The document summarizes a presentation on reliable and energy-efficient communication in wireless sensor networks. The presentation covered wireless sensor network applications and requirements, experimentation platforms for wireless sensor network research, and research on traffic-adaptive MAC protocols, adaptive forward error correction, and TCP performance optimizations for wireless sensor networks. It provided examples and results from experiments conducted on a wireless sensor network testbed.
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...IJNSA Journal
Next generation network will consist of different types of wireless networks like WSN, Wi-Fi, WiMAX, UMTS, LTE and etc. Wireless Sensor Network (WSN) finds unique and special application as compared to the said networks because sensors are deployed in a very secret, awkward and hostile environment like battle field etc. Various wireless sensor nodes are interconnected and form a Wireless Sensor Network. Sensor nodes once deployed in a region, can’t be repaired thus the power system deployed in the nodes becomes a major key issue i.e. how long its battery life can be utilised. Another major issue of WSN is to have a more secured network which is a function of hash keys. Increase usage of hash key means enhanced security but at the cost of power and area. Sensor systems must utilize the minimal possible energy while operating over secured and wide range of operating scenarios. In this paper, we have proposed a novel ID matching mechanism that uses a Bloom filter to realize wake-up wireless communication. Paper uses hash function for uniquely recognizing particular sensor- node- cluster among all clusters. Paper also shows the effect of number of hash functions on performance of wireless sensor node. The design and implementation of a wireless wake-up receiver module simulation reveals
that proposed model consume 724nW dynamic power and with bloom filter, the proposed model consumes dynamic power 85% less than the consumption cited in “Takiguchi” model[1]. Dynamic power is further reduced by 10% when parallel processing is implemented. Finally paper provides a novel approach to save the dynamic power and subsequently increases the battery life of wireless sensor node and network as a whole.
Survey of Wireless Sensor Network Applicationijsrd.com
Sensor networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and, at the same time, offer numerous challenges due to their peculiarities, primarily the stringent energy constraints to which sensing nodes are typically subjected. The distinguishing traits of sensor networks have a direct impact on the hardware design of the nodes at least four levels: power source, processor, communication hardware, and sensors. Various hardware platforms have already been designed to test the many ideas spawned by the re-search community and to implement applications to virtually all fields of science and technology. We are convinced that CAS will be able to provide a substantial contribution to the development of this exciting field. A wireless sensor network (WSN) has important applications such as remote environmental monitoring and target tracking. This has been enabled by the availability, particularly in recent years, of sensors that are smaller, cheaper, and intelligent. These sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the application's design objectives, cost, hardware, and system constraints. The goal of our survey is to present a comprehensive review of the recent literature since the publication of [I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, 2002]. Following a top-down approach, we give an overview of several new applications and then review the literature on various aspects of WSNs. We classify the problems into three different categories: (1) Internal platform and underlying operating system, (2) Communication protocol stack, and (3) Network services, provisioning, and deployment. We review the major development in these three categories and outline new challenges.
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
A data dissemination protocol for wireless sensor networks has been engaged for modifying configuration fields and circulating management controls to the mote. Earlier, a data dissemination protocol faces the henceforth two consequences. First, they are works on sink based model; only the sink can circulate data item to other motes. Such model is not suitable for large user wireless sensor networks. Second, those protocols are not provide with any security and hence intruders will make problems to misuse the network. We provided the seDrip protocol. It allows the network mentors to authorize multiple network uses with various permissions to simultaneously and directly distributed data items to the mote. seDrip is implemented in an laboratory of network restricted resources mote to depict its large capability in practice.
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networkscscpconf
A cellular network is an asymmetric radio network which is made up of fixed transceivers or
nodes, maintain the signal while the mobile transceiver which is using the network is in the
vicinity of the node. An ad-hoc network is a local area network (LAN) that is built
spontaneously as devices connect.
Instead of relying on a base station to coordinate the flow of messages to each node in the
network, the individual network nodes forward packets to and from each other.
This paper focuses on various issues in cellular, adhoc and sensor network. As issues proves helpful for forthcoming research, this paper work as a backbone to elaborate the various research areas.
Research Challenges and Characteristic Features in Wireless Sensor NetworksEswar Publications
Wireless Sensor Networks have come to the forefront of the scientific community recently and it consists of small nodes with sensing, Communications and computing capabilities. The Wireless Sensor Network Systems can be applied to monitor different environments ranging from military to civil applications. It is observed that different protocols necessary for smooth functioning of the network system are highly application specific. Current WSNs typically communicate directly with a centralized controller or satellite. In this paper we survey the different research challenges in Wireless Sensor Networks and purpose of various research Challenges activities is the development of a framework, which is radically simplifies the development of software for sensor network applications and characteristic Features of Sensor Networks.
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...IJNSA Journal
Next generation network will consist of different types of wireless networks like WSN, Wi-Fi, WiMAX, UMTS, LTE and etc. Wireless Sensor Network (WSN) finds unique and special application as compared to the said networks because sensors are deployed in a very secret, awkward and hostile environment like battle field etc. Various wireless sensor nodes are interconnected and form a Wireless Sensor Network. Sensor nodes once deployed in a region, can’t be repaired thus the power system deployed in the nodes becomes a major key issue i.e. how long its battery life can be utilised. Another major issue of WSN is to have a more secured network which is a function of hash keys. Increase usage of hash key means enhanced security but at the cost of power and area. Sensor systems must utilize the minimal possible energy while operating over secured and wide range of operating scenarios. In this paper, we have proposed a novel ID matching mechanism that uses a Bloom filter to realize wake-up wireless communication. Paper uses hash function for uniquely recognizing particular sensor- node- cluster among all clusters. Paper also shows the effect of number of hash functions on performance of wireless sensor node. The design and implementation of a wireless wake-up receiver module simulation reveals
that proposed model consume 724nW dynamic power and with bloom filter, the proposed model consumes dynamic power 85% less than the consumption cited in “Takiguchi” model[1]. Dynamic power is further reduced by 10% when parallel processing is implemented. Finally paper provides a novel approach to save the dynamic power and subsequently increases the battery life of wireless sensor node and network as a whole.
Survey of Wireless Sensor Network Applicationijsrd.com
Sensor networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and, at the same time, offer numerous challenges due to their peculiarities, primarily the stringent energy constraints to which sensing nodes are typically subjected. The distinguishing traits of sensor networks have a direct impact on the hardware design of the nodes at least four levels: power source, processor, communication hardware, and sensors. Various hardware platforms have already been designed to test the many ideas spawned by the re-search community and to implement applications to virtually all fields of science and technology. We are convinced that CAS will be able to provide a substantial contribution to the development of this exciting field. A wireless sensor network (WSN) has important applications such as remote environmental monitoring and target tracking. This has been enabled by the availability, particularly in recent years, of sensors that are smaller, cheaper, and intelligent. These sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the application's design objectives, cost, hardware, and system constraints. The goal of our survey is to present a comprehensive review of the recent literature since the publication of [I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, 2002]. Following a top-down approach, we give an overview of several new applications and then review the literature on various aspects of WSNs. We classify the problems into three different categories: (1) Internal platform and underlying operating system, (2) Communication protocol stack, and (3) Network services, provisioning, and deployment. We review the major development in these three categories and outline new challenges.
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
A data dissemination protocol for wireless sensor networks has been engaged for modifying configuration fields and circulating management controls to the mote. Earlier, a data dissemination protocol faces the henceforth two consequences. First, they are works on sink based model; only the sink can circulate data item to other motes. Such model is not suitable for large user wireless sensor networks. Second, those protocols are not provide with any security and hence intruders will make problems to misuse the network. We provided the seDrip protocol. It allows the network mentors to authorize multiple network uses with various permissions to simultaneously and directly distributed data items to the mote. seDrip is implemented in an laboratory of network restricted resources mote to depict its large capability in practice.
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networkscscpconf
A cellular network is an asymmetric radio network which is made up of fixed transceivers or
nodes, maintain the signal while the mobile transceiver which is using the network is in the
vicinity of the node. An ad-hoc network is a local area network (LAN) that is built
spontaneously as devices connect.
Instead of relying on a base station to coordinate the flow of messages to each node in the
network, the individual network nodes forward packets to and from each other.
This paper focuses on various issues in cellular, adhoc and sensor network. As issues proves helpful for forthcoming research, this paper work as a backbone to elaborate the various research areas.
Research Challenges and Characteristic Features in Wireless Sensor NetworksEswar Publications
Wireless Sensor Networks have come to the forefront of the scientific community recently and it consists of small nodes with sensing, Communications and computing capabilities. The Wireless Sensor Network Systems can be applied to monitor different environments ranging from military to civil applications. It is observed that different protocols necessary for smooth functioning of the network system are highly application specific. Current WSNs typically communicate directly with a centralized controller or satellite. In this paper we survey the different research challenges in Wireless Sensor Networks and purpose of various research Challenges activities is the development of a framework, which is radically simplifies the development of software for sensor network applications and characteristic Features of Sensor Networks.
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORijcsa
Intrusion Detection is one of the methods of defending against these attacks. In the proposed a security protocol for homogeneous wireless sensor network; network with all nodes are of same type. Clustering is used to improve the energy efficiency. Zone-Based Cluster Protocol (ZBCA) is used for selection of cluster head which is effective in scalability and energy consumption. Single hop technique is used for
communication within normal nodes and cluster head to base station. Simulation of proposed algorithm is performed in MATLAB. Sleep Deprivation Attack has been analyzed where attacker changes the environmental values by an artificial event. Attacker produces an event in environment due to which nodes have to sense the environment more than once in the same round that increase the power consumption of
the node. This interrupt reduces the network life time as nodes are not allowed to go in sleep mode and they are not able to perform their function of data collection and reporting to Cluster head and Base Station properly. Proposed protocol identifies this attack and prevents it from happening by solating the attacker node.
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor NetworksIJERA Editor
Wireless Sensor Networks (WSNs) consist of smallnodes with sensing, computation and wireless
communicationscapabilities. These sensor networks interconnect a several othernodes when established in large
and this opens up severaltechnical challenges and immense application possibilities.These wireless sensor
networks communicate using multi-hopwireless communications, regular ad hoc routing techniquescannot be
directly applied to sensor networks domain due tothe limited processing power and the finite power available
toeach sensor nodes hence recent advances in wireless sensornetworks have developed many protocols
depending on theapplication and network architecture and are specificallydesigned for sensor networks where
energy awareness is anessential consideration. This paper presents routingprotocols for sensor networks and
compares the routingprotocols that are presently of increasing importance.
In this paper, we propose Hybrid Routing Protocol whichcombines the merits of proactive and reactive approach
andovercome their demerits.
ANALYTICAL STUDY FOR MEASURING THE ELECTROMAGNETIC RADIATION OF THE GSM SYSTE...IJCNCJournal
This paper discusses three subjects. In the first section Study And Evaluation Of Mobile Network While in
the second section, Radiated Power Density ability of cellular stations. In the third section compare the
results with the International Standards and safety limits recommended by the ICNIRP to ensure
compliance with the terms and the extent of their impact on human health, on the other hand, through the
results of theoretical analysis and benchmark Mathematical Analysis And Practical Measurement.
Popularity of ubiquitous computing increases the importance of location-aware applications,
which increases the need for finding location of the user. In this paper, we present a novel localization method
for indoor environments using Wi-Fi infrastructure.
While localization using Wi-Fi is cost effective, handling the obstructions which are the main cause of
signal propagation error in indoor environments is a challenging task. We address this problem in two levels,
resulting in increased accuracy of localization. In the first level, we "localize" the residing area of user node in
coarse granularity. Then, we use building layout to find the objects that attenuate the signal between the
reference node and the coarse estimate of the location of user node. Using multi-wall propagation model, we
apply corrections for all obstructions and find the location of user node. Empirical results based on experiments
conducted in lab-scale, shows meter-level accuracy.
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSijwmn
Several researches are focused on the QoS (Quality of Service) and Energy consumption in wireless Multimedia Sensor Networks. Those research projects invest in theory and practice in order to extend the spectrum of use of norms, standards and technologies which are emerged in wireless communications.
The performance of these technologies is strongly related to domains of use and limitations of their characteristics. In this paper, we give a comparison of ZigBee technology, most widely used in sensor networks, and UWB (Ultra Wide Band) which presents itself as competitor that present in these work better results for audiovisual applications with medium-range and high throughput.
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
Reliability in data collection for wireless sensor networks is one of the major problems in IoT applications. Sensor nodes are usually placed in harsh conditions where data communication is at risk of losing packets. Retransmissions are considered costly in terms of delay and power consumptions, especially that wireless sensor nodes are battery operated. In this context we introduce SR-Code, a novel network coding algorithm that achieves reliability in harsh conditions. SR-Code utilizes the XOR operator to code overheard packets. The targeted network topology is a 2-tier network where data loss can occur in all tiers. SR-Code utilizes bit addresses where each node is identified by a single bit in an address bit vector. Identifying packets and computing the cardinality of coded messages can be easily done using address bit vectors. SR-Code realizes redundancy as a function of overheard packet. SR-Code achieved a reliability factor of 75% when the number of packets lost was 100% of the original (un-coded) packet sent.
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...CSCJournals
Mobile Next Generation Network (MNGN) is characterized as heterogeneous network where variety of access technologies are meant to coexist. Decisions on choosing an air interface that meets a particular need at a particular time will be shifted from the network’s side to (a more intelligent) user’s side. On top of that network operators and regularities have come to the realization that assigned spectrum bands are not utilized as they should be. Cognitive radio stands out as a candidate technology to address many emerging issues in MNGN such as capacity, quality of service and spectral efficiency. As a transmission strategy, cognitive radio systems depend greatly on sensing the radio environment. In this paper, we present a novel approach for interference characterization in cognitive radio networks based on wideband chirp signal. The results presented show that improved sensing accuracy is maintained at tolerable system complexity.
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Next generation 5G wireless solutions need to meet the anticipated demands of Machine-to-Machine (M2M) communications in the 2020 era with the total number of devices expected to be about 50 billion for a projected population of around 8 billion according to an Ericsson report. M2M applications can be classified into two categories: Low-cost wide-area and low-latency ultra-reliable M2M. Low-cost wide-area M2M communication requires simple hardware architecture, integration of significant energy efficiency methods and energy harvesting technologies, and enhanced coverage, for such applications as smart metering, fire alarms, sensor networks. Despite LTE enhancements proposed for this class of M2M, however, LTE is not expected to be dominantly used in the near future due to its low coverage and high cost equipment, according to Cisco VNI Mobile, 2015. More research is needed to natively include this M2M class in 5G networks. On the other hand, low-latency ultra-reliable M2M communication requires satisfying strict delay constraint and ultra-high reliability of such applications as platooning of vehicles, robotic control and interaction, remote health care. Controlling the elements in our environment based on the data provided from these machines in this class of M2M applications requires a paradigm shift for control and communication systems with novel strategies for their joint design in beyond 5G networks.
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORijcsa
Intrusion Detection is one of the methods of defending against these attacks. In the proposed a security protocol for homogeneous wireless sensor network; network with all nodes are of same type. Clustering is used to improve the energy efficiency. Zone-Based Cluster Protocol (ZBCA) is used for selection of cluster head which is effective in scalability and energy consumption. Single hop technique is used for
communication within normal nodes and cluster head to base station. Simulation of proposed algorithm is performed in MATLAB. Sleep Deprivation Attack has been analyzed where attacker changes the environmental values by an artificial event. Attacker produces an event in environment due to which nodes have to sense the environment more than once in the same round that increase the power consumption of
the node. This interrupt reduces the network life time as nodes are not allowed to go in sleep mode and they are not able to perform their function of data collection and reporting to Cluster head and Base Station properly. Proposed protocol identifies this attack and prevents it from happening by solating the attacker node.
A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor NetworksIJERA Editor
Wireless Sensor Networks (WSNs) consist of smallnodes with sensing, computation and wireless
communicationscapabilities. These sensor networks interconnect a several othernodes when established in large
and this opens up severaltechnical challenges and immense application possibilities.These wireless sensor
networks communicate using multi-hopwireless communications, regular ad hoc routing techniquescannot be
directly applied to sensor networks domain due tothe limited processing power and the finite power available
toeach sensor nodes hence recent advances in wireless sensornetworks have developed many protocols
depending on theapplication and network architecture and are specificallydesigned for sensor networks where
energy awareness is anessential consideration. This paper presents routingprotocols for sensor networks and
compares the routingprotocols that are presently of increasing importance.
In this paper, we propose Hybrid Routing Protocol whichcombines the merits of proactive and reactive approach
andovercome their demerits.
ANALYTICAL STUDY FOR MEASURING THE ELECTROMAGNETIC RADIATION OF THE GSM SYSTE...IJCNCJournal
This paper discusses three subjects. In the first section Study And Evaluation Of Mobile Network While in
the second section, Radiated Power Density ability of cellular stations. In the third section compare the
results with the International Standards and safety limits recommended by the ICNIRP to ensure
compliance with the terms and the extent of their impact on human health, on the other hand, through the
results of theoretical analysis and benchmark Mathematical Analysis And Practical Measurement.
Popularity of ubiquitous computing increases the importance of location-aware applications,
which increases the need for finding location of the user. In this paper, we present a novel localization method
for indoor environments using Wi-Fi infrastructure.
While localization using Wi-Fi is cost effective, handling the obstructions which are the main cause of
signal propagation error in indoor environments is a challenging task. We address this problem in two levels,
resulting in increased accuracy of localization. In the first level, we "localize" the residing area of user node in
coarse granularity. Then, we use building layout to find the objects that attenuate the signal between the
reference node and the coarse estimate of the location of user node. Using multi-wall propagation model, we
apply corrections for all obstructions and find the location of user node. Empirical results based on experiments
conducted in lab-scale, shows meter-level accuracy.
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSijwmn
Several researches are focused on the QoS (Quality of Service) and Energy consumption in wireless Multimedia Sensor Networks. Those research projects invest in theory and practice in order to extend the spectrum of use of norms, standards and technologies which are emerged in wireless communications.
The performance of these technologies is strongly related to domains of use and limitations of their characteristics. In this paper, we give a comparison of ZigBee technology, most widely used in sensor networks, and UWB (Ultra Wide Band) which presents itself as competitor that present in these work better results for audiovisual applications with medium-range and high throughput.
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
Reliability in data collection for wireless sensor networks is one of the major problems in IoT applications. Sensor nodes are usually placed in harsh conditions where data communication is at risk of losing packets. Retransmissions are considered costly in terms of delay and power consumptions, especially that wireless sensor nodes are battery operated. In this context we introduce SR-Code, a novel network coding algorithm that achieves reliability in harsh conditions. SR-Code utilizes the XOR operator to code overheard packets. The targeted network topology is a 2-tier network where data loss can occur in all tiers. SR-Code utilizes bit addresses where each node is identified by a single bit in an address bit vector. Identifying packets and computing the cardinality of coded messages can be easily done using address bit vectors. SR-Code realizes redundancy as a function of overheard packet. SR-Code achieved a reliability factor of 75% when the number of packets lost was 100% of the original (un-coded) packet sent.
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...CSCJournals
Mobile Next Generation Network (MNGN) is characterized as heterogeneous network where variety of access technologies are meant to coexist. Decisions on choosing an air interface that meets a particular need at a particular time will be shifted from the network’s side to (a more intelligent) user’s side. On top of that network operators and regularities have come to the realization that assigned spectrum bands are not utilized as they should be. Cognitive radio stands out as a candidate technology to address many emerging issues in MNGN such as capacity, quality of service and spectral efficiency. As a transmission strategy, cognitive radio systems depend greatly on sensing the radio environment. In this paper, we present a novel approach for interference characterization in cognitive radio networks based on wideband chirp signal. The results presented show that improved sensing accuracy is maintained at tolerable system complexity.
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Next generation 5G wireless solutions need to meet the anticipated demands of Machine-to-Machine (M2M) communications in the 2020 era with the total number of devices expected to be about 50 billion for a projected population of around 8 billion according to an Ericsson report. M2M applications can be classified into two categories: Low-cost wide-area and low-latency ultra-reliable M2M. Low-cost wide-area M2M communication requires simple hardware architecture, integration of significant energy efficiency methods and energy harvesting technologies, and enhanced coverage, for such applications as smart metering, fire alarms, sensor networks. Despite LTE enhancements proposed for this class of M2M, however, LTE is not expected to be dominantly used in the near future due to its low coverage and high cost equipment, according to Cisco VNI Mobile, 2015. More research is needed to natively include this M2M class in 5G networks. On the other hand, low-latency ultra-reliable M2M communication requires satisfying strict delay constraint and ultra-high reliability of such applications as platooning of vehicles, robotic control and interaction, remote health care. Controlling the elements in our environment based on the data provided from these machines in this class of M2M applications requires a paradigm shift for control and communication systems with novel strategies for their joint design in beyond 5G networks.
SYSTEM ANALYSIS AND DESIGN Assignment helpjohn mayer
SYSTEM ANALYSIS AND DESIGN Assignment help services at Globalwebtutors are available 24/ by online SYSTEM ANALYSIS AND DESIGN experts , SYSTEM ANALYSIS AND DESIGN tutors are available for instant SYSTEM ANALYSIS AND DESIGN questions help , SYSTEM ANALYSIS AND DESIGN writers can help you with complex SYSTEM ANALYSIS AND DESIGN dissertation requirements.
PROJECT DESCRIPTION
DOWNLOAD
The main objective of this project is to develop a device for wireless power transfer. The concept of wireless power transfer was realized by Nikolas tesla. Wireless power transfer can make a remarkable change in the field of the electrical engineering which eliminates the use conventional copper cables and current carrying wires.
Based on this concept, the project is developed to transfer power within a small range. This project can be used for charging batteries those are physically not possible to be connected electrically such as pace makers (An electronic device that works in place of a defective heart valve) implanted in the body that runs on a battery.
The patient is required to be operated every year to replace the battery. This project is designed to charge a rechargeable battery wirelessly for the purpose. Since charging of the battery is not possible to be demonstrated, we are providing a DC fan that runs through wireless power.
This project is built upon using an electronic circuit which converts AC 230V 50Hz to AC 12V, High frequency. The output is fed to a tuned coil forming as primary of an air core transformer. The secondary coil develops a voltage of HF 12volt.
Thus the transfer of power is done by the primary(transmitter) to the secondary that is separated with a considerable distance(say 3cm). Therefore the transfer could be seen as the primary transmits and the secondary receives the power to run load.
Moreover this technique can be used in number of applications, like to charge a mobile phone, iPod, laptop battery, propeller clock wirelessly. And also this kind of charging provides a far lower risk of electrical shock as it would be galvanically isolated.
Ultra-Reliable Networks – A Mobile Operator Perspective3G4G
Presented by Critical Communications World, Amsterdam – June 2nd 2016 by Mansoor Hanif, Director of Radio Access Networks, EE
*** Shared with permission ***
discuss about System system analysis, system design, system analyst's role, Development of System through analysis, SDLC, Case Tools of SAD, Implementation, etc.
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksIDES Editor
The Wireless Sensor Networks (WSN) is
considered to be one of the most promising emerging
technologies. However one of the main constraints which
is holding back its wide range of applications is the
battery life of the sensor node and thus effecting the
network life. A new approach to this problem has been
presented in this paper. The proposed method is suitable
for event driven applications where the event occurrence
is very rare. The system uses spread spectrum as a means
of communication.
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...IDES Editor
A reliable routing protocol for wireless sensor
networks (WSN) should be capable of adjusting to
constantly varying network conditions while conserving
maximum power. Existing Routing protocols provide
reliability at the cost of high energy consumption. In this
paper, we propose to develop an Adaptive Energy Efficient
Reliable Routing Protocol (AEERRP) with the aim of
keeping the energy consumption low while achieving high
reliability. In our proposed protocol, the data forwarding
probability is adaptively adjusted based on the measured
loss conditions at the sink. So only for high loss rates, a node
makes use of high transmission power to arrive at the sink.
Whenever the loss rate is low, it adaptively lessens the
transmission power. Since the source rebroadcasts the data,
until the packet loss is minimized, high data reliability is
achieved. By simulation results we show that the proposed
protocol achieves high reliability while ensuring low energy
consumption and overhead.
The development of the wireless sensor networks (WSNs) in various applications like Defense, Health,
Environment monitoring, Industry etc. always attract many researchers in this field. WSN is the network
which consists of collection of tiny devices called sensor nodes. Sensor node typically combines wireless
radio transmitter-receiver and limited energy, restricted computational processing capacity and
communication band width. These sensor node sense some physical phenomenon using different
transduces. The current improvement in sensor technology has made possible WSNs that have wide and
varied applications. While selecting the right sensor for application a number of characteristics are
important. This paper provides the basics of WSNs including the node characteristics. It also throws light
on the different routing protocols.
In recent years, many of the bridges are monitored using non-destructive testing methods. These methods are used for checking the structural damage, wreckage, strength of the bridges. To reduce the human losses, economic losses, protect the strength and structure of bridge we are introducing a smart bridge monitoring using sensors where it gives high and low values depending upon the problem occurred in the bridge. Now a day we are in hike of power supply, so we are using Wireless Sensor Networks (WSN) technology for regular monitoring of the bridge which consumes less power with accurate values. This project describes the real time working and getting real time values. Outcome of the project is to bring a product based module. R. Dhivya Devi | S. Dinesh | S. Gowri Shankar | K. Ravi Teja"Pontem Monitoring using IoT" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11517.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/11517/pontem-monitoring-using-iot/r-dhivya-devi
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
Data transmission occurs from transmitting node to sink node, which communicate each other via large number of intermediate nodes or directly to an external base station. A network consists of numbers of nodes with one as a source and one or more as a destination node.
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor NetworksIDES Editor
In wireless sensor networks (WSN), data fusion
should be energy efficient. But, determining the optimal
number of aggregators in an energy efficient manner is a
challenging task. Moreover, the existing data fusion
techniques mostly use the same path for transmitting
aggregated data to the sink which reduces the nodes lifetime.
In this paper, we propose a technique which combines energy
efficiency and multiple path selection for data fusion in WSN.
The network is partitioned into various clusters and the node
with highest residual energy is selected as the cluster head.
The sink computes multiple paths to each cluster head for
data transmission. The distributed source coding and the
lifting scheme wavelet transform are used for compressing
the data at the CH. During each round of transmission, the
path is changed in a round robin manner, to conserve the
energy. This process is repeated for each cluster. From our
simulation results we show that this data fusion technique
has less energy consumption with increased packet delivery
ratio, when compared with the existing schemes.
Secured node detection technique based on artificial neural network for wirel...IJECEIAES
The wireless sensor network is becoming the most popular network in the last recent years as it can measure the environmental conditions and send them to process purposes. Many vital challenges face the deployment of WSNs such as energy consumption and security issues. Various attacks could be subjects against WSNs and cause damage either in the stability of communication or in the destruction of the sensitive data. Thus, the demands of intrusion detection-based energy-efficient techniques rise dramatically as the network deployment becomes vast and complicated. Qualnet simulation is used to measure the performance of the networks. This paper aims to optimize the energy-based intrusion detection technique using the artificial neural network by using MATLAB Simulink. The results show how the optimized method based on the biological nervous systems improves intrusion detection in WSN. In addition to that, the unsecured nodes are affected the network performance negatively and trouble its behavior. The regress analysis for both methods detects the variations when all nodes are secured and when some are unsecured. Thus, Node detection based on packet delivery ratio and energy consumption could efficiently be implemented in an artificial neural network.
Optimized Projected Strategy for Enhancement of WSN Using Genetic AlgorithmsIJMER
This paper put forward a new strategy for selecting the most favorable cluster head in Stable
Election Protocol (SEP). The planned approach selects a node as cluster head if it has the maximum
energy among all the available nodes in that particular cluster. It considers diverse nodes and divides
nodes among normal, transitional and advance nodes. To handle the heterogeneity of the nodes, different
optimized probability density functions are selected. First node dead time explain the network stability
period and last node dead explain the overall network lifetime. The main pressure is to increase the time
when first node dies and also when last node dies. The projected strategy is designed and implemented in
the Matlab using mathematics toolbox. The projected algorithm is also compared with the some prominent
protocols like leach, E-LEACH, SEP and extended SEP
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...IJEEE
This paper reviews medium access control
(MAC) in wireless sensor network (WSN),and different
management methods to save energy.MAC protocol
controls how sensors access a shared radio channel to
communicate with neighbours.
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
Similar to Reliable and Energy-Efficient Communication in Wireless Sensor Networks (20)
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 4
Reliable and Energy-Efficient Communication in Wireless Sensor Networks
1. Computer Science Colloquium
Western Michigan University
Reliable and Energy-Efficient
Communication in
Wireless Sensor Networks
Torsten Braun, Universität Bern, Switzerland
braun@iam.unibe.ch, cds.unibe.ch
joint work with Philipp Hurni
2. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Overview
> Introduction
— Wireless Sensor Network Applications and Application Requirements
— Design, Implementation, Evaluation of WSN Protocols
> Experimentation Platform for WSN Research
— Wireless Sensor Network Testbed
— Software-Based Estimation of Energy Consumption
> WSN Research Experiments
— Traffic-Adaptive and Energy-Efficient WSN MAC Protocol
— Adaptive Forward Error Control in WSNs
— TCP Performance Optimizations for WSNs
> Conclusions
Kalamazoo, June 13, 2012 2
3. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Wireless Sensor Network Applications
> Monitoring and control of buildings using sensor nodes and
artificial neural networks
Markus Wälchli, Torsten Braun:
Building Intrusion Detection with a
Wireless Sensor Network, ICST
AdHocNets, Niagara Falls, 2009
Kalamazoo, June 13, 2012 3
4. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Wireless Sensor Network Applications
> Environmental monitoring (A4-Mesh, a4-mesh.unibe.ch)
Plaine Morte glacier
Tseuzier
storage lake
Sierre
Sion
Almerima Jamakovic, Torsten Braun,
Thomas Staub, Markus Anwander:
Authorisation and Authentication
Mechanisms in Support of Secure
Access to WMN Resources,
IEEE HotMesh, San Francisco,
June 2012
Kalamazoo, June 13, 2012 4
5. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Application Requirements
> Energy-efficient operation
> Low delays
> Reliability
> Adaptivity to varying link characteristics and traffic load
Kalamazoo, June 13, 2012 5
6. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Design, Implementation, and Evaluation
of Wireless Sensor Network Protocols
> Simulations are only meaningful with accurate calibration of
parameters, e.g., energy consumption, transmission
characteristics, traffic models.
> Experiments in testbeds give insights about protocol behaviour
in more realistic scenarios and system-related issues,
but face several problems
— Experiment control
— Scalability
— Reproducability
— Energy measurements
— Mobility
Kalamazoo, June 13, 2012 6
8. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Wisebed WSN Testbed @ Universität Bern
> Wisebed: EU FP7 project, 2008 - 2011
> Approx. 50 TelosB/MSB430 nodes connected to portal via Ethernet
USB Mesh Node Internet
LAN
wireless
Ethernet
Portal
Sensor Node
Kalamazoo, June 13, 2012 8
9. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
TARWIS Experiment Configuration
Kalamazoo, June 13, 2012 9
10. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
TARWIS Experiment Monitoring
Kalamazoo, June 13, 2012 10
11. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
TARIWS-Generated Experiment Trace
Kalamazoo, June 13, 2012 11
13. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Software-Based Estimation of
Energy Consumption
> Problem:
Equipment of sensor nodes with measurement hardware is
— very expensive.
— difficult in out-door environments / real-world deployments.
— not sufficient to support energy awareness.
– Energy awareness: Application / system adapts operation to meet
energy consumption constraints.
> Solution:
Software-based energy measurement
(calibration of software-based model using measurement
hardware)
Kalamazoo, June 13, 2012 13
14. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Hardware-Based Energy Measurements
> Measurement of current draw and voltage using
Sensor Network Management Devices (SNMD) from KIT
Kalamazoo, June 13, 2012 14
15. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Simple 3-State-Model
A. Dunkels, F. Osterlind, N. Tsiftes, Z. He: Software-based On-line Energy Estimation for Sensor Nodes. IEEE EmNets, 2007
Kalamazoo, June 13, 2012 15
16. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Measured vs. Estimated Energy Consumption
Approach: Measurement of current draw in different states and energy estimation by
Kalamazoo, June 13, 2012 16
17. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
3-State-Model with State Transitions
Revised estimation:
Kalamazoo, June 13, 2012 17
18. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Estimation Accuracy
OLS: Ordinary Least Squares Regression Analysis
On the Accuracy of Software-based Energy Estimation Techniques. Philipp Hurni, Torsten Braun, Benjamin Nyffenegger,
Anton Hergenroeder: 8th European Conference on Wireless Sensor Networks (EWSN), Bonn, Germany, February 2011.
Kalamazoo, June 13, 2012 18
20. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
WiseMAC
> Very energy-efficient MAC protocol, but adaptivity to traffic
variation is very limited.
> Unsynchronized nodes wakeup for a short time
> Tpreamble = min {4θL,T}
— θ: clock drift, L: time since last update, T: duration of a cycle
> „Piggybacking― of wakeup times
Enz et al.: WiseNET: An Ultralow-Power Wireless Sensor Network
Solution, IEEE Computer, Vol. 37, No. 8; August 2004
Kalamazoo, June 13, 2012 20
21. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
MaxMAC: a Maximally Traffic-Adaptive
and Energy-Efficient WSN MAC Protocol
> is based on sampling of preambles, cf. WiseMAC
> Additional wakeups for higher rates of received packets
(measurement by sliding window)
— Periodic reports in acknowledgements from receiver to sender
— State transitions if thresholds T1,T2,TCSMA are exceeded.
packet rate ≥ T1 packet rate ≥ T2 packet rate ≥ TCSMA
S1 S2
Base CSMA
2* 4*
state duty duty
RECV
cycle cycle
packet rate < T1 packet rate < T2 packet rate < TCSMA
Lease expired Lease expired Lease expired
Kalamazoo, June 13, 2012 21
22. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
MaxMAC
CSMA
Philipp Hurni and Torsten Braun. MaxMAC: a maximally traffic-adaptive MAC protocol for wireless sensor networks.
7th European Conference on Wireless Sensor Networks (EWSN), Coimbra, Portugal, February 2010.
Kalamazoo, June 13, 2012 22
23. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
MaxMAC Implementation on MSB430
> Threshold parameters: T1 = 1, T2 = 2, TCSMA = 3 packets / s
> Base duty cycle: 0.6 % (3 ms) for a base interval of 500 ms
> Frame size: 40 bytes including header
> Lease times: 3 s
> Bit rate: 19.2 kbps
> Implementation of packet burst mode
Kalamazoo, June 13, 2012 23
24. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Experiments with Intruder Scenario I
WiseMAC
MaxMAC
CSMA
Kalamazoo, June 13, 2012 24
25. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Experiments with Intruder Scenario II
Kalamazoo, June 13, 2012 25
27. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Error Control in Wireless Sensor Networks
> Wireless channels in sensor networks have varying bit error
rates, sometimes up to 20 %.
> Options
— Automatic Repeat Request (ARQ)
– Retransmission adds delay.
– Original transmission was useless, but consumed bandwidth and
energy.
— Forward Error Correction (FEC)
– Relatively small delay (due to encoding and decoding) compared to
ARQ for error correction
– En-/decoding can be costly (several 100 ms for decoding).
– Too strong codes consume computing resources and bandwidth.
– Too weak codes might not be able to correct errors.
> Proposed Approach: Adaptive FEC
Kalamazoo, June 13, 2012 27
28. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Implementation of FEC Library
> Repetition Code
> Hamming Code
> Double Error Correction Triple Error Detection (DECTED)
> Bose-Chaudhuri-Hocquengham (BCH)
Kalamazoo, June 13, 2012 28
29. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Adaptive FEC
> Stateful Adaptive FEC (SA)
— Selection of current code dependent on success of previous
transmission (next higher / lower level)
— Quick adaptation
> Stateful History Adaptive (SHA)
— History of last transmissions (here: 5)
— For successful/failed transmissions: storage of next lower/higher level
— Selection of level with majority in history
— Reacts less quickly than SA-FEC
Philipp Hurni, Sebastian
> Stateful Sender Receiver Adaptive (SSRA) Barthlomé, Torsten Braun:
— Consideration of number of corrected bit errors Link-Quality Aware Run-Time
Adaptive Forward Error Correction
by receiver (to be reported in acknowledgement) Strategies in Wireless Sensor
Networks, submitted
(63,36)
Kalamazoo, June 13, 2012 29
30. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Energy Consumption by FEC and ARQ
> Additional power consumption by FEC
> In case of no FEC, MSB430 node can enter lower power mode
with Idefault
> Energy for encoding/decoding 32 bytes (30/100 ms): 0.95 mJ
> Energy for retransmission
Kalamazoo, June 13, 2012 30
31. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Wisebed Experiments
> Different link characteristics → Deployment of a single FEC
scheme would not be most efficient.
Kalamazoo, June 13, 2012 31
32. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Static vs. Adaptive FEC
> Better error correction performance of
adaptive FEC schemes than for static ones.
> Adaptive FEC advantages
— Lower processing and energy costs
— Lower bandwidth and lower interference
in multi-hop scenarios
— Higher packet delivery rate
— Adapt automatically to different
link characteristics
Kalamazoo, June 13, 2012 32
34. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Reasons for Poor TCP Performance in
Wireless Multi-Hop Networks
> Higher bit error rates and packet loss
> Underlying MAC protocols
(exponential back-off, hidden / exposed nodes)
> TCP end-to-end error and congestion control mechanisms
TCP data segment loss TCP acknowledgement loss
Kalamazoo, June 13, 2012 34
35. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Optimization of TCP in WSNs
> Distributed TCP Caching (Dunkels et al., 2004)
Adam Dunkels, Thiemo
Voigt, and Juan Alonso.
Making TCP/IP Viable for
Wireless Sensor Networks.
1st European Workshop on
Wireless Sensor Networks
(EWSN 2004)
> TCP Support for Sensor Networks (Braun et al., 2007)
Torsten Braun, Thiemo
Voigt, Adam Dunkels.
RCP Support for Sensor
networks. IEEE/IFIP
WONS 2007.
Kalamazoo, June 13, 2012 35
36. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Caching and Congestion Control (cctrl)
Module
> is aware of all TCP packets forwarded by a node by interception of
outbound packets.
> allocates buffer for 2 packets per TCP connection (1 for each direction,
µIP has max. 1 unacknowledged TCP data segment per connection)
Philipp Hurni, Ulrich Bürgi,
Markus Anwander, Torsten Braun:
TCP Performance Optimizations for
Wireless Sensor Networks,
9th European Conference on
Wireless Sensor Networks (EWSN),
Trento, Italy, February 2012
Kalamazoo, June 13, 2012 36
37. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
cctrl Functions
> Caching of
— complete TCP data segments and scheduling of retransmission timer
(RTO = 3 ∙ RTTestimated, RTTestimated = estimated RTT between
intermediate node and destination)
— TCP/IP header for TCP acknowledgements
> Local retransmission of TCP data segment (max. 3 attempts),
when RTO expires prior to TCP acknowledgement reception (a)
> Removal of TCP data segments, if acknowledgement number of TCP
acknowledgement > sequence number of cached TCP data segment
> For retransmitted TCP data segments, for which a TCP
acknowledgement has been received: discard TCP data segment;
regenerate TCP acknowledgement (b)
Kalamazoo, June 13, 2012 37
38. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Channel Activity Monitoring
> MAC proxy notifies cctrl upon reception of any packet and stores a
timestamp in activity history.
> cctrl continuously calculates channel activity level (= # overheard
packets by MAC proxy during the last time period RTTestimated)
> Observation:
— Channel activity level of most nodes = 0 during long idle periods
— Long idle periods by
– TCP data segment loss at one of the first hops
– TCP acknowledgement loss close to its destination
(i.e. TCP data segment’s source).
> Approach:
— Split RTO into:
– RTO1 = 3 ∙ RTTestimated ∙ 2/3
– RTO2 = 3 ∙ RTTestimated ∙ 1/3
— When RTO1 expires: early retransmission, if channel activity level = 0;
otherwise: retransmission when RTO2 expires.
— Triggers early local retransmissions close to destination
Kalamazoo, June 13, 2012 38
39. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Long Idle Periods
Kalamazoo, June 13, 2012 39
40. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Spatial Reuse by Multiple TCP Connections
Kalamazoo, June 13, 2012 40
41. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Testbed Experiments
> 7 TelosB nodes in different
rooms of a 3 floor building using
U Bern’s Wisebed testbed
> Receiver node 1
> Sender nodes 2-7
> Experiments with different
MAC protocols for 10 minutes,
15 repetitions
> 16 bytes payload
> 79 bytes per TCP data segment
> 63 bytes per TCP
acknowledgement
> Total: approx. 2500 experiments
during > 400 hours
Kalamazoo, June 13, 2012 41
42. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Overall Comparison of Throughput
Kalamazoo, June 13, 2012 42
43. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Overall Comparison of Energy Consumption
Kalamazoo, June 13, 2012 43
44. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Conclusions
> Contributions
— Design and experimental evaluation of energy-efficient, reliable, and
adaptive protocols
> Experiences: Development and use of WSN testbed resulted in
— More efficient use of hardware resources
— Testbed experiments as easy as simulations
— Repeatability and larger number of experiments
(statistical significance)
— Reproducability of experiments and results
> Outlook
— Integration of wireless mesh nodes into testbed architecture
— Mobility support
— Multimedia sensor networks
— Radio sensor networks
Kalamazoo, June 13, 2012 44
45. Torsten Braun: Reliable and Energy-Efficient Communication in Wireless Sensor Networks
Thanks for your attention !
> braun@iam.unibe.ch
> http://cds.unibe.ch
Kalamazoo, June 13, 2012 45