Wireless sensor networks use multiple sensor nodes that communicate wirelessly to monitor environments. Each node contains sensors to capture phenomena, processing capabilities, and wireless communication. Common sensor types include temperature, pressure, optical, acoustic, and chemical sensors. Challenges for wireless sensor networks include limited energy, decentralized operation, and security. Example applications are structural health monitoring, traffic control, and precision agriculture.
Medium Access Control :-
1.Distributed Operation
2.Synchronization
3.Hidden Terminals
4.Exposed terminals
5.Throughput
6.Access delay
7.Fairness
8.Real-time Traffic support
9.Resource reservation
10.Ability to measure resource availability
11.Capability for power control
Adaptive rate control
Use of directional antennas
How to put these nodes together to form a meaningful network.
How a network should function at high-level application scenarios .
On the basis of these scenarios and optimization goals, the design of networking protocols in wireless sensor networks are derived
A proper service interface is required and integration of WSNs into larger network contexts.
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...Sagar Rai
Software, Software Defined Network, Network Function Virtualization, SDN, NFV, Internet of things, Basics of Internet of things, Network Basics, Virtualization, Limitation of Conventional Network, Open flow, Basics of conventional network,
Medium Access Control :-
1.Distributed Operation
2.Synchronization
3.Hidden Terminals
4.Exposed terminals
5.Throughput
6.Access delay
7.Fairness
8.Real-time Traffic support
9.Resource reservation
10.Ability to measure resource availability
11.Capability for power control
Adaptive rate control
Use of directional antennas
How to put these nodes together to form a meaningful network.
How a network should function at high-level application scenarios .
On the basis of these scenarios and optimization goals, the design of networking protocols in wireless sensor networks are derived
A proper service interface is required and integration of WSNs into larger network contexts.
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...Sagar Rai
Software, Software Defined Network, Network Function Virtualization, SDN, NFV, Internet of things, Basics of Internet of things, Network Basics, Virtualization, Limitation of Conventional Network, Open flow, Basics of conventional network,
Introduction to basics of wireless networks such as
• Radio waves & wireless signal encoding techniques
• Wireless networking issues & constraints
• Wireless internetworking devices
Universal mobile telecommunication System (UMTS) is actually the third generation mobile, which uses WCDMA. The Dream was that 2G and 2.5G systems are incompatible around the world.
-Worldwide devices need to have multiple technologies inside of them, i.e. tri-band phones, dual-mode phones
To develop a single standard that would be accepted around the world.
-One device should be able to work anywhere.
Increased data rate.
- Maximum 2048Kbps
UMTS is developed by 3GPP (3 Generation Partnership Project) a joint venture of several organization
3G UMTS is a third-generation (3G): broadband, packet-based transmission of text, digitized voice, video, multimedia at data rates up to 2 Mbps
Also referred to as wideband code division multiple access(WCDMA)
Allows many more applications to be introduce to a worldwide
Also provide new services like alternative billing methods or calling plans.
The higher bandwidth also enables video conferencing or IPTV.
Once UMTS is fully available, computer and phone users can be constantly attached to the Internet wherever they travel and, as they roam, will have the same set of capabilities.
Single node architecture: hardware and software components of a sensor node - WSN
Network architecture: typical network architectures-data relaying and aggregation strategies -
MAC layer protocols: self-organizing, Hybrid TDMA/FDMA and CSMA based MAC- IEEE
802.15.4
Introduction to basics of wireless networks such as
• Radio waves & wireless signal encoding techniques
• Wireless networking issues & constraints
• Wireless internetworking devices
Universal mobile telecommunication System (UMTS) is actually the third generation mobile, which uses WCDMA. The Dream was that 2G and 2.5G systems are incompatible around the world.
-Worldwide devices need to have multiple technologies inside of them, i.e. tri-band phones, dual-mode phones
To develop a single standard that would be accepted around the world.
-One device should be able to work anywhere.
Increased data rate.
- Maximum 2048Kbps
UMTS is developed by 3GPP (3 Generation Partnership Project) a joint venture of several organization
3G UMTS is a third-generation (3G): broadband, packet-based transmission of text, digitized voice, video, multimedia at data rates up to 2 Mbps
Also referred to as wideband code division multiple access(WCDMA)
Allows many more applications to be introduce to a worldwide
Also provide new services like alternative billing methods or calling plans.
The higher bandwidth also enables video conferencing or IPTV.
Once UMTS is fully available, computer and phone users can be constantly attached to the Internet wherever they travel and, as they roam, will have the same set of capabilities.
Single node architecture: hardware and software components of a sensor node - WSN
Network architecture: typical network architectures-data relaying and aggregation strategies -
MAC layer protocols: self-organizing, Hybrid TDMA/FDMA and CSMA based MAC- IEEE
802.15.4
DSP- use of digital processing, such as by computers or more specialized digital signal processors,to perform a wide variety of signal processing operations.
A to D Convertors
work to convert analog (continuous, infinitely variable) signals to digital (discrete-time, discrete-amplitude) signals. In more practical terms, an ADC converts an analog input, such as a microphone collecting sound, into a digital signal.
Wireless energy meter monitoring with automated tariff calculationUdayalakshmi JK
Electricity billing has become a difficult task. The board has to make regular visit to the consumers house to make the reading. Also it can cause manual error. Now here we are monitoring the energy meter with modern techniques. The total energy consumed by the consumer and the consumption cost is known to the consumer and to the board by means of a hand held device.
One of the most helpful presentation for academic and non academic purpose. This presentation can be presented for 40-45 mins. It contains both technical and non technical details of working of a fingerprint bio-metric scanner.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
2. Sensing and Sensors
• Sensing: technique to gather information about physical objects or areas
• Sensor (transducer): object performing a sensing task; converting one
form of energy in the physical world into electrical energy
• Examples of sensors from biology: the human body
– eyes: capture optical information (light)
– ears: capture acoustic information (sound)
– nose: captures olfactory information (smell)
– skin: captures tactile information (shape, texture)
– SENSING(DATA AQUISTION)
3. • Sensors capture phenomena in the physical world (process, system, plant)
• Signal conditioning prepare captured signals for further use (amplification,
attenuation, filtering of unwanted frequencies, etc.)
• Analog-to-digital conversion (ADC) translates analog signal into digital signal
• Digital signal is processed and output is often given (via digital-analog
converter and signal conditioner) to an actuator (device able to control the
physical world)
• SENSOR CLASSIFICATION
• Physical property to be monitored determines type of required sensor
• Temperature - -Thermistors, thermocouples
• Pressure -Pressure gauges, barometers, ionization gauges
• Optical -Photodiodes, phototransistors, infrared sensors,
CCD sensors
• Acoustic -Piezoelectric resonators, microphones
• Mechanical -Strain gauges, tactile sensors, capacitive
diaphragms, piezoresistive cells
• Motion, vibration Accelerometers, mass air flow sensors
4. • Position GPS, ultrasound-based sensors, infrared-based
sensors, inclinometers
• Electromagnetic Hall-effect sensors, magnetometers
• Chemical pH sensors, electrochemical sensors, infrared gas
sensors
• Humidity Capacitive and resistive sensors, hygrometers,
MEMS-based humidity sensors
• Radiation Ionization detectors, Geiger-Mueller counters
• Power supply:
– active sensors require external power, i.e., they emit energy (microwaves,
light, sound) to trigger response or detect change in energy of transmitted
signal (e.g., electromagnetic proximity sensor)
– passive sensors detect energy in the environment and derive their power
from this energy input (e.g., passive infrared sensor)
• Electrical phenomenon:
– resistive sensors use changes in electrical resistivity (ρ) based on physical
properties such as temperature (resistance R = ρ*l/A)
– capacitive sensors use changes in capacitor dimensions or permittivity (ε)
based on physical properties (capacitance C = ε*A/d)
5. – inductive sensors rely on the principle of inductance (electromagnetic force
is induced by fluctuating current)
– piezoelectric sensors rely on materials (crystals, ceramics) that generate a
displacement of charges in response to mechanical deformation
WIRELESS SENSOR NETWORKS
• Multiple sensors (often hundreds or thousands) form a network to
cooperatively monitor large or complex physical environments
• Acquired information is wirelessly communicated to a base station (BS), which
propagates the information to remote devices for storage, analysis, and
processing
6. WSN COMMUNICATION
• Characteristics of typical WSN:
– low data rates (comparable to dial-up modems)
– energy-constrained sensors
• IEEE 802.11 family of standards
– most widely used WLAN protocols for wireless communications in
general
– can be found in early sensor networks or sensors networks without
stringent energy constraints
• IEEE 802.15.4 is an example for a protocol that has been designed
specifically for short-range communications in WSNs
– low data rates
– low power consumption
– widely used in academic and commercial WSN solutions
• Star topology:
– every sensor communicates directly (single-hop) with the base station
– may require large transmit powers and may be infeasible in large
geographic areas
7. • Mesh topology
– sensors serve as relays (forwarders) for other sensor nodes (multi-hop)
– may reduce power consumption and allows for larger coverage
– introduces the problem of routing
CHALLENGES IN WSN
Energy
Self management
Wireless networks
Decentralization
Design constraints
Security
8. NODE ARCHITECTURE
Wireless sensor nodes are the essential building blocks in a wireless sensor
network
sensing, processing, and communication
stores and executes the communication protocols as well as data processing
algorithms
The node consists of sensing, processing, communication, and power
subsystems . Trade-off between flexibility and efficiency – both in terms of
energy and performance
9. SENSING SUBSYSTEM – ADC
ADC converts the output of a sensor - which is a continuous, analog signal - into a
digital signal. It requires two steps:
1. the analog signal has to be quantized
allowable discrete values is influenced :
(a) by the frequency and magnitude of the signal
(b) by the available processing and storage resources
2. the sampling frequency
Nyquist rate does not suffice because of noise and transmission error
resolution of ADC - an expression of the number of bits that can be used to
encode the digital output
where Q is the resolution in volts per step (volts per output code);
Epp is the peak-to-peak analog voltage; M is the ADC’s resolution in
bits
10. PROCESSING SUB SYSTEM
The processor subsystem
interconnects all the other subsystems and some additional peripheries
its main purpose is to execute instructions pertaining to
sensing, communication, and self-organization
It consists of processor chip ,nonvolatile memory - stores program
instructions ,active memory - temporarily stores the sensed data and internal
clock
ARCHITECTURAL OVERVIEW
The processor subsystem can be designed by employing one of the three basic
computer architectures
Von Neumann architecture
Harvard architecture
Super-Harvard (SHARC) architecture
11. MICROCONTROLLER
STRUCTURE
Integrates the following components:
CPU core ,volatile memory (RAM) for data storage , ROM, EPROM, EEPROM, or
flash memory ,parallel I/O interfaces ,discrete input and output bits
clock generator , one or more internal analog-to-digital converters and
Serial communications interfaces
Advantages:
suitable for building computationally less intensive, standalone applications,
because of its compact construction, small size, low-power consumption,
and low cost
high speed of the programming and eases debugging, because of the use of
higher-level programming languages
Disadvantages:
not as powerful and as efficient as some custom-made processors (such as
DSPs and FPGAs)
some applications (simple sensing tasks but large scale deployments) may
prefer to use architecturally simple but energy- and cost-efficient
processors
12. DIGITAL SIGNAL PROCESSOR
The main function:
process discrete signals with digital filters
filters minimize the effect of noise on a signal or enhance or modify the
spectral characteristics of a signal
while analog signal processing requires complex hardware components,
digital signal processors (DSP) requires simple adders, multipliers, and delay
circuits
DSPs are highly efficient
most DSPs are designed with the Harvard Architecture
Advantages:
powerful and complex digital filters can be realized with commonplace DSPs
useful for applications that require the deployment of nodes in harsh
physical settings (where the signal transmission suffers corruption due to
noise and interference and, hence, requires aggressive signal processing)
Disadvantage:
some tasks require protocols (and not numerical operations) that require
periodical upgrades or modifications (i.e., the networks should support
flexibility in network reprogramming)
13. ASIC is an IC that can be customized for a specific application
Two types of design approaches: full-customized and half-customized
full-customized IC:
some logic cells, circuits, or layout are custom made in order to optimize
cell performance
includes features which are not defined by the standard cell library
expensive and long design time
half-customized ASICs are built with logic cells that are available in the standard
library
in both cases, the final logic structure is configured by the end user - an ASIC is
a cost efficient solution, flexible, and reusable
Advantages:
relatively simple design; can be optimized to meet a specific customer demand
multiple microprocessor cores and embedded software can be designed in a
single cell
Disadvantage:
high development costs and lack of re-configurability
Application-specific Integrated Circuit
14. APPLICATIONS
ASICs are not meant to replace microcontrollers or DSPs but to complement
them
Handle rudimentary and low-level tasks and to decouple these tasks from the
main processing subsystem
FIELD PROGRAMMABLE GATE ARRAYS
The distinction between ASICs and FPGAs is not always clear
FPGAs are more complex in design and more flexible to program
FPGAs are programmed electrically, by modifying a packaged part
programming is done with the support of circuit diagrams and hardware
description languages, such as VHDL and Verilog
Advantages:
higher bandwidth compared to DSPs
flexible in their application
support parallel processing
work with floating point representation
greater flexibility of control
Disadvantages:
complex
the design and realization process is costly
15. COMMUNICATION INTERFACES
• SERIAL PERIPHERAL INTERFACE
high-speed, full-duplex synchronous serial bus and does not have an official
Standard , but use of the SPI interface should conform to the implementation
specification of others - correct communication
The SPI bus defines four pins:
MOSI (Master Out / Slave In),MISO (Master In/Slave Out),SCLK (Serial Clock) and
CS (Chip Select) - communicate via the CS port
Both master and slave devices hold a shift register
Every device in every transmission must read and send data
SPI supports a synchronous communication protocol
The master and the slave must agree on the timing
Master and slave should agree on two additional parameters
clock polarity (CPOL) - defines whether a clock is used as high- or low-active
clock phase (CPHA) - determines the times when the data in the registers is
allowed to change and when the written data can be read
16. OPERATING SYSTEM
An operating System is
a thin software layer
resides between the hardware and the application layer
provides basic programming abstractions to application developers
Its main task is to enable applications to interact with hardware resources
Operating systems are classified as: single-task/multitasking and single-
user/multiuser operating systems
multi-tasking OS - the overhead of concurrent processing because of the
limited resources
single task OS - tasks should have a short duration
The choice of a particular OS depends on several factors; typically functional
and non-functional aspects
17. FUNCTIONAL ASPECTS
• DATA TYPES
• Interactions between the different subsystems take place through:
well-formulated protocols
data types
Complex data types have strong expression power but consume resources - struct
and enum
Simple data types are resource efficient but have limited expression capability - C
programming language
SCHEDULING
queuing-based scheduling
FIFO - the simplest and has minimum system overhead, but treats tasks
unfairly
sorted queue - e.g., shortest job first (SJF) - incurs system overhead (to
estimate execution duration)
round-robin scheduling
a time sharing scheduling technique
several tasks can be processed concurrently
Regardless of task, a scheduler can be pre emptive or non pre emptive
18. HANDLING INTERRUPTS
An interrupt is an asynchronous signal generated by
a hardware device
several system events
OS itself
An interrupt causes:
the processor to interrupt executing the present instruction
to call for an appropriate interrupt handler
Interrupt signals can have different priority levels, a high priority interrupt can
interrupt a low level interrupt
Interrupt mask: let programs choose whether or not they wish to be
interrupted
• MULTI THREADING
A thread is the path taken by a processor or a program during its execution
Multi-threading - a task is divided into several logical pieces
scheduled independent from each other
executed concurrently
Two advantages of a multi-threaded OS:
1. tasks do not block other tasks
2. short-duration tasks can be executed along with long-duration tasks
19. Threads cannot be created endlessly
the creation of threads slows down the processor
no sufficient resources to divide
The OS can keep the number of threads to a manageable size using a thread pool
Advantage:
a thread blocked can be suspended while other tasks are executed in
different threads
Disadvantages:
must carefully protect shared data structures with locks
use condition variables to coordinate the execution of threads
In event-based programming: use events and event handlers
event-handlers register with the OS scheduler to be notified when a named
event occurs
a loop function:
polls for events
calls the appropriate event-handlers when events occur
An event is processed to completion unless its handler reaches at a blocking
operation (callback and returns control to the scheduler)
20. MEMORY ALLOCATION
Memory can be allocated to a program:
statically - a frugal approach, but the requirement of memory must be
known in advance
memory is used efficiently
runtime adaptation is not allowed
dynamically - the requirement of memory is not known in advance (on
a transient basis)
enables flexibility in programming
but produces a considerable management overhead
Non-Functional Aspects
Separation of Concern, System Overhead , Portability, Dynamic
Reprogramming
• PROTOTYPES
TinyOS , SOS , Contiki and LiteOS
21. APPLICATIONS
• STRUCTURAL MONITORING
• HEALTH CARE
• TRAFFIC CONTROL
• PIPELINE MONITORING
• MANY DEFENCE APPLICATIONS
• PRECISION AGRICULTURE
• ACTIVE VOLCANO
• UNDERGROUND MINING
22. TRAFFIC CONTROL
Inductive loops (in-road sensing devices)
advantages:
unaffected by weather
provide direct information (few ambiguity)
how does it work: using Faraday’s induction law
a coil of wire (several meters in diameter, passes an electric current
through the coil)
buried under the road and connected to a roadside control box
magnetic field strength can be induced as a result of a current and
the speed and the size of passing vehicles
MAGNETIC SENSORS
Magnetic sensors can determine the direction and speed of a vehicle
a moving vehicle can disturb the distribution of the magnetic field
by producing its own magnetic field
by cutting across it
23. The magnitude and direction of the disturbance depends on
the speed, size, density and permeability of the vehicle
Classification of magnetic sensors:
low field ( below 1µGauss)
medium field ( between 1µGauss and 10µGauss)
high field ( above 10µGauss)
24. Almost all road vehicles contain a large mass of steel or aluminium
The magnetic permeability of steel is much higher than the surrounding air
Steel has the capacity to concentrate the flux lines of the Earth’s magnetic field
The concentration of magnetic flux varies as the vehicle moves; it can be
detected from a distance of up to 15m
The field variation reveals a detailed magnetic signature
It is possible to distinguish between different types of vehicles
The node consists of
two AMR magnetic sensors to detect vehicular activities
by observing the disturbance in the Earth’s magnetic field the
vehicular creates
the vehicle pulls field lines away from the sensor when it approaches it
• then towards the sensor when it drives away from it
a temperature sensor to monitor road condition (snow, ice, or water)
To measure the speed of a vehicle, the node waits until it detects an excursion
from the predefined baseline and then starts sampling at a frequency of 2KHz
two AMR magnetic sensors are placed one at the front of the node and the
other at the back - they are shifted in time