Sunday, March 31, 2019
Wireless Sensor Networks: Applications and Forms
piano tuner detector mesh topologys Applications and Forms1 radio receiver Sensor NetworkIn this chapter, receiving set sensor lucre (WSN) principles ar being shortly introduced and discussed. In enact to increase the level of understanding for analyzing Wireless Sensor Network (WSN) clays it is effectual to study the technology behind them the technologies which ar presented in this section.Wireless Sensor Networks (WSNs) ar distributed and independent sensors that argon machine-accessible and worked together to measure quantities more than(prenominal) as temperature, humidity, public press, noise levels or vibrations 5. WSNs kindle measure vehicular movement (velocity, location, and so on) and monitor conditions much(prenominal) as lightning condition, soil makeup and motion 5. Nowadays, WSNs ar utilized in m some(prenominal) common coats such as vehicle practises. Some of vehicle applications atomic number 18 vehicle tracking and detection, tire pres sure observe, vehicle speed detection, vehicle verbatimion indicator, traffic control, reversing aid sensors and so on Such applications can be divided in major categories such as safety, certification, environment and logistics.To instrument WSN in an application and pay an high-octane system, first we subscribe to to consider about WSN technology, genes and dialogue topographic anatomy and talks conferences protocols. Therefore, first, in this chapter, basic info about WSN components, the converse devices and process unit of WSN depart be described. Then, the chapter pull up stakes be followed by a description of the WSN topologies and protocols show on mesh WSN technology with ZigBee Protocol.1.1 Wireless Sensor Network componentTo leave comprehensive view of WSN ironware, understanding of WSN components structure is required. Wireless sensors are sm both microcontrollers render with radio receiver talk device and an vigor supplier. The computer computer computer computer architecture of WSNs is illustrated in Figure 31 .As Figure 31 shows the components of WSNs are sensing unit, processing unit, effect supplier and communication device. The sensing unit consists of sensors and Analog to Digital Converters (ADCs). ADCs are responsible for throng the bespeaks and converting them into digital indicates entropy and transfer them through individu bothy some early(a) development mesh communicate topology topology to the processor unit. In the sensing unit, for each one sensor is called an end customer and varies in size and cost. The mission of these multifunction sensor nodes are to sense, process entropy and collaborate with early(a) nodes 8. Wireless sensor meshing can be positioned in two ways, either apply a complex technique with the large sensors far from the determination or using several sensors with an engineered formula on position and topology 5. In addition, each node leaved with a receiving set commun ication transceiver as a communication component.In the process unit, the controller and small memory storage are responsible for managing the collaboration within the sensors to achieve the assigning task. In addition, the communication device with a transceiver makes the net connection. Above all, the essential component of WSN is the power unit, which supports the power for all units 5.One of the unique propertys of sensor webs is that they are equipped with an on-board processor. This feature enables them to locally process some simple computations and broadcast that necessary processed information 5. Network communication is really alter and needs years of study 8, but to be able to implement WSN, we need to know some basic primary concepts of communication technology such as earnings topologies, profit protocol and their loftys and specifications.1.2 conversation technologyTo cover technical aspects of WSN, net profit topology and profit protocol analyse is neede d. This study will help to provide information about reliableness, burlyness, security and stability and of WSNs software aspect to answer the research questions RQ. 1 ,RQ. 2 and RQ. 3 .1.2.1 Topologies in WSN discourseIn engagement communication, the big figure is how information transfers through nodes and nodes interconnect with each other(a)wise. Several basic network topologies may be apply for transmitting to and receiving from a node. The Alliance for Telecommunications labor dissolving agents (ATIS) the standards organization of telecommunication industry explained the network topology as The physiologic, real, consistent or virtual ar come outment of the nods/elements of a network 9. The topology shows the diam and the number of nodes surrounded by any two nodes. Moreover how a info process and the info routing complexities are relied on the chosen topology. Consequently, some characteristics of a sensor networks such as latency, robustness and capacity ar e traded by their topology 10.Figure 32 is a graphic role of networks topology which shows the links of one or much nodes and explains the physical topology of the network. Despite having the alike topology, two networks can differ in contagion rates be acquire of their physical interaction, signal types and di emplacement surrounded by nodes 9. prorogue 31 describes the distinguishable types of network topology. remand 31 topographic anatomy TYPES 9.Since Mesh topology is a chief(prenominal) topic in the thesis, it is canvass more in-depth in this section1.2.1.1 Mesh Wireless NetworkWireless mesh network is a term used when all wireless nodes are connected to each other within an ad-hoc multi-hob and mesh topology. In this network, any pair of nodes is able to communicate between each other within more than one elbow room. In this network each node is used as a router to forward packets to the neighbor nodes which they leave colligate to. That means all nodes communicat e directly or through other midway nodes without any manual configuration. Therefore, this network as well as called a self-configuration and self-organized network 11 12.As described in circuit card 31, there are two types of mesh topology Partially connected and Fully connected (See Figure 33). In a fully connected topology each node has the ability to communicate with all other nodes in the network and creates an interconnection links. By increasing the number of nodes in a mesh network, the number of links increases as well. On the other hand, in a fond(p)ly connected topology, instead of direct interconnection between nodes, each node has two or more links to others to provide alternate routing and traffic balancing. Due to more links and indirect connections between nodes, traffic can flow through one or more router nodes to the destination 7 and create more undeviating interconnections between nodes.Moreover, in partial network, the nodes are connected to either the node with higher(prenominal) rate of entropy transaction or the nearest neighbor node while in fully connected network all nodes have a direct links with each other. This multiple link path conducts a reliable communication. Therefore, whenever a connection let ons or a node breaks polish up, the packages can automatically change their path by jumping from a disconnected node. This is much called the self-healing of the network. This means that the networks connection stability and dependability are not essentially affected by node failures 11.Due to the characteristics of wireless sensor network mesh, this network is self-configuring and self-organizing network in which each end-node is also used as a router (dual role- info originator /data router) to forward the signal packages all the way back of the main gate.Therefore, cod to the characteristics of mesh networks, this network is becoming one of the most implemented networks which able to have the flexible architecture f or the network, easy self-configuration and robust slip perimeter connectivity 11 12. Additionally, the self-configuring characteristic of mesh WSN, induce the ability for the network to connect or disconnect nodes from the network. This brings the ability to assume/decrease the network by adding/removing nodes of a system.Mesh WSN has reliable self-healing and robust fault gross profit. This means if a node fails or breaks down the signal packages jump from the disconnected node and automatically conducts a new path through the nearest node. However, the new path imposes re-routing and re-organizing to the network 5, which consumes too much power from the system. Therefore, having a power-aware protocol and algorithm is necessary for mesh network. ZigBee protocol is one of the protocols which provides this ability for WSN.1.2.2 Protocols in WSN CommunicationWSN systems include variety of protocols for communication. Protocols need to program in different architectural moulds. One of these architectural standard is OSI (Open frame Interconnection) framework. In this session a brief introduction of each protocol and OSI are delineated.Figure 34 shows the graphic overview of all wireless network technologies. This figure illustrated IEEE PAN/LAN/MAN technologies and clearly shows how these standards and protocols can be used in different conditions. For instance, 3G protocol is used to cover a long range of audio information in a wide area network (WAN) while for the same information in a short range and personal area network (PAN), Bluetooth is make better.The standard conceptual rules set for data representation, data communication and mistake detection across two ends in telecommunication, are called communication protocols. These wind rules represent in different horizontal surfaces of communication. There are different protocol stacks introducing different architectures for these social classs such as AppleTalk, Distributed Systems Architecture (DSA), Internet protocol suite (TCP/IP) and Open Systems Interconnect (ISO/OSI). Figure 35 (a) illustrates the different stages of an OSI Model and their functionalities. The OSI model has seven layers and each layer provides assistances for the focal ratio layer and requests services from the impose layer. Figure 35 (b) shows the true communication protocols layers. Each of these layers has to deal with different imports regarding the communication procedure.As the emblematic protocol stack model shows in Figure 35 the communication protocols should implement all layers from bottom to top. In addition, a instruction protocol needs to be use in each layer to fake power ability, robust connectivity and connection reliableness (see Figure 35 b). Below, rules and functionality for each layer are described* Physical layer is responsible for signal processing and physical interface connectivity between a device and physical medium and used bit stream in its data unit. It acted as communication channel for sensing and actuation in cost-efficient and reliable carriage. Some examples of this layer are IEEE 802.11b/g Wi-Fi, IEEE 802.15.1 Bluetooth, IEEE 802.15.4 ZigBee, etcetera 7* Data link layer provides functionality toward channel sharing, Medium Access retain (MAC-Layer), timing (e.g. data time arrival), local link and capacity. It is responsible for sleuthing and correcting the data errors in physical layer and control the locality data comparison. It follows the protocols such as point-to-point protocol (PPP) and IEEE 802 Local Link Control (LLC). 7* Network layer is responsible for network routing functionality, network security, push and power efficiency and reliability of the communication. It includes the network topology management and manages the information and detects errors in data transfer from router to router. A number of protocols is address in this layer such as Internet protocol (IP), Threshold Sensitive Energy melodylike Sensor Network Protocol and etc. 7.* Transport layer provides lengthways transportation (distributing and gathering) of data between end users. It includes storage and responds for caching and controlling the data to recover them back to the initial message that has been sent. Best-known protocols for this layer are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) 7.* upper layers The Upper Layers are responsible for application processing, external query processing and etc. Upper layers include presentation layer session layer and application layer 7.The summary of these standards and protocols are shown in Figure 36Among all the standard and protocols, IEEE PAN/LAN/MAN technologies are the ones applied in the majority of commercialWSNs to support physical layer and link-data layer signal infection. As SOHRABY and ZNATI (2007) mentioned, the most common best-known protocols are (1) the IEEE 802.15.1 (also known as Bluetooth) (2) the IEEE 802.11a/b/g/n series of wire less LANs (3) the IEEE 802.15.4 (ZigBee) (4) the MAN-scope IEEE 802.16 (also known as WiMax) and (5) radio-frequency identification (RFID) tagging 7. Each of these protocols has their own benefits and constraints. The comparisons between IEEE technologies are mentioned in Table 32. As Table 32 shows the IEEE 802.15.4 standard provides data rate of 20 to 250 kbps and operates in the 2.4-GHz ISM circle. This standard covers signals in range of 10 m and requires the lowest power among other IEEE class. While IEEE 802.11a/b/g/n transmits the data in the rate of 54 Mbps ideal for wireless internet connections and operates in the 2.4-GHz ISM (Industrial, Scientific and Medical) radio band as well as the 5-GHz ISM / 5-GHz U-NII (Unlicensed National Information Infrastructure) radio band. However, it requires much higher power consumption than IEEE 802.15 7.Recently, researchers put much causal agency to develop a cost-effective standards-based wireless networking solution that supports l ow-to medium data rates, has low power consumption, and guarantees security and reliability 7. ZigBee Alliance is an association of companies which aims to provide such a standard for WSN consumers. Their mission is to have a simple, reliable, low-cost, low-power and standards-based wireless platform1.2.2.1 ZigBee standardThe ZigBee standard builds on IEEE 802.15.4 and is suitable for remote monitoring and controlling applications. Although it has lower-data-rates than the other standards, its reliability, security, long life battery with less complexity mechanism make it ideal for building automation in industrial network applications. The architecture of the ZigBee stack is established on the Open System Interconnection (OSI) model. The IEEE 802.15.4 defines the physical layer (PHY) and medium access control (MAC) sub-layer and In addition, ZigBee Alliance defines other functionalities for upper layers 7. Figure 37 is a graphic overview of ZigBee protocol stack and shows the resp onsibility areas of IEEE 802.15.4, ZigBee Alliance platform and users applications 7. This examine also shows the basic functionality of each layer.The data transmission service is provided by PHY layer and the protocol in this layer enables the connection between data units and the physical radio channel. ZigBee provides three different frequency band options for PHY layer. First, the transmission data-rate of 250kbps in 16 carry at 2.45GHz (Global) frequency. Second, with 40Kbps in 10 channels at 915MHz (Americas). And the last one, with 20kbps in 1 channel at 868MHz (Europe). The higher data-rate braces a higher order in modulation design and the lower frequency cause a larger cover area and better sensitivity. Depending on the power output, the transmission distance rate can change from 1 to 100 meters. (For more detail information see Table 71 in Appendix A)ZigBee WSN has the ability to have atmospheric static or dynamic network/component with either star or mesh topology and it has three types of nodes a ZigBee Coordinator (ZC), ZigBee Routers (ZR), and ZigBee End-Devices (ZED).In order to have a communication protocol and physical connection both PHY layer and MAC sub-layers of the architecture should be defined upon agreement between innkeeper and clients. These layers require manual administrative procedures setting for server/client entrance.The succeeding(a) three levels namely the network layer, security protocol and transport layer are defined by ZigBee alliance platform automatically. The last layer, application layer, has to interact with the user-interface and other applications it ought to be programmed with high-level language so that integration with any existing devices applications becomes more conveniently practical.The ZigBee stack in gateway is responsible for all the network functionality such as network process management, authentication of the joined nodes, tie uping nodes and routing the messages throughout the network. ZigB ee stack as a standard protocol, has clusters and libraries for improving the implementation process, therefore, using ZigBee compare to other protocols makes the system (including both hardware and software) development process much faster and easier. On the other hand, such standardisation provides easiness of adopt with third troupe sensors regardless of manufacturer, which might be attached to the network later.2 package AspectsTo address the research question regarding the reliability, robustness, and security of any WSN application, it is essential to enquire the software architecture of that network. For convenience in description of the architecture of a WSN application, it is divided into three segments Physical devices (such as lamps, sensors, nodes), Communication Protocol (terminals and servers, bridge, switch, network topology and standard) and Carried Information (application, functions, etc.).Any attempts to retain a diminutive design on software architecture for each part will cause an effective data transmission, which ensures reliability and security of the system 7. Hence achieving any desired data transmission precision level in a WSN, network management (NM) techniques are applicable. Such techniques assist in network status monitoring, reliability and security amendment, and cooperation supervision between components 7. NM techniques could also detect and resolve network faults in addition to restoring the system individually 7.In practice, designing WSN application necessitates tailoring NM techniques for each architectural segment. Various NM techniques regarding each segment are summarized as follows 7 12 5a) Physical architectureSensing and processing management, operation and administration, fault tolerance, maintenance, energy efficiency management, configuration management, cognitive process management, security management, network element management.b) Communication architectureNetwork management, networking protocols, netwo rk topology, function management, monitoring functions, fault management, performance management, security management, service management and communication, maintenance management, network configuration and organization, network behavior, data delivery model, sensor mobility, naming and localization, sensing coverage area, communication coverage area energy efficiency managementc) Information architectureReal-time information management, mapping management, service management, analyze information, control application, business application management report management, sending and receiving commands or response, naming, localization, maintenance, fault toleranceAforementioned NM techniques enhance grapheme of the system. According to ISO 9126-1 software quality model Table 41 13 14 15, the quality characteristics of a system could be divided into six fundamental properties functionality, reliability, usability, efficiency, maintainability, and portability. According to the same docu mentation, these characteristics are broken to sub-characteristics such as suitability, security, maturity, fault tolerance, adaptability, analyzability, stability, testability and so on 13. However, focusing on all subcategories collectively exceeds the time horizon of this research, from this stance three dimensions namely reliability, robustness and security are brought into attention.This section will be divided to two subsections describing the architecture issues and NM techniques for (1) Reliability and rigour, (2) Security, of WSN and other characteristics is relegated to future studies.2.1 Reliability and RobustnessIn WSNs context, the probability that a network functions properly and aggregates trustworthy data without any interruption continuously, is usually referred to as reliability characteristic of the network 23 20. According to ISO 9126-1 software quality documentation, reliability characteristic shows the capability of a network to maintain or re-built (re-start) the service in certain period of time 13. So, it is important that during long sensing, the network has to service up continuously. Reliable service of a network includes precise and proper sensing, delivering and sending acceptable data to the base station. In other words as Taherkordi et al. (2006) put The less loss of interested data, leads us to higher reliability of a system. Systematic approach perceives reliability as probability of data delivery to the base station kinda than point-to-point reliability 16.Robustness defined by Sohraby et al. (2007) as a combining of reliability, availability, and dependability requirements, reflects the degree of the protocol insensitivity to errors and misinformation. Achieving system robustness in WSN, necessitates system capability to detect, tolerate and confine errors as well as reconfigure and restart the network respectively 7. According to the given definition by Sohraby et al. (2007), it is apprehensible that reliability and robus tness share commonalities with each other this is the main rational behind discussing these two attributes together in this section 7.Considering the personality of communication in WSN, a network is unpredictable and prone to fail caused by any physical damages in hardware devices, energy depletion, communication link error, information collapses in packages and etc. 17 16. Therefore, one of the faultfinding issues in design phase of WSN is applying fault tolerance techniques to optimize the network so that reliability and robustness attained 17. These techniques enable the network to check and recover any upcoming failure and restart operation 13.Liu et al. (2009) categorised fault tolerance techniques into node placement, topology control, target and event detection, data gathering and aggregation, and sensor surveillance. Reminding from the beginning of this chapter architecture design divided into three segments. Table 42 depicted a summary of the credible related faults a nd their solutions in each segment. In the following, each aforementioned fault tolerance techniques are being discussed in each design segment.Table 42 The most probable fault and their fault tolerance solutions in WSN 17 7 182.1.1 Reliability and Robustness of Physical Architecture slip any physical interruption in sensor surveillance Solution Node placement management and signal-effect managementFirst item that should be considered in designing physical components architecture for reliability and Robustness is physical placement and signal-effect management. As it is mentioned in section 3, although the mesh network communication is self-organize topology and does not need any manual configuration to bind the network for mobile sensors, the physical architecture and the location schema of the hardware components, sensors and gateways need to be designed carefully 7.As a characteristic of mesh WSN, the sensors in network are free of any generalization restrictions, even though, the placement should be far from any physical end or hostile locations. Inappropriate physical placement of sensor transmitters and gateway antenna can cause noise or significant muzzy in signals 7. In addition, the signal coverage is decayed by touch objects and materials such as metal wall and the like. (E.g. exterior wooden, concrete, brick or gypsum frame, closure or wall). Especially in the case of vehicles, the main body can impose such problem and henceforth installation of the sensors in this manner would be delicate.Moreover, the signal waves might be faded and affected during the transmission, due to various physical phenomena such as grammatical construction, diffraction or bedspreading 7. These effectuate would cause significant interruption in sensor surveillance. Therefore, it is important to manage these signal-effects in early stage of WSN physical architecture design.Reflection occurs when electromagnetic wave of signals is duplicated due to impinge of the wav e on large object or surface such as walls, buildings and the Earth 7. Therefore, all the reflection of the walls and also the Earth should be acknowledged in physical architecture design.Diffraction refers to any defection and obstruction in waves caused by improper intense edges during the data transmission between the transmitter and receiver 7. In this case, designers have to be prudent in sensors placements in the proximity of sharp edges and break angels.Scattering refers to any deviation from straight line. Environmental obstacles in the wing path affect passing waves from their original structure. Even small irregular object such as street signs, and lampposts might encounter and scatter the wave. Hence WSN should be design to face with any irregular aspersion during the wave transmission. Above all, the mobility of sensors and surrounding objects might fade the signals and add noises that should be considered in architecture design 7.These issues are the basic physical factors, which cause major fault in data aggregation of WSN and cut down reliability and robustness. These destructive signals need to be subtracted from the received signal paths 7 forward sending the data to gateway. Therefore, reflection, diffraction and scattering should be considered not only by designers in the physical components placements, but also by programmers in network development. Fault Sensors failure Solution Hardware replacementThe next issue that needs to be considered in designing the physical architecture of a WSN is hardware failure. Sensors energy suppliers or any damages to the sensors and/or their transmitters are the sources of hardware failure. Regardless of source of failure, the WSN must be capable of cognitive operation as well as replacing and switching sensors when necessary. Additionally, any changes in the physical components, on one hand, needs an explicit and well-defied consideration on security issue to prevent any potential threats, and on t he other hand, needs an adaptable and configurable communication connection network 18.2.1.2 Reliability and Robustness of Communication Architecture Fault communication link errors Solution regional anatomy control and event detection , Replicated services in communication model,Communication link error is an important concern in dealing with reliability and robustness of a network in communication architecture. The sensors in WSN are prone to fail and make link errors in point-to-point reliability of communication protocol. Therefore, it is the network topology responsibility to detect the errors and guarantee the overall reliability of the syste
Subscribe to:
Post Comments (Atom)
What Warren Buffets eating habits can teach you about your career
What Warren Buffets dietary patterns can show you your profession Have you at any point heard the expression ââ¬Å"you are what you...
-
The expert age of piety - try on exemplarAs deal add-on much engineering light they make headway likewise a understanding of no...
-
Q Contrast side of meat with one other quarrel with pry to TWO particular points of grammar or vocabulary. With reference to that point o...
-
Byzantine Art proveThere are worldly concerny differences and similarities betwixt the following two pieces of art the bullfighter Fres...
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.