A number of hospitals and medical centers are exploring applications of
WSN technology to a range of medical applications, including pre-hospital and
in-hospital emergency care, disaster response, and stroke patient rehabilitation.
WSNs have the potential to affect the delivery and study of resuscitative care
by allowing vital signs to be collected and integrated automatically into the
patient care record and used for real-time triage
Energy Consumption in chain based routing protocol in wireless sensor networkBADALKUMAR56
油
This document is a project report submitted for the degree of Bachelor of Technology in Computer Science and Engineering. It discusses measuring the power of a chain-based routing protocol called PEGASIS in wireless sensor networks. PEGASIS aims to increase network lifetime by forming chains among sensor nodes so that each node communicates only with a close neighbor, thereby reducing the amount of energy spent per round. The objectives are to decrease end-to-end delay, increase average energy consumption, and increase the number of alive nodes. The report presents the problem definition, objectives, proposed PEGASIS protocol, methodology using NS2 simulation, results showing improved performance, and conclusions.
Analysis of Electromagnetic Pollution Monitoring using Wireless Sensor NetworkIRJET Journal
油
1) The document discusses using a wireless sensor network to monitor electromagnetic pollution by measuring the power levels of different frequency bands. It analyzes techniques to increase the network's lifetime.
2) It proposes a new algorithm where active sensor nodes measure frequency power levels and report violations to a cluster head. It evaluates different cluster head selection methods and detection of failed sensor nodes.
3) The document finds that distributing sensor nodes in a 10x10 star pattern increases the network's lifetime by 77% compared to a homogeneous distribution. It concludes that properly selecting parameters like the watchdog frequency can significantly impact the network's performance.
This document summarizes security issues in wireless body area networks and possible solutions. It discusses how wireless body area networks integrate sensor nodes on or around the human body to monitor health parameters. Key challenges include low energy devices, security threats, and interference. Identity-based encryption is proposed to provide data confidentiality using bilinear pairings like Weil pairing and Tate pairing. Weil pairing requires more computation time than Tate pairing. Tate pairing also consumes less power, making it more suitable for low-energy sensor nodes. Performance analysis of the schemes can examine memory usage and runtime.
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET Journal
油
This document summarizes a research paper on node deployment strategies to improve coverage area in wireless sensor networks. It discusses how node deployment is a key design issue that affects network performance metrics like coverage, connectivity, lifetime and robustness. There are two main types of node deployment - manual and random. Manual deployment precisely positions nodes but is not feasible for large-scale networks. Random deployment using techniques like aerial dropping can achieve wide coverage but results may not be optimal. The paper then reviews several node deployment algorithms proposed in other research to optimize coverage through approaches like virtual force-based mobility and bee colony optimization algorithms. It concludes node deployment is important for wireless sensor network effectiveness.
The development of the wireless sensor networks (WSNs) in various applications like Defense, Health,
Environment monitoring, Industry etc. always attract many researchers in this field. WSN is the network
which consists of collection of tiny devices called sensor nodes. Sensor node typically combines wireless
radio transmitter-receiver and limited energy, restricted computational processing capacity and
communication band width. These sensor node sense some physical phenomenon using different
transduces. The current improvement in sensor technology has made possible WSNs that have wide and
varied applications. While selecting the right sensor for application a number of characteristics are
important. This paper provides the basics of WSNs including the node characteristics. It also throws light
on the different routing protocols.
Device-to-device (D2D) communications underlaying a cellular infrastructure has been proposed as a means of taking advantage of the physical proximity of communicating devices, increasing resource utilization, and improving cellular coverage. Relative to the traditional cellular methods, there is a need to design new peer discovery methods, physical layer procedures, and radio resource management algorithms that help realize the potential article we use the 3GPP Long Term Evolution system as a baseline for D2D design, review some of the key design challenges, and propose solution approaches that allow cellular devices and D2D pairs to share spectrum resources and thereby increase the spectrum and energy efficiency of traditional cellular networks. Sim- ulation results illustrate the viability of the proposed design.
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networkscscpconf
油
A cellular network is an asymmetric radio network which is made up of fixed transceivers or
nodes, maintain the signal while the mobile transceiver which is using the network is in the
vicinity of the node. An ad-hoc network is a local area network (LAN) that is built
spontaneously as devices connect.
Instead of relying on a base station to coordinate the flow of messages to each node in the
network, the individual network nodes forward packets to and from each other.
This paper focuses on various issues in cellular, adhoc and sensor network. As issues proves helpful for forthcoming research, this paper work as a backbone to elaborate the various research areas.
The seminar covered data security, privacy, and applications in emerging body area networks (BANs). Key topics included typical BAN applications in healthcare, research challenges around frequency bands and hardware, and models proposed for secure data storage and access control. Four models were described in detail: one based on redundant residue number systems, one using erasure coding, one using constant data motion, and one using attribute-based encryption to implement fine-grained access control of encrypted health data in BANs.
Gerd Keiser - Optical Fiber Communications-McGraw-Hill Education (2010).pdfArunKumar674066
油
This document provides an overview of the fourth edition of the textbook "Optical Fiber Communications" by Gerd Keiser. It discusses key topics covered in the book such as optical fiber structures and waveguiding, attenuation and dispersion, optical sources, photodetectors, digital and analog links, and optical networks. The book is published by McGraw-Hill and copyrighted in 2011. It is intended to provide comprehensive coverage of optical fiber communication systems and their components.
Roger Freeman - Telecommunication System Engineering.pdfPatrickMumba7
油
This document is the copyright page and table of contents for the book "Telecommunication System Engineering" by Roger L. Freeman. It describes that the book is in its fourth edition and covers topics related to telecommunication network design, including basic telephony, local networks, analog switching, signaling, transmission, long-distance networks, link design, digital transmission systems, and digital switching and networks. The copyright protects the content of the book and limits how it can be reproduced or used without permission.
This document provides an overview and table of contents for the book "RF Microelectronics" by Behzad Razavi. It describes the book as focusing on radio frequency integrated circuit design and analysis. The preface outlines the book's goal of explaining RF analysis techniques and their predictive design capabilities. The table of contents lists the book's 9 chapters which cover topics such as basic RF concepts, communication systems, transceiver architectures, low-noise amplifiers, mixers, passive components, oscillators, and phase-locked loops.
This document outlines a course about computer networks. It covers 9 major topics: introduction, the physical layer, data link layer, medium access layer, network layer, transport layer, application layer, network security, and conclusions. Each topic is further broken down into 3 or more subsections that will be taught as part of the course. The course aims to provide a comprehensive overview of computer network concepts and protocols.
This document provides an overview and summary of wireless fundamentals and history. It includes sections on wireless modems and their basic elements, how wireless communication works, different modulation techniques used, performance over distance, wireless networks and spectrum, industry standards, and proprietary technologies. The summary aims to explain at a high level the basics of wireless technology and its evolution over time.
Mehmet Yuce_ Jamil Y Khan - Wireless body area networks _ technology, impleme...rubini Rubini
油
This document provides an overview of a book on wireless body area networks (WBANs). It includes a title page with publication details and copyright information. The contents section lists 13 chapters that cover various topics related to WBAN technologies, applications, hardware, networking protocols, and signal processing. The document does not contain any substantive information beyond identifying the book's structure and expected coverage of WBAN-related subjects.
Computer_Networks_Tanenbaum_5th_edition Text BookDhairya Joshi
油
This document is the front matter and table of contents for the 5th edition of the textbook "Computer Networks" by Andrew S. Tanenbaum and David J. Wetherall. The table of contents provides an outline of the chapters in the book, which cover topics such as the physical layer, data link layer, network layer, transport layer, and example networks including the Internet, mobile networks, wireless LANs, and sensor networks. The front matter includes copyright information and dedications by the authors.
This document provides an overview of planning and optimization aspects for WCDMA (UMTS) network deployment. It covers topics such as network topology, WCDMA concepts, deployment options, the effects of vendor implementation, RF planning and optimization, capacity planning and optimization, initial parameter settings, service optimization, inter-system planning and optimization, and indoor coverage. The document is intended to help those involved in planning, deploying, and operating WCDMA networks to address challenges as usage and applications grow.
The document provides biographical information about Merrill Skolnik, the editor in chief of the Radar Handbook. It notes that Skolnik was the superintendent of the Radar Division at the U.S. Naval Research Laboratory for over 30 years and was involved in advances in radar at MIT Lincoln Laboratory, the Institute for Defense Analyses, and Electronic Communications, Inc. It also states that Skolnik authored the popular textbook Introduction to Radar Systems and was the editor of Radar Applications as well as a former editor of the Proceedings of the IEEE.
VSkills Basic Network Support Professional Certification holders have more than a working familiarity with networks, switchesthey are technically skilled to take advantage of the breadth of features efficiently and effectively.
Network support consists of day-to-day support of computer network and networking devices like hub, switches, etc. Certification covers basics of a computer network, networking media (wired and wireless), networking devices and configuration, management and troubleshooting of switches.
It is in great demand in IT infrastructure companies, data centers, MNCs, Corporates and Government organizations.
http://www.vskills.in/certification/Certified-Router-Support-Professional
This document analyzes the performance of WiMAX networks with the addition of relay stations. It begins with introductions to WiMAX and key features. The problem statement outlines limitations of limited base station infrastructure. The proposed solution discusses using relay stations as an alternative to address these limitations. Details are provided on relay station types and the network simulator tool. The document presents simulation results showing that relay stations improve throughput and reduce dropped packets over increasing distances and node numbers compared to networks without relay stations. It concludes with proposals for future work analyzing different bandwidth allocation techniques with relay stations.
This patent application describes methods and systems for evaluating quality of service in an IP telephony network using call forwarding. A test call is generated and forwarded between network devices to exchange a test signal. The quality of service of the network is then evaluated based on characteristics of the test signal.
This document provides an introduction to LTE, LTE-Advanced, SAE and 4G mobile communications. It discusses the architectural evolution from UMTS to LTE and the key drivers for this including increasing mobile data demand. The 3GPP specifications that define the LTE system architecture and protocols are also referenced.
HetNet's Race to Connect - NEDAS April 1, 2014 In-Building Wireless SummitIlissa Miller
油
This document summarizes a panel discussion on maximizing 4G networks until 5G is available. It discusses the challenges of increasing data consumption and network congestion. Near term solutions discussed include using more spectrum, increasing cell density through small cells and distributed antenna systems (DAS), offloading data to WiFi networks, and improving spectrum efficiency. The panel explores how these techniques can help alleviate current network constraints and enhance the mobile experience.
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNishanth Gandhidoss
油
This document describes a project report submitted for the degree of Bachelor of Technology in Information Technology. The report focuses on network intrusion detection and node recovery using dynamic path routing. It was submitted by three students - Nishanth G., Sudharshan N., and Surya Krishnan R. - to Sri Venkateswara College of Engineering in partial fulfillment of their degree requirements. The document includes sections on acknowledgements, abstract, contents, introduction, literature survey, system design, network topology, network intrusion detection and prevention, node recovery, source anonymity, dynamic path routing, results and discussions, and conclusions. It aims to address privacy and security issues in networks through techniques like encryption, evidence collection, risk assessment
This document provides an overview of connection admission control (CAC) techniques for orthogonal frequency-division multiple access (OFDMA)-based WiMAX networks. It analyzes the performance of two CAC policies - threshold-based and queue-aware - through developing queueing models and discrete-time Markov chains. The analysis captures key quality of service measures like blocking probability, throughput, and delay under different traffic loads. Numerical results demonstrate the queue-aware policy provides better performance than the threshold-based policy.
IRJET- Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLANIRJET Journal
油
This document discusses dynamic adaptation of the Distributed Coordinating Function (DCF) and Point Coordinating Function (PCF) modes of the IEEE 802.11 WLAN standard. It proposes three protocols to dynamically switch between the DCF and PCF modes based on changing traffic load and network size. One protocol is a Dynamic Switching Protocol that observes network traffic to determine when to switch modes. A second protocol, Priority Round Robin Scheduling, aims to reduce polling overhead in PCF by replacing simple round robin scheduling with priority-based scheduling. The document also discusses dynamically adapting configuration parameters in PCF and DCF based on varying network conditions.
Gerd Keiser - Optical Fiber Communications-McGraw-Hill Education (2010).pdfArunKumar674066
油
This document provides an overview of the fourth edition of the textbook "Optical Fiber Communications" by Gerd Keiser. It discusses key topics covered in the book such as optical fiber structures and waveguiding, attenuation and dispersion, optical sources, photodetectors, digital and analog links, and optical networks. The book is published by McGraw-Hill and copyrighted in 2011. It is intended to provide comprehensive coverage of optical fiber communication systems and their components.
Roger Freeman - Telecommunication System Engineering.pdfPatrickMumba7
油
This document is the copyright page and table of contents for the book "Telecommunication System Engineering" by Roger L. Freeman. It describes that the book is in its fourth edition and covers topics related to telecommunication network design, including basic telephony, local networks, analog switching, signaling, transmission, long-distance networks, link design, digital transmission systems, and digital switching and networks. The copyright protects the content of the book and limits how it can be reproduced or used without permission.
This document provides an overview and table of contents for the book "RF Microelectronics" by Behzad Razavi. It describes the book as focusing on radio frequency integrated circuit design and analysis. The preface outlines the book's goal of explaining RF analysis techniques and their predictive design capabilities. The table of contents lists the book's 9 chapters which cover topics such as basic RF concepts, communication systems, transceiver architectures, low-noise amplifiers, mixers, passive components, oscillators, and phase-locked loops.
This document outlines a course about computer networks. It covers 9 major topics: introduction, the physical layer, data link layer, medium access layer, network layer, transport layer, application layer, network security, and conclusions. Each topic is further broken down into 3 or more subsections that will be taught as part of the course. The course aims to provide a comprehensive overview of computer network concepts and protocols.
This document provides an overview and summary of wireless fundamentals and history. It includes sections on wireless modems and their basic elements, how wireless communication works, different modulation techniques used, performance over distance, wireless networks and spectrum, industry standards, and proprietary technologies. The summary aims to explain at a high level the basics of wireless technology and its evolution over time.
Mehmet Yuce_ Jamil Y Khan - Wireless body area networks _ technology, impleme...rubini Rubini
油
This document provides an overview of a book on wireless body area networks (WBANs). It includes a title page with publication details and copyright information. The contents section lists 13 chapters that cover various topics related to WBAN technologies, applications, hardware, networking protocols, and signal processing. The document does not contain any substantive information beyond identifying the book's structure and expected coverage of WBAN-related subjects.
Computer_Networks_Tanenbaum_5th_edition Text BookDhairya Joshi
油
This document is the front matter and table of contents for the 5th edition of the textbook "Computer Networks" by Andrew S. Tanenbaum and David J. Wetherall. The table of contents provides an outline of the chapters in the book, which cover topics such as the physical layer, data link layer, network layer, transport layer, and example networks including the Internet, mobile networks, wireless LANs, and sensor networks. The front matter includes copyright information and dedications by the authors.
This document provides an overview of planning and optimization aspects for WCDMA (UMTS) network deployment. It covers topics such as network topology, WCDMA concepts, deployment options, the effects of vendor implementation, RF planning and optimization, capacity planning and optimization, initial parameter settings, service optimization, inter-system planning and optimization, and indoor coverage. The document is intended to help those involved in planning, deploying, and operating WCDMA networks to address challenges as usage and applications grow.
The document provides biographical information about Merrill Skolnik, the editor in chief of the Radar Handbook. It notes that Skolnik was the superintendent of the Radar Division at the U.S. Naval Research Laboratory for over 30 years and was involved in advances in radar at MIT Lincoln Laboratory, the Institute for Defense Analyses, and Electronic Communications, Inc. It also states that Skolnik authored the popular textbook Introduction to Radar Systems and was the editor of Radar Applications as well as a former editor of the Proceedings of the IEEE.
VSkills Basic Network Support Professional Certification holders have more than a working familiarity with networks, switchesthey are technically skilled to take advantage of the breadth of features efficiently and effectively.
Network support consists of day-to-day support of computer network and networking devices like hub, switches, etc. Certification covers basics of a computer network, networking media (wired and wireless), networking devices and configuration, management and troubleshooting of switches.
It is in great demand in IT infrastructure companies, data centers, MNCs, Corporates and Government organizations.
http://www.vskills.in/certification/Certified-Router-Support-Professional
This document analyzes the performance of WiMAX networks with the addition of relay stations. It begins with introductions to WiMAX and key features. The problem statement outlines limitations of limited base station infrastructure. The proposed solution discusses using relay stations as an alternative to address these limitations. Details are provided on relay station types and the network simulator tool. The document presents simulation results showing that relay stations improve throughput and reduce dropped packets over increasing distances and node numbers compared to networks without relay stations. It concludes with proposals for future work analyzing different bandwidth allocation techniques with relay stations.
This patent application describes methods and systems for evaluating quality of service in an IP telephony network using call forwarding. A test call is generated and forwarded between network devices to exchange a test signal. The quality of service of the network is then evaluated based on characteristics of the test signal.
This document provides an introduction to LTE, LTE-Advanced, SAE and 4G mobile communications. It discusses the architectural evolution from UMTS to LTE and the key drivers for this including increasing mobile data demand. The 3GPP specifications that define the LTE system architecture and protocols are also referenced.
HetNet's Race to Connect - NEDAS April 1, 2014 In-Building Wireless SummitIlissa Miller
油
This document summarizes a panel discussion on maximizing 4G networks until 5G is available. It discusses the challenges of increasing data consumption and network congestion. Near term solutions discussed include using more spectrum, increasing cell density through small cells and distributed antenna systems (DAS), offloading data to WiFi networks, and improving spectrum efficiency. The panel explores how these techniques can help alleviate current network constraints and enhance the mobile experience.
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNishanth Gandhidoss
油
This document describes a project report submitted for the degree of Bachelor of Technology in Information Technology. The report focuses on network intrusion detection and node recovery using dynamic path routing. It was submitted by three students - Nishanth G., Sudharshan N., and Surya Krishnan R. - to Sri Venkateswara College of Engineering in partial fulfillment of their degree requirements. The document includes sections on acknowledgements, abstract, contents, introduction, literature survey, system design, network topology, network intrusion detection and prevention, node recovery, source anonymity, dynamic path routing, results and discussions, and conclusions. It aims to address privacy and security issues in networks through techniques like encryption, evidence collection, risk assessment
This document provides an overview of connection admission control (CAC) techniques for orthogonal frequency-division multiple access (OFDMA)-based WiMAX networks. It analyzes the performance of two CAC policies - threshold-based and queue-aware - through developing queueing models and discrete-time Markov chains. The analysis captures key quality of service measures like blocking probability, throughput, and delay under different traffic loads. Numerical results demonstrate the queue-aware policy provides better performance than the threshold-based policy.
IRJET- Dynamic Adaption of DCF and PCF Mode of IEEE 802.11 WLANIRJET Journal
油
This document discusses dynamic adaptation of the Distributed Coordinating Function (DCF) and Point Coordinating Function (PCF) modes of the IEEE 802.11 WLAN standard. It proposes three protocols to dynamically switch between the DCF and PCF modes based on changing traffic load and network size. One protocol is a Dynamic Switching Protocol that observes network traffic to determine when to switch modes. A second protocol, Priority Round Robin Scheduling, aims to reduce polling overhead in PCF by replacing simple round robin scheduling with priority-based scheduling. The document also discusses dynamically adapting configuration parameters in PCF and DCF based on varying network conditions.
How to Configure Recurring Revenue in Odoo 17 CRMCeline George
油
This slide will represent how to configure Recurring revenue. Recurring revenue are the income generated at a particular interval. Typically, the interval can be monthly, yearly, or we can customize the intervals for a product or service based on its subscription or contract.
Research Publication & Ethics contains a chapter on Intellectual Honesty and Research Integrity.
Different case studies of intellectual dishonesty and integrity were discussed.
Inventory Reporting in Odoo 17 - Odoo 17 Inventory AppCeline George
油
This slide will helps us to efficiently create detailed reports of different records defined in its modules, both analytical and quantitative, with Odoo 17 ERP.
One Click RFQ Cancellation in Odoo 18 - Odoo 際際滷sCeline George
油
In this slide, well discuss the one click RFQ Cancellation in odoo 18. One-Click RFQ Cancellation in Odoo 18 is a feature that allows users to quickly and easily cancel Request for Quotations (RFQs) with a single click.
Comprehensive Guide to Antibiotics & Beta-Lactam Antibiotics.pptxSamruddhi Khonde
油
Comprehensive Guide to Antibiotics & Beta-Lactam Antibiotics
Antibiotics have revolutionized medicine, playing a crucial role in combating bacterial infections. Among them, Beta-Lactam antibiotics remain the most widely used class due to their effectiveness against Gram-positive and Gram-negative bacteria. This guide provides a detailed overview of their history, classification, chemical structures, mode of action, resistance mechanisms, SAR, and clinical applications.
What Youll Learn in This Presentation
History & Evolution of Antibiotics
Cell Wall Structure of Gram-Positive & Gram-Negative Bacteria
Beta-Lactam Antibiotics: Classification & Subtypes
Penicillins, Cephalosporins, Carbapenems & Monobactams
Mode of Action (MOA) & Structure-Activity Relationship (SAR)
Beta-Lactamase Inhibitors & Resistance Mechanisms
Clinical Applications & Challenges.
Why You Should Check This Out?
Essential for pharmacy, medical & life sciences students.
Provides insights into antibiotic resistance & pharmaceutical trends.
Useful for healthcare professionals & researchers in drug discovery.
Swipe through & explore the world of antibiotics today!
Like, Share & Follow for more in-depth pharma insights!
Effective Product Variant Management in Odoo 18Celine George
油
In this slide well discuss on the effective product variant management in Odoo 18. Odoo concentrates on managing product variations and offers a distinct area for doing so. Product variants provide unique characteristics like size and color to single products, which can be managed at the product template level for all attributes and variants or at the variant level for individual variants.
How to Configure Deliver Content by Email in Odoo 18 SalesCeline George
油
In this slide, well discuss on how to configure proforma invoice in Odoo 18 Sales module. A proforma invoice is a preliminary invoice that serves as a commercial document issued by a seller to a buyer.
Unit 1 Computer Hardware for Educational Computing.pptxRomaSmart1
油
Computers have revolutionized various sectors, including education, by enhancing learning experiences and making information more accessible. This presentation, "Computer Hardware for Educational Computing," introduces the fundamental aspects of computers, including their definition, characteristics, classification, and significance in the educational domain. Understanding these concepts helps educators and students leverage technology for more effective learning.
1. AUERBACH PUBLICATIONS
A CRC Press Company
Boca Raton London New York Washington, D.C.
Wireless
Sensor
Networks
Edgar H. Callaway, Jr.
Architectures
and
Protocols
2. This book contains information obtained from authentic and highly regarded sources. Reprinted material
is quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable
efforts have been made to publish reliable data and information, but the author and the publisher cannot
assume responsibility for the validity of all materials or for the consequences of their use.
Neither this book nor any part may be reproduced or transmitted in any form or by any means, electronic
or mechanical, including photocopying, micro鍖lming, and recording, or by any information storage or
retrieval system, without prior permission in writing from the publisher.
The consent of CRC Press LLC does not extend to copying for general distribution, for promotion, for
creating new works, or for resale. Speci鍖c permission must be obtained in writing from CRC Press LLC
for such copying.
Direct all inquiries to CRC Press LLC, 2000 N.W. Corporate Blvd., Boca Raton, Florida 33431.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are
used only for identi鍖cation and explanation, without intent to infringe.
Visit the Auerbach PublicationsWeb site at www.auerbach-publications.com
息 2004 by CRC Press LLC
Auerbach is an imprint of CRC Press LLC
No claim to original U.S. Government works
International Standard Book Number 0-8493-1823-8
Library of Congress Card Number 2003051886
Printed in the United States of America 1 2 3 4 5 6 7 8 9 0
Printed on acid-free paper
Library of Congress Cataloging-in-Publication Data
Callaway, Edgar H.
Wireless sensor networks : architectures and protocols / Edgar H. Callaway.
p. cm.
Includes bibliographical references and index.
ISBN 0-8493-1823-8 (alk. paper)
1. Sensor networks. 2. Wireless LANs. I. Title.
Tk7872.D48C35 2003
004.6蔵8dc21 2003051886
AU1823_C00.fm Page iv Monday, July 28, 2003 10:24 AM
息2004 CRC Press LLC
4. About the Author
Edgar H. Callaway Jr. received a B.S. in mathematics and an M.S.E.E. from
the University of Florida, Gainesville in 1979 and 1983, respectively; an
M.B.A. from Nova (now Nova-Southeastern) University, Davie, Florida, in
1987; and a Ph.D. in Computer Engineering from Florida Atlantic University,
Boca Raton, in 2002.
Dr. Callaway joined the Land Mobile Division of Motorola in 1984 as an
RF engineer working on 800-MHz and (later) 900-MHz trunked radio prod-
ucts. In 1990, he transferred to Motorolas Paging Products Group, Boynton
Beach, where he designed paging receivers for the Japanese market.
From 1992 to 2000, Dr. Callaway was engaged in paging receiver and
transceiver system design and was the lead receiver designer of Motorolas
paging platform. In 2000, he joined Motorola Labs, Plantation, Florida,
where his interests include the design of low-power wireless networks. He
is a Registered Professional Engineer (Florida). He has published several
papers and has had more 20 U.S. patents issued.
AU1823_C55.fm Page 325 Monday, July 14, 2003 8:44 AM
息2004 CRC Press LLC
5. Contents
Chapter 1 Introduction to Wireless Sensor Networks
1.1 Applications and Motivation
1.1.1 Industrial Control and Monitoring
1.1.2 Home Automation and Consumer Electronics
1.1.3 Security and Military Sensing
1.1.4 Asset Tracking and Supply Chain Management
1.1.5 Intelligent Agriculture and Environmental Sensing
1.1.6 Health Monitoring
1.2 Network Performance Objectives
1.2.1 Low Power Consumption
1.2.2 Low Cost
1.2.3 Worldwide Availability
1.2.4 Network Type
1.2.5 Security
1.2.6 Data Throughput
1.2.7 Message Latency
1.2.8 Mobility
1.3 Contributions of this Book
1.4 Organization of this Book
References
Chapter 2 The Development of Wireless Sensor Networks
2.1 Early Wireless Networks
2.2 Wireless Data Networks
2.2.1 The ALOHA System
2.2.2 The PRNET System
2.2.3 Amateur Packet Radio Networks
2.2.4 Wireless Local Area Networks (WLANs)
2.2.5 Wireless Personal Area Networks (WPANs)
2.3 Wireless Sensor and Related Networks
2.3.1 WINS
AU1823_C00.fm Page vii Monday, July 28, 2003 10:24 AM
息2004 CRC Press LLC
6. 2.3.2 PicoRadio
2.3.3 mAMPS
2.3.4 Terminodes, MANET, and Other Mobile Ad Hoc
Networks
2.3.5 Underwater Acoustic and Deep Space Networks
2.4 Conclusion
References
Chapter 3 The Physical Layer
3.1 Introduction
3.2 Some Physical Layer Examples
3.2.1 Bluetooth
3.2.2 IEEE 802.11b
3.2.3 Wireless Sensor Networks
3.2.3.1 PicoRadio
3.2.3.2 WINS
3.2.3.3 mAMPS
3.3 A Practical Physical Layer For Wireless Sensor Networks
3.3.1 Cost
3.3.2 Power
3.3.2.1 Power Source
3.3.2.2 Power Consumption
3.4 Simulations and Results
3.4.1 Simulations
3.4.2 Results
3.5 Conclusion
References
Chapter 4 The Data Link Layer
4.1 Introduction
4.2 Medium Access Control Techniques
4.2.1 ALOHA
4.2.2 Carrier Sense Multiple Access (CSMA)
4.2.3 Polling
4.2.4 Access Techniques in Wireless Sensor Networks
4.2.4.1 WINS
4.2.4.2 PicoRadio
4.2.4.3 Others
4.3 The Mediation Device (MD)
4.3.1 The MD Protocol
4.3.2 The Distributed MD Protocol
4.3.3 Emergency Mode
4.3.4 Channel Access
4.4 System Analysis and Simulation
4.4.1 Duty Cycle
AU1823_C00.fm Page viii Monday, July 28, 2003 10:24 AM
息2004 CRC Press LLC
7. 4.4.2 Latency
4.5 Conclusion
References
Chapter 5 The Network Layer
5.1 Introduction
5.2 Some Network Design Examples
5.2.1 Structure
5.2.2 Routing
5.3 A Wireless Sensor Network Design Employing a Cluster
Tree Architecture
5.3.1 Network Design
5.3.2 Network Association
5.3.3 Network Maintenance
5.3.4 Routing
5.4 Simulations
5.5 Results
5.5.1 Throughput (Cumulative Percentage of Messages
Arriving at the DD versus Time)
5.5.2 Throughput (Cumulative Percentage of Messages
Arriving at the DD versus Node Level)
5.5.3 Average Message Transmission Time
5.5.4 Average Message Latency versus Node Level
5.5.5 Packet Collisions versus Time
5.5.6 Duty Cycle
5.5.7 Duty Cycle versus Level
5.5.8 Message Latency versus MD Period
5.5.9 Maximum Network Throughput versus MD Period
5.5.10 Maximum Network Throughput versus Node Density
5.6 Conclusion
References
Chapter 6 Practical Implementation Issues
6.1 Introduction
6.2 The Partitioning Decision
6.3 Transducer Interfaces
6.3.1 Integrated Sensors
6.3.2 The External Interface
6.4 Time Base Accuracy and Average Power Consumption
6.5 Conclusion
References
Chapter 7 Power Management
7.1 Introduction
7.2 Power Sources
AU1823_C00.fm Page ix Monday, July 28, 2003 10:24 AM
息2004 CRC Press LLC
8. 7.2.1 Mains
7.2.2 Batteries
7.2.2.1 Lifetime
7.2.2.2 Low Battery Detection
7.2.2.3 Low Battery Alarm
7.2.2.4 Choice of Cell Chemistry
7.2.3 Energy Scavenging
7.2.3.1 Photovoltaic Cells
7.2.3.2 Mechanical Vibration
7.2.3.3 Other Scavengable Energy Sources
7.3 Loads
7.3.1 Power Consumption of Analog Circuits
7.3.2 Power Consumption of Digital Logic
7.3.3 Power Consumption of Other Loads
7.4 Voltage Converters and Regulators
7.4.1 Types of Voltage Converters
7.4.2 Voltage Conversion Strategy
7.5 Power Management Strategy
7.6 Conclusion
References
Chapter 8 Antennas and the De鍖nition of RF Performance
8.1 Introduction
8.2 Antennas
8.2.1 Antenna Characteristics
8.2.2 Ef鍖ciency and Antenna Placement
8.2.3 Bandwidth
8.2.4 Antenna Design Choices
8.3 RF Performance De鍖nition and Measurement
8.3.1 De鍖nition and Measurement
8.3.2 Production Issues
8.4 Conclusion
References
Chapter 9 Electromagnetic Compatibility
9.1 Introduction
9.2 EMC: The Problem
9.3 Examples of Self-Interference
9.4 The Physics Associated with EMC Problems
9.4.1 The Wideband Spectral View
9.4.2 The Narrowband Spectral View
9.4.3 Victim Circuits in Receivers
9.4.3.1 The Zero-IF Receiver
9.4.3.2 The Low-IF Receiver
9.4.3.3 The Superheterodyne Receiver
AU1823_C00.fm Page x Monday, July 28, 2003 10:24 AM
息2004 CRC Press LLC
9. 9.4.4 Scope of the Problem
9.4.4.1 Digital-RF Isolation Needed
9.4.5 Coupling Mechanisms
9.4.5.1 Radiated Coupling
9.4.5.2 Conducted Coupling
9.4.6 Avoiding Coupling Problems
9.4.6.1 System Level
9.4.6.2 Integrated Circuit Level
9.4.6.3 Circuit Board Level
9.5 Principles of Proper Layout
9.5.1 There is No Ground
9.5.2 There is Only Return Current
9.6 The Layout Process
9.6.1 Things to Look for After the Schematics Are Done
but Before the Layouts Are Started
9.6.1.1 High-Frequency Voltages and Currents
9.6.1.2 Antenna Placement
9.6.1.3 Power Source Placement
9.6.1.4 Sensor Placement
9.6.1.5 Placement of Oscillators
9.6.1.6 RF Filters, Low-Noise Ampli鍖ers (LNAs), and Power
Ampli鍖ers
9.6.2 EMC-Aware Layout Procedure
9.7 Detective/Corrective Techniques
9.7.1 The Hole in the Bucket Principle
9.7.2 Substitution
9.7.3 Software to Control Speci鍖c MCU Functions
9.7.4 Physical Separation
9.7.5 The Fallacy of Shields
9.7.6 Get to Know the IC Designer
9.7.7 Simulation
9.8 Conclusion
References
Chapter 10 Electrostatic Discharge
10.1 Introduction
10.2 The Problem
10.2.1 Examples
10.2.2 Failure Modes
10.3 Physical Properties of the Electrostatic Discharge
10.3.1 The Triboelectric Effect
10.3.2 Air Breakdown
10.3.3 Charge Redistribution
10.4 The Effects of ESD on ICs
10.5 Modeling and Test Standards
AU1823_C00.fm Page xi Monday, July 28, 2003 10:24 AM
息2004 CRC Press LLC
10. 10.5.1 The Double Exponential Pulse
10.5.2 Human Body, Machine, and Charged Device Models
10.5.3 Detailed Requirements of an ESD Standard
10.5.4 Performance Standards
10.6 Product Design to Minimize ESD Problems
10.6.1 Prevent Discharges from Entering or Exiting
the Housing
10.6.1.1 Avoid Holes in the Housing
10.6.1.2 Locate Circuit Boards and the Metal on Them
Away from Housing Holes
10.6.1.3 Eliminate Metal Points and Burrs
10.6.2 Once Inside, Design Paths for the Discharge to Travel
10.6.3 Reaching the Integrated Circuit
10.6.4 Once an ESD Event Occurs, Limit Discernable Effects
10.7 Conclusion
References
Chapter 11 Wireless Sensor Network Standards
11.1 Introduction
11.2 The IEEE 802.15.4 Low-Rate WPAN Standard
11.3 The ZigBee Alliance
11.4 The IEEE 1451.5 Wireless Smart Transducer
Interface Standard
References
Chapter 12 Summary and Opportunities for Future Development
12.1 Summary
12.2 Opportunities for Future Development
References
Appendix A Signal Processing Worksystem (SPW)
Appendix B WinneuRFon
B.1 Introduction
B.2 Motivation
B.3 System Requirements
B.4 Supported Features
B.5 Current Status and Achievement
B.6 Simulation Method and More Potential Functionalities
B.7 Proposal for Future Work
B.8 Summary
Appendix C An Example Wireless Sensor Network
Transceiver Integrated Circuit (IC)
AU1823_C00.fm Page xii Monday, July 28, 2003 10:24 AM
息2004 CRC Press LLC
11. Acknowledgments
This book is an extension of my dissertation,1 completed at Florida Atlantic
University (Boca Raton) in 2002 under the guidance of Dr. Ravi Shankar. If,
as Newton said, a body remains at rest until acted upon by an external
force, his was the force that moved me to return to school and complete
my education; and for that, I am grateful. I also thank the other members of
my committee, Dr. Valentine Aalo, Dr. Raymond Barrett, Dr. Borko Furht, Dr.
Sam Hsu, and Dr. Fred Martin, for consenting to serve on the committee
and for their constructive criticism of my work.
Much of the research for this book was done while I was employed at the
Florida Communication Research Laboratory, Plantation, a division of
Motorola Labs. I am indebted to the laboratory directors, Dr. Larry Dwor-
sky and Dr. Chip Shanley, and my immediate superior, Dr. Bob ODea, for
their support, which went far beyond corporate standard operating proce-
dure. I also bene鍖ted from many useful technical discussions with my co-
workers, including Anthony Allen, Monique Bourgeois, Priscilla Chen, Dr.
Neiyer Correal, Dr. Lance Hester, Dr. Jian Huang, Dr. Yan Huang, Masahiro
Maeda, Qicai Shi, Bob Stengel, and especially Paul Gorday, Sumit Talwalkar,
and David Taubenheim for their consultations on the Signal Processing
Worksystem (SPW).
I thank Gary Pace of Motorolas Semiconductor Products Sector,
Boynton Beach, Florida, for the differential ampli鍖er circuit discussed in
Chapter 7, and for inculcating in me the value of low-voltage, low-power
design. In addition to many of the aforementioned individuals, Dan
Brueske, Barbara Doutre, Dr. Antonio Faraone, Latonia Gordon, and Dr.
Kai Siwiak reviewed various early drafts of this book; any remaining
errors of omission or commission, however, are mine.
Special thanks are due to Joan Lange, Kim Searer, and Martha Mitchell,
corporate librarians who went to extraordinary efforts to track down
obscure references for me on short notice.
AU1823_C00.fm Page xv Monday, July 28, 2003 10:24 AM
息2004 CRC Press LLC
12. Acknowledgments
My parents, Pat and Ed, deserve special thanks for emphasizing the
value of education to a young man more often interested in other things. I
also recognize my greatest debt of gratitude: to my wife, Jan. Without her
support and understanding, this book would not have been possible.
Edgar H. Callaway, Jr.
Note
1. Edgar H. Callaway, Jr., A Communication Protocol for Wireless Sensor Networks, Ph.D.
dissertation, Florida Atlantic University, Boca Raton, FL, August 2002.
AU1823_C00.fm Page xvi Monday, July 28, 2003 10:24 AM
息2004 CRC Press LLC