Wireless body sensor networks (WBSN) are a particular type of wireless sensor networks (WSN)
that are becoming an important topic in the technological research community. Advances in the
reduction of the power consumption and cost of these networks have led to solutions mature enough
for their use in a broad range of applications such as sportsman or health monitoring.
The development of those applications has been stimulated by the finalization of the IEEE 802.15.4
standard, which defines the medium access control (MAC) and physical layer (PHY) for low-rate
wireless personal area networks (LR-WPAN). One of the MAC schemes proposed is slotted Carrier
Sense Multiple Access with Collision Avoidance (CSMA/CA). This project analyzes the performance of
this MAC, based on a state-of-the-art analytical model for a star topology, which captures the behavior
of the MAC using two Markov chain models; the per-node state model and the channel state model.
More importantly, we extend this model to include acknowledged traffic. The impact of including
acknowledgments is evaluated in terms of energy consumption, throughput and latency.
The performance predicted by the analytical model has been extensively verified with simulations
using the ns-2 IEEE 802.15.4 contributed module. Throughput, energy consumption and latency
analysis is performed. Additionally, we have simulated a statistical channel model describing the radio
channel behavior around the human body to calculate the packet error rate (PER) found in a typical
WBSN under the aforementioned standard. This PER is then introduced into our analytical model.
This document analyzes the performance of quality of service (QoS) parameters for IEEE 802.15.4 star topology networks using mobile ad hoc network (MANET) routing protocols. It simulates the star topology network with 100 sensor nodes communicating to a central coordinator using the DSR, DYMO, and AODV routing protocols under varying traffic loads. The results show that DSR generally performs better than DYMO and AODV in terms of packet delivery ratio, end-to-end delay, energy consumption, and network lifetime for most traffic loads in the beacon-enabled IEEE 802.15.4 star topology network.
This document summarizes a new fault injection approach for testing network-on-chip (NoC) architectures. The approach uses a dual-processor system on an FPGA to inject faults into a NoC design under test and evaluate the effects. Faults are injected by modifying the FPGA configuration memory to physically implement different fault models. The approach allows testing of routing and logic resources without intrusive test modules. Experimental results demonstrate the effectiveness of classifying faults in a mesh NoC case study implemented on the FPGA.
The document discusses buffer sizing algorithms for 802.11 wireless networks. It proposes two novel dynamic buffer sizing algorithms - eBDP and ALT that achieve high throughput while maintaining low delay across different network conditions. Experimental results on a production WLAN and testbed demonstrate that the algorithms significantly improve performance compared to using fixed buffer sizes. The algorithms adapt the buffer size based on network parameters like load and traffic patterns.
Distributed sensor networks (DSN) consist of multiple sensor nodes that detect conditions and transmit data wirelessly. Each node contains sensors, microprocessors, transceivers, and power sources. DSNs implement a distributed control architecture to improve data collection and provide backup in case nodes fail. They were first developed by DARPA in 1978 and have standards set by groups like IEEE. DSNs are used for military surveillance, environmental monitoring, health applications, and home automation. They are poised to revolutionize various fields due to advantages like scalability, fault tolerance, and ability to operate in harsh environments.
The use of P2P networks for multimedia distribution has spread out globally in recent years.
Therefore, there is a strong need for a content distribution mechanism over P2P networks that do not pose security and privacy threats to the copyright holders or to end users, respectively. The existent systems for copyright and privacy protection employ cryptographic mechanisms at a cost of high computational burden which makes these systems impractical for distributing large files. In this presentation, the authors (Amna Qureshi, David Megías, Helena Rifà-Pous) propose and analyse a P2P content distribution system which allows efficient distribution of large-sized content while preserving the security and privacy of merchants and buyers, respectively. The experimental results confirm that the framework provides an efficient solution to copyright infringement issues over P2P networks, while protecting the end users’ privacy.
This document provides a 100 step guide to electrocardiogram (ECG) interpretation written by Dr. S. Aswini Kumar. It begins with basic definitions of an ECG, the machine used to record it, and how the paper is formatted. It then explains how to analyze various aspects of the ECG including heart rate, rhythm, electrical axis, P wave, PR interval, QRS duration, ST segment, T wave, and conditions like myocardial infarction. The document provides criteria for interpreting abnormalities and identifying conditions. It concludes with examples of analyzing ECG findings and providing an impression.
This document analyzes the performance of quality of service (QoS) parameters for IEEE 802.15.4 star topology networks using mobile ad hoc network (MANET) routing protocols. It simulates the star topology network with 100 sensor nodes communicating to a central coordinator using the DSR, DYMO, and AODV routing protocols under varying traffic loads. The results show that DSR generally performs better than DYMO and AODV in terms of packet delivery ratio, end-to-end delay, energy consumption, and network lifetime for most traffic loads in the beacon-enabled IEEE 802.15.4 star topology network.
This document summarizes a new fault injection approach for testing network-on-chip (NoC) architectures. The approach uses a dual-processor system on an FPGA to inject faults into a NoC design under test and evaluate the effects. Faults are injected by modifying the FPGA configuration memory to physically implement different fault models. The approach allows testing of routing and logic resources without intrusive test modules. Experimental results demonstrate the effectiveness of classifying faults in a mesh NoC case study implemented on the FPGA.
The document discusses buffer sizing algorithms for 802.11 wireless networks. It proposes two novel dynamic buffer sizing algorithms - eBDP and ALT that achieve high throughput while maintaining low delay across different network conditions. Experimental results on a production WLAN and testbed demonstrate that the algorithms significantly improve performance compared to using fixed buffer sizes. The algorithms adapt the buffer size based on network parameters like load and traffic patterns.
Distributed sensor networks (DSN) consist of multiple sensor nodes that detect conditions and transmit data wirelessly. Each node contains sensors, microprocessors, transceivers, and power sources. DSNs implement a distributed control architecture to improve data collection and provide backup in case nodes fail. They were first developed by DARPA in 1978 and have standards set by groups like IEEE. DSNs are used for military surveillance, environmental monitoring, health applications, and home automation. They are poised to revolutionize various fields due to advantages like scalability, fault tolerance, and ability to operate in harsh environments.
The use of P2P networks for multimedia distribution has spread out globally in recent years.
Therefore, there is a strong need for a content distribution mechanism over P2P networks that do not pose security and privacy threats to the copyright holders or to end users, respectively. The existent systems for copyright and privacy protection employ cryptographic mechanisms at a cost of high computational burden which makes these systems impractical for distributing large files. In this presentation, the authors (Amna Qureshi, David Megías, Helena Rifà-Pous) propose and analyse a P2P content distribution system which allows efficient distribution of large-sized content while preserving the security and privacy of merchants and buyers, respectively. The experimental results confirm that the framework provides an efficient solution to copyright infringement issues over P2P networks, while protecting the end users’ privacy.
This document provides a 100 step guide to electrocardiogram (ECG) interpretation written by Dr. S. Aswini Kumar. It begins with basic definitions of an ECG, the machine used to record it, and how the paper is formatted. It then explains how to analyze various aspects of the ECG including heart rate, rhythm, electrical axis, P wave, PR interval, QRS duration, ST segment, T wave, and conditions like myocardial infarction. The document provides criteria for interpreting abnormalities and identifying conditions. It concludes with examples of analyzing ECG findings and providing an impression.
This document summarizes and reviews various MAC protocols proposed for wireless body area networks (WBANs). It begins by outlining the key requirements for WBAN MAC protocols, including low power consumption, support for heterogeneous traffic, and quality of service guarantees. It then provides an overview of several existing and proposed MAC protocols for WBANs, including IEEE 802.15.4, H-MAC, DTDMA, PB-TDMA, and BodyMAC. It compares their strengths and weaknesses. Finally, it reviews various power-efficient mechanisms like low-power listening, scheduled contention, and TDMA that could be used in WBAN MAC protocols.
Vikram Phatak is seeking a position as a design engineer. He has a Bachelor's degree in Electrical Engineering from Visvesvaraya Technological University and is currently pursuing a Master's degree in Electrical Engineering from San Diego State University. He has experience in designing unmanned vehicles, wireless communication systems, and ASIC design using VHDL. His projects include simulations of wireless communication protocols and mixed-signal IC design. He is proficient in languages like C, VHDL, and Verilog and tools such as SPICE, Matlab, and Xilinx ISE.
A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...ijwmn
- The document proposes a modified IEEE 802.15.6 MAC scheme to enhance the performance of wireless body area networks for e-health applications.
- The standard IEEE 802.15.6 MAC scheme is unable to fulfill all the requirements of medical applications in WBANs due to some limitations.
- The proposed MAC scheme modifies the superframe structure, user priorities, and access mechanism of the standard IEEE 802.15.6 to improve reliability, throughput, delay, energy consumption, and fairness.
A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...ijwmn
The recently released IEEE 802.15.6 standard specifies several physical (PHY) layers and medium access
control (MAC) layer protocols for variety of medical and non-medical applications of Wireless Body Area
Networks (WBAN). Themedical applications of WBAN hasseveral obligatory requirements and constrains
viz. high reliability, strict delaydeadlines and low power consumption.The standard IEEE 802.15.6 MAC
scheme is not able to fulfil the all requirements of medical applications of WBAN. To address this issue we
propose anIEEE 802.15.6-based MAC schemethat is the modification of superframe structure, user
priorities and access mechanism of standard IEEE 802.15.6 MAC scheme. The proposed superframe has
three access phases: random access phases (RAP), manage access phases (MAP) and contention access
phase (CAP). The proposed four user priorities nodes access the channel during RAP using CAMA/CA
mechanism with a large value of contention window. The proposed MAC scheme uses RTS/CTS access
mechanism instead of basic access mechanism to mitigate the effect of hidden and expose terminal
problem. Moreover, we develop an analytical model to evaluate the performance of proposed MAC scheme
and solve the analytical model using Maple. The results show that the modified IEEE802.15.6 MAC
scheme achieve the better performance in terms of reliability, throughput, average access delay, energy
consumption, channel utilization and fairness compared to standard IEEE 802.15.6 MAC scheme in Ehealth applications.
Model-Driven Physical-Design for Future Nanoscale ArchitecturesCiprian Teodorov
This document discusses model-driven physical design approaches for future nanoscale architectures. It proposes a generic physical design framework based on a common structural domain model. This model-based approach aims to maximize tool reuse across different nanoscale technologies. It also separates algorithmic and architectural concerns by modeling tools as model transformations. An example nanoscale architecture template called R2D NASIC is developed using this framework and evaluated. Results show improvements in density, performance and max throughput pipelines compared to a baseline. Overall, the model-driven approach seeks to provide a common vocabulary and design flow for tackling challenges in physical design for emerging nanotechnologies.
This document summarizes an evaluation of ad-hoc routing protocols for wireless sensor networks. It analyzes the performance of three protocols - DSDV, AODV, and DSR - through simulation. The results show that AODV has the best performance with less degradation and packet loss compared to DSDV and DSR as node mobility increases. AODV is therefore identified as the most suitable routing protocol for use in mobile wireless sensor networks based on its ability to handle topology changes from node movement.
presentation for NEC course to defend for NEP 2020DrVikasMahor
This document summarizes an audit presentation on an LT-Spice tutorial for circuit simulation course given by Dr. Vikas Mahor. The objectives of the course are to teach students how to use CAD tools to analyze microelectronic circuits. The content includes installing LT-Spice software, its device models, creating and simulating circuits, and performing various circuit analyses. Upon completing the course, students will be able to analyze electrical DC circuits, build and simulate DC circuits, and write technical reports. The need for electronic circuit simulators is discussed. A list of simulation activities conducted is provided, including rectifier, clipper, clamper, logic gate, and filter circuits. Course assignments are managed via Moodle and assignment reports
Deep learning-based switchable network for in-loop filtering in high efficie...IJECEIAES
The video codecs are focusing on a smart transition in this era. A future area of research that has not yet been fully investigated is the effect of deep learning on video compression. The paper’s goal is to reduce the ringing and artifacts that loop filtering causes when high-efficiency video compression is used. Even though there is a lot of research being done to lessen this effect, there are still many improvements that can be made. In This paper we have focused on an intelligent solution for improvising in-loop filtering in high efficiency video coding (HEVC) using a deep convolutional neural network (CNN). The paper proposes the design and implementation of deep CNN-based loop filtering using a series of 15 CNN networks followed by a combine and squeeze network that improves feature extraction. The resultant output is free from double enhancement and the peak signal-to-noise ratio is improved by 0.5 dB compared to existing techniques. The experiments then demonstrate that improving the coding efficiency by pipelining this network to the current network and using it for higher quantization parameters (QP) is more effective than using it separately. Coding efficiency is improved by an average of 8.3% with the switching based deep CNN in-loop filtering.
Overview of DuraMat software tool development(poster version)Anubhav Jain
This document provides an overview of software tools being developed by the DuraMat project to analyze photovoltaic systems. It summarizes six software tools that serve two main purposes: core functions for PV analysis and modeling operation/degradation, and tools for project planning and reducing levelized cost of energy (LCOE). The core function tools include PVAnalytics for data processing and a PV-Pro preprocessor. Tools for operation/degradation include PV-Pro, PVOps, PVArc, and pv-vision. Tools for project planning and LCOE include a simplified LCOE calculator and VocMax string length calculator. All tools are open source and designed for large PV data sets.
Performance Analysis of Routing Protocols of Wireless Sensor NetworksDarpan Dekivadiya
The document summarizes different types of routing protocols that can be used in wireless sensor networks. It categorizes the protocols based on their mode of functioning, participation style of nodes, and network structure. Some key routing protocols discussed include LEACH, which is a proactive clustering protocol, SPIN that uses direct communication, and TEEN which is a reactive clustering protocol. The document also discusses challenges in routing for wireless sensor networks given the constraints of sensor nodes.
Rc maca receiver-centric mac protocol for event-driven wireless sensor networksLogicMindtech Nologies
NS2 Projects for M. Tech, NS2 Projects in Vijayanagar, NS2 Projects in Bangalore, M. Tech Projects in Vijayanagar, M. Tech Projects in Bangalore, NS2 IEEE projects in Bangalore, IEEE 2015 NS2 Projects, WSN and MANET Projects, WSN and MANET Projects in Bangalore, WSN and MANET Projects in Vijayangar
Ec6601 vlsi design syllabus for 6 th sem ece regulation 2013 anna universit...Raja Posupo
This document contains the syllabus for the EC6601 VLSI Design course for 6th semester ECE students following the 2013 Anna University regulations. The syllabus covers 5 units - MOS transistor principles, combinational logic circuits, sequential logic circuits, designing arithmetic building blocks, and implementation strategies. The objectives are to study CMOS circuit realization of building blocks in microprocessors and digital VLSI circuits, discuss architectural choices and performance tradeoffs, and focus on transistor circuit level design and issues in digital operation.
This document provides an overview of wireless sensor networks (WSNs). It discusses the background and components of sensor nodes, including sensors, processors, radio transceivers, and power sources. The document also covers sensor network architectures like clustered and layered networks. It describes data dissemination in WSNs using data diffusion models and explores concepts like interests, gradients, and reinforcement. Finally, it introduces the problem of gathering sensor data efficiently to prolong network lifetime and discusses optimizing the energy-delay metric.
sensors are what we experience the most in our life. they are even working in our body in different aspects. they may be as eyes, ears, skin, tongue etc. when we combine them they make a network. it may be a human sensor network. but i have shared something interesting about wireless sensor networks.
This document discusses an energy-aware cross-layer scheduler developed for reliable transmission of MPEG4 video over 802.11e wireless local area networks. The scheduler aims to ensure reliable delivery of multiple real-time video streams from cameras to an access point, while minimizing overall energy consumption of the camera devices. It is a controller located at the access point that makes run-time decisions on allocating channel resources and configurable parameters in the devices based on instantaneous link quality and data rate demands, utilizing performance-energy models developed at design-time.
On quality of monitoring for multi channel wireless infrastructure networksJPINFOTECH JAYAPRAKASH
This document discusses maximizing the quality of monitoring (QoM) for multi-channel wireless infrastructure networks. It introduces the QoM metric defined as the expected number of active users monitored. It considers two models - user-centric which can distinguish users' activities, and sniffer-centric which only knows channel activity. For user-centric, devising algorithms attains a constant approximation ratio to the NP-hard optimization problem of maximizing QoM by assigning sniffers to channels. For sniffer-centric, stochastic inference schemes transform it into the user-centric domain to apply those algorithms. The proposed methods are evaluated using both synthetic and real-world traces showing effectiveness.
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )ijassn
Authors are invited to submit papers for this journal through e-mail ijassn@aircconline.com.Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
This document summarizes and reviews various MAC protocols proposed for wireless body area networks (WBANs). It begins by outlining the key requirements for WBAN MAC protocols, including low power consumption, support for heterogeneous traffic, and quality of service guarantees. It then provides an overview of several existing and proposed MAC protocols for WBANs, including IEEE 802.15.4, H-MAC, DTDMA, PB-TDMA, and BodyMAC. It compares their strengths and weaknesses. Finally, it reviews various power-efficient mechanisms like low-power listening, scheduled contention, and TDMA that could be used in WBAN MAC protocols.
Vikram Phatak is seeking a position as a design engineer. He has a Bachelor's degree in Electrical Engineering from Visvesvaraya Technological University and is currently pursuing a Master's degree in Electrical Engineering from San Diego State University. He has experience in designing unmanned vehicles, wireless communication systems, and ASIC design using VHDL. His projects include simulations of wireless communication protocols and mixed-signal IC design. He is proficient in languages like C, VHDL, and Verilog and tools such as SPICE, Matlab, and Xilinx ISE.
A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...ijwmn
- The document proposes a modified IEEE 802.15.6 MAC scheme to enhance the performance of wireless body area networks for e-health applications.
- The standard IEEE 802.15.6 MAC scheme is unable to fulfill all the requirements of medical applications in WBANs due to some limitations.
- The proposed MAC scheme modifies the superframe structure, user priorities, and access mechanism of the standard IEEE 802.15.6 to improve reliability, throughput, delay, energy consumption, and fairness.
A MODIFIED IEEE 802.15.6 MAC SCHEME TO ENHANCE PERFORMANCE OF WIRELESS BODY A...ijwmn
The recently released IEEE 802.15.6 standard specifies several physical (PHY) layers and medium access
control (MAC) layer protocols for variety of medical and non-medical applications of Wireless Body Area
Networks (WBAN). Themedical applications of WBAN hasseveral obligatory requirements and constrains
viz. high reliability, strict delaydeadlines and low power consumption.The standard IEEE 802.15.6 MAC
scheme is not able to fulfil the all requirements of medical applications of WBAN. To address this issue we
propose anIEEE 802.15.6-based MAC schemethat is the modification of superframe structure, user
priorities and access mechanism of standard IEEE 802.15.6 MAC scheme. The proposed superframe has
three access phases: random access phases (RAP), manage access phases (MAP) and contention access
phase (CAP). The proposed four user priorities nodes access the channel during RAP using CAMA/CA
mechanism with a large value of contention window. The proposed MAC scheme uses RTS/CTS access
mechanism instead of basic access mechanism to mitigate the effect of hidden and expose terminal
problem. Moreover, we develop an analytical model to evaluate the performance of proposed MAC scheme
and solve the analytical model using Maple. The results show that the modified IEEE802.15.6 MAC
scheme achieve the better performance in terms of reliability, throughput, average access delay, energy
consumption, channel utilization and fairness compared to standard IEEE 802.15.6 MAC scheme in Ehealth applications.
Model-Driven Physical-Design for Future Nanoscale ArchitecturesCiprian Teodorov
This document discusses model-driven physical design approaches for future nanoscale architectures. It proposes a generic physical design framework based on a common structural domain model. This model-based approach aims to maximize tool reuse across different nanoscale technologies. It also separates algorithmic and architectural concerns by modeling tools as model transformations. An example nanoscale architecture template called R2D NASIC is developed using this framework and evaluated. Results show improvements in density, performance and max throughput pipelines compared to a baseline. Overall, the model-driven approach seeks to provide a common vocabulary and design flow for tackling challenges in physical design for emerging nanotechnologies.
This document summarizes an evaluation of ad-hoc routing protocols for wireless sensor networks. It analyzes the performance of three protocols - DSDV, AODV, and DSR - through simulation. The results show that AODV has the best performance with less degradation and packet loss compared to DSDV and DSR as node mobility increases. AODV is therefore identified as the most suitable routing protocol for use in mobile wireless sensor networks based on its ability to handle topology changes from node movement.
presentation for NEC course to defend for NEP 2020DrVikasMahor
This document summarizes an audit presentation on an LT-Spice tutorial for circuit simulation course given by Dr. Vikas Mahor. The objectives of the course are to teach students how to use CAD tools to analyze microelectronic circuits. The content includes installing LT-Spice software, its device models, creating and simulating circuits, and performing various circuit analyses. Upon completing the course, students will be able to analyze electrical DC circuits, build and simulate DC circuits, and write technical reports. The need for electronic circuit simulators is discussed. A list of simulation activities conducted is provided, including rectifier, clipper, clamper, logic gate, and filter circuits. Course assignments are managed via Moodle and assignment reports
Deep learning-based switchable network for in-loop filtering in high efficie...IJECEIAES
The video codecs are focusing on a smart transition in this era. A future area of research that has not yet been fully investigated is the effect of deep learning on video compression. The paper’s goal is to reduce the ringing and artifacts that loop filtering causes when high-efficiency video compression is used. Even though there is a lot of research being done to lessen this effect, there are still many improvements that can be made. In This paper we have focused on an intelligent solution for improvising in-loop filtering in high efficiency video coding (HEVC) using a deep convolutional neural network (CNN). The paper proposes the design and implementation of deep CNN-based loop filtering using a series of 15 CNN networks followed by a combine and squeeze network that improves feature extraction. The resultant output is free from double enhancement and the peak signal-to-noise ratio is improved by 0.5 dB compared to existing techniques. The experiments then demonstrate that improving the coding efficiency by pipelining this network to the current network and using it for higher quantization parameters (QP) is more effective than using it separately. Coding efficiency is improved by an average of 8.3% with the switching based deep CNN in-loop filtering.
Overview of DuraMat software tool development(poster version)Anubhav Jain
This document provides an overview of software tools being developed by the DuraMat project to analyze photovoltaic systems. It summarizes six software tools that serve two main purposes: core functions for PV analysis and modeling operation/degradation, and tools for project planning and reducing levelized cost of energy (LCOE). The core function tools include PVAnalytics for data processing and a PV-Pro preprocessor. Tools for operation/degradation include PV-Pro, PVOps, PVArc, and pv-vision. Tools for project planning and LCOE include a simplified LCOE calculator and VocMax string length calculator. All tools are open source and designed for large PV data sets.
Performance Analysis of Routing Protocols of Wireless Sensor NetworksDarpan Dekivadiya
The document summarizes different types of routing protocols that can be used in wireless sensor networks. It categorizes the protocols based on their mode of functioning, participation style of nodes, and network structure. Some key routing protocols discussed include LEACH, which is a proactive clustering protocol, SPIN that uses direct communication, and TEEN which is a reactive clustering protocol. The document also discusses challenges in routing for wireless sensor networks given the constraints of sensor nodes.
Rc maca receiver-centric mac protocol for event-driven wireless sensor networksLogicMindtech Nologies
NS2 Projects for M. Tech, NS2 Projects in Vijayanagar, NS2 Projects in Bangalore, M. Tech Projects in Vijayanagar, M. Tech Projects in Bangalore, NS2 IEEE projects in Bangalore, IEEE 2015 NS2 Projects, WSN and MANET Projects, WSN and MANET Projects in Bangalore, WSN and MANET Projects in Vijayangar
Ec6601 vlsi design syllabus for 6 th sem ece regulation 2013 anna universit...Raja Posupo
This document contains the syllabus for the EC6601 VLSI Design course for 6th semester ECE students following the 2013 Anna University regulations. The syllabus covers 5 units - MOS transistor principles, combinational logic circuits, sequential logic circuits, designing arithmetic building blocks, and implementation strategies. The objectives are to study CMOS circuit realization of building blocks in microprocessors and digital VLSI circuits, discuss architectural choices and performance tradeoffs, and focus on transistor circuit level design and issues in digital operation.
This document provides an overview of wireless sensor networks (WSNs). It discusses the background and components of sensor nodes, including sensors, processors, radio transceivers, and power sources. The document also covers sensor network architectures like clustered and layered networks. It describes data dissemination in WSNs using data diffusion models and explores concepts like interests, gradients, and reinforcement. Finally, it introduces the problem of gathering sensor data efficiently to prolong network lifetime and discusses optimizing the energy-delay metric.
sensors are what we experience the most in our life. they are even working in our body in different aspects. they may be as eyes, ears, skin, tongue etc. when we combine them they make a network. it may be a human sensor network. but i have shared something interesting about wireless sensor networks.
This document discusses an energy-aware cross-layer scheduler developed for reliable transmission of MPEG4 video over 802.11e wireless local area networks. The scheduler aims to ensure reliable delivery of multiple real-time video streams from cameras to an access point, while minimizing overall energy consumption of the camera devices. It is a controller located at the access point that makes run-time decisions on allocating channel resources and configurable parameters in the devices based on instantaneous link quality and data rate demands, utilizing performance-energy models developed at design-time.
On quality of monitoring for multi channel wireless infrastructure networksJPINFOTECH JAYAPRAKASH
This document discusses maximizing the quality of monitoring (QoM) for multi-channel wireless infrastructure networks. It introduces the QoM metric defined as the expected number of active users monitored. It considers two models - user-centric which can distinguish users' activities, and sniffer-centric which only knows channel activity. For user-centric, devising algorithms attains a constant approximation ratio to the NP-hard optimization problem of maximizing QoM by assigning sniffers to channels. For sniffer-centric, stochastic inference schemes transform it into the user-centric domain to apply those algorithms. The proposed methods are evaluated using both synthetic and real-world traces showing effectiveness.
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )ijassn
Authors are invited to submit papers for this journal through e-mail ijassn@aircconline.com.Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
PFC_Analysis of IEEE 802.15.4 in WBSN
1. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Performance Analysis of the Contention Access
Period in the slotted IEEE 802.15.4 for Wireless
Body Sensor Networks
Manuel Aymerich
Tutor: Nadia Khaled
Dept. Teor´ de Se˜al y Comunicaciones
ıa n
Universidad Carlos III de Madrid
Legan´s, May 21, 2009
e
1 / 37
2. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Outline
1 Motivation and Objectives
Motivation and Objectives
2 State-of-the-Art
MAC design in WBSN
Overview of the sloted IEEE 802.15.4 CAP
3 Analytical Model
Development
Analytical Formulation
4 High Pathloss WBSN
Analysis
Changes in the Analytical Model
5 Results
Initial Considerations
Comparison ACK and non-ACK traffic
Performance Results for a high path loss WBSN
6 Conclusions
2 / 37
3. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Outline
1 Motivation and Objectives
Motivation and Objectives
2 State-of-the-Art
MAC design in WBSN
Overview of the sloted IEEE 802.15.4 CAP
3 Analytical Model
Development
Analytical Formulation
4 High Pathloss WBSN
Analysis
Changes in the Analytical Model
5 Results
Initial Considerations
Comparison ACK and non-ACK traffic
Performance Results for a high path loss WBSN
6 Conclusions
3 / 37
4. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Motivation and Objectives
Motivation
WBSN ⇒ tremendous international
interest in recent years.
Advances in low power, low
cost, wireless MEMC systems.
Significant progress in wearable
ECG &
and implantable biosensors. Tilt Sensor
SpO2 & IEEE 802.15.4
Motion Sensor
WBSN Applications:
Personal Server
In-vivo monitoring: everyday
healthcare, sports.
Video Games.
Motion
System requirements: Sensors
Network Coordinator
Single hop star topology. Temperature &
Humidity Sensor
Low-power.
Low-cost.
Self-configuring.
4 / 37
5. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Motivation and Objectives
Objectives
According to Dr. Leonard Fass, Director of GE Healthcare:
”One of the greatest barriers to the adoption of emerging BSN
technologies is the whether or not they can be integrated with
existing systems, under common standards.”
The novel IEEE 802.15.4 standard is poised to become the global
standard for low data rate, low energy consumption WSN.
5 / 37
6. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Motivation and Objectives
Objectives
Analyze the CAP of the slotted IEEE 802.15.4 standard
working under a WBSN application scheme.
1 Star topology.
2 Acknowledged uplink traffic (nodes-to-coordinator).
3 High pathloss human body channel.
How?
Extend an a state-of-the-art analytical model of the IEEE
802.15.4 CAP for acknowledged traffic and under a WBSN
channel.
Evaluate it in terms of energy consumption and throughput.
Compare with ns-2 simulation results.
5 / 37
7. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Outline
1 Motivation and Objectives
Motivation and Objectives
2 State-of-the-Art
MAC design in WBSN
Overview of the sloted IEEE 802.15.4 CAP
3 Analytical Model
Development
Analytical Formulation
4 High Pathloss WBSN
Analysis
Changes in the Analytical Model
5 Results
Initial Considerations
Comparison ACK and non-ACK traffic
Performance Results for a high path loss WBSN
6 Conclusions
6 / 37
8. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
MAC design in WBSN
Energy Efficiency in WBSN MAC Protocols
The MAC layer directly controls energy operation.
Major causes of energy waste in WBSN:
1 Collisions
2 Idle listening
3 Overhearing
4 Packet overhead
WBSN MAC design focuses on minimizing energy
consumption.
Contention based protocols: turning radio into sleep state
when it is not needed.
Scheduled based protocols: low duty cycling.
7 / 37
9. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Overview of the sloted IEEE 802.15.4 CAP
MAC Layer
Operational Modes:
IEEE 802.15.4 MAC
Beacon Enabled Non-Beacon Enabled
Superframe Unslotted CSMA/CA
Contention Access Period Contention Free Period
Slotted CSMA/CA GTS Allocation
Non-beacon-enabled mode:
Distributed system without coordinator.
Ad-hoc.
Beacon-enabled mode:
Coordinated
Synchronization through beacon.
Superframe time structure to organize communication.
8 / 37
10. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Overview of the sloted IEEE 802.15.4 CAP
Beacon-Enabled Mode
Beacon frames are periodically sent by the coordinator every BI.
Delimits the superframe structure and enables communication.
Superframe structure:
9 / 37
11. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Overview of the sloted IEEE 802.15.4 CAP
CAP CSMA/CA Mechanism
Slotted CSMA
Delay for
random(2BE - 1) unit
NB = 0, CW = 2 backoff periods
Step 1. Init
Battery life
Y
BE = lesser of
Perform CCA on
backoff period
Step 2. Backoff
extension? (2, macMinBE)
N
boundary
Procedure
BE = macMinBE
Channel idle?
Y
Step 3. CCA
N
Locate backoff CW = 2, NB = NB+1, CW = CW - 1
Step 4. ACK
period boundary BE = min(BE+1, aMaxBE)
Example...
N NB> N
macMaxCSMABackoffs CW = 0?
?
Y Y
Failure Success
10 / 37
12. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Outline
1 Motivation and Objectives
Motivation and Objectives
2 State-of-the-Art
MAC design in WBSN
Overview of the sloted IEEE 802.15.4 CAP
3 Analytical Model
Development
Analytical Formulation
4 High Pathloss WBSN
Analysis
Changes in the Analytical Model
5 Results
Initial Considerations
Comparison ACK and non-ACK traffic
Performance Results for a high path loss WBSN
6 Conclusions
11 / 37
13. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Development
About the Analytical Model
Based on Ramachandran et al. model from University of
Washington.
Inspired on Bianchi’s analysis of IEEE 802.11.
Models sensors and channel using Markov chains.
Unacknowledged traffic.
No channel Model.
Choice:
Accuracy of the model with respect to ns-2 simulations.
Amenability for extension.
12 / 37
14. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Development
Model Assumptions
One-hop star topology
Fixed number of sensing devices (M)
Only CAP with no inactive period
No data packet retransmissions
Data packets of fixed N-backoff slots duration.
Packets arrive at the nodes according to a Poisson arrival rate
λ.
No buffering at the nodes.
13 / 37
15. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Analytical Formulation
Markov Chain Model for a Sensing Node
Max number of backoffs/trials to re-access
channel when sensed busy for one packet
Backoff before channel
sensing 1-p1n 1-p2n 1-p3n 1-p4n 1-p5n
BO1 BO2 BO3 BO4 BO5
)
3 n
)
)
2 n
4 n
n)
)
5 n
-p
-p
-p
p1
1-
-p
)(1
)(1
)(1
p(
)(1
c
)
)
)
c
c
2 n
4 n
n
5 n)
-p
c
i
-p
-p
p1n i
i
n p3n p4n
3
p2
-p
-p
1-p p5n
-p
-p
(1
i
-p
(1
(1
)1
)1
(1
1
)1
i|i c (
i|i c (
i|i c)(
i|i c (
p
p
p
p
(1-
(1-
(1-
(1-
IDLE CS11 CS21 CS31 CS41 CS51
pp1n (1-pic)
(1-pic)p2n (1-pic)p3n (1-pic)p4n (1-pic)p5n
n
1
2 n
n
3 n
c )p
4
pic
p
pic pic c )p 5
p
pic pic
)
i|i c
)
i|i c
i|i
-p -p i|
i
-p
-p
(1 (1
(1
(1
ACK CS12 CS22 CS32 CS42 CS52
(1-pi|ic)
pi|ic pi|ic pi|ic pi|ic pi|ic
1
TX
Channel Access failure
Channel must be
sensed idle during
CW=2 consecutive This Markov Chain is solved an equation relating pci and the probability that a
backoff slots node accesses the channel pnt.
14 / 37
16. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Analytical Formulation
Markov Chain Model For the Channel
One and only one node
begins transmission
SUCCESS
β
α 1 Consistent non linear
1 equation system for
NO node begins IDLE,IDLE BUSY,IDLE
transmission pi/i , pic and pt .
c n
which can be solved
δ= 1
1- following numerical
α-
β
FAILURE approximation
techniques.
More than one node
begins transmission at
the same time
This Markov Chain is solved the second necessary equation relating pci and the probability
that a node accesses the channel pnt to characterize completely the whole system.
15 / 37
17. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Analytical Formulation
Time Spent in the ACK and (BUSY,IDLE) States
… data ACK idle …
tack_min Lack
(a) Slot timing for the derivation of tsuccess
… collision idle …
tack_max
(a) Slot timing for the derivation of tfailure
0.6 ≤ tack ≤ 1.6 (1)
The presence of acknowledgements makes the time spent in the (ACK) node
state and (BUSY,IDLE) channel state non deterministic:
1 On the previous model, it was just one slot.
2 Determining these timings is an important aspect of our contributed
model.
3 Probabilistic approach to determine the mean time spent on this states. 16 / 37
18. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Analytical Formulation
Performance Metrics
Aggregated throughput:
Relative time spent in the successful channel state.
c
Nπs Nβ
S = = (2)
c
πii + c c
TB,I πbi c c
+ Nπs + Nπf c
1 + TB,I (1 − α) + N(β + δ)
Average power consumption per node:
Relative time spent on transmitting, receiving and idle node states.
n n n n n n n n n
Yav = (pidle − pbeacon + pbo − pir )Yidle + (pcs + pir + pbeacon + pack )Yrx + ptx Ytx (3)
Per node bytes-per-Joule capacity:
(S/M)(250 × 103 /8)
η= (4)
Yav
17 / 37
19. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Outline
1 Motivation and Objectives
Motivation and Objectives
2 State-of-the-Art
MAC design in WBSN
Overview of the sloted IEEE 802.15.4 CAP
3 Analytical Model
Development
Analytical Formulation
4 High Pathloss WBSN
Analysis
Changes in the Analytical Model
5 Results
Initial Considerations
Comparison ACK and non-ACK traffic
Performance Results for a high path loss WBSN
6 Conclusions
18 / 37
20. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Analysis
Path Loss Model for the Human Body
The human body is a very lossy medium.
Transmissions near the human body are not always possible.
Recently E. Reusens et al. and A. Fort et al. proposed the use
of a lognormal model distribution+shadowing deviation to
determine the node’s communication range:
PL = PdB + Ps = P0,dB + 10nlog (d/d0 ) + tσ
The PL exponent n is varied empirically to match the
measured data.
Ps = tσ is the shadowing component.
√
t = 2erfc −1 [2(1 − p)]
19 / 37
21. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Analysis
Parameter Values for the Shadowing Model
parameter value LOS value NLOS
d0 10 cm 10 cm
P0,dB 35.7 dB 48.8 dB
σ 6.2 dB 5.0 dB
n 3.38 5.9
20 / 37
22. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Changes in the Analytical Model
New Channel Markov Chain
SUCCESS
)
Pe
1-
β(
α 1
1
IDLE,IDLE BUSY,IDLE
βP 1
e+
δ
FAILURE
Inclusion of the packet loss rate Pe .
21 / 37
23. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Outline
1 Motivation and Objectives
Motivation and Objectives
2 State-of-the-Art
MAC design in WBSN
Overview of the sloted IEEE 802.15.4 CAP
3 Analytical Model
Development
Analytical Formulation
4 High Pathloss WBSN
Analysis
Changes in the Analytical Model
5 Results
Initial Considerations
Comparison ACK and non-ACK traffic
Performance Results for a high path loss WBSN
6 Conclusions
22 / 37
24. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Initial Considerations
Flow diagram to Obtain Results
Analytical Init Simul Init
Config Script
Seed Value
.tcl
Matlab Topology Analyzer script
.scn ns-2 .awk
Nam File Trace File gawk Output Data
NAM .nam .tr .txt
Analyzer
Solution Topology Animator Performance Graphs Matlab
23 / 37
25. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Initial Considerations
Parameters Used
aMinBE = 3 aMaxBE = 5
CSMA/CA parameters macMaxCSMABackoffs = 5 CW = 2
BCO = 6 SFO = 6
Analytical parameters n
pbeacon = 1/3072
Data Packet size N = Ldata = 10backoffslots nbeacon = 2backoffslots
Number of sensing Nodes M = 12
24 / 37
26. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Initial Considerations
CC2420 Energy State Values
Max [dBm] Min [dBm]
Sensitivity S(R) -94 -90
25 / 37
27. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Comparison ACK and non-ACK traffic
Throughput
0
10 14
Analytical ACK
Simulation ACK 12
Analytical NO ACK
Simulation NO ACK
10
% change in throughput
Channel throughput, S
8
−1
10
6
4
2
−2
10 0
−3 −2 −1 0 −3 −2 −1 0
10 10 10 10 10 10 10 10
Per packet arrival rate λ [packet per packet duration] Per packet arrival rate λ [packet per packet duration]
Excellent accuracy of our analytical model capturing throughput
performance.
26 / 37
28. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Comparison ACK and non-ACK traffic
ns-2 Overhearing Bug
2
10
Analytical NO ACK
Simulation NO ACK
Per−node power consumption, Yav [mW]
1
10
0
10
−1
10
−3 −2 −1 0
10 10 10 10
Per packet arrival rate λ [packet per packet duration]
Figure: Per node power consumption
27 / 37
29. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Comparison ACK and non-ACK traffic
ns-2 Overhearing Bug
2 2 2
10 10 10
Analytical NO ACK Analytical NO ACK
Analytical NO ACK
Per−node Idle power consumption, Yidle [mW]
Simulation NO ACK
,Per−node Rx power consumption,Yrx [mW]
Simulation NO ACK
Per−node Tx power consumption,Ytx [mW]
Simulation NO ACK
1 1
10 10
1
10
0 0
10 10
0
10
−1 −1
10 10
−2 −2 −1
10 10 10
−3 −2 −1 0 −3 −2 −1 0 −3 −2 −1 0
10 10 10 10 10 10 10 10 10 10 10 10
Per packet arrival rate λ [packet per packet duration] Per packet arrival rate λ [packet per packet duration] Per packet arrival rate λ [packet per packet duration]
Simulation Rx energy increases.
Simulation Idle energy decreases.
27 / 37
30. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Comparison ACK and non-ACK traffic
Average per node power consumption
1
10 7
Analytical ACK
Analytical NO ACK 6
% change in per node power consumption
Per−node power consumption, Yav [mW]
5
4
3
2
1
0
10
0
−3 −2 −1 0 −3 −2 −1 0
10 10 10 10 10 10 10 10
Per packet arrival rate λ [packet per packet duration] Per packet arrival rate λ [packet per packet duration]
The inclusion of the ACK increases energy consumption.
28 / 37
31. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Comparison ACK and non-ACK traffic
Bytes per Joule capacity
Bytes per Joule capacity comparison
16
Analytical ACK
Analytical NO ACK 14
% change in bytes−per−Joule capacity
Bytes per Joule capacity, η [KB/J]
12
10
8
6
4
2
10
2
0
−3 −2 −1 0 −3 −2 −1 0
10 10 10 10 10 10 10 10
Per packet arrival rate λ [packet per packet duration] Per packet arrival rate λ [packet per packet duration]
The optimal energy-throughput trade off, archived for a datarate of
λ = 0.04 = 10kbps
29 / 37
32. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Performance Results for a high path loss WBSN
Throughput in the LOS channel
Throughput comparison WBSN channel with LOS
0
10
Channel throughput, S
−1
10
Analytical ACK Pe=0%
Analytical ACK Pe=5%
Simulation ACK Pt=1mW
Simulation ACK Pt=0.1mW
−2
10
−3 −2 −1 0
10 10 10 10
Per packet arrival rate λ [packet per packet duration]
Figure: Throughput comparison WBSN channel with LOS
30 / 37
33. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Performance Results for a high path loss WBSN
Average per node power consumption LOS channel
LOS channel
1
10
Analytical ACK Pt=1mW
Analytical ACK Pt=0.1mW
Per−node power consumption, Yav [mW]
0
10
−3 −2 −1 0
10 10 10 10
Per packet arrival rate λ [packet per packet duration]
Figure: Per-node power consumption in LOS channel
31 / 37
34. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Performance Results for a high path loss WBSN
Throughput in NLOS channel
Throughput comparison BSN channel with NLOS
0
10
Channel throughput, S
−1
10
Simulation ACK Pt=1mW
Simulation ACK Pt=0.32mW
Analytical ACK Pe=0%
Analytical ACK Pe=5%
−2
10
−3 −2 −1 0
10 10 10 10
Per packet arrival rate λ [packet per packet duration]
Figure: Throughput comparison WBSN channel with NLOS
32 / 37
35. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Performance Results for a high path loss WBSN
Hidden terminal problem
For high data rates, the hidden terminal problem becomes
dominant, and collapses our model.
33 / 37
36. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Outline
1 Motivation and Objectives
Motivation and Objectives
2 State-of-the-Art
MAC design in WBSN
Overview of the sloted IEEE 802.15.4 CAP
3 Analytical Model
Development
Analytical Formulation
4 High Pathloss WBSN
Analysis
Changes in the Analytical Model
5 Results
Initial Considerations
Comparison ACK and non-ACK traffic
Performance Results for a high path loss WBSN
6 Conclusions
34 / 37
37. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Conclusions
Extension of an analytical model of the slotted CSMA/CA
procedure in the CAP of the IEEE 802.15.4 standard to
acknowledged traffic.
The validity of the analytical model has been demonstrated
comparing with simulation results.
For the purpose of conducting near realistic simulations, the
Chipcon CC2420 IEEE 802.15.4 transceiver energy parameters
have been used.
The results of the analytical model resolution have been then
employed to predict throughput and energy consumption.
We have uncovered one of the main problems of using IEEE
802.15.4 in a human body environment: hidden node problem
⇒ multihop topology or the use of relays could be more
suited.
35 / 37
38. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Future Work
Solve the overhearing ns-2 simulation bug.
Include in the model, the possibility of hidden nodes.
Study the GTS implementation, particularly effective for
WBSN applications that have timing constraints.
Use a multi-hop topology strategy to solve energy issues.
Study other sophisticated channel models available in the
literature to perform different evaluations and contrast studies.
36 / 37
39. Motivation and Objectives State-of-the-Art Analytical Model High Pathloss WBSN Results Conclusions
Questions?
Thank you for your attention!
37 / 37