126 research outputs found

    Visoko-pouzdan prenos podataka kod bežičnih senzorskih mreža sa malom potrošnjom energije primenom 2D-SEC-DED tehnike kodiranja

    Get PDF
    This dissertation deals with the challenges of energy efficiency in systems with limited resources of homogeneous and heterogeneous wireless sensory networks for data collection applications in real environmentals. This research covers several fields from physical layer optimization up to network layer solutions. The problem which has to be solved is viewed from three different perspectives: the energy profile of the nodes with a special emphasis on the activity of the sensing block, the network protocol with a special focus on finding an adequate coding technique that need to reduce or eliminate the request for retransmission and evaluating the range of transmission for the proposed encoding technique. If energy efficiency in wireless sensor networks is formulated as a load balancing problem then the power management unit can significantly contribute to reduction in power consumption. Power management is implemented by switching on/off individual subblocks of the sensor node independently of the hardware platform. By reducing energy consumption both an extension of the lifetime of the sensor node and sensor network, is achieved. The obtained energy profiles reveal significant differences in energy consumption of wireless sensor nodes depending in terms of external sensors number, resolution of the analog-to-digital converter, network traffic dynamics, topology of the network, applied coding techniques, operating modes and activities during the lifetime of the sensor node and other factors. In this sense, the application of combination of power aware techniques, such as the duty-cycling at system-level, and power gating at the level of sensor elements, i.e. sensors, is proposed. An evaluation of the approach shows that energy consumption reduction three orders of magnitude on average can be achieved, when these two techniques are incorporated into the sensor node. On the other hand, in the wireless sensor networks, the choice of coding scheme, i.e. channel coding depends on the application and characteristics-, model-, type-errors appearing in the wireless channel. For example, one encoding technique is preferred for use when burst errors patterns are dominant, while another coding technique is more acceptable in situations where noise causes random errors that are either single or double in nature. Bearing this in mind, along with the analysis of channel characteristics, in this dissertation, we propose a new massage coding technique by which on extend traditional protocols with aim to improve energy efficiency, while maintaining high reliability in data transmission and low latency of message transfer. Namely, channel evaluation in wireless sensor networks used in industry shows that most of the errors are of single or double nature, and burst type errors are present, but rarely. In this context, in this dissertation, an effective technique for correcting errors at a destination (FEC) based on Hamming's coding scheme of relatively low complexity, called Two Dimensional-Single Error Correction- Double Error Detection (2D-SEC-DED) was developed. The proposed encoding technique is intendet to minimize packet retransmissions, thus saving energy. Evaluation of the proposed encoding scheme shows that the code is able to correct all single errors and 99.99% of double/multiple errors. The analysis was carried out through the implementation, in MATLAB, of two versions of Rendezvous Protocol for Long Life (RPLL), called Modified RPLL (M-RPLL) and Ordinary RPLL (O-RPLL), respectively. The energy gain achieved in this way is used to improve the performance of wireless transmission, such as increasing of the transmission range. As illustration, for indoor environment characterized by the path loss exponent 4 at the target BER of 5 10 4 , the proposed encoding scheme is able to improve the transmission distance by about 18 m , or the received signal strength (RSSI) by about 8.5 dBm compared to wireless sensor networks with encoding schemes without possibility to correct errors

    Smart Wireless Sensor Networks

    Get PDF
    The recent development of communication and sensor technology results in the growth of a new attractive and challenging area - wireless sensor networks (WSNs). A wireless sensor network which consists of a large number of sensor nodes is deployed in environmental fields to serve various applications. Facilitated with the ability of wireless communication and intelligent computation, these nodes become smart sensors which do not only perceive ambient physical parameters but also be able to process information, cooperate with each other and self-organize into the network. These new features assist the sensor nodes as well as the network to operate more efficiently in terms of both data acquisition and energy consumption. Special purposes of the applications require design and operation of WSNs different from conventional networks such as the internet. The network design must take into account of the objectives of specific applications. The nature of deployed environment must be considered. The limited of sensor nodes� resources such as memory, computational ability, communication bandwidth and energy source are the challenges in network design. A smart wireless sensor network must be able to deal with these constraints as well as to guarantee the connectivity, coverage, reliability and security of network's operation for a maximized lifetime. This book discusses various aspects of designing such smart wireless sensor networks. Main topics includes: design methodologies, network protocols and algorithms, quality of service management, coverage optimization, time synchronization and security techniques for sensor networks

    ENERGY HARVESTING TECHNIQUES IN WIRELESS SENSOR NETWORKS

    Get PDF
    Batteries are the main source of energy for low-power electronics such as micro-electro mechanical systems (MEMS), wireless sensor networks, embedded devices for remote sensing and control, etc. With the limited capacity of finite power sources and the need for supplying energy for the lifetime of a system/device there is a requirement for self-powered devices. Using conventional batteries is not always good design solution because batteries require human intervention to replace them (very often in hard-accessible and harsh-environmental conditions). Therefore, acquiring the electrical power, by using an alternative source of energy that is needed to operate these devices is a major concern. The process of extracting energy from the surrounding environment and converting it into consumable electrical energy is known as energy harvesting or power scavenging. The energy harvesting sources can be used to increase the lifetime and capability of the devices by either replacing or augmenting the battery usage. There are various forms of energy that can be scavenged, like solar, mechanical, thermal, and electromagnetic. Nowadays, there is a big interest in the field of research related to energy harvesting. This paper represents a survey for identifying the sources of energy harvesting and describes the basic operation of principles of the most common energy harvester. As first, we present, in short, the conversion principles of single energy source harvesting systems and point to their benefits and limitations in their usage. After that, hybrid structures of energy harvesters which simultaneously combine scavenged power from different ambient sources (solar, thermoelectric, electromagnetic), with aim to support higher load at the output, are considered

    Radio Communications

    Get PDF
    In the last decades the restless evolution of information and communication technologies (ICT) brought to a deep transformation of our habits. The growth of the Internet and the advances in hardware and software implementations modified our way to communicate and to share information. In this book, an overview of the major issues faced today by researchers in the field of radio communications is given through 35 high quality chapters written by specialists working in universities and research centers all over the world. Various aspects will be deeply discussed: channel modeling, beamforming, multiple antennas, cooperative networks, opportunistic scheduling, advanced admission control, handover management, systems performance assessment, routing issues in mobility conditions, localization, web security. Advanced techniques for the radio resource management will be discussed both in single and multiple radio technologies; either in infrastructure, mesh or ad hoc networks

    On Information-centric Resiliency and System-level Security in Constrained, Wireless Communication

    Get PDF
    The Internet of Things (IoT) interconnects many heterogeneous embedded devices either locally between each other, or globally with the Internet. These things are resource-constrained, e.g., powered by battery, and typically communicate via low-power and lossy wireless links. Communication needs to be secured and relies on crypto-operations that are often resource-intensive and in conflict with the device constraints. These challenging operational conditions on the cheapest hardware possible, the unreliable wireless transmission, and the need for protection against common threats of the inter-network, impose severe challenges to IoT networks. In this thesis, we advance the current state of the art in two dimensions. Part I assesses Information-centric networking (ICN) for the IoT, a network paradigm that promises enhanced reliability for data retrieval in constrained edge networks. ICN lacks a lower layer definition, which, however, is the key to enable device sleep cycles and exclusive wireless media access. This part of the thesis designs and evaluates an effective media access strategy for ICN to reduce the energy consumption and wireless interference on constrained IoT nodes. Part II examines the performance of hardware and software crypto-operations, executed on off-the-shelf IoT platforms. A novel system design enables the accessibility and auto-configuration of crypto-hardware through an operating system. One main focus is the generation of random numbers in the IoT. This part of the thesis further designs and evaluates Physical Unclonable Functions (PUFs) to provide novel randomness sources that generate highly unpredictable secrets, on low-cost devices that lack hardware-based security features. This thesis takes a practical view on the constrained IoT and is accompanied by real-world implementations and measurements. We contribute open source software, automation tools, a simulator, and reproducible measurement results from real IoT deployments using off-the-shelf hardware. The large-scale experiments in an open access testbed provide a direct starting point for future research

    A linguistic approach to concurrent, distributed, and adaptive programming across heterogeneous platforms

    Get PDF
    Two major trends in computing hardware during the last decade have been an increase in the number of processing cores found in individual computer hardware platforms and an ubiquity of distributed, heterogeneous systems. Together, these changes can improve not only the performance of a range of applications, but the types of applications that can be created. Despite the advances in hardware technology, advances in programming of such systems has not kept pace. Traditional concurrent programming has always been challenging, and is only set to be come more so as the level of hardware concurrency increases. The different hardware platforms which make up heterogeneous systems come with domain-specific programming models, which are not designed to interact, or take into account the different resource-constraints present across different hardware devices, motivating a need for runtime reconfiguration or adaptation. This dissertation investigates the actor model of computation as an appropriate abstraction to address the issues present in programming concurrent, distributed, and adaptive applications across different scales and types of computing hardware. Given the limitations of other approaches, this dissertation describes a new actor-based programming language (Ensemble) and its runtime to address these challenges. The goal of this language is to enable non-specialist programmers to take advantage of parallel, distributed, and adaptive programming without the programmer requiring in-depth knowledge of hardware architectures or software frameworks. There is also a description of the design and implementation of the runtime system which executes Ensemble applications across a range of heterogeneous platforms. To show the suitability of the actor-based abstraction in creating applications for such systems, the language and runtime were evaluated in terms of linguistic complexity and performance. These evaluations covered programming embedded, concurrent, distributed, and adaptable applications, as well as combinations thereof. The results show that the actor provides an objectively simple way to program such systems without sacrificing performance

    Distributed Real-time Systems - Deterministic Protocols for Wireless Networks and Model-Driven Development with SDL

    Get PDF
    In a networked system, the communication system is indispensable but often the weakest link w.r.t. performance and reliability. This, particularly, holds for wireless communication systems, where the error- and interference-prone medium and the character of network topologies implicate special challenges. However, there are many scenarios of wireless networks, in which a certain quality-of-service has to be provided despite these conditions. In this regard, distributed real-time systems, whose realization by wireless multi-hop networks becomes increasingly popular, are a particular challenge. For such systems, it is of crucial importance that communication protocols are deterministic and come with the required amount of efficiency and predictability, while additionally considering scarce hardware resources that are a major limiting factor of wireless sensor nodes. This, in turn, does not only place demands on the behavior of a protocol but also on its implementation, which has to comply with timing and resource constraints. The first part of this thesis presents a deterministic protocol for wireless multi-hop networks with time-critical behavior. The protocol is referred to as Arbitrating and Cooperative Transfer Protocol (ACTP), and is an instance of a binary countdown protocol. It enables the reliable transfer of bit sequences of adjustable length and deterministically resolves contest among nodes based on a flexible priority assignment, with constant delays, and within configurable arbitration radii. The protocol's key requirement is the collision-resistant encoding of bits, which is achieved by the incorporation of black bursts. Besides revisiting black bursts and proposing measures to optimize their detection, robustness, and implementation on wireless sensor nodes, the first part of this thesis presents the mode of operation and time behavior of ACTP. In addition, possible applications of ACTP are illustrated, presenting solutions to well-known problems of distributed systems like leader election and data dissemination. Furthermore, results of experimental evaluations with customary wireless transceivers are outlined to provide evidence of the protocol's implementability and benefits. In the second part of this thesis, the focus is shifted from concrete deterministic protocols to their model-driven development with the Specification and Description Language (SDL). Though SDL is well-established in the domain of telecommunication and distributed systems, the predictability of its implementations is often insufficient as previous projects have shown. To increase this predictability and to improve SDL's applicability to time-critical systems, real-time tasks, an approved concept in the design of real-time systems, are transferred to SDL and extended to cover node-spanning system tasks. In this regard, a priority-based execution and suspension model is introduced in SDL, which enables task-specific priority assignments in the SDL specification that are orthogonal to the static structure of SDL systems and control transition execution orders on design as well as on implementation level. Both the formal incorporation of real-time tasks into SDL and their implementation in a novel scheduling strategy are discussed in this context. By means of evaluations on wireless sensor nodes, evidence is provided that these extensions reduce worst-case execution times substantially, and improve the predictability of SDL implementations and the language's applicability to real-time systems

    Field-Deployable Concurrent-Transmitter Networks for Long Term Environmental Monitoring

    Get PDF
    In this work, I draw upon my experience with field deployments of low-power data collection systems to come up with new approaches to long-term environmental monitoring (LTEM). Our goal is to develop long-lived, reliable systems that can be deployed by non-experts. The specific requirements of LTEM systems lead us to pursue techniques which can take advantage of the natural heirarchies that exist in sensor deployments while avoiding the difficulties inherent in selecting efficient data transmission routes in the face of unreliable hardware and difficult-to-measure link dynamics. The approach we advocate eschews traditional single-path routing and transmission methods in favor of approaches that leverage non-destructive simultaneous packet transmissions over subsets of the network. We apply this principle to develop a medium access protocol suitable for dense networks (Flip-MAC) as well as a method for identifying the set of potentially-useful forwarders between a data source and its destination (CX). This document not only characterizes and evaluates the low-level behavior of these protocols, but also describes the design of a larger multi-tiered data collection system based on CX, a suite of hardware which is well-suited to both CX and common deployment patterns, and the design of a ``dirt-to-database'' system which gives domain scientists the tools they need to deploy and manage networks on their own

    Dynamic Coverage Control and Estimation in Collaborative Networks of Human-Aerial/Space Co-Robots

    Full text link
    In this dissertation, the author presents a set of control, estimation, and decision making strategies to enable small unmanned aircraft systems and free-flying space robots to act as intelligent mobile wireless sensor networks. These agents are primarily tasked with gathering information from their environments in order to increase the situational awareness of both the network as well as human collaborators. This information is gathered through an abstract sensing model, a forward facing anisotropic spherical sector, which can be generalized to various sensing models through adjustment of its tuning parameters. First, a hybrid control strategy is derived whereby a team of unmanned aerial vehicles can dynamically cover (i.e., sweep their sensing footprints through all points of a domain over time) a designated airspace. These vehicles are assumed to have finite power resources; therefore, an agent deployment and scheduling protocol is proposed that allows for agents to return periodically to a charging station while covering the environment. Rules are also prescribed with respect to energy-aware domain partitioning and agent waypoint selection so as to distribute the coverage load across the network with increased priority on those agents whose remaining power supply is larger. This work is extended to consider the coverage of 2D manifolds embedded in 3D space that are subject to collision by stochastic intruders. Formal guarantees are provided with respect to collision avoidance, timely convergence upon charging stations, and timely interception of intruders by friendly agents. This chapter concludes with a case study in which a human acts as a dynamic coverage supervisor, i.e., they use hand gestures so as to direct the selection of regions which ought to be surveyed by the robot. Second, the concept of situational awareness is extended to networks consisting of humans working in close proximity with aerial or space robots. In this work, the robot acts as an assistant to a human attempting to complete a set of interdependent and spatially separated multitasking objectives. The human wears an augmented reality display and the robot must learn the human's task locations online and broadcast camera views of these tasks to the human. The locations of tasks are learned using a parallel implementation of expectation maximization of Gaussian mixture models. The selection of tasks from this learned set is executed by a Markov Decision Process which is trained using Q-learning by the human. This method for robot task selection is compared against a supervised method in IRB approved (HUM00145810) experimental trials with 24 human subjects. This dissertation concludes by discussing an additional case study, by the author, in Bayesian inferred path planning. In addition, open problems in dynamic coverage and human-robot interaction are discussed so as to present an avenue forward for future work.PHDAerospace EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttps://deepblue.lib.umich.edu/bitstream/2027.42/155147/1/wbentz_1.pd

    Distributed Control Architecture

    Get PDF
    This document describes the development and testing of a novel Distributed Control Architecture (DCA). The DCA developed during the study is an attempt to turn the components used to construct unmanned vehicles into a network of intelligent devices, connected using standard networking protocols. The architecture exists at both a hardware and software level and provides a communication channel between control modules, actuators and sensors. A single unified mechanism for connecting sensors and actuators to the control software will reduce the technical knowledge required by platform integrators and allow control systems to be rapidly constructed in a Plug and Play manner. DCA uses standard networking hardware to connect components, removing the need for custom communication channels between individual sensors and actuators. The use of a common architecture for the communication between components should make it easier for software to dynamically determine the vehicle s current capabilities and increase the range of processing platforms that can be utilised. Implementations of the architecture currently exist for Microsoft Windows, Windows Mobile 5, Linux and Microchip dsPIC30 microcontrollers. Conceptually, DCA exposes the functionality of each networked device as objects with interfaces and associated methods. Allowing each object to expose multiple interfaces allows for future upgrades without breaking existing code. In addition, the use of common interfaces should help facilitate component reuse, unit testing and make it easier to write generic reusable software
    corecore