Free Essay

Wireless Sensor Network

In:

Submitted By razaa2248
Words 2659
Pages 11
Wireless Sensor Networks and Their Usage
Ali Raza,Shahid Rasheed & Shazib Javeed
University Of Central Punjab

Abstract
Innovations in industrial, home and automation in transportation represent smart environments. Wireless Sensor Networks (WSNs) provide a new paradigm for sensing and disseminating information from various environments, with the potential to serve many and diverse applications Networks (WSN), where thousands of sensors are deployed at different locations operating in different modes .WSN consists of a number of sensors spread across a geographical area; each sensor has wireless communication capability and sufficient intelligence for signal processing and networking of the data.
Wireless Sensor Networks (WSN) are used in variety of fields which includes military, healthcare, environmental, biological, home and other commercial applications. With the huge advancement in the field of embedded computer and sensor technology, Wireless Sensor Networks (WSN), which is composed of several thousands of sensor nodes which are capable of sensing, actuating, and relaying the collected information, have made remarkable impact everywhere?
Key Words
Wireless Sensor Network (WSNs)
Structural Health Monitoring (SHM)
Micro Electro-Mechanical Systems (MEMS)
Introduction
Sensor network is capable of sensing, processing and communicating which helps the base station or command node to observe and react according to the condition in a particular environment (physical, battle field, biological) . Sensor network protocols have a unique self-organizing capability. Another interesting feature of WSNs is that the sensor nodes cooperate with each other. Sensor nodes have an in-built processor, using which raw data are processed before transmission. These features facilitate wide range of applications of WSNs ranging from biomedical, environmental, military, event detection and vehicular telematics.
The sensors that, when distributed in the environment, comprise WSNs include cameras as vision sensors, microphones as audio sensors, and those capable of sensing ultrasound, infra-red, temperature, humidity, noise, pressure and vibration. Although the individual sensor’s sensing range is limited, WSNs can cover a large space by integrating data from many sensors. Diverse and precise information on the environment may thus be obtained. Sensor networks are an emerging computing platform consisting of large numbers of small, low-powered, wireless motes each with limited computation, sensing, and communication abilities. WSNs could potentially become a disruptive technology, for example because of social issues such as security and privacy, but the technological vision is for new and diverse types of applications for the social good. The environment can be monitored for fire-fighting, to detect marine ground floor erosion, and to study the effect of earthquake vibration patterns on bridges and buildings. Surveillance of many kinds can be supported, such as for intruder detection in premises. Wireless sensors can be embedded deeply within machinery, where wired sensors would not be feasible because: wiring would be too costly; could not reach the deeply embedded parts; would limit flexibility; would represent a maintenance problem; or would prevent mobility. Mobile items such as containers can be tagged, as can goods in a factory floor automation system. Smart price tags for foods could communicate with a refrigerator.

Working

Block diagram

Wireless Sensor Networks are collections of motes. Motes are the individual computers that work together to form networks. The requirements for motes are extensive. They must be small, energy efficient, multifunctional, and wireless. Collections of motes communicate with each other to reach a common goal. For example, if the goal is to collect information about the microclimates around all sections of redwoods in a forest, the motes are placed in the trees to form a network. Once placed, they collect and transmit data to each other, and eventually to a main computer.
How do motes communicate with each other?
Motes communicate with each other using radio transmitters and receivers. They form networks with other motes that change with the positions of the motes. They create links with each other in different configurations to maximize the performance for each mote. These links all lead to the “parent” mote, which transmits the information from each of the “child” motes to computer.

What safety mechanisms are in place?
In addition to communicating, motes also adapt to their situation. In the case of a malfunction the remaining motes will reform the network. For example, there are 500 motes in place around a system. If 20% or 100 motes die, the rest of the motes will reconfigure the network to continue working with the remaining 400. Furthermore, 400 motes will collect as much data as 400 scientists working non-stop for that period of time. The bigger problems that face these networks are people with destructive intentions, and the potential for motes to keep “working” while spitting out bad information. Corrupt data can sometimes be caught when the information is used and reread by humans, but the times that it goes unnoticed can slightly or significantly alter conclusions drawn from the data.
The threat of hackers is a serious problem because the operating system for the motes is an “open-source” system, which allows relatively easy access to codes. All security procedures will develop with the growth of the technology in response to a larger number of hackers. The harder people try to break the system, the more the system will be protected.
How do WSNs communicate with the user?
Wireless sensor networks communicate within themselves as well as with a user not necessarily near the network’s location. Wireless sensor networks collect data about what is happening, and perform some action according to that data, be it moving, setting off alarms, or simply recording the data. All of these actions change the world that the mote is in, causing other changes, and so on. Because of the connection between the motes, all of these changes affect each mote, and all of the data collected by the mote is routed to the parent mote. This parent mote is connected to a computer of higher power that performs a function for which the motes are not designed. One such function is to access the internet and transfer the motes’ data to the user’s computer. The user may also communicate with the motes. If the user gives some directives, the directives will be sent over the internet to the computer/station. The computer will communicate the same directives to the parent mote, which then disperses the message.
Construction of motes
Sensors:
When motes are under construction, their intended purpose often dictates the sensors that are added to the mote e.g temperature, moisture, and vibration sensors. These are fairly typical mote, but some motes have many more functions. There are motes that take photographs of the surroundings, sense motion, measure light intensity, and much more.
Power Source: The power source for the mote also depends the mote’s intended use. If the mote is designed to last a very long time, say one year, it will have a larger power source than a mote that is only meant to run for a month.
Radio:
The radio consists of a radio transmitter and a radio receiver. Both of these parts must exist for any mote to fully communicate with the other motes. The radio, when transmitting, receives information from the electronic brain and broadcasts the data to other motes according to the network connections. In the other direction, when receiving, the radio receives information from another mote’s radio and transmits it to the electronic brain.
The Electronic Brain:
It consists of a microprocessor and some flash memory. Many of them have connectors to add other processes and sensors with ease.
Challenges In WSNs.
Life Time
One of the main issues in sensor networks is network lifetime.With the available technology, the sensors are battery powered. Due to size and cost constraints, the energy available at each sensor for sensing and communications is limited and globally affects the application lifetime. A solution for mitigating the energy problem is to implement mechanisms for efficient energy management. One method is based on scheduling sensor activity so that for each sensor the active state, in which it actually performs its monitoring task alternates with a low-energy idle (sleep) state.
Flexibility
Sensor networks should be scalable, and they should be able to dynamically adapt to changes in node density and topology, like in the case of the self-healing minefields. In surveillance applications, most nodes may remain quiescent as long as nothing interesting happens. However, they must be able to respond to special events that the network intends to study with some degree of granularity.
In a self-healing minefield, a number of sensing mines may sleep as long as none of their peers explodes, but need to quickly become operational in the case of an enemy attack. Response time is also very critical in control applications (sensor/actuator networks) in which the network is to provide a delay-guaranteed service.
Maintenance
The only desired form of maintenance in a sensor network is the complete or partial update of the program code in the sensor nodes over the wireless channel. All sensor nodes should be updated, and the restrictions on the size of the new code should be the same as in the case of wired programming.
Data Collection
Data collection is related to network connectivity and coverage.
Communication
Most sensor networks use radio communication, even if alternative solutions are offered by laser and infrared.
Sensing
The high sampling rates of modern digital sensors are usually not needed in sensor networks. The power efficiency of sensors and their turn-on and turn-off time are much more important. Additional issues are the physical size of the sensing hardware, fabrication, and assembly compatibility with other components of the system.
Applications
HEALTHCARE APPLICATIONS
WSNs are very efficient in supporting various day-to-day applications. WSN based technologies have revolutionized home and elderly healthcare applications. Physiological parameters of patients can be monitored remotely by physicians and caretakers without affecting the patients’ activities. This has resulted in reduction of costs, improvement of equipment’s and better management of patients reaping huge commercial benefits. These technologies have significantly minimized human errors, allowed better understanding into origin of diseases and has helped in devising methods for rehabilitation, recovery and the impacts of drug therapy. Biological Task Mapping
WSNs find widespread applications in the area of biological sensing. Specifically, there is recent research going on in the concept of “labs on a chip”, supported by latest technologies like nano-techniques. The use of WSNs for biological applications have been accelerated due to the advancements in Micro Electro-Mechanical Systems (MEMS), embedded systems, microcontrollers and various wireless communication technologies.
Biomedical Signal Monitoring
WSNs have revolutionized the field of medicine in many ways. Telemedicine is the field which involves the treatment and care of patients from a distance and also aids in biomedical diagnosis. The application of WSNs has significantly improved this field. In this technique a mote is placed inside or around the desired body part and kept it under observation
COMMERCIAL APPLICATIONS
Some of the commercial applications of WSNs include vehicular monitoring, cultural property protection, event detection and structural health monitoring. These applications have a profound impact on ordinary day-to-day affairs.
Smart Parking
WSNs are widely used in the applications like intelligent parking for the purposes such as effective usage of existing parking lots instead of making expensive investments in new installations and to make provisions for coupling with cheap sensor nodes which can track the vehicles effectively. Existing solution for parking application uses magnetometers and video cameras. The detections of magnetometers are not very accurate as they are influenced by environmental factors. Video camera which is the alternate is expensive and it is not feasible to transmit large amount of data in a wireless environment through multiple hops. Another factor which affects the application of magnetometers and video cameras is that in a parking lot, apart from entry and exit of vehicles there may be other moving objects, which is a great challenge.
Monitoring of remote parking, mechanism for parking reservation and automated
Guidance is some of the latest features provided by the system. Modern vehicles.
Fuel efficiency and reduction in the weight of automotive can be achieved by replacing wired sensors and their cables with wireless sensors.
Event Detection
Tracking is a typical characteristic of wireless sensor networks, especially for instant tracking of events. Much work has been done in WSN, with sensor nodes having identical sensing units.
Structural Health Monitoring
The process of detection of damage for civil, aerospace and other engineering systems is referred to as Structural Health Monitoring (SHM). Any change in the material or geometric properties of these systems due to internal factors (aging) or external factors (natural calamities, pollution) is termed as damage. The normal operation of an SHM system includes low power, long-term monitoring of a structure to provide periodic updating of its health condition. However, during critical events such as earthquakes and other natural
Disasters, real-time rapid structural conditional screening can be done using SHM system.
ENVIRONMENTAL APPLICATIONS
Environmental applications include the monitoring of farms, green house, forest ,snow ,erosion phenomenon and flood warnings.
SEISMIC MONITORING: A promising application for underwater sensor networks is seismic monitoring for oil extraction from underwater fields. Frequent seismic monitoring is of importance in oil extraction .Terrestrial oil fields can be frequently monitored, with fields typically being surveyed annually, or quarterly in some fields, and even daily or continuously in some gas storage facilities and permanently instrumented fields. However, monitoring of underwater oil fields is much more challenging, partly because seismic sensors are not currently permanently deployed in underwater fields.
Greenhouse Monitoring
To ensure that the automation system in a greenhouse works properly, it is necessary to measure the local climate parameters at various points of observation in different parts of the big greenhouse. This work if done using a wired network will make the entire system clumsy and costly. However, a WSN based application for the same purpose using several small size sensor nodes equipped with radio would be a cost effective solution. Habitat Surveillance
WSNs find widespread application in habitat surveillance compared to other monitoring methods due to high deployment density and self-organization of the sensor nodes. The advantage with WSN is that the invisible placement of sensor nodes in the habitat does not leave any noticeable mark which might affect the behavior pattern of the inhabitants.
Tsunami Surveillance
WSNs system can be used to predict the tsuami.The buoyant sensor can be placed in remote locations,which will analyze the ocean waves. INDUSTRIAL APPLICATIONS
Nowadays, industrial applications are built on distributed architectures and they are required to be inexpensive, flexible and dependable. The system’s performance can be improved by interfacing sensors and actuators directly to the industrial communication network, as data and diagnostics can be made accessible to many systems and also shared on the web.
MILITARY APPLICATIONS
WSNs play a vital role in military Command, Control, Communications, Computing, Intelligence, Surveillance, Reconnaissance and Targeting (C4ISRT) systems. In the battlefield, the WSNs are prone to the attacks, where either the data or corrupting control devices are attacked, leading to large amount of energy consumption and finally to the exit of nodes from work. The energy efficiency of sensor nodes and the correct modeling of energy consumption are the research issues yet to be explored.
Conclusion
Advancement in the field of wireless communication has drastically changed our lives. Today we can’t even imagine to live without this technology. And the time is not far when this technology will replace the human services.
Acknowledgement
A highly gratitude to Dr.ir Nasir for their motivation and rendering their precious services to pen this paper . He kept an eagle eye and vigilantly usher’s us to make this paper unabridged.
References
[1] http://faculty.kfupm.edu.sa/COE/mayez/ps-coe499/project/Sensor-network/XSCALE-STARGATE/1-1-challenges-sensor-networks.pdf
[2] http://www.eecs.berkeley.edu/~binetude/work/reliable.pdf
[3] http://www.eecs.harvard.edu/~dbrooks/hempstead_JOLPE08.pdf
[4] http://www.eecis.udel.edu/~fei/reading/070426.wsn.security.survey.pdf

Similar Documents

Free Essay

Wireless Sensor Networks

...SECURE ROUTING IN WIRELESS SENSOR NETWORKS By [Name] The Name of the Class (Course) Professor (Tutor): The Name of the School (University): The City and State The Date: Abstract. Wireless sensor networks (WSANs) are a group of sensors and actors that are linked by a wireless medium for the purpose of performing distributed sensing and action on a given task. This involves the sensors collecting information about the surrounding physical environment and sending the information to the actors which take the decisions and perform some needed action basing on the information received from the sensors about the surrounding environment. These sensor networks are sometimes referred to as wireless sensor and actuator networks. They monitor physical or environmental conditions such as sound, pressure, temperature among others and send the collected data to the required location. Effective sensing and acting requires a distributed local coordination methods and mechanism among the sensors and the actors in addition to this, sensor data should be valid in order for right and timely actions to be performed. This paper describes secure routing in wireless sensor networks and outlines its threats on security. Keywords: Wireless sensor and actor networks; Actuators; Ad hoc networks; Sybil attack; Real-time communication; Sinkhole; Routing; MAC; adversary. Introduction With the recent rapid improvement on technology, many networking technologies have been created to make...

Words: 5106 - Pages: 21

Free Essay

Routing in Wireless Sensor Networks

...Routing in Wireless Sensor Networks: application on Fire Detection Abstract: this paper is about fire detection in building using a modified APTEEN routing protocol. Here we design a system called iFireControl which is a smart detection system for buildings, which is more water efficient than many current systems, while keeping its robustness. introduction A Wireless Sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants and to cooperatively pass their data through the network to a main location. The more modern networks are bi-directional, also enabling control of sensors activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; nowadays such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, Agriculture, Area Monitoring, Smart Home Monitoring, Seismic Monitoring etc. Wireless Sensor Networks provide a bridge between the real physical and virtual worlds; allow the ability to observe the previously unobservable at a fine resolution over large spatio-temporal scales. The WSN is built of “nodes” from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts: a...

Words: 4845 - Pages: 20

Free Essay

Prolonging the Lifetime of Wireless Sensor Network.

...INTRODUCTION Wireless Sensor Networks (WSNs) are distributed embedded systems composed of a large number of low- cost, low-power, multifunctional sensor nodes. The sensor nodes are small in size and communicate wirelessly in short distances. These tiny sensor nodes can perform sensing, data processing and communicating. They are densely deployed in the desired environment. A sensor network consists of multiple detection stations called sensor nodes, each of which is small, lightweight and portable. Every sensor node is equipped with a transducer, microcomputer, transceiver and power source. The transducer generates electrical signals based on sensed physical effects and phenomena. The microcomputer processes and stores the sensor output. The transceiver, which can be hard-wired or wireless, receives commands from a central computer and transmits data to that computer. The power for each sensor node is derived from the electric utility or from a battery. Sensors use a signal of some sort, from the environment and convert it to readable form for purpose of information transfer. Each sensor node has multiple modalities for sensing the environment such as acoustic, seismic, light, temperature, etc. However, each sensor can sense only one modality at a time. The sensor nodes in the target tracking WSN use collaboration with the neighboring nodes. This requires data exchange between sensor nodes over an ad hoc wireless network with no central coordination medium. There...

Words: 1981 - Pages: 8

Premium Essay

Wireless Sensor Network Case Study

...MAXIMIZATION IN WIRELESS SENSOR NETWORK USING NODE ENERGY BASED SCHEDULING METHOD Jency. J1,Anita Christy angelin2, 1PG Scholar/Department of CSE, Karunya University,Coimbatore-India. 2Assistant Professor/Department of CSE, Karunya University, Coimbatore-India. ---------------------------------------------------------------------------------------------------------------- Abstract—Wireless sensor networks consist of large number of battery powered wireless sensor nodes. A major key issue in WSNs is to reduce the energy consumption while maintaining the normal functions of WSNs. Many different methods are used to reduce the energy consumption in the wireless sensor networks. If the node is not able to send a packet to the...

Words: 2807 - Pages: 12

Free Essay

Simulation and Research on Data Fusion Algorithm of the Wireless Sensor Network Based on Ns2

...2009 World Congress on Computer Science and Information Engineering Simulation and Research on Data Fusion Algorithm of the Wireless Sensor Network Based on NS2 Junguo Zhang, Wenbin Li, Xueliang Zhao, Xiaodong Bai, Chen Chen Beijing Forestry University, 35 Qinghua East Road, Haidian District,Beijing, 100083 P.R.China information which processed by the embedded system to the user terminals by means of random selforganization wireless communication network through multi-hop relay. Thus it authentically achieves the purpose of ‘monitor anywhere and anytime’. The basic function of sensor network is gathering and sending back the information of the monitoring areas which the relevant sensor nodes are set in. But the sensor network node resources are very limited, which mainly embodies in battery capacity, processing ability, storage capacity, communication bandwidth and so on. Because of the limited monitoring range and reliability of each sensor, we have to make the monitoring areas of the sensor nodes overlapped when they are placed in order to enhance the robustness and accuracy of the information gathered by the entire network. In this case, certain redundancy in the gathered data will be inevitable. On the way of sending monitoring data by multi-hop relay to the sink nodes (or base stations) which are responsible to gather the data. It is necessary to reduce the redundant information by fusion processing. Data fusion is generally defined as a process...

Words: 3532 - Pages: 15

Free Essay

Hybrid Security Approach for Nodes Authentication in Wireless Sensor Network Using Cellular Automata

.... . . . . . . . . . . . 2 3 3 4 4 4 5 6 7 7 8 8 9 . . . . . . . . . . . . . . . . . . . 10 2 Introduction 3 Wireless Sensor Network 3.1 The Basics of WSN . . . . . . . . . . . . . . . . . . . . . . . . . . 3.1.1 3.1.2 3.1.3 3.2 3.3 3.4 Components of Sensor Nodes . . . . . . . . . . . . . . . . Key Features . . . . . . . . . . . . . . . . . . . . . . . . . Types of Sensor nodes . . . . . . . . . . . . . . . . . . . . Constraints in WSNs . . . . . . . . . . . . . . . . . . . . . . . . . Applications of WSN . . . . . . . . . . . . . . . . . . . . . . . . . Security Threats in WSN . . . . . . . . . . . . . . . . . . . . . . 4 Cellular Automata 4.1 Reversible Cellular Automata 5 Deployment issues in WSN with specific focus on authentication 5.1 5.2 Authentication of Cluster Head and Base Station . . . . . . . . . Authentication of Nodes . . . . . . . . . . . . . . . . . . . . . . . 12 13 13 14 15 15 15 16 6 Schemes as well as Supporting claims 6.1 6.2 6.3 Cloning attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . Replay Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Man-in-the-middle . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Conclusion List of Figures 1 2 3 4 5 Wireless sensor Network . . . . . . . . . . . . . . . . . . . . . . . Components of Sensor Nodes . . . . . . . . . . . . . . . . . . . . WSN with three types of sensor nodes . . . . . . . . . . . . . . . Elementary CA . . . . . . . . . . . . . . . . . . . . . . . . . . . . Reversible...

Words: 4368 - Pages: 18

Free Essay

Merger Integration at Boa

...Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks Dr. G. Padmavathi, Mrs. D. Shanmugapriya, Prof and Head, Dept. of Computer Science, Avinashilingam University for Women, Coimbatore, India, ganapathi.padmavathi@gmail.com Lecturer, Dept. of Information Technology, Avinashilingam University for Women, Coimbatore, India, ds_priyaa@rediffmail.com Abstract—Wireless Sensor networks (WSN) is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. One of the major challenges wireless sensor networks face today is security. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional security solutions unfeasible. The sensing technology combined with processing power and wireless communication makes it profitable for being exploited in great quantity in future. The wireless communication technology also acquires various types of security threats. This paper discusses a wide variety of attacks in WSN and their classification mechanisms and different securities available to handle them including the challenges faced. Keywords-Wireless Sensor Network; Security Security Attacks; Defensive mechanisms; Challenges ...

Words: 5174 - Pages: 21

Free Essay

Survey on Leach Protocols

...in Wireless Sensor Network 1st Bhavya R Patel, 2nd Jignesh patel 1st PG Student, 2nd Asst.Prof. 1st Computer Engineering, 2nd Computer Engineering S.R.Patel Engineering College, Unjha, Mehsana,India 1bhavyapatel9@gmail.com, 2 jigneshpatel.er@gmail.com __________________________________________________________________________________________________________ Abstract-Sensor webs consisting of nodes with limited battery power and wireless communications are deployed to collect useful information from the field. Gathering sensed information in an energy efficient manner is critical to operate the sensor network for a long period of time. A data collection problem is defined where, in a round of communication, each sensor node has a packet to be sent to the distant base station. If each node transmits its sensed data directly to the base station then it will deplete its power quickly. Since wireless communications consume significant amounts of battery power, sensor nodes should spend as little energy as possible receiving and transmitting data. It is necessary for communication protocols to maximize nodes' lifetimes, reduce bandwidth consumption by using local collaboration among the nodes, and tolerate node failures. Most of the work in energy efficient data gathering application is motivated by LEACH by allowing rotation of cluster head for load distribution. In this paper, we have presented several existing methods for energy efficient cluster head selection in wireless sensor...

Words: 2569 - Pages: 11

Free Essay

Accoustic Communication

...Acoustic Sensor Networks Ian F. Akyildiz, Dario Pompili, Tommaso Melodia Broadband & Wireless Networking Laboratory School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA 30332 Tel: (404) 894-5141 Fax: (404) 894-7883 e-mail:{ian, dario, tommaso}@ece.gatech.edu Abstract— Ocean bottom sensor nodes can be used for oceanographic data collection, pollution monitoring, offshore exploration and tactical surveillance applications. Moreover, Unmanned or Autonomous Underwater Vehicles (UUVs, AUVs), equipped with sensors, will find application in exploration of natural undersea resources and gathering of scientific data in collaborative monitoring missions. Underwater acoustic networking is the enabling technology for these applications. Underwater Networks consist of a variable number of sensors and vehicles that are deployed to perform collaborative monitoring tasks over a given area. In this paper, several fundamental key aspects of underwater acoustic communications are investigated. Different architectures for two-dimensional and three-dimensional underwater sensor networks are discussed, and the underwater channel is characterized. The main challenges for the development of efficient networking solutions posed by the underwater environment are detailed at all layers of the protocol stack. Furthermore, open research issues are discussed and possible solution approaches are outlined. I. I NTRODUCTION Ocean bottom sensor nodes are...

Words: 4664 - Pages: 19

Free Essay

Internet of Things

...the era of computing will be outside the realm of the traditional desktop. In the Internet of Things (IoT) paradigm, many of the objects that surround us will be on the network in one form or another. Radio Frequency IDentification (RFID) and sensor network technologies will rise to meet this new challenge, in which information and communication systems are invisibly embedded in the environment around us. This results in the generation of enormous amounts of data which have to be stored, processed and presented in a seamless, efficient, and easily interpretable form. This model will consist of services that are commodities and delivered in a manner similar to traditional commodities. Cloud computing can provide the virtual infrastructure for such utility computing which integrates monitoring devices, storage devices, analytics tools, visualization platforms and client delivery. The cost based model that Cloud computing offers will enable end-to-end service provisioning for businesses and users to access applications on demand from anywhere. Smart connectivity with existing networks and context-aware computation using network resources is an indispensable part of IoT. With the growing presence of WiFi and 4G-LTE wireless Internet access, the evolution towards ubiquitous information and communication networks is already evident. However, for the Internet of Things vision to successfully emerge, the computing paradigm will need to go beyond traditional mobile computing scenarios...

Words: 858 - Pages: 4

Premium Essay

Nt1310 Unit 1 Exercise 1

...Introduction: With the advances of micro electro mechanical system technology, wireless communications and digital electronics, Wireless Sensor Networks have been used in everywhere such as battlefield surveillance, environment supervision and traffic control has become a reality. Wireless Sensor Networks consist of large number of sensor nodes which collect and route data to the external sink with a certain transmission regulation. Due to the limitations of bandwidth memory and computing capability of such nodes the applied routing topology should ensure the minimization of energy consumption and hence maximization the lifetime of the network. When the energy is limited, our main aim is to find a route which can minimize the energy consumption...

Words: 924 - Pages: 4

Free Essay

Review

...REVIEW #1 This article is about the advancement of the Wireless Sensor Networks (WNSs). Their usage in various fields making them the most fast evolving technology. The wireless sensor network consist of a large number of sensor nodes, Sink and the Actuator. These sensor networks use broadcast communication paradigm but most of the networks depends on point-to-point communication. The sensor networks does not have a global identification because of large in number. The communication architecture of sensor networks has three phases 1. Sensor node 2.Sink 3.User. The sensor node collects data sends it to the sink, where the sink compute the data and finally sends it to the user. The design topology of sensor networks depends on the user requirement. The basic system consists of the power unit, processing unit, sensing unit and the transceiver. Depending on the requirement some other components can be added to the network which are like location finding system, mobilizer, power generator, etc. The design factors depend on 1.Fault Tolerance 2.Scalability 3.Production cost 4.Hardware Constraints 5.Sensor network Topology 6.Environment 7.Transmission Media 8.Poweer consumption. Depending on the network size and the requirements the cost of the network changes. The Transmission of data follows a different protocol stack which consist of different layers. Each of the layer is very dedicated in their duty of transferring data. The physical layer and the Data link layer are the...

Words: 647 - Pages: 3

Free Essay

Ic- Internet of Things

...IC the Future! Frost & Sullivan’s Virtual Thought Leadership Panel on Internet of Everything Measurement & Instrumentation March 20, 2014 © 2012 Frost & Sullivan. All rights reserved. This document contains highly confidential information and is the sole property of Frost & Sullivan. No part of it may be circulated, quoted, copied or otherwise reproduced without the written approval of Frost & Sullivan. Moderator’s Profile • 12 years of expertise in semiconductor and wireless industry. Special expertise in business and product strategy, positioning, consulting and market analysis. Heads a team of global analysts that conduct both syndicated and custom research on various segments of the semiconductor industry. Some of the application that are on focus in the semiconductor group including automotive, healthcare, consumer electronics, aerospace, defense, industrial, wired and wireless communication 2 • Aravind Seshagiri, Program Manager, Measurement & Instrumentation Frost & Sullivan Follow me on: (Connect with social media) @asesh1974 • • Key Take Away’s from the previous edition Ian Ferguson, Vice President Segment Marketing Security is non-negotiable. ARM is concerned about fragmentation of standards and compromise on privacy. Performance, power efficiency and the flexibility to reconfigure on the go are they key needs for next gen processors. Bob Doud, Director of Marketing Privacy a pressing issue rather than actual information overload...

Words: 2300 - Pages: 10

Free Essay

Student

...WIRELESS SENSOR NETWORK COVERAGE: DEMONSTARTING POWER SAVINGS AND LIMITATIONS WITH MINIMIZED COVERAGE BY SIDNEY I. RUBEY A thesis submitted to the Graduate faculty of the University of Colorado at Colorado Springs in partial fulfillment of the requirements for the degree of Master of Science Department of Computer Science 2011 This thesis for Master of Science degree by Sidney I. Rubey has been approved for the Department of Computer Science by ------------------------------------------------------------------------ Dr. C. Edward Chow, Chair ------------------------------------------------------------------------ Dr. Terrance E. Boult ------------------------------------------------------------------------ Dr. Xiaobo Zhou ----------------------------------------- Date Abstract This paper explores the competing issues of coverage efficiency and power available in wireless sensor networks. Specifically, a shortest distance routing protocol is implemented, and total network system lifetimes are determined using a variety of small percentages of the available system nodes. Using a network simulator developed in Java, wireless sensor nodes are simulated, and power consumption algorithms are included in each node that take into consideration all aspects of power consumption in the operation of the node. Simulating different coverage schemes on the same network system, same initial power sources, and routing protocol, an increase of overall system lifetime of 900% is demonstrated...

Words: 15836 - Pages: 64

Free Essay

Robotics

...Use of Unobtrusive Human-Machine Interface for Rehabilitation of Stroke victims through Robot Assisted Mirror therapy Gautam Narangi, Arjun Narang2, Soumya Singhi luhani Lempiainen Electrical and Electronics Engineering, Bharati Managing Director Vidyapeeth's College of Engineering, New Delhi, India Deltatron Oy Ltd. Department of Electronics and Instrumentation, Birla Helsinki, Finland Institute of Technology and Science, Pilani, India jle@deltatron.fi gautam2410@gmail.com, arjun.narang09@gmail.com, soumya.singh1001@gmail.com Abstract- Stroke is one of the leading causes of long-term disability worldwide. Present techniques employed One technique employed to effectively rehabilitate stroke for victims, especially those suffering from partial paralysis or rehabilitation of victims suffering from partial paralysis or loss loss of function, is using mirror therapy. Mirror therapy is a of function, such as mirror therapy, require substantial amount of resources, which may not be readily available. In traditional mirror therapy, patients place a mirror beside the functional limb, blocking their view of the affected limb, creating the illusion that both the limbs are working properly, which strategy that has been used successfully to treat phantom pain after amputation and recovery from hemiplegia after a stroke. In traditional mirror therapy, patients place a mirror beside the functional...

Words: 3208 - Pages: 13