc On-demand Distance Vector)  Mobile Ad-hoc On-Demand Data Delivery Protocol  MPRDV (Multipoint Relay Distance Vector protocol)  SSR (Signal Stability Routing protocol)  PLBR (Preferred link based routing)  TORA (Temporally-Ordered Routing Algorithm routing protocol)  HRPLS (Hybrid Routing Protocol for Large Scale Mobile Ad-Hoc Networks with Mobile Backbones)  HSLS (Hazy Sighted Link State routing protocol)  ZRP (Zone Routing Protocol)
  • 19. Solution components  Routing area restriction  Dynamic selection of optimization radius  External definition of routing overhead
  • 20. Routing overhead chart  m — tree arity  n — nodes number  R — dynamics
  • 21. Possible reasons of routing overhead increase  Number of nodes increase  Network dynamics increase  Network radius increase  Using aggressive updating strategy
  • 22. Routing area restriction For effective routing area definition we should introduce some definitions. G(t)=<V,E>, where V – set of nodes, E – arches G(t) describes network topology d(vi,vj) – distance between vi and vj vi: Ri>0, G (vi , Ri ) ⊂ G (t ), d (vi , v j ) ≤ Ri Choose Ri with regard to time needed for collection of information about G(vi,Ri) G(vi,Ri) - effective routing area for vi, G (vi , Ri ) ≡ R(vi )
  • 23. External and internal routing records  External routing records (only in edge nodes)  Internal routing records (always true)
  • 24. Routing optimization area  Local optimization  Global optimization  Optimization in restricted area
  • 25. Local sample  Information collection – 1 hop  Route defining – 1 hop  «Trust» zone – 1 hop  Control traffic is minimum
  • 26. Global sample  Information collection – whole net  Route defining – whole net  «Trust» zone – whole net  Control traffic is maximum
  • 27. Restricted sample  Information collection is restricted with R  Route defining – within R radius  «Trust» zone – within R radius  Control traffic is restricted
  • 28. Failure detection  At first only one router knows about a route failure  After the message to sender about the impossibility of passing, the whole effective routing area is informed  The sender gets informed when its timer is over
  • 31. Global plan The past  2007 Autumn, generic task definition, domain investigation  2008 Winter, getting XO devices, experience XO system programming The future  2008 Summer, public presentation our of solution ideas (conference proceedings or paper)  2008 Autumn, implement modules for NS2 and simulations  2008 Winter, contribute some code for XO laptops  2009 Spring, defence of the master thesises at LETI

Editor's Notes

  1. 1. This is a research project 2. Project has next parts: 1) Research/investigation 2) Modelling/analysis 3) Implementation
  2. мы рассматриваем клиентские сети
  3. Отличительные особенности
  4. Only dynamic routing can allow and make use of redundante links. A router is able to make decisions about which link to use based on a set of configurable measures. Once the redundant links exist, if a link goes down, an alternative path around the failed node will be automatically found and used. Even if links do not actually go down, the routers can distribute the traffic load across the available paths in proportion to the bandwidth available on each path. Routers&apos; reports about what they are doing make it easy to produce good statistics about network utilisation which would allow us to hilight areas of heavy traffic, for example, and plan acordingly. Using routers at a backbone level would allow people running Access Point to run pretty much networking software and formats. Routers can aggregate routes to subnets that are part of the same larger network into a single route to advertise to the rest of the world.
  5. http://www.cse.unsw.edu.au/~nrl/researchprojects.htm#jqadir On Reducing Routing Overhead in MANET Ph.D Candidate: Quan Jun (Jerry) Chen Description: Reducing Routing overhead is one of the most important tasks in wireless network. Particularly, in Mobile Adhoc Network (MANET), where topology changes frequently, routing protocols may generate considerable routing overhead when conquering the uncertainty of mobile nodes. Excessive routing overhead consumes valuable resources, such as bandwidth and power, and causes frequent packet collisions, which finally degrade network throughput and end-to-end delay. In our work, we decompose routing protocols into two fundamental building blocks: 1) beacon broadcasting (route maintenance) and 2) flooding rebroadcasting (route discovery), and we propose two frameworks respectively to reduce routing overhead occurred. For the first one, we propose the framework of “Adaptive Beacon Broadcasting (ABB)”, which adapts beacon broadcasting to nodes mobility and traffic load. For the second one, by exploiting the relationship between flooding distance and the number of hops, we propose “Distance-based Flooding Restriction (DFR)”. Both frameworks are evaluated by theoretical model and simulation. The results show ABB and DFR can significantly reduce routing overhead without compromising other performance metrics.
  6. Pro-active This type of protocols maintains fresh lists of destinations and their routes by periodically distributing routing tables throughout the network. The main disadvantages of such algorithms are - 1. Respective amount of data for maintenance. 2. Slow reaction on restructuring and failures. Reactive This type of protocols finds a route on demand by flooding the network with Route Request packets. The main disadvantages of such algorithms are - 1. High latency time in route finding. 2. Excessive flooding can lead to network clogging. Flow-Oriented This type of protocols finds a route on demand by following present flows. One option is to unicast consecutively when forwarding data while promoting a new link The main disadvantages of such algorithms are - 1. Takes long time when exploring new routes without a priori knowledge. 2. May refer to entitative existing traffic to compensate for missing knowledge on routes. Adaptive This type of protocols combines the advantages of proactive and of reactive routing. The routing is initially established with some proactively prospected routes and then serves the demand from additionally activated nodes through reactive flooding. Some metrics must support the choice of reaction. The main disadvantages of such algorithms are - 1. Advantage depends on amount of nodes activated. 2. Reaction to traffic demand depends on gradient of traffic volume. Hybrid This type of protocols combines the advantages of proactive and of reactive routing. The routing is initially established with some proactively prospected routes and then serves the demand from additionally activated nodes through reactive flooding. The choice for one or the other method requires predetermination for typical cases. The main disadvantages of such algorithms are - 1. Advantage depends on amount of nodes activated. 2. Reaction to traffic demand depends on gradient of traffic volume.
  7. Restrict routing area. Efficient routing area definition. Optimal routing inside the effective routing area. Not guaranteed — outside. Change optimization radius to control network services&apos; QoS. Limit routing overhead externally in order to provide this requirement. Trade-off between traffic overhead and routes quality.
  8. Арность дерева — число несвязанных узлов в дереве, с которыми связан каждый узел дерева Дерево — худший из возможных вариантов маршрутизации
  9. Общая идея такая: чем большее число узлов каждый маршрутизатор (node в данном случае) будет использовать для поиска маршрута, тем большие накладные расходы
  10. d(v i ,v j ) – distance between v i and v j - min hop count With right R i number nodes will have all necessary information for optimal route definition. Calculation expenses for effective route search algorithms are low.