NSF Wireless/Mobile Planning Group Workshop
Session Notes

Home | Agenda/Slides | Abstracts | Position Papers

WMPG Technical Proposal

Internet Architecture White Paper

Presentation Abstracts

Position Papers

Breakout Sessions

Wireless Implementation

WMPG Site VIsit slides draft for comment

Session II

Wireless/Mobile/Sensor Network Requirements

Session Notes

Wireless Sensor Networks for Environmental Monitoring - Drivers for Adaptive and Programmable Network and Distributed System Services (Deborah Estrin)

The talk consists of two parts: one is environmental monitoring application drivers, and the other is drivers motivated by sensor computing with cars and people. They are distributed applications and create programmable, autonomous networks. Current technology research focus includes heterogeneous wireless sensor networks, which may take into account mobile components, algorithms to optimize the whole system, data integration, network scalability (hierarchy) and the ability to deal with rich sensor data and real-time interruption, and security/privacy.


1. Are senor networks connected each other? How is the system different? Is heterogeneity within the sensor net?

2. Scalability: why does a car need to talk to another car which is very far away from? This is another sense of scalability from the Internet.

3. Programmable: What are the software requirements? This is a challenge. The software can not be complicated and expensive. Efforts will be made to develop new embedded programmable applications, which is not trivial.

Mobile/Wireless Networking Scenarios/Requirements (Mario Gerla)

This talk discussed some wireless scenarios that drive new requirements on the Internet "network layer", which may trigger a "redesign" of the IP stack. The wireless scenarios include the Internet access, ad hoc networks, sensor, pervasive computing and some military network. After presenting the functions of the network layer, the speaker also discussed the impacts of other layers' made on IP by cross layer interaction: lower layer information help the network and higher layers make decision; while higher layers motivate the network layer as well.

Network Requirements Arising from Mobile Platforms (Kevin Kahn)

This talk presented the Whither platforms, which has the features of high numbers, close cooperation, shifting configuration, multiple contexts and multiple network capabilities. The scenarios and capabilities have been also identified. In particular the requirements include fast roaming, constellation gatewaying, personal routing, multi-homing, location relative addressing and cross layer optimizations. Finally the example issues have been given.


Trends and Implications for Unlicensed Wireless Networks (Srinivasan Seshan)

The talk discussed the trends of unlicensed wireless networks by considering the market size, the device density and the network management. Taking into account the diversity on network types, device types and optimization goals, the speaker pointed out the possible solutions would be: to modify only wireless network equipment, or to use the Internet, or to make key changes to the Internet. In addition, it may need the Internet standards for billing, location information, helping manage spectrum and probably providing services for non-IP devices.


1. The public APs are used as an alternative to the infostation. The infostation has in-build storage (cache) as compared to APs, which may simply serve as the bridge.

2. Diverse networks propose different requirements and ask what the internet can do for them.

Near-Field Networks (Badri Nath)

The edge of the Internet is changing. Example scenarios are: automatic checking using sim card in cell phone, data synch at home using gprs/Bluetooth/802.11 devices. Different requirements pose challenges on manageability architecture, opportunistic protocols and configurability. Knobs are used as the interface at the network and device to manage the network, and end-nodes are included as network management elements.

Security Challenges Facing the Future Wireless World (Wade Trappe)

Security is a challenge, especially in wireless networks. After reevaluating the security paradigm for wireless systems on confidentiality, integrity, forensics, privacy, location services, resource management, physical security, intrusion detection, non repudiation and availability, the speaker brought out some considerations: - We always need traditional security. - We have a chance to consider security as we redesign the network.

Interfacing Embedded Sensor Networks to the Internet (Phil Levis)

This talk discussed in particular motes when interfacing to the Internet. The mote network is energy limited, self-organizing and requires aggregate and collaborative operations. The particular scenario is kind of data-, node- and location-centric communication, where an Internet host is communicating with a mote network. Mote networks are not IP-based. Data-centric communication can use layer 4+ protocols on top of IP. The scale and scope of mote networks will require a larger namespace and also a naming system infrastructure. Finally a future Internet was proposed, where there are interconnects existing in the network, and other kind of routing need to be discovered rather than changing the Internet.


1. End-to-end notion. Heterogeneous data link.

2. It is not necessary for sensor data to flow all through the Internet and get all the way involved. For example, the geographic application does not require data going through the Internet. Internet is sufficient as the backbone network.


Instructions for Workshop Participants

Directions to WINLAB Tech Center II facility

Directions to Workshop Dinner on Aug 2

For problems or questions regarding this web contact webmaster@winlab.rutgers.edu.