Cybikos: wireless handheld computers Cybikos specifications: 32-bit processor running at 11mhz 4mhz coprocessor for its radio transmitter 512k of RAM 512k.

Slides:



Advertisements
Similar presentations
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Advertisements

How does a network identify computers and transmissions?
Operating System.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Company name KUAS HPDS Using Remote Memory Paging for Handheld Devices in a Pervasive Computing Environment Arjuna Sathiaseelan.
Answers of Exercise 7 1. Explain what are the connection-oriented communication and the connectionless communication. Give some examples for each of the.
Network Layer and Transport Layer.
28.2 Functionality Application Software Provides Applications supply the high-level services that user access, and determine how users perceive the capabilities.
Ad-Hoc Networking on Wireless Devices Ben Hilldore Advisor: Dr. Alvin Lim 8/07/2003.
Generic Sensor Platform for Networked Sensors Haywood Ho.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Chapter 27 Q and A Victor Norman IS333 Spring 2015.
Layer-3 Routing Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
Systems Software Operating Systems.
Connecting LANs, Backbone Networks, and Virtual LANs
The Operating System. Operating Systems (F) What you need to know about –operating system as a program; –directory/folder.
Chapter 4.  Understand network connectivity.  Peer-to-Peer network & Client-Server network  Understand network topology  Star, Bus & Ring topology.
Q and A for Ch. 17 CS 332, Spring Fiber Modems Q: Why use fiber modem extensions? Is it to save money on not having to use as much fiber (otherwise.
Operating Systems Operating System
© Paradigm Publishing Inc. 4-1 Chapter 4 System Software.
© Oxford University Press 2011 Computer Networks Bhushan Trivedi, Director, MCA Programme, at the GLS Institute of Computer Technology, Ahmadabad.
DEMIGUISE STORAGE An Anonymous File Storage System VIJAY KUMAR RAVI PRAGATHI SEGIREDDY COMP 512.
3/11/2002CSE Input/Output Input/Output Control Datapath Memory Processor Input Output Memory Input Output Network Control Datapath Processor.
Routing and Routing Protocols Dynamic Routing Overview.
Chapter 4 System Software.
Lecturer: Ghadah Aldehim
Operating System. Architecture of Computer System Hardware Operating System (OS) Programming Language (e.g. PASCAL) Application Programs (e.g. WORD, EXCEL)
Common Devices Used In Computer Networks
Four Components of a Computer System. Computer System Components Users (people, machines, other computers) Applications programs – define the ways in.
CS 1308 Computer Literacy and the Internet. Introduction  Von Neumann computer  “Naked machine”  Hardware without any helpful user-oriented features.
Gathering Data in Wireless Sensor Networks Madhu K. Jayaprakash.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Introduction to Interactive Media Interactive Media Tools: Software.
Operating Systems Lecture 2 Processes and Threads Adapted from Operating Systems Lecture Notes, Copyright 1997 Martin C. Rinard. Zhiqing Liu School of.
Recall: Three I/O Methods Synchronous: Wait for I/O operation to complete. Asynchronous: Post I/O request and switch to other work. DMA (Direct Memory.
Chapter 8: Operating Systems and Utility Programs Catherine Gifford Dan Falgares.
INVITATION TO COMPUTER SCIENCE, JAVA VERSION, THIRD EDITION Chapter 6: An Introduction to System Software and Virtual Machines.
Tony McGregor RIPE NCC Visiting Researcher The University of Waikato DAR Active measurement in the large.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
Introduction to dCache Zhenping (Jane) Liu ATLAS Computing Facility, Physics Department Brookhaven National Lab 09/12 – 09/13, 2005 USATLAS Tier-1 & Tier-2.
ECE 526 – Network Processing Systems Design Computer Architecture: traditional network processing systems implementation Chapter 4: D. E. Comer.
1 UNIT 13 The World Wide Web Lecturer: Kholood Baselm.
X-WindowsP.K.K.Thambi The X Window System Module 5.
OPERATING SYSTEMS BY LANDON, KYLE, AND ETHAN. WHAT IS THEIR PURPOSE? (1) manage the computer's resources, such as the central processing unit (2) establish.
Interactive Workflows Branislav Šimo, Ondrej Habala, Ladislav Hluchý Institute of Informatics, Slovak Academy of Sciences.
Routing Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute of Information.
Lecture Topics: 11/27 Networks Layered Model Ethernet IP.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
1 THE COMPUTER. 2 Input Processing Output Storage 4 basic functions.
© Paradigm Publishing, Inc. 4-1 Chapter 4 System Software Chapter 4 System Software.
Communications & Networks National 4 & 5 Computing Science.
Lecture 4 Mechanisms & Kernel for NOSs. Mechanisms for Network Operating Systems  Network operating systems provide three basic mechanisms that support.
Illustrating Networking Concepts with Wireless Handheld Devices Brad Richards & Nate Waisbrot Computer Science Department Vassar College.
Week1: Introduction to Computer Networks. Copyright © 2012 Cengage Learning. All rights reserved.2 Objectives 2 Describe basic computer components and.
Silberschatz, Galvin and Gagne ©2011 Operating System Concepts Essentials – 8 th Edition Chapter 2: The Linux System Part 5.
Systems and User Interface Software. Types of Operating System  Single User  Multi User  Multi-tasking  Batch Processing  Interactive  Real Time.
An operating system (OS) is a collection of system programs that together control the operation of a computer system.
Day 13 Intro to MANs and WANs. MANs Cover a larger distance than LANs –Typically multiple buildings, office park Usually in the shape of a ring –Typically.
1 UNIT 13 The World Wide Web. Introduction 2 Agenda The World Wide Web Search Engines Video Streaming 3.
1 UNIT 13 The World Wide Web. Introduction 2 The World Wide Web: ▫ Commonly referred to as WWW or the Web. ▫ Is a service on the Internet. It consists.
OPERATING SYSTEM REVIEW. System Software The programs that control and maintain the operation of the computer and its devices The two parts of system.
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
Software Architecture of Sensors. Hardware - Sensor Nodes Sensing: sensor --a transducer that converts a physical, chemical, or biological parameter into.
Computer 4 JEOPARDY Bobbie, Sandy, Trudy.
Introduction to Operating System (OS)
Chapter 3: Windows7 Part 4.
Chapter 16: Distributed System Structures
Software Defined Networking (SDN)
GEOMATIKA UNIVERSITY COLLEGE CHAPTER 2 OPERATING SYSTEM PRINCIPLES
Presentation transcript:

Cybikos: wireless handheld computers Cybikos specifications: 32-bit processor running at 11mhz 4mhz coprocessor for its radio transmitter 512k of RAM 512k of flash memory (used for storage) 160x100 grayscale LCD display 300 foot range on their wireless communications. Why we picked Cybikos: They’re very cheap They have a full-featured operating system They have built-in support for ad-hoc wireless networking The compiler runs under Windows or Linux, any PC can transfer files to the Cybiko The solution: Each computer keeps a table telling it who it’s connected to. Whenever the user tries to send data through my interface, the computer checks against the table to see if it should allow the data to go through. This check is transparent to the user. What I did: The computers will only talk over the lines colored in blue a d b c abcd a b c d connections -√xx √-√√ x√-x x√x- a b c d a d b c The Problem: I had a wireless network, but I needed to make it behave as if it were a wired network. In a wireless network, any computer can communicate with any other computer. In a wired network, computers can only communicate if they have a wire running between them. What I had: All the computers are interconnected.What I wanted: Only adjacent computers are connected. Virtual network administration: I made one of the nodes an administrator -- not participating in the virtual network as a node, but overseeing the simulation. Virtual network startup routine: 1) The administrator figures out what the network will look like 2) The administrator gathers all the computers it needs and tells them to wait for the network 3) The admin sends its network table, which contains everything the nodes need to know Code structure: My virtual topology is made of multiple layers of abstraction from the Cybiko OS. Cybiko OS Send and receive, names Virtual topology Protocol Provides a familiar interface to send and receive functions and the ability to use strings for source and destination, instead of serial numbers. Keeps a record of the network topology and enforces it. Handles key presses, checking for messages, and provides a basic GUI. Decides how to handle messages from other nodes (by forwarding them on to another Cybiko, for example). Are there system messages? place it in the data queue yes React appropriately used in my interface? yes Pass the key press to the protocol code no Are there messages in the data queue? from another node? key press? yes no Consume the message no Topology change? load the new topology Message from the administrator? Pass it to the protocol code yes pass the data to the protocol code no yes Message system: The single most complicated part of the virtual topology is handling messages. The Cybiko OS sends an application messages for any event: key presses, system events (low battery, etc), and messages from other Cybikos. System messages, and key presses that affect the GUI need to be responded to quickly, and data from other virtual nodes needs to be processed by the protocol code. The system I developed reacts immediately to local messages, and queues messages from remote machines in a separate queue to keep the system’s queue from overflowing. Conclusion: We have three completed protocols, demonstrating flooding, distance vector, and link state routing, and the underlying system is complete. Having successfully tested the programs on students, the simulation of wired networks is finished. We have begun work simulating wireless and low-level networking situations. Nathaniel WaisbrotAdvisor: Professor Brad Richards Vassar College, Poughkeepsie NY Project Goal Create a system for simulating an arbitrary wired network atop hand-held wireless computers. Initial requirements : The system must be robust enough to support a wide variety of protocols The system must provide a layer of abstraction, so that the protocol code can be understood by people without knowledge of the system The eventual goal of this project is to create a series of labs, suitable for supplementing an undergraduate computer science course. These labs will allow students to experience and experiment with both wired and wireless networking in a hands-on fashion. The results of work will be presented to the National Science Foundation, which funded this project through its Course, Curriculum and Laboratory Improvement program. Requirements of a virtual network: There are certain things which all the nodes of a virtual network need to know before they can work together What is the shape of the network? (i.e.: which nodes are connected, and what is the distance or cost of the connection) What are the names of the other nodes? (They can’t talk to each other without knowing their names) Is the network running? (If some of the nodes get their information faster than others, they can’t start networking early)