Preview

Wireless Sensor Networks

Powerful Essays
Open Document
Open Document
8501 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wireless Sensor Networks
1. Introduction
The increasing interest in wireless sensor networks can be promptly understood simply by thinking about what they essentially are: a large number of small sensing self-powered nodes which gather information or detect special events and communicate in a wireless fashion, with the end goal of handing their processed data to a base station. Sensing, processing and communication are three key elements whose combination in one tiny device gives rise to a vast number of applications
[A1], [A2]. Sensor networks provide endless opportunities, but at the same time pose formidable challenges, such as the fact that energy is a scarce and usually non-renewable resource. However, recent advances in low power VLSI, embedded computing, communication hardware, and in general, the convergence of computing and communications, are making this emerging technology a reality [A3]. Likewise, advances in nanotechnology and Micro Electro-Mechanical Systems (MEMS) are pushing toward networks of tiny distributed sensors and actuators. 2. Applications of Sensor Networks
Possible applications of sensor networks are of interest to the most diverse fields. Environmental monitoring, warfare, child education, surveillance, micro-surgery, and agriculture are only a few examples [A4]. Through joint efforts of the University of California at Berkeley and the
College of the Atlantic, environmental monitoring is carried out off the coast of Maine on Great Duck Island by means of a network of Berkeley motes equipped with various sensors [B6]. The nodes send their data to a base station which makes them available on the Internet. Since habitat monitoring is rather sensitive to human presence, the deployment of a sensor network provides a noninvasive approach and a remarkable degree of granularity in data acquisition [B7]. The same idea lies behind the
Pods project at the University of Hawaii at Manoa [B8], where environmental data (air temperature,



References: pp. 102–114, Aug. 2002. Systems (ASPLOS-X), San Jose, CA, Oct. 2002. vol. 3, no. 1, pp. 38–45, 2004. International Workshop on Wearable and Implantable Body Sensor Networks, London, UK, 2004. patient monitoring,” in 8th Annual New England Regional Trauma Conference, Burlington, MA, 2002. no. 4, pp. 22–33, 2003. vol. 9, pp. 8–27, Aug. 2002. Sept. 2004. Societies (INFOCOM’01), vol. 3, Anchorage, AK, pp. 1380–1387, Apr. 2001.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    We have considered a 4x4 square grid wireless sensor network, where sinks and sensor nodes both are static. Locations of the sinks are deterministically placed. Locations of our sinks are taken from our deterministic sensor node deployment approach for 4x4 square grid region, where the network is 1-hop and 2-covered. Sinks are placed deterministically on grid cross points. But the sensor node deployment strategy is set to random here. Locations of sensor…

    • 614 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    LYT2 Task2

    • 4061 Words
    • 12 Pages

    This book provides generic approach architecture for the implementation of the wireless sensor networks. It proposes for a move into the routing protocols and improvement of networks through routing optimization, medium access and control of power while at the same time fulfilling the daily goals. It emphasizes on the importance to node information in the many wireless sensor network applications as well as the communication protocol. This solution can be applicable in the case of NHS since the use of wireless sensor networks can greatly help in transferring large data files, including the imaging files to…

    • 4061 Words
    • 12 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ruth Park’s Australian literary classic, Playing Beatie Bow (1980), highlights how we can arrive at a more empathetic and tolerant view of the world, once we are able to interact in our relationships with a greater degree a perspicacity and altruism, and move away from a self-interest and mean-spirited approach to life. One of the main themes Ruth Park displays is a change in behaviour in children but especially Abigail. She shows her developing perspicacity, altruism and empathy for others.…

    • 476 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    In the pursuit of opening a great venture with my business partner we are hoping to capture a share this booming industry of high tech wireless devices in the 21st century. Our goal is to open up a store (Wireless World LLC) in the high end area, most probably in Millenia Mall shopping center; for the purpose of meeting our budget demands. In which our product line would include high tech devices such as: phones, wireless eBook readers, high-end notebook and netbook computers, iPads, and other wireless computing devices. Our initial plan is to market our products to the wealthy individuals ranging from the age group of 22-49. For the purpose of their consistency in trying to stay up to date with the latest fashion or trying to make their work more productive with the capabilities of the devices.…

    • 1518 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Wireless Signals

    • 551 Words
    • 3 Pages

    Wireless signals are all around us as we walk or drive around the city or town where we live. The four types of wireless technologies that are out there are Wi-Fi, Cellular, Bluetooth, and WiMAX. We will be looking at these types of wireless technologies a little more in depth, where are they most commonly used, and how they differ from one another. The first wireless technology that we will be looking at is the Wi-Fi wireless signal. The Wi-Fi signal is mainly associated with computer networking, the specification used to create a wireless local area network is the IEEE 802.11. One would use this type of wireless technology if you were a business owner opening up a coffee shop and needed a public network. The network would have a wired connection to an internet source, then leading to a wireless router that transmits and receives the data from all of the customer’s devices that want to use the Wi-Fi. This will also connect all of the devices to one another through the network. The next type of wireless technology that we will be looking at is Cellular. This type of wireless technology is most often associated with wireless telephones. The cellular network is connected to cells that will enable a user to move around freely while staying connected to the network. This type of signal is used everywhere you go nowadays and are used by everyone. There are a multitude of devices that use these networks at one time and those include, smart phones, tablets, and some computers can use the cell towers to get a signal to be able to use the internet. The first generation of cellular signals was completely analog, and from there with the growing demand of faster speeds and better connectivity technology brought us 2G, 3G, and the ever popular 4G phones. Bluetooth is the next technology that we will touch on and is very similar to the Wi-Fi and cellular networks but on…

    • 551 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Cabaret Film Analysis

    • 996 Words
    • 4 Pages

    Cabaret, directed by Bob Fosse, reveals a variety of stories to present the central theme of power. Through the employment of characters Maximilian Von Heune, Fritz Wendel, Natalia Landauer and The Emcee, Fosse establishes their distinct positions among society. The power of money is actively explored through Max’s role, while the influence of the Nazi party becomes progressively evident as the story of Fritz and Natalia is revealed. Equally, the Emcee’s omniscient role is employed to contrast fantasy and reality.…

    • 996 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Wireless Network

    • 268 Words
    • 2 Pages

    Hello all, when it comes to designing a wireless network there are four steps to follow the first is the correct deployment scenario like Ad hoc or peer-to-peer, infrastructure, point-to-point and point-to-multipoint remote wireless bridge, Ethernet to wireless bridge, and wireless gate. However, infrastructure is the most commonly used with an access point connected to a wired infrastructure.…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Riordan Enterprises has requested to look into the possibility of adding wireless capabilities to their existing network. The need for wireless is understandable. It enables employees to be productive from anywhere. If they need to travel to a potential customer in Montana, or are at a plastics conference in Hawaii the ability to connect to the Riordan’s intranet is vital. Not only does it allow the employee to continue to stay connected with work, it also allows them to share the intranet and all it has to offer to potential clients, as well as offering those potential clients use of the system for easier ordering and up to date financial and tracking information regarding their purchases. This is why a Virtual Private Network would be a good tool to add to the Riordan tool bag. It will allow the current network to stay intact as well as adding the ability to access the network from anywhere. This adds in the efficiency and productivity of Riordan and its many employees and global locations.…

    • 2267 Words
    • 10 Pages
    Powerful Essays
  • Best Essays

    A Network Protocol

    • 1423 Words
    • 6 Pages

    This paper is a continuation of our previous scenario of developing a Wide Area Network for an audio and video special effects company with worldwide offices in the U.S., Europe, Japan, and South America. This part of the project details the types of network protocols we’re proposing to utilize for the WAN and LAN throughout the corporation.…

    • 1423 Words
    • 6 Pages
    Best Essays
  • Satisfactory Essays

    II. Central University Suppose you are the network manager for Central University, a medium-size university with 13,000 students. The university has 10 separate colleges (e.g., business, arts, journalism), 3 of which are relatively large (300 faculty and staff members, 2,000 students, and 3 buildings) and 7 of which are relatively small (200 faculty and staff, 1,000 students, and 1 building). In addition, there are another 2,000 staff members who work in various administration departments (e.g., library, maintenance, finance) spread over another 10 buildings. There are 4 residence halls that house a total of 2,000 students. Suppose the university has the 128.100.xxx.xxx address range on the Internet. How would you assign the IP addresses to the various subnets? How would you control the process by which IP addresses are assigned to individual computers? You will have to make some assumptions to answer both questions, so be sure to state your assumptions. The best way to address the following issue is to first identify the network requirement for Central University. The establishment of the solution must consider the various buildings, and departments as well as future growth expectation. When establishing a large network between buildings and departments, it is essential for the network manager to identify what parts of the network are available, requiring upgrades, and or facilitates space for additional equipments. The first assumption is that every building has sufficient routers, switches, and network fabric to handle the traffic on this scale. Acquiring subnets for privacy to keep frivolous student traffic off their subnets along with maintaining the faculty and staff on separate subnets for privacy. These subnet breakdowns will not be sufficient enough. Using Dynamic Host Configuration Protocol servers to assign individual IPs and alleviate the issue of having to assign static IPs to people will be the right choice for securing, and facilitating the…

    • 517 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    In recent several years, there has been a rapidly growing interest in Underwater Wireless Sensor Networks (UWSNs). UWSNs can be used for a broad range scientific exploration, including ocean sampling, environmental monitoring, undersea Explorations, disaster prevention, assisted navigation, distributed…

    • 3630 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    of Computer Science and Engineering Pennsylvania State University, University Park Email: {xji, zha, metzner}@cse.psu.edu † Department of Electrical Engineering Pennsylvania State University, University Park Email: kesidis@engr.psu.edu leads to large amount of information delivery. In general, the cost for computation locally is much lower than that for communication for a sensor. In order to prolong the life of a wireless sensor network, it is desirable to minimize the communication costs in operating the sensor network. The continuous objects can be some poison gas or biochemical materials, which are released maliciously from some specific source and then slowly diffuse. Although they are usually in three dimension space in reality, it is generally more interesting to know their locations and spread in a two dimension plane of the earth’s surface. Figure 1 (a) illustrates the detection and tracking of three continuous objects. Sensors around the objects detect and track their boundaries and send the boundary information to the sink in hop-by-hop fashion along the dashed lines. Then, the sink relies the boundary information to outside computers or the Internet. The most efficient manner to identify the existence of the objects is to probe their boundaries. The boundary of a continuous object is consecutive and enclosing the continuous object, inside which the content of the target material per unit region is nearly homogeneous and higher than a threshold. We hope to find portion of objects’ boundaries that are inside the area with sensors deployed. Current signal processing techniques enable sensors to precisely detect the content of target material at their nearby region. However, it is desirable to propose some infrastructure to facilitate sensor collaboration. The continuous objects…

    • 4287 Words
    • 18 Pages
    Powerful Essays
  • Best Essays

    CHEN Xi-hao, CHEN Hui-min and ZHOU Wei,” Least-mean-square routing with load-balancing for wireless ad hoc networks” J Shanghai Univ (Engl Ed), 2008, vol.12(2),pp. 131–135…

    • 3772 Words
    • 16 Pages
    Best Essays
  • Good Essays

    Retailers use the beacon to identify their patrons, fathom their daily needs, push the message accordingly to increase customer loyalty and build a strong relation with them.…

    • 867 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Wireless technology

    • 720 Words
    • 3 Pages

    [1] Introduction It would be hard to imagine a world without wireless applications and services. Around the globe, mobile services are playing increasingly important roles in many facets of our society. Just a decade ago, mobile services consisted primarily of basic voice communication. Today, we depend on mobile services not only for communication, but also for education, entertainment, healthcare, location and m-commerce.…

    • 720 Words
    • 3 Pages
    Good Essays