Design of a Sensor Network Based Security System

Size: px
Start display at page:

Download "Design of a Sensor Network Based Security System"

Transcription

1 Design of a Sensor Network Based Security System Gergely Vakulya University of Pannonia Department of Computer Science and Systems Technology Veszprém, Hungary vakulya@dcs.uni-pannon.hu Gyula Simon University of Pannonia Department of Computer Science and Systems Technology Veszprém, Hungary simon@dcs.uni-pannon.hu Abstract In this paper a wireless distributed building safety and security framework will be introduced. The main design goals of the system are completely distributed operation, flexibility, robustness, fast response time, and energy efficiency. The framework uses low duty cycle TDMA-based communication scheme, where the scheduling is the result of optimization, based on network discovery measurements. The hardware and software architecture of a prototype system is introduced. I. INTRODUCTION Building security and safety systems (BSSS) use a wide variety of sensors to detect smoke, fire, intrusion, and also can measure additional environmental properties, e.g. temperature, humidity, lighting conditions. Sensors communicate their measurements and based on the measured properties the system makes decisions and may generate alarms. Most BSSS applications use wired technologies, but due to their ease of deployment and reconfigurability several wireless BSSS solutions have been proposed (e.g. [1], [2], [3], [4]). The sensory aspects and the automatic detection in safety systems have a large literature, see e.g. [5] for a survey. The physical sensors and detection algorithms are out of the scope of this paper, the goal of the proposed system is to provide a general framework, which can incorporate arbitrary sensors or actuators, and also any decision making algorithm. Safety and security systems require real-time response (e.g. alarm after a few seconds of the detection of fire) and robust operation (e.g. fail-safe operation in case of the failure of some nodes). Energy efficiency is also a crucial requirement if the system is operated on batteries. In the proposed system the operation is completely distributed (i.e. no central control or supervisor unit is required except for the system setup), thus the potential single point of failure is avoided. The sensors form a wireless network where the important information is spread throughout the network and each node decides autonomously on its own actions. E.g. an alarm node is not ordered to be activated by another node but rather the alarm node decides itself, based upon the received messages, whether the alarm should be set or not. The system may contain central (optionally mobile) supervision units to monitor the network by the operators. The network propagates not only alert messages but status information as well, thus the intactness of the system is continuously monitored. When a failure is detected (e.g. a node is missing) a system alarm is generated. The energy efficient operation of the network is provided by a low duty cycle TDMA scheduling, computed and optimized when the system is deployed. Robustness is provided by guaranteeing multiple data propagation paths to tolerate single node (or link) failures. The paper is organized as follows. Section II reviews relevant literature. In Section III the proposed system architecture is introduced. In Section IV the hardware and software architecture of a prototype system are described. Section V concludes. II. PREVIOUS WORK The scope of duties in safety and security systems is diversified, covering detection, communication, decision making, and actuation. The specific challenges arising in sensor networkbased applications are discussed in [5] from the viewpoint of fire protection systems. The main design considerations and principles of fire rescue applications, including the hardware and software aspects, are summarized in [6]. In [2] a distributed fire monitoring system is described. It uses MicaZ motes as sensors and their onboard thermometers as fire detectors. The application uses a special network protocol for transporting the critical data. In another interesting solution Bluetooth, primarily designed for computer peripherals, was used in security systems [3]. Due to its small protocol stack and advanced energy saving capabilities ZigBee is often used in wireless sensor networking applications. In [4] a complex fire protection system was presented, using ZigBee for sensor-sensor communication, and a combination of WiFi, 3G and DAB as the communication infrastructure for the fire brigades. TDMA is used in various sensor networking applications to achieve high power efficiency, small end-to-end delay and also to avoid collisions. The scheduling problem is unfortunately NP-complete [7], but approximate solutions are known, e.g. based on graph coloring [7] or nonlinear optimization [8]. The problem of clustered wireless sensor networks was handled in [8], with special emphasis on energy efficiency. In this paper a novel TDMA-based solution will be proposed for energy efficient data dissemination in the whole network (from every node to every node) /11/$ IEEE 15

2 III. THE PROPOSED SECURITY SYSTEM A. Requirements Since this sensor network is designed for safety and security (e.g. fire monitoring and building surveillance) the primary requirements are low latency, high reliability and fault-tolerance. The main system requirements are summarized as follows: The whole system is decentralized; every node is equivalent. In this way no central operation/decision making is required. Every alert message reaches all nodes in at most 5 seconds, which is satisfactory for most fire alarm and intrusion detection systems. The network tolerates a single point of failure, e.g. a fault of one node, or communication link. In case of a failure instant user intervention is required, while the service is still maintained. Dispatching the alert messages are guaranteed even in case of a single point of failure. The network is scalable up to several hundreds of nodes, allowing services in medium-sized buildings. The lifetime of the nodes is at least 1 year, with one battery pack. The requirements on fault tolerance induce that the graph of the network must be 2-connected. In addition to this the following reasonable assumptions are used: The sensor nodes have fixed positions. The nodes have an unique, 64-bit address. by one, with AddressAssign messages. The nodes send an AddressAssignReply message to acknowledge. After the address assignment the base station broadcasts a NeighborRequest message to the network, and after random delays the nodes start to send NeighborShout messages to their neighbors. These messages are single-hop broadcast messages, and they are repeated multiple times. The nodes store the IDs of the neighbors they have received NeighborShout messages from, and also the quality of the links, represented by the triplet {N rec, avgrssi, avglqi}, where N rec is the number of received messages, avgrssi is the average Received Signal Strength Indicator, and avglqi is the average Link Quality Index. After a safe delay the nodes send back the collected information in NeighborReport messages. In case a NeighborReport message does not reach the base station a NeighborRequest message can be addressed to a particular node, instead of the whole network. In this case the selected node sends back its collected information about the neighborhood, without the discovery procedure. B. Operating modes The system has two operating modes: setup and surveillance. The setup mode is used after the deployment of the sensor nodes and it consists of three phases: discovery, optimization and configuration. In discovery phase the network topology is determined. The optimization phase calculates the TDMA schedule, which is then downloaded to the nodes in the configuration phase. The surveillance mode uses the precomputed TDMA schedule to coordinate inter-node communication. C. Network discovery The operation of the network discovery is shown in Fig. 1. The nodes have a 64-bit unique long address, which is impractical for addressing and routing. Thus at the beginning of the discovery phase the long address is replaced by a unique 10-bit short address as follows. The discovery phase is initiated by the base station, by sending a HelloEverybody message to the network. For the network-wide broadcast flood routing is used. As an answer the nodes send their long address in a HelloEverybodyReply message. The converge-cast protocol is handled by a gradientbased routing. To avoid the collisions every node uses a random delay before the actual sending. After the reception of the HelloeverybodyReply messages the base station assigns a short address to the nodes, one Fig. 1. Messages of the discovery phase From the collected NeighborReport messages the base station builds the preliminary connectivity graph G, which contains also the symmetric link quality information, as follows: The vertices of G are the nodes in the network. There is an edge between two vertices in G if the composite link quality index CLQI, computed from {N rec,avgrssi,avglqi}, 16

3 between the corresponding nodes is good in both directions. The weight of an edge between nodes i and j is the minimum of the CLQI quantities between (i, j) and (j, i). This step is shown in Fig. 2(b). From G the reliable connectivity matrix G is generated, by omitting vertices with weights less than a threshold (Fig. 2(c)). D. TDMA optimization In the optimization phase a TDMA schedule is generated. With a clustering algorithm k-connected subgraphs are searched (k 2), as shown in Fig. 2(c). Then a derived graph F is generated, where the vertices represent the clusters and there is an edge between two vertices in F if there are at least two vertex-disjoint paths between the corresponding clusters in G. Then a Hamiltonian cycle is searched in F with a traveling salesman approximator. This cycle then projected back to G, where an edge of F is associated by an edge in G, so that the edges are vertex-disjoint in G (Fig. 2(d), thick lines). In the next step all the remaining points of the clusters are connected to the Hamiltonian cycle (Fig. 2(e), thin lines), producing graph H. Because of the small number of nodes in each cluster, an exhaustive search can also be used for the last step. This way we obtain a cycle, with optional hooks on it. The traversal is built as follows: 1 Start from an arbitrary node in H to an arbitrary direction. 2 Continue until a branch is found. 3 Travel all paths, one after the other, until the end of branch is reached. 4 Continue from step 2 until there are no nodes left. 5 Time slices are associated with the edges of H in the order of the traversal (Fig. 2(e)). Fig. 2(e) shows one direction of the message transmission path with length L =28. This path is reversed and another scheduling is added with the reverse direction. Thus the full TDMA schedule contains 2L time slices. Communicating in both directions provides fault-tolerance, i.e. the information will get to all nodes even if one of the nodes dies. E. Network configuration In the configuration phase the TDMA schedule is downloaded to the nodes, and other working parameters can also be set. The configuration download is reliable, using an acknowledgement for each downloaded packet. F. Surveillance mode In the surveillance mode the communication is organized using the TDMA schedule provided by the optimization phase. TDMA requires precise time synchronization and guaranteed availability of the required resources (radio, CPU). The accurate time synchronization is provided by using a modified version of FTSP [9]. There are two modifications to the original algorithm. First, there are no separate time synchronization messages: the synchronization information is embedded in the existing network traffic. Second, periodical beaconing is provided according to the TDMA time slots. (b) (d) (a) Fig. 2. The TDMA schedule optimization. (a) An example building layout with fire sensors, motion detectors and alarms. (b) The measured connection graph. The thickness of the arcs represent the quality of the corresponding links. (c) The network after thresholding the links and clustering. (d) Hamiltonian-cycle between the clusters (thick lines) and paths inside the clusters (thin lines). Links represented by dashed lines do not participate in the communication. (e) The TDMA schedule in one direction. For the guaranteed availability of system resources slotted programming [10] is used as shown in Fig. 3. The communication is assigned to dedicated time slots, separated from the processing, which may require longer and uncertain amount of time. In each communication time slot exactly one node can transmit to exactly one other node, with acknowledgement. With the applied synchronization method the duty cycle can be lowered to the range of %. Fig. 3. Slotted communication of four consecutive nodes. Each node have a time slot for transmission and for reception. Processing is separated in time from communication. (c) (e) 17

4 IV. PROTOTYPE SYSTEM A. Hardware architecture The sensor node is built around the ZigBit integrated radio device. It contains an 8-bit Atmel ATmega1281 microcontroller, and an RF212 radio transceiver, connected to each other using an SPI bus. The microcontroller has 128kByte flash program memory, 8kByte SRAM, and several peripherals, such as I2C, SPI and analog-digital converter. In the prototype system the 900MHz version of the radio was used, with an external whip antenna. The maximum radio communication bandwidth is 1Mbps. The analog and digital IO ports of the processor can be accessed using an external connector, so several kinds of sensors can be connected to the prototype board. For programming and communication purposes the mote has a JTAG connector and a USB interface with a USB- RS232 converter. The sensor node is shown on Fig. 4. Fig. 4. The sensor node B. Software architecture The sensor node s software uses TinyOS [11], which is a component-based embedded real-time operating system designed to wireless sensor network applications. TinyOS provides a large number of reusable modules, e.g. serial port access, periodical and one-shot timers, single or multihop radio communication [12] and time synchronization [9]. Fig. 5. The architecture of the sensor nodes. The architecture of the sensor nodes is shown in Fig. 5. The main low-level services are the drivers for the radio, the timers and the sensors. The security application can access them through two middleware services (routing, time synchronization), and the measurement service. The configuration service handles the settings of the sensor node. Fig. 6. The architecture of the supervisor unit. The architecture of supervisor unit is shown in Fig. 6. It consists of two main components. In left hand side of the figure the architecture of the system configuration, while in the right hand side the system management component are shown. Both components use the WSN interface to communicate with the wireless sensor network. The discovery service of the system management component is responsible to for detecting the nodes and building the connectivity matrix. Using the data provided by the discovery service the optimization service computes the TDMA schedule, which is then downloaded to the nodes by the configuration service. While the system configuration component is mainly offline, the system management component is heavily online. The wireless sensor network is accessed through a system state service. The user can execute commands or handle (e.g. cancel or confirm) alarms with the commands and the alarm handling services. All user interactions are done using the graphical user interface. C. Results The prototype system was tested in a 15-node network, deployed in an office building. The communication framework provided a 96-byte packet for the application, which was used to transmit alarm messages (e.g. movement detected) and user commands (e.g. activate sensor) with low delay, and status information (e.g. node battery level) with higher delay. The cycle time was two seconds, thus an alarm message can be delivered to each node in the network within 4 seconds in the worst case. The delivery time consists of max. 2 seconds on-node delay from the event detection to the message transmission, and another 2 seconds cycle time for the message hopping through the network (this time actually was much smaller, 15 20ms in the 15-node network.) The average synchronization error between subsequent nodes was 16μs with maximum network-wide synchronization error of 150μs. The radios were switched on either at the sheduled transmission time or slightly before the scheduled reception time. The tight syncronization allowed the prereception awake time be minimal. As a result, the radio of every node was alive for less than 8ms in each cycle, providing duty cycle of 0.4%, which cannot be approached by current off-the-shelf technologies (e.g. Zigbee). The microcontroller s duty cycle was even lower in this simple application. The applied 96-byte useful payload of the messages was more than enough for our simple application but for higher node numbers a careful application-level mechanism must be implemented to control the access to the scarce message resources. 18

5 V. CONCLUSION A sensor network-based massively distributed security framework has been proposed, which can distribute alarm messages in the whole network with low latency and provides high power efficiency. The network needs a central control unit only at the initial phase and later on its operation is completely distributed. The proposed system uses a TDMAbased communication protocol, based on graph-theoretic optimization, in order to provide low duty cycle operation for the nodes. The proposed system is robust and fault-tolerant, as it provides guaranteed system services even in case of a single node failure. The hardware and software architectures of the prototype system were introduced. REFERENCES [1] N. Ikram, S. Durranii, H. Sajid, and H. Saeed, A wireless multimedia sensor network based intelligent safety and security system (IS3), in SENSORCOMM 09: Proceedings of the 2009 Third International Conference on Sensor Technologies and Applications. Washington, DC, USA: IEEE Computer Society, 2009, pp [2] A. Tsertou, R. Upadhyay, D. Laurenson, and S. McLaughlin, Towards a tailored sensor network for fire emergency monitoring in large buildings, in Proceedings of the 1st IEEE International Conference in Wireless Rural and Emergency Communications (WRECOM07), Rome, Italy, Sep [3] S.-H. Choi, B.-K. Kim, J. Park, C.-H. Kang, and D.-S. Eom, An implementation of wireless sensor network for security system using bluetooth, IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp , Feb [4] S.-H. Yang and P. Frederick, SafetyNET a wireless sensor network for fire protection and emergency responses, Measurement and Control, vol. 39, no. 7, pp , Sep [5] M. Bahrepour, N. Meratnia, and P. J. M. Havinga, Automatic fire detection: A survey from wireless sensor network perspective, Centre for Telematics and Information Technology University of Twente, Enschede, Technical Report TR-CTIT-08-73, Dec [6] K. Sha, W. Shi, and O. Watkins, Using wireless sensor networks for fire rescue applications: Requirements and challenges, in Proceedings of IEEE International Conference on Electro/information Technology, [7] S. C. Ergen and P. Varaiya, TDMA scheduling algorithms for wireless sensor networks, Wirel. Netw., vol. 16, no. 4, pp , [8] L. Shi and A. O. Fapojuwo, TDMA scheduling with optimized energy efficiency and minimum delay in clustered wireless sensor networks, IEEE Transactions on Mobile Computing, vol. 9, no. 7, pp , [9] M. Maróti, B. Kusy, G. Simon, and A. Lédeczi, The flooding time synchronization protocol, in Proceedings of the 2nd international conference on Embedded networked sensor systems, ser. SenSys 04. New York, NY, USA: ACM, 2004, pp [Online]. Available: [10] R. Flury and R. Wattenhofer, Slotted programming for sensor networks, in IPSN 10: Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks. New York, NY, USA: ACM, 2010, pp [11] P. Levis and D. Gay, TinyOS Programming. New York, NY, USA: Cambridge University Press, [12] M. Maróti, Directed flood-routing framework for wireless sensor networks, in Middleware 04: Proceedings of the 5th ACM/IFIP/USENIX international conference on Middleware. New York, NY, USA: Springer-Verlag New York, Inc., 2004, pp

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs 15 th TF-Mobility Meeting Sensor Networks Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs Overview 2 Ubiquitous Computing > Vision defined by Mark Weiser in 1991 Seamless integration

More information

A Transport Protocol for Multimedia Wireless Sensor Networks

A Transport Protocol for Multimedia Wireless Sensor Networks A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless

More information

High-Frequency Distributed Sensing for Structure Monitoring

High-Frequency Distributed Sensing for Structure Monitoring High-Frequency Distributed Sensing for Structure Monitoring K. Mechitov, W. Kim, G. Agha and T. Nagayama* Department of Computer Science, University of Illinois at Urbana-Champaign 201 N. Goodwin Ave.,

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Wireless Sensor Network Based Low Power Embedded System Design For Automated Irrigation System Using MSP430

Wireless Sensor Network Based Low Power Embedded System Design For Automated Irrigation System Using MSP430 Wireless Sensor Network Based Low Power Embedded System Design For Automated Irrigation System Using MSP430 Mr. Patil Vikas Anandrao. M Tech. Student (Digital Systems) Rajarambapu Institute of Technology,

More information

Introduction to Wireless Sensor Network Security

Introduction to Wireless Sensor Network Security Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

Design of WSN-Based Remote Monitoring System for Environmental Parameters in Substation

Design of WSN-Based Remote Monitoring System for Environmental Parameters in Substation International Journal of Smart Grid and Clean Energy Design of WSN-Based Remote Monitoring System for Environmental Parameters in Substation Aina Hu a *, Huanhuan Wang b, and Jianchen Wan a a Department

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. Marco Zennaro, ICTP Trieste-Italy

INTRODUCTION TO WIRELESS SENSOR NETWORKS. Marco Zennaro, ICTP Trieste-Italy INTRODUCTION TO WIRELESS SENSOR NETWORKS Marco Zennaro, ICTP Trieste-Italy Wireless sensor networks A Wireless Sensor Network is a self-configuring network of small sensor nodes communicating among themselves

More information

Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System

Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System , pp.97-108 http://dx.doi.org/10.14257/ijseia.2014.8.6.08 Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System Suk Hwan Moon and Cheol sick Lee Department

More information

Implementation of Wireless Gateway for Smart Home

Implementation of Wireless Gateway for Smart Home Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang

More information

WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks

WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 755-760 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4686 WBAN Beaconing for Efficient Resource Sharing in Wireless Wearable

More information

Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009

Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009 Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer October 2009 Jennic highlights Jennic is a fabless semiconductor company providing Wireless Microcontrollers to high-growth

More information

A Review of Security System for Smart Home Applications

A Review of Security System for Smart Home Applications Journal of Computer Science 8 (7): 1165-1170, 2012 ISSN 1549-3636 2012 Science Publications A Review of Security System for Smart Home Applications Mohammad Syuhaimi Ab-Rahman and Mohd Ariff Razaly Department

More information

Intelligent Home Automation and Security System

Intelligent Home Automation and Security System Intelligent Home Automation and Security System Ms. Radhamani N Department of Electronics and communication, VVIET, Mysore, India ABSTRACT: In todays scenario safer home security is required, As the technology

More information

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

Surveillance System Using Wireless Sensor Networks

Surveillance System Using Wireless Sensor Networks Surveillance System Using Wireless Sensor Networks Dan Nguyen, Leo Chang Computer Engineering, Santa Clara University Santa Clara, California, USA dantnguyen84@gmail.com chihshun@gmail.com Abstract The

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Remote Home Security System Based on Wireless Sensor Network Using NS2

Remote Home Security System Based on Wireless Sensor Network Using NS2 Remote Home Security System Based on Wireless Sensor Network Using NS2 #Rajesh Banala 1, Asst.Professor,E-mail: rajesh.banal@gmail.com #D.Upender 2, Asst.Professor, E mail: upender584@gmail.com #Department

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

Load Balancing Routing Algorithm for Data Gathering Sensor Network

Load Balancing Routing Algorithm for Data Gathering Sensor Network Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum

More information

Wireless Sensor Network for Performance Monitoring of Electrical Machine

Wireless Sensor Network for Performance Monitoring of Electrical Machine International Journal of Reconfigurable and Embedded Systems (IJRES) Vol. 4, No. 1, March 2015, pp. 1~5 ISSN: 2089-4864 1 Wireless Sensor Network for Performance Monitoring of Electrical Machine Priyanka

More information

Remote-Controlled Dissolved Oxygen Monitoring System

Remote-Controlled Dissolved Oxygen Monitoring System Iowa State University Senior Design Remote-Controlled Dissolved Oxygen Monitoring System Final Document Students: Terry Fett-EE Josh Dunham-EE Brian Peck-CprE Grant VerMeer-CprE Advisors: Dr. Joseph Shinar

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS

BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS Review of the Air Force Academy No 2 (24) 2013 BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS Marian ALEXANDRU, Vlad URSU Transilvania University of Brasov, Romania Abstract: A study of how to implement

More information

Experimental implementation of a real-time token-based network protocol on a microcontroller

Experimental implementation of a real-time token-based network protocol on a microcontroller Experimental implementation of a real-time token-based network protocol on a microcontroller Ferdy Hanssen, Robert Krikke, Bert Baron, Pierre G. Jansen, Hans Scholten Distributed and Embedded Systems group

More information

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,

More information

ZIGBEE 802.15.4. ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna

ZIGBEE 802.15.4. ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna ECGR-6185 Advanced Embedded Systems ZIGBEE 802.15.4 University of North Carolina-Charlotte Charlotte Chaitanya Misal Vamsee Krishna WPAN A personal area network (PAN) is a computer network used for communication

More information

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

RT-QoS for Wireless ad-hoc Networks of Embedded Systems RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results

More information

REMOTE TEMPERATURE AND HUMIDITY MONITORING SYSTEM USING WIRELESS SENSOR NETWORKS

REMOTE TEMPERATURE AND HUMIDITY MONITORING SYSTEM USING WIRELESS SENSOR NETWORKS REMOTE TEMPERATURE AND HUMIDITY MONITORING SYSTEM USING WIRELESS SENSOR NETWORKS Varsha jaladi 1, Guthula Ganga Raja Sekhar 2, K.Raghava Rao 3 1 BTech Student, dept. of Electronics and Computers, K L University,

More information

DEVELOPMENT OF VIBRATION REMOTE MONITORING SYSTEM BASED ON WIRELESS SENSOR NETWORK

DEVELOPMENT OF VIBRATION REMOTE MONITORING SYSTEM BASED ON WIRELESS SENSOR NETWORK International Journal of Computer Application and Engineering Technology Volume 1-Issue1, January 2012.pp.1-7 www.ijcaet.net DEVELOPMENT OF VIBRATION REMOTE MONITORING SYSTEM BASED ON WIRELESS SENSOR NETWORK

More information

NanoMon: An Adaptable Sensor Network Monitoring Software

NanoMon: An Adaptable Sensor Network Monitoring Software NanoMon: An Adaptable Sensor Network Monitoring Software Misun Yu, Haeyong Kim, and Pyeongsoo Mah Embedded S/W Research Division Electronics and Telecommunications Research Institute (ETRI) Gajeong-dong

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

SPI I2C LIN Ethernet. u Today: Wired embedded networks. u Next lecture: CAN bus u Then: 802.15.4 wireless embedded network

SPI I2C LIN Ethernet. u Today: Wired embedded networks. u Next lecture: CAN bus u Then: 802.15.4 wireless embedded network u Today: Wired embedded networks Ø Characteristics and requirements Ø Some embedded LANs SPI I2C LIN Ethernet u Next lecture: CAN bus u Then: 802.15.4 wireless embedded network Network from a High End

More information

Security for Ad Hoc Networks. Hang Zhao

Security for Ad Hoc Networks. Hang Zhao Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile

More information

STRUCTURAL HEALTH MONITORING AT ROME UNDERGROUND, ROMA, ITALY

STRUCTURAL HEALTH MONITORING AT ROME UNDERGROUND, ROMA, ITALY Ref: WhP_Rome_vA STRUCTURAL HEALTH MONITORING AT ROME UNDERGROUND, ROMA, ITALY WHITE PAPER Summary: This white paper shows how Structural Health Monitoring (SHM), helps to improve the quality in the construction

More information

Design and Development of SMS Based Wireless Home Appliance Control and Security System

Design and Development of SMS Based Wireless Home Appliance Control and Security System Journal of Modern Science and Technology Vol. 3. No. 1. March 2015 Issue. Pp.80-87 Design and Development of SMS Based Wireless Home Appliance Control and Security System Md. Abdullah Al Asad *, Md. Al

More information

CSC 774 Advanced Network Security. Outline. Related Work

CSC 774 Advanced Network Security. Outline. Related Work CC 77 Advanced Network ecurity Topic 6.3 ecure and Resilient Time ynchronization in Wireless ensor Networks 1 Outline Background of Wireless ensor Networks Related Work TinyeRync: ecure and Resilient Time

More information

Power & Environmental Monitoring

Power & Environmental Monitoring Data Centre Monitoring Made Easy Power & Environmental Monitoring Features & Benefits Packet Power provides the easiest, most cost effective way to capture detailed power and temperature information for

More information

Industrial Networks & Databases

Industrial Networks & Databases Industrial Networks & Databases LONWORKS KNX 1 HVAC and BEMS HVAC - Heating, Ventilation & Air Conditioning BEMS - Building & Energy Management Systems 2 3 4 LONWORKS (Local Operating Networks) Open solution

More information

High rate and Switched WiFi. WiFi 802.11 QoS, Security 2G. WiFi 802.11a/b/g. PAN LAN Cellular MAN

High rate and Switched WiFi. WiFi 802.11 QoS, Security 2G. WiFi 802.11a/b/g. PAN LAN Cellular MAN Security Issues and Quality of Service in Real Time Wireless PLC/SCADA Process Control Systems Dr. Halit Eren & Dincer Hatipoglu Curtin University of Technology (Perth Australia) 2/27/2008 1 PRESENTATION

More information

Maximizing Range and Battery Life in Low-Cost Wireless Networks

Maximizing Range and Battery Life in Low-Cost Wireless Networks Maximizing Range and Battery Life in Low-Cost Wireless Networks The proliferation of cost-effective wireless technology has led to the rise of entirely new types of networks across a wide range of applications

More information

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257 Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy

More information

FAMA/TDMA Hybrid MAC for Wireless Sensor Networks

FAMA/TDMA Hybrid MAC for Wireless Sensor Networks FAMA/TDMA Hybrid MAC for Wireless Sensor Networks Nuwan Gajaweera Dialog-University of Moratuwa Mobile Communication Research Lab, University of Moratuwa, Katubedda, Moratuwa, Sri Lanka Email: nuwang@ent.mrt.ac.lk

More information

APPLICATION NOTE. AVR2130: Lightweight Mesh Developer Guide. Atmel MCU Wireless. Features. Description

APPLICATION NOTE. AVR2130: Lightweight Mesh Developer Guide. Atmel MCU Wireless. Features. Description APPLICATION NOTE AVR2130: Lightweight Mesh Developer Guide Atmel MCU Wireless Features Atmel Lightweight Mesh stack specification and APIs Lightweight Mesh Software Development Kit (SDK) Description This

More information

Automated Security System using ZigBee

Automated Security System using ZigBee IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 01 June 2015 ISSN (online): 2349-6010 Automated Security System using ZigBee Sneha Susan Abraham Saveetha School

More information

Wireless Sensor Networks Chapter 14: Security in WSNs

Wireless Sensor Networks Chapter 14: Security in WSNs Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks

More information

Fig. 1 BAN Architecture III. ATMEL BOARD

Fig. 1 BAN Architecture III. ATMEL BOARD Volume 2, Issue 9, September 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Demystifying Wireless for Real-World Measurement Applications

Demystifying Wireless for Real-World Measurement Applications Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,

More information

Sensor network infrastructure for intelligent building monitoring and management system

Sensor network infrastructure for intelligent building monitoring and management system Sensor network infrastructure for intelligent building monitoring and management system 1 R.VENKATESH, 2 K.RADHA, 3 M.GANTHIMATHI 1.B.E-CSE, Muthayammal Engineering College, Rasipuram. 2. Assistant Professor

More information

The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications

The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications Joshua Ellul jellul@imperial.ac.uk Overview Brief introduction to Body Sensor Networks BSN Hardware

More information

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Monu Rani 1, Kiran Gupta 2, Arvind Sharma 3 1 M.Tech (Student), 2 Assistant Professor, 3 Assistant Professor Department

More information

Design and Development of SMS Based Wireless Home Appliance Control and Security System

Design and Development of SMS Based Wireless Home Appliance Control and Security System Design and Development of SMS Based Wireless Home Appliance Control and Security System Md. Abdullah Al Asad 1, Md. Al Muzahid 2 and Md. Saifuddin Faruk 3 The rapid change in the wireless communication

More information

Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India

Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India Load Balancing Algorithms in Wireless Sensor Network : A Survey Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India Dr. Nileshsingh V. Thakur

More information

AN EVOLVABLE OPERATING SYSTEM FOR WIRELESS SENSOR NETWORKS

AN EVOLVABLE OPERATING SYSTEM FOR WIRELESS SENSOR NETWORKS AN EVOLVABLE OPERATING SYSTEM FOR WIRELESS SENSOR NETWORKS THU-THUY DO, DAEYOUNG KIM, TOMAS SANCHEZ LOPEZ, HYUNHAK KIM, SEONGKI HONG, MINH-LONG PHAM Information and Communications University, 119 Munjiro,

More information

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies 3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

An Intelligent Car Park Management System based on Wireless Sensor Networks

An Intelligent Car Park Management System based on Wireless Sensor Networks An Intelligent Car Park Management System based on Wireless Sensor Networks Vanessa W.S. Tang, Yuan Zheng, Jiannong Cao Internet and Mobile Computing Lab Department of Computing, The Hong Kong Polytechnic

More information

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org Internet of things (IOT) applications covering industrial domain Dev Bhattacharya dev_bhattacharya@ieee.org Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture

More information

The design and implementation of the environment monitoring system of smart home based on EnOcean technology

The design and implementation of the environment monitoring system of smart home based on EnOcean technology International Conference on Manufacturing Science and Engineering (ICMSE 2015) The design and implementation of the environment monitoring system of smart home based on EnOcean technology Peng Dong1, a,

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

DKWF121 WF121-A 802.11 B/G/N MODULE EVALUATION BOARD

DKWF121 WF121-A 802.11 B/G/N MODULE EVALUATION BOARD DKWF121 WF121-A 802.11 B/G/N MODULE EVALUATION BOARD PRELIMINARY DATA SHEET Wednesday, 16 May 2012 Version 0.5 Copyright 2000-2012 Bluegiga Technologies All rights reserved. Bluegiga Technologies assumes

More information

Wireless Home Security System

Wireless Home Security System Wireless Home Security System Group: D14 Members: Vaibhav Singh (05D07026) Abhishek Tiwari (05D07028) Sauvik Chowdhury (05D07029) 1. Abstract The project is aimed at designing a low cost and reliable wireless

More information

SIP Protocol as a Communication Bus to Control Embedded Devices

SIP Protocol as a Communication Bus to Control Embedded Devices 229 SIP Protocol as a Communication Bus to Control Embedded Devices Ramunas DZINDZALIETA Institute of Mathematics and Informatics Akademijos str. 4, Vilnius Lithuania ramunas.dzindzalieta@gmail.com Abstract.

More information

Design of Environmental Parameters Monitoring System for Watermelon Seedlings Based on Wireless Sensor Networks

Design of Environmental Parameters Monitoring System for Watermelon Seedlings Based on Wireless Sensor Networks Applied Mathematics & Information Sciences An International Journal 20 NSP 5 (2) (20), 243S-250S Design of Environmental Parameters Monitoring System for Watermelon Seedlings Based on Wireless Sensor Networks

More information

Wireless Sensor Network: Challenges, Issues and Research

Wireless Sensor Network: Challenges, Issues and Research ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues

More information

BodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks

BodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks BodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks Gengfa Fang and Eryk Dutkiewicz Department of Physics and Engineering Macquarie University, Sydney, NSW, Australia Tel:

More information

Vibration Measurement of Wireless Sensor Nodes for Structural Health Monitoring

Vibration Measurement of Wireless Sensor Nodes for Structural Health Monitoring , pp.18-22 http://dx.doi.org/10.14257/astl.2015.98.05 Vibration Measurement of Wireless Sensor Nodes for Structural Health Monitoring Surgwon Sohn, Seong-Rak Rim, In Jung Lee Div. of Computer and Information

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

Palaparthi.Jagadeesh Chand. Associate Professor in ECE Department, Nimra Institute of Science & Technology, Vijayawada, A.P.

Palaparthi.Jagadeesh Chand. Associate Professor in ECE Department, Nimra Institute of Science & Technology, Vijayawada, A.P. Patient Monitoring Using Embedded Palaparthi.Jagadeesh Chand Associate Professor in ECE Department, Nimra Institute of Science & Technology, Vijayawada, A.P Abstract The aim of this project is to inform

More information

Latency on a Switched Ethernet Network

Latency on a Switched Ethernet Network Application Note 8 Latency on a Switched Ethernet Network Introduction: This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency

More information

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer

More information

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Journal of Information Processing Systems, Vol.6, No.4, December 2010 DOI : 10.3745/JIPS.2010.6.4.501 Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Dae-Suk Yoo* and Seung

More information

Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities. Dr. William Kao

Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities. Dr. William Kao Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities Dr. William Kao Agenda Introduction - Sensors, Actuators, Transducers Sensor Types, Classification Wireless Sensor Networks

More information

MOTEWORKS. Key Features. Overview

MOTEWORKS. Key Features. Overview MOTEWORKS SOFTWARE PLATFORM MoteWorks 2.0 provides a complete software development environment for wireless sensor network applications. Included is a collection of flexible software packages that enables

More information

M2M I/O Modules. To view all of Advantech s M2M I/O Modules, please visit www.advantech.com/products.

M2M I/O Modules. To view all of Advantech s M2M I/O Modules, please visit www.advantech.com/products. M2M I/O Modules 14 M2M I/O Modules Overview 14-2 M2M I/O Modules Selection Guide 14-6 ADAM-2510Z Wireless Router Node 14-8 ADAM-2520Z Wireless Modbus RTU Gateway 14-9 ADAM-2031Z ADAM-2632Z ADAM-2017Z ADAM-2018Z

More information

2.0 Command and Data Handling Subsystem

2.0 Command and Data Handling Subsystem 2.0 Command and Data Handling Subsystem The Command and Data Handling Subsystem is the brain of the whole autonomous CubeSat. The C&DH system consists of an Onboard Computer, OBC, which controls the operation

More information

Water Quality Monitoring System Using Zigbee Based Wireless Sensor Network

Water Quality Monitoring System Using Zigbee Based Wireless Sensor Network 24 Water Quality Monitoring System Using Zigbee Based Wireless Sensor Network Zulhani Rasin Faculty of Electrical Engineering Universiti Teknikal Malaysia Melaka (UTeM) Melaka, Malaysia Email: zulhani@utem.edu.my

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Wireless monitoring system for temperature and humidity based on ZigBee

Wireless monitoring system for temperature and humidity based on ZigBee Wireless monitoring system for temperature and humidity based on ZigBee Abstract Jianjun Chen* Shaoxing University uanpei College, Shaoxing, Zhejiang, 3000, China Received March 04, www.cmnt.lv Traditional

More information

Using IPv6 and 6LoWPAN for Home Automation Networks

Using IPv6 and 6LoWPAN for Home Automation Networks Using IPv6 and 6LoWPAN for Home Automation Networks Thomas Scheffler / Bernd Dörge ICCE-Berlin Berlin, 06.09.2011 Overview IPv6 and 6LoWPAN for Home Automation Networks 6LoWPAN Application & Network Architecture

More information

How To Make A Multi-User Communication Efficient

How To Make A Multi-User Communication Efficient Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

More information

Synapse s SNAP Network Operating System

Synapse s SNAP Network Operating System Synapse s SNAP Network Operating System by David Ewing, Chief Technology Officer, Synapse Wireless Today we are surrounded by tiny embedded machines electro-mechanical systems that monitor the environment

More information

A survey on Spectrum Management in Cognitive Radio Networks

A survey on Spectrum Management in Cognitive Radio Networks A survey on Spectrum Management in Cognitive Radio Networks Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty Georgia Institute of Technology Communications Magazine, vol 46, April 2008,

More information

Easy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols.

Easy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols. 1 LCA Easy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols. Christina Vlachou, Julien Herzen, Patrick Thiran (EPFL) Marc Sommer, Hervé Dedieu (HEIG-VD) Gérôme Bovet, Jean

More information

Influence of Load Balancing on Quality of Real Time Data Transmission*

Influence of Load Balancing on Quality of Real Time Data Transmission* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,

More information

Data Management in Sensor Networks

Data Management in Sensor Networks Data Management in Sensor Networks Ellen Munthe-Kaas Jarle Søberg Hans Vatne Hansen INF5100 Autumn 2011 1 Outline Sensor networks Characteristics TinyOS TinyDB Motes Application domains Data management

More information

Sensors and actuators are ubiquitous. They are used

Sensors and actuators are ubiquitous. They are used Understanding IEEE 1451 Networked Smart Transducer Interface Standard Eugene Y. Song and Kang Lee istockphoto.com What Is a Smart Transducer? Sensors and actuators are ubiquitous. They are used in a variety

More information

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,

More information

Microchip Technology. February 2008 Valerio Moretto Slide 1

Microchip Technology. February 2008 Valerio Moretto Slide 1 Microchip Technology February 2008 Valerio Moretto Slide 1 Connectivity Solutions Wired Wireless February 2008 Valerio Moretto Slide 2 Microchip Solutions More complex software Operating Systems >40 MIPS

More information

LoRa FAQs. www.semtech.com 1 of 4 Semtech. Semtech Corporation LoRa FAQ

LoRa FAQs. www.semtech.com 1 of 4 Semtech. Semtech Corporation LoRa FAQ LoRa FAQs 1.) What is LoRa Modulation? LoRa (Long Range) is a modulation technique that provides significantly longer range than competing technologies. The modulation is based on spread-spectrum techniques

More information

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0 LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does

More information

Chapter 2 Principle of Wireless Sensor Networks

Chapter 2 Principle of Wireless Sensor Networks Chapter 2 Principle of Wireless Sensor Networks Keywords IEEE 802.15.4 ZigBee 6LowPAN Wireless sensor networks 2.1 Introduction Wireless sensor networks are a subset of wireless networking applications,

More information

The Internet of Things: Opportunities & Challenges

The Internet of Things: Opportunities & Challenges The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is

More information

Industrial Network Marketing System (WNC)

Industrial Network Marketing System (WNC) WIRELESS PROCESS MONITORING AND CONTROL: A Brief Overview Authors: Waqas Ikram and Nina F Thornhill Department of Chemical Engineering Imperial College Contents Contents Motivation Why use Wireless? Opportunities

More information

DATA LOGGER AND REMOTE MONITORING SYSTEM FOR MULTIPLE PARAMETER MEASUREMENT APPLICATIONS. G.S. Nhivekar, R.R.Mudholker

DATA LOGGER AND REMOTE MONITORING SYSTEM FOR MULTIPLE PARAMETER MEASUREMENT APPLICATIONS. G.S. Nhivekar, R.R.Mudholker e -Journal of Science & Technology (e-jst) e-περιοδικό Επιστήμης & Τεχνολογίας 55 DATA LOGGER AND REMOTE MONITORING SYSTEM FOR MULTIPLE PARAMETER MEASUREMENT APPLICATIONS G.S. Nhivekar, R.R.Mudholker Department

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information