WorldWideScience

Sample records for wireless physical layer

  1. Wireless physical layer security

    Science.gov (United States)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  2. Physical layer approaches for securing wireless communication systems

    CERN Document Server

    Wen, Hong

    2013-01-01

    This book surveys the outstanding work of physical-layer (PHY) security, including  the recent achievements of confidentiality and authentication for wireless communication systems by channel identification. A practical approach to building unconditional confidentiality for Wireless Communication security by feedback and error correcting code is introduced and a framework of PHY security based on space time block code (STBC) MIMO system is demonstrated.  Also discussed is a scheme which combines cryptographic techniques implemented in the higher layer with the physical layer security approach

  3. Signal processing approaches to secure physical layer communications in multi-antenna wireless systems

    CERN Document Server

    Hong, Y-W Peter; Kuo, C-C Jay

    2013-01-01

    This book introduces various signal processing approaches to enhance physical layer secrecy in multi-antenna wireless systems. Wireless physical layer secrecy has attracted much attention in recent years due to the broadcast nature of the wireless medium and its inherent vulnerability to eavesdropping. While most articles on physical layer secrecy focus on the information-theoretic aspect, we focus specifically on the signal processing aspects, including beamforming and precoding techniques for data transmission and discriminatory training schemes for channel estimation. The discussions will c

  4. Physical and Cross-Layer Security Enhancement and Resource Allocation for Wireless Networks

    Science.gov (United States)

    Bashar, Muhammad Shafi Al

    2011-01-01

    In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…

  5. Securing wireless communications at the physical layer

    CERN Document Server

    Liu, Ruoheng

    2009-01-01

    Throughout this book there is an underlying theme that the rich multipath environment that is typical of wireless scenarios supports the establishment of new security services at the physical layer, including new mechanisms that establish cryptographic keys, that support communication with assured confidentiality, and that can authenticate transmitters in mobile environments. The book takes a holistic approach to covering topics related to physical layer security solutions, with contributions ranging from the theoretical underpinnings behind secure communications to practical systems validatio

  6. Wireless Physical Layer Security with CSIT Uncertainty

    KAUST Repository

    Hyadi, Amal

    2017-09-01

    Recent years have been marked by an enormous growth of wireless communication networks and an extensive use of wireless applications. In return, this phenomenal expansion induced more concerns about the privacy and the security of the users. Physical layer security is one of the most promising solutions that were proposed to enhance the security of next generation wireless systems. The fundamental idea behind this technique is to exploit the randomness and the fluctuations of the wireless channel to achieve security without conditional assumptions on the computational capabilities of the eavesdropper. In fact, while these elements have traditionally been associated with signal deterioration, physical layer security uses them to ensure the confidentiality of the users. Nevertheless, these technical virtues rely heavily on perhaps idealistic channel state information assumptions. In that regard, the aim of this thesis is to look at the physical layer security paradigm from the channel uncertainty perspective. In particular, we discuss the ergodic secrecy capacity of different wiretap channels when the transmitter is hampered by the imperfect knowledge of the channel state information (CSI). We consider two prevalent causes of uncertainty for the CSI at transmitter (CSIT); either an error of estimation occurs at the transmitter and he can only base his coding and the transmission strategies on a noisy version of the CSI, or the CSI feedback link has a limited capacity and the legitimate receivers can only inform the transmitter about the quantized CSI. We investigate both the single-user multiple-input multiple-output (MIMO) wiretap channel and the multi-user broadcast wiretap channel. In the latter scenario, we distinguish between two situations: multiple messages transmission and common message transmission. We also discuss the broadcast channel with confidential messages (BCCM) where the transmitter has one common message to be transmitted to two users and one

  7. Applying Physical-Layer Network Coding in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Liew SoungChang

    2010-01-01

    Full Text Available A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes, simultaneously. Rather than a blessing, this feature is treated more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11. This paper shows that the concept of network coding can be applied at the physical layer to turn the broadcast property into a capacity-boosting advantage in wireless ad hoc networks. Specifically, we propose a physical-layer network coding (PNC scheme to coordinate transmissions among nodes. In contrast to "straightforward" network coding which performs coding arithmetic on digital bit streams after they have been received, PNC makes use of the additive nature of simultaneously arriving electromagnetic (EM waves for equivalent coding operation. And in doing so, PNC can potentially achieve 100% and 50% throughput increases compared with traditional transmission and straightforward network coding, respectively, in 1D regular linear networks with multiple random flows. The throughput improvements are even larger in 2D regular networks: 200% and 100%, respectively.

  8. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qiuhua Wang

    2017-02-01

    Full Text Available Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.

  9. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks.

    Science.gov (United States)

    Wang, Qiuhua

    2017-02-04

    Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS) records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.

  10. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview

    Science.gov (United States)

    Zhang, Junqing; Duong, Trung; Woods, Roger; Marshall, Alan

    2017-08-01

    The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of key generation and physical layer encryption. These schemes can be implemented and are lightweight, and thus offer practical solutions for providing effective IoT wireless security. Future research to make IoT-based physical layer security more robust and pervasive is also covered.

  11. Cognitive Security of Wireless Communication Systems in the Physical Layer

    Directory of Open Access Journals (Sweden)

    Mustafa Harun Yılmaz

    2017-01-01

    Full Text Available While the wireless communication systems provide the means of connectivity nearly everywhere and all the time, communication security requires more attention. Even though current efforts provide solutions to specific problems under given circumstances, these methods are neither adaptive nor flexible enough to provide security under the dynamic conditions which make the security breaches an important concern. In this paper, a cognitive security (CS concept for wireless communication systems in the physical layer is proposed with the aim of providing a comprehensive solution to wireless security problems. The proposed method will enable the comprehensive security to ensure a robust and reliable communication in the existence of adversaries by providing adaptive security solutions in the communication systems by exploiting the physical layer security from different perspective. The adaptiveness relies on the fact that radio adapts its propagation characteristics to satisfy secure communication based on specific conditions which are given as user density, application specific adaptation, and location within CS concept. Thus, instead of providing any type of new security mechanism, it is proposed that radio can take the necessary precautions based on these conditions before the attacks occur. Various access scenarios are investigated to enable the CS while considering these conditions.

  12. Cooperative Wireless Communications and Physical Layer Security : State of the Art

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    in the mobile equipment is not feasible due to resource constraints. Cooperative wireless communication (CWC) is the upcoming virtual MIMO technique to combat fading and achieve diversity through user cooperation. Physical layer security (PLS) is the imminent security guarantee for the cooperative communication....

  13. A Real-Time GPP Software-Defined Radio Testbed for the Physical Layer of Wireless Standards

    NARCIS (Netherlands)

    Schiphorst, Roelof; Hoeksema, F.W.; Slump, Cornelis H.

    2005-01-01

    We present our contribution to the general-purpose-processor-(GPP)-based radio. We describe a baseband software-defined radio testbed for the physical layer of wireless LAN standards. All physical layer functions have been successfully mapped on a Pentium 4 processor that performs these functions in

  14. Physical Layer Design in Wireless Sensor Networks for Fading Mitigation

    Directory of Open Access Journals (Sweden)

    Nuo Chen

    2013-09-01

    Full Text Available This paper presents the theoretical analysis, simulation results and suggests design in digital technology of a physical layer for wireless sensor networks. The proposed design is able to mitigate fading inside communication channel. To mitigate fading the chip interleaving technique is proposed. For the proposed theoretical model of physical layer, a rigorous mathematical analysis is conducted, where all signals are presented and processed in discrete time domain form which is suitable for further direct processing necessary for devices design in digital technology. Three different channels are used to investigate characteristics of the physical layer: additive white Gaussian noise channel (AWGN, AWG noise and flat fading channel and AWG noise and flat fading channel with interleaver and deinterleaver blocks in the receiver and transmitter respectively. Firstly, the mathematical model of communication system representing physical layer is developed based on the discrete time domain signal representation and processing. In the existing theory, these signals and their processing are represented in continuous time form, which is not suitable for direct implementation in digital technology. Secondly, the expressions for the probability of chip, symbol and bit error are derived. Thirdly, the communication system simulators are developed in MATLAB. The simulation results confirmed theoretical findings.

  15. Improving the physical layer security of wireless communication networks using spread spectrum coding and artificial noise approach

    CSIR Research Space (South Africa)

    Adedeji, K

    2016-09-01

    Full Text Available at the application layer to protect the messages against eavesdropping. However, the evolution of strong deciphering mechanisms has made conventional cryptography-based security techniques ineffective against attacks from an intruder. Figure 1: Layer protocol... communication networks with passive and active eavesdropper,” IEEE Globecom; Wireless Communication System, pp. 4868-4873, 2012. [9] Y. Zou, X. Wang and W. Shen, “Optimal relay selection for physical layer security in cooperative wireless networks,” IEEE...

  16. Information Security of PHY Layer in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Weidong Fang

    2016-01-01

    Full Text Available Since the characteristics of wireless channel are open and broadcasting, wireless networks are very vulnerable to be attacked via eavesdropping, jamming, and interference. As traditional secure technologies are not suitable for PHY layer of wireless networks, physical-layer security issues become a focus of attention. In this paper, we firstly identify and summarize the threats and vulnerabilities in PHY layer of wireless networks. Then, we give a holistic overview of PHY layer secure schemes, which are divided into three categories: spatial domain-based, time domain-based, and frequency domain-based. Along the way, we analyze the pros and cons of current secure technologies in each category. In addition, we also conclude the techniques and methods used in these categories and point out the open research issues and directions in this area.

  17. Cross-Layer Wireless Resource Allocation

    National Research Council Canada - National Science Library

    Berry, Randall A; Yeh, Edmund M

    2005-01-01

    .... This bit pipe is a simple abstraction of the underlying physical and data link layers. There is growing awareness that this simple bit-pipe view is inadequate, particularly in the context of modern wireless data networks...

  18. Underwater Acoustic Wireless Sensor Networks: Advances and Future Trends in Physical, MAC and Routing Layers

    NARCIS (Netherlands)

    Climent, S.; Sanchez, A.; Capella, J.V.; Meratnia, Nirvana; Serrano, J.J.

    2014-01-01

    This survey aims to provide a comprehensive overview of the current research on underwater wireless sensor networks, focusing on the lower layers of the communication stack, and envisions future trends and challenges. It analyzes the current state-of-the-art on the physical, medium access control

  19. Cross-Layer Adaptive Feedback Scheduling of Wireless Control Systems

    Science.gov (United States)

    Xia, Feng; Ma, Longhua; Peng, Chen; Sun, Youxian; Dong, Jinxiang

    2008-01-01

    There is a trend towards using wireless technologies in networked control systems. However, the adverse properties of the radio channels make it difficult to design and implement control systems in wireless environments. To attack the uncertainty in available communication resources in wireless control systems closed over WLAN, a cross-layer adaptive feedback scheduling (CLAFS) scheme is developed, which takes advantage of the co-design of control and wireless communications. By exploiting cross-layer design, CLAFS adjusts the sampling periods of control systems at the application layer based on information about deadline miss ratio and transmission rate from the physical layer. Within the framework of feedback scheduling, the control performance is maximized through controlling the deadline miss ratio. Key design parameters of the feedback scheduler are adapted to dynamic changes in the channel condition. An event-driven invocation mechanism for the feedback scheduler is also developed. Simulation results show that the proposed approach is efficient in dealing with channel capacity variations and noise interference, thus providing an enabling technology for control over WLAN. PMID:27879934

  20. Revisiting of Channel Access Mechanisms in Mobile Wireless Networks through Exploiting Physical Layer Technologies

    Directory of Open Access Journals (Sweden)

    Junmei Yao

    2018-01-01

    Full Text Available The wireless local area networks (WLANs have been widely deployed with the rapid development of mobile devices and have further been brought into new applications with infrastructure mobility due to the growth of unmanned aerial vehicles (UAVs. However, the WLANs still face persistent challenge on increasing the network throughput to meet the customer’s requirement and fight against the node mobility. Interference is a well-known issue that would degrade the network performance due to the broadcast characteristics of the wireless signals. Moreover, with infrastructure mobility, the interference becomes the key obstacle in pursuing the channel capacity. Legacy interference management mechanism through the channel access control in the MAC layer design of the 802.11 standard has some well-known drawbacks, such as exposed and hidden terminal problems, inefficient rate adaptation, and retransmission schemes, making the efficient interference management an everlasting research topic over the years. Recently, interference management through exploiting physical layer mechanisms has attracted much research interest and has been proven to be a promising way to improve the network throughput, especially under the infrastructure mobility scenarios which provides more indicators for node dynamics. In this paper, we introduce a series of representative physical layer techniques and analyze how they are exploited for interference management to improve the network performance. We also provide some discussions about the research challenges and give potential future research topics in this area.

  1. Cross-Layer Adaptive Feedback Scheduling of Wireless Control Systems

    Directory of Open Access Journals (Sweden)

    Jinxiang Dong

    2008-07-01

    Full Text Available There is a trend towards using wireless technologies in networked control systems. However, the adverse properties of the radio channels make it difficult to design and implement control systems in wireless environments. To attack the uncertainty in available communication resources in wireless control systems closed over WLAN, a cross-layer adaptive feedback scheduling (CLAFS scheme is developed, which takes advantage of the co-design of control and wireless communications. By exploiting crosslayer design, CLAFS adjusts the sampling periods of control systems at the application layer based on information about deadline miss ratio and transmission rate from the physical layer. Within the framework of feedback scheduling, the control performance is maximized through controlling the deadline miss ratio. Key design parameters of the feedback scheduler are adapted to dynamic changes in the channel condition. An eventdriven invocation mechanism for the feedback scheduler is also developed. Simulation results show that the proposed approach is efficient in dealing with channel capacity variations and noise interference, thus providing an enabling technology for control over WLAN.

  2. Wireless Physical Layer Security: On the Performance Limit of Secret-Key Agreement

    KAUST Repository

    Zorgui, Marwen

    2015-05-01

    Physical layer security (PLS) is a new paradigm aiming at securing communications between legitimate parties at the physical layer. Conventionally, achieving confidentiality in communication networks relies on cryptographic techniques such as public-key cryptography, secret-key distribution and symmetric encryption. Such techniques are deemed secure based on the assumption of limited computational abilities of a wiretapper. Given the relentless progress in computational capacities and the dynamic topology and proliferation of modern wireless networks, the relevance of the previous techniques in securing communications is more and more questionable and less and less reliable. In contrast to this paradigm, PLS does not assume a specific computational power at any eavesdropper, its premise to guarantee provable security via employing channel coding techniques at the physical layer exploiting the inherent randomness in most communication systems. In this dissertation, we investigate a particular aspect of PLS, which is secret-key agreement, also known as secret-sharing. In this setup, two legitimate parties try to distill a secret-key via the observation of correlated signals through a noisy wireless channel, in the presence of an eavesdropper who must be kept ignorant of the secret-key. Additionally, a noiseless public channel is made available to the legitimate parties to exchange public messages that are also accessible to the eavesdropper. Recall that key agreement is an important aspect toward realizing secure communications in the sense that the key can be used in a one-time pad scheme to send the confidential message. In the first part, our focus is on secret-sharing over Rayleigh fading quasi-static channels. We study the fundamental relationship relating the probability of error and a given target secret-key rate in the high power regime. This is characterized through the diversity multiplexing tradeoff (DMT) concept, that we define for our model and then

  3. Wireless sensor networks architectures and protocols

    CERN Document Server

    Callaway, Jr, Edgar H

    2003-01-01

    Introduction to Wireless Sensor NetworksApplications and MotivationNetwork Performance ObjectivesContributions of this BookOrganization of this BookThe Development of Wireless Sensor NetworksEarly Wireless NetworksWireless Data NetworksWireless Sensor and Related NetworksConclusionThe Physical LayerSome Physical Layer ExamplesA Practical Physical Layer for Wireless Sensor NetworksSimulations and ResultsConclusionThe Data Link LayerMedium Access Control TechniquesThe Mediation DeviceSystem Analysis and SimulationConclusionThe Network LayerSome Network Design ExamplesA Wireless Sensor Network De

  4. Physical Layer Network Coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Yomo, Hironori; Popovski, Petar

    2013-01-01

    of interfering nodes and usage of spatial reservation mechanisms. Specifically, we introduce a reserved area in order to protect the nodes involved in two-way relaying from the interference caused by neighboring nodes. We analytically derive the end-to-end rate achieved by PLNC considering the impact......Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause....../receive interference. The way to deal with this problem in distributed wireless networks is usage of MAC-layer mechanisms that make a spatial reservation of the shared wireless medium, similar to the well-known RTS/CTS in IEEE 802.11 wireless networks. In this paper, we investigate two-way relaying in presence...

  5. Code-Hopping Based Transmission Scheme for Wireless Physical-Layer Security

    Directory of Open Access Journals (Sweden)

    Liuguo Yin

    2018-01-01

    Full Text Available Due to the broadcast and time-varying natures of wireless channels, traditional communication systems that provide data encryption at the application layer suffer many challenges such as error diffusion. In this paper, we propose a code-hopping based secrecy transmission scheme that uses dynamic nonsystematic low-density parity-check (LDPC codes and automatic repeat-request (ARQ mechanism to jointly encode and encrypt source messages at the physical layer. In this scheme, secret keys at the transmitter and the legitimate receiver are generated dynamically upon the source messages that have been transmitted successfully. During the transmission, each source message is jointly encoded and encrypted by a parity-check matrix, which is dynamically selected from a set of LDPC matrices based on the shared dynamic secret key. As for the eavesdropper (Eve, the uncorrectable decoding errors prevent her from generating the same secret key as the legitimate parties. Thus she cannot select the correct LDPC matrix to recover the source message. We demonstrate that our scheme can be compatible with traditional cryptosystems and enhance the security without sacrificing the error-correction performance. Numerical results show that the bit error rate (BER of Eve approaches 0.5 as the number of transmitted source messages increases and the security gap of the system is small.

  6. Wireless Physical Layer Security with CSIT Uncertainty

    KAUST Repository

    Hyadi, Amal

    2017-01-01

    Recent years have been marked by an enormous growth of wireless communication networks and an extensive use of wireless applications. In return, this phenomenal expansion induced more concerns about the privacy and the security of the users

  7. Distributed Cross-layer Monitoring in Wireless Mesh Networks

    OpenAIRE

    Panmin, Ye; Yong,

    2009-01-01

    Wireless mesh networks has rapid development over the last few years. However, due to properties such as distributed infrastructure and interference, which strongly affect the performance of wireless mesh networks, developing technology has to face the challenge of architecture and protocol design issues. Traditional layered protocols do not function efficiently in multi-hop wireless environments. To get deeper understanding on interaction of the layered protocols and optimize the performance...

  8. An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty

    KAUST Repository

    Hyadi, Amal; Rezki, Zouheir; Alouini, Mohamed-Slim

    2016-01-01

    The concept of physical layer security builds on the pivotal idea of turning the channel's imperfections, such as noise and fading, into a source of security. This is established through appropriately designed coding techniques and signal processing strategies. In this vein, it has been shown that fading channels can enhance the transmission of confidential information and that a secure communication can be achieved even when the channel to the eavesdropper is better than the main channel. However, to fully benefit from what fading has to offer, the knowledge of the channel state information at the transmitter (CSIT) is of primordial importance. In practical wireless communication systems, CSIT is usually obtained, prior to data transmission, through CSI feedback sent by the receivers. The channel links over which this feedback information is sent can be either noisy, rate-limited, or delayed, leading to CSIT uncertainty. In this paper, we present a comprehensive review of recent and ongoing research works on physical layer security with CSIT uncertainty. We focus on both information theoretic and signal processing approaches to the topic when the uncertainty concerns the channel to the wiretapper or the channel to the legitimate receiver. Moreover, we present a classification of the research works based on the considered channel uncertainty. Mainly, we distinguish between the cases when the uncertainty comes from an estimation error of the CSIT, from a CSI feedback link with limited capacity, or from an outdated CSI.

  9. An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty

    KAUST Repository

    Hyadi, Amal

    2016-09-21

    The concept of physical layer security builds on the pivotal idea of turning the channel\\'s imperfections, such as noise and fading, into a source of security. This is established through appropriately designed coding techniques and signal processing strategies. In this vein, it has been shown that fading channels can enhance the transmission of confidential information and that a secure communication can be achieved even when the channel to the eavesdropper is better than the main channel. However, to fully benefit from what fading has to offer, the knowledge of the channel state information at the transmitter (CSIT) is of primordial importance. In practical wireless communication systems, CSIT is usually obtained, prior to data transmission, through CSI feedback sent by the receivers. The channel links over which this feedback information is sent can be either noisy, rate-limited, or delayed, leading to CSIT uncertainty. In this paper, we present a comprehensive review of recent and ongoing research works on physical layer security with CSIT uncertainty. We focus on both information theoretic and signal processing approaches to the topic when the uncertainty concerns the channel to the wiretapper or the channel to the legitimate receiver. Moreover, we present a classification of the research works based on the considered channel uncertainty. Mainly, we distinguish between the cases when the uncertainty comes from an estimation error of the CSIT, from a CSI feedback link with limited capacity, or from an outdated CSI.

  10. A cross-layer communication framework for wireless networked control systems

    NARCIS (Netherlands)

    Israr, N.; Scanlon, W.G.; Irwin, G.W.

    2009-01-01

    This paper presents a robust, dynamic cross-layer wireless communication architecture for wireless networked control systems. Each layer in the proposed protocol architecture contributes to the overall goal of reliable, energy efficient communication. The protocol stack also features a

  11. Design and Study of Cognitive Network Physical Layer Simulation Platform

    Directory of Open Access Journals (Sweden)

    Yongli An

    2014-01-01

    Full Text Available Cognitive radio technology has received wide attention for its ability to sense and use idle frequency. IEEE 802.22 WRAN, the first to follow the standard in cognitive radio technology, is featured by spectrum sensing and wireless data transmission. As far as wireless transmission is concerned, the availability and implementation of a mature and robust physical layer algorithm are essential to high performance. For the physical layer of WRAN using OFDMA technology, this paper proposes a synchronization algorithm and at the same time provides a public platform for the improvement and verification of that new algorithm. The simulation results show that the performance of the platform is highly close to the theoretical value.

  12. Cross-layer model design in wireless ad hoc networks for the Internet of Things.

    Science.gov (United States)

    Yang, Xin; Wang, Ling; Xie, Jian; Zhang, Zhaolin

    2018-01-01

    Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods.

  13. Cross-layer model design in wireless ad hoc networks for the Internet of Things.

    Directory of Open Access Journals (Sweden)

    Xin Yang

    Full Text Available Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods.

  14. Identifying Opportunities for Exploiting Cross-Layer Interactions in Adaptive Wireless Systems

    Directory of Open Access Journals (Sweden)

    Troy Weingart

    2007-01-01

    Full Text Available The flexibility of cognitive and software-defined radio heralds an opportunity for researchers to reexamine how network protocol layers operate with respect to providing quality of service aware transmission among wireless nodes. This opportunity is enhanced by the continued development of spectrally responsive devices—ones that can detect and respond to changes in the radio frequency environment. Present wireless network protocols define reliability and other performance-related tasks narrowly within layers. For example, the frame size employed on 802.11 can substantially influence the throughput, delay, and jitter experienced by an application, but there is no simple way to adapt this parameter. Furthermore, while the data link layer of 802.11 provides error detection capabilities across a link, it does not specify additional features, such as forward error correction schemes, nor does it provide a means for throttling retransmissions at the transport layer (currently, the data link and transport layer can function counterproductively with respect to reliability. This paper presents an analysis of the interaction of physical, data link, and network layer parameters with respect to throughput, bit error rate, delay, and jitter. The goal of this analysis is to identify opportunities where system designers might exploit cross-layer interactions to improve the performance of Voice over IP (VoIP, instant messaging (IM, and file transfer applications.

  15. The art of wireless sensor networks

    CERN Document Server

    2014-01-01

    During the last one and a half decades, wireless sensor networks have witnessed significant growth and tremendous development in both academia and industry.   “The Art of Wireless Sensor Networks: Volume 1: Fundamentals” focuses on the fundamentals concepts in the design, analysis, and implementation of wireless sensor networks. It covers the various layers of the lifecycle of this type of network from the physical layer up to the application layer. Its rationale is that the first volume covers contemporary design issues, tools, and protocols for radio-based two-dimensional terrestrial sensor networks. All the book chapters in this volume include up-to-date research work spanning various classic facets of the physical properties and functional behavior of wireless sensor networks, including physical layer, medium access control, data routing, topology management, mobility management, localization, task management, data management, data gathering, security, middleware, sensor technology, standards, and ...

  16. A primer on physical-layer network coding

    CERN Document Server

    Liew, Soung Chang; Zhang, Shengli

    2015-01-01

    The concept of physical-layer network coding (PNC) was proposed in 2006 for application in wireless networks. Since then it has developed into a subfield of communications and networking with a wide following. This book is a primer on PNC. It is the outcome of a set of lecture notes for a course for beginning graduate students at The Chinese University of Hong Kong. The target audience is expected to have some prior background knowledge in communication theory and wireless communications, but not working knowledge at the research level. Indeed, a goal of this book/course is to allow the reader

  17. Cross-Layer Techniques for Adaptive Video Streaming over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Yufeng Shan

    2005-02-01

    Full Text Available Real-time streaming media over wireless networks is a challenging proposition due to the characteristics of video data and wireless channels. In this paper, we propose a set of cross-layer techniques for adaptive real-time video streaming over wireless networks. The adaptation is done with respect to both channel and data. The proposed novel packetization scheme constructs the application layer packet in such a way that it is decomposed exactly into an integer number of equal-sized radio link protocol (RLP packets. FEC codes are applied within an application packet at the RLP packet level rather than across different application packets and thus reduce delay at the receiver. A priority-based ARQ, together with a scheduling algorithm, is applied at the application layer to retransmit only the corrupted RLP packets within an application layer packet. Our approach combines the flexibility and programmability of application layer adaptations, with low delay and bandwidth efficiency of link layer techniques. Socket-level simulations are presented to verify the effectiveness of our approach.

  18. Trusted communications with physical layer security for 5G and beyond

    CERN Document Server

    Duong, Trung Q; Poor, H Vincent

    2017-01-01

    Securely transferring confidential information over a wireless network is a challenging task. This book addresses security issues, not only for 5G but also beyond, using physical layer security technology and techniques.

  19. MAC layer security issues in wireless mesh networks

    Science.gov (United States)

    Reddy, K. Ganesh; Thilagam, P. Santhi

    2016-03-01

    Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.

  20. Wireless Physical Layer Security: On the Performance Limit of Secret-Key Agreement

    KAUST Repository

    Zorgui, Marwen

    2015-01-01

    Physical layer security (PLS) is a new paradigm aiming at securing communications between legitimate parties at the physical layer. Conventionally, achieving confidentiality in communication networks relies on cryptographic techniques such as public

  1. Cooperative Jamming for Physical Layer Security in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    Interference is generally considered as the redundant and unwanted occurrence in wireless communication. This work proposes a novel cooperative jamming mechanism for scalable networks like Wireless Sensor Networks (WSNs) which makes use of friendly interference to confuse the eavesdropper...

  2. Physical layer simulation study for the coexistence of WLAN standards

    Energy Technology Data Exchange (ETDEWEB)

    Howlader, M. K. [Marquette Univ., 222 Haggerty Hall, P. O. Box 1881, Milwaukee, WI 53201 (United States); Keiger, C. [Analysis and Measurement Services Corporation, 9111 Cross Park Drive, Knoxville, TN 37923 (United States); Ewing, P. D. [Oak Ridge National Laboratory, MS-6006, P. O. Box 2008, Oak Ridge, TN 37831 (United States); Govan, T. V. [U.S. Nuclear Regulatory Commission, MS T-10-D20, 11545 Rockville Pike, Rockville, MD 20852 (United States)

    2006-07-01

    This paper presents the results of a study on the performance of wireless local area network (WLAN) devices in the presence of interference from other wireless devices. To understand the coexistence of these wireless protocols, simplified physical-layer-system models were developed for the Bluetooth, Wireless Fidelity (WiFi), and Zigbee devices, all of which operate within the 2.4-GHz frequency band. The performances of these protocols were evaluated using Monte-Carlo simulations under various interference and channel conditions. The channel models considered were basic additive white Gaussian noise (AWGN), Rayleigh fading, and site-specific fading. The study also incorporated the basic modulation schemes, multiple access techniques, and channel allocations of the three protocols. This research is helping the U.S. Nuclear Regulatory Commission (NRC) understand the coexistence issues associated with deploying wireless devices and could prove useful in the development of a technical basis for guidance to address safety-related issues with the implementation of wireless systems in nuclear facilities. (authors)

  3. Physical layer simulation study for the coexistence of WLAN standards

    International Nuclear Information System (INIS)

    Howlader, M. K.; Keiger, C.; Ewing, P. D.; Govan, T. V.

    2006-01-01

    This paper presents the results of a study on the performance of wireless local area network (WLAN) devices in the presence of interference from other wireless devices. To understand the coexistence of these wireless protocols, simplified physical-layer-system models were developed for the Bluetooth, Wireless Fidelity (WiFi), and Zigbee devices, all of which operate within the 2.4-GHz frequency band. The performances of these protocols were evaluated using Monte-Carlo simulations under various interference and channel conditions. The channel models considered were basic additive white Gaussian noise (AWGN), Rayleigh fading, and site-specific fading. The study also incorporated the basic modulation schemes, multiple access techniques, and channel allocations of the three protocols. This research is helping the U.S. Nuclear Regulatory Commission (NRC) understand the coexistence issues associated with deploying wireless devices and could prove useful in the development of a technical basis for guidance to address safety-related issues with the implementation of wireless systems in nuclear facilities. (authors)

  4. Cross-layer optimization of wireless multi-hop networks

    OpenAIRE

    Soldati, Pablo

    2007-01-01

    The interest in wireless communications has grown constantly for the past decades, leading to an enormous number of applications and services embraced by billions of users. In order to meet the increasing demand for mobile Internet access, several high data-rate radio networking technologies have been proposed to offer wide area high-speed wireless communications, eventually replacing fixed (wired) networks for many applications. This thesis considers cross-layer optimization of multi-hop rad...

  5. A Study of Application Layer Paradigm for Lower Layer Energy Saving Potentials in Cloud-Edge Social User Wireless Image Sharing

    Directory of Open Access Journals (Sweden)

    Wei Wang

    2015-08-01

    Full Text Available Energy saving becomes critical in modern cloud wireless multimedia and mobile communication systems. In this paper we propose to study a new paradigm named application layer Position-Value diversity for wireless image sharing for cloud-edge communications, which has significant energy saving potentials for modern wireless networking systems. In this new paradigm, saving energy is achieved by looking into application layer imaging traffic, in stead of MAC-PHY protocols at lower layers, and partitioning it into important positions and unimportant values. This paradigm could be integrated to existing wavelet-based tree compression, and truncation of image bit streams could be performed with regards to wireless communication energy budget estimation. Simulation results demonstrated that there are significant potentials of communication energy efficiency gain and Quality of Experience (QoE enhancement in wireless image communication systems.

  6. Rendering Intelligence at Physical Layer for Smart Addressing and Multiple Access

    DEFF Research Database (Denmark)

    Sanyal, Rajarshi; Prasad, Ramjee; Cianca, Ernestina

    2010-01-01

    addressing of a node. For a typical closed user group type of network, we propose a multiple access mechanism and network topology which will not only eliminate the need of intelligent core network equipments in the network area , but to use this intelligent physical layer to directly reach any node over......The primary objective of this work is to propose a technique of wireless communication, where we render intelligence to the physical layer. We aim to realize a physical layer that can take part in some processes which is otherwise confined to higher layer signalling activities, like for example...... the fundamentals behind the proposed multiple access scheme and draws out the benefits compared to the existing multiple access processes based on cellular approach....

  7. Cross-Layer Design of Source Rate Control and Congestion Control for Wireless Video Streaming

    Directory of Open Access Journals (Sweden)

    Peng Zhu

    2007-01-01

    Full Text Available Cross-layer design has been used in streaming video over the wireless channels to optimize the overall system performance. In this paper, we extend our previous work on joint design of source rate control and congestion control for video streaming over the wired channel, and propose a cross-layer design approach for wireless video streaming. First, we extend the QoS-aware congestion control mechanism (TFRCC proposed in our previous work to the wireless scenario, and provide a detailed discussion about how to enhance the overall performance in terms of rate smoothness and responsiveness of the transport protocol. Then, we extend our previous joint design work to the wireless scenario, and a thorough performance evaluation is conducted to investigate its performance. Simulation results show that by cross-layer design of source rate control at application layer and congestion control at transport layer, and by taking advantage of the MAC layer information, our approach can avoid the throughput degradation caused by wireless link error, and better support the QoS requirements of the application. Thus, the playback quality is significantly improved, while good performance of the transport protocol is still preserved.

  8. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jian Wang

    2017-05-01

    Full Text Available This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.

  9. Safe Cooperating Cyber-Physical Systems using Wireless Communication

    DEFF Research Database (Denmark)

    Pop, Paul; Scholle, Detlef; Sljivo, Irfan

    2017-01-01

    This paper presents an overview of the ECSEL project entitled ―Safe Cooperating Cyber-Physical Systems using Wireless Communication‖ (SafeCOP), which runs during the period 2016–2019. SafeCOP targets safety-related Cooperating Cyber-Physical Systems (CO-CPS) characterised by use of wireless...... detection of abnormal behaviour, triggering if needed a safe degraded mode. SafeCOP will also develop methods and tools, which will be used to produce safety assurance evidence needed to certify cooperative functions. SafeCOP will extend current wireless technologies to ensure safe and secure cooperation...

  10. A Cross-Layer Cooperation Mechanism of Wireless Networks Based on Game Theory

    OpenAIRE

    Chunsheng, Cui; Yongjian, Yang; Liping, Huang

    2014-01-01

    To meet the wireless network congestion control problem, we give a definition of congestion degree classification and propose a mechanism of directed cooperative path net, guided by the wireless network’s cross-layer design methods and node cooperation principles. Considering the virtual collision and “starved” phenomenon in congested networks, the QRD mechanism and channel competition mechanism QPCG are proposed, with introducing the game theory into the cross-layer design. Simulation result...

  11. Network coding at different layers in wireless networks

    CERN Document Server

    2016-01-01

    This book focuses on how to apply network coding at different layers in wireless networks – including MAC, routing, and TCP – with special focus on cognitive radio networks. It discusses how to select parameters in network coding (e.g., coding field, number of packets involved, and redundant information ration) in order to be suitable for the varying wireless environments. The book explores how to deploy network coding in MAC to improve network performance and examines joint network coding with opportunistic routing to improve the successful rate of routing. In regards to TCP and network coding, the text considers transport layer protocol working with network coding to overcome the transmission error rate, particularly with how to use the ACK feedback of TCP to enhance the efficiency of network coding. The book pertains to researchers and postgraduate students, especially whose interests are in opportunistic routing and TCP in cognitive radio networks.

  12. Joint optimization of physical layer parameters and routing in wireless mesh networks

    KAUST Repository

    Tobagi, Fouad A.

    2010-06-01

    Achieving the best performance in a wireless mesh network requires striking the right balance between the performance of links carrying traffic and the extent of spatial reuse of the wireless medium. The performance of a link depends on its transmit power and data rate as well as the level of interference caused by concurrent transmissions in the network; the latter is function of the Energy Detect (ED) threshold that determines when a node may access the medium. Which links in the network carry traffic is determined by the routing function; routing selects paths according to a link metric that reflects the relative performance of links (e.g., the expected transmission time of a packet on the link). In this paper, we seek to maximize end-to-end network throughput by jointly optimizing physical layer parameters and routing. We consider a random topology with a uniform node density. We consider that the signal attenuation between a pair of nodes is determined by a power law path loss model with an exponent equal to 3. Our findings are as follows. Consider first that the same transmit power and same data rate are used on all links. For any transmit power, data rate and ED threshold setting, the highest feasible load is obtained when the level of interference experienced by links used by routing is the highest possible. For a given transmit power and data rate setting, there is an optimum ED threshold that maximizes network performance. At the optimum ED threshold and maximum load, the range of link lengths used by routing is the lowest possible given the topology and routing metric used. With an ED threshold higher than the optimum, the same range of links is used by routing; however, the highest feasible load in this case is lower due to the fact that concurrent transmitters are allowed to be closer. With a lower ED threshold, concurrent transmitters are forced to be farther apart, and thus longer links become more attractive; as a result, the range of link lengths

  13. Joint optimization of physical layer parameters and routing in wireless mesh networks

    KAUST Repository

    Tobagi, Fouad A.; Hira, Mukesh M.

    2010-01-01

    Achieving the best performance in a wireless mesh network requires striking the right balance between the performance of links carrying traffic and the extent of spatial reuse of the wireless medium. The performance of a link depends on its transmit power and data rate as well as the level of interference caused by concurrent transmissions in the network; the latter is function of the Energy Detect (ED) threshold that determines when a node may access the medium. Which links in the network carry traffic is determined by the routing function; routing selects paths according to a link metric that reflects the relative performance of links (e.g., the expected transmission time of a packet on the link). In this paper, we seek to maximize end-to-end network throughput by jointly optimizing physical layer parameters and routing. We consider a random topology with a uniform node density. We consider that the signal attenuation between a pair of nodes is determined by a power law path loss model with an exponent equal to 3. Our findings are as follows. Consider first that the same transmit power and same data rate are used on all links. For any transmit power, data rate and ED threshold setting, the highest feasible load is obtained when the level of interference experienced by links used by routing is the highest possible. For a given transmit power and data rate setting, there is an optimum ED threshold that maximizes network performance. At the optimum ED threshold and maximum load, the range of link lengths used by routing is the lowest possible given the topology and routing metric used. With an ED threshold higher than the optimum, the same range of links is used by routing; however, the highest feasible load in this case is lower due to the fact that concurrent transmitters are allowed to be closer. With a lower ED threshold, concurrent transmitters are forced to be farther apart, and thus longer links become more attractive; as a result, the range of link lengths

  14. Cross-Layer Protocol as a Better Option in Wireless Mesh Network with Respect to Layered-Protocol

    OpenAIRE

    Ahmed Abdulwahab Al-Ahdal; Dr. V. P. Pawar; G. N. Shinde

    2014-01-01

    The Optimal way to improve Wireless Mesh Networks (WMNs) performance is to use a better network protocol, but whether layered-protocol design or cross-layer design is a better option to optimize protocol performance in WMNs is still an on-going research topic. In this paper, we focus on cross-layer protocol as a better option with respect to layered-protocol. The layered protocol architecture (OSI) model divides networking tasks into layers and defines a pocket of services for each layer to b...

  15. Low-profile wireless passive resonators for sensing

    Energy Technology Data Exchange (ETDEWEB)

    Gong, Xun; An, Linan

    2017-04-04

    A resonator for sensing a physical or an environmental parameter includes a support having a top surface that provides a ground plane, and a polymer-derived ceramic (PDC) element positioned on the top surface including a PDC layer, and a metal patch on the PDC layer. The metal patch is electrically isolated from all surrounding structure, and the resonator has a resonant frequency that changes as a function of the physical or environmental parameter. A system for wirelessly sensing a physical or environmental parameter includes at least one resonator and a wireless RF reader located remotely from the resonator for transmitting a wide-band RF interrogation signal that excites the resonator. The wireless RF reader detects a sensing signal retransmitted by the resonator and includes a processor for determining the physical or environmental parameter at the location of the resonator from the sensing signal.

  16. Physical-Layer Design for Next-Generation Cellular Wireless Systems

    NARCIS (Netherlands)

    Foschini, Gerard J.; Huang, Howard C.; Mullender, Sape J.; Venkatesan, Sivarama; Viswanathan, Harish

    The conventional cellular architecture will remain an integral part of nextgeneration wireless systems, providing high-speed packet data services directly to mobile users and also backhaul service for local area networks. In this paper, we present several proposals addressing the challenges

  17. Migration of TCP Connections with Layer-2 Support in Wireless Environments

    NARCIS (Netherlands)

    Bosch, H.G.P.; Cortes, Mauricio; Janiszewski, Tom J.; McKie, Jim B.; Mullender, Sape J.; Rajkumar, Ajay; Recchione, Michael C.; Rossetti, David A.; Turner, Michael D.

    2008-01-01

    Example embodiments provide methods of transparently migrating a reliable transport layer connection between a user and a first base station and a second base station in a wireless network. The method includes receiving at least one transport layer connection state information parameter from the

  18. Apparatus and method supporting wireless access to multiple security layers in an industrial control and automation system or other system

    Science.gov (United States)

    Chen, Yu-Gene T.

    2013-04-16

    A method includes receiving a message at a first wireless node. The first wireless node is associated with a first wired network, and the first wired network is associated with a first security layer. The method also includes transmitting the message over the first wired network when at least one destination of the message is located in the first security layer. The method further includes wirelessly transmitting the message for delivery to a second wireless node when at least one destination of the message is located in a second security layer. The second wireless node is associated with a second wired network, and the second wired network is associated with the second security layer. The first and second security layers may be associated with different security paradigms and/or different security domains. Also, the message could be associated with destinations in the first and second security layers.

  19. Protocol design and analysis for cooperative wireless networks

    CERN Document Server

    Song, Wei; Jin, A-Long

    2017-01-01

    This book focuses on the design and analysis of protocols for cooperative wireless networks, especially at the medium access control (MAC) layer and for crosslayer design between the MAC layer and the physical layer. It highlights two main points that are often neglected in other books: energy-efficiency and spatial random distribution of wireless devices. Effective methods in stochastic geometry for the design and analysis of wireless networks are also explored. After providing a comprehensive review of existing studies in the literature, the authors point out the challenges that are worth further investigation. Then, they introduce several novel solutions for cooperative wireless network protocols that reduce energy consumption and address spatial random distribution of wireless nodes. For each solution, the book offers a clear system model and problem formulation, details of the proposed cooperative schemes, comprehensive performance analysis, and extensive numerical and simulation results that validate th...

  20. Wireless data transmission for high energy physics applications

    Science.gov (United States)

    Dittmeier, Sebastian; Brenner, Richard; Dancila, Dragos; Dehos, Cedric; De Lurgio, Patrick; Djurcic, Zelimir; Drake, Gary; Gonzalez Gimenez, Jose Luis; Gustafsson, Leif; Kim, Do-Won; Locci, Elizabeth; Pfeiffer, Ullrich; Röhrich, Dieter; Rydberg, Anders; Schöning, André; Siligaris, Alexandre; Soltveit, Hans Kristian; Ullaland, Kjetil; Vincent, Pierre; Rodriguez Vazquez, Pedro; Wiedner, Dirk; Yang, Shiming

    2017-08-01

    Silicon tracking detectors operated at high luminosity collider experiments pose a challenge for current and future readout systems regarding bandwidth, radiation, space and power constraints. With the latest developments in wireless communications, wireless readout systems might be an attractive alternative to commonly used wired optical and copper based readout architectures. The WADAPT group (Wireless Allowing Data and Power Transmission) has been formed to study the feasibility of wireless data transmission for future tracking detectors. These proceedings cover current developments focused on communication in the 60 GHz band. This frequency band offers a high bandwidth, a small form factor and an already mature technology. Motivation for wireless data transmission for high energy physics application and the developments towards a demonstrator prototype are summarized. Feasibility studies concerning the construction and operation of a wireless transceiver system have been performed. Data transmission tests with a transceiver prototype operating at even higher frequencies in the 240 GHz band are described. Data transmission at rates up to 10 Gb/s have been obtained successfully using binary phase shift keying.

  1. Underwater Optical Wireless Communications, Networking, and Localization: A Survey

    KAUST Repository

    Saeed, Nasir; Celik, Abdulkadir; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2018-01-01

    Underwater wireless communications can be carried out through acoustic, radio frequency (RF), and optical waves. Compared to its bandwidth limited acoustic and RF counterparts, underwater optical wireless communications (UOWCs) can support higher data rates at low latency levels. However, severe aquatic channel conditions (e.g., absorption, scattering, turbulence, etc.) pose great challenges for UOWCs and significantly reduce the attainable communication ranges, which necessitates efficient networking and localization solutions. Therefore, we provide a comprehensive survey on the challenges, advances, and prospects of underwater optical wireless networks (UOWNs) from a layer by layer perspective which includes: 1) Potential network architectures; 2) Physical layer issues including propagation characteristics, channel modeling, and modulation techniques 3) Data link layer problems covering link configurations, link budgets, performance metrics, and multiple access schemes; 4) Network layer topics containing relaying techniques and potential routing algorithms; 5) Transport layer subjects such as connectivity, reliability, flow and congestion control; 6) Application layer goals and state-of-the-art UOWN applications, and 7) Localization and its impacts on UOWN layers. Finally, we outline the open research challenges and point out the future directions for underwater optical wireless communications, networking, and localization research.

  2. Underwater Optical Wireless Communications, Networking, and Localization: A Survey

    KAUST Repository

    Saeed, Nasir

    2018-02-28

    Underwater wireless communications can be carried out through acoustic, radio frequency (RF), and optical waves. Compared to its bandwidth limited acoustic and RF counterparts, underwater optical wireless communications (UOWCs) can support higher data rates at low latency levels. However, severe aquatic channel conditions (e.g., absorption, scattering, turbulence, etc.) pose great challenges for UOWCs and significantly reduce the attainable communication ranges, which necessitates efficient networking and localization solutions. Therefore, we provide a comprehensive survey on the challenges, advances, and prospects of underwater optical wireless networks (UOWNs) from a layer by layer perspective which includes: 1) Potential network architectures; 2) Physical layer issues including propagation characteristics, channel modeling, and modulation techniques 3) Data link layer problems covering link configurations, link budgets, performance metrics, and multiple access schemes; 4) Network layer topics containing relaying techniques and potential routing algorithms; 5) Transport layer subjects such as connectivity, reliability, flow and congestion control; 6) Application layer goals and state-of-the-art UOWN applications, and 7) Localization and its impacts on UOWN layers. Finally, we outline the open research challenges and point out the future directions for underwater optical wireless communications, networking, and localization research.

  3. Low latency adaptive streaming of HD H.264 video over 802.11 wireless networks with cross-layer feedback

    Science.gov (United States)

    Patti, Andrew; Tan, Wai-tian; Shen, Bo

    2007-09-01

    Streaming video in consumer homes over wireless IEEE 802.11 networks is becoming commonplace. Wireless 802.11 networks pose unique difficulties for streaming high definition (HD), low latency video due to their error-prone physical layer and media access procedures which were not designed for real-time traffic. HD video streaming, even with sophisticated H.264 encoding, is particularly challenging due to the large number of packet fragments per slice. Cross-layer design strategies have been proposed to address the issues of video streaming over 802.11. These designs increase streaming robustness by imposing some degree of monitoring and control over 802.11 parameters from application level, or by making the 802.11 layer media-aware. Important contributions are made, but none of the existing approaches directly take the 802.11 queuing into account. In this paper we take a different approach and propose a cross-layer design allowing direct, expedient control over the wireless packet queue, while obtaining timely feedback on transmission status for each packet in a media flow. This method can be fully implemented on a media sender with no explicit support or changes required to the media client. We assume that due to congestion or deteriorating signal-to-noise levels, the available throughput may drop substantially for extended periods of time, and thus propose video source adaptation methods that allow matching the bit-rate to available throughput. A particular H.264 slice encoding is presented to enable seamless stream switching between streams at multiple bit-rates, and we explore using new computationally efficient transcoding methods when only a high bit-rate stream is available.

  4. The Study of Cross-layer Optimization for Wireless Rechargeable Sensor Networks Implemented in Coal Mines

    Science.gov (United States)

    Ding, Xu; Shi, Lei; Han, Jianghong; Lu, Jingting

    2016-01-01

    Wireless sensor networks deployed in coal mines could help companies provide workers working in coal mines with more qualified working conditions. With the underground information collected by sensor nodes at hand, the underground working conditions could be evaluated more precisely. However, sensor nodes may tend to malfunction due to their limited energy supply. In this paper, we study the cross-layer optimization problem for wireless rechargeable sensor networks implemented in coal mines, of which the energy could be replenished through the newly-brewed wireless energy transfer technique. The main results of this article are two-fold: firstly, we obtain the optimal relay nodes’ placement according to the minimum overall energy consumption criterion through the Lagrange dual problem and KKT conditions; secondly, the optimal strategies for recharging locomotives and wireless sensor networks are acquired by solving a cross-layer optimization problem. The cyclic nature of these strategies is also manifested through simulations in this paper. PMID:26828500

  5. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network.

    Science.gov (United States)

    Yang, Bin; Zhang, Jianfeng

    2017-06-28

    Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme.

  6. Wireless communications resource management

    CERN Document Server

    Lee, B; Seo, H

    2009-01-01

    Wireless technologies continue to evolve to address the insatiable demand for faster response times, larger bandwidth, and reliable transmission. Yet as the industry moves toward the development of post 3G systems, engineers have consumed all the affordable physical layer technologies discovered to date. This has necessitated more intelligent and optimized utilization of available wireless resources. Wireless Communications Resource Managem ent, Lee, Park, and Seo cover all aspects of this critical topic, from the preliminary concepts and mathematical tools to detailed descriptions of all the resource management techniques. Readers will be able to more effectively leverage limited spectrum and maximize device battery power, as well as address channel loss, shadowing, and multipath fading phenomena.

  7. A Cross-Layer Routing Design for Multi-Interface Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Tzu-Chieh Tsai

    2009-01-01

    Full Text Available In recent years, Wireless Mesh Networks (WMNs technologies have received significant attentions. WMNs not only accede to the advantages of ad hoc networks but also provide hierarchical multi-interface architecture. Transmission power control and routing path selections are critical issues in the past researches of multihop networks. Variable transmission power levels lead to different network connectivity and interference. Further, routing path selections among different radio interfaces will also produce different intra-/interflow interference. These features tightly affect the network performance. Most of the related works on the routing protocol design do not consider transmission power control and multi-interface environment simultaneously. In this paper, we proposed a cross-layer routing protocol called M2iRi2 which coordinates transmission power control and intra-/interflow interference considerations as routing metrics. Each radio interface calculates the potential tolerable-added transmission interference in the physical layer. When the route discovery starts, the M2iRi2 will adopt the appropriate power level to evaluate each interface quality along paths. The simulation results demonstrate that our design can enhance both network throughput and end-to-end delay.

  8. Efficient Evaluation of Wireless Real-Time Control Networks

    Directory of Open Access Journals (Sweden)

    Peter Horvath

    2015-02-01

    Full Text Available In this paper, we present a system simulation framework for the design and performance evaluation of complex wireless cyber-physical systems. We describe the simulator architecture and the specific developments that are required to simulate cyber-physical systems relying on multi-channel, multihop mesh networks. We introduce realistic and efficient physical layer models and a system simulation methodology, which provides statistically significant performance evaluation results with low computational complexity. The capabilities of the proposed framework are illustrated in the example of WirelessHART, a centralized, real-time, multi-hop mesh network designed for industrial control and monitor applications.

  9. Cross-layer design for intrusion detection and data security in wireless ad hoc sensor networks

    Science.gov (United States)

    Hortos, William S.

    2007-09-01

    A wireless ad hoc sensor network is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. The nodes are severely resource-constrained, with limited processing, memory and power capacities and must operate cooperatively to fulfill a common mission in typically unattended modes. In a wireless sensor network (WSN), each sensor at a node can observe locally some underlying physical phenomenon and sends a quantized version of the observation to sink (destination) nodes via wireless links. Since the wireless medium can be easily eavesdropped, links can be compromised by intrusion attacks from nodes that may mount denial-of-service attacks or insert spurious information into routing packets, leading to routing loops, long timeouts, impersonation, and node exhaustion. A cross-layer design based on protocol-layer interactions is proposed for detection and identification of various intrusion attacks on WSN operation. A feature set is formed from selected cross-layer parameters of the WSN protocol to detect and identify security threats due to intrusion attacks. A separate protocol is not constructed from the cross-layer design; instead, security attributes and quantified trust levels at and among nodes established during data exchanges complement customary WSN metrics of energy usage, reliability, route availability, and end-to-end quality-of-service (QoS) provisioning. Statistical pattern recognition algorithms are applied that use observed feature-set patterns observed during network operations, viewed as security audit logs. These algorithms provide the "best" network global performance in the presence of various intrusion attacks. A set of mobile (software) agents distributed at the nodes implement the algorithms, by moving among the layers involved in the network response at each active node

  10. Emulation Platform for Cyber Analysis of Wireless Communication Network Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Van Leeuwen, Brian P. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Eldridge, John M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Wireless networking and mobile communications is increasing around the world and in all sectors of our lives. With increasing use, the density and complexity of the systems increase with more base stations and advanced protocols to enable higher data throughputs. The security of data transported over wireless networks must also evolve with the advances in technologies enabling more capable wireless networks. However, means for analysis of the effectiveness of security approaches and implementations used on wireless networks are lacking. More specifically a capability to analyze the lower-layer protocols (i.e., Link and Physical layers) is a major challenge. An analysis approach that incorporates protocol implementations without the need for RF emissions is necessary. In this research paper several emulation tools and custom extensions that enable an analysis platform to perform cyber security analysis of lower layer wireless networks is presented. A use case of a published exploit in the 802.11 (i.e., WiFi) protocol family is provided to demonstrate the effectiveness of the described emulation platform.

  11. OFDM systems for wireless communications

    CERN Document Server

    Narasimhamurthy, Adarsh

    2010-01-01

    Orthogonal Frequency Division Multiplexing (OFDM) systems are widely used in the standards for digital audio/video broadcasting, WiFi and WiMax. Being a frequency-domain approach to communications, OFDM has important advantages in dealing with the frequency-selective nature of high data rate wireless communication channels. As the needs for operating with higher data rates become more pressing, OFDM systems have emerged as an effective physical-layer solution.This short monograph is intended as a tutorial which highlights the deleterious aspects of the wireless channel and presents why OFDM is

  12. The SafeCOP ECSEL Project: Safe Cooperating Cyber-Physical Systems Using Wireless Communication

    DEFF Research Database (Denmark)

    Pop, Paul; Scholle, Detlef; Hansson, Hans

    2016-01-01

    This paper presents an overview of the ECSEL project entitled "Safe Cooperating Cyber-Physical Systems using Wireless Communication" (SafeCOP), which runs during the period 2016 -- 2019. SafeCOP targets safety-related Cooperating Cyber-Physical Systems (CO-CPS) characterised by use of wireless...... detection of abnormal behaviour, triggering if needed a safe degraded mode. SafeCOP will also develop methods and tools, which will be used to produce safety assurance evidence needed to certify cooperative functions. SafeCOP will extend current wireless technologies to ensure safe and secure cooperation...

  13. Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols

    NARCIS (Netherlands)

    Law, Y.W.; van Hoesel, L.F.W.; Doumen, J.M.; Hartel, Pieter H.; Havinga, Paul J.M.; Atluri, V.; Samarati, P.; Ning, P.; Du, W.

    2005-01-01

    A typical wireless sensor node has little protection against radio jamming. The situation becomes worse if energy efficient jamming can be achieved by exploiting knowledge of the data link layer. Encrypting the packets may help prevent the jammer from taking actions based on the content of the

  14. Cross-Layer QoS Control for Video Communications over Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Pei Yong

    2005-01-01

    Full Text Available Assuming a wireless ad hoc network consisting of homogeneous video users with each of them also serving as a possible relay node for other users, we propose a cross-layer rate-control scheme based on an analytical study of how the effective video transmission rate is affected by the prevailing operating parameters, such as the interference environment, the number of transmission hops to a destination, and the packet loss rate. Furthermore, in order to provide error-resilient video delivery over such wireless ad hoc networks, a cross-layer joint source-channel coding (JSCC approach, to be used in conjunction with rate-control, is proposed and investigated. This approach attempts to optimally apply the appropriate channel coding rate given the constraints imposed by the effective transmission rate obtained from the proposed rate-control scheme, the allowable real-time video play-out delay, and the prevailing channel conditions. Simulation results are provided which demonstrate the effectiveness of the proposed cross-layer combined rate-control and JSCC approach.

  15. Cross Layer PHY-MAC Protocol for Wireless Static and Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Chris Blondia

    2008-11-01

    Full Text Available Multihop mobile wireless networks have drawn a lot of attention in recent years thanks to their wide applicability in civil and military environments. Since the existing IEEE 802.11 distributed coordination function (DCF standard does not provide satisfactory access to the wireless medium in multihop mobile networks, we have designed a cross-layer protocol, (CroSs-layer noise aware power driven MAC (SNAPdMac, which consists of two parts. The protocol first concentrates on the flexible adjustment of the upper and lower bounds of the contention window (CW to lower the number of collisions. In addition, it uses a power control scheme, triggered by the medium access control (MAC layer, to limit the waste of energy and also to decrease the number of collisions. Thanks to a noticeable energy conservation and decrease of the number of collisions, it prolongs significantly the lifetime of the network and delays the death of the first node while increasing both the throughput performance and the sending bit rate/throughput fairness among contending flows.

  16. Performance and energy efficiency in wireless self-organized networks

    Energy Technology Data Exchange (ETDEWEB)

    Gao, C.

    2009-07-01

    Self-organized packet radio networks (ad-hoc networks) and wireless sensor networks have got massive attention recently. One of critical problems in such networks is the energy efficiency, because wireless nodes are usually powered by battery. Energy efficiency design can dramatically increase the survivability and stability of wireless ad-hoc/sensor networks. In this thesis the energy efficiency has been considered at different protocol layers for wireless ad-hoc/sensor networks. The energy consumption of wireless nodes is inspected at the physical layer and MAC layer. At the network layer, some current routing protocols are compared and special attention has been paid to reactive routing protocols. A minimum hop analysis is given and according to the analysis result, a modification of AODV routing is proposed. A variation of transmit power can be also applied to clustering algorithm, which is believed to be able to control the scalability of network. Clustering a network can also improve the energy efficiency. We offer a clustering scheme based on the link state measurement and variation of transmit power of intra-cluster and inter-cluster transmission. Simulation shows that it can achieve both targets. In association with the clustering algorithm, a global synchronization scheme is proposed to increase the efficiency of clustering algorithm. The research attention has been also paid to self-organization for multi-hop cellular networks. A 2-hop 2-slot uplink proposal to infrastructure-based cellular networks. The proposed solution can significantly increase the throughput of uplink communication and reduce the energy consumption of wireless terminals. (orig.)

  17. Optimised cross-layer synchronisation schemes for wireless sensor networks

    Science.gov (United States)

    Nasri, Nejah; Ben Fradj, Awatef; Kachouri, Abdennaceur

    2017-07-01

    This paper aims at synchronisation between the sensor nodes. Indeed, in the context of wireless sensor networks, it is necessary to take into consideration the energy cost induced by the synchronisation, which can represent the majority of the energy consumed. On communication, an already identified hard point consists in imagining a fine synchronisation protocol which must be sufficiently robust to the intermittent energy in the sensors. Hence, this paper worked on aspects of performance and energy saving, in particular on the optimisation of the synchronisation protocol using cross-layer design method such as synchronisation between layers. Our approach consists in balancing the energy consumption between the sensors and choosing the cluster head with the highest residual energy in order to guarantee the reliability, integrity and continuity of communication (i.e. maximising the network lifetime).

  18. Cross-layer optimized rate adaptation and scheduling for multiple-user wireless video streaming

    NARCIS (Netherlands)

    Ozcelebi, T.; Sunay, M.O.; Tekalp, A.M.; Civanlar, M.R.

    2007-01-01

    We present a cross-layer optimized video rate adaptation and user scheduling scheme for multi-user wireless video streaming aiming for maximum quality of service (QoS) for each user,, maximum system video throughput, and QoS fairness among users. These objectives are jointly optimized using a

  19. Optimization and Verification of the TR-MAC Protocol for Wireless Sensor Networks

    NARCIS (Netherlands)

    Morshed, S.; Heijenk, Geert

    2015-01-01

    Energy-efficiency is an important requirement in the design of communication protocols for wireless sensor networks (WSN). TR-MAC is an energy-efficient medium access control (MAC) layer protocol for low power WSN that exploits transmitted-reference (TR) modulation in the physical layer. The

  20. Layered ACO-OFDM for intensity-modulated direct-detection optical wireless transmission.

    Science.gov (United States)

    Wang, Qi; Qian, Chen; Guo, Xuhan; Wang, Zhaocheng; Cunningham, David G; White, Ian H

    2015-05-04

    Layered asymmetrically clipped optical orthogonal frequency division multiplexing (ACO-OFDM) with high spectral efficiency is proposed in this paper for optical wireless transmission employing intensity modulation with direct detection. In contrast to the conventional ACO-OFDM, which only utilizes odd subcarriers for modulation, leading to an obvious spectral efficiency loss, in layered ACO-OFDM, the subcarriers are divided into different layers and modulated by different kinds of ACO-OFDM, which are combined for simultaneous transmission. In this way, more subcarriers are used for data transmission and the spectral efficiency is improved. An iterative receiver is also proposed for layered ACO-OFDM, where the negative clipping distortion of each layer is subtracted once it is detected so that the signals from different layers can be recovered. Theoretical analysis shows that the proposed scheme can improve the spectral efficiency by up to 2 times compared with conventional ACO-OFDM approaches with the same modulation order. Meanwhile, simulation results confirm a considerable signal-to-noise ratio gain over ACO-OFDM at the same spectral efficiency.

  1. Cross Layer Interference Management in Wireless Biomedical Networks

    Directory of Open Access Journals (Sweden)

    Emmanouil G. Spanakis

    2014-04-01

    Full Text Available Interference, in wireless networks, is a central phenomenon when multiple uncoordinated links share a common communication medium. The study of the interference channel was initiated by Shannon in 1961 and since then this problem has been thoroughly elaborated at the Information theoretic level but its characterization still remains an open issue. When multiple uncoordinated links share a common medium the effect of interference is a crucial limiting factor for network performance. In this work, using cross layer cooperative communication techniques, we study how to compensate interference in the context of wireless biomedical networks, where many links transferring biomedical or other health related data may be formed and suffer from all other interfering transmissions, to allow successful receptions and improve the overall network performance. We define the interference limited communication range to be the critical communication region around a receiver, with a number of surrounding interfering nodes, within which a successful communication link can be formed. Our results indicate that we can achieve more successful transmissions by adapting the transmission rate and power, to the path loss exponent, and the selected mode of the underline communication technique allowing interference mitigation and when possible lower power consumption and increase achievable transmission rates.

  2. A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2010-01-01

    ZigBee is a wireless sensor network standard that defines network and application layers on top of IEEE 802.15.4's physical and medium access control layers. In the latest version of ZigBee, enhancements are prescribed for the security sublayer but we show in this paper that problems persist...

  3. Cross-layer based adaptive wireless traffic control for per-flow and per-station fairness

    Directory of Open Access Journals (Sweden)

    Siwamogsatham Siwaruk

    2011-01-01

    Full Text Available Abstract In the IEEE 802.11 wireless LANs, the bandwidth is not fairly shared among stations due to the distributed coordination function (DCF mechanism in the IEEE 802.11 MAC protocol. It introduces the per-flow and per-station unfairness problems between uplink and downlink flows, as the uplink flows usually dominate the downlink flows. In addition, some users may use greedy applications such as video streaming, which may prevent other applications from connecting to the Internet. In this article, we propose an adaptive cross-layer bandwidth allocation mechanism to provide per-station and per-flow fairness. To verify the effectiveness and scalability, our scheme is implemented on a wireless access router and numerous experiments in a typical wireless environment with both TCP and UDP traffic are conducted to evaluate performance of the proposed scheme.

  4. System analysis and energy model of 60GHz radio-triggered wireless sensor receiver

    NARCIS (Netherlands)

    Gao, H.; Wu, Y.; Matters - Kammerer, M.; Milosevic, D.; Linnartz, J.P.M.G.; Baltus, P.

    2013-01-01

    The optimization of a wireless system towards low power performance is not straightforward, it is the combination and trade-offs among different communication layers. In the physical layer, the frequency and the data rate are the fundamental parameters for optimizing power consumption in the

  5. [Exploration of the design of media access control layer of wireless body area network for medical healthcare].

    Science.gov (United States)

    Liu, Xuemei; Ge, Baofeng

    2012-04-01

    This paper proposes a media access control (MAC) layer design for wireless body area network (WBAN) systems. WBAN is a technology that targets for wireless networking of wearable and implantable body sensors which monitor vital body signs, such as heart-rate, body temperature, blood pressure, etc. It has been receiving attentions from international organizations, e. g. the Institute of Electrical and Electronics Engineers (IEEE), due to its capability of providing efficient healthcare services and clinical management. This paper reviews the standardization procedure of WBAN and summarizes the challenge of the MAC layer design. It also discusses the methods of improving power consumption performance, which is one of the major issues of WBAN systems.

  6. Cross-layer protocol design for QoS optimization in real-time wireless sensor networks

    Science.gov (United States)

    Hortos, William S.

    2010-04-01

    The metrics of quality of service (QoS) for each sensor type in a wireless sensor network can be associated with metrics for multimedia that describe the quality of fused information, e.g., throughput, delay, jitter, packet error rate, information correlation, etc. These QoS metrics are typically set at the highest, or application, layer of the protocol stack to ensure that performance requirements for each type of sensor data are satisfied. Application-layer metrics, in turn, depend on the support of the lower protocol layers: session, transport, network, data link (MAC), and physical. The dependencies of the QoS metrics on the performance of the higher layers of the Open System Interconnection (OSI) reference model of the WSN protocol, together with that of the lower three layers, are the basis for a comprehensive approach to QoS optimization for multiple sensor types in a general WSN model. The cross-layer design accounts for the distributed power consumption along energy-constrained routes and their constituent nodes. Following the author's previous work, the cross-layer interactions in the WSN protocol are represented by a set of concatenated protocol parameters and enabling resource levels. The "best" cross-layer designs to achieve optimal QoS are established by applying the general theory of martingale representations to the parameterized multivariate point processes (MVPPs) for discrete random events occurring in the WSN. Adaptive control of network behavior through the cross-layer design is realized through the parametric factorization of the stochastic conditional rates of the MVPPs. The cross-layer protocol parameters for optimal QoS are determined in terms of solutions to stochastic dynamic programming conditions derived from models of transient flows for heterogeneous sensor data and aggregate information over a finite time horizon. Markov state processes, embedded within the complex combinatorial history of WSN events, are more computationally

  7. CWAP Certified Wireless Analysis Professional Official Study Guide Exam PW0-270

    CERN Document Server

    Westcott, David A; Miller, Ben; Mackenzie, Peter

    2011-01-01

    The official study guide for the Certified Wireless Analysis Professional certification from CWNPFour leading wireless experts thoroughly prepare you for the vendor-neutral CWAP exam administered by CWNP, the industry leader for enterprise Wi-Fi training and certification.  This official study guide not only covers all exam objectives for the CWAP exam, it also prepares you to administer and troubleshoot complex enterprise WLAN environments.Covers all exam objectives for the Certified Wireless Analysis Professional (CWAP) examCovers 802.11 physical (PHY) and 802.11 MAC layer frame formats and

  8. Cooperative Communications for Wireless Information Assurance: Secure Cooperative Communications and Testbed Development

    National Research Council Canada - National Science Library

    Li, Xiaohua

    2007-01-01

    ..., and have invented a new cooperative OFDM transmission scheme to combat transmission asynchronism. They are helpful to the development of future physical-layer wireless information assurance techniques as well as the cooperative communication techniques...

  9. An Energy-Efficient Link Layer Protocol for Reliable Transmission over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Iqbal Adnan

    2009-01-01

    Full Text Available In multihop wireless networks, hop-by-hop reliability is generally achieved through positive acknowledgments at the MAC layer. However, positive acknowledgments introduce significant energy inefficiencies on battery-constrained devices. This inefficiency becomes particularly significant on high error rate channels. We propose to reduce the energy consumption during retransmissions using a novel protocol that localizes bit-errors at the MAC layer. The proposed protocol, referred to as Selective Retransmission using Virtual Fragmentation (SRVF, requires simple modifications to the positive-ACK-based reliability mechanism but provides substantial improvements in energy efficiency. The main premise of the protocol is to localize bit-errors by performing partial checksums on disjoint parts or virtual fragments of a packet. In case of error, only the corrupted virtual fragments are retransmitted. We develop stochastic models of the Simple Positive-ACK-based reliability, the previously-proposed Packet Length Optimization (PLO protocol, and the SRVF protocol operating over an arbitrary-order Markov wireless channel. Our analytical models show that SRVF provides significant theoretical improvements in energy efficiency over existing protocols. We then use bit-error traces collected over different real networks to empirically compare the proposed and existing protocols. These experimental results further substantiate that SRVF provides considerably better energy efficiency than Simple Positive-ACK and Packet Length Optimization protocols.

  10. Development of Wireless Techniques in Data and Power Transmission - Application for Particle Physics Detectors

    CERN Document Server

    Locci, E.; Dehos, C.; De Lurgio, P.; Djurcic, Z.; Drake, G.; Gimenez, J. L. Gonzalez; Gustafsson, L.; Kim, D.W.; Roehrich, D.; Schoening, A.; Siligaris, A.; Soltveit, H.K.; Ullaland, K.; Vincent, P.; Wiednert, D.; Yang, S.; Brenner, R.

    2015-01-01

    Wireless techniques have developed extremely fast over the last decade and using them for data and power transmission in particle physics detectors is not science- fiction any more. During the last years several research groups have independently thought of making it a reality. Wireless techniques became a mature field for research and new developments might have impact on future particle physics experiments. The Instrumentation Frontier was set up as a part of the SnowMass 2013 Community Summer Study [1] to examine the instrumentation R&D for the particle physics research over the coming decades: {\\guillemotleft} To succeed we need to make technical and scientific innovation a priority in the field {\\guillemotright}. Wireless data transmission was identified as one of the innovations that could revolutionize the transmission of data out of the detector. Power delivery was another challenge mentioned in the same report. We propose a collaboration to identify the specific needs of different projects that m...

  11. Worlds largest particle physics laboratory selects Proxim Wireless Mesh

    CERN Multimedia

    2007-01-01

    "Proxim Wireless has announced that the European Organization for Nuclear Research (CERN), the world's largest particle physics laboratory and the birthplace of the World Wide Web, is using it's ORiNOCO AP-4000 mesh access points to extend the range of the laboratory's Wi-Fi network and to provide continuous monitoring of the lab's calorimeters" (1/2 page)

  12. DEVELOPMENT OF WIRELESS TECHNIQUES IN DATA AND POWER TRANSMISSION APPLICATION FOR PARTICLE-PHYSICS DETECTORS

    CERN Document Server

    Brenner, R; Dehos, C; De Lurgio, P; Djurcic, Z; Drake, G; Gonzales Gimenez, JL; Gustafsson, L; Kim, DW; Locci, E; Pfeiffer, U; Röhrich, D; Rydberg, D; Schöning, A; Siligaris, A; Soltveit, HK; Ullaland, K; Vincent, P; Vasquez, PR; Wiedner, D; Yang, S

    2017-01-01

    In the WADAPT project described in this Letter of Intent, we propose to develop wireless techniques for data and power transmission in particle-physics detectors. Wireless techniques have developed extremely fast over the last decade and are now mature for being considered as a promising alternative to cables and optical links that would revolutionize the detector design. The WADAPT consortium has been formed to identify the specific needs of different projects that might benefit from wireless techniques with the objective of providing a common platform for research and development in order to optimize effectiveness and cost. The proposed R&D will aim at designing and testing wireless demonstrators for large instrumentation systems.

  13. Adaptive Multi-Layered Space-Time Block Coded Systems in Wireless Environments

    KAUST Repository

    Al-Ghadhban, Samir

    2014-12-23

    © 2014, Springer Science+Business Media New York. Multi-layered space-time block coded systems (MLSTBC) strike a balance between spatial multiplexing and transmit diversity. In this paper, we analyze the block error rate performance of MLSTBC. In addition, we propose an adaptive MLSTBC schemes that are capable of accommodating the channel signal-to-noise ratio variation of wireless systems by near instantaneously adapting the uplink transmission configuration. The main results demonstrate that significant effective throughput improvements can be achieved while maintaining a certain target bit error rate.

  14. A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2009-01-01

    ZigBee is a wireless sensor network standard that defines network and application layers on top of IEEE 802.15.4’s physical and medium access control layers. In the latest version of ZigBee, enhancements are prescribed for the security sublayer but we show in this paper that problems persist....... In particular we show that the End-to-End Application Key Establishment Protocol is flawed and we propose a secure protocol instead. We do so by using formal verification techniques based on static program analysis and process algebras. We present a way of using formal methods in wireless network security......, and propose a secure key establishment protocol for ZigBee networks....

  15. Cross-layer Energy Optimization Under Image Quality Constraints for Wireless Image Transmissions.

    Science.gov (United States)

    Yang, Na; Demirkol, Ilker; Heinzelman, Wendi

    2012-01-01

    Wireless image transmission is critical in many applications, such as surveillance and environment monitoring. In order to make the best use of the limited energy of the battery-operated cameras, while satisfying the application-level image quality constraints, cross-layer design is critical. In this paper, we develop an image transmission model that allows the application layer (e.g., the user) to specify an image quality constraint, and optimizes the lower layer parameters of transmit power and packet length, to minimize the energy dissipation in image transmission over a given distance. The effectiveness of this approach is evaluated by applying the proposed energy optimization to a reference ZigBee system and a WiFi system, and also by comparing to an energy optimization study that does not consider any image quality constraint. Evaluations show that our scheme outperforms the default settings of the investigated commercial devices and saves a significant amount of energy at middle-to-large transmission distances.

  16. ``Low Power Wireless Technologies: An Approach to Medical Applications''

    Science.gov (United States)

    Bellido O., Francisco J.; González R., Miguel; Moreno M., Antonio; de La Cruz F, José Luis

    Wireless communication supposed a great both -quantitative and qualitative, jump in the management of the information, allowing the access and interchange of it without the need of a physical cable connection. The wireless transmission of voice and information has remained in constant evolution, arising new standards like BluetoothTM, WibreeTM or ZigbeeTM developed under the IEEE 802.15 norm. These newest wireless technologies are oriented to systems of communication of short-medium distance and optimized for a low cost and minor consume, becoming recognized as a flexible and reliable medium for data communications across a broad range of applications due to the potential that the wireless networks presents to operate in demanding environments providing clear advantages in cost, size, power, flexibility, and distributed intelligence. About the medical applications, the remote health or telecare (also called eHealth) is getting a bigger place into the manufacturers and medical companies, in order to incorporate products for assisted living and remote monitoring of health parameteres. At this point, the IEEE 1073, Personal Health Devices Working Group, stablish the framework for these kind of applications. Particularly, the 1073.3.X describes the physical and transport layers, where the new ultra low power short range wireless technologies can play a big role, providing solutions that allow the design of products which are particularly appropriate for monitor people’s health with interoperability requirements.

  17. Analytical approach to cross-layer protocol optimization in wireless sensor networks

    Science.gov (United States)

    Hortos, William S.

    2008-04-01

    In the distributed operations of route discovery and maintenance, strong interaction occurs across mobile ad hoc network (MANET) protocol layers. Quality of service (QoS) requirements of multimedia service classes must be satisfied by the cross-layer protocol, along with minimization of the distributed power consumption at nodes and along routes to battery-limited energy constraints. In previous work by the author, cross-layer interactions in the MANET protocol are modeled in terms of a set of concatenated design parameters and associated resource levels by multivariate point processes (MVPPs). Determination of the "best" cross-layer design is carried out using the optimal control of martingale representations of the MVPPs. In contrast to the competitive interaction among nodes in a MANET for multimedia services using limited resources, the interaction among the nodes of a wireless sensor network (WSN) is distributed and collaborative, based on the processing of data from a variety of sensors at nodes to satisfy common mission objectives. Sensor data originates at the nodes at the periphery of the WSN, is successively transported to other nodes for aggregation based on information-theoretic measures of correlation and ultimately sent as information to one or more destination (decision) nodes. The "multimedia services" in the MANET model are replaced by multiple types of sensors, e.g., audio, seismic, imaging, thermal, etc., at the nodes; the QoS metrics associated with MANETs become those associated with the quality of fused information flow, i.e., throughput, delay, packet error rate, data correlation, etc. Significantly, the essential analytical approach to MANET cross-layer optimization, now based on the MVPPs for discrete random events occurring in the WSN, can be applied to develop the stochastic characteristics and optimality conditions for cross-layer designs of sensor network protocols. Functional dependencies of WSN performance metrics are described in

  18. H.264 Layered Coded Video over Wireless Networks: Channel Coding and Modulation Constraints

    Directory of Open Access Journals (Sweden)

    Ghandi MM

    2006-01-01

    Full Text Available This paper considers the prioritised transmission of H.264 layered coded video over wireless channels. For appropriate protection of video data, methods such as prioritised forward error correction coding (FEC or hierarchical quadrature amplitude modulation (HQAM can be employed, but each imposes system constraints. FEC provides good protection but at the price of a high overhead and complexity. HQAM is less complex and does not introduce any overhead, but permits only fixed data ratios between the priority layers. Such constraints are analysed and practical solutions are proposed for layered transmission of data-partitioned and SNR-scalable coded video where combinations of HQAM and FEC are used to exploit the advantages of both coding methods. Simulation results show that the flexibility of SNR scalability and absence of picture drift imply that SNR scalability as modelled is superior to data partitioning in such applications.

  19. A polygonal double-layer coil design for high-efficiency wireless power transfer

    Science.gov (United States)

    Mao, Shitong; Wang, Hao; Mao, Zhi-Hong; Sun, Mingui

    2018-05-01

    In this work, we present a novel coil structure for the design of Wireless Power Transfer (WPT) systems via magnetic resonant coupling. The new coil consists of two layers of flat polygonal windings in square, pentagonal and hexagonal shapes. The double-layer coil can be conveniently fabricated using the print circuit broad (PCB) technology. In our design, we include an angle between the two layers which can be adjusted to change the area of inter-layer overlap. This unique structure is thoroughly investigated with respect to the quality factor Q and the power transfer efficiency (PTE) using the finite element method (FEM). An equivalent circuit is derived and used to explain the properties of the angularly shifted double-layer coil theoretically. Comparative experiments are conducted from which the performance of the new coil is evaluated quantitatively. Our results have shown that an increased shift angle improves the Q-factor, and the optimal PTE is achieved when the angle reaches the maximum. When compared to the pentagonal and hexagonal coils, the square coil achieves the highest PTE due to its lowest parasitic capacitive effects. In summary, our new coil design improves the performance of WPT systems and allows a formal design procedure for optimization in a given application.

  20. A Survey on Cross-Layer Intrusion Detection System for Wireless ...

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... forwarding, and open wireless medium are the factors that make ... Wireless Sensor Network (WSN) is a kind of network that ... These tiny sensors are mainly small sized and have low ..... they were integrated to WSN for intrusion detection in ..... Anomaly Detection Techniques for Smart City Wireless Sensor.

  1. MOS-Based Multiuser Multiapplication Cross-Layer Optimization for Mobile Multimedia Communication

    Directory of Open Access Journals (Sweden)

    Shoaib Khan

    2007-01-01

    Full Text Available We propose a cross-layer optimization strategy that jointly optimizes the application layer, the data-link layer, and the physical layer of a wireless protocol stack using an application-oriented objective function. The cross-layer optimization framework provides efficient allocation of wireless network resources across multiple types of applications run by different users to maximize network resource usage and user perceived quality of service. We define a novel optimization scheme based on the mean opinion score (MOS as the unifying metric over different application classes. Our experiments, applied to scenarios where users simultaneously run three types of applications, namely voice communication, streaming video and file download, confirm that MOS-based optimization leads to significant improvement in terms of user perceived quality when compared to conventional throughput-based optimization.

  2. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  3. Radio frequency identification enabled wireless sensing for intelligent food logistics.

    Science.gov (United States)

    Zou, Zhuo; Chen, Qiang; Chen, Qing; Uysal, Ismail; Zheng, Lirong

    2014-06-13

    Future technologies and applications for the Internet of Things (IoT) will evolve the process of the food supply chain and create added value of business. Radio frequency identifications (RFIDs) and wireless sensor networks (WSNs) have been considered as the key technological enablers. Intelligent tags, powered by autonomous energy, are attached on objects, networked by short-range wireless links, allowing the physical parameters such as temperatures and humidities as well as the location information to seamlessly integrate with the enterprise information system over the Internet. In this paper, challenges, considerations and design examples are reviewed from system, implementation and application perspectives, particularly with focus on intelligent packaging and logistics for the fresh food tracking and monitoring service. An IoT platform with a two-layer network architecture is introduced consisting of an asymmetric tag-reader link (RFID layer) and an ad-hoc link between readers (WSN layer), which are further connected to the Internet via cellular or Wi-Fi. Then, we provide insights into the enabling technology of RFID with sensing capabilities. Passive, semi-passive and active RFID solutions are discussed. In particular, we describe ultra-wideband radio RFID which has been considered as one of the most promising techniques for ultra-low-power and low-cost wireless sensing. Finally, an example is provided in the form of an application in fresh food tracking services and corresponding field testing results.

  4. Optimization of high-definition video coding and hybrid fiber-wireless transmission in the 60 GHz band

    DEFF Research Database (Denmark)

    Lebedev, Alexander; Pham, Tien Thang; Beltrán, Marta

    2011-01-01

    The paper addresses the problem of distribution of highdefinition video over fiber-wireless networks. The physical layer architecture with the low complexity envelope detection solution is investigated. We present both experimental studies and simulation of high quality high-definition compressed...... video transmission over 60 GHz fiberwireless link. Using advanced video coding we satisfy low complexity and low delay constraints, meanwhile preserving the superb video quality after significantly extended wireless distance. © 2011 Optical Society of America....

  5. Analysis Of Packets Delay In Wireless Data Networks

    Directory of Open Access Journals (Sweden)

    Krivchenkov Aleksandr

    2015-12-01

    Full Text Available The networks with wireless links for automation control applications traffic transmission when packets have small size and application payload is predictable are under consideration. Analytical model for packets delay on their propagation path through the network is proposed. Estimations for network architectures based on WiFi and Bluetooth wireless technologies are made. The specifications for physical layer 802.11 a/b/g/n and 802.15.1 are under consideration. Analytical and experimental results for delivered network bandwidth for different network architecture, traffic structure and wireless technologies were compared to validate that basic mechanisms are correctly taken into account in the model. It is shown that basic effects are taken into account and further accuracy “improvement” of the model will give not more than 5%. As a result that is important for automation control applications we have reliably received the lowest possible level for packets delay in one wireless link. For 802.11 it is of order of 0.2 ms, for 802.15.1 it is 1.25 ms and is true when application packet can be transferred by one data frame.

  6. Evaluation of 90nm 6T-SRAM as physical unclonable function for secure key generation in wireless sensor nodes

    NARCIS (Netherlands)

    Selimis, G.; Konijnenburg, M.; Ashouei, M.; Huisken, J.; de Groot, H.; van der Leest, V.; Schrijen, G.-J.; van Hulst, M.; Tuyls, P.

    2011-01-01

    Due to the unattended nature of WSN (Wireless Sensor Network) deployment, each sensor can be subject to physical capture, cloning and unauthorized device alteration. In this paper, we use the embedded SRAM, often available on a wireless sensor node, for secure data (cryptographic keys, IDs)

  7. Cross-Layer Active Predictive Congestion Control Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yinfeng Wu

    2009-10-01

    Full Text Available In wireless sensor networks (WSNs, there are numerous factors that may cause network congestion problems, such as the many-to-one communication modes, mutual interference of wireless links, dynamic changes of network topology and the memory-restrained characteristics of nodes. All these factors result in a network being more vulnerable to congestion. In this paper, a cross-layer active predictive congestion control scheme (CL-APCC for improving the performance of networks is proposed. Queuing theory is applied in the CL-APCC to analyze data flows of a single-node according to its memory status, combined with the analysis of the average occupied memory size of local networks. It also analyzes the current data change trends of local networks to forecast and actively adjust the sending rate of the node in the next period. In order to ensure the fairness and timeliness of the network, the IEEE 802.11 protocol is revised based on waiting time, the number of the node‟s neighbors and the original priority of data packets, which dynamically adjusts the sending priority of the node. The performance of CL-APCC, which is evaluated by extensive simulation experiments. is more efficient in solving the congestion in WSNs. Furthermore, it is clear that the proposed scheme has an outstanding advantage in terms of improving the fairness and lifetime of networks.

  8. Cross-layer active predictive congestion control protocol for wireless sensor networks.

    Science.gov (United States)

    Wan, Jiangwen; Xu, Xiaofeng; Feng, Renjian; Wu, Yinfeng

    2009-01-01

    In wireless sensor networks (WSNs), there are numerous factors that may cause network congestion problems, such as the many-to-one communication modes, mutual interference of wireless links, dynamic changes of network topology and the memory-restrained characteristics of nodes. All these factors result in a network being more vulnerable to congestion. In this paper, a cross-layer active predictive congestion control scheme (CL-APCC) for improving the performance of networks is proposed. Queuing theory is applied in the CL-APCC to analyze data flows of a single-node according to its memory status, combined with the analysis of the average occupied memory size of local networks. It also analyzes the current data change trends of local networks to forecast and actively adjust the sending rate of the node in the next period. In order to ensure the fairness and timeliness of the network, the IEEE 802.11 protocol is revised based on waiting time, the number of the node's neighbors and the original priority of data packets, which dynamically adjusts the sending priority of the node. The performance of CL-APCC, which is evaluated by extensive simulation experiments. is more efficient in solving the congestion in WSNs. Furthermore, it is clear that the proposed scheme has an outstanding advantage in terms of improving the fairness and lifetime of networks.

  9. QoS Modeling for End-to-End Performance Evaluation over Networks with Wireless Access

    Directory of Open Access Journals (Sweden)

    Gómez Gerardo

    2010-01-01

    Full Text Available This paper presents an end-to-end Quality of Service (QoS model for assessing the performance of data services over networks with wireless access. The proposed model deals with performance degradation across protocol layers using a bottom-up strategy, starting with the physical layer and moving on up to the application layer. This approach makes it possible to analytically assess performance at different layers, thereby facilitating a possible end-to-end optimization process. As a representative case, a scenario where a set of mobile terminals connected to a streaming server through an IP access node has been studied. UDP, TCP, and the new TCP-Friendly Rate Control (TFRC protocols were analyzed at the transport layer. The radio interface consisted of a variable-rate multiuser and multichannel subsystem, including retransmissions and adaptive modulation and coding. The proposed analytical QoS model was validated on a real-time emulator of an end-to-end network with wireless access and proved to be very useful for the purposes of service performance estimation and optimization.

  10. Using Wireless Pedometers to Measure Children’s Physical Activity: How Reliable is the Fitbit Zip?

    Directory of Open Access Journals (Sweden)

    Tingting Xu

    2017-07-01

    Full Text Available The purpose of this study is to examine the reliability of wireless pedometers in measuring elementary school children’s physical activity. Activity measurement using a wireless pedometer Fitbit ZipTM was compared to activity measurement using Yamax Digi-WalkerTM SW701 for a group of randomly selected 25 children in Grades 3, 4, and 5. Fitbit ZipTM wireless pedometers were found to have an appropriate degree (Nunnally & Bernstein, 1994 of accuracy and reliability compared to the Yamax Digi-WalkerTM SW701 pedometer. The Fitbit ZipTM wireless pedometer collected more step counts than the Yamax Digi-WalkerTM SW701 pedometer; however, the difference was not statistically significant. Participants reported that they preferred wearing the Fitbit ZipTM to the Yamax Digi-WalkerTM SW701 because the Fitbit ZipTM was more comfortable to wear and less likely to fall off. Participants also reported being more motivated to move while wearing the Fitbit ZipTM.

  11. Physical parameters collection based on wireless senor network

    Science.gov (United States)

    Chen, Xin; Wu, Hong; Ji, Lei

    2013-12-01

    With the development of sensor technology, wireless senor network has been applied in the medical, military, entertainment field and our daily life. But the existing available wireless senor networks applied in human monitoring system still have some problems, such as big power consumption, low security and so on. To improve senor network applied in health monitoring system, the paper introduces a star wireless senor networks based on msp430 and DSP. We design a low-cost heart-rate monitor senor node. The communication between senor node and sink node is realized according to the newest protocol proposed by the IEEE 802.15.6 Task Group. This wireless senor network will be more energy-efficient and faster compared to traditional senor networks.

  12. Coordinated Transmissions to Direct and Relayed Users in Wireless Cellular Systems

    DEFF Research Database (Denmark)

    Thai, Chan; Popovski, Petar; Kaneko, Megumi

    2011-01-01

    The ideas of wireless network coding at the physical layer promise high throughput gains in wireless systems with relays and multi–way traffic flows. This gain can be ascribed to two principles: (1) joint transmission of multiple communication flows and (2) usage of a priori information to cancel...... the interference. In this paper we use these principles to devise new transmission schemes in wireless cellular systems that feature both users served directly by the base stations (direct users) and users served through relays (relayed users). We present four different schemes for coordinated transmission...... of uplink and downlink traffic in which one direct and one relayed user are served. These schemes are then used as building blocks in multi–user scenarios, where we present several schemes for scheduling pairs of users for coordinated transmissions. The optimal scheme involves exhaustive search of the best...

  13. SystemC modelling of wireless communication channel

    Science.gov (United States)

    Conti, Massimo; Orcioni, Simone

    2011-05-01

    This paper presents the definition in SystemC of wireless channels at different levels of abstraction. The different levels of description of the wireless channel can be easily interchanged allowing the reuse of the application and baseband layers in a high level analysis of the network or in a deep analysis of the communication between the wireless devices.

  14. A Review of Protocol Implementations and Energy Efficient Cross-Layer Design for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Tao Chen

    2012-11-01

    Full Text Available The issues inherent in caring for an ever-increasing aged population has been the subject of endless debate and continues to be a hot topic for political discussion. The use of hospital-based facilities for the monitoring of chronic physiological conditions is expensive and ties up key healthcare professionals. The introduction of wireless sensor devices as part of a Wireless Body Area Network (WBAN integrated within an overall eHealth solution could bring a step change in the remote management of patient healthcare. Sensor devices small enough to be placed either inside or on the human body can form a vital part of an overall health monitoring network. An effectively designed energy efficient WBAN should have a minimal impact on the mobility and lifestyle of the patient. WBAN technology can be deployed within a hospital, care home environment or in the patient’s own home. This study is a review of the existing research in the area of WBAN technology and in particular protocol adaptation and energy efficient cross-layer design. The research reviews the work carried out across various layers of the protocol stack and highlights how the latest research proposes to resolve the various challenges inherent in remote continual healthcare monitoring.

  15. Proposal of Wireless Traffic Control Schemes for Wireless LANs

    Science.gov (United States)

    Hiraguri, Takefumi; Ichikawa, Takeo; Iizuka, Masataka; Kubota, Shuji

    This paper proposes two traffic control schemes to support the communication quality of multimedia streaming services such as VoIP and audio/video over IEEE 802.11 wireless LAN systems. The main features of the proposed scheme are bandwidth control for each flow of the multimedia streaming service and load balancing between access points (APs) of the wireless LAN by using information of data link, network and transport layers. The proposed schemes are implemented on a Linux machine which is called the wireless traffic controller (WTC). The WTC connects a high capacity backbone network and an access network to which the APs are attached. We evaluated the performance of the proposed WTC and confirmed that the communication quality of the multimedia streaming would be greatly improved by using this technique.

  16. An ad hoc wireless sensor network for tele medicine applications

    International Nuclear Information System (INIS)

    Sheltami, Tarek R.; Mahmoud, Ashraf S.; Abu-Amara, Marwan H.

    2007-01-01

    Recent advances in embedded computing systems have led to the emergence of wireless sensor networks (SNETs), consisting of small, battery-powered motes with limited computation and radio communication capabilities. SNETs permit data gathering and computation to be deeply embedded in the physical environment. Large scale ad hoc sensor networks (ASNET), when deployed among mobile patients, can provide dynamic data query architecture to allow medical specialists to monitor patients at any place via the web or cellular network. In case of an emergency, doctors and/or nurses will be contacted automatically through their handheld personal digital assistants (PDAs) or cellular phones. In specific, the proposed network consists of sensor nodes at the first layer whose responsibility is to measure, collect and communicate, via wired or wireless interface, readings to a microcontroller presenting the second layer of architecture. Deployed microcontrollers process incoming readings and report to a central system via a wireless interface. The implemented network distinguishes between periodic sensor readings and critical or event driven readings where higher priorities is given for the latter. In this paper we implement 3 special cases for tracking and monitoring patients and doctors using SNETs. In addition, the performance of a large scale of our implementation has been tested by means of mathematical analysis. (author)

  17. Acemind new indoor full duplex optical wireless communication prototype

    Science.gov (United States)

    Bouchet, Olivier; Perrufel, Micheline; Topsu, Suat; Guan, Hongyu

    2016-09-01

    For over a century and Mr. Guglielmo Marconi invention, systems using radio waves have controlled over wireless telecommunication solutions; from Amplitude Modulation (AM) radio products to satellite communications for instance. But beyond an increasingly negative opinion face to radio waves and radio spectrum availability more and more reduced; there is an unprecedented opportunity with LED installation in displays and lighting to provide optical wireless communication solutions. As a result, technologically mature solutions are already commercially available for services such as Location Based Services (LBS), broadcast diffusion or Intelligent Transport Services (ITS). Pending finalization of the standard review process IEEE 802.15.7 r1, our paper presents the results of the European collaborative project named "ACEMIND". It offers an indoor bilateral optical wireless communication prototype having the following characteristics: use of the existing electrical infrastructure, through judicious combination with Light Fidelity (LiFi), Power Line Communication (PLC) and Ethernet to reduce the implementation cost. We propose a bilateral optical wireless communication even when the light is switched off by using Visible Light Communication (VLC) and Infra-Red Communication (IRC) combined to a remote optical switch. Dimensionally optimized LiFi module is presented in order to offer the possibility for integration inside a laptop. Finally, there is operational mechanism implementation such as OFDM/DMT to increase throughput. After the introduction, we will present the results of a market study from Orange Labs customers about their opinion on LiFi components. Then we will detail the LiFi prototype, from the physical layer aspect to MAC layer before concluding on commercial development prospects.

  18. The PASCO Wireless Smart Cart: A Game Changer in the Undergraduate Physics Laboratory

    Science.gov (United States)

    Shakur, Asif; Connor, Rainor

    2018-01-01

    With the introduction of the Wireless Smart Cart by PASCO scientific in April 2016, we expect a paradigm shift in undergraduate physics laboratory instruction. We have evaluated the feasibility of using the smart cart by carrying out experiments that are usually performed using traditional PASCO equipment. The simplicity, convenience, and…

  19. Location-Aware Cross-Layer Design Using Overlay Watermarks

    Directory of Open Access Journals (Sweden)

    Paul Ho

    2007-04-01

    Full Text Available A new orthogonal frequency division multiplexing (OFDM system embedded with overlay watermarks for location-aware cross-layer design is proposed in this paper. One major advantage of the proposed system is the multiple functionalities the overlay watermark provides, which includes a cross-layer signaling interface, a transceiver identification for position-aware routing, as well as its basic role as a training sequence for channel estimation. Wireless terminals are typically battery powered and have limited wireless communication bandwidth. Therefore, efficient collaborative signal processing algorithms that consume less energy for computation and less bandwidth for communication are needed. Transceiver aware of its location can also improve the routing efficiency by selective flooding or selective forwarding data only in the desired direction, since in most cases the location of a wireless host is unknown. In the proposed OFDM system, location information of a mobile for efficient routing can be easily derived when a unique watermark is associated with each individual transceiver. In addition, cross-layer signaling and other interlayer interactive information can be exchanged with a new data pipe created by modulating the overlay watermarks. We also study the channel estimation and watermark removal techniques at the physical layer for the proposed overlay OFDM. Our channel estimator iteratively estimates the channel impulse response and the combined signal vector from the overlay OFDM signal. Cross-layer design that leads to low-power consumption and more efficient routing is investigated.

  20. Physical Layer Security Using Two-Path Successive Relaying

    Directory of Open Access Journals (Sweden)

    Qian Yu Liau

    2016-06-01

    Full Text Available Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes.

  1. Wireless motion sensor network for monitoring motion in a process, wireless sensor node, reasoning node, and feedback and/or actuation node for such wireless motion sensor network

    NARCIS (Netherlands)

    Havinga, Paul J.M.; Marin Perianu, Raluca; Marin Perianu, Mihai

    2010-01-01

    Wireless motion sensor network for monitoring motion in a process comprising at least one wireless sensor node for measuring at least one physical quantity related to motion or orientation, feature extraction means for deriving a feature for the measured quantities, a wireless transmitter connected

  2. Two-Layer Hierarchy Optimization Model for Communication Protocol in Railway Wireless Monitoring Networks

    Directory of Open Access Journals (Sweden)

    Xiaoping Ma

    2018-01-01

    Full Text Available The wireless monitoring system is always destroyed by the insufficient energy of the sensors in railway. Hence, how to optimize the communication protocol and extend the system lifetime is crucial to ensure the stability of system. However, the existing studies focused primarily on cluster-based or multihop protocols individually, which are ineffective in coping with the complex communication scenarios in the railway wireless monitoring system (RWMS. This study proposes a hybrid protocol which combines the cluster-based and multihop protocols (CMCP to minimize and balance the energy consumption in different sections of the RWMS. In the first hierarchy, the total energy consumption is minimized by optimizing the cluster quantities in the cluster-based protocol and the number of hops and the corresponding hop distances in the multihop protocol. In the second hierarchy, the energy consumption is balanced through rotating the cluster head (CH in the subnetworks and further optimizing the hops and the corresponding hop distances in the backbone network. On this basis, the system lifetime is maximized with the minimum and balance energy consumption among the sensors. Furthermore, the hybrid particle swarm optimization and genetic algorithm (PSO-GA are adopted to optimize the energy consumption from the two-layer hierarchy. Finally, the effectiveness of the proposed CMCP is verified in the simulation. The performances of the proposed CMCP in system lifetime, residual energy, and the corresponding variance are all superior to the LEACH protocol widely applied in the previous research. The effective protocol proposed in this study can facilitate the application of the wireless monitoring network in the railway system and enhance safety operation of the railway.

  3. High-rate wireless data communications: An underwater acoustic communications framework at the physical layer

    Directory of Open Access Journals (Sweden)

    Bessios Anthony G.

    1996-01-01

    Full Text Available A variety of signal processing functions are performed by Underwater Acoustic Systems. These include: 1 detection to determine presence or absence of information signals in the presence of noise, or an attempt to describe which of a predetermined finite set of possible messages { m i , i , ... , M } the signal represents; 2 estimation of some parameter θ ˆ associated with the received signal (i.e. range, depth, bearing angle, etc.; 3 classification and source identification; 4 dynamics tracking; 5 navigation (collision avoidance and terminal guidance; 6 countermeasures; and 7 communications. The focus of this paper is acoustic communications. There is a global current need to develop reliable wireless digital communications for the underwater environment, with sufficient performance and efficiency to substitute for costly wired systems. One possible goal is a wireless system implementation that insures underwater terminal mobility. There is also a vital need to improve the performance of the existing systems in terms of data-rate, noise immunity, operational range, and power consumption, since, in practice, portable high-speed, long range, compact, low-power systems are desired. We concede the difficulties associated with acoustic systems and concentrate on the development of robust data transmission methods anticipating the eventual need for real time or near real time video transmission. An overview of the various detection techniques and the general statistical digital communication problem is given based on a statistical decision theory framework. The theoretical formulation of the underwater acoustic data communications problem includes modeling of the stochastic channel to incorporate a variety of impairments and environmental uncertainties, and proposal of new compensation strategies for an efficient and robust receiver design.

  4. Cross-Layer Design Approach for Power Control in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    A. Sarfaraz Ahmed

    2015-03-01

    Full Text Available In mobile ad hoc networks, communication among mobile nodes occurs through wireless medium The design of ad hoc network protocol, generally based on a traditional “layered approach”, has been found ineffective to deal with receiving signal strength (RSS-related problems, affecting the physical layer, the network layer and transport layer. This paper proposes a design approach, deviating from the traditional network design, toward enhancing the cross-layer interaction among different layers, namely physical, MAC and network. The Cross-Layer design approach for Power control (CLPC would help to enhance the transmission power by averaging the RSS values and to find an effective route between the source and the destination. This cross-layer design approach was tested by simulation (NS2 simulator and its performance over AODV was found to be better.

  5. Analysis and Testing of Mobile Wireless Networks

    Science.gov (United States)

    Alena, Richard; Evenson, Darin; Rundquist, Victor; Clancy, Daniel (Technical Monitor)

    2002-01-01

    Wireless networks are being used to connect mobile computing elements in more applications as the technology matures. There are now many products (such as 802.11 and 802.11b) which ran in the ISM frequency band and comply with wireless network standards. They are being used increasingly to link mobile Intranet into Wired networks. Standard methods of analyzing and testing their performance and compatibility are needed to determine the limits of the technology. This paper presents analytical and experimental methods of determining network throughput, range and coverage, and interference sources. Both radio frequency (BE) domain and network domain analysis have been applied to determine wireless network throughput and range in the outdoor environment- Comparison of field test data taken under optimal conditions, with performance predicted from RF analysis, yielded quantitative results applicable to future designs. Layering multiple wireless network- sooners can increase performance. Wireless network components can be set to different radio frequency-hopping sequences or spreading functions, allowing more than one sooner to coexist. Therefore, we ran multiple 802.11-compliant systems concurrently in the same geographical area to determine interference effects and scalability, The results can be used to design of more robust networks which have multiple layers of wireless data communication paths and provide increased throughput overall.

  6. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  7. Wireless optical network for a home network

    Science.gov (United States)

    Bouchet, Olivier; Porcon, Pascal; Walewski, Joachim W.; Nerreter, Stefan; Langer, Klaus-Dieter; Fernández, Luz; Vucic, Jelena; Kamalakis, Thomas; Ntogari, Georgia; Neokosmidis, Ioannis; Gueutier, Eric

    2010-08-01

    During the European collaborative project OMEGA, two optical-wireless prototypes have been developed. The first prototype operates in the near-infrared spectral region and features Giga Ethernet connectivity, a simple transceiver architecture due to the use of on-off keying, a multi-sector transceiver, and an ultra-fast switch for sector-to-sector hand over. This full-duplex system, composed by one base station and one module, transmits data on three meters. The second prototype is a visible-light-communications system based on DMT signal processing and an adapted MAC sublayer. Data rates around to 100 Mb/s at the physical layer are achieved. This broadcast system, composed also by one base station and one module, transmits data up to two meters. In this paper we present the adapted optical wireless media-access-control sublayer protocol for visible-light communications. This protocol accommodates link adaptation from 128 Mb/s to 1024 Mb/s with multi-sector coverage, and half-duplex or full-duplex transmission.

  8. Capacity Analysis of Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    M. I. Gumel

    2012-06-01

    Full Text Available The next generation wireless networks experienced a great development with emergence of wireless mesh networks (WMNs, which can be regarded as a realistic solution that provides wireless broadband access. The limited available bandwidth makes capacity analysis of the network very essential. While the network offers broadband wireless access to community and enterprise users, the problems that limit the network capacity must be addressed to exploit the optimum network performance. The wireless mesh network capacity analysis shows that the throughput of each mesh node degrades in order of l/n with increasing number of nodes (n in a linear topology. The degradation is found to be higher in a fully mesh network as a result of increase in interference and MAC layer contention in the network.

  9. Networking wireless sensors

    National Research Council Canada - National Science Library

    Krishnamachari, Bhaskar

    2005-01-01

    ... by networking techniques across multiple layers. The topics covered include network deployment, localization, time synchronization, wireless radio characteristics, medium-access, topology control, routing, data-centric techniques, and transport protocols. Ideal for researchers and designers seeking to create new algorithms and protocols and enginee...

  10. PERFORMANCE STUDY OF DISTRIBUTED COORDINATION FUNCTION OVER IEEE 802.11A PHYSICAL LAYER

    Directory of Open Access Journals (Sweden)

    S. SELVAKENEDDY

    2006-06-01

    Full Text Available IEEE 802.11a is one of the latest standards to be released by the IEEE Project 802 for wireless LANs. It has specified an additional physical layer (PHY to support higher data rates, and is termed as the orthogonal frequency division multiplexing (OFDM. In order to exploit its benefits, one of the medium access control (MAC protocols specified in the IEEE 802.11 specification is called distributed coordination function (DCF. DCF is a carrier sense multiple access with collision avoidance (CSMA/CA scheme with slotted binary exponential backoff. The frames can be transmitted using the basic access scheme or the RTS/CTS scheme in DCF. It was demonstrated previously that the RTS/CTS mechanism works well in most scenarios for the previously specified PHYs. In this work, a simple simulator is developed to verify the scalability of the RTS/CTS mechanism over OFDM PHY, which supports much higher data rates.

  11. Collaborative Algortihms for Communication in Wireless Sensor Networks

    NARCIS (Netherlands)

    Nieberg, T.; Dulman, S.O.; Havinga, Paul J.M.; van Hoesel, L.F.W.; Wu Jian, W.J.

    In this paper, we present the design of the communication in a wireless sensor network. The resource limitations of a wireless sensor network, especially in terms of energy, require an integrated, and collaborative approach for the different layers of communication. In particular, energy-efficient

  12. Collaborative Algorithms for Communication in Wireless Sensor Networks

    NARCIS (Netherlands)

    Nieberg, T.; Dulman, S.O.; Havinga, Paul J.M.; van Hoesel, L.F.W.; Wu Jian, W.J.; Basten, Twan; Geilen, Marc; de Groot, Harmke

    2003-01-01

    In this paper, we present the design of the communication in a wireless sensor network. The resource limitations of a wireless sensor network, especially in terms of energy, require an integrated, and collaborative approach for the different layers of communication. In particular, energy-efficient

  13. Physical activity discrimination improvement using accelerometers and wireless sensor network localization - biomed 2013.

    Science.gov (United States)

    Bashford, Gregory R; Burnfield, Judith M; Perez, Lance C

    2013-01-01

    Automating documentation of physical activity data (e.g., duration and speed of walking or propelling a wheelchair) into the electronic medical record (EMR) offers promise for improving efficiency of documentation and understanding of best practices in the rehabilitation and home health settings. Commercially available devices which could be used to automate documentation of physical activities are either cumbersome to wear or lack the specificity required to differentiate activities. We have designed a novel system to differentiate and quantify physical activities, using inexpensive accelerometer-based biomechanical data technology and wireless sensor networks, a technology combination that has not been used in a rehabilitation setting to date. As a first step, a feasibility study was performed where 14 healthy young adults (mean age = 22.6 ± 2.5 years, mean height = 173 ± 10.0 cm, mean mass = 70.7 ± 11.3 kg) carried out eight different activities while wearing a biaxial accelerometer sensor. Activities were performed at each participant’s self-selected pace during a single testing session in a controlled environment. Linear discriminant analysis was performed by extracting spectral parameters from the subjects’ accelerometer patterns. It is shown that physical activity classification alone results in an average accuracy of 49.5%, but when combined with rule-based constraints using a wireless sensor network with localization capabilities in an in silico simulated room, accuracy improves to 99.3%. When fully implemented, our technology package is expected to improve goal setting, treatment interventions and patient outcomes by enhancing clinicians’ understanding of patients’ physical performance within a day and across the rehabilitation program.

  14. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  15. Frame Transmission Efficiency-Based Cross-Layer Congestion Notification Scheme in Wireless Ad Hoc Networks.

    Science.gov (United States)

    He, Huaguang; Li, Taoshen; Feng, Luting; Ye, Jin

    2017-07-15

    Different from the traditional wired network, the fundamental cause of transmission congestion in wireless ad hoc networks is medium contention. How to utilize the congestion state from the MAC (Media Access Control) layer to adjust the transmission rate is core work for transport protocol design. However, recent works have shown that the existing cross-layer congestion detection solutions are too complex to be deployed or not able to characterize the congestion accurately. We first propose a new congestion metric called frame transmission efficiency (i.e., the ratio of successful transmission delay to the frame service delay), which describes the medium contention in a fast and accurate manner. We further present the design and implementation of RECN (ECN and the ratio of successful transmission delay to the frame service delay in the MAC layer, namely, the frame transmission efficiency), a general supporting scheme that adjusts the transport sending rate through a standard ECN (Explicit Congestion Notification) signaling method. Our method can be deployed on commodity switches with small firmware updates, while making no modification on end hosts. We integrate RECN transparently (i.e., without modification) with TCP on NS2 simulation. The experimental results show that RECN remarkably improves network goodput across multiple concurrent TCP flows.

  16. Cross-Layer Optimal Rate Allocation for Heterogeneous Wireless Multicast

    Directory of Open Access Journals (Sweden)

    Amr Mohamed

    2009-01-01

    Full Text Available Heterogeneous multicast is an efficient communication scheme especially for multimedia applications running over multihop networks. The term heterogeneous refers to the phenomenon when multicast receivers in the same session require service at different rates commensurate with their capabilities. In this paper, we address the problem of resource allocation for a set of heterogeneous multicast sessions over multihop wireless networks. We propose an iterative algorithm that achieves the optimal rates for a set of heterogeneous multicast sessions such that the aggregate utility for all sessions is maximized. We present the formulation of the multicast resource allocation problem as a nonlinear optimization model and highlight the cross-layer framework that can solve this problem in a distributed ad hoc network environment with asynchronous computations. Our simulations show that the algorithm achieves optimal resource utilization, guarantees fairness among multicast sessions, provides flexibility in allocating rates over different parts of the multicast sessions, and adapts to changing conditions such as dynamic channel capacity and node mobility. Our results show that the proposed algorithm not only provides flexibility in allocating resources across multicast sessions, but also increases the aggregate system utility and improves the overall system throughput by almost 30% compared to homogeneous multicast.

  17. Microwave energy harvesting based on metamaterial absorbers with multi-layered square split rings for wireless communications

    Science.gov (United States)

    Karaaslan, Muharrem; Bağmancı, Mehmet; Ünal, Emin; Akgol, Oguzhan; Sabah, Cumali

    2017-06-01

    We propose the design of a multiband absorber based on multi-layered square split ring (MSSR) structure. The multi-layered metamaterial structure is designed to be used in the frequency bands such as WIMAX, WLAN and satellite communication region. The absorption levels of the proposed structure are higher than 90% for all resonance frequencies. In addition, the incident angle and polarization dependence of the multi-layered metamaterial absorber and harvester is also investigated and it is observed that the structure has polarization angle independent frequency response with good absorption characteristics in the entire working frequency band. The energy harvesting ratios of the structure is investigated especially for the resonance frequencies at which the maximum absorption occurs. The energy harvesting potential of the proposed MSSRs is as good as those of the structures given in the literature. Therefore, the suggested design having good absorption, polarization and angle independent characteristics with a wide bandwidth is a potential candidate for future energy harvesting applications in commonly used wireless communication bands, namely WIMAX, WLAN and satellite communication bands.

  18. The PASCO Wireless Smart Cart: A Game Changer in the Undergraduate Physics Laboratory

    Science.gov (United States)

    Shakur, Asif; Connor, Rainor

    2018-03-01

    With the introduction of the Wireless Smart Cart by PASCO scientific in April 2016, we expect a paradigm shift in undergraduate physics laboratory instruction. We have evaluated the feasibility of using the smart cart by carrying out experiments that are usually performed using traditional PASCO equipment. The simplicity, convenience, and cost-saving achieved by replacing a plethora of traditional laboratory sensors, wires, and equipment clutter with the smart cart are reported here.

  19. Cross-layer cluster-based energy-efficient protocol for wireless sensor networks.

    Science.gov (United States)

    Mammu, Aboobeker Sidhik Koyamparambil; Hernandez-Jayo, Unai; Sainz, Nekane; de la Iglesia, Idoia

    2015-04-09

    Recent developments in electronics and wireless communications have enabled the improvement of low-power and low-cost wireless sensors networks (WSNs). One of the most important challenges in WSNs is to increase the network lifetime due to the limited energy capacity of the network nodes. Another major challenge in WSNs is the hot spots that emerge as locations under heavy traffic load. Nodes in such areas quickly drain energy resources, leading to disconnection in network services. In such an environment, cross-layer cluster-based energy-efficient algorithms (CCBE) can prolong the network lifetime and energy efficiency. CCBE is based on clustering the nodes to different hexagonal structures. A hexagonal cluster consists of cluster members (CMs) and a cluster head (CH). The CHs are selected from the CMs based on nodes near the optimal CH distance and the residual energy of the nodes. Additionally, the optimal CH distance that links to optimal energy consumption is derived. To balance the energy consumption and the traffic load in the network, the CHs are rotated among all CMs. In WSNs, energy is mostly consumed during transmission and reception. Transmission collisions can further decrease the energy efficiency. These collisions can be avoided by using a contention-free protocol during the transmission period. Additionally, the CH allocates slots to the CMs based on their residual energy to increase sleep time. Furthermore, the energy consumption of CH can be further reduced by data aggregation. In this paper, we propose a data aggregation level based on the residual energy of CH and a cost-aware decision scheme for the fusion of data. Performance results show that the CCBE scheme performs better in terms of network lifetime, energy consumption and throughput compared to low-energy adaptive clustering hierarchy (LEACH) and hybrid energy-efficient distributed clustering (HEED).

  20. Cross-Layer Cluster-Based Energy-Efficient Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Aboobeker Sidhik Koyamparambil Mammu

    2015-04-01

    Full Text Available Recent developments in electronics and wireless communications have enabled the improvement of low-power and low-cost wireless sensors networks (WSNs. One of the most important challenges in WSNs is to increase the network lifetime due to the limited energy capacity of the network nodes. Another major challenge in WSNs is the hot spots that emerge as locations under heavy traffic load. Nodes in such areas quickly drain energy resources, leading to disconnection in network services. In such an environment, cross-layer cluster-based energy-efficient algorithms (CCBE can prolong the network lifetime and energy efficiency. CCBE is based on clustering the nodes to different hexagonal structures. A hexagonal cluster consists of cluster members (CMs and a cluster head (CH. The CHs are selected from the CMs based on nodes near the optimal CH distance and the residual energy of the nodes. Additionally, the optimal CH distance that links to optimal energy consumption is derived. To balance the energy consumption and the traffic load in the network, the CHs are rotated among all CMs. In WSNs, energy is mostly consumed during transmission and reception. Transmission collisions can further decrease the energy efficiency. These collisions can be avoided by using a contention-free protocol during the transmission period. Additionally, the CH allocates slots to the CMs based on their residual energy to increase sleep time. Furthermore, the energy consumption of CH can be further reduced by data aggregation. In this paper, we propose a data aggregation level based on the residual energy of CH and a cost-aware decision scheme for the fusion of data. Performance results show that the CCBE scheme performs better in terms of network lifetime, energy consumption and throughput compared to low-energy adaptive clustering hierarchy (LEACH and hybrid energy-efficient distributed clustering (HEED.

  1. Utilizing Cross-Layer Information to Improve Performance in JPEG2000 Decoding

    Directory of Open Access Journals (Sweden)

    Hannes Persson

    2007-01-01

    Full Text Available We focus on wireless multimedia communication and investigate how cross-layer information can be used to improve performance at the application layer, using JPEG2000 as an example. The cross-layer information is in the form of soft information from the physical layer. The soft information, which is supplied by a soft decision demodulator, yields reliability measures for the received bits and is fed into two soft input iterative JPEG2000 image decoders. When errors are detected with the error detecting mechanisms in JPEG2000, the decoders utilize the soft information to point out likely transmission errors. Hence, the decoders can correct errors and increase the image quality without making time-consuming retransmissions. We believe that the proposed decoding method utilizing soft information is suitable for a general IP-based network and that it keeps the principles of a layered structure of the protocol stack intact. Further, experimental results with images transmitted over a simulated wireless channel show that a simple decoding algorithm that utilizes soft information can give high gains in image quality compared to the standard hard-decision decoding.

  2. An Embedded Multi-Agent Systems Based Industrial Wireless Sensor Network.

    Science.gov (United States)

    Taboun, Mohammed S; Brennan, Robert W

    2017-09-14

    With the emergence of cyber-physical systems, there has been a growing interest in network-connected devices. One of the key requirements of a cyber-physical device is the ability to sense its environment. Wireless sensor networks are a widely-accepted solution for this requirement. In this study, an embedded multi-agent systems-managed wireless sensor network is presented. A novel architecture is proposed, along with a novel wireless sensor network architecture. Active and passive wireless sensor node types are defined, along with their communication protocols, and two application-specific examples are presented. A series of three experiments is conducted to evaluate the performance of the agent-embedded wireless sensor network.

  3. High throughput route selection in multi-rate wireless mesh networks

    Institute of Scientific and Technical Information of China (English)

    WEI Yi-fei; GUO Xiang-li; SONG Mei; SONG Jun-de

    2008-01-01

    Most existing Ad-hoc routing protocols use the shortest path algorithm with a hop count metric to select paths. It is appropriate in single-rate wireless networks, but has a tendency to select paths containing long-distance links that have low data rates and reduced reliability in multi-rate networks. This article introduces a high throughput routing algorithm utilizing the multi-rate capability and some mesh characteristics in wireless fidelity (WiFi) mesh networks. It uses the medium access control (MAC) transmission time as the routing metric, which is estimated by the information passed up from the physical layer. When the proposed algorithm is adopted, the Ad-hoc on-demand distance vector (AODV) routing can be improved as high throughput AODV (HT-AODV). Simulation results show that HT-AODV is capable of establishing a route that has high data-rate, short end-to-end delay and great network throughput.

  4. Capacity of Wireless Ad Hoc Networks with Opportunistic Collaborative Communications

    Directory of Open Access Journals (Sweden)

    Simeone O

    2007-01-01

    Full Text Available Optimal multihop routing in ad hoc networks requires the exchange of control messages at the MAC and network layer in order to set up the (centralized optimization problem. Distributed opportunistic space-time collaboration (OST is a valid alternative that avoids this drawback by enabling opportunistic cooperation with the source at the physical layer. In this paper, the performance of OST is investigated. It is shown analytically that opportunistic collaboration outperforms (centralized optimal multihop in case spatial reuse (i.e., the simultaneous transmission of more than one data stream is not allowed by the transmission protocol. Conversely, in case spatial reuse is possible, the relative performance between the two protocols has to be studied case by case in terms of the corresponding capacity regions, given the topology and the physical parameters of network at hand. Simulation results confirm that opportunistic collaborative communication is a promising paradigm for wireless ad hoc networks that deserves further investigation.

  5. Capacity of Wireless Ad Hoc Networks with Opportunistic Collaborative Communications

    Directory of Open Access Journals (Sweden)

    O. Simeone

    2007-03-01

    Full Text Available Optimal multihop routing in ad hoc networks requires the exchange of control messages at the MAC and network layer in order to set up the (centralized optimization problem. Distributed opportunistic space-time collaboration (OST is a valid alternative that avoids this drawback by enabling opportunistic cooperation with the source at the physical layer. In this paper, the performance of OST is investigated. It is shown analytically that opportunistic collaboration outperforms (centralized optimal multihop in case spatial reuse (i.e., the simultaneous transmission of more than one data stream is not allowed by the transmission protocol. Conversely, in case spatial reuse is possible, the relative performance between the two protocols has to be studied case by case in terms of the corresponding capacity regions, given the topology and the physical parameters of network at hand. Simulation results confirm that opportunistic collaborative communication is a promising paradigm for wireless ad hoc networks that deserves further investigation.

  6. Significant performance improvement obtained in a wireless mesh network using a beamswitching antenna

    CSIR Research Space (South Africa)

    Lysko, AA

    2012-09-01

    Full Text Available mesh network operated in a fixed 11 Mbps mode. The throughput improvement in multi-hop communication obtained in the presence of an interferer is tenfold, from 0.2 Mbps to 2 Mbps. Index Terms?antenna, smart antenna, wireless mesh network, WMN... efficiency in the communications, and active research and development of new methods and technologies enabling this at the physical layer, including multiple antenna techniques, such as multiple input multiple output (MIMO) and smart antennas...

  7. An Embedded Multi-Agent Systems Based Industrial Wireless Sensor Network

    Science.gov (United States)

    Brennan, Robert W.

    2017-01-01

    With the emergence of cyber-physical systems, there has been a growing interest in network-connected devices. One of the key requirements of a cyber-physical device is the ability to sense its environment. Wireless sensor networks are a widely-accepted solution for this requirement. In this study, an embedded multi-agent systems-managed wireless sensor network is presented. A novel architecture is proposed, along with a novel wireless sensor network architecture. Active and passive wireless sensor node types are defined, along with their communication protocols, and two application-specific examples are presented. A series of three experiments is conducted to evaluate the performance of the agent-embedded wireless sensor network. PMID:28906452

  8. Initial Results from an Energy-Aware Airborne Dynamic, Data-Driven Application System Performing Sampling in Coherent Boundary-Layer Structures

    Science.gov (United States)

    Frew, E.; Argrow, B. M.; Houston, A. L.; Weiss, C.

    2014-12-01

    The energy-aware airborne dynamic, data-driven application system (EA-DDDAS) performs persistent sampling in complex atmospheric conditions by exploiting wind energy using the dynamic data-driven application system paradigm. The main challenge for future airborne sampling missions is operation with tight integration of physical and computational resources over wireless communication networks, in complex atmospheric conditions. The physical resources considered here include sensor platforms, particularly mobile Doppler radar and unmanned aircraft, the complex conditions in which they operate, and the region of interest. Autonomous operation requires distributed computational effort connected by layered wireless communication. Onboard decision-making and coordination algorithms can be enhanced by atmospheric models that assimilate input from physics-based models and wind fields derived from multiple sources. These models are generally too complex to be run onboard the aircraft, so they need to be executed in ground vehicles in the field, and connected over broadband or other wireless links back to the field. Finally, the wind field environment drives strong interaction between the computational and physical systems, both as a challenge to autonomous path planning algorithms and as a novel energy source that can be exploited to improve system range and endurance. Implementation details of a complete EA-DDDAS will be provided, along with preliminary flight test results targeting coherent boundary-layer structures.

  9. Pervasive wireless environments

    CERN Document Server

    Yang, Jie; Trappe, Wade; Cheng, Jerry

    2014-01-01

    This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sen

  10. U Patch Antenna for RFID and Wireless Applications

    International Nuclear Information System (INIS)

    Abi Saad, R.; Melhem, Z.; Nader, C.; Zaatar, Y.; Zaouk, D.

    2011-01-01

    in this paper, we propose a new multi-band patch antenna structure for embedded RFID (Radio Frequency Identification) readers and wireless communications. The proposed antenna is a dual band microstrip patch antenna using U-slot geometry. The operating frequencies of the proposed antenna are chosen as 2.4 and 0.9 (GHz), obtained by optimizing the physical dimensions of the U-slot. Several parameters have been investigated using Ansoft Designer software. The antenna is fed through a quarter wavelength transformer for impedance matching. An additional layer of alumina is added above the surface of the conductors to increase the performance of the antenna. (author)

  11. A Cross-Layer Wireless Sensor Network Energy-Efficient Communication Protocol for Real-Time Monitoring of the Long-Distance Electric Transmission Lines

    Directory of Open Access Journals (Sweden)

    Jun Yu

    2015-01-01

    Full Text Available Optimization of energy consumption in Wireless Sensor Network (WSN nodes has become a critical link that constrains the engineering application of the smart grid due to the fact that the smart grid is characterized by long-distance transmission in a special environment. The paper proposes a linear hierarchical network topological structure specific to WSN energy conservation in environmental monitoring of the long-distance electric transmission lines in the smart grid. Based on the topological structural characteristics and optimization of network layers, the paper also proposes a Topological Structure be Layered Configurations (TSLC routing algorithm to improve the quality of WSN data transmission performance. Coprocessing of the network layer and the media access control (MAC layer is achieved by using the cross-layer design method, accessing the status for the nodes in the network layer and obtaining the status of the network nodes of the MAC layer. It efficiently saves the energy of the whole network, improves the quality of the network service performance, and prolongs the life cycle of the network.

  12. A Novel Passive Wireless Sensor for Concrete Humidity Monitoring

    Directory of Open Access Journals (Sweden)

    Shuangxi Zhou

    2016-09-01

    Full Text Available This paper presents a passive wireless humidity sensor for concrete monitoring. After discussing the transmission of electromagnetic wave in concrete, a novel architecture of wireless humidity sensor, based on Ultra-High Frequency (UHF Radio Frequency Identification (RFID technology, is proposed for low-power application. The humidity sensor utilizes the top metal layer to form the interdigitated electrodes, which were then filled with polyimide as the humidity sensing layer. The sensor interface converts the humidity capacitance into a digital signal in the frequency domain. A two-stage rectifier adopts a dynamic bias-voltage generator to boost the effective gate-source voltage of the switches in differential-drive architecture. The clock generator employs a novel structure to reduce the internal voltage swing. The measurement results show that our proposed wireless humidity can achieve a high linearity with a normalized sensitivity of 0.55% %RH at 20 °C. Despite the high losses of concrete, the proposed wireless humidity sensor achieves reliable communication performances in passive mode. The maximum operating distance is 0.52 m when the proposed wireless sensor is embedded into the concrete at the depth of 8 cm. The measured results are highly consistent with the results measured by traditional methods.

  13. A Novel Passive Wireless Sensor for Concrete Humidity Monitoring.

    Science.gov (United States)

    Zhou, Shuangxi; Deng, Fangming; Yu, Lehua; Li, Bing; Wu, Xiang; Yin, Baiqiang

    2016-09-20

    This paper presents a passive wireless humidity sensor for concrete monitoring. After discussing the transmission of electromagnetic wave in concrete, a novel architecture of wireless humidity sensor, based on Ultra-High Frequency (UHF) Radio Frequency Identification (RFID) technology, is proposed for low-power application. The humidity sensor utilizes the top metal layer to form the interdigitated electrodes, which were then filled with polyimide as the humidity sensing layer. The sensor interface converts the humidity capacitance into a digital signal in the frequency domain. A two-stage rectifier adopts a dynamic bias-voltage generator to boost the effective gate-source voltage of the switches in differential-drive architecture. The clock generator employs a novel structure to reduce the internal voltage swing. The measurement results show that our proposed wireless humidity can achieve a high linearity with a normalized sensitivity of 0.55% %RH at 20 °C. Despite the high losses of concrete, the proposed wireless humidity sensor achieves reliable communication performances in passive mode. The maximum operating distance is 0.52 m when the proposed wireless sensor is embedded into the concrete at the depth of 8 cm. The measured results are highly consistent with the results measured by traditional methods.

  14. A Novel Passive Wireless Sensor for Concrete Humidity Monitoring

    Science.gov (United States)

    Zhou, Shuangxi; Deng, Fangming; Yu, Lehua; Li, Bing; Wu, Xiang; Yin, Baiqiang

    2016-01-01

    This paper presents a passive wireless humidity sensor for concrete monitoring. After discussing the transmission of electromagnetic wave in concrete, a novel architecture of wireless humidity sensor, based on Ultra-High Frequency (UHF) Radio Frequency Identification (RFID) technology, is proposed for low-power application. The humidity sensor utilizes the top metal layer to form the interdigitated electrodes, which were then filled with polyimide as the humidity sensing layer. The sensor interface converts the humidity capacitance into a digital signal in the frequency domain. A two-stage rectifier adopts a dynamic bias-voltage generator to boost the effective gate-source voltage of the switches in differential-drive architecture. The clock generator employs a novel structure to reduce the internal voltage swing. The measurement results show that our proposed wireless humidity can achieve a high linearity with a normalized sensitivity of 0.55% %RH at 20 °C. Despite the high losses of concrete, the proposed wireless humidity sensor achieves reliable communication performances in passive mode. The maximum operating distance is 0.52 m when the proposed wireless sensor is embedded into the concrete at the depth of 8 cm. The measured results are highly consistent with the results measured by traditional methods. PMID:27657070

  15. ZERO: Probabilistic Routing for Deploy and Forget Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jose Carlos Pacho

    2010-09-01

    Full Text Available As Wireless Sensor Networks are being adopted by industry and agriculture for large-scale and unattended deployments, the need for reliable and energy-conservative protocols become critical. Physical and Link layer efforts for energy conservation are not mostly considered by routing protocols that put their efforts on maintaining reliability and throughput. Gradient-based routing protocols route data through most reliable links aiming to ensure 99% packet delivery. However, they suffer from the so-called ”hot spot” problem. Most reliable routes waste their energy fast, thus partitioning the network and reducing the area monitored. To cope with this ”hot spot” problem we propose ZERO a combined approach at Network and Link layers to increase network lifespan while conserving reliability levels by means of probabilistic load balancing techniques.

  16. A Cross-Layer Key Management Scheme for MIPv6 Fast Handover over IEEE 802.11 Wireless LAN

    Directory of Open Access Journals (Sweden)

    Chang-Seop Park

    2015-01-01

    Full Text Available A new key management and security scheme is proposed to integrate Layer Two (L2 and Layer Three (L3 keys for secure and fast Mobile IPv6 handover over IEEE 802.11 Wireless Local Area Network (WLAN. Unlike the original IEEE 802.11-based Mobile IPv6 Fast Handover (FMIPv6 that requires time-consuming IEEE 802.1x-based Extensible Authentication Protocol (EAP authentication on each L3 handover, the newly proposed key management and security scheme requires only one 802.1x-EAP regardless of how many L3 handovers occur. Therefore, the proposed scheme reduces the handover latency that results from a lengthy 802.1x-based EAP. The proposed key management and security scheme is extensively analyzed in terms of security and performance, and the proposed security scheme is shown to be more secure than those that were previously proposed.

  17. A Cross-Layer Approach in Sensing and Resource Allocation for Multimedia Transmission over Cognitive UWB Networks

    Directory of Open Access Journals (Sweden)

    Lo ACC

    2010-01-01

    Full Text Available We propose an MAC centric cross-layer approach to address the problem of multimedia transmission over cognitive Ultra Wideband (C-UWB networks. Several fundamental design issues, which are related to application (APP, medium access control (MAC, and physical (PHY layer, are discussed. Although substantial research has been carried out in the PHY layer perspective of cognitive radio system, this paper attempts to extend the existing research paradigm to MAC and APP layers, which can be considered as premature at this time. This paper proposed a cross-layer design that is aware of (a UWB wireless channel conditions, (b time slot allocations at the MAC layer, and (c MPEG-4 video at the APP layer. Two cooperative sensing mechanisms, namely, AND and OR, are analyzed in terms of probability of detection ( , probability of false alarm ( , and the required sensing period. Then, the impact of sensing scheduling to the MPEG-4 video transmission over wireless cognitive UWB networks is observed. In addition, we also proposed the packet reception rate- (PRR- based resource allocation scheme that is aware of the channel condition, target PRR, and queue status.

  18. SenseCube—a novel inexpensive wireless multisensor for physics lab experimentations

    Science.gov (United States)

    Mehta, Vedant; Lane, Charles D.

    2018-07-01

    SenseCube is a multisensor capable of measuring many different real-time events and changes in environment. Most conventional sensors used in introductory-physics labs use their own software and have wires that must be attached to a computer or an alternate device to analyze the data. This makes the standard sensors time consuming, tedious, and space-constricted. SenseCube was developed to overcome these limitations. This research was focused on developing a device that is all-encompassing, cost-effective, wireless, and compact, yet can perform the same tasks as the multiple standard sensors normally used in physics labs. It measures more than twenty distinct types of real-time events and transfers the data via Bluetooth. Both Windows and Mac software were developed so that the data from this device can be retrieved and/or saved on either platform. This paper describes the sensor itself, its development, its capabilities, and its cost comparison with standard sensors.

  19. Wireless Industrial Monitoring and Control Networks: The Journey So Far and the Road Ahead

    Directory of Open Access Journals (Sweden)

    Paul Havinga

    2012-08-01

    Full Text Available While traditional wired communication technologies have played a crucial role in industrial monitoring and control networks over the past few decades, they are increasingly proving to be inadequate to meet the highly dynamic and stringent demands of today’s industrial applications, primarily due to the very rigid nature of wired infrastructures. Wireless technology, however, through its increased pervasiveness, has the potential to revolutionize the industry, not only by mitigating the problems faced by wired solutions, but also by introducing a completely new class of applications. While present day wireless technologies made some preliminary inroads in the monitoring domain, they still have severe limitations especially when real-time, reliable distributed control operations are concerned. This article provides the reader with an overview of existing wireless technologies commonly used in the monitoring and control industry. It highlights the pros and cons of each technology and assesses the degree to which each technology is able to meet the stringent demands of industrial monitoring and control networks. Additionally, it summarizes mechanisms proposed by academia, especially serving critical applications by addressing the real-time and reliability requirements of industrial process automation. The article also describes certain key research problems from the physical layer communication for sensor networks and the wireless networking perspective that have yet to be addressed to allow the successful use of wireless technologies in industrial monitoring and control networks.

  20. Wireless Technician

    Science.gov (United States)

    Tech Directions, 2011

    2011-01-01

    One of the hottest areas in technology is invisible. Wireless communications allow people to transmit voice messages, data, and other signals through the air without physically connecting senders to receivers with cables or wires. And the technology is spreading at lightning speed. Cellular phones, personal digital assistants, and wireless…

  1. Resource sharing in wireless networks: The SAPHYRE approach

    NARCIS (Netherlands)

    Jorswieck, E.A.; Badia, L.; Fahldieck, T.; Gesbert, D.; Gustafsson, S.; Haardt, M.; Ho, K.-M.; Karipidis, E.; Kortke, A.; Larsson, E.G.; Mark, H.; Nawrocki, M.; Piesiewicz, R.; Römer, F.; Schubert, M.; Sykora, J.; Trommelen, P.H.; Ende, B.D. van; Zorzi, M.

    2010-01-01

    Physical resource sharing between wireless operators and service providers is necessary in order to support efficient, competitive, and innovative wireless communication markets. By sharing resources, such as spectrum or infrastructure, which are usually exclusively allocated interference is created

  2. Extending Wireless Broadband Network Architectures with Home Gateways, Localization, and Physical Environment Surveillance

    DEFF Research Database (Denmark)

    Jelling Kristoffersen, Kåre; Kjærgaard, Mikkel Baun; Chen, Jianjun

    2005-01-01

    homes. It must bridge across the most prevalent standard protocols for data, video, telephony and telemetry, and must be able to automatically discover new devices in a residence and allow over the air/wire provisioning, billing, management and aggregation of new services from multiple service providers...... is initially demonstrated in a 52 DECT base station installation covering four office buildings of total 4500 m2 . Finally the paper proposes the application of a commercial off-the-shelf wireless broadband network as a sensor network, without any additional hardware, for physical intrusion detection of e...

  3. Bandwidth Estimation in Wireless Lans for Multimedia Streaming Services

    Directory of Open Access Journals (Sweden)

    Heung Ki Lee

    2007-01-01

    Full Text Available The popularity of multimedia streaming services via wireless networks presents major challenges in the management of network bandwidth. One challenge is to quickly and precisely estimate the available bandwidth for the decision of streaming rates of layered and scalable multimedia services. Previous studies based on wired networks are too burdensome to be applied to multimedia applications in wireless networks. In this paper, a new method, IdleGap, is suggested to estimate the available bandwidth of a wireless LAN based on the information from a low layer in the protocol stack. We use a network simulation tool, NS-2, to evaluate our new method with various ranges of cross-traffic and observation times. Our simulation results show that IdleGap accurately estimates the available bandwidth for all ranges of cross-traffic (100 Kbps ∼ 1 Mbps with a very short observation time of 10 seconds.

  4. The Most Possible Scheme of Joint Service Detection for the Next Wireless Communication Technologies

    Directory of Open Access Journals (Sweden)

    Firdaus Firdaus

    2013-03-01

    Full Text Available The era of beyond third generation wireless communication is highly heterogeneous in that it comprises several radio access technologies that need to be joined into a single multimode terminal. In this respect, this paper introduces a common service recognition system for the next wireless communication technologies i.e. Long Term Evolution (LTE, WiMAX or IEEE 802.16, and Wireless Local Area Network (WLAN or IEEE 802.11. It is done in physical layer as one of multimode terminal ability regardless network cooperation existence. We investigated on the preamble and synchronization signals as indicators of the available services instead of carrier frequency detection. To detect these signals, we proposed a time domain detection system consisting of auto-correlation, cross-correlation, and a peak period detection. Based on complexity analysis, this paper proposes the most possible scheme with lower complexity than cross-correlation implementation. Moreover, the fixed point simulation results show that the proposed system satisfies the minimum receiver sensitivity requirements that specified in the standards.

  5. Securing While Sampling in Wireless Body Area Networks With Application to Electrocardiography.

    Science.gov (United States)

    Dautov, Ruslan; Tsouri, Gill R

    2016-01-01

    Stringent resource constraints and broadcast transmission in wireless body area network raise serious security concerns when employed in biomedical applications. Protecting data transmission where any minor alteration is potentially harmful is of significant importance in healthcare. Traditional security methods based on public or private key infrastructure require considerable memory and computational resources, and present an implementation obstacle in compact sensor nodes. This paper proposes a lightweight encryption framework augmenting compressed sensing with wireless physical layer security. Augmenting compressed sensing to secure information is based on the use of the measurement matrix as an encryption key, and allows for incorporating security in addition to compression at the time of sampling an analog signal. The proposed approach eliminates the need for a separate encryption algorithm, as well as the predeployment of a key thereby conserving sensor node's limited resources. The proposed framework is evaluated using analysis, simulation, and experimentation applied to a wireless electrocardiogram setup consisting of a sensor node, an access point, and an eavesdropper performing a proximity attack. Results show that legitimate communication is reliable and secure given that the eavesdropper is located at a reasonable distance from the sensor node and the access point.

  6. A Cross-Layer Duty Cycle MAC Protocol Supporting a Pipeline Feature for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Chon Kim

    2011-05-01

    Full Text Available Although the conventional duty cycle MAC protocols for Wireless Sensor Networks (WSNs such as RMAC perform well in terms of saving energy and reducing end-to-end delivery latency, they were designed independently and require an extra routing protocol in the network layer to provide path information for the MAC layer. In this paper, we propose a new cross-layer duty cycle MAC protocol with data forwarding supporting a pipeline feature (P-MAC for WSNs. P-MAC first divides the whole network into many grades around the sink. Each node identifies its grade according to its logical hop distance to the sink and simultaneously establishes a sleep/wakeup schedule using the grade information. Those nodes in the same grade keep the same schedule, which is staggered with the schedule of the nodes in the adjacent grade. Then a variation of the RTS/CTS handshake mechanism is used to forward data continuously in a pipeline fashion from the higher grade to the lower grade nodes and finally to the sink. No extra routing overhead is needed, thus increasing the network scalability while maintaining the superiority of duty-cycling. The simulation results in OPNET show that P-MAC has better performance than S-MAC and RMAC in terms of packet delivery latency and energy efficiency.

  7. Effects of wireless packet loss in industrial process control systems.

    Science.gov (United States)

    Liu, Yongkang; Candell, Richard; Moayeri, Nader

    2017-05-01

    controller to the burstiness of packet loss is also characterized in different process stages. The performance results indicate that wireless links with redundant bandwidth reservation can meet the requirements of the TE process model under normal operational conditions. When disturbances are introduced in the TE plant model, wireless packet loss during transitions between process stages need further protection in severely impaired links. Techniques such as retransmission scheduling, multipath routing and enhanced physical layer design are discussed and the latest industrial wireless protocols are compared. Published by Elsevier Ltd.

  8. Cross-platform wireless sensor network development

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg; Kusy, Branislav

    Design and development of wireless sensor network applications adds an additional layer of complexity to traditional computer systems. The developer needs to be an expert in resource constrained embedded devices as well as traditional desktop computers. We propose Tinylnventor, an open...

  9. Analysis of Wireless Sensor Network Topology and Estimation of Optimal Network Deployment by Deterministic Radio Channel Characterization

    Directory of Open Access Journals (Sweden)

    Erik Aguirre

    2015-02-01

    Full Text Available One of the main challenges in the implementation and design of context-aware scenarios is the adequate deployment strategy for Wireless Sensor Networks (WSNs, mainly due to the strong dependence of the radiofrequency physical layer with the surrounding media, which can lead to non-optimal network designs. In this work, radioplanning analysis for WSN deployment is proposed by employing a deterministic 3D ray launching technique in order to provide insight into complex wireless channel behavior in context-aware indoor scenarios. The proposed radioplanning procedure is validated with a testbed implemented with a Mobile Ad Hoc Network WSN following a chain configuration, enabling the analysis and assessment of a rich variety of parameters, such as received signal level, signal quality and estimation of power consumption. The adoption of deterministic radio channel techniques allows the design and further deployment of WSNs in heterogeneous wireless scenarios with optimized behavior in terms of coverage, capacity, quality of service and energy consumption.

  10. Analysis of wireless sensor network topology and estimation of optimal network deployment by deterministic radio channel characterization.

    Science.gov (United States)

    Aguirre, Erik; Lopez-Iturri, Peio; Azpilicueta, Leire; Astrain, José Javier; Villadangos, Jesús; Falcone, Francisco

    2015-02-05

    One of the main challenges in the implementation and design of context-aware scenarios is the adequate deployment strategy for Wireless Sensor Networks (WSNs), mainly due to the strong dependence of the radiofrequency physical layer with the surrounding media, which can lead to non-optimal network designs. In this work, radioplanning analysis for WSN deployment is proposed by employing a deterministic 3D ray launching technique in order to provide insight into complex wireless channel behavior in context-aware indoor scenarios. The proposed radioplanning procedure is validated with a testbed implemented with a Mobile Ad Hoc Network WSN following a chain configuration, enabling the analysis and assessment of a rich variety of parameters, such as received signal level, signal quality and estimation of power consumption. The adoption of deterministic radio channel techniques allows the design and further deployment of WSNs in heterogeneous wireless scenarios with optimized behavior in terms of coverage, capacity, quality of service and energy consumption.

  11. Physical Layer Ethernet Clock Synchronization

    Science.gov (United States)

    2010-11-01

    42 nd Annual Precise Time and Time Interval (PTTI) Meeting 77 PHYSICAL LAYER ETHERNET CLOCK SYNCHRONIZATION Reinhard Exel, Georg...oeaw.ac.at Nikolaus Kerö Oregano Systems, Mohsgasse 1, 1030 Wien, Austria E-mail: nikolaus.keroe@oregano.at Abstract Clock synchronization ...is a service widely used in distributed networks to coordinate data acquisition and actions. As the requirement to achieve tighter synchronization

  12. Wireless synapses in bio-inspired neural networks

    Science.gov (United States)

    Jannson, Tomasz; Forrester, Thomas; Degrood, Kevin

    2009-05-01

    Wireless (virtual) synapses represent a novel approach to bio-inspired neural networks that follow the infrastructure of the biological brain, except that biological (physical) synapses are replaced by virtual ones based on cellular telephony modeling. Such synapses are of two types: intracluster synapses are based on IR wireless ones, while intercluster synapses are based on RF wireless ones. Such synapses have three unique features, atypical of conventional artificial ones: very high parallelism (close to that of the human brain), very high reconfigurability (easy to kill and to create), and very high plasticity (easy to modify or upgrade). In this paper we analyze the general concept of wireless synapses with special emphasis on RF wireless synapses. Also, biological mammalian (vertebrate) neural models are discussed for comparison, and a novel neural lensing effect is discussed in detail.

  13. Performance Analysis of IEEE 802.11e (EDCF) and IEEE 802.11(DCF) WLAN Incorporating Different Physical Layer Standards

    Science.gov (United States)

    Sharma, V.; Singh, H.; Malhotra, J.

    2012-12-01

    Medium access coordination function basically implements the distributed coordination function (DCF) which provides support to best effort services but limited to QoS services. Subsequently, a new standard, namely enhanced distributed channel access (EDCA) is reported. The IEEE 802.11e (EDCA) defines MAC procedures to support QoS requirements which specifies distributed contention based access scheme to access the shared wireless media. This paper evaluates the performance of EDCA based IEEE 802.11 WLAN for various access categories (ACs) using OPNET™ Modeller 14.5. Further, the computed results are compared with DCF protocols in terms of QoS parameters. Furthermore, the simulative observation is reported at data rate of 54 Mbps using different physical layer protocols such as IEEE 802.11a/b/g to stumble on the best one to be implemented with EDCF to achieve improved QoS.

  14. A wireless interrogation system exploiting narrowband acoustic resonator for remote physical quantity measurement

    Energy Technology Data Exchange (ETDEWEB)

    Friedt, J.-M [SENSeOR, 32 Avenue de l' Observatoire, 25044 Besancon (France); Droit, C.; Martin, G.; Ballandras, S. [Department of Time and Frequency, FEMTO-ST, 32 Avenue de l' Observatoire, 25044 Besancon (France)

    2010-01-15

    Monitoring physical quantities using acoustic wave devices can be advantageously achieved using the wave characteristic dependence to various parametric perturbations (temperature, stress, and pressure). Surface acoustic wave (SAW) resonators are particularly well suited to such applications as their resonance frequency is directly influenced by these perturbations, modifying both the phase velocity and resonance conditions. Moreover, the intrinsic radio frequency (rf) nature of these devices makes them ideal for wireless applications, mainly exploiting antennas reciprocity and piezoelectric reversibility. In this paper, we present a wireless SAW sensor interrogation unit operating in the 434 MHz centered ISM band--selected as a tradeoff between antenna dimensions and electromagnetic wave penetration in dielectric media--based on the principles of a frequency sweep network analyzer. We particularly focus on the compliance with the ISM standard which reveals complicated by the need for switching from emission to reception modes similarly to radar operation. In this matter, we propose a fully digital rf synthesis chain to develop various interrogation strategies to overcome the corresponding difficulties and comply with the above-mentioned standard. We finally assess the reader interrogation range, accuracy, and dynamics.

  15. A wireless interrogation system exploiting narrowband acoustic resonator for remote physical quantity measurement

    International Nuclear Information System (INIS)

    Friedt, J.-M; Droit, C.; Martin, G.; Ballandras, S.

    2010-01-01

    Monitoring physical quantities using acoustic wave devices can be advantageously achieved using the wave characteristic dependence to various parametric perturbations (temperature, stress, and pressure). Surface acoustic wave (SAW) resonators are particularly well suited to such applications as their resonance frequency is directly influenced by these perturbations, modifying both the phase velocity and resonance conditions. Moreover, the intrinsic radio frequency (rf) nature of these devices makes them ideal for wireless applications, mainly exploiting antennas reciprocity and piezoelectric reversibility. In this paper, we present a wireless SAW sensor interrogation unit operating in the 434 MHz centered ISM band--selected as a tradeoff between antenna dimensions and electromagnetic wave penetration in dielectric media--based on the principles of a frequency sweep network analyzer. We particularly focus on the compliance with the ISM standard which reveals complicated by the need for switching from emission to reception modes similarly to radar operation. In this matter, we propose a fully digital rf synthesis chain to develop various interrogation strategies to overcome the corresponding difficulties and comply with the above-mentioned standard. We finally assess the reader interrogation range, accuracy, and dynamics.

  16. Cross-Layer Measurement on an IEEE 802.11g Wireless Network Supporting MPEG-2 Video Streaming Applications in the Presence of Interference

    Directory of Open Access Journals (Sweden)

    Alessandro Sona

    2010-01-01

    Full Text Available The performance of wireless local area networks supporting video streaming applications, based on MPEG-2 video codec, in the presence of interference is here dealt with. IEEE 802.11g standard wireless networks, that do not support QoS in according with IEEE 802.11e standard, are, in particular, accounted for and Bluetooth signals, additive white Gaussian noise, and competitive data traffic are considered as sources of interference. The goal is twofold: from one side, experimentally assessing and correlating the values that some performance metrics assume at the same time at different layers of an IEEE 802.11g WLAN delivering video streaming in the presence of in-channel interference; from the other side, deducing helpful and practical hints for designers and technicians, in order to efficiently assess and enhance the performance of an IEEE 802.11g WLAN supporting video streaming in some suitable setup conditions and in the presence of interference. To this purpose, an experimental analysis is planned following a cross-layer measurement approach, and a proper testbed within a semianechoic chamber is used. Valuable results are obtained in terms of signal-to-interference ratio, packet loss ratio, jitter, video quality, and interference data rate; helpful hints for designers and technicians are finally gained.

  17. The Model of Communication Channel in the 802.11b Standard Wireless Network

    Directory of Open Access Journals (Sweden)

    Zdenek Nemec

    2008-01-01

    Full Text Available The paper deals with software modelling of a communication channel in the 802.11b standard wireless network physical layer. A computer model of signal processing was created to verify possibility of the proposal of localisation system. Functionality of the signal generation and processing model was verified by the Spectrum Analyzer. Simulations run inSimulink/Matlab SW. The Simulink is used for the signal processor model and a pure Matlab software is used for mathematical evaluations of data processor model and for determination of initial conditions.

  18. An Energy-Efficient and High-Quality Video Transmission Architecture in Wireless Video-Based Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yasaman Samei

    2008-08-01

    Full Text Available Technological progress in the fields of Micro Electro-Mechanical Systems (MEMS and wireless communications and also the availability of CMOS cameras, microphones and small-scale array sensors, which may ubiquitously capture multimedia content from the field, have fostered the development of low-cost limited resources Wireless Video-based Sensor Networks (WVSN. With regards to the constraints of videobased sensor nodes and wireless sensor networks, a supporting video stream is not easy to implement with the present sensor network protocols. In this paper, a thorough architecture is presented for video transmission over WVSN called Energy-efficient and high-Quality Video transmission Architecture (EQV-Architecture. This architecture influences three layers of communication protocol stack and considers wireless video sensor nodes constraints like limited process and energy resources while video quality is preserved in the receiver side. Application, transport, and network layers are the layers in which the compression protocol, transport protocol, and routing protocol are proposed respectively, also a dropping scheme is presented in network layer. Simulation results over various environments with dissimilar conditions revealed the effectiveness of the architecture in improving the lifetime of the network as well as preserving the video quality.

  19. An Energy-Efficient and High-Quality Video Transmission Architecture in Wireless Video-Based Sensor Networks.

    Science.gov (United States)

    Aghdasi, Hadi S; Abbaspour, Maghsoud; Moghadam, Mohsen Ebrahimi; Samei, Yasaman

    2008-08-04

    Technological progress in the fields of Micro Electro-Mechanical Systems (MEMS) and wireless communications and also the availability of CMOS cameras, microphones and small-scale array sensors, which may ubiquitously capture multimedia content from the field, have fostered the development of low-cost limited resources Wireless Video-based Sensor Networks (WVSN). With regards to the constraints of videobased sensor nodes and wireless sensor networks, a supporting video stream is not easy to implement with the present sensor network protocols. In this paper, a thorough architecture is presented for video transmission over WVSN called Energy-efficient and high-Quality Video transmission Architecture (EQV-Architecture). This architecture influences three layers of communication protocol stack and considers wireless video sensor nodes constraints like limited process and energy resources while video quality is preserved in the receiver side. Application, transport, and network layers are the layers in which the compression protocol, transport protocol, and routing protocol are proposed respectively, also a dropping scheme is presented in network layer. Simulation results over various environments with dissimilar conditions revealed the effectiveness of the architecture in improving the lifetime of the network as well as preserving the video quality.

  20. Medium access control and network layer design for 60 GHz wireless personal area networks

    NARCIS (Netherlands)

    An, X.

    2010-01-01

    The unlicensed frequency band around 60 GHz is a very promising spectrum due to its potential to provide multiple gigabits per second based data rates for short range wireless communication. Hence, 60 GHz radio is an attractive candidate to enable ultra high rate Wireless Personal Area Networks

  1. In-to-out body path loss for wireless radio frequency capsule endoscopy in a human body.

    Science.gov (United States)

    Vermeeren, G; Tanghe, E; Thielens, A; Martens, L; Joseph, W

    2016-08-01

    Physical-layer characterization is important for design of in-to-out body communication for wireless body area networks (WBANs). This paper numerically investigates the path loss of an in-to-out body radio frequency (RF) wireless link between an endoscopy capsule and a receiver outside the body using a 3D electromagnetic solver. A spiral antenna in the endoscopy capsule is tuned to operate in the Medical Implant Communication Service (MICS) band at 402 MHz, accounting for the properties of the human body. The influence of misalignment, rotation of the capsule, and human body model are investigated. Semi-empirical path loss models for various homogeneous tissues and 3D realistic human body models are provided for manufacturers to evaluate the performance of in-to-out-body WBAN systems.

  2. CogWnet: A Resource Management Architecture for Cognitive Wireless Networks

    KAUST Repository

    Alqerm, Ismail

    2013-07-01

    With the increasing adoption of wireless communication technologies, there is a need to improve management of existing radio resources. Cognitive radio is a promising technology to improve the utilization of wireless spectrum. Its operating principle is based on building an integrated hardware and software architecture that configures the radio to meet application requirements within the constraints of spectrum policy regulations. However, such an architecture must be able to cope with radio environment heterogeneity. In this paper, we propose a cognitive resource management architecture, called CogWnet, that allocates channels, re-configures radio transmission parameters to meet QoS requirements, ensures reliability, and mitigates interference. The architecture consists of three main layers: Communication Layer, which includes generic interfaces to facilitate the communication between the cognitive architecture and TCP/IP stack layers; Decision-Making Layer, which classifies the stack layers input parameters and runs decision-making optimization algorithms to output optimal transmission parameters; and Policy Layer to enforce policy regulations on the selected part of the spectrum. The efficiency of CogWnet is demonstrated through a testbed implementation and evaluation.

  3. Cross-Layer Design and Analysis of Downlink Communications in Cellular CDMA Systems

    Directory of Open Access Journals (Sweden)

    Sun Jin Yuan

    2006-01-01

    Full Text Available A cellular CDMA network with voice and data communications is considered. Focusing on the downlink direction, we seek for the overall performance improvement which can be achieved by cross-layer analysis and design, taking physical layer, link layer, network layer, and transport layer into account. We are concerned with the role of each single layer as well as the interaction among layers, and propose algorithms/schemes accordingly to improve the system performance. These proposals include adaptive scheduling for link layer, priority-based handoff strategy for network admission control, and an algorithm for the avoidance of TCP spurious timeouts at the transport layer. Numerical results show the performance gain of each proposed scheme over independent performance of an individual layer in the wireless mobile network. We conclude that the system performance in terms of capacity, throughput, dropping probability, outage, power efficiency, delay, and fairness can be enhanced by jointly considering the interactions across layers.

  4. Truncated power control for improving TCP/IP performance over CDMA wireless links

    DEFF Research Database (Denmark)

    Cianca, Ernestina; Prasad, Ramjee; De Sanctis, Mauro

    2005-01-01

    The issue of the performance degradation of transmission control protocol/Internet Protocol (TCP/IP) over wireless links due to the presence of noncongestion-related packet losses has been addressed with a physical layer approach. The effectiveness of automatic repeat request techniques...... in enhancing TCP/IP performance depends on the tradeoff between frame transmission delay and residual errors after retransmissions. The paper shows how a truncated power control can be effectively applied to improve that tradeoff so that a higher transmission reliability is provided without increasing...... the frame transmission delay through the radio link layer and without increasing the energy consumption. An analytical framework has been developed to show the feasibility and effectiveness of the proposed power control. The analytical results, which are carried out assuming a constant multiuser...

  5. Optimized and Executive Survey of Physical Node Capture Attack in Wireless Sensor Network

    OpenAIRE

    Bhavana Butani; Piyush Kumar Shukla; Sanjay Silakari

    2014-01-01

    Wireless sensor networks (WSNs) are novel large-scale wireless networks that consist of distributed, self organizing, low-power, low-cost, tiny sensor devices to cooperatively collect information through infrastructure less wireless networks. These networks are envisioned to play a crucial role in variety of applications like critical military surveillance applications, forest fire monitoring, commercial applications such as building security monitoring, traffic surveillance, habitat monitori...

  6. Optimization design of wireless charging system for autonomous robots based on magnetic resonance coupling

    Directory of Open Access Journals (Sweden)

    Junhua Wang

    2018-05-01

    Full Text Available Wireless charging is the key technology to realize real autonomy of mobile robots. As the core part of wireless power transfer system, coupling mechanism including coupling coils and compensation topology is analyzed and optimized through simulations, to achieve stable and practical wireless charging suitable for ordinary robots. Multi-layer coil structure, especially double-layer coil is explored and selected to greatly enhance coupling performance, while shape of ferrite shielding goes through distributed optimization to guarantee coil fault tolerance and cost effectiveness. On the basis of optimized coils, primary compensation topology is analyzed to adopt composite LCL compensation, to stabilize operations of the primary side under variations of mutual inductance. Experimental results show the optimized system does make sense for wireless charging application for robots based on magnetic resonance coupling, to realize long-term autonomy of robots.

  7. Optimization design of wireless charging system for autonomous robots based on magnetic resonance coupling

    Science.gov (United States)

    Wang, Junhua; Hu, Meilin; Cai, Changsong; Lin, Zhongzheng; Li, Liang; Fang, Zhijian

    2018-05-01

    Wireless charging is the key technology to realize real autonomy of mobile robots. As the core part of wireless power transfer system, coupling mechanism including coupling coils and compensation topology is analyzed and optimized through simulations, to achieve stable and practical wireless charging suitable for ordinary robots. Multi-layer coil structure, especially double-layer coil is explored and selected to greatly enhance coupling performance, while shape of ferrite shielding goes through distributed optimization to guarantee coil fault tolerance and cost effectiveness. On the basis of optimized coils, primary compensation topology is analyzed to adopt composite LCL compensation, to stabilize operations of the primary side under variations of mutual inductance. Experimental results show the optimized system does make sense for wireless charging application for robots based on magnetic resonance coupling, to realize long-term autonomy of robots.

  8. MAC-layer protocol for TCP fairness in Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal; Jamshaid, Kamran; Shihada, Basem; Ho, Pin-Han

    2012-01-01

    In this paper we study the interactions of TCP and IEEE 802.11 MAC in Wireless Mesh Networks (WMNs). We use a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput performance due to the effect of queue

  9. Radial transfer of tracking data with wireless links

    CERN Document Server

    Pelikan, Daniel; Brenner, Richard; Dancila, Dragos; Gustafsson, Leif

    2014-01-01

    Wireless data transfer has revolutionized the consumer mar ket for the last decade giving products equipped with transmitters and receiver for wireless data t ransfer. Wireless technology has fea- tures attractive for data transfer in future tracking detec tors. The removal of wires and connectors for data links is certainly beneficial both for the material b udget and the reliability of the system. One other advantage is the freedom of routing signals which t oday is particularly complicated when bringing the data the first 50 cm outside the tracker. Wit h wireless links intelligence can be built into a tracker by introducing communication betwee n tracking layers within a Region Of Interest which would allow the construction of track primit ives in real time. The wireless signal is transmitted by a passive antenna structure which is a radiat ion hard and much less complex object than an optical link. Due to the requirement of high data rate s in detectors a high bandwidth is required. The frequency band aro...

  10. Self-powered wireless disposable sensor for welfare application.

    Science.gov (United States)

    Douseki, Takakuni; Tanaka, Ami

    2013-01-01

    A self-powered urinary incontinence sensor consisting of a flexible urine-activated battery and a wireless transmitter has been developed as an application for wireless biosensor networks. The flexible urine-activated battery is embedded in a disposal diaper and makes possible both the sensing of urine leakage and self-powered operation. An intermittent power-supply circuit that uses an electric double-layer capacitor (EDLC) with a small internal resistance suppresses the supply voltage drop due to the large internal resistance of the battery. This circuit supplies the power to a wireless transmitter. A 315-MHz-band wireless transmitter performs low-power operation. To verify the effectiveness of the circuit scheme, we fabricated a prototype sensor system. When 80 cc of urine is poured onto the diaper, the battery outputs a voltage of 1 V; and the sensor can transmit an ID signal over a distance of 5 m.

  11. Achievable Throughput-Based MAC Layer Handoff in IEEE 802.11 Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Wu Haitao

    2009-01-01

    Full Text Available We propose a MAC layer handoff mechanism for IEEE 802.11 Wireless Local Area Networks (WLAN to give benefit to bandwidth-greedy applications at STAs. The proposed mechanism determines an optimal AP with the maximum achievable throughput rather than the best signal condition by estimating the AP's bandwidth with a new on-the-fly measurement method, Transient Frame Capture (TFC, and predicting the actual throughput could be achieved at STAs. Since the TFC is employed based on the promiscuous mode of WLAN NIC, STAs can avoid the service degradation through the current associated AP. In addition, the proposed mechanism is a client-only solution which does not require any modification of network protocol on APs. To evaluate the performance of the proposed mechanism, we develop an analytic model to estimate reliable and accurate bandwidth of the AP and demonstrate through testbed measurement with various experimental study methods. We also validate the fairness of the proposed mechanism through simulation studies.

  12. Reactor building indoor wireless network channel quality estimation using RSSI measurement of wireless sensor network

    International Nuclear Information System (INIS)

    Merat, S.

    2008-01-01

    Expanding wireless communication network reception inside reactor buildings (RB) and service wings (SW) has always been a technical challenge for operations service team. This is driven by the volume of metal equipment inside the Reactor Buildings (RB) that blocks and somehow shields the signal throughout the link. In this study, to improve wireless reception inside the Reactor Building (RB), an experimental model using indoor localization mesh based on IEEE 802.15 is developed to implement a wireless sensor network. This experimental model estimates the distance between different nodes by measuring the RSSI (Received Signal Strength Indicator). Then by using triangulation and RSSI measurement, the validity of the estimation techniques is verified to simulate the physical environmental obstacles, which block the signal transmission. (author)

  13. Reactor building indoor wireless network channel quality estimation using RSSI measurement of wireless sensor network

    Energy Technology Data Exchange (ETDEWEB)

    Merat, S. [Wardrop Engineering Inc., Toronto, Ontario (Canada)

    2008-07-01

    Expanding wireless communication network reception inside reactor buildings (RB) and service wings (SW) has always been a technical challenge for operations service team. This is driven by the volume of metal equipment inside the Reactor Buildings (RB) that blocks and somehow shields the signal throughout the link. In this study, to improve wireless reception inside the Reactor Building (RB), an experimental model using indoor localization mesh based on IEEE 802.15 is developed to implement a wireless sensor network. This experimental model estimates the distance between different nodes by measuring the RSSI (Received Signal Strength Indicator). Then by using triangulation and RSSI measurement, the validity of the estimation techniques is verified to simulate the physical environmental obstacles, which block the signal transmission. (author)

  14. Practice brief. Securing wireless technology for healthcare.

    Science.gov (United States)

    Retterer, John; Casto, Brian W

    2004-05-01

    Wireless networking can be a very complex science, requiring an understanding of physics and the electromagnetic spectrum. While the radio theory behind the technology can be challenging, a basic understanding of wireless networking can be sufficient for small-scale deployment. Numerous security mechanisms are available to wireless technologies, making it practical, scalable, and affordable for healthcare organizations. The decision on the selected security model should take into account the needs for additional server hardware and administrative costs. Where wide area network connections exist between cooperative organizations, deployment of a distributed security model can be considered to reduce administrative overhead. The wireless approach chosen should be dynamic and concentrate on the organization's specific environmental needs. Aspects of organizational mission, operations, service level, and budget allotment as well as an organization's risk tolerance are all part of the balance in the decision to deploy wireless technology.

  15. Adaptive Cross-Layer Distributed Energy-Efficient Resource Allocation Algorithms for Wireless Data Networks

    Directory of Open Access Journals (Sweden)

    Daniela Saturnino

    2008-10-01

    Full Text Available The issue of adaptive and distributed cross-layer resource allocation for energy efficiency in uplink code-division multiple-access (CDMA wireless data networks is addressed. The resource allocation problems are formulated as noncooperative games wherein each terminal seeks to maximize its own energy efficiency, namely, the number of reliably transmitted information symbols per unit of energy used for transmission. The focus of this paper is on the issue of adaptive and distributed implementation of policies arising from this approach, that is, it is assumed that only readily available measurements, such as the received data, are available at the receiver in order to play the considered games. Both single-cell and multicell networks are considered. Stochastic implementations of noncooperative games for power allocation, spreading code allocation, and choice of the uplink (linear receiver are thus proposed, and analytical results describing the convergence properties of selected stochastic algorithms are also given. Extensive simulation results show that, in many instances of practical interest, the proposed stochastic algorithms approach with satisfactory accuracy the performance of nonadaptive games, whose implementation requires much more prior information.

  16. One Kind of Routing Algorithm Modified in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Wei Ni Ni

    2016-01-01

    Full Text Available The wireless sensor networks are the emerging next generation sensor networks, Routing technology is the wireless sensor network communication layer of the core technology. To build reliable paths in wireless sensor networks, we can consider two ways: providing multiple paths utilizing the redundancy to assure the communication reliability or constructing transmission reliability mechanism to assure the reliability of every hop. Braid multipath algorithm and ReInforM routing algorithm are the realizations of these two mechanisms. After the analysis of these two algorithms, this paper proposes a ReInforM routing algorithm based braid multipath routing algorithm.

  17. Development of an Internal Real-Time Wireless Diagnostic Tool for a Proton Exchange Membrane Fuel Cell

    Directory of Open Access Journals (Sweden)

    Chi-Yuan Lee

    2018-01-01

    Full Text Available To prolong the operating time of unmanned aerial vehicles which use proton exchange membrane fuel cells (PEMFC, the performance of PEMFC is the key. However, a long-term operation can make the Pt particles of the catalyst layer and the pollutants in the feedstock gas bond together (e.g., CO, so that the catalyst loses reaction activity. The performance decay and aging of PEMFC will be influenced by operating conditions, temperature, flow and CO concentration. Therefore, this study proposes the development of an internal real-time wireless diagnostic tool for PEMFC, and uses micro-electro-mechanical systems (MEMS technology to develop a wireless and thin (<50 μm flexible integrated (temperature, flow and CO microsensor. The technical advantages are (1 compactness and three wireless measurement functions; (2 elastic measurement position and accurate embedding; (3 high accuracy and sensitivity and quick response; (4 real-time wireless monitoring of dynamic performance of PEMFC; (5 customized design and development. The flexible integrated microsensor is embedded in the PEMFC, three important physical quantities in the PEMFC, which are the temperature, flow and CO, can be measured simultaneously and instantly, so as to obtain the authentic and complete reaction in the PEMFC to enhance the performance of PEMFC and to prolong the service life.

  18. CWSP Certified Wireless Security Professional Official Study Guide, Exam PW0-204

    CERN Document Server

    Coleman, David D; Harkins, Bryan E

    2010-01-01

    Sybex is now the official publisher for Certified Wireless Network Professional, the certifying vendor for the CWSP program. This guide covers all exam objectives, including WLAN discovery techniques, intrusion and attack techniques, 802.11 protocol analysis. Wireless intrusion-prevention systems implementation, layer 2 and 3 VPNs used over 802.11 networks, and managed endpoint security systems. It also covers enterprise/SMB/SOHO/Public-Network Security design models and security solution implementation, building robust security networks, wireless LAN management systems, and much more.

  19. COMPARATIVE ANALYSIS OF LEACH AND HEEMPCP PROTOCOLS FOR WIRELESS SENSOR NETWORKS SYSTEM

    OpenAIRE

    Richa Asstt. Pro.Misha Thakur

    2018-01-01

    In this paper author aims at describing a wireless sensor network. wireless sensor network consisting of spatially distributed autonomous devices using sensor to monitor physical or environmental conditions. Wireless sensor network can be used in wide range of applications including environmental monitoring, habitat monitoring, various military applications, smart home technologiesand agriculture. Wireless sensor networks constitute one of promising application areas of the recently developed...

  20. Estimation of Physical Layer Performance inWSNs Exploiting the Method of Indirect Observations

    Directory of Open Access Journals (Sweden)

    Luigi Atzori

    2012-11-01

    Full Text Available Wireless Sensor Networks (WSNs are used in many industrial and consumer applications that are increasingly gaining impact in our day to day lives. Still great efforts are needed towards the definition of methodologies for their effective management. One big issue is themonitoring of the network status, which requires the definition of the performance indicators and methodologies and should be accurate and not intrusive at the same time. In this paper, we present a new process for the monitoring of the physical layer in WSNs making use of a completely passive methodology. From data sniffed by external nodes, we first estimate the position of the nodes by applying the Weighted Least Squares (WLS to the method of indirect observations. The resulting node positions are then used to estimate the status of the communication links using the most appropriate propagation model. We performed a significant number of measurements on the field in both indoor and outdoor environments. From the experiments, we were able to achieve an accurate estimation of the channel links status with an average error lower than 1 dB, which is around 5 dB lower than the error introduced without the application of the proposed method.

  1. Collaborative communication protocols for wireless sensor networks

    NARCIS (Netherlands)

    Dulman, S.O.; van Hoesel, L.F.W.; Nieberg, T.; Havinga, Paul J.M.

    In this document, the design of communication within a wireless sensor network is discussed. The resource limitations of such a network, especially in terms of energy, require an integrated approach for all (traditional) layers of communication. We present such an integrated, collaborative approach

  2. Recent development in wireless sensor and ad-hoc networks

    CERN Document Server

    Li, Xiaolong; Yang, Yeon-Mo

    2015-01-01

    Wireless Sensor Network (WSN) consists of numerous physically distributed autonomous devices used for sensing and monitoring the physical and/or environmental conditions. A WSN uses a gateway that provides wireless connectivity to the wired world as well as distributed networks. There are many open problems related to Ad-Hoc networks and its applications. Looking at the expansion of the cellular infrastructure, Ad-Hoc network may be acting as the basis of the 4th generation wireless technology with the new paradigm of ‘anytime, anywhere communications’. To realize this, the real challenge would be the security, authorization and management issues of the large scale WSNs. This book is an edited volume in the broad area of WSNs. The book covers various chapters like Multi-Channel Wireless Sensor Networks, its Coverage, Connectivity as well as Deployment. It covers comparison of various communication protocols and algorithms such as MANNET, ODMRP and ADMR Protocols for Ad hoc Multicasting, Location Based C...

  3. Wireless visual sensor network resource allocation using cross-layer optimization

    Science.gov (United States)

    Bentley, Elizabeth S.; Matyjas, John D.; Medley, Michael J.; Kondi, Lisimachos P.

    2009-01-01

    In this paper, we propose an approach to manage network resources for a Direct Sequence Code Division Multiple Access (DS-CDMA) visual sensor network where nodes monitor scenes with varying levels of motion. It uses cross-layer optimization across the physical layer, the link layer and the application layer. Our technique simultaneously assigns a source coding rate, a channel coding rate, and a power level to all nodes in the network based on one of two criteria that maximize the quality of video of the entire network as a whole, subject to a constraint on the total chip rate. One criterion results in the minimal average end-to-end distortion amongst all nodes, while the other criterion minimizes the maximum distortion of the network. Our approach allows one to determine the capacity of the visual sensor network based on the number of nodes and the quality of video that must be transmitted. For bandwidth-limited applications, one can also determine the minimum bandwidth needed to accommodate a number of nodes with a specific target chip rate. Video captured by a sensor node camera is encoded and decoded using the H.264 video codec by a centralized control unit at the network layer. To reduce the computational complexity of the solution, Universal Rate-Distortion Characteristics (URDCs) are obtained experimentally to relate bit error probabilities to the distortion of corrupted video. Bit error rates are found first by using Viterbi's upper bounds on the bit error probability and second, by simulating nodes transmitting data spread by Total Square Correlation (TSC) codes over a Rayleigh-faded DS-CDMA channel and receiving that data using Auxiliary Vector (AV) filtering.

  4. A Comparison between Different Meta-Heuristic Techniques in Power Allocation for Physical Layer Security

    Directory of Open Access Journals (Sweden)

    N. Okati

    2017-12-01

    Full Text Available Node cooperation can protect wireless networks from eavesdropping by using the physical characteristics of wireless channels rather than cryptographic methods. Allocating the proper amount of power to cooperative nodes is a challenging task. In this paper, we use three cooperative nodes, one as relay to increase throughput at the destination and two friendly jammers to degrade eavesdropper’s link. For this scenario, the secrecy rate function is a non-linear non-convex problem. So, in this case, exact optimization methods can only achieve suboptimal solution. In this paper, we applied different meta-heuristic optimization techniques, like Genetic Algorithm (GA, Partial Swarm Optimization (PSO, Bee Algorithm (BA, Tabu Search (TS, Simulated Annealing (SA and Teaching-Learning-Based Optimization (TLBO. They are compared with each other to obtain solution for power allocation in a wiretap wireless network. Although all these techniques find suboptimal solutions, but they appear superlative to exact optimization methods. Finally, we define a Figure of Merit (FOM as a rule of thumb to determine the best meta-heuristic algorithm. This FOM considers quality of solution, number of required iterations to converge, and CPU time.

  5. Implementation of a Low-Cost Energy and Environment Monitoring System Based on a Hybrid Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Dong Sik Kim

    2017-01-01

    Full Text Available A low-cost hybrid wireless sensor network (WSN that utilizes the 917 MHz band Wireless Smart Utility Network (Wi-SUN and a 447 MHz band narrow bandwidth communication network is implemented for electric metering and room temperature, humidity, and CO2 gas measurements. A mesh network connection that is commonly utilized for the Internet of Things (IoT is used for the Wi-SUN under the Contiki OS, and a star connection is used for the narrow bandwidth network. Both a duty-cycling receiver algorithm and a digitally controlled temperature-compensated crystal oscillator algorithm for frequency reference are implemented at the physical layer of the receiver to accomplish low-power and low-cost wireless sensor node design. A two-level temperature-compensation approach, in which first a fixed third-order curve and then a sample-based first-order curve are applied, is proposed using a conventional AT-cut quartz crystal resonator. The developed WSN is installed in a home and provides reliable data collection with low construction complexity and power consumption.

  6. Regressive Prediction Approach to Vertical Handover in Fourth Generation Wireless Networks

    Directory of Open Access Journals (Sweden)

    Abubakar M. Miyim

    2014-11-01

    Full Text Available The over increasing demand for deployment of wireless access networks has made wireless mobile devices to face so many challenges in choosing the best suitable network from a set of available access networks. Some of the weighty issues in 4G wireless networks are fastness and seamlessness in handover process. This paper therefore, proposes a handover technique based on movement prediction in wireless mobile (WiMAX and LTE-A environment. The technique enables the system to predict signal quality between the UE and Radio Base Stations (RBS/Access Points (APs in two different networks. Prediction is achieved by employing the Markov Decision Process Model (MDPM where the movement of the UE is dynamically estimated and averaged to keep track of the signal strength of mobile users. With the help of the prediction, layer-3 handover activities are able to occur prior to layer-2 handover, and therefore, total handover latency can be reduced. The performances of various handover approaches influenced by different metrics (mobility velocities were evaluated. The results presented demonstrate good accuracy the proposed method was able to achieve in predicting the next signal level by reducing the total handover latency.

  7. Parylene-C passivation and effects on rectennas' wireless power transfer performance

    Science.gov (United States)

    Cooper, Camille; Eldridge, Keisharra; Kim, Min H.; Yoon, Hargsoon; Choi, Sang H.; Song, Kyo D.

    2014-04-01

    In this study, the effect of Parylene-C coated as a passivation layer on various rectennas is investigated in terms of their wireless power transfer performance. A passivation has been used for protection of rectenna circuits and their packaging in order for protection of the circuit elements and electrical insulation. Especially, wireless power receiving rectennas attached on sensors or on moving vehicles such as airship needs proper protection while they are exposed to harsh environment. In this research, a layer of Parylene-C thin film is used for passivation on rectennas and electromagnetic coupling by the coating is assessed by the measurement of receiving power levels. In this research, an electrochemical analysis method will also be introduced to measure the degree of water protection by a Parylene-C layer.

  8. Resource management for multimedia services in high data rate wireless networks

    CERN Document Server

    Zhang, Ruonan; Pan, Jianping

    2017-01-01

    This brief offers a valuable resource on principles of quality-of-service (QoS) provisioning and the related link-layer resource management techniques for high data-rate wireless networks. The primary emphasis is on protocol modeling and analysis. It introduces media access control (MAC) protocols, standards of wireless local area networks (WLANs), wireless personal area networks (WPANs), and wireless body area networks (WBANs), discussing their key technologies, applications, and deployment scenarios. The main analytical approaches and models for performance analysis of the fundamental resource scheduling mechanisms, including the contention-based, reservation-based, and hybrid MAC, are presented. To help readers understand and evaluate system performance, the brief contains a range of simulation results. In addition, a thorough bibliography provides an additional tool. This brief is an essential resource for engineers, researchers, students, and users of wireless networks.

  9. Security Belt for Wireless Implantable Medical Devices.

    Science.gov (United States)

    Kulaç, Selman

    2017-09-19

    In this study, a new protective design compatible with existing non-secure systems was proposed, since it is focused on the secure communication of wireless IMD systems in all transmissions. This new protector is an external wearable device and appears to be a belt fitted around for the patients IMD implanted. However, in order to provide effective full duplex transmissions and physical layer security, some sophisticated transceiver antennas have been placed on the belt. In this approach, beam-focused multi-antennas in optimal positions on the belt are randomly switched when transmissions to the IMD are performed and multi-jammer switching with MRC combining or majority-rule based receiving techniques are applied when transmissions from the IMD are carried out. This approach can also reduce the power consumption of the IMDs and contribute to the prolongation of the IMD's battery life.

  10. NASA Fuel Tank Wireless Power and Signal Study

    Science.gov (United States)

    Merrill, Garrick

    2015-01-01

    Hydro Technologies has developed a custom electronics and mechanical framework for interfacing with off-the-shelf sensors to achieve through barrier sensing solutions. The core project technology relies on Hydro Technologies Wireless Power and Signal Interface (Wi psi) System for transmitting data and power wirelessly using magnetic fields. To accomplish this, Wi psi uses a multi-frequency local magnetic field to produce magnetic fields capable of carrying data and power through almost any material such as metals, seawater, concrete, and air. It will also work through layers of multiple materials.

  11. Intelligent future wireless networks for energy efficiency: overall analysis and standardization activities

    CSIR Research Space (South Africa)

    Kliks, A

    2013-10-01

    Full Text Available solutions supporting sophisticated energy management within each layer of the OSI stack model in the context of wireless networking, as well as the overview of cross-layer energy-efficient applications. All parts of the chapter have adequate references...

  12. A wireless sensor enabled by wireless power.

    Science.gov (United States)

    Lee, Da-Sheng; Liu, Yu-Hong; Lin, Chii-Ruey

    2012-11-22

    Through harvesting energy by wireless charging and delivering data by wireless communication, this study proposes the concept of a wireless sensor enabled by wireless power (WPWS) and reports the fabrication of a prototype for functional tests. One WPWS node consists of wireless power module and sensor module with different chip-type sensors. Its main feature is the dual antenna structure. Following RFID system architecture, a power harvesting antenna was designed to gather power from a standard reader working in the 915 MHz band. Referring to the Modbus protocol, the other wireless communication antenna was integrated on a node to send sensor data in parallel. The dual antenna structure integrates both the advantages of an RFID system and a wireless sensor. Using a standard UHF RFID reader, WPWS can be enabled in a distributed area with a diameter up to 4 m. Working status is similar to that of a passive tag, except that a tag can only be queried statically, while the WPWS can send dynamic data from the sensors. The function is the same as a wireless sensor node. Different WPWSs equipped with temperature and humidity, optical and airflow velocity sensors are tested in this study. All sensors can send back detection data within 8 s. The accuracy is within 8% deviation compared with laboratory equipment. A wireless sensor network enabled by wireless power should be a totally wireless sensor network using WPWS. However, distributed WPWSs only can form a star topology, the simplest topology for constructing a sensor network. Because of shielding effects, it is difficult to apply other complex topologies. Despite this limitation, WPWS still can be used to extend sensor network applications in hazardous environments. Further research is needed to improve WPWS to realize a totally wireless sensor network.

  13. Biomonitoring with Wireless Communications

    Energy Technology Data Exchange (ETDEWEB)

    Budinger, Thomas F.

    2003-03-01

    This review is divided into three sections: technologies for monitoring physiological parameters; biosensors for chemical assays and wireless communications technologies including image transmissions. Applications range from monitoring high risk patients for heart, respiratory activity and falls to sensing levels of physical activity in military, rescue, and sports personnel. The range of measurements include, heart rate, pulse wave form, respiratory rate, blood oxygen, tissue pCO2, exhaled carbon dioxide and physical activity. Other feasible measurements will employ miniature chemical laboratories on silicon or plastic chips. The measurements can be extended to clinical chemical assays ranging from common blood assays to protein or specialized protein measurements (e.g., troponin, creatine, and cytokines such as TNF and IL6). Though the feasibility of using wireless technology to communicate vital signs has been demonstrated 32 years ago (1) it has been only recently that practical and portable devices and communications net works have become generally available for inexpensive deployment of comfortable and affordable devices and systems.

  14. How to model wireless mesh networks topology

    International Nuclear Information System (INIS)

    Sanni, M L; Hashim, A A; Anwar, F; Ali, S; Ahmed, G S M

    2013-01-01

    The specification of network connectivity model or topology is the beginning of design and analysis in Computer Network researches. Wireless Mesh Networks is an autonomic network that is dynamically self-organised, self-configured while the mesh nodes establish automatic connectivity with the adjacent nodes in the relay network of wireless backbone routers. Researches in Wireless Mesh Networks range from node deployment to internetworking issues with sensor, Internet and cellular networks. These researches require modelling of relationships and interactions among nodes including technical characteristics of the links while satisfying the architectural requirements of the physical network. However, the existing topology generators model geographic topologies which constitute different architectures, thus may not be suitable in Wireless Mesh Networks scenarios. The existing methods of topology generation are explored, analysed and parameters for their characterisation are identified. Furthermore, an algorithm for the design of Wireless Mesh Networks topology based on square grid model is proposed in this paper. The performance of the topology generated is also evaluated. This research is particularly important in the generation of a close-to-real topology for ensuring relevance of design to the intended network and validity of results obtained in Wireless Mesh Networks researches

  15. ENERGY OPTIMIZATION IN CLUSTER BASED WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    T. SHANKAR

    2014-04-01

    Full Text Available Wireless sensor networks (WSN are made up of sensor nodes which are usually battery-operated devices, and hence energy saving of sensor nodes is a major design issue. To prolong the networks lifetime, minimization of energy consumption should be implemented at all layers of the network protocol stack starting from the physical to the application layer including cross-layer optimization. Optimizing energy consumption is the main concern for designing and planning the operation of the WSN. Clustering technique is one of the methods utilized to extend lifetime of the network by applying data aggregation and balancing energy consumption among sensor nodes of the network. This paper proposed new version of Low Energy Adaptive Clustering Hierarchy (LEACH, protocols called Advanced Optimized Low Energy Adaptive Clustering Hierarchy (AOLEACH, Optimal Deterministic Low Energy Adaptive Clustering Hierarchy (ODLEACH, and Varying Probability Distance Low Energy Adaptive Clustering Hierarchy (VPDL combination with Shuffled Frog Leap Algorithm (SFLA that enables selecting best optimal adaptive cluster heads using improved threshold energy distribution compared to LEACH protocol and rotating cluster head position for uniform energy dissipation based on energy levels. The proposed algorithm optimizing the life time of the network by increasing the first node death (FND time and number of alive nodes, thereby increasing the life time of the network.

  16. Emulating Wired Backhaul with Wireless Network Coding

    DEFF Research Database (Denmark)

    Thomsen, Henning; De Carvalho, Elisabeth; Popovski, Petar

    2014-01-01

    In this paper we address the need for wireless network densification. We propose a solution wherein the wired backhaul employed in heterogeneous cellular networks is replaced with wireless links, while maintaining the rate requirements of the uplink and downlink traffic of each user. The first...... of the two-way protocol. The transmit power is set high enough to enable successive decoding at the small cell base station where the downlink data to the user is first decoded and its contribution removed from the received signal followed by the uplink data from the user. The decoding of the second layer......, the uplink traffic to the user, remains identical to the one performed in a wired system. In the broadcast phase, the decoding of the downlink traffic can also be guaranteed to remain identical. Hence, our solution claims an emulation of a wired backhaul with wireless network coding with same performance. We...

  17. Advanced Signal Processing for Wireless Multimedia Communications

    Directory of Open Access Journals (Sweden)

    Xiaodong Wang

    2000-01-01

    Full Text Available There is at present a worldwide effort to develop next-generation wireless communication systems. It is envisioned that many of the future wireless systems will incorporate considerable signal-processing intelligence in order to provide advanced services such as multimedia transmission. In general, wireless channels can be very hostile media through which to communicate, due to substantial physical impediments, primarily radio-frequency interference and time-arying nature of the channel. The need of providing universal wireless access at high data-rate (which is the aim of many merging wireless applications presents a major technical challenge, and meeting this challenge necessitates the development of advanced signal processing techniques for multiple-access communications in non-stationary interference-rich environments. In this paper, we present some key advanced signal processing methodologies that have been developed in recent years for interference suppression in wireless networks. We will focus primarily on the problem of jointly suppressing multiple-access interference (MAI and intersymbol interference (ISI, which are the limiting sources of interference for the high data-rate wireless systems being proposed for many emerging application areas, such as wireless multimedia. We first present a signal subspace approach to blind joint suppression of MAI and ISI. We then discuss a powerful iterative technique for joint interference suppression and decoding, so-called Turbo multiuser detection, that is especially useful for wireless multimedia packet communications. We also discuss space-time processing methods that employ multiple antennas for interference rejection and signal enhancement. Finally, we touch briefly on the problems of suppressing narrowband interference and impulsive ambient noise, two other sources of radio-frequency interference present in wireless multimedia networks.

  18. Novel Methodology for Functional Modeling and Simulation of Wireless Embedded Systems

    Directory of Open Access Journals (Sweden)

    Sosa Morales Emma

    2008-01-01

    Full Text Available Abstract A novel methodology is presented for the modeling and the simulation of wireless embedded systems. Tight interaction between the analog and the digital functionality makes the design and verification of such systems a real challenge. The applied methodology brings together the functional models of the baseband algorithms written in C language with the circuit descriptions at behavioral level in Verilog or Verilog-AMS for the system simulations in a single kernel environment. The physical layer of an ultrawideband system has been successfully modeled and simulated. The results confirm that this methodology provides a standardized framework in order to efficiently and accurately simulate complex mixed signal applications for embedded systems.

  19. Secure physical layer using dynamic permutations in cognitive OFDMA systems

    DEFF Research Database (Denmark)

    Meucci, F.; Wardana, Satya Ardhy; Prasad, Neeli R.

    2009-01-01

    This paper proposes a novel lightweight mechanism for a secure Physical (PHY) layer in Cognitive Radio Network (CRN) using Orthogonal Frequency Division Multiplexing (OFDM). User's data symbols are mapped over the physical subcarriers with a permutation formula. The PHY layer is secured...... with a random and dynamic subcarrier permutation which is based on a single pre-shared information and depends on Dynamic Spectrum Access (DSA). The dynamic subcarrier permutation is varying over time, geographical location and environment status, resulting in a very robust protection that ensures...... confidentiality. The method is shown to be effective also for existing non-cognitive systems. The proposed mechanism is effective against eavesdropping even if the eavesdropper adopts a long-time patterns analysis, thus protecting cryptography techniques of higher layers. The correlation properties...

  20. Integer-linear-programing optimization in scalable video multicast with adaptive modulation and coding in wireless networks.

    Science.gov (United States)

    Lee, Dongyul; Lee, Chaewoo

    2014-01-01

    The advancement in wideband wireless network supports real time services such as IPTV and live video streaming. However, because of the sharing nature of the wireless medium, efficient resource allocation has been studied to achieve a high level of acceptability and proliferation of wireless multimedia. Scalable video coding (SVC) with adaptive modulation and coding (AMC) provides an excellent solution for wireless video streaming. By assigning different modulation and coding schemes (MCSs) to video layers, SVC can provide good video quality to users in good channel conditions and also basic video quality to users in bad channel conditions. For optimal resource allocation, a key issue in applying SVC in the wireless multicast service is how to assign MCSs and the time resources to each SVC layer in the heterogeneous channel condition. We formulate this problem with integer linear programming (ILP) and provide numerical results to show the performance under 802.16 m environment. The result shows that our methodology enhances the overall system throughput compared to an existing algorithm.

  1. Integer-Linear-Programing Optimization in Scalable Video Multicast with Adaptive Modulation and Coding in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Dongyul Lee

    2014-01-01

    Full Text Available The advancement in wideband wireless network supports real time services such as IPTV and live video streaming. However, because of the sharing nature of the wireless medium, efficient resource allocation has been studied to achieve a high level of acceptability and proliferation of wireless multimedia. Scalable video coding (SVC with adaptive modulation and coding (AMC provides an excellent solution for wireless video streaming. By assigning different modulation and coding schemes (MCSs to video layers, SVC can provide good video quality to users in good channel conditions and also basic video quality to users in bad channel conditions. For optimal resource allocation, a key issue in applying SVC in the wireless multicast service is how to assign MCSs and the time resources to each SVC layer in the heterogeneous channel condition. We formulate this problem with integer linear programming (ILP and provide numerical results to show the performance under 802.16 m environment. The result shows that our methodology enhances the overall system throughput compared to an existing algorithm.

  2. User Needs and Advances in Space Wireless Sensing and Communications

    Science.gov (United States)

    Kegege, Obadiah

    2017-01-01

    Decades of space exploration and technology trends for future missions show the need for new approaches in space/planetary sensor networks, observatories, internetworking, and communications/data delivery to Earth. The User Needs to be discussed in this talk includes interviews with several scientists and reviews of mission concepts for the next generation of sensors, observatories, and planetary surface missions. These observatories, sensors are envisioned to operate in extreme environments, with advanced autonomy, whereby sometimes communication to Earth is intermittent and delayed. These sensor nodes require software defined networking capabilities in order to learn and adapt to the environment, collect science data, internetwork, and communicate. Also, some user cases require the level of intelligence to manage network functions (either as a host), mobility, security, and interface data to the physical radio/optical layer. For instance, on a planetary surface, autonomous sensor nodes would create their own ad-hoc network, with some nodes handling communication capabilities between the wireless sensor networks and orbiting relay satellites. A section of this talk will cover the advances in space communication and internetworking to support future space missions. NASA's Space Communications and Navigation (SCaN) program continues to evolve with the development of optical communication, a new vision of the integrated network architecture with more capabilities, and the adoption of CCSDS space internetworking protocols. Advances in wireless communications hardware and electronics have enabled software defined networking (DVB-S2, VCM, ACM, DTN, Ad hoc, etc.) protocols for improved wireless communication and network management. Developing technologies to fulfil these user needs for wireless communications and adoption of standardized communication/internetworking protocols will be a huge benefit to future planetary missions, space observatories, and manned missions

  3. Layer-component-based communication stack framework for wireless residential control systems

    DEFF Research Database (Denmark)

    Torbensen, R.; Hjorth, Theis S.

    2011-01-01

    on a common IP infrastructure, regardless of individual wireless technology. Legacy home automation devices are also supported. A prototype has been implemented on multiple resource-constrained hardware platforms, to demonstrate that the solution is both feasible for low-cost devices and portable. It has been...

  4. Layer-component-based communication stack framework for wireless residential control systems

    DEFF Research Database (Denmark)

    Torbensen, Rune; Hjorth, Theis

    2010-01-01

    on a common IP infrastructure, regardless of individual wireless technology. Legacy home automation devices are also supported. A prototype has been implemented on multiple resource-constrained hardware platforms, to demonstrate that the solution is both feasible for low-cost devices and portable. It has been...

  5. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  6. Sub-Transport Layer Coding

    DEFF Research Database (Denmark)

    Hansen, Jonas; Krigslund, Jeppe; Roetter, Daniel Enrique Lucani

    2014-01-01

    Packet losses in wireless networks dramatically curbs the performance of TCP. This paper introduces a simple coding shim that aids IP-layer traffic in lossy environments while being transparent to transport layer protocols. The proposed coding approach enables erasure correction while being...... oblivious to the congestion control algorithms of the utilised transport layer protocol. Although our coding shim is indifferent towards the transport layer protocol, we focus on the performance of TCP when ran on top of our proposed coding mechanism due to its widespread use. The coding shim provides gains...

  7. Wireless Information-Theoretic Security in an Outdoor Topology with Obstacles: Theoretical Analysis and Experimental Measurements

    Directory of Open Access Journals (Sweden)

    Dagiuklas Tasos

    2011-01-01

    Full Text Available This paper presents a Wireless Information-Theoretic Security (WITS scheme, which has been recently introduced as a robust physical layer-based security solution, especially for infrastructureless networks. An autonomic network of moving users was implemented via 802.11n nodes of an ad hoc network for an outdoor topology with obstacles. Obstructed-Line-of-Sight (OLOS and Non-Line-of-Sight (NLOS propagation scenarios were examined. Low-speed user movement was considered, so that Doppler spread could be discarded. A transmitter and a legitimate receiver exchanged information in the presence of a moving eavesdropper. Average Signal-to-Noise Ratio (SNR values were acquired for both the main and the wiretap channel, and the Probability of Nonzero Secrecy Capacity was calculated based on theoretical formula. Experimental results validate theoretical findings stressing the importance of user location and mobility schemes on the robustness of Wireless Information-Theoretic Security and call for further theoretical analysis.

  8. Analyzing energy consumption of wireless networks. A model-based approach

    Energy Technology Data Exchange (ETDEWEB)

    Yue, Haidi

    2013-03-04

    During the last decades, wireless networking has been continuously a hot topic both in academy and in industry. Many different wireless networks have been introduced like wireless local area networks, wireless personal networks, wireless ad hoc networks, and wireless sensor networks. If these networks want to have a long term usability, the power consumed by the wireless devices in each of these networks needs to be managed efficiently. Hence, a lot of effort has been carried out for the analysis and improvement of energy efficiency, either for a specific network layer (protocol), or new cross-layer designs. In this thesis, we apply model-based approach for the analysis of energy consumption of different wireless protocols. The protocols under consideration are: one leader election protocol, one routing protocol, and two medium access control protocols. By model-based approach we mean that all these four protocols are formalized as some formal models, more precisely, as discrete-time Markov chains (DTMCs), Markov decision processes (MDPs), or stochastic timed automata (STA). For the first two models, DTMCs and MDPs, we model them in PRISM, a prominent model checker for probabilistic model checking, and apply model checking technique to analyze them. Model checking belongs to the family of formal methods. It discovers exhaustively all possible (reachable) states of the models, and checks whether these models meet a given specification. Specifications are system properties that we want to study, usually expressed by some logics, for instance, probabilistic computer tree logic (PCTL). However, while model checking relies on rigorous mathematical foundations and automatically explores the entire state space of a model, its applicability is also limited by the so-called state space explosion problem -- even systems of moderate size often yield models with an exponentially larger state space that thwart their analysis. Hence for the STA models in this thesis, since there

  9. Liquid-crystal intraocular adaptive lens with wireless control

    NARCIS (Netherlands)

    Simonov, A.N.; Vdovine, G.V.; Loktev, M.

    2007-01-01

    We present a prototype of an adaptive intraocular lens based on a modal liquid-crystal spatial phase modulator with wireless control. The modal corrector consists of a nematic liquid-crystal layer sandwiched between two glass substrates with transparent low- and high-ohmic electrodes, respectively.

  10. Data aggregation in wireless sensor networks using the SOAP protocol

    International Nuclear Information System (INIS)

    Al-Yasiri, A; Sunley, A

    2007-01-01

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks

  11. Data aggregation in wireless sensor networks using the SOAP protocol

    Energy Technology Data Exchange (ETDEWEB)

    Al-Yasiri, A; Sunley, A [School of Computing, Science and Engineering, University of Salford, Greater Manchester, M5 4WT (United Kingdom)

    2007-07-15

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks.

  12. Quality-of-service sensitivity to bio-inspired/evolutionary computational methods for intrusion detection in wireless ad hoc multimedia sensor networks

    Science.gov (United States)

    Hortos, William S.

    2012-06-01

    In the author's previous work, a cross-layer protocol approach to wireless sensor network (WSN) intrusion detection an identification is created with multiple bio-inspired/evolutionary computational methods applied to the functions of the protocol layers, a single method to each layer, to improve the intrusion-detection performance of the protocol over that of one method applied to only a single layer's functions. The WSN cross-layer protocol design embeds GAs, anti-phase synchronization, ACO, and a trust model based on quantized data reputation at the physical, MAC, network, and application layer, respectively. The construct neglects to assess the net effect of the combined bioinspired methods on the quality-of-service (QoS) performance for "normal" data streams, that is, streams without intrusions. Analytic expressions of throughput, delay, and jitter, coupled with simulation results for WSNs free of intrusion attacks, are the basis for sensitivity analyses of QoS metrics for normal traffic to the bio-inspired methods.

  13. Optical wireless connected objects for healthcare.

    Science.gov (United States)

    Toumieux, Pascal; Chevalier, Ludovic; Sahuguède, Stéphanie; Julien-Vergonjanne, Anne

    2015-10-01

    In this Letter the authors explore the communication capabilities of optical wireless technology for a wearable device dedicated to healthcare application. In an indoor environment sensible to electromagnetic perturbations such as a hospital, the use of optical wireless links can permit reducing the amount of radio frequencies in the patient environment. Moreover, this technology presents the advantage to be secure, low-cost and easy to deploy. On the basis of commercially available components, a custom-made wearable device is presented, which allows optical wireless transmission of accelerometer data in the context of physical activity supervision of post-stroke patients in hospital. Considering patient mobility, the experimental performance is established in terms of packet loss as a function of the number of receivers fixed to the ceiling. The results permit to conclude that optical wireless links can be used to perform such mobile remote monitoring applications. Moreover, based on the measurements obtained with one receiver, it is possible to theoretically determine the performance according to the number of receivers to be deployed.

  14. Experimental validation of wireless communication with chaos

    International Nuclear Information System (INIS)

    Ren, Hai-Peng; Bai, Chao; Liu, Jian; Baptista, Murilo S.; Grebogi, Celso

    2016-01-01

    The constraints of a wireless physical media, such as multi-path propagation and complex ambient noises, prevent information from being communicated at low bit error rate. Surprisingly, it has only recently been shown that, from a theoretical perspective, chaotic signals are optimal for communication. It maximises the receiver signal-to-noise performance, consequently minimizing the bit error rate. This work demonstrates numerically and experimentally that chaotic systems can in fact be used to create a reliable and efficient wireless communication system. Toward this goal, we propose an impulsive control method to generate chaotic wave signals that encode arbitrary binary information signals and an integration logic together with the match filter capable of decreasing the noise effect over a wireless channel. The experimental validation is conducted by inputting the signals generated by an electronic transmitting circuit to an electronic circuit that emulates a wireless channel, where the signals travel along three different paths. The output signal is decoded by an electronic receiver, after passing through a match filter.

  15. Experimental validation of wireless communication with chaos

    Energy Technology Data Exchange (ETDEWEB)

    Ren, Hai-Peng; Bai, Chao; Liu, Jian [Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing, Xian University of Technology, Xian 710048 (China); Baptista, Murilo S.; Grebogi, Celso [Institute for Complex System and Mathematical Biology, SUPA, University of Aberdeen, Aberdeen AB24 3UE (United Kingdom)

    2016-08-15

    The constraints of a wireless physical media, such as multi-path propagation and complex ambient noises, prevent information from being communicated at low bit error rate. Surprisingly, it has only recently been shown that, from a theoretical perspective, chaotic signals are optimal for communication. It maximises the receiver signal-to-noise performance, consequently minimizing the bit error rate. This work demonstrates numerically and experimentally that chaotic systems can in fact be used to create a reliable and efficient wireless communication system. Toward this goal, we propose an impulsive control method to generate chaotic wave signals that encode arbitrary binary information signals and an integration logic together with the match filter capable of decreasing the noise effect over a wireless channel. The experimental validation is conducted by inputting the signals generated by an electronic transmitting circuit to an electronic circuit that emulates a wireless channel, where the signals travel along three different paths. The output signal is decoded by an electronic receiver, after passing through a match filter.

  16. Experimental validation of wireless communication with chaos.

    Science.gov (United States)

    Ren, Hai-Peng; Bai, Chao; Liu, Jian; Baptista, Murilo S; Grebogi, Celso

    2016-08-01

    The constraints of a wireless physical media, such as multi-path propagation and complex ambient noises, prevent information from being communicated at low bit error rate. Surprisingly, it has only recently been shown that, from a theoretical perspective, chaotic signals are optimal for communication. It maximises the receiver signal-to-noise performance, consequently minimizing the bit error rate. This work demonstrates numerically and experimentally that chaotic systems can in fact be used to create a reliable and efficient wireless communication system. Toward this goal, we propose an impulsive control method to generate chaotic wave signals that encode arbitrary binary information signals and an integration logic together with the match filter capable of decreasing the noise effect over a wireless channel. The experimental validation is conducted by inputting the signals generated by an electronic transmitting circuit to an electronic circuit that emulates a wireless channel, where the signals travel along three different paths. The output signal is decoded by an electronic receiver, after passing through a match filter.

  17. Broadcast of four HD videos with LED ceiling lighting: optical-wireless MAC

    Science.gov (United States)

    Bouchet, Olivier; Porcon, Pascal; Gueutier, Eric

    2011-09-01

    The European project "hOME Gigabit Access Network" (OMEGA) targeted various wireless and wired solutions for 1 Gbit/s connectivity in Home Area Networks (HANs). One objective was to evaluate the suitability of optical wireless technologies in two spectral regions: visible light (visible-light communications - VLC) and near infrared (infrared communications - IRC). Several demonstrators have been built, all of them largely relying on overthe- shelf components. The demonstrators included a "wide-area" VLC broadcast link based on LED ceiling lighting and a laser-based high-data-rate "wide-area" IRC prototype. In this paper we discuss an adapted optical-wireless media-access-control (OWMAC) sublayer, which was developed and implemented during the project. It is suitable for both IRC and VLC. The VLC prototype is based on DMT signal processing and provides broadcasting at { 100 Mbit/s over an area of approximately 5 m2. The IRC prototype provides {300 Mbit/s half-duplex communication over an area of approximately 30 m2. The IRC mesh network, composed of one base station and two terminals, is based on OOK modulation, multi-sector transceivers, and an ultra-fast sector switch. After a brief discussion about the design of the optical-wireless data link layer and the optical-wireless switch (OWS) card, we address the card development and implementation. We also present applications for the VLC and IRC prototypes and measurement results regarding the MAC layer.

  18. Development of an Internal Real-Time Wireless Diagnostic Tool for a Proton Exchange Membrane Fuel Cell.

    Science.gov (United States)

    Lee, Chi-Yuan; Chen, Chia-Hung; Tsai, Chao-Hsuan; Wang, Yu-Syuan

    2018-01-13

    To prolong the operating time of unmanned aerial vehicles which use proton exchange membrane fuel cells (PEMFC), the performance of PEMFC is the key. However, a long-term operation can make the Pt particles of the catalyst layer and the pollutants in the feedstock gas bond together (e.g., CO), so that the catalyst loses reaction activity. The performance decay and aging of PEMFC will be influenced by operating conditions, temperature, flow and CO concentration. Therefore, this study proposes the development of an internal real-time wireless diagnostic tool for PEMFC, and uses micro-electro-mechanical systems (MEMS) technology to develop a wireless and thin (PEMFC; (5) customized design and development. The flexible integrated microsensor is embedded in the PEMFC, three important physical quantities in the PEMFC, which are the temperature, flow and CO, can be measured simultaneously and instantly, so as to obtain the authentic and complete reaction in the PEMFC to enhance the performance of PEMFC and to prolong the service life.

  19. TULIP: A Link-Level Protocol for Improving TCP over Wireless Links

    National Research Council Canada - National Science Library

    Parsa, Christina; Garcia-Luna-Aceves, J. J

    1999-01-01

    We present the transport unaware link improvement protocol (TULIP), which dramatically improves the performance of TCP over lossy wireless links, without competing with or modifying the transport- or network-layer protocols...

  20. Metglas-Elgiloy bi-layer, stent cell resonators for wireless monitoring of viscosity and mass loading

    KAUST Repository

    Viswanath, Anupam; Green, Scott Ryan; Kosel, Jü rgen; Gianchandani, Yogesh B.

    2012-01-01

    This paper presents the design and evaluation of magnetoelastic sensors intended for wireless monitoring of tissue accumulation in peripheral artery stents. The sensors are fabricated from 28 μm thick foils of magnetoelastic 2826MB Metglas™, an amorphous Ni-Fe alloy. The sensor layer consists of a frame and an active resonator portion. The frame consists of 150 μm wide struts that are patterned in the same wishbone array pattern as a 12 mm × 1.46 mm Elgiloy stent cell. The active portion is a 10 mm long symmetric leaf shape and is anchored to the frame at mid length. The active portion nests within the stent cell, with a uniform gap separating the two. A gold-indium eutectic bonding process is used to bond Metglas™ and Elgiloy foils, which are subsequently patterned to form bi-layer resonators. The response of the sensor to viscosity changes and mass loading that precede and accompany artery occlusion is tested in vitro. The typical sensitivity to viscosity of the fundamental, longitudinal resonant frequency at 361 kHz is 427 ppm cP -1 over a 1.1-8.6 cP range. The sensitivity to mass loading is typically between 63000 and 65000 ppm mg-1 with the resonant frequency showing a reduction of 8.1% for an applied mass that is 15% of the unloaded mass of the sensor. This is in good agreement with the theoretical response. © 2013 IOP Publishing Ltd.

  1. Metglas-Elgiloy bi-layer, stent cell resonators for wireless monitoring of viscosity and mass loading

    KAUST Repository

    Viswanath, Anupam

    2012-12-21

    This paper presents the design and evaluation of magnetoelastic sensors intended for wireless monitoring of tissue accumulation in peripheral artery stents. The sensors are fabricated from 28 μm thick foils of magnetoelastic 2826MB Metglas™, an amorphous Ni-Fe alloy. The sensor layer consists of a frame and an active resonator portion. The frame consists of 150 μm wide struts that are patterned in the same wishbone array pattern as a 12 mm × 1.46 mm Elgiloy stent cell. The active portion is a 10 mm long symmetric leaf shape and is anchored to the frame at mid length. The active portion nests within the stent cell, with a uniform gap separating the two. A gold-indium eutectic bonding process is used to bond Metglas™ and Elgiloy foils, which are subsequently patterned to form bi-layer resonators. The response of the sensor to viscosity changes and mass loading that precede and accompany artery occlusion is tested in vitro. The typical sensitivity to viscosity of the fundamental, longitudinal resonant frequency at 361 kHz is 427 ppm cP -1 over a 1.1-8.6 cP range. The sensitivity to mass loading is typically between 63000 and 65000 ppm mg-1 with the resonant frequency showing a reduction of 8.1% for an applied mass that is 15% of the unloaded mass of the sensor. This is in good agreement with the theoretical response. © 2013 IOP Publishing Ltd.

  2. Passive Classification of Wireless NICs during Rate Switching

    OpenAIRE

    Beyah RaheemA; Copeland JohnA; Corbett CheritaL

    2008-01-01

    Abstract Computer networks have become increasingly ubiquitous. However, with the increase in networked applications, there has also been an increase in difficulty to manage and secure these networks. The proliferation of 802.11 wireless networks has heightened this problem by extending networks beyond physical boundaries. We propose the use of spectral analysis to identify the type of wireless network interface card (NIC). This mechanism can be applied to support the detection of unauthorize...

  3. Investigating Wireless Power Transfer

    Science.gov (United States)

    St. John, Stuart A.

    2017-01-01

    Understanding Physics is a great end in itself, but is also crucial to keep pace with developments in modern technology. Wireless power transfer, known to many only as a means to charge electric toothbrushes, will soon be commonplace in charging phones, electric cars and implanted medical devices. This article outlines how to produce and use a…

  4. Elastomeric Sensing of Pressure with Liquid Metal and Wireless Inductive Coupling

    Science.gov (United States)

    Dick, Jacob; Zou, Xiyue; Hogan, Ben; Tumalle, Jonathan; Etikyala, Sowmith; Fung, Diego; Charles, Watley; Gu, Tianye; Hull, Patrick V.; Mazzeo, Aaron D.

    2017-01-01

    This project describes resistance-based soft sensors filled with liquid metal, which permit measurements of large strains (0 percent to 110 percent), associated with small forces of less than 30 Newtons. This work also demonstrates a methodology for wireless transfer of these strain measurements without connected electrodes. These sensors allow intermittent detection of pressure on soft membranes with low force. Adapting these sensors for passive wireless pressure sensing will eliminate the need for embedded batteries, and will allow the sensors to transmit pressure data through non-conductive materials including glass and acrylic. The absence of batteries allows us to embed these sensors into materials for long-term use because the sensors only use passive analog circuit elements. We found the oxidation of the liquid metal (eutectic gallium indium) plays a role in the repeatability of the soft sensors. We investigated how the oxidation layer affected the behavior of the sensor by encapsulating materials (silicone, fluorosilicone, and PVC) with varied permeabilities to oxygen. We measured the effects of mechanical loading on the oxidation layer and the effects of wireless inductive coupling on the oxidation layer. We concluded our research by investigating the effects of embedding self-resonant circuits into polydimethylsiloxane (PDMS). Efforts to design engineered systems with soft materials are a growing field with progress in soft robotics, epidermal electronics, and wearable electronics. In the field of soft robotics, PDMS-based grippers are capable of picking up delicate objects because their form-fitting properties allow them to conform to the shape of objects more easily than conventional robotic grippers. Epidermal devices also use PDMS as a substrate to hold electronic components such as radios, sensors, and power supply circuits. Additionally, PDMS-based soft sensors can monitor human motion with liquid metal embedded within micro-channels. Passive

  5. An empirical evaluation of bufferbloat in IEEE 802.11n wireless networks

    KAUST Repository

    Showail, Ahmad; Jamshaid, Kamran; Shihada, Basem

    2014-01-01

    In this paper, we analyze the impact of large, persistently-full buffers (`bufferbloat') on various network dynamics in IEEE 802.11n wireless networks. Bufferbloat has mostly been studied in the context of wired networks. We study the impact of bufferbloat on a variety of wireless network topologies, including wireless LAN (WLAN) and multi-hop wireless networks. Our results show that a single FTP transfer between two Linux wireless hosts can saturate the buffers in the network stack, leading to RTT delays exceeding 4.5 s in multi-hop configurations. We show that well-designed Aggregate MAC Protocol Data Unit (A-MPDU) MAC-layer frame aggregation can reduce RTT delays while simultaneously increasing network throughput. However, additional measures may still be required to meet the constraints of real-time flows (such as VoIP). Our experiments show that large buffers can deteriorate the fairness in rate allocation in parking lot based multi-hop networks.

  6. An empirical evaluation of bufferbloat in IEEE 802.11n wireless networks

    KAUST Repository

    Showail, Ahmad

    2014-04-06

    In this paper, we analyze the impact of large, persistently-full buffers (`bufferbloat\\') on various network dynamics in IEEE 802.11n wireless networks. Bufferbloat has mostly been studied in the context of wired networks. We study the impact of bufferbloat on a variety of wireless network topologies, including wireless LAN (WLAN) and multi-hop wireless networks. Our results show that a single FTP transfer between two Linux wireless hosts can saturate the buffers in the network stack, leading to RTT delays exceeding 4.5 s in multi-hop configurations. We show that well-designed Aggregate MAC Protocol Data Unit (A-MPDU) MAC-layer frame aggregation can reduce RTT delays while simultaneously increasing network throughput. However, additional measures may still be required to meet the constraints of real-time flows (such as VoIP). Our experiments show that large buffers can deteriorate the fairness in rate allocation in parking lot based multi-hop networks.

  7. Energy-aware Wireless Multi-hop Networks

    NARCIS (Netherlands)

    Vazifehdan, J.

    2011-01-01

    Wireless networks have provided us a variety of services which facilitate communication between people beyond the physical boundaries. Mobile telephony, mobile Internet and high-deffnition video calls are examples of services supported by modern networks nowadays. Beyond this, enhancements in

  8. Information processing and routing in wireless sensor networks

    CERN Document Server

    Yu, Yang; Krishnamachari, Bhaskar

    2006-01-01

    This book presents state-of-the-art cross-layer optimization techniques for energy-efficient information processing and routing in wireless sensor networks. Besides providing a survey on this important research area, three specific topics are discussed in detail - information processing in a collocated cluster, information transport over a tree substrate, and information routing for computationally intensive applications. The book covers several important system knobs for cross-layer optimization, including voltage scaling, rate adaptation, and tunable compression. By exploring tradeoffs of en

  9. Securing the communication of medical information using local biometric authentication and commercial wireless links.

    Science.gov (United States)

    Ivanov, Vladimir I; Yu, Paul L; Baras, John S

    2010-09-01

    Medical information is extremely sensitive in nature - a compromise, such as eavesdropping or tampering by a malicious third party, may result in identity theft, incorrect diagnosis and treatment, and even death. Therefore, it is important to secure the transfer of medical information from the patient to the recording system. We consider a portable, wireless device transferring medical information to a remote server. We decompose this problem into two sub-problems and propose security solutions to each of them: (1) to secure the link between the patient and the portable device, and (2) to secure the link between the portable device and the network. Thus we push the limits of the network security to the edge by authenticating the user using their biometric information; authenticating the device to the network at the physical layer; and strengthening the security of the wireless link with a key exchange mechanism. The proposed authentication methods can be used for recording the readings of medical data in a central database and for accessing medical records in various settings.

  10. Design of a hybrid (wired/wireless) acquisition data system for monitoring of cultural heritage physical parameters in Smart Cities.

    Science.gov (United States)

    García Diego, Fernando-Juan; Esteban, Borja; Merello, Paloma

    2015-03-25

    Preventive conservation represents a working method and combination of techniques which helps in determining and controlling the deterioration process of cultural heritage in order to take the necessary actions before it occurs. It is acknowledged as important, both in terms of preserving and also reducing the cost of future conservation measures. Therefore, long-term monitoring of physical parameters influencing cultural heritage is necessary. In the context of Smart Cities, monitoring of cultural heritage is of interest in order to perform future comparative studies and load information into the cloud that will be useful for the conservation of other heritage sites. In this paper the development of an economical and appropriate acquisition data system combining wired and wireless communication, as well as third party hardware for increased versatility, is presented. The device allows monitoring a complex network of points with high sampling frequency, with wired sensors in a 1-wire bus and a wireless centralized system recording data for monitoring of physical parameters, as well as the future possibility of attaching an alarm system or sending data over the Internet. This has been possible with the development of three board's designs and more than 5000 algorithm lines. System tests have shown an adequate system operation.

  11. Wireless Monitoring of Induction Machine Rotor Physical Variables

    Directory of Open Access Journals (Sweden)

    Jefferson Doolan Fernandes

    2017-11-01

    Full Text Available With the widespread use of electric machines, there is a growing need to extract information from the machines to improve their control systems and maintenance management. The present work shows the development of an embedded system to perform the monitoring of the rotor physical variables of a squirrel cage induction motor. The system is comprised of: a circuit to acquire desirable rotor variable(s and value(s that send it to the computer; a rectifier and power storage circuit that converts an alternating current in a continuous current but also stores energy for a certain amount of time to wait for the motor’s shutdown; and a magnetic generator that harvests energy from the rotating field to power the circuits mentioned above. The embedded system is set on the rotor of a 5 HP squirrel cage induction motor, making it difficult to power the system because it is rotating. This problem can be solved with the construction of a magnetic generator device to avoid the need of using batteries or collector rings and will send data to the computer using a wireless NRF24L01 module. For the proposed system, initial validation tests were made using a temperature sensor (DS18b20, as this variable is known as the most important when identifying the need for maintenance and control systems. Few tests have shown promising results that, with further improvements, can prove the feasibility of using sensors in the rotor.

  12. Wireless Monitoring of Induction Machine Rotor Physical Variables.

    Science.gov (United States)

    Doolan Fernandes, Jefferson; Carvalho Souza, Francisco Elvis; Cipriano Maniçoba, Glauco George; Salazar, Andrés Ortiz; de Paiva, José Alvaro

    2017-11-18

    With the widespread use of electric machines, there is a growing need to extract information from the machines to improve their control systems and maintenance management. The present work shows the development of an embedded system to perform the monitoring of the rotor physical variables of a squirrel cage induction motor. The system is comprised of: a circuit to acquire desirable rotor variable(s) and value(s) that send it to the computer; a rectifier and power storage circuit that converts an alternating current in a continuous current but also stores energy for a certain amount of time to wait for the motor's shutdown; and a magnetic generator that harvests energy from the rotating field to power the circuits mentioned above. The embedded system is set on the rotor of a 5 HP squirrel cage induction motor, making it difficult to power the system because it is rotating. This problem can be solved with the construction of a magnetic generator device to avoid the need of using batteries or collector rings and will send data to the computer using a wireless NRF24L01 module. For the proposed system, initial validation tests were made using a temperature sensor (DS18b20), as this variable is known as the most important when identifying the need for maintenance and control systems. Few tests have shown promising results that, with further improvements, can prove the feasibility of using sensors in the rotor.

  13. Passive Classification of Wireless NICs during Rate Switching

    Directory of Open Access Journals (Sweden)

    Cherita L. Corbett

    2008-02-01

    Full Text Available Computer networks have become increasingly ubiquitous. However, with the increase in networked applications, there has also been an increase in difficulty to manage and secure these networks. The proliferation of 802.11 wireless networks has heightened this problem by extending networks beyond physical boundaries. We propose the use of spectral analysis to identify the type of wireless network interface card (NIC. This mechanism can be applied to support the detection of unauthorized systems that use NICs which are different from that of a legitimate system. We focus on rate switching, a vaguely specified mechanism required by the 802.11 standard that is implemented in the hardware and software of the wireless NIC. We show that the implementation of this function influences the transmission patterns of a wireless stream, which are observable through traffic analysis. Our mechanism for NIC identification uses signal processing to analyze the periodicity embedded in the wireless traffic caused by rate switching. A stable spectral profile is created from the periodic components of the traffic and used for the identity of the wireless NIC. We show that we can distinguish between NICs manufactured by different vendors and NICs manufactured by the same vendor using their spectral profiles.

  14. Passive Classification of Wireless NICs during Rate Switching

    Directory of Open Access Journals (Sweden)

    Beyah RaheemA

    2008-01-01

    Full Text Available Abstract Computer networks have become increasingly ubiquitous. However, with the increase in networked applications, there has also been an increase in difficulty to manage and secure these networks. The proliferation of 802.11 wireless networks has heightened this problem by extending networks beyond physical boundaries. We propose the use of spectral analysis to identify the type of wireless network interface card (NIC. This mechanism can be applied to support the detection of unauthorized systems that use NICs which are different from that of a legitimate system. We focus on rate switching, a vaguely specified mechanism required by the 802.11 standard that is implemented in the hardware and software of the wireless NIC. We show that the implementation of this function influences the transmission patterns of a wireless stream, which are observable through traffic analysis. Our mechanism for NIC identification uses signal processing to analyze the periodicity embedded in the wireless traffic caused by rate switching. A stable spectral profile is created from the periodic components of the traffic and used for the identity of the wireless NIC. We show that we can distinguish between NICs manufactured by different vendors and NICs manufactured by the same vendor using their spectral profiles.

  15. A Wireless Self-Powered Urinary Incontinence Sensor System

    Science.gov (United States)

    Tanaka, Ami; Utsunomiya, Fumiyasu; Douseki, Takakuni

    A self-powered urinary incontinence sensor system consisting of a urine-activated coin battery and a wireless transmitter has been developed as an application for wireless biosensor networks. The urine-activated battery makes possible both the sensing of urine leakage and self-powered operation. An intermittent power-supply circuit that uses an electric double-layer capacitor (EDLC) with a small internal resistance suppresses the supply voltage drop due to the large internal resistance of the battery. This circuit and a 1-V surface acoustic wave (SAW) oscillator reduce the power dissipation of a wireless transmitter. The SAW oscillator quickly responds to the on-off control of the power supply, which is suitable for intermittent operation. To verify the effectiveness of the circuit scheme, the authors fabricated a prototype sensor system. When the volume of urine is 0.2 ml, the battery outputs a voltage of over 1.3 V; and the sensor system can transmit signals over a distance of 5 m.

  16. QoS Provisioning Techniques for Future Fiber-Wireless (FiWi Access Networks

    Directory of Open Access Journals (Sweden)

    Martin Maier

    2010-04-01

    Full Text Available A plethora of enabling optical and wireless access-metro network technologies have been emerging that can be used to build future-proof bimodal fiber-wireless (FiWi networks. Hybrid FiWi networks aim at providing wired and wireless quad-play services over the same infrastructure simultaneously and hold great promise to mitigate the digital divide and change the way we live and work by replacing commuting with teleworking. After overviewing enabling optical and wireless network technologies and their QoS provisioning techniques, we elaborate on enabling radio-over-fiber (RoF and radio-and-fiber (R&F technologies. We describe and investigate new QoS provisioning techniques for future FiWi networks, ranging from traffic class mapping, scheduling, and resource management to advanced aggregation techniques, congestion control, and layer-2 path selection algorithms.

  17. Investigating wireless power transfer

    Science.gov (United States)

    St John, Stuart A.

    2017-09-01

    Understanding Physics is a great end in itself, but is also crucial to keep pace with developments in modern technology. Wireless power transfer, known to many only as a means to charge electric toothbrushes, will soon be commonplace in charging phones, electric cars and implanted medical devices. This article outlines how to produce and use a simple set of equipment to both demonstrate and investigate this phenomenon. It presents some initial findings and aims to encourage Physics educators and their students to conduct further research, pushing the bounds of their understanding.

  18. Energy-efficient digital and wireless IC design for wireless smart sensing

    Science.gov (United States)

    Zhou, Jun; Huang, Xiongchuan; Wang, Chao; Tae-Hyoung Kim, Tony; Lian, Yong

    2017-10-01

    Wireless smart sensing is now widely used in various applications such as health monitoring and structural monitoring. In conventional wireless sensor nodes, significant power is consumed in wirelessly transmitting the raw data. Smart sensing adds local intelligence to the sensor node and reduces the amount of wireless data transmission via on-node digital signal processing. While the total power consumption is reduced compared to conventional wireless sensing, the power consumption of the digital processing becomes as dominant as wireless data transmission. This paper reviews the state-of-the-art energy-efficient digital and wireless IC design techniques for reducing the power consumption of the wireless smart sensor node to prolong battery life and enable self-powered applications.

  19. Capacity analysis of wireless mesh networks | Gumel | Nigerian ...

    African Journals Online (AJOL)

    ... number of nodes (n) in a linear topology. The degradation is found to be higher in a fully mesh network as a result of increase in interference and MAC layer contention in the network. Key words: Wireless mesh network (WMN), Adhoc network, Network capacity analysis, Bottleneck collision domain, Medium access control ...

  20. Link Investigation of IEEE 802.15.4 Wireless Sensor Networks in Forests.

    Science.gov (United States)

    Ding, Xingjian; Sun, Guodong; Yang, Gaoxiang; Shang, Xinna

    2016-06-27

    Wireless sensor networks are expected to automatically monitor the ecological evolution and wildlife habits in forests. Low-power links (transceivers) are often adopted in wireless sensor network applications, in order to save the precious sensor energy and then achieve long-term, unattended monitoring. Recent research has presented some performance characteristics of such low-power wireless links under laboratory or outdoor scenarios with less obstacles, and they have found that low-power wireless links are unreliable and prone to be affected by the target environment. However, there is still less understanding about how well the low-power wireless link performs in real-world forests and to what extent the complex in-forest surrounding environments affect the link performances. In this paper, we empirically evaluate the low-power links of wireless sensors in three typical different forest environments. Our experiment investigates the performance of the link layer compatible with the IEEE 802.15.4 standard and analyzes the variation patterns of the packet reception ratio (PRR), the received signal strength indicator (RSSI) and the link quality indicator (LQI) under diverse experimental settings. Some observations of this study are inconsistent with or even contradict prior results that are achieved in open fields or relatively clean environments and thus, provide new insights both into effectively evaluating the low-power wireless links and into efficiently deploying wireless sensor network systems in forest environments.

  1. Mobility management techniques for the next-generation wireless networks

    Science.gov (United States)

    Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.

    2001-10-01

    The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.

  2. Double-Layer Structured CO2 Adsorbent Functionalized with Modified Polyethyleneimine for High Physical and Chemical Stability.

    Science.gov (United States)

    Jeon, Sunbin; Jung, Hyunchul; Kim, Sung Hyun; Lee, Ki Bong

    2018-06-18

    CO 2 capture using polyethyleneimine (PEI)-impregnated silica adsorbents has been receiving a lot of attention. However, the absence of physical stability (evaporation and leaching of amine) and chemical stability (urea formation) of the PEI-impregnated silica adsorbent has been generally established. Therefore, in this study, a double-layer impregnated structure, developed using modified PEI, is newly proposed to enhance the physical and chemical stabilities of the adsorbent. Epoxy-modified PEI and diepoxide-cross-linked PEI were impregnated via a dry impregnation method in the first and second layers, respectively. The physical stability of the double-layer structured adsorbent was noticeably enhanced when compared to the conventional adsorbents with a single layer. In addition to the enhanced physical stability, the result of simulated temperature swing adsorption cycles revealed that the double-layer structured adsorbent presented a high potential working capacity (3.5 mmol/g) and less urea formation under CO 2 -rich regeneration conditions. The enhanced physical and chemical stabilities as well as the high CO 2 working capacity of the double-layer structured adsorbent were mainly attributed to the second layer consisting of diepoxide-cross-linked PEI.

  3. Physical Layer Multi-Core Prototyping A Dataflow-Based Approach for LTE eNodeB

    CERN Document Server

    Pelcat, Maxime; Piat, Jonathan; Nezan, Jean-François

    2013-01-01

    Base stations developed according to the 3GPP Long Term Evolution (LTE) standard require unprecedented processing power. 3GPP LTE enables data rates beyond hundreds of Mbits/s by using advanced technologies, necessitating a highly complex LTE physical layer. The operating power of base stations is a significant cost for operators, and is currently optimized using state-of-the-art hardware solutions, such as heterogeneous distributed systems. The traditional system design method of porting algorithms to heterogeneous distributed systems based on test-and-refine methods is a manual, thus time-expensive, task.   Physical Layer Multi-Core Prototyping: A Dataflow-Based Approach for LTE eNodeB provides a clear introduction to the 3GPP LTE physical layer and to dataflow-based prototyping and programming. The difficulties in the process of 3GPP LTE physical layer porting are outlined, with particular focus on automatic partitioning and scheduling, load balancing and computation latency reduction, specifically in sys...

  4. MAC layer power management schemes for efficient energy- delay tradeoffs in wireless local area networks

    OpenAIRE

    Sarkar, Mahasweta

    2006-01-01

    In order to minimize power consumption and thereby prolong the system lifetime of battery powered wireless devices, it makes sense for such devices to transit to a very low power "Sleep" state when they are not communicating with their peers. However the main challenge of the sleep mechanism lies in the wireless nodes inability to "wake up" as soon as a packet arrives for it during its sleep state. This leads to an obvious tradeoff between power saving and packet delay. In this dissertation w...

  5. Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture

    Science.gov (United States)

    McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID

    2012-05-08

    Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.

  6. Feasibility studies for a wireless 60 GHz tracking detector readout

    International Nuclear Information System (INIS)

    Dittmeier, S.; Schöning, A.; Soltveit, H.K.; Wiedner, D.

    2016-01-01

    The amount of data produced by highly granular silicon tracking detectors in high energy physics experiments poses a major challenge to readout systems. At high collision rates, e.g. at LHC experiments, only a small fraction of data can be read out with currently used technologies. To cope with the requirements of future or upgraded experiments new data transfer techniques are required which offer high data rates at low power and low material budget. Wireless technologies operating in the 60 GHz band or at higher frequencies offer high data rates and are thus a promising upcoming alternative to conventional data transmission via electrical cables or optical fibers. Using wireless technology, the amount of cables and connectors in detectors can be significantly reduced. Tracking detectors profit most from a reduced material budget as fewer secondary particle interactions (multiple Coulomb scattering, energy loss, etc.) improve the tracking performance in general. We present feasibility studies regarding the integration of the wireless technology at 60 GHz into a silicon tracking detector. We use spare silicon strip modules of the ATLAS experiment as test samples which are measured to be opaque in the 60 GHz range. The reduction of cross talk between links and the attenuation of reflections is studied. An estimate of the maximum achievable link density is given. It is shown that wireless links can be placed as close as 2 cm next to each other for a layer distance of 10 cm by exploiting one or several of the following measures: highly directive antennas, absorbers like graphite foam, linear polarization and frequency channeling. Combining these measures, a data rate area density of up to 11 Tb/(s·m"2) seems feasible. In addition, two types of silicon sensors are tested under mm-wave irradiation in order to determine the influence of 60 GHz data transmission on the detector performance: an ATLAS silicon strip sensor module and an HV-MAPS prototype for the Mu3e

  7. Feasibility studies for a wireless 60 GHz tracking detector readout

    Energy Technology Data Exchange (ETDEWEB)

    Dittmeier, S., E-mail: dittmeier@physi.uni-heidelberg.de; Schöning, A.; Soltveit, H.K.; Wiedner, D.

    2016-09-11

    The amount of data produced by highly granular silicon tracking detectors in high energy physics experiments poses a major challenge to readout systems. At high collision rates, e.g. at LHC experiments, only a small fraction of data can be read out with currently used technologies. To cope with the requirements of future or upgraded experiments new data transfer techniques are required which offer high data rates at low power and low material budget. Wireless technologies operating in the 60 GHz band or at higher frequencies offer high data rates and are thus a promising upcoming alternative to conventional data transmission via electrical cables or optical fibers. Using wireless technology, the amount of cables and connectors in detectors can be significantly reduced. Tracking detectors profit most from a reduced material budget as fewer secondary particle interactions (multiple Coulomb scattering, energy loss, etc.) improve the tracking performance in general. We present feasibility studies regarding the integration of the wireless technology at 60 GHz into a silicon tracking detector. We use spare silicon strip modules of the ATLAS experiment as test samples which are measured to be opaque in the 60 GHz range. The reduction of cross talk between links and the attenuation of reflections is studied. An estimate of the maximum achievable link density is given. It is shown that wireless links can be placed as close as 2 cm next to each other for a layer distance of 10 cm by exploiting one or several of the following measures: highly directive antennas, absorbers like graphite foam, linear polarization and frequency channeling. Combining these measures, a data rate area density of up to 11 Tb/(s·m{sup 2}) seems feasible. In addition, two types of silicon sensors are tested under mm-wave irradiation in order to determine the influence of 60 GHz data transmission on the detector performance: an ATLAS silicon strip sensor module and an HV-MAPS prototype for the Mu3e

  8. Advanced Measurements of the Aggregation Capability of the MPT Network Layer Multipath Communication Library

    Directory of Open Access Journals (Sweden)

    Gábor Lencse

    2015-05-01

    Full Text Available The MPT network layer multipath communicationlibrary is a novel solution for several problems including IPv6transition, reliable data transmission using TCP, real-time transmissionusing UDP and also wireless network layer routingproblems. MPT can provide an IPv4 or an IPv6 tunnel overone or more IPv4 or IPv6 communication channels. MPT canalso aggregate the capacity of multiple physical channels. In thispaper, the channel aggregation capability of the MPT libraryis measured up to twelve 100Mbps speed channels. Differentscenarios are used: both IPv4 and IPv6 are used as the underlyingand also as the encapsulated protocols and also both UDP andTCP are used as transport protocols. In addition, measurementsare taken with both 32-bit and 64-bit version of the MPT library.In all cases, the number of the physical channels is increased from1 to 12 and the aggregated throughput is measured.

  9. Equivalent physical models and formulation of equivalent source layer in high-resolution EEG imaging

    International Nuclear Information System (INIS)

    Yao Dezhong; He Bin

    2003-01-01

    In high-resolution EEG imaging, both equivalent dipole layer (EDL) and equivalent charge layer (ECL) assumed to be located just above the cortical surface have been proposed as high-resolution imaging modalities or as intermediate steps to estimate the epicortical potential. Presented here are the equivalent physical models of these two equivalent source layers (ESL) which show that the strength of EDL is proportional to the surface potential of the layer when the outside of the layer is filled with an insulator, and that the strength of ECL is the normal current of the layer when the outside is filled with a perfect conductor. Based on these equivalent physical models, closed solutions of ECL and EDL corresponding to a dipole enclosed by a spherical layer are given. These results provide the theoretical basis of ESL applications in high-resolution EEG mapping

  10. Equivalent physical models and formulation of equivalent source layer in high-resolution EEG imaging

    Energy Technology Data Exchange (ETDEWEB)

    Yao Dezhong [School of Life Science and Technology, University of Electronic Science and Technology of China, Chengdu City, 610054, Sichuan Province (China); He Bin [The University of Illinois at Chicago, IL (United States)

    2003-11-07

    In high-resolution EEG imaging, both equivalent dipole layer (EDL) and equivalent charge layer (ECL) assumed to be located just above the cortical surface have been proposed as high-resolution imaging modalities or as intermediate steps to estimate the epicortical potential. Presented here are the equivalent physical models of these two equivalent source layers (ESL) which show that the strength of EDL is proportional to the surface potential of the layer when the outside of the layer is filled with an insulator, and that the strength of ECL is the normal current of the layer when the outside is filled with a perfect conductor. Based on these equivalent physical models, closed solutions of ECL and EDL corresponding to a dipole enclosed by a spherical layer are given. These results provide the theoretical basis of ESL applications in high-resolution EEG mapping.

  11. Wireless mesh networks.

    Science.gov (United States)

    Wang, Xinheng

    2008-01-01

    Wireless telemedicine using GSM and GPRS technologies can only provide low bandwidth connections, which makes it difficult to transmit images and video. Satellite or 3G wireless transmission provides greater bandwidth, but the running costs are high. Wireless networks (WLANs) appear promising, since they can supply high bandwidth at low cost. However, the WLAN technology has limitations, such as coverage. A new wireless networking technology named the wireless mesh network (WMN) overcomes some of the limitations of the WLAN. A WMN combines the characteristics of both a WLAN and ad hoc networks, thus forming an intelligent, large scale and broadband wireless network. These features are attractive for telemedicine and telecare because of the ability to provide data, voice and video communications over a large area. One successful wireless telemedicine project which uses wireless mesh technology is the Emergency Room Link (ER-LINK) in Tucson, Arizona, USA. There are three key characteristics of a WMN: self-organization, including self-management and self-healing; dynamic changes in network topology; and scalability. What we may now see is a shift from mobile communication and satellite systems for wireless telemedicine to the use of wireless networks based on mesh technology, since the latter are very attractive in terms of cost, reliability and speed.

  12. Competition in the domain of wireless networks security

    Science.gov (United States)

    Bednarczyk, Mariusz

    2017-04-01

    Wireless networks are very popular and have found wide spread usage amongst various segments, also in military environment. The deployment of wireless infrastructures allow to reduce the time it takes to install and dismantle communications networks. With wireless, users are more mobile and can easily get access to the network resources all the time. However, wireless technologies like WiFi or Bluetooth have security issues that hackers have extensively exploited over the years. In the paper several serious security flaws in wireless technologies are presented. Most of them enable to get access to the internal networks and easily carry out man-in-the-middle attacks. Very often, they are used to launch massive denial of service attacks that target the physical infrastructure as well as the RF spectrum. For instance, there are well known instances of Bluetooth connection spoofing in order to steal WiFi password stored in the mobile device. To raise the security awareness and protect wireless networks against an adversary attack, an analysis of attack methods and tools over time is presented in the article. The particular attention is paid to the severity, possible targets as well as the ability to persist in the context of protective measures. Results show that an adversary can take complete control of the victims' mobile device features if the users forget to use simple safety principles.

  13. Surface Acoustic Wave Devices for Harsh Environment Wireless Sensing

    Directory of Open Access Journals (Sweden)

    David W. Greve

    2013-05-01

    Full Text Available Langasite surface acoustic wave devices can be used to implement harsh-environment wireless sensing of gas concentration and temperature. This paper reviews prior work on the development of langasite surface acoustic wave devices, followed by a report of recent progress toward the implementation of oxygen gas sensors. Resistive metal oxide films can be used as the oxygen sensing film, although development of an adherent barrier layer will be necessary with the sensing layers studied here to prevent interaction with the langasite substrate. Experimental results are presented for the performance of a langasite surface acoustic wave oxygen sensor with tin oxide sensing layer, and these experimental results are correlated with direct measurements of the sensing layer resistivity.

  14. Wireless transmission: state of research, applications, trends

    International Nuclear Information System (INIS)

    Berger, A.

    2016-01-01

    At the end of the 19th century Nikola Tesla started his work in the field of wireless energy transmission. More than 100 years after Tesla, the progress in modern semiconductor technology offer developers the possibility to realize highly efficient systems and have led to a revival of wireless energy transmission. The application ranges from the transmission of a few milliwatts in biomedical applications, over a few watts for the charging of mobile phones, to hundreds of kilowatts in the automotive sector. Depending on the used method, the possible transmission distances vary between a few centimeters up to thousands of kilometers. The physical basis of these technologies is the transmission of energy by electromagnetic waves. State-of-the-art systems use wavelengths ranging from radio waves to microwaves, to ultraviolet light. Current research focuses on optimizing transmission efficiency, increasing the possible transmission distance between transmitter and receiver, and improving spatial freedom of movement. This lecture gives an overview of the different approaches of wireless energy transmission and their physical background, the established industrial standards and the current state of research. In addition, the advantages and disadvantages of the individual methods are illustrated by selected commercial and scientific applications. (rössner) [de

  15. Cross-layer design for radio resource allocation based on priority scheduling in OFDMA wireless access network

    Directory of Open Access Journals (Sweden)

    Chen Yen-Wen

    2011-01-01

    Full Text Available Abstract The orthogonal frequency-division multiple access (OFDMA system has the advantages of flexible subcarrier allocation and adaptive modulation with respect to channel conditions. However, transmission overhead is required in each frame to broadcast the arrangement of radio resources to all mobile stations within the coverage of the same base station. This overhead greatly affects the utilization of valuable radio resources. In this paper, a cross layer scheme is proposed to reduce the number of traffic bursts at the downlink of an OFDMA wireless access network so that the overhead of the media access protocol (MAP field can be minimized. The proposed scheme considers the priorities and the channel conditions of quality of service (QoS traffic streams to arrange for them to be sent with minimum bursts in a heuristic manner. In addition, the trade-off between the degradation of the modulation level and the reduction of traffic bursts is investigated. Simulation results show that the proposed scheme can effectively reduce the traffic bursts and, therefore, increase resource utilization.

  16. Insecurity of Wireless Networks

    Energy Technology Data Exchange (ETDEWEB)

    Sheldon, Frederick T [ORNL; Weber, John Mark [Dynetics, Inc.; Yoo, Seong-Moo [University of Alabama, Huntsville; Pan, W. David [University of Alabama, Huntsville

    2012-01-01

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA, allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.

  17. Multigigabit W-Band (75–110 GHz) Bidirectional Hybrid Fiber-Wireless Systems in Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Lebedev, Alexander; Vegas Olmos, Juan José

    2014-01-01

    compare the transmission performances in terms of achievable wireless distances with and without using a high-frequency electrical power amplifier at the wireless transmitter. A downlink 16-Gbit/s QPSK signal and an uplink 1.25-Gbit/s ASK signal transmission over the two implementations are experimentally......We experimentally demonstrate multigigabit capacity bidirectional hybrid fiber-wireless systems with RF carrier frequencies at the W-band (75-110 GHz) that enables the seamless convergence between wireless and fiber-optic data transmission systems in access networks. In this study, we evaluate...... the transmission performances in two scenarios: a fiber-wireless access link that directly provide high-speed connections to wireless end users, and a fiber-wireless-fiber signal relay where a high capacity wireless link can be used to bridge two access fiber spans over physical obstacles. In both scenarios, we...

  18. Wireless virtualization

    CERN Document Server

    Wen, Heming; Le-Ngoc, Tho

    2013-01-01

    This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiq

  19. Design and Evaluation of a Wireless Sensor Network Based Aircraft Strength Testing System

    Science.gov (United States)

    Wu, Jian; Yuan, Shenfang; Zhou, Genyuan; Ji, Sai; Wang, Zilong; Wang, Yang

    2009-01-01

    The verification of aerospace structures, including full-scale fatigue and static test programs, is essential for structure strength design and evaluation. However, the current overall ground strength testing systems employ a large number of wires for communication among sensors and data acquisition facilities. The centralized data processing makes test programs lack efficiency and intelligence. Wireless sensor network (WSN) technology might be expected to address the limitations of cable-based aeronautical ground testing systems. This paper presents a wireless sensor network based aircraft strength testing (AST) system design and its evaluation on a real aircraft specimen. In this paper, a miniature, high-precision, and shock-proof wireless sensor node is designed for multi-channel strain gauge signal conditioning and monitoring. A cluster-star network topology protocol and application layer interface are designed in detail. To verify the functionality of the designed wireless sensor network for strength testing capability, a multi-point WSN based AST system is developed for static testing of a real aircraft undercarriage. Based on the designed wireless sensor nodes, the wireless sensor network is deployed to gather, process, and transmit strain gauge signals and monitor results under different static test loads. This paper shows the efficiency of the wireless sensor network based AST system, compared to a conventional AST system. PMID:22408521

  20. Design and evaluation of a wireless sensor network based aircraft strength testing system.

    Science.gov (United States)

    Wu, Jian; Yuan, Shenfang; Zhou, Genyuan; Ji, Sai; Wang, Zilong; Wang, Yang

    2009-01-01

    The verification of aerospace structures, including full-scale fatigue and static test programs, is essential for structure strength design and evaluation. However, the current overall ground strength testing systems employ a large number of wires for communication among sensors and data acquisition facilities. The centralized data processing makes test programs lack efficiency and intelligence. Wireless sensor network (WSN) technology might be expected to address the limitations of cable-based aeronautical ground testing systems. This paper presents a wireless sensor network based aircraft strength testing (AST) system design and its evaluation on a real aircraft specimen. In this paper, a miniature, high-precision, and shock-proof wireless sensor node is designed for multi-channel strain gauge signal conditioning and monitoring. A cluster-star network topology protocol and application layer interface are designed in detail. To verify the functionality of the designed wireless sensor network for strength testing capability, a multi-point WSN based AST system is developed for static testing of a real aircraft undercarriage. Based on the designed wireless sensor nodes, the wireless sensor network is deployed to gather, process, and transmit strain gauge signals and monitor results under different static test loads. This paper shows the efficiency of the wireless sensor network based AST system, compared to a conventional AST system.

  1. Wireless Sensor Networks : Structure and Algorithms

    NARCIS (Netherlands)

    van Dijk, T.C.

    2014-01-01

    In this thesis we look at various problems in wireless networking. First we consider two problems in physical-model networks. We introduce a new model for localisation. The model is based on a range-free model of radio transmissions. The first scheme is randomised and we analyse its expected

  2. A Survey on Secure Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Shihong Zou

    2017-01-01

    Full Text Available Combining tiny sensors and wireless communication technology, wireless body area network (WBAN is one of the most promising fields. Wearable and implantable sensors are utilized for collecting the physiological data to achieve continuously monitoring of people’s physical conditions. However, due to the openness of wireless environment and the significance and privacy of people’s physiological data, WBAN is vulnerable to various attacks; thus, strict security mechanisms are required to enable a secure WBAN. In this article, we mainly focus on a survey on the security issues in WBAN, including securing internal communication in WBAN and securing communication between WBAN and external users. For each part, we discuss and identify the security goals to be achieved. Meanwhile, relevant security solutions in existing research on WBAN are presented and their applicability is analyzed.

  3. Wireless Biological Electronic Sensors.

    Science.gov (United States)

    Cui, Yue

    2017-10-09

    The development of wireless biological electronic sensors could open up significant advances for both fundamental studies and practical applications in a variety of areas, including medical diagnosis, environmental monitoring, and defense applications. One of the major challenges in the development of wireless bioelectronic sensors is the successful integration of biosensing units and wireless signal transducers. In recent years, there are a few types of wireless communication systems that have been integrated with biosensing systems to construct wireless bioelectronic sensors. To successfully construct wireless biological electronic sensors, there are several interesting questions: What types of biosensing transducers can be used in wireless bioelectronic sensors? What types of wireless systems can be integrated with biosensing transducers to construct wireless bioelectronic sensors? How are the electrical sensing signals generated and transmitted? This review will highlight the early attempts to address these questions in the development of wireless biological electronic sensors.

  4. Implementation of WirelessHART in the NS-2 Simulator and Validation of Its Correctness

    Directory of Open Access Journals (Sweden)

    Pouria Zand

    2014-05-01

    Full Text Available One of the first standards in the wireless sensor networks domain,WirelessHART (HART (Highway Addressable Remote Transducer, was introduced to address industrial process automation and control requirements. This standard can be used as a reference point to evaluate other wireless protocols in the domain of industrial monitoring and control. This makes it worthwhile to set up a reliable WirelessHART simulator in order to achieve that reference point in a relatively easy manner. Moreover, it offers an alternative to expensive testbeds for testing and evaluating the performance of WirelessHART. This paper explains our implementation of WirelessHART in the NS-2 network simulator. According to our knowledge, this is the first implementation that supports the WirelessHART network manager, as well as the whole stack (all OSI (Open Systems Interconnection model layers of the WirelessHART standard. It also explains our effort to validate the correctness of our implementation, namely through the validation of the implementation of the WirelessHART stack protocol and of the network manager. We use sniffed traffic from a realWirelessHART testbed installed in the Idrolab plant for these validations. This confirms the validity of our simulator. Empirical analysis shows that the simulated results are nearly comparable to the results obtained from real networks. We also demonstrate the versatility and usability of our implementation by providing some further evaluation results in diverse scenarios. For example, we evaluate the performance of the WirelessHART network by applying incremental interference in a multi-hop network.

  5. Reactive and adaptive monitoring to secure aggregation in wireless sensor networks

    NARCIS (Netherlands)

    Labraoui, Nabila; Gueroui, Mourad; Aliouat, Makhlouf; Petit, Jonathan

    Data aggregation is considered as one of the fundamental distributed data processing procedures for saving the energy and minimizing the medium access layer contention in wireless sensor networks. However, sensor networks are likely to be deployed in an untrusted environment, which make them

  6. Uplink Cross-Layer Scheduling with Differential QoS Requirements in OFDMA Systems

    Directory of Open Access Journals (Sweden)

    Chen Wei

    2010-01-01

    Full Text Available Fair and efficient scheduling is a key issue in cross-layer design for wireless communication systems, such as 3GPP LTE and WiMAX. However, few works have considered the multiaccess of the traffic with differential QoS requirements in wireless systems. In this paper, we will consider an OFDMA-based wireless system with four types of traffic associated with differential QoS requirements, namely, minimum reserved rate, maximum sustainable rate, maximum latency, and tolerant jitter. Given these QoS requirements, the traffic scheduling will be formulated into a cross-layer optimization problem, which is convex fortunately. By separating the power allocation through the waterfilling algorithm in each user, this problem will further reduce to a kind of continuous quadratic knapsack problem in the base station which yields low complexity. It is then demonstrated that the proposed cross-layer method cannot only guarantee the application layer QoS requirements, but also minimizes the integrated residual workload in the MAC layer. To further enhance the ability of QoS assurance in heavily loaded scenario, a call admission control scheme will also be proposed. The simulation results show that the QoS requirements for the four types of traffic are guaranteed effectively by the proposed algorithms.

  7. Multi-objective ant algorithm for wireless sensor network positioning

    International Nuclear Information System (INIS)

    Fidanova, S.; Shindarov, M.; Marinov, P.

    2013-01-01

    It is impossible to imagine our modern life without telecommunications. Wireless networks are a part of telecommunications. Wireless sensor networks (WSN) consist of spatially distributed sensors, which communicate in wireless way. This network monitors physical or environmental conditions. The objective is the full coverage of the monitoring region and less energy consumption of the network. The most appropriate approach to solve the problem is metaheuristics. In this paper the full coverage of the area is treated as a constrain. The objectives which are optimized are a minimal number of sensors and energy (lifetime) of the network. We apply multi-objective Ant Colony Optimization to solve this important telecommunication problem. We chose MAX-MIN Ant System approach, because it is proven to converge to the global optima

  8. Energy-Aware Broadcasting and Multicasting in Wireless Ad Hoc Networks: A Cross-Layering Approach

    National Research Council Canada - National Science Library

    Wieselthier, Jeffrey E; Nguyen, Gam D; Ephremides, Anthony

    2004-01-01

    ...) problems, especially when energy-aware operation is required. To address the specific problem of energy-aware tree construction in wireless ad hoc networks, we have developed the Broadcast Incremental Power (BIP...

  9. Clinical potential of implantable wireless sensors for orthopedic treatments.

    Science.gov (United States)

    Karipott, Salil Sidharthan; Nelson, Bradley D; Guldberg, Robert E; Ong, Keat Ghee

    2018-04-01

    Implantable wireless sensors have been used for real-time monitoring of chemicals and physical conditions of bones, tendons and muscles to diagnose and study orthopedic diseases and injuries. Due to the importance of these sensors in orthopedic care, a critical review, which not only analyzes the underlying technologies but also their clinical implementations and challenges, will provide a landscape view on their current state and their future clinical role. Areas covered: By conducting an extensive literature search and following the leaders of orthopedic implantable wireless sensors, this review covers the battery-powered and battery-free wireless implantable sensor technologies, and describes their implementation for hips, knees, spine, and shoulder stress/strain monitoring. Their advantages, limitations, and clinical challenges are also described. Expert commentary: Currently, implantable wireless sensors are mostly limited for scientific investigations and demonstrative experiments. Although rapid advancement in sensors and wireless technologies will push the reliability and practicality of these sensors for clinical realization, regulatory constraints and financial viability in medical device industry may curtail their continuous adoption for clinical orthopedic applications. In the next five years, these sensors are expected to gain increased interest from researchers, but wide clinical adoption is still unlikely.

  10. Terahertz communication: The opportunities of wireless technology beyond 5G

    KAUST Repository

    Elayan, Hadeel; Amin, Osama; Shubair, Raed M.; Alouini, Mohamed-Slim

    2018-01-01

    Over the past years, carrier frequencies used for wireless communications have been increasing to meet bandwidth requirements. The engineering community witnessed the development of wide radio bands such as the millimeter-wave (mmW) frequencies to fulfill the explosive growth of mobile data demand and pave the way towards 5G networks. Other research interests have been steered towards optical wireless communication to allow higher data rates, improve physical security and avoid electromagnetic interference. Nevertheless, a paradigm change in the electromagnetic wireless world has been witnessed with the exploitation of the Terahertz (THz) frequency band (0.1–10 THz). With the dawn of THz technology, which fills the gap between radio and optical frequency ranges, ultimate promise is expected for the next generation of wireless networks. In this paper, the light is shed on a number of opportunities associated with the deployment of the THz wireless links. These opportunities offer a plethora of applications to meet the future communication requirements and satisfy the ever increasing user demand of higher data rates.

  11. Terahertz communication: The opportunities of wireless technology beyond 5G

    KAUST Repository

    Elayan, Hadeel

    2018-05-17

    Over the past years, carrier frequencies used for wireless communications have been increasing to meet bandwidth requirements. The engineering community witnessed the development of wide radio bands such as the millimeter-wave (mmW) frequencies to fulfill the explosive growth of mobile data demand and pave the way towards 5G networks. Other research interests have been steered towards optical wireless communication to allow higher data rates, improve physical security and avoid electromagnetic interference. Nevertheless, a paradigm change in the electromagnetic wireless world has been witnessed with the exploitation of the Terahertz (THz) frequency band (0.1–10 THz). With the dawn of THz technology, which fills the gap between radio and optical frequency ranges, ultimate promise is expected for the next generation of wireless networks. In this paper, the light is shed on a number of opportunities associated with the deployment of the THz wireless links. These opportunities offer a plethora of applications to meet the future communication requirements and satisfy the ever increasing user demand of higher data rates.

  12. Competition at the Wireless Sensor Network MAC Layer: Low Power Probing interfering with X-MAC

    International Nuclear Information System (INIS)

    Zacharias, Sven; Newe, Thomas

    2011-01-01

    Wireless Sensor Networks (WSNs) combine sensors with computer networks and enable very dense, in-situ and live measurements of data over a large area. Since this emerging technology has the potential to be embedded almost everywhere for numberless applications, interference between different networks can become a serious issue. For most WSNs, it is assumed today that the network medium access is non-competitive. On the basis of X-MAC interfered by Low Power Probing, this paper shows the danger and the effects of different sensor networks communicating on a single wireless channel of the 2.4 GHz band, which is used by the IEEE 802.15.4 standard.

  13. Competition at the Wireless Sensor Network MAC Layer: Low Power Probing interfering with X-MAC

    Energy Technology Data Exchange (ETDEWEB)

    Zacharias, Sven; Newe, Thomas, E-mail: Sven.Zacharias@ul.ie [University of Limerick (Ireland)

    2011-08-17

    Wireless Sensor Networks (WSNs) combine sensors with computer networks and enable very dense, in-situ and live measurements of data over a large area. Since this emerging technology has the potential to be embedded almost everywhere for numberless applications, interference between different networks can become a serious issue. For most WSNs, it is assumed today that the network medium access is non-competitive. On the basis of X-MAC interfered by Low Power Probing, this paper shows the danger and the effects of different sensor networks communicating on a single wireless channel of the 2.4 GHz band, which is used by the IEEE 802.15.4 standard.

  14. Competition at the Wireless Sensor Network MAC Layer: Low Power Probing interfering with X-MAC

    Science.gov (United States)

    Zacharias, Sven; Newe, Thomas

    2011-08-01

    Wireless Sensor Networks (WSNs) combine sensors with computer networks and enable very dense, in-situ and live measurements of data over a large area. Since this emerging technology has the potential to be embedded almost everywhere for numberless applications, interference between different networks can become a serious issue. For most WSNs, it is assumed today that the network medium access is non-competitive. On the basis of X-MAC interfered by Low Power Probing, this paper shows the danger and the effects of different sensor networks communicating on a single wireless channel of the 2.4 GHz band, which is used by the IEEE 802.15.4 standard.

  15. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol\\'s perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain\\'s fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  16. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung; Kazandjieva, Maria A.; Jain, Mayank; Levis, Philip

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol's perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain's fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  17. Handbook on theoretical and algorithmic aspects of sensor, ad hoc wireless, and peer-to-peer networks

    CERN Document Server

    Wu, Jie

    2005-01-01

    PrefaceAD HOC WIRELESS NETWORKSA Modular Cross Layer Architecture for Ad Hoc Networks, M. Conti, J. Crowcroft, G. Maselli, and G. TuriRouting Scalability in MANETs, J. Eriksson, S. Krishnamurthy and M. FaloutsosUniformly Distributed Algorithm for Virtual Backbone Routing in Ad Hoc Wireless Networks, D.S. KimMaximum Necessary Hop Count for Packet Routing in MANET, X. Chen and J. ShenEfficient Strategyproof Multicast in Selfish Wireless Networks, X.-Yang LiGeocasting in Ad Hoc and Sensor Networks, I. StojmenovicTopology Control for Ad hoc Networks: Present Solutions and Open Issues, C.-C. Shen a

  18. Functional Basis for Efficient Physical Layer Classical Control in Quantum Processors

    Science.gov (United States)

    Ball, Harrison; Nguyen, Trung; Leong, Philip H. W.; Biercuk, Michael J.

    2016-12-01

    The rapid progress seen in the development of quantum-coherent devices for information processing has motivated serious consideration of quantum computer architecture and organization. One topic which remains open for investigation and optimization relates to the design of the classical-quantum interface, where control operations on individual qubits are applied according to higher-level algorithms; accommodating competing demands on performance and scalability remains a major outstanding challenge. In this work, we present a resource-efficient, scalable framework for the implementation of embedded physical layer classical controllers for quantum-information systems. Design drivers and key functionalities are introduced, leading to the selection of Walsh functions as an effective functional basis for both programing and controller hardware implementation. This approach leverages the simplicity of real-time Walsh-function generation in classical digital hardware, and the fact that a wide variety of physical layer controls, such as dynamic error suppression, are known to fall within the Walsh family. We experimentally implement a real-time field-programmable-gate-array-based Walsh controller producing Walsh timing signals and Walsh-synthesized analog waveforms appropriate for critical tasks in error-resistant quantum control and noise characterization. These demonstrations represent the first step towards a unified framework for the realization of physical layer controls compatible with large-scale quantum-information processing.

  19. A Review of Various Security Protocols in Wireless Sensor Network

    OpenAIRE

    Anupma Sangwan; Deepti Sindhu; Kulbir Singh

    2011-01-01

    Sensor networks are highly distributed networks of small, lightweight wireless sensor nodes, deployed in large numbers to monitor the environment or system by the measurement of physical parameters such as temperature, pressure, or relative humidity, sound, vibration, motion or pollutants, at different locations. A WSN [1] is composed of a large number of low-cost sensor nodes (SNs) and one or several base stations (BS) or destination nodes. SNs are typically small wireless devices with limit...

  20. A wireless power transmission system for an active capsule endoscope for colon inspection.

    Science.gov (United States)

    Jia, Zhiwei; Yan, Guozheng; Shi, Yu; Zhu, Bingquan

    2012-07-01

    Multipurpose active capsule endoscopes (ACE) have drawn considerable attention in recent years, but these devices continue to suffer from energy limitations. In order to deliver stable and sufficient energy safely, a wireless power transmission system based on inductive coupling is presented. The system consists of a double-layer solenoid pair primary coil outside and a multiple secondary coils inside the body. At least 500 mW usable power can be transmitted under the worst geometrical conditions and the safety restraints in a volume of Φ13 × 13 mm. The wireless power transmission system is integrated to an ACE and applied in animal experiments. The designed wireless power transmission is proved to be feasible and potentially safe in a future application.

  1. The Wireless ATM Architecture

    Directory of Open Access Journals (Sweden)

    R. Palitefka

    1998-06-01

    Full Text Available An overview of the proposed wireless ATM structure is provided. Wireless communication have been developed to a level where offered services can now be extended beyond voice and data. There are already wireless LANs, cordless systems offering data services and mobile data. Wireless LAN systems are basically planned for local, on-promises and in-house networking providing short distance radio or infrared links between computer system. The main challenge of wireless ATM is to harmonise the development of broadband wireless system with service B -ISDN/ATM and ATM LANs, and offer multimedia multiservice features for the support of time-sensitive voice communication, video, desktop multimedia applications, and LAN data traffic for the wireless user.

  2. Fault Tolerance in ZigBee Wireless Sensor Networks

    Science.gov (United States)

    Alena, Richard; Gilstrap, Ray; Baldwin, Jarren; Stone, Thom; Wilson, Pete

    2011-01-01

    Wireless sensor networks (WSN) based on the IEEE 802.15.4 Personal Area Network standard are finding increasing use in the home automation and emerging smart energy markets. The network and application layers, based on the ZigBee 2007 PRO Standard, provide a convenient framework for component-based software that supports customer solutions from multiple vendors. This technology is supported by System-on-a-Chip solutions, resulting in extremely small and low-power nodes. The Wireless Connections in Space Project addresses the aerospace flight domain for both flight-critical and non-critical avionics. WSNs provide the inherent fault tolerance required for aerospace applications utilizing such technology. The team from Ames Research Center has developed techniques for assessing the fault tolerance of ZigBee WSNs challenged by radio frequency (RF) interference or WSN node failure.

  3. Temperature estimation of induction machines based on wireless sensor networks

    Directory of Open Access Journals (Sweden)

    Y. Huang

    2018-04-01

    Full Text Available In this paper, a fourth-order Kalman filter (KF algorithm is implemented in the wireless sensor node to estimate the temperatures of the stator winding, the rotor cage and the stator core in the induction machine. Three separate wireless sensor nodes are used as the data acquisition systems for different input signals. Six Hall sensors are used to acquire the three-phase stator currents and voltages of the induction machine. All of them are processed to root mean square (rms in ampere and volt. A rotary encoder is mounted for the rotor speed and Pt-1000 is used for the temperature of the coolant air. The processed signals in the physical unit are transmitted wirelessly to the host wireless sensor node, where the KF is implemented with fixed-point arithmetic in Contiki OS. Time-division multiple access (TDMA is used to make the wireless transmission more stable. Compared to the floating-point implementation, the fixed-point implementation has the same estimation accuracy at only about one-fifth of the computation time. The temperature estimation system can work under any work condition as long as there are currents through the machine. It can also be rebooted for estimation even when wireless transmission has collapsed or packages are missing.

  4. Optical wireless links with enhanced linearity and selectivity [Invited

    Science.gov (United States)

    Green, Roger J.; Sweet, C.; Idrus, S.

    2005-10-01

    Optical wireless is an attractive medium as an alternative to optical fiber communications, and also to RF, because of its high bandwidth and relative ease of use, especially when it comes to deployment in new physical situations. We describe an optical wireless link approach that offers a performance that gives analog transmission with significantly reduced distortion levels and enhanced reception sensitivity by combining a novel hybrid detector-amplifier technique. Reduction of distortion by 40 dB and improvement in sensitivity of 20-30 dB is possible, using the techniques described.

  5. Physical-layer network coding in coherent optical OFDM systems.

    Science.gov (United States)

    Guan, Xun; Chan, Chun-Kit

    2015-04-20

    We present the first experimental demonstration and characterization of the application of optical physical-layer network coding in coherent optical OFDM systems. It combines two optical OFDM frames to share the same link so as to enhance system throughput, while individual OFDM frames can be recovered with digital signal processing at the destined node.

  6. Wireless Communication Technologies

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Communication Technologies. Since 1999, the wireless LAN has experienced a tremendous growth. Reasons: Adoption of industry standards. Interoperability testing. The progress of wireless equipments to higher data rates. Rapid decrease in product ...

  7. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling.

    Science.gov (United States)

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-09-18

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.

  8. Performance evaluation and traffic modeling

    NARCIS (Netherlands)

    Berg, J.L. van den; Bohnert, T.M.; Cabral, O.; Moltchanov, D.; Staehle, D.; Velez, F.

    2009-01-01

    Mobile and wireless communication systems are becoming more and more complex, making understanding the interaction of different technologies on different layers a very difficult task. The introduction of sophisticated techniques on the physical layer that react to changes of the wireless channel on

  9. Wireless security in mobile health.

    Science.gov (United States)

    Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan

    2012-12-01

    Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.

  10. An improved technique for the detection of pilot contamination attacks in TDD wireless communication systems

    Directory of Open Access Journals (Sweden)

    Mihaylova Dimitriya

    2017-01-01

    Full Text Available One of the problems phasing the physical layer security of a wireless system is its vulnerability to pilot contamination attacks and hence schemes for its detection need to be applied. A method proposed in the literature consists of training with two N-PSK pilots. Although the method is effective in most of the cases, it is not able to discover an attack initiated during the transmission of the second pilot from the pair if both the legitimate and non-legitimate pilots coincide. In this current paper, an improvement to this method is proposed which detects an intruder who misses the first pilot transmission. The suggested improvement eliminates the usage of threshold values in the detection – a main drawback of previously existing solution.

  11. Novel wireless sensors for in situ measurement of sub-ice hydrologic systems

    OpenAIRE

    Bagshaw, E; Lishman, B; Wadham, J; Bowden, J; Burrow, S; Clare, L; Chandler, D

    2014-01-01

    Wireless sensors have the potential to provide significant insight into in situ physical and biogeochemical processes in sub-ice hydrologic systems. However, the nature of the glacial environment means that sensor deployment and data return is challenging. We describe two bespoke sensor platforms, electronic tracers or ‘ETracers’, and ‘cryoegg’, for untethered, wireless data collection from glacial hydrologic systems, including subglacial channels. Both employ radio frequencies for data trans...

  12. Interference in wireless ad hoc networks with smart antennas

    KAUST Repository

    Alabdulmohsin, Ibrahim

    2014-01-01

    In this paper, we show that the use of directional antennas in wireless ad hoc networks can actually increase interference due to limitations of virtual carrier sensing. We derive a simple mathematical expression for interference in both physical

  13. Flood and Traffic Wireless Monitoring System for Smart Cities

    KAUST Repository

    Mousa, Mustafa

    2016-01-01

    The convergence of computation, communication and sensing has led to the emergence of Wireless Sensor Networks (WSNs), which allow distributed monitoring of physical phenomena over extended areas. In this thesis, we focus on a dual flood and traffic

  14. A Priority-aware Frequency Domain Polling MAC Protocol for OFDMA-based Networks in Cyber-physical Systems

    Institute of Scientific and Technical Information of China (English)

    Meng Zheng; Junru Lin; Wei Liang; Haibin Yu

    2015-01-01

    Wireless networking in cyber-physical systems(CPSs) is characteristically different from traditional wireless systems due to the harsh radio frequency environment and applications that impose high real-time and reliability constraints.One of the fundamental considerations for enabling CPS networks is the medium access control protocol. To this end, this paper proposes a novel priority-aware frequency domain polling medium access control(MAC) protocol, which takes advantage of an orthogonal frequency-division multiple access(OFDMA)physical layer to achieve instantaneous priority-aware polling.Based on the polling result, the proposed work then optimizes the resource allocation of the OFDMA network to further improve the data reliability. Due to the non-polynomial-complete nature of the OFDMA resource allocation, we propose two heuristic rules,based on which an efficient solution algorithm to the OFDMA resource allocation problem is designed. Simulation results show that the reliability performance of CPS networks is significantly improved because of this work.

  15. Ubiquitous Wireless Smart Sensing and Control

    Science.gov (United States)

    Wagner, Raymond

    2013-01-01

    Need new technologies to reliably and safely have humans interact within sensored environments (integrated user interfaces, physical and cognitive augmentation, training, and human-systems integration tools). Areas of focus include: radio frequency identification (RFID), motion tracking, wireless communication, wearable computing, adaptive training and decision support systems, and tele-operations. The challenge is developing effective, low cost/mass/volume/power integrated monitoring systems to assess and control system, environmental, and operator health; and accurately determining and controlling the physical, chemical, and biological environments of the areas and associated environmental control systems.

  16. Scaling Laws for Heterogeneous Wireless Networks

    Science.gov (United States)

    2009-09-01

    planned and the size of communication networks that are fundamentally understood. On the one hand, wireline networks (like the Internet) have grown from...Franceschetti, Marco D. Migliore, and Paolo Minero . The capacity of wireless networks: Information-theoretic and physical limits. In Proceedings of the...Allerton Conference on Communication, Control, and Computing, September 2007. [12] Massimo Franceschetti, Marco D. Migliore, and Paolo Minero . The

  17. Additively Manufactured IN718 Components with Wirelessly Powered and Interrogated Embedded Sensing

    Energy Technology Data Exchange (ETDEWEB)

    Attridge, Paul [United Technologies Research Center, East Hartford, CT (United States); Bajekal, Sanjay [United Technologies Research Center, East Hartford, CT (United States); Klecka, Michael [United Technologies Research Center, East Hartford, CT (United States); Wu, Xin [United Technologies Research Center, East Hartford, CT (United States); Savulak, Steve [United Technologies Research Center, East Hartford, CT (United States); Viens, Dan [United Technologies Research Center, East Hartford, CT (United States); Carey, Michael [United Technologies Research Center, East Hartford, CT (United States); Miano, John [United Technologies Research Center, East Hartford, CT (United States); Rioux, William [United Technologies Research Center, East Hartford, CT (United States); Zacchio, Joseph [United Technologies Research Center, East Hartford, CT (United States); Dunst, Richard [National Energy Technology Lab. (NETL), Pittsburgh, PA, (United States); Straub, Doug [National Energy Technology Lab. (NETL), Pittsburgh, PA, (United States); Mantese, Joseph [United Technologies Research Center, East Hartford, CT (United States)

    2017-07-14

    A methodology is described for embedding commercial-off-the-shelf sensors together with wireless communication and power circuit elements using direct laser metal sintered additively manufactured components. Physics based models of the additive manufacturing processes and sensor/wireless level performance models guided the design and embedment processes. A combination of cold spray deposition and laser engineered net shaping was used to fashion the transmitter/receiving elements and embed the sensors, thereby providing environmental protection and component robustness/survivability for harsh conditions. By design, this complement of analog and digital sensors were wirelessly powered and interrogated using a health and utilization monitoring system; enabling real-time, in situ prognostics and diagnostics.

  18. Optimal Performance Monitoring of Hybrid Mid-Infrared Wavelength MIMO Free Space Optical and RF Wireless Networks in Fading Channels

    Science.gov (United States)

    Schmidt, Barnet Michael

    An optimal performance monitoring metric for a hybrid free space optical and radio-frequency (RF) wireless network, the Outage Capacity Objective Function, is analytically developed and studied. Current and traditional methods of performance monitoring of both optical and RF wireless networks are centered on measurement of physical layer parameters, the most common being signal-to-noise ratio, error rate, Q factor, and eye diagrams, occasionally combined with link-layer measurements such as data throughput, retransmission rate, and/or lost packet rate. Network management systems frequently attempt to predict or forestall network failures by observing degradations of these parameters and to attempt mitigation (such as offloading traffic, increasing transmitter power, reducing the data rate, or combinations thereof) prior to the failure. These methods are limited by the frequent low sensitivity of the physical layer parameters to the atmospheric optical conditions (measured by optical signal-to-noise ratio) and the radio frequency fading channel conditions (measured by signal-to-interference ratio). As a result of low sensitivity, measurements of this type frequently are unable to predict impending failures sufficiently in advance for the network management system to take corrective action prior to the failure. We derive and apply an optimal measure of hybrid network performance based on the outage capacity of the hybrid optical and RF channel, the outage capacity objective function. The objective function provides high sensitivity and reliable failure prediction, and considers both the effects of atmospheric optical impairments on the performance of the free space optical segment as well as the effect of RF channel impairments on the radio frequency segment. The radio frequency segment analysis considers the three most common RF channel fading statistics: Rayleigh, Ricean, and Nakagami-m. The novel application of information theory to the underlying physics of the

  19. A Novel Spectrally Efficient Asynchronous Multi-Channel MAC Using a Half-Duplex Transceiver for Wireless Networks

    Directory of Open Access Journals (Sweden)

    Abdullah Devendiran

    2018-01-01

    Full Text Available Multi-channel medium access control (MAC protocols maximize network performance by enabling concurrent wireless transmissions over non-interfering channels. Despite physical layer advancements, the underlying IEEE 802.11 MAC standard cannot fully exploit features and support high-performance applications. In this work, we propose the novel spectrally efficient asynchronous multi-channel MAC (SA-MMAC protocol for wireless networks using a single half-duplex transceiver. A full-duplex mode of operation on data channels reduces the signaling overhead and boosts the spectrum efficiency. A revamped contention mechanism of IEEE 802.11 addresses the multi-channel hidden terminal problem, and a jamming signal from the receiver addresses the collisions in control signals. Furthermore, the control channel is used for data transmissions to increase the bandwidth utilization but under a restricted half-duplex mode to avoid causing a bottleneck situation. The simulator is tested for correctness. The results suggest that the protocol can work well on 3, 4, or 12 concurrent channels with high node density, providing about 12.5 times more throughput than IEEE 802.11 and 18% to 95% more throughput than its multi-channel variants under saturated traffic conditions.

  20. Data-Driven Design of Intelligent Wireless Networks: An Overview and Tutorial

    Directory of Open Access Journals (Sweden)

    Merima Kulin

    2016-06-01

    Full Text Available Data science or “data-driven research” is a research approach that uses real-life data to gain insight about the behavior of systems. It enables the analysis of small, simple as well as large and more complex systems in order to assess whether they function according to the intended design and as seen in simulation. Data science approaches have been successfully applied to analyze networked interactions in several research areas such as large-scale social networks, advanced business and healthcare processes. Wireless networks can exhibit unpredictable interactions between algorithms from multiple protocol layers, interactions between multiple devices, and hardware specific influences. These interactions can lead to a difference between real-world functioning and design time functioning. Data science methods can help to detect the actual behavior and possibly help to correct it. Data science is increasingly used in wireless research. To support data-driven research in wireless networks, this paper illustrates the step-by-step methodology that has to be applied to extract knowledge from raw data traces. To this end, the paper (i clarifies when, why and how to use data science in wireless network research; (ii provides a generic framework for applying data science in wireless networks; (iii gives an overview of existing research papers that utilized data science approaches in wireless networks; (iv illustrates the overall knowledge discovery process through an extensive example in which device types are identified based on their traffic patterns; (v provides the reader the necessary datasets and scripts to go through the tutorial steps themselves.

  1. CCNA Wireless Study Guide

    CERN Document Server

    Lammle, Todd

    2010-01-01

    A complete guide to the CCNA Wireless exam by leading networking authority Todd Lammle. The CCNA Wireless certification is the most respected entry-level certification in this rapidly growing field. Todd Lammle is the undisputed authority on networking, and this book focuses exclusively on the skills covered in this Cisco certification exam. The CCNA Wireless Study Guide joins the popular Sybex study guide family and helps network administrators advance their careers with a highly desirable certification.: The CCNA Wireless certification is the most respected entry-level wireless certification

  2. Wireless Power Transmission to Organic Light Emitting Diode Lighting Panel with Magnetically Coupled Resonator

    Science.gov (United States)

    Kim, Yong-Hae; Han, Jun-Han; Kang, Seung-Youl; Cheon, Sanghoon; Lee, Myung-Lae; Ahn, Seong-Deok; Zyung, Taehyoung; Lee, Jeong-Ik; Moon, Jaehyun; Chu, Hye Yong

    2012-09-01

    We are successful to lit the organic light emitting diode (OLED) lighting panel through the magnetically coupled wireless power transmission technology. For the wireless power transmission, we used the operation frequency 932 kHz, specially designed double spiral type transmitter, small and thin receiver on the four layered printed circuit board, and schottky diodes for the full bridge rectifier. Our white OLED is a hybrid type, in which phosphorescent and fluorescent organics are used together to generate stable white color. The total efficiency of power transmission is around 72%.

  3. Localization in Wireless Networks Foundations and Applications

    CERN Document Server

    Sanford, Jessica Feng; Slijepcevic, Sasha

    2012-01-01

    In a computational tour-de-force, this volume wipes away a host of problems related to location discovery in wireless ad-hoc sensor networks. WASNs have recognized potential in many applications that are location-dependent, yet are heavily constrained by factors such as cost and energy consumption. Their “ad-hoc” nature, with direct rather than mediated connections between a network of wireless devices, adds another layer of difficulty.   Basing this work entirely on data-driven, coordinated algorithms, the authors' aim is to present location discovery techniques that are highly accurate—and which fit user criteria. The research deploys nonparametric statistical methods and relies on the concept of joint probability to construct error (including location error) models and environmental field models. It also addresses system issues such as the broadcast and scheduling of the beacon. Reporting an impressive accuracy gain of almost 17 percent, and organized in a clear, sequential manner, this book represe...

  4. Wirelessly powered micro-tracer enabled by miniaturized antenna and microfluidic channel

    International Nuclear Information System (INIS)

    Duan, G; Zhao, X; Seren, H R; Chen, C; Zhang, X

    2015-01-01

    A miniaturized antenna, 380μm by 380μm in size, was fabricated and integrated with a commercialized passive RFID chip to form a micro-tracer, whose size was 2mm by 1mm in total. The micro-tracer was wirelessly powered and interrogated by a single layer spiral reader antenna through near field coupling. To maximize the working distance, the resonant frequency of micro-tracer and reader antenna were matched at 840MHz. Due to the ultra small size of the tracer antenna, power transfer efficiency decreased dramatically as the distance between tracer antenna and reader antenna increased, thus the working distance of the microtracer was limited within 1mm. To achieve massive operation of the micro-tracer, a microfluidic platform was fabricated with in channel focusing and separation. Acrylic sheets were laser cut to define the channel and cover structure, then bonded together layer by layer with a glass substrate, on which reader antenna was integrated. Pump oil was used as the fluidic media carrying the micro-tracer flowing inside the microfluidic channel. The wireless power transfer and real-time communication was demonstrated with the micro-tracer flowing above the reader antenna, as the ID of the micro-tracer was retrieved and displayed on a computer screen. (paper)

  5. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  6. mm-Wave Hybrid Photonic Wireless Links for Ultra-High Speed Wireless Transmissions

    DEFF Research Database (Denmark)

    Rommel, Simon; Vegas Olmos, Juan José; Tafur Monroy, Idelfonso

    Hybrid photonic-wireless transmission schemes in the mm-wave frequency range are promising candidates to enable the multi-gigabit per second data communications required from wireless and mobile networks of the 5th and future generations. Large FCC spectrum allocations for wireless transmission...

  7. Efficient Deployment of Key Nodes for Optimal Coverage of Industrial Mobile Wireless Networks.

    Science.gov (United States)

    Li, Xiaomin; Li, Di; Dong, Zhijie; Hu, Yage; Liu, Chengliang

    2018-02-10

    In recent years, industrial wireless networks (IWNs) have been transformed by the introduction of mobile nodes, and they now offer increased extensibility, mobility, and flexibility. Nevertheless, mobile nodes pose efficiency and reliability challenges. Efficient node deployment and management of channel interference directly affect network system performance, particularly for key node placement in clustered wireless networks. This study analyzes this system model, considering both industrial properties of wireless networks and their mobility. Then, static and mobile node coverage problems are unified and simplified to target coverage problems. We propose a novel strategy for the deployment of clustered heads in grouped industrial mobile wireless networks (IMWNs) based on the improved maximal clique model and the iterative computation of new candidate cluster head positions. The maximal cliques are obtained via a double-layer Tabu search. Each cluster head updates its new position via an improved virtual force while moving with full coverage to find the minimal inter-cluster interference. Finally, we develop a simulation environment. The simulation results, based on a performance comparison, show the efficacy of the proposed strategies and their superiority over current approaches.

  8. Streetlight Control System Based on Wireless Communication over DALI Protocol

    Science.gov (United States)

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-01-01

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed. PMID:27128923

  9. Streetlight Control System Based on Wireless Communication over DALI Protocol.

    Science.gov (United States)

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-04-27

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed.

  10. SDN Based User-Centric Framework for Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Zhaoming Lu

    2016-01-01

    Full Text Available Due to the rapid growth of mobile data traffic, more and more basestations and access points (APs have been densely deployed to provide users with ubiquitous network access, which make current wireless network a complex heterogeneous network (HetNet. However, traditional wireless networks are designed with network-centric approaches where different networks have different quality of service (QoS strategies and cannot easily cooperate with each other to serve network users. Massive network infrastructures could not assure users perceived network and service quality, which is an indisputable fact. To address this issue, we design a new framework for heterogeneous wireless networks with the principle of user-centricity, refactoring the network from users’ perspective to suffice their requirements and preferences. Different from network-centric approaches, the proposed framework takes advantage of Software Defined Networking (SDN and virtualization technology, which will bring better perceived services quality for wireless network users. In the proposed user-centric framework, control plane and data plane are decoupled to manage the HetNets in a flexible and coadjutant way, and resource virtualization technology is introduced to abstract physical resources of HetNets into unified virtualized resources. Hence, ubiquitous and undifferentiated network connectivity and QoE (quality of experience driven fine-grained resource management could be achieved for wireless network users.

  11. Wireless passive radiation sensor

    Science.gov (United States)

    Pfeifer, Kent B; Rumpf, Arthur N; Yelton, William G; Limmer, Steven J

    2013-12-03

    A novel measurement technique is employed using surface acoustic wave (SAW) devices, passive RF, and radiation-sensitive films to provide a wireless passive radiation sensor that requires no batteries, outside wiring, or regular maintenance. The sensor is small (<1 cm.sup.2), physically robust, and will operate unattended for decades. In addition, the sensor can be insensitive to measurement position and read distance due to a novel self-referencing technique eliminating the need to measure absolute responses that are dependent on RF transmitter location and power.

  12. Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Hong-Chuan Yang

    2007-01-01

    Full Text Available We study the energy-efficient configuration of multihop paths with automatic repeat request (ARQ mechanism in wireless ad hoc networks. We adopt a cross-layer design approach and take both the quality of each radio hop and the battery capacity of each transmitting node into consideration. Under certain constraints on the maximum tolerable transmission delay and the required packet delivery ratio, we solve optimization problems to jointly schedule the transmitting power of each transmitting node and the retransmission limit over each hop. Numerical results demonstrate that the path configuration methods can either significantly reduce the average energy consumption per packet delivery or considerably extend the average lifetime of the multihop route.

  13. Throughput vs. Delay in Lossy Wireless Mesh Networks with Random Linear Network Coding

    DEFF Research Database (Denmark)

    Hundebøll, Martin; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani

    2014-01-01

    This work proposes a new protocol applying on– the–fly random linear network coding in wireless mesh net- works. The protocol provides increased reliability, low delay, and high throughput to the upper layers, while being oblivious to their specific requirements. This seemingly conflicting goals ...

  14. MAC-layer protocol for TCP fairness in Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal

    2012-08-01

    In this paper we study the interactions of TCP and IEEE 802.11 MAC in Wireless Mesh Networks (WMNs). We use a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput performance due to the effect of queue utilization and packet relaying. A closed form solution is derived to numerically determine the throughput. Based on the developed model, we propose a distributed MAC protocol to alleviate the unfairness problem in WMNs. Our protocol uses the age of packet as a priority metric for packet scheduling. Simulation is conducted to validate our model and to illustrate the fairness characteristics of our proposed MAC protocol. We conclude that we can achieve fairness with only little impact on network capacity.

  15. A comprehensive survey of energy-aware routing protocols in wireless body area sensor networks.

    Science.gov (United States)

    Effatparvar, Mehdi; Dehghan, Mehdi; Rahmani, Amir Masoud

    2016-09-01

    Wireless body area sensor network is a special purpose wireless sensor network that, employing wireless sensor nodes in, on, or around the human body, makes it possible to measure biological parameters of a person for specific applications. One of the most fundamental concerns in wireless body sensor networks is accurate routing in order to send data promptly and properly, and therefore overcome some of the challenges. Routing protocols for such networks are affected by a large number of factors including energy, topology, temperature, posture, the radio range of sensors, and appropriate quality of service in sensor nodes. Since energy is highly important in wireless body area sensor networks, and increasing the network lifetime results in benefiting greatly from sensor capabilities, improving routing performance with reduced energy consumption presents a major challenge. This paper aims to study wireless body area sensor networks and the related routing methods. It also presents a thorough, comprehensive review of routing methods in wireless body area sensor networks from the perspective of energy. Furthermore, different routing methods affecting the parameter of energy will be classified and compared according to their advantages and disadvantages. In this paper, fundamental concepts of wireless body area sensor networks are provided, and then the advantages and disadvantages of these networks are investigated. Since one of the most fundamental issues in wireless body sensor networks is to perform routing so as to transmit data precisely and promptly, we discuss the same issue. As a result, we propose a classification of the available relevant literature with respect to the key challenge of energy in the routing process. With this end in view, all important papers published between 2000 and 2015 are classified under eight categories including 'Mobility-Aware', 'Thermal-Aware', 'Restriction of Location and Number of Relays', 'Link-aware', 'Cluster- and Tree

  16. Novel Congestion-Free Alternate Routing Path Scheme using Stackelberg Game Theory Model in Wireless Networks

    Directory of Open Access Journals (Sweden)

    P. Chitra

    2017-04-01

    Full Text Available Recently, wireless network technologies were designed for most of the applications. Congestion raised in the wireless network degrades the performance and reduces the throughput. Congestion-free network is quit essen- tial in the transport layer to prevent performance degradation in a wireless network. Game theory is a branch of applied mathematics and applied sciences that used in wireless network, political science, biology, computer science, philosophy and economics. e great challenges of wireless network are their congestion by various factors. E ective congestion-free alternate path routing is pretty essential to increase network performance. Stackelberg game theory model is currently employed as an e ective tool to design and formulate conges- tion issues in wireless networks. is work uses a Stackelberg game to design alternate path model to avoid congestion. In this game, leaders and followers are selected to select an alternate routing path. e correlated equilibrium is used in Stackelberg game for making better decision between non-cooperation and cooperation. Congestion was continuously monitored to increase the throughput in the network. Simulation results show that the proposed scheme could extensively improve the network performance by reducing congestion with the help of Stackelberg game and thereby enhance throughput.

  17. Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture

    Science.gov (United States)

    Steele, Kerry D [Kennewick, WA; Anderson, Gordon A [Benton City, WA; Gilbert, Ronald W [Morgan Hill, CA

    2011-02-01

    Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture are described. In one aspect, a communications device identification method includes providing identification information regarding a group of wireless identification devices within a wireless communications range of a reader, using the provided identification information, selecting one of a plurality of different search procedures for identifying unidentified ones of the wireless identification devices within the wireless communications range, and identifying at least some of the unidentified ones of the wireless identification devices using the selected one of the search procedures.

  18. Wireless adiabatic power transfer

    International Nuclear Information System (INIS)

    Rangelov, A.A.; Suchowski, H.; Silberberg, Y.; Vitanov, N.V.

    2011-01-01

    Research highlights: → Efficient and robust mid-range wireless energy transfer between two coils. → The adiabatic energy transfer is analogous to adiabatic passage in quantum optics. → Wireless energy transfer is insensitive to any resonant constraints. → Wireless energy transfer is insensitive to noise in the neighborhood of the coils. - Abstract: We propose a technique for efficient mid-range wireless power transfer between two coils, by adapting the process of adiabatic passage for a coherently driven two-state quantum system to the realm of wireless energy transfer. The proposed technique is shown to be robust to noise, resonant constraints, and other interferences that exist in the neighborhood of the coils.

  19. Wireless communication technology NFC

    OpenAIRE

    MÁROVÁ, Kateřina

    2014-01-01

    Aim of this bachelor thesis is to handle the issue of new wireless communication technology NFC (Near Field Communication) including a comparison of advantages and disadvantages of NFC with other wireless technologies (Bluetooth, Wi-Fi, etc.). NFC is a technology for wireless communications between different electronic devices, one of which is typically a mobile phone. Near Field Communication allows wireless communication at very short distance by approaching or enclosing two devices and can...

  20. 75 FR 8400 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-02-24

    ... Communications System Server Software, Wireless Handheld Devices and Battery Packs; Notice of Investigation... within the United States after importation of certain wireless communications system server software... certain wireless communications system server software, wireless handheld devices or battery packs that...

  1. 75 FR 43206 - In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld...

    Science.gov (United States)

    2010-07-23

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-706] In the Matter of Certain Wireless Communications System Server Software, Wireless Handheld Devices and Battery Packs: Notice of Commission... United States after importation of certain wireless communications system server software, wireless...

  2. Wireless data transfer with mm-waves for future tracking detectors

    International Nuclear Information System (INIS)

    Pelikan, D.; Bingefors, N.; Brenner, R.; Gustafsson, L.; Dancila, D.

    2014-01-01

    Wireless data transfer has revolutionized the consumer market for the last decade generating many products equipped with transmitters and receivers for wireless data transfer. Wireless technology opens attractive possibilities for data transfer in future tracking detectors. The reduction of wires and connectors for data links is certainly beneficial both for the material budget and the reliability of the system. An advantage of wireless data transfer is the freedom of routing signals which today is particularly complicated when bringing the data the first 50 cm out of the tracker. With wireless links intelligence can be built into a tracker by introducing communication between tracking layers within a region of interest which would allow the construction of track primitives in real time. The wireless technology used in consumer products is however not suitable for tracker readouts. The low data transfer capacity of current 5 GHz transceivers and the relatively large feature sizes of the components is a disadvantage.Due to the requirement of high data rates in tracking detectors high bandwidth is required. The frequency band around 60 GHz turns out to be a very promising candidate for data transfer in a detector system. The high baseband frequency allows for data transfer in the order of several Gbit/s. Due to the small wavelength in the mm range only small structures are needed for the transmitting and receiving electronics. The 60 GHz frequency band is a strong candidate for future WLAN applications hence components are already starting to be available on the market.Patch antennas produced on flexible Printed Circuit Board substrate that can be used for wireless communication in future trackers are presented in this article. The antennas can be connected to transceivers for data transmission/reception or be connected by wave-guides to structures capable of bringing the 60 GHz signal behind boundaries. Results on simulation and fabrication of these antennas are

  3. Wireless data transfer with mm-waves for future tracking detectors

    Science.gov (United States)

    Pelikan, D.; Bingefors, N.; Brenner, R.; Dancila, D.; Gustafsson, L.

    2014-11-01

    Wireless data transfer has revolutionized the consumer market for the last decade generating many products equipped with transmitters and receivers for wireless data transfer. Wireless technology opens attractive possibilities for data transfer in future tracking detectors. The reduction of wires and connectors for data links is certainly beneficial both for the material budget and the reliability of the system. An advantage of wireless data transfer is the freedom of routing signals which today is particularly complicated when bringing the data the first 50 cm out of the tracker. With wireless links intelligence can be built into a tracker by introducing communication between tracking layers within a region of interest which would allow the construction of track primitives in real time. The wireless technology used in consumer products is however not suitable for tracker readouts. The low data transfer capacity of current 5 GHz transceivers and the relatively large feature sizes of the components is a disadvantage.Due to the requirement of high data rates in tracking detectors high bandwidth is required. The frequency band around 60 GHz turns out to be a very promising candidate for data transfer in a detector system. The high baseband frequency allows for data transfer in the order of several Gbit/s. Due to the small wavelength in the mm range only small structures are needed for the transmitting and receiving electronics. The 60 GHz frequency band is a strong candidate for future WLAN applications hence components are already starting to be available on the market.Patch antennas produced on flexible Printed Circuit Board substrate that can be used for wireless communication in future trackers are presented in this article. The antennas can be connected to transceivers for data transmission/reception or be connected by wave-guides to structures capable of bringing the 60 GHz signal behind boundaries. Results on simulation and fabrication of these antennas are

  4. Miracle: The Multi-Interface Cross-Layer Extension of ns2

    Directory of Open Access Journals (Sweden)

    Guerra Federico

    2010-01-01

    Full Text Available We present Miracle, a novel framework which extends ns2 to facilitate the simulation and the design of beyond 4G networks. Miracle enhances ns2 by providing an efficient and embedded engine for handling cross-layer messages and, at the same time, enabling the coexistence of multiple modules within each layer of the protocol stack. We also present a novel framework developed as an extension of Miracle called Miracle PHY and MAC. This framework facilitates the development of more realistic Channel, PHY and MAC modules, considering features currently lacking in most state-of-the-art simulators, while at the same time giving a strong emphasis on code modularity, interoperability and reusability. Finally, we provide an overview of the wireless technologies implemented in Miracle, discussing in particular the models for the IEEE 802.11, UMTS and WiMAX standards and for Underwater Acoustic Networks. We observe that, thanks to Miracle and its extensions, it is possible to carefully simulate complex network architectures at all the OSI layers, from the physical reception model to standard applications and system management schemes. This allows to have a comprehensive view of all the interactions among network components, which play an important role in many research areas, such as cognitive networking and cross-layer design.

  5. Dynamic power control for wireless backbone mesh networks: a survey

    CSIR Research Space (South Africa)

    Olwal, TO

    2010-01-01

    Full Text Available points of failures, and robust against RF interference, obstacles or power outage. This is because WMRs forming wireless backbone mesh networks (WBMNs) are built on advanced physical technologies. Such nodes perform both accessing and forwarding...

  6. Battery-Free Love-Wave-Based Neural Probe and Its Wireless Characterizations

    Science.gov (United States)

    Jung, In Ki; Fu, Chen; Lee, Keekeun

    2013-06-01

    A wireless Love-wave-based neural probe that utilizes a one-port reflective delay line was developed for both reading and stimulating neurons in the brain. Poly(methyl methacrylate) (PMMA) as a waveguide layer and gold (Au) electrodes were structured on the top of a 41° YX LiNbO3 piezoelectric substrate, following the parameters extracted from coupling-of-mode (COM) modeling. For a one-port reflective delay line, single-phase unidirectional transducers (SPUDTs) and three shorted grating reflectors were employed, which made possible the implementation of a wireless and battery-free neural probe. The fabricated Love-wave-based neural probes were wirelessly measured using two antennas with a 440 MHz central frequency and a network analyzer. Sharp reflection peaks with a high signal-to-noise ratio were observed from the reflection peaks. The probe was immersed in 0.9% saline solution while applying input DC voltages. Good linearity, high sensitivity, and reproducibility were observed depending on DC applied voltage, in the range from 0 to 500 mV. The sensitivity obtained from the DC firings (artificial neural firings) was ˜0.04 µs/VDC, indicating that this prototype probe is very promising for the wireless reading and stimulation of neural firings in in vivo animal testing.

  7. A Wireless Fully Passive Neural Recording Device for Unobtrusive Neuropotential Monitoring.

    Science.gov (United States)

    Kiourti, Asimina; Lee, Cedric W L; Chae, Junseok; Volakis, John L

    2016-01-01

    We propose a novel wireless fully passive neural recording device for unobtrusive neuropotential monitoring. Previous work demonstrated the feasibility of monitoring emulated brain signals in a wireless fully passive manner. In this paper, we propose a novel realistic recorder that is significantly smaller and much more sensitive. The proposed recorder utilizes a highly efficient microwave backscattering method and operates without any formal power supply or regulating elements. Also, no intracranial wires or cables are required. In-vitro testing is performed inside a four-layer head phantom (skin, bone, gray matter, and white matter). Compared to our former implementation, the neural recorder proposed in this study has the following improved features: 1) 59% smaller footprint, 2) up to 20-dB improvement in neuropotential detection sensitivity, and 3) encapsulation in biocompatible polymer. For the first time, temporal emulated neuropotentials as low as 63 μVpp can be detected in a wireless fully passive manner. Remarkably, the high-sensitivity achieved in this study implies reading of most neural signals generated by the human brain. The proposed recorder brings forward transformational possibilities in wireless fully passive neural detection for a very wide range of applications (e.g., epilepsy, Alzheimer's, mental disorders, etc.).

  8. Benchmarking Block Ciphers for Wireless Sensor Networks (Extended Abstract)

    NARCIS (Netherlands)

    Law, Yee Wei; Doumen, Jeroen; Hartel, Pieter H.

    The energy efficiency requirement of wireless sensor networks (WSNs) is especially high because the sensor nodes are meant to operate without human intervention for a long period of time with little energy supply. Besides, available storage is scarce due to their small physical size. Therefore

  9. Bargaining Agents in Wireless Contexts: An Alternating-Offers Protocol for Multi-issue Bilateral Negotiation in Mobile Marketplaces

    Science.gov (United States)

    Ragone, Azzurra; Ruta, Michele; di Sciascio, Eugenio; Donini, Francesco M.

    We present an approach to multi-issue bilateral negotiation for mobile commerce scenarios. The negotiation mechanism has been integrated in a semantic-based application layer enhancing both RFID and Bluetooth wireless standards. OWL DL has been used to model advertisements and relationships among issues within a shared common ontology. Finally, non standard inference services integrated with utility theory help in finding suitable agreements. We illustrate and motivate the provided theoretical framework in a wireless commerce case study.

  10. Physical Layer Security for Cooperative NOMA Systems

    KAUST Repository

    Chen, Jianchao

    2018-01-09

    In this correspondence, we investigate the physical layer security for cooperative non-orthogonal multiple access (NOMA) systems, where both amplify-and-forward (AF) and decode-and-forward (DF) protocols are considered. More specifically, some analytical expressions are derived for secrecy outage probability (SOP) and strictly positive secrecy capacity (SPSC). Results show that AF and DF almost achieve the same secrecy performance. Moreover, asymptotic results demonstrate that the SOP tends to a constant at high signal-to-noise ratio (SNR). Finally, our results show that the secrecy performance of considered NOMA systems is independent of the channel conditions between the relay and the poor user.

  11. Physical Layer Security for Cooperative NOMA Systems

    KAUST Repository

    Chen, Jianchao; Yang, Liang; Alouini, Mohamed-Slim

    2018-01-01

    In this correspondence, we investigate the physical layer security for cooperative non-orthogonal multiple access (NOMA) systems, where both amplify-and-forward (AF) and decode-and-forward (DF) protocols are considered. More specifically, some analytical expressions are derived for secrecy outage probability (SOP) and strictly positive secrecy capacity (SPSC). Results show that AF and DF almost achieve the same secrecy performance. Moreover, asymptotic results demonstrate that the SOP tends to a constant at high signal-to-noise ratio (SNR). Finally, our results show that the secrecy performance of considered NOMA systems is independent of the channel conditions between the relay and the poor user.

  12. Effect of metal shielding on a wireless power transfer system

    Science.gov (United States)

    Li, Jiacheng; Huang, Xueliang; Chen, Chen; Tan, Linlin; Wang, Wei; Guo, Jinpeng

    2017-05-01

    In this paper, the effect of non-ferromagnetic metal shielding (NFMS) material on the resonator of wireless power transfer (WPT) is studied by modeling, simulation and experimental analysis. And, the effect of NFMS material on the power transfer efficiency (PTE) of WPT systems is investigated by circuit model. Meanwhile, the effect of ferromagnetic metal shielding material on the PTE of WPT systems is analyzed through simulation. A double layer metal shield structure is designed. Experimental results demonstrate that by applying the novel double layer metal shielding method, the system PTE increases significantly while the electromagnetic field of WPT systems declines dramatically.

  13. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  14. Wireless ATM : handover issues

    OpenAIRE

    Jiang, Fan; Käkölä, Timo

    1998-01-01

    Basic aspects of cellular systems and the ATM transmission technology are introduced. Wireless ATM is presented as a combination of radio ATM and mobile ATM. Radio ATM is a wireless extension of an ATM connection while mobile ATM contains the necessary extensions to ATM to support mobility. Because the current ATM technology does not support mobility, handover becomes one of the most important research issues for wireless ATM. Wireless ATM handover requirements are thus analysed. A handover s...

  15. Physical-layer network coding for passive optical interconnect in datacenter networks.

    Science.gov (United States)

    Lin, Rui; Cheng, Yuxin; Guan, Xun; Tang, Ming; Liu, Deming; Chan, Chun-Kit; Chen, Jiajia

    2017-07-24

    We introduce physical-layer network coding (PLNC) technique in a passive optical interconnect (POI) architecture for datacenter networks. The implementation of the PLNC in the POI at 2.5 Gb/s and 10Gb/s have been experimentally validated while the gains in terms of network layer performances have been investigated by simulation. The results reveal that in order to realize negligible packet drop, the wavelengths usage can be reduced by half while a significant improvement in packet delay especially under high traffic load can be achieved by employing PLNC over POI.

  16. Experimental Evaluation of Simulation Abstractions for Wireless Sensor Network MAC Protocols

    Directory of Open Access Journals (Sweden)

    G. P. Halkes

    2010-01-01

    Full Text Available The evaluation of MAC protocols for Wireless Sensor Networks (WSNs is often performed through simulation. These simulations necessarily abstract away from reality in many ways. However, the impact of these abstractions on the results of the simulations has received only limited attention. Moreover, many studies on the accuracy of simulation have studied either the physical layer and per link effects or routing protocol effects. To the best of our knowledge, no other work has focused on the study of the simulation abstractions with respect to MAC protocol performance. In this paper, we present the results of an experimental study of two often used abstractions in the simulation of WSN MAC protocols. We show that a simple SNR-based reception model can provide quite accurate results for metrics commonly used to evaluate MAC protocols. Furthermore, we provide an analysis of what the main sources of deviation are and thereby how the simulations can be improved to provide even better results.

  17. High speed optical wireless data transmission system for particle sensors in high energy physics

    Science.gov (United States)

    Ali, W.; Corsini, R.; Ciaramella, E.; Dell'Orso, R.; Messineo, A.; Palla, F.

    2015-08-01

    High speed optical fiber or copper wire communication systems are frequently deployed for readout data links used in particle physics detectors. Future detector upgrades will need more bandwidth for data transfer, but routing requirements for new cables or optical fiber will be challenging due to space limitations. Optical wireless communication (OWC) can provide high bandwidth connectivity with an advantage of reduced material budget and complexity of cable installation and management. In a collaborative effort, Scuola Superiore Sant'Anna and INFN Pisa are pursuing the development of a free-space optical link that could be installed in a future particle physics detector or upgrade. We describe initial studies of an OWC link using the inner tracker of the Compact Muon Solenoid (CMS) detector as a reference architecture. The results of two experiments are described: the first to verify that the laser source transmission wavelength of 1550 nm will not introduce fake signals in silicon strip sensors while the second was to study the source beam diameter and its tolerance to misalignment. For data rates of 2.5 Gb/s and 10 Gb/s over a 10 cm working distance it was observed that a tolerance limit of ±0.25 mm to ±0.8 mm can be obtained for misaligned systems with source beam diameters of 0.38 mm to 3.5 mm, respectively.

  18. A hybrid MAC protocol design for energy-efficient very-high-throughput millimeter wave, wireless sensor communication networks

    Science.gov (United States)

    Jian, Wei; Estevez, Claudio; Chowdhury, Arshad; Jia, Zhensheng; Wang, Jianxin; Yu, Jianguo; Chang, Gee-Kung

    2010-12-01

    This paper presents an energy-efficient Medium Access Control (MAC) protocol for very-high-throughput millimeter-wave (mm-wave) wireless sensor communication networks (VHT-MSCNs) based on hybrid multiple access techniques of frequency division multiplexing access (FDMA) and time division multiplexing access (TDMA). An energy-efficient Superframe for wireless sensor communication network employing directional mm-wave wireless access technologies is proposed for systems that require very high throughput, such as high definition video signals, for sensing, processing, transmitting, and actuating functions. Energy consumption modeling for each network element and comparisons among various multi-access technologies in term of power and MAC layer operations are investigated for evaluating the energy-efficient improvement of proposed MAC protocol.

  19. Research on a Banknote Printing Wastewater Monitoring System based on Wireless Sensor Network

    International Nuclear Information System (INIS)

    Li, B B; Yuan, Z F

    2006-01-01

    In this paper, a banknote printing wastewater monitoring system based on WSN is presented in line with the system demands and actual condition of the worksite for a banknote printing factory. In Physical Layer, the network node is a nRF9e5-centric embedded instrument, which can realize the multi-function such as data collecting, status monitoring, wireless data transmission and so on. Limited by the computing capability, memory capability, communicating energy and others factors, it is impossible for the node to get every detail information of the network, so the communication protocol on WSN couldn't be very complicated. The competitive-based MACA (Multiple Access with Collision Avoidance) Protocol is introduced in MAC, which can decide the communication process and working mode of the nodes, avoid the collision of data transmission, hidden and exposed station problem of nodes. On networks layer, the routing protocol in charge of the transmitting path of the data, the networks topology structure is arranged based on address assignation. Accompanied with some redundant nodes, the network performances stabile and expandable. The wastewater monitoring system is a tentative practice of WSN theory in engineering. Now, the system has passed test and proved efficiently

  20. An IoT Reader for Wireless Passive Electromagnetic Sensors.

    Science.gov (United States)

    Galindo-Romera, Gabriel; Carnerero-Cano, Javier; Martínez-Martínez, José Juan; Herraiz-Martínez, Francisco Javier

    2017-03-28

    In the last years, many passive electromagnetic sensors have been reported. Some of these sensors are used for measuring harmful substances. Moreover, the response of these sensors is usually obtained with laboratory equipment. This approach highly increases the total cost and complexity of the sensing system. In this work, a novel low-cost and portable Internet-of-Things (IoT) reader for passive wireless electromagnetic sensors is proposed. The reader is used to interrogate the sensors within a short-range wireless link avoiding the direct contact with the substances under test. The IoT functionalities of the reader allows remote sensing from computers and handheld devices. For that purpose, the proposed design is based on four functional layers: the radiating layer, the RF interface, the IoT mini-computer and the power unit. In this paper a demonstrator of the proposed reader is designed and manufactured. The demonstrator shows, through the remote measurement of different substances, that the proposed system can estimate the dielectric permittivity. It has been demonstrated that a linear approximation with a small error can be extracted from the reader measurements. It is remarkable that the proposed reader can be used with other type of electromagnetic sensors, which transduce the magnitude variations in the frequency domain.

  1. Less is more : data reduction in wireless sensor networks

    NARCIS (Netherlands)

    Masoum, Alireza

    2018-01-01

    Wireless sensor networks are monitoring systems consisting of many small, low-cost and low-power devices called sensor nodes. A large number of sensor nodes are deployed in an environment to monitor a physical phenomenon, execute light processes on collected data, and send either raw data or

  2. Quality-of-service provisioning for dynamic heterogeneous wireless sensor networks

    NARCIS (Netherlands)

    Steine, M.

    2013-01-01

    A Wireless Sensor Network (WSN) consists of a large collection of spatially dis- tributed autonomous devices with sensors to monitor physical or environmental conditions, such as air-pollution, temperature and traffic flow. By cooperatively processing and communicating information to central

  3. 'There were more wires than him': the potential for wireless patient monitoring in neonatal intensive care.

    Science.gov (United States)

    Bonner, Oliver; Beardsall, Kathryn; Crilly, Nathan; Lasenby, Joan

    2017-02-01

    The neonatal intensive care unit (NICU) can be one of the most stressful hospital environments. Alongside providing intensive clinical care, it is important that parents have the opportunity for regular physical contact with their babies because the neonatal period is critical for parent-child bonding. At present, monitoring technology in the NICU requires multiple wired sensors to track each baby's vital signs. This study describes the experiences that parents and nurses have with the current monitoring methods, and reports on their responses to the concept of a wireless monitoring system. Semistructured interviews were conducted with six parents, each of whom had babies on the unit, and seven nurses who cared for those babies. The interviews initially focused on the participants' experiences of the current wired system and then on their responses to the concept of a wireless system. The transcripts were analysed using a general inductive approach to identify relevant themes. Participants reported on physical and psychological barriers to parental care, the ways in which the current system obstructed the efficient delivery of clinical care and the perceived benefits and risks of a wireless system. The parents and nurses identified that the wires impeded baby-parent bonding; physically and psychologically. While a wireless system was viewed as potentially enabling greater interaction, staff and parents highlighted potential concerns, including the size, weight and battery life of any new device. The many wires required to safely monitor babies within the NICU creates a negative environment for parents at a critical developmental period, in terms of physical and psychological interactions. Nurses also experience challenges with the existing system, which could negatively impact the clinical care delivery. Developing a wireless system could overcome these barriers, but there remain challenges in designing a device suitable for this unique environment.

  4. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  5. Internal model control for industrial wireless plant using WirelessHART hardware-in-the-loop simulator.

    Science.gov (United States)

    Tran, Chung Duc; Ibrahim, Rosdiazli; Asirvadam, Vijanth Sagayan; Saad, Nordin; Sabo Miya, Hassan

    2018-04-01

    The emergence of wireless technologies such as WirelessHART and ISA100 Wireless for deployment at industrial process plants has urged the need for research and development in wireless control. This is in view of the fact that the recent application is mainly in monitoring domain due to lack of confidence in control aspect. WirelessHART has an edge over its counterpart as it is based on the successful Wired HART protocol with over 30 million devices as of 2009. Recent works on control have primarily focused on maintaining the traditional PID control structure which is proven not adequate for the wireless environment. In contrast, Internal Model Control (IMC), a promising technique for delay compensation, disturbance rejection and setpoint tracking has not been investigated in the context of WirelessHART. Therefore, this paper discusses the control design using IMC approach with a focus on wireless processes. The simulation and experimental results using real-time WirelessHART hardware-in-the-loop simulator (WH-HILS) indicate that the proposed approach is more robust to delay variation of the network than the PID. Copyright © 2017. Published by Elsevier Ltd.

  6. The development of a wireless Love wave biosensor on 41° YX LiNbO3

    International Nuclear Information System (INIS)

    Oh, Hae-Kwan; Wang, Wen; Lee, Keekeun; Min, Churlki; Yang, Sangsik

    2009-01-01

    This paper presents a novel wireless Love-wave-based biosensor using a polymethyl methacrylate (PMMA) waveguide and protein A receptor layers on a 41° YX LiNbO 3 piezoelectric substrate for immunoglobulin G (IgG) detection. A 440 MHz reflective delay line composed of single-phase unidirectional transducers (SPUDTs) and three shorted grating reflectors was fabricated as the sensor element. A theoretical modeling was performed to describe the wave propagation of Love wave devices on a 41° YX LiNbO 3 piezoelectric substrate with large piezoelectricity. The fabricated devices were wirelessly characterized by using the network analyzer as the reader unit. The resultant reflection peaks showed large signal/noise ratio, sharp peaks, and few spurious signals. The binding of the IgG to the protein A receptor layer induced large phase shifts of the reflection peaks due to the mass loading effect. Good linearity, reproducibility, and high sensitivity were observed in the IgG concentration range 1–65 nM. Unique advantages such as high sensitivity and a simple wireless measurement method over other currently available biosensors are also presented

  7. New ergonomic headset for Tongue-Drive System with wireless smartphone interface.

    Science.gov (United States)

    Park, Hangue; Kim, Jeonghee; Huo, Xueliang; Hwang, In-O; Ghovanloo, Maysam

    2011-01-01

    Tongue Drive System (TDS) is a wireless tongue-operated assistive technology (AT), developed for people with severe physical disabilities to control their environment using their tongue motion. We have developed a new ergonomic headset for the TDS with a user-friendly smartphone interface, through which users will be able to wirelessly control various devices, access computers, and drive wheelchairs. This headset design is expected to act as a flexible and multifunctional communication interface for the TDS and improve its usability, accessibility, aesthetics, and convenience for the end users.

  8. Novel Reduced-Feedback Wireless Communication Systems

    KAUST Repository

    Shaqfeh, Mohammad Obaidah; Alnuweiri, Hussein; Alouini, Mohamed-Slim

    2011-01-01

    We have recently contributed to this field and published several journal and conference papers. We are the pioneers to propose a novel reduced-feedback opportunistic scheduling scheme that combines many desired features including fairness in resources distribution across the active terminals and distributed processing at the MAC layer level. In addition our scheme operates close to the upper capacity limits of achievable transmission rates over wireless links. We have also proposed another hybrid scheme that enables adjusting the feedback load flexibly based on rates requirements. We are currently investigating other novel ideas to design reduced-feedback communication systems.

  9. A video wireless capsule endoscopy system powered wirelessly: design, analysis and experiment

    International Nuclear Information System (INIS)

    Pan, Guobing; Chen, Jiaoliao; Xin, Wenhui; Yan, Guozheng

    2011-01-01

    Wireless capsule endoscopy (WCE), as a relatively new technology, has brought about a revolution in the diagnosis of gastrointestinal (GI) tract diseases. However, the existing WCE systems are not widely applied in clinic because of the low frame rate and low image resolution. A video WCE system based on a wireless power supply is developed in this paper. This WCE system consists of a video capsule endoscope (CE), a wireless power transmission device, a receiving box and an image processing station. Powered wirelessly, the video CE has the abilities of imaging the GI tract and transmitting the images wirelessly at a frame rate of 30 frames per second (f/s). A mathematical prototype was built to analyze the power transmission system, and some experiments were performed to test the capability of energy transferring. The results showed that the wireless electric power supply system had the ability to transfer more than 136 mW power, which was enough for the working of a video CE. In in vitro experiments, the video CE produced clear images of the small intestine of a pig with the resolution of 320 × 240, and transmitted NTSC format video outside the body. Because of the wireless power supply, the video WCE system with high frame rate and high resolution becomes feasible, and provides a novel solution for the diagnosis of the GI tract in clinic

  10. MAC-Layer Active Dropping for Real-Time Video Streaming in 4G Access Networks

    KAUST Repository

    She, James

    2010-12-01

    This paper introduces a MAC-layer active dropping scheme to achieve effective resource utilization, which can satisfy the application-layer delay for real-time video streaming in time division multiple access based 4G broadband wireless access networks. When a video frame is not likely to be reconstructed within the application-layer delay bound at a receiver for the minimum decoding requirement, the MAC-layer protocol data units of such video frame will be proactively dropped before the transmission. An analytical model is developed to evaluate how confident a video frame can be delivered within its application-layer delay bound by jointly considering the effects of time-varying wireless channel, minimum decoding requirement of each video frame, data retransmission, and playback buffer. Extensive simulations with video traces are conducted to prove the effectiveness of the proposed scheme. When compared to conventional cross-layer schemes using prioritized-transmission/retransmission, the proposed scheme is practically implementable for more effective resource utilization, avoiding delay propagation, and achieving better video qualities under certain conditions.

  11. Physically Unclonable Cryptographic Primitives by Chemical Vapor Deposition of Layered MoS2.

    Science.gov (United States)

    Alharbi, Abdullah; Armstrong, Darren; Alharbi, Somayah; Shahrjerdi, Davood

    2017-12-26

    Physically unclonable cryptographic primitives are promising for securing the rapidly growing number of electronic devices. Here, we introduce physically unclonable primitives from layered molybdenum disulfide (MoS 2 ) by leveraging the natural randomness of their island growth during chemical vapor deposition (CVD). We synthesize a MoS 2 monolayer film covered with speckles of multilayer islands, where the growth process is engineered for an optimal speckle density. Using the Clark-Evans test, we confirm that the distribution of islands on the film exhibits complete spatial randomness, hence indicating the growth of multilayer speckles is a spatial Poisson process. Such a property is highly desirable for constructing unpredictable cryptographic primitives. The security primitive is an array of 2048 pixels fabricated from this film. The complex structure of the pixels makes the physical duplication of the array impossible (i.e., physically unclonable). A unique optical response is generated by applying an optical stimulus to the structure. The basis for this unique response is the dependence of the photoemission on the number of MoS 2 layers, which by design is random throughout the film. Using a threshold value for the photoemission, we convert the optical response into binary cryptographic keys. We show that the proper selection of this threshold is crucial for maximizing combination randomness and that the optimal value of the threshold is linked directly to the growth process. This study reveals an opportunity for generating robust and versatile security primitives from layered transition metal dichalcogenides.

  12. Efficient Deployment of Key Nodes for Optimal Coverage of Industrial Mobile Wireless Networks

    Science.gov (United States)

    Li, Xiaomin; Li, Di; Dong, Zhijie; Hu, Yage; Liu, Chengliang

    2018-01-01

    In recent years, industrial wireless networks (IWNs) have been transformed by the introduction of mobile nodes, and they now offer increased extensibility, mobility, and flexibility. Nevertheless, mobile nodes pose efficiency and reliability challenges. Efficient node deployment and management of channel interference directly affect network system performance, particularly for key node placement in clustered wireless networks. This study analyzes this system model, considering both industrial properties of wireless networks and their mobility. Then, static and mobile node coverage problems are unified and simplified to target coverage problems. We propose a novel strategy for the deployment of clustered heads in grouped industrial mobile wireless networks (IMWNs) based on the improved maximal clique model and the iterative computation of new candidate cluster head positions. The maximal cliques are obtained via a double-layer Tabu search. Each cluster head updates its new position via an improved virtual force while moving with full coverage to find the minimal inter-cluster interference. Finally, we develop a simulation environment. The simulation results, based on a performance comparison, show the efficacy of the proposed strategies and their superiority over current approaches. PMID:29439439

  13. Data converters for wireless standards

    CERN Document Server

    Shi, Chunlei

    2002-01-01

    Wireless communication is witnessing tremendous growth with proliferation of different standards covering wide, local and personal area networks (WAN, LAN and PAN). The trends call for designs that allow 1) smooth migration to future generations of wireless standards with higher data rates for multimedia applications, 2) convergence of wireless services allowing access to different standards from the same wireless device, 3) inter-continental roaming. This requires designs that work across multiple wireless standards, can easily be reused, achieve maximum hardware share at a minimum power consumption levels particularly for mobile battery-operated devices.

  14. Cross-Layer optimization of the packet loss rate in mobile videoconferencing applications

    OpenAIRE

    Rivera-Rodríguez, R.; Olivares-Domínguez, O. E.; Serrano-Santoyo, A.

    2010-01-01

    Videoconferencing transmission over wireless channels presents relevant challenges in mobile scenarios at vehicular speeds. Previous contributions are focused on the optimization of the transmission of multimedia and delay-sensitive applications over the forward link. In this paper, a new Quality of Service (QoS) parameter adaptation scheme is proposed. This scheme applies the Cross-Layer Design technique on the reverse link of an 1xEV-DO Revision 0 channel. As the wireless channel parameters...

  15. Secure Communications over Wireless Networks Even 1-bit Feedback Helps Achieving Security

    KAUST Repository

    Rezki, Zouheir

    2016-01-06

    Recently, there have been a surge toward developing sophisticated security mechanisms based on a cross layer design. While an extensive progress has been realized toward establishing physical layer security as an important design paradigm to enhance security of existing wireless networks, only a little effort has been made toward designing practical coding schemes that achieve or approach the secrecy capacity. Most of existing results are tied to some simplifying assumptions that do not seem always reasonable (passive eavesdropper, perfect channel state information (CSI), etc.). Furthermore, it is still not very clear how to exploit physical layer security paradigms, together with existing cryptosystems, in order to add a supplementary level of protection for information transmission or to achieve key agreement. In this talk, we address the first part of the above problematic, i.e., the effect of channel uncertainty on network security. Particularly, we show that even a coarse estimate of the main channel (channel between the transmitter and the legitimate receiver) can help providing a positive secrecy rate. Specifically, we assume two types of channel uncertainty at the transmitter. The first one is a rate-limited feedback in a block fading channel where the feedback information can be proactive (at the beginning of the coherence block) or of ARQ-type. The second type of uncertainty takes the form of a noisy estimate of the main channel at the transmitter in a fast fading channel. In both cases, we provide upper and lower bounds on the secrecy capacity. We argue how our achievable schemes and upper bounding techniques extend to multi-user setting (broadcasting a single confidential message or multiple confidential messages to multiple legitimate receivers) and to multiple antenna channels.

  16. Secure Communications over Wireless Networks Even 1-bit Feedback Helps Achieving Security

    KAUST Repository

    Rezki, Zouheir

    2016-01-01

    Recently, there have been a surge toward developing sophisticated security mechanisms based on a cross layer design. While an extensive progress has been realized toward establishing physical layer security as an important design paradigm to enhance security of existing wireless networks, only a little effort has been made toward designing practical coding schemes that achieve or approach the secrecy capacity. Most of existing results are tied to some simplifying assumptions that do not seem always reasonable (passive eavesdropper, perfect channel state information (CSI), etc.). Furthermore, it is still not very clear how to exploit physical layer security paradigms, together with existing cryptosystems, in order to add a supplementary level of protection for information transmission or to achieve key agreement. In this talk, we address the first part of the above problematic, i.e., the effect of channel uncertainty on network security. Particularly, we show that even a coarse estimate of the main channel (channel between the transmitter and the legitimate receiver) can help providing a positive secrecy rate. Specifically, we assume two types of channel uncertainty at the transmitter. The first one is a rate-limited feedback in a block fading channel where the feedback information can be proactive (at the beginning of the coherence block) or of ARQ-type. The second type of uncertainty takes the form of a noisy estimate of the main channel at the transmitter in a fast fading channel. In both cases, we provide upper and lower bounds on the secrecy capacity. We argue how our achievable schemes and upper bounding techniques extend to multi-user setting (broadcasting a single confidential message or multiple confidential messages to multiple legitimate receivers) and to multiple antenna channels.

  17. Streetlight Control System Based on Wireless Communication over DALI Protocol

    Directory of Open Access Journals (Sweden)

    Francisco José Bellido-Outeiriño

    2016-04-01

    Full Text Available Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed.

  18. Novel Concepts of Cooperative Wireless Networking

    DEFF Research Database (Denmark)

    Zhang, Qi

    2008-01-01

    ; secondly, the increasing density of the wireless devices makes cooperation possible; last, the cost of information exchange (i.e. transmission power, transmission time, spectrum, etc.) is very low if information exchange over short-range link is needed. Cooperation changes the way of information delivery......Although wireless networks have achieved great success in the lastest two decades, the current wireless networks have difficulties to fulll users' ever-increasing expectations and needs. It is mainly due to available spectrum resource scarcity, limited battery capacity of wireless device......, unreliable wireless radio link, etc. To tackle these issues, a new telecommunication paradigm has been proposed, referred to as cooperative wireless networking [1]. The basic idea of cooperative wireless networking is that wireless devices work together to achieve their individual goals or one common goal...

  19. Wireless Networks: New Meaning to Ubiquitous Computing.

    Science.gov (United States)

    Drew, Wilfred, Jr.

    2003-01-01

    Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…

  20. Intelligent Local Avoided Collision (iLAC) MAC Protocol for Very High Speed Wireless Network

    Science.gov (United States)

    Hieu, Dinh Chi; Masuda, Akeo; Rabarijaona, Verotiana Hanitriniala; Shimamoto, Shigeru

    Future wireless communication systems aim at very high data rates. As the medium access control (MAC) protocol plays the central role in determining the overall performance of the wireless system, designing a suitable MAC protocol is critical to fully exploit the benefit of high speed transmission that the physical layer (PHY) offers. In the latest 802.11n standard [2], the problem of long overhead has been addressed adequately but the issue of excessive colliding transmissions, especially in congested situation, remains untouched. The procedure of setting the backoff value is the heart of the 802.11 distributed coordination function (DCF) to avoid collision in which each station makes its own decision on how to avoid collision in the next transmission. However, collision avoidance is a problem that can not be solved by a single station. In this paper, we introduce a new MAC protocol called Intelligent Local Avoided Collision (iLAC) that redefines individual rationality in choosing the backoff counter value to avoid a colliding transmission. The distinguishing feature of iLAC is that it fundamentally changes this decision making process from collision avoidance to collaborative collision prevention. As a result, stations can avoid colliding transmissions with much greater precision. Analytical solution confirms the validity of this proposal and simulation results show that the proposed algorithm outperforms the conventional algorithms by a large margin.

  1. RF and microwave engineering fundamentals of wireless communications

    CERN Document Server

    Gustrau, Frank

    2012-01-01

    This book provides a fundamental and practical introduction to radio frequency and microwave engineering and physical aspects of wireless communication In this book, the author addresses a wide range of radio-frequency and microwave topics with emphasis on physical aspects including EM and voltage waves, transmission lines, passive circuits, antennas, radio wave propagation. Up-to-date RF design tools like RF circuit simulation, EM simulation and computerized smith charts, are used in various examples to demonstrate how these methods can be applied effectively in RF engineering

  2. From early wireless to Everest.

    Science.gov (United States)

    Allen, A

    1998-01-01

    Medical information has been transmitted using wireless technologies for almost 80 years. A "wired wireless" electronic stethoscope was developed by the U.S. Army Signal Corps in the early 1920's, for potential use in ship-to-shore transmission of cardiac sounds. [Winters SR. Diagnosis by wireless. Scientific American June 11, 1921, p. 465] Today, wireless is used in a wide range of medical applications and at sites from transoceanic air flights to offshore oil platforms to Mt. Everest. 'Wireless LANs' are often used in medical environments. Typically, nurses and physicians in a hospital or clinic use hand-held "wireless thin client" pen computers that exchange patient information and images with the hospital server. Numerous companies, such as Fujitsu (article below) and Cruise Technologies (www.cruisetech.com) manufacture handheld pen-entry computers. One company, LXE, integrates radio-frequency (RF) enhanced hand-held computers specifically designed for production use within a wireless LAN (www.lxe.com). Other companies (Proxim, Symbol, and others) supply the wireless RF LAN infrastructure for the enterprise. Unfortunately, there have been problems with widespread deployment of wireless LANs. Perhaps the biggest impediment has been the lack of standards. Although an international standard (IEEE 802.11) was adopted in 1997, most wireless LAN products still are not compatible with the equipment of competing companies. A problem with the current standard for LAN adapters is that throughput is limited to 3 Mbps--compared to at least 10 Mbps, and often 100 Mbps, in a hard-wired Ethernet LAN. An II Mbps standard is due out in the next year or so, but it will be at least 2 years before standards-compliant products are available. This story profiles some of the ways that wireless is being used to overcome gaps in terrestrial and within-enterprise communication.

  3. Effect of metal shielding on a wireless power transfer system

    Directory of Open Access Journals (Sweden)

    Jiacheng Li

    2017-05-01

    Full Text Available In this paper, the effect of non-ferromagnetic metal shielding (NFMS material on the resonator of wireless power transfer (WPT is studied by modeling, simulation and experimental analysis. And, the effect of NFMS material on the power transfer efficiency (PTE of WPT systems is investigated by circuit model. Meanwhile, the effect of ferromagnetic metal shielding material on the PTE of WPT systems is analyzed through simulation. A double layer metal shield structure is designed. Experimental results demonstrate that by applying the novel double layer metal shielding method, the system PTE increases significantly while the electromagnetic field of WPT systems declines dramatically.

  4. FPGA-based digital convolution for wireless applications

    CERN Document Server

    Guan, Lei

    2017-01-01

    This book presents essential perspectives on digital convolutions in wireless communications systems and illustrates their corresponding efficient real-time field-programmable gate array (FPGA) implementations. Covering these digital convolutions from basic concept to vivid simulation/illustration, the book is also supplemented with MS PowerPoint presentations to aid in comprehension. FPGAs or generic all programmable devices will soon become widespread, serving as the “brains” of all types of real-time smart signal processing systems, like smart networks, smart homes and smart cities. The book examines digital convolution by bringing together the following main elements: the fundamental theory behind the mathematical formulae together with corresponding physical phenomena; virtualized algorithm simulation together with benchmark real-time FPGA implementations; and detailed, state-of-the-art case studies on wireless applications, including popular linear convolution in digital front ends (DFEs); nonlinear...

  5. Passive wireless sensor systems can recognize activites of daily living.

    Science.gov (United States)

    Urwyler, Prabitha; Stucki, Reto; Muri, Rene; Mosimann, Urs P; Nef, Tobias

    2015-08-01

    The ability to determine what activity of daily living a person performs is of interest in many application domains. It is possible to determine the physical and cognitive capabilities of the elderly by inferring what activities they perform in their houses. Our primary aim was to establish a proof of concept that a wireless sensor system can monitor and record physical activity and these data can be modeled to predict activities of daily living. The secondary aim was to determine the optimal placement of the sensor boxes for detecting activities in a room. A wireless sensor system was set up in a laboratory kitchen. The ten healthy participants were requested to make tea following a defined sequence of tasks. Data were collected from the eight wireless sensor boxes placed in specific places in the test kitchen and analyzed to detect the sequences of tasks performed by the participants. These sequence of tasks were trained and tested using the Markov Model. Data analysis focused on the reliability of the system and the integrity of the collected data. The sequence of tasks were successfully recognized for all subjects and the averaged data pattern of tasks sequences between the subjects had a high correlation. Analysis of the data collected indicates that sensors placed in different locations are capable of recognizing activities, with the movement detection sensor contributing the most to detection of tasks. The central top of the room with no obstruction of view was considered to be the best location to record data for activity detection. Wireless sensor systems show much promise as easily deployable to monitor and recognize activities of daily living.

  6. Miniaturized, low power FGMOSFET radiation sensor and wireless dosimeter system

    KAUST Repository

    Arsalan, Muhammad; Shamim, Atif; Tarr, Nicholas Garry; Roy, Langis

    2013-01-01

    A miniaturized floating gate (FG) MOSFET radiation sensor system is disclosed, The sensor preferably comprises a matched pair of sensor and reference FGMOSFETs wherein the sensor FGMOSFET has a larger area floating gate with an extension over a field oxide layer, for accumulation of charge and increased sensitivity. Elimination of a conventional control gate and injector gate reduces capacitance, and increases sensitivity, and allows for fabrication using standard low cost CMOS technology. A sensor system may be provided with integrated signal processing electronics, for monitoring a change in differential channel current I.sub.D, indicative of radiation dose, and an integrated negative bias generator for automatic pre-charging from a low voltage power source. Optionally, the system may be coupled to a wireless transmitter. A compact wireless sensor System on Package solution is presented, suitable for dosimetry for radiotherapy or other biomedical applications.

  7. Miniaturized, low power FGMOSFET radiation sensor and wireless dosimeter system

    KAUST Repository

    Arsalan, Muhammad

    2013-08-27

    A miniaturized floating gate (FG) MOSFET radiation sensor system is disclosed, The sensor preferably comprises a matched pair of sensor and reference FGMOSFETs wherein the sensor FGMOSFET has a larger area floating gate with an extension over a field oxide layer, for accumulation of charge and increased sensitivity. Elimination of a conventional control gate and injector gate reduces capacitance, and increases sensitivity, and allows for fabrication using standard low cost CMOS technology. A sensor system may be provided with integrated signal processing electronics, for monitoring a change in differential channel current I.sub.D, indicative of radiation dose, and an integrated negative bias generator for automatic pre-charging from a low voltage power source. Optionally, the system may be coupled to a wireless transmitter. A compact wireless sensor System on Package solution is presented, suitable for dosimetry for radiotherapy or other biomedical applications.

  8. Physical properties of layered homologous RE-B-C(N) compounds

    International Nuclear Information System (INIS)

    Mori, Takao; Zhang Fuxiang; Leithe-Jasper, Andreas

    2004-01-01

    Physical properties of a series of homologous RE-B-C(N) B 12 cluster compounds REB 17 CN, REB 22 C 2 N, and REB 28.5 C 4 (RE=Er,Ho) were investigated. The structures of the compounds are layer-like along the c-axis, with rare earth and B 6 octahedral layers separated by B 12 icosahedral and C-B-C chain layers whose number increases successively from two B 12 layers for the REB 17 CN compound to four for the REB 28.5 C 4 compound. The rare earth atoms are configured in two triangular flat layers which are stacked on top of one another in AB stacking where the nearest-neighbor rare earth directions are the three atoms forming a triangle in the adjacent layer. The series of homologous compounds exhibit a spin glass transition with T f shifting in correspondence with variations of the basal plane lattice constants, consistent with the magnetic interaction being effective in the basal planes. The isothermal remanent magnetization shows a stretched exponential decay I m (t)∝ exp[-Ct -(1-n) ]. Exponents determined for the different homologous compounds were scaled as a function of T r =T/T f and found to follow the empirical dependency determined for typical spin glasses. It is indicated that a mixture of disorder originating from the partial occupancy of the rare earth sites and frustration of interactions due to the unique configuration is responsible for the manifestation of spin glass transitions in these homologous systems

  9. Efficient Key Generation and Distribution on Wireless Sensor Networks

    OpenAIRE

    Ariño Pérez, Víctor

    2013-01-01

    Projecte realitzat en el marc d’un programa de mobilitat amb la KTH Electrical Engineering [ANGLÈS] Wireless Sensor Networks have become popular during the last years. The introduction of IPv6 which broadened the address space available, IEEE802.15.4 and adaptation layers such as 6loWPAN have allowed the intercommunication of small devices. These networks are useful in many scenarios such as civil monitoring, mining, battlefield operations, as well as consumer products. Hence, practical se...

  10. Wireless network pricing

    CERN Document Server

    Huang, Jianwei

    2013-01-01

    Today's wireless communications and networking practices are tightly coupled with economic considerations, to the extent that it is almost impossible to make a sound technology choice without understanding the corresponding economic implications. This book aims at providing a foundational introduction on how microeconomics, and pricing theory in particular, can help us to understand and build better wireless networks. The book can be used as lecture notes for a course in the field of network economics, or a reference book for wireless engineers and applied economists to understand how pricing

  11. Subsurface event detection and classification using Wireless Signal Networks.

    Science.gov (United States)

    Yoon, Suk-Un; Ghazanfari, Ehsan; Cheng, Liang; Pamukcu, Sibel; Suleiman, Muhannad T

    2012-11-05

    Subsurface environment sensing and monitoring applications such as detection of water intrusion or a landslide, which could significantly change the physical properties of the host soil, can be accomplished using a novel concept, Wireless Signal Networks (WSiNs). The wireless signal networks take advantage of the variations of radio signal strength on the distributed underground sensor nodes of WSiNs to monitor and characterize the sensed area. To characterize subsurface environments for event detection and classification, this paper provides a detailed list and experimental data of soil properties on how radio propagation is affected by soil properties in subsurface communication environments. Experiments demonstrated that calibrated wireless signal strength variations can be used as indicators to sense changes in the subsurface environment. The concept of WSiNs for the subsurface event detection is evaluated with applications such as detection of water intrusion, relative density change, and relative motion using actual underground sensor nodes. To classify geo-events using the measured signal strength as a main indicator of geo-events, we propose a window-based minimum distance classifier based on Bayesian decision theory. The window-based classifier for wireless signal networks has two steps: event detection and event classification. With the event detection, the window-based classifier classifies geo-events on the event occurring regions that are called a classification window. The proposed window-based classification method is evaluated with a water leakage experiment in which the data has been measured in laboratory experiments. In these experiments, the proposed detection and classification method based on wireless signal network can detect and classify subsurface events.

  12. A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks

    Science.gov (United States)

    Shahzad, Aamir; Lee, Malrey; Xiong, Neal Naixue; Jeong, Gisung; Lee, Young-Keun; Choi, Jae-Young; Mahesar, Abdul Wheed; Ahmad, Iftikhar

    2016-01-01

    In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design. PMID:26950129

  13. A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks.

    Science.gov (United States)

    Shahzad, Aamir; Lee, Malrey; Xiong, Neal Naixue; Jeong, Gisung; Lee, Young-Keun; Choi, Jae-Young; Mahesar, Abdul Wheed; Ahmad, Iftikhar

    2016-03-03

    In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design.

  14. A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2016-03-01

    Full Text Available In Industrial systems, Supervisory control and data acquisition (SCADA system, the pseudo-transport layer of the distributed network protocol (DNP3 performs the functions of the transport layer and network layer of the open systems interconnection (OSI model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design.

  15. Optimal Design and Analysis of the Stepped Core for Wireless Power Transfer Systems

    Directory of Open Access Journals (Sweden)

    Xiu Zhang

    2016-01-01

    Full Text Available The key of wireless power transfer technology rests on finding the most suitable means to improve the efficiency of the system. The wireless power transfer system applied in implantable medical devices can reduce the patients’ physical and economic burden because it will achieve charging in vitro. For a deep brain stimulator, in this paper, the transmitter coil is designed and optimized. According to the previous research results, the coils with ferrite core can improve the performance of the wireless power transfer system. Compared with the normal ferrite core, the stepped core can produce more uniform magnetic flux density. In this paper, the finite element method (FEM is used to analyze the system. The simulation results indicate that the core loss generated in the optimal stepped ferrite core can reduce about 10% compared with the normal ferrite core, and the efficiency of the wireless power transfer system can be increased significantly.

  16. Online vehicle and atmospheric pollution monitoring using GIS and wireless sensor networks

    International Nuclear Information System (INIS)

    Cordova-Lopez, L E; Mason, A; Cullen, J D; Shaw, A; Al-Shamma'a, A I

    2007-01-01

    A Geographical Information System (GIS) is a computer system designed to integrate, store, edit, analyse, share and display geographically referenced data. A wireless sensor network (WSN) is a wireless network of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions. This paper presents the integration of these two technologies to create a system able to detect measure and transmit information regarding the presence and quantities of internal combustion derived pollution and the geographical location in real time with the aim of creating pollution maps in urban environments

  17. BTP: a Block Transfer Protocol for Delay Tolerant Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg; Biagioni, Edoardo S.

    2010-01-01

    Wireless sensor networks that are energy-constrained must transmit and receive data as efficiently as possible.  If the transmission is delay tolerant, transferring blocks of accumulated data can be more efficient than transferring each sensed measurement as soon as it is available.  This paper...... proposes a Block Transfer Protocol (BTP) designed for efficient and reliable transmission in wireless sensor networks.  BTP reduces the time it takes to reliably transfer a block of packets compared to conventional link layer protocols, by piggybacking in data packets information about the transfer......, minimizing the number of acknowledgements needed for reliable transmission, and reducing the need for timeouts, which can substantially slow down communication when transmission is unreliable.  In addition, BTP improves reliability by handling false positive acknowledgements and by letting the receivers...

  18. A Comprehensive Theory of Algorithms for Wireless Networks and Mobile Systems

    Science.gov (United States)

    2016-06-08

    pages 109-118, July 2015. [3] Magnus Halldorsson, Stephan Holzer and Nancy Lynch. A Local Broadcast Layer for the SINR Network Model. ACM Symposium on...publication, 2014. [9] Magnus Halldorsson, Stephan Holzer, Pradipta Mitra and Roger Wattenhofer. The Power of Oblivious Wireless Power. Submitted for...David Peleg. Nonuniform SINR+Voronoi Diagrams are Effectively Uniform. In Yoram Moses, editor, Distributed Computing: 29th International Symposium

  19. Physical-Layer Security with Full-Duplex Transceivers and Multiuser Receiver at Eve

    DEFF Research Database (Denmark)

    Mahmood, Nurul Huda; Shafique Ansari, Imran; Popovski, Petar

    2017-01-01

    , leading researchers to study other possible applications that can accord higher gains. The potential of full-duplex communication in improving the physical-layer security of a communication link is investigated in this contribution. We specifically present a thorough analysis of the achievable ergodic...

  20. Intelligent Wireless Sensor Network

    OpenAIRE

    Saeed, Bakhtiar I.; Mehrdadi, Bruce

    2010-01-01

    In recent years, there has been significant increase in utilisation of embedded-microcontrollers in broad range of applications extending from commercial products to industrial process system monitoring. Furthermore, improvements in speed, size and power consumption of microcontrollers with added wireless capabilities has provided new generation of applications. These include versatile and\\ud low cost solutions in wireless sensor networking applications such as wireless system monitoring and ...

  1. Hybrid brain-computer interface for biomedical cyber-physical system application using wireless embedded EEG systems.

    Science.gov (United States)

    Chai, Rifai; Naik, Ganesh R; Ling, Sai Ho; Nguyen, Hung T

    2017-01-07

    One of the key challenges of the biomedical cyber-physical system is to combine cognitive neuroscience with the integration of physical systems to assist people with disabilities. Electroencephalography (EEG) has been explored as a non-invasive method of providing assistive technology by using brain electrical signals. This paper presents a unique prototype of a hybrid brain computer interface (BCI) which senses a combination classification of mental task, steady state visual evoked potential (SSVEP) and eyes closed detection using only two EEG channels. In addition, a microcontroller based head-mounted battery-operated wireless EEG sensor combined with a separate embedded system is used to enhance portability, convenience and cost effectiveness. This experiment has been conducted with five healthy participants and five patients with tetraplegia. Generally, the results show comparable classification accuracies between healthy subjects and tetraplegia patients. For the offline artificial neural network classification for the target group of patients with tetraplegia, the hybrid BCI system combines three mental tasks, three SSVEP frequencies and eyes closed, with average classification accuracy at 74% and average information transfer rate (ITR) of the system of 27 bits/min. For the real-time testing of the intentional signal on patients with tetraplegia, the average success rate of detection is 70% and the speed of detection varies from 2 to 4 s.

  2. Joint Schemes for Physical Layer Security and Error Correction

    Science.gov (United States)

    Adamo, Oluwayomi

    2011-01-01

    The major challenges facing resource constraint wireless devices are error resilience, security and speed. Three joint schemes are presented in this research which could be broadly divided into error correction based and cipher based. The error correction based ciphers take advantage of the properties of LDPC codes and Nordstrom Robinson code. A…

  3. The wireless Web and patient care.

    Science.gov (United States)

    Bergeron, B P

    2001-01-01

    Wireless computing, when integrated with the Web, is poised to revolutionize the practice and teaching of medicine. As vendors introduce wireless Web technologies in the medical community that have been used successfully in the business and consumer markets, clinicians can expect profound increases in the amount of patient data, as well as the ease with which those data are acquired, analyzed, and disseminated. The enabling technologies involved in this transformation to the wireless Web range from the new generation of wireless PDAs, eBooks, and wireless data acquisition peripherals to new wireless network protocols. The rate-limiting step in the application of this technology in medicine is not technology per se but rather how quickly clinicians and their patients come to accept and appreciate the benefits and limitations of the application of wireless Web technology.

  4. Wirelessly powered electrowetting-on-dielectric (EWOD) by planar receiver coils

    Science.gov (United States)

    Byun, Sang Hyun; Yuan, Junqi; Yoon, Myung Gon; Cho, Sung Kwon

    2015-03-01

    Electrowetting-on-dielectric (EWOD) is one of the most versatile methods used to control the wettability of liquids using electrical input. In most applications, EWOD is applied using physical wiring, which may restrict its application to implantable EWOD devices. In order to resolve this issue, we have studied and developed a wirelessly powered EWOD by using planar coils at the receiver that are fabricated out of a printed circuit board (PCB) by means of standard micro photolithography. Unlike conventional, bulky, spool coil type, the planar coil type lends itself to compact design and easy integration with EWOD chips. The present wireless powering principle is based on magnetic induction, which is very efficient when the transmitter and receiver coils are close to each other. The voltage obtained at the receiver is much higher than typically required EWOD voltages (>50 V) using a high transmission frequency (~MHz). The span of the EWOD contact angle is over 40°. In addition, amplitude modulation (AM) is implemented in the present wireless powering setup, followed by demodulation, in order to oscillate droplets at low frequency. This technique ensures smooth and reliable droplet movements. The wirelessly powered EWOD is used to transport a droplet and is mounted in a mini-boat which it powers and propels.

  5. Wireless network security theories and applications

    CERN Document Server

    Chen, Lei; Zhang, Zihong

    2013-01-01

    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  6. Physics considerations in MV-CBCT multi-layer imager design.

    Science.gov (United States)

    Hu, Yue-Houng; Fueglistaller, Rony; Myronakis, Marios E; Rottmann, Joerg; Wang, Adam; Shedlock, Daniel; Morf, Daniel; Baturin, Paul; Huber, Pascal; Star-Lack, Josh M; Berbeco, Ross I

    2018-05-30

    Megavoltage (MV) cone-beam computed tomography (CBCT) using an electronic portal imaging (EPID) offers advantageous features, including 3D mapping, treatment beam registration, high-z artifact suppression, and direct radiation dose calculation. Adoption has been slowed by image quality limitations and concerns about imaging dose. Developments in imager design, including pixelated scintillators, structured phosphors, inexpensive scintillation materials, and multi-layer imager (MLI) architecture have been explored to improve EPID image quality and reduce imaging dose. The present study employs a hybrid Monte Carlo and linear systems model to determine the effect of detector design elements, such as multi-layer architecture and scintillation materials. We follow metrics of image quality including modulation transfer function (MTF) and noise power spectrum (NPS) from projection images to 3D reconstructions to in-plane slices and apply a task based figure-of-merit, the ideal observer signal-to-noise ratio (d') to determine the effect of detector design on object detectability. Generally, detectability was limited by detector noise performance. Deploying an MLI imager with a single scintillation material for all layers yields improvement in noise performance and d' linear with the number of layers. In general, improving x-ray absorption using thicker scintillators results in improved DQE(0). However, if light yield is low, performance will be affected by electronic noise at relatively high doses, resulting in rapid image quality degradation. Maximizing image quality in a heterogenous MLI detector (i.e. multiple different scintillation materials) is most affected by limiting imager noise. However, while a second-order effect, maximizing total spatial resolution of the MLI detector is a balance between the intensity contribution of each layer against its individual MTF. So, while a thinner scintillator may yield a maximal individual-layer MTF, its quantum efficiency will

  7. Cluster Based Hierarchical Routing Protocol for Wireless Sensor Network

    OpenAIRE

    Rashed, Md. Golam; Kabir, M. Hasnat; Rahim, Muhammad Sajjadur; Ullah, Shaikh Enayet

    2012-01-01

    The efficient use of energy source in a sensor node is most desirable criteria for prolong the life time of wireless sensor network. In this paper, we propose a two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP). We introduce a new concept called head-set, consists of one active cluster head and some other associate cluster heads within a cluster. The head-set members are responsible for control and management of the network. Results show that t...

  8. Wireless Cybersecurity

    Science.gov (United States)

    2013-04-01

    completely change the entire landscape. For example, under the quantum computing regime, factoring prime numbers requires only polynomial time (i.e., Shor’s...AFRL-OSR-VA-TR-2013-0206 Wireless Cybersecurity Biao Chen Syracuse University April 2013 Final Report DISTRIBUTION A...19a. NAME OF RESPONSIBLE PERSON 19b. TELEPHONE NUMBER (Include area code) 21-02-2013 FINAL REPORT 01-04-2009 TO 30-11-2012 Wireless Cybersecurity

  9. The Lure of Wireless Encryption

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Following our article entitled “Jekyll or Hyde? Better browse securely” in the last issue of the Bulletin, some people wondered why the CERN wireless network is not encrypted…   There are many arguments why it is not. The simplest is usability: the communication and management of the corresponding access keys would be challenging given the sheer number of wireless devices the CERN network hosts. Keys would quickly become public, e.g. at conferences, and might be shared, written on whiteboards, etc. Then there are all the devices which cannot be easily configured to use encryption protocols - a fact which would create plenty of calls to the CERN Service Desk… But our main argument is that wireless encryption is DECEPTIVE. Wireless encryption is deceptive as it only protects the wireless network against unauthorised access (and the CERN network already has other means to protect against that). Wireless encryption however, does not really help you. You ...

  10. Analysis of physical factors on chosen properties of anodic alumina oxide (AAO layers and environment

    Directory of Open Access Journals (Sweden)

    M. Gombár

    2016-10-01

    Full Text Available In the contribution is evaluated an impact of physical factors of anodizing process, namely the temperature of an electrolyte, anodizing time and voltage, on the change of values of Vickers microhardness and thickness of formed layer of experimental materials Al99∙5. By increasing of electrolyte temperature, the values of layer microhardness and thickness layer increase, namely about 0.78 % at the increasing of electrolyte temperature by 1 °C. By lengthening of anodizing time grows the value of layer thickness, but only to the value of the critical deposition time, when chemical dissolution of the layer start to be more prominent. By voltage increasing, values of layer thickness and micro-hardness are increased in the range of the used experimental values.

  11. Physical layer impairments tolerance based lightpath provision in software defined optical network

    Institute of Scientific and Technical Information of China (English)

    Zhao Xianlong; Xu Xianze; Bai Huifeng

    2017-01-01

    As all-optical networks grow with ever increasing ultra-high speed, the communication quality suffers seriously from physical layer impairments ( PLIs) .The same problem still exists in software defined optical network ( SDON) controlled by OpenFlow.Aimed to solve this problem, a PLIs tol-erance based lightpath provision scheme is proposed for OpenFlow controlled optical networks.This proposed approach not only takes the OSNR model to represent those linear PLIs factors, but also in-troduces those nonlinear factors into the OSNR model.Thus, the proposed scheme is able to cover most PLIs factors of each optical link and conduct optical lightpath provison with better communica-tion quality.Moreover, PLIs tolerance model is also set up and considered in this work with some necessary extension to OpenFlow protocols to achieve better compatibility between physical layer im-pairments factors and various services connections.Simulation results show that the proposed scheme is able to get better performance in terms of packet loss rate and connection setup time.

  12. Principles of wireless access and localization

    CERN Document Server

    Pahlavan, Kaveh

    2013-01-01

    A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques.  The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking.   Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the

  13. Wireless Plug and Play Control Systems: Hardware, Networks, and Protocols

    DEFF Research Database (Denmark)

    Meybodi, Soroush Afkhami

    2012-01-01

    This dissertation reports the result of efforts to identify and solve the problems that arise when a control system is to be designed for various industrial case studies of the Plug and Play Process Control (P3C) project that require autonomous addition/removal of sensors, actuators and subsystems...... in only one of the P3C case studies where all of the nodes of the wireless networked control system are placed underground and should be able to transmit data among themselves. It is not a trivial problem because the well known radio frequency electromagnetic waves face serious difficulties penetrating...... is recommended for wireless plug and play control systems. Formation and maintenance of clusters of nodes are directly linked to the top level application layer via a novel application-based routing metric. The proposed routing metric facilitates implementation of the networking topology in accordance...

  14. Wireless Technology in K-12 Education

    Science.gov (United States)

    Walery, Darrell

    2004-01-01

    Many schools begin implementing wireless technology slowly by creating wireless "hotspots" on the fly. This is accomplished by putting a wireless access point on a cart along with a set of wireless laptop computers. A teacher can then wheel the cart anywhere in the school that has a network drop, plug the access point in and have an…

  15. Radio frequency sensing measurements and methods for location classification in wireless networks

    Science.gov (United States)

    Maas, Dustin C.

    The wireless radio channel is typically thought of as a means to move information from transmitter to receiver, but the radio channel can also be used to detect changes in the environment of the radio link. This dissertation is focused on the measurements we can make at the physical layer of wireless networks, and how we can use those measurements to obtain information about the locations of transceivers and people. The first contribution of this work is the development and testing of an open source, 802.11b sounder and receiver, which is capable of decoding packets and using them to estimate the channel impulse response (CIR) of a radio link at a fraction of the cost of traditional channel sounders. This receiver improves on previous implementations by performing optimized matched filtering on the field-programmable gate array (FPGA) of the Universal Software Radio Peripheral (USRP), allowing it to operate at full bandwidth. The second contribution of this work is an extensive experimental evaluation of a technology called location distinction, i.e., the ability to identify changes in radio transceiver position, via CIR measurements. Previous location distinction work has focused on single-input single-output (SISO) radio links. We extend this work to the context of multiple-input multiple-output (MIMO) radio links, and study system design trade-offs which affect the performance of MIMO location distinction. The third contribution of this work introduces the "exploiting radio windows" (ERW) attack, in which an attacker outside of a building surreptitiously uses the transmissions of an otherwise secure wireless network inside of the building to infer location information about people inside the building. This is possible because of the relative transparency of external walls to radio transmissions. The final contribution of this dissertation is a feasibility study for building a rapidly deployable radio tomographic (RTI) imaging system for special operations forces

  16. Mechanisms for Prolonging Network Lifetime in Wireless Sensor Networks

    Science.gov (United States)

    Yang, Yinying

    2010-01-01

    Sensors are used to monitor and control the physical environment. A Wireless Sensor Network (WSN) is composed of a large number of sensor nodes that are densely deployed either inside the phenomenon or very close to it [18][5]. Sensor nodes measure various parameters of the environment and transmit data collected to one or more sinks, using…

  17. Investigation of interference in multiple-input multiple-output wireless transmission at W band for an optical wireless integration system.

    Science.gov (United States)

    Li, Xinying; Yu, Jianjun; Dong, Ze; Zhang, Junwen; Chi, Nan; Yu, Jianguo

    2013-03-01

    We experimentally investigate the interference in multiple-input multiple-output (MIMO) wireless transmission by adjusting the relative locations of horn antennas (HAs) in a 100 GHz optical wireless integration system, which can deliver a 50 Gb/s polarization-division-multiplexing quadrature-phase-shift-keying signal over 80 km single-mode fiber-28 and a 2×2 MIMO wireless link. For the parallel 2×2 MIMO wireless link, each receiver HA can only get wireless power from the corresponding transmitter HA, while for the crossover ones, the receiver HA can get wireless power from two transmitter HAs. At the wireless receiver, polarization demultiplexing is realized by the constant modulus algorithm (CMA) in the digital-signal-processing part. Compared to the parallel case, wireless interference causes about 2 dB optical signal-to-noise ratio penalty at a bit-error ratio (BER) of 3.8×10(-3) for the crossover cases if similar CMA taps are employed. The increase in CMA tap length can reduce wireless interference and improve BER performance. Furthermore, more CMA taps should be adopted to overcome the severe wireless interference when two pairs of transmitter and receiver HAs have different wireless distances.

  18. Wireless and mobile systems in telemedicine

    Directory of Open Access Journals (Sweden)

    Reza Safdari

    2012-12-01

    Full Text Available Background: It is necessary to deploy mobile and wireless systems in healthcare, because they have many benefits for healthcare systems. The objectives of this article were introducing various systems, applications, and standards of the wireless and mobile telemedicine. Material and Methods: This review study was conducted in 2010. To conduct the study, published articles in the years 2005 to 2012, in English with an emphasis on wireless and mobile technologies in health were studied. Search was done with key words include telemedicine, wireless health systems, health and telecommunications technology in databases including Pubmed, Science Direct, Google Scholar, Web of Sciences, Proquest. The collected data were analyzed. Results: Telemedicine system in the ambulance, telemedicine systems in space, telecardiology systems, EEG system, ultrasound system are some types of wireless and mobile systems in telemedicine. PDA-based mobile and wireless telemedicine application, based PDA drug application, and patient tracking application are some of wireless and mobile applications of telemedicine. The most important standards of wireless and mobile telemedicine are HL7, DICOM, SNOMed, and ICD-9-CM. Conclusion: There are many challenges in the wireless and mobile systems in telemedicine, despite the many benefits. Slow speed in sending pictures and video, lack of attention to the privacy in the design of these systems, environmental variables and the number of users during the day are some of these challenges. It is recommended to consider these challenges during the planning and designing of wireless and mobile systems in telemedicine.

  19. Power Aware Simulation Framework for Wireless Sensor Networks and Nodes

    Directory of Open Access Journals (Sweden)

    Daniel Weber

    2008-07-01

    Full Text Available The constrained resources of sensor nodes limit analytical techniques and cost-time factors limit test beds to study wireless sensor networks (WSNs. Consequently, simulation becomes an essential tool to evaluate such systems.We present the power aware wireless sensors (PAWiS simulation framework that supports design and simulation of wireless sensor networks and nodes. The framework emphasizes power consumption capturing and hence the identification of inefficiencies in various hardware and software modules of the systems. These modules include all layers of the communication system, the targeted class of application itself, the power supply and energy management, the central processing unit (CPU, and the sensor-actuator interface. The modular design makes it possible to simulate heterogeneous systems. PAWiS is an OMNeT++ based discrete event simulator written in C++. It captures the node internals (modules as well as the node surroundings (network, environment and provides specific features critical to WSNs like capturing power consumption at various levels of granularity, support for mobility, and environmental dynamics as well as the simulation of timing effects. A module library with standardized interfaces and a power analysis tool have been developed to support the design and analysis of simulation models. The performance of the PAWiS simulator is comparable with other simulation environments.

  20. Subsurface Event Detection and Classification Using Wireless Signal Networks

    Directory of Open Access Journals (Sweden)

    Muhannad T. Suleiman

    2012-11-01

    Full Text Available Subsurface environment sensing and monitoring applications such as detection of water intrusion or a landslide, which could significantly change the physical properties of the host soil, can be accomplished using a novel concept, Wireless Signal Networks (WSiNs. The wireless signal networks take advantage of the variations of radio signal strength on the distributed underground sensor nodes of WSiNs to monitor and characterize the sensed area. To characterize subsurface environments for event detection and classification, this paper provides a detailed list and experimental data of soil properties on how radio propagation is affected by soil properties in subsurface communication environments. Experiments demonstrated that calibrated wireless signal strength variations can be used as indicators to sense changes in the subsurface environment. The concept of WSiNs for the subsurface event detection is evaluated with applications such as detection of water intrusion, relative density change, and relative motion using actual underground sensor nodes. To classify geo-events using the measured signal strength as a main indicator of geo-events, we propose a window-based minimum distance classifier based on Bayesian decision theory. The window-based classifier for wireless signal networks has two steps: event detection and event classification. With the event detection, the window-based classifier classifies geo-events on the event occurring regions that are called a classification window. The proposed window-based classification method is evaluated with a water leakage experiment in which the data has been measured in laboratory experiments. In these experiments, the proposed detection and classification method based on wireless signal network can detect and classify subsurface events.

  1. L2-LBMT: A Layered Load Balance Routing Protocol for underwater multimedia data transmission

    Science.gov (United States)

    Lv, Ze; Tang, Ruichun; Tao, Ye; Sun, Xin; Xu, Xiaowei

    2017-12-01

    Providing highly efficient underwater transmission of mass multimedia data is challenging due to the particularities of the underwater environment. Although there are many schemes proposed to optimize the underwater acoustic network communication protocols, from physical layer, data link layer, network layer to transport layer, the existing routing protocols for underwater wireless sensor network (UWSN) still cannot well deal with the problems in transmitting multimedia data because of the difficulties involved in high energy consumption, low transmission reliability or high transmission delay. It prevents us from applying underwater multimedia data to real-time monitoring of marine environment in practical application, especially in emergency search, rescue operation and military field. Therefore, the inefficient transmission of marine multimedia data has become a serious problem that needs to be solved urgently. In this paper, A Layered Load Balance Routing Protocol (L2-LBMT) is proposed for underwater multimedia data transmission. In L2-LBMT, we use layered and load-balance Ad Hoc Network to transmit data, and adopt segmented data reliable transfer (SDRT) protocol to improve the data transport reliability. And a 3-node variant of tornado (3-VT) code is also combined with the Ad Hoc Network to transmit little emergency data more quickly. The simulation results show that the proposed protocol can balance energy consumption of each node, effectively prolong the network lifetime and reduce transmission delay of marine multimedia data.

  2. Investigation on iterative multiuser detection physical layer network coding in two-way relay free-space optical links with turbulences and pointing errors.

    Science.gov (United States)

    Abu-Almaalie, Zina; Ghassemlooy, Zabih; Bhatnagar, Manav R; Le-Minh, Hoa; Aslam, Nauman; Liaw, Shien-Kuei; Lee, It Ee

    2016-11-20

    Physical layer network coding (PNC) improves the throughput in wireless networks by enabling two nodes to exchange information using a minimum number of time slots. The PNC technique is proposed for two-way relay channel free space optical (TWR-FSO) communications with the aim of maximizing the utilization of network resources. The multipair TWR-FSO is considered in this paper, where a single antenna on each pair seeks to communicate via a common receiver aperture at the relay. Therefore, chip interleaving is adopted as a technique to separate the different transmitted signals at the relay node to perform PNC mapping. Accordingly, this scheme relies on the iterative multiuser technique for detection of users at the receiver. The bit error rate (BER) performance of the proposed system is examined under the combined influences of atmospheric loss, turbulence-induced channel fading, and pointing errors (PEs). By adopting the joint PNC mapping with interleaving and multiuser detection techniques, the BER results show that the proposed scheme can achieve a significant performance improvement against the degrading effects of turbulences and PEs. It is also demonstrated that a larger number of simultaneous users can be supported with this new scheme in establishing a communication link between multiple pairs of nodes in two time slots, thereby improving the channel capacity.

  3. Utilization of OFDM for efficient packet forwarding in wireless sensor networks

    KAUST Repository

    Bader, Ahmed

    2011-12-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. However, as the network density grows, the overhead incurred grows significantly. As such, end-to-end energy and delay performance is adversely impacted. Motivated by the need for a forwarding mechanism that is more tolerant to growth in node density, an alternative position-based protocol is proposed in this paper. The protocol is designed such that it completely eliminates the need for potential relays to undergo a relay election process. Rather, any eligible relay may decide to forward the packet ahead, thus significantly reducing the overhead. The operation of the proposed protocol is empowered by exploiting favorable features of orthogonal frequency division multiplexing (OFDM) at the physical layer. End-to-end performance is evaluated here against existing beaconless protocols. It is demonstrated that the proposed protocol is more efficient since it is able to offer lower end-to-end delay for the same amount of energy consumption. © 2011 IEEE.

  4. Error and Congestion Resilient Video Streaming over Broadband Wireless

    Directory of Open Access Journals (Sweden)

    Laith Al-Jobouri

    2015-04-01

    Full Text Available In this paper, error resilience is achieved by adaptive, application-layer rateless channel coding, which is used to protect H.264/Advanced Video Coding (AVC codec data-partitioned videos. A packetization strategy is an effective tool to control error rates and, in the paper, source-coded data partitioning serves to allocate smaller packets to more important compressed video data. The scheme for doing this is applied to real-time streaming across a broadband wireless link. The advantages of rateless code rate adaptivity are then demonstrated in the paper. Because the data partitions of a video slice are each assigned to different network packets, in congestion-prone wireless networks the increased number of packets per slice and their size disparity may increase the packet loss rate from buffer overflows. As a form of congestion resilience, this paper recommends packet-size dependent scheduling as a relatively simple way of alleviating the buffer-overflow problem arising from data-partitioned packets. The paper also contributes an analysis of data partitioning and packet sizes as a prelude to considering scheduling regimes. The combination of adaptive channel coding and prioritized packetization for error resilience with packet-size dependent packet scheduling results in a robust streaming scheme specialized for broadband wireless and real-time streaming applications such as video conferencing, video telephony, and telemedicine.

  5. Evaluation of wireless Local Area Networks

    Science.gov (United States)

    McBee, Charles L.

    1993-09-01

    This thesis is an in-depth evaluation of the current wireless Local Area Network (LAN) technologies. Wireless LAN's consist of three technologies: they are infrared light, microwave, and spread spectrum. When the first wireless LAN's were introduced, they were unfavorably labeled slow, expensive, and unreliable. The wireless LAN's of today are competitively priced, more secure, easier to install, and provide equal to or greater than the data throughput of unshielded twisted pair cable. Wireless LAN's are best suited for organizations that move office staff frequently, buildings that have historical significance, or buildings that have asbestos. Additionally, an organization may realize a cost savings of between $300 to $1,200 each time a node is moved. Current wireless LAN technologies have a positive effect on LAN standards being developed by the Defense Information System Agency (DISA). DoD as a whole is beginning to focus on wireless LAN's and mobile communications. If system managers want to remain successful, they need to stay abreast of this technology.

  6. Simulation of Wireless Digital Communication Systems

    Directory of Open Access Journals (Sweden)

    A. Mohammed

    2004-12-01

    Full Text Available Due to the explosive demands for high speed wireless services, suchas wireless Internet, email and cellular video conferencing, digitalwireless communications has become one of the most exciting researchtopics in electrical and electronic engineering field. The never-endingdemand for such personal and multimedia services, however, demandstechnologies operating at higher data rates and broader bandwidths. Inaddition, the complexity of wireless communication and signalprocessing systems has grown considerably during the past decade.Therefore, powerful computer­aided techniques are required for theprocess of modeling, designing, analyzing and evaluating theperformance of digital wireless communication systems. In this paper wediscuss the basic propagation mechanisms affecting the performance ofwireless communication systems, and present a simple, powerful andefficient way to simulate digital wireless communication systems usingMatlab. The simulated results are compared with the theoreticalanalysis to validate the simulator. The simulator is useful inevaluating the performance of wireless multimedia services and theassociated signal processing structures and algorithms for current andnext generation wireless mobile communication systems.

  7. Layer-based buffer aware rate adaptation design for SHVC video streaming

    Science.gov (United States)

    Gudumasu, Srinivas; Hamza, Ahmed; Asbun, Eduardo; He, Yong; Ye, Yan

    2016-09-01

    This paper proposes a layer based buffer aware rate adaptation design which is able to avoid abrupt video quality fluctuation, reduce re-buffering latency and improve bandwidth utilization when compared to a conventional simulcast based adaptive streaming system. The proposed adaptation design schedules DASH segment requests based on the estimated bandwidth, dependencies among video layers and layer buffer fullness. Scalable HEVC video coding is the latest state-of-art video coding technique that can alleviate various issues caused by simulcast based adaptive video streaming. With scalable coded video streams, the video is encoded once into a number of layers representing different qualities and/or resolutions: a base layer (BL) and one or more enhancement layers (EL), each incrementally enhancing the quality of the lower layers. Such layer based coding structure allows fine granularity rate adaptation for the video streaming applications. Two video streaming use cases are presented in this paper. The first use case is to stream HD SHVC video over a wireless network where available bandwidth varies, and the performance comparison between proposed layer-based streaming approach and conventional simulcast streaming approach is provided. The second use case is to stream 4K/UHD SHVC video over a hybrid access network that consists of a 5G millimeter wave high-speed wireless link and a conventional wired or WiFi network. The simulation results verify that the proposed layer based rate adaptation approach is able to utilize the bandwidth more efficiently. As a result, a more consistent viewing experience with higher quality video content and minimal video quality fluctuations can be presented to the user.

  8. A wireless sensor tag platform for container security and integrity

    Science.gov (United States)

    Amaya, Ivan A.; Cree, Johnathan V.; Mauss, Fredrick J.

    2011-04-01

    Cargo containers onboard ships are widely used in the global supply chain. The need for container security is evidenced by the Container Security Initiative launched by the U.S. Bureau of Customs and Border Protection (CBP). One method of monitoring cargo containers is using low power wireless sensor tags. The wireless sensor tags are used to set up a network that is comprised of tags internal to the container and a central device. The sensor network reports alarms and other anomalies to a central device, which then relays the message to an outside network upon arrival at the destination port. This allows the port authorities to have knowledge of potential security or integrity issues before physically examining the container. Challenges of using wireless sensor tag networks for container security include battery life, size, environmental conditions, information security, and cost among others. PNNL developed an active wireless sensor tag platform capable of reporting data wirelessly to a central node as well as logging data to nonvolatile memory. The tags, operate at 2.4 GHz over an IEEE 802.15.4 protocol, and were designed to be distributed throughout the inside of a shipping container in the upper support frame. The tags are mounted in a housing that allows for simple and efficient installation or removal prior to, during, or after shipment. The distributed tags monitor the entire container volume. The sensor tag platform utilizes low power electronics and provides an extensible sensor interface for incorporating a wide range of sensors including chemical, biological, and environmental sensors.

  9. MB-OFDM-UWB Based Wireless Multimedia Sensor Networks for Underground Coalmine: A Survey

    Science.gov (United States)

    Han, Ruisong; Yang, Wei; You, Kaiming

    2016-01-01

    Safety production of coalmines is a task of top priority which plays an important role in guaranteeing, supporting and promoting the continuous development of the coal industry. Since traditional wireless sensor networks (WSNs) cannot fully meet the requirements of comprehensive environment monitoring of underground coalmines, wireless multimedia sensor networks (WMSNs), enabling the retrieval of multimedia information, are introduced to realize fine-grained and precise environment surveillance. In this paper, a framework for designing underground coalmine WMSNs based on Multi-Band Orthogonal Frequency-Division Multiplexing Ultra-wide Band (MB-OFDM-UWB) is presented. The selection of MB-OFDM-UWB wireless transmission solution is based on the characteristics of underground coalmines. Network structure and design challenges are analyzed first, which is the foundation for further discussion. Then, key supporting technologies and open research areas in different layers are surveyed, and we provide a detailed literature review of the state of the art strategies, algorithms and general solutions in these issues. Finally, other research issues like localization, information processing, and network management are discussed. PMID:27999258

  10. MB-OFDM-UWB Based Wireless Multimedia Sensor Networks for Underground Coalmine: A Survey.

    Science.gov (United States)

    Han, Ruisong; Yang, Wei; You, Kaiming

    2016-12-16

    Safety production of coalmines is a task of top priority which plays an important role in guaranteeing, supporting and promoting the continuous development of the coal industry. Since traditional wireless sensor networks (WSNs) cannot fully meet the requirements of comprehensive environment monitoring of underground coalmines, wireless multimedia sensor networks (WMSNs), enabling the retrieval of multimedia information, are introduced to realize fine-grained and precise environment surveillance. In this paper, a framework for designing underground coalmine WMSNs based on Multi-Band Orthogonal Frequency-Division Multiplexing Ultra-wide Band (MB-OFDM-UWB) is presented. The selection of MB-OFDM-UWB wireless transmission solution is based on the characteristics of underground coalmines. Network structure and design challenges are analyzed first, which is the foundation for further discussion. Then, key supporting technologies and open research areas in different layers are surveyed, and we provide a detailed literature review of the state of the art strategies, algorithms and general solutions in these issues. Finally, other research issues like localization, information processing, and network management are discussed.

  11. Wireless coexistence and interference test method for low-power wireless sensor networks

    NARCIS (Netherlands)

    Serra, R.; Nabi, Majid

    2015-01-01

    Wireless sensor networks (WSNs) are being increasingly introduced for critical applications such as safety, security and health. One the main characteristic requirements of such networks are that they should function with relative low power. Therefore the wireless links are more vulnerable.

  12. Analysis of transmission properties in an indoor wireless sensor network based on a full-factorial design

    International Nuclear Information System (INIS)

    Christmann, Dennis; Martinovic, Ivan; Schmitt, Jens B

    2010-01-01

    In this paper, we systematically investigate different factors and their effects on the wireless transmission properties using a full-factorial experimental design of a wireless sensor network in a real-world indoor environment. We quantify the impact of primary factors such as the wireless channel, physical position, transmission power and line of sight, as well as their interactions on the received signal strength (RSS). While some of our results support conventional assumptions, this study also shows that there are several properties which are in contrast to existing findings. For example, there is no significant correlation in the measured RSS between differently located but equally distant transmitters, yet the correlation coefficient for the two directions of a single link between two transmitters is above 94%, leading to very symmetric links that differ only in a few dBm for the two directions. Further analysis reveals the strong interaction of transmission frequency and physical position, while the transmission power has only an isolated, non-interacting effect on the RSS. Since the analyzed network consists of commodity motes utilizing TI's well-known IEEE 802.15.4 compliant CC2420 transceiver, the results of this experimental analysis can serve as valuable insights in planning and deploying wireless sensor networks in different application scenarios

  13. Wireless Power Transmission via Sheet Medium Using Automatic Phase Adjustment of Multiple Inputs

    Science.gov (United States)

    Matsuda, Takashi; Oota, Toshifumi; Kado, Youiti; Zhang, Bing

    The wireless power transmission via sheet medium is a novel physical form of communication that utilizes the surface as a medium to provide both data and power transmission services. To efficiently transmit a relatively-large amount of electric power (several watts), we have developed a wireless power transmission system via sheet medium that concentrates the electric power on a specific spot by using phase control of multiple inputs. However, to find the optimal phases of the multiple inputs making the microwave converge on a specific spot in the sheet medium, the prior knowledge of the device's position, and the pre-experiment measuring the output power, are needed. In wireless communication area, it is known that the retrodirective array scheme can efficiently transmit the power in a self-phasing manner, which uses the pilot signals sent by the client devices. In this paper, we apply the retrodirective array scheme to the wireless power transmission system via sheet medium, and propose a power transmission scheme using the phase-adjustment of multiple inputs. To confirm the effectiveness of the proposal scheme, we evaluate its performance by computer simulation and realistic measurement. Both results show that the proposal scheme can achieve the retrodirectivity over the wireless power transmission via sheet medium.

  14. Structural and physical properties of a novel misfit-layered cobalt oxide (CaOH)1.14CoO2

    International Nuclear Information System (INIS)

    Isobe, Masaaki; Shizuya, Mitsuyuki; Takayama-Muromachi, Eiji

    2007-01-01

    We have studied crystal structure and physical properties of a new layered cobalt oxide (CaOH) 1.14 CoO 2 . The compound is a composite crystal which consists of two interpenetrating subsystems of the CdI 2 -type CoO 2 layer and the rock-salt-type double CaOH atomic layer. The two subsystems have incommensurate periodicity along the a-axis, resulting in modulated crystal structure due to the inter-subsystem interaction. We found that the observed physical properties originate in the electronic state with a 'low-carrier-density limit' in the cobalt t 2g band

  15. A Study on Wireless Charging for Prolonging the Lifetime of Wireless Sensor Networks.

    Science.gov (United States)

    Tu, Weijian; Xu, Xianghua; Ye, Tingcong; Cheng, Zongmao

    2017-07-04

    Wireless charging is an important issue in wireless sensor networks, since it can provide an emerging and effective solution in the absence of other power supplies. The state-of-the-art methods employ a mobile car and a predefined moving path to charge the sensor nodes in the network. Previous studies only consider a factor of the network (i.e., residual energy of sensor node) as a constraint to design the wireless charging strategy. However, other factors, such as the travelled distance of the mobile car, can also affect the effectiveness of wireless charging strategy. In this work, we study wireless charging strategy based on the analysis of a combination of two factors, including the residual energy of sensor nodes and the travelled distance of the charging car. Firstly, we theoretically analyze the limited size of the sensor network to match the capability of a charging car. Then, the networked factors are selected as the weights of traveling salesman problem (TSP) to design the moving path of the charging car. Thirdly, the charging time of each sensor node is computed based on the linear programming problem for the charging car. Finally, a charging period for the network is studied. The experimental results show that the proposed approach can significantly maximize the lifetime of the wireless sensor network.

  16. A Study on Wireless Charging for Prolonging the Lifetime of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Weijian Tu

    2017-07-01

    Full Text Available Wireless charging is an important issue in wireless sensor networks, since it can provide an emerging and effective solution in the absence of other power supplies. The state-of-the-art methods employ a mobile car and a predefined moving path to charge the sensor nodes in the network. Previous studies only consider a factor of the network (i.e., residual energy of sensor node as a constraint to design the wireless charging strategy. However, other factors, such as the travelled distance of the mobile car, can also affect the effectiveness of wireless charging strategy. In this work, we study wireless charging strategy based on the analysis of a combination of two factors, including the residual energy of sensor nodes and the travelled distance of the charging car. Firstly, we theoretically analyze the limited size of the sensor network to match the capability of a charging car. Then, the networked factors are selected as the weights of traveling salesman problem (TSP to design the moving path of the charging car. Thirdly, the charging time of each sensor node is computed based on the linear programming problem for the charging car. Finally, a charging period for the network is studied. The experimental results show that the proposed approach can significantly maximize the lifetime of the wireless sensor network.

  17. An Enhanced PSO-Based Clustering Energy Optimization Algorithm for Wireless Sensor Network.

    Science.gov (United States)

    Vimalarani, C; Subramanian, R; Sivanandam, S N

    2016-01-01

    Wireless Sensor Network (WSN) is a network which formed with a maximum number of sensor nodes which are positioned in an application environment to monitor the physical entities in a target area, for example, temperature monitoring environment, water level, monitoring pressure, and health care, and various military applications. Mostly sensor nodes are equipped with self-supported battery power through which they can perform adequate operations and communication among neighboring nodes. Maximizing the lifetime of the Wireless Sensor networks, energy conservation measures are essential for improving the performance of WSNs. This paper proposes an Enhanced PSO-Based Clustering Energy Optimization (EPSO-CEO) algorithm for Wireless Sensor Network in which clustering and clustering head selection are done by using Particle Swarm Optimization (PSO) algorithm with respect to minimizing the power consumption in WSN. The performance metrics are evaluated and results are compared with competitive clustering algorithm to validate the reduction in energy consumption.

  18. Performance Evaluation of Localization Accuracy for a Log-Normal Shadow Fading Wireless Sensor Network under Physical Barrier Attacks.

    Science.gov (United States)

    Hussein, Ahmed Abdulqader; Rahman, Tharek A; Leow, Chee Yen

    2015-12-04

    Localization is an apparent aspect of a wireless sensor network, which is the focus of much interesting research. One of the severe conditions that needs to be taken into consideration is localizing a mobile target through a dispersed sensor network in the presence of physical barrier attacks. These attacks confuse the localization process and cause location estimation errors. Range-based methods, like the received signal strength indication (RSSI), face the major influence of this kind of attack. This paper proposes a solution based on a combination of multi-frequency multi-power localization (C-MFMPL) and step function multi-frequency multi-power localization (SF-MFMPL), including the fingerprint matching technique and lateration, to provide a robust and accurate localization technique. In addition, this paper proposes a grid coloring algorithm to detect the signal hole map in the network, which refers to the attack-prone regions, in order to carry out corrective actions. The simulation results show the enhancement and robustness of RSS localization performance in the face of log normal shadow fading effects, besides the presence of physical barrier attacks, through detecting, filtering and eliminating the effect of these attacks.

  19. Performance Evaluation of Localization Accuracy for a Log-Normal Shadow Fading Wireless Sensor Network under Physical Barrier Attacks

    Science.gov (United States)

    Abdulqader Hussein, Ahmed; Rahman, Tharek A.; Leow, Chee Yen

    2015-01-01

    Localization is an apparent aspect of a wireless sensor network, which is the focus of much interesting research. One of the severe conditions that needs to be taken into consideration is localizing a mobile target through a dispersed sensor network in the presence of physical barrier attacks. These attacks confuse the localization process and cause location estimation errors. Range-based methods, like the received signal strength indication (RSSI), face the major influence of this kind of attack. This paper proposes a solution based on a combination of multi-frequency multi-power localization (C-MFMPL) and step function multi-frequency multi-power localization (SF-MFMPL), including the fingerprint matching technique and lateration, to provide a robust and accurate localization technique. In addition, this paper proposes a grid coloring algorithm to detect the signal hole map in the network, which refers to the attack-prone regions, in order to carry out corrective actions. The simulation results show the enhancement and robustness of RSS localization performance in the face of log normal shadow fading effects, besides the presence of physical barrier attacks, through detecting, filtering and eliminating the effect of these attacks. PMID:26690159

  20. Time-difference imaging of magnetic induction tomography in a three-layer brain physical phantom

    International Nuclear Information System (INIS)

    Liu, Ruigang; Li, Ye; Fu, Feng; You, Fusheng; Shi, Xuetao; Dong, Xiuzhen

    2014-01-01

    Magnetic induction tomography (MIT) is a contactless and noninvasive technique to reconstruct the conductivity distribution in a human cross-section. In this paper, we want to study the feasibility of imaging the low-contrast perturbation and small volume object in human brains. We construct a three-layer brain physical phantom which mimics the real conductivity distribution of brains by introducing an artificial skull layer. Using our MIT data acquisition system on this phantom and differential algorithm, we have obtained a series of reconstructed images of conductivity perturbation objects. All of the conductivity perturbation objects in the brain phantom can be clearly distinguished in the reconstructed images. The minimum detectable conductivity difference between the object and the background is 0.03 S m −1  (12.5%). The minimum detectable inner volume of the objects is 3.4 cm 3 . The three-layer brain physical phantom is able to simulate the conductivity distribution of the main structures of a human brain. The images of the low-contrast perturbation and small volume object show the prospect of MIT in the future. (paper)

  1. Introduction to Ultra Wideband for Wireless Communications

    DEFF Research Database (Denmark)

    Nikookar, Homayoun; Prasad, Ramjee

    wireless channels, interference, signal processing as well as applications and standardization activities are addressed. Introduction to Ultra Wideband for Wireless Communications provides easy-to-understand material to (graduate) students and researchers working in the field of commercial UWB wireless......Ultra Wideband (UWB) Technology is the cutting edge technology for wireless communications with a wide range of applications. In Introduction to Ultra Wideband for Wireless Communications UWB principles and technologies for wireless communications are explained clearly. Key issues such as UWB...... communications. Due to tutorial nature of the book it can also be adopted as a textbook on the subject in the Telecommunications Engineering curriculum. Problems at the end of each chapter extend the reader's understanding of the subject. Introduction to Ultra Wideband for Wireless Communications will aslo...

  2. Wireless rechargeable sensor networks

    CERN Document Server

    Yang, Yuanyuan

    2015-01-01

    This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability

  3. Optical wireless communications to OC-768 and beyond

    Science.gov (United States)

    Medved, David B.; Davidovich, Leonid

    2001-10-01

    Laser and LED-based wireless communication systems are currently providing license-free interconnection for broadband voice, data and video transport. These systems allow for the immediate, reliable and low-cost extension of copper and fiber-based networks to any end user, providing efficient First Mile bypass access to high data rate backbone networks at speeds ranging from T-1 voice to full throughput ATM at 155 Mbps and up to Gigabit Ethernet. These wireless optical beams constitute a Virtual Fiber in the air, providing the capabilities of fiber in situations where wired connectivity is unavailable, impractical, expensive or slow-to-implement, while achieving a combination of low cost, speed and reliability that cannot be matched by microwave, mm wave, spread spectrum or other competing (actually complementary) wireless technologies. The carrier frequency of the optical beam is about 10,000 times higher than the highest frequencies used by the millimeter wave technology. By means of Wavelength Division Multiplexing more than 1000 independent data channels can be projected into the air on a single beam thus providing a potential bandwidth ten million times that of any RF solution. The twin barriers of physics and regulatory bureaucracy to this essentially infinite wireless bandwidth are thus eliminated by this Virtual Fiber. As user density and individual bandwidth needs escalate, the optical wireless will be the preferred medium of choice in both network and cellular interconnection. A mesh topology which integrates our optical wireless systems with the latest Optical Access switches and routing equipment will be described using case study examples from Japan to South America. As the Bandwidth Blowout continues to push the limits of electronics and especially in the case of DWDM (Dense Wavelength Division Multiples), the conventional optical wireless solutions are no longer feasible. Instead of using f.o. transceivers to convert photons to electrons and thence

  4. An improved broadband E patch microstrip antenna for wireless communications

    Science.gov (United States)

    Bzeih, Amer; Chahine, Soubhi Abou; Kabalan, Karim Y.; El-Hajj, Ali; Chehab, Ali

    2007-12-01

    A broadband probe-fed microstrip antenna with E-shaped patch on a single-layer air substrate is investigated. Bandwidth enhancement of the antenna is achieved by inserting two parallel slots into its radiating patch. The effects of the antenna parameters are analyzed, and their optimal values for broadband operation are obtained. The design parameters are formulated as a function of the center frequency, and the empirical equations are validated by simulation. A 51.5% enhanced E patch antenna for modern wireless communications (Personal Communications Service, Digital Cellular System, Universal Mobile Telecommunications System, Wireless Local Area Network 802.11 b/g, and Bluetooth) is designed, simulated, fabricated, and measured. A comparison between simulated and measured results is presented, and it showed satisfactory agreement. Moreover, the effect of incorporating more parallel slots into the radiating patch is investigated. The antenna is designed and simulated for different scenarios (four slots, six slots, and eight slots), where a bandwidth of 57% is achieved in the eight-slot design.

  5. A CMOS pressure sensor tag chip for passive wireless applications.

    Science.gov (United States)

    Deng, Fangming; He, Yigang; Li, Bing; Zuo, Lei; Wu, Xiang; Fu, Zhihui

    2015-03-23

    This paper presents a novel monolithic pressure sensor tag for passive wireless applications. The proposed pressure sensor tag is based on an ultra-high frequency RFID system. The pressure sensor element is implemented in the 0.18 µm CMOS process and the membrane gap is formed by sacrificial layer release, resulting in a sensitivity of 1.2 fF/kPa within the range from 0 to 600 kPa. A three-stage rectifier adopts a chain of auxiliary floating rectifier cells to boost the gate voltage of the switching transistors, resulting in a power conversion efficiency of 53% at the low input power of -20 dBm. The capacitive sensor interface, using phase-locked loop archietcture, employs fully-digital blocks, which results in a 7.4 bits resolution and 0.8 µW power dissipation at 0.8 V supply voltage. The proposed passive wireless pressure sensor tag costs a total 3.2 µW power dissipation.

  6. Less wireless costs : optimizing firms aim to cut wireless service bills

    International Nuclear Information System (INIS)

    Mahony, J.

    2006-01-01

    The Calgary-based firm Alliance is offering optimized billing to oil companies, many of which spend more than $100,000 a month on wireless services for devices such as cellular telephones, pagers and Blackberries. In particular, Alliance is focusing on cutting the cost of wireless for corporate clients by analyzing client-usage patterns and choosing the most cost-efficient rate plans offered by the telecoms. Alliance suggests that do-it-yourself optimization is too complex for the average user, given the very large choice of rate plans. Using algorithms, Alliance software goes through all the wireless service contract options from the telecoms to choose the best plan for a company's needs. Optimizers claim their clients will see significant savings on wireless, in the order to 20 to 50 per cent. This article presented a brief case history of a successful optimization plan for Nabors Canada LP. Alliance allows its clients to view their billing information on their web-based server. Call records can be viewed by device or company division. 1 ref., 1 fig

  7. Bimodal wireless sensing with dual-channel wide bandgap heterostructure varactors

    Science.gov (United States)

    Deen, David A.; Osinsky, Andrei; Miller, Ross

    2014-03-01

    A capacitive wireless sensing scheme is developed that utilizes an AlN/GaN-based dual-channel varactor. The dual-channel heterostructure affords two capacitance plateaus within the capacitance-voltage (CV) characteristic, owing to the two parallel two-dimensional electron gases (2DEGs) located at respective AlN/GaN interfaces. The capacitance plateaus are leveraged for the definition of two resonant states of the sensor when implemented in an inductively-coupled resonant LRC network for wireless readout. The physics-based CV model is compared with published experimental results, which serve as a basis for the sensor embodiment. The bimodal resonant sensor is befitting for a broad application space ranging from gas, electrostatic, and piezoelectric sensors to biological and chemical detection.

  8. Bimodal wireless sensing with dual-channel wide bandgap heterostructure varactors

    International Nuclear Information System (INIS)

    Deen, David A.; Osinsky, Andrei; Miller, Ross

    2014-01-01

    A capacitive wireless sensing scheme is developed that utilizes an AlN/GaN-based dual-channel varactor. The dual-channel heterostructure affords two capacitance plateaus within the capacitance-voltage (CV) characteristic, owing to the two parallel two-dimensional electron gases (2DEGs) located at respective AlN/GaN interfaces. The capacitance plateaus are leveraged for the definition of two resonant states of the sensor when implemented in an inductively-coupled resonant LRC network for wireless readout. The physics-based CV model is compared with published experimental results, which serve as a basis for the sensor embodiment. The bimodal resonant sensor is befitting for a broad application space ranging from gas, electrostatic, and piezoelectric sensors to biological and chemical detection

  9. Bimodal wireless sensing with dual-channel wide bandgap heterostructure varactors

    Energy Technology Data Exchange (ETDEWEB)

    Deen, David A.; Osinsky, Andrei; Miller, Ross [Agnitron Technology Incorporated, Eden Prairie, Minnesota 55346 (United States)

    2014-03-03

    A capacitive wireless sensing scheme is developed that utilizes an AlN/GaN-based dual-channel varactor. The dual-channel heterostructure affords two capacitance plateaus within the capacitance-voltage (CV) characteristic, owing to the two parallel two-dimensional electron gases (2DEGs) located at respective AlN/GaN interfaces. The capacitance plateaus are leveraged for the definition of two resonant states of the sensor when implemented in an inductively-coupled resonant LRC network for wireless readout. The physics-based CV model is compared with published experimental results, which serve as a basis for the sensor embodiment. The bimodal resonant sensor is befitting for a broad application space ranging from gas, electrostatic, and piezoelectric sensors to biological and chemical detection.

  10. On the physics of relativistic double layers

    International Nuclear Information System (INIS)

    Carlqvist, P.

    1982-06-01

    A model of a strong, time-independent, and relativistic double layer is studied. Besides double layers having the electric field parallel to the current the model also describes a certain type of oblique double layers. The 'Langmuir condition' (ratio of ion current density to electron current density) as well as an expression for the potential drop of the double layer are derived. Furthermore, the distribution of charged particles, electric field, and potential within the double layer are clarified and discussed. It is found that the properties of relativistic double layers differ substantially from the properties of corresponding non-relativistic double layers. (Author)

  11. Resource allocation and MIMO for 4G and beyond

    CERN Document Server

    2014-01-01

    This book presents the underlying technological breakthroughs that allowed the current state of wireless technology development to evolve. The book focuses on the two lower layers of the ISO/OSI layered model, specifically the physical and data link layers including the media access control sub-layer. These two layers are of particular importance to wireless systems due to the spectrum shortage, the broadcast nature of interference, and time variability in the wireless channel. Topics covered in this book include: radio resource allocation (RRA) for emerging architectures such as Coordinated Multipoint (CoMP) and Device-to-Device communications (D2D); RRA for quality of service control; propagation and transceiver aspects of MIMO systems; and the design and selection of MIMO multiuser precoders. The proposed approaches for RRA and MIMO are applicable to mobile communication standards such as 3GPP’s LTE and LTE-Advanced, but also apply further to the continuously evolving wireless access technologies lan...

  12. EEM{sup TM} wireless supervision

    Energy Technology Data Exchange (ETDEWEB)

    Bilic, H. [Ericsson-Nikola Tesla d.d. Zagreb (Croatia)

    2000-07-01

    By adding the GSM network to the communication level of Energy Management systems, energy operating centres (EOC) can offer wireless access to the supervised equipment. Furthermore EOC can profit from rapid service development in the GSM networks. With implementation of GPRS to the GSM network EOC can instantly offer wireless access to external IP based networks such as Internet and corporate Intranets. The author describes architecture and key characteristic of Ericsson EnergyMaster{sup TM} (EEM{sup TM}) system for Energy Management, how and where to implement wireless supervision, wireless access to IP addresses and also how to implement new services provided by the GSM network. (orig.)

  13. Design of a low-power testbed for Wireless Sensor Networks and verification

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Dulman, S.O.; Havinga, Paul J.M.; Kip, Harry J.

    In this document the design considerations and component choices of a testbed prototype device for wireless sensor networks will be discussed. These devices must be able to monitor their physical environment, process data and assist other nodes in forwarding sensor readings. For these tasks, five

  14. Reliable Communication in Wireless Meshed Networks using Network Coding

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Paramanathan, Achuthan; Hundebøll, Martin

    2012-01-01

    The advantages of network coding have been extensively studied in the field of wireless networks. Integrating network coding with existing IEEE 802.11 MAC layer is a challenging problem. The IEEE 802.11 MAC does not provide any reliability mechanisms for overheard packets. This paper addresses...... this problem and suggests different mechanisms to support reliability as part of the MAC protocol. Analytical expressions to this problem are given to qualify the performance of the modified network coding. These expressions are confirmed by numerical result. While the suggested reliability mechanisms...

  15. An Improved Wireless Battery Charging System

    OpenAIRE

    Woo-Seok Lee; Jin-Hak Kim; Shin-Young Cho; Il-Oun Lee

    2018-01-01

    This paper presents a direct wireless battery charging system. The output current of the series-series compensated wireless power transfer (SS-WPT) system is used as a current source, and the output voltage of AC-DC converter controls the current source. Therefore, the proposed wireless battery charging system needs no battery charging circuit to carry out charging profiles, and can solve space constraints and thermal problems in many battery applications. In addition, the proposed wireless b...

  16. A passive wireless ultrasound pitch–catch system

    International Nuclear Information System (INIS)

    Zahedi, F; Yao, J; Huang, H

    2015-01-01

    This paper exploits amplitude modulation and demodulation to achieve a passive wireless ultrasound pitch–catch system consisting of a wireless interrogator and a combination of a wireless actuator and a sensor mounted on a structure. The wireless interrogator operates in two modes, i.e. the generation and sensing modes. At the generation mode, the interrogator transmits two microwave signals; one is amplitude modulated with the ultrasound excitation signal while the other is a continuous-wave carrier signal. Once received by the wireless actuator, the amplitude modulated signal is demodulated using the carrier signal to recover the ultrasound excitation signal, which is then supplied to a piezoelectric wafer actuator for ultrasound generation. Subsequently, the interrogator is switched to the sensing mode by transmitting a carrier signal with a different frequency. Once received by the wireless sensor, this carrier signal is modulated with the ultrasound sensing signal acquired by the piezoelectric wafer sensor to produce an amplitude modulated microwave signal, which can then be wirelessly transmitted and demodulated by the interrogator to recover the original ultrasound sensing signal. The principle and implementation of the wireless ultrasound pitch–catch system as well as the data processing of the wirelessly received sensing signal are described. Experiment results validating wireless ultrasound generation and sensing from a distance of 0.5 m are presented. (paper)

  17. On securing wireless sensor network--novel authentication scheme against DOS attacks.

    Science.gov (United States)

    Raja, K Nirmal; Beno, M Marsaline

    2014-10-01

    Wireless sensor networks are generally deployed for collecting data from various environments. Several applications specific sensor network cryptography algorithms have been proposed in research. However WSN's has many constrictions, including low computation capability, less memory, limited energy resources, vulnerability to physical capture, which enforce unique security challenges needs to make a lot of improvements. This paper presents a novel security mechanism and algorithm for wireless sensor network security and also an application of this algorithm. The proposed scheme is given to strong authentication against Denial of Service Attacks (DOS). The scheme is simulated using network simulator2 (NS2). Then this scheme is analyzed based on the network packet delivery ratio and found that throughput has improved.

  18. Photonic-assisted ultrafast THz wireless access

    DEFF Research Database (Denmark)

    Yu, Xianbin; Chen, Ying; Galili, Michael

    THz technology has been considered feasible for ultrafast wireless data communi- cation, to meet the increasing demand on next-generation fast wireless access, e.g., huge data file transferring and fast mobile data stream access. This talk reviews recent progress in high-speed THz wireless...

  19. The effect of using waste newspaper in surface layers on physical and mechanical properties of three-layer particleboard

    Directory of Open Access Journals (Sweden)

    vahid vaziri

    2017-02-01

    Full Text Available In this study, physical and mechanical properties of particleboard made from recycled newspaper in the surface layers were investigated. Coarse and fine wood chips and recycled newspaper with dimension of 0.5 × 4 cm2 were used. The variable in this research were the ratio of recycled newspaper to wood chips (at five levels; 0:100, 15:85, 30:70, 45:55, 60:40. Urea formaldehyde resin used at 10% content on dry weight basis of the wood particles and newspaper and ammonium chloride was used as a catalyst to 2% of the dry weight of adhesive. Physical and mechanical properties of panels measured according to EN Standard. The results showed that panels containing recycled newspapers at the level of 45% had the highest bending strength and modulus of elasticity. Internal bonding and screw holding strength decreased with increasing of recycled newspaper and control sample had the highest strength. Water absorption and thickness swelling increased with increasing of recycled newspaper portion. On the basis of results of this study can be concluded that particleboard containing recycled newspapers in the surface layers up to the level of 30% can be used for general purpose boards and interior fitments (including furniture for use in dry conditions.

  20. A Micromachined Capacitive Pressure Sensor Using a Cavity-Less Structure with Bulk-Metal/Elastomer Layers and Its Wireless Telemetry Application

    Directory of Open Access Journals (Sweden)

    Yogesh B. Gianchandani

    2008-04-01

    Full Text Available This paper reports a micromachined capacitive pressure sensor intended for applications that require mechanical robustness. The device is constructed with two micromachined metal plates and an intermediate polymer layer that is soft enough to deform in a target pressure range. The plates are formed of micromachined stainless steel fabricated by batch-compatible micro-electro-discharge machining. A polyurethane roomtemperature- vulcanizing liquid rubber of 38-μm thickness is used as the deformable material. This structure eliminates both the vacuum cavity and the associated lead transfer challenges common to micromachined capacitive pressure sensors. For frequency-based interrogation of the capacitance, passive inductor-capacitor tanks are fabricated by combining the capacitive sensor with an inductive coil. The coil has 40 turns of a 127-μmdiameter copper wire. Wireless sensing is demonstrated in liquid by monitoring the variation in the resonant frequency of the tank via an external coil that is magnetically coupled with the tank. The sensitivity at room temperature is measured to be 23-33 ppm/KPa over a dynamic range of 340 KPa, which is shown to match a theoretical estimation. Temperature dependence of the tank is experimentally evaluated.

  1. Green heterogeneous wireless networks

    CERN Document Server

    Ismail, Muhammad; Nee, Hans-Peter; Qaraqe, Khalid A; Serpedin, Erchin

    2016-01-01

    This book focuses on the emerging research topic "green (energy efficient) wireless networks" which has drawn huge attention recently from both academia and industry. This topic is highly motivated due to important environmental, financial, and quality-of-experience (QoE) considerations. Specifically, the high energy consumption of the wireless networks manifests in approximately 2% of all CO2 emissions worldwide. This book presents the authors’ visions and solutions for deployment of energy efficient (green) heterogeneous wireless communication networks. The book consists of three major parts. The first part provides an introduction to the "green networks" concept, the second part targets the green multi-homing resource allocation problem, and the third chapter presents a novel deployment of device-to-device (D2D) communications and its successful integration in Heterogeneous Networks (HetNets). The book is novel in that it specifically targets green networking in a heterogeneous wireless medium, which re...

  2. Mathematical analogies in physics. Thin-layer wave theory

    Directory of Open Access Journals (Sweden)

    José M. Carcione

    2014-03-01

    Full Text Available Field theory applies to elastodynamics, electromagnetism, quantum mechanics, gravitation and other similar fields of physics, where the basic equations describing the phenomenon are based on constitutive relations and balance equations. For instance, in elastodynamics, these are the stress-strain relations and the equations of momentum conservation (Euler-Newton law. In these cases, the same mathematical theory can be used, by establishing appropriate mathematical equivalences (or analogies between material properties and field variables. For instance, the wave equation and the related mathematical developments can be used to describe anelastic and electromagnetic wave propagation, and are extensively used in quantum mechanics. In this work, we obtain the mathematical analogy for the reflection/refraction (transmission problem of a thin layer embedded between dissimilar media, considering the presence of anisotropy and attenuation/viscosity in the viscoelastic case, conductivity in the electromagnetic case and a potential barrier in quantum physics (the tunnel effect. The analogy is mainly illustrated with geophysical examples of propagation of S (shear, P (compressional, TM (transverse-magnetic and TE (transverse-electric waves. The tunnel effect is obtained as a special case of viscoelastic waves at normal incidence.

  3. An Enhanced PSO-Based Clustering Energy Optimization Algorithm for Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    C. Vimalarani

    2016-01-01

    Full Text Available Wireless Sensor Network (WSN is a network which formed with a maximum number of sensor nodes which are positioned in an application environment to monitor the physical entities in a target area, for example, temperature monitoring environment, water level, monitoring pressure, and health care, and various military applications. Mostly sensor nodes are equipped with self-supported battery power through which they can perform adequate operations and communication among neighboring nodes. Maximizing the lifetime of the Wireless Sensor networks, energy conservation measures are essential for improving the performance of WSNs. This paper proposes an Enhanced PSO-Based Clustering Energy Optimization (EPSO-CEO algorithm for Wireless Sensor Network in which clustering and clustering head selection are done by using Particle Swarm Optimization (PSO algorithm with respect to minimizing the power consumption in WSN. The performance metrics are evaluated and results are compared with competitive clustering algorithm to validate the reduction in energy consumption.

  4. Security For Wireless Sensor Network

    OpenAIRE

    Saurabh Singh,; Dr. Harsh Kumar Verma

    2011-01-01

    Wireless sensor network is highly vulnerable to attacks because it consists of various resourceconstrained devices with their low battery power, less memory, and associated low energy. Sensor nodescommunicate among themselves via wireless links. However, there are still a lot of unresolved issues in wireless sensor networks of which security is one of the hottest research issues. Sensor networks aredeployed in hostile environments. Environmental conditions along with resource-constraints give...

  5. Midfield wireless powering of subwavelength autonomous devices.

    Science.gov (United States)

    Kim, Sanghoek; Ho, John S; Poon, Ada S Y

    2013-05-17

    We obtain an analytical bound on the efficiency of wireless power transfer to a weakly coupled device. The optimal source is solved for a multilayer geometry in terms of a representation based on the field equivalence principle. The theory reveals that optimal power transfer exploits the properties of the midfield to achieve efficiencies far greater than conventional coil-based designs. As a physical realization of the source, we present a slot array structure whose performance closely approaches the theoretical bound.

  6. Resource Allocation and Cross Layer Control in Wireless Networks

    National Research Council Canada - National Science Library

    Georgiadis, L; Neely, M; Tassiulas, L

    2006-01-01

    Information .ow in a telecommunication network is accomplished through the interaction of mechanisms at various design layers with the end goal of supporting the information exchange needs of the applications...

  7. Emerging wireless networks concepts, techniques and applications

    CERN Document Server

    Makaya, Christian

    2011-01-01

    An authoritative collection of research papers and surveys, Emerging Wireless Networks: Concepts, Techniques, and Applications explores recent developments in next-generation wireless networks (NGWNs) and mobile broadband networks technologies, including 4G (LTE, WiMAX), 3G (UMTS, HSPA), WiFi, mobile ad hoc networks, mesh networks, and wireless sensor networks. Focusing on improving the performance of wireless networks and provisioning better quality of service and quality of experience for users, it reports on the standards of different emerging wireless networks, applications, and service fr

  8. Introductory survey for wireless infrared communications

    Directory of Open Access Journals (Sweden)

    Munsif Ali Jatoi

    2014-08-01

    Full Text Available Wireless infrared communications can be defined as the propagation of light waves in free space using infrared radiation whose range is 400–700 nm. This range corresponds to frequencies of hundreds of terahertz, which is high for higher data rate applications. Wireless infrared is applied for higher data rates applications such as wireless computing, wireless video and wireless multimedia communication applications. Introduced by Gfeller, this field has grown with different link configurations, improved transmitter efficiency, increased receiver responsivity and various multiple access techniques for improved quality. Errors are caused because of background light, which causes degradation overall system performance. Error correction techniques are used to remove the errors caused during transmission. This study provides a brief account on field theory used for error correction in wireless infrared systems. The results are produced in terms of bit error rate and signal-to-noise ratio for various bit lengths to show the ability of encoding and decoding algorithms.

  9. Introduction to wireless sensor networks

    CERN Document Server

    Forster, Anna

    2016-01-01

    Explores real-world wireless sensor network development, deployment, and applications. The book begins with an introduction to wireless sensor networks and their fundamental concepts. Hardware components, operating systems, protocols, and algorithms that make up the anatomy of a sensor node are described in chapter two. Properties of wireless communications, medium access protocols, wireless links, and link estimation protocols are described in chapter three and chapter four. Routing basics and metrics, clustering techniques, time synchronization and localization protocols, as well as sensing techniques are introduced in chapter five to nine. The concluding chapter summarizes the learnt methods and shows how to use them to deploy real-world sensor networks in a structured way.

  10. Wireless Communications for Monitoring Nuclear Material Processes part 1.: Context and Technologies

    International Nuclear Information System (INIS)

    Braina, F.; Goncalves, J.C.M.; Versino, C.; Heppleston, M.; Schoeneman, B.; Tolk, K.

    2007-01-01

    Recent advances in radio frequency communication technologies offer the motivation to consider the use of wireless communication in nuclear safeguards applications. From the Nuclear Safeguards Inspectorate' (NSI) point of view, wireless data transmission, which would be supplemental to wired communication is attractive for the ease of installation and the ability to respond to the changing requirements as the inspection approach evolves, resulting in a reduction of costs. However, for wireless technologies to be considered as a viable complement to cables, a number of concerns have to be addressed. First, nuclear operators need to be guaranteed that RF transmission will not interfere with the facilities safety and physical security systems. On their side, the NSI must be satisfied that Containment and Surveillance equipment and data transmission processes will not be affected by the other existing RF equipment. Second, it is desirable, both for the NSI and the operators, that the data being transmitted is not available for analysis by a third party. In addition, the NSI require data to be authenticated as close to the point of acquisition as possible. This paper was prepared as an account of work performed and approved by the ESARDA Working Group on Containment and Surveillance. It is the first of a suite dedicated to bridging RF technologies with safeguards monitoring applications. The paper focuses on technological issues: it introduces basic concepts underlying wireless communication, including methods for transmission, issues on power consumption, frequency, range, and considerations on interference and noise resilience. It overviews state-of-the-art wireless technologies and presents a projection on wireless capabilities that are likely to be reached in the near future

  11. OIT Wireless Telemetry for Industrial Applications

    Energy Technology Data Exchange (ETDEWEB)

    Manges, WW

    2002-09-03

    The need for advanced wireless technology has been identified in the National Research Council publication (1) ''Manufacturing Process Controls for the Industries of the Future as a Critical Technology for the Future''. The deployment challenges to be overcome in order for wireless to be a viable option include: (1) eliminating interference (assuring reliable communications); (2) easing the deployment of intelligent, wireless sensors; (3) developing reliable networks (robust architectures); (4) developing remote power (long-lasting and reliable); and (5) developing standardized communication protocols. This project demonstrated the feasibility of robust wireless sensor networks that could meet these requirements for the harsh environments common to the DOE/OIT Industries of the Future. It resulted in a wireless test bed that was demonstrated in a paper mill and a steel plant. The test bed illustrated key protocols and components that would be required in a real-life, wireless network. The technologies for low power connectivity developed and demonstrated at the plant eased fears that the radios would interfere with existing control equipment. The same direct sequence, spread spectrum (DSSS) technology that helped assure the reliability of the connection also demonstrated that wireless communication was feasible in these plants without boosting the transmitted power to dangerous levels. Our experience and research have indicated that two key parameters are of ultimate importance: (1) reliability and (2) inter-system compatibility. Reliability is the key to immediate acceptance among industrial users. The importance cannot be overstated, because users will not tolerate an unreliable information network. A longer term issue that is at least as important as the reliability of a single system is the inter-system compatibility between these wireless sensor networks and other wireless systems that are part of our industries. In the long run, the

  12. Voice Quality Estimation in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Petr Zach

    2015-01-01

    Full Text Available This article deals with the impact of Wireless (Wi-Fi networks on the perceived quality of voice services. The Quality of Service (QoS metrics must be monitored in the computer network during the voice data transmission to ensure proper voice service quality the end-user has paid for, especially in the wireless networks. In addition to the QoS, research area called Quality of Experience (QoE provides metrics and methods for quality evaluation from the end-user’s perspective. This article focuses on a QoE estimation of Voice over IP (VoIP calls in the wireless networks using network simulator. Results contribute to voice quality estimation based on characteristics of the wireless network and location of a wireless client.

  13. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  14. Evolution of Heterogeneous Wireless Networks

    DEFF Research Database (Denmark)

    Zhang, Q.; Fitzek, Frank; Katz, Marcos

    2006-01-01

    Mobile and wireless content, services and networks - Short-term and long-term development trends......Mobile and wireless content, services and networks - Short-term and long-term development trends...

  15. Synthesis of PVA/PVP hydrogels having two-layer by radiation and their physical properties

    International Nuclear Information System (INIS)

    Park, K.R.; Nho, Y.C.

    2003-01-01

    In these studies, two-layer hydrogels which consisted of polyurethane membrane and a mixture of polyvinyl alcohol(PVA)/poly-N-vinylpyrrolidone(PVP)/glycerin/chitosan were made for the wound dressing. Polyurethane was dissolved in solvent, the polyurethane solution was poured on the mould, and then dried to make the thin membrane. Hydrophilic polymer solutions were poured on the polyurethane membranes, they were exposed to gamma irradiation or two steps of 'freezing and thawing' and gamma irradiation doses to make the hydrogels. The physical properties such as gelation, water absorptivity, and gel strength were examined to evaluate the hydrogels for wound dressing. The physical properties of hydrogels such as gelation and gel strength was greatly improved when polyurethane membrane was used as a covering layer of hydrogel, and the evaporation speed of water in hydrogel was reduced

  16. SIMULATION OF WIRELESS SENSOR NETWORK WITH HYBRID TOPOLOGY

    Directory of Open Access Journals (Sweden)

    J. Jaslin Deva Gifty

    2016-03-01

    Full Text Available The design of low rate Wireless Personal Area Network (WPAN by IEEE 802.15.4 standard has been developed to support lower data rates and low power consuming application. Zigbee Wireless Sensor Network (WSN works on the network and application layer in IEEE 802.15.4. Zigbee network can be configured in star, tree or mesh topology. The performance varies from topology to topology. The performance parameters such as network lifetime, energy consumption, throughput, delay in data delivery and sensor field coverage area varies depending on the network topology. In this paper, designing of hybrid topology by using two possible combinations such as star-tree and star-mesh is simulated to verify the communication reliability. This approach is to combine all the benefits of two network model. The parameters such as jitter, delay and throughput are measured for these scenarios. Further, MAC parameters impact such as beacon order (BO and super frame order (SO for low power consumption and high channel utilization, has been analysed for star, tree and mesh topology in beacon disable mode and beacon enable mode by varying CBR traffic loads.

  17. Energy-efficient wireless mesh infrastructures

    OpenAIRE

    Al-Hazmi, Y.; de Meer, Hermann; Hummel, Karin Anna; Meyer, Harald; Meo, Michela; Remondo Bueno, David

    2011-01-01

    The Internet comprises access segments with wired and wireless technologies. In the future, we can expect wireless mesh infrastructures (WMIs) to proliferate in this context. Due to the relatively low energy efficiency of wireless transmission, as compared to wired transmission, energy consumption of WMIs can represent a significant part of the energy consumption of the Internet as a whole. We explore different approaches to reduce energy consumption in WMIs, taking into accoun...

  18. Indoor Airborne Ultrasonic Wireless Communication Using OFDM Methods.

    Science.gov (United States)

    Jiang, Wentao; Wright, William M D

    2017-09-01

    Concerns still exist over the safety of prolonged exposure to radio frequency (RF) wireless transmissions and there are also potential data security issues due to remote signal interception techniques such as Bluesniping. Airborne ultrasound may be used as an alternative to RF for indoor wireless communication systems for securely transmitting data over short ranges, as signals are difficult to intercept from outside the room. Two types of air-coupled capacitive ultrasonic transducer were used in the implementation of an indoor airborne wireless communication system. One was a commercially available SensComp series 600 ultrasonic transducer with a nominal frequency of 50 kHz, and the other was a prototype transducer with a high- k dielectric layer operating at higher frequencies from 200 to 400 kHz. Binary phase-shift keying (BPSK), quadrature phase-shift keying (QPSK), and quadrature amplitude modulation (QAM)-based orthogonal frequency division multiplexing modulation methods were successfully implemented using multiple orthogonal subchannels. The modulated ultrasonic signal packets were synchronized using a wireless link, and a least-squares channel estimation algorithm was used to compensate the phase and amplitude distortion introduced by the air channel. By sending and receiving the ultrasonic signals using the SensComp transducers, the achieved maximum system data rate was up to 180 kb/s using 16-QAM with ultrasonic channels from 55 to 99 kHz, over a line-of-sight transmission distance of 6 m with no detectable errors. The transmission range could be extended to 9 and 11 m using QPSK and BPSK modulation schemes, respectively. The achieved data rates for the QPSK and BPSK schemes were 90 and 45 kb/s using the same bandwidth. For the high- k ultrasonic transducers, a maximum data rate up to 800 kb/s with no measurable errors was achieved up to a range of 0.7 m. The attainable transmission ranges were increased to 1.1 and 1.2 m with data rates of 400 and 200 kb

  19. Comparison of WRF local and nonlocal boundary layer Physics in Greater Kuala Lumpur, Malaysia

    Science.gov (United States)

    Ooi, M. C. G.; Chan, A.; Kumarenthiran, S.; Morris, K. I.; Oozeer, M. Y.; Islam, M. A.; Salleh, S. A.

    2018-02-01

    The urban boundary layer (UBL) is the internal advection layer of atmosphere above urban region which determines the exchanges of momentum, water and other atmospheric constituents between the urban land surface and the free troposphere. This paper tested the performance of three planetary boundary layer (PBL) physics schemes of Weather Research and Forecast (WRF) software to ensure the appropriate representation of vertical structure of UBL in Greater Kuala Lumpur (GKL). Comparison was conducted on the performance of respective PBL schemes to generate vertical and near-surface weather profile and rainfall. Mellor-Yamada- Janjíc (MYJ) local PBL scheme coupled with Eta MM5 surface layer scheme was found to predict the near-surface temperature and wind profile and mixing height better than the nonlocal schemes during the intermonsoonal period with least influences of the synoptic background weather.

  20. Performance Analysis of IIUM Wireless Campus Network

    International Nuclear Information System (INIS)

    Latif, Suhaimi Abd; Masud, Mosharrof H; Anwar, Farhat

    2013-01-01

    International Islamic University Malaysia (IIUM) is one of the leading universities in the world in terms of quality of education that has been achieved due to providing numerous facilities including wireless services to every enrolled student. The quality of this wireless service is controlled and monitored by Information Technology Division (ITD), an ISO standardized organization under the university. This paper aims to investigate the constraints of wireless campus network of IIUM. It evaluates the performance of the IIUM wireless campus network in terms of delay, throughput and jitter. QualNet 5.2 simulator tool has employed to measure these performances of IIUM wireless campus network. The observation from the simulation result could be one of the influencing factors in improving wireless services for ITD and further improvement

  1. Integration of RFID and Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    Miodrag; Bolic; Amiya; Nayak; Ivan; Stojmenovi.

    2007-01-01

    Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important wireless technologies that have wide variety of applications and provide limitless future potentials. However,RFID and sensor networks almost are under development in parallel way. Integration of RFID and wireless sensor networks attracts little attention from research community. This paper first presents a brief introduction on RFID,and then investigates recent research works,new products/patents and applications that integrate RFID with sensor networks. Four types of integration are discussed. They are integrating tags with sensors,integrating tags with wireless sensor nodes,integrating readers with wireless sensor nodes and wire-less devices,and mix of RFID and sensors. New challenges and future works are discussed in the end.

  2. Cross-Layer Scheme to Control Contention Window for Per-Flow in Asymmetric Multi-Hop Networks

    Science.gov (United States)

    Giang, Pham Thanh; Nakagawa, Kenji

    The IEEE 802.11 MAC standard for wireless ad hoc networks adopts Binary Exponential Back-off (BEB) mechanism to resolve bandwidth contention between stations. BEB mechanism controls the bandwidth allocation for each station by choosing a back-off value from one to CW according to the uniform random distribution, where CW is the contention window size. However, in asymmetric multi-hop networks, some stations are disadvantaged in opportunity of access to the shared channel and may suffer severe throughput degradation when the traffic load is large. Then, the network performance is degraded in terms of throughput and fairness. In this paper, we propose a new cross-layer scheme aiming to solve the per-flow unfairness problem and achieve good throughput performance in IEEE 802.11 multi-hop ad hoc networks. Our cross-layer scheme collects useful information from the physical, MAC and link layers of own station. This information is used to determine the optimal Contention Window (CW) size for per-station fairness. We also use this information to adjust CW size for each flow in the station in order to achieve per-flow fairness. Performance of our cross-layer scheme is examined on various asymmetric multi-hop network topologies by using Network Simulator (NS-2).

  3. Using Wireless Network Coding to Replace a Wired with Wireless Backhaul

    DEFF Research Database (Denmark)

    Thomsen, Henning; De Carvalho, Elisabeth; Popovski, Petar

    2014-01-01

    of wireless emulated wire (WEW), based on two-way relaying and network coding. This setup leads to a new type of broadcast problem, with decoding conditions that are specific to the requirement for equivalence to the wired backhaul. We formulate and solve the associated optimization problems. The proposed...... approach is a convincing argument that wireless backhauling solutions should be designed and optimized for two-way communication....

  4. A telemedicine system for wireless home healthcare based on Bluetooth and the Internet.

    Science.gov (United States)

    Zhao, Xiaoming; Fei, Ding-Yu; Doarn, Charles R; Harnett, Brett; Merrell, Ronald

    2004-01-01

    The VitalPoll Telemedicine System (VTS) was designed and developed for wireless home healthcare. The aims of this study were: to design the architecture and communication methods for a telemedicine system; to implement a physiologic routing hub to collect data from different medical devices and sensors; and to evaluate the feasibility of this system for applications in wireless home healthcare. The VTS was built using Bluetooth wireless and Internet technologies with client/server architecture. Several medical devices, which acquire vital signs, such as real-time electrocardiogram signals, heart rate, body temperature, and activity (physical motion), were integrated into the VTS. Medical information and data were transmitted over short-range interface (USB, RS232), wireless communication, and the Internet. The medical results were stored in a database and presented using a web browser. The patient's vital signals can be collected, transmitted, and displayed in real time by the VTS. The experiments verified no data loss during Bluetooth and Internet communication. Bluetooth and the Internet provide enough bandwidth channels to tranmit these vital signs. The experimental results show that VTS may be suitable for a practical telemedicine system in home healthcare.

  5. The wireless networking system of Earthquake precursor mobile field observation

    Science.gov (United States)

    Wang, C.; Teng, Y.; Wang, X.; Fan, X.; Wang, X.

    2012-12-01

    The mobile field observation network could be real-time, reliably record and transmit large amounts of data, strengthen the physical signal observations in specific regions and specific period, it can improve the monitoring capacity and abnormal tracking capability. According to the features of scatter everywhere, a large number of current earthquake precursor observation measuring points, networking technology is based on wireless broadband accessing McWILL system, the communication system of earthquake precursor mobile field observation would real-time, reliably transmit large amounts of data to the monitoring center from measuring points through the connection about equipment and wireless accessing system, broadband wireless access system and precursor mobile observation management center system, thereby implementing remote instrument monitoring and data transmition. At present, the earthquake precursor field mobile observation network technology has been applied to fluxgate magnetometer array geomagnetic observations of Tianzhu, Xichang,and Xinjiang, it can be real-time monitoring the working status of the observational instruments of large area laid after the last two or three years, large scale field operation. Therefore, it can get geomagnetic field data of the local refinement regions and provide high-quality observational data for impending earthquake tracking forecast. Although, wireless networking technology is very suitable for mobile field observation with the features of simple, flexible networking etc, it also has the phenomenon of packet loss etc when transmitting a large number of observational data due to the wireless relatively weak signal and narrow bandwidth. In view of high sampling rate instruments, this project uses data compression and effectively solves the problem of data transmission packet loss; Control commands, status data and observational data transmission use different priorities and means, which control the packet loss rate within

  6. Point Defects in Two-Dimensional Layered Semiconductors: Physics and Its Applications

    Science.gov (United States)

    Suh, Joonki

    Recent advances in material science and semiconductor processing have been achieved largely based on in-depth understanding, efficient management and advanced application of point defects in host semiconductors, thus finding the relevant techniques such as doping and defect engineering as a traditional scientific and technological solution. Meanwhile, two- dimensional (2D) layered semiconductors currently draw tremendous attentions due to industrial needs and their rich physics at the nanoscale; as we approach the end of critical device dimensions in silicon-based technology, ultra-thin semiconductors have the potential as next- generation channel materials, and new physics also emerges at such reduced dimensions where confinement of electrons, phonons, and other quasi-particles is significant. It is therefore rewarding and interesting to understand and redefine the impact of lattice defects by investigating their interactions with energy/charge carriers of the host matter. Potentially, the established understanding will provide unprecedented opportunities for realizing new functionalities and enhancing the performance of energy harvesting and optoelectronic devices. In this thesis, multiple novel 2D layered semiconductors, such as bismuth and transition- metal chalcogenides, are explored. Following an introduction of conventional effects induced by point defects in semiconductors, the related physics of electronically active amphoteric defects is revisited in greater details. This can elucidate the complication of a two-dimensional electron gas coexisting with the topological states on the surface of bismuth chalcogenides, recently suggested as topological insulators. Therefore, native point defects are still one of the keys to understand and exploit topological insulators. In addition to from a fundamental science point of view, the effects of point defects on the integrated thermal-electrical transport, as well as the entropy-transporting process in

  7. DISA Wireless E-Mail Trial

    National Research Council Canada - National Science Library

    Haney, Steven

    1997-01-01

    .... Correspondingly unique wireless modems were obtained and mated to the PCMCIA slot of notebook computers in the user/evaluation population, consisting of InfoTac and Mobedem wireless modems for use...

  8. Self-organization of grafted polyelectrolyte layers via the coupling of chemical equilibrium and physical interactions.

    Science.gov (United States)

    Tagliazucchi, Mario; de la Cruz, Mónica Olvera; Szleifer, Igal

    2010-03-23

    The competition between chemical equilibrium, for example protonation, and physical interactions determines the molecular organization and functionality of biological and synthetic systems. Charge regulation by displacement of acid-base equilibrium induced by changes in the local environment provides a feedback mechanism that controls the balance between electrostatic, van der Waals, steric interactions and molecular organization. Which strategies do responsive systems follow to globally optimize chemical equilibrium and physical interactions? We address this question by theoretically studying model layers of end-grafted polyacids. These layers spontaneously form self-assembled aggregates, presenting domains of controlled local pH and whose morphologies can be manipulated by the composition of the solution in contact with the film. Charge regulation stabilizes micellar domains over a wide range of pH by reducing the local charge in the aggregate at the cost of chemical free energy and gaining in hydrophobic interactions. This balance determines the boundaries between different aggregate morphologies. We show that a qualitatively new form of organization arises from the coupling between physical interactions and protonation equilibrium. This optimization strategy presents itself with polyelectrolytes coexisting in two different and well-defined protonation states. Our results underline the need of considering the coupling between chemical equilibrium and physical interactions due to their highly nonadditive behavior. The predictions provide guidelines for the creation of responsive polymer layers presenting self-organized patterns with functional properties and they give insights for the understanding of competing interactions in highly inhomogeneous and constrained environments such as those relevant in nanotechnology and those responsible for biological cells function.

  9. Cooperative Diversity in Wireless Networks

    Directory of Open Access Journals (Sweden)

    A. Mahmood

    2010-01-01

    Full Text Available Transmit Diversity is an effective methodology for improving the quality and reliability of a wireless network by reducingthe effects of fading. As majority of the wireless devices (i.e. mobile handsets, etc are limited to only one antenna, especiallydue to hardware constraints, size and cost factors; cooperative communication can be utilized in order to generatetransmit diversity [1]. This enables single antenna wireless devices to share their antennas during transmission in such amanner that creates a virtual MIMO (multiple-input and multiple-output system [2] [3]. In this paper, we will analyze therecent developments and trends in this promising area of wireless Ad hoc networks. The article will also discuss variousmain cooperative signaling methods and will also observe their performance.

  10. Radiation-Tolerance Assessment of a Redundant Wireless Device

    Science.gov (United States)

    Huang, Q.; Jiang, J.

    2018-01-01

    This paper presents a method to evaluate radiation-tolerance without physical tests for a commercial off-the-shelf (COTS)-based monitoring device for high level radiation fields, such as those found in post-accident conditions in a nuclear power plant (NPP). This paper specifically describes the analysis of radiation environment in a severe accident, radiation damages in electronics, and the redundant solution used to prolong the life of the system, as well as the evaluation method for radiation protection and the analysis method of system reliability. As a case study, a wireless monitoring device with redundant and diversified channels is evaluated by using the developed method. The study results and system assessment data show that, under the given radiation condition, performance of the redundant device is more reliable and more robust than those non-redundant devices. The developed redundant wireless monitoring device is therefore able to apply in those conditions (up to 10 M Rad (Si)) during a severe accident in a NPP.

  11. Low-Power Wireless Sensor Network Infrastructures

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg

    Advancements in wireless communication and electronics improving form factor and hardware capabilities has expanded the applicability of wireless sensor networks. Despite these advancements, devices are still limited in terms of energy which creates the need for duty-cycling and low-power protocols...... peripherals need to by duty-cycled and the low-power wireless radios are severely influenced by the environmental effects causing bursty and unreliable wireless channels. This dissertation presents a communication stack providing services for low-power communication, secure communication, data collection......, and network management which enables construction of low-power wireless sensor network applications. More specifically, these services are designed with the extreme low-power scenarios of the SensoByg project in mind and are implemented as follows. First, low-power communication is implemented with Auto...

  12. Efficient weakly-radiative wireless energy transfer: An EIT-like approach

    International Nuclear Information System (INIS)

    Hamam, Rafif E.; Karalis, Aristeidis; Joannopoulos, J.D.; Soljacic, Marin

    2009-01-01

    Inspired by a quantum interference phenomenon known in the atomic physics community as electromagnetically induced transparency (EIT), we propose an efficient weakly radiative wireless energy transfer scheme between two identical classical resonant objects, strongly coupled to an intermediate classical resonant object of substantially different properties, but with the same resonance frequency. The transfer mechanism essentially makes use of the adiabatic evolution of an instantaneous (so called 'dark') eigenstate of the coupled 3-object system. Our analysis is based on temporal coupled mode theory (CMT), and is general enough to be valid for various possible sorts of coupling, including the resonant inductive coupling on which witricity-type wireless energy transfer is based. We show that in certain parameter regimes of interest, this scheme can be more efficient, and/or less radiative than other, more conventional approaches. A concrete example of wireless energy transfer between capacitively-loaded metallic loops is illustrated at the beginning, as a motivation for the more general case. We also explore the performance of the currently proposed EIT-like scheme, in terms of improving efficiency and reducing radiation, as the relevant parameters of the system are varied.

  13. Wireless body sensor networks for health-monitoring applications

    International Nuclear Information System (INIS)

    Hao, Yang; Foster, Robert

    2008-01-01

    Current wireless technologies, such as wireless body area networks and wireless personal area networks, provide promising applications in medical monitoring systems to measure specified physiological data and also provide location-based information, if required. With the increasing sophistication of wearable and implantable medical devices and their integration with wireless sensors, an ever-expanding range of therapeutic and diagnostic applications is being pursued by research and commercial organizations. This paper aims to provide a comprehensive review of recent developments in wireless sensor technology for monitoring behaviour related to human physiological responses. It presents background information on the use of wireless technology and sensors to develop a wireless physiological measurement system. A generic miniature platform and other available technologies for wireless sensors have been studied in terms of hardware and software structural requirements for a low-cost, low-power, non-invasive and unobtrusive system. (topical review)

  14. Packet Duplication in Dual Connectivity Enabled 5G Wireless Networks: Overview and Challenges

    OpenAIRE

    Aijaz, Adnan

    2018-01-01

    Enabling ultra-reliable low latency communications (uRLLC) over 5G wireless networks creates challenging design requirements, particularly on the air-interface. The stringent latency and reliability targets require enhancements at different layers of the protocol stack. On the other hand, the parallel redundancy protocol (PRP), wherein each data packet is duplicated and transmitted concurrently over two independent networks, provides a simple solution for improving reliability and reducing la...

  15. An Integrated Simulation Module for Cyber-Physical Automation Systems

    Directory of Open Access Journals (Sweden)

    Francesco Ferracuti

    2016-05-01

    Full Text Available The integration of Wireless Sensors Networks (WSNs into Cyber Physical Systems (CPSs is an important research problem to solve in order to increase the performances, safety, reliability and usability of wireless automation systems. Due to the complexity of real CPSs, emulators and simulators are often used to replace the real control devices and physical connections during the development stage. The most widespread simulators are free, open source, expandable, flexible and fully integrated into mathematical modeling tools; however, the connection at a physical level and the direct interaction with the real process via the WSN are only marginally tackled; moreover, the simulated wireless sensor motes are not able to generate the analogue output typically required for control purposes. A new simulation module for the control of a wireless cyber-physical system is proposed in this paper. The module integrates the COntiki OS JAva Simulator (COOJA, a cross-level wireless sensor network simulator, and the LabVIEW system design software from National Instruments. The proposed software module has been called “GILOO” (Graphical Integration of Labview and cOOja. It allows one to develop and to debug control strategies over the WSN both using virtual or real hardware modules, such as the National Instruments Real-Time Module platform, the CompactRio, the Supervisory Control And Data Acquisition (SCADA, etc. To test the proposed solution, we decided to integrate it with one of the most popular simulators, i.e., the Contiki OS, and wireless motes, i.e., the Sky mote. As a further contribution, the Contiki Sky DAC driver and a new “Advanced Sky GUI” have been proposed and tested in the COOJA Simulator in order to provide the possibility to develop control over the WSN. To test the performances of the proposed GILOO software module, several experimental tests have been made, and interesting preliminary results are reported. The GILOO module has been

  16. An Integrated Simulation Module for Cyber-Physical Automation Systems.

    Science.gov (United States)

    Ferracuti, Francesco; Freddi, Alessandro; Monteriù, Andrea; Prist, Mariorosario

    2016-05-05

    The integration of Wireless Sensors Networks (WSNs) into Cyber Physical Systems (CPSs) is an important research problem to solve in order to increase the performances, safety, reliability and usability of wireless automation systems. Due to the complexity of real CPSs, emulators and simulators are often used to replace the real control devices and physical connections during the development stage. The most widespread simulators are free, open source, expandable, flexible and fully integrated into mathematical modeling tools; however, the connection at a physical level and the direct interaction with the real process via the WSN are only marginally tackled; moreover, the simulated wireless sensor motes are not able to generate the analogue output typically required for control purposes. A new simulation module for the control of a wireless cyber-physical system is proposed in this paper. The module integrates the COntiki OS JAva Simulator (COOJA), a cross-level wireless sensor network simulator, and the LabVIEW system design software from National Instruments. The proposed software module has been called "GILOO" (Graphical Integration of Labview and cOOja). It allows one to develop and to debug control strategies over the WSN both using virtual or real hardware modules, such as the National Instruments Real-Time Module platform, the CompactRio, the Supervisory Control And Data Acquisition (SCADA), etc. To test the proposed solution, we decided to integrate it with one of the most popular simulators, i.e., the Contiki OS, and wireless motes, i.e., the Sky mote. As a further contribution, the Contiki Sky DAC driver and a new "Advanced Sky GUI" have been proposed and tested in the COOJA Simulator in order to provide the possibility to develop control over the WSN. To test the performances of the proposed GILOO software module, several experimental tests have been made, and interesting preliminary results are reported. The GILOO module has been applied to a smart home

  17. Wireless networking for the dental office: current wireless standards and security protocols.

    Science.gov (United States)

    Mupparapu, Muralidhar; Arora, Sarika

    2004-11-15

    Digital radiography has gained immense popularity in dentistry today in spite of the early difficulty for the profession to embrace the technology. The transition from film to digital has been happening at a faster pace in the fields of Orthodontics, Oral Surgery, Endodontics, Periodontics, and other specialties where the radiographic images (periapical, bitewing, panoramic, cephalometric, and skull radiographs) are being acquired digitally, stored within a server locally, and eventually accessed for diagnostic purposes, along with the rest of the patient data via the patient management software (PMS). A review of the literature shows the diagnostic performance of digital radiography is at least comparable to or even better than that of conventional radiography. Similarly, other digital diagnostic tools like caries detectors, cephalometric analysis software, and digital scanners were used for many years for the diagnosis and treatment planning purposes. The introduction of wireless charged-coupled device (CCD) sensors in early 2004 (Schick Technologies, Long Island City, NY) has moved digital radiography a step further into the wireless era. As with any emerging technology, there are concerns that should be looked into before adapting to the wireless environment. Foremost is the network security involved in the installation and usage of these wireless networks. This article deals with the existing standards and choices in wireless technologies that are available for implementation within a contemporary dental office. The network security protocols that protect the patient data and boost the efficiency of modern day dental clinics are enumerated.

  18. Physical Layer Built-In Security Analysis and Enhancement Algorithms for CDMA Systems

    Directory of Open Access Journals (Sweden)

    Li Tongtong

    2007-01-01

    Full Text Available Historically developed for secure communication and military use, CDMA has been identified as a major modulation and multiple-access technique for 3G systems and beyond. In addition to the wide bandwidth and low power-spectrum density which make CDMA signals robust to narrowband jamming and easy to be concealed within the noise floor, the physical layer built-in information privacy of CDMA system is provided by pseudorandom scrambling. In this paper, first, security weakness of the operational and proposed CDMA airlink interfaces is analyzed. Second, based on the advanced encryption standard (AES, we propose to enhance the physical layer built-in security of CDMA systems through secure scrambling. Performance analysis demonstrates that while providing significantly improved information privacy, CDMA systems with secure scrambling have comparable computational complexity and overall system performance with that of conventionally scrambled systems. Moreover, it is shown that by scrambling the training sequence and the message sequence separately with two independent scrambling sequences, both information privacy and system performance can be further improved. The proposed scheme can readily be applied to 3G systems and beyond.

  19. High Power Wireless Transfer : For Charging High Power Batteries

    OpenAIRE

    Gill, Himmat

    2017-01-01

    Wireless power transfer (WPT) is developing with emerging of new technologies that has made it possible to transfer electricity over certain distances without any physical contact, offering significant benefits to modern automation systems, medical applications, consumer electronic, and especially in electric vehicle systems. The goal of this study is to provide a brief review of existing compensation topologies for the loosely coupled transformer. The technique used to simulate a co...

  20. Wireless Power Transfer and Data Collection in Wireless Sensor Networks

    OpenAIRE

    Li, Kai; Ni, Wei; Duan, Lingjie; Abolhasan, Mehran; Niu, Jianwei

    2017-01-01

    In a rechargeable wireless sensor network, the data packets are generated by sensor nodes at a specific data rate, and transmitted to a base station. Moreover, the base station transfers power to the nodes by using Wireless Power Transfer (WPT) to extend their battery life. However, inadequately scheduling WPT and data collection causes some of the nodes to drain their battery and have their data buffer overflow, while the other nodes waste their harvested energy, which is more than they need...