1,028 research outputs found

    Robust Header Compression (ROHC) in Next-Generation Network Processors

    Get PDF
    Robust Header Compression (ROHC) provides for more efficient use of radio links for wireless communication in a packet switched network. Due to its potential advantages in the wireless access area andthe proliferation of network processors in access infrastructure, there exists a need to understand the resource requirements and architectural implications of implementing ROHC in this environment. We presentan analysis of the primary functional blocks of ROHC and extract the architectural implications on next-generation network processor design for wireless access. The discussion focuses on memory space andbandwidth dimensioning as well as processing resource budgets. We conclude with an examination of resource consumption and potential performance gains achievable by offloading computationally intensiveROHC functions to application specific hardware assists. We explore the design tradeoffs for hardware as-sists in the form of reconfigurable hardware, Application-Specific Instruction-set Processors (ASIPs), andApplication-Specific Integrated Circuits (ASICs)

    A Survey on Routing Protocols for Large-Scale Wireless Sensor Networks

    Get PDF
    With the advances in micro-electronics, wireless sensor devices have been made much smaller and more integrated, and large-scale wireless sensor networks (WSNs) based the cooperation among the significant amount of nodes have become a hot topic. “Large-scale” means mainly large area or high density of a network. Accordingly the routing protocols must scale well to the network scope extension and node density increases. A sensor node is normally energy-limited and cannot be recharged, and thus its energy consumption has a quite significant effect on the scalability of the protocol. To the best of our knowledge, currently the mainstream methods to solve the energy problem in large-scale WSNs are the hierarchical routing protocols. In a hierarchical routing protocol, all the nodes are divided into several groups with different assignment levels. The nodes within the high level are responsible for data aggregation and management work, and the low level nodes for sensing their surroundings and collecting information. The hierarchical routing protocols are proved to be more energy-efficient than flat ones in which all the nodes play the same role, especially in terms of the data aggregation and the flooding of the control packets. With focus on the hierarchical structure, in this paper we provide an insight into routing protocols designed specifically for large-scale WSNs. According to the different objectives, the protocols are generally classified based on different criteria such as control overhead reduction, energy consumption mitigation and energy balance. In order to gain a comprehensive understanding of each protocol, we highlight their innovative ideas, describe the underlying principles in detail and analyze their advantages and disadvantages. Moreover a comparison of each routing protocol is conducted to demonstrate the differences between the protocols in terms of message complexity, memory requirements, localization, data aggregation, clustering manner and other metrics. Finally some open issues in routing protocol design in large-scale wireless sensor networks and conclusions are proposed

    Impact of Random Deployment on Operation and Data Quality of Sensor Networks

    Get PDF
    Several applications have been proposed for wireless sensor networks, including habitat monitoring, structural health monitoring, pipeline monitoring, and precision agriculture. Among the desirable features of wireless sensor networks, one is the ease of deployment. Since the nodes are capable of self-organization, they can be placed easily in areas that are otherwise inaccessible to or impractical for other types of sensing systems. In fact, some have proposed the deployment of wireless sensor networks by dropping nodes from a plane, delivering them in an artillery shell, or launching them via a catapult from onboard a ship. There are also reports of actual aerial deployments, for example the one carried out using an unmanned aerial vehicle (UAV) at a Marine Corps combat centre in California -- the nodes were able to establish a time-synchronized, multi-hop communication network for tracking vehicles that passed along a dirt road. While this has a practical relevance for some civil applications (such as rescue operations), a more realistic deployment involves the careful planning and placement of sensors. Even then, nodes may not be placed optimally to ensure that the network is fully connected and high-quality data pertaining to the phenomena being monitored can be extracted from the network. This work aims to address the problem of random deployment through two complementary approaches: The first approach aims to address the problem of random deployment from a communication perspective. It begins by establishing a comprehensive mathematical model to quantify the energy cost of various concerns of a fully operational wireless sensor network. Based on the analytic model, an energy-efficient topology control protocol is developed. The protocol sets eligibility metric to establish and maintain a multi-hop communication path and to ensure that all nodes exhaust their energy in a uniform manner. The second approach focuses on addressing the problem of imperfect sensing from a signal processing perspective. It investigates the impact of deployment errors (calibration, placement, and orientation errors) on the quality of the sensed data and attempts to identify robust and error-agnostic features. If random placement is unavoidable and dense deployment cannot be supported, robust and error-agnostic features enable one to recognize interesting events from erroneous or imperfect data

    An architecture for intelligent health assessment enabled IEEE 1451 compliant smart sensors

    Get PDF
    As systems become increasingly complex and costly, potential failure mechanisms and indicators are numerous and difficult to identify, while the cost of loss is very expensive - human lives, replacement units, and impacts to national security. In order to ensure the safety and long-term reliability of vehicles, structures, and devices attention must be directed toward the assessment and management of system health. System health is the key component that links data, information, and knowledge to action. Integrated Systems Health Management (ISHM) doctrine calls for comprehensive real-time health assessment and management of systems where the distillation of raw data into information takes place within sensors and actuators. This thesis develops novel field programmable health assessment capability for sensors and actuators in ISHM. Health assessment and feature extraction algorithms are implemented on a sensor or actuator through the Embedded Routine Manager (ERM) API. Algorithms are described using Health Electronic Datasheets (HEDS) to provide more flexible run-time operation. Interfacing is accomplished through IEEE Standard 1451 for Smart Sensors and Actuators, connecting ISHM with the instrumentation network of the future. These key elements are validated using exemplar algorithms to detect noise, spike, and flat-line events onboard the ISHM enabled Methane Thruster Testbed Project (MTTP) at NASA Stennis Space Center in Mississippi

    Space Station Freedom data management system growth and evolution report

    Get PDF
    The Information Sciences Division at the NASA Ames Research Center has completed a 6-month study of portions of the Space Station Freedom Data Management System (DMS). This study looked at the present capabilities and future growth potential of the DMS, and the results are documented in this report. Issues have been raised that were discussed with the appropriate Johnson Space Center (JSC) management and Work Package-2 contractor organizations. Areas requiring additional study have been identified and suggestions for long-term upgrades have been proposed. This activity has allowed the Ames personnel to develop a rapport with the JSC civil service and contractor teams that does permit an independent check and balance technique for the DMS

    Security and Privacy in Wireless Sensor Networks

    Get PDF

    The Secure and Energy Efficient Data Routing in the IoT based Network

    Get PDF
    The business applications such as weather forecasting, traffic management, weather forecasting, traffic management, etc., are enormously adopting Internet of Things(IoT). While scaling of these applications are fast, the device/sensor capabilities, particularly in terms of battery life and energy efficiency is limited. Despite of intensive research conducted to address these shortcomings, Wireless IoT Sensor Network(WIoTSN) still cannot assure 100\% efficient network life. Therefore, the core objective of the thesis is to provide an overview of energy efficiency of proactive(OLSR) and reactive(DSR and AODV) data routing protocols by scaling the size of network, i.e. number of sensor nodes, data packet size, data transmission rate and speed of mobile sink node. It also reviews the importance of security in WIoTSN. The two approaches, such as literature review and simulation testing, are used to achieve the objective of the thesis. The literature review provides information about reactive and proactive protocols and their mechanism for route discovery. Similarly, the network simulator tool NS3 is used for running simulation to evaluate the performance of selected routing protocols for energy efficiency. The thesis results showed the effect of scaling the parameters selected for experimental purpose on the energy efficiency of proactive and reactive data routing protocols. The simulation results prove that the reactive protocol DSR outperforms another reactive protocol AODV and proactive protocol OLSR in energy efficiency. From the security perspective, the thesis also emphasizes its need in IoT and suggest to minimize wasteful resources in WIoTSN and use them by restructuring the network for secure energy-efficient data routing protocols

    Previous hop routing: exploiting opportunism in VANETs

    Get PDF
    Routing in highly dynamic wireless networks such as Vehicular Ad-hoc Networks (VANETs) is a challenging task due to frequent topology changes. Sustaining a transmission path between peers in such network environment is difficult. In this thesis, Previous Hop Routing (PHR) is poposed; an opportunistic forwarding protocol exploiting previous hop information and distance to destination to make the forwarding decision on a packet-by-packet basis. It is intended for use in highly dynamic network where the life time of a hop-by-hop path between source and destination nodes is short. Exploiting the broadcast nature of wireless communication avoids the need to copy packets, and enables redundant paths to be formed. To save network resources, especially under high network loads, PHR employs probabilistic forwarding. The forwarding probability is calculated based on the perceived network load as measured by the arrival rate at the network interface. We evaluate PHR in an urban VANET environment using NS2 (for network traffic) and SUMO (for vehicular movement) simulators, with scenarios configured to re ect real-world conditions. The simulation scenarios are configured to use two velocity profiles i.e. Low and high velocity. The results show that the PHR networks able to achieve best performance as measured by Packet Delivery Ratio (PDR) and Drop Burst Length (DBL) compared to conventional routing protocols in high velocity scenarios

    Interaktive latenzkritische Anwendungen in mobilen Ad-hoc Netzen

    Get PDF
    In this thesis we discuss the challenges that latency-sensitive interactive applications face in mobile ad-hoc networks. By using multi-player games as an example, we argue that the traditional client-server architecture is unsuitable for this new environment. We consequently create a novel communication architecture as well as quality of service mechanisms that can support the network requirements of such applications in mobile environments. By using a number of distributed zone servers that are selected and managed dynamically by our server selection algorithm, we provide a scalable approach that offers the necessary redundancy. Furthermore, we propose additional quality of service mechanisms to reduce latency and packet loss for interactive applications. We evaluate our approach through network simulation and realistic mobile gaming scenarios. The performance of our evaluation is checked against real-world measurements.In dieser Arbeit werden die Probleme und Herausforderungen von latenz-kritischen interactiven Computeranwendungen in mobilen Ad-hoc Netzen untersucht. Am Beispiel von Mehrbenutzercomputerspielen zeigen wir, dass traditionelle Client-Server Architekturen für diese neuen Umgebungen ungeeignet sind. Im Rahmen dieser Arbeit wird daher eine neue Kommunikationsarchitektur sowie verschiedene Mechanismen zur Erhöhung der Dienstgüte vorgeschlagen. Mit Hilfe von Zonenserver, die durch den Serverauswahlalgorithmus ausgesucht und verwaltet werden zeigen wir einen Ansatz auf, der sowohl bezüglich der Netzgröße skalierbar ist als auch die notwendige Redundanz bereitstellt. Wir zeigen die Funktionalität und die Leistung unseres Ansatzes mit Hilfe von Netzsimulationen bei denen realistische Szenarien für mobiles Spielen simuliert werden. Der hierbei benutze Netzsimulator wurde dafür auf Basis von eigenen Messungen verbessert und für das jeweilige Szenario passend eingestellt
    corecore