Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Advantages and disadvantages of wireless sensors
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Advantages and disadvantages of wireless sensors
Introduction
Background
A wireless sensor network (WSN) consists of distributed sensors to monitor environmental conditions such as temperature, sound, vibration, pressure, motion or detect dimensions, to pass their data through the network to a base station for processing. Advantages of WSN over a wired system considered in elimination of wiring cost, sensors can be installed in harsh environments. Each sensor node is a combination of Radio transceiver with an internal antenna or connection to an external antenna micro-controller, electronic circuit for interfacing with the sensors, energy source, usually a battery or an embedded form of energy harvesting. Drawback of using sensors is having limited power to consume, a memory that is capable of performing limited computations, in addition to probability of communication failures between nodes.
Motivation
Sensor-based networks basically are characterized by their continuous mode of operation and power sources, which increases the fault rates in sensors, knowing that maintenance or replacement of sensors is considered expensive.
Fault tolerant techniques are based on time redundancy or space redundancy or combination of both. As mentioned previously, a sensor has a limited computation power, so time redundancy techniques are not supposed to be of beneficial. Traditional techniques in backing up sensors are based on double and triple redundancy, which doesn’t satisfy the requirement of having a reliable network with a minimum number of sensors.
This work aims to design an algorithm that finds the minimum number of detection sensors needed in a network for a certain application. Plus, obtaining the minimum number of sensors needed to back up the core sensors.
Assumption...
... middle of paper ...
...67% 33% 55.7
H2 67% 67% 67% 67
H4 100% 67% 33% 66.7
H5 67% 100% 33% 66.7
H6 67% 67% 67% 67
W2 67% 67% 67% 67
C3 100% 100% 33% 77.7
Conclusion:
The solution presented in the following paper provides an optimal and minimal sensor allocation methodology. The first step is to find a minimal cost sensor subset that would be able to uniquely identify the objects by choosing sensor from different parameters depending on the effectiveness cost of the sensor. To provide a fault tolerant solution an extra-unrepeated sensor is added. The extra sensor is not simply a duplicated sensor to avoid failures of the sensor due to the environmental failure or failure in the location. The results analyzed in this paper are for a simple system. Overhead of 33% resulted upto 67% fault tolerance.
Works Cited
Fault Tolerance Techniques for Wireless Ad Hoc Sensor Networks
Troubleshooting media problems on a bus networks can be very tedious, since a break in the backbone will bring down the entire LAN. For this reason, bus topology is not considered one of the more robust network topologies, compared with star or mesh. A loose or missing terminating resistor can also bring down a LAN.
...ial approaches which are Normal Accident and HROs, although it seems certain that both of them tends to limit the progression that can contribute toward achieving to highly protective systems. This is because the scope of the problems is too narrow and the potential of the solutions is too limited as well. Hence, Laporte and Consolini et.al., (1991) as cited in Marais, et.al., (2004) conclude that the most interesting feature of the high reliability organization is to prioritize both performance and security by the managerial oversight. In addition, the goal agreement must be an official announcement. In essence, it is recommended that there is a continuing need in the high risk organizations for more awareness of developing security system and high reliability environment in order to gain highly successful method to lower risk in an advance technology system.
The second layer of the OSI model is the data link layer. This is the layer that transports the data between network nodes in a wide area network (WAN) or on the same local area network (LAN) between nodes. The data link layer makes available the procedural and functional means to move data between network devices and could provide the measures to find and possibly correct errors that may occur in the physical layer. The security vulnerabi...
The rapid progress of embedded MEMS (micro-sensing technologies) and wireless communication has made wireless sensor networks possible. Such an environment may have many wireless nodes which are inexpensive; each node is capable of collecting, storing and processing environmental data, and communicating with neighboring nodes. These sensors are connected with wires in the past but tod...
Five different pieces of hardware will be subjected to the algorithms and tested five different times to validate if the prognostics are working. The prognostic-algorithms of years past are not intelligent enough to decipher large amounts of data. Van Bree, Veltman, Hendrix, and Van Den Bosch (2009) stated that rather than passively reacting to prognostic issues with limited fault-tolerances, the capabilities of a system should predict failures actively. The system should be able to reconfigure and control actions so that stability and acceptable performance of the entire system can be maintained (Van Bree et al., 2009). This research was intended to better understand the aspects of prognostics in the electronics world. This abridged literature review focuses on three key topics, which helped form and inspire the crux of the research questions: successful implementation of prognostics, time-to-market concerns, and technical risk.
...mpany up and running through any kind of interruptions such as power failures, IT system crashes, natural or man-made disasters, supply chain/vendor problems and more.
Large amounts of data streams are generated in resource-constrained environments. Sensor networks represent a typical example. These devices have short life batteries. The design of techniques that are energy efficient is a crucial issue given that sending all the generated stream to a central site is energy inefficient in addition to its lack of scalability problem.
Technology has become more important in this millennium era, as it has become a need for almost every people in the world. With the development of technology, the statistics of criminalization had also increases as there are many new methods to do their crime by misusing the technology that was invented to help people. Various technology inventions had been made to overcome this problem. One of them is a surveillance method that was invented to keep an eye on the criminal, be it an intruder, a robber or a theft. The objective of this project is to come up with a more advanced surveillance system than the previous one, can respond quickly (faster), have the ability to integrate different party, which is the owner, the security, and the police, and can inform the police and the user quickly by using SMS, MMS and email. Our project also aims to develop a system that offers more support than the previous system and have the ability to monitor and track multi-target criminal, whether it is in a fixed property (house) or moving property (car).
To overcome the drawback of those technologies a new vehicle recognition system was designed which was consists of three main parts, Radio frequency identification (RFID) read write device, RFID card which is allocated to the authorized vehicles and a control centre. When RFID card comes under the electromagnetic field of RFID read write device it reads RFID card and send the information to control centre. Based on the information from RFID read write device control centre take appropriate steps to control the barrier movement. The drawback of this system is that RFID has very short detection
Cyber-Physical Systems are systems with tight interaction between the physical components and the computational resources. The way we influence and get influenced by Physical world is set to change with advent of Cyber-Physical Systems (CPS) [1]. These systems are made up of closely coupled actuation, processing and communication components. The impact of Cyber-Physical Systems on humans may be compared to impact of Internet. Internet accelerated the flow of information and built a whole new industry for itself. Whereas CPS could change every known industry is numerous ways than Internet. They have the capability to make IT revolution a small one. Trends assisting development of CPS are highly capable and more economic sensors, actuators, powerful and compact processing, network penetration and revolution in wireless communication systems. They would be pervasively present from something as small as a sensor sensing the electrical charge in a chip to radars tracking the storms, and system monitoring and maintaining the heath of Electric Grids at national level.
Hence this system allows to design control systems with a high safety level as well as a big increase in maintainability. Any failure can be detected by the control system and the installation will be always in a safe state. When the system allows to identify its own failures, the corrective maintenance tasks are simplified, so the maintainability and the plant availability increase.
Mesh networks are reliable, stable, and redundant. If a node can no longer operate, all the others are not affected as they can still communicate either directly or through one or more intermediate nodes. Mesh networks can be very expensive due to the large amount of cable and connections required.
The perception layer includes a group of Internet-enabled devices that are able to perceive, detect objects, gather information, and exchange information with other devices through the Internet communication networks. Radio Frequency Identification Devices (RFID), cameras, sensors, Global Positioning Systems (GPS) are some examples of perception layer devices. Forwarding data from the perception layer to the application layer under the constraints of devices’ capabilities, network limitation and the applications’ constraints is the task of the network layer. IOT systems use a combination of short-range networks communication
De Poorter, E., Troubleyn, E., Moerman, I., & Demeester, P. (2011). IDRA: A flexible system architecture for next generation wireless sensor networks. Wireless Networks, 17(6), 1423-1440. doi:http://dx.doi.org/10.1007/s11276-011-0356-5
In today’s technologically advanced environment, computers are everywhere. Electronic devices are in incorporated into our lives from the mirrors in our bathroom to the smart phones in our pockets and everything in between. The vision of Andrews, Inc is “To be the manufacturer’s choice for sensors, powering the things of everyday life.” Our goal is to build sensors which are adequate, affordable and accessible to the business customers building the products of today. The Andrews business customer is looking for sensors which will get the job done. Put another way, they are need a basic sensor designed to meet their product needs. Our customers are looking for ways to increase their contribution margins and maintain a reasonable price point for their consumers. Lastly, these business customers need the product to meet their production schedule. It is essential to be a key supplies contributing to the customers value chain activities.