WWW.THESES.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Theses, dissertations, documentation
 
<< HOME
CONTACTS



Pages:     | 1 |   ...   | 5 | 6 || 8 | 9 |   ...   | 39 |

«Carles Gómez Josep Paradells José E. Caballero Edita: Fundación Vodafone España Autores: Carles Gómez Montenegro* Universitat Politècnica de ...»

-- [ Page 7 ] --

A sibling node can be defined as a neighbour of a specific node, which has the same rank in the topology but does not necessarily have the same parent as this node.

–  –  –

Finally, note that the star topology is a particular case of a tree topology where all nodes are one hop away from the tree root.

1.4.1.3. Mesh topology In the mesh topology, nodes can communicate with all their neighbours (i.e. the nodes that are within the coverage range of a certain node) and any node can communicate with any other node if a path exists. Hence, this topology exploits all the communications links that exist in a network (see Fig. 1.3.b).

The mesh topology is suitable for applications where any node can communicate with any other node. In contrast with the star and tree topologies, the mesh topology does not require the presence of special nodes.

–  –  –

1.4.2. The layered protocol stack approach Typically, many computer network protocol architectures follow the layered approach, whereby a layer offers a set of services to the layer on top of it. The well known Open Systems Interconnection (OSI) reference model [4] proposes a layered protocol stack, and the Transmission Control

Chapter 1. Introduction to Wireless Sensor Networks

Protocol/Internet Protocol (TCP/IP) stack constitutes a well known example that follows the layered architecture [5].

The use of layers allows one layer to operate independently despite the problems addressed by other layers. The layered approach has some overhead, which is not significant in devices with plenty of resources such as desktops. However, about a decade ago, some researchers believed that the resource constraints of sensor nodes might constitute a reason for abandoning the layered approach in WSNs [6].

As will be seen throughout the book (and especially in Chapter 11), the main current WSN solutions follow the layered approach. Nevertheless, cross-layer mechanisms, which use information from various layers to operate, have proved to be beneficial in many wireless systems. These include WSNs, where the simplicity of the sensor node platforms makes it easy to implement cross-layer mechanisms.

1.4.3. WSN protocols

Communication among devices in WSNs is enabled by the following

types of protocols:

• Physical layer protocols (see Chapter 3).

• Medium Access Control (MAC) protocols (see Chapter 4).

• Routing protocols (see Chapter 7).

• Transport protocols (see Chapter 8).

• Data encoding and aggregation protocols (see Chapter 12) Additionally, there are important cross-layer services in WSNs such as security (see Chapter 9) and topology control (see Chapter 6).

REFERENCES

[1] M. Dohler, T. Watteyne, T. Winter, D. Barthel, “Routing Requirements for Urban Low-Power and Lossy Networks”, RFC 5548, May 2009.

–  –  –

[2] E. Kim, D. Kaspar, N. Chevrollier, J.P. Vasseur, “Design and Application spaces for 6LoWPANs”, draft-ietf-6lowpan-usecases-05, IETF Internet Draft, November 2009 (Work in progress).

[3] Smart Dust project website:

http://robotics.eecs.berkeley.edu/–pister/SmartDust/ [4] H. Zimmermann, “OSI Reference Model – The ISO Model of Architecture for Open Systems Interconnection”, IEEE Transactions on Communications, Vol. COM-28, No. 4, April 1980.

[5] R. Braden, “Requirements for Internet Hosts – Communication Layers”, RFC 1122, October 1989.

[6] D. Estrin, R. Govindan, J. Heidemann, S. Kumar, “Next century challenges:

scalable coordination in sensor networks”. In MobiCom ’99: Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, pages 263–270, New York, USA, 1999.

[7] A. Sheth, “Semantic Sensor Web”, Intelligent Sensors, Sensor Networks and Information Processing – ISSNIP, Melbourne, Australia, August 2008.

[8] “Technical Document on Sensor Networks (Version 3)”, Technical Document of ISO/IEC JTC 1, Study Group on Sensor Networks (SGSN), December 2009.

Applications of WSNs and standardization initiatives Chapter 2. Applications of WSNs and standardization initiatives

2. Applications of WSNs and standardization initiatives The range of WSN applications is huge. On the other hand, future predictions are indicating that “In the next 10 years, many more devices and machines than humans will be connected to the Internet”; or in other words, "The number of elements to communicate is no longer Billions (people) but Trillions (things) [57, 58]”. This fact has triggered many standardization initiatives, in order to facilitate products interoperability. Firstly, this chapter aims at briefly introducing the main WSN application areas and some of the general characteristics of the network in each case (see Section 2.1). Secondly, the chapter focuses on the main standardization initiatives and organizations in the area of WSNs (see section 2.2).

2.1. Applications of WSNs This section aims at introducing the main application areas for WSNs. The reader may note that some of these areas overlap to some extent.

2.1.1. Environmental monitoring One of the classical WSN applications is environmental monitoring. In this type of application, sensor nodes are spread over a certain area (e.g. an urban area, a forest, a jungle, etc.) for monitoring parameters such as temperature, humidity, quality of the air, pollen concentration etc. These (and





Sensors Everywhere

other) data allow studying the environmental conditions of the zone and how they influence people, animals [18] and/or vegetation of the zone. In rural zones, forest fire control is another area of applicability. The following table shows examples of what can be sensed at present.

–  –  –

In rural scenarios, especially in zones where access is difficult, the nodes may be randomly deployed (e.g. thrown from a helicopter) and remain static. The data is collected by one or more sink nodes, which can be connected to other networks for remote access.

2.1.2. Healthcare, sports and fitness, assisted living Wearable wireless sensors can periodically report the levels of several body parameters [31], e.g. temperature, blood pressure, ElectroCardioGraph (ECG) (see Fig. 2.1) and insulin for a precise diagnosis. Sensor nodes can be used for patient location, monitoring and indentification in the hospital or at home (see Fig. 2.2). This fact enables remote care, by which patients, disabled and elderly citizens can benefit from at-home medical attention [35, 48]. On the other hand, alarms can be activated if critical events are Chapter 2. Applications of WSNs and standardization initiatives detected (e.g. acceleration sensors suggest that a person has fallen).

At-home medical attention may exploit the presence of a home automation WSN (see 2.1.6) for enhanced connectivity within the home and with remote hosts.

Fig. 2.1. Sensor node from Shimmer with a ECG extension [54] Fig. 2.2. Wireless sensor node to be fitted at the wrist (orange box) for patient identification, monitoring and location. The black box at the top of the image is used as a wireless router to create a backhaul network used for communication and as a reference for location in the hospital

–  –  –

Some examples of European Projects addressing different aspects of the health care research topic are HeartCycle [33] and PERSONA [34]. While the scope of the HeartCycle project is the closed-loop management of both heart failure patients and chronic heart disease patients (including diabetes, arrhythmias, etc.), the scope of the PERSONA (PERceptive Spaces prOmoting iNdependent Aging) project is a standard AAL (Ambient Assisted Living) service platform aimed at assisting elderly people in their daily activities.

Another application area that can benefit from wearable sensors is sports and fitness [36, 37]. Heart rate sensors may communicate, for example, either with a watch which can display the result of the measurement, or with a device which can store the main statistics of a training session. The WSN is, in this case, composed of a small number of nodes. In addition, it may also be possible to transmit these data to a remote database (e.g. connected to the Internet) where the recorded data can be processed and analysed, and based on that, a “virtual coacher” can provide feedback and guidance to the user while the training session is in progress.

Finally, in addition to health-related parameters, biometric sensors can report data from which the emotions of a person can be obtained.

Emotional sensing is an interesting new area of research [38].

2.1.3. Structural monitoring

Buildings, bridges, tunnels, etc., can benefit from periodic monitoring of the architecture health [15]. On the other hand, upon detection of emergency situations (for example testing of earthquake or structural damages), the sensor nodes can inform quickly about the event, so that appropriate actions can be taken in response.

Another area of application may be internal pipeline corrosion monitoring in the fuel and gas industry.

The nodes in these environments are manually deployed and remain static. The data is collected by one or more sink nodes, which can be connected to other networks for remote access.

Chapter 2. Applications of WSNs and standardization initiatives 2.

1.4. Automotive There are a wide range of applications based on sensors already working within a car, like for example environment control (indoor and outdoor temperatures), windows status, vehicle occupancy, seat belt monitoring, rain brush control, fuel control, tire pressure [50] or brake assistance (signal information from pedestrian and obstacles sensing), etc. All these sensed data could be arranged based on simple WSN configurations.

2.1.5. Logistics

WSNs can provide value for logistics (tracking goods, pallets, baggage, etc), supply chain management or dynamic pricing information update in retail stores. For example, product packages can have embedded sensor nodes for detecting unauthorized package opening. These sensor nodes can communicate with static nodes placed in the warehouse for triggering alarms upon detection of unauthorized opening.

On the other hand, the embedded sensor nodes may store information about each product, such as its own identification and additional information, such as the current location, the temperature inside the package, etc. RFID technologies are also suitable for this application category [39, 40].

2.1.6. Home and building automation

WSNs enable a variety of applications in the home for user comfort and

home management. Some examples follow [41, 42]:

• Light control. A new light can be controlled from any switch, which reduces the need for new wired connections. Lights can also be activated in response to a command from a remote control. Furthermore, they can be turned on automatically when presence and luminance sensors detect that people are in a poorly illuminated room.

• Remote control. Infrared technology has been used for wireless communication between a remote control and devices such as TVs, HiFi equipment and Heating Ventilating and Air Conditioning (HVAC) sys

<

Sensors Everywhere

tems. However, infrared requires line-of-sight (LOS) and short-distance communication. RF technology overcomes these limitations.

• Security and safety. Advanced security systems can be based on several sensors (e.g. smoke detectors, glass-break sensors and motion sensors) for detecting possible risk situations that trigger appropriate actions in response. For example, smoke detectors may activate fire alarms.

• Window shades, HVAC, central heating, etc. may be controlled depending on the information collected by several types of sensors that monitor parameters such as temperature, humidity, light and presence. Unnecessary waste of energy can thus be avoided.

Fig. 2.3. Motion sensor based on a passive infrared (PIR) sensor providing also temperature and illumination level In a home, the number of nodes may be in the order of tens (and even hundreds in some residences), and the node density can be high. The nodes are mainly static, but some of them (e.g. those attached to remote controls or even to people) may exhibit some degree of mobility. The home automation network can be connected to other networks (e.g. the Internet) via a gateway or a router, depending on the protocols used.

Chapter 2. Applications of WSNs and standardization initiatives

The applications in building automation are similar to the ones in home automation, but the network size and structure may be different. In a building, the number of nodes may be in the order of thousands. In building automation, areas are defined as small physical locales, such as a room [16].

These areas are managed by controls which obtain the measurements provided by the sensors present in the area (e.g. temperature, occupancy, light, humidity, etc.). On the other hand, zones are defined as extended physical locales (e.g. a floor) which are also managed by controls that receive the data from the sensors within that zone. In building automation, most of the interactions between nodes do not involve sink nodes.

2.1.7. Industrial monitoring and control

In industrial environments, very critical communications are carried out using cables, which are known to be more reliable than wireless links.

However, these environments will benefit from adding wireless sensor nodes for controlling devices which are not currently connected.

The main WSN applications envisioned for process control (where the main product is typically a fluid, e.g. oil, chemicals, etc.) are monitoring applications with various requirements with regard to real time operation and non-critical loop control operations [20]. In factory automation (where the product is a discrete element, e.g. a car, a lamp, etc.), WSNs will allow to carry out monitoring operations that currently are done manually or are not done.



Pages:     | 1 |   ...   | 5 | 6 || 8 | 9 |   ...   | 39 |


Similar works:

«In: The Lithosphere: Geochemistry, Geology and Geophysics ISBN: 978-1-60456-903-2 Editors: J.E. Anderson et al, pp. 123-140 © 2008 Nova Science Publishers, Inc. Chapter 3 THE FATE OF SUBDUCTED OCEANIC CRUST AND THE ORIGIN OF INTRAPLATE VOLCANISM Alan D. Smith Department of Earth Sciences, University of Durham, Durham, DH1 3LE, UK Abstract Standard geodynamic models envisage subducted oceanic crust to be part isolated in thermal boundary layers and part remixed into the depleted mantle. The two...»

«THE PORTABILITY OF FLEXICURITY IN ITALY Jody Tubi University G. D'Annunzio of Pescara and Chieti, Italy jodytubi@gmail.com Abstract: A high unemployment rate is a typical European issue. During the ’80s and the ‘90s one tried to so solve such problem introducing labour market flexibility (due to the Neoliberals ideology). Though, social tensions had risen because of the uncertainty and the lack of securities flexibility implies. Flexicurity was born as a way to settle workers’ and...»

«MINNESOTA STATE COLLEGES AND UNIVERSITIES Normandale Community College REQUEST FOR PROPOSAL (RFP) FOR Web videos for degree promotion SPECIAL NOTE: This Request for Proposal (RFP) does not obligate the Minnesota State Colleges and Universities (MnSCU) system, its Board of Trustees or Normandale Community College to award a contract or complete the proposed project and each reserves the right to cancel this RFP if it is considered to be in its best interest. Proposals must be clear and concise....»

«&RQIHUHQFLD#GH#3UHVHQWDFLyQ#GH#(XURSHDQ 6FKRROQHW +DFLHQGR#TXH#OD#WHFQRORJtD#GH#OD#,QIRUPDFLyQ IXQFLRQH#HQ#HO#FROHJLR 8 9 de septiembre de 1998: IBM Centre, Bruselas Conferencia Presentación de la European Schoolnet: Haciendo que la Tecnología de la Información funcione en el colegio 8 9 de septiembre de 1998: IBM Centre, Bruselas Este folleto contiene una versión resumida del informe completo de la conferencia de presentación de EUN. Este folleto contiene la ponencia de Stephen Heppell, y...»

«30-S: La vulnerabilidad del liderazgo de la Revolución Ciudadana y de la Institucionalidad en Ecuador 30-S: The vulnerability of the Citizens´Revolution leadership and Ecuador´s institutionality coyuntura Santiago Ortiz Profesor-investigador de FLACSO-Ecuador Correo electrónico: sortiz@flacso.org.ec Fecha de recepción: noviembre 2010 Fecha de aceptación: noviembre 2010 Resumen Los hechos del 30 de septiembre, que son descritos por el autor como un intento de golpe de Estado, se...»

«ICI Mentoring Programme: An Independent Evaluation Final Report Gráinne Healy Independent Consultant March 2010 ICI Mentoring Programme: An Independent Evaluation Contents 1. Introduction 3 2. Evaluation approach and methodology 7 3. Background to Mentoring Programmes 8 4. The ICI Mentoring Programme 10 5. Evaluation Overview and Case Studies 13 6. Conclusions and Recommendations 36 ICI Mentoring Programme: An Independent Evaluation ‘I’m not a specialist but I felt I could be useful to...»

«UNITED NATIONS COMMON COUNTRY ASSESSMENT TURKEY (2000) Table of Contents I FOREWORD The UNCT in Turkey P A R T : I Executive Summary BACKGROUND and RATIONALE INTERNATIONAL DEVELOPMENT CONTEXT NATIONAL CONTEXT of TURKEY’S DEVELOPMENT ANALYSIS of NATIONAL FOLLOW-UP to UN CONFERENCES, CONVENTIONS and SUMMITS. 4 CONVENTION on the RIGHTS of the CHILD CONVENTION on the ELIMINATION of ALL FORMS of DISCRIMINATION AGAINST WOMEN (CEDAW) INTERNATIONAL CONFERENCE on NUTRITION WORLD FOOD SUMMIT WORLD...»

«FOR IMMEDIATE RELEASE Photos, Videos, and Interviews on Request Media Contact: Esha Pai (212) 561-7469 Esha.pai@kingcompr.com 15 YOUNG LEADERS RECEIVE PRESTIGIOUS NATIONAL AWARD AND $36,000 EACH FOR THEIR WORK TO PROMOTE YOUTH ENGAGEMENT AND SOCIAL CHANGE The Helen Diller Family Foundation Puts its Faith in “Generation Zers” Making Life Better for Baltimore Kids with Imprisoned Parents, Dallas Teens Who Could Use Tech Skills to Succeed, Latino Day Laborers and their Families in California,...»

«Estudios Económicos CNBV, Vol. 1 2012 LA BANCA EXTRANJERA EN MÉXICO: ¿HAY MOTIVOS PARA PREOCUPARSE? Javier González y Pablo Peña I. Introducción Ninguna de las marcas de automóviles que se venden en México es nacional. Todas provienen de otros países. A pesar de eso, no escuchamos a los analistas de la industria y a los comentaristas decir que por ser empresas de origen extranjero no maximizan utilidades. Independientemente del país donde se encuentren sus oficinas corporativas, las...»

«PARENTING STYLES, MATERNAL EFFICACY, AND IMPACT OF A CHILDHOOD DISABILITY ON THE FAMILY IN MOTHERS OF CHILDREN WITH DISABILITIES by GWENDOLYN ANNE PUGH (Under the Direction of Zolinda Stoneman) ABSTRACT The purpose of the study was to examine how maternal efficacy and the impact of a childhood disability on the family were related to the mother’s parenting styles. Sixty-eight mothers of children with disabilities were recruited from intervention and educational programs for children with...»

«HOW FAMILY BACKGROUND INFLUENCES STUDENT ACHIEVEMENT Barbara Nez a Brec ko ˘ ˘ Educational Research Institute, Slovenija Abstract A key goal of education is to ensure that every student has a chance to excel, both in school and in life. Increasingly, children’s success in school determines their success as adults, determining whether and where they go to college, what professions they enter and how much they can earn. School performance in primary and secondary school does not depend on a...»

«This document, concerning room air conditioners is an action issued by the Department of Energy. Though it is not intended or expected, should any discrepancy occur between the document posted here and the document published in the Federal Register, the Federal Register publication controls. This document is being made available through the Internet solely as a means to facilitate the public's access to this document. [6450-01-P] DEPARTMENT OF ENERGY 10 CFR Part 430 [Docket Number...»





 
<<  HOME   |    CONTACTS
2016 www.theses.xlibx.info - Theses, dissertations, documentation

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.