SlideShare a Scribd company logo
UNIT -V
Sensor Network
Platforms
and Tools
Introduction
• A real-world sensor network application most
likely has to incorporate all these elements,
subject to energy, bandwidth, computation,
storage, and real-time constraints
• There are two types of programming for sensor
networks, those carried out by end users and
those performed by application developers.
End users
• An end user may view a sensor network as a
pool of data and interact with the network via
queries.
• Just as with query languages for database
systems like SQL
• good sensor network programming language
should be expressive enough to encode
application logic at a high level of abstraction
• At the same time be structured enough to
allow efficient execution on the distributed
platform.
Application developer
• an application developer must provide end
users of a sensor network with the capabilities
of data acquisition, processing, and storage.
• Unlike general distributed or database
• systems, collaborative signal and
information processing (CSIP) software
comprises reactive, concurrent, distributed
programs running on ad hoc, resource-
constrained, unreliable computation and
communication platforms.
Sensor Node Hardware
• Sensor node hardware can be grouped into
three categories.
• Augmented general-purpose computers:::::
Examples include lowpower
PCs, embedded PCs (e.g., PC104), custom-
designed PCs.
Sensor Network Programming
Challenges
• Traditional programming technologies rely on
operating systems to provide abstraction for
processing, I/O, networking, and user
interaction hardware
• When applying such a model to programming
networked embedded systems, such as sensor
networks, the application programmers need
to explicitly deal with message passing, event
synchronization, interrupt handing, and
sensor reading.
Traditional embedded system programming interface.
Node-Level Software Platforms
• A node-level platform can be a node centric
operating system, which provides hardware and
networking abstractions of a sensor node to
programmers.
• A typical operating system abstracts the
hardware platform by providing a set of
services for applications, including file
management-
• memory allocation, task scheduling, peripheral
device drivers, and networking.
Operating System: TinyOS
• Let us consider a TinyOS application example—
FieldMonitor
• where all nodes in a sensor field periodically
send their temperature and photo sensor
readings to a base station via an ad hoc routing
Mechanism
The FieldMonitor application for sensing and sending measurements.
The Timer component and its
interfaces.
• In nesC, code can be classified into two types:
• Asynchronous code (AC): Code that is
reachable from at least one interrupt handler.
• Synchronous code (SC): Code that is only
reachable from tasks.
TinyGALS
Node-Level Simulators
• Node-level design methodologies are usually
associated with simulators that simulate the
behavior of a sensor network on a per-node
basis.
• Using simulation, designers can quickly study
the performance in terms of timing, power,
bandwidth, and scalability.
• A node-level simulator typically has the
following components:
• Sensor node model:
• Communication model:
• Physical environment model:

More Related Content

Similar to 4239213.ppt

Embedded system architecture.pptx
Embedded system architecture.pptxEmbedded system architecture.pptx
Embedded system architecture.pptx
AltafKaroshi
 
Introduction to embedded system design
Introduction to embedded system designIntroduction to embedded system design
Introduction to embedded system design
Mukesh Bansal
 
Embedded system
Embedded systemEmbedded system
Embedded system
Pankaj Upadhyay
 
Embedded
EmbeddedEmbedded
Embedded
bala saga
 
INTRODUCTION TO COMPUTER SOFTWARE
INTRODUCTION TO COMPUTER SOFTWAREINTRODUCTION TO COMPUTER SOFTWARE
INTRODUCTION TO COMPUTER SOFTWARE
abiramiabi21
 
RTOS based Confidential Area Security System
RTOS based Confidential Area Security SystemRTOS based Confidential Area Security System
RTOS based Confidential Area Security System
ajinky gadewar
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
LeahRachael
 
avicHomphs-150226100804-conversion-gate01 (1)(1).pdf
avicHomphs-150226100804-conversion-gate01 (1)(1).pdfavicHomphs-150226100804-conversion-gate01 (1)(1).pdf
avicHomphs-150226100804-conversion-gate01 (1)(1).pdf
RajDhrub
 
computer hardware and software
computer hardware and softwarecomputer hardware and software
computer hardware and software
avinash gupta
 
Chapter 5-IT infrastructure(REV 2.0).pptx
Chapter 5-IT infrastructure(REV 2.0).pptxChapter 5-IT infrastructure(REV 2.0).pptx
Chapter 5-IT infrastructure(REV 2.0).pptx
MohdSyaifuadJasemi
 
UNIT -1 VI.pptx
UNIT -1 VI.pptxUNIT -1 VI.pptx
UNIT -1 VI.pptx
thamizhvani3
 
Computing notes
Computing notesComputing notes
Computing notesthenraju24
 
Types of computing
Types of computingTypes of computing
Types of computing
Priyam Pandey
 
Technology Fundamentals
Technology FundamentalsTechnology Fundamentals
Technology Fundamentals
ashishsharma1506
 
Multicore_Architecture Book.pdf
Multicore_Architecture Book.pdfMulticore_Architecture Book.pdf
Multicore_Architecture Book.pdf
SwatantraPrakash5
 
Linux for embedded_systems
Linux for embedded_systemsLinux for embedded_systems
Linux for embedded_systems
Vandana Salve
 
Distributed Computing system
Distributed Computing system Distributed Computing system
Distributed Computing system
Sarvesh Meena
 
Lect 1 Distributed System.pptx
Lect 1 Distributed System.pptxLect 1 Distributed System.pptx
Lect 1 Distributed System.pptx
PardonSamson
 

Similar to 4239213.ppt (20)

Embedded system architecture.pptx
Embedded system architecture.pptxEmbedded system architecture.pptx
Embedded system architecture.pptx
 
Introduction to embedded system design
Introduction to embedded system designIntroduction to embedded system design
Introduction to embedded system design
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
Embedded
EmbeddedEmbedded
Embedded
 
INTRODUCTION TO COMPUTER SOFTWARE
INTRODUCTION TO COMPUTER SOFTWAREINTRODUCTION TO COMPUTER SOFTWARE
INTRODUCTION TO COMPUTER SOFTWARE
 
RTOS based Confidential Area Security System
RTOS based Confidential Area Security SystemRTOS based Confidential Area Security System
RTOS based Confidential Area Security System
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
 
avicHomphs-150226100804-conversion-gate01 (1)(1).pdf
avicHomphs-150226100804-conversion-gate01 (1)(1).pdfavicHomphs-150226100804-conversion-gate01 (1)(1).pdf
avicHomphs-150226100804-conversion-gate01 (1)(1).pdf
 
computer hardware and software
computer hardware and softwarecomputer hardware and software
computer hardware and software
 
Chapter 5-IT infrastructure(REV 2.0).pptx
Chapter 5-IT infrastructure(REV 2.0).pptxChapter 5-IT infrastructure(REV 2.0).pptx
Chapter 5-IT infrastructure(REV 2.0).pptx
 
UNIT -1 VI.pptx
UNIT -1 VI.pptxUNIT -1 VI.pptx
UNIT -1 VI.pptx
 
Computing notes
Computing notesComputing notes
Computing notes
 
Types of computing
Types of computingTypes of computing
Types of computing
 
Technology Fundamentals
Technology FundamentalsTechnology Fundamentals
Technology Fundamentals
 
Technology Fundamentals
Technology FundamentalsTechnology Fundamentals
Technology Fundamentals
 
Multicore_Architecture Book.pdf
Multicore_Architecture Book.pdfMulticore_Architecture Book.pdf
Multicore_Architecture Book.pdf
 
Linux for embedded_systems
Linux for embedded_systemsLinux for embedded_systems
Linux for embedded_systems
 
Distributed Computing system
Distributed Computing system Distributed Computing system
Distributed Computing system
 
Lect 1 Distributed System.pptx
Lect 1 Distributed System.pptxLect 1 Distributed System.pptx
Lect 1 Distributed System.pptx
 
ODP Presentation LinuxCon NA 2014
ODP Presentation LinuxCon NA 2014ODP Presentation LinuxCon NA 2014
ODP Presentation LinuxCon NA 2014
 

Recently uploaded

Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 

Recently uploaded (20)

Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 

4239213.ppt

  • 2. Introduction • A real-world sensor network application most likely has to incorporate all these elements, subject to energy, bandwidth, computation, storage, and real-time constraints • There are two types of programming for sensor networks, those carried out by end users and those performed by application developers.
  • 3. End users • An end user may view a sensor network as a pool of data and interact with the network via queries. • Just as with query languages for database systems like SQL • good sensor network programming language should be expressive enough to encode application logic at a high level of abstraction • At the same time be structured enough to allow efficient execution on the distributed platform.
  • 4. Application developer • an application developer must provide end users of a sensor network with the capabilities of data acquisition, processing, and storage. • Unlike general distributed or database • systems, collaborative signal and information processing (CSIP) software comprises reactive, concurrent, distributed programs running on ad hoc, resource- constrained, unreliable computation and communication platforms.
  • 5. Sensor Node Hardware • Sensor node hardware can be grouped into three categories. • Augmented general-purpose computers::::: Examples include lowpower PCs, embedded PCs (e.g., PC104), custom- designed PCs.
  • 6. Sensor Network Programming Challenges • Traditional programming technologies rely on operating systems to provide abstraction for processing, I/O, networking, and user interaction hardware • When applying such a model to programming networked embedded systems, such as sensor networks, the application programmers need to explicitly deal with message passing, event synchronization, interrupt handing, and sensor reading.
  • 7. Traditional embedded system programming interface.
  • 8. Node-Level Software Platforms • A node-level platform can be a node centric operating system, which provides hardware and networking abstractions of a sensor node to programmers. • A typical operating system abstracts the hardware platform by providing a set of services for applications, including file management- • memory allocation, task scheduling, peripheral device drivers, and networking.
  • 9. Operating System: TinyOS • Let us consider a TinyOS application example— FieldMonitor • where all nodes in a sensor field periodically send their temperature and photo sensor readings to a base station via an ad hoc routing Mechanism
  • 10. The FieldMonitor application for sensing and sending measurements.
  • 11. The Timer component and its interfaces.
  • 12. • In nesC, code can be classified into two types: • Asynchronous code (AC): Code that is reachable from at least one interrupt handler. • Synchronous code (SC): Code that is only reachable from tasks.
  • 14. Node-Level Simulators • Node-level design methodologies are usually associated with simulators that simulate the behavior of a sensor network on a per-node basis. • Using simulation, designers can quickly study the performance in terms of timing, power, bandwidth, and scalability.
  • 15. • A node-level simulator typically has the following components: • Sensor node model: • Communication model: • Physical environment model: