WorldWideScience

Sample records for area networks deployment

  1. Router deployment of Streetside Parking Sensor Networks in Urban Areas

    OpenAIRE

    Lin, Trista; Rivano, Hervé; Le Mouël, Frédéric

    2015-01-01

    International audience The deployment of urban infrastructure is very important for urban sensor applications. In this paper, we studied and introduced the deployment strategy of wireless on-street parking sensor networks. We defined a multiple-objective problem with four objectives, and solved them with real street parking map. The results show two sets of Pareto Front with the minimum energy consumption, sensing information delay and the amount of deployed routers and gateways. The resul...

  2. Scalable Spectrum Sharing Mechanism for Local Area Networks Deployment

    DEFF Research Database (Denmark)

    Da Costa, Gustavo Wagner Oliveira; Cattoni, Andrea Fabio; Kovacs, Istvan Zsolt;

    2010-01-01

    The availability on the market of powerful and lightweight mobile devices has led to a fast diffusion of mobile services for end users and the trend is shifting from voice based services to multimedia contents distribution. The current access networks are, however, able to support relatively low...... data rates and with limited Quality of Service (QoS). In order to extend the access to high data rate services to wireless users, the International Telecommunication Union (ITU) established new requirements for future wireless communication technologies of up to 1Gbps in low mobility and up to 100Mbps...

  3. Deployment of the National Transparent Optical Network around the San Francisco Bay Area

    Energy Technology Data Exchange (ETDEWEB)

    McCammon, K.; Haigh, R.; Armstrong, G. [and others

    1996-06-01

    We report on the deployment and initial operation of the National Transparent Optical Network, an experimental WDM network testbed around the San Francisco Bay Area, during the Optical Fiber Conference (OFC`96) held in San Jose, CA. The deployment aspects of the physical plant, optical and SONET layers are examined along with a discussion of broadband applications which utilized the network during the OFC`96 demonstration. The network features dense WDM technology, transparent optical routing technology using acousto- optic tunable filter based switches, and network modules with add/drop, multicast, and wavelength translation capabilities. The physical layer consisted of over 300 km of Sprint and Pacific Bell conventional single mode fiber which was amplified with I I optical amplifiers deployed in pre-amp, post-amp, and line amp configurations. An out-of-band control network provided datacom channels from remote equipment sites to the SONET network manager deployed at the San Jose Convention Center for the conference. Data transport over five wavelengths was achieved in the 1550 nm window using a variety of signal formats including analog and digital signal transmission on different wavelengths on the same fiber. The network operated throughout the week of OFC`96 and is still in operation today.

  4. Design and initial deployment of the wireless local area networking infrastructure at Sandia National Laboratories.

    Energy Technology Data Exchange (ETDEWEB)

    Long, John P.; Hamill, Michael J.; Mitchell, M. G.; Miller, Marc M.; Witzke, Edward L.; Wiener, Dallas J

    2006-11-01

    A major portion of the Wireless Networking Project at Sandia National Laboratories over the last few years has been to examine IEEE 802.11 wireless networking for possible use at Sandia and if practical, introduce this technology. This project team deployed 802.11a, b, and g Wireless Local Area Networking at Sandia. This report examines the basics of wireless networking and captures key results from project tests and experiments. It also records project members thoughts and designs on wireless LAN architecture and security issues. It documents some of the actions and milestones of this project, including pilot and production deployment of wireless networking equipment, and captures the team's rationale behind some of the decisions made. Finally, the report examines lessons learned, future directions, and conclusions.

  5. Seismic Network Deployment Preparations

    OpenAIRE

    Allen Husker; Igor Stubailo; Monica Kohler; Paul Davis

    2003-01-01

    Technological and scientific preparations are occurring for the development of a multi-hop radio-linked seismic array (MHRLSA) of 50 broadband stations (GURALP 3ts) and its first few deployments. A ruggedized data relay device (DRD) is being fabricated using Intel’¡Çs new low power, small form factor stargate motherboard. A DRD will be placed at each node of the array and configured as a local area network (LAN) with station spacing up to 10 km. The objective is to use protocols that have bee...

  6. Energy Efficient Model For Deploying Wireless Body Area Networks Using Multi-Hop Network Topology

    Directory of Open Access Journals (Sweden)

    Robert C.Chepkwony

    2015-10-01

    Full Text Available Wireless body area networks (WBANs offers a lot of application opportunities in the area of health care. Recent developments in sensors and radio communication technologies have motivated many researchers to design WBAN systems for application in healthcare provision. Power consumption is still a limiting factor in realizing a WBAN with a very long lifetime. In order for wireless body area networks to ensure widespread use and adoption, some of the design constraints should be solved to promote uptake and meet social expectations. As a result, design of energy efficient WBANs is required to enhance battery life at the same time ensure that sensor nodes are small enough to be conveniently worn or implanted in the body. Energy consumption in WBANs happens during sensing, processing and communication. This research focused on designing an energy efficient model during communication between sensors. The parameters were simulated and implemented using MATLAB and Simulink simulation software. The sensors are randomly localized on a plane and distance between them calculated. The model uses a relay between the sensors and the coordinator to reduce power consumption by sensors during signal transmission. The relay is dedicated to retransmitting signals onl

  7. Analysis of the legal challenges required for the deployment of network robot systems in European urban areas

    OpenAIRE

    Sanfeliu, Alberto; Punsola, Albert; Yoshimura, Yuji; Llácer, María Rosa; Gramunt, María Dolors

    2009-01-01

    In this article we present a study of the legal challenges that must be solved in order to deploy robots and sensors in urban areas. We start describing urban issues and robot deployment problems that can derive in legal aspects. Then we identify the main challenges and then we focus in the privacy issue, discussing the concept, the European laws concerning these topics and its approach in networking robots in urban areas. Moreover, we describe some of the problems with cameras and wireless c...

  8. Rapidly Deployable Internet-of-Things Body Area Network Platform for Medical Devices

    OpenAIRE

    Baek, In Hwan

    2016-01-01

    Biomedical devices in the past provided limited capability for the data acquisition and presented the data in the form of user interface for a care provider to observe. Now, what is required for biomedical devices has fundamentally changed. Many devices must now support secure networking and include a network of sensors to enable machine learning-based sensor fusion for accurate inference of the subject’s state.This thesis introduces an Internet-of-Things (IoT) body area network (BAN) platfor...

  9. Deploying rural community wireless mesh networks

    OpenAIRE

    Ishmael, J; Bury, S.; Pezaros, D.; Race, N. J. P.

    2008-01-01

    Inadequate Internet access is widening the digital divide between town and countryside, degrading both social communication and business advancements in rural areas. Wireless mesh networking can provide an excellent framework for delivering broadband services to such areas. With this in mind, Lancaster University deployed a WMN in the rural village of Wray over a three-year period, providing the community with Internet service that exceeds many urban offerings. The project gave researchers...

  10. Service Creation and Deployment in Converged Networks

    DEFF Research Database (Denmark)

    Soler, José

    This monograph (Early Experiences related to Service Creation & Deployment in Converged Networks) presents different experiences related to architectures and mechanisms for deployment of telephony services, understood as especial features complementing the basic voice service. The context for these...... experiences is the transition of telecommunication (telephony) networks from circuit switched based systems towards packet based ones. The text of this monograph proceeds, unaltered for the most, from the author’s PhD thesis “Framework for Deployment of Advanced Telecommunication Services in Current and...

  11. Sensor Node Deployment Based on Electromagnetism-Like Algorithm in Mobile Wireless Sensor Networks

    OpenAIRE

    Recep Özdağ; Ali Karcı

    2015-01-01

    The dynamic deployment of sensors in wireless networks significantly affects the performance of the network. However, the efficient application of dynamic deployments which determines the positions of the sensors within the network increases the coverage area of the network. As a result of this, dynamic deployment increases the efficiency of the wireless sensor networks (WSNs). In this paper, dynamic deployment was applied to WSNs which consist of mobile sensors by aiming at increasing the co...

  12. New OBS network deployment offshore Ireland

    Science.gov (United States)

    Le Pape, Florian; Bean, Chris; Craig, David; Jousset, Philippe; Horan, Clare; Hogg, Colin; Donne, Sarah; McCann, Hannah; Möllhoff, Martin; Kirk, Henning; Ploetz, Aline

    2016-04-01

    With the presence of the stormy NE Atlantic, Ireland is ideally located to investigate further our understanding of ocean generated microseisms and use noise correlation methods to develop seismic imaging in marine environments as well as time-lapse monitoring. In order to study the microseismic activity offshore Ireland, 10 Broad Band Ocean Bottom Seismographs (OBSs) units including hydrophones have been deployed in January 2016 across the shelf offshore Donegal and out into the Rockall Trough. This survey represents the first Broadband passive study in this part of the NE Atlantic. The instruments will be recovered in August 2016 providing 8 months worth of data to study microseisms but also the offshore seismic activity in the area. One of the main goal of the survey is to investigate the spatial and temporal distributions of dominant microseism source regions, close to the microseism sources. Additionally we will study the coupling of seismic and acoustic signals at the sea bed and its evolution in both the deep water and continental shelf areas. Furthermore, the survey also aims to investigate further the relationship between sea state conditions (e.g. wave height, period), seafloor pressure variations and seismic data recorded on both land and seafloor. Finally, the deployed OBS network is also the first ever attempt to closely monitor local offshore earthquakes in Ireland. Ireland seismicity although relatively low can reduce slope stability and poses the possibility of triggering large offshore landslides and local tsunamis.

  13. Cognitive networks applications and deployments

    CERN Document Server

    Lloret Mauri, Jaime; Rawat, Danda B; Perez, Javier Manuel Aguiar

    2014-01-01

    INTRODUCTIONEfficient Spectrum Management: Challenges and Solutions; Tarek M. Salem, Sherine M. Abdel-Kader, Salah M. Abdel-MaGeid, and Mohamed ZakiA Survey on Joint Routing and Dynamic spectrum Access in Cognitive Radio Networks; Xianzhong Xie, Helin Yang, and Athanasios V. VasilakosNeighbor Discovery for Cognitive Radio Networks; Athar Ali Khan, Mubashir Husain Rehmani, and Yasir SaleemSPECTRUM SENSINGTime-Domain Cognitive Sensor Networking; Stefano Busanelli, Gianluigi Ferrari, Alessandro Colazzo, and Jean-Michel DricotSpectrum Sensing in Cognitive Wireless Networks; Danda B. Rawat and Chan

  14. 78 FR 775 - Goodman Networks, Inc. Core Network Engineering (Deployment Engineering) Division Alpharetta, GA...

    Science.gov (United States)

    2013-01-04

    ... Employment and Training Administration Goodman Networks, Inc. Core Network Engineering (Deployment Engineering) Division Alpharetta, GA; Goodman Networks, Inc. Core Network Engineering (Deployment Engineering) Division Hunt Valley, MD; Goodman Networks, Inc. Core Network Engineering (Deployment Engineering)...

  15. Deploying a Wireless Sensor Network in Iceland

    OpenAIRE

    K.; Martinez; Hart, J. K.; Ong, R.

    2009-01-01

    A wireless sensor network deployment on a glacier in Iceland is described. The system uses power management as well as power harvesting to provide long-term environment sensing. Advances in base station and sensor node design as well as initial results are described.

  16. Heterogeneous Deployment Analysis for Cost-Effective Mobile Network Evolution

    DEFF Research Database (Denmark)

    Coletti, Claudio

    2013-01-01

    The plethora of connected devices, such as attractive smartphones, data dongles and 3G/4G built-in tablet computers, has brought mobile operators to face increasing demand in mobile broadband traffic and services. In addition to the roll-out of Long Term Evolution (LTE), the deployment of small low......-powered base stations is a promising cost-effective solution to considerably enhance user experience. In such a network topology, which is denoted as heterogeneous deployment, the macro layer is expected to provide wider coverage but lower average data speeds whereas small cells are targeted at extending...... network coverage and boosting network capacity in traffic hot-spot areas. The thesis deals with the deployment of both outdoor small cells and indoor femto cells. Amongst the outdoor solution, particular emphasis is put on relay base stations as backhaul costs can be reduced by utilizing LTE spectrum...

  17. EDITORIAL Wireless sensor networks: design for real-life deployment and deployment experiences Wireless sensor networks: design for real-life deployment and deployment experiences

    Science.gov (United States)

    Gaura, Elena; Roedig, Utz; Brusey, James

    2010-12-01

    Wireless sensor networks (WSNs) are among the most promising technologies of the new millennium. The opportunities afforded by being able to program networks of small, lightweight, low-power, computation- and bandwidth-limited nodes have attracted a large community of researchers and developers. However, the unique set of capabilities offered by the technology produces an exciting but complex design space, which is often difficult to negotiate in an application context. Deploying sensing physical environments produces its own set of challenges, and can push systems into failure modes, thus revealing problems that can be difficult to discover or reproduce in simulation or the laboratory. Sustained efforts in the area of wireless networked sensing over the last 15 years have resulted in a large number of theoretical developments, substantial practical achievements, and a wealth of lessons for the future. It is clear that in order to bridge the gap between (on the one hand) visions of very large scale, autonomous, randomly deployed networks and (on the other) the actual performance of fielded systems, we need to view deployment as an essential component in the process of developing sensor networks: a process that includes hardware and software solutions that serve specific applications and end-user needs. Incorporating deployment into the design process reveals a new and different set of requirements and considerations, whose solutions require innovative thinking, multidisciplinary teams and strong involvement from end-user communities. This special feature uncovers and documents some of the hurdles encountered and solutions offered by experimental scientists when deploying and evaluating wireless sensor networks in situ, in a variety of well specified application scenarios. The papers specifically address issues of generic importance for WSN system designers: (i) data quality, (ii) communications availability and quality, (iii) alternative, low-energy sensing

  18. Probabilistic Dynamic Deployment of Wireless Sensor Networks by Artificial Bee Colony Algorithm

    OpenAIRE

    Dervis Karaboga; Celal Ozturk; Beyza Gorkemli

    2011-01-01

    As the usage and development of wireless sensor networks are increasing, the problems related to these networks are being realized. Dynamic deployment is one of the main topics that directly affect the performance of the wireless sensor networks. In this paper, the artificial bee colony algorithm is applied to the dynamic deployment of stationary and mobile sensor networks to achieve better performance by trying to increase the coverage area of the network. A probabilistic detection model is ...

  19. Wireless Sensor Network Deployment for Monitoring Wildlife Passages

    OpenAIRE

    José-Vicente López-Bao; Alejandro Rodríguez,; Joan Garcia-Haro; Pawel Kulakowski; Fernando Losilla; Felipe Garcia-Sanchez; Antonio-Javier Garcia-Sanchez; Francisco Palomares

    2010-01-01

    Wireless Sensor Networks (WSNs) are being deployed in very diverse application scenarios, including rural and forest environments. In these particular contexts, specimen protection and conservation is a challenge, especially in natural reserves, dangerous locations or hot spots of these reserves (i.e., roads, railways, and other civil infrastructures). This paper proposes and studies a WSN based system for generic target (animal) tracking in the surrounding area of wildlife passages built to ...

  20. Deployment And Evaluation Of A Multi-Hop Wireless Network

    OpenAIRE

    Fakrulradzi Idris; Norlezah Hashim

    2013-01-01

    Multi-hop wireless network uses two or more wireless hops to send information from source to destination. This paper presents the design and deployment of multi-hop wireless network testbed in Universiti Teknikal Malaysia Melaka (UTeM). While using the testbed to provide additional WiFi coverage around the cafeteria area in UTeM Industrial Campus, real-time measurements of various key parameters are carried out. This paper also provides some technical details of the testbed implementation as ...

  1. Analysis of the Deployment Quality for Intrusion Detection in Wireless Sensor Networks

    OpenAIRE

    Noureddine Assad; Brahim Elbhiri; Moulay Ahmed Faqihi; Mohamed Ouadou; Driss Aboutajdine

    2015-01-01

    The intrusion detection application in a homogeneous wireless sensor network is defined as a mechanism to detect unauthorized intrusions or anomalous moving attackers in a field of interest. The quality of deterministic sensor nodes deployment can be determined sufficiently by a rigorous analysis before the deployment. However, when random deployment is required, determining the deployment quality becomes challenging. An area may require that multiple nodes monitor each point from the sen...

  2. ZERO: Probabilistic Routing for Deploy and Forget Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jose Carlos Pacho

    2010-09-01

    Full Text Available As Wireless Sensor Networks are being adopted by industry and agriculture for large-scale and unattended deployments, the need for reliable and energy-conservative protocols become critical. Physical and Link layer efforts for energy conservation are not mostly considered by routing protocols that put their efforts on maintaining reliability and throughput. Gradient-based routing protocols route data through most reliable links aiming to ensure 99% packet delivery. However, they suffer from the so-called ”hot spot” problem. Most reliable routes waste their energy fast, thus partitioning the network and reducing the area monitored. To cope with this ”hot spot” problem we propose ZERO a combined approach at Network and Link layers to increase network lifespan while conserving reliability levels by means of probabilistic load balancing techniques.

  3. Probabilistic dynamic deployment of wireless sensor networks by artificial bee colony algorithm.

    Science.gov (United States)

    Ozturk, Celal; Karaboga, Dervis; Gorkemli, Beyza

    2011-01-01

    As the usage and development of wireless sensor networks are increasing, the problems related to these networks are being realized. Dynamic deployment is one of the main topics that directly affect the performance of the wireless sensor networks. In this paper, the artificial bee colony algorithm is applied to the dynamic deployment of stationary and mobile sensor networks to achieve better performance by trying to increase the coverage area of the network. A probabilistic detection model is considered to obtain more realistic results while computing the effectively covered area. Performance of the algorithm is compared with that of the particle swarm optimization algorithm, which is also a swarm based optimization technique and formerly used in wireless sensor network deployment. Results show artificial bee colony algorithm can be preferable in the dynamic deployment of wireless sensor networks. PMID:22163942

  4. Probabilistic Dynamic Deployment of Wireless Sensor Networks by Artificial Bee Colony Algorithm

    Directory of Open Access Journals (Sweden)

    Dervis Karaboga

    2011-06-01

    Full Text Available As the usage and development of wireless sensor networks are increasing, the problems related to these networks are being realized. Dynamic deployment is one of the main topics that directly affect the performance of the wireless sensor networks. In this paper, the artificial bee colony algorithm is applied to the dynamic deployment of stationary and mobile sensor networks to achieve better performance by trying to increase the coverage area of the network. A probabilistic detection model is considered to obtain more realistic results while computing the effectively covered area. Performance of the algorithm is compared with that of the particle swarm optimization algorithm, which is also a swarm based optimization technique and formerly used in wireless sensor network deployment. Results show artificial bee colony algorithm can be preferable in the dynamic deployment of wireless sensor networks.

  5. Wide area sensor network

    Science.gov (United States)

    Mukhopadhyay, Sanjoy; Nix, Tricia; Junker, Robert; Brentano, Josef; Khona, Dhiren

    2006-05-01

    The technical concept for this project has existed since the Chernobyl accident in 1986. A host of Eastern European nations have developed countrywide grid of sensors to monitor airborne radiation. The objective is to build a radiological sensor network for real-time monitoring of environmental radiation levels in order to provide data for warning, and consequentially the assessment of a nuclear event. A network of radiation measuring equipment consisting of gamma, neutron, alpha, and beta counters would be distributed over a large area (preferably on fire station roof tops) and connected by a wireless network to the emergency response center. The networks would be deployed in urban environments and would supply first responders and federal augmentation teams (including those from the U.S. Departments of Energy, Defense, Justice, and Homeland Security) with detailed, accurate information regarding the transport of radioactive environmental contaminants, so the agencies can provide a safe and effective response. A networked sensor capability would be developed, with fixed sensors deployed at key locations and in sufficient numbers, to provide adequate coverage for early warning, and input to post-event emergency response. An overall system description and specification will be provided, including detector characteristics, communication protocols, infrastructure and maintenance requirements, and operation procedures. The system/network can be designed for a specifically identified urban area, or for a general urban area scalable to cities of specified size. Data collected via the network will be transmitted directly to the appropriate emergency response center and shared with multiple agencies via the Internet or an Intranet. The data collected will be managed using commercial off - the - shelf Geographical Information System (GIS). The data will be stored in a database and the GIS software will aid in analysis and management of the data. Unique features of the

  6. Multiobjective Sensor Node Deployement in Wireless Sensor Networks

    OpenAIRE

    K.Sheela Sobana Rani; Dr.N.DEVARAJAN

    2012-01-01

    In Wireless Sensor Networks (WSN), sensor node deployment is essential for maximizing the coverage and detection probabilities. But the existing optimization solution suffers from limited energy storage, node death, increased network traffic etc. To solve these issues, we propose a multi-objective PSO and fuzzy based optimization model for sensor node deployment. The objectives considered in the paper include maximizing network coverage, connectivity and network lifetime. A fuzzy rule is cons...

  7. Wireless Sensor Network Deployment for Monitoring Wildlife Passages

    Directory of Open Access Journals (Sweden)

    José-Vicente López-Bao

    2010-08-01

    Full Text Available Wireless Sensor Networks (WSNs are being deployed in very diverse application scenarios, including rural and forest environments. In these particular contexts, specimen protection and conservation is a challenge, especially in natural reserves, dangerous locations or hot spots of these reserves (i.e., roads, railways, and other civil infrastructures. This paper proposes and studies a WSN based system for generic target (animal tracking in the surrounding area of wildlife passages built to establish safe ways for animals to cross transportation infrastructures. In addition, it allows target identification through the use of video sensors connected to strategically deployed nodes. This deployment is designed on the basis of the IEEE 802.15.4 standard, but it increases the lifetime of the nodes through an appropriate scheduling. The system has been evaluated for the particular scenario of wildlife monitoring in passages across roads. For this purpose, different schemes have been simulated in order to find the most appropriate network operational parameters. Moreover, a novel prototype, provided with motion detector sensors, has also been developed and its design feasibility demonstrated. Original software modules providing new functionalities have been implemented and included in this prototype. Finally, main performance evaluation results of the whole system are presented and discussed in depth.

  8. Dynamic Deployment of Wireless Sensor Networks by Biogeography Based Optimization Algorithm

    Directory of Open Access Journals (Sweden)

    Luo Liu

    2012-06-01

    Full Text Available As the usage and development of wireless sensor networks increases, problems related to these networks are becoming apparent. Dynamic deployment is one of the main topics that directly affects the performance of the wireless sensor networks. In this paper, biogeography-based optimization is applied to the dynamic deployment of static and mobile sensor networks to achieve better performance by trying to increase the coverage area of the network. A binary detection model is considered to obtain realistic results while computing the effectively covered area. Performance of the algorithm is compared with that of the artificial bee colony algorithm, Homo-H-VFCPSO and stud genetic algorithm that are also population-based optimization algorithms. Results show biogeography-based optimization can be preferable in the dynamic deployment of wireless sensor networks.

  9. University of Cambridge deploys Procket Networks' PRO/8801

    CERN Multimedia

    2003-01-01

    Procket Networks, a provider of high performance Internet Protocol (IP) technology and products has announced that the University of Cambridge has deployed the PRO/8801(TM) router into its research network to develop industry-leading deep packet inspection applications. The major application for this deployment is to identify and understand new traffic patterns created by large scale scientific computations and downloads such as the GRID (1 page).

  10. Performance Evaluation of AODV, DSDV & DSR for Quasi Random Deployment of Sensor Nodes in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Kulkarni, Nandkumar P.; Prasad, Ramjee; Cornean, Horia;

    2011-01-01

    Sensor deployment is one of the key topics addressed in Wireless Sensor Network (WSN). This paper proposes a new deployment technique of sensor nodes for WSN called as Quasi Random Deployment (QRD). The novel approach to deploy sensor nodes in QRD fashion is to improve the energy efficiency...... of the WSN in order to increase the network life time and coverage. The QRD produces highly uniform coordinates and it systematically fills the specified area. Along with Random Deployment (RD) pattern of wireless sensor node QRD is analysed in this study. The network is simulated using NS-2 simulator...

  11. Analysis of the Deployment Quality for Intrusion Detection in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Noureddine Assad

    2015-01-01

    Full Text Available The intrusion detection application in a homogeneous wireless sensor network is defined as a mechanism to detect unauthorized intrusions or anomalous moving attackers in a field of interest. The quality of deterministic sensor nodes deployment can be determined sufficiently by a rigorous analysis before the deployment. However, when random deployment is required, determining the deployment quality becomes challenging. An area may require that multiple nodes monitor each point from the sensing area; this constraint is known as k-coverage where k is the number of nodes. The deployment quality of sensor nodes depends directly on node density and sensing range; mainly a random sensor nodes deployment is required. The major question is centred around the problem of network coverage, how can we guarantee that each point of the sensing area is covered by the required number of sensor nodes and what a sufficient condition to guarantee the network coverage? To deal with this, probabilistic intrusion detection models are adopted, called single/multi-sensing detection, and the deployment quality issue is surveyed and analysed in terms of coverage. We evaluate the capability of our probabilistic model in homogeneous wireless sensor network, in terms of sensing range, node density, and intrusion distance.

  12. Problems in the Deployment of Learning Networks In Small Organizations

    OpenAIRE

    Shankle, Dean E.; Shankle, Jeremy P.

    2006-01-01

    Please, cite this publication as: Shankle, D.E., & Shankle, J.P. (2006). Problems in the Deployment of Learning Networks In Small Organizations. Proceedings of International Workshop in Learning Networks for Lifelong Competence Development, TENCompetence Conference. March 30th-31st, Sofia, Bulgaria: TENCompetence. Retrieved June 30th, 2006, from http://dspace.learningnetworks.org

  13. Coverage-guaranteed sensor node deployment strategies for wireless sensor networks.

    Science.gov (United States)

    Fan, Gaojuan; Wang, Ruchuan; Huang, Haiping; Sun, Lijuan; Sha, Chao

    2010-01-01

    Deployment quality and cost are two conflicting aspects in wireless sensor networks. Random deployment, where the monitored field is covered by randomly and uniformly deployed sensor nodes, is an appropriate approach for large-scale network applications. However, their successful applications depend considerably on the deployment quality that uses the minimum number of sensors to achieve a desired coverage. Currently, the number of sensors required to meet the desired coverage is based on asymptotic analysis, which cannot meet deployment quality due to coverage overestimation in real applications. In this paper, we first investigate the coverage overestimation and address the challenge of designing coverage-guaranteed deployment strategies. To overcome this problem, we propose two deployment strategies, namely, the Expected-area Coverage Deployment (ECD) and BOundary Assistant Deployment (BOAD). The deployment quality of the two strategies is analyzed mathematically. Under the analysis, a lower bound on the number of deployed sensor nodes is given to satisfy the desired deployment quality. We justify the correctness of our analysis through rigorous proof, and validate the effectiveness of the two strategies through extensive simulation experiments. The simulation results show that both strategies alleviate the coverage overestimation significantly. In addition, we also evaluate two proposed strategies in the context of target detection application. The comparison results demonstrate that if the target appears at the boundary of monitored region in a given random deployment, the average intrusion distance of BOAD is considerably shorter than that of ECD with the same desired deployment quality. In contrast, ECD has better performance in terms of the average intrusion distance when the invasion of intruder is from the inside of monitored region. PMID:22294915

  14. Sunrise deploys mobile network for CERN

    CERN Multimedia

    2004-01-01

    Sunrise, the alternative telecoms provider in Switzerland, is finalizing the installation of a mobile network comprising about forty sites located around the new particle accelerator at CERN (1 paragraph)

  15. Optimal Sinks Deployment and Packet Scheduling for Wireless Sensor Networks

    OpenAIRE

    Achir, Nadjib; Muhlethaler, Paul

    2014-01-01

    International audience —In this paper we propose an optimal deployment and distributed packet scheduling of multi-sink Wireless Sensors networks (WNSs). This work is devoted to computing the optimal deployment of sinks for a given maximum number of hops between nodes and sinks. We also propose an optimal distributed packet scheduling in order to estimate the minimum energy consumption. We consider the energy consumed due to reporting, forwarding and overhearing. In contrast to reporting an...

  16. Dynamic sensing optimization strategy for mobile nodes deployment in wireless sensor networks

    Science.gov (United States)

    Wang, Sheng; Wang, Xue; Ma, Junjie

    2006-11-01

    Sensor nodes deployment problem is one of the fundamental issues in wireless sensor networks (WSNs) which should consider a tradeoff among several metrics, such as coverage area, reliability, accuracy, lifetime etc. The mobile sensor nodes which can relocate themselves can be used to optimize the nodes deployment under various kinds of situations. Because coverage area is hard to be calculated by analytical method, an areas division method is introduced to evaluate the coverage area metric for simplifying calculation. Then we introduce a practically feasible combined metric which refers to coverage area, reliability, accuracy and lifetime, which uses areas division, detecting reliability, Mahalanobis distance and energy entropy as metric functions. Here, nodes deployment is considered as an optimization problem. Particle swarm optimization (PSO) algorithm, which has a series of advantages, such as, high-speed regional convergence, efficient global searching ability, and so on, is suitable for solving multi-dimension function optimization in continuous space. So we adopt PSO for nodes deployment optimization where the combined metric is considered as fitness function. Because the combined metric is multiform and changeable in PSO, we can adopt different combined metrics for different applications, while other strategies just consider the coverage area in nodes deployment. The experimental results verify that the PSO based mobile nodes deployment strategy has good performance in quickness, which can improve the capabilities of WSNs and dynamically adjust the deployment according to the changes of situation, especially when some areas need multiple-node-measurement.

  17. Multiobjective Sensor Node Deployement in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    K.Sheela Sobana Rani

    2012-04-01

    Full Text Available In Wireless Sensor Networks (WSN, sensor node deployment is essential for maximizing the coverage and detection probabilities. But the existing optimization solution suffers from limited energy storage, node death, increased network traffic etc. To solve these issues, we propose a multi-objective PSO and fuzzy based optimization model for sensor node deployment. The objectives considered in the paper include maximizing network coverage, connectivity and network lifetime. A fuzzy rule is constructed with the input parameters suchas node degree, link quality and residual energy. Depending upon the outcome of the fuzzy logic, the nodes are categorized into good, normal and bad. After the initial deployment of good nodes, the multi-objective particle swarm optimization (PSO based technique is applied for the deployment of other nodes. Keeping the good nodes as the reference points, PSO iteration is performed such that each bad and normal node is connected to at least one good node. Thus from our simulation results we show that the fuzzy logic and the optimizationtechnique provides efficient and accurate decisions for node deployment.

  18. Automatic deployment of the Network Weather Service using the Effective Network View

    OpenAIRE

    Legrand, Arnaud; Quinson, Martin

    2004-01-01

    The monitoring infrastructure constitutes a key component of any Grid scheduler. The Network Weather Service (NWS) is the most commonly used tool to fulfill this need. Unfortunately, users have to deploy the NWS manually, which can be very tedious and error-prone. This paper characterizes the NWS deployment requirements and introduces a method based on the Effective Network View (ENV) network mapper to automatically perform this task. We also present the resulting deployment on our lab's LAN.

  19. Strategies for Power Line Communications Smart Metering Network Deployment

    Directory of Open Access Journals (Sweden)

    Alberto Sendin

    2014-04-01

    Full Text Available Smart Grids are becoming a reality all over the world. Nowadays, the research efforts for the introduction and deployment of these grids are mainly focused on the development of the field of Smart Metering. This emerging application requires the use of technologies to access the significant number of points of supply (PoS existing in the grid, covering the Low Voltage (LV segment with the lowest possible costs. Power Line Communications (PLC have been extensively used in electricity grids for a variety of purposes and, of late, have been the focus of renewed interest. PLC are really well suited for quick and inexpensive pervasive deployments. However, no LV grid is the same in any electricity company (utility, and the particularities of each grid evolution, architecture, circumstances and materials, makes it a challenge to deploy Smart Metering networks with PLC technologies, with the Smart Grid as an ultimate goal. This paper covers the evolution of Smart Metering networks, together with the evolution of PLC technologies until both worlds have converged to project PLC-enabled Smart Metering networks towards Smart Grid. This paper develops guidelines over a set of strategic aspects of PLC Smart Metering network deployment based on the knowledge gathered on real field; and introduces the future challenges of these networks in their evolution towards the Smart Grid.

  20. On prolonging network lifetime through load-similar node deployment in wireless sensor networks.

    Science.gov (United States)

    Li, Qiao-Qin; Gong, Haigang; Liu, Ming; Yang, Mei; Zheng, Jun

    2011-01-01

    This paper is focused on the study of the energy hole problem in the Progressive Multi-hop Rotational Clustered (PMRC)-structure, a highly scalable wireless sensor network (WSN) architecture. Based on an analysis on the traffic load distribution in PMRC-based WSNs, we propose a novel load-similar node distribution strategy combined with the Minimum Overlapping Layers (MOL) scheme to address the energy hole problem in PMRC-based WSNs. In this strategy, sensor nodes are deployed in the network area according to the load distribution. That is, more nodes shall be deployed in the range where the average load is higher, and then the loads among different areas in the sensor network tend to be balanced. Simulation results demonstrate that the load-similar node distribution strategy prolongs network lifetime and reduces the average packet latency in comparison with existing nonuniform node distribution and uniform node distribution strategies. Note that, besides the PMRC structure, the analysis model and the proposed load-similar node distribution strategy are also applicable to other multi-hop WSN structures. PMID:22163809

  1. On Prolonging Network Lifetime through Load-Similar Node Deployment in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jun Zheng

    2011-03-01

    Full Text Available This paper is focused on the study of the energy hole problem in the Progressive Multi-hop Rotational Clustered (PMRC-structure, a highly scalable wireless sensor network (WSN architecture. Based on an analysis on the traffic load distribution in PMRC-based WSNs, we propose a novel load-similar node distribution strategy combined with the Minimum Overlapping Layers (MOL scheme to address the energy hole problem in PMRC-based WSNs. In this strategy, sensor nodes are deployed in the network area according to the load distribution. That is, more nodes shall be deployed in the range where the average load is higher, and then the loads among different areas in the sensor network tend to be balanced. Simulation results demonstrate that the load-similar node distribution strategy prolongs network lifetime and reduces the average packet latency in comparison with existing nonuniform node distribution and uniform node distribution strategies. Note that, besides the PMRC structure, the analysis model and the proposed load-similar node distribution strategy are also applicable to other multi-hop WSN structures.

  2. Simultaneous Fleet Deployment and Network Design of Liner Shipping

    DEFF Research Database (Denmark)

    Gelareh, Shahin; Pisinger, David

    A mixed integer linear programming formulation is proposed for the simultaneous design of network and fleet deployment of a liner service providers for deep-sea shipping. The underlying network design problem is based on a 4-index (5-index by considering capacity type) formulation of the hub loca...... confirm superiority of our approach in comparison with a general-purpose mixed integer programming solver....

  3. Rule-Based vs. Behavior-Based Self-Deployment for Mobile Wireless Sensor Networks

    Science.gov (United States)

    Urdiales, Cristina; Aguilera, Francisco; González-Parada, Eva; Cano-García, Jose; Sandoval, Francisco

    2016-01-01

    In mobile wireless sensor networks (MWSN), nodes are allowed to move autonomously for deployment. This process is meant: (i) to achieve good coverage; and (ii) to distribute the communication load as homogeneously as possible. Rather than optimizing deployment, reactive algorithms are based on a set of rules or behaviors, so nodes can determine when to move. This paper presents an experimental evaluation of both reactive deployment approaches: rule-based and behavior-based ones. Specifically, we compare a backbone dispersion algorithm with a social potential fields algorithm. Most tests are done under simulation for a large number of nodes in environments with and without obstacles. Results are validated using a small robot network in the real world. Our results show that behavior-based deployment tends to provide better coverage and communication balance, especially for a large number of nodes in areas with obstacles. PMID:27399709

  4. Rule-Based vs. Behavior-Based Self-Deployment for Mobile Wireless Sensor Networks.

    Science.gov (United States)

    Urdiales, Cristina; Aguilera, Francisco; González-Parada, Eva; Cano-García, Jose; Sandoval, Francisco

    2016-01-01

    In mobile wireless sensor networks (MWSN), nodes are allowed to move autonomously for deployment. This process is meant: (i) to achieve good coverage; and (ii) to distribute the communication load as homogeneously as possible. Rather than optimizing deployment, reactive algorithms are based on a set of rules or behaviors, so nodes can determine when to move. This paper presents an experimental evaluation of both reactive deployment approaches: rule-based and behavior-based ones. Specifically, we compare a backbone dispersion algorithm with a social potential fields algorithm. Most tests are done under simulation for a large number of nodes in environments with and without obstacles. Results are validated using a small robot network in the real world. Our results show that behavior-based deployment tends to provide better coverage and communication balance, especially for a large number of nodes in areas with obstacles. PMID:27399709

  5. Deployment IPv6 over IPv4 network infrastructure

    OpenAIRE

    Hoang, Tien Dung

    2015-01-01

    The purpose of this thesis is doing the research about IPv6, concentrate in how to deploy an IPv6 network based on IPv4 network without making any interruption to IPv4 network. This thesis is made for Financing and Promoting Technology Corporation (FPT) in Vietnam. This thesis is completed in two main parts. The theoretical part is making research about IPv4 and IPv6 to have the point of view about IPv4 and IPv6 basically, and from those one, seeing the advantages of IPv6 comparing wit...

  6. Framework for Fault Revoking and Homogeneous Distribution of Randomly Deployed Sensor Nodes in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Devendra Prasad

    2011-03-01

    Full Text Available Wireless sensor networks (WSNs are one of the most exciting and challenging research areas. Sensor nodes (SNs are generally deployed randomly from some flying base station (BS in the deployment area, which may result uneven distribution of these static SNs. Besides these, they may be damaged because of natural calamities. In order to obtain the homogeneous distribution it is necessary to provide external kinetic to these static SNs until they acquire the appropriate position in the deployment area. In this paper, we propose a framework for fault revoking and homogeneous distribution of randomly deployed SNs in the deployment area, so that the sink node within various clusters consumes equal amount of energy. The external kinetic to these static SNs for their homogeneous distribution is provided by the MSNs which are rich in energy. However, if any node gets damaged due to some environmental activity, then the framework makes provision for fault revoking with the help of Fault Revoking Mobile Sensor Node (FRN in the deployment area.

  7. QARI: Quality aware software deployment for wireless sensor networks

    OpenAIRE

    Horré, Wouter; Hughes, Danny; Michiels, Sam; Joosen, Wouter

    2010-01-01

    If we are to deploy sensor applications in a realistic business context, we must provide innovative middleware services to control and enforce required system behavior; in order to correctly interpret collected temperature data, for example, sensor applications require guarantees about minimal coverage and the number of available sensors. The extreme dynamism, scale and unreliability of wireless sensor networks represent major challenges in contemporary software management. This paper pres...

  8. ZERO: Probabilistic Routing for Deploy and Forget Wireless Sensor Networks

    OpenAIRE

    Jose Carlos Pacho; Xavier Vilajosana; Jose Lopez Vicario; Juan, Angel A.; Ignasi Vilajosana; Antoni Morell; Jordi Llosa

    2010-01-01

    As Wireless Sensor Networks are being adopted by industry and agriculture for large-scale and unattended deployments, the need for reliable and energy-conservative protocols become critical. Physical and Link layer efforts for energy conservation are not mostly considered by routing protocols that put their efforts on maintaining reliability and throughput. Gradient-based routing protocols route data through most reliable links aiming to ensure 99% packet delivery. However, they suffer from t...

  9. Comparative Analysis between WiMAX and Fiber Optics Backhaul Network Deployment in Developing Countries - The Case of Ghana

    DEFF Research Database (Denmark)

    Adjin, Daniel Michael Okwabi; Williams, Idongesit

    This paper discusses the potentials of mobile WiMAX as a backhaul technology in rural areas for the purpose of providing broadband internet services. Rural areas are known to be commercially unviable for the deployment of telecommunications services. Fixed network technologies are more expensive to...... deploy than mobile technologies. But in many developing countries, there is preference for the deployment of fiber optics rather than a broadband wireless solution for the deployment of broadband internet. Argument is made in this paper using the Expectation Confirmation Theory to reveal the level of...... satisfaction of mobile WiMAX compared to what Fiber optics would bring to rural areas in terms of broadband provisioning, Cost of access, Cost of deployment, Network accessibility and availability. The case of investigation is Northern Ghana due to the proliferation of rural areas in that region. The...

  10. Local area networks

    CERN Document Server

    Zafiropoulo, P

    1982-01-01

    Pitro Zafiropulo is a- staff member at the IBM Research Laboratories at Zurich. He joined IBM in 1968 and has worked on protocol validation, synthesis, integrated networks, network reliability, PABX's and speech recognition. Local Area Networks are intended to provide improved communication capabilities such as high data throughput rates, low error rates and ease of connection among terminal stations and comuters. These new types of networks operate within a limited geographical range like an establishment, campus or building and are owned by a single organization. The presentation introduces these networks and the main techniques are described. It then proceeds to evaluate the main switching techniques as they apply to LAN ring and bus configurations. The preferred technique of token-ring distributed switching is identified. The contents of Mr. Zafiropoulo's talk was somewhat similar to the paper of Mr. Kummerle, which is therefore included in these Proceedings.

  11. Evaluation of Deployment Challenges of Wireless Sensor Networks at Signalized Intersections

    Directory of Open Access Journals (Sweden)

    Leyre Azpilicueta

    2016-07-01

    Full Text Available With the growing demand of Intelligent Transportation Systems (ITS for safer and more efficient transportation, research on and development of such vehicular communication systems have increased considerably in the last years. The use of wireless networks in vehicular environments has grown exponentially. However, it is highly important to analyze radio propagation prior to the deployment of a wireless sensor network in such complex scenarios. In this work, the radio wave characterization for ISM 2.4 GHz and 5 GHz Wireless Sensor Networks (WSNs deployed taking advantage of the existence of traffic light infrastructure has been assessed. By means of an in-house developed 3D ray launching algorithm, the impact of topology as well as urban morphology of the environment has been analyzed, emulating the realistic operation in the framework of the scenario. The complexity of the scenario, which is an intersection city area with traffic lights, vehicles, people, buildings, vegetation and urban environment, makes necessary the channel characterization with accurate models before the deployment of wireless networks. A measurement campaign has been conducted emulating the interaction of the system, in the vicinity of pedestrians as well as nearby vehicles. A real time interactive application has been developed and tested in order to visualize and monitor traffic as well as pedestrian user location and behavior. Results show that the use of deterministic tools in WSN deployment can aid in providing optimal layouts in terms of coverage, capacity and energy efficiency of the network.

  12. Evaluation of Deployment Challenges of Wireless Sensor Networks at Signalized Intersections.

    Science.gov (United States)

    Azpilicueta, Leyre; López-Iturri, Peio; Aguirre, Erik; Martínez, Carlos; Astrain, José Javier; Villadangos, Jesús; Falcone, Francisco

    2016-01-01

    With the growing demand of Intelligent Transportation Systems (ITS) for safer and more efficient transportation, research on and development of such vehicular communication systems have increased considerably in the last years. The use of wireless networks in vehicular environments has grown exponentially. However, it is highly important to analyze radio propagation prior to the deployment of a wireless sensor network in such complex scenarios. In this work, the radio wave characterization for ISM 2.4 GHz and 5 GHz Wireless Sensor Networks (WSNs) deployed taking advantage of the existence of traffic light infrastructure has been assessed. By means of an in-house developed 3D ray launching algorithm, the impact of topology as well as urban morphology of the environment has been analyzed, emulating the realistic operation in the framework of the scenario. The complexity of the scenario, which is an intersection city area with traffic lights, vehicles, people, buildings, vegetation and urban environment, makes necessary the channel characterization with accurate models before the deployment of wireless networks. A measurement campaign has been conducted emulating the interaction of the system, in the vicinity of pedestrians as well as nearby vehicles. A real time interactive application has been developed and tested in order to visualize and monitor traffic as well as pedestrian user location and behavior. Results show that the use of deterministic tools in WSN deployment can aid in providing optimal layouts in terms of coverage, capacity and energy efficiency of the network. PMID:27455270

  13. Using GIS in Designing and Deploying Wireless Network in City Plans

    Directory of Open Access Journals (Sweden)

    Iyad Aldasouqi

    2014-07-01

    Full Text Available Site Surveys play a very important role in the successful and efficient deployment of wireless networks. The first step is to understand the basic goal of a wireless network, which is mainly to provide an appropriate coverage and throughput to all end users with high efficiency, full coverage and reasonable cost. Site Surveys is very important for the sake of planning and designing a wireless network specifically in outdoor networks, to provide a wireless solution that will deliver the required wireless coverage, data rates, network capacity, roaming capability and Quality of Service (QoS. The survey usually involves a site visit to test for RF interference, and to identify optimum installation locations for access points. This requires analysis of building floor plans, inspection of the facility, and use of site survey tools. Interviews with IT management and the end users of the wireless network are also important to determine the design parameters for the wireless network. Wireless Local Area Network (WLAN can be implemented and deployed using different techniques and methodologies, starting from site survey to launching. The main problems are that some areas may not be covered well and the high cost of equipment. This paper discusses a technique that helps determining the best location for access points using GPS system, in order to choose the optimal number of access points. This technique has a positive impact on the cost. Another important factor is the type of antenna, which has a very important effect on both cost and coverage issues.

  14. Network architectures in support of digital subscriber line (DSL) deployment

    Science.gov (United States)

    Peuch, Bruno

    1998-09-01

    DSL technology enables very high bandwidth transmission in a point-to-point fashion from a customer's premises to a central office (CO), wiring center, or other logical point of traffic aggregation. Unlike many technologies that enable broadband Internet access, DSL technology does not determine a specific architecture to be deployed at either the customer's premises or in the service/access provider's network. In fact, DSL technology can be used in conjunction with a variety of network architectures. While being agnostic regarding to higher-layer protocols, there are still several critical 'protocol specific' issues that need to be addressed when deploying DSL as a solution for IP (Internet/intrAnet) access. This paper will address these issues and present a range of network architectures that incorporate DSL technology. This paper will only focus on those architectures that enable IP access. These architectures are divided into three categories: Traditional Dialled Model (TDM), frame-based (Frame Relay/Ethernet), and cell-based (ATM).

  15. Deploying optical performance monitoring in TeliaSonera's network

    Science.gov (United States)

    Svensson, Torbjorn K.; Karlsson, Per-Olov E.

    2004-09-01

    This paper reports on the first steps taken by TeliaSonera towards deploying optical performance monitoring (OPM) in the company"s transport network, in order to assure increasingly reliable communications on the physical layer. The big leap, a world-wide deployment of OPM still awaits a breakthrough. There is required very obvious benefits from using OPM in order to change this stalemate. Reasons may be the anaemic economy of many telecom operators, shareholders" pushing for short-term payback, and reluctance to add complexity and to integrate a system management. Technically, legacy digital systems do already have a proven ability of monitoring, so adding OPM to the dense wavelength division multiplexed (DWDM) systems in operation should be judged with care. Duly installed, today"s DWDM systems do their job well, owing to rigorous rules for link design and a prosperous power budget, a power management inherent to the system, and a reliable supplier"s support. So what may bring this stalemate to an end? -A growing number of appliances of OPM, for enhancing network operation and maintenance, and enabling new customer services, will most certainly bring momentum to a change. The first employment of OPM in TeliaSonera"s network is launched this year, 2004. The preparedness of future OPM dependent services and transport technologies will thereby be granted.

  16. Metropolitan area network support at Fermilab

    International Nuclear Information System (INIS)

    Advances in wide area network service offerings, coupled with comparable developments in local area network technology have enabled many research sites to keep their offsite network bandwidth ahead of demand. For most sites, the more difficult and costly aspect of increasing wide area network capacity is the local loop, which connects the facility LAN to the wide area service provider(s). Fermilab, in coordination with neighboring Argonne National Laboratory, has chosen to provide its own local loop access through leasing of dark fiber to nearby network exchange points, and procuring dense wave division multiplexing (DWDM) equipment to provide data channels across those fibers. Installing and managing such optical network infrastructure has broadened the Laboratory's network support responsibilities to include operating network equipment that is located off-site, and is technically much different than classic LAN network equipment. Effectively, the Laboratory has assumed the role of a local service provider. This paper will cover Fermilab's experiences with deploying and supporting a Metropolitan Area Network (MAN) infrastructure to satisfy its offsite networking needs. The benefits and drawbacks of providing and supporting such a service will be discussed

  17. Metropolitan area network support at Fermilab

    Energy Technology Data Exchange (ETDEWEB)

    DeMar, Phil; Andrews, Chuck; Bobyshev, Andrey; Crawford, Matt; Colon, Orlando; Fry, Steve; Grigaliunas, Vyto; Lamore, Donna; Petravick, Don; /Fermilab

    2007-09-01

    Advances in wide area network service offerings, coupled with comparable developments in local area network technology have enabled many research sites to keep their offsite network bandwidth ahead of demand. For most sites, the more difficult and costly aspect of increasing wide area network capacity is the local loop, which connects the facility LAN to the wide area service provider(s). Fermilab, in coordination with neighboring Argonne National Laboratory, has chosen to provide its own local loop access through leasing of dark fiber to nearby network exchange points, and procuring dense wave division multiplexing (DWDM) equipment to provide data channels across those fibers. Installing and managing such optical network infrastructure has broadened the Laboratory's network support responsibilities to include operating network equipment that is located off-site, and is technically much different than classic LAN network equipment. Effectively, the Laboratory has assumed the role of a local service provider. This paper will cover Fermilab's experiences with deploying and supporting a Metropolitan Area Network (MAN) infrastructure to satisfy its offsite networking needs. The benefits and drawbacks of providing and supporting such a service will be discussed.

  18. Lessons learned on solar powered wireless sensor network deployments in urban, desert environments

    KAUST Repository

    Dehwah, Ahmad H.

    2015-05-01

    The successful deployment of a large scale solar powered wireless sensor network in an urban, desert environment is a very complex task. Specific cities of such environments cause a variety of operational problems, ranging from hardware faults to operational challenges, for instance due to the high variability of solar energy availability. Even a seemingly functional sensor network created in the lab does not guarantee reliable long term operation, which is absolutely necessary given the cost and difficulty of accessing sensor nodes in urban environments. As part of a larger traffic flow wireless sensor network project, we conducted several deployments in the last two years to evaluate the long-term performance of solar-powered urban wireless sensor networks in a desert area. In this article, we share our experiences in all domains of sensor network operations, from the conception of hardware to post-deployment analysis, including operational constraints that directly impact the software that can be run. We illustrate these experiences using numerous experimental results, and present multiple unexpected operational problems as well as some possible solutions to address them. We also show that current technology is far from meeting all operational constraints for these demanding applications, in which sensor networks are to operate for years to become economically appealing.

  19. Context-Aware Local Optimization of Sensor Network Deployment

    OpenAIRE

    Meysam Argany; Mir Abolfazl Mostafavi; Christian Gagné

    2015-01-01

    Wireless sensor networks are increasingly used for tracking and monitoring dynamic phenomena in urban and natural areas. Spatial coverage is an important issue in sensor networks in order to fulfill the needs of sensing applications. Optimization methods are widely used to efficiently distribute sensor nodes in the network to achieve a desired level of coverage. Most of the existing algorithms do not consider the characteristics of the real environment in the optimization process. In this pap...

  20. Applying fuzzy analytic network process in quality function deployment model

    Directory of Open Access Journals (Sweden)

    Mohammad Ali Afsharkazemi

    2012-08-01

    Full Text Available In this paper, we propose an empirical study of QFD implementation when fuzzy numbers are used to handle the uncertainty associated with different components of the proposed model. We implement fuzzy analytical network to find the relative importance of various criteria and using fuzzy numbers we calculate the relative importance of these factors. The proposed model of this paper uses fuzzy matrix and house of quality to study the products development in QFD and also the second phase i.e. part deployment. In most researches, the primary objective is only on CRs to implement the quality function deployment and some other criteria such as production costs, manufacturing costs etc were disregarded. The results of using fuzzy analysis network process based on the QFD model in Daroupat packaging company to develop PVDC show that the most important indexes are being waterproof, resistant pill packages, and production cost. In addition, the PVDC coating is the most important index in terms of company experts’ point of view.

  1. On Periodic Node Deployment in Wireless Sensor Networks: A Statistical Analysis

    CERN Document Server

    Sinha, Abhishek; Vasilakos, Athanasios V

    2011-01-01

    Rapid progress made in the field of sensor technology, wireless communication, and computer networks in recent past, led to the development of wireless Ad-hoc sensor networks, consisting of small, low-cost sensors, which can monitor wide and remote areas with precision and liveliness unseen to the date without the intervention of a human operator. This work comes up with a stochastic model for periodic sensor-deployment (in face of their limited amount of battery-life) to maintain a minimal node-connectivity in wireless sensor networks. The node deployment cannot be modeled by using results from conventional continuous birth-death process, since new nodes are added to the network in bursts, i.e. the birth process is not continuous in practical situations. We analyze the periodic node deployment process using discrete birth-continuous death process and obtain two important statistical measures of the existing number of nodes in the network, namely the mean and variance. We show that the above mentioned sequenc...

  2. Two-tier cellular random network planning for minimum deployment cost

    OpenAIRE

    Mekikis, Prodromos Vasileios; KARTSAKLI, Elli; Antonopoulos, Angelos; Lalos, Aris S.; Alonso Zárate, Luis Gonzaga; Verikoukis, Christos

    2014-01-01

    Random dense deployment of heterogeneous networks (HetNets), consisting of macro base stations (BS) and small cells (SC), can provide higher quality of service (QoS) while increasing the energy efficiency of the cellular network. In addition, it is possible to achieve lower deployment cost and, therefore, maximize the benefits for the network providers. In this paper, we propose a novel method to determine the minimum deployment cost of a two-tier heterogeneous cellular network using random d...

  3. MPLS for metropolitan area networks

    CERN Document Server

    Tan, Nam-Kee

    2004-01-01

    METROPOLITAN AREA NETWORKS AND MPLSRequirements of Metropolitan Area Network ServicesMetropolitan Area Network OverviewThe Bandwidth DemandThe Metro Service Provider's Business ApproachesThe Emerging Metro Customer Expectations and NeedsSome Prevailing Metro Service OpportunitiesService Aspects and RequirementsRoles of MPLS in Metropolitan Area NetworksMPLS PrimerMPLS ApplicationsTRAFFIC ENGINEERING ASPECTS OF METROPOLITAN AREA NETWORKSTraffic Engineering ConceptsNetwork CongestionHyper Aggregation ProblemEasing CongestionNetwork ControlTactical versus Strategic Traffic EngineeringIP/ATM Overl

  4. Green Cellular Network Deployment To Reduce RF Pollution

    CERN Document Server

    Katiyar, Sumit; Agrawal, N K

    2012-01-01

    As the mobile telecommunication systems are growing tremendously all over the world, the numbers of handheld and base stations are also rapidly growing and it became very popular to see these base stations distributed everywhere in the neighborhood and on roof tops which has caused a considerable amount of panic to the public in Palestine concerning wither the radiated electromagnetic fields from these base stations may cause any health effect or hazard. Recently UP High Court in India ordered for removal of BTS towers from residential area, it has created panic among cellular communication network designers too. Green cellular networks could be a solution for the above problem. This paper deals with green cellular networks with the help of multi-layer overlaid hierarchical structure (macro / micro / pico / femto cells). Macrocell for area coverage, micro for pedestrian and a slow moving traffic while pico for indoor use and femto for individual high capacity users. This could be the answer of the problem of ...

  5. An Intelligent Surveillance Platform for Large Metropolitan Areas with Dense Sensor Deployment

    Directory of Open Access Journals (Sweden)

    Jesus A. Alonso-López

    2013-06-01

    Full Text Available This paper presents an intelligent surveillance platform based on the usage of large numbers of inexpensive sensors designed and developed inside the European Eureka Celtic project HuSIMS. With the aim of maximizing the number of deployable units while keeping monetary and resource/bandwidth costs at a minimum, the surveillance platform is based on the usage of inexpensive visual sensors which apply efficient motion detection and tracking algorithms to transform the video signal in a set of motion parameters. In order to automate the analysis of the myriad of data streams generated by the visual sensors, the platform’s control center includes an alarm detection engine which comprises three components applying three different Artificial Intelligence strategies in parallel. These strategies are generic, domain-independent approaches which are able to operate in several domains (traffic surveillance, vandalism prevention, perimeter security, etc.. The architecture is completed with a versatile communication network which facilitates data collection from the visual sensors and alarm and video stream distribution towards the emergency teams. The resulting surveillance system is extremely suitable for its deployment in metropolitan areas, smart cities, and large facilities, mainly because cheap visual sensors and autonomous alarm detection facilitate dense sensor network deployments for wide and detailed coverage.

  6. An intelligent surveillance platform for large metropolitan areas with dense sensor deployment.

    Science.gov (United States)

    Fernández, Jorge; Calavia, Lorena; Baladrón, Carlos; Aguiar, Javier M; Carro, Belén; Sánchez-Esguevillas, Antonio; Alonso-López, Jesus A; Smilansky, Zeev

    2013-01-01

    This paper presents an intelligent surveillance platform based on the usage of large numbers of inexpensive sensors designed and developed inside the European Eureka Celtic project HuSIMS. With the aim of maximizing the number of deployable units while keeping monetary and resource/bandwidth costs at a minimum, the surveillance platform is based on the usage of inexpensive visual sensors which apply efficient motion detection and tracking algorithms to transform the video signal in a set of motion parameters. In order to automate the analysis of the myriad of data streams generated by the visual sensors, the platform's control center includes an alarm detection engine which comprises three components applying three different Artificial Intelligence strategies in parallel. These strategies are generic, domain-independent approaches which are able to operate in several domains (traffic surveillance, vandalism prevention, perimeter security, etc.). The architecture is completed with a versatile communication network which facilitates data collection from the visual sensors and alarm and video stream distribution towards the emergency teams. The resulting surveillance system is extremely suitable for its deployment in metropolitan areas, smart cities, and large facilities, mainly because cheap visual sensors and autonomous alarm detection facilitate dense sensor network deployments for wide and detailed coverage. PMID:23748169

  7. Gateway Deployment optimization in Cellular Wi-Fi Mesh Networks

    Directory of Open Access Journals (Sweden)

    Rajesh Prasad

    2006-07-01

    Full Text Available With the standardization of IEEE 802.11, there has been an explosive growth of wireless local area networks (WLAN. Recently, this cost effective technology is being developed aggressively for establishing metro-scale “cellular Wi-Fi” network to support seamless Internet access in the urban area. We envision a large scale WLAN system in the future where Access Points (APs will be scattered over an entire city enabling people to use their mobile devices ubiquitously. The problem addressed in this paper involves finding the minimum number of gateways and their optimal placement so as to minimize the network installation costs while maintaining reliability, flexibility and an acceptable grade of service. The problem is modeled taking a network graph, where the nodes represents either the Access Points of IEEE 802.11 or wired backbone gateways. In this paper, we present two methods (1 an innovative approach using integer linear programming (ILP for gateway selection in the cellular Wi-Fi network, and (2 a completely new heuristic (OPEN/CLOSE to solve the gateway selection problem. In the ILP model, we developed a set of linear inequalities based on various constraints. The ILP model is solved by using lp-solve, a simplex-based software for linear and integer programming problems. The second approach is an OPEN/CLOSE heuristic, tailored for cellular Wi-Fi, which arrives at a sub-optimal solution. Java programming language is used for simulation in OPEN/CLOSE heuristic. Extensive simulations are carried out for performance evaluation. Simulation results show that the proposed approaches can effectively identify a set of gateways at optimal locations in a cellular Wi-Fi network, resulting in an overall cost reduction of up to 50%. The technique presented in this paper is generalized and can be used for gateway selection for other networks as well.

  8. Xweb: a framework for application network deployment in a programmable internet service infrastructure

    OpenAIRE

    Ardáiz Villanueva, Óscar; Navarro Moldes, Leandro

    2004-01-01

    An application network consists of a number of application servers distributed throughout the Internet, connected and coordinated to provide services with low latency. Adding, removing and migrating servers, application networks adapt to demand variations. To create new servers anywhere in the Internet a programmable Internet service infrastructure is needed. In addition application network servers must be deployed coordinately. We propose a framework for application network deployment that i...

  9. Zigbee Wireless Sensor Network Nodes Deployment Strategy for Digital Agricultural Data Acquisition

    OpenAIRE

    Xiang, Xinjian; Guo, Xiaoqing

    2010-01-01

    ZigBee is an emerging wireless network technology, according to china's digital agricultural feature such as remote, dispersion, variability and diversity, the ZigBee-based wireless sensor network for digital agricultural data acquisition is one of the best ways to build the system. In this paper, based on ZigBee wireless sensor network deployment planning principles and the status of our digital agriculture, we study several ZigBee wireless sensor network nodes deployment program for differe...

  10. Planning the deployment of fault-tolerant wireless sensor networks

    OpenAIRE

    Sitanayah, Lanny

    2013-01-01

    Since Wireless Sensor Networks (WSNs) are subject to failures, fault-tolerance becomes an important requirement for many WSN applications. Fault-tolerance can be enabled in different areas of WSN design and operation, including the Medium Access Control (MAC) layer and the initial topology design. To be robust to failures, a MAC protocol must be able to adapt to traffic fluctuations and topology dynamics. We design ER-MAC that can switch from energy-efficient operation in norma...

  11. Network Analysis of Strategic Marketing Actions and Quality Function Deployment

    Directory of Open Access Journals (Sweden)

    fatema daneshian

    2011-12-01

    Nowadays, strategic marketing management has become an accepted practice in the strategic field. An increasing number of researchers consider marketing strategies for offering key competitive advantages associated with strategic marketing management. Every decision in the strategic field should be based on three dimensions of evaluating market, evaluating competitors and evaluating company. In this research, a model has been developed for selecting and ranking marketing strategies considering the evaluation of market (customer satisfaction elements, competitors and company based on Kano model. Quality function deployment (QFD and the analytic network process (ANP approaches have been used for market prioritization. The research has been carried out in three phases. In Phase one, the Kano model of customer satisfaction has been used to determine which requirements of a product or service brings more satisfaction to the customers, followed by the evaluation of competitors and gap analyze. In Phase two, The QFD approach has been used to incorporate the voice of customer (VOC into the marketing strategies of the company and has provided a systematic planning tool for considering the information of elements (in the last phase to make appropriate decisions effectively and efficiently. In Phase three, the ANP method has been used to analyze strategic actions considering company conditions. Finally the outputs of QFD have been corrected by ANP weights. Findings imply that the three most important strategic actions which are important for the company include offering differentiated and new generation of products to the market (leapfrog strategy, optimizing visual properties of products, and widespread and attractive advertising (frontal attack.

  12. Hybrid Spectral Efficient Cellular Network Deployment to Reduce RF Pollution

    Science.gov (United States)

    Katiyar, Sumit; K. Jain, R.; K. Agrawal, N.

    2012-09-01

    As the mobile telecommunication systems are growing tremendously all over the world, the numbers of handheld and base stations are also rapidly growing and it became very popular to see these base stations distributed everywhere in the neighborhood and on roof tops which has caused a considerable amount of panic to the public in Palestine concerning wither the radiated electromagnetic fields from these base stations may cause any health effect or hazard. Recently UP High Court in India ordered for removal of BTS towers from residential area, it has created panic among cellular communication network designers too. Green cellular networks could be a solution for the above problem. This paper deals with green cellular networks with the help of multi-layer overlaid hierarchical structure (macro / micro / pico / femto cells). Macrocell for area coverage, micro for pedestrian and a slow moving traffic while pico for indoor use and femto for individual high capacity users. This could be the answer of the problem of energy conservation and enhancement of spectral density also.

  13. Sensor deployment strategy for chain-type wireless underground mine sensor network

    Institute of Scientific and Technical Information of China (English)

    CHEN Guang-zhu; ZHU Zhen-cai; ZHOU Gong-bo; SHEN Chun-feng; SUN Yan-jing

    2008-01-01

    Wireless sensor networks (WSNs) are very important for monitoring underground mine safety. Sensor node deployment affects the performances of WSNs. In our study, a chain-type wireless underground mine sensor network (CWUMSN) is first presented. A CWUMSN can monitor the environment and locate miners in underground mines. The lowest density deployment strategies of cluster head nodes are discussed theoretically. We prove that the lifetime of CWUMSN with a non-uniform deployment strategy is longer than with a uniform deployment strategy. Secondly, we present the algorithm of non-uniform lowest density deployment of cluster head nodes. Next, we propose a dynamic choice algorithm of cluster head nodes for CWUMSN which can improve the adaptability of networks. Our experiments of CWUMSN with both non-uniform lowest density and uniform lowest density deployments are simulated. The results show that the lifetime of CWUMSN with non-uniform lowest density deployment is almost 2.5 times as long as that of the uniform lowest density deployment. This work provides a new deployment strategy for wireless underground mine sensor networks and then effectively promotes the application of wireless sensor networks to underground mines.

  14. Network Analysis of Strategic Marketing Actions and Quality Function Deployment

    Directory of Open Access Journals (Sweden)

    Fatemeh Daneshian

    2011-01-01

    Full Text Available Nowadays, strategic marketing management has become an accepted practice in the strategic field. An increasing number of researchers consider marketing strategies for offering key competitive advantages associated with strategic marketing management. Every decision in the strategic field should be based on three dimensions of evaluating market, evaluating competitors and evaluating company. In this research, a model has been developed for selecting and ranking marketing strategies considering the evaluation of market (customer satisfaction elements, competitors and company based on Kano model. Quality function deployment (QFD and the analytic network process (ANP approaches have been used for market prioritization. The research has been carried out in three phases. In Phase one, the Kano model of customer satisfaction has been used to determine which requirements of a product or service brings more satisfaction to the customers, followed by the evaluation of competitors and gap analyze. In Phase two, The QFD approach has been used to incorporate the voice of customer (VOC into the marketing strategies of the company and has provided a systematic planning tool for considering the information of elements (in the last phase to make appropriate decisions effectively and efficiently. In Phase three, the ANP method has been used to analyze strategic actions considering company conditions. Finally the outputs of QFD have been corrected by ANP weights. Findings imply that the three most important strategic actions which are important for the company include offering differentiated and new generation of products to the market (leapfrog strategy, optimizing visual properties of products, and widespread and attractive advertising (frontal attack.

  15. Lessons from a pilot deployment of energy efficient data collection protocols in wireless sensor networks

    International Nuclear Information System (INIS)

    This study reports results of, as well as experiences and engineering challenges encountered, during a pilot deployment of a Dual Prediction and Probabilistic Scheduler (DPPS) for energy efficient data collection (EEDC). The deployment was motivated by sensor network supplier, Senceive Ltd., whose researchers wanted to incorporate more intelligence into their firmware to facilitate more cost effective remote asset management. The process of embedding and deploying DPPS, highlighted the importance of re-evaluating the assumptions typically overlooked in computer simulations and emphasises the need for sensor network researchers as a whole to reconsider the usefulness of EEDC protocols through real-life experimental deployment.

  16. MIRAGE: a management tool for the analysis and deployment of network security policies

    OpenAIRE

    Garcia Alfaro, Joaquin; Cuppens, Frédéric; CUPPENS-BOULAHIA, Nora; Preda, Stere

    2010-01-01

    We present the core functionality of MIRAGE, a management tool for the analysis and deployment of configuration policies over network security components, such as firewalls, intrusion detection systems, and VPN routers.We review the two main functionalities embedded in our current prototype: (1) a bottom-up analysis of already deployed network security configurations and (2) a top-down refinement of global policies into network security component configurations. In both cases, MIRAGE provides...

  17. Networked gamma radiation detection system for tactical deployment

    Science.gov (United States)

    Mukhopadhyay, Sanjoy; Maurer, Richard; Wolff, Ronald; Smith, Ethan; Guss, Paul; Mitchell, Stephen

    2015-08-01

    A networked gamma radiation detection system with directional sensitivity and energy spectral data acquisition capability is being developed by the National Security Technologies, LLC, Remote Sensing Laboratory to support the close and intense tactical engagement of law enforcement who carry out counterterrorism missions. In the proposed design, three clusters of 2″ × 4″ × 16″ sodium iodide crystals (4 each) with digiBASE-E (for list mode data collection) would be placed on the passenger side of a minivan. To enhance localization and facilitate rapid identification of isotopes, advanced smart real-time localization and radioisotope identification algorithms like WAVRAD (wavelet-assisted variance reduction for anomaly detection) and NSCRAD (nuisance-rejection spectral comparison ratio anomaly detection) will be incorporated. We will test a collection of algorithms and analysis that centers on the problem of radiation detection with a distributed sensor network. We will study the basic characteristics of a radiation sensor network and focus on the trade-offs between false positive alarm rates, true positive alarm rates, and time to detect multiple radiation sources in a large area. Empirical and simulation analyses of critical system parameters, such as number of sensors, sensor placement, and sensor response functions, will be examined. This networked system will provide an integrated radiation detection architecture and framework with (i) a large nationally recognized search database equivalent that would help generate a common operational picture in a major radiological crisis; (ii) a robust reach back connectivity for search data to be evaluated by home teams; and, finally, (iii) a possibility of integrating search data from multi-agency responders.

  18. On the Probabilistic Deployment of Smart Grid Networks in TV White Space.

    Science.gov (United States)

    Cacciapuoti, Angela Sara; Caleffi, Marcello; Paura, Luigi

    2016-01-01

    To accommodate the rapidly increasing demand for wireless broadband communications in Smart Grid (SG) networks, research efforts are currently ongoing to enable the SG networks to utilize the TV spectrum according to the Cognitive Radio paradigm. To this aim, in this letter, we develop an analytical framework for the optimal deployment of multiple closely-located SG Neighborhood Area Networks (NANs) concurrently using the same TV spectrum. The objective is to derive the optimal values for both the number of NANs and their coverage. More specifically, regarding the number of NANs, we derive the optimal closed-form expression, i.e., the closed-form expression that assures the deployment of the maximum number of NANs in the considered region satisfying a given collision constraint on the transmissions of the NANs. Regarding the NAN coverage, we derive the optimal closed-form expression, i.e., the closed-form expression of the NAN transmission range that assures the maximum coverage of each NAN in the considered region satisfying the given collision constraint. All the theoretical results are derived by adopting a stochastic approach. Finally, numerical results validate the theoretical analysis. PMID:27171099

  19. Design, deployment and performance of 4G-LTE networks a practical approach

    CERN Document Server

    ElNashar, Ayman; Sherif, Mahmoud

    2014-01-01

    This book provides an insight into the key practical aspects and best practice of 4G-LTE network design, performance, and deployment Design, Deployment and Performance of 4G-LTE Networks addresses the key practical aspects and best practice of 4G networks design, performance, and deployment. In addition, the book focuses on the end-to-end aspects of the LTE network architecture and different deployment scenarios of commercial LTE networks. It describes the air interface of LTE focusing on the access stratum protocol layers: PDCP, RLC, MAC, and Physical Layer. The air interface described in this book covers the concepts of LTE frame structure, downlink and uplink scheduling, and detailed illustrations of the data flow across the protocol layers. It describes the details of the optimization process including performance measurements and troubleshooting mechanisms in addition to demonstrating common issues and case studies based on actual field results. The book provides detailed performance analysis of key fe...

  20. Mobile middleware for wireless body area network.

    Science.gov (United States)

    Chen, Xiang; Waluyo, Agustinus Borgy; Pek, Isaac; Yeoh, Wee-Soon

    2010-01-01

    This paper presents a flexible, efficient and lightweight Wireless Body Area Network (WBAN) Middleware. The Middleware is developed to bridge the communication between mobile device as a gateway and the sensor nodes, and therefore it shields the underlying sensor and OS/protocol stack away from the WBAN application layer. The middleware is coded in the form of lightweight dynamic link library, which allows the application developer to simply incorporate the middleware resource dynamic link library into their application and call the required functions (i.e. data acquisition, resource management and configurations). A showcase of the middleware deployment is exhibited at the end of the paper. PMID:21096294

  1. A Sparse Representation-Based Deployment Method for Optimizing the Observation Quality of Camera Networks

    OpenAIRE

    Guangming Shi; Xiaotian Wang; Fei Qi; Chang Wang

    2013-01-01

    Deployment is a critical issue affecting the quality of service of camera networks. The deployment aims at adopting the least number of cameras to cover the whole scene, which may have obstacles to occlude the line of sight, with expected observation quality. This is generally formulated as a non-convex optimization problem, which is hard to solve in polynomial time. In this paper, we propose an efficient convex solution for deployment optimizing the observation quality based on a novel aniso...

  2. LTE Micro-cell Deployment for High-Density Railway Areas

    DEFF Research Database (Denmark)

    Sniady, Aleksander; Kassab, Mohamed; Soler, José;

    2014-01-01

    Long Term Evolution (LTE) is a serious candidate for the future releases of the European Rail Traffic Management System (ERTMS). LTE offers more capacity and supports new communication-based applications and services for railways. Nevertheless, even with this technology, the classical macro......-cell radio deployments reach overload, especially in high-density areas, such as major train stations. In this paper, an LTE micro-cell deployment is investigated in high-density railway areas. Copenhagen Main Station is considered as a realistic deployment study case, with a set of relevant railway...... communication-based applications. The micro-cell deployment is compared with a classical macro-cell deployment in terms of transmission performance. Simulation results show a capacity improvement in the micro-cell deployment and its positive impact on critical (safety) and non-critical applications....

  3. The Node Deployment of Intelligent Sensor Networks Based on the Spatial Difference of Farmland Soil.

    Science.gov (United States)

    Liu, Naisen; Cao, Weixing; Zhu, Yan; Zhang, Jingchao; Pang, Fangrong; Ni, Jun

    2015-01-01

    Considering that agricultural production is characterized by vast areas, scattered fields and long crop growth cycles, intelligent wireless sensor networks (WSNs) are suitable for monitoring crop growth information. Cost and coverage are the most key indexes for WSN applications. The differences in crop conditions are influenced by the spatial distribution of soil nutrients. If the nutrients are distributed evenly, the crop conditions are expected to be approximately uniform with little difference; on the contrary, there will be great differences in crop conditions. In accordance with the differences in the spatial distribution of soil information in farmland, fuzzy c-means clustering was applied to divide the farmland into several areas, where the soil fertility of each area is nearly uniform. Then the crop growth information in the area could be monitored with complete coverage by deploying a sensor node there, which could greatly decrease the deployed sensor nodes. Moreover, in order to accurately judge the optimal cluster number of fuzzy c-means clustering, a discriminant function for Normalized Intra-Cluster Coefficient of Variation (NICCV) was established. The sensitivity analysis indicates that NICCV is insensitive to the fuzzy weighting exponent, but it shows a strong sensitivity to the number of clusters. PMID:26569243

  4. Analysis of factors influencing deployment of fire suppression resources in Spain using artificial neural networks

    Directory of Open Access Journals (Sweden)

    Costafreda-Aumedes S

    2016-02-01

    Full Text Available In Spain, the established fire control policy states that all fires must be controlled and put out as soon as possible. Though budgets have not restricted operations until recently, we still experience large fires and we often face multiple-fire situations. Furthermore, fire conditions are expected to worsen in the future and budgets are expected to drop. To optimize the deployment of firefighting resources, we must gain insights into the factors affecting how it is conducted. We analyzed the national data base of historical fire records in Spain for patterns of deployment of fire suppression resources for large fires. We used artificial neural networks to model the relationships between the daily fire load, fire duration, fire type, fire size and response time, and the personnel and terrestrial and aerial units deployed for each fire in the period 1998-2008. Most of the models highlighted the positive correlation of burned area and fire duration with the number of resources assigned to each fire and some highlighted the negative influence of daily fire load. We found evidence suggesting that firefighting resources in Spain may already be under duress in their compliance with Spain’s current full suppression policy.

  5. Enhanced Deployment Strategy for Role-based Hierarchical Application Agents in Wireless Sensor Networks with Established Clusterheads

    Science.gov (United States)

    Gendreau, Audrey

    Efficient self-organizing virtual clusterheads that supervise data collection based on their wireless connectivity, risk, and overhead costs, are an important element of Wireless Sensor Networks (WSNs). This function is especially critical during deployment when system resources are allocated to a subsequent application. In the presented research, a model used to deploy intrusion detection capability on a Local Area Network (LAN), in the literature, was extended to develop a role-based hierarchical agent deployment algorithm for a WSN. The resulting model took into consideration the monitoring capability, risk, deployment distribution cost, and monitoring cost associated with each node. Changing the original LAN methodology approach to model a cluster-based sensor network depended on the ability to duplicate a specific parameter that represented the monitoring capability. Furthermore, other parameters derived from a LAN can elevate costs and risk of deployment, as well as jeopardize the success of an application on a WSN. A key component of the approach presented in this research was to reduce the costs when established clusterheads in the network were found to be capable of hosting additional detection agents. In addition, another cost savings component of the study addressed the reduction of vulnerabilities associated with deployment of agents to high volume nodes. The effectiveness of the presented method was validated by comparing it against a type of a power-based scheme that used each node's remaining energy as the deployment value. While available energy is directly related to the model used in the presented method, the study deliberately sought out nodes that were identified with having superior monitoring capability, cost less to create and sustain, and are at low-risk of an attack. This work investigated improving the efficiency of an intrusion detection system (IDS) by using the proposed model to deploy monitoring agents after a temperature sensing

  6. A Deployment of Fine-Grained Sensor Network and Empirical Analysis of Urban Temperature

    Directory of Open Access Journals (Sweden)

    Yoshito Tobe

    2010-03-01

    Full Text Available Temperature in an urban area exhibits a complicated pattern due to complexity of infrastructure. Despite geographical proximity, structures of a group of buildings and streets affect changes in temperature. To investigate the pattern of fine-grained distribution of temperature, we installed a densely distributed sensor network called UScan. In this paper, we describe the system architecture of UScan as well as experience learned from installing 200 sensors in downtown Tokyo. The field experiment of UScan system operated for two months to collect long-term urban temperature data. To analyze the collected data in an efficient manner, we propose a lightweight clustering methodology to study the correlation between the pattern of temperature and various environmental factors including the amount of sunshine, the width of streets, and the existence of trees. The analysis reveals meaningful results and asserts the necessity of fine-grained deployment of sensors in an urban area.

  7. Lessons from the Field—Two Years of Deploying Operational Wireless Sensor Networks on the Great Barrier Reef

    Directory of Open Access Journals (Sweden)

    Geoff Page

    2011-06-01

    Full Text Available Wireless Sensor Networks promised to do for observation systems what consumer electronics have done for areas like photography—drive down the price per observation (photograph, introduce new functionality and capabilities, and make, what had been a relatively exclusive set of technologies and capabilities, ubiquitous. While this may have been true for some terrestrial sensor networks there are issues in the marine environment that have limited the realization of ubiquitous cheap sensing. This paper reports on the lessons learned from two years of operation of wireless sensor networks deployed at seven coral reefs along the Great Barrier Reef in north-eastern Australia.

  8. A New Node Deployment and Location Dispatch Algorithm for Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Peng Jiang

    2016-01-01

    Full Text Available Considering that deployment strategies for underwater sensor networks should contribute to fully connecting the networks, a Guaranteed Full Connectivity Node Deployment (GFCND algorithm is proposed in this study. The GFCND algorithm attempts to deploy the coverage nodes according to the greedy iterative strategy, after which the connectivity nodes are used to improve network connectivity and fully connect the whole network. Furthermore, a Location Dispatch Based on Command Nodes (LDBCN algorithm is proposed, which accomplishes the location adjustment of the common nodes with the help of the SINK node and the command nodes. The command nodes then dispatch the common nodes. Simulation results show that the GFCND algorithm achieves a comparatively large coverage percentage and a fully connected network; furthermore, the LDBCN algorithm helps the common nodes preserve more total energy when they reach their destination locations.

  9. Identification of a supplier network through Quality Function Deployment

    DEFF Research Database (Denmark)

    Kristensen, Preben Sander; Holmen, Elsebeth

    1994-01-01

    During 1993-94 the authors followed a product development process in a Danish Butter Cookie company. The process was structured according to the Quality Function Deployment technique House of Quality. Customer attributes were derived from a discus a diabetics end-user focus group. During a series...... of meetings the production manager and the marketing manager transformed attributes into characteristics and constructed Houses of Quality for a sugar-free cookie. As expected, most product characteristics were deployed to potential suppliers. In this way the company identified the departments and...... transformation processes and characteristics constituting this fan were based on the company's knowledge before entering into development interaction with suppliers. If these characteristics are used to express the company's demand in the subsequent interaction process, much information may be lost. We suggest...

  10. Emergent Behavior in Massively-Deployed Sensor Networks

    OpenAIRE

    Ekaterina Shurkova; Ruzana Ishak; Stephan Olariu; Shaharuddin Salleh

    2008-01-01

    The phenomenal advances in MEMS and nanotechnology make it feasible to build small devices, referred to as sensors that are able to sense, compute and communicate over small distances. The massive deployment of these small devices raises the fascinating question of whether or not the sensors, as a collectivity, will display emergent behavior, just as living organisms do. In this work we report on a recent effort intended to observe emerging behavior of large groups of sensor nodes, like livin...

  11. Strategies for Power Line Communications Smart Metering Network Deployment

    OpenAIRE

    Alberto Sendin; Ivan Peña; Pablo Angueira

    2014-01-01

    Smart Grids are becoming a reality all over the world. Nowadays, the research efforts for the introduction and deployment of these grids are mainly focused on the development of the field of Smart Metering. This emerging application requires the use of technologies to access the significant number of points of supply (PoS) existing in the grid, covering the Low Voltage (LV) segment with the lowest possible costs. Power Line Communications (PLC) have been extensively used in electricity grids ...

  12. Design of Randomly Deployed Heterogeneous Wireless Sensor Networks by Algorithms Based on Swarm Intelligence

    OpenAIRE

    Joon-Woo Lee; Won Kim

    2015-01-01

    This paper reports the design of a randomly deployed heterogeneous wireless sensor network (HWSN) with two types of nodes: a powerful node and an ordinary node. Powerful nodes, such as Cluster Heads (CHs), communicate directly to the data sink of the network, and ordinary nodes sense the desired information and transmit the processed data to powerful nodes. The heterogeneity of HWSNs improves the networks lifetime and coverage. This paper focuses on the design of a random network among HWSNs....

  13. Realtime Delivery of Alarms and Key Observables in a Deployed Hydrological Sensor Network

    Science.gov (United States)

    Marshall, I. W.; Price, M. C.; Li, H.; Boyd, N.; Boult, S.

    2007-12-01

    It has widely [1-3] been proposed that sensor networks are a good solution for environmental monitoring. However, this application presents a number of major challenges for current technology. In particular environmental science involves the study of coupled non-equilibrium dynamic processes that generate time series with non-stationary means and strongly dependent variables and which operate in the presence of large amounts of noise/interference (thermal, chemical and biological) and multiple quasi-periodic forcing factors (diurnal cycles, tides, etc). This typically means that any analysis must be based on large data samples obtained at multiple scales of space and time. In addition the areas of interest are large, relatively inaccessible and typically extremely hostile to electronic instrumentation. Our analysis of these factors has encouraged us to focus on this list of generic requirements; a) Node lifetime (between visits) should be 1 yr or greater b) Communication range should be ~250m c) Nodes should be portable, unobtrusive, low cost, etc. d) Networks are expected to be sparse since areas of interest are large and budgets are small However, the characteristics of each environment, the dominant processes operating in it and the measurements that are of interest are sufficiently different that the design of an appropriate sensor network solution is normally most determined by site specific constraints. Most importantly the opportunities for exploiting contextual correlation to disambiguate observations and improve the maintenance and robustness of a deployed sensor network are always site specific. We will describe the design and initial deployment of a hydrological sensor network we are developing to assess the hydro-dynamics of surface water drainage into Great Crowden Brook in the Peak District (UK). The complete network will observe soil moisture, temperature and rainfall on a number of transects across the valley, and will also investigate water quality

  14. Cost effective node deployment strategy for energy-balanced and delay-efficient data collection in wireless sensor networks

    OpenAIRE

    Doudou, Messaoud; Djenouri, Djamel; Barceló Ordinas, José María; Badache, Nadjib

    2014-01-01

    The real-world node deployment aspect is investigated, while considering cost minimization for resolving the energy hole around the sink, which represents a serious problem in typical sensor networks with uniform distribution. A novel strategy is proposed that is based on the use of two sinks and a few extra relay nodes close to the sinks' areas. The traffic is then alternatively sent to the sinks in every other cycle. As a second contribution, an efficient data collection mechanism has been ...

  15. A Practical Hand-on Guide for Deploying a Large-scale Wireless Multi-hop Network

    OpenAIRE

    Aziz, Adel; Herzen, Julien

    2010-01-01

    The knowledge of how to exactly deploy a wireless multi-hop network can be of interest for both researchers and engineers. Engineers may be interested in the possibility of extending the coverage area of their traditional access point and to provide ubiquitous Internet connectivity at a significantly reduced cost and some communities have already started to do so. Researchers need large-scale testbeds offering a certain level of flexibility in order to study the behavior of existing protocols...

  16. Fleet deployment, network design and hub location of liner shipping companies

    DEFF Research Database (Denmark)

    Gelareh, Shahin; Pisinger, David

    2011-01-01

    A mixed integer linear programming formulation is proposed for the simultaneous design of network and fleet deployment of a deep-sea liner service provider. The underlying network design problem is based on a 4-index (5-index by considering capacity type) formulation of the hub location problem w...... in comparison with a general-purpose mixed integer programming solver....

  17. An access control architecture for metropolitan area wireless networks

    OpenAIRE

    Friday, Adrian; Wu, Maomao; Schmid, Stefan; Finney, Joseph; Cheverst, Keith; Davies, Nigel

    2001-01-01

    This paper presents a novel wireless access point architecture designed to support the development of next generation mobile context-aware applications over metropolitan scale areas. In addition, once deployed, this network will allow ordinary citizens secure, accountable and convenient access to the Internet from their local city and campus environments. The proposed architecture is based on an approach utilising a modified Mobile IPv6 protocol stack that uses packet marking and network leve...

  18. Biomimetic Models for An Ecological Approach to Massively-Deployed Sensor Networks

    Science.gov (United States)

    Jones, Kennie H.; Lodding, Kenneth N.; Olariu, Stephan; Wilson, Larry; Xin, Chunsheng

    2005-01-01

    Promises of ubiquitous control of the physical environment by massively-deployed wireless sensor networks open avenues for new applications that will redefine the way we live and work. Due to small size and low cost of sensor devices, visionaries promise systems enabled by deployment of massive numbers of sensors ubiquitous throughout our environment working in concert. Recent research has concentrated on developing techniques for performing relatively simple tasks with minimal energy expense, assuming some form of centralized control. Unfortunately, centralized control is not conducive to parallel activities and does not scale to massive size networks. Execution of simple tasks in sparse networks will not lead to the sophisticated applications predicted. We propose a new way of looking at massively-deployed sensor networks, motivated by lessons learned from the way biological ecosystems are organized. We demonstrate that in such a model, fully distributed data aggregation can be performed in a scalable fashion in massively deployed sensor networks, where motes operate on local information, making local decisions that are aggregated across the network to achieve globally-meaningful effects. We show that such architectures may be used to facilitate communication and synchronization in a fault-tolerant manner, while balancing workload and required energy expenditure throughout the network.

  19. A Faster Convergence Artificial Bee Colony Algorithm in Sensor Deployment for Wireless Sensor Networks

    OpenAIRE

    Yu, Xiangyu; Zhang, Jiaxin; Fan, Jiaru; Zhang, Tao

    2013-01-01

    In wireless sensor networks (WSN), sensor deployment is one of the main topics for enhancing the sensor’s coverage rate. In this paper, by modifying updating equation of onlooker bee and scout bee of original artificial bee colony (ABC) algorithm, a sensor deployment algorithm based on the modified ABC algorithm is proposed. Some new parameters such as forgetting and neighbor factor for accelerating the convergence speed and probability of mutant for maximizing the coverage rate are introduce...

  20. Internet2: Building and Deploying Advanced, Networked Applications.

    Science.gov (United States)

    Hanss, Ted

    1997-01-01

    Internet2, a consortium effort of over 100 universities, is investing in upgrading campus and national computer network platforms for such applications as digital libraries, collaboration environments, tele-medicine, and distance-independent instruction. The project is described, issues the project intends to address are detailed, and ways in…

  1. Discursive Deployments: Mobilizing Support for Municipal and Community Wireless Networks in the U.S.

    Energy Technology Data Exchange (ETDEWEB)

    Alvarez, Rosio; Rodriguez, Juana Maria

    2008-08-16

    This paper examines Municipal Wireless (MW) deployments in the United States. In particular, the interest is in understanding how discourse has worked to mobilize widespread support for MW networks. We explore how local governments discursively deploy the language of social movements to create a shared understanding of the networking needs of communities. Through the process of"framing" local governments assign meaning to the MW networks in ways intended to mobilize support anddemobilize opposition. The mobilizing potential of a frame varies and is dependent on its centrality and cultural resonance. We examine the framing efforts of MW networks by using a sample of Request for Proposals for community wireless networks, semi-structured interviews and local media sources. Prominent values that are central to a majority of the projects and others that are culturally specific are identified and analyzed for their mobilizing potency.

  2. A Wireless Sensor Network for Hospital Security: From User Requirements to Pilot Deployment

    Directory of Open Access Journals (Sweden)

    Kaseva Ville

    2011-01-01

    Full Text Available Increasing amount of Wireless Sensor Network (WSN applications require low network delays. However, current research on WSNs has mainly concentrated on optimizing energy-efficiency omitting low network delays. This paper presents a novel WSN design targeted at applications requiring low data transfer delays and high reliability. We present the whole design flow from user requirements to an actual pilot deployment in a real hospital unit. The WSN includes multihop low-delay data transfer and energy-efficient mobile nodes reaching lifetime of years with small batteries. The nodes communicate using a low-cost low-power 2.4 GHz radio. The network is used in a security application with which personnel can send alarms in threatening situations. Also, a multitude of sensor measurements and actuator control is possible with the WSN. A full-scale pilot deployment is extensively experimented for performance results. Currently, the pilot network is in use at the hospital.

  3. Deployment of Wireless Sensor Networks in Crop Storages

    DEFF Research Database (Denmark)

    Juul, Jakob Pilegaard; Green, Ole; Jacobsen, Rune Hylsberg

    2015-01-01

    In the agricultural domain, proper storage conditions of crops is important to avoid losses due to degradation of crop quality. Currently, monitoring storages is often done manually and by using only a few samples. This makes the process time-consuming and in many cases the few samples taken cannot...... of the system are also discussed. It is concluded that the network works well for the intended application and that the intended users also see a value in the provided service....

  4. Dynamic deployment of applications in wireless sensor networks

    OpenAIRE

    Pilloni, Virginia

    2013-01-01

    Over the past decades, the progress inWirelss Sensor Network (WSN) technology, both in terms of processing capability and energy consumption reduction, has evolved WSNs into complex systems that can gather information about the monitored environment and make prompt and intelligent decisions. In the beginning, military applications drove the research and development of WSNs, with large-scale acoustic systems for underwater surveillance, radar systems for the collection of data on air target...

  5. Research on Monitoring Area Division of Quality Grade Changes in County Cultivated Land and Technology of Deploying Monitoring Point

    Institute of Scientific and Technical Information of China (English)

    Wei; WEI; Lijun; LIAO; Jianxin; YU

    2013-01-01

    It is an important means in management of improving both the quality and quantity of cultivated land to monitor grade changes in cultivated land quality. How to deploy monitoring network system and its point reasonably and roundly are the key to the technology of monitoring grade changes in cultivated land quality by monitoring grade changes in cultivated land quality dynamically in order to obtain the information to the index of cultivated land quality and its changes based on the existing achievements of farmland classification and grading. Spatial analysis method is used to demarcate monitoring area and deploy monitoring point according to ARCGIS,of which the result can meet the demand for monitoring grade changes in cultivated land.

  6. Ethernet access network based on free-space optic deployment technology

    Science.gov (United States)

    Gebhart, Michael; Leitgeb, Erich; Birnbacher, Ulla; Schrotter, Peter

    2004-06-01

    The satisfaction of all communication needs from single households and business companies over a single access infrastructure is probably the most challenging topic in communications technology today. But even though the so-called "Last Mile Access Bottleneck" is well known since more than ten years and many distribution technologies have been tried out, the optimal solution has not yet been found and paying commercial access networks offering all service classes are still rare today. Conventional services like telephone, radio and TV, as well as new and emerging services like email, web browsing, online-gaming, video conferences, business data transfer or external data storage can all be transmitted over the well known and cost effective Ethernet networking protocol standard. Key requirements for the deployment technology driven by the different services are high data rates to the single customer, security, moderate deployment costs and good scalability to number and density of users, quick and flexible deployment without legal impediments and high availability, referring to the properties of optical and wireless communication. We demonstrate all elements of an Ethernet Access Network based on Free Space Optic distribution technology. Main physical parts are Central Office, Distribution Network and Customer Equipment. Transmission of different services, as well as configuration, service upgrades and remote control of the network are handled by networking features over one FSO connection. All parts of the network are proven, the latest commercially available technology. The set up is flexible and can be adapted to any more specific need if required.

  7. Markovian agents models for wireless sensor networks deployed in environmental protection

    International Nuclear Information System (INIS)

    Wireless sensor networks (WSNs) are gaining popularity as distributed monitoring systems in safety critical applications, when the location to be controlled may be dangerous for a human operator or difficult to access. Fire is one of the major thread in urban as well as in open environments, and WSNs are receiving increasing attention as a mean to build effective and timely fire protection systems. The present paper presents a novel analytical technique for the study of the propagation of a fire in a wide open area and the interaction with a WSN deployed to monitor the outbreak of the fire and to send a warning signal to a base station. For the complex scenario under study, an analytical modeling and analysis technique based on Markovian agents (MAs) is discussed. It is shown that, even if the overall state space of the models is huge, nevertheless an analytical solution is feasible, by exploiting the locality of the interactions among MAs, based on a message passing mechanism combined with a perception function. - Highlights: • We present a revised theory of Markovian agent models, detailing the analysis techniques and its complexity • We a target a complex application of a wireless sensor network (WSN) that monitors forest fire. • The model captures the propagation of fire, heat, and the detection by the WSN. • We compute key performance indices such us the fire propagation front, and message travel time. • We perform an extensive set of experiments to study the effectiveness of the WSN in detecting forest fire

  8. Probabilistic and hybrid model checking deployments for wireless sensor networks

    International Nuclear Information System (INIS)

    In the early stages of system development, model checking is a good practice for examining the WSNs (Wireless Sensor Networks). Model checking involves verifying a system's properties based on the system's finite state model. For varying applications like computers and wireless communication prior to expensive simulations, model checking has become a vital requirement in order to investigate the performance and reliability. In this paper for the first time, we are presenting probabilistic and hybrid model checking tools which are being implemented to analyse and verify the WSN applications and their examples. Here we are categorizing the model checking tools and presenting how they have been used for the investigation of various behaviours of WSN solutions. Consequently, this paper helps readers/researchers to choose the appropriate model checking tool and to get benefited in shape of validating their solutions. The paper has also highlighted the problems of existing model checking tools within WSN domain. (author)

  9. Design And Efficient Deployment Of Honeypot And Dynamic Rule Based Live Network Intrusion Collaborative System

    Directory of Open Access Journals (Sweden)

    Renuka Prasad.B

    2011-03-01

    Full Text Available The continuously emerging, operationally and managerially independent, geographically distributedcomputer networks deployable in an evolutionarily manner have created greater challenges in securingthem. Several research works and experiments have convinced the security expert that Network IntrusionDetection Systems (NIDS or Network Intrusion Prevention Systems (NIPS alone are not capable ofsecuring the Computer Networks from internal and external threats completely. In this paper we presentthe design of Intrusion Collaborative System which is a combination of NIDS,NIPS, Honeypots, softwaretools like nmap, iptables etc. Our Design is tested against existing attacks based on Snort Rules andseveral customized DDOS , remote and guest attacks. Dynamic rules are generated during every unusualbehavior that helps Intrusion Collaborative System to continuously learn about new attacks. Also aformal approach to deploy Live Intrusion Collaboration Systems based on System of Systems Concept isProposed.

  10. Blackboard Mechanism Based Ant Colony Theory for Dynamic Deployment of Mobile Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    Guang-ping Qi; Ping Song; Ke-jie Li

    2008-01-01

    A novel bionic swarm intelligence algorithm, called ant colony algorithm based on a blackboard mechanism, is proposed to solve the autonomy and dynamic deployment of mobiles sensor networks effectively. A blackboard mechanism is introduced into the system for making pheromone and completing the algorithm. Every node, which can be looked as an ant, makes one information zone in its memory for communicating with other nodes and leaves pheromone, which is created by ant itself in nature. Then ant colony theory is used to find the optimization scheme for path planning and deployment of mobile Wireless Sensor Network (WSN). We test the algorithm in a dynamic and unconfigurable environment. The results indicate that the algorithm can reduce the power consumption by 13% averagely, enhance the efficiency of path planning and deployment of mobile WSN by 15% averagely.

  11. Towards a P2P-Based Deployment of Network Management Information

    OpenAIRE

    Makhloufi, Rafik; Bonnet, Grégory; Doyen, Guillaume; Gaïti, Dominique

    2010-01-01

    International audience Standard static centralized network management approaches are unsuitable for managing large, dynamic and distributed networks. Some decentralized approaches based on the P2P model have emerged to overcome the limitations of these centralized approaches like lack of scalability and fault-tolerance. However, they do not address issues related to the deployment of management information which is crucial in a decentralized management context because of the heterogeneous ...

  12. Analysis of Heterogeneous Networks with Dual Connectivity in a Realistic Urban Deployment

    DEFF Research Database (Denmark)

    Gerardino, Guillermo Andrés Pocovi; Barcos, Sonia; Wang, Hua; Pedersen, Klaus I.; Rosa, Claudio

    2015-01-01

    Dual Connectivity (DC) has been studied and proved to be an effective solution to deal with the fragmented resources in deployment scenarios where the macro and small cells use different frequency carriers. The performance of DC has mainly been analyzed using generic network models such as those ...

  13. A Deployment Method Based on Spring Force in Wireless Robot Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiangyu Yu

    2014-05-01

    Full Text Available Robotic sensor deployment is fundamental for the effectiveness of wireless robot sensor networks - a good deployment algorithm leads to good coverage and connectivity with low energy consumption for the whole network. Virtual force-based algorithms (VFAs is one of the most popular approaches to this problem. In VFA, sensors are treated as points subject to repulsive and attractive forces exerted among them - sensors can move according to imaginary force generated in algorithms. In this paper, a virtual spring force-based algorithm with proper damping is proposed for the deployment of sensor nodes in a wireless sensor network (WSN. A new metric called Pair Correlation Diversion (PCD is introduced to evaluate the uniformity of the sensor distribution. Numerical simulations showed that damping can affect the network coverage, energy consumption, convergence time and general topology in the deployment. Moreover, it was found that damping effect (imaginary friction force has significant influence on algortithm outcomes. In addition, when working under approximate critical-damping condition, the proposed approach has the advantage of a higher coverage rate, better configurational uniformity and less energy consumption.

  14. Argonne National Lab deploys Force10 networks' massively dense ethernet switch for supercomputing cluster

    CERN Multimedia

    2003-01-01

    "Force10 Networks, Inc. today announced that Argonne National Laboratory (Argonne, IL) has successfully deployed Force10 E-Series switch/routers to connect to the TeraGrid, the world's largest supercomputing grid, sponsored by the National Science Foundation (NSF)" (1/2 page).

  15. Effect of military deployment in operational area on the trend of smoking among troops

    International Nuclear Information System (INIS)

    To identify effect of military deployment in operational area on trend of smoking cigarettes among troops. Study Design: Descriptive cross-sectional study. Place and Duration of study: The study was carried out in an Army Brigade deployed in Operation Al-Mizan, Swat, from Jan to March 2014. Material and Methods: Whole troops of an army brigade deployed in operation Al-Mizan, Swat were the part of present study. Total strength of brigade comprised of 1850 troops. Out of these 1850, officers constituted 53 (2.86%) and rest 1797 (97.14%) were Junior Commissioned officers (JCOs), noncommissioned officers (NCOs) and soldiers. All ranks other than officers were collectively termed as soldiers. All the individuals were given structured questionnaire to fill. The information was gathered on variables like age, rank, unit, education, duration of deployment in operational area, habit of smoking, intensity of smoking (number of cigarettes smoked daily) and change in the habit and intensity of smoking after being deployed in the operational area. Information was also gathered from the individuals about the reasons for change in the habit (starting or stopping smoking) and intensity of smoking after deployment in operational area. Forty nine individuals with less than 6 months duration in operational area were excluded. All the other officers and soldiers (1801) having served more than 6 months in the operational area were included in the study. Results: There were total 1801 individuals included in the study. Officers constituted 52 (2.88%) of the total and rest 1749 (97.12%) were soldiers. The mean age of officers was 26.34 ± 4.6 years and mean age of soldiers was 27.92 ± 4.5 years. The overall frequency of smoking in officers and soldiers in the operational area came out to be 29.6%, however the overall frequency of smoking in these individuals before coming to operational area was 26.8%. There were 3 officers and 47 soldiers who started smoking in the operational area

  16. Energy Balanced Dynamic Deployment Optimization to Enhance Reliable Lifetime of Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    J.Roselin

    2013-08-01

    Full Text Available In Wireless Sensor Networks (WSNs, the available energy of sensor nodes is limited and hard to renew. The energy supervision is also very critical. In Mission Critical Surveillance application, due tonode’s battery depletion, coverage hole may be created. Hole at Critical Point (CP leads to performance degradation of overall network. It is merely impossible, to redeploy sensor nodes or to recharge the battery in middle run during monitoring. The proposed Energy Balanced-Dynamic Deployment (EB-DD Optimization approach, positions the self deployable mobile sensors towards CP according to its Energy Density. This balances the Energy Density of the network thereby increasing the Reliable Lifetime. The simulation results show the effectiveness of the approach in terms of balanced Energy Density around CPs with less mobility.

  17. Electricity network limitations on large-scale deployment of wind energy

    Energy Technology Data Exchange (ETDEWEB)

    Fairbairn, R.J.

    1999-07-01

    This report sought to identify limitation on large scale deployment of wind energy in the UK. A description of the existing electricity supply system in England, Scotland and Wales is given, and operational aspects of the integrated electricity networks, licence conditions, types of wind turbine generators, and the scope for deployment of wind energy in the UK are addressed. A review of technical limitations and technical criteria stipulated by the Distribution and Grid Codes, the effects of system losses, and commercial issues are examined. Potential solutions to technical limitations are proposed, and recommendations are outlined.

  18. Home area networks and IPTV

    CERN Document Server

    Rémy, Jean-Gabriel

    2013-01-01

    The field of Home Area Networks (HAN), a dedicated residential subset of LAN technologies for home-based use, is fast becoming the next frontier for the communications industry.This book describes the various technologies involved in the implementation of a HAN: high-speed Internet connections, indoor implementations, services, software, and management packages. It also reviews multimedia applications (which are increasingly the most important and complex aspects of most HANs) with a detailed description of IPTV technology. It highlights the main technologies used for HANs: information tra

  19. 77 FR 55715 - Medical Area Body Network

    Science.gov (United States)

    2012-09-11

    ... COMMISSION 47 CFR Parts 2 and 95 Medical Area Body Network AGENCY: Federal Communications Commission. ACTION... (MedRadio) rules to permit the development of new Medical Body Area Network (MBAN) devices in the 2360... permit the development of new Medical Body Area Network (MBAN) devices in the 2360-2400 MHz band....

  20. RED TACTON HUMAN AREA NETWORKING

    Directory of Open Access Journals (Sweden)

    Priyanka Kakade

    2013-04-01

    Full Text Available All the user-friendly services require technologies that enable communication between people and objects in close proximity. This paper describes a model of human area networking technology that enables communication by touching, a technology we call Red Tacton. Human area networking technology for communication between mobile terminals and between terminals that are embedded in the environment has become important. When cables are used for communication between terminals, the routing of the cables is clearly inconvenient. When very weak radio signals are used for the communication, data speeds are reduced by packet collision and other such problems in crowded places such as exhibition sites and security risk from unwanted signal interception is another problem. Technology for solving such problems includes the use of the person body as a signal path for communication. A transmission path is formed automatically when a person comes into contact with a device and communication between mobile terminals begins. Here, the human body acts as a transmission medium supporting IEEE 802.3 half duplex communication at 10Mbit/s.

  1. Toward Sustainable Networking: Storage Area Networks with Network Coding

    CERN Document Server

    Ferner, Ulric J; Soljanin, Emina

    2012-01-01

    This manuscript provides a model to characterize the energy savings of network coded storage (NCS) in storage area networks (SANs). We consider blocking probability of drives as our measure of performance. A mapping technique to analyze SANs as independent M/G/K/K queues is presented, and blocking probabilities for uncoded storage schemes and NCS are derived and compared. We show that coding operates differently than the amalgamation of file chunks and energy savings are shown to scale well with striping number. We illustrate that for enterprise-level SANs energy savings of 20-50% can be realized.

  2. Pneumatic Launcher Based Precise Placement Model for Large-Scale Deployment in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Vikrant Sharma

    2015-12-01

    Full Text Available Sensor nodes (SNs are small sized, low cost devices used to facilitate automation, remote controlling and monitoring. Wireless sensor network (WSN is an environment monitoring network formed by the number of SNs connected by a wireless medium. Deployment of SNs is an essential phase in the life of a WSN as all the other performance matrices such as connectivity, life and coverage directly depends on it. Moreover, the task of deployment becomes challenging when the WSN is to be established in a large scale candidate region within a limited time interval in order to deal with emergency conditions. In this paper a model for time efficient and precise placement of SNs in large-scale candidate region has been proposed. It constitute of two sets of pneumatic launchers (PLs, one on either side of a deployment helicopter. Each PL is governed by software which determines the launch time and velocity of a SN for its precise placement on the predetermined positions. Simulation results show that the proposed scheme is more time efficient, feasible and cost effective in comparison to the existing state of art models of deployment and can be opted as an effective alternative to deal with emergency conditions.

  3. Deployment of a WLCG network monitoring infrastructure based on the perfSONAR-PS technology

    International Nuclear Information System (INIS)

    The WLCG infrastructure moved from a very rigid network topology, based on the MONARC model, to a more relaxed system, where data movement between regions or countries does not necessarily need to involve T1 centres. While this evolution brought obvious advantages, especially in terms of flexibility for the LHC experiment's data management systems, it also opened the question of how to monitor the increasing number of possible network paths, in order to provide a global reliable network service. The perfSONAR network monitoring system has been evaluated and agreed as a proper solution to cover the WLCG network monitoring use cases: it allows WLCG to plan and execute latency and bandwidth tests between any instrumented endpoint through a central scheduling configuration, it allows archiving of the metrics in a local database, it provides a programmatic and a web based interface exposing the tests results; it also provides a graphical interface for remote management operations. In this contribution we will present our activity to deploy a perfSONAR based network monitoring infrastructure, in the scope of the WLCG Operations Coordination initiative: we will motivate the main choices we agreed in terms of configuration and management, describe the additional tools we developed to complement the standard packages and present the status of the deployment, together with the possible future evolution.

  4. Decentralized Sensor Fusion for Ubiquitous Networking Robotics in Urban Areas

    Directory of Open Access Journals (Sweden)

    Aníbal Ollero

    2010-03-01

    Full Text Available In this article we explain the architecture for the environment and sensors that has been built for the European project URUS (Ubiquitous Networking Robotics in Urban Sites, a project whose objective is to develop an adaptable network robot architecture for cooperation between network robots and human beings and/or the environment in urban areas. The project goal is to deploy a team of robots in an urban area to give a set of services to a user community. This paper addresses the sensor architecture devised for URUS and the type of robots and sensors used, including environment sensors and sensors onboard the robots. Furthermore, we also explain how sensor fusion takes place to achieve urban outdoor execution of robotic services. Finally some results of the project related to the sensor network are highlighted.

  5. Deploying IPv6 in 3GPP networks evolving mobile broadband from 2G to LTE and beyond

    CERN Document Server

    Korhonen, Jouni; Soininen, Jonne

    2013-01-01

    Deploying IPv6 in 3GPP Networks - Evolving Mobile Broadband from 2G to LTE and Beyond  A practical guide enabling mobile operators to deploy IPv6 with confidence The most widely used cellular mobile broadband network technology is based on the 3GPP standards. The history and background of the 3GPP technology is in the Global Mobile Service (GSM) technology and the work done in European Telecommunications Standards Institute (ETSI). This primary voice service network has evolved to be the dominant mobile Internet access technology. Deploying IPv6 in

  6. Elucidating multipollutant exposure across a complex metropolitan area by systematic deployment of a mobile laboratory

    Science.gov (United States)

    Levy, I.; Mihele, C.; Lu, G.; Narayan, J.; Hilker, N.; Brook, J. R.

    2014-07-01

    This study evaluates a deployment strategy of a heavily instrumented mobile lab for characterizing multipollutant spatial patterns based upon a limited number of measurement days spread over different seasons. The measurements obtained through this deployment strategy are used to gain insight into average pollutant levels between routine monitoring sites and in relation to emission sources in the region, as well as to assess correlations between pollutant patterns to better understand the nature of urban air pollutant mixtures. A wide range of locations were part of the deployment in order to characterize the distribution of chronic exposures potentially allowing development of exposure models. Comparison of the mobile lab averages to the available adjacent air quality monitoring network stations to evaluate their representativeness showed that they were in reasonable agreement with the annual averages at the monitoring sites, thus providing some evidence that, through the deployment approach, the mobile lab is able to capture the main features of the average spatial patterns. The differences between mobile lab and network averages varied by pollutant with the best agreement for NO2 with a percentage difference of 20%. Sharp differences in the average spatial distribution were found to exist between different pollutants on multiple scales, particularly on the sub-urban scale, i.e., the neighborhood to street scales. For example, NO2 was observed to be 210-265% higher by the main highway in the study region compared to the nearby urban background monitoring site, while black carbon was higher by 180-200% and particle number concentration was 300% higher. The repeated measurements of near-roadway gradients showed that the rate of change differed by pollutant with elevated concentrations detected up to 600-700 m away for some pollutants. These results demonstrate that through systematic deployment mobile laboratory measurements can be used to characterize average or

  7. Spectrum Load Balancing for Flexible Spectrum Usage in Local Area Deployment Scenario

    DEFF Research Database (Denmark)

    Kumar, Sanjay; Wang, Yuanye; Marchetti, Nicola; KOVÁCS, Istvan; Pedersen, Klaus; Mogensen, Preben

    spectral resources from a common pool based on the individual traffic requirements of the HeNBs, thereby enabling Flexible Spectrum Usage (FSU). It ensures coexistence of several HeNBs in the given geographical area by partially or completely preventing mutual interference on the shared spectrum. A......In this paper we propose a non-contention based mechanism for allocation of the spectral resources by several interfering Home e-NodeBs (HeNBs) deployed by the same or different operators, potentially in random manner in a given geographical area. The proposed mechanism facilitates allocation of...

  8. Analysis of Wireless Sensor Network Topology and Estimation of Optimal Network Deployment by Deterministic Radio Channel Characterization

    Directory of Open Access Journals (Sweden)

    Erik Aguirre

    2015-02-01

    Full Text Available One of the main challenges in the implementation and design of context-aware scenarios is the adequate deployment strategy for Wireless Sensor Networks (WSNs, mainly due to the strong dependence of the radiofrequency physical layer with the surrounding media, which can lead to non-optimal network designs. In this work, radioplanning analysis for WSN deployment is proposed by employing a deterministic 3D ray launching technique in order to provide insight into complex wireless channel behavior in context-aware indoor scenarios. The proposed radioplanning procedure is validated with a testbed implemented with a Mobile Ad Hoc Network WSN following a chain configuration, enabling the analysis and assessment of a rich variety of parameters, such as received signal level, signal quality and estimation of power consumption. The adoption of deterministic radio channel techniques allows the design and further deployment of WSNs in heterogeneous wireless scenarios with optimized behavior in terms of coverage, capacity, quality of service and energy consumption.

  9. On the area spectral efficiency improvement of heterogeneous network by exploiting the integration of macro-femto cellular networks

    KAUST Repository

    Shakir, Muhammad

    2012-06-01

    Heterogeneous networks are an attractive means of expanding mobile network capacity. A heterogeneous network is typically composed of multiple radio access technologies (RATs) where the base stations are transmitting with variable power. In this paper, we consider a Heterogeneous network where we complement the macrocell network with low-power low-cost user deployed nodes, such as femtocell base stations to increase the mean achievable capacity of the system. In this context, we integrate macro-femto cellular networks and derive the area spectral efficiency of the proposed two tier Heterogeneous network. We consider the deployment of femtocell base stations around the edge of the macrocell such that this configuration is referred to as femto-on-edge (FOE) configuration. Moreover, FOE configuration mandates reduction in intercell interference due to the mobile users which are located around the edge of the macrocell since these femtocell base stations are low-power nodes which has significantly lower transmission power than macrocell base stations. We present a mathematical analysis to calculate the instantaneous carrier to interference ratio (CIR) of the desired mobile user in macro and femto cellular networks and determine the total area spectral efficiency of the Heterogeneous network. Details of the simulation processes are included to support the analysis and show the efficacy of the proposed deployment. It has been shown that the proposed setup of the Heterogeneous network offers higher area spectral efficiency which aims to fulfill the expected demand of the future mobile users. © 2012 IEEE.

  10. Deploying perfSONAR-base End-2-End monitoring for production US CMS networking

    International Nuclear Information System (INIS)

    Fermilab is the US Tier-1 Center for CMS data storage and analysis. End-2-End (E2E) circuits are utilized to support high impact data movement into and out of the Tier-1 Center. E2E circuits have been implemented to facilitate the movement of raw experiment data from the Tier-0 Center at CERN, as well as processed data to a number of the US Tier-2 sites. Troubleshooting and monitoring of those circuits presents a significant challenge, since the circuits typically cross multiple research and education networks, each with its own management domain and customized monitoring capabilities. The perfSONAR Monitoring Project was established to facilitate development and deployment of a common monitoring infrastructure across multiple network management domains. Fermilab has deployed perfSONAR across its E2E circuit infrastructure and enhanced the product with several tools that ease the monitoring and management of those circuits. This paper will present the current state of perfSONAR monitoring at Fermilab and detail our experiences using perfSONAR to manage our current E2E circuit infrastructure. We will describe how production network circuits are monitored by perfSONAR E2E Monitoring Points (MPs), and the benefits it has brought to production US CMS networking support

  11. Deploying perfSONAR-based End-2-End monitoring for production US CMS networking

    Energy Technology Data Exchange (ETDEWEB)

    Grigoriev, Maxim; Bobyshev, Andrey; Crawford, Matt; DeMar, Phil; Grigaliunas, Vyto; Petravick, Don; /Fermilab

    2007-09-01

    Fermilab is the US Tier-1 Center for CMS data storage and analysis. End-2-End (E2E) circuits are utilized to support high impact data movement into and out of the Tier-1 Center. E2E circuits have been implemented to facilitate the movement of raw experiment data from the Tier-0 Center at CERN, as well as processed data to a number of the US Tier-2 sites. Troubleshooting and monitoring of those circuits presents a significant challenge, since the circuits typically cross multiple research & education networks, each with its own management domain and customized monitoring capabilities. The perfSONAR Monitoring Project was established to facilitate development and deployment of a common monitoring infrastructure across multiple network management domains. Fermilab has deployed perfSONAR across its E2E circuit infrastructure and enhanced the product with several tools that ease the monitoring and management of those circuits. This paper will present the current state of perfSONAR monitoring at Fermilab and detail our experiences using perfSONAR to manage our current E2E circuit infrastructure. We will describe how production network circuits are monitored by perfSONAR E2E Monitoring Points (MPs), and the benefits it has brought to production US CMS networking support.

  12. Mobility Responsive Node Deployment and Tree Construction Framework for ZIGBEE Wireless Networks

    Directory of Open Access Journals (Sweden)

    Prinslin.L

    2014-01-01

    Full Text Available ZigBee is a wireless communication technology which provides self-organized, multi-hop and reliable networking facility with long battery lifetime. ZigBee standards have been developed to provide simple, low cost and battery efficient wireless devices. ZigBee operates on top of the IEEE 802.15.4 Medium Access Control (MAC and physical layer wireless standards to provide network, security and application support services. ZigBee provides wireless networking between low power devices, aimed to reduce the energy consumption and delay. ZigBee technology is deployed in numerous applications such as home based healthcare, medical monitoring and consumer electronics. Data delivery failures occur in ZigBee wireless network due to mobility. Mobility is part of ZigBee vision and it is difficult to provide to/from connections to mobile devices. So, to locate the displaced mobile end devices, the Broadcasting method is used to lessen the effects of mobility. But it consumes large amount of resources in terms of bandwidth and power consumption. Recently Mobility Responsive ZigBee Tree Construction (MRZTC framework is proposed to avoid such resource consumption and provides efficient data transmission between coordinator and mobile end devices. Data delivery ratio is increased efficiently during downlink communication i.e. between coordinator and mobile end device by using deployment framework, rather than using conventional route reconstruction method.

  13. Wireless body area networks technology, implementation, and applications

    CERN Document Server

    Yuce, Mehmet R

    2011-01-01

    The book provides a comprehensive overview for the latest WBAN systems, technologies, and applications. The chapters of the book have been written by various specialists who are experts in their areas of research and practice. The book starts with the basic techniques involved in designing and building WBAN systems. It explains the deployment issues and then moves into the application areas of WBAN. The remaining chapters focus on the development of hardware, signal processing algorithms, and wireless communication and network design for wearable and implantable body sensors used in WBAN appli

  14. Network-based Parallel Retrieval Onboard Computing Environment for Sensor Systems Deployed on NASA Unmanned Aircraft Systems Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Remote Sensing Solutions proposes to develop the Network-based Parallel Retrieval Onboard Computing Environment for Sensor Systems (nPROCESS) for deployment on...

  15. Low Maintenance Wireless Network Architecture and Strategies For Mitigating Challenges In Implementing Wireless Networks and Wireless Sensor Networks in Dense Forests and Rural Areas

    OpenAIRE

    Samrat Pravin Patel; Sumeet S. Deshmukh; Anil R. Rajbhar

    2013-01-01

    An innovative ,cost effective and eco friendly approach for the implementation of wide area wireless network coverage forsurveillance, remote wireless sensing , monitoring and other usage in dense forest and rural areas in developing countries like India andAfrica .The paper gives an simplified layout for the network implementation for bridging the digital divide and the knowledge flowbetween the urban areas and the remote locations where telecom companies cannot reach easily or deploy networ...

  16. Demonstration of UAV deployment and control of mobile wireless sensing networks for modal analysis of structures

    Science.gov (United States)

    Zhou, Hao; Hirose, Mitsuhito; Greenwood, William; Xiao, Yong; Lynch, Jerome; Zekkos, Dimitrios; Kamat, Vineet

    2016-04-01

    Unmanned aerial vehicles (UAVs) can serve as a powerful mobile sensing platform for assessing the health of civil infrastructure systems. To date, the majority of their uses have been dedicated to vision and laser-based spatial imaging using on-board cameras and LiDAR units, respectively. Comparatively less work has focused on integration of other sensing modalities relevant to structural monitoring applications. The overarching goal of this study is to explore the ability for UAVs to deploy a network of wireless sensors on structures for controlled vibration testing. The study develops a UAV platform with an integrated robotic gripper that can be used to install wireless sensors in structures, drop a heavy weight for the introduction of impact loads, and to uninstall wireless sensors for reinstallation elsewhere. A pose estimation algorithm is embedded in the UAV to estimate the location of the UAV during sensor placement and impact load introduction. The Martlet wireless sensor network architecture is integrated with the UAV to provide the UAV a mobile sensing capability. The UAV is programmed to command field deployed Martlets, aggregate and temporarily store data from the wireless sensor network, and to communicate data to a fixed base station on site. This study demonstrates the integrated UAV system using a simply supported beam in the lab with Martlet wireless sensors placed by the UAV and impact load testing performed. The study verifies the feasibility of the integrated UAV-wireless monitoring system architecture with accurate modal characteristics of the beam estimated by modal analysis.

  17. Advanced Algorithm for Optimizing the Deployment Cost of Passive Optical Networks

    Directory of Open Access Journals (Sweden)

    Pavel Lafata

    2013-01-01

    Full Text Available The deployment of passive optical networks (PONs is slow today, especially in Europe, because completely new optical infrastructures are necessary to be installed in the last-mile segments of access networks, which is always very expensive process. One of the possibilities is to design economically effective topologies and to optimize the deployment cost. This article describes the method leading to evaluate an algorithm for designing suboptimal economic solutions and topologies for PONs by focusing on optimization of constructional length of distribution networks. While the typical PON topologies are star topologies or tree-star topologies, the first part of this article introduces new sub algorithm for estimating the minimum star topology. The next section brings the evaluation of two sub algorithms for solving minimum constructional length problems. Finally, all these parts will be merged into a complex algorithm by using clusterization technique to solve optimum topologies. However, the current version of presented algorithm is purely based on mathematical theories and was implemented in Matlab environment. Therefore, it is able to design only theoretical optimum topologies without taking external conditions and real limitations into account. These real conditions will be further implemented in the future, so the algorithm could be also used for practical applications.

  18. A Combined Localization and Geographic Routing Algorithm for Rapidly-Deployed Wireless Sensor Networks

    OpenAIRE

    Hui Qu; Wicker, Stephen B.

    2008-01-01

    We consider a network of randomly-deployed, low-cost sensors and a single powerful sink node. A partition-based localization algorithm is proposed in which the sink node imparts sector-based location information through the phased-array transmission of a series of beacons. One-hop neighbor information is used by each sensor in a series of sector-partitioning routines to identify the sub-sector in which it resides. A geographic routing algorithm is then proposed which uses the sector-based loc...

  19. Deploying SIP-based Mobile Exam Application onto Next Generation Network testbed

    CERN Document Server

    Barnawi, Ahmed; Emran, Muhammad; Khan, Asif Irshad; 10.1109/SIECPC.2011.5876936

    2012-01-01

    Over the past few years, mobile operators are faced with enormous challenges. Of such challenges, evolved user demands on personalized applications. Telecommunications industry as well as research community have paid enormous attention to Next Generation Networks (NGN) to address this challenge. NGN is perceived as a sophisticated platform where both application developers and mobile operators cooperate to develop user applications with enhanced quality of experience. The objective of this paper is twofold: first we present an introduction to state-of-the-art NGN testbed to be developed at KAU, and second we provide initial analysis for deploying a mobile application on top of the testbed.

  20. Deploying a simple voice over IP network using a simulation tool

    OpenAIRE

    Limbu, Prajil

    2016-01-01

    Voice over IP is a major advancement in the field of IP communications systems technology since the advent of Internet. It is a communication technology which enables a device to transmit and receive voice traffic with the help of an IP-based network such as the Internet. Various types and deployments of Voice over IP are prevailing due to its popularity since its origin. Since its advent, it has managed to evolve and has given a platform to be benefited with its numerous advantages not only ...

  1. RBNB DataTurbine streaming data middleware deployment for global lake ecological observatory network sites

    Science.gov (United States)

    Tilak, S.; Arzberger, P.; Blenckner, T.; Fountain, T.; Hansen, P.; Kratz, T.; Pierson, D.; Winslow, L.

    2007-12-01

    cyberinfrastructure challenges in a principled manner, we deployed RBNB DataTurbine - an open-source streaming data middleware system. More specifically, RBNB DataTurbine was deployed to perform sensor data acquisition, transport, and dissemination in a scalable and reliable fashion. All legacy data was input into the database designed for use by GLEON sites and the RBNB-based deployment was set up so that real-time data is automatically written into the database. This allowed local researchers not only to use and adapt RBNB DataTurbine for their site, but also enabled them to join the global GLEON community thereby giving them access to international data. In this poster, we discuss the set up at the Lake Erken site (including details on sensors and communication network etc.) followed by description of their traditional data acquisition methodology. We then give a detailed description of our RBNB DataTurbine deployment at Lake Erken.

  2. Use of positioning information for performance enhancement of uncoordinated heterogeneous network deployment

    DEFF Research Database (Denmark)

    Semov, Plamen T.; Mihovska, Albena D.; Prasad, Ramjee;

    2013-01-01

    This paper proposes a novel algorithm for dynamic physical resource allocation based on the use of positioning information during carrier aggregation (CA) in a semi-and uncoordinated deployment of heterogeneous networks (HetNet). The algorithm uses the known Q-learning method enhanced with...... information but the locations of the mobile users and neighboring cells to solve the problem of dynamic physical resource assignment in uncoordinated scenario while accounting for improved allocation and scheduling. The results are compared to the performance when known scheduling algorithms are employed and...... show increased cell throughput, while maintaining an adequate user throughput when employing Q-learning with positioning information....

  3. 77 FR 43567 - Medical Area Body Network

    Science.gov (United States)

    2012-07-25

    ... Rulemaking Proceedings, 63 FR 24121 (1998). Electronic Filers: Comments may be filed electronically using the... COMMISSION 47 CFR Parts 2 and 95 Medical Area Body Network AGENCY: Federal Communications Commission. ACTION... Medical Body Area Network (``MBAN'') coordinator(s) for the 2360-2390 MHz band. Although the ]...

  4. Local AREA networks in advanced nuclear reactors

    International Nuclear Information System (INIS)

    The report assesses Local Area Network Communications with a view to their application in advanced nuclear reactor control and protection systems. Attention is focussed on commercially available techniques and systems for achieving the high reliability and availability required. A basis for evaluating network characteristics in terms of broadband or baseband type, medium, topology, node structure and access method is established. The reliability and availability of networks is then discussed. Several commercial networks are briefly assessed and a distinction made between general purpose networks and those suitable for process control. The communications requirements of nuclear reactor control and protection systems are compared with the facilities provided by current technology

  5. Protecting information on local area networks

    CERN Document Server

    Schweitzer, James A

    1988-01-01

    Protecting Information on Local Area Networks presents the various types of networks and explains why they are being expanded at such a rapid pace. This book considers how management can gain control of the valuable network-services information resources generally available.Organized into three parts encompassing seven chapters, this book begins with an overview of the various networks and their operations. This text then discusses the appropriate management actions to ensure some control over the use of networks and the business information resource. Other chapters consider the management rat

  6. Pervasive surveillance-agent system based on wireless sensor networks: design and deployment

    International Nuclear Information System (INIS)

    Nowadays, proliferation of embedded systems is enhancing the possibilities of gathering information by using wireless sensor networks (WSNs). Flexibility and ease of installation make these kinds of pervasive networks suitable for security and surveillance environments. Moreover, the risk for humans to be exposed to these functions is minimized when using these networks. In this paper, a virtual perimeter surveillance agent, which has been designed to detect any person crossing an invisible barrier around a marked perimeter and send an alarm notification to the security staff, is presented. This agent works in a state of 'low power consumption' until there is a crossing on the perimeter. In our approach, the 'intelligence' of the agent has been distributed by using mobile nodes in order to discern the cause of the event of presence. This feature contributes to saving both processing resources and power consumption since the required code that detects presence is the only system installed. The research work described in this paper illustrates our experience in the development of a surveillance system using WNSs for a practical application as well as its evaluation in real-world deployments. This mechanism plays an important role in providing confidence in ensuring safety to our environment

  7. Pervasive surveillance-agent system based on wireless sensor networks: design and deployment

    Science.gov (United States)

    Martínez, José F.; Bravo, Sury; García, Ana B.; Corredor, Iván; Familiar, Miguel S.; López, Lourdes; Hernández, Vicente; Da Silva, Antonio

    2010-12-01

    Nowadays, proliferation of embedded systems is enhancing the possibilities of gathering information by using wireless sensor networks (WSNs). Flexibility and ease of installation make these kinds of pervasive networks suitable for security and surveillance environments. Moreover, the risk for humans to be exposed to these functions is minimized when using these networks. In this paper, a virtual perimeter surveillance agent, which has been designed to detect any person crossing an invisible barrier around a marked perimeter and send an alarm notification to the security staff, is presented. This agent works in a state of 'low power consumption' until there is a crossing on the perimeter. In our approach, the 'intelligence' of the agent has been distributed by using mobile nodes in order to discern the cause of the event of presence. This feature contributes to saving both processing resources and power consumption since the required code that detects presence is the only system installed. The research work described in this paper illustrates our experience in the development of a surveillance system using WNSs for a practical application as well as its evaluation in real-world deployments. This mechanism plays an important role in providing confidence in ensuring safety to our environment.

  8. Deployment of Low-Cost, Carbon Dioxide Sensors throughout the Washington Metropolitan Area - The Capital Climate Initiative

    Science.gov (United States)

    Caine, Kristen M.; Bailey, D. Michelle; Houston Miller, J.

    2016-04-01

    According to the IPCC from 1995 to 2005, atmospheric carbon dioxide (CO2) concentrations increased by 19 ppm, the highest average growth rate recorded for any decade since measurements began in the 1950s. Due to its ability to influence global climate change, it is imperative to continually monitor carbon dioxide emission levels, particularly in urban areas where some estimate in excess of 75% of total greenhouse gas emissions occur. Although high-precision sensors are commercially available, these are not cost effective for mapping a large spatial area. A goal of this research is to build out a network of sensors that are accurate and precise enough to provide a valuable data tool for accessing carbon emissions from a large, urban area. This publically available greenhouse gas dataset can be used in numerous environmental assessments and as validation for remote sensing products. It will also be a valuable teaching tool for classes at our university and will promote further engagement of K-12 students and their teachers through education and outreach activities. Each of our sensors (referred to as "PiOxides") utilizes a non-dispersive infrared (NDIR) sensor for the detection of carbon dioxide along with a combination pressure/temperature/humidity sensor. The collection of pressure and temperature increases the accuracy and precision of the CO2 measurement. The sensors communicate using a serial interfaces with a Raspberry Pi microcontroller. Each PiOxide is connected to a website that leverages recent developments in open source GIS tools. In this way, data from individual sensors can be followed individually or aggregated to provide real-time, spatially-resolved data of CO2 trends across a broad area. Our goal for the network is to expand across the entire DC/Maryland/Virginia Region through partnerships with private and public schools. We are also designing GHG Bluetooth beacons that may be accessed by mobile phone users in their vicinity. In two additional

  9. A hybrid 802.16/802.11 network architecture for a United States coastal area network

    Science.gov (United States)

    Burbank, Jack L.; Kasch, William T.; Andrusenko, Julia; Haberman, Brian K.; Nichols, Robert; Zheng, Harold

    2007-04-01

    This paper presents a concept for a United States Coastal Area Network (U-SCAN) that is comprised of IEEE 802.11, 802.16, and satellite communications technologies. The Office of Naval Research (ONR) on behalf of the National Oceanographic Partnership Program (NOPP) has tasked The Johns Hopkins University Applied Physics Laboratory (JHU/APL) to perform an architectural study into the establishment of a United States Coastal Area Network (U-SCAN). The goal of this study is to define a wireless network architecture that can be deployed to enable contiguous coastal area network coverage for scientific, commercial, and homeland security (e.g. Coast Guard) applications within the United States Exclusive Economic Zone (EEZ), in a manner that is flexible, manageable, and affordable. The JHU/APL study will ultimately provide recommendations to NOPP regarding potential network architectures and technologies that could provide the desired capability, with a particular focus on commercial (both existing and emerging) technologies. This paper presents the envisioned U-SCAN architecture, and presents the envisioned technical capabilities and shortcomings of the component candidate technologies.

  10. Alcohol use in a military population deployed in combat areas: a cross sectional study

    Directory of Open Access Journals (Sweden)

    Hanwella Raveen

    2012-06-01

    Full Text Available Abstract Background Alcohol misuse is more prevalent among military populations. Association between PTSD and heavy drinking have been reported in many studies. Most of the studies on alcohol use among military personnel are from US and UK. Aim of this study is to describe alcohol consumption patterns among military personnel in Sri Lanka, a country where the alcohol consumption among the general population are very different to that in US and UK. Methods Cross sectional study consisting of representative samples of Sri Lanka Navy Special Forces and regular forces deployed in combat areas continuously during a one year period was carried out. Data was collected using a self report questionnaire. Alcohol Use Disorder Identification Test (AUDIT was used to assess alcohol consumption. Results Sample consisted of 259 Special Forces and 412 regular navy personnel. The median AUDIT score was 2.0 (interquartile range 6.0. Prevalence of current drinking was 71.2 %. Of the current users 54.81 % were infrequent users (frequency ≤ once a month while 37.87 % of users consumed 2–4 times a month. Prevalence of hazardous drinking (AUDIT ≥ 8 was 16.69 % and binge drinking 14.01 %. Five (0.75 % had AUDIT total ≥20. There was no significant difference between Special Forces and regular forces in hazardous drinking or binge drinking. Total AUDIT score ≥16 were associated with difficulty performing work. Conclusions High rates of hazardous drinking and binge drinking described among military personnel in US and UK were not seen among SLN personnel deployed in combat areas. This finding contrasts with previously reported association between combat exposure and hazardous alcohol use among military personnel. Alcohol use among military personnel may be significantly influenced by alcohol consumption patterns among the general population, access to alcohol and attitudes about alcohol use. Similar to findings from other countries, heavy

  11. Convergecast in Wireless Body Area Networks

    OpenAIRE

    Badreddine, Wafa; Khernane, Nesrine; Potop-Butucaru, Maria; Chaudet, Claude

    2015-01-01

    —Wireless Body Area Networks (WBAN) is a recent challenging area in the domain of health monitoring. There are several concerns in this area ranging from energy efficient communication to designing delays efficient protocols that support nodes dynamicity induced by human body mobility. This paper focuses on the convergecast or data gathering protocols in WBAN. Our contribution is twofold. First, we extensively analyze the impact of postural body mobility on various classes of multi-hop conver...

  12. Wireless sensor network deployment for monitoring soil moisture dynamics at the field scale

    Science.gov (United States)

    Majone, B.; Bellin, A.; Filippi, E.; Ioriatti, L.; Martinelli, M.; Massa, A.; Toller, G.

    2009-12-01

    We describe a recent deployment of soil moisture and temperature sensors in an apple tree orchard aimed at exploring the interaction between soil moisture dynamics and plant physiology. The field is divided into three parcels with different constant irrigation rates. The deployment includes dendrometers which monitor the variations of the trunk diameter. The idea is to monitor continuously and at small time steps soil moisture dynamics, soil temperature and a parameter reflecting plant stress at the parcel scale, in order to better investigate the interaction between plant physiology and soil moisture dynamics. Other sensors monitoring plant physiology can be easily accommodated within the Wireless Sensor Network (WSN). The experimental site is an apple orchard of 5000 m2 located at Cles, province of Trento, Italy, at the elevation of 640 m.a.s.l. In this site about 1200 apple trees are cultivated (cultivar Golden Delicious). The trees have been planted in 2004 in north-south rows 3.5 m apart. The deployment consists of 27 locations connected by a multi hop WSN, each one equipped with 5 soil moisture sensors (capacitance sensors EC-5, decagon Service) at the depths of 10, 20, 30, 50 and 80 cm, and a temperature sensor at the depth of 20 cm, for a total of 135 soil moisture and 27 temperature sensors. The proposed monitoring system is based on totally autonomous sensor nodes which allow both real time and historic data management. The data gathered are then organized in a database on a public web site. The node sensors are connected through an input/output interface to a WSN platform. The power supply consists of a solar panel able to provide 250 mA at 7 V and a 3V DC/DC converter based on a dual frequency high efficient switching regulator. The typical meteorological data are monitored with a weather station located at a distance of approximately 100 m from the experimental site. Great care has been posed to calibration of the capacitance sensors both in the

  13. Dedicated Carrier Deployment in Heterogeneous Networks with Inter-site Carrier Aggregation

    DEFF Research Database (Denmark)

    Wang, Hua; Rosa, Claudio; Pedersen, Klaus I.

    picos with dedicated carrier deployment. Collaborative inter-site carrier aggregation (CA) is proposed in scenarios with macro+RRH deployment to make an efficient use of the fragmented spectrum from multiple cells. While in scenarios with macro+pico deployment, UEs can only connect to either the...

  14. The Deployment of Carbon Monoxide Wireless Sensor Network (CO-WSN for Ambient Air Monitoring

    Directory of Open Access Journals (Sweden)

    Chaichana Chaiwatpongsakorn

    2014-06-01

    Full Text Available Wireless sensor networks are becoming increasingly important as an alternative solution for environment monitoring because they can reduce cost and complexity. Also, they can improve reliability and data availability in places where traditional monitoring methods are difficult to site. In this study, a carbon monoxide wireless sensor network (CO-WSN was developed to measure carbon monoxide concentrations at a major traffic intersection near the University of Cincinnati main campus. The system has been deployed over two weeks during Fall 2010, and Summer 2011–2012, traffic data was also recorded by using a manual traffic counter and a video camcorder to characterize vehicles at the intersection 24 h, particularly, during the morning and evening peak hour periods. According to the field test results, the 1 hr-average CO concentrations were found to range from 0.1–1.0 ppm which is lower than the National Ambient Air Quality Standards (NAAQS 35 ppm on a one-hour averaging period. During rush hour periods, the traffic volume at the intersection varied from 2,067 to 3,076 vehicles per hour with 97% being passenger vehicles. Furthermore, the traffic volume based on a 1-h average showed good correlation (R2 = 0.87 with the 1-h average CO-WSN concentrations for morning and evening peak time periods whereas CO-WSN results provided a moderate correlation (R2 = 0.42 with 24 hours traffic volume due to fluctuated changes of meteorological conditions. It is concluded that the performance and the reliability of wireless ambient air monitoring networks can be used as an alternative method for real time air monitoring.

  15. The deployment of carbon monoxide wireless sensor network (CO-WSN) for ambient air monitoring.

    Science.gov (United States)

    Chaiwatpongsakorn, Chaichana; Lu, Mingming; Keener, Tim C; Khang, Soon-Jai

    2014-06-01

    Wireless sensor networks are becoming increasingly important as an alternative solution for environment monitoring because they can reduce cost and complexity. Also, they can improve reliability and data availability in places where traditional monitoring methods are difficult to site. In this study, a carbon monoxide wireless sensor network (CO-WSN) was developed to measure carbon monoxide concentrations at a major traffic intersection near the University of Cincinnati main campus. The system has been deployed over two weeks during Fall 2010, and Summer 2011-2012, traffic data was also recorded by using a manual traffic counter and a video camcorder to characterize vehicles at the intersection 24 h, particularly, during the morning and evening peak hour periods. According to the field test results, the 1 hr-average CO concentrations were found to range from 0.1-1.0 ppm which is lower than the National Ambient Air Quality Standards (NAAQS) 35 ppm on a one-hour averaging period. During rush hour periods, the traffic volume at the intersection varied from 2,067 to 3,076 vehicles per hour with 97% being passenger vehicles. Furthermore, the traffic volume based on a 1-h average showed good correlation (R2 = 0.87) with the 1-h average CO-WSN concentrations for morning and evening peak time periods whereas CO-WSN results provided a moderate correlation (R2 = 0.42) with 24 hours traffic volume due to fluctuated changes of meteorological conditions. It is concluded that the performance and the reliability of wireless ambient air monitoring networks can be used as an alternative method for real time air monitoring. PMID:24937527

  16. The Security of Wireless Local Area Network

    Institute of Scientific and Technical Information of China (English)

    林楠; 李翠霞

    2007-01-01

    The Wireless Local Area Network (WLAN) is a new and developing technology and the security problem is always important in all networks; therefore, the security problems will be discussed in this article. The article firstly introduces the history of development of IEEE 802.11 and provides an overview of the Wireless LAN. The architecture of WLAN will be referred in next. Finally, the further of the wireless LAN will be prospected by this article.

  17. Scatter search based met heuristic for robust optimization of the deploying of "DWDM" technology on optical networks with survivability

    Directory of Open Access Journals (Sweden)

    Moreno-Pérez José A.

    2005-01-01

    Full Text Available In this paper we discuss the application of a met heuristic approach based on the Scatter Search to deal with robust optimization of the planning problem in the deploying of the Dense Wavelength Division Multiplexing (DWDM technology on an existing optical fiber network taking into account, in addition to the forecasted demands, the uncertainty in the survivability requirements.

  18. Enhanced Deployment Strategy for Role-Based Hierarchical Application Agents in Wireless Sensor Networks with Established Clusterheads

    Science.gov (United States)

    Gendreau, Audrey

    2014-01-01

    Efficient self-organizing virtual clusterheads that supervise data collection based on their wireless connectivity, risk, and overhead costs, are an important element of Wireless Sensor Networks (WSNs). This function is especially critical during deployment when system resources are allocated to a subsequent application. In the presented research,…

  19. Field and long-term demonstration of a wide area quantum key distribution network.

    Science.gov (United States)

    Wang, Shuang; Chen, Wei; Yin, Zhen-Qiang; Li, Hong-Wei; He, De-Yong; Li, Yu-Hu; Zhou, Zheng; Song, Xiao-Tian; Li, Fang-Yi; Wang, Dong; Chen, Hua; Han, Yun-Guang; Huang, Jing-Zheng; Guo, Jun-Fu; Hao, Peng-Lei; Li, Mo; Zhang, Chun-Mei; Liu, Dong; Liang, Wen-Ye; Miao, Chun-Hua; Wu, Ping; Guo, Guang-Can; Han, Zheng-Fu

    2014-09-01

    A wide area quantum key distribution (QKD) network deployed on communication infrastructures provided by China Mobile Ltd. is demonstrated. Three cities and two metropolitan area QKD networks were linked up to form the Hefei-Chaohu-Wuhu wide area QKD network with over 150 kilometers coverage area, in which Hefei metropolitan area QKD network was a typical full-mesh core network to offer all-to-all interconnections, and Wuhu metropolitan area QKD network was a representative quantum access network with point-to-multipoint configuration. The whole wide area QKD network ran for more than 5000 hours, from 21 December 2011 to 19 July 2012, and part of the network stopped until last December. To adapt to the complex and volatile field environment, the Faraday-Michelson QKD system with several stability measures was adopted when we designed QKD devices. Through standardized design of QKD devices, resolution of symmetry problem of QKD devices, and seamless switching in dynamic QKD network, we realized the effective integration between point-to-point QKD techniques and networking schemes. PMID:25321550

  20. EU Armed Forces’ Use of Social Media in Areas of Deployment

    Directory of Open Access Journals (Sweden)

    Maria Hellman

    2016-02-01

    Full Text Available The advent of social media can be seen both as a risk and an opportunity by armed forces. Previous research has primarily examined whether or not the use of social media endangers or strengthens armed forces’ strategic narrative. We examine armed forces’ perceptions of risks and opportunities on a broad basis, with a particular focus on areas of deployment. The article is based on a survey of perceptions of social media amongst the armed forces of EU member states, thus adding to previous research through its comparative perspective. Whereas previous research has mainly focused on larger powers, such as the US and the UK, this article includes the views of the armed forces of 26 EU states, including several smaller nations. In analyzing the results we asked whether or not risk and opportunity perceptions were related to national ICT maturity and the existence of a social media strategy. The analysis shows that perceptions of opportunities outweigh perceptions of risks, with marketing and two-way communication as the two most prominent opportunities offered by the use of social media. Also, armed forces in countries with a moderate to high ICT maturity emphasize social media as a good way for marketing purposes.

  1. Frequency of gingival and periodontal diseases among troops deployed in operational area

    International Nuclear Information System (INIS)

    Objective: To find the Frequency of Gingival and Periodontal Diseases among Troops Deployed in Operational Area and to evaluate the treatment needs which might be helpful in oral health policy planning and specific intervention against periodontal disease. Design: Descriptive study. Place and Duration of Study: The study was conducted at 140 mobile dental unit Swat from Dec 2009 to June 2011. Subjects and Methods: the periodontal status of 1500 personnels of Pakistan Army was examined using Basic periodontal Examination Index. Data was evaluated by SPSS version 16. Percentage of various gingival and periodontal disease traits was calculated and treatment needs determined. Results: Out of total 1500 subjects 12.8% subjects were having satisfactory periodontal health and required no treatment whereas 38.3% were having gingivitis requiring oral hygiene instruction and prophylaxis. Gingivitis modified by local factors was seen in 23.5% and required oral hygiene instruction and correction of modifying factors. Some (13.6%) were having mild periodontitis and required scaling, root planning and oral hygiene instruction whereas 11.8% were having moderate or advance periodontitis and required comprehensive periodontal treatment including surgical treatment. Conclusion: A large number of cases (82.7%) of gingivitis and periodontitis were detected in subject population which shows lack of awareness and self -consciousness among troops regarding their oral hygiene. (author)

  2. The M 7.7 Tocopilla earthquake and its aftershock sequence: deployment of a Task Force local network

    Science.gov (United States)

    Sobiesiak, M.; Eggert, S.; Woith, H.; Grosser, H.; Peyrat, S.; Vilotte, J.; Medina, E.; Ruch, J.; Walter, T.; Victor, P.; Barrientos, S.; Gonzalez, G.

    2008-05-01

    After the November 14, 2007 Tocopilla earthquake in northern Chile, a local network of 20 short period seismic stations, 5 strong motion instruments, 6 GPS stations and 3 extensometers has been installed in the fault plane area between Tocopilla and Antofagasta by the German Task Force for earthquakes (GFZ Potsdam). The hydrogeology group of the TF sampled 20 thermal water sources in the area of the El Tatio geyser field, located about 170 km E of the epicentre. In collaboration with the IPG Paris, 4 broad band stations were deployed at the northern end of the fault plane between Tocopilla and Maria Elena. Major targets of the investigations of the aftershock sequence are the segment boundary between the 1995 Antofagasta earthquake and the recent Tocopilla event, stress transfer between both successively ruptured subduction zone segments, structural properties of the fault plane, possible consequences for the northern adjacent Iquique segment, and the influence of earthquake seismic waves on the El Tatio hydrothermal field. In our presentation we would like to show first results on the spatial distribution of the aftershocks and discuss these in relation to studies we have made on the Antofagasta aftershock sequence.

  3. Research on Monitoring Area Division of Quality Grade Changes in County Cultivated Land and Technology of Deploying Monitoring Point

    OpenAIRE

    Wei, Wei; Liao, Lijun; Yu, Jianxin

    2013-01-01

    It is an important means in management of improving both the quality and quantity of cultivated land to monitor grade changes in cultivated land quality. How to deploy monitoring network system and its point reasonably and roundly are the key to the technology of monitoring grade changes in cultivated land quality by monitoring grade changes in cultivated land quality dynamically in order to obtain the information to the index of cultivated land quality and its changes based on the existing a...

  4. Deep fiber networks: new ready-to-deploy architectures yield technical and economic benefits

    Science.gov (United States)

    Sipes, Donald L., Jr.; Loveless, Robert

    2001-07-01

    The advent of digital technology in HFC networks has opened up a myriad of opportunities for MSOs. The introduction of these advanced services comes at a cost: namely, the need for increased capacity; and especially increased reusable bandwidth. In HFC networks all services are ostensibly broadcast: the prime difference between services being the footprint over which these services are broadcast. Channel lineups for broadcast video services typically cover the largest are. Advertising zones are typically second, usually on the order of a typical 20K home hub. For initial penetrations for high speed data services such as cable modems, a typical hub site will be divided into several sectors using a single 6 MHz channel. Telephony services are broadcast over the smallest area, typically a 6 MHz channel for each node. Naturally as penetration of these services increase, the broadcast area for each will also decrease.

  5. Field and long-term demonstration of a wide area quantum key distribution network

    CERN Document Server

    Wang, Shuang; Yin, Zhen-Qiang; Li, Hong-Wei; He, De-Yong; Li, Yu-Hu; Zhou, Zheng; Song, Xiao-Tian; Li, Fang-Yi; Wang, Dong; Chen, Hua; Han, Yun-Guang; Huang, Jing-Zheng; Guo, Jun-Fu; Hao, Peng-Lei; Li, Mo; Zhang, Chun-Mei; Liu, Dong; Liang, Wen-Ye; Miao, Chun-Hua; Wu, Ping; Guo, Guang-Can; Han, Zheng-Fu

    2014-01-01

    A wide area quantum key distribution (QKD) network deployed on communication infrastructures provided by China Mobile Ltd. is demonstrated. Three cities and two metropolitan area QKD networks were linked up to form the Hefei-Chaohu-Wuhu wide area QKD network with over 150 kilometers coverage area, in which Hefei metropolitan area QKD network was a typical full-mesh core network to offer all-to-all interconnections, and Wuhu metropolitan area QKD network was a representative quantum access network with point-to-multipoint configuration. The whole wide area QKD network ran for more than 5000 hours, from 21 December 2011 to 19 July 2012, and part of the network stopped until last December. To adapt to the complex and volatile field environment, the Faraday-Michelson QKD system with several stability measures was adopted when we designed QKD devices. Through standardized design of QKD devices, resolution of symmetry problem of QKD devices, and seamless switching in dynamic QKD network, we realized the effective i...

  6. 78 FR 78769 - Medical Body Area Networks

    Science.gov (United States)

    2013-12-27

    ...), 95.1217(a)(3), 95.1223 and 95.1225 published at 78 FR 55715, September 11, 2012 are effective... First Report and Order, FCC 12-54, published at 78 FR 55715, September 11, 2012. The OMB Control Number... COMMISSION 47 CFR Part 95 Medical Body Area Networks AGENCY: Federal Communications Commission. ACTION:...

  7. Wireless local area network. A new technology of network

    International Nuclear Information System (INIS)

    This paper introduces Wireless Local Area Network (WLAN), including the concept, history, characters and the foreground of its development, it also narrates in detail the several key techniques used to implement IEEE802.11 WLAN, and ideas on key technology of future progress in wireless LAN field have also been presented. (authors)

  8. 47 CFR 54.518 - Support for wide area networks.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Support for wide area networks. 54.518 Section... area networks. To the extent that states, schools, or libraries build or purchase a wide area network to provide telecommunications services, the cost of such wide area networks shall not be eligible...

  9. IPRAN 承载网 LTE 业务的业务部署%IPRAN Bearer network LTE service deployment

    Institute of Scientific and Technical Information of China (English)

    2013-01-01

    LTE (Long Term Evolution)as a long-term evolution of 3G system application,this year has been extensively around the world,and in the LTE process,operators pay more and more attention to network construction.Bearer network deployment must consider how to make full use of the existing cyber source, the function deployment,network capacity,traffic safety,maintainability and meet the LTE business development,and reduce the cost of network technology development,adaptation of 2G/3G/LTE collaborative development.This paper takes IPRAN bearer network(IP Radio Access Network)as an example,the IPRAN bearer network LTE service deployment.%  LTE(Long Term Evolution)作为3G 系统的长期演进,今年来在世界各地得到了广泛的应用发展,而在推进 LTE 的进程中,运营商越来越重视承载网的建设。承载网的部署必须考虑如何充分利用现有网络资源,在功能部署、网络容量、业务安全、可维护性等方面满足 LTE 业务发展,并减低网络技术演进代价,适应2G/3G/LTE 协同发展。本文以联通承载网 IPRAN(IP Radio Access Network )方案为例,阐述下 IPRAN 承载网 LTE 业务的业务部署。

  10. Local network deployed around the Kozloduy NPP - a useful tool for seismological monitoring

    Science.gov (United States)

    Solakov, Dimcho; Simeonova, Stela; Dimitrova, Liliya; Slavcheva, Krasimira; Raykova, Plamena; Popova, Maria; Georgiev, Ivan

    2015-04-01

    Radiation risks may transcend national borders, and international cooperation serves to promote and enhance safety globally by exchanging experience and by improving capabilities to control hazards, to prevent accidents, to respond to emergencies and to mitigate any harmful consequences. International safety standards provide support for states in meeting their obligations under general principles of international law, such as those relating to environmental protection. Seismic safety is a key element of NPP safe operation. Safety and security measures have in common the aim of protecting human life and health and the environment. The Kozloduy NPP site is located in the stable part of the Moesian platform (area of about 50000 km2). From seismological point of view the Moesian platform is the most quite area on the territory of Bulgaria. There are neither historical nor instrumental earthquakes with M>4.5 occurred within the platform. The near region (area with radial extent of 30 km) of the NPP site is characterized with very low seismic activity. The strongest recorded quake is the 1987 earthquake МS=3.6, localized 22 km northwest of the Kozloduy NPP site on the territory of Romania. In line with international practice, the geological, geophysical and seismological characteristics of the region around the site have been investigated for the purpose of evaluating the seismic hazards at the NPP site. A local network (LSN) of sensitive seismographs having a recording capability for micro-earthquakes have been installed around Kozloduy NPP and operated since 1997. The operation and data processing, data interpretation, and reporting of the local micro-earthquake network are linked to the national seismic network (NOTSSI). A real-time data transfer from stations to National Data Center (in Sofia) was implemented using the VPN and MAN networks of the Bulgarian Telecommunication. Real-time and interactive data processing are performed by the Seismic Network Data

  11. Investigation on the upgrade of existing 10Gbps metro DWDM networks to 40Gbps based on measured PMD data of deployed fiber in Malaysia

    Science.gov (United States)

    Khairi, K.; Lambak, Z.; Ahmad, A.; Abdul Kadir, M. Z.; Hamzah, Z.; Tarsono, D.; Abd. Manaf, Z.; Mohamad, R.; Abd. Rahman, M. N.; Samsuri, N.; Fong, K. H.

    2011-12-01

    We present analysis of different modulation formats using actual Polarization Mode Dispersion (PMD) data of deployed fiber links in the metro area in Kuala Lumpur, Malaysia. Simulations have been conducted for comparing the performance of Non-Return-to-Zero (NRZ), Return-to-Zero (RZ), Carrier-Suppressed Return-to-Zero (CSRZ), Phase Shaped Binary Transmission (PSBT) and Differential Quadrature Phase Shift Keying (DQPSK) modulation formats for possible future upgrade to 40Gbps from an existing 10Gbps DWDM system. The performance in terms of BER is presented to illustrate the limitations attributed to PMD based on current existing network configurations.

  12. Local-area communication networks - An overview

    International Nuclear Information System (INIS)

    Local-area communication networks represent a new field of activity. In this paper we first describe three scenarios for the use of these networks, and then discuss various technical approaches. Particular emphasis is put on bus and ring systems with various media access control mechanisms. Specifically, we compare the delay-throughput characteristic of two access methods, carrier-sense multiple access with collision detection and token passing, and discuss some significant differences of bus and ring systems concerning wiring, media, transmission, and reliability. (orig.)

  13. RE-ATTEMPT: A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks

    OpenAIRE

    2014-01-01

    Modern health care system is one of the most popular Wireless Body Area Sensor Network (WBASN) applications and a hot area of research subject to present work. In this paper, we present Reliability Enhanced-Adaptive Threshold based Thermal-unaware Energy-efficient Multi-hop ProTocol (RE-ATTEMPT) for WBASNs. The proposed routing protocol uses fixed deployment of wireless sensors (nodes) such that these are placed according to energy levels. Moreover, we use direct communication for the deliver...

  14. A Wireless Sensor Network Deployment for Rural and Forest Fire Detection and Verification

    Science.gov (United States)

    Lloret, Jaime; Garcia, Miguel; Bri, Diana; Sendra, Sandra

    2009-01-01

    Forest and rural fires are one of the main causes of environmental degradation in Mediterranean countries. Existing fire detection systems only focus on detection, but not on the verification of the fire. However, almost all of them are just simulations, and very few implementations can be found. Besides, the systems in the literature lack scalability. In this paper we show all the steps followed to perform the design, research and development of a wireless multisensor network which mixes sensors with IP cameras in a wireless network in order to detect and verify fire in rural and forest areas of Spain. We have studied how many cameras, sensors and access points are needed to cover a rural or forest area, and the scalability of the system. We have developed a multisensor and when it detects a fire, it sends a sensor alarm through the wireless network to a central server. The central server selects the closest wireless cameras to the multisensor, based on a software application, which are rotated to the sensor that raised the alarm, and sends them a message in order to receive real-time images from the zone. The camera lets the fire fighters corroborate the existence of a fire and avoid false alarms. In this paper, we show the test performance given by a test bench formed by four wireless IP cameras in several situations and the energy consumed when they are transmitting. Moreover, we study the energy consumed by each device when the system is set up. The wireless sensor network could be connected to Internet through a gateway and the images of the cameras could be seen from any part of the world. PMID:22291533

  15. A Wireless Sensor Network Deployment for Rural and Forest Fire Detection and Verification

    Directory of Open Access Journals (Sweden)

    Sandra Sendra

    2009-10-01

    Full Text Available Forest and rural fires are one of the main causes of environmental degradation in Mediterranean countries. Existing fire detection systems only focus on detection, but not on the verification of the fire. However, almost all of them are just simulations, and very few implementations can be found. Besides, the systems in the literature lack scalability. In this paper we show all the steps followed to perform the design, research and development of a wireless multisensor network which mixes sensors with IP cameras in a wireless network in order to detect and verify fire in rural and forest areas of Spain. We have studied how many cameras, sensors and access points are needed to cover a rural or forest area, and the scalability of the system. We have developed a multisensor and when it detects a fire, it sends a sensor alarm through the wireless network to a central server. The central server selects the closest wireless cameras to the multisensor, based on a software application, which are rotated to the sensor that raised the alarm, and sends them a message in order to receive real-time images from the zone. The camera lets the fire fighters corroborate the existence of a fire and avoid false alarms. In this paper, we show the test performance given by a test bench formed by four wireless IP cameras in several situations and the energy consumed when they are transmitting. Moreover, we study the energy consumed by each device when the system is set up. The wireless sensor network could be connected to Internet through a gateway and the images of the cameras could be seen from any part of the world.

  16. Collecting and distributing wearable sensor data: an embedded personal area network to local area network gateway server.

    Science.gov (United States)

    Neuhaeuser, Jakob; D'Angelo, Lorenzo T

    2013-01-01

    The goal of the concept and of the device presented in this contribution is to be able to collect sensor data from wearable sensors directly, automatically and wirelessly and to make them available over a wired local area network. Several concepts in e-health and telemedicine make use of portable and wearable sensors to collect movement or activity data. Usually these data are either collected via a wireless personal area network or using a connection to the user's smartphone. However, users might not carry smartphones on them while inside a residential building such as a nursing home or a hospital, but also within their home. Also, in such areas the use of other wireless communication technologies might be limited. The presented system is an embedded server which can be deployed in several rooms in order to ensure live data collection in bigger buildings. Also, the collection of data batches recorded out of range, as soon as a connection is established, is also possible. Both, the system concept and the realization are presented. PMID:24110771

  17. STUDIES TO SUPPORT DEPLOYMENT OF EDIBLE OILS AS THE FINAL CVOC REMEDIATION IN T AREA SUMMARY REPORT

    Energy Technology Data Exchange (ETDEWEB)

    Riha, B; Brian02 Looney, B; Miles Denham, M; Christopher Bagwell, C; Richard Hall, R; Carol Eddy-Dilek, C

    2006-10-31

    The purpose of these studies was to determine the feasibility of using edible oils for remediation of the low but persistent chlorinated solvent (cVOC) groundwater contamination at the SRS T-Area. The following studies were completed: (1) Review of cVOC degradation processes and edible oil delivery for enhanced bioremediation. (2) Column studies to investigate placing neat oil on top of the water table to increase oil saturation and sequestration. (3) Analysis of T-Area groundwater geochemistry to determine the applicability of edible oils for remediation at this site. (4) Microcosm studies to evaluate biotic and abiotic processes for the T-Area groundwater system and evaluation of the existing microbial community with and with out soybean oil amendments. (5) Monitoring of a surrogate vadose zone site undergoing edible oil remediation at the SRS to understand partitioning and biotransformation products of the soybean oil. (6) Design of a delivery system for neat and emulsified edible oil deployment for the T-Area groundwater plume. A corresponding white paper is available for each of the studies listed. This paper provides a summary and overview of the studies completed for the remediation of the T-Area groundwater plume using edible oils. This report begins with a summary of the results and a brief description of the preliminary oil deployment design followed by brief descriptions of T-Area and current groundwater conditions as related to edible oil deployment. This is followed by a review of the remediation processes using edible oils and specific results from modeling, field and laboratory studies. Finally, a description of the preliminary design for full scale oil deployment is presented.

  18. Sub-Balanced Energy Consumption through Engineered Gaussian Deployment Strategies in Corona-Based Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Atiq-Ur-Rahman

    2013-06-01

    Full Text Available Wireless sensor networks (WSNs are getting more widespread use and can be used in a wide range of applications, such as environmental monitoring, smart homes, military surveillance, forests, habitat monitoring, farmlands and precision agriculture. Due to the limited battery power, energy efficiency is the most challenging problem in wireless sensor network. For various applications, it is necessary to deploy sensor node in efficient way to monitor the event precisely, achieve balance energy depletion and extend the network lifetime. In many-to-one traffic pattern, nodes closer to the sink have heavier traffic loads and deplete their energy quickly; this leads to energy holes around the sink. Due to the creation of energy holes, data can no longer be delivered to the sink, although most of sensor nodes have enough residual energy. To overcome the problem of energy hole and achieving sub-balanced energy consumption in corona-based wireless sensor network, engineered Gaussian deployment strategies are proposed. Simulation result shows that the proposed technique maximizes the network lifetime, data delivery, energy consumption and also reducing the chances of energy-hole formation in a network.

  19. Network Coding for Energy Efficiency in Wireless Body Area Networks

    CERN Document Server

    Shi, Xiaomeng; Lucani, Daniel

    2010-01-01

    A network coding scheme for practical implementations of wireless body area networks is presented, with the objective of providing reliability under low-energy constraints. We propose a simple network layer protocol, study the mean energy to complete in-cast transmissions of given packets from the sensors to the base station (BS), and show through numerical examples that this scheme can reduce the overall energy consumption. More specifically, Time Division Multiple Access (TDMA) is used to allocate the wireless channel to individual nodes. Each node linearly combines its data packets before taking turns to send the ensuing mixtures to the BS. An acknowledgement message is broadcasted by the BS after each round of transmissions, indicating the number of coded packets to be transmitted in the next round. We parametrically study the optimal number of coded packets to send, in terms of completion energy, given the packet erasure probabilities, and the energy use for transmitting data packets as well as listening...

  20. The LUSI Seismic Experiment: Deployment of a Seismic Network around LUSI, East Java, Indonesia

    Science.gov (United States)

    Karyono, Karyono; Mazzini, Adriano; Lupi, Matteo; Syafri, Ildrem; Haryanto, Iyan; Masturyono, Masturyono; Hadi, Soffian; Rohadi, Suprianto; Suardi, Iman; Rudiyanto, Ariska; Pranata, Bayu

    2015-04-01

    The spectacular Lusi eruption started in northeast Java, Indonesia the 29 of May 2006 following a M6.3 earthquake striking the island. Initially, several gas and mud eruption sites appeared along the reactivated strike-slip Watukosek fault system and within weeks several villages were submerged by boiling mud. The most prominent eruption site was named Lusi. Lusi is located few kilometres to the NE of the Arjuno-Welirang volcanic complex. Lusi sits upon the Watukosek fault system. From this volcanic complex originates the Watukosek fault system that was reactivated by the M6.3 earthquake in 2006 and is still periodically reactivated by the frequent seismicity. To date Lusi is still active and erupting gas, water, mud and clasts. Gas and water data show that the Lusi plumbing system is connected with the neighbouring Arjuno-Welirang volcanic complex. This makes the Lusi eruption a "sedimentary hosted geothermal system". To verify and characterise the occurrence of seismic activity and how this perturbs the connected Watukosek fault, the Arjuno-Welirang volcanic system and the ongoing Lusi eruption, we deployed 30 seismic stations (short-period and broadband) in this region of the East Java basin. The seismic stations are more densely distributed around LUSI and the Watukosek fault zone that stretches between Lusi and the Arjuno Welirang (AW) complex. Fewer stations are positioned around the volcanic arc. Our study sheds light on the seismic activity along the Watukosek fault system and describes the waveforms associated to the geysering activity of Lusi. The initial network aims to locate small event that may not be captured by the Indonesian Agency for Meteorology, Climatology and Geophysics (BMKG) seismic network and it will be crucial to design the second phase of the seismic experiment that will consist of a local earthquake tomography of the Lusi-Arjuno Welirang region and temporal variations of vp/vs ratios. Such variations will then be ideally related to

  1. WSN中一种改进的节点部署方案%An Improved Scheme of Sensor Deployment in Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    张凯

    2012-01-01

    The sensor deployment is one of the fundamental problems in wireless sensor networks,which affects the sensing area of nodes and the quality of service of information transmission.The existing deployment algorithms require the extra detection and repair the covered holes on the boundary,so the cost of deployment is high and the distribution of nodes is uneven.To solve this problem,this paper proposes an improved scheme of sensor deployment,firstly,the scheme processes the border deployment in order to ensure the complete coverage and connectivity,then the new region is generated based on the new convex polygon generation algorithm,finally,the improved scheme is recursive called in the new region,until the entire sensing area of nodes is completely covered.The theoretical analysis and simulation results show that our scheme is better than the existing deployment schemes in terms of the number of nodes in the deployment and the scalability.%节点部署是无线传感器网络的基本问题之一,关系到网络的感知范围和信息传输服务质量。现有的部署算法需要额外探测和修复边界上的覆盖空洞,从而增加了网络部署的成本而且使得节点分布不均匀。针对这一问题,提出了一种改进的节点部署方案,首先进行边界部署,以保证边界上的完全覆盖和连通;然后在感应区域内生成一个新的凸多边形区域,在此新区域上再递归调用边界部署算法,直到整个感应区域被完全覆盖。理论分析和仿真实验表明,在部署节点个数和可扩展性方面均优于已有的部署方案。

  2. CSMA Local Area Networking under Dynamic Altruism

    OpenAIRE

    Antoniadis, Panayotis; Fdida, Serge; Griffin, Christopher; Jin, Youngmi; Kesidis, George

    2012-01-01

    In this paper, we consider medium access control of local area networks (LANs) under limited-information conditions as befits a distributed system. Rather than assuming "by rule" conformance to a protocol designed to regulate packet-flow rates (e.g., CSMA windowing), we begin with a non-cooperative game framework and build a dynamic altruism term into the net utility. The effects of altruism are analyzed at Nash equilibrium for both the ALOHA and CSMA frameworks in the quasistationary (fictit...

  3. Cloud-assisted Wireless Body Area Networks

    OpenAIRE

    Ullah, Sana; Vasilakos, Athanasios; Chao, Han-Chieh; Suzuki, Junichi

    2014-01-01

    Wireless Body Area Networks (WBANs) have emerged as a promising technology for medical and non-medical applications. WBANs consist of a number of miniaturized, portable, and autonomous sensor nodes that are used for long-term health monitoring of patients. These sensor nodes continuously collect information of patients, which are used for ubiquitous health monitoring. In addition, WBANs may be used for managing catastrophic events and increasing the effectiveness and performance of rescue for...

  4. A Depth-Adjustment Deployment Algorithm Based on Two-Dimensional Convex Hull and Spanning Tree for Underwater Wireless Sensor Networks.

    Science.gov (United States)

    Jiang, Peng; Liu, Shuai; Liu, Jun; Wu, Feng; Zhang, Le

    2016-01-01

    Most of the existing node depth-adjustment deployment algorithms for underwater wireless sensor networks (UWSNs) just consider how to optimize network coverage and connectivity rate. However, these literatures don't discuss full network connectivity, while optimization of network energy efficiency and network reliability are vital topics for UWSN deployment. Therefore, in this study, a depth-adjustment deployment algorithm based on two-dimensional (2D) convex hull and spanning tree (NDACS) for UWSNs is proposed. First, the proposed algorithm uses the geometric characteristics of a 2D convex hull and empty circle to find the optimal location of a sleep node and activate it, minimizes the network coverage overlaps of the 2D plane, and then increases the coverage rate until the first layer coverage threshold is reached. Second, the sink node acts as a root node of all active nodes on the 2D convex hull and then forms a small spanning tree gradually. Finally, the depth-adjustment strategy based on time marker is used to achieve the three-dimensional overall network deployment. Compared with existing depth-adjustment deployment algorithms, the simulation results show that the NDACS algorithm can maintain full network connectivity with high network coverage rate, as well as improved network average node degree, thus increasing network reliability. PMID:27428970

  5. A Depth-Adjustment Deployment Algorithm Based on Two-Dimensional Convex Hull and Spanning Tree for Underwater Wireless Sensor Networks

    Science.gov (United States)

    Jiang, Peng; Liu, Shuai; Liu, Jun; Wu, Feng; Zhang, Le

    2016-01-01

    Most of the existing node depth-adjustment deployment algorithms for underwater wireless sensor networks (UWSNs) just consider how to optimize network coverage and connectivity rate. However, these literatures don’t discuss full network connectivity, while optimization of network energy efficiency and network reliability are vital topics for UWSN deployment. Therefore, in this study, a depth-adjustment deployment algorithm based on two-dimensional (2D) convex hull and spanning tree (NDACS) for UWSNs is proposed. First, the proposed algorithm uses the geometric characteristics of a 2D convex hull and empty circle to find the optimal location of a sleep node and activate it, minimizes the network coverage overlaps of the 2D plane, and then increases the coverage rate until the first layer coverage threshold is reached. Second, the sink node acts as a root node of all active nodes on the 2D convex hull and then forms a small spanning tree gradually. Finally, the depth-adjustment strategy based on time marker is used to achieve the three-dimensional overall network deployment. Compared with existing depth-adjustment deployment algorithms, the simulation results show that the NDACS algorithm can maintain full network connectivity with high network coverage rate, as well as improved network average node degree, thus increasing network reliability. PMID:27428970

  6. Dual Stack Deployment in a Carrier Grade Network to Fulfill the Demands of Next Generation of Internet

    Directory of Open Access Journals (Sweden)

    Tarique Jamil Saifullah Khanzada

    2013-07-01

    Full Text Available The Internet is migrating from IPv4 (Internet Protocol version 4 to IPv6 (Internet Protocol version 6. The high cost of migration services from IPv4-IPv6 and system complexity are main factors for slow adaption of IPv6 This paper presents the implementation of migration techniques from IPv4-IPv6. Furthermore, existing IPv4 addresses have already been depleted in IANA (Internet Assigned Numbers Authority and will be soon exhausted in RIR (Regional Internet Registry while more clients are joining the Internet. Slower rate of the progress of IPv6 confirms complete shifting from IPv4-IPv6 at once is still long away, although fewer parts of IPv6 have been employed in current market goods. Integration of IPv4 and IPv6 is carried in order to take care of online users. In this paper, it is suggested that hierarchical direction finding structural design in IPv4 and IPv6 will improve the efficiency of IPv4 network. This research work provides the way to design the network scenario for the carrier grade set of connections. The carrier grade network scenario routers are named to be Karachi, Sukkur, Islamabad, Multan and Peshawar for the managerial simulation purposes. The carrier grade network deployment is implemented along with dual stack to migrate to IPv6. This study holds the way to deploy IPv4-IPv6 carrier grade network by providing real time scenario which is yet not considered in the literature to the best of our knowledge

  7. Dual stack deployment in a carrier grade network to fulfill the demands of next generation of internet

    International Nuclear Information System (INIS)

    The Internet is migrating from IPv4 (Internet Protocol version 4) to IPv6 (Internet Protocol version 6). The high cost of migration services from IPv4-IPv6 and system complexity are main factors for slow adaption of IPv6 This paper presents the implementation of migration techniques from IPv4-IPv6. Furthermore, existing IPv4 addresses have already been depleted in IANA (Internet Assigned Numbers Authority) and will be soon exhausted in RIR (Regional Internet Registry) while more clients are joining the Internet. Slower rate of the progress of IPv6 confirms complete shifting from IPv4-IPv6 at once is still long away, although fewer parts of IPv6 have been employed in current market goods. Integration of IPv4 and IPv6 is carried in order to take care of online users. In this paper, it is suggested that hierarchical direction finding structural design in IPv4 and IPv6 will improve the efficiency of IPv4 network. This research work provides the way to design the network scenario for the carrier grade set of connections. The carrier grade network scenario routers are named to be Karachi, Sukkur, Islamabad, Multan and Peshawar for the managerial simulation purposes. The carrier grade network deployment is implemented along with dual stack to migrate to IPv6. This study holds the way to deploy IPv4-IPv6 carrier grade network by providing real time scenario which is yet not considered in the literature to the best of our knowledge. (author)

  8. Smoking among troops deployed in combat areas and its association with combat exposure among navy personnel in Sri Lanka

    OpenAIRE

    De Silva Varuni; Jayasekera Nicholas ELW; Hanwella Raveen

    2012-01-01

    Abstract Background Among military personnel alcohol consumption and binge-drinking have increased but cigarette smoking has declined in the recent past. Although there is a strong association between smoking and PTSD the association between combat exposure and smoking is not clear. Methods This cross sectional study was carried out among representative samples of SLN Special Forces and regular forces deployed in combat areas. Both Special Forces and regular forces were selected using simple ...

  9. Deploying Monitoring Trails for Fault Localization in All- Optical Networks and Radio-over-Fiber Passive Optical Networks

    Science.gov (United States)

    Maamoun, Khaled Mohamed

    Fault localization is the process of realizing the true source of a failure from a set of collected failure notifications. Isolating failure recovery within the network optical domain is necessary to resolve alarm storm problems. The introduction of the monitoring trail (m-trail) has been proven to deliver better performance by employing monitoring resources in a form of optical trails - a monitoring framework that generalizes all the previously reported counterparts. In this dissertation, the m-trail design is explored and a focus is given to the analysis on using m-trails with established lightpaths to achieve fault localization. This process saves network resources by reducing the number of the m-trails required for fault localization and therefore the number of wavelengths used in the network. A novel approach based on Geographic Midpoint Technique, an adapted version of the Chinese Postman's Problem (CPP) solution and an adapted version of the Traveling Salesman's Problem (TSP) solution algorithms is introduced. The desirable features of network architectures and the enabling of innovative technologies for delivering future millimeter-waveband (mm-WB) Radio-over-Fiber (RoF) systems for wireless services integrated in a Dense Wavelength Division Multiplexing (DWDM) is proposed in this dissertation. For the conceptual illustration, a DWDM RoF system with channel spacing of 12.5 GHz is considered. The mm-WB Radio Frequency (RF) signal is obtained at each Optical Network Unit (ONU) by simultaneously using optical heterodyning photo detection between two optical carriers. The generated RF modulated signal has a frequency of 12.5 GHz. This RoF system is easy, cost-effective, resistant to laser phase noise and also reduces maintenance needs, in principle. A revision of related RoF network proposals and experiments is also included. A number of models for Passive Optical Networks (PON)/ RoF-PON that combine both innovative and existing ideas along with a number of

  10. Impact of the environment and the topology on the performance of hierarchical body area networks

    Directory of Open Access Journals (Sweden)

    Ferrari Gianluigi

    2011-01-01

    Full Text Available Abstract Personal area networks and, more specifically, body area networks (BANs are key building blocks of future generation networks and of the Internet of Things as well. In this article, we present a novel analytical framework for network performance analysis of body sensor networks with hierarchical (tree topologies. This framework takes into account the specificities of the on-body channel modeling and the impact of the surrounding environment. The obtained results clearly highlight the differences between indoor and outdoor scenarios, and provide several insights on BAN design and analysis. In particular, it will be shown that the BAN topology should be selected according to the foreseen medical application and the deployment environment.

  11. CSMA Local Area Networking under Dynamic Altruism

    CERN Document Server

    Antoniadis, Panayotis; Griffin, Christopher; Jin, Youngmi; Kesidis, George

    2012-01-01

    In this paper, we consider medium access control of local area networks (LANs) under limited-information conditions as befits a distributed system. Rather than assuming "by rule" conformance to a protocol designed to regulate packet-flow rates (e.g., CSMA windowing), we begin with a non-cooperative game framework and build a dynamic altruism term into the net utility. The effects of altruism are analyzed at Nash equilibrium for both the ALOHA and CSMA frameworks in the quasistationary (fictitious play) regime. We consider either power or throughput based costs of networking, and the cases of identical or heterogeneous (independent) users/players. In a numerical study we consider diverse players, and we see that the effects of altruism for similar players can be beneficial in the presence of significant congestion, but excessive altruism may lead to underuse of the channel when demand is low.

  12. Home Area Networks and the Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    Clements, Samuel L.; Carroll, Thomas E.; Hadley, Mark D.

    2011-04-01

    With the wide array of home area network (HAN) options being presented as solutions to smart grid challenges for the home, it is time to compare and contrast their strengths and weaknesses. This white paper examines leading and emerging HAN technologies. The emergence of the smart grid is bringing more networking players into the field. The need for low consistent bandwidth usage differs enough from the traditional information technology world to open the door to new technologies. The predominant players currently consist of a blend of the old and new. Within the wired world Ethernet and HomePlug Green PHY are leading the way with an advantage to HomePlug because it doesn't require installing new wires. In the wireless the realm there are many more competitors but WiFi and ZigBee seem to have the most momentum.

  13. Deploying a Locata network to enable precise positioning in urban canyons

    Science.gov (United States)

    Montillet, J.-P.; Roberts, G. W.; Hancock, C.; Meng, X.; Ogundipe, O.; Barnes, J.

    2009-02-01

    Locata is a new positioning technology developed by the Locata Corporation. At the beginning of 2007, the Institute of Engineering Surveying and Space Geodesy (IESSG) bought and received a network of Locata transceivers with two rovers. The purpose is to solve the challenges identified when surveying in dense multipath areas (i.e. urban canyons). In this paper, the technology is tested in an urban canyon scenario on the University park at the University of Nottingham. By comparing Locata position solutions with the true positions calculated with a total station and a carrier-phase GPS, the results show that centimetre-level accuracy is achievable in difficult environments in the presence of Wi-Fi signals. The rover’s estimated coordinates may diverge in some cases. Finally, a comparison study shows that Real Time Kinematic GPS and Locata technologies have similar accuracy when both are available.

  14. Experimental and Theoretical Analysis of Storage Friendly TCP Performance in Distributed Storage Area Network

    Directory of Open Access Journals (Sweden)

    Suresh Muknahallipatna

    2007-08-01

    Full Text Available Fibre channel storage area networks (SAN are widely implemented in production data center environments. Recently the storage industry has moved towards deployment of distributed SANs (DSAN, geographically dispersed across large physical distances. In a DSAN, specialized gateway devices interconnect the individual Fibre Channel (FC fabrics over IP networks using TCP/IP based protocols (iFCP or FCIP or over metro to long distance optical networks such as Dense Wavelength Division Multiplexing (DWDM based networks that utilize native FC ports supporting large numbers of link credits. When using TCP/IP based storage networking protocols to interconnect local FC fabrics in a DSAN, the sustained throughput achievable depends upon the link characteristics and TCP/IP stack implementation. Sustaining maximum possible storage traffic throughput across the wide area network enables practical DSAN deployments by maintaining the required site to site service level agreements.This study explores the effects of several TCP/IP modifications on sustained traffic throughput for a DSAN interconnected via iFCP gateways across an impaired network. The TCP/IP stack modifications, known as storage friendly, include changes to the window scaling, congestion avoidance, and fast recovery algorithms. The theoretical background and experimental results are presented to explain and illustrate these modifications.

  15. Realistic Indoor Wi-Fi and Femto deployment Study as the Offloading Solutions to LTE Macro Network

    DEFF Research Database (Denmark)

    Hu, Liang; Coletti, Claudio; Nguyen, Huan Cong;

    2012-01-01

    This paper investigates the downlink performance of indoor deployed Wi-Fi and Femto as the offloading solution to the LTE macro cellular networks in a real large-scale dense-urban scenario. With an assumed traffic volume of 50x compared to today’s levels, it is estimated that the LTE dual......-carrier macro network will suffer high network outage which is defined as proportion of outage users. A user is considered to be in outage if they have a user throughput less than 1 Mbps. We evaluate the performance of indoor Wi-Fi and Femto cell deployment to offload the congested LTE macro network. We show...... that, in a dual-carrier LTE macro case, Wi-Fi access point density of 230/km2 is required to meet the Key Performance Indicator (KPI) - less than 10% of users have a throughput below 1 Mbps whereas out-band Femto access point density of 1200/km2 is required. Furthermore, we show that in-band Femto cell...

  16. Body Area Network Standardization, Analysis and Application

    OpenAIRE

    Asare, Diamond

    2014-01-01

    WBAN (Wireless Body Area Network) on sisätiloissa tai ihmiskehon välittömässä läheisyydessä käytettävä lyhyen kantaman langaton tiedonsiirtotapa. Se soveltuu sekä lääketieteellisiin että ei-lääketieteellisiin sovelluksiin. Yleisimmin sitä käytetään lääketieteessä potilaan reaaliaikaisessa diagnosoinnissa. Olemassa olevat lyhyen kantaman tiedonsiirtoteknologiat, kuten Bluetooth, Bluetooth Low Energy (BLE), ZigBee ja Wi-Fi olisivat olleet soveltuvia teknologioita WBAN:lle. Ne ovat k...

  17. Patient Data Prioritization in the Cross-Layer Designs of Wireless Body Area Network

    OpenAIRE

    Fasee Ullah; Abdul Hanan Abdullah; Muhammad Qasim Jan; Kashif Naseer Qureshi

    2015-01-01

    In Wireless Body Area Network (WBAN), various biomedical sensors (BMSs) are deployed to monitor various vital signs of a patient for detecting the abnormality of the vital signs. These BMSs inform the medical staff in advance before the patient’s life goes into a threatening situation. In WBAN, routing layer has the same challenges as generally seen in WSN, but the unique requirements of WBANs need to be addressed by the novel routing mechanisms quite differently from the routing mechanism in...

  18. Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium

    OpenAIRE

    Somasundaram, M.; R. Sivakumar

    2015-01-01

    Wireless Body Area Network (WBAN) is effectively used in healthcare to increase the value of the patient's life and also the value of healthcare services. The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. The security issue also arises in monitoring the user body fu...

  19. Integration of quantum key distribution in metropolitan area networks

    OpenAIRE

    Poppe, Andreas; Schrenk, Bernhard; Hipp, Florian; Peev, Momtchil; Aleksic, Slavisa; Franzl, Gerald; Ciurana Aguilar, Alex; Martín Ayuso, Vicente

    2014-01-01

    The deployment of Quantum Key Distribution forces the development of QKD-links to be operated in current and next-generation photonic metro-access networks. These highly heterogeneous architectures determine the conditions QKD-links need to be optimized for.

  20. Meeting fronthaul challenges of future mobile network deployments — The HARP approach

    DEFF Research Database (Denmark)

    Dittmann, Lars; Christiansen, Henrik Lehrmann; Checko, Aleksandra

    2014-01-01

    In future mobile networks aggregation at different levels is necessary but at the same time imposes challenges that mandate looking into new architectures. This paper presents the design consideration approach for a C-RAN based mobile aggregation network used in the EU HARP project....... With this architecture fronthaul aggregation is performed which might be an option for future generation of mobile networks....

  1. Wireless sensor networks in relic protection: deployment methodology and cross-layer design

    Institute of Scientific and Technical Information of China (English)

    Li Dong; Liu Wei; Hui Chunli; Huang Changcheng; Cui Li

    2009-01-01

    This paper describes the deployment optimization technology and the cross-layer design of a surveillance WSN system applied in relic protection. Facing the typical technical challenges in the application context of relic protection, we firstly propose a deployment technology based on ant colony optimization algorithm (DT-ACO) to overcome the difficulties in communication connectivity and sensing coverage. Meanwhile, DT-ACO minimizes the overall cost of the system as much as possible. Secondly we propose a novel power-aware cross-layer scheme (PACS) to facilitate adjustable system lifetime and surveillance accuracy. The performance analysis shows that we achieve lower device cost, significant extension of the system lifetime and improvement on the data delivery rate compared with the traditional methods.

  2. Marine protected area networks in California, USA.

    Science.gov (United States)

    Botsford, Louis W; White, J Wilson; Carr, Mark H; Caselle, Jennifer E

    2014-01-01

    California responded to concerns about overfishing in the 1990s by implementing a network of marine protected areas (MPAs) through two science-based decision-making processes. The first process focused on the Channel Islands, and the second addressed California's entire coastline, pursuant to the state's Marine Life Protection Act (MLPA). We review the interaction between science and policy in both processes, and lessons learned. For the Channel Islands, scientists controversially recommended setting aside 30-50% of coastline to protect marine ecosystems. For the MLPA, MPAs were intended to be ecologically connected in a network, so design guidelines included minimum size and maximum spacing of MPAs (based roughly on fish movement rates), an approach that also implicitly specified a minimum fraction of the coastline to be protected. As MPA science developed during the California processes, spatial population models were constructed to quantify how MPAs were affected by adult fish movement and larval dispersal, i.e., how population persistence within MPA networks depended on fishing outside the MPAs, and how fishery yields could either increase or decrease with MPA implementation, depending on fishery management. These newer quantitative methods added to, but did not supplant, the initial rule-of-thumb guidelines. In the future, similar spatial population models will allow more comprehensive evaluation of the integrated effects of MPAs and conventional fisheries management. By 2011, California had implemented 132 MPAs covering more than 15% of its coastline, and now stands on the threshold of the most challenging step in this effort: monitoring and adaptive management to ensure ecosystem sustainability. PMID:25358301

  3. Evaluating alternative network configurations and resource allocations for deployed Marine Corps aviation logistics units

    OpenAIRE

    Jabin, Joshua M.

    2009-01-01

    Approved for public release, distribution unlimited This thesis develops a model and performs analysis to estimate the operational effectiveness of the Marine Aviation Logistics Support Program II (MALSP II) under different system configurations and resource allocation policies. MALSP II is designed to protect the aviation logistics system from uncertain, possibly high variance, demand that could have a significant detrimental impact on the material readiness of deployed aircraft. Altho...

  4. Channel models for wireless body area networks.

    Science.gov (United States)

    Takizawa, Kenichi; Aoyagi, Akahiro; Takada, Jun-Ichi; Katayama, Norihiko; Yekeh, Kamya; Takehiko, Yazdandoost; Kohno, Kobayashi Ryuji

    2008-01-01

    Wireless patient monitoring using wearable sensors is a promising application. This paper provides stochastic channel models for wireless body area network (WBAN) on the human body. Parameters of the channel models are extracted from measured channel transfer functions (CTFs) in a hospital room. Measured frequency bands are selected so as to include permissible bands for WBAN; ultra wideband (UWB), the industry, science and medical (ISM) bands, and wireless medical telemetry system (WMTS) bands. As channel models, both a path loss model and a power delay profile (PDP) model are considered. But, even though path loss models are derived for the all frequency bands, PDP model is only for the UWB band due to the highly frequency selectiveness of UWB channels. The parameters extracted from the measurement results are summarized for each channel model. PMID:19162968

  5. Storage Area Network Implementation on an Educational Institute Network Computer Networking and Communication

    CERN Document Server

    Osama, Safarini

    2011-01-01

    the storage infrastructure is the foundation on which information relies and therefore must support a company's business objectives and business model. In this environment, simply deploying more and faster storage devices is not enough; a new kind of infrastructure is needed, one that provides more enhanced network availability, data accessibility, and system manageability than is provided by today's infrastructure. The SAN meets this challenge. The SAN liberates the storage device, so it is not on a particular server bus, and attaches it directly to the network. In other words, storage is externalized and functionally distributed across the organization. The SAN also enables the centralizing of storage devices and the clustering of servers, which makes for easier and less expensive administration. So the idea is to create an intelligent SAN infrastructure that stretches to meet increased demands, allows highly available and heterogeneous access to expanding information.

  6. A Model for Field Deployment of Wireless Sensor Networks (WSNs) within the Domain of Microclimate Habitat Monitoring

    Science.gov (United States)

    Sanborn, Mark

    2011-01-01

    Wireless sensor networks (WSNs) represent a class of miniaturized information systems designed to monitor physical environments. These smart monitoring systems form collaborative networks utilizing autonomous sensing, data-collection, and processing to provide real-time analytics of observed environments. As a fundamental research area in…

  7. Deployment of a Testbed in a Brazilian Research Network using IPv6 and Optical Access Technologies

    Science.gov (United States)

    Martins, Luciano; Ferramola Pozzuto, João; Olimpio Tognolli, João; Chaves, Niudomar Siqueira De A.; Reggiani, Atilio Eduardo; Hortêncio, Claudio Antonio

    2012-04-01

    This article presents the implementation of a testbed and the experimental results obtained with it on the Brazilian Experimental Network of the government-sponsored "GIGA Project." The use of IPv6 integrated to current and emerging optical architectures and technologies, such as dense wavelength division multiplexing and 10-gigabit Ethernet on the core and gigabit capable passive optical network and optical distribution network on access, were tested. These protocols, architectures, and optical technologies are promising and part of a brand new worldwide technological scenario that has being fairly adopted in the networks of enterprises and providers of the world.

  8. Security Key Management Model for Low Rate Wireless Personal Area Networks

    Directory of Open Access Journals (Sweden)

    Anass RGHIOUI

    2014-10-01

    Full Text Available IEEE 802.15.4-based devices networks known by the name of LR-WPAN (Low Rate Wireless Personal Area Network are characterized by low computation, memory and storage space, and they do not possess an infrastructure. This makes them dynamic and easy to deploy, but in the other hand, this makes them very vulnerable to security issues, as they are low energy so they cant implement current security solutions, and they are deployed in non-secure environments that makes them susceptible to eavesdropping attacks. Most proposed solutions draw out the security of the bootstrapping and commissioning phases as the percentage of existing of an intruder in this time is very low. In this paper, we propose a security model for LR-WPANs based on symmetric cryptography, which takes into account securing the bootstrapping phase, with an analysis of the effectiveness of this proposal and the measures of its implementation.

  9. A simulation model for aligning smart home networks and deploying smart objects

    DEFF Research Database (Denmark)

    Lynggaard, Per

    Smart homes use sensor based networks to capture activities and offer learned services to the user. These smart home networks are challenging because they mainly use wireless communication at frequencies that are shared with other services and equipments. One of the major challenges is the interf...

  10. 75 FR 49843 - Regulated Navigation Area; Boom Deployment Strategy Testing, Great Bay, NH

    Science.gov (United States)

    2010-08-16

    ... FR 3316). Public Meeting We do not now plan to hold a public meeting. But you may submit a request... through the area. Dated: August 2, 2010. D.A. Neptun, Rear Admiral, U.S. Coast Guard, Commander,...

  11. TREATABILITY STUDY FOR EDIBLE OIL DEPLOYMENT FOR ENHANCED CVOC ATTENUATION FOR T-AREA, SAVANNAH RIVER SITE

    Energy Technology Data Exchange (ETDEWEB)

    Riha, B.; Looney, B.; Noonkester, J.; Hyde, W.; Walker, R.

    2012-05-15

    Groundwater beneath T-Area, a former laboratory and semiworks operation at the Department of Energy (DOE) Savannah River Site (SRS), is contaminated by chlorinated solvents (cVOCs). Since the contamination was detected in the 1980s, the cVOCs at T-Area have been treated by a combination of soil vapor extraction and groundwater pump and treat. The site received approval to temporarily discontinue the active groundwater treatment and implement a treatability study of enhanced attenuation - an engineering and regulatory strategy that has recently been developed by DOE and the Interstate Technology and Regulatory Council (ITRC 2007). Enhanced attenuation uses active engineering solutions to alter the target site in such a way that the contaminant plume will passively stabilize and shrink and to document that the action will be effective, timely, and sustainable. The paradigm recognizes that attenuation remedies are fundamentally based on a mass balance. Thus, long-term plume dynamics can be altered either by reducing the contaminant loading from the source or by increasing the rate of natural attenuation processes within all, or part of, the plume volume. The combination of technologies that emerged for T-Area included: (1) neat (pure) vegetable oil deployment in the deep vadose zone in the former source area, (2) emulsified vegetable oil deployment within the footprint of the groundwater plume, and (3) identification of attenuation mechanisms and rates for the distal portion of the plume. In the first part, neat oil spreads laterally forming a thin layer on the water table to intercept and reduce future cVOC loading (via partitioning) and reduce oxygen inputs (via biostimulation). In the second and third parts, emulsified oil forms active bioremediation reactor zones within the plume footprint to degrade existing groundwater contamination (via reductive dechlorination and/or cometabolism) and stimulates long-term attenuation capacity in the distal plume (via

  12. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge

    Directory of Open Access Journals (Sweden)

    Le Xuan Hung

    2008-12-01

    Full Text Available For many sensor network applications such as military or homeland security, it is essential for users (sinks to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1 Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2 The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3 The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4 Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5 No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.

  13. The Deployment of Carbon Monoxide Wireless Sensor Network (CO-WSN) for Ambient Air Monitoring

    OpenAIRE

    Chaichana Chaiwatpongsakorn; Mingming Lu; Keener, Tim C.; Soon-Jai Khang

    2014-01-01

    Wireless sensor networks are becoming increasingly important as an alternative solution for environment monitoring because they can reduce cost and complexity. Also, they can improve reliability and data availability in places where traditional monitoring methods are difficult to site. In this study, a carbon monoxide wireless sensor network (CO-WSN) was developed to measure carbon monoxide concentrations at a major traffic intersection near the University of Cincinnati main campus. The syst...

  14. Large Scale Deployment of PV Units in Existing Distribution Networks: Optimization of the Installation Layout

    OpenAIRE

    Sossan, Fabrizio; Darulová, Jana; Paolone, Mario; Kahl, Annelen; Bartlett, Stuart John; Lehning, Michael

    2016-01-01

    In fixed PV installations, the azimuth and tilt of the panels are normally chosen with the objective of maximizing the plant capacity factor. In this paper, we show that when considering distribution networks with densely clustered PV plants, there exist installation criteria other than the conventional that achieve higher net PV production without violating distribution network constraints. In particular, we formulate an optimization problem to determine the siting, sizing, azimuth and tilt ...

  15. SODEXO: A System Framework for Deployment and Exploitation of Deceptive Honeybots in Social Networks

    OpenAIRE

    Zhu, Quanyan; Clark, Andrew; Poovendran, Radha; Basar, Tamer

    2012-01-01

    As social networking sites such as Facebook and Twitter are becoming increasingly popular, a growing number of malicious attacks, such as phishing and malware, are exploiting them. Among these attacks, social botnets have sophisticated infrastructure that leverages compromised users accounts, known as bots, to automate the creation of new social networking accounts for spamming and malware propagation. Traditional defense mechanisms are often passive and reactive to non-zero-day attacks. In t...

  16. Unobstructive Body Area Networks (BAN) for Efficient Movement Monitoring

    OpenAIRE

    António Pereira; Florentino Fdez-Riverola; Filipe Felisberto; Nuno Costa

    2012-01-01

    The technological advances in medical sensors, low-power microelectronics and miniaturization, wireless communications and networks have enabled the appearance of a new generation of wireless sensor networks: the so-called wireless body area networks (WBAN). These networks can be used for continuous monitoring of vital parameters, movement, and the surrounding environment. The data gathered by these networks contributes to improve users’ quality of life and allows the creation of a knowledge ...

  17. Ultra wideband wireless body area networks

    CERN Document Server

    Thotahewa, Kasun Maduranga Silva; Yuce, Mehmet Rasit

    2014-01-01

    This book explores the design of ultra wideband (UWB) technology for wireless body-area networks (WBAN).  The authors describe a novel implementation of WBAN sensor nodes that use UWB for data transmission and narrow band for data reception, enabling low power sensor nodes, with high data rate capability.  The discussion also includes power efficient, medium access control (MAC) protocol design for UWB based WBAN applications and the authors present a MAC protocol in which a guaranteed delivery mechanism is utilized to transfer data with high priority.  Readers will also benefit from this book’s feasibility analysis of the UWB technology for human implant applications through the study of electromagnetic and thermal power absorption of human tissue that is exposed to UWB signals.   • Describes hardware platform development for IR-UWB based WBAN communication; • Discusses power efficient medium access control (MAC) protocol design for IR-UWB based WBAN applications; • Includes feasibility analy...

  18. Body Area Networks performance analysis using UWB.

    Science.gov (United States)

    Fatehy, Mohammed; Kohno, Ryuji

    2013-01-01

    The successful realization of a Wireless Body Area Network (WBAN) using Ultra Wideband (UWB) technology supports different medical and consumer electronics (CE) applications but stand in a need for an innovative solution to meet the different requirements of these applications. Previously, we proposed to use adaptive processing gain (PG) to fulfill the different QoS requirements of these WBAN applications. In this paper, interference occurred between two different BANs in a UWB-based system has been analyzed in terms of acceptable ratio of overlapping between these BANs' PG providing the required QoS for each BAN. The first BAN employed for a healthcare device (e.g. EEG, ECG, etc.) with a relatively longer spreading sequence is used and the second customized for entertainment application (e.g. wireless headset, wireless game pad, etc.) where a shorter spreading code is assigned. Considering bandwidth utilization and difference in the employed spreading sequence, the acceptable ratio of overlapping between these BANs should fall between 0.05 and 0.5 in order to optimize the used spreading sequence and in the meantime satisfying the required QoS for these applications. PMID:24109913

  19. TIS process supervisory local area network (LAN)

    International Nuclear Information System (INIS)

    TIS - the process supervisory LAN was installed at both the NPP V-1 twin-units of WWER-440/230 type and the NPP V-2 twin-units of WWER-440/213 type at Jaslovske Bohunice, Slovak Republic, in 1992. It represents a superstructure to the existing reactor unit process computers RPP-16S and IV 500 MA at the NPP V-1 and IVS Komplex Uran 2M and KVRK at the NPP V-2. The principal goal of TIS is to supply both the main control room staff and the NPP operation personnel and operation mode engineers with process information in a larger extent and on a higher level than the existing process computers do. TIS provides following process supervision functions: Taking over Data, Data Processing, Operative and Historical Data Collection, Active Alarm Management, Mimic Diagrams, REAL-time and Historical Trending, Horizontal Bargraphs, Data Tables, Report Generation, Shift Supervisor Support in case of Failure/Accident at NPP, User Database Applications, Computerized Operating Procedures, Programmable Prompts to Operator, ''Desk-top'' Calculator, Communication with Professional Departments, Auto-diagnostics. TIS is a PC local area network of QNX NET type, its data transmission rate being 2.5 Mbits/second. TIS is run under QNX operating system. Application software modules are written in QNX C and C-86 languages. Some functions were completed in OnCmd v.4.2 database environment. (author). 2 figs

  20. Familiarity breeds contempt: kangaroos persistently avoid areas with experimentally deployed dingo scents.

    Directory of Open Access Journals (Sweden)

    Michael H Parsons

    Full Text Available BACKGROUND: Whether or not animals habituate to repeated exposure to predator scents may depend upon whether there are predators associated with the cues. Understanding the contexts of habituation is theoretically important and has profound implication for the application of predator-based herbivore deterrents. We repeatedly exposed a mixed mob of macropod marsupials to olfactory scents (urine, feces from a sympatric predator (Canis lupus dingo, along with a control (water. If these predator cues were alarming, we expected that over time, some red kangaroos (Macropus rufous, western grey kangaroos (Macropus fuliginosus and agile wallabies (Macropus agilis would elect to not participate in cafeteria trials because the scents provided information about the riskiness of the area. METHODOLOGY/PRINCIPAL FINDINGS: We evaluated the effects of urine and feces independently and expected that urine would elicit a stronger reaction because it contains a broader class of infochemicals (pheromones, kairomones. Finally, we scored non-invasive indicators (flight and alarm stomps to determine whether fear or altered palatability was responsible for the response. Repeated exposure reduced macropodid foraging on food associated with 40 ml of dingo urine, X = 986.75+/-3.97 g food remained as compared to the tap water control, X = 209.0+/-107.0 g (P0.5. Macropodids did not habituate to repeated exposure to predator scents, rather they avoided the entire experimental area after 10 days of trials (R(2 = 83.8; P<0.001. CONCLUSIONS/SIGNIFICANCE: Responses to urine and feces were indistinguishable; both elicited fear-based responses and deterred foraging. Despite repeated exposure to predator-related cues in the absence of a predator, macropodids persistently avoided an area of highly palatable food. Area avoidance is consistent with that observed from other species following repeated anti-predator conditioning, However, this is the first time this response has been

  1. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things

    OpenAIRE

    Lusheng Wang; Yamei Wang; Zhizhong Ding; Xiumin Wang

    2015-01-01

    With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs) tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS) game between these devices. S...

  2. Design & Deploy Web 2.0 enable services over Next Generation Network Platform

    CERN Document Server

    Lakhtaria, Kamaljit I; 10.5121/ijdms.2010.2305

    2010-01-01

    The Next Generation Networks (NGN) aims to integrate for IP-based telecom infrastructures and provide most advance & high speed emerging value added services. NGN capable to provide higher innovative services, these services will able to integrate communication and Web service into a single platform. IP Multimedia Subsystem, a NGN leading technology, enables a variety of NGN-compliant communications services to interoperate while being accessed through different kinds of access networks, preferably broadband. IMS–NGN services essential by both consumer and corporate users are by now used to access services, even communications services through the web and web-based communities and social networks, It is key for success of IMS-based services to be provided with efficient web access, so users can benefit from those new services by using web-based applications and user interfaces, not only NGN-IMS User Equipments and SIP protocol. Many Service are under planning which provided only under convergence of ...

  3. Madagascar's nascent locally managed marine area network

    Directory of Open Access Journals (Sweden)

    Taylor Lee Mayol

    2013-11-01

    Full Text Available Since 2004, the creation of locally managed marine areas (LMMAs in Madagascar has exponentially increased, highlighting the need for improved information sharing between communities and between support organizations. Until recently, however, these LMMAs operated in relative isolation, with little communication or coordination between LMMA community associations.Madagascar’s first national LMMA forum was held to address this need in June 2012 in the village of Andavadoaka. The forum brought together 55 community members from 18 LMMAs throughout Madagascar, representing a total of 134 villages. A principle outcome of this meeting was the formation of a national LMMA network named MIHARI, a Malagasy acronym that translates into ‘local marine resource management’. The nascent MIHARI network is an informal network that was inspired by the success of the LMMA Network in the Indo-Pacific region. MIHARI aims to facilitate peer-to-peer learning amongst coastal communities, improve communication, raise the profile and expand the use of the LMMA approach and serve as a unified lobbying platform for the interests of Madagascar’s traditional fishers.The creation of MIHARI represents a significant development towards uniting community-led approaches to conservation in Madagascar and highlights the significant role LMMAs can play in marine conservation on a national scale. This is of particular significance in Madagascar, a country with little capacity or financial resources to oversee large-scale marine conservation efforts, a problem compounded by both the vast coastline and geographical isolation of many fishing communities. Madagascar’s new LMMA network is leading the way for coastal community conservation in the western Indian Ocean and aims to serve as the basis for a wider regional LMMA network. RésuméDepuis 2004, la mise en place d’Aires Marines Gérées Localement (AMGL à Madagascar suit une augmentation exponentielle, mettant en lumi

  4. How an existing telecommunications network can support the deployment of smart meters in a water utility?

    Directory of Open Access Journals (Sweden)

    Samuel de Barros Moraes

    2015-12-01

    Full Text Available This case study, based on interviews and technical analysis of a Brazilian water utility with more than 10 million clients, aims to understand what kind of adjusts on a telecommunications network, developed for operational and corporate use, demands to support a smart metering system, identifying this synergies and challenges.

  5. Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems

    Energy Technology Data Exchange (ETDEWEB)

    Singh, Surya V.; Thronas, Aaron I.

    2010-01-01

    This paper discusses the importance of remote access via virtual private network (VPN) for the Second Line of Defense (SLD) Central Alarm System (CAS) sites, the requirements for maintaining secure channels while using VPN and implementation requirements for current and future sites.

  6. THE TECHNOLOGICAL ISSUES AND IMPACT OF INTELLIGENT NETWORK STRATEGIES AND ITS RAPID DEPLOYMENT OF SERVICES IN THE COMMUNICATION NETWORK

    OpenAIRE

    Dr.S.S.Riaz Ahamed

    2011-01-01

    The primary aim of the IN was to enhance the core telephony services offered by traditional telecommunications networks, which usually amounted to making and receiving voice calls, sometimes with call divert. This core would then provide a basis upon which operators could build services in addition to those already present on astandard telephone exchange. Using the intelligent network (IN) approach for supporting telecommunications services enables the use of productivity-enhancing techniques...

  7. Evaluation of the Impact of Furniture on Communications Performance for Ubiquitous Deployment of Wireless Sensor Networks in Smart Homes

    Directory of Open Access Journals (Sweden)

    Antonio F. Gómez Skarmeta

    2012-05-01

    Full Text Available The extensions of the environment with the integration of sensing systems in any space, in conjunction with ubiquitous computing are enabling the so-called Smart Space Sensor Networks. This new generation of networks are offering full connectivity with any object, through the Internet of Things (IoT and/or the Web, i.e., the Web of Things. These connectivity capabilities are making it feasible to sense the behaviours of people at home and act accordingly. These sensing systems must be integrated within typical elements found at home such as furniture. For that reason, this work considers furniture as an interesting element for the transparent location of sensors. Furniture is a ubiquitous object, i.e., it can be found everywhere at home or the office, and it can integrate and hide the sensors of a network. This work addresses the lack of an exhaustive study of the effect of furniture on signal losses. In addition an easy-to-use tool for estimating the robustness of the communication channel among the sensor nodes and gateways is proposed. Specifically, the losses in a sensor network signal due to the materials found within the communication link are evaluated. Then, this work proposes a software tool that gathers the obtained results and is capable of evaluating the impact of a given set of materials on the communications. This tool also provides a mechanism to optimize the sensor network deployments during the definition of smart spaces. Specifically, it provides information such as: maximum distances between sensor nodes, most suitable type of furniture to integrate sensors, or battery life of sensor nodes. This tool has been validated empirically in the lab, and it is currently being used by several enterprise partners of the Technological Centre of Furniture and Wood in the southeast of Spain.

  8. Evaluation of the impact of furniture on communications performance for ubiquitous deployment of Wireless Sensor Networks in smart homes.

    Science.gov (United States)

    Bleda, Andrés L; Jara, Antonio J; Maestre, Rafael; Santa, Guadalupe; Gómez Skarmeta, Antonio F

    2012-01-01

    The extensions of the environment with the integration of sensing systems in any space, in conjunction with ubiquitous computing are enabling the so-called Smart Space Sensor Networks. This new generation of networks are offering full connectivity with any object, through the Internet of Things (IoT) and/or the Web, i.e., the Web of Things. These connectivity capabilities are making it feasible to sense the behaviours of people at home and act accordingly. These sensing systems must be integrated within typical elements found at home such as furniture. For that reason, this work considers furniture as an interesting element for the transparent location of sensors. Furniture is a ubiquitous object, i.e., it can be found everywhere at home or the office, and it can integrate and hide the sensors of a network. This work addresses the lack of an exhaustive study of the effect of furniture on signal losses. In addition an easy-to-use tool for estimating the robustness of the communication channel among the sensor nodes and gateways is proposed. Specifically, the losses in a sensor network signal due to the materials found within the communication link are evaluated. Then, this work proposes a software tool that gathers the obtained results and is capable of evaluating the impact of a given set of materials on the communications. This tool also provides a mechanism to optimize the sensor network deployments during the definition of smart spaces. Specifically, it provides information such as: maximum distances between sensor nodes, most suitable type of furniture to integrate sensors, or battery life of sensor nodes. This tool has been validated empirically in the lab, and it is currently being used by several enterprise partners of the Technological Centre of Furniture and Wood in the southeast of Spain. PMID:22778653

  9. The network of brain areas involved in the motion aftereffect

    OpenAIRE

    Taylor, J. G.; Schmitz, N.; Ziemons, K.; Grosse-Ruyken, M. L.; Gruber, O; Müller-Gärtner, H. W.; Shah, J. N.

    2000-01-01

    A network of brain areas is expected to be involved in supporting the motion aftereffect. The most active components of this network were determined by means of an fMRI study of nine subjects exposed to a visual stimulus of moving bars producing the effect. Across the subjects, common areas were identified during various stages of the effect, as well as networks of areas specific to a single stage. In addition to the well-known motion-sensitive area MT the prefrontal brain areas BA44 and 47 a...

  10. Automated Wildlife Monitoring Using Self-Configuring Sensor Networks Deployed in Natural Habitats

    OpenAIRE

    Trifa, Vlad; Girod, Lewis; Travis C. Collier; Blumstein, Daniel; Taylor, C E

    2007-01-01

    To understand the complex interactions among animals within an ecosystem, biologists need to be able to track their location and social interactions. There are a variety of factors that make this difficult. We propose using adaptive, embedded networked sensing technologies to develop an efficient means for wildlife monitoring. This paper surveys our research; we demonstrate how a self-organizing system can efficiently conduct real-time acoustic source detection and localization using distribu...

  11. Authentication system deployment throughout protected access (UTM) for the Wireless Network in a hotel chain

    OpenAIRE

    Escolà Henke, Jean Miquel

    2011-01-01

    A Hotel chain distributed over Europe wishes to provide wireless access to Internet for the hosted customers and offer an integral security through a Unified Threat Management ( UTM ) The project will consist; in one hand, based on the customer's needs, on adding a wireless access, with a captive portal authentication centralized at our company being able to manage users as well as the wireless networks remotely. On the other hand, the securization and management of the communication li...

  12. Game-Theoretic Deployment Design of Small-Cell OFDM Networks

    OpenAIRE

    Gaoning, He; Betz, Sharon; Debbah, Merouane

    2009-01-01

    International audience We present a non-cooperative game-theoretic approach for the distributed resource allocation problem in the context of multiple transmitters communicating with multiple receivers through parallel independent fading channels, which is closely related with small-cell multi-user orthogonal frequency division multiplexing (OFDM) networks, e.g., Wi-Fi hotspots. We assume that all the transmitters are rational, selfish, and each one carries the objective of maximizing its ...

  13. SNSAPI: A Cross-Platform Middleware for Rapid Deployment of Decentralized Social Networks

    OpenAIRE

    Hu, Pili; Fan, Qijiang; Lau, Wing Cheong

    2014-01-01

    In this paper, we present the design, implementation and our year-long maintenance experience of SNSAPI, a Python-based middleware which unifies the interfaces and data structures of heterogeneous Social Networking Services (SNS). Unlike most prior works, our middleware is user-oriented and requires zero infrastructure support. It enables a user to readily conduct online social activities in a programmable, cross-platform fashion while gradually reducing the dependence on centralized Online S...

  14. AP Deployment Research Based on Physical Distance and Channel Isolation

    OpenAIRE

    Dangui Yan; Chengchang Zhang; Honghua Liao; Lisheng Yang; Ping Li; Guogang Yang

    2014-01-01

    Aiming at the problem of inefficiency of wireless local area networks (WLAN) access point (AP) deployment in urban environment, a new algorithm for AP deployment based on physical distance and channel isolation (DPDCI) is proposed. First, it detects the position information of deployed APs and then calculates the interference penalty factor combined with physical distance and channel isolation, and finally gets the optimal location and channel of the new AP through the genetic algorithm. Comp...

  15. Opportunistic Relaying in Wireless Body Area Networks: Coexistence Performance

    OpenAIRE

    Dong, Jie; SMITH, DAVID

    2012-01-01

    In this paper, a cooperative two-hop communication scheme, together with opportunistic relaying (OR), is applied within a mobile wireless body area network (WBAN). Its effectiveness in interference mitigation is investigated in a scenario where there are multiple closely-located networks. Due to a typical WBAN's nature, no coordination is used among different WBANs. A suitable time-division-multiple-access (TDMA) is adopted as both an intra-network and also an inter-network access scheme. Ext...

  16. A NODE DEPLOYMENT SCHEME FOR BOUNDARY INTRUSION DETECTION IN WIRELESS SENSOR NETWORKS%WS N中一种用于边界入侵检测的节点部署方案

    Institute of Scientific and Technical Information of China (English)

    王燕玲; 李广伦

    2014-01-01

    Intrusion detection is an important aspect of the research of network safety in wireless sensor networks.Aiming at the disadvan-tages of existing intrusion detection schemes that they only consider the protection of single network infrastructure but rarely deem the WSN as a whole in intrusion detection,this paper presents a node deployment scheme for boundary intrusion detection.Firstly,it deems the entire monitoring area as a whole,and then deploys the nodes based on reverse Gaussian distribution,the larger number of sensor nodes is deployed to the area closing the boundary,finally,in order to ensure the connectivity and coverage over the entire network,the area is divided onto multiple rounds,the required minimum number of the deployed sensor nodes in each round is analysed theoretically.Simulation experimental results show that this scheme can effectively realise intrusion detection,and is superior to Gaussian deployment and uniform deployment sce-narios in terms of intrusion distance and the number of sensor nodes by invasion triggered.%入侵检测是无线传感器网络安全研究的一个重要方面。针对现有的入侵检测方案大多只考虑保护单一的网络设施,很少将整个WSN网络看作一个整体来进行入侵检测的不足,提出一种面向边界入侵检测的节点部署方案。首先将整个监测区域看作一个整体,然后基于逆高斯分布对节点进行部署,靠近边界的区域被部署更多数量的传感器节点,最后为了保证整个网络的连通和覆盖,通过将整个区域划分为多个轮,从理论上分析了在每轮中所需部署传感器节点的最少数目。仿真实验结果表明,该方案能够有效地实现入侵检测,在入侵距离和入侵所触发的传感器节点数目方面都要优于高斯部署和均匀部署方案。

  17. Establishment of Stereo Multi-sensor Network for Giant Landslide Monitoring and its Deploy in Xishan landslide, Sichuan, China.

    Science.gov (United States)

    Liu, C.; Lu, P.; WU, H.

    2015-12-01

    Landslide is one of the most destructive natural disasters, which severely affects human lives as well as the safety of personal properties and public infrastructures. Monitoring and predicting landslide movements can keep an adequate safety level for human beings in those situations. This paper indicated a newly developed Stereo Multi-sensor Landslide Monitoring Network (SMSLMN) based on a uniform temporal geo-reference. Actually, early in 2003, SAMOA (Surveillance et Auscultation des Mouvements de Terrain Alpins, French) project was put forwarded as a plan for landslide movements monitoring. However, SAMOA project did not establish a stereo observation network to fully cover the surface and internal part of landslide. SMSLMN integrated various sensors, including space-borne, airborne, in-situ and underground sensors, which can quantitatively monitor the slide-body and obtain portent information of movement in high frequency with high resolution. The whole network has been deployed at the Xishan landslide, Sichuan, P.R.China. According to various characteristic of stereo monitoring sensors, observation capabilities indicators for different sensors were proposed in order to obtain the optimal sensors combination groups and observation strategy. Meanwhile, adaptive networking and reliable data communication methods were developed to apply intelligent observation and sensor data transmission. Some key technologies, such as signal amplification and intelligence extraction technology, data access frequency adaptive adjustment technology, different sensor synchronization control technology were developed to overcome the problems in complex observation environment. The collaboratively observation data have been transferred to the remote data center where is thousands miles away from the giant landslide spot. These data were introduced into the landslide stability analysis model, and some primary conclusion will be achieved at the end of paper.

  18. Data security in wireless local area network

    International Nuclear Information System (INIS)

    The ever increasing demand for performance and data security improvement in wireless local area network (W LAN) has motivated increasing the difficulties to crack the system by man-in -the middle attacks. There are two primary and main objectives of this thesis to enhance data security in WLAN. The first objective is the enhancement of identities-exchange and key-exchange during authentication process. The second objective is the investigation of a proposed symmetrical encryption algorithm based on key-updating to enhance the performance of data-security in WLAN. The current asymmetrical encryption algorithms are used to authenticate the devices in WLAN to each other. They are used to exchange the identities and the keys in a secret channel during the authentication process. This thesis investigates the problems of identities- exchange. The enhancement of the identities-exchange and key-exchange stages during the authentication process has been suggested and studied in the thesis to solve the drawbacks of the traditional asymmetrical encryption algorithms.Next the investigation of a proposed symmetrical encryption to encrypt the data during the data exchange process gives a new approach to increase the difficulties to the man in the middle attacks to crack the system.The key updating with each packet is the new approach to solve the problem of the fixed key used to encrypt / decrypt the data with all packets in WLAN.A Comparative study between the proposed symmetrical encryption algorithms and the other algorithms is presented in the thesis. Proposed symmetrical encryption algorithm is applied on a text, voice, and image messages as practical applications of the proposed symmetrical encryption algorithm. Finally, the man-in-the middle attacks can broadcast noise signals in WLAN channels to prevent the data to reach correctly to the end-user. The quality of the received image is measured for the proposed and the traditional symmetrical encryption algorithms to

  19. Development of mechanism of packet capturing over local area network

    International Nuclear Information System (INIS)

    Today the Networks grow in the- scale along many dimensions, among those one of the dimensions is to analyze Network Traffic and to predict the traffic for future Networks. The fastest growth of DCN (Data Communication Networks) over the past decades has resulted in the development of various Network utilities, which perform Network evaluation in different domains. As more and more people are getting interested in the networking, more network monitoring application is being developed by the computer scientists and engineers. Usually, a network consist of different platforms and operating systems. On a Network packets of various types such as data packets, control packets, travel from PC to PC. In this paper we are going to present a network diagnostic Tool that captures all packets over local area network (LAN). The Network Diagnostic Tool captures packets under the platform windows NT/2000. The execution mode of the tool is absolutely at Run time. It tracks the packets as they move on from the lowest layer to the upper layer in the TCP/IP Protocol Stack. It efficiently decrypts all the incoming packets using the RFC (Request for Comments) standards. The results suggest that the Network Diagnostic tool successfully decrypts all the incoming network traffic accurately and efficiently. (author)

  20. Experimental validation of a distributed algorithm for dynamic spectrum access in local area networks

    DEFF Research Database (Denmark)

    Tonelli, Oscar; Berardinelli, Gilberto; Tavares, Fernando Menezes Leitão;

    2013-01-01

    activities with the Autonomous Component Carrier Selection (ACCS) algorithm, a distributed solution for interference management among small neighboring cells. A preliminary evaluation of the algorithm performance is provided considering its live execution on a software defined radio network testbed. The......Next generation wireless networks aim at a significant improvement of the spectral efficiency in order to meet the dramatic increase in data service demand. In local area scenarios user-deployed base stations are expected to take place, thus making the centralized planning of frequency resources...... among the cells, a non-viable solution. Cognitive Radio (CR) and Dynamic Spectrum Access (DSA) are the research paradigms which are expected to provide the network nodes the capabilities for an autonomous and efficient selection of the spectrum resources. In this paper we present the first experimental...

  1. Analytical bounds on the area spectral efficiency of uplink heterogeneous networks over generalized fading channels

    KAUST Repository

    Shakir, Muhammad

    2014-06-01

    Heterogeneous networks (HetNets) are envisioned to enable next-generation cellular networks by providing higher spectral and energy efficiency. A HetNet is typically composed of multiple radio access technologies where several low-power low-cost operators or user-deployed small-cell base stations (SBSs) complement the macrocell network. In this paper, we consider a two-tier HetNet where the SBSs are arranged around the edge of the reference macrocell such that the resultant configuration is referred to as cell-on-edge (COE). Each mobile user in a small cell is considered capable of adapting its uplink transmit power according to a location-based slow power control mechanism. The COE configuration is observed to increase the uplink area spectral efficiency (ASE) and energy efficiency while reducing the cochannel interference power. A moment-generating-function (MGF)-based approach has been exploited to derive the analytical bounds on the uplink ASE of the COE configuration. The derived expressions are generalized for any composite fading distribution, and closed-form expressions are presented for the generalized- K fading channels. Simulation results are included to support the analysis and to show the efficacy of the COE configuration. A comparative performance analysis is also provided to demonstrate the improvements in the performance of cell-edge users of the COE configuration compared with that of macro-only networks (MoNets) and other unplanned deployment strategies. © 2013 IEEE.

  2. THE TECHNOLOGICAL ISSUES AND IMPACT OF INTELLIGENT NETWORK STRATEGIES AND ITS RAPID DEPLOYMENT OF SERVICES IN THE COMMUNICATION NETWORK

    Directory of Open Access Journals (Sweden)

    Dr.S.S.Riaz Ahamed

    2011-05-01

    Full Text Available The primary aim of the IN was to enhance the core telephony services offered by traditional telecommunications networks, which usually amounted to making and receiving voice calls, sometimes with call divert. This core would then provide a basis upon which operators could build services in addition to those already present on astandard telephone exchange. Using the intelligent network (IN approach for supporting telecommunications services enables the use of productivity-enhancing techniques for the creation of new services. Rather than creating new services by cutting fresh software code, modules of service-independent logic can be arranged using graphical user interfaces. As a result, advanced telecommunications services, which are independent of the central switch, can be created more quickly than ever.

  3. Improving the reliability of wireless body area networks.

    Science.gov (United States)

    Arrobo, Gabriel E; Gitlin, Richard D

    2011-01-01

    In this paper we propose a highly reliable wireless body area network (WBAN) that provides increased throughput and avoids single points of failure. Such networks improve upon current WBANs by taking advantage of a new technology, Cooperative Network Coding (CNC). Using CNC in wireless body area network to support real-time applications is an attractive solution to combat packet loss, reduce latency due to retransmissions, avoid single points of failure, and improve the probability of successful recovery of the information at the destination. In this paper, we have extended Cooperative Network Coding, from its original configuration (one-to-one) to many-to-many as in multiple-input-multiple-output (MIMO) systems. Cooperative Network Coding results in increased throughput and network reliability because of the cooperation of the nodes in transmitting coded combination packets across spatially distinct paths to the information sinks. PMID:22254774

  4. An integrated architecture for deploying a virtual private medical network over the web.

    Science.gov (United States)

    Gritzalis, S; Gritzalis, D; Moulinos, C; Iliadis, J

    2001-01-01

    In this paper we describe a pilot architecture aiming at protecting Web-based medical applications through the development of a virtual private medical network. The basic technology, which is utilized by this integrated architecture, is the Trusted Third Party (TTP). In specific, a TTP is used to generate, distribute, and revoke digital certificates to/from medical practitioners and healthcare organizations wishing to communicate in a secure way. Digital certificates and digital signatures are, in particular, used to provide peer and data origin authentication and access control functionalities. We also propose a logical Public Key Infrastructure (PKI) architecture, which is robust, scalable, and based on standards. This architecture aims at supporting large-scale healthcare applications. It supports openness, scalability, flexibility and extensibility, and can be integrated with existing TTP schemes and infrastructures offering transparency and adequate security. Finally, it is demonstrated that the proposed architecture enjoys all desirable usability characteristics, and meets the set of criteria, which constitutes an applicable framework for the development of trusted medical services over the Web. PMID:11583408

  5. Geothermal assessment of the MX deployment area in Nevada. Final report, April 1, 1981-April 30, 1982

    Energy Technology Data Exchange (ETDEWEB)

    Trexler, D.T.; Bruce, J.L.; Cates, D.; Dolan, H.H.; Covington, C.H.

    1982-06-01

    A preliminary geothermal resource assessment of the MX deployment area in Nevada focused on Coyote Spring Valley in southeastern Nevada. Initially, an extensive literature search was conducted and a bibliography consisting of 750 entries was compiled covering all aspects of geology pertaining to the study area. A structural study indicates that Coyote Spring Valley lies in a tectonically active area which is favorable for the discovery of geothermal resources. Hot water may be funneled to the near-surface along an extensive fracture and fault system which appears to underlie the valley, according to information gathered during the literature search and aerial photo survey. A total of 101 shallow temperature probes were emplanted in Coyote Spring Valley. Three anomalous temperature points all lying within the same vicinity were identified in the north-central portion of the valley near a fault. A soil-mercury study also identified one zone of anomalous mercury concentrations around the north end of the Arrow Canyon Range. A literature search covering regional fluid geochemistry indicated that the three fluid samples taken from Coyote Spring Valley have a higher concentration of Na + K. During field work, seven fluid samples were collected in Coyote Spring Valley which also appear to be derived from volcanic units due to the presence of Ca-Mg or Na-K carbonate-bicarbonate. A temperature gradient study of six test water wells indicates that only one geothermal well with a temperature of 35.5/sup 0/C (96/sup 0/F) exists in the central portion of the valley at the north end of Arrow Canyon Range near the zone of anomalous soil-mercury points. A cultural assessment of Coyote Spring Valley was performed prior to field work.

  6. Large area controlled assembly of transparent conductive networks

    Science.gov (United States)

    Ivanov, Ilia N.; Simpson, John T.

    2015-09-29

    A method of preparing a network comprises disposing a solution comprising particulate materials in a solvent onto a superhydrophobic surface comprising a plurality of superhydrophobic features and interfacial areas between the superhydrophobic features. The plurality of superhydrophobic features has a water contact angle of at least about 150.degree.. The method of preparing the network also comprises removing the solvent from the solution of the particulate materials, and forming a network of the particulate materials in the interfacial areas, the particulate materials receding to the interfacial areas as the solvent is removed.

  7. Storage Area Networks and The High Performance Storage System

    Energy Technology Data Exchange (ETDEWEB)

    Hulen, H; Graf, O; Fitzgerald, K; Watson, R W

    2002-03-04

    The High Performance Storage System (HPSS) is a mature Hierarchical Storage Management (HSM) system that was developed around a network-centered architecture, with client access to storage provided through third-party controls. Because of this design, HPSS is able to leverage today's Storage Area Network (SAN) infrastructures to provide cost effective, large-scale storage systems and high performance global file access for clients. Key attributes of SAN file systems are found in HPSS today, and more complete SAN file system capabilities are being added. This paper traces the HPSS storage network architecture from the original implementation using HIPPI and IPI-3 technology, through today's local area network (LAN) capabilities, and to SAN file system capabilities now in development. At each stage, HPSS capabilities are compared with capabilities generally accepted today as characteristic of storage area networks and SAN file systems.

  8. Split Architecture for Large Scale Wide Area Networks

    OpenAIRE

    John, Wolfgang; Devlic, Alisa; Ding, Zhemin; Jocha, David; Kern, Andras; Kind, Mario; Köpsel, Andreas; Nordell, Viktor; Sharma, Sachin; Sköldström, Pontus; Staessens, Dimitri; Takacs, Attila; Topp, Steffen; Westphal, F. -Joachim; Woesner, Hagen

    2014-01-01

    This report defines a carrier-grade split architecture based on requirements identified during the SPARC project. It presents the SplitArchitecture proposal, the SPARC concept for Software Defined Networking (SDN) introduced for large-scale wide area networks such as access/aggregation networks, and evaluates technical issues against architectural trade-offs. First we present the control and management architecture of the proposed SplitArchitecture. Here, we discuss a recursive control archit...

  9. Directional MAC Approach for Wireless Body Area Networks

    OpenAIRE

    Md. Asdaque Hussain; Md. Nasre Alam; Kyung Sup Kwak

    2011-01-01

    Wireless Body Area Networks (WBANs) designed for medical, sports, and entertainment applications, have drawn the attention of academia and industry alike. A WBAN is a special purpose network, designed to operate autonomously to connect various medical sensors and appliances, located inside and/or outside of a human body. This network enables physicians to remotely monitor vital signs of patients and provide real time feedback for medical diagnosis and consultations. The WBAN system can offer ...

  10. Simulation of Optical Packet—Switched Metropolitan Area Network

    Institute of Scientific and Technical Information of China (English)

    朱炳春; 贾潞华; 等

    2002-01-01

    This paper introduces architectures of two types optical packet-switched metropolitan area networks and their media access control protocols.We have designed ralated network simulation systems.With these simulation systems,the characteristics and performanceof the two MANs can be achieved.

  11. Usage of the cyclotron facility local area network

    International Nuclear Information System (INIS)

    Local area network of controllers at the Karlsruhe cyclotyron is shown. Experience after two years of usage is described. The system is applied controlling, data acquisition, management, databases usage

  12. Research on Sensor Networks Deployment in the Combat of Airborne Guard%空降扼守战斗中传感器网络部署

    Institute of Scientific and Technical Information of China (English)

    胡博; 沈军; 罗护

    2011-01-01

    In order to measure wireless sensor networks deployment in combat of airborne guard comprehensively and rationally, a new kind of index system of evaluating a wireless sensor networks deployment is built and the determining method of each factor is given. In this base, the math model of wireless sensor networks is built, the detailed solving algorithm is also given. The simulation shows the model is valid.%为了全面、合理地度量空降扼守战斗中传感器网络部署的优劣,建立了一种新的评价指标体系,给出了指标的具体确定方法;在此基础上建立传感器网络部署的数学模型,给出了算法流程.通过仿真实验证明,模型是有效的.

  13. Application of Wireless Sensor and Actuator Networks to Achieve Intelligent Microgrids: A Promising Approach towards a Global Smart Grid Deployment

    Directory of Open Access Journals (Sweden)

    Alvaro Llaria

    2016-02-01

    Full Text Available Smart Grids (SGs constitute the evolution of the traditional electrical grid towards a new paradigm, which should increase the reliability, the security and, at the same time, reduce the costs of energy generation, distribution and consumption. Electrical microgrids (MGs can be considered the first stage of this evolution of the grid, because of the intelligent management techniques that must be applied to assure their correct operation. To accomplish this task, sensors and actuators will be necessary, along with wireless communication technologies to transmit the measured data and the command messages. Wireless Sensor and Actuator Networks (WSANs are therefore a promising solution to achieve an intelligent management of MGs and, by extension, the SG. In this frame, this paper surveys several aspects concerning the application of WSANs to manage MGs and the electrical grid, as well as the communication protocols that could be applied. The main concerns regarding the SG deployment are also presented, including future scenarios where the interoperability of different generation technologies must be assured.

  14. A comprehensive survey of energy-aware routing protocols in wireless body area sensor networks.

    Science.gov (United States)

    Effatparvar, Mehdi; Dehghan, Mehdi; Rahmani, Amir Masoud

    2016-09-01

    Wireless body area sensor network is a special purpose wireless sensor network that, employing wireless sensor nodes in, on, or around the human body, makes it possible to measure biological parameters of a person for specific applications. One of the most fundamental concerns in wireless body sensor networks is accurate routing in order to send data promptly and properly, and therefore overcome some of the challenges. Routing protocols for such networks are affected by a large number of factors including energy, topology, temperature, posture, the radio range of sensors, and appropriate quality of service in sensor nodes. Since energy is highly important in wireless body area sensor networks, and increasing the network lifetime results in benefiting greatly from sensor capabilities, improving routing performance with reduced energy consumption presents a major challenge. This paper aims to study wireless body area sensor networks and the related routing methods. It also presents a thorough, comprehensive review of routing methods in wireless body area sensor networks from the perspective of energy. Furthermore, different routing methods affecting the parameter of energy will be classified and compared according to their advantages and disadvantages. In this paper, fundamental concepts of wireless body area sensor networks are provided, and then the advantages and disadvantages of these networks are investigated. Since one of the most fundamental issues in wireless body sensor networks is to perform routing so as to transmit data precisely and promptly, we discuss the same issue. As a result, we propose a classification of the available relevant literature with respect to the key challenge of energy in the routing process. With this end in view, all important papers published between 2000 and 2015 are classified under eight categories including 'Mobility-Aware', 'Thermal-Aware', 'Restriction of Location and Number of Relays', 'Link-aware', 'Cluster- and Tree

  15. Improved Adaptive Routing for Multihop IEEE 802.15.6 Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Shariar Imtiaz

    2013-11-01

    Full Text Available Wireless Body Area Network has the ability to collect and send data on body measurement to the server through PDA or other device. Nodes (sensors collect vital signs from the body or environmental factor and check them. In IEEE 802.15.6 routing is discussed as a part of the link layer where multihop is not fully considered. Improving network performance, reducing energy consumption, thus extending the network lifetime is the main challenge in BANs. Several studies mention that multihop for BANs helps for achieving network performance, reducing energy consumption and extending network lifetime. One work presents the Adaptive multihop tree-based Routing (AMR protocol that is extensively evaluated in a real testbed deployment. They use fuzzy logic to combine all metrics they use. Another limitation is that they have used Prim's algorithm which is not a realistic approach. So in this work we have improved their multihop tree-based Routing (AMR protocol using Kruskal's algorithm instead of Prim's algorithm. The time complexity of Kruskal's algorithm is way less than prims's algorithm. We have used network simulator 3 (NS3 to simulate and found that our algorithm is better than AMR if many of nodes.

  16. Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium.

    Science.gov (United States)

    Somasundaram, M; Sivakumar, R

    2015-01-01

    Wireless Body Area Network (WBAN) is effectively used in healthcare to increase the value of the patient's life and also the value of healthcare services. The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. The security issue also arises in monitoring the user body function records. Most of the systems on the Wireless Body Area Network are not effective in facing the security deployment issues. To access the patient's information with higher security on WBAN, Game Theory with Stackelberg Security Equilibrium (GTSSE) is proposed in this paper. GTSSE mechanism takes all the players into account. The patients are monitored by placing the power position authority initially. The position authority in GTSSE is the organizer and all the other players react to the organizer decision. Based on our proposed approach, experiment has been conducted on factors such as security ratio based on patient's health information, system flexibility level, energy consumption rate, and information loss rate. Stackelberg Security considerably improves the strength of solution with higher security. PMID:26759829

  17. The research of controller area network on hybrid electrical vehicle

    Institute of Scientific and Technical Information of China (English)

    Wu Hongxing; Song Liwei; Kou Baoquan; Cheng Shukang

    2006-01-01

    It is of increasing importance to design and implement vehicle networks for transferring information between electrical control units on Hybrid Electrical Vehicle (HEV). This paper presents a scheme of using Controller Area Network (CAN) technology to realize communication and datasharing between the electrical units on the HEV. The principle and communication protocol of Electrical Control Units (ECU) CAN node are introduced. By considering different sensitivity of the devices to the latency of data transportation, a new design procedure is proposed for the purpose of simplifying network codes and wiring harness, reducing assembly space and weight, improving assembly efficiency, and enhancing fault-diagnose in auto networks.

  18. Designing application software in wide area network settings

    Science.gov (United States)

    Makpangou, Mesaac; Birman, Ken

    1990-01-01

    Progress in methodologies for developing robust local area network software has not been matched by similar results for wide area settings. The design of application software spanning multiple local area environments is examined. For important classes of applications, simple design techniques are presented that yield fault tolerant wide area programs. An implementation of these techniques as a set of tools for use within the ISIS system is described.

  19. Kinect Technology Game Play to Mimic Quake Catcher Network (QCN) Sensor Deployment During a Rapid Aftershock Mobilization Program (RAMP)

    Science.gov (United States)

    Kilb, D. L.; Yang, A.; Rohrlick, D.; Cochran, E. S.; Lawrence, J.; Chung, A. I.; Neighbors, C.; Choo, Y.

    2011-12-01

    The Kinect technology allows for hands-free game play, greatly increasing the accessibility of gaming for those uncomfortable using controllers. How it works is the Kinect camera transmits invisible near-infrared light and measures its "time of flight" to reflect off an object, allowing it to distinguish objects within 1 centimeter in depth and 3 mm in height and width. The middleware can also respond to body gestures and voice commands. Here, we use the Kinect Windows SDK software to create a game that mimics how scientists deploy seismic instruments following a large earthquake. The educational goal of the game is to allow the players to explore 3D space as they learn about the Quake Catcher Network's (QCN) Rapid Aftershock Mobilization Program (RAMP). Many of the scenarios within the game are taken from factual RAMP experiences. To date, only the PC platform (or a Mac running PC emulator software) is available for use, but we hope to move to other platforms (e.g., Xbox 360, iPad, iPhone) as they become available. The game is written in programming language C# using Microsoft XNA and Visual Studio 2010, graphic shading is added using High Level Shader Language (HLSL), and rendering is produced using XNA's graphics libraries. Key elements of the game include selecting sensor locations, adequately installing the sensor, and monitoring the incoming data. During game play aftershocks can occur unexpectedly, as can other problems that require attention (e.g., power outages, equipment failure, and theft). The player accrues points for quickly deploying the first sensor (recording as many initial aftershocks as possible), correctly installing the sensors (orientation with respect to north, properly securing, and testing), distributing the sensors adequately in the region, and troubleshooting problems. One can also net points for efficient use of game play time. Setting up for game play in your local environment requires: (1) the Kinect hardware ( $145); (2) a computer

  20. EMPLOYING SENSOR NETWORK TO GUIDE FIREFIGHTERS IN DANGEROUS AREA

    DEFF Research Database (Denmark)

    Koohi, Hamidreza; Nadernejad, Ehsan; Fathi, Mahmoud

    2010-01-01

    In this paper, we intend to focus on the sensor network applications in firefighting. A distributed algorithm is developed for the sensor network to guide firefighters through a burning area. The sensor network models the danger of the area under coverage as obstacles, and has the property to adapt...... itself against possible changes. The protocol developed, will integrate the artificial potential field of the sensors with the information of the intended place of moving firefighter so that it guides the firefighter step by step through the sensor network by choosing the safest path in dangerous zones....... This protocol is simulated by Visual-Sense and the simulation results are available. Keyword: Firefighter, Sensor Network, Potential Field, Area’s Danger, Navigation...

  1. Smoking among troops deployed in combat areas and its association with combat exposure among navy personnel in Sri Lanka

    Directory of Open Access Journals (Sweden)

    de Silva Varuni

    2012-07-01

    Full Text Available Abstract Background Among military personnel alcohol consumption and binge-drinking have increased but cigarette smoking has declined in the recent past. Although there is a strong association between smoking and PTSD the association between combat exposure and smoking is not clear. Methods This cross sectional study was carried out among representative samples of SLN Special Forces and regular forces deployed in combat areas. Both Special Forces and regular forces were selected using simple random sampling. Only personnel who had served continuously in combat areas during the one year period prior to end of combat operations were included in the study. Females were not included in the sample. The study assessed several mental health outcomes as well as alcohol use, smoking and cannabis use. Sample was classified according to smoking habits as never smokers, past smokers (those who had smoked in the past but not within the past year and current smokers (those smoking at least one cigarette within the past 12 months. Results Sample consisted of 259 Special Forces and 412 regular navy personnel. Prevalence of current smoking was 17.9% (95% CI 14.9-20.8. Of the sample 58.4% had never smoked and 23.7% were past smokers. Prevalence of current smoking was significantly higher among Special Forces personnel compared to regular forces. (OR 1.90 (95% CI 1.20-3.02. Personnel aged ≥35 years had the lowest prevalence of smoking (14.0%. Commissioned officers had a lower prevalence (12.1% than non commissioned officers or other ranks. After adjustment for demographic variables and service type there was significant association between smoking and combat experiences of seeing dead or wounded [OR 1.79 (95%CI 1.08-2.9], handling dead bodies [OR 2.47(95%CI 1.6-3.81], coming under small arms fire [OR 2.01(95%CI 1.28-3.15] and coming under mortar, missile and artillery fire [OR 2.02(95%CI 1.29-3.17]. There was significant association between the number of

  2. Area Green Efficiency (AGE) of Two Tier Heterogeneous Cellular Networks

    KAUST Repository

    Tabassum, Hina

    2012-10-03

    Small cell networks are becoming standard part of the future heterogeneous networks. In this paper, we consider a two tier heterogeneous network which promises energy savings by integrating the femto and macro cellular networks and thereby reducing CO2 emissions, operational and capital expenditures (OPEX and CAPEX) whilst enhancing the area spectral efficiency (ASE) of the network. In this context, we define a performance metric which characterize the aggregate energy savings per unit macrocell area and is referred to as area green efficiency (AGE) of the two tier heterogeneous network where the femto base stations are arranged around the edge of the reference macrocell such that the configuration is referred to as femto-on-edge (FOE). The mobile users in macro and femto cellular networks are transmitting with the adaptive power while maintaining the desired link quality such that the energy aware FOE configuration mandates to (i) save energy, and (ii) reduce the co-channel interference. We present a mathematical analysis to incorporate the uplink power control mechanism adopted by the mobile users and calibrate the uplink ASE and AGE of the energy aware FOE configuration. Next, we derive analytical expressions to compute the bounds on the uplink ASE of energy aware FOE configuration and demonstrate that the derived bounds are useful in evaluating the ASE under worst and best case interference scenarios. Simulation results are produced to demonstrate the ASE and AGE improvements in comparison to macro-only and macro-femto configuration with uniformly distributed femtocells.

  3. A Distributed Multiagent System Architecture for Body Area Networks Applied to Healthcare Monitoring

    Directory of Open Access Journals (Sweden)

    Filipe Felisberto

    2015-01-01

    Full Text Available In the last years the area of health monitoring has grown significantly, attracting the attention of both academia and commercial sectors. At the same time, the availability of new biomedical sensors and suitable network protocols has led to the appearance of a new generation of wireless sensor networks, the so-called wireless body area networks. Nowadays, these networks are routinely used for continuous monitoring of vital parameters, movement, and the surrounding environment of people, but the large volume of data generated in different locations represents a major obstacle for the appropriate design, development, and deployment of more elaborated intelligent systems. In this context, we present an open and distributed architecture based on a multiagent system for recognizing human movements, identifying human postures, and detecting harmful activities. The proposed system evolved from a single node for fall detection to a multisensor hardware solution capable of identifying unhampered falls and analyzing the users’ movement. The experiments carried out contemplate two different scenarios and demonstrate the accuracy of our proposal as a real distributed movement monitoring and accident detection system. Moreover, we also characterize its performance, enabling future analyses and comparisons with similar approaches.

  4. Energy efficient medium access protocol for wireless medical body area sensor networks.

    Science.gov (United States)

    Omeni, O; Wong, A; Burdett, A J; Toumazou, C

    2008-12-01

    This paper presents a novel energy-efficient MAC Protocol designed specifically for wireless body area sensor networks (WBASN) focused towards pervasive healthcare applications. Wireless body area networks consist of wireless sensor nodes attached to the human body to monitor vital signs such as body temperature, activity or heart-rate. The network adopts a master-slave architecture, where the body-worn slave node periodically sends sensor readings to a central master node. Unlike traditional peer-to-peer wireless sensor networks, the nodes in this biomedical WBASN are not deployed in an ad hoc fashion. Joining a network is centrally managed and all communications are single-hop. To reduce energy consumption, all the sensor nodes are in standby or sleep mode until the centrally assigned time slot. Once a node has joined a network, there is no possibility of collision within a cluster as all communication is initiated by the central node and is addressed uniquely to a slave node. To avoid collisions with nearby transmitters, a clear channel assessment algorithm based on standard listen-before-transmit (LBT) is used. To handle time slot overlaps, the novel concept of a wakeup fallback time is introduced. Using single-hop communication and centrally controlled sleep/wakeup times leads to significant energy reductions for this application compared to more ldquoflexiblerdquo network MAC protocols such as 802.11 or Zigbee. As duty cycle is reduced, the overall power consumption approaches the standby power. The protocol is implemented in hardware as part of the Sensiumtrade system-on-chip WBASN ASIC, in a 0.13- mum CMOS process. PMID:23853128

  5. Towards a Software Framework to Support Deployment of Low Cost End-to-End Hydroclimatological Sensor Network

    Science.gov (United States)

    Celicourt, P.; Piasecki, M.

    2015-12-01

    Deployment of environmental sensors assemblies based on cheap platforms such as Raspberry Pi and Arduino have gained much attention over the past few years. While they are more attractive due to their ability to be controlled with a few programming language choices, the configuration task can become quite complex due to the need of having to learn several different proprietary data formats and protocols which constitute a bottleneck for the expansion of sensor network. In response to this rising complexity the Institute of Electrical and Electronics Engineers (IEEE) has sponsored the development of the IEEE 1451 standard in an attempt to introduce a common standard. The most innovative concept of the standard is the Transducer Electronic Data Sheet (TEDS) which enables transducers to self-identify, self-describe, self-calibrate, to exhibit plug-and-play functionality, etc. We used Python to develop an IEEE 1451.0 platform-independent graphical user interface to generate and provide sufficient information about almost ANY sensor and sensor platforms for sensor programming purposes, automatic calibration of sensors data, incorporation of back-end demands on data management in TEDS for automatic standard-based data storage, search and discovery purposes. These features are paramount to make data management much less onerous in large scale sensor network. Along with the TEDS Creator, we developed a tool namely HydroUnits for three specific purposes: encoding of physical units in the TEDS, dimensional analysis, and on-the-fly conversion of time series allowing users to retrieve data in a desired equivalent unit while accommodating unforeseen and user-defined units. In addition, our back-end data management comprises the Python/Django equivalent of the CUAHSI Observations Data Model (ODM) namely DjangODM that will be hosted by a MongoDB Database Server which offers more convenience for our application. We are also developing a data which will be paired with the data

  6. Synchronizing computer clocks using a local area network

    Science.gov (United States)

    Levine, Judah

    1990-01-01

    Researchers completed the first tests of a method to synchronize the clocks of networked computers to the National Institute of Standards and Technology (NIST) time scale. The method uses a server computer to disseminate the time to other clients on the same local-area network. The server is synchronized to NIST using the ACTS protocol over a dial-up telephone line. The software in both the server and the parameters of this model are used to adjust the time of the local clock and the interval between calibration requests in a statistically optimum way. The algorithm maximizes the time between calibrations while at the same time keeping the time of the local clock correct within a specific tolerance. The method can be extended to synchronize computers linked over wide-area networks, and an experiment to test the performance of the algorithms over such networks is being planned.

  7. Interference-Aware Radio Resource Management for Local Area Wireless Networks

    Directory of Open Access Journals (Sweden)

    Ribeiro CássioB

    2011-01-01

    Full Text Available Interference-aware multiple access is an enabler to cost-efficient and reliable high data-rate local area wireless access. In this paper, we propose an interference-aware radio resource management scheme where receivers inform about their throughput, interference, and signal levels by means of broadcast messages tied to data reception. In the proposed scheme, the conventional scheduler is extended to interference-aware operation where individual scheduling decisions are based on estimated change in system-level performance. The performance of the proposed scheme is evaluated in system simulations where it is compared to a conventional scheduler and a centralized scheduler (global optimum. The convergence of the proposed scheduler is analyzed and signaling overhead of an example implementation is characterized. The results demonstrate that the proposed scheme enables fair and efficient wireless access in challenging interference scenarios, for example, multiple networks deployed in the same geographical area and sharing a common band.

  8. Shareholding Network in the Euro Area Banking Market

    OpenAIRE

    Nicolò Pecora; Alessandro Spelta

    2014-01-01

    Analyzing the topological properties of the network of shareholding relationships among the Euro Area banks we evaluate the relevance of a bank in the ?nancial system respect to ownership and control of other banks. We ?nd that the degree distribution of the European banking network displays power laws in both the binary and the weighted case. We also ?nd that the exponents are linked by a scaling relation revealing a direct connection between an increase of control diversi?cation and an incr...

  9. Local area networks an introduction to the technology

    CERN Document Server

    McNamara, John E

    1985-01-01

    This concise book provides an objective introduction to local area networks - how they work, what they do, and how you can benefit from them. It outlines the pros and cons of the most common configurations so you can evaluate them in light of your own needs. You'll also learn about network software, with special emphasis on the ISO layered model of communications protocols.

  10. A Biometric Key Establishment Protocol for Body Area Networks

    OpenAIRE

    Lin Yao; Bing Liu; Guowei Wu; Kai Yao; Jia Wang

    2011-01-01

    Current advances in semiconductor technology have made it possible to implant a network of biosensors inside the human body for health monitoring. In the context of a body area network (BAN), the confidentiality and integrity of the sensitive health information is particularly important. In this paper, we present an ECG (electrocardiogram)-signal-based key establishment protocol to secure the communication between every sensor and the control unit before the physiological data are transferred...

  11. A trusted connection framework for multilevel secure Local Area Networks

    OpenAIRE

    Wilson, Jeffery Dwane.

    2000-01-01

    The Naval Postgraduate School is developing a Multilevel Secure Local Area Network (MLS LAN) that incorporates commercial-off-the-shelf client workstations to provide multiple users with simultaneous secure access to stored data of different sensitivity levels. The MLS LAN uses a Trusted Computing Base Extension (TCBE) in the LAN's client workstations to extend the TCB from the trusted server across the network to these workstations. Connections between elements of the LAN are under TCB contr...

  12. Wireless Body Area Networks for Healthcare: A Survey

    Directory of Open Access Journals (Sweden)

    Garth V. Crosby

    2012-06-01

    Full Text Available Wireless body area networks (WBANs are emerging as important networks, applicable in various fields. This paper surveys the WBANs that are designed for applications in healthcare. We present a comprehensive survey consisting of stand-alone sections focusing on important aspects of WBANs. We examine the following: monitoring and sensing, power efficient protocols, system architectures, routing and security. We conclude by discussing some open research issues, their potential solutions and future trends.

  13. Wireless Body Area Networks for Healthcare Applications: Protocol Stack Review

    OpenAIRE

    Luis Filipe; Florentino Fdez-Riverola; Nuno Costa; António Pereira

    2015-01-01

    Wireless Body Area Networks (WBANs) supporting healthcare applications are in early development stage but offer valuable contributions at monitoring, diagnostic, or therapeutic levels. They cover real-time medical information gathering obtained from different sensors with secure data communication and low power consumption. As a consequence of the increasing interest in the application of this type of networks, several articles dealing with different aspects of such systems have been publishe...

  14. Ecological Infrastructures on Road Networks in and around Forested Areas.

    OpenAIRE

    Gülci, Sercan; Akay, Abdullah E.

    2015-01-01

    The road networks are located in and around forested areas to ensure sustainable management of forest resources. However, it is crucial to improve roads due to their habitat fragmentation and the barrier effects on forest ecosystems. Especially the wild animals, as one of the important components of ecosystem, are detrimentally affected by road networks due to degradation, alteration, conversion, and loss of their habitats. In recent years, ecological infrastructures have been developed to pr...

  15. A local area computer network expert system framework

    Science.gov (United States)

    Dominy, Robert

    1987-01-01

    Over the past years an expert system called LANES designed to detect and isolate faults in the Goddard-wide Hybrid Local Area Computer Network (LACN) was developed. As a result, the need for developing a more generic LACN fault isolation expert system has become apparent. An object oriented approach was explored to create a set of generic classes, objects, rules, and methods that would be necessary to meet this need. The object classes provide a convenient mechanism for separating high level information from low level network specific information. This approach yeilds a framework which can be applied to different network configurations and be easily expanded to meet new needs.

  16. Active system area networks for data intensive computations. Final report

    Energy Technology Data Exchange (ETDEWEB)

    None

    2002-04-01

    The goal of the Active System Area Networks (ASAN) project is to develop hardware and software technologies for the implementation of active system area networks (ASANs). The use of the term ''active'' refers to the ability of the network interfaces to perform application-specific as well as system level computations in addition to their traditional role of data transfer. This project adopts the view that the network infrastructure should be an active computational entity capable of supporting certain classes of computations that would otherwise be performed on the host CPUs. The result is a unique network-wide programming model where computations are dynamically placed within the host CPUs or the NIs depending upon the quality of service demands and network/CPU resource availability. The projects seeks to demonstrate that such an approach is a better match for data intensive network-based applications and that the advent of low-cost powerful embedded processors and configurable hardware makes such an approach economically viable and desirable.

  17. Protocol of Magnetic Field Area Network and its Applications

    International Nuclear Information System (INIS)

    The social needs are increasing in the wireless communication technology based on sensors for the monitoring of natural disasters such as avalanche and storm, the management of underground conditions from ground sinking and landslide, the monitoring of pipes, wires buried under the ground, the management of building and bridge, and the monitoring of the pollutions such as soils and water. However, the conventional wireless communication systems based on EM (Electro Magnetic) waves have not supported reliable communication because of large signal strength attenuation around soil, water, and metals. In order to handle this problem, various efforts in the wireless communication area have been conducted. Magnetic Field Area Network (MFAN) supports the reliable communication service without large signal attenuation around water, soil, and metal. Therefore, Magnetic Field Area Network (MFAN) is expected to be one of promising solutions to the limit of the conventional technologies such as Radio Frequency Indentification (RFID) and Wireless Sensor Network (WSN)

  18. Simulator configuration management systems and local area networks

    International Nuclear Information System (INIS)

    The proposed revisions to American Nuclear Society 3.5-1985 (Section 5) (Draft for American National Standards Institute-ANS-3.5-1990) require nuclear powered Utilities to establish a Simulator Configuration Management System (CMS). Solutions have been presented by S3 Technologies that use a relational database approach to establish a simulator design database. This database can be used as a powerful informational tool by many users, but only if the database supports multi-user capabilities. Local Area Networks (LANs) provide the means of inexpensive manner. Moreover, LANs can improve all types of communications, not just database sharing, through the use of E-mail and multi- user word processing packages. This paper provides an overview of commercially available local area networks. Topics covered will be LAN definitions, LAN applications (CMS, CAD/CAM, and data processing), the advantages and restrictions of local area networking, the specific technologies of the LAN (media, topologies, bridges, and gateways), and LAN standards

  19. Protocol of Magnetic Field Area Network and its Applications

    Energy Technology Data Exchange (ETDEWEB)

    Won, Yunjae; Kang, Shinjae; Lim, Seungok [Korea Electronics Technology Institute, Seoul (Korea, Republic of); Kahng, Hyunkook [Korea Univ., Seoul (Korea, Republic of)

    2012-03-15

    The social needs are increasing in the wireless communication technology based on sensors for the monitoring of natural disasters such as avalanche and storm, the management of underground conditions from ground sinking and landslide, the monitoring of pipes, wires buried under the ground, the management of building and bridge, and the monitoring of the pollutions such as soils and water. However, the conventional wireless communication systems based on EM (Electro Magnetic) waves have not supported reliable communication because of large signal strength attenuation around soil, water, and metals. In order to handle this problem, various efforts in the wireless communication area have been conducted. Magnetic Field Area Network (MFAN) supports the reliable communication service without large signal attenuation around water, soil, and metal. Therefore, Magnetic Field Area Network (MFAN) is expected to be one of promising solutions to the limit of the conventional technologies such as Radio Frequency Indentification (RFID) and Wireless Sensor Network (WSN)

  20. Impact of High Power Interference Sources in Planning and Deployment of Wireless Sensor Networks and Devices in the 2.4 GHz Frequency Band in Heterogeneous Environments

    Directory of Open Access Journals (Sweden)

    Francisco Falcone

    2012-11-01

    Full Text Available In this work, the impact of radiofrequency radiation leakage from microwave ovens and its effect on 802.15.4 ZigBee-compliant wireless sensor networks operating in the 2.4 GHz Industrial Scientific Medical (ISM band is analyzed. By means of a novel radioplanning approach, based on electromagnetic field simulation of a microwave oven and determination of equivalent radiation sources applied to an in-house developed 3D ray launching algorithm, estimation of the microwave oven’s power leakage is obtained for the complete volume of an indoor scenario. The magnitude and the variable nature of the interference is analyzed and the impact in the radio link quality in operating wireless sensors is estimated and compared with radio channel measurements as well as packet measurements. The measurement results reveal the importance of selecting an adequate 802.15.4 channel, as well as the Wireless Sensor Network deployment strategy within this type of environment, in order to optimize energy consumption and increase the overall network performance. The proposed method enables one to estimate potential interference effects in devices operating within the 2.4 GHz band in the complete scenario, prior to wireless sensor network deployment, which can aid in achieving the most optimal network topology.

  1. A middleware architecture for autonomic software deployment

    OpenAIRE

    Matougui, Mohamed El Amine; LERICHE, Sébastien

    2012-01-01

    International audience Autonomic software deployment in open networked environments such as mobile and ad hoc networks is an open issue. Some solutions to software deployment exist; but, they are usable only within static topologies of devices. We propose a middleware architecture providing a constraint-based language guiding the deployment process at a high level and an autonomous agent-based system for establishing and maintaining a software deployment according to a deployment plan. Con...

  2. INTERFERENCES BETWEEN THE ECOLOGICAL NETWORK AND URBANIZED AREAS IN POLAND

    Directory of Open Access Journals (Sweden)

    IWONA ZWIERZCHOWSKA

    2008-06-01

    Full Text Available This paper presents spatial relations between Polish urban areas and valuable habitats and links between them composing the country’s ecological network. The quantitative analysis for 891 towns and cities was conducted using GIS techniques based on cartographic vector data and statistical data. Valuable habitats and links between them, such as national parks, landscape parks, CORINE biotopes sites, wildlife corridors linking NATURA 2000 sites and ECONET areas, can be found in 72% of Polish towns and cities. The proportion of artificial surfaces in those areas is different depending on the size of a town or city and its location. Urban areas with the highest index of presence of valuable habitats and links between them are concentrated in the south of Poland, where settlement network is most dense. However, in the case of those areas the proportion of artificial surfaces interfering with the ecological network is lower than Poland’s average, being 16%. The pressure of anthropogenic land cover extending onto the country’s ecological network is most conspicuous in urban areas with a population of at least several dozen thousand residents where the average developed area is 20.8% of their total area. The danger for the continuity of the nature system is best seen in the north westernPoland, where artificial surfaces interference in towns and cities is largest. The analysis performed identified 82 towns and cities, in which the preservation of the continuity of the ecological networkshould be a priority in spatial management because of a higher than average index of the presence of valuable habitats and links between them and large proportion of artificial surfaces in those areas.

  3. A Graph Theoretical Approach for Network Coding in Wireless Body Area Networks

    OpenAIRE

    Byrne, Eimear; Manada, Akiko; Marinkovic, Stevan; Popovici, Emanuel

    2011-01-01

    Modern medical wireless systems, such as wireless body area networks (WBANs), are applications of wireless networks that can be used as a tool of data transmission between patients and doctors. Accuracy of data transmission is an important requirement for such systems. In this paper, we will propose a WBAN which is robust against erasures and describe its properties using graph theoretic techniques.

  4. Information manual for the experimentation of the deployment of optical fibers on public power distribution networks; Notice d'information pour l'experimentation du deploiement de fibres optiques sur les reseaux publics d'electricite

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    During the French inter-ministry committee for the national development (CIADT) of July 9, 2001, the government decided to launch a feasibility study about the deployment of telecommunication optical fibers over the whole territory using the electricity transportation grid. The aim is to give access to high-speed Internet to everyone and at a reasonable cost. This manual summarizes the technical, legal and economical results of the study carried out by the working group: 1 - the actors in concern (managers of power transportation and distribution networks, country authorities, managers and users of telecommunication infrastructures, regulatory agencies, financial organizations); 2 - the telecommunication networks on power lines; 3 - the feasibility of the experimentation (relations between the different partners, conditions); 4 - the implementation of the experimentation (useful contacts, contracts); 5 - the experimentation areas. Appendixes. (J.S.)

  5. Unobstructive Body Area Networks (BAN for Efficient Movement Monitoring

    Directory of Open Access Journals (Sweden)

    António Pereira

    2012-09-01

    Full Text Available The technological advances in medical sensors, low-power microelectronics and miniaturization, wireless communications and networks have enabled the appearance of a new generation of wireless sensor networks: the so-called wireless body area networks (WBAN. These networks can be used for continuous monitoring of vital parameters, movement, and the surrounding environment. The data gathered by these networks contributes to improve users’ quality of life and allows the creation of a knowledge database by using learning techniques, useful to infer abnormal behaviour. In this paper we present a wireless body area network architecture to recognize human movement, identify human postures and detect harmful activities in order to prevent risk situations. The WBAN was created using tiny, cheap and low-power nodes with inertial and physiological sensors, strategically placed on the human body. Doing so, in an as ubiquitous as possible way, ensures that its impact on the users’ daily actions is minimum. The information collected by these sensors is transmitted to a central server capable of analysing and processing their data. The proposed system creates movement profiles based on the data sent by the WBAN’s nodes, and is able to detect in real time any abnormal movement and allows for a monitored rehabilitation of the user.

  6. Unobstructive Body Area Networks (BAN) for efficient movement monitoring.

    Science.gov (United States)

    Felisberto, Filipe; Costa, Nuno; Fdez-Riverola, Florentino; Pereira, António

    2012-01-01

    The technological advances in medical sensors, low-power microelectronics and miniaturization, wireless communications and networks have enabled the appearance of a new generation of wireless sensor networks: the so-called wireless body area networks (WBAN). These networks can be used for continuous monitoring of vital parameters, movement, and the surrounding environment. The data gathered by these networks contributes to improve users' quality of life and allows the creation of a knowledge database by using learning techniques, useful to infer abnormal behaviour. In this paper we present a wireless body area network architecture to recognize human movement, identify human postures and detect harmful activities in order to prevent risk situations. The WBAN was created using tiny, cheap and low-power nodes with inertial and physiological sensors, strategically placed on the human body. Doing so, in an as ubiquitous as possible way, ensures that its impact on the users' daily actions is minimum. The information collected by these sensors is transmitted to a central server capable of analysing and processing their data. The proposed system creates movement profiles based on the data sent by the WBAN's nodes, and is able to detect in real time any abnormal movement and allows for a monitored rehabilitation of the user. PMID:23112726

  7. Lightweight and confidential data discovery and dissemination for wireless body area networks.

    Science.gov (United States)

    He, Daojing; Chan, Sammy; Zhang, Yan; Yang, Haomiao

    2014-03-01

    As a special sensor network, a wireless body area network (WBAN) provides an economical solution to real-time monitoring and reporting of patients' physiological data. After a WBAN is deployed, it is sometimes necessary to disseminate data into the network through wireless links to adjust configuration parameters of body sensors or distribute management commands and queries to sensors. A number of such protocols have been proposed recently, but they all focus on how to ensure reliability and overlook security vulnerabilities. Taking into account the unique features and application requirements of a WBAN, this paper presents the design, implementation, and evaluation of a secure, lightweight, confidential, and denial-of-service-resistant data discovery and dissemination protocol for WBANs to ensure the data items disseminated are not altered or tampered. Based on multiple one-way key hash chains, our protocol provides instantaneous authentication and can tolerate node compromise. Besides the theoretical analysis that demonstrates the security and performance of the proposed protocol, this paper also reports the experimental evaluation of our protocol in a network of resource-limited sensor nodes, which shows its efficiency in practice. In particular, extensive security analysis shows that our protocol is provably secure. PMID:24608049

  8. Compute and Storage Clouds Using Wide Area High Performance Networks

    CERN Document Server

    Grossman, Robert L; Sabala, Michael; Zhang, Wanzhi

    2008-01-01

    We describe a cloud based infrastructure that we have developed that is optimized for wide area, high performance networks and designed to support data mining applications. The infrastructure consists of a storage cloud called Sector and a compute cloud called Sphere. We describe two applications that we have built using the cloud and some experimental studies.

  9. Semantic Interoperability in Body Area Sensor Networks and Applications

    NARCIS (Netherlands)

    Bui, V.T.; Brandt, P.; Liu, H.; Basten, T.; Lukkien, J.

    2014-01-01

    Crucial to the success of Body Area Sensor Networks is the flexibility with which stakeholders can share, extend and adapt the system with respect to sensors, data and functionality. The first step is to develop an interoperable platform with explicit interfaces, which takes care of common managemen

  10. Species interactions–area relationships: biological invasions and network structure in relation to island area

    OpenAIRE

    Sugiura, Shinji

    2010-01-01

    The relationship between species number and island area is a fundamental rule in ecology. However, the extent to which interactions with exotic species and how the structure of species interactions is related to island area remain unexplored. Here, I document the relationship between island area and (i) interactions with exotic species and (ii) network structure of species interactions in the context of mutualistic interactions between ants and extrafloral nectary-bearing plants on the oceani...

  11. Optimizing Cloud-RAN Deployments in Real-life Scenarios Using Microwave Radio

    DEFF Research Database (Denmark)

    Al-obaidi, Rami; Checko, Aleksandra; Holm, Henrik;

    2015-01-01

    Cloud Radio Access Network (C-RAN) is a new architecture designed to be the candidate for enabling future mobile networks. However, it will be deployed only if it is economically viable. In this paper we investigate the technological options of C-RAN deployments. By using analytical methods we...... derive engineering guidelines for minimizing the CAPital EXpenditure (CAPEX) of C-RAN deployment. We show for which population density and span of BBU Pool coverage usage of Microwave Radio (MWR) links is viable. For larger scale deployment we recommend to divide the area into multiple BBU Pools....

  12. The Development & Implementation of Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Dr Madhumita Dash

    2014-03-01

    Full Text Available Abstract : The increasing use of wireless networks and the constant miniaturization of electrical devices has empowered the development of Wireless Body Area Net-works . Wireless Body Area Network is a system of devices in close proximity to a person’s body that cooperate for the benefit of the user where various sensors are attached on clothing or on the body or even implanted under the skin. This paper shows several uses of the BAN technology and the most obvious application of a BAN is in the medical sector, however there are also more recreational uses to BANs. Using a WBAN, the patient experiences a greater physical mobility and is no longer compelled to stay in the hospital. This paper offers a survey of the concept of Wireless Body Area Networks. As WBANs are placed on the human body and often transport private data, security is also considered. This paper will discuss the technologies surrounding BANs, as well as several common applications for BANs.

  13. Emerging Trends in Healthcare Adoption of Wireless Body Area Networks.

    Science.gov (United States)

    Rangarajan, Anuradha

    2016-01-01

    Real-time personal health monitoring is gaining new ground with advances in wireless communications. Wireless body area networks (WBANs) provide a means for low-powered sensors, affixed either on the human body or in vivo, to communicate with each other and with external telecommunication networks. The healthcare benefits of WBANs include continuous monitoring of patient vitals, measuring postacute rehabilitation time, and improving quality of medical care provided in medical emergencies. This study sought to examine emerging trends in WBAN adoption in healthcare. To that end, a systematic literature survey was undertaken against the PubMed database. The search criteria focused on peer-reviewed articles that contained the keywords "wireless body area network" and "healthcare" or "wireless body area network" and "health care." A comprehensive review of these articles was performed to identify adoption dimensions, including underlying technology framework, healthcare subdomain, and applicable lessons-learned. This article benefits healthcare technology professionals by identifying gaps in implementation of current technology and highlighting opportunities for improving products and services. PMID:27413830

  14. Directional MAC Approach for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Md. Asdaque Hussain

    2011-01-01

    Full Text Available Wireless Body Area Networks (WBANs designed for medical, sports, and entertainment applications, have drawn the attention of academia and industry alike. A WBAN is a special purpose network, designed to operate autonomously to connect various medical sensors and appliances, located inside and/or outside of a human body. This network enables physicians to remotely monitor vital signs of patients and provide real time feedback for medical diagnosis and consultations. The WBAN system can offer two significant advantages: patient mobility due to their use of portable monitoring devices and a location independent monitoring facility. With its appealing dimensions, it brings about a new set of challenges, which we do not normally consider in such small sensor networks. It requires a scalable network in terms of heterogeneous data traffic, low power consumption of sensor nodes, integration in and around the body networking and coexistence. This work presents a medium access control protocol for WBAN which tries to overcome the aforementioned challenges. We consider the use of multiple beam adaptive arrays (MBAA at BAN Coordinator (BAN_C node. When used as a BAN_C, an MBAA can successfully receive two or more overlapping packets at the same time. Each beam captures a different packet by automatically pointing its pattern toward one packet while annulling other contending packets. This paper describes how an MBAA can be integrated into a single hope star topology as a BAN_C. Simulation results show the performance of our proposed protocol.

  15. Directional MAC approach for wireless body area networks.

    Science.gov (United States)

    Hussain, Md Asdaque; Alam, Md Nasre; Kwak, Kyung Sup

    2011-01-01

    Wireless Body Area Networks (WBANs) designed for medical, sports, and entertainment applications, have drawn the attention of academia and industry alike. A WBAN is a special purpose network, designed to operate autonomously to connect various medical sensors and appliances, located inside and/or outside of a human body. This network enables physicians to remotely monitor vital signs of patients and provide real time feedback for medical diagnosis and consultations. The WBAN system can offer two significant advantages: patient mobility due to their use of portable monitoring devices and a location independent monitoring facility. With its appealing dimensions, it brings about a new set of challenges, which we do not normally consider in such small sensor networks. It requires a scalable network in terms of heterogeneous data traffic, low power consumption of sensor nodes, integration in and around the body networking and coexistence. This work presents a medium access control protocol for WBAN which tries to overcome the aforementioned challenges. We consider the use of multiple beam adaptive arrays (MBAA) at BAN Coordinator (BAN_C) node. When used as a BAN_C, an MBAA can successfully receive two or more overlapping packets at the same time. Each beam captures a different packet by automatically pointing its pattern toward one packet while annulling other contending packets. This paper describes how an MBAA can be integrated into a single hope star topology as a BAN_C. Simulation results show the performance of our proposed protocol. PMID:22346602

  16. Performance Analysis of Traffic Sensitive Wireless Body Area Networks

    OpenAIRE

    ÇALHAN, Ali

    2015-01-01

    The cooperation of micro-electronics, wireless communications, integrated circuits and sensor networks have led to rise of Wireless Body Area Networks (WBANs). The aim of WBANs is to keep a human body under control by means of a set of small-size, lightweight, and low-power sensor nodes placed in, on, or around the human body. The WBANs are also used in a number of new applications namely health monitoring, entertainment, sports, and military applications. The sensor nodes in WBANs have limit...

  17. Antennas, Wave Propagation, and Localization in Wireless Body Area Networks

    OpenAIRE

    Chandra, Rohit

    2014-01-01

    A network of communicating wireless devices that are implantable, wearable or within close proximity of a human body is called wireless body area network (WBAN). The propagation channels for the devices in the WBAN are either through the body or over the body. This results in the attenuation and the absorption of electromagnetic waves radiated by the antenna of these devices due to the lossy tissues of the body. With a proper antenna and knowledge of the signal loss between the devices in the...

  18. 覆盖网络中多服务静态部署算法%Static multi-service deployment algorithm on the overlay network

    Institute of Scientific and Technical Information of China (English)

    脱立恒; 倪宏; 李满天; 刘学

    2014-01-01

    针对因特网的覆盖网络中多服务在不同服务节点的部署问题,提出了一种保证平均请求转发延迟满足服务质量要求,以最小化服务部署规模为目标的服务部署模型.该模型在传统的单服务部署问题的基础上,增加了多服务的分配任务;为了合理均衡利用服务节点的服务器资源,引入并发上限限制单节点的并发数目.证明了该模型属于非确定性多项式时间完全问题,提出了两种贪婪启发式算法,两种算法可以在多项式时间内求解.实验结果表明,所提出模型和启发式方法能够大大降低服务部署规模,分别将服务部署规模降低为原始规模的41%和47.8%.%The Static Multi-Service deployment Model SMSPM for short,is proposed to deal with the problem of overlay network multi-service deployment on the Internet.The SMSPM minimizes the scale of service deployment as a target and guarantees the average request forwarding delay to satisfy the quality of service.Based on single service deployment,the SMSPM allocates multiple services to different service nodes We introduce the concurrent upper limit on the number of concurrents in a single node to use reasonably server resources of service nodes.We prove that the SMSPM problem is NP-Complete.We propose two greedy heuristic algorithms,NBND and BND.NBND and BND can solve the problem in the polynomial time.Experimental results show that NBND and BND.SMSPM and two greedy heuristic algorithms can greatly lower the scale of multi-service deployment.BND and NBND can reduce the scale of multi-service deployment to 41% and 47.8% of the original scale of multi-service deployment.

  19. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things

    Science.gov (United States)

    Wang, Lusheng; Wang, Yamei; Ding, Zhizhong; Wang, Xiumin

    2015-01-01

    With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs) tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS) game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI). In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG), forming a congestion game with ICI (CGI) and a congestion game with capacity (CGC). For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE). Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell) is profoundly revealed, and the collapse points are identified. PMID:26393617

  20. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things.

    Science.gov (United States)

    Wang, Lusheng; Wang, Yamei; Ding, Zhizhong; Wang, Xiumin

    2015-01-01

    With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs) tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS) game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI). In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG), forming a congestion game with ICI (CGI) and a congestion game with capacity (CGC). For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE). Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell) is profoundly revealed, and the collapse points are identified. PMID:26393617

  1. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things

    Directory of Open Access Journals (Sweden)

    Lusheng Wang

    2015-09-01

    Full Text Available With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI. In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG, forming a congestion game with ICI (CGI and a congestion game with capacity (CGC. For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE. Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell is profoundly revealed, and the collapse points are identified.

  2. Multiplex networks in metropolitan areas: generic features and local effects

    CERN Document Server

    Strano, Emanuele; Dobson, Simon; Barthelemy, Marc

    2015-01-01

    Most large cities are spanned by more than one transportation system. These different modes of transport have usually been studied separately: it is however important to understand the impact on urban systems of the coupling between them and we report in this paper an empirical analysis of the coupling between the street network and the subway for the two large metropolitan areas of London and New York. We observe a similar behaviour for network quantities related to quickest paths suggesting the existence of generic mechanisms operating beyond the local peculiarities of the specific cities studied. An analysis of the betweenness centrality distribution shows that the introduction of underground networks operate as a decentralising force creating congestions in places located at the end of underground lines. Also, we find that increasing the speed of subways is not always beneficial and may lead to unwanted uneven spatial distributions of accessibility. In fact, for London -- but not for New York -- there is ...

  3. Power allocation strategies to minimize energy consumption in wireless body area networks.

    Science.gov (United States)

    Kailas, Aravind

    2011-01-01

    The wide scale deployment of wireless body area networks (WBANs) hinges on designing energy efficient communication protocols to support the reliable communication as well as to prolong the network lifetime. Cooperative communications, a relatively new idea in wireless communications, offers the benefits of multi-antenna systems, thereby improving the link reliability and boosting energy efficiency. In this short paper, the advantages of resorting to cooperative communications for WBANs in terms of minimized energy consumption are investigated. Adopting an energy model that encompasses energy consumptions in the transmitter and receiver circuits, and transmitting energy per bit, it is seen that cooperative transmission can improve energy efficiency of the wireless network. In particular, the problem of optimal power allocation is studied with the constraint of targeted outage probability. Two strategies of power allocation are considered: power allocation with and without posture state information. Using analysis and simulation-based results, two key points are demonstrated: (i) allocating power to the on-body sensors making use of the posture information can reduce the total energy consumption of the WBAN; and (ii) when the channel condition is good, it is better to recruit less relays for cooperation to enhance energy efficiency. PMID:22254777

  4. Network Architecture, Security Issues, and Hardware Implementation of a Home Area Network for Smart Grid

    OpenAIRE

    Sergio Saponara; Tony Bacchillone

    2012-01-01

    This paper discusses aims, architecture, and security issues of Smart Grid, taking care of the lesson learned at University of Pisa in research projects on smart energy and grid. A key element of Smart Grid is the energy home area network (HAN), for which an implementation is proposed, dealing with its security aspects and showing some solutions for realizing a wireless network based on ZigBee. Possible hardware-software architectures and implementations using COTS (Commercial Off The Shelf) ...

  5. Reliable and Energy Efficient Network Protocols for Wireless Body Area Networks

    OpenAIRE

    Latré, B.

    2008-01-01

    In a wireless Body Area Network (WBAN) various sensors are attached on clothing, on the body or are even implanted under the skin. The wireless nature of the network and the wide variety of sensors offers numerous new, practical and innovative applications. A motivating example can be found in the world of health monitoring. The sensors of the WBAN measure for example the heartbeat, the body temperature or record a prolonged electrocardiogram. Using a WBAN, the patient experiences a greater p...

  6. Interference Mitigation for Cyber-Physical Wireless Body Area Network System Using Social Networks

    OpenAIRE

    Zhang, Zhaoyang; WANG, HONGGANG; Wang, Chonggang; Fang, Hua

    2013-01-01

    Wireless body area networks (WBANs) are cyber-physical systems (CPS) that have emerged as a key technology to provide real-time health monitoring and ubiquitous healthcare services. WBANs could operate in dense environments such as in a hospital and lead to a high mutual communication interference in many application scenarios. The excessive interferences will significantly degrade the network performance including depleting the energy of WBAN nodes more quickly, and even eventually jeopardiz...

  7. Hybrid Wavelength Routed and Optical Packet Switched Ring Networks for the Metropolitan Area Network

    OpenAIRE

    Nord, Martin

    2005-01-01

    Increased data traffic in the metropolitan area network calls for new network architectures. This paper evaluates optical ring architectures based on optical packet switching, wavelength routing, and hybrid combinations of the two concepts. The evaluation includes overall throughput and fairness aspects in both uniform and unbalanced traffic scenarios, for both Poisson and bursty input traffic. Simulations show a trade-off between performance and complexity. Whilst the static wavelength route...

  8. REAL TIME ANALYSIS OF WIRELESS CONTROLLER AREA NETWORK

    Directory of Open Access Journals (Sweden)

    Gerardine Immaculate Mary

    2014-09-01

    Full Text Available It is widely known that Control Area Networks (CAN are used in real-time, distributed and parallel processing which cover manufacture plants, humanoid robots, networking fields, etc., In applications where wireless conditions are encountered it is convenient to continue the exchange of CAN frames within the Wireless CAN (WCAN. The WCAN considered in this research is based on wireless token ring protocol (WTRP; a MAC protocol for wireless networks to reduce the number of retransmissions due to collision and the wired counterpart CAN attribute on message based communication. WCAN uses token frame method to provide channel access to the nodes in the system. This method allow all the nodes to share common broadcast channel by taken turns in transmitting upon receiving the token frame which is circulating within the network for specified amount of time. This method provides high throughput in bounded latency environment, consistent and predictable delays and good packet delivery ratio. The most important factor to consider when evaluating a control network is the end-to-end time delay between sensors, controllers, and actuators. The correct operation of a control system depends on the timeliness of the data coming over the network, and thus, a control network should be able to guarantee message delivery within a bounded transmission time. The proposed WCAN is modeled and simulated using QualNet, and its average end to end delay and packet delivery ratio (PDR are calculated. The parameters boundaries of WCAN are evaluated to guarantee a maximum throughput and a minimum latency time, in the case of wireless communications, precisely WCAN.

  9. Hybrid Wavelength Routed and Optical Packet Switched Ring Networks for the Metropolitan Area Network

    DEFF Research Database (Denmark)

    Nord, Martin

    Increased data traffic in the metropolitan area network calls for new network architectures. This paper evaluates optical ring architectures based on optical packet switching, wavelength routing, and hybrid combinations of the two concepts. The evaluation includes overall throughput and fairness...... aspects in both uniform and unbalanced traffic scenarios, for both Poisson and bursty input traffic. Simulations show a trade-off between performance and complexity. Whilst the static wavelength routed optical network is a good solutions for uniform traffic, the proposed hybrid architectures are more...

  10. An Algorithm for Technology Choice in Local Area Network Design

    OpenAIRE

    Ann S. Marucheck; Joanne M. Sulek

    1987-01-01

    Technological advances in both the manufacturing and office sectors have emphasized the need to link processors and communications equipment into Local Area Networks (LANs) to facilitate communication and promote resource sharing. Interviews with designers and users of LANs revealed that a primary problem in the acquisition of a LAN is making technology choices in a cost effective manner when the available technologies and their costs are constantly changing. Since no standards for technology...

  11. PROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKS

    OpenAIRE

    Sotirios Kontogiannis; George Kokkonis; Stavros Valsamidis

    2016-01-01

    Wireless Body Area Networks (WBAN) is the recent trend for localized and personalized medical services. For that purpose, several tele-medicine architectures and WBAN frameworks for patient monitoring have been proposed. This paper presents a new medical protocol MESETP (Medical Services Transport Protocol), that underlies data delivery for both real-time and non real-time medical services. Furthermore, performance tests of MESETP with existing real time protocols and non real-...

  12. A Review of Wireless Body Area Networks for Medical Applications

    OpenAIRE

    2010-01-01

    Recent advances in Micro-Electro-Mechanical Systems (MEMS) technology, integrated circuits, and wireless communication have allowed the realization of Wireless Body Area Networks (WBANs). WBANs promise unobtrusive ambulatory health monitoring for a long period of time and provide real-time updates of the patient's status to the physician. They are widely used for ubiquitous healthcare, entertainment, and military applications. This paper reviews the key aspects of WBANs for numerous applicati...

  13. An Overview of Wireless Local Area Network (WLAN)

    OpenAIRE

    AlShourbaji, Ibrahim

    2013-01-01

    Wireless Communication is an application of science and technology that has come to be vital for modern existence. From the early radio and telephone to current devices such as mobile phones and laptops, accessing the global network has become the most essential and indispensable part of our lifestyle. Wireless communication is an ever developing field, and the future holds many possibilities in this area. One expectation for the future in this field is that, the devices can be developed to s...

  14. A Large Area Fiber Optic Gyroscope on multiplexed fiber network

    OpenAIRE

    Costanzo, Giovanni Antonio; Pizzocaro, Marco; Clivati, Cecilia

    2013-01-01

    We describe a fiber optical gyroscope based on the Sagnac effect realized on a multiplexed telecom fiber network. Our loop encloses an area of 20 km2 and coexists with Internet data traffic. This Sagnac interferometer achieves a sensitivity of about (10-8 rad/s)/sqrt(Hz), thus approaching ring laser gyroscopes without using narrow linewidth laser nor sophisticated optics. The proposed gyroscope is sensitive enough for seismic applications, opening new possibilities for this kind of optical fi...

  15. A Large Area Fiber Optic Gyroscope on multiplexed fiber network

    OpenAIRE

    Clivati, Cecilia; Calonico, Davide; Giovanni A. Costanzo; Mura, Alberto; Pizzocaro, Marco; Levi, Filippo

    2012-01-01

    We describe a fiber optical gyroscope based on the Sagnac effect realized on a multiplexed telecom fiber network. Our loop encloses an area of 20 km^2 and coexists with Internet data traffic. This Sagnac interferometer achieves a sensitivity of about 1e-8 (rad/s)/sqrt(Hz), thus approaching ring laser gyroscopes without using narrow-linewidth laser nor sophisticated optics. The proposed gyroscope is sensitive enough for seismic applications, opening new possibilities for this kind of optical f...

  16. Adaptive Medium Access Control Protocol for Wireless Body Area Networks

    OpenAIRE

    Javaid, N.; Ahmad, A.; A. Rahim; Z.A. Khan; M. Ishfaq; Qasim, U.

    2014-01-01

    Wireless Body Area Networks (WBANs) are widely used for applications such as modern health-care systems, where wireless sensors (nodes) monitor the parameter(s) of interest. Nodes are provided with limited battery power and battery power is dependent on radio activity. MAC protocols play a key role in controlling the radio activity. Therefore, we present Adaptive Medium Access Control (A-MAC) protocol for WBANs supported by linear programming models for the minimization of energy consumption ...

  17. Wireless Local Area Networks with Multiple-Packet Reception Capability

    OpenAIRE

    Zhang, Ying Jun; Zheng, Peng Xuan; Liew, Soung Chang

    2007-01-01

    Thanks to its simplicity and cost efficiency, wireless local area network (WLAN) enjoys unique advantages in providing high-speed and low-cost wireless services in hot spots and indoor environments. Traditional WLAN medium-access-control (MAC) protocols assume that only one station can transmit at a time: simultaneous transmissions of more than one station causes the destruction of all packets involved. By exploiting recent advances in PHY-layer multiuser detection (MUD) techniques, it is pos...

  18. Ultra low power transceiver for wireless body area networks

    CERN Document Server

    Masuch, Jens

    2013-01-01

    This book describes the design of ultra low power transceivers for body area networks.  Since these applications have very limited energy resources, typically powered only by tiny batteries or through energy harvesting techniques, this book describes an architecture for a Bluetooth low energy transceiver to overcome these limitations. Coverage includes not only the main concepts for achieving low power consumption, but also the details of the circuit design and its implementation in a standard CMOS technology.     ·         Guides readers through the design of ultra low power transceivers for body area networks, from architecture to circuit-level implementation; ·         Describes 4 key strategies for ultra-low power transceiver design and specific, innovative techniques for circuit-level design; ·         Enables readers to design transceivers for body area networks that are 27% more energy efficient than those currently available; ·         Includes a review of the st...

  19. Development of a Real-Time Radiological Area Monitoring Network for Emergency Response at Lawrence Livermore National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Bertoldo, N; Hunter, S; Fertig, R; Laguna, G; MacQueen, D

    2004-03-08

    A real-time radiological sensor network for emergency response was developed and deployed at the Lawrence Livermore National Laboratory (LLNL). The Real-Time Radiological Area Monitoring (RTRAM) network is comprised of 16 Geiger-Mueller (GM) sensors positioned on the LLNL Livermore site perimeter to continuously monitor for a radiological condition resulting from a terrorist threat to site security and the health and safety of LLNL personnel. The RTRAM network sensor locations coincide with wind sector directions to provide thorough coverage of the one square mile site. These low-power sensors are supported by a central command center (CCC) and transmit measurement data back to the CCC computer through the LLNL telecommunications infrastructure. Alarm conditions are identified by comparing current data to predetermined threshold parameters and are validated by comparison with plausible dispersion modeling scenarios and prevailing meteorological conditions. Emergency response personnel are notified of alarm conditions by automatic radio and computer based notifications. A secure intranet provides emergency response personnel with current condition assessment data that enable them to direct field response efforts remotely. The RTRAM network has proven to be a reliable system since initial deployment in August 2001 and maintains stability during inclement weather conditions.

  20. Development of a Real-Time Radiological Area Monitoring Network for Emergency Response at Lawrence Livermore National Laboratory

    International Nuclear Information System (INIS)

    A real-time radiological sensor network for emergency response was developed and deployed at the Lawrence Livermore National Laboratory (LLNL). The Real-Time Radiological Area Monitoring (RTRAM) network is comprised of 16 Geiger-Mueller (GM) sensors positioned on the LLNL Livermore site perimeter to continuously monitor for a radiological condition resulting from a terrorist threat to site security and the health and safety of LLNL personnel. The RTRAM network sensor locations coincide with wind sector directions to provide thorough coverage of the one square mile site. These loW--power sensors are supported by a central command center (CCC) and transmit measurement data back to the CCC computer through the LLNL telecommunications infrastructure. Alarm conditions are identified by comparing current data to predetermined threshold parameters and are validated by comparison with plausible dispersion modeling scenarios and prevailing meteorological conditions. Emergency response personnel are notified of alarm conditions by automatic radio and computer based notifications. A secure intranet provides emergency response personnel with current condition assessment data that enable them to direct field response efforts remotely. The RTRAM network has proven to be a reliable system since initial deployment in August 2001 and maintains stability during inclement weather conditions

  1. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge

    OpenAIRE

    Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo

    2008-01-01

    For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to prov...

  2. Automated Deployment of Customer-Premises Equipment

    OpenAIRE

    Åberg, Christian

    2016-01-01

    Zero touch deployment tools perform installation and configuration of computer networking devices without human interaction. Modern zero touch deployment tools generally lack support for routers and are platform dependent. This forces Internet Service Providers to rely on manual node deployment methods when deploying Customer-Premise Equipment which is time consuming and error prone. This thesis investigates how the process of deploying Customer-Premises Equipment can be automated and optimize...

  3. "A Fiberoptic Local-Area-Network Solution For Tactical Command And Control Systems"

    Science.gov (United States)

    Vlasak, Weldon; Pfister, Gerhard

    1983-11-01

    This paper examines key network requirements for the elements of distributed tactical command and control system. System concepts are evolved that support implementation solutions with emphasis on advanced technologies. Mobile command and control elements of ground and air forces are becoming more vulnerable in an ever increasing threat environment. This vulnerability is caused by the employment of these elements in a manner characterized by functional and physical centralization. A command and control unit typically consists of a centralized operations center surrounded by closely clustered communications and surveillance equipments. Because these elements have different deployment and employment requirements, the command and control unit is not optimized in terms of survivability, mobility, effectiveness, and operational flexibility. In recent years, convincing arguments have been put forth to the effect that distributed operations centers, redundantly structured communication functions, and netted surveillance systems can provide the necessary attributes to be effective in the advanced threat environment. Current technology does not meet the requirements of such a system. A local area network provides a power interconnection mechanism for the distributed elements of the command and control system. The requirements are for a rapid, efficient, and reliable means of transferring voice and data communications between elements. The topology of such a network must primarily consider survivability and reliability of communications interchanges with special emphasis on continued operations under degraded conditions. When such conditions occur, e.g., the result of combat attrition, a complete command and control capability should remain even though it may be at somewhat of a reduced capacity. The interconnection medium for the local area network should be immune to external disruptions, e.g., EMI, EMP, or C3CM, and should have a wide transmission bandwidth with a minimum

  4. Terabit Optical Local Area Networks for Multiprocessing Systems

    Science.gov (United States)

    Szymanski, Ted H.; Au, Albert; Lafrenière-Roula, Myriam; Tyan, Victor; Supmonchai, Boonchuay; Wong, James; Zerrouk, Belkacem; Obenaus, Stefan Thomas

    1998-01-01

    The design of a scalable optical local area network for multiprocessing systems is described. Each workstation has a parallel-fiber-ribbon optical link to a centralized complementary metal-oxide silicon (CMOS) switch core, implemented on a single compact printed circuit board (PCB). When the Motorola Optobus fiber technology is used, each workstation has a data bandwidth of 6.4 Gbits /s to the core. A centralized switch core interconnecting 32 workstations supports a 204-Gbit /s aggregate data bandwidth. The switch core is based on a conventional broadcast-and-select architecture, implemented with parallel CMOS integrated circuits (IC s). The switch core scales well; by incorporation of the CMOS optoelectronic IC s with optical input -output, the electrical core can be reduced to a single-chip optoelectronic IC with terabit capacities. A prototype of an optoelectronic switch core has been fabricated and is described. The appeal of the architecture includes its reliance on commercially available parallel-fiber technology, its reliance on the well-developed markets of local area networks and networks of workstations, and its smooth scalability from the electrical to optical domains as technology matures.

  5. Capacity Limit, Link Scheduling and Power Control in Wireless Networks

    Science.gov (United States)

    Zhou, Shan

    2013-01-01

    The rapid advancement of wireless technology has instigated the broad deployment of wireless networks. Different types of networks have been developed, including wireless sensor networks, mobile ad hoc networks, wireless local area networks, and cellular networks. These networks have different structures and applications, and require different…

  6. On achieving network throughput demand in cognitive radio-based home area networks

    NARCIS (Netherlands)

    Sarijari, M.A.B.; Abdullah, M.S.; Janssen, G.J.M.; Van der Veen, A.J.

    2015-01-01

    The growing number of wireless devices for in-house use is causing a more intense use of the spectrum to satisfy the required quality-of-service such as throughput. This has contributed to spectrum scarcity and interference problems particularly in home area networks (HAN). Cognitive radio (CR) has

  7. Developments for a passive optical node network for deployment in deep sea enabling time synchronous data readout

    International Nuclear Information System (INIS)

    An overview of an optical network design for a Very Large Volume neutrino Telescope (VLVnT) [Proceedings of the Workshop on Technical aspects of a VLVnT in the Mediterranean Sea, ISBN90-6488-026-3] residing on the seabed is presented. The passive optical network transports all data to shore in a synchronous way without data congestion. Due to fixed propagation delay and low jitter over the fiber network an accurate event time stamp can be generated onshore. The determined signal propagation can also serve for detector calibration. The results of a proto type vertical cable test are presented.

  8. Energy-efficient MAC Protocol for Patient Personal Area Networks.

    Science.gov (United States)

    Lamprinos, I; Prentza, A; Sakka, E; Koutsouris, D

    2005-01-01

    The formulation of a Personal Area Network (PAN), consisting of a wireless infrastructure of medical sensors, attached to patient's body, and a supervising device carried by them, lays the path for continuous and real-time monitoring of vital signs without discomforting the person in question. This infrastructure enhances the context of remote healthcare services by supporting flexible acquisition of crucial vital signs, while at the same time it provides more convenience to the patient. Aiming at the exploitation of the inherent features and requirements of wireless medical sensor networks, in this paper we focus on the main design guidelines of a low power Medium Access Control (MAC) protocol, designated to support a patient PAN. The proposed protocol intends to improve energy efficiency in such applications and thus is oriented towards the prevention of main energy wastage sources, such as collision, idle listening and power outspending. PMID:17281057

  9. A security suite for wireless body area networks

    CERN Document Server

    Sampangi, Raghav V; Urs, Shalini R; Sampalli, Srinivas

    2012-01-01

    Wireless Body Area Networks (WBANs) have gained a lot of research attention in recent years since they offer tremendous benefits for remote health monitoring and continuous, real-time patient care. However, as with any wireless communication, data security in WBANs is a challenging design issue. Since such networks consist of small sensors placed on the human body, they impose resource and computational restrictions, thereby making the use of sophisticated and advanced encryption algorithms infeasible. This calls for the design of algorithms with a robust key generation / management scheme, which are reasonably resource optimal. This paper presents a security suite for WBANs, comprised of IAMKeys, an independent and adaptive key management scheme for improving the security of WBANs, and KEMESIS, a key management scheme for security in inter-sensor communication. The novelty of these schemes lies in the use of a randomly generated key for encrypting each data frame that is generated independently at both the s...

  10. Modbus based smart radiation monitoring network of area gamma monitors

    International Nuclear Information System (INIS)

    With the advent of Low cost microprocessors/micro controllers and VLSI based ASIPs, the field of instrumentation is undergoing a rapid change. Connectivity of a remote computer to the instruments for accessing the data and other diagnostic information has become one of the important requirements of all modern instruments, in addition to providing accurate measurement data. This is more so, in case of those instruments, which are located in some hostile environments such as radioactive zones of nuclear power reactor. The details of a network of Area Gamma Monitors (AGM) using the modbus protocol, are presented in this paper. The paper highlights the details of the AGM, protocol implementation and the windows based graphical user interface, implemented on a PC that can act as a master node, for interacting with various AGMs on the network. (author)

  11. Performance Analysis of Traffic Sensitive Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Ali Çalhan

    2015-10-01

    Full Text Available The cooperation of micro-electronics, wireless communications, integrated circuits and sensor networks have led to rise of Wireless Body Area Networks (WBANs. The aim of WBANs is to keep a human body under control by means of a set of small-size, lightweight, and low-power sensor nodes placed in, on, or around the human body. The WBANs are also used in a number of new applications namely health monitoring, entertainment, sports, and military applications. The sensor nodes in WBANs have limited energy resources as a result of communicating with each other wirelessly. Therefore, the medium access control protocols for WBANs must be energy efficient protocols. Also, WBAN’s importance of having the different data traffics has increased determination of operation sequence at the coordinator nodes. In this study, data traffic sensitive WBAN is proposed. End to end delay and throughput results are examined for performance evaluation.

  12. A Review of Wireless Body Area Networks for Medical Applications

    CERN Document Server

    Ullah, Sana; Ullah, Niamat; Saleem, Shahnaz; Higgins, Henry; Kwak, Kyung Sup; 10.4236/ijcns.2009.28093

    2010-01-01

    Recent advances in Micro-Electro-Mechanical Systems (MEMS) technology, integrated circuits, and wire-less communication have allowed the realization of Wireless Body Area Networks (WBANs). WBANs promise unobtrusive ambulatory health monitoring for a long period of time, and provide real-time updates of the patients status to the physician. They are widely used for ubiquitous healthcare, entertainment, and military applications. This paper reviews the key aspects of WBANs for numerous applications. We present a WBAN infrastructure that provides solutions to on-demand, emergency, and normal traffic. We further discuss in-body antenna design and low-power MAC protocol for a WBAN. In addition, we briefly outline some of the WBAN applications with examples. Our discussion realizes a need for new power-efficient solutions towards in-body and on-body sensor networks.

  13. A Simple Battery Aware Gossip Based Sleep Protocol for Densely Deployed Ad-hoc and Sensor Networks

    CERN Document Server

    Shukla, Ashish

    2010-01-01

    Conserving power in mobile ad-hoc and sensor networks is a big challenge. Most of the nodes in these networks, in general, are battery powered, therefore, an efficient power saving protocol is required to extend the lifetime of such networks. A lot of work has been done and several protocols have been proposed to address this problem. Gossip based protocols, which are based on the results of percolation theory, significantly reduce power consumption with very little implementation overhead. However, not much work has been done to make gossiping battery aware. In this paper we introduce a simple gossip based battery aware sleep protocol. The protocol allows low battery nodes to sleep more, therefore, improves overall network lifetime.

  14. Adaptive comanagement of a marine protected area network in Fiji.

    Science.gov (United States)

    Weeks, Rebecca; Jupiter, Stacy D

    2013-12-01

    Adaptive management of natural resources is an iterative process of decision making whereby management strategies are progressively changed or adjusted in response to new information. Despite an increasing focus on the need for adaptive conservation strategies, there remain few applied examples. We describe the 9-year process of adaptive comanagement of a marine protected area network in Kubulau District, Fiji. In 2011, a review of protected area boundaries and management rules was motivated by the need to enhance management effectiveness and the desire to improve resilience to climate change. Through a series of consultations, with the Wildlife Conservation Society providing scientific input to community decision making, the network of marine protected areas was reconfigured so as to maximize resilience and compliance. Factors identified as contributing to this outcome include well-defined resource-access rights; community respect for a flexible system of customary governance; long-term commitment and presence of comanagement partners; supportive policy environment for comanagement; synthesis of traditional management approaches with systematic monitoring; and district-wide coordination, which provided a broader spatial context for adaptive-management decision making. Co-Manejo Adaptativo de una Red de Áreas Marinas Protegidas en Fiyi. PMID:24112643

  15. DEPLOYMENT OF MOBILE ROUTERS ENSURING COVERAGE AND CONNECTIVITY

    Directory of Open Access Journals (Sweden)

    Emi Mathews

    2012-02-01

    Full Text Available Maintaining connectivity among a group of autonomous agents exploring an area is very important, as itpromotes cooperation between the agents and also helps message exchanges which are very critical fortheir mission. Creating an underlying Ad-hoc Mobile Router Network (AMRoNet using simple roboticrouters is an approach that facilitates communication between the agents without restricting theirmovements. We address the following question in our paper: How to create an AMRoNet with localinformation and with minimum number of routers? We propose two new localized and distributedalgorithms 1agent-assisted router deployment and 2 a self-spreading for creating AMRoNet. Thealgorithms use a greedy deployment strategy for deploying routers effectively into the area maximizingcoverage and a triangular deployment strategy to connect different connected component of routers fromdifferent base stations. Empirical analysis shows that theproposed algorithms are the two bestlocalizedapproaches to create AMRoNets.

  16. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Jingwei Liu

    2016-05-01

    Full Text Available Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.

  17. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks

    Science.gov (United States)

    Liu, Jingwei; Zhang, Lihuan; Sun, Rong

    2016-01-01

    Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead. PMID:27213384

  18. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Liu, Jingwei; Zhang, Lihuan; Sun, Rong

    2016-01-01

    Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead. PMID:27213384

  19. Cooperative communications for sleep monitoring in wireless body area networks

    OpenAIRE

    Shimly, Samiya; Movassaghi, Samaneh; Smith, David

    2016-01-01

    This paper investigates the performance of cooperative receive diversity, for the wireless body area network (WBAN) radio channel, compliant with the IEEE 802.15.6 Standard, in the case of monitoring a sleeping person. Extensive WBAN measurements near the 2.4 GHz ISM band were used. Up to 7 dB and 20% improvement for two-hop communications with the use of relays are empirically demonstrated with respect to outage probability and outage duration, with 3-branch cooperative selection combining a...

  20. A SECURE KEY MANAGEMENT TECHNIQUE FOR WIRELESS BODY AREA NETWORKS

    OpenAIRE

    Venkatasubramanian Sivaprasatham; Jothi Venkateswaran

    2012-01-01

    In Wireless Body Area Networks (WBAN), the key factors to be considered for transmission of confidential data are security and privacy as it is mostly having applications in emergency medical response systems. The lack of security may lead to loss of data privacy resulting in an adversary to bring in bogus data or altering the legal ones. Hence in this study, a secure key management technique for WBAN is proposed. The proposed architecture consists of a set of WBANs connected to the master se...

  1. PROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKS

    Directory of Open Access Journals (Sweden)

    Sotirios Kontogiannis

    2016-03-01

    Full Text Available Wireless Body Area Networks (WBAN is the recent trend for localized and personalized medical services. For that purpose, several tele-medicine architectures and WBAN frameworks for patient monitoring have been proposed. This paper presents a new medical protocol MESETP (Medical Services Transport Protocol, that underlies data delivery for both real-time and non real-time medical services. Furthermore, performance tests of MESETP with existing real time protocols and non real-time protocols used by existing medical services are examined and comparison results are presented.

  2. An area-efficient network interface for a TDM-based Network-on-Chip

    DEFF Research Database (Denmark)

    Sparsø, Jens; Kasapaki, Evangelia; Schoeberl, Martin

    2013-01-01

    Network interfaces (NIs) are used in multi-core systems where they connect processors, memories, and other IP-cores to a packet switched Network-on-Chip (NOC). The functionality of a NI is to bridge between the read/write transaction interfaces used by the cores and the packet-streaming interface...... used by the routers and links in the NOC. The paper addresses the design of a NI for a NOC that uses time division multiplexing (TDM). By keeping the essence of TDM in mind, we have developed a new area-efficient NI micro-architecture. The new design completely eliminates the need for FIFO buffers...... and credit based flow control - resources which are reported to account for 50–85% of the area in existing NI designs. The paper discusses the design considerations, presents the new NI micro-architecture, and reports area figures for a range of implementations....

  3. Sensor Deployment and Relocation: A Unified Scheme

    Institute of Scientific and Technical Information of China (English)

    Michele Garetto; Marco Gribaudo; Carla-Fabiana Chiasserini; Emilio Leonardi

    2008-01-01

    Sensor networks are envisioned to revolutionize our daily life by ubiquitously monitoring our environment and/or adjusting it to suit our needs. Recent progress in robotics and low-power embedded systems has made it possible to add mobility to small, light, low-cost sensors to be used in teams or swarms. Augmenting static sensor networks with mobile nodes addresses many design challenges that exist in traditional static sensor networks. This paper addresses the problem of topology control in mobile wireless networks. Limitations in communication, computation and energy capabilities push towards the adoption of distributed, energy-efficient solutions to perform self-deployment and relocation of the nodes. We develop a unified, distributed algorithm that has the following features. During deployment, our algorithm yields a regular tessellation of the geographical area with a given node density, called monitoring configuration. Upon the occurrence of a physical phenomenon, network nodes relocate themselves so as to properly sample and control the event, while maintaining the network connectivity. Then, as soon as the event ends, all nodes return to the monitoring configuration. To achieve these goals, we use a virtual force-based strategy which proves to be very effective even when compared to an optimal centralized solution. We assess the performance of our approach in the presence of events with different shapes, and we investigate the transient behavior of our algorithm. This allows us to evaluate the effectiveness and the response time of the proposed solution under various environmental conditions.

  4. Wireless local area network in a prehospital environment

    Directory of Open Access Journals (Sweden)

    Grimes Gary J

    2004-08-01

    Full Text Available Abstract Background Wireless local area networks (WLANs are considered the next generation of clinical data network. They open the possibility for capturing clinical data in a prehospital setting (e.g., a patient's home using various devices, such as personal digital assistants, laptops, digital electrocardiogram (EKG machines, and even cellular phones, and transmitting the captured data to a physician or hospital. The transmission rate is crucial to the applicability of the technology in the prehospital setting. Methods We created two separate WLANs to simulate a virtual local are network environment such as in a patient's home or an emergency room (ER. The effects of different methods of data transmission, number of clients, and roaming among different access points on the file transfer rate were determined. Results The present results suggest that it is feasible to transfer small files such as patient demographics and EKG data from the patient's home to the ER at a reasonable speed. Encryption, user control, and access control were implemented and results discussed. Conclusions Implementing a WLAN in a centrally managed and multiple-layer-controlled access control server is the key to ensuring its security and accessibility. Future studies should focus on product capacity, speed, compatibility, interoperability, and security management.

  5. Energy Analysis of Contention Tree-Based Access Protocols in Dense Machine-to-Machine Area Networks

    Directory of Open Access Journals (Sweden)

    Francisco Vázquez-Gallego

    2015-01-01

    Full Text Available Machine-to-Machine (M2M area networks aim at connecting an M2M gateway with a large number of energy-constrained devices that must operate autonomously for years. Therefore, attaining high energy efficiency is essential in the deployment of M2M networks. In this paper, we consider a dense M2M area network composed of hundreds or thousands of devices that periodically transmit data upon request from a gateway or coordinator. We theoretically analyse the devices’ energy consumption using two Medium Access Control (MAC protocols which are based on a tree-splitting algorithm to resolve collisions among devices: the Contention Tree Algorithm (CTA and the Distributed Queuing (DQ access. We have carried out computer-based simulations to validate the accuracy of the theoretical models and to compare the energy performance using DQ, CTA, and Frame Slotted-ALOHA (FSA in M2M area networks with devices in compliance with the IEEE 802.15.4 physical layer. Results show that the performance of DQ is totally independent of the number of contending devices, and it can reduce the energy consumed per device in more than 35% with respect to CTA and in more than 80% with respect to FSA.

  6. Evaluation of the Impact of Furniture on Communications Performance for Ubiquitous Deployment of Wireless Sensor Networks in Smart Homes

    OpenAIRE

    Antonio F. Gómez Skarmeta; Guadalupe Santa; Bleda, Andrés L.; Rafael Maestre; Jara, Antonio J.

    2012-01-01

    The extensions of the environment with the integration of sensing systems in any space, in conjunction with ubiquitous computing are enabling the so-called Smart Space Sensor Networks. This new generation of networks are offering full connectivity with any object, through the Internet of Things (IoT) and/or the Web, i.e., the Web of Things. These connectivity capabilities are making it feasible to sense the behaviours of people at home and act accordingly. These sensing s...

  7. Extended Virtual Spring Mesh (EVSM): The Distributed Self-Organizing Mobile Ad Hoc Network for Area Exploration

    Energy Technology Data Exchange (ETDEWEB)

    Kurt Derr

    2011-12-01

    Mobile Ad hoc NETworks (MANETs) are distributed self-organizing networks that can change locations and configure themselves on the fly. This paper focuses on an algorithmic approach for the deployment of a MANET within an enclosed area, such as a building in a disaster scenario, which can provide a robust communication infrastructure for search and rescue operations. While a virtual spring mesh (VSM) algorithm provides scalable, self-organizing, and fault-tolerant capabilities required by aMANET, the VSM lacks the MANET's capabilities of deployment mechanisms for blanket coverage of an area and does not provide an obstacle avoidance mechanism. This paper presents a new technique, an extended VSM (EVSM) algorithm that provides the following novelties: (1) new control laws for exploration and expansion to provide blanket coverage, (2) virtual adaptive springs enabling the mesh to expand as necessary, (3) adapts to communications disturbances by varying the density and movement of mobile nodes, and (4) new metrics to assess the performance of the EVSM algorithm. Simulation results show that EVSM provides up to 16% more coverage and is 3.5 times faster than VSM in environments with eight obstacles.

  8. LTE网络部署CSFB语音时MSC POOL解决方案研究%Research on MSC POOL Solution to CSFB Voice Deployed in LTE Network

    Institute of Scientific and Technical Information of China (English)

    张红霞

    2014-01-01

    LTE部署初期,运营商通过CSFB技术为LTE用户提供语音业务。现网2G/3G端局采用MSC POOL组网的情况下,部署CSFB功能后引入了一些新问题。基于此,通过调整组网和配置、MSC和MME流程优化等方法来解决,既完成了CSFB功能又体现了MSC POOL组网的优势。%In the early stage of LTE deployment, telecom operator provides voice service to LTE subscribers using CSFB(Circuit Switched Fallback) technology. However, with MSC POOL already applied in current 2G/3G networks, some new problems arise when CSFB technology is introduced. In view of this situations, they are can be solved by adjusting networking and configuration, as well as optimizing MSC and MME flows. Thus, the advantages of both CSFB function and MSC POOL networking are simultaneously implemented.

  9. Application of Intelligent Motor Relaying Device in Network Deployment%智能型电动机保护器及其组网应用

    Institute of Scientific and Technical Information of China (English)

    言穆昀

    2013-01-01

    智能型电动机保护器具有保护和通信功能,渐渐替代了传统的热继电器,并进入普及阶段.现代化市政行业中利用智能型电动机保护器的网络通信功能可实现组网需求,大大简化了现场接线,提高了管理水平.%The function of protection and telecommunication was realized by the intelligent motor relaying device, which gradually took the place of the thermal relays, moreover it was went in popularization. The requirement of the network deployment could be realized by the function of the internet telecommunication of the intellgent motor relaying device in the modem municipal field. The wive splice on-site was largely simplized, management level was enhanced.

  10. Non-uniform deployment strategy of wireless sensor networks based on path%无线传感器网络基于路径的非均匀分布策略

    Institute of Scientific and Technical Information of China (English)

    高美凤; 钟文平

    2012-01-01

    The unbalanced load among sensors in wireless sensor networks is caused by many-to-one way of data transmission. The nodes near Sink will spend more energy than those far away from Sink,and then the energy hole is caused in sensor networks. According the paths of data transmission and the nodes undertaking the different number of paths, the energy consumption of different layers node is balanced. The non-uniform sensor deployment strategy,which number of routing node in an inner is equal to number of sensing node in outer tiers farther away from Sink,while the fraction of coverge of sensing node in all the coverage area is the same,is presented. The simulation results show that the non-uniform sensor deployment strategy is feasible.%无线传感器网络中多对一的数据传输方式导致节点负载的不均衡性,靠近汇聚节点( Sink)的节点要比远离Sink的节点消耗更多的能量,如此容易引发能量空洞问题.针对该问题,从网络数据的传递路径出发,根据网络中节点承担的路径数量的不同,平衡各层节点的能耗,提出感知节点覆盖率一致、内层路由节点与其所有外层感知节点数目相同的的非均匀分布策略,并通过仿真实验证明了该方法的有效性.

  11. A comprehensive survey of wireless body area networks on PHY, MAC, and network layers solutions

    OpenAIRE

    Ullah, Sana; Higgins, Henry; Braem, Bart; Latré, Benoît; Blondia, Chris; Moerman, Ingrid; Saleem, Shahnaz; Rahman, Ziaur; Kwak, Kyung Sup

    2012-01-01

    Recent advances in microelectronics and integrated circuits, system-on-chip design, wireless communication and intelligent low-power sensors have allowed the realization of a Wireless Body Area Network (WBAN). A WBAN is a collection of low-power, miniaturized, invasive/non-invasive lightweight wireless sensor nodes that monitor the human body functions and the surrounding environment. In addition, it supports a number of innovative and interesting applications such as ubiquitous healthcare, e...

  12. Impact of the environment and the topology on the performance of hierarchical body area networks

    OpenAIRE

    Ferrari Gianluigi; Dricot Jean-Michel; Van Roy Stéphane; Horlin François; De Doncker Philippe

    2011-01-01

    Abstract Personal area networks and, more specifically, body area networks (BANs) are key building blocks of future generation networks and of the Internet of Things as well. In this article, we present a novel analytical framework for network performance analysis of body sensor networks with hierarchical (tree) topologies. This framework takes into account the specificities of the on-body channel modeling and the impact of the surrounding environment. The obtained results clearly highlight t...

  13. Multi-area layered multicast scheme for MPLS networks

    Science.gov (United States)

    Ma, Yajie; Yang, Zongkai; Wang, Yuming; Chen, Jingwen

    2005-02-01

    Multi-protocol label switching (MPLS) is multiprotocols both at layer 2 and layer 3. It is suggested to overcome the shortcomings of performing complex longest prefix matching in layer 3 routing by using short, fixed length labels. The MPLS community has put more effort into the label switching of unicast IP traffic, but less in the MPLS multicast mechanism. The reasons are the higher label consumption, the dynamical mapping of L3 multicast tree to L2 LSPs and the 20-bit shim header which is much fewer than the IPv4 IP header. On the other hand, heterogeneity of node capability degrades total performance of a multicast group. In order to achieve the scalability as well as the heterogeneity in MPLS networks, a novel scheme of MPLS-based Multi-area Layered Multicast Scheme (MALM) is proposed. Unlike the existing schemes which focus on aggregating the multicast stream, we construct the multicast tree based on the virtual topology aggregation. The MPLS area is divided into different sub-areas to form the hierarchical virtual topology and the multicast group is reconstructed into multiple layers according to the node capability. At the same time, the label stack is used to save the label space. For stability of the MALM protocol, a multi-layer protection scheme is also discussed. The experiment results show that the proposed scheme saves label space and decrease the Multicast Forwarding Table in much degree.

  14. 100G Deployment@(DE-KIT)

    Science.gov (United States)

    Hoeft, Bruno; Petzold, Andreas

    2015-12-01

    The Steinbuch Centre for Computing (SCC) at Karlsruhe Institute of Technology (KIT) has been involved fairly early in 100GE network technology. Initiated by DFN1 (the German NREN), a first 100GE wide area network testbed over a distance of approx. 450 km was deployed between the national research organizations KIT and FZ-Jülich in 2010. Three years later in 2013. KIT joined the Caltech SuperComputing 2013 (SC132) 100GE "show floor" initiative using the transatlantic ANA-100GE link to transfer LHC data from a storage at DE-KIT (GridKa) in Europe to hard disks at the show floor of SC13 in Denver (USA). The network infrastructure of KIT as well as of the German Tier-1 installation DE-KIT (GridKa). however. is still based on 10Gbps. As highlighted in the contribution "Status and Trends in Networking at LHC Tier1 Facilities" to CHEP 2012. proactive investment is required at the Tier-1 sites. Bandwidth requirements will grow beyond current capacity and the required upgrades are expected in 2015. In close cooperation with DFN. KIT drives the upgrade from 10GE to 100GE. The process is divided into several phases. due to upgrade costs and differing requirements in different parts of the network infrastructure. The requirements of the different phases as well as the planned topology will be described. Some of the obstacles we discovered during the deployment will be discussed and solutions or workarounds presented.

  15. Microcontroller Protocol for Secure Broadcast in Controller Area Networks

    Directory of Open Access Journals (Sweden)

    B.Vijayalakshmi

    2014-04-01

    Full Text Available Controller Area Network is a bus commonly used by controllers inside vehicles and in various industrial control applications. In the past controllers were assumed to operate in secure perimeters, but today these environments are well connected to the outside world and recent incidents showed them extremely vulnerable to cyber-attacks. To withstand such threats, one can implement security in the application layer of CAN. Here we design, refine and implement a broadcast authentication protocol based on the well known paradigm of using key-chains and time synchronization, a commonly used Mechanism in wireless sensor networks, which allows us to take advantage from the use of symmetric primitives without the need of secret shared keys during broadcast. But, as process control is a time critical operation we make several refinements in order to improve on the authentication delay. For this we study several trade-offs to alleviate shortcomings on computational speed, memory and bandwidth up to the point of using reduced versions of hash functions that can assure ad hoc security. To prove the efficiency of the protocol

  16. A SECURE KEY MANAGEMENT TECHNIQUE FOR WIRELESS BODY AREA NETWORKS

    Directory of Open Access Journals (Sweden)

    Venkatasubramanian Sivaprasatham

    2012-01-01

    Full Text Available In Wireless Body Area Networks (WBAN, the key factors to be considered for transmission of confidential data are security and privacy as it is mostly having applications in emergency medical response systems. The lack of security may lead to loss of data privacy resulting in an adversary to bring in bogus data or altering the legal ones. Hence in this study, a secure key management technique for WBAN is proposed. The proposed architecture consists of a set of WBANs connected to the master server via backend server using authentication channel. Initially, backend server and master server use a shared symmetric key. When a node wants to join a network, it forwards a request message protected by the Message Authentication Code (MAC to the master server via the backend server. The master server verifies the MAC and generates message key and master key for the node and sends it to backend server. The backend server encrypts the message key with the master key and sends it to the node that initiates the joining process. After all nodes receive key information from the master server, the Base Server (BS schedules a re-keying period to refresh the master key. By simulation results, it is shown that the proposed technique is more authenticated. The proposed approach offers data confidentiality and integrity in WBANs.

  17. Model-Driven Approach for Body Area Network Application Development

    Directory of Open Access Journals (Sweden)

    Algimantas Venčkauskas

    2016-05-01

    Full Text Available This paper introduces the sensor-networked IoT model as a prototype to support the design of Body Area Network (BAN applications for healthcare. Using the model, we analyze the synergistic effect of the functional requirements (data collection from the human body and transferring it to the top level and non-functional requirements (trade-offs between energy-security-environmental factors, treated as Quality-of-Service (QoS. We use feature models to represent the requirements at the earliest stage for the analysis and describe a model-driven methodology to design the possible BAN applications. Firstly, we specify the requirements as the problem domain (PD variability model for the BAN applications. Next, we introduce the generative technology (meta-programming as the solution domain (SD and the mapping procedure to map the PD feature-based variability model onto the SD feature model. Finally, we create an executable meta-specification that represents the BAN functionality to describe the variability of the problem domain though transformations. The meta-specification (along with the meta-language processor is a software generator for multiple BAN-oriented applications. We validate the methodology with experiments and a case study to generate a family of programs for the BAN sensor controllers. This enables to obtain the adequate measure of QoS efficiently through the interactive adjustment of the meta-parameter values and re-generation process for the concrete BAN application.

  18. Networked Estimation with an Area-Triggered Transmission Method

    Directory of Open Access Journals (Sweden)

    Young Soo Suh

    2008-02-01

    Full Text Available This paper is concerned with the networked estimation problem in which sensordata are transmitted over the network. In the event-driven sampling scheme known aslevel-crossing or send-on-delta, sensor data are transmitted to the estimator node if thedifference between the current sensor value and the last transmitted one is greater than agiven threshold. The event-driven sampling generally requires less transmission than thetime-driven one. However, the transmission rate of the send-on-delta method becomeslarge when the sensor noise is large since sensor data variation becomes large due to thesensor noise. Motivated by this issue, we propose another event-driven sampling methodcalled area-triggered in which sensor data are sent only when the integral of differencesbetween the current sensor value and the last transmitted one is greater than a giventhreshold. Through theoretical analysis and simulation results, we show that in the certaincases the proposed method not only reduces data transmission rate but also improvesestimation performance in comparison with the conventional event-driven method.

  19. Model-Driven Approach for Body Area Network Application Development.

    Science.gov (United States)

    Venčkauskas, Algimantas; Štuikys, Vytautas; Jusas, Nerijus; Burbaitė, Renata

    2016-01-01

    This paper introduces the sensor-networked IoT model as a prototype to support the design of Body Area Network (BAN) applications for healthcare. Using the model, we analyze the synergistic effect of the functional requirements (data collection from the human body and transferring it to the top level) and non-functional requirements (trade-offs between energy-security-environmental factors, treated as Quality-of-Service (QoS)). We use feature models to represent the requirements at the earliest stage for the analysis and describe a model-driven methodology to design the possible BAN applications. Firstly, we specify the requirements as the problem domain (PD) variability model for the BAN applications. Next, we introduce the generative technology (meta-programming as the solution domain (SD)) and the mapping procedure to map the PD feature-based variability model onto the SD feature model. Finally, we create an executable meta-specification that represents the BAN functionality to describe the variability of the problem domain though transformations. The meta-specification (along with the meta-language processor) is a software generator for multiple BAN-oriented applications. We validate the methodology with experiments and a case study to generate a family of programs for the BAN sensor controllers. This enables to obtain the adequate measure of QoS efficiently through the interactive adjustment of the meta-parameter values and re-generation process for the concrete BAN application. PMID:27187394

  20. Model-Driven Approach for Body Area Network Application Development

    Science.gov (United States)

    Venčkauskas, Algimantas; Štuikys, Vytautas; Jusas, Nerijus; Burbaitė, Renata

    2016-01-01

    This paper introduces the sensor-networked IoT model as a prototype to support the design of Body Area Network (BAN) applications for healthcare. Using the model, we analyze the synergistic effect of the functional requirements (data collection from the human body and transferring it to the top level) and non-functional requirements (trade-offs between energy-security-environmental factors, treated as Quality-of-Service (QoS)). We use feature models to represent the requirements at the earliest stage for the analysis and describe a model-driven methodology to design the possible BAN applications. Firstly, we specify the requirements as the problem domain (PD) variability model for the BAN applications. Next, we introduce the generative technology (meta-programming as the solution domain (SD)) and the mapping procedure to map the PD feature-based variability model onto the SD feature model. Finally, we create an executable meta-specification that represents the BAN functionality to describe the variability of the problem domain though transformations. The meta-specification (along with the meta-language processor) is a software generator for multiple BAN-oriented applications. We validate the methodology with experiments and a case study to generate a family of programs for the BAN sensor controllers. This enables to obtain the adequate measure of QoS efficiently through the interactive adjustment of the meta-parameter values and re-generation process for the concrete BAN application. PMID:27187394

  1. Terabit optical local area networks for multiprocessing systems.

    Science.gov (United States)

    Szymanski, T H; Au, A; Lafrenière-Roula, M; Tyan, V; Supmonchai, B; Wong, J; Zerrouk, B; Obenaus, S T

    1998-01-10

    The design of a scalable optical local area network formultiprocessing systems is described. Each workstation has aparallel-fiber-ribbon optical link to a centralized complementarymetal-oxide silicon (CMOS) switch core, implemented on a singlecompact printed circuit board (PCB). When the Motorola Optobusfiber technology is used, each workstation has a data bandwidth of 6.4Gbits/s to the core. A centralized switch core interconnecting 32workstations supports a 204-Gbit/s aggregate data bandwidth. Theswitch core is based on a conventional broadcast-and-selectarchitecture, implemented with parallel CMOS integrated circuits(IC's). The switch core scales well; by incorporation of theCMOS optoelectronic IC's with optical input-output, the electricalcore can be reduced to a single-chip optoelectronic IC with terabitcapacities. A prototype of an optoelectronic switch core has been fabricated and is described. The appeal of the architectureincludes its reliance on commercially available parallel-fibertechnology, its reliance on the well-developed markets of local areanetworks and networks of workstations, and its smooth scalability from the electrical to optical domains as technology matures. PMID:18268582

  2. Efficient controller area network data compression for automobile applications

    Institute of Scientific and Technical Information of China (English)

    Yu-jing WU; Jin-Gyun CHUNG

    2015-01-01

    Controller area networks (CANs) have been designed for multiplexing communication between electronic control units (ECUs) in vehicles and many high-level industrial control applications. When a CAN bus is overloaded by a large number of ECUs connected to it, both the waiting time and the error probability of the data transmission are increased. Thus, it is desirable to reduce the CAN frame length, since the duration of data transmission is proportional to the frame length. In this paper, we present a CAN message compression method to reduce the CAN frame length. Experimental results indicate that CAN transmission data can be compressed by up to 81.06%with the proposed method. By using an embedded test board, we show that 64-bit engine management system (EMS) CAN data compression can be performed within 0.16 ms;consequently, the proposed algorithm can be successfully used in automobile applications.

  3. Sharing waste management data over a wide area computer network

    International Nuclear Information System (INIS)

    In this paper the authors envision a time when waste management professionals from any institution will be able to access high quality data, regardless of where this data may actually be archived. They will not have to know anything about where the data actually resides or what format it is stored in. They will only have to specify the type of data and the workstation software will handle the rest of the details of finding them and accessing them. A method - now in use at the Lamont-Doherty Geological Observatory of Columbia University and several other institutions - of achieving this vision is described in this paper. Institutions make views of their databases publicly available to users of the wide-area network (e.g. Internet), using database serving software that runs on one of their computers. This software completely automates the process of finding out what kind of data are available and of retrieving them

  4. Use of local area networks in radioisotopic monitoring systems

    International Nuclear Information System (INIS)

    In the spring of 1988, Canberra's Nuclear Data Systems Division introduced a device that performed the basic data acquisition functions of a multichannel analyzer (MCA) but was interfaced to an Institute of electrical and Electronics Engineers standard 802.2/802.3 Ethernet local area network1,2 (LAN). The device, known as the 556 acquisition interface module (AIM), includes 64K channels of spectral memory and can handle two analog-to-digital converter (ADC) modules running an aggregate acquisition rate of up to 1 MHz. The AIM can transfer data and accept commands over the 10M bit/s LAN, making it suitable for real-time applications. Subsequent advancements in software and hardware display technology have expanded the capabilities of spectroscopy analysis systems by providing remote real-time spectral displays. The paper presents a system architecture review and discusses applicability for radiation monitoring

  5. A Novel Human Body Area Network for Brain Diseases Analysis.

    Science.gov (United States)

    Lin, Kai; Xu, Tianlang

    2016-10-01

    Development of wireless sensor and mobile communication technology provide an unprecedented opportunity for realizing smart and interactive healthcare systems. Designing such systems aims to remotely monitor the health and diagnose the diseases for users. In this paper, we design a novel human body area network for brain diseases analysis, which is named BABDA. Considering the brain is one of the most complex organs in the human body, the BABDA system provides four function modules to ensure the high quality of the analysis result, which includes initial data collection, data correction, data transmission and comprehensive data analysis. The performance evaluation conducted in a realistic environment with several criteria shows the availability and practicability of the BABDA system. PMID:27526187

  6. Wireless Broadband Network on TVWS for Rural Areas: an Indian Perspective

    DEFF Research Database (Denmark)

    Deshmukh, Madhukar; Patil, Kishor P.; Frederiksen, Flemming Bjerge;

    2013-01-01

    market domains. The current global move to switch from analogue to digital TV has opened up an opportunity for the re-allocation of this valuable resource. In one way, spectrum bands once used for analogue TV broadcasting will be completely cleared, leaving a space for deploying new licensed wireless...... services, and in another way, digital television technology geographically interleaves spectrum bands to avoid interference between neighboring stations-leaving a space for deploying new unlicensed wireless services. The focus of the paper is to assess the availability of geographically interleaved...... spectrum, also known as television spectrum white spaces (TVWS) and proposing the wireless network scenarios for rural broadband connectivity....

  7. Implementation and performance evaluation of mobile ad hoc network for Emergency Telemedicine System in disaster areas.

    Science.gov (United States)

    Kim, J C; Kim, D Y; Jung, S M; Lee, M H; Kim, K S; Lee, C K; Nah, J Y; Lee, S H; Kim, J H; Choi, W J; Yoo, S K

    2009-01-01

    So far we have developed Emergency Telemedicine System (ETS) which is a robust system using heterogeneous networks. In disaster areas, however, ETS cannot be used if the primary network channel is disabled due to damages on the network infrastructures. Thus we designed network management software for disaster communication network by combination of Mobile Ad hoc Network (MANET) and Wireless LAN (WLAN). This software maintains routes to a Backbone Gateway Node in dynamic network topologies. In this paper, we introduce the proposed disaster communication network with management software, and evaluate its performance using ETS between Medical Center and simulated disaster areas. We also present the results of network performance analysis which identifies the possibility of actual Telemedicine Service in disaster areas via MANET and mobile network (e.g. HSDPA, WiBro). PMID:19964544

  8. Securing Local Area Networks with OpenFlow

    OpenAIRE

    Chowdhury, Fahad

    2015-01-01

    In the traditional network architecture, the data flow is controlled by switches and routers which make it difficult to meet the ever growing requirements of the present network environment. The popularity of network virtualization and cloud services, and a rapid growth of mobile devices and contents have made the control of the network challenging and complicated. Software Defined Networking (SDN) paradigm offers a suitable solution by separating the forwarding hardware from the control deci...

  9. 无线传感器网络中多sink节点优化部署方法%Optimal deployment of multiple sink nodes in wireless sensor networks

    Institute of Scientific and Technical Information of China (English)

    刘强; 毛玉明; 冷甦鹏; 李龙江; 庄奕群

    2011-01-01

    大规模无线传感器网络( WSN)环境下,当网络结构采用单一的sink节点时,容易造成sink节点周围的普通传感节点因为转发大量其他节点的数据,迅速消耗掉自身能量而使网络失效.为了延长网络寿命,需要降低传感节点到sink节点的跳数,而采用多sink结构是一个有效的方法.为此,需要考虑一定规模的网络中,应该布置多少sink节点,才能使得网络寿命最大化的同时网络成本最低.基于栅格网络结构,提出了多sink节点下的网络寿命模型和网络成本模型,并采用一种新颖的方法计算最大网络寿命成本比(RLC),推导出了保证网络寿命最大化的同时网络成本最低的sink节点个数的表达式.理论结果表明,该值与网络规模、关键节点数、节点收发功率以及普通节点和sink节点的成本等参数有关.最后通过仿真实验证明了该结论的正确性.%In a large-scale Wireless sensor Network ( WSN), the nodes closer to the single sink node use up their energy more quickly than others because of relaying more packets so that the network is invalid rapidly. In order to elongate the network lifetime, it is required to deduce the hops from sensor node to sink node. An efficient method is to deploy multiple sink nodes instead of single one. Therefore, it needs to be considered that how many sink nodes should be deployed on minimizing network cost and maximizing network lifetime. A network lifetime model and a cost model were proposed in WSN with multiple sink nodes and a new method was presented to determine the optimal number of sink nodes by computing the Ratio of Lifetime to Cost (RLC). The theoretical studies show that the number of sink nodes is related to the cost of sensor nodes and sink nodes, the network scale, the number of critical sensor nodes and the transmission power of sensor node. The simulation results prove the theoretical conclusion.

  10. Application of local area networks to accelerator control systems at the Stanford Linear Accelerator

    International Nuclear Information System (INIS)

    The history and current status of SLAC's SDLC networks for distributed accelerator control systems are discussed. These local area networks have been used for instrumentation and control of the linear accelerator. Network topologies, protocols, physical links, and logical interconnections are discussed for specific applications in distributed data acquisition and control system, computer networks and accelerator operations

  11. Application of local area networks to accelerator control systems at the Stanford Linear Accelerator

    Energy Technology Data Exchange (ETDEWEB)

    Fox, J.D.; Linstadt, E.; Melen, R.

    1983-03-01

    The history and current status of SLAC's SDLC networks for distributed accelerator control systems are discussed. These local area networks have been used for instrumentation and control of the linear accelerator. Network topologies, protocols, physical links, and logical interconnections are discussed for specific applications in distributed data acquisition and control system, computer networks and accelerator operations.

  12. Radiofrequency Field Distribution Assessment in Indoor Areas Covered by Wireless Local Area Network

    Directory of Open Access Journals (Sweden)

    HELBET, R.

    2009-02-01

    Full Text Available Electromagnetic environment becomes day by day more congested. Radio communication systems in the short range are now part of everyday life, and there is a need to also assess the pollution level due to their emission if we take into account human health and protection. There is consistent scientific evidence that environmental electromagnetic field may cause undesirable biological effects or even health hazards. Present paper aims at giving a view on exposure level due to wireless local area networks (WLAN emission solely, as part of environmental radiofrequency pollution. Highly accurate measurements were made indoor by using a frequency-selective measurement system and identifying the correct settings for an error-minimum assessment. We focused on analysis of the electric flux density distribution inside a room, in the far field of the emitting antennas, in case of a single network communication channel. We analyze the influence the network configuration parameters have on the field level. Distance from the source and traffic rate are also important parameters that affect the exposure level. Our measurements indicate that in the immediate vicinity of the WLAN stations the average field may reach as much as 13% from the present accepted reference levels given in the human exposure standards.

  13. Air Transport Network Specialization in a Multi-Hub Area : A Case Study of the Baltic Sea Area

    OpenAIRE

    PyyhtiÀ, Markus

    2010-01-01

    This master s thesis is concerned with the airline network geography of the Baltic Sea Area. The developments in economical liberties in the area and new liberties in air transport give special interest in researching this matter. Also the requirements of airlines to consolidate their activities give a reason to predict the possible outcomes of the geography of airlines in the area. Airlines networks organize themselves according to economic principles, most often attempting to reconcil...

  14. Enterprise IPv6 Deployment Guidelines

    OpenAIRE

    Chown, Tim; Pouffary, Yanick; Howard, Lee; Vyncke, Eric; Chittimaneni, Kiran; Kuarsingh, Victor

    2012-01-01

    Enterprise network administrators worldwide are in various stages of preparing for or deploying IPv6 into their networks. The administrators face different challenges than operators of Internet access providers, and have reasons for different priorities. The overall problem for many administrators will be to offer Internet-facing services over IPv6, while continuing to support IPv4, and while introducing IPv6 access within the enterprise IT network. The overall transition will take mos...

  15. Larval connectivity in an effective network of marine protected areas.

    Directory of Open Access Journals (Sweden)

    Mark R Christie

    Full Text Available Acceptance of marine protected areas (MPAs as fishery and conservation tools has been hampered by lack of direct evidence that MPAs successfully seed unprotected areas with larvae of targeted species. For the first time, we present direct evidence of large-scale population connectivity within an existing and effective network of MPAs. A new parentage analysis identified four parent-offspring pairs from a large, exploited population of the coral-reef fish Zebrasoma flavescens in Hawai'i, revealing larval dispersal distances ranging from 15 to 184 km. In two cases, successful dispersal was from an MPA to unprotected sites. Given high adult abundances, the documentation of any parent-offspring pairs demonstrates that ecologically-relevant larval connectivity between reefs is substantial. All offspring settled at sites to the north of where they were spawned. Satellite altimetry and oceanographic models from relevant time periods indicated a cyclonic eddy that created prevailing northward currents between sites where parents and offspring were found. These findings empirically demonstrate the effectiveness of MPAs as useful conservation and management tools and further highlight the importance of coupling oceanographic, genetic, and ecological data to predict, validate and quantify larval connectivity among marine populations.

  16. Interoperability and security in wireless body area network infrastructures.

    Science.gov (United States)

    Warren, Steve; Lebak, Jeffrey; Yao, Jianchu; Creekmore, Jonathan; Milenkovic, Aleksandar; Jovanov, Emil

    2005-01-01

    Wireless body area networks (WBANs) and their supporting information infrastructures offer unprecedented opportunities to monitor state of health without constraining the activities of a wearer. These mobile point-of-care systems are now realizable due to the convergence of technologies such as low-power wireless communication standards, plug-and-play device buses, off-the-shelf development kits for low-power microcontrollers, handheld computers, electronic medical records, and the Internet. To increase acceptance of personal monitoring technology while lowering equipment cost, advances must be made in interoperability (at both the system and device levels) and security. This paper presents an overview of WBAN infrastructure work in these areas currently underway in the Medical Component Design Laboratory at Kansas State University (KSU) and at the University of Alabama in Huntsville (UAH). KSU efforts include the development of wearable health status monitoring systems that utilize ISO/IEEE 11073, Bluetooth, Health Level 7, and OpenEMed. WBAN efforts at UAH include the development of wearable activity and health monitors that incorporate ZigBee-compliant wireless sensor platforms with hardware-level encryption and the TinyOS development environment. WBAN infrastructures are complex, requiring many functional support elements. To realize these infrastructures through collaborative efforts, organizations such as KSU and UAH must define and utilize standard interfaces, nomenclature, and security approaches. PMID:17281067

  17. Mid-infrared absorption-spectroscopy-based carbon dioxide sensor network in greenhouse agriculture: development and deployment.

    Science.gov (United States)

    Wang, Jianing; Zheng, Lingjiao; Niu, Xintao; Zheng, Chuantao; Wang, Yiding; Tittel, Frank K

    2016-09-01

    A mid-infrared carbon dioxide (CO2) sensor was experimentally demonstrated for application in a greenhouse farm environment. An optical module was developed using a lamp source, a dual-channel pyre-electrical detector, and a spherical mirror. A multi-pass gas chamber and a dual-channel detection method were adopted to effectively enhance light collection efficiency and suppress environmental influences. The moisture-proof function realized by a breathable waterproof chamber was specially designed for the application of such a sensor in a greenhouse with high humidity. Sensor structure of the optical part and electrical part were described, respectively, and related experiments were carried out to evaluate the sensor performance on CO2 concentration. The limit of detection of the sensor is 30 ppm with an absorption length of 30 cm. The relative detection error is less than 5% within the measurement range of 30-5000 ppm. The fluctuations for the long-term (10 h) stability measurements on a 500 ppm CO2 sample and a 2000 ppm CO2 sample are 1.08% and 3.6%, respectively, indicating a good stability of the sensor. A wireless sensor network-based automatic monitoring system was implemented for greenhouse application using multiple mid-infrared CO2 sensor nodes. A monitor software based on LabVIEW was realized via a laptop for real-time environmental data display, storage, and website sharing capabilities. A field experiment of the sensor network was carried out in the town of Shelin in Jilin Province, China, which proved that the whole monitoring system possesses stable sensing performance for practical application under the circumstances of a greenhouse. PMID:27607279

  18. Network Architecture, Security Issues, and Hardware Implementation of a Home Area Network for Smart Grid

    Directory of Open Access Journals (Sweden)

    Sergio Saponara

    2012-01-01

    Full Text Available This paper discusses aims, architecture, and security issues of Smart Grid, taking care of the lesson learned at University of Pisa in research projects on smart energy and grid. A key element of Smart Grid is the energy home area network (HAN, for which an implementation is proposed, dealing with its security aspects and showing some solutions for realizing a wireless network based on ZigBee. Possible hardware-software architectures and implementations using COTS (Commercial Off The Shelf components are presented for key building blocks of the energy HAN such as smart power meters and plugs and a home smart information box providing energy management policy and supporting user's energy awareness.

  19. A comprehensive survey of Wireless Body Area Networks : on PHY, MAC, and Network layers solutions.

    Science.gov (United States)

    Ullah, Sana; Higgins, Henry; Braem, Bart; Latre, Benoit; Blondia, Chris; Moerman, Ingrid; Saleem, Shahnaz; Rahman, Ziaur; Kwak, Kyung Sup

    2012-06-01

    Recent advances in microelectronics and integrated circuits, system-on-chip design, wireless communication and intelligent low-power sensors have allowed the realization of a Wireless Body Area Network (WBAN). A WBAN is a collection of low-power, miniaturized, invasive/non-invasive lightweight wireless sensor nodes that monitor the human body functions and the surrounding environment. In addition, it supports a number of innovative and interesting applications such as ubiquitous healthcare, entertainment, interactive gaming, and military applications. In this paper, the fundamental mechanisms of WBAN including architecture and topology, wireless implant communication, low-power Medium Access Control (MAC) and routing protocols are reviewed. A comprehensive study of the proposed technologies for WBAN at Physical (PHY), MAC, and Network layers is presented and many useful solutions are discussed for each layer. Finally, numerous WBAN applications are highlighted. PMID:20721685

  20. Continual observation on crop leaf area index using wireless sensors network

    International Nuclear Information System (INIS)

    Crop structural parameter, i.e. leaf area index(LAI), is the main factor that can effect the solar energy re-assignment in the canopy. An automatic measuring system which is designed on the basis of wireless sensors network(WSN) is present in this paper. The system is comprised of two types of node. One is the measurement nodes which measured solar irradiance and were deployed beneath and above the canopy respectively, and another is a sink node which was used to collect data from the other measurement nodes. The measurement nodes also have ability to repeater data from one node to another and finally transfer signal to the sink node. Then the collected data of sink node are transferred to the data center through GPRS network. Using the field data collected by WSN, canopy structural parameters can be calculated using the direct transmittance which is the ratio of sun radiation captured by the measurement node beneath and above the canopy on different sun altitude angles. The proposed WSN measurement systems which is consisted of about 45 measurement node was deployed in the Heihe watershed to continually observe the crop canopy structural parameters from 25 June to 24 August 2012. To validate the performance of the WSN measured crop structural parameters, the LAI values were also measured by LAI2000. The field preliminary validation results show that the designed system can capture the varies of solar direct canopy transmittance on different time in a day, which is the basis to calculate the target canopy structural parameters. The validation results reveal that the measured LAI values derived from our propose measurement system have acceptable correlation coefficient(R2 from 0.27 to 0.96 and averaged value 0.42) with those derived from LAI2000. So it is a promising way in the agriculture application to utilize the proposed system and thus will be an efficient way to measure the crop structural parameters in the large spatial region and on the long time series

  1. A novel wireless personal area network technology: ultra wide band technology

    Institute of Scientific and Technical Information of China (English)

    GAO Wei-hua; GUO Li-li; LIANG Zhi-guo

    2006-01-01

    Ultra Wideband (UWB) technology is promising for wireless personal area network (WPAN) applications due to its high data rate, low power requirement and short-range characteristics. Instead of exploring new unused frequency band, the UWB communication follows the overlay principle, i.e.,sharing the spectrum with existing systems and devices. This novel radio technology has been recently approved by the regulatory authorities in the United States and Canada, and is being considered for approval in Europe and Asia. In this paper, an overview of the UWB radio technology from the technical,economical, and regulatory perspectives is provided. Firstly, the definition of UWB by the Federal Communications Commission (FCC) is introduced, followed by a brief introduction to the history. The current status of the standardization process resulting from the FCC's recent decision to permit unlicensed operation in the [3.1-10.6] GHz band is discussed. Then, the reasons of considering UWB as a future solution for WLAN/WPAN applications are studied. In particular, the unique properties of UWB and its difference from other wireless technology alternatives are studied. Then, the benefits and challenges related to the commercial deployment of UWB for future applications are discussed. Finally,the research problems and challenges posed by the UWB technology are focused.

  2. Trends in Area of Safety Communications within Industrial Networks

    OpenAIRE

    Maria Franekova; Ales Janota; Karol Rastocny

    2005-01-01

    The paper deals with the problems of safety communication in industrial networks for purpose of assurance of functional safety. It is intents on analysis of treats on industry networks and there is described recommended safety protections and their location into layer communication protocol applicable in fieldbus network, which they are used within safety critical processes control.

  3. Simulated Annealing for Location Area Planning in Cellular networks

    Directory of Open Access Journals (Sweden)

    N. B. Prajapati

    2010-03-01

    Full Text Available LA planning in cellular network is useful for minimizing location management cost in GSM network. Infact, size of LA can be optimized to create a balance between the LA update rate and expected pagingrate within LA. To get optimal result for LA planning in cellular network simulated annealing algorithmis used. Simulated annealing give optimal results in acceptable run-time.

  4. Simulated Annealing for Location Area Planning in Cellular networks

    OpenAIRE

    Prajapati, N. B.; R. R. Agravat; Hasan, M I

    2010-01-01

    LA planning in cellular network is useful for minimizing location management cost in GSM network. In fact, size of LA can be optimized to create a balance between the LA update rate and expected paging rate within LA. To get optimal result for LA planning in cellular network simulated annealing algorithm is used. Simulated annealing give optimal results in acceptable run-time.

  5. Technologies and Research Trends in Wireless Body Area Networks for Healthcare: A Systematic Literature Review

    OpenAIRE

    Ilkyu Ha

    2015-01-01

    Owing to the increasing interest in the integration of the medical technology and the information and communications technology, research on wireless body area networks (WBANs), which apply a sensor network to the human body, is being actively conducted. Existing sensor network technology has the potential to be used in a WBAN; however, it has some limitations. In particular, a WBAN has a very different network environment compared to a sensor network that uses free space, because wireless se...

  6. Policy-based Traffic Management in Home Area Network – An Elementary Testbed Model

    OpenAIRE

    Ibrahim Rana, Annie; Ó Foghlú, Mícheál

    2009-01-01

    Traffic management in home area network (HAN) is different from the traditional traffic management in access and core networks. Traditionally network traffic works in best effort fashion and the HAN services are usually accommodated on the basis of first-in first-out rule. However quality can deteriorate when high number of users is connected to the HAN. Moreover the bursty traffic can also impact the quality by chocking the network traffic and blocking the network resources for a...

  7. Prototype for Integrating Internet of Things and Emergency Service in an IP Multimedia Subsystem for Wireless Body Area Networks

    Institute of Scientific and Technical Information of China (English)

    KaiDi Chang; JiannLiang Chen; HanChieh Chao

    2014-01-01

    In recent years, the application of the Internet of Things (IoT) has become an emerging business. The most important concept of next-generation network for providing a common global IT platform is combining seamless networks and networked things, objects or sensors. Also, wireless body area networks (WBANs) are becoming mature with the widespread usage of the IoT. In order to support WBAN, the platform, scenario and emergency service are necessary due to the sensors in WBAN being related to wearer's life. The sensors on the body detect a lot of information about bioinformatics and medical signals, such as heartbeat and blood. Thus, the integration of IoT and network communication in daily life is important. However, there is not only a lack of common fabric for integrating IoT with current Internet and but also no emergency call process in the current network communication envi-ronment. To overcome such situations, the prototype of integrating IoT and emergency call process is discussed. A simulated boot-strap platform to provide the discussion of open challenges and solutions for deploying IoT in Internet and the emergency commu-nication system are analyzed by using a service of 3GPP IP multimedia subsystem. Finally, the prototype for supporting WBAN with emergence service is also addressed and the performance results are useful to service providers and network operators that they can estimate their migration to IoT by referring to this experience and experiment results. Furthermore, the queuing model used to achieve the performance of emergency service in IMS and the delay time of the proposed model is analyzed.

  8. Area Efficient Design of Routing Node for Network-on-Chip

    OpenAIRE

    Rehan Maroofi; Vilas Nitnaware; Shyam Limaye

    2011-01-01

    Network-on-Chip (NoC) is a paradigm proposed to satisfy the communication demands of future Systems-on-Chip (SoC). The main components of an NoC are the network adapters, routing nodes, and network interconnect links. Reducing area and power consumption has higher priority in the case of on-chip networks compared to conventional off-chip networks. This paper presents an area efficient design for the routing node component of an NoC. The area efficiency is obtained by applying the concept of a...

  9. ECG-cryptography and authentication in body area networks.

    Science.gov (United States)

    Zhang, Zhaoyang; Wang, Honggang; Vasilakos, Athanasios V; Fang, Hua

    2012-11-01

    Wireless body area networks (BANs) have drawn much attention from research community and industry in recent years. Multimedia healthcare services provided by BANs can be available to anyone, anywhere, and anytime seamlessly. A critical issue in BANs is how to preserve the integrity and privacy of a person's medical data over wireless environments in a resource efficient manner. This paper presents a novel key agreement scheme that allows neighboring nodes in BANs to share a common key generated by electrocardiogram (ECG) signals. The improved Jules Sudan (IJS) algorithm is proposed to set up the key agreement for the message authentication. The proposed ECG-IJS key agreement can secure data communications over BANs in a plug-n-play manner without any key distribution overheads. Both the simulation and experimental results are presented, which demonstrate that the proposed ECG-IJS scheme can achieve better security performance in terms of serval performance metrics such as false acceptance rate (FAR) and false rejection rate (FRR) than other existing approaches. In addition, the power consumption analysis also shows that the proposed ECG-IJS scheme can achieve energy efficiency for BANs. PMID:22752143

  10. Analyzing Medium Access Techniques in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    N. Javaid

    2014-01-01

    Full Text Available This paper presents comparison of Access Techniques used in Medium Access Control (MAC protocol for Wireless Body Area Networks (WBANs. Comparison is performed between Time Division Multiple Access (TDMA, Frequency Division Multiple Access (FDMA, Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA, Pure ALOHA and Slotted ALOHA (S-ALOHA. Performance metrics used for comparison are Throughput (T, Delay (D and Offered Load (G. The main goal for comparison is to show which technique gives highest Throughput and lowest Delay with increase in Load. Energy efficiency is major issue in WBAN that is why there is need to know which technique performs best for energy conservation and also gives minimum delay. Simulations are performed for different scenarios and results are compared for all techniques. We suggest TDMA as best technique to be used in MAC protocol for WBANs due to its high throughput and minimum delay with increase in load. MATLAB is the tool that is used for simulation.

  11. Wireless Body Area Network (WBAN) design techniques and performance evaluation.

    Science.gov (United States)

    Khan, Jamil Yusuf; Yuce, Mehmet R; Bulger, Garrick; Harding, Benjamin

    2012-06-01

    In recent years interest in the application of Wireless Body Area Network (WBAN) for patient monitoring applications has grown significantly. A WBAN can be used to develop patient monitoring systems which offer flexibility to medical staff and mobility to patients. Patients monitoring could involve a range of activities including data collection from various body sensors for storage and diagnosis, transmitting data to remote medical databases, and controlling medical appliances, etc. Also, WBANs could operate in an interconnected mode to enable remote patient monitoring using telehealth/e-health applications. A WBAN can also be used to monitor athletes' performance and assist them in training activities. For such applications it is very important that a WBAN collects and transmits data reliably, and in a timely manner to a monitoring entity. In order to address these issues, this paper presents WBAN design techniques for medical applications. We examine the WBAN design issues with particular emphasis on the design of MAC protocols and power consumption profiles of WBAN. Some simulation results are presented to further illustrate the performances of various WBAN design techniques. PMID:20953680

  12. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%. PMID:27091755

  13. Wireless Local Area Networks with Multiple-Packet Reception Capability

    CERN Document Server

    Zhang, Ying Jun; Liew, Soung Chang

    2007-01-01

    Thanks to its simplicity and cost efficiency, wireless local area network (WLAN) enjoys unique advantages in providing high-speed and low-cost wireless services in hot spots and indoor environments. Traditional WLAN medium-access-control (MAC) protocols assume that only one station can transmit at a time: simultaneous transmissions of more than one station causes the destruction of all packets involved. By exploiting recent advances in PHY-layer multiuser detection (MUD) techniques, it is possible for a receiver to receive multiple packets simultaneously. This paper argues that such multipacket reception (MPR) capability can greatly enhance the capacity of future WLANs. In addition, it provides the MAC-layer and PHY-layer designs needed to achieve the improved capacity. First, to demonstrate MUD/MPR as a powerful capacity-enhancement technique, we prove a "super-linearity" result, which states that the system throughput per unit cost increases as the MPR capability increases. Second, we show that the commonly...

  14. Experimental Characterization of a UWB Channel for Body Area Networks

    Directory of Open Access Journals (Sweden)

    Xia Lingli

    2011-01-01

    Full Text Available Ultrawideband (UWB communication is a promising technology for wireless body area networks (BANs, especially for applications that require transmission of both low and high data rates with excellent energy efficiency. Therefore, understanding the unique UWB channel propagation characteristics around the human body is critical for a successful wireless system, especially for insuring the reliability of important vital sign data. Previous work has focused only on on-body channels, where both TX and RX antennas are located on the human body. In this paper, a 3–5 GHz UWB channel is measured and analyzed for human body wireless communications. Beyond the conventional on-body channel model, line-of-sight (LOS and non-line-of-sight (NLOS channel models are obtained using a TX antenna placed at various locations of the human body while the RX antenna is placed away from the human body. Measurement results indicate that the human body does not significantly degrade the impedance of a monopole omnidirectional antenna. The measured path loss and multipath analysis suggest that a LOS UWB channel is excellent for low-power, high-data-rate transmission, while NLOS and on-body channels need to be reconfigured to operate at a lower data rate due to high path loss.

  15. Interference Mitigation for Cyber-Physical Wireless Body Area Network System Using Social Networks.

    Science.gov (United States)

    Zhang, Zhaoyang; Wang, Honggang; Wang, Chonggang; Fang, Hua

    2013-06-01

    Wireless body area networks (WBANs) are cyber-physical systems (CPS) that have emerged as a key technology to provide real-time health monitoring and ubiquitous healthcare services. WBANs could operate in dense environments such as in a hospital and lead to a high mutual communication interference in many application scenarios. The excessive interferences will significantly degrade the network performance including depleting the energy of WBAN nodes more quickly, and even eventually jeopardize people's lives due to unreliable (caused by the interference) healthcare data collections. Therefore, It is critical to mitigate the interference among WBANs to increase the reliability of the WBAN system while minimizing the system power consumption. Many existing approaches can deal with communication interference mitigation in general wireless networks but are not suitable for WBANs due to their ignoring the social nature of WBANs. Unlike the previous research, we for the first time propose a power game based approach to mitigate the communication interferences for WBANs based on the people's social interaction information. Our major contributions include: (1) model the inter-WBANs interference, and determine the distance distribution of the interference through both theoretical analysis and Monte Carlo simulations; (2) develop social interaction detection and prediction algorithms for people carrying WBANs; (3) develop a power control game based on the social interaction information to maximize the system's utility while minimize the energy consumption of WBANs system. The extensive simulation results show the effectiveness of the power control game for inter-WBAN interference mitigation using social interaction information. Our research opens a new research vista of WBANs using social networks. PMID:25436180

  16. A Realistic ICT Network Design and Implementation in the Neighbourhood Area of the Smart Grid

    OpenAIRE

    Zoya Pourmirza, John M. Brooke

    2013-01-01

    The Smart Grid has three main characteristics, which are to some degree antagonistic. These characteristics are: provision of good power quality, energy cost reduction and improvement in the reliability of the grid. The need to ensure that they can be accomplished together demands a much richer ICT monitoring and control network than the current system. In this paper we particularly investigate the design and deployment of the ICT system in the urban environment, specifically in a university ...

  17. A Discrete Event Modeling and Simulation of Wave Division Multiplexing Unidirectional Slotted Ring Metropolitan Area Network

    Directory of Open Access Journals (Sweden)

    H. A. Fua’ad

    2009-01-01

    Full Text Available Problem statement: The lack of uniformity in the choice of simulation platforms for optical WDM networks stands behind the difficulty of developing a common simulation environment. Correlating WDM unidirectional slotted ring network to Discrete Event Simulation (DES encompassing event definition, time advancing mechanism and scheduler has yet to be developed. Approach: The study focused on the proposed and the development of an event based discrete simulator for the WDM unidirectional slotted ring network to facilitate the reuse of the protocol modules under a common simulation environment. The proposed network architecture implemented for the developed simulator employs a separate wavelength as the control information channel. This control information enabled the nodes to monitor their access to the transmission media. Each node was equipped with a tunable transmitter and fixed receiver for data communication. Access nodes were equipped with a fixed transmitter and fixed receiver for the control information exchange. The developed simulator had derived the use of dividing the wavelength into slots. Nodes used these slots to transmit fixed size packets. Slots can be reused by the access node after receiving packets by the deployment of the spatial reuse scheme, thus enhancing the bandwidth utilization. The developed simulator had derived the set of the parameters, events, performance metrics and other unique WDM simulator elements according to a detailed analysis of the base model. Results: The network delay and packet loss were investigated and compared to a benchmark of the modeled domain. Successful deployment of the developed simulator was proven by the generated results. Conclusion: Extensive performance analysis of WDM unidirectional slotted ring network can be deployed using the developed simulator with low computational overheads. Further enhancements were to extend the developed simulator for bidirectional slotted ring supporting

  18. 管道支持移动传感器网络部署和调度研究综述%Survey of on deployment and scheduling of cable based mobile wireless sensor network

    Institute of Scientific and Technical Information of China (English)

    钟经伟; 袁学文; 罗更强

    2012-01-01

    On the analysis of mobile sensor network purpose, this paper overviewed the state-of-the-art of researches on the mobile sensors network deployment and scheduling, and proposed deployment and scheduling method of the cable based mobile sensor network lo identify and analyze a number of key challenges of such technology. Finally, it outlooked and discussed iu-ture development direction.%在分析移动传感网络用途的基础上,综述了移动传感网络部署和调度的研究现状,提出了基于管道支持的移动传感器网络部署和调度方法,识别和分析了其当前面临的一组关键挑战,展望和讨论了其未来的发展方向.

  19. Forecasting PM10 in metropolitan areas: Efficacy of neural networks

    International Nuclear Information System (INIS)

    Deterministic photochemical air quality models are commonly used for regulatory management and planning of urban airsheds. These models are complex, computer intensive, and hence are prohibitively expensive for routine air quality predictions. Stochastic methods are becoming increasingly popular as an alternative, which relegate decision making to artificial intelligence based on Neural Networks that are made of artificial neurons or ‘nodes’ capable of ‘learning through training’ via historic data. A Neural Network was used to predict particulate matter concentration at a regulatory monitoring site in Phoenix, Arizona; its development, efficacy as a predictive tool and performance vis-à-vis a commonly used regulatory photochemical model are described in this paper. It is concluded that Neural Networks are much easier, quicker and economical to implement without compromising the accuracy of predictions. Neural Networks can be used to develop rapid air quality warning systems based on a network of automated monitoring stations.Highlights: ► Neural Network is an alternative technique to photochemical modelling. ► Neutral Networks can be as effective as traditional air photochemical modelling. ► Neural Networks are much easier and quicker to implement in health warning system. - Neutral networks are as effective as photochemical modelling for air quality predictions, but are much easier, quicker and economical to implement in air pollution (or health) warning systems.

  20. From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT

    OpenAIRE

    Tieming Chen; Zhenbo Yu; Shijian Li; Bo Chen

    2016-01-01

    Model checking has successfully been applied on verification of security protocols, but the modeling process is always tedious and proficient knowledge of formal method is also needed although the final verification could be automatic depending on specific tools. At the same time, due to the appearance of novel kind of networks, such as wireless sensor networks (WSN) and wireless body area networks (WBAN), formal modeling and verification for these domain-specific systems are quite challengin...

  1. The Study on the Communication Network of Wide Area Measurement System in Electricity Grid

    Science.gov (United States)

    Xiaorong, Cheng; Ying, Wang; Yangdan, Ni

    Wide area measurement system(WAMS) is a fundamental part of security defense in Smart Grid, and the communication system of WAMS is an important part of Electric power communication network. For a large regional network is concerned, the real-time data which is transferred in the communication network of WAMS will affect the safe operation of the power grid directly. Therefore, WAMS raised higher requirements for real-time, reliability and security to its communication network. In this paper, the architecture of WASM communication network was studied according to the seven layers model of the open systems interconnection(OSI), and the network architecture was researched from all levels. We explored the media of WAMS communication network, the network communication protocol and network technology. Finally, the delay of the network were analyzed.

  2. Compressive-sampling-based positioning in wireless body area networks.

    Science.gov (United States)

    Banitalebi-Dehkordi, Mehdi; Abouei, Jamshid; Plataniotis, Konstantinos N

    2014-01-01

    Recent achievements in wireless technologies have opened up enormous opportunities for the implementation of ubiquitous health care systems in providing rich contextual information and warning mechanisms against abnormal conditions. This helps with the automatic and remote monitoring/tracking of patients in hospitals and facilitates and with the supervision of fragile, elderly people in their own domestic environment through automatic systems to handle the remote drug delivery. This paper presents a new modeling and analysis framework for the multipatient positioning in a wireless body area network (WBAN) which exploits the spatial sparsity of patients and a sparse fast Fourier transform (FFT)-based feature extraction mechanism for monitoring of patients and for reporting the movement tracking to a central database server containing patient vital information. The main goal of this paper is to achieve a high degree of accuracy and resolution in the patient localization with less computational complexity in the implementation using the compressive sensing theory. We represent the patients' positions as a sparse vector obtained by the discrete segmentation of the patient movement space in a circular grid. To estimate this vector, a compressive-sampling-based two-level FFT (CS-2FFT) feature vector is synthesized for each received signal from the biosensors embedded on the patient's body at each grid point. This feature extraction process benefits in the combination of both short-time and long-time properties of the received signals. The robustness of the proposed CS-2FFT-based algorithm in terms of the average positioning error is numerically evaluated using the realistic parameters in the IEEE 802.15.6-WBAN standard in the presence of additive white Gaussian noise. Due to the circular grid pattern and the CS-2FFT feature extraction method, the proposed scheme represents a significant reduction in the computational complexity, while improving the level of the

  3. Infrastructure Assisted Data Dissemination for Vehicular Sensor Networks in Metropolitan Areas

    NARCIS (Netherlands)

    Erman-Tüysüz, Aysegül; Schwartz, Ramon S.; Dilo, Arta; Scholten, Hans; Havinga, Paul; Daher, Robil; Vinel, Alexey

    2012-01-01

    Vehicular Sensor Networks (VSNs) are an emerging area of research that combines technologies developed in the domains of Intelligent Transport Systems (ITS) and Wireless Sensor Networks. Data dissemination is an important aspect of these networks. It enables vehicles to share relevant sensor data ab

  4. IP Connected Low Power Wireless Personal Area Networks in the Future Internet

    DEFF Research Database (Denmark)

    Jacobsen, Rune Hylsberg; Toftegaard, Thomas Skjødeberg; Kjærgaard, Jens Kristian

    2012-01-01

    , and available energy and will suffer a high data loss rate when integrated into a network infrastructure. This poses significant challenges in the network design. This chapter describes the assumptions, technologies, and challenges for transmitting IPv6 over low power wireless personal area networks (Lo...

  5. Establishment of national 80 GPS surveying control network of Xiangshan uranium mine area

    International Nuclear Information System (INIS)

    The status of Beijing 1954 surveying control network of Xiangshan uranium mine area is analyzed. With the national guidance of verification of mineral rights,the GPS tool is used to rebuild the national 1980 surveying control network of the uranium mine area. The general idea of establishing a network, construction program,and the accuracy evaluation are introduced. The practice shows that the accuracy of the surveying control network accords with the requirements of urban survey specifications, and this network can meet the requirements of the future mine development. (authors)

  6. Economic benefits of broadened local area networks for electric power plants

    International Nuclear Information System (INIS)

    The paper discusses economic benefits which influenced the choice of a broadband local area network for a power plant instead of an alternative multi-cable communication network. Broadband communication networks can offer significant economies over alternative technologies. One-time, cost avoidance savings and recurring annual savings are estimated to total $5.1 million in the first year. The cost/benefit analysis presented here can be used as a guide by other utilities to analyze communication networking alternatives. The paper also includes a discussion of local area network attributes relevant to the power plant installation

  7. Performance Implications of IPSec Deployment

    OpenAIRE

    Ronan, John; Davy, Stephen; Malone, Paul; Ó Foghlú, Mícheál

    2004-01-01

    Virtual Private Networks (VPNs) use the Internet or other data network service as a backbone to provide a secure connection across a potentially hostile WAN. Such security guarantees provide the motivation for VPN deployment. This security does, however, come at a performance cost brought about by the increased processing overhead. This paper presents an investigation into these overheads. In particular, this investigation will consider different user resource availability in addition to rout...

  8. Area Spectral and Energy Efficiency Analysis of Cellular Networks with Cell DTX

    OpenAIRE

    Chang, Peiliang; Miao, Guowang

    2015-01-01

    Cell discontinuous transmission (DTX) has been proposed as an effective solution to reduce energy consumption of cellular networks. In this paper, we investigate the impact of network traffic load on area spectral efficiency (ASE) and energy efficiency (EE) of cellular networks with cell DTX. Closedform expressions of ASE and EE as functions of traffic load for cellular networks with cell DTX are derived. It is shown that ASE increases monotonically in traffic load, while EE depends on the po...

  9. Locating Users to Develop Location-Based Services in Wireless Local Area Networks

    OpenAIRE

    Royo, José Alberto; Mena Nieto, Eduardo; Gallego, Luis Carlos

    2009-01-01

    Nowadays the proliferation of mobile computing devices and local-area wireless networks has fostered a growing interest in location aware systems and services. The challenges of theses services are: 1) to discover the location of the user (or his device), 2) to minimize the network connections, due to the high communication cost, 3) to deal with continuous change of location, 4) to consider network disconnections, and 5) to adjust its behavior to low bandwidth networks. In this paper we descr...

  10. The application of iterative equalisation to high data rate wireless personal area networks

    OpenAIRE

    Lillie, AG; Nix, AR; Fletcher, PN; McGeehan, JP

    2002-01-01

    There is increasing demand for broadband wireless personal area networking devices, mainly fuelled by mobile multimedia applications such as wireless home networks. This paper investigates the suitability of iterative equalisation as a means of achieving low bit and packet error rates in a future high data rate personal area network standard. Baseband simulation results demonstrate the powerful ISI mitigation and error correcting performance of such receivers when operating in representative ...

  11. Catchments network on badlands around Mediterranean area (RESOBAM)

    Science.gov (United States)

    Copard, Yoann; Lebouteiller, Caroline; Regues-Munoz, David; Latron, Jerome; Solé-Benet, Albert; Canton, Yolanda; Nadal-Romero, Estela; Della Seta, Marta; Rossi, Mauro; Capolongo, Domenico; Maquaire, Olivier; Forey, Estelle; Di-Giovanni, Christian; Gallart, Francesc; Delmonte, Maurizio; Vergari, Francesca; Massei, Nicolas; Torri, Dino

    2016-04-01

    Between 2013 and 2014, a network funded by MISTRALS-ENVIMED institution, was born around some instrumented catchments developing a badland-type morphology. This network has grouped 3 countries (France, Spain and Italy) with 12 scientific labs. RESOBAM has concerned two sites in France (Draix-Bléone and Vaches Noires), three in Spain (Vallcebre, Araguas and El Cautivo) and some sites in Italy (Tuscany, Basilicata). Main goal of this network was to federate the research around badlands at the European scale, by proposing some scientific topics as: sediment and water transports / budget, (bio)geochemical cycles, agricultural (farming), education, restoration, cultural heritage, soil conservation / biodiversity, climatic change etc. Other main interests were also to propose some common scientific projects and the development of students exchanges. This communication presents the synthesis of our four meetings held at Draix, Zaragoza, Almeriá and Rouen and some perspectives to continue this network.

  12. Hash-area-based data dissemination protocol in wireless sensor networks

    Institute of Scientific and Technical Information of China (English)

    WANG Tian; WANG Guo-jun; GUO Min-yi; JIA Wei-jia

    2008-01-01

    HashQuery, a Hash-area-based data dissemination protocol, was designed in wireless sensor networks. Using a Hash function which uses time as the key, both mobile sinks and sensors can determine the same Hash area. The sensors can send the information about the events that they monitor to the Hash area and the mobile sinks need only to query that area instead of flooding among the whole network, and thus much energy can be saved. In addition, the location of the Hash area changes over time so as to balance the energy consumption in the whole network. Theoretical analysis shows that the proposed protocol can be energy-efficient and simulation studies further show that when there are 5 sources and 5 sinks in the network, it can save at least 50% energy compared with the existing two-tier data dissemination(TTDD) protocol, especially in large-scale wireless sensor networks.

  13. Nuclear warhead verification system based on local area network

    International Nuclear Information System (INIS)

    The authors built up a nuclear warhead verification system based on Local Area Network (LAN). The hardware of the system consists of an Intranet server, two personnel computers and a portable high pure germanium gamma-ray spectrometer. The software, Blanking-out, is made of two modules designed for the inspecting and inspected parties respectively. Both of the two modules are interactive and communicate through the Intranet. When the system operates, any sensitive information carried by the high energy resolved gamma-ray spectrum collected by the detector will be meddled by the inspected module before the package of spectral data is sent to the inspecting module to prevent a disclosure of sensitive information. After receiving of the spectral data, the inspecting module will display on the screen of the inspecting PC terminal the verification results in a from of blanked spectrum (spectral blanking-out form) or a form of a piece of phrase (phrase form). The guideline to the spectral blanking-out is that: for those ranges of energy obligated to be inspected, the inspected module should ensure that the inspecting module can display their truly and subjective spectrum; and for the other ranges of energy, the inspected module can blank-out certain parts of the spectra based on the knowledge of sensitive information. Phrase form is rather straight-forward, answering the question whether the inspected warhead is a 'uranium-type', or 'Plutonium-type' or 'non-nuclear type'. The authors conducted a demonstration on some surrogates for nuclear warheads to see whether the nuclear warhead verification system possesses that capability of identifying the type of a warhead and blanking sensitive spectral information. The demonstration was carried out successfully. Phrase form is especially recommendable due to its stronger capability to prevent sensitive information from disclosure and its higher verification credibility. The demonstration also disclosed some deficiencies of the

  14. 三维传感器网络部署、覆盖和连接问题研究%Research on deployment,coverage and connectivity in three dimensional sensor networks

    Institute of Scientific and Technical Information of China (English)

    钟永信; 黄建国; 韩晶

    2011-01-01

    To solve the problem of optimal deployment of nodes in three dimensional sensor networks,an algorithm of maximal efficient volume per node is presented by analyzing some popular deployment patterns of space-filling polyhedrons such as cube and truncated octahedron.This algorithm can calculate the minimal number of sensors needed to achieve both full coverage and connectivity of networks.Finally,the deployment performances of regular polyhedrons are compared by some simulations.Optimal deployment patterns under the condition of different values of rc/rs are obtained,where rc is communication range and rs is sensing range,and the deployment efficiency of networks is improved.%针对三维传感器网络中节点最优部署问题进行研究.通过分析常用规则多面体(如立方体和截顶八面体等)在三维空间的填充特点,提出了网络节点按规则多面体部署时,单位节点最大有效体积的计算方法;同时利用该方法得到了网络区域保持充分覆盖且邻节点相连接时所需的最少节点数;最后通过仿真比较了不同规则多面体的部署性能,进而给出了在各种rc/rs(rc为通信范围,rs为感测范围)情况下的最优部署模式,提高了网络节点的部署效率.

  15. A Review of Protocol Implementations and Energy Efficient Cross-Layer Design for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Tao Chen

    2012-11-01

    Full Text Available The issues inherent in caring for an ever-increasing aged population has been the subject of endless debate and continues to be a hot topic for political discussion. The use of hospital-based facilities for the monitoring of chronic physiological conditions is expensive and ties up key healthcare professionals. The introduction of wireless sensor devices as part of a Wireless Body Area Network (WBAN integrated within an overall eHealth solution could bring a step change in the remote management of patient healthcare. Sensor devices small enough to be placed either inside or on the human body can form a vital part of an overall health monitoring network. An effectively designed energy efficient WBAN should have a minimal impact on the mobility and lifestyle of the patient. WBAN technology can be deployed within a hospital, care home environment or in the patient’s own home. This study is a review of the existing research in the area of WBAN technology and in particular protocol adaptation and energy efficient cross-layer design. The research reviews the work carried out across various layers of the protocol stack and highlights how the latest research proposes to resolve the various challenges inherent in remote continual healthcare monitoring.

  16. A review of protocol implementations and energy efficient cross-layer design for wireless body area networks.

    Science.gov (United States)

    Hughes, Laurie; Wang, Xinheng; Chen, Tao

    2012-01-01

    The issues inherent in caring for an ever-increasing aged population has been the subject of endless debate and continues to be a hot topic for political discussion. The use of hospital-based facilities for the monitoring of chronic physiological conditions is expensive and ties up key healthcare professionals. The introduction of wireless sensor devices as part of a Wireless Body Area Network (WBAN) integrated within an overall eHealth solution could bring a step change in the remote management of patient healthcare. Sensor devices small enough to be placed either inside or on the human body can form a vital part of an overall health monitoring network. An effectively designed energy efficient WBAN should have a minimal impact on the mobility and lifestyle of the patient. WBAN technology can be deployed within a hospital, care home environment or in the patient’s own home. This study is a review of the existing research in the area of WBAN technology and in particular protocol adaptation and energy efficient cross-layer design. The research reviews the work carried out across various layers of the protocol stack and highlights how the latest research proposes to resolve the various challenges inherent in remote continual healthcare monitoring. PMID:23202185

  17. Optimal Assignment of Cells in C-RAN Deployments with Multiple BBU Pools

    DEFF Research Database (Denmark)

    Holm, Henrik; Checko, Aleksandra; Al-obaidi, Rami;

    2015-01-01

    Cloud Radio Access Network (C-RAN) is receiving increasing attention not only within the research community but also from operators and standardization bodies. However, even a good technology will be deployed only if it is economically viable. In our previous work, for larger scale deployment we...... recommend to divide the area into multiple BBU Pools. In this paper we show how to optimally assign cells to different BBU Pools in such a scenario. By using Integer Linear Programming (ILP) method we derive engineering guidelines for minimizing the CAPital EXpenditure (CAPEX) of C-RAN deployment....

  18. Management and development of local area network upgrade prototype

    Science.gov (United States)

    Fouser, T. J.

    1981-01-01

    Given the situation of having management and development users accessing a central computing facility and given the fact that these same users have the need for local computation and storage, the utilization of a commercially available networking system such as CP/NET from Digital Research provides the building blocks for communicating intelligent microsystems to file and print services. The major problems to be overcome in the implementation of such a network are the dearth of intelligent communication front-ends for the microcomputers and the lack of a rich set of management and software development tools.

  19. Implementation of SNS Model for Intrusion Prevention in Wireless Local Area Network

    DEFF Research Database (Denmark)

    Isah, Abdullahi

    The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria.......The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria....

  20. The study of real security of WiFi networks in selected area

    OpenAIRE

    Kühnel, Ondřej

    2012-01-01

    This work deals with the real security of WiFi networks in selected areas. The main objective is to determine what knowledge users have about the security of WiFi networks using a questionnaire and to find out what is the real security of access points in the monitoring area WiFi networks. At the beginning, the work provides information on WiFi technology, security, possible attacks on WiFi networks and basic configuration of the wireless access point. The second part of this work is to evalu...

  1. ASE-BAN, a Wireless Body Area Network Testbed

    DEFF Research Database (Denmark)

    Madsen, Jens Kargaard; Karstoft, Henrik; Toftegaard, Thomas Skjødeberg;

    2010-01-01

    /actuators attached to the body and a host server application. The gateway uses the BlackFin BF533 processor from Analog Devices, and uses Bluetooth for wireless communication. Two types of sensors are attached to the network: an electro-cardio-gram sensor and an oximeter sensor. The testbed has been successfully...

  2. The provosion of wide-area networking facilities

    International Nuclear Information System (INIS)

    The academic community in the United Kingdom is currently engaged in an extensive programme to provide comprehensive networking facilities within and among the 47 universities and numerous research institutions in the British Isles. The programme is described and the possible provision of similar facilities on an international scale discussed. (orig.)

  3. Demo: Snap – Rapid Sensornet Deployment with a Sensornet Appstore

    OpenAIRE

    Duquennoy, Simon; Wirström, Niklas; Dunkels, Adam

    2011-01-01

    Despite ease of deployment being seen as a primary advantage of sensor networks, deployment remains difficult. We present Snap, a system for rapid sensornet deployment that allows sensor networks to be deployed, positioned, and reprogrammed through a sensornet appstore. Snap uses a smartphone interface that uses QR codes for node identification, a map interface for node positioning, and dynamic loading of applications on the nodes. Snap nodes run the Contiki operating system...

  4. Measuring the effectiveness of protected area networks in reducing deforestation

    OpenAIRE

    Andam, Kwaw S.; Ferraro, Paul J.; Pfaff, Alexander; Sanchez-Azofeifa, G. Arturo; Robalino, Juan A.

    2008-01-01

    Global efforts to reduce tropical deforestation rely heavily on the establishment of protected areas. Measuring the effectiveness of these areas is difficult because the amount of deforestation that would have occurred in the absence of legal protection cannot be directly observed. Conventional methods of evaluating the effectiveness of protected areas can be biased because protection is not randomly assigned and because protection can induce deforestation spillovers (displacement) to neighbo...

  5. Area law and vacuum reordering in harmonic networks

    OpenAIRE

    Riera, A.; Latorre, J I

    2006-01-01

    We review a number of ideas related to area law scaling of the geometric entropy from the point of view of condensed matter, quantum field theory and quantum information. An explicit computation in arbitrary dimensions of the geometric entropy of the ground state of a discretized scalar free field theory shows the expected area law result. In this case, area law scaling is a manifestation of a deeper reordering of the vacuum produced by majorization relations. Furthermore, the explicit contro...

  6. Dense wavelength division multiplexing devices for metropolitan-area datacom and telecom networks

    Science.gov (United States)

    DeCusatis, Casimer M.; Priest, David G.

    2000-12-01

    Large data processing environments in use today can require multi-gigabyte or terabyte capacity in the data communication infrastructure; these requirements are being driven by storage area networks with access to petabyte data bases, new architecture for parallel processing which require high bandwidth optical links, and rapidly growing network applications such as electronic commerce over the Internet or virtual private networks. These datacom applications require high availability, fault tolerance, security, and the capacity to recover from any single point of failure without relying on traditional SONET-based networking. These requirements, coupled with fiber exhaust in metropolitan areas, are driving the introduction of dense optical wavelength division multiplexing (DWDM) in data communication systems, particularly for large enterprise servers or mainframes. In this paper, we examine the technical requirements for emerging nextgeneration DWDM systems. Protocols for storage area networks and computer architectures such as Parallel Sysplex are presented, including their fiber bandwidth requirements. We then describe two commercially available DWDM solutions, a first generation 10 channel system and a recently announced next generation 32 channel system. Technical requirements, network management and security, fault tolerant network designs, new network topologies enabled by DWDM, and the role of time division multiplexing in the network are all discussed. Finally, we present a description of testing conducted on these networks and future directions for this technology.

  7. A Survey on Wireless Body Area Networks for eHealthcare Systems in Residential Environments

    Science.gov (United States)

    Ghamari, Mohammad; Janko, Balazs; Sherratt, R. Simon; Harwin, William; Piechockic, Robert; Soltanpur, Cinna

    2016-01-01

    Current progress in wearable and implanted health monitoring technologies has strong potential to alter the future of healthcare services by enabling ubiquitous monitoring of patients. A typical health monitoring system consists of a network of wearable or implanted sensors that constantly monitor physiological parameters. Collected data are relayed using existing wireless communication protocols to a base station for additional processing. This article provides researchers with information to compare the existing low-power communication technologies that can potentially support the rapid development and deployment of WBAN systems, and mainly focuses on remote monitoring of elderly or chronically ill patients in residential environments. PMID:27338377

  8. A Survey on Wireless Body Area Networks for eHealthcare Systems in Residential Environments.

    Science.gov (United States)

    Ghamari, Mohammad; Janko, Balazs; Sherratt, R Simon; Harwin, William; Piechockic, Robert; Soltanpur, Cinna

    2016-01-01

    Current progress in wearable and implanted health monitoring technologies has strong potential to alter the future of healthcare services by enabling ubiquitous monitoring of patients. A typical health monitoring system consists of a network of wearable or implanted sensors that constantly monitor physiological parameters. Collected data are relayed using existing wireless communication protocols to a base station for additional processing. This article provides researchers with information to compare the existing low-power communication technologies that can potentially support the rapid development and deployment of WBAN systems, and mainly focuses on remote monitoring of elderly or chronically ill patients in residential environments. PMID:27338377

  9. An evaluation of Access Tier local area network switches.

    Energy Technology Data Exchange (ETDEWEB)

    Eldridge, John M.; Olsberg, Ronald R.

    2004-06-01

    This reports tabulates the Test and Evaluation results of the Access Class Switch tests conducted by members of Department 9336. About 15 switches were reviewed for use in the enterprise network as access tier switches as defined in a three tier architecture. The Access Switch Tier has several functions including: aggregate customer desktop ports, preserve and apply QoS tags, provide switched LAN access, provide VLAN assignment, as well as others. The typical switch size is 48 or less user ports. The evaluation team reviewed network switch evaluation reports from the Tolly Group as well as other sources. We then used these reports as a starting point to identify particular switches for evaluation. In general we reviewed the products of dominant equipment manufacturers. Also, based on architectural design requirements, the majority of the switches tested were of relatively small monolithic unit variety.

  10. Cellular telephone-based wide-area radiation detection network

    Science.gov (United States)

    Craig, William W.; Labov, Simon E.

    2009-06-09

    A network of radiation detection instruments, each having a small solid state radiation sensor module integrated into a cellular phone for providing radiation detection data and analysis directly to a user. The sensor module includes a solid-state crystal bonded to an ASIC readout providing a low cost, low power, light weight compact instrument to detect and measure radiation energies in the local ambient radiation field. In particular, the photon energy, time of event, and location of the detection instrument at the time of detection is recorded for real time transmission to a central data collection/analysis system. The collected data from the entire network of radiation detection instruments are combined by intelligent correlation/analysis algorithms which map the background radiation and detect, identify and track radiation anomalies in the region.

  11. LHCNet: Wide Area Networking and Collaborative Systems for HEP

    Energy Technology Data Exchange (ETDEWEB)

    Newman, H.B,

    2007-08-20

    This proposal presents the status and progress in 2006-7, and the technical and financial plans for 2008-2010 for the US LHCNet transatlantic network supporting U.S. participation in the LHC physics program. US LHCNet provides transatlantic connections of the Tier1 computing facilities at Fermilab and Brookhaven with the Tier0 and Tier1 facilities at CERN as well as Tier1s elsewhere in Europe and Asia. Together with ESnet, Internet2, the GEANT pan-European network, and NSF’s UltraLight project, US LHCNet also supports connections between the Tier2 centers (where most of the analysis of the data will take place, starting this year) and the Tier1s as needed.See report

  12. Overview of HEP wide area networking: Producer perspective

    International Nuclear Information System (INIS)

    The prime role of HEP network producers is to understand user requirements and to translate them into policies and solutions; the next stage is to manage in a collaborative way the resulting services. Close coordination is essential, and concrete steps have been taken by HEP in Europe and the USA to set up the appropriate management structures. External constraints also exist (PTTs, policies on standards, ...) and the HEP network provider has to accomodate all these components in the planning of future services. This paper mainly discusses what has been achieved worldwide by HEP in this context - a set of coordinated conventional services using multivendor and proprietary protocols and mainly based on leased lines - and what can be expected in the coming years: advanced services consistent with the Supercomputer-Workstation era, based on high (megabit) to very high (hundred megabit) links. This is required to actually achieve collaborative and distributed processing of HEP data. (orig.)

  13. LHCNet: Wide Area Networking and Collaborative Systems for HEP

    International Nuclear Information System (INIS)

    This proposal presents the status and progress in 2006-7, and the technical and financial plans for 2008-2010 for the US LHCNet transatlantic network supporting U.S. participation in the LHC physics program. US LHCNet provides transatlantic connections of the Tier1 computing facilities at Fermilab and Brookhaven with the Tier0 and Tier1 facilities at CERN as well as Tier1s elsewhere in Europe and Asia. Together with ESnet, Internet2, the GEANT pan-European network, and NSF's UltraLight project, US LHCNet also supports connections between the Tier2 centers (where most of the analysis of the data will take place, starting this year) and the Tier1s as needed.See report

  14. Selecting/realization of Virtual Private Networks with Multiprotocol Label Switching or Virtual Local Area Networks

    OpenAIRE

    Ögren, Niklas

    2002-01-01

    Many reports have been written about the techniques behind Virtual Private Networks (VPN) and Multi Protocol Label Switching (MPLS). They usually deal with the low level design of the software implementing a specific technique. The initial products are usually not mature enough to run in a large network or have to be adjusted in some way to fit. This report investigates the different ways of implementing strict layer 2 Virtual Private Networks in an existing nation-wide Gigabit Ethernet. The ...

  15. WAVNet: Wide-Area Network virtualization technique for Virtual Private Cloud

    OpenAIRE

    Di, S; Zhang, W.; Cheng, L.; Xu, Z.; Wang, CL

    2011-01-01

    A Virtual Private Cloud (VPC) is a secure collection of computing, storage and network resources spanning multiple sites over Wide Area Network (WAN). With VPC, computation and services are no longer restricted to a fixed site but can be relocated dynamically across geographical sites to improve manageability, performance and fault tolerance. We propose WAVNet, a layer 2 virtual private network (VPN) which supports virtual machine live migration over WAN to realize mobility of execution envir...

  16. Weighted Energy-Balanced Efficient Routing Algorithm for Wireless Body Area Network

    OpenAIRE

    Zhuoming Li; Zhenyu Xu; Shengge Mao; Xing Tong; Xuejun Sha

    2016-01-01

    Wireless Body Area Network (WBAN) is a small-scaled sensor network consisting of a series of medical devices attributed to, around, or implanted in a human body, providing continuous monitoring by different sensors to collect vital signals or motion and GPS. This paper proposes an effective routing algorithm to balance the energy consumption within a WBAN in order to prolong the overall lifetime of the network, called dynamic routing algorithm (DRA) and its improved version based on a multipa...

  17. Policy Refinement for Traffic Management in Home Area Networks: Problem Statement

    OpenAIRE

    Rana, Annie Ibrahim; O Foghlu, Micheal

    2009-01-01

    Traditional home area network (HAN) equipment is usually unmanaged and network traffic is served in best effort fashion. This type of unmanaged network sometimes causes quality-of-service issues in the HAN, for example loss of quality in streamed video or audio content. Traffic management rules using policies to prioritise certain types of traffic according to user requirements and to assign bandwidth limits to other traffic types. However very little work has been done yet addressing the ...

  18. Energy efficiency in wireless networks

    CERN Document Server

    Jumira, Oswald

    2013-01-01

    The last decade has witnessed an unprecedented development and growth in global wireless communications systems, technologies and network "traffic" generated over network infrastructures.This book presents state-of-the-art energy-efficient techniques, designs and implementations that pertain to wireless communication networks such as cellular networks, wireless local area networks (WLANs) and wireless ad hoc networks (WAHNs) including mobile ad hoc networks (MANETs), and wireless sensor networks (WSNs) as they are deployed across the world to facilitate "always on" reliable high-speed

  19. Area law and vacuum reordering in harmonic networks

    International Nuclear Information System (INIS)

    We review a number of ideas related to area-law scaling of the geometric entropy from the point of view of condensed matter, quantum field theory, and quantum information. An explicit computation in arbitrary dimensions of the geometric entropy of the ground state of a discretized scalar free field theory shows the expected area law result. In this case, area-law scaling is a manifestation of a deeper reordering of the vacuum produced by majorization relations. Furthermore, the explicit control on all the eigenvalues of the reduced density matrix allows for a verification of entropy loss along the renormalization group trajectory driven by the mass term. A further result of our computation shows that single-copy entanglement also obeys area law scaling, majorization relations, and decreases along renormalization group flows

  20. Area γ radiation monitoring network systems based on totally integrated automation

    International Nuclear Information System (INIS)

    It introduces a kind of Area γ Radiation Monitoring Network Systems based on Totally Integrated Automation. It features simple and safe process control, easy integration of information network, field bus and field instrumentation, modular design and powerful system expansion, implements management and control integration, is positive importance for localization of Radiation Monitoring System. (authors)

  1. Low Rate Wireless Personal Area Networks (LR-WPAN 802.15.4 standard)

    OpenAIRE

    Mirzoev, Dr. Timur

    2014-01-01

    This manuscript will provide a brief overview on Low Rate Wireless Personal Area Networks (LR-WPAN) for 802.15.4 protocol standard which was approved by IEEE Computer Society in May 2003. 802.15.4 standard presents some advantages for structuring sensor networks and other types of applications that require low rate communications. Some security considerations will also be presented.

  2. Implementation of SNS Model for Intrusion Prevention in Wireless Local Area Network

    OpenAIRE

    Isah, Abdullahi

    2015-01-01

    The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria.

  3. From BAN to AmI-BAN: micro and nano technologies in future Body Area Networks

    NARCIS (Netherlands)

    Jones, Val; Jones, V.M.

    2006-01-01

    At the University of Twente we have been researching mobile healthcare applications since 1999. Since 2002 the University of Twente and partners have been developing health Body Area Networks (BANs) and a BAN service platform. We define a BAN as a network of communicating devices worn on, around or

  4. Modern Agricultural Digital Management Network Information System of Heilongjiang Reclamation Area Farm

    OpenAIRE

    Wang, Xi; Wang, Chun; Zhuang, Wei Dong; Yang, Hui

    2010-01-01

    To meet the need of agriculture management modernization of Heilongjiang reclamation area, further boost large-scale integration level of modern agriculture production and boost management level of agriculture production.On Red Farm, we have established the digital management network information system with the remote sensor technology, GIS technology, GPS technology, database technology, network technology, agriculture intelligent technology, multimedia technology, information auto acquired ...

  5. Metropolitian area network services comprised of virtual local area networks running over hybrid fiber-coax and asynchronous transfer mode technologies

    Science.gov (United States)

    Biedron, William S.

    1995-11-01

    Since 1990 there has been a rapid increase in the demand for communication services, especially local and wide area network (LAN/WAN) oriented services. With the introduction of the DFB laser transmitter, hybrid-fiber-coax (HFC) cable plant designs, ATM transport technologies and rf modems, new LAN/WAN services can now be defined and marketed to residential and business customers over existing cable TV systems. The term metropolitan area network (MAN) can be used to describe this overall network. This paper discusses the technical components needed to provision these services as well as provides some perspectives on integration issues. Architecture at the headend and in the backbone is discussed, as well as specific service definitions and the technology issues associated with each. The TCP/IP protocol is suggested as a primary protocol to be used throughout the MAN.

  6. STIMULUS: End-System Network Interface Controller for 100 Gb/s Wide Area Networks

    Energy Technology Data Exchange (ETDEWEB)

    Zarkesh-Ha, Payman [University of New Mexico

    2014-09-12

    The main goal of this research grant is to develop a system-level solution leveraging novel technologies that enable network communications at 100 Gb/s or beyond. University of New Mexico in collaboration with Acadia Optronics LLC has been working on this project to develop the 100 Gb/s Network Interface Controller (NIC) under this Department of Energy (DOE) grant.

  7. Scale-dependent effects of habitat area on species interaction networks: invasive species alter relationships

    Directory of Open Access Journals (Sweden)

    Sugiura Shinji

    2012-07-01

    Full Text Available Abstract Background The positive relationship between habitat area and species number is considered a fundamental rule in ecology. This relationship predicts that the link number of species interactions increases with habitat area, and structure is related to habitat area. Biological invasions can affect species interactions and area relationships. However, how these relationships change at different spatial scales has remained unexplored. We analysed understory plant–pollinator networks in seven temperate forest sites at 20 spatial scales (radius 120–2020 m to clarify scale-associated relationships between forest area and plant–pollinator networks. Results The pooled data described interactions between 18 plant (including an exotic and 89 pollinator (including an exotic species. The total number of species and the number of interaction links between plant and pollinator species were negatively correlated with forest area, with the highest correlation coefficient at radii of 1520 and 1620 m, respectively. These results are not concordant with the pattern predicted by species–area relationships. However, when associations with exotic species were excluded, the total number of species and the number of interaction links were positively correlated with forest area (the highest correlation coefficient at a radius of 820 m. The network structure, i.e., connectance and nestedness, was also related to forest area (the highest correlation coefficients at radii of 720–820 m, when associations with exotics were excluded. In the study area, the exotic plant species Alliaria petiolata, which has invaded relatively small forest patches surrounded by agricultural fields, may have supported more native pollinator species than initially expected. Therefore, this invasive plant may have altered the original relationships between forest area and plant–pollinator networks. Conclusions Our results demonstrate scale-dependent effects of forest

  8. Study of Dynamic eICIC in a Realistic Urban Deployment

    DEFF Research Database (Denmark)

    Pedersen, Klaus I.; Soret, Beatriz; Barcos, Sonia; Gerardino, Guillermo Andrés Pocovi; Wang, Hua

    2015-01-01

    In this paper, we investigate the operation of eICIC in a realistic deployment based on site specific data from a dense urban European capital area. Rather than the classical semistatic and common network-wide configuration, the importance of having highly dynamic and distributed mechanisms that ...

  9. Development of a Lab Experiment for Intrusion Detection System in Wireless Body Area Networks

    OpenAIRE

    2013-01-01

    With the advent of sophisticated technology and associated indubitable benefits, the wireless network is gaining popularity day by day. Still there exists numerous security challenges and to overcome these, different researches are being carried on. This suggests that the wireless security is still in nascent stage and requires further development. The new wireless technologies like Wireless Body Area Network, thus provides tough challenges to security professionals. Wireless Body Area Networ...

  10. Wireless Body Area Networks and Its Emerging Technologies in Real Time Applications

    OpenAIRE

    Esther Evangelin; Dahlia Sam

    2014-01-01

    With the rapid improvement of wireless communication and semiconductor technologies, the body area sensor network (BASN) is fast developing. The BASN which is also referred to as the WBAN (Wireless Body Area Network), is widely used in medical applications and comprises of Body Sensors attached to human body. These body sensors will help to monitor the interior functions of the body. The data generated by the sensors is transmitted via the internet and collected in external se...

  11. Energy Efficient Aggregation and Reliable Communication for Wireless Body Area Networks (WBAN)

    OpenAIRE

    Venkatasubramanian Sivaprasatham; Dr. Jothi venkateswaran; Dr. Hafidh Taher Ba Omar

    2014-01-01

    In wireless body area networks (WBAN), the data loss, security and reliability requirements are not handled in the existing literature works. This necessitates the technique that deals with slot allocation scheme, delay and other performance metrics. In order to overcome this issue, in this paper, we propose an energy efficient aggregation and reliable communication for Wireless Body Area Networks (WBAN). Initially, the aggregator nodes are chosen based on the nodes connectivity. During the d...

  12. Security and privacy in emerging networks: Part 1 [Guest Editorial

    OpenAIRE

    Guizani, Mohsen; He, Daojing; Ren, Kui; Rodrigues, Joel; Chan, Sammy; Zhang, Yan

    2015-01-01

    With the recent advancements in networking technologies, some new emerging networks are being implemented that have the potential to be deployed broadly and on a large scale in the near future. In the wired domain, these emerging networks include, for example, networks based on software-defined networking (SDN) and named data networking (NDN). In the wireless domain, they include mobile and wireless networks involving handheld computing devices, sensors and RFID devices, body area sensor netw...

  13. Directional Probability Perceived Nodes Deployment Based on Particle Swarm Optimization

    OpenAIRE

    Zhang, Junguo; Lei, Yutong; Chen, Chen; Lin, Fantao

    2016-01-01

    Node deployment is the key problem of wireless sensor network technology. For a directional sensor network, the perceived probability model reflects the quality of the network. The problem of the probability node deployment is too little of the distribution of the nodes asymmetrical. In this paper, we study the probability model of directional perceived nodes and propose an improved deterministic deployment algorithm based on particle swarm optimization to increase perceived probability. By a...

  14. ON MOBILE MESH NETWORKS

    OpenAIRE

    Namiot, Dmitry

    2015-01-01

    With the advances in mobile computing technologies and the growth of the Net, mobile mesh networks are going through a set of important evolutionary steps. In this paper, we survey architectural aspects of mobile mesh networks and their use cases and deployment models. Also, we survey challenging areas of mobile mesh networks and describe our vision of promising mobile services. This paper presents a basic introductory material for Masters of Open Information Technologies Lab, interested in m...

  15. Geotechnology-Based Modeling to Optimize Conservation of Forest Network in Urban Area

    Science.gov (United States)

    Teng, Mingjun; Zhou, Zhixiang; Wang, Pengcheng; Xiao, Wenfa; Wu, Changguang; Lord, Elizabeth

    2016-03-01

    Forest network development in urban areas faces the challenge from forest fragmentation, human-induced disturbances, and scarce land resources. Here, we proposed a geotechnology-based modeling to optimize conservation of forest network by a case study of Wuhan, China. The potential forest network and their priorities were assessed using an improved least-cost path model and potential utilization efficiency estimation. The modeling process consists of four steps: (i) developing species assemblages, (ii) identifying core forest patches, (iii) identifying potential linkages among core forest patches, and (iv) demarcating forest networks. As a result, three species assemblages, including mammals, pheasants, and other birds, were identified as the conservation targets of urban forest network (UFN) in Wuhan, China. Based on the geotechnology-based model, a forest network proposal was proposed to fulfill the connectivity requirements of selected species assemblages. The proposal consists of seven forest networks at three levels of connectivity, named ideal networks, backbone networks, and comprehensive network. The action priorities of UFN plans were suggested to optimize forest network in the study area. Additionally, a total of 45 forest patches with important conservation significance were identified as prioritized stepping-stone patches in the forest network development. Urban forest conserve was also suggested for preserving woodlands with priority conservation significance. The presented geotechnology-based modeling is fit for planning and optimizing UFNs, because of the inclusion of the stepping-stone effects, human-induced pressures, and priorities. The framework can also be applied to other areas after a sensitivity test of the model and the modification of the parameters to fit the local environment.

  16. Geotechnology-Based Modeling to Optimize Conservation of Forest Network in Urban Area.

    Science.gov (United States)

    Teng, Mingjun; Zhou, Zhixiang; Wang, Pengcheng; Xiao, Wenfa; Wu, Changguang; Lord, Elizabeth

    2016-03-01

    Forest network development in urban areas faces the challenge from forest fragmentation, human-induced disturbances, and scarce land resources. Here, we proposed a geotechnology-based modeling to optimize conservation of forest network by a case study of Wuhan, China. The potential forest network and their priorities were assessed using an improved least-cost path model and potential utilization efficiency estimation. The modeling process consists of four steps: (i) developing species assemblages, (ii) identifying core forest patches, (iii) identifying potential linkages among core forest patches, and (iv) demarcating forest networks. As a result, three species assemblages, including mammals, pheasants, and other birds, were identified as the conservation targets of urban forest network (UFN) in Wuhan, China. Based on the geotechnology-based model, a forest network proposal was proposed to fulfill the connectivity requirements of selected species assemblages. The proposal consists of seven forest networks at three levels of connectivity, named ideal networks, backbone networks, and comprehensive network. The action priorities of UFN plans were suggested to optimize forest network in the study area. Additionally, a total of 45 forest patches with important conservation significance were identified as prioritized stepping-stone patches in the forest network development. Urban forest conserve was also suggested for preserving woodlands with priority conservation significance. The presented geotechnology-based modeling is fit for planning and optimizing UFNs, because of the inclusion of the stepping-stone effects, human-induced pressures, and priorities. The framework can also be applied to other areas after a sensitivity test of the model and the modification of the parameters to fit the local environment. PMID:26661451

  17. Requirements and System Architecture for a Healthcare Wireless Body Area Network

    DEFF Research Database (Denmark)

    Hansen, Finn Overgaard; Toftegaard, Thomas Skjødeberg

    Wireless body area networks enable new opportunities for personal healthcare monitoring and personal healthcare applications. This paper presents a comprehensive set of requirements and challenges for building a wireless body area network to support diverse user groups and a corresponding set of ...... of an ASE-BAN test bed. The major goal for this test bed is to be a platform for research and experiments with development of an ultra-low power body area network including sensor, communication nodes, communication protocols and a body gateway component.......Wireless body area networks enable new opportunities for personal healthcare monitoring and personal healthcare applications. This paper presents a comprehensive set of requirements and challenges for building a wireless body area network to support diverse user groups and a corresponding set...... of healthcare applications. Based on the identified requirements, the paper presents an architecture for a wireless body area network and describes how this architecture is connected to an existing it-infrastructure supporting healthcare at home. Finally the paper presents our on-going research with development...

  18. Autonomous Management of a Recursive Area Hierarchy for Large Scale Wireless Sensor Networks using Multiple Parents

    Energy Technology Data Exchange (ETDEWEB)

    Cree, Johnathan V.; Delgado-Frias, Jose

    2016-03-15

    Large scale wireless sensor networks have been proposed for applications ranging from anomaly detection in an environment to vehicle tracking. Many of these applications require the networks to be distributed across a large geographic area while supporting three to five year network lifetimes. In order to support these requirements large scale wireless sensor networks of duty-cycled devices need a method of efficient and effective autonomous configuration/maintenance. This method should gracefully handle the synchronization tasks duty-cycled networks. Further, an effective configuration solution needs to recognize that in-network data aggregation and analysis presents significant benefits to wireless sensor network and should configure the network in a way such that said higher level functions benefit from the logically imposed structure. NOA, the proposed configuration and maintenance protocol, provides a multi-parent hierarchical logical structure for the network that reduces the synchronization workload. It also provides higher level functions with significant inherent benefits such as but not limited to: removing network divisions that are created by single-parent hierarchies, guarantees for when data will be compared in the hierarchy, and redundancies for communication as well as in-network data aggregation/analysis/storage.

  19. Scale-dependent effects of habitat area on species interaction networks: invasive species alter relationships

    OpenAIRE

    Sugiura Shinji; Taki Hisatomo

    2012-01-01

    Abstract Background The positive relationship between habitat area and species number is considered a fundamental rule in ecology. This relationship predicts that the link number of species interactions increases with habitat area, and structure is related to habitat area. Biological invasions can affect species interactions and area relationships. However, how these relationships change at different spatial scales has remained unexplored. We analysed understory plant–pollinator networks in s...

  20. Physical Monitoring in Daily Life by Remote Body Area Network System

    International Nuclear Information System (INIS)

    To spend daily life in high QOL, it is important to keep our health condition. Physical diseases are caused by various body parameters. People must get body parameter in daily life. Therefore people need wearable body area network system for getting body parameter in daily life. Authors made wearable body area network system which can get heart rate, SpO2, body temperature, skin temperature, air temperature, impact and acceleration of waist, shoulder, both ankles and wrist. Moreover authors made some applications by using these parameters. This paper describes the wearable sensing network system, host system to monitor dynamic physical conditions of user at remote location and applications

  1. Reconfigurable hardware applications on NetFPGA for network monitoring in large area sensor networks

    International Nuclear Information System (INIS)

    A valuable functionality for sensor networks, distributed in large volumes is the capability to characterize and analyze the data traffic at wire speed and monitor the data prior to committing to permanent storage. As a demonstrator we use a reconfigurable hardware router for real-time monitoring of data before their transmission to further processing and storage. The reconfigurable hardware router is based on the NetFPGA platform. In this study we report on the hardware implementation to monitor web-based network applications and compare our results with a software based network analyzer

  2. 福建电信全球眼业务平台云化演进方案%Solutionon Migrationor Deployment of Megaeyes Service of Fujian Telecomon Cloud Computing Network

    Institute of Scientific and Technical Information of China (English)

    陈绪水

    2015-01-01

    通过对福建电信全球眼业务平台现状进行分析,找出现有存在的问题,并结合现状给出云计算技术实现的全球眼平台系统架构以及全球眼平台云化演进思路,重点描述了接入服务器云化的试点方案。%In this paper,by analysising the present situation of megaeyes service platform of Fujian Telecom,many disadvan-tages are finded.Based on these,an architecture and a thinking of migration or deployment on cloud computing network is de-veloped. As the focus,a test solution on deployment of Access Server is depicted.

  3. Communications protocols for a fault tolerant, integrated local area network for Space Station applications

    Science.gov (United States)

    Meredith, B. D.

    1984-01-01

    The evolutionary growth of the Space Station and the diverse activities onboard are expected to require a hierarchy of integrated,local area networks capable of supporting data, voice and video communications. In addition, fault tolerant network operation is necessary to protect communications between critical systems attached to the net and to relieve the valuable human resources onboard Space Station of day-to-day data system repair tasks. An experimental, local area network is being developed which will serve as a testbed for investigating candidate algorithms and technologies for a fault tolerant, integrated network. The establishment of a set of rules or protocols which govern communications on the net is essential to obtain orderly and reliable operation. A hierarchy of protocols for the experimental network is presented and procedures for data and control communications are described.

  4. Main concept of local area network protection on the basis of the SAAM 'TRAFFIC'

    International Nuclear Information System (INIS)

    In our previous paper we developed a system for acquisition, analysis and management of the network traffic (SAAM 'Traffic') for a segment of the JINR local area computer network (JINR LAN). In our present work we consider well-known scenarios of attacks on local area networks and propose protection methods based on the SAAM 'Traffic'. Although the system for LAN protection is installed on a router computer, it is not analogous to the firewall scheme and, thus, it does not hinder the performance of distributed network applications. This provides a possibility to apply such an approach to GRID-technologies, where network protection on the firewall basis can not be basically used. (author)

  5. Disrupted functional connectivity of cerebellar default network areas in attention-deficit/hyperactivity disorder.

    Science.gov (United States)

    Kucyi, Aaron; Hove, Michael J; Biederman, Joseph; Van Dijk, Koene R A; Valera, Eve M

    2015-09-01

    Attention-deficit/hyperactivity disorder (ADHD) is increasingly understood as a disorder of spontaneous brain-network interactions. The default mode network (DMN), implicated in ADHD-linked behaviors including mind-wandering and attentional fluctuations, has been shown to exhibit abnormal spontaneous functional connectivity (FC) within-network and with other networks (salience, dorsal attention and frontoparietal) in ADHD. Although the cerebellum has been implicated in the pathophysiology of ADHD, it remains unknown whether cerebellar areas of the DMN (CerDMN) exhibit altered FC with cortical networks in ADHD. Here, 23 adults with ADHD and 23 age-, IQ-, and sex-matched controls underwent resting state fMRI. The mean time series of CerDMN areas was extracted, and FC with the whole brain was calculated. Whole-brain between-group differences in FC were assessed. Additionally, relationships between inattention and individual differences in FC were assessed for between-group interactions. In ADHD, CerDMN areas showed positive FC (in contrast to average FC in the negative direction in controls) with widespread regions of salience, dorsal attention and sensorimotor networks. ADHD individuals also exhibited higher FC (more positive correlation) of CerDMN areas with frontoparietal and visual network regions. Within the control group, but not in ADHD, participants with higher inattention had higher FC between CerDMN and regions in the visual and dorsal attention networks. This work provides novel evidence of impaired CerDMN coupling with cortical networks in ADHD and highlights a role of cerebro-cerebellar interactions in cognitive function. These data provide support for the potential targeting of CerDMN areas for therapeutic interventions in ADHD. PMID:26109476

  6. Determination of the chromospheric quiet network element area index and its variation between 2008 and 2011

    Institute of Scientific and Technical Information of China (English)

    Jagdev Singh; Ravindra Belur; Selvendran Raju; Kumaravel Pichaimani; Muthu Priyal; Thambaje Gopalan Priya; Amareswari Kotikalapudi

    2012-01-01

    In general,it is believed that plages and sunspots are the main contributors to solar irradiance.There are small-scale structures on the Sun with intermediate magnetic fields that could also contribute to solar irradiance,but it has not yet been quantified how many of these small scale structures contribute and how much this varies over the solar cycle.We used Ca Ⅱ K images obtained from the telescope at the Kodaikanal observatory.We report a method to separate the network elements from the background structure and plage regions,and compute the changes in the network element area index during the minimum phase of the solar cycle and part of the ascending phase of cycle 24.The measured area occupied by the network elements is about 30% and the plages cover less than 1% of the solar disk during the observation period from February 2008 to 2011.During the extended period of minimum activity,it is observed that the network element area index decreases by about 7% compared to the area occupied by the network elements in 2008.A long term study of the network element area index is required to understand the variations over the solar cycle.

  7. A Tabu Search WSN Deployment Method for Monitoring Geographically Irregular Distributed Events

    Directory of Open Access Journals (Sweden)

    2009-03-01

    Full Text Available In this paper, we address the Wireless Sensor Network (WSN deployment issue. We assume that the observed area is characterized by the geographical irregularity of the sensed events. Formally, we consider that each point in the deployment area is associated a differentiated detection probability threshold, which must be satisfied by our deployment method. Our resulting WSN deployment problem is formulated as a Multi-Objectives Optimization problem, which seeks to reduce the gap between the generated events detection probabilities and the required thresholds while minimizing the number of deployed sensors. To overcome the computational complexity of an exact resolution, we propose an original pseudo-random approach based on the Tabu Search heuristic. Simulations show that our proposal achieves better performances than several other approaches proposed in the literature. In the last part of this paper, we generalize the deployment problem by including the wireless communication network connectivity constraint. Thus, we extend our proposal to ensure that the resulting WSN topology is connected even if a sensor communication range takes small values.

  8. A Tabu Search WSN Deployment Method for Monitoring Geographically Irregular Distributed Events.

    Science.gov (United States)

    Aitsaadi, Nadjib; Achir, Nadjib; Boussetta, Khaled; Pujolle, Guy

    2009-01-01

    In this paper, we address the Wireless Sensor Network (WSN) deployment issue. We assume that the observed area is characterized by the geographical irregularity of the sensed events. Formally, we consider that each point in the deployment area is associated a differentiated detection probability threshold, which must be satisfied by our deployment method. Our resulting WSN deployment problem is formulated as a Multi-Objectives Optimization problem, which seeks to reduce the gap between the generated events detection probabilities and the required thresholds while minimizing the number of deployed sensors. To overcome the computational complexity of an exact resolution, we propose an original pseudo-random approach based on the Tabu Search heuristic. Simulations show that our proposal achieves better performances than several other approaches proposed in the literature. In the last part of this paper, we generalize the deployment problem by including the wireless communication network connectivity constraint. Thus, we extend our proposal to ensure that the resulting WSN topology is connected even if a sensor communication range takes small values. PMID:22573977

  9. REVIEW ON MULTI-AGENT SYSTEM COLLABORATION IN LEARNING MANAGEMENT SYSTEM DOMAIN BY DEPLOYING WIRELESS SENSOR NETWORKS FOR STUDENT LOCATION DETECTION

    Directory of Open Access Journals (Sweden)

    A. K. Mwinyi

    2014-01-01

    Full Text Available Student location detection in Learning Management System (LMS by utilizing Multi-Agent System (MAS which contains sensor nodes is a new area of research. This study reviews several studies to ascertain the potential of integrating these two technologies to automate students’ class attendance in Higher Learning Institutions (HLIs. Currently, the HLIs are using paper-based process to record students’ attendance in the class, that is time consuming and is not possible to monitor students all the time, that they suppose to be in learning environment. Introducing the sensor networks and MAS in LMS system is to enable the instructors or lecturers to be aware of the presence of their students once they reach the system’s domain. The collaboration using MAS facilitates the retrieval and recording of students’ details from the sensors and then sends them to LMS servers through Cluster Head Sensor. The information that is collected and recorded by the agents include the signal strength of the students’ device and their profiles which can facilitate to know the exactly locations of the students, by comparing such information with the information already stored in LMS database. Therefore, a system architecture that comprises MAS with sensor networks in LMS is presented in this study for monitoring students’ attendance in the classes and labs. This type of system architecture with improved LMS features is more focused and intended for HLIs that follow the blended learning system. This proposed system has potential of boosting learning process in HLIs by providing new feature in LMS that monitor students’ activities in blended systems, that support classroom and online teachings.

  10. Mastering Windows 7 Deployment

    CERN Document Server

    Finn, Aidan; van Surksum, Kenneth

    2011-01-01

    Get professional-level instruction on Windows 7 deployment tools Enterprise-level operating system deployment is challenging and requires knowledge of specific tools. It is expected that Windows 7 will be extensively deployed in businesses worldwide. This comprehensive Sybex guide provides thorough coverage of the Microsoft deployment tools that were specifically created for Windows 7, preparing system administrators, MIS professionals, and corporate programmers to tackle the task effectively.Companies worldwide are expected to deploy Windows 7 as their enterprise operating system; system admi

  11. Artificial neural network estimation of soil erosion and nutrient concentrations in runoff from land application areas

    Science.gov (United States)

    The transport of sediment and nutrients from land application areas is an environmental concern. New methods are needed for estimating soil and nutrient concentrations of runoff from cropland areas on which manure is applied. Artificial Neural Networks (ANN) trained with a Backpropagation (BP) algor...

  12. How effective is the MERCOSUR’s network of protected areas in representing South America's ecoregions?

    OpenAIRE

    Soutullo, Alvaro; Gudynas, Eduardo

    2005-01-01

    We evaluate the effectiveness of the MERCOSUR’s network of protected areas in representing South America’s ecoregions. The region contains 1,219 non-overlapping protected areas covering nearly 2,000,000 km2. Fifty percent of the reserves are 60% in Chile, and all the ecoregions in Paraguay and Uruguay are shared with other countries. Overall, although it currently covers 14% of the region, the network of protected areas of the MERCOSUR still performs poorly in protecting its ecoregions....

  13. Representation of global and national conservation priorities by Colombia's Protected Area Network.

    Directory of Open Access Journals (Sweden)

    German Forero-Medina

    Full Text Available BACKGROUND: How do national-level actions overlap with global priorities for conservation? Answering this question is especially important in countries with high and unique biological diversity like Colombia. Global biodiversity schemes provide conservation guidance at a large scale, while national governments gazette land for protection based on a combination of criteria at regional or local scales. Information on how a protected area network represents global and national conservation priorities is crucial for finding gaps in coverage and for future expansion of the system. METHODOLOGY/PRINCIPAL FINDINGS: We evaluated the agreement of Colombia's protected area network with global conservation priorities, and the extent to which the network reflects the country's biomes, species richness, and common environmental and physical conditions. We used this information to identify priority biomes for conservation. We find the dominant strategy in Colombia has been a proactive one, allocating the highest proportion of protected land on intact, difficult to access and species rich areas like the Amazon. Threatened and unique areas are disproportionately absent from Colombia's protected lands. We highlight six biomes in Colombia as conservation priorities that should be considered in any future expansion of Colombia's protected area network. Two of these biomes have less than 3% of their area protected and more than 70% of their area transformed for human use. One has less than 3% protected and high numbers of threatened vertebrates. Three biomes fall in both categories. CONCLUSIONS: Expansion of Colombia's Protected Area Network should consider the current representativeness of the network. We indicate six priority biomes that can contribute to improving the representation of threatened species and biomes in Colombia.

  14. 一种基于点路结合的骨干网P2P缓存部署方法%A Node-Link Based Cache Deployment Algorithm for P2P Traffic in ISP Networks

    Institute of Scientific and Technical Information of China (English)

    翟海滨; 蒋海; 孙毅; 李军; 李忠诚

    2013-01-01

    P2P应用的广泛流行给ISP骨干网络带来了前所未有的流量压力,P2P缓存(peer-to-peer caching)技术是目前缓解这种流量压力的最有效手段之一,缓存部署方法对P2P缓存系统的运行效率有重要影响.已有缓存部署方法分为两类:基于骨干节点的部署方法(node-based cache deployment,NCD)和基于骨干链路的部署方法(link-based cache deployment,LCD).在不同的P2P流量分布情形下,NCD与LCD各有优劣,但是,这两类方法未能充分发挥缓存的性能.提出一种基于点路结合的骨干网P2P缓存部署方法(node-Link based cache deployment,NLCD),根据缓存部署过程中P2P流量分布和缓存存储状态的动态变化,灵活选择骨干节点或骨干链路作为部署位置.建立了以网络负载最小化为目标的缓存部署模型,基于该模型将P2P缓存部署问题建模为一个最优化问题,由于流量分布和缓存状态会在部署过程中不断变化,不具有最优子结构性质.证明了该最优化问题为NP完全问题,并设计了一种启发式贪婪算法进行求解.实验结果表明,针对典型的H&S型、Ladder型骨干网络拓扑,使用NLCD的平均链路使用率比使用LCD低5%~15%,比使用NCD低7%~30%.%Peer-to-peer (P2P) systems are generating a large portion of the total Internet traffic and imposing a heavy burden on Internet services providers (ISPs). P2P caching is an effective means of easing this burden. We focus on the cache deployment problem as it has a significant impact on the effectiveness of caching. An ISP backbone network topology is usually abstracted to a graph comprised of nodes representing core routers and links connecting adjacent core routers. While deploying caches at nodes (node-based cache deployment, NCD) can reduce the amount of P2P traffic transmitted from lower access networks to the ISP backbone network, deploying caches on links (link-based cache deployment, LCD) can directly reduce the amount of

  15. Structural and effective connectivity reveals potential network-based influences on category-sensitive visual areas

    Directory of Open Access Journals (Sweden)

    Nicholas Furl

    2015-05-01

    Full Text Available Visual category perception is thought to depend on brain areas that respond specifically when certain categories are viewed. These category-sensitive areas are often assumed to be “modules” (with some degree of processing autonomy and to act predominantly on feedforward visual input. This modular view can be complemented by a view that treats brain areas as elements within more complex networks and as influenced by network properties. This network-oriented viewpoint is emerging from studies using either diffusion tensor imaging to map structural connections or effective connectivity analyses to measure how their functional responses influence each other. This literature motivates several hypotheses that predict category-sensitive activity based on network properties. Large, long-range fiber bundles such as inferior fronto-occipital, arcuate and inferior longitudinal fasciculi are associated with behavioural recognition and could play crucial roles in conveying backward influences on visual cortex from anterior temporal and frontal areas. Such backward influences could support top-down functions such as visual search and emotion-based visual modulation. Within visual cortex itself, areas sensitive to different categories appear well-connected (e.g., face areas connect to object- and motion sensitive areas and their responses can be predicted by backward modulation. Evidence supporting these propositions remains incomplete and underscores the need for better integration of DTI and functional imaging.

  16. Multi-Objective Channel Assignment and Gateway Deployment Optimizer for Wireless Mesh Network%融合信道分配的无线Mes h网络多目标网关部署

    Institute of Scientific and Technical Information of China (English)

    赵传信; 陈付龙; 王汝传; 赵诚; 罗永龙

    2015-01-01

    Gateway deployment and channel assignment are important for the wireless mesh network planning because they influence the network quality of service directly . Traditionally , the two problems are studied separately .In this paper ,a comprehensive strategy is proposed to minimize both the link collision and the cost of gateway deployment for wireless mesh network .In addition ,the load balance is also considered in the planning stage and characteristics of the aggregation of flow traffic near the gateway in wireless mesh network are reflected by the degree of link collision . For the gateway deployment ,it has been proved to be NP‐hard .Here a novel multi‐objective particle swarm algorithm is proposed to optimize both channel assignment and gateway deployment .The route of nodes is built through creating a tree algorithm after the channel are assigned and gateway are selected .Thus ,the two problems are decoupled .The channel assignment and gateway deployment are then obtained in polynomial time for wireless mesh network planning .Comparing with the existing algorithms based on balanced channel repartition , the simulation results show that our proposed algorithm can reduce network collision effectively and improve network performance significantly , while reducing the path length and obtaining load balance of the gateways .%信道分配和网关部署是无线M esh网络规划面临的重要挑战,作为影响网络性能的关键问题,传统上针对它们的研究都是独立的。为了有效结合二者规划网络,提升网络性能,提出了一种无线M esh网络联合信道分配和网关部署策略,综合考虑了最小化链路冲突量和网关部署代价,在部署网关过程中有效地分配信道以消减无线链路间干扰。利用链路冲突量衡量网关附近节点流量聚集的特征,使用基于多目标粒子群算法来优化信道分配和选择部署网关,在信道分配和网关选择已定的情况下构建

  17. NFU-Enabled FASTA: moving bioinformatics applications onto wide area networks

    Directory of Open Access Journals (Sweden)

    Liu Huadong

    2007-11-01

    Full Text Available Abstract Background Advances in Internet technologies have allowed life science researchers to reach beyond the lab-centric research paradigm to create distributed collaborations. Of the existing technologies that support distributed collaborations, there are currently none that simultaneously support data storage and computation as a shared network resource, enabling computational burden to be wholly removed from participating clients. Software using computation-enable logistical networking components of the Internet Backplane Protocol provides a suitable means to accomplish these tasks. Here, we demonstrate software that enables this approach by distributing both the FASTA algorithm and appropriate data sets within the framework of a wide area network. Results For large datasets, computation-enabled logistical networks provide a significant reduction in FASTA algorithm running time over local and non-distributed logistical networking frameworks. We also find that genome-scale sizes of the stored data are easily adaptable to logistical networks. Conclusion Network function unit-enabled Internet Backplane Protocol effectively distributes FASTA algorithm computation over large data sets stored within the scaleable network. In situations where computation is subject to parallel solution over very large data sets, this approach provides a means to allow distributed collaborators access to a shared storage resource capable of storing the large volumes of data equated with modern life science. In addition, it provides a computation framework that removes the burden of computation from the client and places it within the network.

  18. Obstacle Constrained Total Area Coverage in Wireless Sensor Networks

    CERN Document Server

    M, Shyam

    2010-01-01

    This paper deals with the accomplishment of total area coverage of an arbitrary region using sensors with a finite sensing radius of rs. For a given region, we aim to obtain a deterministic placement of sensors which, apart from ensuring that the entire region comes under the purview of at least a single sensor, minimises the number of sensors utilised. We begin by considering regions devoid of obstacles and thus having every location amenable for placement. Herein, we formalise the popular notion that sensors at the centres of the hexagons of a hexagonal tessellation provide the most optimal placement. We then move on to regions which may comprise obstacles of arbitrary size at arbitrary locations. We recognise two distinct classes of obstacles, namely transparent and opaque obstacles, which are distinguished by their ability (or the lack of it) to permit sensing radiation through them. In the real world, transparent obstacles model lakes, ponds and swamps, while the opaque ones stand for, inter alia, hills,...

  19. Energy Efficient Aggregation and Reliable Communication for Wireless Body Area Networks (WBAN

    Directory of Open Access Journals (Sweden)

    Venkatasubramanian Sivaprasatham

    2014-01-01

    Full Text Available In wireless body area networks (WBAN, the data loss, security and reliability requirements are not handled in the existing literature works. This necessitates the technique that deals with slot allocation scheme, delay and other performance metrics. In order to overcome this issue, in this paper, we propose an energy efficient aggregation and reliable communication for Wireless Body Area Networks (WBAN. Initially, the aggregator nodes are chosen based on the nodes connectivity. During the data aggregation, the encryption key and the verification key is assigned to the nodes while transmitting data to the data aggregator. In order to enhance the reliability of data during transmission, the network coding methodology is considered. By simulation results, we show that the proposed technique enhances the network performance.

  20. A multiscale network analysis of protected-area connectivity for mammals in the United States.

    Science.gov (United States)

    Minor, Emily S; Lookingbill, Todd R

    2010-12-01

    Protected areas must be close, or connected, enough to allow for the preservation of large-scale ecological and evolutionary processes, such as gene flow, migration, and range shifts in response to climate change. Nevertheless, it is unknown whether the network of protected areas in the United States is connected in a way that will preserve biodiversity over large temporal and spatial scales. It is also unclear whether protected-area networks that function for larger species will function for smaller species. We assessed the connectivity of protected areas in the three largest biomes in the United States. With methods from graph theory--a branch of mathematics that deals with connectivity and flow--we identified and measured networks of protected areas for three different groups of mammals. We also examined the value of using umbrella species (typically large-bodied, far-ranging mammals) in designing large-scale networks of protected areas. Although the total amount of protected land varied greatly among biomes in the United States, overall connectivity did not. In general, protected-area networks were well connected for large mammals but not for smaller mammals. Additionally, it was not possible to predict connectivity for small mammals on the basis of connectivity for large mammals, which suggests the umbrella species approach may not be an appropriate design strategy for conservation networks intended to protect many species. Our findings indicate different strategies should be used to increase the likelihood of persistence for different groups of species. Strategic linkages of existing lands should be a conservation priority for smaller mammals, whereas conservation of larger mammals would benefit most from the protection of more land. PMID:20666801

  1. Community Based Networks and 5G

    DEFF Research Database (Denmark)

    Williams, Idongesit

    2016-01-01

    The deployment of previous wireless standards has provided more benefits for urban dwellers than rural dwellers. 5G deployment may not be different. This paper identifies that Community Based Networks as carriers that deserve recognition as potential 5G providers may change this. The argument is...... hinged on a research aimed at understanding how and why Community Based Networks deploy telecom and Broadband infrastructure. The study was a qualitative study carried out inductively using Grounded Theory. Six cases were investigated.Two Community Based Network Mobilization models were identified. The...... findings indicate that 5G connectivity can be extended to rural areas by these networks, via heterogenous networks. Hence the delivery of 5G data rates delivery via Wireless WAN in rural areas can be achieved by utilizing the causal factors of the identified models for Community Based Networks....

  2. Camera Networks The Acquisition and Analysis of Videos over Wide Areas

    CERN Document Server

    Roy-Chowdhury, Amit K

    2012-01-01

    As networks of video cameras are installed in many applications like security and surveillance, environmental monitoring, disaster response, and assisted living facilities, among others, image understanding in camera networks is becoming an important area of research and technology development. There are many challenges that need to be addressed in the process. Some of them are listed below: - Traditional computer vision challenges in tracking and recognition, robustness to pose, illumination, occlusion, clutter, recognition of objects, and activities; - Aggregating local information for wide

  3. AID: An Energy Efficient Decoding Scheme for LDPC Codes in Wireless Body Area Sensor Networks

    OpenAIRE

    Javaid, N.; Rehman, O.; Alrajeh, N.; Khan, Z A; Manzoor, B.; Ahmed, S.

    2013-01-01

    One of the major challenges in Wireless Body Area Networks (WBANs) is to prolong the lifetime of network. Traditional research work focuses on minimizing transmit power, however, in the case of short range communication the consumption power in decoding is significantly larger than transmit power. This paper investigates the minimization of total power consumption by reducing the decoding power consumption. For achieving a desired Bit Error Rate (BER), we introduce some fundamental results on...

  4. Design and implementation of a fiber optic token-ring local area network

    OpenAIRE

    Bibeau, Gary J.

    1991-01-01

    Approved for public release; distribution is unlimited This thesis describes the design and implementation of a fiber optic token-ring local area network (LAN) . This design features fiber optic channels between stations on the network without the use of a wiring concentrator. The initial LAN electrical signal operating at 4 Mbps was provided by a LAN adapter card based on the TMS380 chipset developed for twisted pair copper wire. Since the physical characteristics of fib...

  5. Participation in protected areas: a social network case study in Catalonia, Spain

    OpenAIRE

    Laura Calvet-Mir; Sara Maestre-Andrés; José Luis Molina; Jeroen van den Bergh

    2015-01-01

    Local participation of stakeholders in governance of protected areas is considered to be important to natural resource management and biodiversity conservation. Social network analysis (SNA) is a useful tool for analysis because it allows the understanding of stakeholders' relationships, interactions, and influences through communication networks. We combine quantitative and qualitative data to undertake a SNA for the natural park of Sant Llorenç del Munt in Catalonia, Spain. This is aimed at...

  6. A Beacon Interval Shifting Scheme for Interference Mitigation in Body Area Networks

    OpenAIRE

    Seungku Kim; Seokhwan Kim; Jin-Woo Kim; Doo-Seop Eom

    2012-01-01

    This paper investigates the issue of interference avoidance in body area networks (BANs). IEEE 802.15 Task Group 6 presented several schemes to reduce such interference, but these schemes are still not proper solutions for BANs. We present a novel distributed TDMA-based beacon interval shifting scheme that reduces interference in the BANs. A design goal of the scheme is to avoid the wakeup period of each BAN coinciding with other networks by employing carrier sensing before a beacon transmiss...

  7. BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks

    OpenAIRE

    Syed Muhammad Khaliq-ur-Rahman Raazi; Heejo Lee; Sungyoung Lee; Young-Koo Lee

    2010-01-01

    Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences...

  8. A Novel Intrusion Detection System for Wireless Body Area Network in Health Care Monitoring

    OpenAIRE

    T.V.P.Sundararajan; Shanmugam, A

    2010-01-01

    Problem statement: Health monitoring, telemedicine, military, interactive entertainment and portable audio/video systems were most promising applications where WBANs can be used. However, designers of such systems face a number of challenging tasks, as they need to address often quite conflicting requirements for size, operating time, precision and reliability. Network security is very important in Wireless Body Area Network (WBAN) since the vital human life might be jeopardized, unless manag...

  9. Design and implementation of a multi-purpose Wireless Body Area Network

    OpenAIRE

    Virk, M. (Muhammad)

    2013-01-01

    A wireless body area network (WBAN) is a collection of miniaturized and energy efficient wireless sensor nodes which monitor human body functions and its surroundings. It has been observed that WBANs perform single application per network, computation and storage capacities are scarce and there is no or limited mobility support. Technically complex WBAN application solutions today, find refuge in processing computationally complex data external to WBANs, i.e., processing sensor data on a conv...

  10. Ethernet-Based Passive Optical Local-Area Networks for Fiber-to-the-Desk Application

    OpenAIRE

    Radovanovic, Igor; Etten, van, WC Wim; Freriks, Hennie

    2003-01-01

    We introduce optical local-area network (LAN) architectures based on multimode optical fiber and components, short wavelength lasers and detectors, and the widely used fast Ethernet protocol. These architectures are designed to lower the costs associated with passive optical LAN implementation. Further reduction in overall cost is achieved through decreased network downtime, lower maintenance cost, extended geometrical spans, and larger headroom for future capacity increase. These optically t...

  11. Modeling and Estimation Techniques for Wide-Area Network Traffic with Atypical Components

    OpenAIRE

    Minton, Carl Edward

    2002-01-01

    A critical first step to improving existing and designing future wide-area networks is an understanding of the load placed on these networks. Efforts to model traffic are often confounded by atypical traffic - traffic particular to the observation site not ubiquitously applicable. The causes and characteristics of atypical traffic are explored in this thesis. Atypical traffic is found to interfere with parsimonious analytic traffic models. A detection and modeling tech...

  12. ATLAS: A Traffic Load Aware Sensor MAC Design for Collaborative Body Area Sensor Networks

    OpenAIRE

    Young-Cheol Bang; Md. Obaidur Rahman; Sungwon Lee; Choong Seon Hong

    2011-01-01

    In collaborative body sensor networks, namely wireless body area networks (WBANs), each of the physical sensor applications is used to collaboratively monitor the health status of the human body. The applications of WBANs comprise diverse and dynamic traffic loads such as very low-rate periodic monitoring (i.e., observation) data and high-rate traffic including event-triggered bursts. Therefore, in designing a medium access control (MAC) protocol for WBANs, energy conservation should be the p...

  13. Modeling data rate agility in the IEEE 802.11a wireless local area networking protocol

    OpenAIRE

    Braswell, Bryan E.

    2001-01-01

    The IEEE 802.11a high-speed wireless local area networking (WLAN) protocol does not specify a mechanism for dynamically altering network data rates based on changing link conditions. This thesis first presents a baseline software model of the 802.11a protocol developed using the OPNET simulation tool. The model includes both the medium access control (MAC) and physical (PHY) layers of the standard. Two data rate agility mechanisms are then proposed and analyzed using the model. An infrastruct...

  14. Cooperative Communications inWireless Local Area Networks: MAC Protocol Design and Multi-layer Solutions

    OpenAIRE

    He, Xin

    2012-01-01

    This dissertation addresses cooperative communications and proposes multi-layer solu- tions for wireless local area networks, focusing on cooperative MAC design. The coop- erative MAC design starts from CSMA/CA based wireless networks. Three key issues of cooperation from the MAC layer are dealt with: i.e., when to cooperate (opportunistic cooperation), whom to cooperate with (relay selection), and how to protect cooperative transmissions (message procedure design). In addition...

  15. Improving the Real-time Performance of a Wireless Local Area Network

    OpenAIRE

    Baldwin, Rusty Olen

    1999-01-01

    This research considers the transmission of real-time data within a wireless local area network (WLAN). Exact and approximate analytic network evaluation techniques are examined. The suitability of using a given technique in a particular situation is discussed. Simulation models are developed to study the performance of our protocol RT-MAC (real-time medium access control). RT-MAC is a novel, simple, and elegant MAC protocol for use in transmitting real-time data in point to point a...

  16. University of Tennessee deploys force10 switch for CERN work

    CERN Multimedia

    2007-01-01

    "Force20 networks, the pioneer in building and securing reliable networks, today announced that the University of Tennessee physics department has deployed the C300 resilient switch to analyze data form CERN's Large Hadron Collider." (1/2 page)

  17. CCT deployment considerations

    International Nuclear Information System (INIS)

    The deployment of Clean Coal Technologies (CCT) is discussed by asserting that in the case of commercializing CCT, the government's involvement should not stop at the demonstration gate. Two areas in this regard are described. First, the need for the domestic DOE CCT Program to focus on the domestic deployment of demonstrated technologies, and second, the need to recognize that to participate in the phenomenal growth of international power markets through use of clean coal or advanced coal technologies an aggressive partnering between the government and industry to demonstrate technologies abroad will be required. The Clean Coal Technology Coalition's (CCT) primary mission has been to promote the development and use of CCTs. The CCT is a strong advocate for the DOE CCT Program and applauds the Department's and industry's success at developing many coal-based technologies. By current design, the DOE program is said to go no further than the initial demonstration of a technology. Since the inception of CCT in 1986, the Coalition has advocated the need to pursue a partnership with government in which more than one demonstration of the same or similar technology is supported by the clean coal program. Only in this way can one be assured of widespread acceptance of any given technology. There exists a gap (call it a open-quotes risk gapclose quotes) between CCTs that have been successfully demonstrated (and presumably available for commercial use) and their widespread commercial use. A technology matrix has been developed in which the developmental status of a variety of clean coal technologies is demonstrated. While still too early to pass judgment, it appears that while success is being achieved in demonstrating advanced coal technologies, the market place - for several reasons - is not, indeed may have no plans, to adopt these technologies

  18. APPLICATION OF HIERARCHY ARTIFICIAL NEURAL NETWORK TO EVALUATE THE EXPLOITATION CONDITITONS OF SURFACE MINING AREA

    Institute of Scientific and Technical Information of China (English)

    李新春; 范力军

    1998-01-01

    It always adopts the direct hierarchy analysis to value the exploitation conditions of surface mining areas. This way has some unavoidable shortcomings because it is mainly under theaid of experts and it is affected by the subjective thinking of the experts. This paper puts forwards a new approach that divides the whole exploitation conditions into sixteen subsidiary systems and each subsidiary system forms a neural network system. The whole decision system of exploitation conditions of surface mining areas is composed of sixteen subsidiary neural network systems. Each neural network is practiced with the data of the worksite, which is reasonable and scientific. This way will be a new decision approach for exploiting the surface mining areas.

  19. Projected impacts of climate change on a continent-wide protected area network

    DEFF Research Database (Denmark)

    Hole, David G; Willis, Stephen G; Pain, Deborah J;

    2009-01-01

    Despite widespread concern, the continuing effectiveness of networks of protected areas under projected 21st century climate change is uncertain. Shifts in species' distributions could mean these resources will cease to afford protection to those species for which they were originally established......, despite the likelihood of significant community disruption, we demonstrate that rigorously defined networks of protected areas can play a key role in mitigating the worst impacts of climate change on biodiversity........ Using modelled projected shifts in the distributions of sub-Saharan Africa's entire breeding avifauna, we show that species turnover across the continent's Important Bird Area (IBA) network is likely to vary regionally and will be substantial at many sites (> 50% at 42% of IBAs by 2085 for priority...

  20. Tether Deployer And Brake

    Science.gov (United States)

    Carroll, Joseph A.; Alexander, Charles M.

    1993-01-01

    Design concept promises speed, control, and reliability. Scheme for deploying tether provides for fast, free, and snagless payout and fast, dependable braking. Developed for small, expendable tethers in outer space, scheme also useful in laying transoceanic cables, deploying guidance wires to torpedoes and missiles, paying out rescue lines from ship to ship via rockets, deploying antenna wires, releasing communication and power cables to sonobuoys and expendable bathythermographs, and in reeling out lines from fishing rods.