Localization & positioning
|
|
- Rose Lilian Lawson
- 7 years ago
- Views:
Transcription
1
2 In many circumstances, it is useful or even necessary for a node in a wireless sensor network to be aware of its location in the physical world. For example, tracking or event-detection functions are not particularly useful if the WSN cannot provide any information where an event has happened.
3 To do so, usually, the reporting nodes location has to be known. Manually configuring location information into each node during deployment is not an option. Similarly, equipping every node with a Global Positioning System (GPS) receiver fails because of cost and deployment limitations (GPS, e.g. does not work indoors).
4 - Goals - Means for a node to determine its physical position (with respect to some coordinate system) or symbolic location Using the help of Anchor nodes that know their position Directly adjacent Over multiple hops Using different means to determine distances and/or angles locally
5 - Properties - Physical position vs symbolic location Does the system provide data about the physical position of a node (in some numeric coordinate system) or does a node learn about a symbolic location for example, living room, office 123 in building 4? Is it, in addition, possible to match physical position with a symbolic location name (out of possibly several applicable ones)?
6 - Properties - Absolute vs relative coordinates An absolute coordinate system is valid for all objects and embedded in some general frame of reference. E.g. positions in the UTM coordinates form an absolute coordinate system for any place on earth. Relative coordinates can differ for any located object or set of objects a WSN where nodes have correct coordinates wrt each other but have no relationship to absolute coordinates is an example.
7 - Properties - Absolute vs relative coordinates (cont.) To provide absolute coordinates, a few anchors (aka beacons or landmarks) are necessary (at least three for a 2D system). These anchors are nodes that know their own position in the absolute coordinate system. Anchors can rotate, translate, and possibly scale a relative coordinate system so that it coincides with the absolute coordinate system.
8 - Properties - Localized versus centralized computation Are any required computations performed locally, by the participants, on the basis of some locally available measurements? or Are measurements reported to a central station that computes positions or locations and distributes them back to the participants?
9 - Properties - Localized versus centralized computation (cont.) Apart from scaling and efficiency considerations (both wrt computational and communication overhead), privacy issues are important here as it might not be desirable for a participant to reveal its position to a central entity.
10 - Properties - Accuracy and precision Positioning accuracy is the largest distance between the estimated and the true position of an entity (high accuracy indicates a small maximal mismatch). Precision is the ratio with which a given accuracy is reached, averaged over many repeated attempts to determine a position.
11 - Properties - Accuracy and precision (cont.) For example, a system could claim to provide a 20-cm accuracy with at least 95% precision. Evidently, accuracy and precision values only make sense when considered together, forming the accuracy/precision characteristic of a system.
12 - Properties - Scale A system can be intended for different scales, for example in indoor deployment the size of a room or a building or in outdoor deployment a parking lot or even worldwide operation. Two important metrics here are, the area the system can cover per unit of infrastructure, and the number of locatable objects per unit of infrastructure per time interval.
13 - Properties - Limitations For some positioning techniques, there are inherent deployment limitations. GPS, for example, does not work indoors; other systems have only limited ranges over which they operate.
14 - Properties - Costs Positioning systems cause costs: in time (installation, administration), space (device size, space for infrastructure), energy (during operation), and capital (price of a node and infrastructure).
15
16 - Overview - Basic approaches Single-hop schemes Multi-hop schemes
17 - Overview - Basic approaches Single-hop schemes Multi-hop schemes
18 - Overview - Basic approaches Proximity (Tri)lateration and (tri)angulation Scene analysis
19 - Basic Approaches - Proximity The simplest technique is to exploit the finite range of wireless communication. It can be used to decide whether a node that wants to determine its position or location is in the proximity of an anchor. Only provides coarse-grain information, but OK. One example is the natural restriction of infrared communication by walls, which can be used to provide a node with simple location information about the room it is in.
20 - Basic Approaches - Proximity (cont.) Proximity-based systems can be quite sophisticated and can even be used for approximate positioning when a node can analyze proximity information of several overlapping anchors. They can also be relatively robust to the uncertainties of the wireless channel deciding whether a node is in the proximity of another node is tantamount to deciding connectivity, which can happen on relatively long time scales, averaging out short-term fluctuations.
21 - Basic Approaches - Trilateration and triangulation Lateration versus angulation In addition to mere connectivity/proximity information, the communication between two nodes often allows to extract information about their geometric relationship. E.g. the distance between two nodes or the angle in a triangle can be estimated. Using elementary geometry, this information can be used to derive information about node positions.
22 - Basic Approaches - Trilateration and triangulation Lateration versus angulation When distances between entities are used, the approach is called lateration. When angles between nodes are used, one talks about angulation.
23 - Basic Approaches - Trilateration and triangulation Lateration
24 - Basic Approaches - Trilateration and triangulation Lateration For lateration in a plane, the simplest case is for a node to have precise distance measurements to three noncolinear anchors. The extension to a 3D space is trivial (four anchors are needed). Using distances and anchor positions, the node s position has to be at the intersection of three circles around the anchors.
25 - Basic Approaches - (x = 5, y = 4) r 2 r 3 (x = 8, y = 2) r 1 (x = 2, y = 1)
26 - Basic Approaches - Trilateration and triangulation Lateration The problem here is that, in reality, distance measurements are never perfect and the intersection of these three circles will, in general, not result in a single point. To overcome these imperfections, distance measurements form more that three anchors can be used, resulting in a multilateration problem.
27 - Basic Approaches - Trilateration and triangulation Lateration The most important characteristics are: Received Signal Strength Indicator (RSSI), Time of Arrival (ToA), and Time Difference of Arrival (TDoA).
28 - Basic Approaches - Trilateration and triangulation Angulation It exploits the fact that in a triangle once the length of two sides and two angles are known the position of the third point is known as the intersection of the two remaining sides of the triangle. The problem of imprecise measurements arises here as well and can also be solved using multiple measurements.
29 - Basic Approaches - Angle 1 Length known Angle 2
30 - Basic Approaches - Trilateration and triangulation Lateration: Received Signal Strength Indicator In theory, the energy of a radio signal diminishes with the square of the distance from the signal's source. As a result, a node listening to a radio transmission should be able to use the strength of the received signal to calculate its distance from the transmitter.
31 - Basic Approaches - Trilateration and triangulation Lateration: Received Signal Strength Indicator (cont) Assuming that the transmission power P tx, the path loss model, and the path loss coefficient α are known, the receiver can use the received signal strength P rcvd to solve for the distance d in a pathloss equation like:
32 - Basic Approaches - Trilateration and triangulation Lateration: Received Signal Strength Indicator (cont) No additional hardware is necessary and distance estimates can even be derived without additional overhead from communication that is taking place anyway. However, RSSI values are not constant but can heavily oscillate, even when sender and receiver do not move. This is caused by effects like fast fading and mobility of the environment.
33 - Basic Approaches - Trilateration and triangulation Lateration: Received Signal Strength Indicator (cont) Use statistics... (PDF for a fixed RSSI)
34 - Basic Approaches - Trilateration and triangulation Lateration: Received Signal Strength Indicator (cont) In addition, simple, cheap radio transceivers are often not calibrated and the same actual signal strength can result in different RSSI values on different devices. Other problems are the presence of obstacles, and the multipath fading (the signal attenuation along the path can lead to incorrectly assuming a longer distance than it is in reality).
35 - Basic Approaches - Trilateration and triangulation Lateration: Time of arrival (ToA) It exploits the relationship between distance and transmission time when the propagation speed is known. Assuming both sender and receiver know the time when a transmission for example, a short ultrasound pulse starts, the time of arrival of this transmission at the receiver can be used to compute propagation time and, thus, distance.
36 - Basic Approaches - Trilateration and triangulation Lateration: Time of arrival (cont.) Depending on the transmission medium that is used, time of arrival requires very high resolution clocks to produce results of acceptable accuracy. E.g., for sound waves, these resolution requirements are modest, although propagation speed depends on external factors such as temperature or humidity and careful calibration is necessary. However, they are hard for radio waves.
37 - Basic Approaches - Trilateration and triangulation Lateration: Time difference of arrival (TDoA) It utilizes implicit synchronization by directly providing the start of transmission information to the receiver. This can be done if two transmission mediums of very different propagation speeds are used for example, radio waves propagating at the speed of light and ultrasound.
38 - Basic Approaches - Trilateration and triangulation Lateration: Time difference of arrival (cont.) Hence, when a sender starts an ultrasound and a radio transmission simultaneously, the receiver can use the arrival of the radio transmission to start measuring the time until arrival of the ultrasound transmission, safely ignoring the propagation time of the radio communication.
39 - Basic Approaches - Trilateration and triangulation Lateration: Time difference of arrival (cont.)
40 - Basic Approaches - Trilateration and triangulation Lateration: Time difference of arrival (cont.) The obvious disadvantage of this approach is the need for two types of senders and receivers on each node. The advantage, on the other hand, is a considerably better accuracy compared to RSSI-based approaches. Many localization methods use it.
41 - Basic Approaches - Trilateration and triangulation Lateration What is then better? RSSI: simpler and based on standard hardware TdoA: provide superior ranging results but need more complex and additional hardware, and thus also more energy consumption.
42 - Basic Approaches - Trilateration and triangulation Lateration: Mathematical basics behind 3-lateration Assuming distances to three points with known location are exactly given. Solve system of equations (Pythagoras!).
43 - Basic Approaches - Trilateration and triangulation Lateration: Mathematical basics behind 3-lateration where: (xi,y i ) : coordinates of anchor point i ri distance to anchor i (xu, y u ) : unknown coordinates of node
44 - Basic Approaches - Trilateration and triangulation Lateration: Mathematical basics behind 3-lateration Subtracting eq. 3 from 1 & 2: Rearranging terms gives a linear equation in (x u, y u )!
45 - Basic Approaches - Trilateration and triangulation Lateration: Mathematical basics behind 3-lateration Rewriting as a matrix equation:
46 - Basic Approaches - Trilateration and triangulation Lateration: Mathematical basics behind 3-lateration Example: (x 1, y 1 ) = (2,1), (x 2, y 2 ) = (5,4), (x 3, y 3 ) = (8,2), r 1 = , r 2 = 2, r 3 = 3! (x u,y u ) = (5,2) (x = 2, y = 1) r 1 (x = 5, y = 4) r 2 r 3 (x = 8, y = 2)
47 - Basic Approaches - Trilateration and triangulation Lateration: Mathematical basics behind 3-lateration Example: (x = 5, y = 4) r 2! (x u,y u ) = (5,2) (x = 2, y = 1) r 1 r 3 (x = 8, y = 2)
48 - Basic Approaches - Trilateration and triangulation Lateration: Mathematical basics behind 3-lateration What if only distance estimation r i 0 = r i + i available? Then use multiple anchors, that define a different system of equations:
49 - Basic Approaches - Trilateration and triangulation Lateration: Mathematical basics behind 3-lateration And choose the (x u, y u ) that minimize mean square error.
50 - Basic Approaches - Trilateration and triangulation Angulation
51 - Basic Approaches - Trilateration and triangulation Angulation Measure angles as alternative to distances. Either the angle of a connecting line between an anchor and a position-unaware node to a given reference direction ( 0 north ). Or the angle between two such connecting lines if no reference direction is commonly known to all nodes.
52 - Basic Approaches - Trilateration and triangulation Angulation Angle 1 Length known Angle 2
53 - Basic Approaches - Trilateration and triangulation Angulation A traditional approach to measuring angles is to use directional antennas, rotating on their axis, similar to a radar station or a conventional lighthouse. This makes angle measurements conceptually simple, but such devices are quite inappropriate for sensors nodes; they can be useful for supporting infrastructure anchors.
54 - Basic Approaches - Trilateration and triangulation Angulation
55 - Basic Approaches - Trilateration and triangulation Angulation Another technique is to have multiple antennas mounted on a device at known separation and measuring the time difference between a signal s arrival at the different antennas, the direction from which a wavefront arrived at the device can be computed. This results in strenuous timing requirements. Overall, angulation is a less frequent used technique compared to lateration.
56 - Basic Approaches - Scene analysis
57 - Basic Approaches - Scene analysis A quite different technique. IDEA: Radio environment has characteristic signatures ; they can be measured beforehand, stored, and compared with current situation.
58 - Basic Approaches - Scene analysis The most evident form of it is to analyze pictures taken by a camera and to try to derive the position from this picture. This requires substantial computational effort and is hardly appropriate for sensor nodes. Other measurable characteristic fingerprints of a given location can be used for scene analysis, for example, radio wave propagation patterns.
59 - Basic Approaches - Scene analysis One option is to use signal strength measurements of (one or more anchors) transmitting a known signal strength and compare the actually measured values with those stored in a database of previously off-line measured values for each location (e.g. the RADAR system is one example that uses this approach to determine positions in a building). Using other physical characteristics such as multipath behavior is also conceivable.
60 - Basic Approaches - Scene analysis While scene analysis is interesting for systems that have a dedicated deployment phase and where off-line measurements are acceptable, this is not always the case for WSNs. Hence, this approach is not the main focus of attention.
61 - Overview - Basic approaches Single-hop schemes Multi-hop schemes
62 - Single-hop schemes - Overlapping connectivity Approximate point in triangle
63 - Single-hop schemes - Overlapping connectivity Approximate point in triangle
64 - Single-hop schemes - Overlapping connectivity It tries to use only the observation of connectivity to a set of anchors to determine a node s position. The underlying assumption is that transmissions (of known and fixed transmission power) from an anchor can be received within a circular area of known radius. Anchor nodes periodically send out transmissions identifying themselves (or, equivalently, containing their positions).
65 - Single-hop schemes - Overlapping connectivity (cont.)
66 - Single-hop schemes - Overlapping connectivity (cont.) Once a node has received these announcements from all anchors of which it is in reach (typically waiting for a few periods to smooth out the effect of random packet losses), it can determine that it is in the intersection of the circles around these anchors. The estimated position is then the arithmetic average of the received anchors positions.
67 - Single-hop schemes - Overlapping connectivity (cont.) Moreover, assuming that the node knows about all the anchors that are deployed, the fact that some anchor announcements are not received implies that the node is outside the respective circles. This information further allows to restrict the node s possible position.
68 - Single-hop schemes - Overlapping connectivity (cont.) The achievable absolute accuracy depends on the number of anchors more anchors allow a finergrained resolution of the area. Accuracy degrades if the real coverage range deviates from a perfect sphere (as it usually does in reality). In addition, the transmission range has to be chosen carefully to result in a minimal positioning error, given a set of anchors.
69 - Single-hop schemes - Overlapping connectivity Approximate point in triangle
70 - Single-hop schemes - Approximate point in triangle The idea is to decide whether a node is within or outside of a triangle formed by any three anchors. Using this information, a node can intersect the triangles and estimate its own position, similar to the intersection of circles from before.
71 - Single-hop schemes - Approximate point in triangle (cont.) A B G F C E D
72 - Single-hop schemes - Approximate point in triangle (cont.) The node has detected that it is inside the triangles BDF, BDE, and CDF and also that it is outside the triangle ADF (and ABF, AFC, and others). Hence, it can estimate its own position to be somewhere within the dark gray area for example, this area s center of gravity. A B G F C E D
73 - Single-hop schemes - Approximate point in triangle (cont.) The interesting question is how to decide whether a node is inside or outside the triangle formed by any three arbitrarily selected anchors. Look at what happens when a node inside a triangle is moved: Irrespective of the direction of the movement, the node must be closer to at least one of the corners of the triangle than it was before the movement. Conversely, for a node outside a triangle, there is at least one direction for which the node s distance to all corners increases.
74 - Single-hop schemes - Approximate point in triangle (cont.) Moving a sensor node to determine its position is hardly practical. But one possibility to approximate movements is for a node to inquire all its neighbors about their distance to the given three corner anchors, compared to the enquiring node s distance. Deciding which of two nodes is closer to an anchor can be approximated by comparing their corresponding RSSI values.
75 - Single-hop schemes - Approximate point in triangle (cont.) If, for all neighbors, there is at least one corner such that the neighbor is closer to the corner than the enquiring node, it is assumed to be inside the triangle, else outside.??
76 - Overview - Basic approaches Single-hop schemes Multi-hop schemes
77 - Multi-hop schemes - How to estimate range to a node to which no direct radio communication exists? No RSSI, TDoA, But: Multihop communication is possible B X A C
78 - Multi-hop schemes - Ideas: State it as a semidefinite program Count the number of hops Use also range estimation between neighbors Collaborative multilateration
79 - Multi-hop schemes - Ideas: State it as a semidefinite program Count the number of hops Use also range estimation between neighbors Collaborative multilateration
80 - Multi-hop schemes - Ideas: State it as a semidefinite program Connectivity between any two nodes is only possible if nodes are at most R distance units apart. The fact that two nodes are connected introduces a constraint to the feasibility problem for two connected nodes, it is impossible to choose positions that would place them further than R away.
81 - Multi-hop schemes - Ideas: State it as a semidefinite program (cont.) This problem can be solved, but only centrally, requiring all connectivity information at one point. Because of its essentially centralized character and computationally expensive to solve, it is only of limited applicability to WSNs.
82 - Multi-hop schemes - Ideas: State it as a semidefinite program Count the number of hops Use also range estimation between neighbors Collaborative multilateration
83 - Multi-hop schemes - Ideas: Count the number of hops Assume length of one hop is known. The idea is to count the number of hops (along the shortest path) between any two anchors and to use it to estimate the average length of a single hop by dividing the sum of the distances to other anchors by the sum of the hop counts.
84 - Multi-hop schemes - Ideas: Count the number of hops (cont.) Every anchor computes this estimated hop length and propagates it into the network. A node with unknown position can then use this estimated hop length (and the known number of hops to other anchors) to compute a multihop range estimate and perform multilateration.
85 - Multi-hop schemes - Ideas: State it as a semidefinite program Count the number of hops Use also range estimation between neighbors Collaborative multilateration
86 - Multi-hop schemes - Ideas: Use also range estimation between neighbors If range estimates between neighbors exist, use them to improve total length of route estimation in previous method.
87 - Multi-hop schemes - Ideas: State it as a semidefinite program Count the number of hops Use also range estimation between neighbors Collaborative multilateration
88 - Multi-hop schemes - Ideas: Collaborative multilateration Assume some nodes can hear at least three anchors (to perform triangulation), but not all. Idea: let more and more nodes compute position estimates, spread position knowledge in the network. Problem: Errors accumulate.
89 Ideas: Collaborative multilateration (cont.) Localization & positioning - Multi-hop schemes - (2,10) (8,0) (18,20) (38,5) (?,?) (?,?) (?,?) A B C (2,10) (8,0) (18,20) (38,5) (?,?) (?,?) (?,?) A B C (2,10) (8,0) (18,20) (38,5) (?,?) (?,?) (?,?) A B C (2,10) (8,0) (18,20) (38,5) (?,?) (?,?) (12,14) A B C (2,10) (8,0) (18,20) (38,5) (?,?) (?,?) (12,14) A B C (2,10) (8,0) (18,20) (38,5) (?,?) (?,?) (12,14) A B C (2,10) (8,0) (18,20) (38,5) (?,?) (30,12) (12,14) A B C (2,10) (8,0) (18,20) (38,5) (?,?) (30,12) (12,14) A B C (2,10) (8,0) (18,20) (38,5) (?,?) (30,12) (12,14) A B C (2,10) (8,0) (18,20) (38,5) (22,2) (30,12) (12,14) A B C (2,10) (8,0) (18,20) (38,5) (22,2) (30,12) (12,14) A B C (2,10) (8,0) (18,20) (38,5) (22,2) (30,12) (12,14) A B C I: II: III: IV:
90 - Multi-hop schemes - Ideas: Collaborative multilateration (cont.) Similar idea to previous one, but accept problem that position of nodes is only probabilistically known. Represent this probability explicitly, use it to compute probabilities for further nodes.
91 - Multi-hop schemes - Ideas: Collaborative multilateration (cont.)
92 - Conclusions - Determining location or position is a vitally important function in WSN, but fraught with many errors and shortcomings: Range estimates often not sufficiently accurate Many anchors are needed for acceptable results Anchors might need external position sources (GPS) Multilateration problematic (convergence, accuracy)
Omni Antenna vs. Directional Antenna
Omni Antenna vs. Directional Antenna Document ID: 82068 Contents Introduction Prerequisites Requirements Components Used Conventions Basic Definitions and Antenna Concepts Indoor Effects Omni Antenna Pros
More informationRobot Perception Continued
Robot Perception Continued 1 Visual Perception Visual Odometry Reconstruction Recognition CS 685 11 Range Sensing strategies Active range sensors Ultrasound Laser range sensor Slides adopted from Siegwart
More informationEE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Path Loss Radio Wave Propagation The wireless radio channel puts fundamental limitations to the performance of wireless communications systems Radio channels are extremely random, and are not easily analyzed
More informationIndoor Location Tracking using Received Signal Strength Indicator
Indoor Location Tracking using Received Signal Strength Indicator 9 11 X Indoor Location Tracking using Received Signal Strength Indicator Chuan-Chin Pu 1, Chuan-Hsian Pu, and Hoon-Jae Lee 3 1 Sunway University
More informationExperiences in positioning and sensor network applications with Ultra Wide Band technology
Experiences in positioning and sensor network applications with Ultra Wide Band technology WAMS LANGATTOMUUDESTA UUTTA BISNESTÄ Timo Lehikoinen VTT Technical Research Centre of Finland 10/14/2013 2 Contents
More informationA comparison of radio direction-finding technologies. Paul Denisowski, Applications Engineer Rohde & Schwarz
A comparison of radio direction-finding technologies Paul Denisowski, Applications Engineer Rohde & Schwarz Topics General introduction to radiolocation Manual DF techniques Doppler DF Time difference
More informationWireless Sensor Networks Chapter 3: Network architecture
Wireless Sensor Networks Chapter 3: Network architecture António Grilo Courtesy: Holger Karl, UPB Goals of this chapter Having looked at the individual nodes in the previous chapter, we look at general
More informationAntenna Deployment Technical Brief
ProCurve Networking Antenna Deployment Technical Brief Introduction... 2 Antenna types... 2 Omni directional antennas... 2 Directional antennas... 2 Diversity antennas... 3 High gain directional antennas...
More informationUnderstanding Range for RF Devices
Understanding Range for RF Devices October 2012 White Paper Understanding how environmental factors can affect range is one of the key aspects to deploying a radio frequency (RF) solution. This paper will
More informationAntenna Diversity in Wireless Local Area Network Devices
Antenna Diversity in Wireless Local Area Network Devices Frank M. Caimi, Ph.D. Kerry L. Greer Jason M. Hendler January 2002 Introduction Antenna diversity has been used in wireless communication systems
More informationSynthetic Sensing: Proximity / Distance Sensors
Synthetic Sensing: Proximity / Distance Sensors MediaRobotics Lab, February 2010 Proximity detection is dependent on the object of interest. One size does not fit all For non-contact distance measurement,
More informationLocation of Mobile Terminals Using Time Measurements and Survey Points
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 52, NO. 4, JULY 2003 999 Location of Mobile Terminals Using Time Measurements and Survey Points Michael McGuire, Member, IEEE, Konstantinos N. Plataniotis,
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationEvaluation and testing of techniques for indoor positioning
Master s Thesis Evaluation and testing of techniques for indoor positioning Hampus Engström Fredrik Helander Department of Electrical and Information Technology, Faculty of Engineering, LTH, Lund University,
More informationMotion Sensing without Sensors: Information. Harvesting from Signal Strength Measurements
Motion Sensing without Sensors: Information Harvesting from Signal Strength Measurements D. Puccinelli and M. Haenggi Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana,
More informationWireless Technologies take Personnel Safety in the Process Industries to a New Level
324808 Issue 3 Wireless Technologies take Personnel Safety in the Process Industries to a New Level October 2010 WHITE PAPER John Hartley Managing Director Copyright Extronics Ltd 2009 The information
More informationAvaya WLAN 9100 External Antennas for use with the WAO-9122 Access Point
Avaya WLAN 9100 External Antennas for use with the WAO-9122 Access Point Overview To optimize the overall performance of a WLAN in an outdoor deployment it is important to understand how to maximize coverage
More informationWhat is 802.11? Why are standards important?
What is 802.11? The 802.11 standards are a group of evolving specifications defined by the Institute of Electrical and Electronic Engineers (IEEE). Commonly referred to as Wi Fi the 802.11 standards define
More informationWireless LAN Concepts
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
More informationRT-QoS for Wireless ad-hoc Networks of Embedded Systems
RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results
More informationMath 215 Project (25 pts) : Using Linear Algebra to solve GPS problem
Due Thursday March 1, 2012 NAME(S): Math 215 Project (25 pts) : Using Linear Algebra to solve GPS problem 0.1 Introduction The age old question, Where in the world am I? can easily be solved nowadays by
More informationOutdoor Localization System Using RSSI Measurement of Wireless Sensor Network
International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 78-3075, Volume-, Issue-, January 013 Outdoor Localization System Using RSSI Measurement of Wireless Sensor Network
More informationPerformance Analysis of the IEEE 802.11 Wireless LAN Standard 1
Performance Analysis of the IEEE. Wireless LAN Standard C. Sweet Performance Analysis of the IEEE. Wireless LAN Standard Craig Sweet and Deepinder Sidhu Maryland Center for Telecommunications Research
More informationLANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
More informationRobot Sensors. Outline. The Robot Structure. Robots and Sensors. Henrik I Christensen
Robot Sensors Henrik I Christensen Robotics & Intelligent Machines @ GT Georgia Institute of Technology, Atlanta, GA 30332-0760 hic@cc.gatech.edu Henrik I Christensen (RIM@GT) Sensors 1 / 38 Outline 1
More informationMultihopping for OFDM based Wireless Networks
Multihopping for OFDM based Wireless Networks Jeroen Theeuwes, Frank H.P. Fitzek, Carl Wijting Center for TeleInFrastruktur (CTiF), Aalborg University Neils Jernes Vej 12, 9220 Aalborg Øst, Denmark phone:
More informationMultipath fading in wireless sensor mote
Multipath fading in wireless sensor mote Vaishali M.Tech (VLSI), IMSEC, Ghaziabad/MTU, Noida Abstract: In this paper we study about the new technology as to transfer the data with the help of smart device,
More informationE190Q Lecture 5 Autonomous Robot Navigation
E190Q Lecture 5 Autonomous Robot Navigation Instructor: Chris Clark Semester: Spring 2014 1 Figures courtesy of Siegwart & Nourbakhsh Control Structures Planning Based Control Prior Knowledge Operator
More informationCopyright 2011 Casa Software Ltd. www.casaxps.com. Centre of Mass
Centre of Mass A central theme in mathematical modelling is that of reducing complex problems to simpler, and hopefully, equivalent problems for which mathematical analysis is possible. The concept of
More informationSURVEYING WITH GPS. GPS has become a standard surveying technique in most surveying practices
SURVEYING WITH GPS Key Words: Static, Fast-static, Kinematic, Pseudo- Kinematic, Real-time kinematic, Receiver Initialization, On The Fly (OTF), Baselines, Redundant baselines, Base Receiver, Rover GPS
More informationMobile Phone Tracking & Positioning Techniques
Mobile Phone Tracking & Positioning Techniques Laxmana Siridhara Arigela #1, Putta Aditya Veerendra *2, Simhadri Anvesh *2, Kolisetty Sandeep Satya Hanuman #3 1 Assistant Professor, Department of ECE,
More informationUniversity of L Aquila Center of Excellence DEWS Poggio di Roio 67040 L Aquila, Italy http://www.diel.univaq.it/dews
University of L Aquila Center of Excellence DEWS Poggio di Roio 67040 L Aquila, Italy http://www.diel.univaq.it/dews Locating ZigBee Nodes Using the TI s CC2431 Location Engine: A Testbed Platform and
More informationInternet Sustainability and Network Marketing Safety
Protecting Neighbor Discovery Against Node Compromises in Sensor Networks Donggang Liu isec Laboratory, CSE Department The University of Texas at Arlington Abstract The neighborhood information has been
More informationPART 5D TECHNICAL AND OPERATING CHARACTERISTICS OF MOBILE-SATELLITE SERVICES RECOMMENDATION ITU-R M.1188
Rec. ITU-R M.1188 1 PART 5D TECHNICAL AND OPERATING CHARACTERISTICS OF MOBILE-SATELLITE SERVICES Rec. ITU-R M.1188 RECOMMENDATION ITU-R M.1188 IMPACT OF PROPAGATION ON THE DESIGN OF NON-GSO MOBILE-SATELLITE
More informationAntennas & Propagation. CS 6710 Spring 2010 Rajmohan Rajaraman
Antennas & Propagation CS 6710 Spring 2010 Rajmohan Rajaraman Introduction An antenna is an electrical conductor or system of conductors o Transmission - radiates electromagnetic energy into space o Reception
More informationWireless Networking Trends Architectures, Protocols & optimizations for future networking scenarios
Wireless Networking Trends Architectures, Protocols & optimizations for future networking scenarios H. Fathi, J. Figueiras, F. Fitzek, T. Madsen, R. Olsen, P. Popovski, HP Schwefel Session 1 Network Evolution
More informationcommunication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
More informationLeast-Squares Intersection of Lines
Least-Squares Intersection of Lines Johannes Traa - UIUC 2013 This write-up derives the least-squares solution for the intersection of lines. In the general case, a set of lines will not intersect at a
More informationThe Basics of FEA Procedure
CHAPTER 2 The Basics of FEA Procedure 2.1 Introduction This chapter discusses the spring element, especially for the purpose of introducing various concepts involved in use of the FEA technique. A spring
More information3D Scanner using Line Laser. 1. Introduction. 2. Theory
. Introduction 3D Scanner using Line Laser Di Lu Electrical, Computer, and Systems Engineering Rensselaer Polytechnic Institute The goal of 3D reconstruction is to recover the 3D properties of a geometric
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology
More informationDynamic Source Routing in Ad Hoc Wireless Networks
Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 dbj@cs.cmu.edu Abstract
More informationAP Physics 1 and 2 Lab Investigations
AP Physics 1 and 2 Lab Investigations Student Guide to Data Analysis New York, NY. College Board, Advanced Placement, Advanced Placement Program, AP, AP Central, and the acorn logo are registered trademarks
More informationΠ8: Indoor Positioning System using WLAN Received Signal Strength Measurements Preface
Π8: Indoor Positioning System using WLAN Received Signal Strength Measurements Preface In this deliverable we provide the details of building an indoor positioning system using WLAN Received Signal Strength
More informationBasic Network Design
Frequency Reuse and Planning Cellular Technology enables mobile communication because they use of a complex two-way radio system between the mobile unit and the wireless network. It uses radio frequencies
More informationPrediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
More informationFOOTPRINT MODELING AND CONNECTIVITY ANALYSIS FOR WIRELESS SENSOR NETWORKS. A Thesis Presented. Changfei Chen. The University of Vermont.
FOOTPRINT MODELING AND CONNECTIVITY ANALYSIS FOR WIRELESS SENSOR NETWORKS A Thesis Presented by Changfei Chen to The Faculty of the Graduate College of The University of Vermont In Partial Fulfillment
More informationIntroduction to the Smith Chart for the MSA Sam Wetterlin 10/12/09 Z +
Introduction to the Smith Chart for the MSA Sam Wetterlin 10/12/09 Quick Review of Reflection Coefficient The Smith chart is a method of graphing reflection coefficients and impedance, and is often useful
More informationVoice services over Adaptive Multi-user Orthogonal Sub channels An Insight
TEC Voice services over Adaptive Multi-user Orthogonal Sub channels An Insight HP 4/15/2013 A powerful software upgrade leverages quaternary modulation and MIMO techniques to improve network efficiency
More informationAntenna Properties and their impact on Wireless System Performance. Dr. Steven R. Best. Cushcraft Corporation 48 Perimeter Road Manchester, NH 03013
Antenna Properties and their impact on Wireless System Performance Dr. Steven R. Best Cushcraft Corporation 48 Perimeter Road Manchester, NH 03013 Phone (603) 627-7877 FAX: (603) 627-1764 Email: sbest@cushcraft.com
More informationWIRELESS communication channels have the characteristic
512 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 54, NO. 3, MARCH 2009 Energy-Efficient Decentralized Cooperative Routing in Wireless Networks Ritesh Madan, Member, IEEE, Neelesh B. Mehta, Senior Member,
More informationIn mathematics, there are four attainment targets: using and applying mathematics; number and algebra; shape, space and measures, and handling data.
MATHEMATICS: THE LEVEL DESCRIPTIONS In mathematics, there are four attainment targets: using and applying mathematics; number and algebra; shape, space and measures, and handling data. Attainment target
More information- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of
An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science
More informationGossiping using the Energy Map in Wireless Sensor Networks
Gossiping using the Energy Map in Wireless Sensor Networks Max do Val Machado 1, Raquel A.F. Mini 2, Antonio A.F. Loureiro 1, Daniel L. Guidoni 1 and Pedro O.S.V. de Melo 1 1 Federal University of Minas
More informationIRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents
More informationKey Priorities for Sub-GHz Wireless Deployment
Key Priorities for Sub-GHz Wireless Deployment Silicon Laboratories Inc., Austin, TX Introduction To build an advanced wireless system, most developers will end up choosing between two industrial, scientific
More informationLog-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network
Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering
More information1 of 9 2/9/2010 3:38 PM
1 of 9 2/9/2010 3:38 PM Chapter 23 Homework Due: 8:00am on Monday, February 8, 2010 Note: To understand how points are awarded, read your instructor's Grading Policy. [Return to Standard Assignment View]
More informationBuild Panoramas on Android Phones
Build Panoramas on Android Phones Tao Chu, Bowen Meng, Zixuan Wang Stanford University, Stanford CA Abstract The purpose of this work is to implement panorama stitching from a sequence of photos taken
More informationIndoor Positioning Systems WLAN Positioning
Praktikum Mobile und Verteilte Systeme Indoor Positioning Systems WLAN Positioning Prof. Dr. Claudia Linnhoff-Popien Michael Beck, André Ebert http://www.mobile.ifi.lmu.de Wintersemester 2015/16 WLAN Positioning
More informationCommon Core State Standards for Mathematics Accelerated 7th Grade
A Correlation of 2013 To the to the Introduction This document demonstrates how Mathematics Accelerated Grade 7, 2013, meets the. Correlation references are to the pages within the Student Edition. Meeting
More informationTIME DOMAIN. PulsON Ranging & Communications. Part Four: Tracking Architectures Using Two-Way Time-of-Flight (TW-TOF) Ranging
TIME DOMIN PulsON Ranging & Communications Part Four: Tracking rchitectures Using Two-Way Time-of-Flight (TW-TOF) Ranging 320-0293 C June 2012 4955 Corporate Drive, Suite 101, Huntsville, labama 35805
More informationA Study of Network assisted Device-to- Device Discovery Algorithms, a Criterion for Mode Selection and a Resource Allocation Scheme
A Study of Network assisted Device-to- Device Discovery Algorithms, a Criterion for Mode Selection and a Resource Allocation Scheme ANASTASIOS THANOS KTH Information and Communication Technology Master
More informationQUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
More informationTroubleshooting Problems Affecting Radio Frequency Communication
Troubleshooting Problems Affecting Radio Frequency Communication Document ID: 8630 Refer to the Cisco Wireless Downloads (registered customers only) page in order to get Cisco Aironet drivers, firmware
More informationEpipolar Geometry. Readings: See Sections 10.1 and 15.6 of Forsyth and Ponce. Right Image. Left Image. e(p ) Epipolar Lines. e(q ) q R.
Epipolar Geometry We consider two perspective images of a scene as taken from a stereo pair of cameras (or equivalently, assume the scene is rigid and imaged with a single camera from two different locations).
More informationA Real-Time Indoor Position Tracking System Using IR-UWB
ASEAN IVO Forum 2015 @ Kuala Lumpur, Malaysia November 26th A Real-Time Indoor Position Tracking System Using IR-UWB Huan-Bang Li, Toshinori Kagawa, and Ryu Miura National Institute of Information and
More informationEnergy Effective Routing Protocol for Maximizing Network Lifetime of WSN
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India
More informationFrom reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either
More informationFrequency Assignment in Mobile Phone Systems
Konrad-Zuse-Zentrum für Informationstechnik Berlin Takustraße 7 D-14195 Berlin-Dahlem Germany MARTIN GRÖTSCHEL Frequency Assignment in Mobile Phone Systems ZIB-Report 00-58 (Dezember 2000) Frequency Assignment
More informationECE/CS 372 introduction to computer networks. Lecture 13
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
More informationAttacks on neighbor discovery
Cryptographic Protocols (EIT ICT MSc) Dr. Levente Buttyán associate professor BME Hálózati Rendszerek és Szolgáltatások Tanszék Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu, buttyan@crysys.hu
More informationINTRUSION PREVENTION AND EXPERT SYSTEMS
INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla avic@v-secure.com Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion
More informationAt the completion of this guide you should be comfortable with the following:
This guide provides instructions and best practices for deployment of the Yealink W52P IP DECT phones and repeaters RT10, which is intended for qualified technicians (or administrator) who will deploy
More informationTHE development of media access control (MAC) protocols
710 IEEE JOURNAL OF OCEANIC ENGINEERING, VOL. 32, NO. 3, JULY 2007 UWAN-MAC: An Energy-Efficient MAC Protocol for Underwater Acoustic Wireless Sensor Networks Min Kyoung Park, Member, IEEE, and Volkan
More informationMetrics for Detection of DDoS Attacks
Chapter 3 Metrics for Detection of DDoS Attacks The DDoS attacks are trying to interfere with the physical transmission and reception of wireless communications. Attacks are caused by jamming, exhaustion,
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey on
More informationLecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday
Lecture 14: Data transfer in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Data transfer over multiple wireless hops Many applications: TCP flow from a wireless node
More informationThe Ultimate Solution For Metro and Rural Wi-Fi. Wavion White Paper April 2008
For Metro and Rural Wi-Fi Executive summary The current generation of conventional Wi-Fi metro access points use commoditized chipsets originally designed specifically for indoor environments. When brought
More informationProtocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012
Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation
More informationHow To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
More informationAnalog and Digital Signals, Time and Frequency Representation of Signals
1 Analog and Digital Signals, Time and Frequency Representation of Signals Required reading: Garcia 3.1, 3.2 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Data vs. Signal Analog vs. Digital Analog Signals
More informationCS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
More informationMobile Tracking and Resource Reservation Scheme for Cellular Networks
Mobile Tracking and Resource Reservation Scheme for Cellular Networks Subbiah Shenbagaraman, B. Prabhakaran, S. Venkatesan Department of Computer Science, University of Texas at Dallas, Richardson, USA,
More informationBig Ideas in Mathematics
Big Ideas in Mathematics which are important to all mathematics learning. (Adapted from the NCTM Curriculum Focal Points, 2006) The Mathematics Big Ideas are organized using the PA Mathematics Standards
More informationYou will need the following pieces of equipment to complete this experiment:
UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING The Edward S. Rogers Sr. Department of Electrical and Computer Engineering ECE422H1S: RADIO AND MICROWAVE WIRELESS SYSTEMS EXPERIMENT 3:
More informationPractical Guide to the Simplex Method of Linear Programming
Practical Guide to the Simplex Method of Linear Programming Marcel Oliver Revised: April, 0 The basic steps of the simplex algorithm Step : Write the linear programming problem in standard form Linear
More informationA PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA
A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA N. Zarrinpanjeh a, F. Dadrassjavan b, H. Fattahi c * a Islamic Azad University of Qazvin - nzarrin@qiau.ac.ir
More informationEstimation of Position and Orientation of Mobile Systems in a Wireless LAN
Proceedings of the 46th IEEE Conference on Decision and Control New Orleans, LA, USA, Dec. 12-14, 2007 Estimation of Position and Orientation of Mobile Systems in a Wireless LAN Christof Röhrig and Frank
More informationBluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
More informationMobile Positioning Techniques in GSM Cellular Networks based on Signal Strength
Mobile Positioning Techniques in GSM Cellular Networks based on Signal Strength Mr. G.V.V.S.N. Babji, E. Nageswara Rao M.Tech Scholar, Prof & HOD, Abstract - Locating the site of a mobile user with a high
More informationThe Graphical Method: An Example
The Graphical Method: An Example Consider the following linear program: Maximize 4x 1 +3x 2 Subject to: 2x 1 +3x 2 6 (1) 3x 1 +2x 2 3 (2) 2x 2 5 (3) 2x 1 +x 2 4 (4) x 1, x 2 0, where, for ease of reference,
More informationWHITE PAPER THE PAIN OF IBM LOTUS DOMINO EMAIL BROADCASTING OPTIMIZING DELIVERY PERFORMANCE
WHITE PAPER THE PAIN OF IBM LOTUS DOMINO EMAIL BROADCASTING OPTIMIZING DELIVERY PERFORMANCE As a general purpose e-mail system, IBM Lotus Notes/Domino (Domino) provides powerful e-mail authoring, transport,
More informationCMPT 165: The Internet, Part 3
CMPT 165: The Internet, Part 3 Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University September 15, 2011 1 Basic Communication Technology Packet Switching (sharing a tranmission
More informationLecture 1. Introduction to Wireless Communications 1
896960 Introduction to Algorithmic Wireless Communications Lecture 1. Introduction to Wireless Communications 1 David Amzallag 2 May 25, 2008 Introduction to cellular telephone systems. How a cellular
More informationGreedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures
Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Dmitri Krioukov, kc claffy, and Kevin Fall CAIDA/UCSD, and Intel Research, Berkeley Problem High-level Routing is
More informationSensors and Cellphones
Sensors and Cellphones What is a sensor? A converter that measures a physical quantity and converts it into a signal which can be read by an observer or by an instrument What are some sensors we use every
More informationScanning with Sony Ericsson TEMS Phones. Technical Paper
Scanning with Sony Ericsson TEMS Phones Technical Paper Scanning with Sony Ericsson TEMS Phones 2009-05-13 Ascom 2009. All rights reserved. TEMS is a trademark of Ascom. All other trademarks are the property
More informationA survey on Spectrum Management in Cognitive Radio Networks
A survey on Spectrum Management in Cognitive Radio Networks Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty Georgia Institute of Technology Communications Magazine, vol 46, April 2008,
More information