Professional Documents
Culture Documents
• Wireless Sensor Networks are networks that consist of sensors which are distributed in
an ad-hoc manner.
• These sensors work with each other to sense some physical phenomenon and then the
information gathered is processed to get relevant results.
• Wireless sensor networks consist of protocols and algorithms with self-organizing
capabilities.
Sensors
• Monitoring of objects.
• Monitoring of an area.
Monitoring Area
• Precision Agriculture
• Military Surveillance
• Treaty Verification
• Intelligent Alarms
Precision Agriculture
Monitoring Objects
• Structural Monitoring
• Eco-physiology
• Condition-based Maintenance
• Medical Diagnostics
• Urban terrain mapping
Condition-based Maintenance
IRISNET
• Internet scale Resource Intensive Sensor Network Services
• World Wide Sensor Web
• Applications include Parking space finder, Watchmychild (or watchmyparent) services,
etc.
• Demands:
• Planet wide
• local data collection and storage
• Real Time Adaptation of collection and processing
• Data as a single queriable unit
• Queries posed anywhere on the internet
• Data Integrity and Privacy
• Robustness
• Ease of service authorship
Sensor Networks for Emergency Response
• How to monitor and deal with a large number of casualties in a disaster response
scenario?
• How to strategically identify and stratify severely injured patients and provide transport
to trauma care center?
• How can sensors help in monitoring vital signs of a victim and aid locating the victims?
Code Blue
• CodeBlue comprises of a suite of protocols and services that let many types of devices
like sensors, handhelds, etc coordinate their activities.
• CodeBlue architecture does not use the traditional agents or RPC mechanism to
operate.
Motes
• Motes, grammatically is a speck of dust, technically referred to as smart dust with limited
computing and communication abilities.
• The picture represents Mica2, developed by UC Berkeley, is a popular sensor node
design.
• 7.3MHz microcontroller with 4K RAM and 128K ROM.
• Single chip radio CC1000 capable of operating at 76.8kbps.
• Range of operation: 20 ~ 30 meters.
SCS5619-MOBILE AND PERVASIVE COMPUITNG-UNIT-III
• Pulse Oximeter shown on left measures patient’s heart rate and blood oxygen
saturation.
• EKG shown on the right measures the patient’s heart rate and rhythm.
• The information is transmitted to monitoring device using differential encoding scheme.
Monitoring Device
In-Network Processing
To reduce communication costs some algorithms remove or reduce nodes' redundant sensor
information and avoid forwarding data that is of no use. As nodes can inspect the data they
forward, they can measure averages or directionality for example of readings from other nodes.
For example, in sensing and monitoring applications, it is generally the case that neighboring
sensor nodes monitoring an environmental feature typically register similar values. This kind of
data redundancy due to the spatial correlation between sensor observations inspires techniques
for in-network data aggregation and mining
SCS5619-MOBILE AND PERVASIVE COMPUITNG-UNIT-III
Aggregation Queries
SELECT AVG (sound)
FROM sensors
EPOCH DURATION 10s
SELECT region, CNT (occupied) AVG (sound)
FROM sensors
GROUP BY region
HAVING AVG (sound) > 200
EPOCH DURATION 10s
SCS5619-MOBILE AND PERVASIVE COMPUITNG-UNIT-III
TinyDB Architecture
Types of Aggregates
• SQL supports MIN, MAX, SUM, COUNT, AVERAGE
• Any function over a set can be computed via TAG
• In network benefit for many operations
– E.g. Standard deviation, top/bottom N, spatial union/intersection, histograms, etc.
– Compactness of PSR
Data Dissemination
Data dissemination is the distribution or transmitting of statistical, or other, data to end users.
• Process of diffusing the data, query to the various sink nodes.
• Methods of dissemination
• Directed diffusion
TTDD (Two Tier Data Dissemination)
SCS5619-MOBILE AND PERVASIVE COMPUITNG-UNIT-III
• Goal:
– Efficient data dissemination from multiple source to multiple mobile Sinks
– Reducing the number of packets for efficient energy consumption
– Supporting mobile nodes
• Enhanced method uses:
– Using a permanent grid structure
– Cross-shaped trajectory
– Use Cluster concept
– Use hybrid routing
Assumptions and Basic Model
• Basic model
– Multiple mobile sink nodes exist in the sensor network.
• Assumptions
– Each sensor node is assumed to be aware of its own geographic location
– Sensor nodes remain stationary
– Homogeneous sensor nodes are deployed in a wide sensor field.
– One-hop communication is used for data transmission between proximate sensor
nodes and multi-hop communication for distant sensors.
– Each sensor node is aware of its available energy.
SCS5619-MOBILE AND PERVASIVE COMPUITNG-UNIT-III
• Example
Sensor Databases
A sensor database involves a combination of stored data and sensor data. - Sensor data is
generated by signal processing functions. - Stored data include the set of sensors that
participate in the sensor database together with characteristics of the sensors (e.g., their
location) or characteristics of the physical environment.
SCS5619-MOBILE AND PERVASIVE COMPUITNG-UNIT-III
Some Examples: - monitoring in-building energy usage for planning energy conservation -
Supervising items in factory warehouse - Gathering information in a disaster area - military and
civilian surveillance - fine-grain monitoring of natural habitats with a view to understanding
ecosystem dynamics
data gathering in instrumented learning environments for children - Measuring variations in local
salinity levels in riparian environments - what make some of today’s network different : 1- they
operate unattended and untethered. 2- energy-efficiency is becoming a primary design
consideration
Approaches: -
- processing of sensor queries and access to the sensor network are separated.
- Data is extracted from the sensor network in a predefined way and is stored in a database
located on a unique frontend server.
- It periodically retrieves data from the sensor network and stores the data at a centralized
database.
- It requires significant communication and that requires energy - Limitations: exhaust the
energy of the sensors and produce a lot of redundant data
Approaches:
Distributed Approach:
- The query workload determines the data that should be extracted from sensors.
- Flexible: different queries extract different data from the sensor network
- Efficient: only relevant data are extracted from the sensor network.
SCS5619-MOBILE AND PERVASIVE COMPUITNG-UNIT-III
COUGAR:
- The COUGAR System is a platform for query processing techniques over ad-hoc sensor
networks
- Treats a sensor network as a distributed database
- A query optimizer is located on the gateway node to generate distributed query processing
plans after receiving queries from outside
- The COUGAR forms clusters out of the sensors to allow intelligent in-network aggregation to
conserve energy by reducing the amount of communication between sensors.
- Each sensor type has a standard Abstract Data Type representation which is used at all
nodes. It is not possible to insert sensing nodes with new sensing capabilities into the network in
an ad hoc manner.
Architecture:
- The Query Proxy: a small database component that runs on sensor nodes to interpret and
execute queries
- Frontend component: which is a more powerful Query Proxy that permits connections to the
world outside of the sensor network?
- A graphical user interface through which users can pose ad-hoc and long-running queries on
the sensor network.
TinyDB
- Enquiry processing system for sensor networks that operates on TinyOS
- TinyDB provides a simple SQL-like interface to query sensor data mush as you would pose
queries against a traditional database
- Query processing system for extracting information from a network of TinyOS sensors
- collects data from motes, filters it, aggregates it together, and routes it.
Every node has an identically structured sensor table containing local sensor data. Each type of
sensor corresponds to an attribute (column) in this table.
Motivation:
- The primary goal of TinyDB is to allow data-driven applications to be developed and deployed
much more quickly.
- Acquire and deliver desired data while conserving as much power as possible
- TinyDB transforms diverse kinds of sensor networks into user-friendly virtual databases rich
with raw information about the real world.
SCS5619-MOBILE AND PERVASIVE COMPUITNG-UNIT-III
Database in every sensor: - Deployment experiences show that aggregation is rarely used in
practice. Indeed, in many cases each device has and a unique task - Each sensor device
should run its own database system. - Low-power flash memory has both rapidly decreased in
cost and rapidly increased in storage capacity.
The energy cost of a query that selects 100 tuple is less than the cost of single packet
transmission.
Antelope:
- Antelope contains a flexible data indexing mechanism that includes three different indexing
algorithms
- Each node in the sensor network provides a database interface to their stored data and each
mote runs a database manager for energy-efficient data querying
- Queries are made to individual nodes instead of to a dedicated sink node
Antelope consists of eight components:
1- query processor: which parse AQL queries
2- Privacy control: which ensures that query is allowed
3- LogicVM: which executes the query
4- Database kernel: which holds the database logic and coordinates query execution
5- Index abstraction: which holds the index logic
6- Index process: which builds indexes from existing data
SCS5619-MOBILE AND PERVASIVE COMPUITNG-UNIT-III
Back in the early ’90s, the authors of were the first to deal with the problem of data management
in distributed mobile environments. It provoked a new research direction with several names
such as pervasive computing, ubiquitous computing, and nomad computing, anywhere anytime
computing. At that time, the idea of cell phones becoming personal digital assistants, or pocket
computers was still largely a fantasy.
Since then, mobile devices have been continuously getting smaller, cheaper and more powerful.
Nevertheless, there are some inherent shortcomings of mobile computing that still exist and,
more importantly, are not expected to be drastically confronted with in the near future. These
are the following:
• Wireless bandwidth: WLANs are capable of providing 56 Mbit/s bandwidth, but this is rather a
theoretical value, since real applications usually have to live with a lower value. Wireless
bandwidth is constantly increasing, but not at a tremendous rate.
SCS5619-MOBILE AND PERVASIVE COMPUITNG-UNIT-III
• Small display size: The limited screen size of mobile devices is a severe limitation, since a
considerable increase is not expected. Data analysis becomes extremely problematic using
such devices. Therefore, the end user interface design cannot follow the traditional desktop
principles.
Wireless Information Broadcast
Data broadcast has added another dimension in the area of mobile computing. Data access
from wireless channels is a very useful facility because it allows users to get desired data
through many computationally enabled devices.
In reality, wireless channels are always fewer than the number required to satisfy user
demands. Thus, the task of data dissemination technology is to develop ways for satisfying data
demand with limited wireless resources.
Data broadcast is a 1-to-n process, enabling enhanced scalability.
The effectiveness of data dissemination systems is evaluated by its ability to provide users with
required data ubiquitously. Data broadcast can be managed with three different modes: on-
demand, push-based and hybrid.
Broadcast Structure
In broadcast systems, there is no traditional network stack. Data is transmitted in the form of
buckets. Buckets are also called data blocks or frames. Practically, buckets reside on top of the
wireless Medium Access Control (MAC) protocol. In broadcast systems, mobile clients must
wait until the server broadcasts the required information.
Indexing techniques are used to implement selective tuning in wireless environments. Indices
are broadcast together with data to help mobile clients locate the required information, as shown
in above Figure. In most systems, buckets are classified into index and data buckets.
Air indexing is fundamentally different than disk indexing. While disk indices represent a path or
an offset in the disk (where accessibility is direct), air indices provide solely a time offset
indicating when the pointed item is going to appear in the wireless channel.
Broadcast Architectures
On-Demand
In on-demand broadcast, clients make explicit requests for data. If multiple clients request the
same data at approximately the same time, the server may match these requests and only
broadcast the data once. Such architecture is shown in above Figure.
However, this approach has many disadvantages. First of all, it is resource intensive. Users
require a separate channel to send requests to the server. The server, after receiving the
request, composes the result and sends it to the user on a back channel (downstream) known
to the user.
Push-Based
In push-based systems, the server employs point-to-multipoint communication and sends data
items in the absence of explicit client requests. In order to achieve that, the server maintains a
broadcast schedule, which determines the order and the frequency in which data items are
broadcast. Such architecture is shown in the above Figure.
The major feature of such systems is scalability. Client population does not influence the
dissemination process because clients do not issue requests. The addition of new clients does
not influence the server’s incoming load or the client perceived access time.
The major problem of push-based systems is their lack of self organization and adaptiveness.
As the name suggests, hybrid data dissemination is a combination of on-demand and push-
based approaches. Data items are classified into popular and unpopular (respectively, hot and
cold).
SCS5619-MOBILE AND PERVASIVE COMPUITNG-UNIT-III
Popular data items are delivered via push-based channels, while unpopular data items are
disseminated via on-demand channels. Such architecture is shown in above Figure.
Typical design issues in hybrid systems are channel allocation (number of push and on-demand
channels), data classification (cold or hot) and item scheduling.
Document classification and bandwidth division are interrelated issues, simply because a given
bandwidth division determines the performance of a document classification choice and,
conversely, a given document classification determines a bandwidth split that optimizes
performance.
Mobile Databases
Mobility and portability pose new challenges to mobile database management and distributed
computing. In conventional database systems, there is one common characteristic: All
components, especially the processing units, are stationary.
The first research efforts for mobile databases concentrated on relational databases. The
presence of personal and terminal mobility incurs several problems related to the maintenance
of the ACID (Atomicity, Consistency, Isolation, and Durability) properties. Naturally, the ACID
properties of a transaction must be maintained in all data management activities.
Transaction Processing
Transactions models for mobile environments are different than those used in centralized or
distributed databases in the following ways.
SCS5619-MOBILE AND PERVASIVE COMPUITNG-UNIT-III
Query Processing
Query optimization techniques have to consider the effects of mobility. Query processing in
mobile environments can be divided into queries that involve only the content of the database,
and location based queries. Mobility has several effects on the ACID properties. Location data
may involve location based queries or location aware queries.
Other typical issues are finding the best execution plan for a query that involves data broadcast
on different channels, and defining the organization of the broadcast data so that the consumed
energy is minimized.
Caching
Cache management plays an important role in mobile computing because of its potential to
alleviate the performance and availability limitations during weak connections and is
connections. It can reduce contention on limited bandwidth networks. This improves query
response time and supports disconnected or weakly connected operations.
If a mobile user has cached a portion of the shared data, different levels of cache consistency
may be requested. In a strongly connected mode, the user may want the current values of the
database items belonging to its cache. During weak connections, the user may require weak
Consistency when the cached copy is a quasi-copy of the database items.
SCS5619-MOBILE AND PERVASIVE COMPUITNG-UNIT-III
Replication
The ability to replicate data objects is essential in mobile computing in order to increase
availability and performance. Shared data items have different synchronization constraints
depending on their semantics and particular use.
Wireless mesh network is an upcoming technology that has the potential to deliver Internet
broadband access, wireless local area network coverage, and network connectivity for network
operators and customers at low costs.
It is a communication network that have increasingly attracted Internet Service Providers (ISPs)
recently because of its rapid growing and developing of wireless technologies. WMN is a
promising technology in providing high bandwidth network coverage. WMNs will greatly help the
users to be always on- line anywhere anytime by connecting to wireless meshes routers.
Moreover, the mesh routers have the bridge functionality to connect WMNs with various existing
wireless networks such as cellular, wireless sensor, wireless-fidelity (Wi-Fi), worldwide
interoperability for microwave access (WiMAX), WiMedia networks. Thus, WMNs will deliver
wireless services for a large variety of applications.
WMN Classification
Wireless networks can be classified based on the connectivity types of the various network
elements, which are either Point to Point (PTP), Point to Multi-Point (PTM) or Multi-Point to
Multi-Point (MPM) networks.
PTP networks are reliable. However, they are not scalable and their level of adaptability is low.
PTM networks are moderately scalable, but they have low adaptability and reliability. In order to
overcome these limitations, Multi-point to Multi-point (MTM) networks are offering features that
provide high reliability, adaptability and scalability to accommodate a large number of users.
SCS5619-MOBILE AND PERVASIVE COMPUITNG-UNIT-III
Advantages of WMNs
Self Organizing and Self Configuring: WMNs are flexible in network architecture and not depend
on the implementation and the protocols. Self healing and self configuring are the WMNs
features. This, reduces the set-up time and maintenance cost. Apart from this, it enhances
network performance. Due to these features, the network service providers are able to change,
expand, and adapt the network as needed to meet the demands of the end users.
Low Deployment Cost: Mesh routers are wireless and they have the ability to service in multi-
hop environments. Thus, using wireless routers in large areas are cheaper compared to single
hop routers/access points that they have wired connections. Typically, due to wired connections
that is more expensive to install and maintain, the WMNs deployment with easier plus faster
installation and maintenance, leads to a lower operation cost.
Increased Reliability: In a WMN there are multiple paths from source to destination nodes. This
provides alternate paths in case of failure. Alternate paths may chose, in order to minimize the
bottlenecks in congested area of the network too. This also allows the traffic loads to be
balanced in the network. Load balancing and minimizing the bottleneck via alternate routing can
significantly increase network reliability in WMNs.
SCS5619-MOBILE AND PERVASIVE COMPUITNG-UNIT-III
Scalability: In traditional wireless networks, when number of nodes increases, the network
performance will be affected downward. But, in WMNs, increasing the number of nodes will
increase transmission capacity for better load balancing and alternate routes. Usually, the local
packets (generated in clients of mesh router) run faster compared to packets (generated in two
or more hops away) from the neighbors. This is mainly achievable using some WMNs
configurations and protocols that manage the communication medium.
WMN Architecture
Wireless mesh architecture design is a first step towards providing high-bandwidth Internet
access over a
Specific coverage area. WMNs consist of Mesh Clients (MCs) and Wireless Mesh Routers
(WMRs), which relaying each other’s packets in a multi-hop fashion, where mesh routers have
minimal mobility and form the Backbone of WMNs (BWMNs).
Based on the functionality of the nodes the architecture of WMNs can be classified into:
Infrastructure mesh Architecture,
Client mesh Architecture and
Hybrid mesh architecture
Infrastructure Mesh
Via Ethernet links conventional clients with Ethernet interfaces can be connected to
mesh routers.
If the conventional clients have the same radio technologies as the mesh routers then
they can communicate directly with the mesh routers
If different radio technologies are used then the clients communicate with their base
station that have Ethernet connections to mesh routers
Client Mesh
Client meshing provides peer-to-peer networks among client devices. Here no such
mesh router is required. Client will act like a mesh router by relaying the packets.
SCS5619-MOBILE AND PERVASIVE COMPUITNG-UNIT-III
Hybrid Mesh
Characteristics
• The design of the routing protocols for WMNs is still an area of research although there
are many routing protocols that are available for ad hoc networks.
• However, an optimal routing protocol for WMNs must possess features like:
• multiple performance metrics
• scalability
• robustness and
• Efficient routing with mesh infrastructure.
• The routing protocols for ad hoc networks are equipped with some of these features, but
none of them possesses all of the above.
Multi Radio Routing:
• In a multi-radio link quality source routing (MR-LQSR) a new performance metric,
weighted cumulative expected transmission time (WCETT), is incorporated.
• Both link quality metric and the minimum hop count are accounted for in WCETT
which provides a good tradeoff between delay and throughput.
• Also, the availability of node disjoint routes between source and destination
determines the improvement, given a performance metric.
Hierarchical Routing:
• The hierarchical routing protocols tend to achieve better performance when the
node density is high.
• This is because of less overhead, shorter average routing path, and quicker set-
up procedure of routing path etc.
• Maintaining hierarchy definitely adds to the complexity and this may compromise
the performance of the routing protocol.
Geographical Routing:
• This kind of routing scheme forwards packets only by using the position
information of the nodes in the vicinity and in the destination node unlike the
topology based schemes.
• This suggests that there is less impact on the geographic routing due to a
topology change than the other routing protocols.
Applications of WMN
• Solutions based on site survey are expensive and not practical for home networking,
while installation of multiple access points is also expensive and not convenient because
of Ethernet wiring from access points to backhaul network access modem or hub.
• Moreover, communications between end nodes under two different access points have
to go all the way back to the access hub.
Not an efficient solution, especially for broadband networking.
• Mesh
• In a community, the common architecture for network access is based on cable or DSL
connected to the Internet, and the last-hop is wireless by connecting a wireless router to
a cable or DSL modem.
* Even if the information must be shared within a community or neighborhood, all traffic
Must flow through Internet. This significantly reduces network resource utilization.
* Large percentage of areas in between houses is not covered by wireless services.
* An expensive but high bandwidth gateway between multiple homes or neighborhoods
May not be shared and wireless services must be set up individually. As a result,
network service costs may increase.
* Only a single path may be available for one home to access the Internet or
SCS5619-MOBILE AND PERVASIVE COMPUITNG-UNIT-III
Enterprise Networking
• Within an office or all offices in an entire building, or among offices in multiple buildings.
• IEEE 802.11 WLANs are widely used in various offices currently. However, they are still
isolated islands.
• Connections among them are achieved through wired Ethernet (still costly)
• In addition, adding more backhaul access modems only increases capacity locally, but
does not improve robustness to link failures, network congestion and other problems of
the entire enterprise network.
• Multiple backhaul access modems can be shared by all nodes in the entire network, and
thus improve the robustness and resource utilization of enterprise networks.
SCS5619-MOBILE AND PERVASIVE COMPUITNG-UNIT-III
• The physical-layer transmission rate of a node in WMNs is much higher than that in any
cellular networks, e.g., an IEEE 802.11g node can transmit at a rate of 54 Mbps.
• Moreover, the communication between nodes in WMNs does not rely on a wired
backbone.
• Compared to wired networks, e.g., cable or optical networks, wireless mesh MAN is an
economic alternative to broadband networking, especially in underdeveloped regions.
• Wireless mesh MAN covers a potentially much larger area than home, enterprise,
building, or community networks.
• Thus, the requirement on the network scalability by wireless mesh MAN is much higher
than that by other applications.
• In a hospital or medical center, monitoring and diagnosis data need to be processed and
transmitted from one room to another for various purposes.
• Data transmission is usually broadband, since high resolution medical images and
various periodical monitoring information can easily produce a constant and large
volume of data.
• Traditional wired networks can only provide limited network access to certain fixed
medical devices.
SCS5619-MOBILE AND PERVASIVE COMPUITNG-UNIT-III
• Wi-Fi based networks must rely on the existence of Ethernet connections, which may
cause high system cost and complexity but without the abilities to eliminate dead spots.
• In order to deploy such systems at locations as needed, WMNs are a much more viable
solution than wired networks to connect all devices.
• Since still images and videos are the major traffic flowing in the network, this application
demands much higher network capacity than other applications.
References: