Sokwoo Rhee, Ph.D. Sheng Liu, Ph.D.
|
|
- Kerrie Wilcox
- 8 years ago
- Views:
Transcription
1 Sokwoo Rhee, Ph.D. Sheng Liu, Ph.D.
2 A Guide to the Fundamentals of Wireless Sensor Networks by Sokwoo Rhee, Ph.D. and Sheng Liu, Ph.D. Version 1.0 January Millennial Net, Inc. All rights reserved.
3 About the authors Sokwoo Rhee, Ph.D., was a research associate at MIT focusing on wireless biomedical instrumentation. His research led to the development of a sensor ring that measures the wearer s vital signs. The practical application for this ring was nursing home resident care. Residents would wear the rings to monitor their temperature, heart rate, and oxygen saturation; the data would be transmitted continuously to a base station. The small size requirements of the ring necessitated a small battery. While a coin cell battery would fit the bill in terms of size, there were power consumption and mobility challenges still to be met. For practical reasons, the battery would need to run for months not days, the transmission range would need to cover the entire nursing home facility, and the data transmission would need to support mobile residents. Sokwoo began researching mesh networking as the approach to address the requirements and bring the application from a good idea to a practical solution. Sheng Liu, Ph.D., spent five years as a research scientist at MIT, directing industry-sponsored research programs in the areas of controls, robotics, simulations, signal processing, and mechatronics. He then went to Raytheon where, as Senior Development Engineer, he played a critical role in designing receiver spread-spectrum decoding algorithms for differential-gps based aircraft precision approach and landing systems. In 2000, Sokwoo and Sheng joined forces. Sheng s experience in autonomous systems analysis, dynamic programming, and algorithm development combined with Sokwoo s work on the practical biomedical sensor application resulted in the development of a set of innovative techniques to meet the practicality needs of the ring sensor. These techniques broke ground in reducing power consumption, extending transmission distance, and managing a dynamic, mobile network with a high degree of reliability. The result was a wireless sensor networking protocol that was applicable across a wide spectrum of applications. With this breakthrough protocol, Sowkoo and Sheng founded Millennial Net, Inc. and developed and commercialized the Millennial Net wireless sensor networking platform. Today, as chief technology officer and vice president of research respectively, Sokwoo and Sheng continue to lead the industry in developing innovative technologies to enable Millennial Net s customers develop practical wireless sensor networking-enabled applications.
4 1. Introduction...1 Purpose of This Source Book...1 Symbols Used in this Book...2 Defining Wireless Sensor Networks...3 Opportunities...5 Replacing Traditional Wired Networks... 5 New Opportunities Wireless Sensor Networking Overview...6 System Modules...6 Application Platform... 7 Gateway...7 Mesh Node Module... 8 End Node Module... 8 Sensor/Actuator... 8 System Software...9 Module Firmware... 9 API... 9 Network Monitoring System Network Design Considerations...11 Design Drivers Range Shout Versus Whisper Environmental Concerns Radio Frequency Radio Transmission Techniques Power Data Rate Raw Data Rate Network Throughput Duty Cycle Scalability Mobility Mobile Sensors Mobile Gateways Topologies and Data Models...23 Network Topologies Star Mesh Star-Mesh Hybrid Data Models Data Collection Models Bi-Directional Dialogue Data Models Routing Techniques...30 Efficient Protocol Proactive Protocols Reactive Protocols Routing Protocol Design The Millennial Net System...34 Persistent Dynamic Routing Protocol Highly Responsive Reliable Extremely Power Efficient Scalable Build vs. Buy A Complete System System Software Hardware Modules Development and Management Tools Evaluation Kits Glossary...38
5 1. Introduction The Wireless Sensor Networking Source Book provides a methodology for selecting and implementing a wireless sensor network. Your company s project requires integrating a wireless sensor network between a network of sensors and the application used to monitor and control them. You have been put in charge of selecting the wireless sensor network to use. You re familiar with some concepts of wireless networks, but don t feel comfortable enough to make an informed decision on this particular type of wireless system. What do you need to know? What questions need to be asked? Where do you start? You start here with the Wireless Sensor Networking Source Book. This guide is for engineers and decision makers that will be designing, specifying, selecting, or implementing a wireless sensor network. Purpose of This Source Book The source book provides a broad understanding of the technology fundamentals and design considerations that affect function and performance of a wireless sensor network. As opposed to a high-data-rate wireless systems used in LAN applications (WLAN), a low-power wireless sensor network is specifically designed for low-data-rate applications. This guide is designed to provide you with the information necessary to make an informed decision when selecting and integrating such a network system. Table 1-1 provides a quick reference to the information you will find in this guide. 1
6 Table 1-1: Information provided in this guide Guide Section Chapter 2: Wireless Sensor Networking Overview Chapter 3: Network Design Considerations Chapter 4: Topologies and Data Models Chapter 5: Routing Techniques Chapter 6: The Millennial Net System Information Provided This chapter provides a basic understanding of the wireless sensor network building blocks as a prerequisite to a discussion of fundamental network design considerations outlined in Chapter 3. The information presented in this chapter will help you assess the feasibility of a wireless sensor network in your application, to make important scoping and sizing decisions, and to establish a framework to assess different options in specifying and selecting a wireless sensor network system for your application. This chapter provides a look at three textbook topologies and discusses the different data models used by wireless sensor networks to collect and manage data. In this chapter, you ll learn the advantages and disadvantages associated with the different routing techniques developed specifically for wireless sensor networks. This chapter provides a brief overview of Millennial Net s wireless sensor networking platform with Persistent Dynamic Routing. Symbols Used in this Book The symbols shown in table 1-2 are used in this book to illustrate sensor networking concepts: Table 1-2: Symbols used in this guide Symbol Description Sensor/actuator Application End node 2
7 Symbol Description Mesh node Gateway Defining Wireless Sensor Networks Typical wireless sensor network applications share three common requirements: small form factor, long battery life, and dynamic operating environment. Until recently, networks designed for monitoring and controlling sensors or actuators on a network were limited in application and scope due to a major network design consideration the cables required to connect the various sensors and actuators to a centralized collection point. In addition to the costs associated with installing and maintaining communication cables (fiber optic or copper), this type of network infrastructure prevents sensor mobility and severely limits the feasible applications of such a network. Thanks to significant advances in low-power radio and digital circuit design, self-organizing wireless sensor networks are now a reality. Sensors of all types (temperature, motion, occupancy, vibration, etc.) can now be wirelessly enabled and deployed inexpensively and quickly. Wireless sensor networks fundamentally change the economics of deploying and operating a sensor network, unlocking opportunities to achieve new efficiencies in production processes, building control, or monitoring, to name just a few. Wireless sensor networks also enable the development of a brand new 3
8 class of applications and services not previously possible with wired sensor networks. There are no administrative duties associated with establishing and maintaining an ad hoc network. As illustrated in Figure 1-1, wireless sensor networks form what is called a wireless ad hoc network, which refers to a network s ability to self-organize and selfheal. This means there are no administrative duties associated with establishing and maintaining a wireless sensor network. By comparison, a wired infrastructure network, such as the LAN found in most office environments, requires a significant amount of overhead to install and maintain in terms of cabling and administrative time. In an ad hoc network, sensor nodes consisting of a sensor attached to a wireless module can be randomly placed and moved as needed. If the network needs to scale up, additional sensor nodes are easily added. The new sensor nodes and surrounding network will do the work of discovering each other and establishing communication paths through singleand multi-hop paths. All this is made possible through the use of robust, efficient network protocols developed specifically for wireless sensor networks. Figure 1-1: Untethered, mobile ad hoc network nodes 4
9 Opportunities Looking forward, wireless sensor networks will unlock new and exciting applications and services. Today, wireless sensor networks are being used in a number of low-power, low-data-rate applications aiding digital precision instruments on the factory floor, collecting water and gas meter readings, monitoring shipments through the supply chain, and reporting on the vital signs of individual wearers. Looking forward, wireless sensor networks will unlock new and exciting applications and services. Replacing Traditional Wired Networks Sensors and actuators can now be monitored and controlled wirelessly, obviating the expensive installation and maintenance of copper or fiber optic cables. For instance, wireless sensor networks are now being installed in building maintenance systems, replacing the traditional RS-485 cables used to connect the building controller with the various thermostats located throughout a building. The wireless sensor network is transparent to the controller and thermostats, that up until now used the RS-485 cables to communicate with each other. New Opportunities The emerging technology behind wireless sensor networks is opening the door to a new world of opportunities in data collection and system monitoring applications opportunities where traditional wired networks made them economically or physically impossible to consider. Today, applications as varied as monitoring water usage in large apartment complexes to unobtrusively monitoring a patient s blood sugar level are now possible. Wireless sensor networks will allow companies to develop new sources of revenue and cut or eliminate waste. 5
10 2. Wireless Sensor Networking Overview This chapter provides you with a basic understanding of the wireless sensor network building blocks as a prerequisite to a discussion of fundamental network design considerations outlined in Chapter 3. System Modules The modules of a wireless sensor network enable wireless connectivity within the network, connecting an application platform at one end of the network with one or more sensor or actuator devices at the other end. As shown in Figure 2-1, the gateway and end node modules create a transparent, wireless data path between the application platform and sensor. Figure 2-1: Basic wireless sensor network components Exchange of analog or digital information between an application platform and one or more sensor nodes takes place in a wireless fashion. In this example, the data path between the gateway and end node is referred to as a single-hop network link. To extend the range of a network or circumvent an obstacle, a wireless mesh node module can be added between a gateway and an end node as shown in Figure
11 Figure 2-2: Adding a mesh node module This particular example represents a multi-hop data path, in which data packets are handed off from one module to the next before reaching their destination (gateway-to-mesh node-to-end node and vice versa). More elaborate network layouts are discussed later in Network Topologies, but for now, we ll take a closer look at each of the network components shown in Figure 2-2. Application Platform This is the network device (PC, handheld, etc.) used to monitor and control the actions of the various sensors and actuators that are connected to the wireless sensor network. The application platform is capable of making decisions based on the information it gathers from the network. Typically, the wireless sensor network will come with an API (application programming interface) and/or a GUI (graphical user interface) used to interface with the wireless modules. Gateway The gateway is the interface between the application platform and the wireless nodes on the network. The gateway can be a discrete module, or it can be integrated onto a Flash card form factor for a handheld device, for example. All information received from the various network nodes is aggregated by the gateway and forwarded on to the application platform. In the 7
12 reverse direction, when a command is issued by the application program to a network node, the gateway relays the information to the wireless sensor network. The gateway can also perform protocol conversion to enable the wireless network to work with other industry-standard network protocols. Mesh Node Module Hardware design will affect a module s power-efficiency. Considered full-function devices (FFD), mesh node modules (sometimes called routers) are used to extend network coverage area, route around obstacles, and provide back-up routes in case of network congestion or device failure. In some cases, mesh nodes may also be connected via analog and digital interfaces to sensors and actuators, providing the same I/O functionality of an end node module. Mesh nodes can be battery powered or line powered. End Node Module Considered reduced-function devices (RFD), end nodes (sometimes called endpoints) provide the physical interface between the wireless sensor network and the sensor or actuator that it is wired to. End nodes will usually have one or more I/O connections for connecting to and communicating with analog or digital sensor or actuator devices. End nodes are typically battery powered. Sensor/Actuator These are the devices you ultimately wish to monitor and/or control. An example is a sensor monitoring the pressure in an oil pipeline. 8
13 System Software The software required to integrate and operate a wireless sensor network resides as firmware in the system modules and in the application platform as a set of API functions or network monitoring system (NMS). Module Firmware Firmware design will affect a module s power-efficiency. Module firmware is a small, efficient piece of code that incorporates the module into a larger ad hoc network. It drives the module's operation as part of the larger ad hoc network. The firmware is also responsible for packaging the analog and digital sensor data into digital packets and delivering them across the wireless sensor network. API An API, or application programming interface, is a set of commonly used functions for streamlining application development. Used by application developers, an API provides hooks to integrate the application platforms with the modules on the wireless sensor network. API functions are grouped into libraries. In wireless sensor networks, there two different API libraries: High-level Library: These functions are used to integrate the application with the gateway module. Low-level library: These functions are used to integrate the sensor/actuator with the end node module. 9
14 Network Monitoring System A network monitoring system (NMS) is software used to interface with a particular wireless sensor network, eliminating the need for any programming. Through the NMS s graphical user interface (GUI), network operators are able to see the various nodes of their wireless sensor network. Depending on the type of network, control commands can also be issued through the NMS. For example, a pin on a digital interface between an end node and an actuator can be set to high to change the state of the actuator. 10
15 3. Network Design Considerations The information presented in this chapter will help you assess the feasibility of a wireless sensor network in your application, make important scoping and sizing decisions, and establish a framework to assess different options in specifying and selecting a wireless sensor network system. In this chapter, the major design drivers associated with wireless sensor networks are described. Most importantly, you ll learn about the performance trade-offs that may need to be considered during the network design process. Understanding how the design drivers are inter-related will help if and when a trade-off decision needs to be made. Ultimately, this will provide you with the tools needed to design a wireless sensor network that will operate at its optimal level of performance. Design Drivers Table 3-1 contains a matrix used to develop a profile of your particular wireless sensor network application. The profile matrix lists the important network design drivers and will help you determine how important each driver is in the overall design and operation of your network. This exercise will also help determine what design trade-offs may need to be made with each wireless sensor networking system you are investigating. 11
16 Table 3-1: Application profile Design Driver Level of Importance Minimal Moderate Critical Range Short distance between modules Long distance between modules to minimize hops Maximum distance between modules desired Power External power source available Long battery life desired to minimize battery replacement Single battery must provide power for multiple years Data rate Very low data rate Moderate data rate High data rate Duty cycle Low duty cycles Moderate duty cycles High duty cycles Scalability Small network size Moderate network size Large network size Mobility Modules stationary and data paths stable Modules mobile and/or data paths changeable Modules extremely mobile and data paths highly changeable Range The term range can be used to describe either of the following: Network Range: The total physical area covered by a wireless sensor network. Module Range: The distance that data can be transmitted between two modules on a network. Two communicating modules represent the most basic building block in designing a wireless sensor network. Factors that affect the range of a network or network module include: Number of supported network nodes as determined by the manufacturer. 12
17 Power associated with the radio frequency used. Environmental issues, such as walls, electrical interference, etc. By understanding some of the range-related concepts and issues associated with module range, you ll understand how to efficiently attain the desired network range. Shout Versus Whisper Even with the additional modules, the multi-hop whisper method consumes much less power to move data between the two points on a network. When transmitting data between two distant points on a network, more power is not always the best answer to bridging the distance between them. Figure 3-1 illustrates two different methods for transmitting data between two points on a network. Figure 3-1: Shout versus whisper links With the shout method, the modules use high output power to transmit data packets between them. While the two modules are able to communicate effectively, they are not doing it in a very power-effi- 13
18 cient manner. The whisper method illustrates how multiple modules using low output power are used to bridge the same distance. Even with the additional modules, the multi-hop whisper method consumes much less total RF transmit power to move data between the two points on a network. Figure 3-2 illustrates the relationship between power and distance for the two methods. Figure 3-2: Power/distance relationship Multi-hopping is a technique also used in wireless sensor networks to extend the range of a network far beyond the limits of the radio frequency used. If for example, the frequency being used restricted the distance between network modules to no more than feet, this distance could be extended by inserting one or more mesh node modules. The data would then hop from source to destination modules using the mesh nodes as stepping stones. Environmental Concerns The maximum range at which two modules on a network can communicate is affected by a number of environmental and network characteristics. 14
19 Items blocking the line of sight between network modules, such as walls and floors, will limit wireless communications. The type of building material used in such obstacles will affect how well a radio frequency can penetrate the object. Figure 3-3: Penetrating line-of-sight obstacles In cases where obstacles must be circumvented to provide radio connectivity between modules, one or more mesh node modules can be inserted for this purpose as shown in Figure 3-4. Figure 3-4: Circumventing radio-frequency obstacles 15
20 Radio Frequency Each module on the network contains a radio transmitter used to communicate with the other wireless modules on the network. Wireless sensor networks generally use one of the license-free ISM frequency bands. Lower radio frequencies, such as 916 MHz which is license-free in North America, require less power and are better at penetrating objects such as walls or doors. Typically, the radio or RF components consume more than 70% of the total power in full-operation mode, sometimes consuming even more while receiving (RX) than transmitting (TX) data. The RF components also burn significant amounts of power during TX/RX switching or waking up. So, many different scenarios must be considered in the power budget. Radio Transmission Techniques For applications where environmental noise is an issue, the modulation scheme of the radio should also be considered as a way of working around such problems. There are typically two modulation schemes or techniques used for transmitting radio signals over a wireless sensor network one uses narrowband signals while the other transmits wideband or spreadspectrum signals. Narrowband Signals These radio signals use a very narrow portion of the radio frequency bandwidth as shown in Figure 3-4. Spread-Spectrum Signals Spread-spectrum signals are resistant to interference and hard to intercept. A spread-spectrum transmitter takes a narrowband signal and spreads it across a broad portion of the radio frequency in a predefined method. Destination devices receiving the signal understand the pre- 16
21 defined method and de-spread the signal before the data can be interpreted. Spread-spectrum signals are usually created using the direct sequence spread spectrum (DSSS) method or the frequency hopping spread spectrum (FHSS) method shown in Figure 3-4. The DSSS method spreads the narrowband signal out over a broad portion of the frequency band. The FHSS method spreads its signal by hopping the narrowband signal across a broad frequency range as a function of time. Figure 3-4: Narrowband, DSSS, and FHSS signals RF circuitry power consumption is highly dependent on the modulation scheme. Spread-spectrum RF chips consume much more power than typical narrowband radios because of the complex base-band processing. Although spread-spectrum radios offer better immunity to interference, for many sensor network applications, narrowband radios remain a practical and more power-efficient choice. 17
22 Power Power efficiency is a critical design factor for wireless sensor network components. The importance of how efficiently the modules in a wireless sensor network manage their power resources can vary with each application. In some applications, power consumption efficiency is not an issue as access to local power resources is readily available to each module. Modules integrated with the thermostats of a building automation system, for example, can draw their power from the same 24 VAC source used by the thermostats. In other applications, wireless sensor network modules are located in areas where access to local power is not possible, either because of module location or mobility issues. In such instances, the modules typically draw their power from small, coin-cell batteries, making efficient use of power critical. Being able to operate efficiently for long periods of time using battery power is a major advantage of wireless sensor networks over wired networks and a critical design factor. Data Rate Data rate refers to the amount of data the wireless sensor network is capable of carrying or supporting. Expressed in bits per seconds (bps), data rate is evaluated in two ways: the raw data rate and the actual network throughput. Raw Data Rate This value is determined by the radio used in the wireless sensor network modules and is less relevant to wireless sensor network design than network throughput described below. 18
23 Network Throughput This value refers to the actual data rate a network can support. Network throughput is always less than the raw data rate, and will vary based on many factors including: The size of the network (number of nodes). The density of the modules within the wireless sensor network. Modules must negotiate for transmission (TX) time, therefore, the fewer the number of modules within communication range of each other, the faster data can be exchanged. Figure 3-5: Network node density High-Density Network Modules all competing for transmission time. Low-Density Network Little competition between modules for transmission. Duty Cycle The duty cycle of a module refers to the percentage of time the module is active versus inactive, and is determined using the following equation: module time on time period = duty cycle (%) When in an active state, a module is transmitting data, receiving data, or simply listening to the network. Since modules consume power when transmitting or receiving data, it is important to keep the duty cycle to a minimum to achieve the greatest level of power efficiency. When inactive, some end node or mesh node modules can be configured to enter into a sleep mode, conserving valuable energy. These modules will wake up to either issue a network heartbeat on a regular basis or when needed for data transmission and 19
24 reception. The heartbeat is the end node s way of letting the network know it is still there. The duty cycle for the modules on a network should be configurable, especially for powerconscious applications. The duty cycle for the modules on a network should be configurable, especially for power-conscious applications. In some applications, input from a module might only be required every few hours, allowing the module to remain in sleep mode for extended periods of time. The module will wake up briefly to transmit the data it has collected, then return to a power-conserving sleep mode. For applications where module input is required very frequently, keeping the duty cycle low by putting the module in sleep mode even if only for a few seconds enables the modules to conserve a significant amount of energy compared with being constantly in an active or awake state. One key design challenge in reducing duty cycle of mesh nodes modules is to ensure these nodes can wake up in time to route for other mesh nodes. A poorly coordinated sleep/wake-up schedule among mesh nodes can lead to excessive latency or even loss of data. Therefore, reducing duty cycle of mesh nodes must be implemented intelligently in order to save power without sacrificing responsiveness and robustness. Scalability In typical wireless sensor networks, there is an inverse relationship between network size and latency. In typical wireless sensor networks, at any given sampling rate, there is an inverse relationship between network size and latency. In other words, it becomes more difficult to build a responsive ad hoc network as the number of nodes increases. This is 20
25 due to the network overhead that comes with the increased size of the network. In ad hoc networks, the network is formed without any predetermined topology or shape. Therefore, any node wishing to communicate with other nodes should generate more packets than its data packets; these extra packets are generally called control packets or network overhead. As the size of the network grows, more control packets will be needed to find and keep the routing paths. In typical ad hoc networks, the overhead increases exponentially as the network size grows. In a small network, the amount of control packets is almost negligible. But when the network size starts increasing, the overhead increases rapidly. Mobility Mobility refers to the ability of the network to handle mobile nodes and changeable data paths. Mobility refers to the ability of the network to handle mobile nodes and changeable data paths. High network responsiveness is a pre-requisite for supporting mobility. There are two kinds of mobility that a wireless sensor network must support: mobile sensors and mobile gateways. Mobile Sensors The self-configuring nature of ad hoc sensor networks enable them to be able to recognize sensors entering and exiting the network. This enables the network to monitor and control dynamic environments where sensors are not stationary. It also provides low-maintenance scalability. Adding a new sensor to the network requires only placing the sensor node within the network; no further configuration or set up is required. 21
26 Mobile Gateways Gateway mobility enables a gateway device to enter the network, automatically bind to that network and gather data, then leave the network. One mobile gateway can bind to multiple networks and multiple mobile gateways can bind to a given network. 22
27 4. Topologies and Data Models This chapter provides a look at three textbook topologies and discusses the different data models used by wireless sensor networks to collect and manage data. Network Topologies The architectures used to implement wireless sensor network solutions include star, mesh, and star-mesh hybrid topologies. Each of these topologies presents its own set of challenges, advantages, and disadvantages as shown in Table 4-1 and discussed below. Table 4-1: Network topologies Topology Power usage Range Star Low Short Mesh High Long Star-mesh hybrid Low Long Star A star topology, as shown in Figure 4-1, is a singlehop system in which all wireless sensor nodes communicate bi-directionally with a gateway. The gateway can be a PC, PDA, dedicated building control device, embedded Web server, or other gateway to an application platform or another network. The end nodes are identical and the gateway serves both to communicate data and commands among end nodes, and to transfer data to an application or other network, such as the Internet. The end nodes 23
28 do not pass data or commands to each other; they use the gateway as a coordination point. Figure 4-1: Star topology Among wireless sensor networking topologies, the star topology is the lowest in overall power consumption, but is limited by the transmission distance of the radio in each end node back to the gateway. This distance can range from ten to hundreds of meters. Notice also, that there are no alternate communication paths between any of the end nodes and the gateway. Should a path become obstructed, communication with the associated end node may be lost. Mesh Mesh topologies are multi-hopping systems in which all wireless sensor nodes are mesh nodes and communicate directly with each other to hop data to and from the gateway and to pass commands to each other. This is illustrated in Figure 4-2. A mesh network is highly fault tolerant because each sensor node has multiple paths back to the gateway 24
29 or to other nodes. The multi-hop system allows for a much longer range than a star topology. Figure 4-2: Mesh topology Star-Mesh Hybrid A star-mesh hybrid seeks to take advantage of the low power and simplicity of the star topology, as well as the extended range and self-healing nature of a mesh network topology. As shown in Figure 4-3, a star-mesh hybrid organizes end nodes around mesh nodes which, in turn, organize themselves in a mesh network. The mesh nodes serve both to extend the range of the network and to provide fault tolerance. Since end nodes can communicate with multiple mesh nodes, if a mesh node fails or if a radio link experiences interference, the network will reconfigure itself around the remaining mesh nodes. 25
30 Figure 4-3: Star-mesh hybrid topology Data Models The data model is a function of the application and describes the flow of data and how that data is used. The data model characterizes and describes the way in which data flows through and is used in the network, or stated a different way, the interaction between the sensors and the application. Unlike the topology which is a function of the network protocol, the data model is a function of the application. You will need to determine the data model most appropriate for your application based on the application s requirements. Broad categories of data models include data collection and bi-directional dialogue models. 26
31 Data Collection Models Data collection models describe monitoring applications where the data flows primarily from the sensor node to the gateway. Periodic Sampling For applications where certain conditions or processes need to be monitored constantly, such as the temperature in a conditioned space or pressure in a process pipeline, sensor data is acquired from a number of remote sensor nodes and forwarded to the gateway or data collection center on a periodic basis. The sampling period mainly depends on how fast the condition or process varies and what intrinsic characteristics need to be captured. In many cases, the dynamics of the condition or process to be monitored can slow down or speed up from time to time. Therefore, if the sensor node can adapt its sampling rates to the changing dynamics of the condition or process, over-sampling can be minimized and power efficiency of the overall network system can be further improved. Another critical design issue associated with periodic sampling applications is the phase relation among multiple sensor nodes. If two sensor nodes operate with identical or similar sampling rates, collisions between packets from the two nodes is likely to happen repeatedly. It is essential that sensor nodes can detect this repeated collision and introduce a phase shift between the two transmission sequences in order to avoid further collisions resulting in optimal network operation and minimized power usage. 27
32 Event Driven There are many cases that require monitoring one or more crucial variables immediately following a specific event or condition. Common examples include fire alarms, door and window sensors, or instruments that are user activated. To support event-driven operations with adequate power efficiency and speed of response, the sensor node must be designed such that its power consumption is minimal in the absence of any triggering event, and the wake-up time is relatively short when the specific event or condition occurs. Many applications require a combination of event driven data collection and periodic sampling. Store and Forward In many applications, data can be captured and stored or even processed by a sensor node before it is transmitted to the gateway or base station. Instead of immediately transmitting every data unit as it is acquired, aggregating and processing data by remote sensor nodes can potentially improve overall network performance in both power consumption and bandwidth efficiency. One example of a store-and-forward application is cold-chain management where the temperature in a freight container carrying produce or pharmaceuticals, for instance, is captured and stored; when the shipment is received, the temperature readings from the trip are downloaded and viewed to ensure that the temperature and humidity stayed within the desired range. Bi-Directional Dialogue Data Models Bi-directional dialogue data models are characterized by a need for two-way communication between the sensor/actuator nodes and gateway/application. 28
33 Polling Controller-based applications, such as those found in building automation systems, use a polling data model. In this model, there is an initial device discovery process that associates a device ID with each physical device in the network. The controller then polls each device on the network successively, typically by sending a serial query message and waiting for a response to that message. For example, an energy management application would use a polling data model to enable the application controllers to poll thermostats, variable air volume (VAV) sensors, and other devices for temperature and other readings. On-Demand The on-demand data model supports highly mobile nodes in the network where a gateway device enters the network, automatically binds to that network and gathers data, then leaves the network. With this model, one mobile gateway can bind to multiple networks and multiple mobile gateways can bind to a given network. An example of an application using the on-demand data model is a medical monitoring application where patients in a hospital wear sensors to monitor vital signs and doctors access that data via a PDA that is a mobile gateway. A doctor enters a room and the mobile PDA automatically binds with the network associated with that patient and downloads vital sensor data. When the doctor enters a second patient's room, the PDA automatically binds with that network and downloads the second patient's data. 29
34 5. Routing Techniques In this chapter, you ll learn the advantages and disadvantages associated with the different routing techniques developed specifically for wireless sensor networks. A wireless sensor network relies on its network layer's routing algorithm to discover routes and deliver data packets from sources to destinations. The routing layer protocol is also responsible for maintaining and repairing routes when radio links (or hops) along established routes are broken, due to relocation or failure of nodes, sever RF interference, or congestion. It is the routing algorithm that enables a wireless sensor network to self-organize and selfheal. Routing always has some degree of overhead associated with it. The size of this overhead directly affects the responsiveness and scalability of the network. To build and implement highly responsive, efficient, and scalable networks, you need a protocol that is very efficient and minimizes the overhead needed to accomplish its tasks. Efficient Protocol The routing protocol is designed to find the most efficient data path route(s) to use between network modules and to dynamically find new paths when conditions within the network change. The embedded routing protocol used by each of the network modules affects a number of characteristics within the wireless sensor network from the way in which modules self-organize to the way in which data is transmitted from source to destination node. The routing protocol is designed to find the most efficient data path route(s) to use between network modules 30
35 and to dynamically find new paths when conditions within the network change. The more efficient the protocol, the more efficiently the wireless sensor network operates, which results in less power being consumed by each module. A number of highly intelligent routing techniques have been developed over the years for both wired and wireless networks. During the 80s and 90s, substantial advances were made to support the explosive growth of computer networks and particularly, the Internet. Prevalence of wireless communication in recent years further spurs the development of network routing techniques. In general, these routing techniques fall into two main categories: proactive and reactive protocols. Proactive Protocols In proactive protocols, such as the link-state routing and the destination-sequenced distance vector (DSDV) routing, each node in the network maintains route information to every other node, typically in the form of routing tables. These routing tables are updated periodically to account for changes in network topology and link conditions. The main advantage of proactive routing is that route information is constantly updated and, therefore, valid routes are always readily available. The route update process in proactive algorithms, however, requires a significant amount of overhead, consuming network bandwidth. This overhead grows exponentially with network size. Hence, for bandwidth-limited applications such as wireless networks, proactive routing cannot scale. 31
36 Reactive Protocols As opposed to proactive routing, reactive routing algorithms establish and maintain routes on demand (i.e., only at the request of nodes that have traffic to send to specified destination nodes). Reactive routing does not require constant updating of route information, hence, reducing the overhead associated with the update process. The on-demand, dynamic nature of reactive routing makes it particularly effective for ad hoc wireless networks where network nodes can be highly mobile and network connection can be formed in an ad hoc manner without the need of any prescribed infrastructure. Popular routing algorithms, such as dynamic source routing (DSR) and ad hoc ondemand distance vector (AODV) routing, have been applied to an increasing number of ad hoc wireless networking applications such as mobile PC networks (WiFi) and battlefield radio networks. Both DSR and AODV have been adopted as part of the solution framework provided by the Mobile Ad hoc Networks (MANET) task group within the Internet Engineering Task Force (IETF). Routing Protocol Design While the existing routing algorithms are effective for various wired and wireless networking applications, they are not well suited for wireless sensor networks due to their unique characteristics and application requirements that are intrinsically different from the traditional networks. Among others, the main differences between wireless sensor networks and traditional networks are as follows. Nodes in wireless sensor networks run on limited power resources, such as low-capacity batteries. 32
37 Radios used in wireless sensor networks support relatively low data rates, typically in the range of 100K - 200K bits per second. In most cases, wireless sensor nodes operate in license-free radio frequency bands with relatively low output power. As such, radio links among nodes can be easily interfered with and corrupted, especially in popular bands such as the 2.4GHz band used by WiFi, Bluetooth and cordless phones. Wireless sensor nodes typically employ low-cost microcontrollers with limited computation capacity and memory. Many applications require a relatively large-scale network with hundreds of wireless sensor nodes to be densely deployed. Topology of a wireless sensor network may change frequently. These unique characteristics pose significant challenges to routing protocol design for wireless sensor networks. Limited channel data rate and radio output power require a highly efficient routing protocol. With stringent resource constraints, routing in wireless sensor networks must be implemented with minimal duty cycle and overhead. Limited channel data rate and radio output power require a highly efficient routing protocol to carry data with low overhead and direct traffic through reliable, multi-hop routes. In a dynamic network with mobile nodes and strong interference, radio links are constantly broken, and the routing protocol must allow network nodes to quickly repair routes and adapt to changing topology. The routing protocol must also be highly scalable to support formation and maintenance of large-scale networks. 33
38 6. The Millennial Net System The Millennial Net wireless sensor networking system delivers a robust, reliable, scalable networking protocol and a complete system for fast and cost-effective time to deployment. Persistent Dynamic Routing Protocol Millennial Net has developed and optimized its protocol to address the unique characteristics and challenges associated with wireless sensor networking. The end result is a networking system and associated protocol that is highly scalable, ultra-efficient, and extremely responsive and resilient in dynamic environments. The Millennial Net protocol for wireless sensor networks that provides the industry s longest battery life at sensor nodes while delivering data over fault-tolerant links with end-to-end redundancy. The Millennial Net protocol is based on Persistent Dynamic Routing a set of patented techniques for reliable and scalable wireless sensor networks which has been designed specifically to meet all critical challenges of wireless sensor networks. When forming an ad hoc sensor network, Persistent Dynamic Routing requires minimal overhead for requesting and establishing connectivity without relying on the bandwidth-consuming flooding technique. Highly Responsive Self-configuration is initiated from the end nodes (not the gateway) for ultra-efficient, light-weight topology discovery and re-discovery providing high respon- 34
39 siveness for mobile sensors in a dynamic environment. Reliable Persistent routing techniques ensure data packet delivery for highly reliable data transmission required for mission-critical applications. Extremely Power Efficient Dynamic route discovery ensures that the best data route is determined on the fly for efficient bandwidth yielding low power consumption and high battery life. Scalable Low overhead yields high scalability to support a network infrastructure with the headroom to grow and adapt. Build vs. Buy Your ability to take advantage of the benefits of wireless sensor networking is only as good as your ability to quickly and cost-effectively develop and deploy your wirelessly networked sensor application. Many so-called solutions available today are simply chips and stacks, leaving you to source components and fabricate PCBs, optimize networking software, as well as perform integration and application development from scratch. Millennial Net delivers a complete system that lets you concentrate on your application requirements. With the complete system software delivered on hardware modules and APIs to streamline sensor and host application integration, your time to market is fast and your development effort is extremely cost-effective. 35
40 A Complete System Millennial Net delivers a complete system of software, hardware modules, and open system interfaces for fast deployment of robust wireless sensor networks. System Software The Millennial Net system software, based on patented Persistent Dynamic Routing technology forms the foundation of a wireless sensor network that is efficient, responsive, and resilient. Topology discovery is ultra-efficient, light-weight, and highly responsive to mobile sensors and a dynamic environment. Persistent routing techniques ensure reliable data transmission for mission-critical applications. Dynamic route discovery makes the platform extremely scalable and power-efficient providing long battery life. The system is architected to minimize overhead, enabling the network to scale very effectively. Hardware Modules End nodes provide a direct interface to analog and digital sensors. The gateway moves data between end nodes and the host, and monitors data links, devices, and battery status. Mesh nodes extend the range of the network, route around obstacles, and form redundant routes. Development and Management Tools The Sensor Integration API provides sensor-specific functions to streamline the integration process and provide data reduction benefits. The Application Integration API enables quick development of applications to integrate, display, and report on the data collected. The Network Monitoring System is a graph- 36
41 ical application for configuring and monitoring the network. Evaluation Kits Millennial Net offers an Evaluation Kit that lets developers install a wireless sensor network prototype in less than one day. The kit contains everything needed including software (with Millennial Net s patented Persistent Dynamic Routing protocol), hardware, and accessories. More information is available online at 37
42 Glossary API Application Programming Interface: A set of definitions of the ways in which one piece of computer software communicates with another. It is a method of achieving abstraction, usually (but not necessarily) between lower-level and higher-level software. One of the primary purposes of an API is to provide a set of commonlyused functions-for example, to poll a wireless network for active network nodes (mesh nodes and end nodes). Programmers can then take advantage of the API by making use of its functionality, saving them the task of programming everything from scratch. APIs themselves are abstract: software that provides a certain API is often called the implementation of that API. ad hoc network A group of wireless sensors connected as an independent wireless network, communicating directly with each other without the use of an access point. bandwidth The amount of data that can be transmitted in a fixed amount of time. For digital devices, the bandwidth is usually expressed in bits per second (bps) or bytes per second. For analog devices, the bandwidth is expressed in cycles per second, or Hertz (Hz). Bluetooth An industrial specification for wireless personal area networks (PANs). Bluetooth provides a way to connect and exchange information between devices like personal digital assistants (PDAs), mobile phones, laptops, PCs, printers and digital cameras via a secure, low-cost, globally available short range radio frequency. Bluetooth lets these devices talk to each other when they come in range, even if they're not in the same room, as long as they are within 10 meters (32 feet of each other). data model As it pertains to wireless sensor networks, the data model characterizes and describes the way in which data flows through and is used in the network. Common data model categories include data 38
Applying Mesh Networking to Wireless Lighting Control
White Paper Applying Mesh Networking to Wireless Lighting Control www.daintree.net Abstract Recent advances in wireless communications standards and energy-efficient lighting equipment have made it possible
More informationZIGBEE 802.15.4. ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna
ECGR-6185 Advanced Embedded Systems ZIGBEE 802.15.4 University of North Carolina-Charlotte Charlotte Chaitanya Misal Vamsee Krishna WPAN A personal area network (PAN) is a computer network used for communication
More informationLoRa FAQs. www.semtech.com 1 of 4 Semtech. Semtech Corporation LoRa FAQ
LoRa FAQs 1.) What is LoRa Modulation? LoRa (Long Range) is a modulation technique that provides significantly longer range than competing technologies. The modulation is based on spread-spectrum techniques
More informationMaximizing Range and Battery Life in Low-Cost Wireless Networks
Maximizing Range and Battery Life in Low-Cost Wireless Networks The proliferation of cost-effective wireless technology has led to the rise of entirely new types of networks across a wide range of applications
More informationDemystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
More informationCustomer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4
Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor
More informationPortable Wireless Mesh Networks: Competitive Differentiation
Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.
More informationMunicipal Mesh Network Design
White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves
More informationLoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0
LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does
More informationThingsquare Technology
Thingsquare Technology Thingsquare connects smartphone apps with things such as thermostats, light bulbs, and street lights. The devices have a programmable wireless chip that runs the Thingsquare firmware.
More informationWireless Video Best Practices Guide
Wireless Video Best Practices Guide Using Digital Video Manager (DVM) with the OneWireless Universal Mesh Network Authors: Annemarie Diepenbroek DVM Product Manager Soroush Amidi OneWireless Product Manager
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationWireless Personal Area Networks (WPANs)
Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and
More informationFrom reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either
More informationGetting the Most Out of Your WirelessHART System
Getting the Most Out of Your WirelessHART System A White Paper presented by: Garrett Schmidt Wireless Product Manager Phoenix Contact Americas Business Unit P.O. Box 4100 Harrisburg, PA 17111-0100 Phone:
More informationSecurity for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
More informationTnet WIRELESS MESH SENSOR NETWORKS
Product Line Overview Tnet WIRELESS MESH SENSOR NETWORKS The fusion of advanced sensor and actuator technology with state of the art wireless networks has enabled a whole new level of applications for
More informationEPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
More informationWireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products
More informationcommunication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
More informationIntroduction to Z-Wave. An Introductory Guide to Z-Wave Technology
Introduction to Z-Wave An Introductory Guide to Z-Wave Technology Table of Contents Z-Wave Overview and Functionality... 3 Z-Wave Technology Quick Overview... 3 Radio Specifications... 3 Network and Topology...
More informationThis document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki
More informationTechnologies Supporting Smart Meter Networks
Technologies Supporting Smart Meter Networks Isamu Kitagawa Shinichi Sekiguchi The power crisis that Japan confronted in the wake of the Great East Japan Earthquake in 2011 underscored the need for managing
More informationThis is the first in a series of whitepapers that explain distinctive design, function and applications of MOSAIC.
MOSAIC: A Fresh Approach to AMR Networking By Ken Milburn Product Manager, MOSAIC This is the first in a series of whitepapers that explain distinctive design, function and applications of MOSAIC. deals
More informationThe Internet of Things: Opportunities & Challenges
The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationWireless LAN Concepts
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
More informationSmartDiagnostics Application Note Wireless Interference
SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationEnvironmental Monitoring: Guide to Selecting Wireless Communication Solutions
Environmental Monitoring: Guide to Selecting Wireless Communication Solutions By: Scott South Published in WaterWorld, January 2005 (Page 48) Rapidly growing demands for information and increased productivity
More informationChapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
More informationAn Overview of ZigBee Networks
An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...
More informationLogitech Advanced 2.4 GHz Technology
Logitech Advanced 2.4 GHz Technology Revision 1.1H March 2, 2009 TABLE OF CONTENTS 1 INTRODUCTION... 3 2 SYSTEM OVERVIEW... 4 2.1 NETWORK TOPOLOGY...4 2.2 MAIN FEATURES...4 3 ASSOCIATION MODEL... 5 4 ENCRYPTION...
More informationSynapse s SNAP Network Operating System
Synapse s SNAP Network Operating System by David Ewing, Chief Technology Officer, Synapse Wireless Today we are surrounded by tiny embedded machines electro-mechanical systems that monitor the environment
More informationInternational Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 Management of Wireless sensor networks using cloud technology Dipankar Mishra, Department of Electronics,
More informationTechnology White Paper Capacity Constrained Smart Grid Design
Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I info@edx.com I www.edx.com Mark Chapman and Greg Leon EDX Wireless
More informationLecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
More informationRemote Home Security System Based on Wireless Sensor Network Using NS2
Remote Home Security System Based on Wireless Sensor Network Using NS2 #Rajesh Banala 1, Asst.Professor,E-mail: rajesh.banal@gmail.com #D.Upender 2, Asst.Professor, E mail: upender584@gmail.com #Department
More informationBuilding a Basic Communication Network using XBee DigiMesh. Keywords: XBee, Networking, Zigbee, Digimesh, Mesh, Python, Smart Home
Building a Basic Communication Network using XBee DigiMesh Jennifer Byford April 5, 2013 Keywords: XBee, Networking, Zigbee, Digimesh, Mesh, Python, Smart Home Abstract: Using Digi International s in-house
More informationM2M I/O Modules. To view all of Advantech s M2M I/O Modules, please visit www.advantech.com/products.
M2M I/O Modules 14 M2M I/O Modules Overview 14-2 M2M I/O Modules Selection Guide 14-6 ADAM-2510Z Wireless Router Node 14-8 ADAM-2520Z Wireless Modbus RTU Gateway 14-9 ADAM-2031Z ADAM-2632Z ADAM-2017Z ADAM-2018Z
More informationWireless Medical Telemetry Laboratory
Wireless Medical Telemetry Laboratory 0 Introduction The development of wireless medical telemetry has become an increasingly popular application in recent years. As the elderly population continues to
More informationOnline Communication of Critical Parameters in Powerplant Using ZIGBEE
International Journal of Engineering Science Invention Volume 2 Issue 2 ǁ February. 2013 Online Communication of Critical Parameters in Powerplant Using ZIGBEE D.Santhiya 1, R.Renita Priyatharshini 2,K.C.Dhivya
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationCHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
More informationIntelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based
More informationSensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities. Dr. William Kao
Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities Dr. William Kao Agenda Introduction - Sensors, Actuators, Transducers Sensor Types, Classification Wireless Sensor Networks
More informationWPAN. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Bluetooth (IEEE 802.15.1) Network topology FHSS operation Link delivery services System architecture & protocols Usage models ZigBee (IEEE 802.15.4) Network topology Physical layer operation CSMA/CA
More informationLogitech Advanced 2.4 GHz Technology With Unifying Technology
Logitech Advanced 2.4 GHz Technology Revision 070709 July 7, 2009 TABLE OF CONTENTS 1 INTRODUCTION: THE MOVE TO WIRELESS PERIPHERALS IN BUSINESS...3 2 SYSTEM OVERVIEW...4 2.1 NETWORK TOPOLOGY...4 2.2 MAIN
More informationFigure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
More informationSecurity in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
More informationCHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
More informationImplementation of Wireless Gateway for Smart Home
Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang
More informationProcess Control and Automation using Modbus Protocol
Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has
More informationVersion Date Author Changes - 6/24/2005 D. Liff Initial draft and release 1.0 11/18/2005 K. Adkins Minor spelling and format changes 1.
1 Version Date Author Changes - 6/24/2005 D. Liff Initial draft and release 1.0 11/18/2005 K. Adkins Minor spelling and format changes 1.1 08/19/2008 D. Liff Added 802.11.n information 1.2 11/09/2010 J.
More informationIntroduction to Zibgbee Technology
Introduction to Zibgbee Technology Ankur Tomar Global Technology Centre Volume 1, July 2011 1. Introduction ZigBee is the most popular industry wireless mesh networking standard for connecting sensors,
More informationWHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
More informationAd hoc and Sensor Networks Chapter 1: Motivation & Applications
Ad hoc and Sensor Networks Chapter 1: Motivation & Applications Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Give an understanding what ad hoc & sensor networks are good
More informationHIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
More informationMicrochip Technology. February 2008 Valerio Moretto Slide 1
Microchip Technology February 2008 Valerio Moretto Slide 1 Connectivity Solutions Wired Wireless February 2008 Valerio Moretto Slide 2 Microchip Solutions More complex software Operating Systems >40 MIPS
More informationDisaster-Resilient Backbone and Access Networks
The Workshop on Establishing Resilient Life-Space in the Cyber-Physical Integrated Society, March. 17, 2015, Sendai, Japan Disaster-Resilient Backbone and Access Networks Shigeki Yamada (shigeki@nii.ac.jp)
More informationEDK 350 (868 MHz) EDK 350U (902 MHz) EnOcean Developer Kit
EDK 350 (868 MHz) EDK 350U (902 MHz) EnOcean Developer Kit EDK 350 User Manual Important Notes This information describes the type of component and shall not be considered as assured characteristics. No
More informationWireless The answer to all our communications needs?
Wireless The answer to all our communications needs? Introduction Since BT s last review of its leased lines back in 2003, there has been a concern in local government that analogue lines will go the way
More informationComparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node
Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node G. E. RIZOS georizos@teiep.gr D. C. VASILIADIS dvas@teiep.gr E. STERGIOU ster@teiep.gr Abstract: In this paper,
More information920MHz Band Multi-hop Wireless Network System
920MHz Band Multi-hop Wireless Network System Hiroshi Hashizume Motohiro Inokuma Masayuki Suto Shigeru Fukunaga Motoharu Kawanishi One policy aimed at the growth of OKI Group is the development of a smart
More information15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs
15 th TF-Mobility Meeting Sensor Networks Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs Overview 2 Ubiquitous Computing > Vision defined by Mark Weiser in 1991 Seamless integration
More informationKey Priorities for Sub-GHz Wireless Deployment
Key Priorities for Sub-GHz Wireless Deployment Silicon Laboratories Inc., Austin, TX Introduction To build an advanced wireless system, most developers will end up choosing between two industrial, scientific
More informationOptimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features
Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing
More informationFast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network
Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
More informationProtocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012
Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation
More informationLocal-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
More informationBest Practices Guide for Obvius Data Acquisition Products
Best Practices Guide for Obvius Data Acquisition Products Part I: Background/general information Obvius LLC provides industry-leading products for cost effective data gathering, storage and communications.
More informationDynamic Source Routing in Ad Hoc Wireless Networks
Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 dbj@cs.cmu.edu Abstract
More informationWireless Sensor Network for Performance Monitoring of Electrical Machine
International Journal of Reconfigurable and Embedded Systems (IJRES) Vol. 4, No. 1, March 2015, pp. 1~5 ISSN: 2089-4864 1 Wireless Sensor Network for Performance Monitoring of Electrical Machine Priyanka
More informationWIRELESS BROADBAND SOLUTIONS FOR CABLE OPERATORS
WIRELESS BROADBAND SOLUTIONS FOR CABLE OPERATORS »Wireless Broadband Solutions for Cable Operators Extending broadband coverage to reach new commercial and residential customers can pose major challenges.
More informationHoneywell s OneWireless Network - The Building Blocks of Reliability Vibhor Tandon, Honeywell Process Solutions
White Paper Honeywell s OneWireless Network - The Building Blocks of Reliability Vibhor Tandon, Honeywell Process Solutions Executive Summary User expectations for network availability and tolerance for
More informationRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking
More informationNETWORKING TECHNOLOGIES
NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.
More informationXBEE 802.15.4 PROTOCOL COMPARISON
Connect with Confidence XBEE 802.15.4 PROTOCOL COMPARISON Abstract Creating wireless networks can be done using a variety of RF protocols. Some protocols are proprietary to individual vendors, others are
More informationSensor network infrastructure for intelligent building monitoring and management system
Sensor network infrastructure for intelligent building monitoring and management system 1 R.VENKATESH, 2 K.RADHA, 3 M.GANTHIMATHI 1.B.E-CSE, Muthayammal Engineering College, Rasipuram. 2. Assistant Professor
More informationThe data can be transmitted through a variety of different communications platforms such as:
COMMUNICATION NETWORK General Overview of SCADA Communications Without a properly designed communication network system, a SCADA system cannot exist. All supervisory control and data acquisition aspects
More informationUNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks
UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks a Mobile Ad hoc NETwork (MANET) is one that comes together as needed, not necessarily with any support from the existing infrastructure or any
More informationCabling LANs and WANs
Cabling LANs and WANs CCNA 1 v3 Module 5 10/11/2005 NESCOT CATC 1 Cabling the LAN Each media has advantages and disadvantages: Cable length Cost Ease of installation Susceptibility to interference The
More informationFIBRE TO THE BTS IMPROVING NETWORK FLEXIBILITY & ENERGY EFFICIENCY
FIBRE TO THE BTS IMPROVING NETWORK FLEXIBILITY & ENERGY EFFICIENCY (Study Paper by FLA Division) Ram Krishna Dy. Director General (FLA) TEC New Delhi, DoT, Govt. of India. E-mail: ddgfla.tec@gov.in Mrs.
More informationNOQ_NQ-9121 Z-Wave Data Logger for Gas Meters Firmware Version : 2.55
NOQ_NQ-9121 Z-Wave Data Logger for Gas Meters Firmware Version : 2.55 Quick Start S This device is a Z-Wave Sensor. Inclusion and Exclusion are confirmed by triple clicking the Z-Wave button on the device.
More informationFrequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)
FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997
More informationIntelligent Home Automation and Security System
Intelligent Home Automation and Security System Ms. Radhamani N Department of Electronics and communication, VVIET, Mysore, India ABSTRACT: In todays scenario safer home security is required, As the technology
More informationIknaia Asset and Personnel Tracking Management System for the Healthcare Industry
Iknaia Asset and Personnel Tracking Management System for the Healthcare Industry July 2014 Introduction Trying to find your way around a large hospital or locating a high-value medical device such as
More information1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network
Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server
More informationImproving SCADA Operations Using Wireless Instrumentation
Improving SCADA Operations Using Wireless Instrumentation April 2010 / White paper by Hany Fouda Make the most of your energy Summary Executive Summary... p 2 Introduction... p 3 The Evolution of Wireless...
More informationBluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
More informationStep by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol
th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar
More informationCHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather
More informationNXU RoIP Link to Eliminate Voice-Grade Leased Line
NXU RoIP Link to Eliminate Voice-Grade Leased Line Purpose This Application Note will describe a method at which Network Extension Units (NXUs) can be utilized on an existing digital network to eliminate
More informationTelecommunications, Networks, and Wireless Computing
Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.
More informationProtocols and Architectures for Wireless Sensor Netwoks. by Holger Karl and Andreas Willig
Protocols and Architectures for Wireless Sensor Netwoks by Holger Karl and Andreas Willig Grade Midterm Exam. 25% Exercises 35% (5 ~ 7 times) Term Project 30% Class Attitude 10% 2 Ad hoc and Sensor Networks
More informationFormal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
More informationLAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
More informationWireless Technologies for Industrial Applications
Wireless Technologies for Industrial Applications Mats Andersson, CTO, connectblue Phone: +46 40 630 71 00 Email: mats.andersson@connectblue.com Web: www.connectblue.com Version 2.2 February 2013 Abstract
More information