The document presents a design flow for developing distributed sensor network applications. It models the application software independently of the hardware architecture to ensure separation of concerns. The design flow considers the constraints of sensor networks, such as limited resources and timing requirements. It facilitates application development through performance analysis and optimal mapping of application processes to sensor nodes. A case study is presented on an industrial multimedia sensor network application developed using this flow.
The document discusses various protocols and security aspects related to IoT. It provides details on protocols such as IEEE 802.15.4, BACnet, Modbus, KNX, Zigbee etc. It also outlines vulnerabilities in IoT like unauthorized access, information corruption, DoS attacks. Key elements of IoT security discussed are identity establishment, access control, data security, non-repudiation and availability. Security requirements and models for IoT are also mentioned.
IEEE 802.15.4 is a standard that defines the physical and MAC layers for low-rate wireless personal area networks. ZigBee builds upon 802.15.4 to add secure networking, reliability and scalability. The document discusses the standards, applications such as home and industrial networking, characteristics including low power consumption, and competing technologies like Bluetooth and Z-Wave. It also outlines Motorola's projects using 802.15.4 and ZigBee for applications like asset tracking and home automation.
The document discusses Bluetooth Low Energy (BLE) and ANT, which are short-range wireless technologies suitable for Internet of Things applications. It provides an overview of BLE specifications, architecture, and improvements in Bluetooth 5. It also describes ANT's protocol stack and topologies. The document concludes that BLE has promising results for indoor and outdoor IoT scenarios due to its longer range, higher throughput, and lower power consumption compared to other technologies. However, scalability, security, interoperability, and hardware/software compatibility remain challenges for BLE in IoT.
Using IEEE's Zigbee Protocol to design a low power, noise efficient node for home automation. The presentation provides some of the key ingredients and working modes for the Zigbee Protocol. Many companies like (DiGi) built smart zigbee radios (commercially named: XBee) based on these protocol stacks, which now help reshaping wireless sensor networking and low power consumer electronics integration .
This document discusses M2M (machine-to-machine) communication and its relationship to IoT. It describes that M2M focuses on device-to-device communication without using the internet, while IoT uses internet protocols and servers. The key domains of an M2M architecture are the M2M device domain, network domain, and application domain. Several open source software tools for M2M development are also outlined, including Mango, Mainspring, and Device Hive.
Zigbee technology and its application inIJCNCJournal
Wireless home automation systems have drawn considerable attentions of the researchers for more than a
decade. The major technologies used to implement these systems include Z-Wave, Insteon, Wavenis,
Bluetooth, WiFi, and ZigBee. Among these technologies the ZigBee based systems have become very popular
because of its low cost and low power consumption. In this paper ZigBee based wireless home automation
systems have been addressed. There are two main parts of this paper. In the first part a brief introduction of
the ZigBee technology has been presented and in the second part a survey work on the ZigBee based wireless
home automation system has been presented. The performances of the ZigBee based systems have also been
compared with those of other competing technologies based systems. In addition some future opportunities
and challenges of the ZigBee based systems have been listed in this paper.
Wireless Intelligent Network is a concept developed by the TR-45 Mobile and Personal Communications Systems Standards engineering committee of the Telecommunications Industry Association.
The document presents EnViBo, an embedded wireless sensor network platform for monitoring vital signs and biomedical signals. EnViBo uses a three-layer architecture with sensor nodes, a local data sink computer, and global data sinks on computers, tablets and smartphones. The platform uses low-cost Microchip microcontrollers and the MiWi P2P wireless protocol for node communications. Five sensor nodes have been developed to monitor temperature, pulse, respiration and activity. Results show the platform can reliably collect monitoring data from the sensor nodes using moderate-cost components. Future work will involve field testing and adding routing nodes to improve indoor performance.
The document discusses various protocols and security aspects related to IoT. It provides details on protocols such as IEEE 802.15.4, BACnet, Modbus, KNX, Zigbee etc. It also outlines vulnerabilities in IoT like unauthorized access, information corruption, DoS attacks. Key elements of IoT security discussed are identity establishment, access control, data security, non-repudiation and availability. Security requirements and models for IoT are also mentioned.
IEEE 802.15.4 is a standard that defines the physical and MAC layers for low-rate wireless personal area networks. ZigBee builds upon 802.15.4 to add secure networking, reliability and scalability. The document discusses the standards, applications such as home and industrial networking, characteristics including low power consumption, and competing technologies like Bluetooth and Z-Wave. It also outlines Motorola's projects using 802.15.4 and ZigBee for applications like asset tracking and home automation.
The document discusses Bluetooth Low Energy (BLE) and ANT, which are short-range wireless technologies suitable for Internet of Things applications. It provides an overview of BLE specifications, architecture, and improvements in Bluetooth 5. It also describes ANT's protocol stack and topologies. The document concludes that BLE has promising results for indoor and outdoor IoT scenarios due to its longer range, higher throughput, and lower power consumption compared to other technologies. However, scalability, security, interoperability, and hardware/software compatibility remain challenges for BLE in IoT.
Using IEEE's Zigbee Protocol to design a low power, noise efficient node for home automation. The presentation provides some of the key ingredients and working modes for the Zigbee Protocol. Many companies like (DiGi) built smart zigbee radios (commercially named: XBee) based on these protocol stacks, which now help reshaping wireless sensor networking and low power consumer electronics integration .
This document discusses M2M (machine-to-machine) communication and its relationship to IoT. It describes that M2M focuses on device-to-device communication without using the internet, while IoT uses internet protocols and servers. The key domains of an M2M architecture are the M2M device domain, network domain, and application domain. Several open source software tools for M2M development are also outlined, including Mango, Mainspring, and Device Hive.
Zigbee technology and its application inIJCNCJournal
Wireless home automation systems have drawn considerable attentions of the researchers for more than a
decade. The major technologies used to implement these systems include Z-Wave, Insteon, Wavenis,
Bluetooth, WiFi, and ZigBee. Among these technologies the ZigBee based systems have become very popular
because of its low cost and low power consumption. In this paper ZigBee based wireless home automation
systems have been addressed. There are two main parts of this paper. In the first part a brief introduction of
the ZigBee technology has been presented and in the second part a survey work on the ZigBee based wireless
home automation system has been presented. The performances of the ZigBee based systems have also been
compared with those of other competing technologies based systems. In addition some future opportunities
and challenges of the ZigBee based systems have been listed in this paper.
Wireless Intelligent Network is a concept developed by the TR-45 Mobile and Personal Communications Systems Standards engineering committee of the Telecommunications Industry Association.
The document presents EnViBo, an embedded wireless sensor network platform for monitoring vital signs and biomedical signals. EnViBo uses a three-layer architecture with sensor nodes, a local data sink computer, and global data sinks on computers, tablets and smartphones. The platform uses low-cost Microchip microcontrollers and the MiWi P2P wireless protocol for node communications. Five sensor nodes have been developed to monitor temperature, pulse, respiration and activity. Results show the platform can reliably collect monitoring data from the sensor nodes using moderate-cost components. Future work will involve field testing and adding routing nodes to improve indoor performance.
The document discusses Zigbee technology, including its history, device types, how it works, uses and future. Zigbee is a wireless technology standard designed for control and sensor networks. It was created by the Zigbee Alliance based on the IEEE 802.15.4 standard for low-power wireless networks. Zigbee networks consist of coordinator, router and end devices and can operate using star, tree or mesh topologies to connect small, low-power digital radios. Common applications of Zigbee include home automation, lighting and appliance control.
Zigbee is a wireless technology standard created for low-power wireless networks. It operates on the IEEE 802.15.4 standard and was created by the Zigbee Alliance to define standards for monitoring and control products. Zigbee networks can include thousands of nodes that operate for years on small batteries. It uses low data rates and mesh networking to transmit data over long ranges through multiple connected devices. Common applications of Zigbee technology include wireless light switches, HVAC controls, and sensor networks for utilities and smart homes.
Debjeet Chakroborty presented a technical seminar on Zigbee technology under the guidance of Dr. Umashankar Ghugar. The presentation covered the introduction of Zigbee including its architecture, types of devices, network topologies, advantages, disadvantages, characteristics, applications, and conclusion. Zigbee is a wireless standard designed for low-power networks that allows devices to communicate with each other within short distances. The presentation discussed Zigbee's six-layer architecture, three device types, common network topologies like star, mesh and cluster-tree, and applications in home networking, industrial control, and medical data collection.
The document discusses ZigBee/IEEE 802.15.4, which is a wireless communication standard designed for low-power wireless networks. It was created to address the needs of wireless sensor networks that required low cost, low power consumption, and reliability. ZigBee networks operate within the IEEE 802.15.4 standard and have low data rates, low power consumption, and support star, tree, and mesh network topologies. ZigBee is targeted towards wireless control and sensor applications such as wireless lighting, thermostats, and other home and industrial automation devices.
The document provides an overview of the ZigBee wireless protocol. It discusses that ZigBee is a low power, low cost wireless standard targeted for automation and remote control applications. It then covers ZigBee features such as mesh networking, security, reliability and interoperability. The document also summarizes the ZigBee protocol stack including the physical, MAC and network layers and different device types in ZigBee networks.
ZigBee is a wireless networking standard used for control and sensor applications that requires low data rates, low power consumption, and secure networking. It is based on the IEEE 802.15.4 standard and allows for up to 65,000 nodes to connect in a mesh network topology. ZigBee operates in the 2.4GHz, 868MHz, and 915MHz frequency bands and is designed for use in personal area networks for applications like home automation, lighting control, and wireless sensor networks. Research is ongoing to expand ZigBee's uses in fields like wireless communications and neuroengineering.
This document provides an overview of LPWAN technology and LoRa. It begins with introducing the speaker and his background. It then discusses LPWAN networks and how they aim to maximize range and battery life. LoRa is introduced as a popular LPWAN protocol using chirp spread spectrum modulation. Key aspects of LoRa like data rates, spreading factors, and the LoRaWAN protocol are summarized. Common use cases for LoRa like smart cities, agriculture, and asset tracking are outlined. The document concludes with discussing deployments of LoRa networks in India by companies like Tata Communications and SenRa.
A Software Defined Hierarchical Communication and Data Management Architectur...AUTOWARE
The document proposes a software defined hierarchical communication and data management architecture for Industry 4.0. It includes a multi-tier organization with different tiers catering to different latency and reliability requirements. Local managers and an orchestrator provide hierarchical management of communications and distributed data. Virtualization technologies such as RAN slicing and cloud RAN are leveraged to achieve flexibility and efficiency.
The document discusses the ZigBee wireless standard. It describes ZigBee as a standard created for low-power wireless networks based on the IEEE 802.15.4 standard. It outlines ZigBee's capabilities for connecting sensors and controls in home and building automation applications. The document also reviews research on ZigBee and the current and future state of the market and products that use the ZigBee standard.
Modified Epc Global Network Architecture of Internet of Things for High Load ...IDES Editor
This paper proposes a flexible and novel
architecture of Internet of Things (IOT) in a high density and
mobility environment. Our proposed architecture solves the
problem of over-loading on the network by monitoring the
total number of changed objects changing global location
crossing the fringe boundaries rather than the actual number
of objects present or those that move within the local area. We
have modified the reader architecture of the EPCglobal
Architecture. The components and the working of the model
has been illustrated in detail. We have also discussed the
physical implementation of our model taking the examples of
a smart home sample application and the performance results
have been tabulated and represented graphically.
What is Zigbee?
this presentation is based on Zigbee
this presentation contains what is zigbee how it works what are their types for what is used how it works introducton contains all the things along with the diagram of zigbee this presentation is very easily understandable..
zigbee architectture is involved
the application of zigbee
the advantages of zigbee
the conclusion of zigbee
it is very helpful for the projects based on home automation security purposes industrial automation... so go through it contains all details about zigbee
Track 3 session 6 - st dev con 2016 - qualcomm - wi-fi connectivity for iotST_World
The document discusses Qualcomm's Wi-Fi and Bluetooth solutions for Internet of Things (IoT) applications. It introduces several Qualcomm system on chips (SOCs) that provide low-power Wi-Fi and Bluetooth connectivity for various IoT use cases. Example products and development boards are also highlighted.
This seminar report provides an overview of ZigBee technology. It defines ZigBee as a wireless networking standard intended for low-power devices. The report outlines ZigBee's key characteristics including low cost, low power consumption, mesh networking topology, and built-in security. It also describes ZigBee's protocol stack and compares it to other wireless technologies like Bluetooth and Wi-Fi. Common applications of ZigBee technology include home automation, wireless sensor networks, and industrial control.
This document summarizes a master's thesis project on improving Internet of Things (IoT) security with Software Defined Networking (SDN). The project involved designing an IoT security architecture using SDN, developing an anomaly detection algorithm, and evaluating the algorithm's performance on a testbed. Key results were that a standard deviation threshold of 10 and window size of 10 seconds detected anomalies with the lowest errors. The architecture detected and mitigated attacks by inserting rules to block malicious traffic. Future work could apply the approach to more sensors and different security architectures.
ZigBee is a wireless technology designed for low-power, short-range communication in personal area networks. It operates on various frequency bands and defines communication protocols for sensor and control networks. The document discusses ZigBee's architecture, protocols, topologies, algorithms and applications in monitoring and control. It compares ZigBee to other wireless standards like Bluetooth and outlines its advantages like low power usage, large network capacity and ease of deployment.
Zigbee is a wireless technology standard used for sensor and control networks. It operates on the IEEE 802.15.4 standard using mesh networking topologies to transmit data over long distances with low power consumption. Zigbee networks consist of coordinator, router, and end devices and are used in applications that require long battery life, security, low data rates and cost such as lighting, HVAC and sensors. Research continues to expand Zigbee's capabilities for use in more devices and markets going forward.
ZigBee is a wireless networking standard intended for low-power devices. It is based on the IEEE 802.15.4 standard and uses small, low-power digital radios to transmit data over short distances. ZigBee networks are self-organizing and reliable, with many possible applications including home automation, industrial control, and consumer electronics. The ZigBee Alliance promotes the standard and ensures interoperability between devices from different manufacturers.
Link Labs introduced the AirFinder SuperTag, a low-power indoor/outdoor asset tracking device. The SuperTag uses Bluetooth indoors and cellular networks outdoors to provide seamless tracking. It also monitors temperature, shock and vibration. The SuperTag was presented as solving challenges with existing GPS, indoor tracking and data logging solutions. Three use cases were described: manufacturing tracking between indoor and outdoor areas, shipment tracking compared to LTE-M GPS trackers, and replacing data loggers for monitoring refrigerated goods. The SuperTag offers automated data collection, geofencing alerts and reporting at a low monthly cost per device.
Zigbee is a wireless networking standard used for low-power digital radios in personal area networks. It uses small, low-power digital radios designed for use in wireless sensor and control networks. Zigbee devices include coordinators, routers, and end devices. Coordinators manage the network, routers relay data, and end devices can only communicate with their parent node. Zigbee uses mesh networking topologies to allow for redundancy and multiple communication paths. Its software architecture is built on top of the IEEE 802.15.4 standard and includes network, application, and device object layers. Zigbee networks are initialized by coordinators searching for channels and assigning PAN IDs to start the network for other devices
This document provides an overview of the course "18BME18 INTERNET OF THINGS FOR BIOMEDICAL ENGINEERS". The course aims to discuss IoT concepts, interpret wireless sensor network protocols, illustrate IoT applications in healthcare using tools and embedded systems. The document outlines the various units that will be covered, including IoT and M2M communication models, functional blocks, and protocols. It also compares IoT with M2M and describes software-defined networking.
This document describes a thesis that proposes a model-based design flow for developing networked embedded systems. The design flow uses the BIP framework to construct system-level models at different levels of abstraction and apply BIP tools for verification and performance evaluation. It also uses code generation for rapid prototyping. The flow aims to provide automated code generation for hardware architectures, construction of faithful system models, and system-level performance evaluation. The thesis applies this design flow on case studies from domains like automotive, industrial automation, and wireless sensor networks.
The document discusses Zigbee technology, including its history, device types, how it works, uses and future. Zigbee is a wireless technology standard designed for control and sensor networks. It was created by the Zigbee Alliance based on the IEEE 802.15.4 standard for low-power wireless networks. Zigbee networks consist of coordinator, router and end devices and can operate using star, tree or mesh topologies to connect small, low-power digital radios. Common applications of Zigbee include home automation, lighting and appliance control.
Zigbee is a wireless technology standard created for low-power wireless networks. It operates on the IEEE 802.15.4 standard and was created by the Zigbee Alliance to define standards for monitoring and control products. Zigbee networks can include thousands of nodes that operate for years on small batteries. It uses low data rates and mesh networking to transmit data over long ranges through multiple connected devices. Common applications of Zigbee technology include wireless light switches, HVAC controls, and sensor networks for utilities and smart homes.
Debjeet Chakroborty presented a technical seminar on Zigbee technology under the guidance of Dr. Umashankar Ghugar. The presentation covered the introduction of Zigbee including its architecture, types of devices, network topologies, advantages, disadvantages, characteristics, applications, and conclusion. Zigbee is a wireless standard designed for low-power networks that allows devices to communicate with each other within short distances. The presentation discussed Zigbee's six-layer architecture, three device types, common network topologies like star, mesh and cluster-tree, and applications in home networking, industrial control, and medical data collection.
The document discusses ZigBee/IEEE 802.15.4, which is a wireless communication standard designed for low-power wireless networks. It was created to address the needs of wireless sensor networks that required low cost, low power consumption, and reliability. ZigBee networks operate within the IEEE 802.15.4 standard and have low data rates, low power consumption, and support star, tree, and mesh network topologies. ZigBee is targeted towards wireless control and sensor applications such as wireless lighting, thermostats, and other home and industrial automation devices.
The document provides an overview of the ZigBee wireless protocol. It discusses that ZigBee is a low power, low cost wireless standard targeted for automation and remote control applications. It then covers ZigBee features such as mesh networking, security, reliability and interoperability. The document also summarizes the ZigBee protocol stack including the physical, MAC and network layers and different device types in ZigBee networks.
ZigBee is a wireless networking standard used for control and sensor applications that requires low data rates, low power consumption, and secure networking. It is based on the IEEE 802.15.4 standard and allows for up to 65,000 nodes to connect in a mesh network topology. ZigBee operates in the 2.4GHz, 868MHz, and 915MHz frequency bands and is designed for use in personal area networks for applications like home automation, lighting control, and wireless sensor networks. Research is ongoing to expand ZigBee's uses in fields like wireless communications and neuroengineering.
This document provides an overview of LPWAN technology and LoRa. It begins with introducing the speaker and his background. It then discusses LPWAN networks and how they aim to maximize range and battery life. LoRa is introduced as a popular LPWAN protocol using chirp spread spectrum modulation. Key aspects of LoRa like data rates, spreading factors, and the LoRaWAN protocol are summarized. Common use cases for LoRa like smart cities, agriculture, and asset tracking are outlined. The document concludes with discussing deployments of LoRa networks in India by companies like Tata Communications and SenRa.
A Software Defined Hierarchical Communication and Data Management Architectur...AUTOWARE
The document proposes a software defined hierarchical communication and data management architecture for Industry 4.0. It includes a multi-tier organization with different tiers catering to different latency and reliability requirements. Local managers and an orchestrator provide hierarchical management of communications and distributed data. Virtualization technologies such as RAN slicing and cloud RAN are leveraged to achieve flexibility and efficiency.
The document discusses the ZigBee wireless standard. It describes ZigBee as a standard created for low-power wireless networks based on the IEEE 802.15.4 standard. It outlines ZigBee's capabilities for connecting sensors and controls in home and building automation applications. The document also reviews research on ZigBee and the current and future state of the market and products that use the ZigBee standard.
Modified Epc Global Network Architecture of Internet of Things for High Load ...IDES Editor
This paper proposes a flexible and novel
architecture of Internet of Things (IOT) in a high density and
mobility environment. Our proposed architecture solves the
problem of over-loading on the network by monitoring the
total number of changed objects changing global location
crossing the fringe boundaries rather than the actual number
of objects present or those that move within the local area. We
have modified the reader architecture of the EPCglobal
Architecture. The components and the working of the model
has been illustrated in detail. We have also discussed the
physical implementation of our model taking the examples of
a smart home sample application and the performance results
have been tabulated and represented graphically.
What is Zigbee?
this presentation is based on Zigbee
this presentation contains what is zigbee how it works what are their types for what is used how it works introducton contains all the things along with the diagram of zigbee this presentation is very easily understandable..
zigbee architectture is involved
the application of zigbee
the advantages of zigbee
the conclusion of zigbee
it is very helpful for the projects based on home automation security purposes industrial automation... so go through it contains all details about zigbee
Track 3 session 6 - st dev con 2016 - qualcomm - wi-fi connectivity for iotST_World
The document discusses Qualcomm's Wi-Fi and Bluetooth solutions for Internet of Things (IoT) applications. It introduces several Qualcomm system on chips (SOCs) that provide low-power Wi-Fi and Bluetooth connectivity for various IoT use cases. Example products and development boards are also highlighted.
This seminar report provides an overview of ZigBee technology. It defines ZigBee as a wireless networking standard intended for low-power devices. The report outlines ZigBee's key characteristics including low cost, low power consumption, mesh networking topology, and built-in security. It also describes ZigBee's protocol stack and compares it to other wireless technologies like Bluetooth and Wi-Fi. Common applications of ZigBee technology include home automation, wireless sensor networks, and industrial control.
This document summarizes a master's thesis project on improving Internet of Things (IoT) security with Software Defined Networking (SDN). The project involved designing an IoT security architecture using SDN, developing an anomaly detection algorithm, and evaluating the algorithm's performance on a testbed. Key results were that a standard deviation threshold of 10 and window size of 10 seconds detected anomalies with the lowest errors. The architecture detected and mitigated attacks by inserting rules to block malicious traffic. Future work could apply the approach to more sensors and different security architectures.
ZigBee is a wireless technology designed for low-power, short-range communication in personal area networks. It operates on various frequency bands and defines communication protocols for sensor and control networks. The document discusses ZigBee's architecture, protocols, topologies, algorithms and applications in monitoring and control. It compares ZigBee to other wireless standards like Bluetooth and outlines its advantages like low power usage, large network capacity and ease of deployment.
Zigbee is a wireless technology standard used for sensor and control networks. It operates on the IEEE 802.15.4 standard using mesh networking topologies to transmit data over long distances with low power consumption. Zigbee networks consist of coordinator, router, and end devices and are used in applications that require long battery life, security, low data rates and cost such as lighting, HVAC and sensors. Research continues to expand Zigbee's capabilities for use in more devices and markets going forward.
ZigBee is a wireless networking standard intended for low-power devices. It is based on the IEEE 802.15.4 standard and uses small, low-power digital radios to transmit data over short distances. ZigBee networks are self-organizing and reliable, with many possible applications including home automation, industrial control, and consumer electronics. The ZigBee Alliance promotes the standard and ensures interoperability between devices from different manufacturers.
Link Labs introduced the AirFinder SuperTag, a low-power indoor/outdoor asset tracking device. The SuperTag uses Bluetooth indoors and cellular networks outdoors to provide seamless tracking. It also monitors temperature, shock and vibration. The SuperTag was presented as solving challenges with existing GPS, indoor tracking and data logging solutions. Three use cases were described: manufacturing tracking between indoor and outdoor areas, shipment tracking compared to LTE-M GPS trackers, and replacing data loggers for monitoring refrigerated goods. The SuperTag offers automated data collection, geofencing alerts and reporting at a low monthly cost per device.
Zigbee is a wireless networking standard used for low-power digital radios in personal area networks. It uses small, low-power digital radios designed for use in wireless sensor and control networks. Zigbee devices include coordinators, routers, and end devices. Coordinators manage the network, routers relay data, and end devices can only communicate with their parent node. Zigbee uses mesh networking topologies to allow for redundancy and multiple communication paths. Its software architecture is built on top of the IEEE 802.15.4 standard and includes network, application, and device object layers. Zigbee networks are initialized by coordinators searching for channels and assigning PAN IDs to start the network for other devices
This document provides an overview of the course "18BME18 INTERNET OF THINGS FOR BIOMEDICAL ENGINEERS". The course aims to discuss IoT concepts, interpret wireless sensor network protocols, illustrate IoT applications in healthcare using tools and embedded systems. The document outlines the various units that will be covered, including IoT and M2M communication models, functional blocks, and protocols. It also compares IoT with M2M and describes software-defined networking.
This document describes a thesis that proposes a model-based design flow for developing networked embedded systems. The design flow uses the BIP framework to construct system-level models at different levels of abstraction and apply BIP tools for verification and performance evaluation. It also uses code generation for rapid prototyping. The flow aims to provide automated code generation for hardware architectures, construction of faithful system models, and system-level performance evaluation. The thesis applies this design flow on case studies from domains like automotive, industrial automation, and wireless sensor networks.
This 3 sentence summary provides the key details about the document:
The document is an introduction to the SENSEnuts programming platform developed by Eigen Technologies for wireless sensor networks. It describes the features of SENSEnuts, including the hardware capabilities and software tools. Steps are outlined for installing SENSEnuts, building a project, and writing basic codes to perform tasks like creating a neighbor list and sending data to a PC.
Educating the computer architects of tomorrow's critical systems with RISC-VRISC-V International
This document provides information about a virtual RISC-V summit event taking place from December 8-10. It then summarizes a presentation given by Leonidas Kosmidis on educating computer architects with RISC-V. The presentation discusses safety critical systems and why companies are interested in RISC-V for these applications. It also describes the computer architecture curriculum and RISC-V projects at the Polytechnic University of Catalonia and Barcelona Supercomputing Center. Specific projects from a processor design course are summarized, including dual/triple lockstep CPUs, a WCET support implementation, and vector extensions added to the Lagarto RISC-V core. The document concludes by acknowledging those involved
This document discusses Bluetooth technology and its use in smart sensor networks. It begins with an introduction of Bluetooth and its specifications. It then explains the two main Bluetooth topologies - piconet and scatternet. Next, it describes how Bluetooth can be used to create wireless sensor networks and the roles of smart sensor nodes and the gateway. It outlines the hardware and software considerations for implementing a Bluetooth smart sensor network and the process the gateway uses to communicate with smart sensor nodes. In conclusion, it briefly discusses applications of sensor networks and factors that influence sensor network design.
Introduction to Internet of Things.pdfGVNSK Sravya
This document provides an introduction to Internet of Things (IoT) concepts. It defines IoT as a network of physical devices connected via standard communication protocols. The document outlines key characteristics of IoT including connectivity, intelligence/identity, scalability, and security. It also describes the physical design of IoT including things/devices and common communication protocols. Finally, it discusses IoT communication models such as request-response, publish-subscribe, push-pull, and exclusive pair models.
The designed SCADA software system ensured remote monitoring of the positions and advanced system health conditions of all the solar tracking systems to provide data analytics and reporting. This SCADA solution was designed and developed toco-exist in a remote system that will continuously monitor multiple fields consisting of several masters and their respective slave trackers.
Leonard Timmons has over 30 years of experience in software engineering, systems design, and database administration. He has a B.E.E. from Georgia Tech and has worked at Advanced Control Systems since 1992 where he has led numerous projects involving network, database, virtualization, and industrial control system design. Prior to that, he worked as an independent consultant on software and systems for companies like Hayes Microcomputer Products, Scientific Atlanta, and Motorola.
EC8702 adhoc and wireless sensor networks iv eceGOWTHAMMS6
This document outlines the syllabus for a course on Adhoc and Wireless Sensor Networks. It covers five units: (1) Introduction to Adhoc Networks and routing protocols, (2) Introduction to sensor networks and architectures, (3) Networking concepts and protocols for sensor networks, (4) Security issues in sensor networks, and (5) Sensor network platforms and tools. Some key topics discussed include characteristics of adhoc networks, challenges in routing, components and applications of wireless sensor networks, and medium access schemes. The objectives are for students to learn the fundamentals and apply their knowledge to identify suitable protocols based on network requirements and understand security and transport layer issues in these networks.
This curriculum vitae is for Joshua Y. Maina, who holds a Ph.D. in Electrical and Computer Engineering from the University of Pittsburgh. He has over 20 years of experience in various engineering roles related to electrical engineering, computer engineering, wireless communications, and RFID systems. His experience includes positions as a staff design engineer, engineering consultant, senior scientist and researcher, independent consultant, and postdoctoral fellow. He also holds masters and bachelors degrees in electrical engineering.
Embedded computing is everywhere. It is in our car engines, refrigerators, and even in the singing greeting cards we send. With improvements in wireless technology, these systems are starting to talk with each other, and they are appearing in places like our shoes and wrists to monitor our athletic activity or health. This emerging Internet of Everything (IoE) has tremendous potential to improve our lives. But like any powerful technology, it also has a dark side: it will observe and implement many of our actions. Security in the IoE is likely to be even more critical than general Internet security. After reviewing some of the challenges in creating a secure IoE, Horowitz will describe a new research program at Stanford to address this issue.
This curriculum vitae summarizes the educational and professional experience of Joshua Y. Maina. He holds a Ph.D. in Electrical and Computer Engineering from the University of Pittsburgh and has over 20 years of experience in various engineering roles. His areas of expertise include computer architecture, wireless communications, RFID systems, and electrical engineering. He is currently a staff design engineer at White's Electronics, where he leads projects from concept to implementation.
RECAP at ETSI Experiential Network Intelligence (ENI) MeetingRECAP Project
This presentation was delivered by Johan Forsman (Tieto), Jörg Domaschka (UULM) and Paolo Casari (IMDEA Networks) at the ETSI Experiential Network Intelligence (ENI) Meeting in Warsaw, Poland, on April 12th, 2019. ETSI Experiential Networked Industry Specification Group (ENI ISG) work on defining a Cognitive Network Management architecture using Artificial Intelligence (AI) techniques and context-aware policies to adjust offered services based on changes in user needs, environmental conditions and business goals. The intention is that the use of Artificial Intelligence techniques in the network management system should solve some of the problems of future network deployment and operations. For more information, see https://www.etsi.org/technologies/experiential-networked-intelligence.
In this paper, we discuss one approach for development and deployment of web sites (web pages) devoted to the description of objects (events) with a precisely delineated geographic scope. This article describes the usage of context-aware programming models for web development. In our paper, we propose mechanisms to create mobile web applications which content links to some predefined geographic area. The accuracy of such a binding allows us to distinguish individual areas within the same indoor space. Target areas for such development are applications for Smart Cities and retail.
The document discusses fog networks and cloud computing in the context of an Internet of Things course. It covers the following key points:
- Fog networks refer to decentralized computing infrastructure located closer to IoT devices to help process some data locally instead of sending everything to the cloud. This helps address issues like latency.
- Cloud computing provides on-demand access to shared computing resources, allowing IoT systems to extend functionality by processing and storing data in the cloud.
- Common cloud service models for IoT include Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Major cloud providers like Amazon AWS offer services tailored to IoT applications
This document provides an introduction to the Internet of Things (IOT). It defines IOT as the collection of physical devices connected over the internet that can exchange data with less human involvement. The history and key technologies that enabled IOT are discussed, including wireless sensor networks, RFID, and cloud computing. The document also outlines the typical architecture of an IOT system including sensing, network, service, and application layers. Common IOT standards, protocols, and applications are summarized along with research areas and challenges in IOT development.
This document appears to be from a CISSP mentor program session discussing communication and network security topics. It includes a quiz on network protocols and technologies like UDP, TCP ports, OSI layers, and IPv6 tunneling. It also summarizes wired WAN protocols like T1/E1 lines, Frame Relay, X.25, ATM, MPLS, and storage protocols like FCoE, FCIP and iSCSI. The session aims to help students studying for the CISSP exam.
What is Your Edge From the Cloud to the Edge, Extending Your ReachSUSE
As companies continue to take advantage of the benefits of cloud – increased flexibility, speed of innovation and quickly responding to business demands, it is no wonder that they want to extend these benefits to the edge. But there are still a lot of questions.
The document discusses definitions of the Internet of Things (IoT). It provides several definitions from various organizations that describe the IoT as connecting physical objects through standard internet protocols and allowing them to generate, exchange and consume data. The document also discusses the evolution of the IoT through different waves, starting with connecting PCs, then people through mobile/cloud, and the current wave of connecting everything through ubiquitous embedded systems like sensors. Finally, the document outlines some of the key enabling technologies and standards that help make the IoT possible, such as 6LoWPAN, CoAP and IEEE protocols.
Similar to Rapid development of WSN applications (20)
hematic appreciation test is a psychological assessment tool used to measure an individual's appreciation and understanding of specific themes or topics. This test helps to evaluate an individual's ability to connect different ideas and concepts within a given theme, as well as their overall comprehension and interpretation skills. The results of the test can provide valuable insights into an individual's cognitive abilities, creativity, and critical thinking skills
Nucleophilic Addition of carbonyl compounds.pptxSSR02
Nucleophilic addition is the most important reaction of carbonyls. Not just aldehydes and ketones, but also carboxylic acid derivatives in general.
Carbonyls undergo addition reactions with a large range of nucleophiles.
Comparing the relative basicity of the nucleophile and the product is extremely helpful in determining how reversible the addition reaction is. Reactions with Grignards and hydrides are irreversible. Reactions with weak bases like halides and carboxylates generally don’t happen.
Electronic effects (inductive effects, electron donation) have a large impact on reactivity.
Large groups adjacent to the carbonyl will slow the rate of reaction.
Neutral nucleophiles can also add to carbonyls, although their additions are generally slower and more reversible. Acid catalysis is sometimes employed to increase the rate of addition.
This presentation explores a brief idea about the structural and functional attributes of nucleotides, the structure and function of genetic materials along with the impact of UV rays and pH upon them.
Or: Beyond linear.
Abstract: Equivariant neural networks are neural networks that incorporate symmetries. The nonlinear activation functions in these networks result in interesting nonlinear equivariant maps between simple representations, and motivate the key player of this talk: piecewise linear representation theory.
Disclaimer: No one is perfect, so please mind that there might be mistakes and typos.
dtubbenhauer@gmail.com
Corrected slides: dtubbenhauer.com/talks.html
ESPP presentation to EU Waste Water Network, 4th June 2024 “EU policies driving nutrient removal and recycling
and the revised UWWTD (Urban Waste Water Treatment Directive)”
Travis Hills' Endeavors in Minnesota: Fostering Environmental and Economic Pr...Travis Hills MN
Travis Hills of Minnesota developed a method to convert waste into high-value dry fertilizer, significantly enriching soil quality. By providing farmers with a valuable resource derived from waste, Travis Hills helps enhance farm profitability while promoting environmental stewardship. Travis Hills' sustainable practices lead to cost savings and increased revenue for farmers by improving resource efficiency and reducing waste.
The debris of the ‘last major merger’ is dynamically youngSérgio Sacani
The Milky Way’s (MW) inner stellar halo contains an [Fe/H]-rich component with highly eccentric orbits, often referred to as the
‘last major merger.’ Hypotheses for the origin of this component include Gaia-Sausage/Enceladus (GSE), where the progenitor
collided with the MW proto-disc 8–11 Gyr ago, and the Virgo Radial Merger (VRM), where the progenitor collided with the
MW disc within the last 3 Gyr. These two scenarios make different predictions about observable structure in local phase space,
because the morphology of debris depends on how long it has had to phase mix. The recently identified phase-space folds in Gaia
DR3 have positive caustic velocities, making them fundamentally different than the phase-mixed chevrons found in simulations
at late times. Roughly 20 per cent of the stars in the prograde local stellar halo are associated with the observed caustics. Based
on a simple phase-mixing model, the observed number of caustics are consistent with a merger that occurred 1–2 Gyr ago.
We also compare the observed phase-space distribution to FIRE-2 Latte simulations of GSE-like mergers, using a quantitative
measurement of phase mixing (2D causticality). The observed local phase-space distribution best matches the simulated data
1–2 Gyr after collision, and certainly not later than 3 Gyr. This is further evidence that the progenitor of the ‘last major merger’
did not collide with the MW proto-disc at early times, as is thought for the GSE, but instead collided with the MW disc within
the last few Gyr, consistent with the body of work surrounding the VRM.
What is greenhouse gasses and how many gasses are there to affect the Earth.moosaasad1975
What are greenhouse gasses how they affect the earth and its environment what is the future of the environment and earth how the weather and the climate effects.
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...University of Maribor
Slides from:
11th International Conference on Electrical, Electronics and Computer Engineering (IcETRAN), Niš, 3-6 June 2024
Track: Artificial Intelligence
https://www.etran.rs/2024/en/home-english/
4. Outline!
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 2/33!
1) Sensor
Networks:
Overview
and
development
challenges
2) Proposed
design
flow
• Modeling
the
Applica?on
So@ware
in
PPM
• Code
genera?on
in
Distributed
Sensor
Network
PlaEorms
• Background
on
BIP
3) Case
study:
Industrial
Mul?media
WSN
Applica?on
• Code
genera?on
from
the
PPM
Applica?on
Model
• Construc?on
of
the
System
Model
in
BIP
• BIP
System
Model
Calibra?on
4) Conclusion
and
ongoing
work
5. Outline!
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 2/33!
1) Sensor
Networks:
Overview
and
development
challenges
2) Proposed
design
flow
• Modeling
the
Applica?on
So@ware
in
PPM
• Code
genera?on
in
Distributed
Sensor
Network
PlaEorms
• Background
on
BIP
3) Case
study:
Industrial
Mul?media
WSN
Applica?on
• Code
genera?on
from
the
PPM
Applica?on
Model
• Construc?on
of
the
System
Model
in
BIP
• BIP
System
Model
Calibra?on
4) Conclusion
and
ongoing
work
6. Sensor networks: Device constraints!
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 3/33!
BaMery
life?me
is
limited..
What
happens
in
case
of
failure?
• Scarce
resources
• Communica?on
cost
• Consumed
energy
• Memory
usage
• Network
bandwidth
7. Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 3/33!
BaMery
life?me
is
limited..
What
happens
in
case
of
failure?
• Scarce
resources
• Communica?on
cost
• Consumed
energy
• Memory
usage
• Network
bandwidth
Sensor networks: Device constraints!
8. Sensor networks: Timing constraints!
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 4/33!
• Many
applica?on
require
accurately
3mestamped
data
9. Sensor networks: Timing constraints!
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 4/33!
• Many
applica?on
require
accurately
3mestamped
data
• Characteristic example: Multimedia Wireless Sensor
Network (MWSN) applications
10. Sensor networks: Timing constraints!
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 5/33!
• Each
sensor
node
has
a
fixed
?me
granularity
which
varies
according
to
the
opera?ng
frequency
of
its
clock
Clock
Time
C(t)
Real
Time
t
(Faster
clock)
(Reference
clock)
(Slower
clock)
t2
t1
t0
t0
11. Sensor networks: Timing constraints!
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 5/33!
How to obtain a common time reference in
a distributed system?
Solution: Clock synchronization
Clock
Time
C(t)
Real
Time
t
(Faster
clock)
(Reference
clock)
(Slower
clock)
t2
t1
t0
t0
12. Sensor networks: Clock synchronization!
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 6/33!
• Several
well
known-‐protocols
opera?ng
either
in
the
so6ware
or
hardware
level
• Target
synchroniza3on
accuracy:
Microsecond
scale
(μs)
• Improved
accuracy
with
enhancements
as:
• Round-‐Trip
Delay
(RTD)
calcula?on
• Requires
more
energy
• Dedicated
drivers
for
hardware
access
• May
not
be
available
in
lightweight
environments
13. Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 6/33!
Sensor networks: Clock synchronization!
RTD
calcula3on
in
Precision
Time
Protocol
(PTP)
• Several
well
known-‐protocols
opera?ng
either
in
the
so6ware
or
hardware
level
• Target
synchroniza3on
accuracy:
Microsecond
scale
(μs)
• Improved
accuracy
with
enhancements
as:
• Round-‐Trip
Delay
(RTD)
calcula?on
• Requires
more
energy
• Dedicated
drivers
for
hardware
access
• May
not
be
available
in
lightweight
environments
14. Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 6/33!
• Several
well
known-‐protocols
opera?ng
either
in
the
so6ware
or
hardware
level
• Target
synchroniza3on
accuracy:
Microsecond
scale
(μs)
• Improved
accuracy
with
enhancements
as:
• Round-‐Trip
Delay
(RTD)
calcula?on
• Requires
more
energy
• Dedicated
drivers
for
hardware
access
• May
not
be
available
in
lightweight
environments
• Promising
protocol
family
using
the
Kalman
filter
algorithm
• Dynamically
adap?ng
to
the
advance
of
the
reference
clock
Sensor networks: Clock synchronization!
15. Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 7/33!
• Heterogeneity
of
devices
• Communica?on
latencies
• Conflicts
in
message
passing
through
the
protocol
stack
Sensor networks: Application development!
Considerable
cost
in
3me
and
development
effort
No
guarantee
that
design
errors
are
fixed
before
deployment
makeSense
project
(www.project-‐makesense.eu)
16. P1
P2
P2
P3
P4
Application Software
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 8/33!
Master
Sound
card
Wifi
card
Node
1
WiFi
Access
Point
(AP)
Slave
Sound
card
Wifi
card
Node
N
Sensor networks: Application deployment!
Sensor Network Distributed Platform
17. Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 8/33!
Master
Sound
card
Wifi
card
Node
1
WiFi
Access
Point
(AP)
Slave
Sound
card
Wifi
card
Node
N
Sensor networks: Application deployment!
Application Software
Sensor Network Distributed Platform
P1
P2
P2
P3
P4
18. Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 8/33!
Master
Sound
card
Wifi
card
Node
1
WiFi
Access
Point
(AP)
Slave
Sound
card
Wifi
card
Node
N
Sensor networks: Application deployment!
How to choose which
application process goes to !
which sensor node?
Sensor Network Distributed Platform
Application Software
P1
P2
P2
P3
P4
19. Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 9/33!
• Design
flow
for
the
development
of
func3onal
WSN
applica?ons
• Ensures
separa3on
of
concerns
• Applica?on
So6ware
and
hardware
architecture
considered
independently
• Deployment
based
on
the
op?mal
methodology
for
each
applica?on
• Model-‐based:
Modularity,
reusability
of
ar3facts
• Considers
all
the
constraints
of
sensor
networks
and
facilitates
applica?on
development
through:
• Performance
Analysis
of
system
requirements
• Automated
Code
Genera3on
Proposed method!
20. Outline!
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 10/33!
1) Sensor
Networks:
Overview
and
Development
Challenges
2) Proposed
Design
flow
• Modeling
the
Applica?on
So@ware
in
PPM
• Code
genera?on
in
Distributed
Sensor
Network
PlaEorms
• Background
on
BIP
3) Case
study:
Industrial
Mul?media
WSN
Applica?on
• Code
genera?on
from
the
PPM
Applica?on
Model
• Construc?on
of
the
System
Model
in
BIP
• BIP
System
Model
Calibra?on
4) Conclusion
and
ongoing
work
22. Abstract System Model (BIP)
Application
Software (PPM)
modeling (1)
Mapping/HW
information (PPM)
Sensor Network
HW
Specifications
(XML)
Sensor Network
Library Components
(BIP)
code generation (2)
Sensor Network
C/C++ Code
Sensor Network/
HW Code
Templates
+Configurations
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 11/33!
Design flow for WSN Applications !
Developed
framework
23. Abstract System Model (BIP)
Application
Software (PPM)
System Model (BIP)
modeling (1)
SMC
calibration (3)
Mapping/HW
information (PPM)
Sensor Network
HW
Specifications
(XML)
Sensor Network
Library Components
(BIP)
code generation (2)
analysis (4)
Sensor Network
C/C++ Code
Execution
Sensor Network/
HW Code
Templates
+Configurations
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 11/33!
Design flow for WSN Applications !
Outputs
24. Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 12/33!
Abstract System Model (BIP)
Application
Software (PPM)
System Model (BIP)
modeling (1)
SMC
calibration (3)
Mapping/HW
information (PPM)
Sensor Network
HW
Specifications
(XML)
Sensor Network
Library Components
(BIP)
code generation (2)
analysis (4)
Sensor Network
C/C++ Code
Execution
Sensor Network/
HW Code
Templates
+Configurations
Design flow for WSN Applications !
25. Pragmatic Programming Model (PPM)!
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 13/33!
• Descrip?on
language
facilita?ng
the
development
of
sensor
network
applica3ons
• XML
format
providing
the
possibility
to
reference
C
files
as
external
libraries
• Applica?on
So@ware
described
as
a
network
of
communica3ng
processes
• Communica?on
through
shared
objects,
such
as:
• FIFO
• Shared
memory
• Mutexed
loca?on
26. PPM Example: Application Software!
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 14/33!
synchro
PLL
FIFO
Process Process
29. Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 14/33!
PPM Example: Application deployment!
Master
Sound
card
Wifi
card
WiFi
Access
Point
(AP)
Slave
Sound
card
Wifi
card
UDOO
Node
N
UDOO
Node
1
synchro
PLL
FIFO
Process Process
30. Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 14/33!
<deployment>
<app-‐node
name="pll"/>
<hw-‐element
name="node"
hw-‐class="udoo"
index="0"/>
<hw-‐property
name="networkInterface"
hw-‐class="node-‐inter"
value="wlan0"/>
<hw-‐property
name="srcPort"
hw-‐class="node-‐srcPort"
value="375"/>
<hw-‐property
name="dstPort"
hw-‐class="node-‐dstPort"
value="250"/>
<hw-‐property
name="dstIP"
hw-‐class="node-‐dstIP"
value="10.0.0.14"/>
</deployment>
PPM Example: Application deployment!
synchro
PLL
FIFO
Process Process
31. Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 15/33!
• Each
process
is
implemented
as
a
thread
• Threads
allocated
to
sensor
nodes
according
to
applica?on
deployment
in
PPM
• Shared
objects
implemented
according
to
the
underlying
hardware
plaUorm
• FIFO_read
and
FIFO_write
primi?ves
replaced
by
API
func3on
calls
of
the
supported
communica?on
protocol
(i.e.
Linux
sockets
parameterized
with
the
UDP
protocol)
• Applica?on
Deployment
also
used
to
define
configura?on
parameters
for
the
communica?on
protocols
• Generated
code
is
implemented
using
re-‐targetable
template
files
• Portable
since
it
can
be
deployed
and
run
in
any
hardware
plaUorm
suppor?ng
Linux
sockets
PPM Example: Code Generation!
33. Abstract System Model (BIP)
Application
Software (PPM)
System Model (BIP)
modeling (1)
SMC
calibration (3)
Mapping/HW
information (PPM)
Sensor Network
HW
Specifications
(XML)
Sensor Network
Library Components
(BIP)
code generation (2)
analysis (4)
Sensor Network
C/C++ Code
Execution
Sensor Network/
HW Code
Templates
+Configurations
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 17/33!
Design flow for WSN Applications !
34. • BIP
(Behavior-‐Interac?on-‐Priority)
is
a
formal
language
for
the
hierarchical
construc?on
of
heterogeneous
real-‐?me
systems
• Provides
a
rich
set
of
tools
for
analysis
and
performance
evalua?on
B
E
H
A
V
I
O
R
Interactions (collaboration)!
Priorities (conflict resolution)!
The BIP component framework!
Composi?on
glue
Atomic
components
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 18/33!
35. BIP component example!
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 19/33!
• Atomic
component
modeling
the
PLL
process
36. BIP component example!
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 19/33!
• Atomic
component
modeling
the
PLL
process
• BIP
components:
transi?on
systems
enriched
with
data
and
func?ons
in
C/C++
37. BIP component example!
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 19/33!
• Atomic
component
modeling
the
PLL
process
• BIP
components:
transi?on
systems
enriched
with
data
and
func?ons
in
C/C++
• Interac?ons
used
to
transfer
data
between
components
38. BIP component example!
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 19/33!
• Atomic
component
modeling
the
PLL
process
• BIP
components:
transi?on
systems
enriched
with
data
and
func?ons
in
C/C++
• Interac?ons
used
to
transfer
data
between
components
• Priori?es
enforce
scheduling
policies
amongst
possible
interac?ons
CLK_REQ<CLK_RECV
39. The BIP component framework!
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 20/33!
• Func3onal
verifica3on
• BIP
state-‐space
explora3on
tool
used
to
verify
safety
requirements,
such
as
deadlock-‐freedom,
in
the
constructed
models
• Model
calibra3on
based
on
code
execu?on
in
the
target
HW
plaEorm
• HW/SW
dependent
constraints
injected
in
the
form
of
probabilis?c
distribu?ons
• Aims
in
obtaining
faithful
models
for
a
considered
system
• Performance
Analysis
of
applica?on
or
system-‐level
requirements
• Sta3s3cal
Model
Checking
(SMC)
tool
for
quan?ta?ve
verifica?on
• Results
provide
feedback
in
the
applica?on
design/development
phase
Supports:
40. Outline!
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 21/33!
1) Sensor
Networks:
Overview
and
Development
Challenges
2) Proposed
Design
Flow
• Modeling
the
Applica?on
So@ware
in
PPM
• Code
genera?on
in
Distributed
Sensor
Network
PlaEorms
• Background
on
BIP
3) Case
study:
Industrial
Mul?media
WSN
Applica?on
• Code
genera?on
from
the
PPM
Applica?on
Model
• Construc?on
of
the
System
Model
in
BIP
• BIP
System
Model
Calibra?on
4) Conclusion
and
ongoing
work
41. Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 22/33!
Case study: Industrial WMSN Application !
• Clock
Synchroniza?on
in
a
Mul?media
Wireless
Sensor
Network
(WMSN)
• Capturing
and
reproduc3on
of
synchronized
audio
data
in
the
sink
• Use
of
the
API
provided
by
the
Advanced
Linux
Sound
Architecture
(ALSA)
• Sender-‐to-‐receiver
synchroniza3on
Master Node
Slave Node
Slave Node
Access Point
(AP)
42. Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 22/33!
Case study: Industrial WMSN Application !
• Clock
Synchroniza?on
in
a
Mul?media
Wireless
Sensor
Network
(WMSN)
• Capturing
and
reproduc3on
of
synchronized
audio
data
in
the
sink
• Use
of
the
API
provided
by
the
Advanced
Linux
Sound
Architecture
(ALSA)
• Sender-‐to-‐receiver
synchroniza3on
• Snowball
SDK
plaEorm
configured
as
AP
in
the
WSN
(sta?c
ad-‐hoc
DHCP
server
capable
of
assigning
automa?cally
IP
addresses)
• 3
UDOO
plaEorms
automa?cally
connected
to
the
WSN
through
the
AP
(1
Master,
2
Slave
nodes)
• Master
UDOO
node
broadcasts
periodically
(T=5s)
a
?mestamp
frame
• Phase
Locked
Loop
(PLL)
synchroniza3on
technique
applied
in
the
slave
UDOO
nodes
to
construct
a
so6ware
clock
• The
so@ware
clock
follows
the
advance
of
the
Master
node’s
clock
and
maintains
a
rela?ve
offset
from
it
43. Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 23/33!
Case study: PPM Model!
44. Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 24/33!
Case study: WMSN Application deployment!
45. Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 25/33!
Case study: Abstract BIP System Model!
46. Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 26/33!
Case study: System Model Calibration!
48. Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 27/33!
Case study: Distribution fitting!
• Method
used
to
obtain
each
distribu?on:
• Special
case
of
model
fiYng
• Target
model
is
a
probability
distribu3on
• Relying
on
sta?s?cal
methods
in
order
learn
the
best
probability
distribu?on
that
fits
the
obtained
execu3on
data
49. Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 27/33!
Probability
distribu3on
(λdelay) Box-‐Whisker
plot
(λdelay)
Case study: Distribution fitting!
• Method
used
to
obtain
each
distribu?on:
• Special
case
of
model
fiYng
• Target
model
is
a
probability
distribu3on
• Relying
on
sta?s?cal
methods
in
order
learn
the
best
probability
distribu?on
that
fits
the
obtained
execu3on
data
50. Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 27/33!
Probability
distribu3on
(λdelay) Box-‐Whisker
plot
(λdelay)
Outliers
Mean
Case study: Distribution fitting!
• Method
used
to
obtain
each
distribu?on:
• Special
case
of
model
fiYng
• Target
model
is
a
probability
distribu3on
• Relying
on
sta?s?cal
methods
in
order
learn
the
best
probability
distribu?on
that
fits
the
obtained
execu3on
data
51. Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 28/33!
Case study: Analysis results!
• The
calibrated
BIP
system
model
was
used
for
tes?ng:
• Cri?cal
func?onal
and
non-‐func?onal
requirements,
such
as
buffer
u3liza3on
• The
synchroniza3on
accuracy
• We
have
expressed
the
following
proper?es:
1) What
is
the
probability
of
overflow/underflow
avoidance
in
the
transmission/recep?on
buffers
of
the
considered
WMSN
Applica?on?
2) Is
the
achieved
synchroniza?on
accuracy
1μs?
52. • Focus:
Es?ma?on
of
the
probability
for
overflow/underflow
in
the
transmission/recep?on
buffers
of
the
system
• The
property
is
expressed
as:
1) φ1
=
(size(Sbuffer)
<
MAX),
where
MAX=400
2)
φ2
=
(size(Mbuffer)
>
0)
Property 1: Buffer utilization!
P(φ1)
Case study: Property verification!
P(φ2)
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 29/33!
53. Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 30/33!
Case study: Property verification!
Property 2: Synchronization accuracy!
• Focus:
Difference
between
the
Master
and
the
Slave
so6ware
clock
should
be
bounded
by
a
non-‐nega?ve
number
∆
• The
property
is
expressed
as:
φ3
=
(|(θM
−
θS
)
−
A|
<
∆)
• A
is
a
fixed
offset
between
the
Master
and
each
Slave’s
so@ware
clock
54. Property 2: Synchronization accuracy!
System ModelGenerated code
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 30/33!
Case study: Property verification!
• Focus:
Difference
between
the
Master
and
the
Slave
so6ware
clock
should
be
bounded
by
a
non-‐nega?ve
number
∆
• The
property
is
expressed
as:
φ3
=
(|(θM
−
θS
)
−
A|
<
∆)
• A
is
a
fixed
offset
between
the
Master
and
each
Slave’s
so@ware
clock
55. System Model
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 30/33!
Here
A=100μs
• For
Δ=1μs
φ3
is
not
sa?sfied
• For
Δ=76μs
φ3
is
sa3sfied
Case study: Property verification!
Property 2: Synchronization accuracy!
• Focus:
Difference
between
the
Master
and
the
Slave
so6ware
clock
should
be
bounded
by
a
non-‐nega?ve
number
∆
• The
property
is
expressed
as:
φ3
=
(|(θM
−
θS
)
−
A|
<
∆)
• A
is
a
fixed
offset
between
the
Master
and
each
Slave’s
so@ware
clock
56. Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 30/33!
Here
A=100μs
• For
Δ=1μs
φ3
is
not
sa?sfied
• For
Δ=76μs
φ3
is
sa3sfied
• Also
observed
from
the
results
of
the
generated
code
Generated code
Case study: Property verification!
Property 2: Synchronization accuracy!
• Focus:
Difference
between
the
Master
and
the
Slave
so6ware
clock
should
be
bounded
by
a
non-‐nega?ve
number
∆
• The
property
is
expressed
as:
φ3
=
(|(θM
−
θS
)
−
A|
<
∆)
• A
is
a
fixed
offset
between
the
Master
and
each
Slave’s
so@ware
clock
57. Conclusions!
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 31/33!
• Fully-‐fledged
design
flow
for
the
development
of
func?onal
distributed
sensor
applica?ons
• Automated
Code
Genera3on
and
Performance
Analysis
using
as
input:
• Applica?on
So@ware
described
in
PPM
(XML
format
with
reference
to
C/C++
func3ons)
• Hardware
specifica?on
(for
the
network
configura3on)
• Mapping
specifica?on
(for
the
applica3on
deployment)
• We
have
applied
it
in
a
Wireless
Mul?media
Sensor
Network
(WMSN)
Applica?on
and
our
experiments
focused
on:
• Buffer
u3liza3on
• Synchroniza3on
accuracy
• Results
provide
feedback
for
the
proper
configura?on
of
similar
applica?ons
58. Perspectives!
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 32/33!
• Adapt
the
design
flow
for
lower
resource
consump3on
hardware
plaUorms,
which
use
dedicated
opera?ng
systems
(e.g.
TinyOS,
Con3ki
OS)
• Low
amount
of
data
supported
in
each
packet
• Packet
fragmenta?on
may
lead
to:
1) Collisions
in
the
MAC
layer
2) Frequent
packet
losses
• Mechanisms
to
improve
clock
synchroniza3on
• Reduc?on
of
the
rela?ve
offset
between
the
Slave
so@ware
clock
and
the
Master
clock
by
oscilla3ng
the
transmission
frequency
of
the
Master’s
3mestamp
• High
frequency
rate
may
lead
to
higher
energy
consump3on
• Possible
change
of
the
Kalman
filter
algorithm
will
be
considered
59. Questions?!
Thank you for your attention.!
Further details: alexios.lekidis@imag.fr!
Lekidis et al.! Building Distributed Sensor Network Applications using BIP! 33/33!