Demo: Towards a MAC Protocol App Store
نویسندگان
چکیده
In recent years there has been a growing interest in the Internet-of-Things (IoT), leading to an expanding number of wireless environment and application domains in which IoT deployments are realized. Over the course of its lifetime, an IoT device will be exposed to different environments and varying demands in terms of network throughput, latency, power consumption, etc. For instance, consider the case of transportation and logistics where sensors will be attached to goods, pallets and containers, monitoring their respective state. These nodes need to work optimally every step of the supply chain: from frequent monitoring in densely packed warehouses to infrequent monitoring during overseas transit. The Medium Access Control (MAC) plays a major role in how a device handles the (changing) application requirements and environment. Unfortunately today there is no onesize-fits-all MAC protocol that works well in all cases. This causes an ever increasing number of MAC protocols that are each optimized for a certain application [1]. There have also been some hybrid or adaptive protocols developed to cope with different environments [2], but even they have limitations in reconfiguring the parameters or changing the behaviour of MAC protocols.
منابع مشابه
Towards A Modular Enterprise App Store
Mobile technologies and more precisely apps have disrupted technology scenario. Bring your own application (BYOA) is a new trend that has emerged after the “bring your own device” (BYOD) vogue. However, and in spite of its intrinsic benefits, the trend presents also several caveats and Enterprise app stores are seen as a way to tackle these risks. In this paper, authors present ModEAS, a system...
متن کاملDemo Abstract: SicsthSense - Dispersing the Cloud
This demo presents SicsthSense, our open cloud platform for the Internet of Things. SicsthSense enables low power devices such as sensor nodes and smartphones to easily store their generated data streams in the cloud. This allows the data streams, and their history, to be made permanently available to users for visualisation, processing and sharing. Moving sensor data computation and monitoring...
متن کاملDEMO: Enabling Trusted Stores for Android
In the Android ecosystem, the process of verifying the integrity of downloaded apps is left to the user. Different from other systems, e.g., Apple App Store, Google does not provide any certified vetting process for the Android apps. This choice has a lot of advantages but it is also the open door to possible attacks as the recent one shown by Bluebox [4]. To address this issue, this demo prese...
متن کاملDesign of a MAC Protocol with Need-Based Scheduling for Wireless Sensor Networks
Sensor networks are a network of nodes working towards a common application such as temperature or light measurement in a field. These sensor nodes are characterized by limited energy resources. We have designed Th-MAC, an energy conserving Medium Access Control(MAC) protocol for wireless sensor networks, the core of which is characterized by need-based scheduling of sleep-wakeup cycle. The nod...
متن کاملDemo Abstract: Generation of Controllable Radio Interference for Protocol Testing in Wireless Sensor Networks
Radio interference plays a central role for the performance ofWireless Sensor Networks (WSN). Interference not only leads to packet loss, but it also affects the function of MAC and routing protocols. Hitherto, testing the impact of interference on WSN experimentally has been difficult because of the unavailability of low-cost tools to create reproducible and well-controlled interference patter...
متن کامل