0% found this document useful (0 votes)
38 views

Yakubu Labarans' Project

IMPACT OF WIRELESS SENSORS BASED SYSTEM FOR HOME ENERGY CONSUMPTION

Uploaded by

Aaron Kure
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views

Yakubu Labarans' Project

IMPACT OF WIRELESS SENSORS BASED SYSTEM FOR HOME ENERGY CONSUMPTION

Uploaded by

Aaron Kure
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 45

CHAPTER ONE

1.0 BACKGROUND OF THE STUDY:

Wireless networks have significantly impacted the world, since their initial
deployment. Wireless networks have continued to develop and their uses have
significantly grown. Cellular phones are nowadays part of huge wireless network
systems and people use mobile phones on a daily basis in order to communicate
with each other and exchange information. Recently, wireless networks have been
used for positioning as well in order to enable the provision of location oriented
services to the end-user. Different types of measurements available during standard
network and terminal operation, mainly for resource management and
synchronization purposes, can be employed to derive the user’s location. With
these numerous uses of wireless network, this project will focus on resources
sharing dedicated network. A professor at the University of Hawaii, Norman
Abramson developed the world’s first wireless computer communication network,
ALOHAnet (operational in 1971), using low-cost ham-like radios. The system
included seven computers deployed over four islands to communicate with the
central computer on the Oahu Island without using phone lines. WLAN hardware
initially cost so much that it was only used as an alternative to cabled LAN in
places where cabling was difficult or impossible. Early development included
industry-specific solutions and proprietary protocols, but at the end of the 1990s
these were replaced by standards, primarily the various versions of IEEE 802.11
(in products using the Wi-Fi brand name). An alternative ATM-like 5 GHz
standardized technology, HiperLAN/2, has so far not succeeded in the market, and
with the release of the faster 54 Mbit/s 802.11a (5 GHz) and 802.11g (2.4 GHz)
standards, it is even more unlikely that it will ever succeed. In 2009 802.11n was
added to 802.11. It operates in both the 2.4 GHz and 5 GHz bands at a maximum
data transfer rate of 600 Mbit/s.

1
Most new routers are able to utilize both wireless bands, known as dualband.
This allows data communications to avoid the crowded 2.4 GHz band, which is
also shared with Bluetooth devices and microwave ovens. The 5 GHz band is also
wider than the 2.4 GHz band, with more channels, which permits a greater number
of devices to share the space. Not all channels are available in all regions.

A wireless local area network (WLAN) links two or more devices using some
wireless distribution method (typically spread-spectrum or OFDM radio), and
usually providing a connection through an access point to the wider Internet. This
gives users the ability to move around within a local coverage area and still be
connected to the network. Most modern WLANs are based on IEEE 802.11
standards, marketed under the Wi-Fi brand name.

1.1 STATEMENT OF PROBLEM

Lack of availability of wireless network has made most of us accustomed to the


limitations that come with a wired network. Especially when we want to check our
email or print a report we find ourselves confined to a certain location or cramped
space.

1.2 AIMS OF THE STUDY

The aim of this project is to design a distributed application to improve search


efficiency in unstructured wireless network using NS-2 simulator.

1.3 OBJECTIVES OF THE STUDY

- To design a distributed application in unstructured wireless network using


NS-2 simulator

2
- To take an advantage of based random walk algorithm in going distributed
search application for avoiding number of transmissions.
- To calculate time taken to cover the entire network after initiation of a
search from a randomly selected initial node in designed network

1.4 SCOPE OF STUDY


WSN is one of the demanding needs in today’s time due to its ubiquitous nature. In
the near future, WSNs can be deployed as underwater acoustic sensor systems,
cognitive sensing and spectrum management, and security and privacy
management.

1.5 SIGNIFICANT OF STUDY


Wireless sensor networks (WSNs), as distributed networks of sensors with the
capacity to detect, process and communicate have been progressively utilized in
different fields including designing, health and environment. This study is
answerable to four significant assignments; information collection, sending and
getting information and in network information handling.

1.6 LIMITATIONS

- Security: WSNs are vulnerable to various types of attacks, such as eavesdropping


jamming, and spoofing. Ensuring the security of the network and the data it
collects is a major challenge.

- Interference: WSNs are often deployed in environments where there is a lot of


interference from other wireless devices.

3
1.7 TERMINOLOGIES

- ROUTER
A router is a piece of hardware or software that receives, filters, and sends data
packets across networks. A router is connected to at least two networks, commonly
LANs (Local Area Networks) or WANs (Wide Area Network).
-PROTOCOL:
These are set of rules outlining how connected devices communication across a
network to exchange information easily and safely.

-DUALBAND:

These are routers which are capable of transmitting and receiving data using both
2.4 GHz and 5GHz frequencies either simultaneously or one at a time.
Dual band also incorporate multiple-In Multiple-Out radio configurations. The
combination of several radios on one band with dual-band support provides higher
performance for home networking than single-band routers offers.

-RADIO MODEMS:

These are modems that transfer data wirelessly across a range of up to tens of
kilometers. Radio modems encode, transmit, receive and decode serial data using
radio waves. They connect to serial ports on devices such as video cameras and
data acquisition systems, and send signals to receive signals from other radio
modems
1.6.5 NETWORK SWITCH:

This is a computer networking device that connects devices together on a computer


network, by using a form of packet switching to forward data to the destination
device. A network switch is considered more advanced than a (repeater) hub
4
because a switch will only forward a message to one or multiple devices that need
to receive it, rather than broadcasting the same message out of each of its ports.

1.6.6 HUB

It is a node or physical layer networking device for connecting multiple Ethernet


devices together and making them act as a single network segment. It has multiple
input/output (I/O) ports, in which a signal introduced at the input of any port
appears at the output of every port except the original incoming.

1.6.7 NETWORK BRIDGE:

A network bridge is a computer networking device that creates a single, aggregate


network from multiple communication networks or network segments. This
function is called network bridging. (Changjin March 3, 2011)

1.6.8 NETWORK ANTENNA:

It is an electrical device which converts electric currents into radio waves, and vice
versa. It is usually used with a radio transmitter or radio receiver. In transmission, a
radio transmitter supplies an electric current oscillating at radio frequency (i.e. high
frequency AC) to the antenna's terminals, and the antenna radiates the energy from
the current as electromagnetic waves (radio waves). In reception, an antenna
intercepts some of the power of an electromagnetic wave in order to produce a tiny
voltage at its terminals that is applied to a receiver to be amplified. An antenna can
be used for both transmitting and receiving.

5
CHAPTER TWO

LITERATURE REVIEW

2.0 OVERVIEW

This chapter will be focus on what improvement wireless LAN has undergo so far
but it can be interchange for what improvement wireless router (IEEE 802.11)
specification has undergo. IEEE was the institutional body that given standards set
and protocols. Wireless Local Area Network (WLAN), also known as IEEE
802.11, is a set of standards that enable over-the-air communication in medium
range distances (approximately 30-150 m).

2.1 IEEE 802.11a STANDARD and SPECIFICATION.

Release Date: Oct-99

Op. Frequency: 5 GHz

Throughput (typ.): 27 Mbit/s

Net Bit Rate (max.): 54 Mbit/s

Gross Bit Rate (max.): 72 Mbit/s

Max Indoor Range: ~50 ft/15 meters

Max Outdoor Range: ~100 ft/30 meters

6
The 802.11a standard uses the same data link layer protocol and frame format as
the original standard, but uses OFDM as modulation skin. It operates in the 5 GHz
band with a maximum data rate of 54 Mbps. Achievable throughputs in the mid-20
Mbps. Since the 2.4 GHz band is heavily used to the point of being crowded, using
the relatively un-used 5 GHz band gives 802.11a a significant advantage.
However, this high carrier frequency also brings a disadvantage: the effective
overall range of 802.11a is less than that of 802.11b/g. In theory, 802.11a signals
are absorbed more readily by walls and other solid objects in their path due to their
smaller wavelength and, as a result, cannot penetrate as far as those of 802.11b. In
practice, 802.11b typically has a higher range at low speeds (802.11b will reduce
speed to 5 Mbps or even 1 Mbps at low signal strengths). However, at higher
speeds, 802.11a often has the same or greater range due to less interference.

2.2 IEEE 802.11b STANDARD and SPECIFICATION.

Release Date: October 1999

Op. Frequency: 2.4 GHz

Throughput (typ.): ~5 Mbit/s

Net Bit Rate (max.): 11 Mbit/s

Gross Bit Rate (max.): Mbit/s

Max Indoor Range: ~150 feet/45 meters

Max Outdoor Range: ~300 feet/90 meters

7
802.11b has a maximum raw data rate of 11 Mbps and uses the same media access
method defined in the original standard. 802.11b products appeared on the market
in early 2000, since 802.11b is a direct extension of the modulation technique
defined in the original standard. The dramatic increase in throughput of 802.11b
(compared to the original standard) along with simultaneous substantial price
reductions led to the rapid acceptance of 802.11b as the definitive wireless LAN
technology. 802.11b devices suffer interference from other products operating in
the 2.4 GHz band. Devices operating in the 2.4 GHz range include: microwave
ovens, Bluetooth devices, baby monitors and cordless telephones.

2.3 IEEE 802.11e5 STANDARD and SPECIFICATION.

IEEE 802.11e-2005 or 802.11e is an approved amendment to the IEEE 802.11


standard that defines a set of Quality of Service enhancements for wireless LAN
applications through modifications to the Media Access Control (MAC) layer. The
standard is considered of critical importance for delay-sensitive applications, such
as Voice over Wireless IP and Streaming Multimedia

2.4 IEEE 802.11g STANDARDS and SPECIFICATION.

Release Date: June 2003

Op. Frequency: 2.4 GHz

Throughput (typ.): ~22 Mbit/s

Net Bit Rate (max.): 54 Mbit/s

Gross Bit Rate (max.): 128 Mbit/s

8
Max Indoor Range: ~150 feet/45 meters

Max Outdoor Range: ~300 feet/90 meters

In June 2003, a third modulation standard was ratified: 802.11g. This works in the
2.4 GHz band (like 802.11b), but uses the same OFDM based transmission scheme
as 802.11a. It operates at a maximum physical layer bit rate of 54 Mbps exclusive
of forward error correction codes, or about 22 Mbps average throughputs. 802.11g
hardware is fully backwards compatible with 802.11b. They then proposed
802.11g standard was rapidly adopted by consumers starting in January 2003, well
before ratification, due to the desire for higher data rates, and reductions in
manufacturing costs. By summer 2003, most dual-band 802.11a/b products became
dual-band/tri-mode, supporting 802.11a and 802.11b/g in a single mobile adapter
card or access point. Details of making b and g work well together occupied much
of the lingering technical process; in an 802.11g network, however, activity of an
802.11b participant will reduce the data rate of the overall 802.11g network. Like
802.11b, 802.11g devices suffer interference from other products operating in the
2.4 GHz band.

2.5 802.11n STANDARD and SPECIFICATION.

Release Date: September 11th, 2009

Op. Frequency: 5 GHz and/or 2.4 GHz

Throughput (typ.): 144 Mbit/s

Net Bit Rate (max.): 600 Mbit/s

Gross Bit Rate (max.):?? Mbit/s


9
Max Indoor Range: ~300 feet/91 meters

Max Outdoor Range: ~600 feet/182 meters

802.11n is a recent amendment which improves upon the previous 802.11


standards, such as 802.11b and 802.11g, with, among other newer features, a
significant increase in data rate from 54 Mbps to 600 Mbps or adding multiple-
input multiple- output (MIMO). The standard use too both frequencies of 2.4 GHz
and 5 GHz. Enterprises, however, have already begun migrating to 802.11n
networks based on the Wi-Fi Alliance's certification of products conforming to a
2007 draft of the 802.11n proposal. The 802.11n standard was ratified by the IEEE
organization on September 11, 2009.

2.6 IEEE 802.11i STANDARD and SPECIFICATION.

The IEEE 802.11i standard focuses on addressing all aspects of wireless security—
even beyond client authentication and data privacy using WEP keys. As the
802.11i standard was being developed, wireless LAN vendors have moved ahead
to implement as many of its features as possible. As a result, the Wi-Fi Alliance
developed Wi-Fi Protected Access (WPA) based on some of the 802.11 draft
components. This is the most recent version of encryption for wireless networks. It
is defined as MAC Layer Security Enhancements for 802.11. It increases the
encryption sophistication of WEP using the Advanced Encryption Standard (AES).
The hardware of devices that use 802.11i must be designed to handle AES. The
two are not compatible, they are completely unique. Older legacy 802.11 products
are not upgradeable. For some administrators, this provides some issues if they are
upgrading their entire system to an 802.11i based encryption. Some of the
equipment may simply need to be replaced in order to comply.

10
2.7 IEEE 802.11-2012 STANDARD and SPECIFICATION.

In 2007, task group TGmb was authorized to "roll up" many of the amendments to
the 2007 version of the 802.11 standard. REVmb or 802.11mb, as it was called,
created a single document that merged ten amendments (802.11k, r, y, n, w, p, z, v,
u, and s) with the 2007 base standard. In addition much cleanup was done,
including a reordering of many of the clauses. Upon publication on March 29,
2012, the new standard was referred to as IEEE 802.11-2012.

2.8 IEEE 802.11ac STANDARD and SPECIFICATION.

IEEE 802.11ac-2013 is an amendment to IEEE 802.11, published in December


2013 that builds on 802.11n. Changes compared to 802.11n include wider channels
(80 or 160 MHz versus 40 MHz) in the 5 GHz band, more spatial streams (up to
eight versus four), higher order modulation (up to 256-QAM vs. 64-QAM), and the
addition of Multi-user MIMO (MU-MIMO). As of October 2013, high-end
implementations support 80 MHz channels, three spatial streams, and 256-QAM,
yielding a data rate of up to 433.3 Mbit/s per spatial stream, 1300 Mbit/s total, in
80 MHz channels in the 5 GHz band. Vendors have announced plans to release so-
called "Wave 2" devices with support for 160 MHz channels, four spatial streams,
and MU-MIMO in 2014 and 2015.

2.9 IEEE 802.11ad STANDARD and SPECIFICATION.

IEEE 802.11ad is an amendment that defines a new physical layer for 802.11
networks to operate in the 60GHz millimeter wave spectrum. This frequency band
has significantly different propagation characteristics than the 2.4GHz and 5GHz
band where Wi-Fi networks operate. Products implementing the 802.11ad standard
are being brought to market under the WiGig brand name. The certification

11
program is now being developed by the Wi-Fi Alliance instead of the now defunct
Alliance. The peak transmission rate of 802.11ad is 7Gbit/s.

2.10 IEEE 802.11af STANDARD and SPECIFICATION.

IEEE 802.11af also referred to as “White-Fi” and “Super Wi-Fi”, is an amendment,


approved in February 2014 that allows WLAN operation in IV white space
spectrum in the VHF and UHF bands between 54 and 790 MHz. It uses cognitive
radio technology to transmit on unused TV channels, with the standard taking
measures to limit interference for primary users, such as analog IV, digital IV and
wireless microphones. Access points and stations determine their position using a
satellite positioning system such as GPS and use the internet to query a geolocation
database (GDB) provided by regional regulatory agency to discover what
frequency channels are available for use at a given time and position. The physical
layer uses OFDM and is based on 802.11ac. The propagation path loss as well as
the attenuation by materials such as brick and concrete is lower in the UHF and
VHF bands than in the 2.4 and 5 GHz bands, which increase the possible range.
The frequency channels are 6 to 8 MHz wide, depending on the regulatory domain.
Up to four channels may be bonded in either one or two contiguous blocks. MIMO
(Multiple Input Multiple Output) operation is possible with up to four streams used
for either space-time block code (STBC) or multi-user (MU) operation. The
achievable data rate per spatial stream is 26.7 Mbit/s for 6 and 7MHz channels and
35.6Mbit/s for 8MHz channels. With four spatial streams and four bonded
channels, the maximum data rate is 426Mbit/s for 6MHzchannels and 568.9Mbit/s
for 8MHz channels.
2.11 IEEE 802.11ah STANDARD and SPECIFICATION.

IEEE 802.11ah defines a WLAN system operating at sub 1 GHz license-exempt


bands, with final approval slated for March 2016. Due to the favorable propagation
characteristics of the low frequency spectra, 802.11ah can be used for various
12
purposes including large scale sensor networks, extended range hotspot, and
outdoor Wi-Fi for cellular traffic offloading, whereas the available bandwidth is
relatively narrow.
2.12 IEEE 802.11ai STANDARD and SPECIFICATION.

IEEE 802.11ai is an amendment to the 802.11 standard which will add new
mechanisms for a faster initial link setup time.

2.13 IEEE 802.11aj STANDARD and SPECIFICATION.

IEEE 802.11aj is a rebranding of 802.11ad for use in the 4.5GHz unlicensed


spectrum available in some regions of the world (specifically
China).

2.14 IEEE 802.11aq STANDARD and SPECIFICATION.

IEEE 802.11aq is an amendment to the 802.11 standard which will enable pre-
association discovery of services. The extend some of the mechanism in 802.11u
that enabled device discovery to further discover the service running on a device,
or provided by a network.

2.15 IEEE 802.11ax STANDARD and SPECIFICATION.

IEEE 802.11ax is the successor to 802.11ac and will increase the efficiency of
WLAN networks. Currently at a very early stage of development this project has
the goal of providing 4 times the throughput of 802.11ac.

2.16 IEEE 802.11T STANDARD and SPECIFICATION.

13
The original goal of the IEEE 802.11 Task Group T (TGT) was to develop
performance metrics, measurement methods, and test conditions to measure the
performance metrics, measurement methods and test conditions to measure the
performance of 802.11 wireless networking equipment.

Within the IEEE 802.11 Working Group, the following IEEE Standards
Association Standard and Amendments exist:

 IEEE 802.11-1997: The WLAN standard was originally 1 Mbit/s and 2


Mbit/s, 2.4 GHz RF and infrared (IR) standard (1997); all the others listed below
are Amendments to this standard, except for Recommended Practices 802.11F and
802.11T.

 IEEE 802.11a: 54 Mbit/s, 5 GHz standard (1999, shipping products in 2001)

 IEEE 802.11b: Enhancements to 802.11 to support 5.5 and 11 Mbit/s (1999)

 IEEE 802.11c: Bridge operation procedures; included in the IEEE 802.1D


standard (2001)

 IEEE 802.11d: International (country-to-country) roaming extensions (2001)


 IEEE 802.11e: Enhancements: QoS, including packet bursting (2005)

 IEEE 802.11F: Inter-Access Point Protocol (2003) Withdrawn February 2006

 IEEE 802.11g: 54 Mbit/s, 2.4 GHz standard (backwards compatible with


b) (2003)

 IEEE 802.11h: Spectrum Managed 802.11a (5 GHz) for European compatibility


(2004)
14
 IEEE 802.11i: Enhanced security (2004)

 IEEE 802.11j: Extensions for Japan (2004)

 IEEE 802.11-2007: A new release of the standard that includes amendments a,


b, d, e, g, h, i and j. (July 2007)
 IEEE 802.11k: Radio resource measurement enhancements (2008)

 IEEE 802.11n: Higher throughput improvements using MIMO (multiple input,


multiple output antennas) (September 2009)

 IEEE 802.11p: WAVE—Wireless Access for the Vehicular


Environment (such as ambulances and passenger cars) (July 2010)

 IEEE 802.11r: Fast BSS transition (FT) (2008)

 IEEE 802.11s: Mesh Networking, Extended Service Set (ESS) (July


2011)

 IEEE 802.11T: Wireless Performance Prediction (WPP)—test methods


and metrics Recommendation
 IEEE 802.11u: Improvements related to HotSpots and 3rd party authorization of
clients, e.g. cellular network offload (February 2011)

 IEEE 802.11v: Wireless network management (February 2011)

 IEEE 802.11w: Protected Management Frames (September 2009)

 IEEE 802.11y: 3650–3700 MHz Operation in the U.S. (2008)


15
 IEEE 802.11z: Extensions to Direct Link Setup (DLS) (September 2010)

 IEEE 802.11-2012: A new release of the standard that includes amendments k,


n, p, r, s, u, v, w, y and z (March 2012)

 IEEE 802.11aa: Robust streaming of Audio Video Transport Streams

(June 2012)

 IEEE 802.11ac: Very High Throughput <6 GHz; potential improvements over
802.11n: better modulation scheme (expected ~10% throughput increase), wider
channels (estimate in future time 80 to 160 MHz), multi user MIMO; (December
2013)

 IEEE 802.11ad: Very High Throughput 60 GHz (December 2012) - see WiGig
 IEEE 802.11ae: Prioritization of Management Frames (March 2012)

 IEEE 802.11af: TV Whitespace (February 2014)

2.2 IN PROCESS

 IEEE 802.11mc: Roll-up of 802.11-2012 + aa, ac, ad, ae & af to be published


as 802.11-2015 (~ December 2015)

 IEEE 802.11ah: Sub 1 GHz license exempt operation (e.g. sensor network,
smart metering) (~ March 2016)

16
 IEEE 802.11ai: Fast Initial Link Setup (~ November 2015)

 IEEE 802.11aj: China Millimeter Wave (~ June 2016)

 IEEE 802.11ak: General Links (~ May 2016)

 IEEE 802.11aq: Pre-association Discovery (~ July 2016)

 IEEE 802.11ax: High Efficiency WLAN (~ May 2018)

802.11F and 802.11T are recommended practices rather than standards, and are
capitalized as such.

802.11m is used for standard maintenance. 802.11ma was completed for

802.11-2007, 802.11mb was completed for 802.11-2012 and 802.11mc is


working towards publishing 802.11-2015.

17
2.2.1 TABLE 1: PROJECT STANDARD and SPECIFICATION

Rang
Effective e (typical
IEEE Operating Throughp indoo
Release Frequenc Throughput r distance
Wireless y ut Speeds
Date (maximu Speeds* in meters)*
Specification Range m
802.11a 1999 5.15- 54 Mbps 23 Mbps ~25 meters
5.35/5.4
7
-
2.4-2.5
802.11b 1999 GHz 11 Mbps 5 Mbps ~35 meters

2.4-2.5
802.11g 2003 GHz 54 Mbps 23 Mbps ~25+ meters

802.11n 2007 2.4 GHz or540 Mbps 100 Mbps ~50 meters
5GHz
(unappro bands
ved

CHAPTER THREE
18
3.0 DESIGN CONSIDERATION

3.0.1Specific one-to-one Initiative Considerations

Identifying which services and applications the WLAN must support is a key to
building a robust, relevant, scalable and sustainable architecture. It is strongly
urged to consider the following elements of any one-to-one initiative:

- Number of NOUN SST staff using the WLAN.

- Types of application(s) being utilized

- Total bandwidth requirements

- Throughput requirements

- Security for laptops

-Special attention should be considered for NOUN SST staff taking their laptop
home to access the Internet or other resources.

3.1 Site Survey

 Obtain floor plans for NOUN SST 6TH Floor included in the project.
 Determine how many Access Points it will take to provide a signal to the
desired coverage area.

 Physical Access Points placement map.

19
 Identify signal trouble areas and physical construction or environmental
challenges.

 Determine user policies for the wireless network.

 Diagram channel layout of Access Points.

 Confirm hardware compatibility (include desired legacy hardware, new


hardware and current or future for staff owned device standards)

 Verify that each Access Points location is physically secure.

 Verify that there is a power source near the intended location for each Access
Point or Power over Ethernet compatibility.

 Confirm there is a way to run a patch cable between your wired network and
each AP and/or APs to be used as repeaters. List specialized antennae
requirements.
 Determine AP network cabling distances and are within CAT-5 or 6 limits
(~100m)

3.2 DESIGN ARCHITECTURE


When defining WLAN architecture, focus on two distinct challenges:
- Technology and educational policy requirements; and

- End-user requirements.

20
3.2.1 TECHNOLOGY

Centrally Coordinated versus Distributed AP Management


Determine which WLAN architecture to adopt. Both architectures – distributed
APs and centrally coordinated APs– have benefits that are well suited to different
environments. These architectures are also referred to as thick and thin
respectively. A wireless network, based on standalone APs, relies on the integrated
functionality of each AP to enable wireless services, authentication and security.
As shown in Figure 16, this network can be characterized as follows:

- All APs in the network operate independently of each other;

- Encryption and decryption is done at the AP;

- Each AP has its own configuration file;

- Larger networks normally rely on a Centralized Management Platform;

- The network configuration is static and does not respond to changing


network conditions such as interfering rogue APs or failures of a neighboring APs;
and

- Be certain to confirm PoE (Power over Ethernet) support, as many

thick APs do not support PoE.

21
FIGURE 1: Wireless Network Consisting of Stand Alone Access,
Planning a Wireless

3.2.2 Network

In a coordinated wireless network, thin APs have much simpler responsibilities.


Most of the heavy lifting is performed by a centralized controller, also known as a
wireless switch, which handles functions such as roaming, authentication,
encryption/decryption, load balancing, RF monitoring, performance monitoring
and location services. Because configuration is done once, at the controller, adding
additional radios to cover new office areas is as simple as plugging them in. As
shown in Figure below, this kind of network can be characterized as follows:

22
- AP activity is coordinated by a wireless centralized controller.
Encryption/decryption and authentication are performed at the controller, instead of
at the individual APs;

- To maintain the health of the network, the controller can reconfigure AP


parameters as needed, providing a self-healing WLAN (e.g. if an AP fails,
neighboring APs can increase signal strength to make up for the lost coverage of
the failing AP);

- The wireless LAN controller performs tasks such as configuration


control, fault tolerance and network expansion;

- Redundancy can be provided through redundant controllers in separate


locations that can assume control in the event of a switch or controller failure; and
- Supports PoE.

FIGURE 2: A Centrally Controlled Wireless Network, Planning a


Wireless network
23
Both the distributed and centrally coordinated architectures have advantages and
disadvantages, depending on the age of the wired infrastructure, deployment area,
building architecture and types of applications to support. Regardless which
approach, it is essential that the architecture provides a way to manage the WLAN
efficiently and effectively.

A distributed AP WLAN is particularly well suited in environments where:

- There is a smaller, isolated wireless coverage area that requires only one or
a few APs; and

- There is a need for wireless bridging from a main building to a remote


portable or temporary building such as a portable office.

However, the operational overhead to manage and maintain a WLAN increases


with the size of the WLAN deployment. Wireless LAN management tools that are
generally proprietary to each vendor’s associated hardware help simplify
configuration and monitoring of the LAN, but the inherent ―independence‖ of
these APs presents a challenge in addressing security, configuration control,
bandwidth predictability and reliability.

It is worth noting that when APs are first deployed, they must be configured. Such
things as radio settings and authorized users must be added. Once WLANs are
installed they are subject to frequent change as manufacturers update firmware and
introduce new products; as new students are introduced and as security codes are
updated. Each of these changes requires an administrator to ―touch‖—physically
or electronically— each AP or device that connects to the WLAN. It is not cost
effective to manage WLANs device by device, and hence if there will be more than
24
just a few APs on your WLAN, option for the centrally coordinated architecture. A
centrally coordinated WLAN is well suited to deployments where:

- There are one or more large wireless coverage areas that require multiple
APs possibly accompanied by several smaller isolated coverage areas;
- RF network self-healing is required; and
- A redundant state-failover solution is required.

There is no question that the trends indicate centrally coordinated solutions are
becoming the de facto standard. As wireless LAN deployments continue to grow
larger, accommodating ever greater numbers of users, there will be an increasing
demand to centrally manage a wide range of security, performance and
configuration attributes as a single system from a single dashboard or software
interface.

A centrally coordinated network offers many benefits, including:

- Lower operational costs. Centralized management facilitates ease of


deployment and ongoing management. It is essential to minimize help desk calls
and trouble tickets.

- Greater availability. In this architecture, it is easier to respond in real-


time to changes in the network performance and spikes in user demand such as
new students or temporary staff.

- Better return on investment. Fast client roaming and enhancements in


Quality of Service provide traffic- sensitive applications with their required
throughput.

25
As for all of their attractions in terms of performance, flexibility and
affordability, WLANs also pose management challenges very different from
those of wired networks. These challenges increase geometrically as WLANs
grow in size, scope and complexity. The solution is to automate these
management tasks by implementing best practice service level management
processes and tools.

Emerging field tools are also complementing IT toolkits in filling the need to
effectively manage the wireless environments. These tools provide the ability
to detect rogue APs, determine security levels, determine where there are
potential interference sources for wireless, such as cordless phones, and
analyze wireless data.

There are many different ways to set up a wireless network. A certain density of
APs is required to provide satisfactory network coverage and capacity, while
many aspects of WLANs are analogous to wired LANs and should be managed
in a consistent fashion; some aspects of wireless are unique. Wireless is a
shared medium and, as such, requires careful planning for dynamic usage
profiles and capacity variations.

3.3. Antennae Selection


Antennae allow for more efficient coverage for specific areas, and can help achieve
desired coverage, capacity and bandwidth objectives. A higher-gain antenna
focuses the radio’s RF energy into a smaller area to achieve higher signal levels
and a better SNR (Signal to Noise Ratio). This typically yields higher data rates
over the area covered by the antenna. For example, a library with floor-to-ceiling
solid wood or metal bookshelves, and wireless network access of PDAs or laptops
is required within this area, deployment of external directional antennae to focus
wireless coverage between each of these obstacles would be required.
26
CHAPTER FOUR
IMPLEMENTATION AND EVALUATION
4.0 System Hardware Requirement

4.1 Hardware

Points to consider include:

 May requires witch standard applicable for VLAN which support PoE,
VLAN or capacity.
 Older hardware is in compatible with new security standards and
 Can older hardware support the new wireless cards? Is there room for them?
4.2 System Software Requirement

4.2.1 Software

Application characteristics must be analyzed if this traffic is to flow over the


WLAN. It is essential to outline this in the policy to protect and ensures capability
as planned. Performance is not limited to the throughput that a client can achieve. It
is also directly related to the client keeping its network connection and
communication session intact. When roaming from one AP to another, there is a
small amount of time during either authentication or association during which the
client will effectively be without a link. The duration of the lost link will determine
ifandhowapplicationswillbeimpacted.Notethatlastroamingwasspecifically
conceived to make this link loss during authentication almost unnoticeable to end
users. Applications exhibit a distinctive sensitivity to the duration of a lost link.
Transactional applications such as e-mail and web browsing are relatively
insensitive, whereas real-time applications such as voice and video are highly
sensitive. Ensure that fast roaming is enabled to make authentication occur
27
promptly enough to not affect the core WLAN application suite.
Application bandwidth requirements can be analyzed by the software vendor’s
specification or manuals. A common issue with networked applications is that they
are developed with little or no consideration for the resources they require from the
communications infrastructure. Application developers take into consideration the
notion of the network, but typically fail to consider band width and latency
implications. The (false) assumption is that the network is always available, that
bandwidth is unlimited and that congestion and delays do not occur. As such, even
though the applications and the network are tightly coupled, they are typically
developed and deployed as independent components. It is exactly this decoupling
that creates the burden of carefully planning a WLAN for successful support of the
extension of applications to the wireless environment. Hence, start with the
premise that the average application is not aware of the transport medium it is
using. They treat the network—wired or wireless—identically. The challenge of
applications not being aware the network is compounded with WLANs. Indeed,
most applications are developed for wired environments; however, they will likely
be developed specifically for the one- to-one initiatives in the education sector.
Specific characteristics of WLANs are their lower through put and higher latency
than their wired equivalents. This is typically not a problem for the burst
applications. However, WLAN can cause additional challenges for applications
that demand high data rates or deterministic behavior. The interaction between
applications and the network is only one of the challenges that must be tackled
when defining WLAN architecture. Defining a wireless architecture to support
voice and video also introduces specific problems that must be considered. The
considerations include provisioning sufficient band width for latency-sensitive
applications, implementing a quality of service (QoS) solution, and ensuring fast-
roaming capabilities between cells. Perhaps today’s students will be in one
classroom and it is unlikely that they will be roaming between APs, which sounds
like a rational and fair statement. However, recall that this WLAN investment is
28
meant to last districts up to five years. In the world of technology, five years is a
very long time, and it may very well be that a district will want to implement other
applications and devices to run over the WLAN. One such example, which could
be used by students or more likely teachers, is that of Voice over WLAN handsets.

4.1.2 Security Software and Operating System Updates.

Desktop and laptop patch management should be deployed to ensure the latest
product patches are pushed to all clients. This will help to increase security, reduce
compatibility challenges, keep interfaces consistent and decrease support costs over
time. Have a comprehensive desktop management strategy that includes all mobile
devices and laptops. A comprehensive, centralized dashboard to monitor, maintain,
manage and report on all desktop management aspects. Do not settle for just patch
management software. The feature and functionality set of the chosen management
system should be comprehensive and in one simple Graphical User Interface
(GUI).
4.2 Personal Firewalls

Personal firewall software should be deployed on each and every laptop. Ideally,
these software firewalls will function within a centrally controlled system that can
enforce usage with and is compatible with your hardware firewalls. All laptops
with a wireless NIC must have a personal firewall installed that supports
connection-specific policies. As laptops are often outside the protection of the
school or district firewall, every laptop should have a personal firewall
installed.Thiswillbecriticalforstudentstakingtheirlaptopshomeandthenreturning,
with potential infections, to the school WLAN. The firewall built into Vista may
provide sufficient baseline security for student laptop use, although software client
licenses compatible with your firewall solution at either the school site or district
head office is better. What is built into Windows XP is not sufficient. The personal
29
firewall should be configured to block split tunneling and any ad hoc WLAN
connections.
4.2.1 Anti-Virus(A/V)

Anti-Virus protects and minimizes threats, and is essential for all laptops because
new viruses proliferate daily and spread quickly. Anti-Virus should be centrally
controlled so the definitions can be monitored. If not, definitions may not be
updated and laptops would eventually get a virus. MacAfee, Symantec, Trend
Micro, Computer Associates and many other vendors have central control and
monitoring. Despite offerings for stand alone, typically consumer versions, do not
implement the seas they do not have central management and require maintenance
and updates. Some small districts may have this in place on guest or even existing
legacy laptops accessing their WLANs. This practice should stop immediately.
4.2.2 Anti-Spyware(A/S)

Anti-Spyware protects against threats through the Internet browser. Protecting


against this will dramatically reduce the level one technical support requirements
and support time and costs. Fewer users asking to have their system cleaned means
more time for more important projects or additional training. Pop-ups can be
frustrating and will impact a user’s experience. Anti-Spyware can protect against
these as well.
4.3Encrypted File Systems(EFS)

Security certificates and critical data will be accessible to a savvy user who
happens to come across a lost or stolen laptop, and includes all access settings to
the WLAN and other resources including applications, VPN and more. Using EFS,
systems will make it challenging, if not impossible, even for a highly skilled user to
crack and gain access without the user’s network password. In this scenario,
password policy and enforcement is critical. The key to address here is that if a
30
laptop is lost, no one could access the data on it. Imagine if a principal’s laptop
were stolen while travelling and all of the private data therein were exposed to a
thief.

31
CHAPTER FIVE

SUMMARY, RECOMMENDATION, AND CONCLUSION.

5.1 SUMMARY
This report demonstrate various search process problems in unstructured network
as well as this report represent entire project process by classifying various project
functionalities. Which also demonstrate project requirements and technical usage
structure for developing distributed dynamic application and classify proposed
method for resolving spatial queries problems by establishing dynamic network
model using network simulator, the proposed model will identify problem
statement in existing system and reconstruct entire network by accepting dynamic
search process
5.2 CONCLUSION.

I had to put tremendous amount of thought and planning into wireless network

solution. N O U N IT staff is highly organized and committed, and this is

reflected in the design and implementation of the dedicated printer wireless

network. Its solution is innovative and functional and can be a cost effective

design for school districts of all sizes implementing wireless networks.

5.0 RECOMMENDATION.

 The first strategy is to accept the recommended client-to-AP ratio as


published by the WLAN equipment vendor. Even though this is the easiest
solution, there is potential for over or under-provisioning the number of
APs because the information provided by the vendor does not consider

32
your specific user-base requirements. However, use the WLAN vendor’s
published recommendations as a rough guideline.
 It is recommended that at minimum a WLAN Intrusion
Detection System (IDS) or an integrated Intrusion detection
and prevention solution. The latter not only identifies
intrusions, but also addresses them automatically.
 Centralized control is generally recommended as it eases administration
burden and can give management high level reports of the entire
organization’s activity. Also, it is strongly recommended to use centrally
manageable security appliances.
 It is strongly recommended that you use your core expertise in
understanding the fundamentals of delivering education to grow students’
experience and knowledge as the base of your decision making.
 Recommended to have standard device type(s).This can be one single
laptop make and model for every eligible staff across the district, or,
multiple standard laptops and PDAs for association one-to-one initiatives.
 Design a strong and encompassing wireless networking policy. One clause
strongly recommended is that wireless APs must only be attached to a
dedicated network segment, and not to a segment containing other network
resources.
 Implementing a standardized policy for school owned laptops used by
students in a one-to-one program is highly recommended.

33
REFFERENCE

AKYILDIZ, I. F., SU, W., SANKARASUBRAMANIAM, Y. & CAYIRCI, E.


2002a. Wireless sensor networks: a survey. Comput. Netw., 393-422.

AKYILDIZ, I. F., WEILIAN, S., SANKARASUBRAMANIAM, Y. & CAYIRCI,


E. 2002c. A survey on sensor networks. Comm. Mag., 102-114.

AL-KARAKI, J. N. & KAMAL, A. E. 2004. „Routing techniques in wireless


sensor networks: a survey‟.
IEEE Transaction on wireless communications, 11, 6-28.

ALZOUBI, K. M., WAN, P. & FRIEDER, O. 2002. Distributed Heuristics for


Connected Dominating Sets in Wireless Ad Hoc Networks. Journal of
Communications and Networks, 4, 22-29.

AMAN KANSAL, FENG ZHAO, JIE LIU, NUPUR KOTHARI &


BHATTACHARYA, A. 2010. Virtual Machine Power Metering and Provisioning.
ACM Symposium on Cloud Computing (SOCC).

ANASTASI, G., CONTI, M., FRANCESCO, M. D. & PASSARELLA, A. 2009.


Energy conservation in wireless sensor networks: A survey. Ad Hoc Netw., 7, 537-
568.

ATLA, A., TADA, R., SHENG, V. & SINGIREDDY, N. 2011. Sensitivity of


different machine learning algorithms to noise. J. Comput. Sci. Coll., 26, 96-103.

BACCOUR, N., KOUB, A., YOUSSEF, H., JAM, M. B., ROS, D. D., RIO,
ALVES, R. & BECKER, L. B. 2010. F-LQE: a fuzzy link quality estimator for
wireless sensor networks. Proceedings of the 7th European conference on Wireless
Sensor Networks. Coimbra, Portugal: Springer-Verlag.

BERZOSA, J., MABE, J., GRABHAM, N. J. & TUDOR, M. J. 2012. Social issues
of power harvesting as key enables of WSN in pervasive computing. 2012 IEEE:
International Conference on Pervasive Computing and Communications
Workshops (PERCOM Workshops).

BHATTACHARYA, A. & KUMAR, A. 2014. A shortest path tree based algorithm


for relay placement in a wireless sensor network and its performance analysis.
Comput. Netw., 71, 48-62.

34
BILLINGS, S. A. & VOON, W. S. F. 1983. Structure detection and model validity
tests in the identification of nonlinear systems. Proceeding of the institution of
electronic engineers. UK

BILLINGS, S. A. & ZHU, Q. M. 1994. Nonlinear model validation using


correlation tests. Int. J. Contr., 60, 1107–1120.

BISWAS, S. & MORRIS, R. 2005. ExOR: opportunistic multi-hop routing


for wireless networks.
SIGCOMM Comput. Commun. Rev., 35, 133-144.

C.BURATTI, A. C., D.DARDARI, R.VERDONE 2009. An Overview on Wireless


Sensor Networks Technology and Evolution. sensors, 9.

CERPA, A. & ESTRIN, D. 2002. ASCENT: Adaptive Self-Configuring sEnsor


Network Topologies.
Computer Communication Review, 32, 62.

CHACHULSKI, S., JENNINGS, M., KATTI, S. & KATABI, D. 2007. Trading


structure for randomness in wireless opportunistic routing. SIGCOMM Comput.
Commun. Rev., 37, 169-180.

CHAMP, J., SAAD, C. & BAERT, A.-E. 2009. Lifetime in Wireless Sensor
Networks. Complex, Intelligent and Software Intensive Systems, 2009. CISIS '09.
International Conference on.

CHU, H.-T., HUANG, C.-C., LIAN, Z.-H. & TSAI, J. J. P. 2006. A ubiquitous
warning system for asthma-inducement. IEEE Computer Society.

D. WEI, Y. J., S. VURAL, K. MOESSNER, AND R. TAFAZOLLI. November


2011. An energy-efficient clustering solution for wireless sensor networks. IEEE
Transactions on Wireless Communications, 10, 1-11.

DONG, Q., BANERJEE, S., ADLER, M. & MISRA, A. 2005. Minimum energy
reliable paths using unreliable wireless links. Proceedings of the 6th ACM
international symposium on Mobile ad hoc networking and computing. Urbana-
Champaign, IL, USA: ACM.

E. JOVANOV, A. L., D. RASKOVIC, P. COX, R. ADHAMI, F. ANDRASIK,


2003. Stress monitoring using a distributed wireless intelligent sensor system,.
IEEE Engineering in Medicine and Biology Magazine.

35
FENGYUAN REN, J. Z., TAO HE, CHUANG LIN, SAJAL K. DAS, December,
2011 EBRP: Energy-Balanced Routing Protocol for Data Gathering in Wireless
Sensor Networks. IEEE Transactions on Parallel and Distributed Systems, , 22,
2108-2125

FOSTER PROVOST, T. F. 2013. Data Science for Business: What you need to
know about data mining and data-analytic thinking, O'Reilly Media.

G. VIRONE, A. W., L. SELAVO, Q. CAO, L. FANG, T. DOAN, Z. HE, AND J.


A. STANKOVIC 2006.
An advanced wireless sensor network for health monitoring. Distributed Diagnosis
and Home Healthcare.

GARCIA-LUNA-ACEVES, J. J., MOSKO, M. & PERKINS, C. E. 2006. A new


approach to on-demand loop-free routing in networks using sequence numbers.
Comput. Netw., 50, 1599-1615.

GHAFFARI, A. 2014. An Energy Efficient Routing Protocol for Wireless Sensor


Networks using A-star Algorithm. Journal of Applied Research and Technology,
12, 815-822.

GOLDSMITH, A. J. & WICKER, S. B. 2002. Design Challenges for Energy-


Constrained Ad Hoc Wireless Networks. IEEE Wireless Communications
Magazine,, 8–27.

H.EDGAR & CALLAWAY, J. 2004. Wireless Sensor Networks.

HALKES, G. P., DAM, T. & LANGENDOEN, K. G. 2005. Comparing energy-


saving MAC protocols for wireless sensor networks. Mobile Networks and
Applications Journal of Kluwer Academic, 10, 783-791.

HALL, M. A. & SMITH, L. A. 1999. Feature Selection for Machine Learning:


Comparing a Correlation-Based Filter Approach to the Wrapper. Proceedings of
the Twelfth International Florida Artificial Intelligence Research Society
Conference. AAAI Press.

HANDE, A. & CEM, E. 2010. Wireless sensor networks for healthcare: A survey.
Comput. Netw. %@ 1389-1286, 54, 2688-2710.

HASTIE T, T. R., FRIEDMAN J 2009. The Elements of Statistical Learning: Data


Mining, Inference, and Prediction, Springer.

36
HEINZELMAN, W. 2000. Application Specific Protocol Architectures for
Wireless Networks. Ph.D Thesis, Massachusetts Institute of Technology.

HEINZELMAN, W., KULIK, J. & BALAKRISHNAN, H. Adaptive Protocols for


Information Dissemination in Wireless Sensor Networks. 5th ACM/IEEE
Mobicom Conference August 1999a Seattle, WA. 174-85.

HEINZELMAN, W. R., CHANDRAKASAN, A. & BALAKRISHNAN, H. 2000.


Energy-efficient communication protocol for wireless microsensor networks. 33rd
Annual Hawaii International Conference on System Sciences.

HEINZELMAN, W. R., CHANDRAKASAN, A. P. & BALAKRISHNAN, H.


2002. An application specific protocol architecture for wireless microsensor
networks. IEEE transactin on Wireless Communications.

HEINZELMAN, W. R., KULIK, J. & BALAKRISHNAN, H. 1999b. Adaptive


protocols for information dissemination in wireless sensor networks. Proceedings
of the 5th annual ACM/IEEE international conference on Mobile computing and
networking. Seattle, Washington, USA: ACM.

HOANG, D. B. Wireless Technologies and Architectures for Health Monitoring


Systems. Digital Society, 2007. ICDS '07. First International Conference on the, 2-
6 Jan. 2007 2007. 6-6.

HOULE, M. E., KRIEGEL, H.-P., KR, P., GER, SCHUBERT, E. & ZIMEK, A.
2010. Can shared-neighbor distances defeat the curse of dimensionality?
Proceedings of the 22nd international conference on Scientific and statistical
database management. Heidelberg, Germany: Springer-Verlag.

HSEIN-PING, K. & DO-UN, J. 2009. Wearable patch-type ECG using ubiquitous


wireless sensor network for healthcare monitoring application. Proceedings of the
2nd International Conference on Interaction Sciences: Information Technology,
Culture and Human. ACM.

HUSSAIN., M. P. S. A. M. Z. 2010. A top-down hierarchical multi-hop secure


routing protocol for wireless sensor networks. International Journal of Ad Hoc,
Sensor and Ubiquitous Computing,, 1.

IBRAHIEM M. M. EL EMARY, S. R. 2013. Wireless Sensor Networks: From


Theory to Applications, CRC Press.

37
INTANAGONWIWAT, C., GOVINDAN, R. & ESTRIN, D. Directed dicusion: a
scalable and robust communication paradigm for sensor networks. Proceedings of
ACM MobiCom '00, 2000 Boston, MA. 56-67.

ISLAM, S., KEUNG, J., LEE, K. & LIU, A. 2012. Empirical prediction models for
adaptive resource provisioning in the cloud. Future Generation Comp. Syst., 28,
155-162.

J. TANG, A. S. A. H. L. 2014. Feature selection for classification: A review.


Data classification:
Algorithms and Applications. CRC Press.

J.N.M.VALDEZ. 2011. Wireless Technologies for Indoor Asset Positioning.


Master, Tempere University of Technology.

JAYANTHY., M. R. E. J. A. T. 2010. An analysis of various parameters in


wireless sensor networks using adaptive FEC technique. . International Journal of
Ad Hoc, Sensor and Ubiquitous Computing,, 1, 33-34.

JEONGGIL, K., JONG HYUN, L., YIN, C., RV, ZVAN MUSVALOIU, E.,
ANDREAS, T., GERALD, M. M., TIA, G., WALT, D., LEO, S. & RICHARD, P.
D. 2010. MEDiSN: Medical emergency detection in sensor networks. ACM Trans.
Embed. Comput. Syst, 10, 1-29.

JOAQU, J., GARZ, E. & BOUSO, C. 2007. An energy-efficient adaptive


modulation suitable for wireless sensor networks with SER and throughput
constraints. EURASIP J. Wirel. Commun. Netw., 2007, 23-23.

K. W. GOH, J. L., Y. KIM, E. K. TAN, AND C. B. SOH 2005. A PDA-based ECG


beat detector for home cardiac care. In IEEE Engineering in Medicine and Biology
Society. Shanghai, China,.

KAMYABPOUR, N. & HOANG, D. B. 2010. A hierarchy energy driven


architecture for wireless sensor networks. 24th IEEE International Conference on
Advanced Information Networking and Applications (AINA-2010). Perth,
Australia: IEEE Computer Society.

KONRAD, L., DAVID, J. M., THADDEUS, R. F. F.-J., ALAN, N., ANTONY, C.,
VICTOR, S., GEOFFREY, M., MATT, W. & STEVE, M. 2004. Sensor Networks
for Emergency Response: Challenges and Opportunities. IEEE Pervasive
Computing, 3, 16-23.
38
KORKALAINEN, M., SALLINEN, M., K, N., RKK, INEN & TUKEVA, P. 2009.
Survey of Wireless Sensor Networks Simulation Tools for Demanding
Applications. Proceedings of the 2009 Fifth International Conference on
Networking and Services. IEEE Computer Society.

KUMAR, S. 2011. NIH GEI project [Online]. The


University of Memphis. Available:
http://www.cs.memphis.edu/~santosh/AutoSense.html.

KURTIS KREDO, I. & MOHAPATRA, P. 2007. Medium access control in


wireless sensor networks.
Comput. Netw., 51, 961-994.

LANGENDOEN., T. D. A. K. An adaptive energy-efficient MAC protocol for


wireless sensors networks.
. In Proceedings of SenSys‟03, 2003.

LE, H., HOANG, D. & POLOAH, R. 2008. S-Web: An Efficient and Self-
organizing Wireless Sensor Network Model. Lecture Notes in Network-Based
Information Systems, 5186, 179-188.

LI, X.-Y., SONG, W.-Z. & WANG, W. 2005. A unified energy-efficient topology
for unicast and broadcast. Proceedings of the 11th annual international conference
on Mobile computing and networking. Cologne, Germany: ACM.

LIANG, J., WANG, J. & CHEN, J. 2009. A Delay-Constrained and Maximum


Lifetime Data Gathering Algorithm for Wireless Sensor Networks. MSN. IEEE
Computer Society.

LIU, A., REN, J., LI, X., CHEN, Z. & SHEN, X. 2012. Design principles and
improvement of cost function based energy aware routing algorithms for wireless
sensor networks. Computer Networks, 56, 1951-1967.

LORINCZ, K., WELSH, M. 2006. MoteTrack: A robust, decentralized approach to


RF-based location tracking. . Pers. Ubiquit. Comput., 11.

MAO, K. Z. & BILLINGS, S. A. 2000. Multi-directional model validity tests for


non-linear system identification. Int. J. Contr., 73, 132–143.

39
MAO, X., TANG, S., XU, X. & LI, X.-Y. 2011. Energy Efficient Opportunistic
Routing in Wireless Sensor Networks. Parallel and Distributed Systems, IEEE
Transactions, 22, 1934-1942.

MEHMET C. VURAN & AKYILDIZ, I. F. XLP: A Cross-Layer Protocol for


Efficient Communication in Wireless Sensor Networks. IEEE TRANSACTIONS
ON MOBILE COMPUTING, 9.

MIN, R., BHARDWAJ, M., CHO, S.-H., SHIH, E., SINHA, A., WANG, A. &
CHANDRAKASAN, A.
2001. Low-power wireless sensor networks. Fourteenth International Conference
on VLSI Design.

MINHAS, M. R., GOPALAKRISHNAN, S. & LEUNG, V. C. M. 2009. An Online


Multipath Topology management Algorithm for Maximizing Lifetime in Wireless
Sensor Networks. Proceedings of the 2009 Sixth International Conference on
Information Technology: New Generations. IEEE Computer Society.

MISRA, A. & BANERJEE, S. 2002. MRPC: maximizing network lifetime for


reliable routing in wireless environments. WCNC. IEEE.

MUSZNICKI, B., TOMCZAK, M. & ZWIERZYKOWSKI, P. Dijkstra-based


Localized Multicast Topology management in Wireless Sensor Networks. 8th
IEEE, IET International Symposium on Communication Systems, Networks and
Digital Signal Processing, 2012. IEEE.

N.B.RIZVANDI, J.TAHERI & ZOMAYA, A. Y. 2011. Some observations on


optimal frequency selection in DVFS-based energy consumption minimization.
Journal of Parallel and Distributed Computing, 71, 1154–1164.

NANNICINI, G. & LIBERTI, L. 2008. Shortest paths on dynamic graphs.


International Transactions in Operational Research, 15, 551-563.

NORMAN, J., JOSEPH, J. P. & ROJA, P. P. 2010. A Faster Routing Scheme for
Stationary Wireless Sensor Networks - A Hybrid Approach. CoRR, abs/1004.0421.

NOURCHENE, B., LAMIA, C. & LOTFI, K. 2011. A Comprehensive Overview


of Wireless Body Area Networks WBAN. Int. J. E-Health Med. Commun., 1-30.

OCTAV, C., CHENYANG, L., THOMAS, C. B. & GRUIA-CATALIN, R. 2010.


Reliable clinical monitoring using wireless sensor networks: experiences in a step-

40
down hospital unit. Proceedings of the 8th ACM Conference on Embedded
Networked Sensor Systems ACM.

P. MOHANTY, S. P., N. SARMA, AND S. S. SATAPATHY. 2010. Security


issues in wireless sensor network data gathering protocols: a survey. . Journal of
Theoretical and Applied Information Technology, 14–27.

P. SAMUNDISWARY, D. S., AND P. DANANJAYAN 2010. Secured greedy


perimeter stateless routing for wireless sensor networks. International Journal of
Ad Hoc, Sensor and Ubiquitous Computing, , 1, 9– 20.

P.KUMAR, S. G. L., N.J.LEE 2012. E-SAP: Efficient-Strong Authentication


Protocol for Healthcare Applications Using Wireless Medical Sensor Networks.
sensors, 2, 1625-1647.

POTTIE, G. J. & KAISER, W. J. 2000. Wireless integrated network sensors.


Commun. ACM, 43, 51-58.

QIONG, H., BO, D. & SUBIR, B. 2013. Pulse Switching. Wireless Sensor
Networks. CRC Press.

RABAEY, J. M., AMMER, M. J., SILVA, J. L. D., PATEL, D. & ROUNDY, S.


2000. PicoRadio Supports Ad Hoc Ultra-Low Power Wireless Networking.
Computer, 33, 42-48.

RABBAT, M. & NOWAK, R. D. 2004. Distributed optimization in sensor


networks. Proceedings of the Third International Symposium on Information
Processing in Sensor Networks (IPSN 2004). Berkeley, CA, USA: ACM.

RAGHUNATHAN, V. & CHOU, P. H. 2006. Design and power management of


energy harvesting embedded systems. Proceedings of the 2006 international
symposium on Low power electronics and design. Tegernsee, Bavaria, Germany:
ACM.

RAGHUNATHAN, V., SCHURGERS, C., PARK, S. & SRIVASTAVA, M. B.


2002. Energy Aware Wireless Microsensor Networks. IEEE Signal Processing
Magazine.

RAHMAN, M. A., EL SADDIK, A. & GUEAIEB, W. 2008. Wireless Sensor


Network Transport Layer: State of the Art. In: MUKHOPADHYAY, S. &
HUANG, R. (eds.) Sensors: Advancement In Modeling, Design Issues, Fabrication
And Practical Applications. Springer %8 July.
41
RAISINGHANI, V. T. & IYER, S. 2004. Cross-Layer Design Optimizations in
Wireless Protocol Stacks,.
Computer Communications, 27, 720-724.

RAMAKRISHNAN, I. M. M. E. E. A. S. 2013. Applications. Wireless Sensor


Networks. CRC Press.

RAMESH, M. V., SREEDEVI, A. G., KANDASAMY, K. & RANGAN, P. V.


2012. Energy comparison of balanced and progressive sensor networks. WOCC.
IEEE.

RIZVANDI, N. B., TAHERI, J., MORAVEJI, R. & ZOMAYA, A. Y. Network


Load Analysis and Provisioning of MapReduce Applications. Parallel and
Distributed Computing, Applications and Technologies (PDCAT), 2012 13th
International Conference on, 14-16 Dec. 2012 2012. 161-166.

S. K. NARANG, G. S., AND A. ORTEGA. March 2010. Unidirectional graph-


based wavelet transforms for efficient data gathering in sensor networks. IEEE
International Conference on Acoustics Speech and Signal Processing (ICASSP
2010).

S. KUMAR, A. September 8, 2011.


http://www.cs.memphis.edu/~santosh/AutoSense.html: NIHGEI project at The
University of Memphis, 2007.

S. PARK, W. L., AND D.-H. CHO. 2012. Fair clustering for energy efficiency in a
cooperative wireless sensor network. In 75th IEEE Conference on Vehicular
Technology.

SALHIEH, A., WEINMANN, J., KOCHHAL, M. & SCHWIEBERT, L. 2001.


Power Efficient Topologies for Wireless Sensor Networks. International
Conference on Parallel Processing.

SANKARASUBRAMANIAM, Y., ZG,AKAN, R. B. & AKYILDIZ, I. F. 2003.


ESRT: event-to-sink reliable transport in wireless sensor networks. Proceedings of
the 4th ACM international symposium on Mobile ad hoc networking &amp;
computing. Annapolis, Maryland, USA: ACM.

SCHAAR, M. V. D. & SHANKAR, N. S. 2005. Cross layer wireless multimedia


transmission challenges, principles and new paradigms. IEEE Wireless
Communications Magazine,, 12, 50-58.
42
SCHEUERMANN, B., LOCHERT, C. & MAUVE, M. 2008. Implicit hop-by-hop
congestion control in wireless multihop networks. Ad Hoc Netw., 6, 260-286.

SHAH, R. C. & RABAEY, J. M. 2002. Energy aware routing for low energy ad
hoc sensor networks.
IEEE Conference on Wireless Communications and Networking.

SHAKKOTTAI, S., RAPPAPORT, T. S. & KARLSSON, P. C. 2003. Cross-Layer


Design for Wireless Networks. IEEE Communications Magazine, 41, 74-80.

SHAOQING, W. & JINGNAN, N. 2010. Energy efficiency optimization of


cooperative communication in wireless sensor networks. EURASIP J. Wirel.
Commun. Netw., 2010, 1-8.

SHARMA, A. 2014. How does random forest work for


regression? [Online]. Available:
https://www.quora.com/How-does-random-forest-work-for-regression-1.

SRAVAN, A., KUNDU, S. & PAL, A. 2007. Low Power Sensor Node for a
Wireless Sensor Network.
20th International IEEE Conference on VLSI Design.

SVEDA, M. & TRCHALIK, R. ZigBee-to-Internet Interconnection


Architectures. Systems,
2007.
ICONS '07. Second International Conference on, 22-28 April 2007 2007. 30-30.

TIAN, Y., JARUPAN, B., EKICI, E. & ÖZGÜNER, F. 2006. Real-time task
mapping and scheduling for collaborative in-network processing in DVS-enabled
wireless sensor networks. . IPDPS. IEEE.

TWALA, B. 2014. Reasoning with Noisy Software Effort Data. Appl. Artif. Intell.,
28, 533-554.

WAN, P.-J., CALINESCU, G., LI, X.-Y. & FRIEDER, O. 2002. Minimum-energy
broadcast routing in static ad hoc wireless networks. ACM Wireless Networks.

43
WANG, Q., HEMPSTEAD, M. & YANG, W. A Realistic Power Consumption
Model for Wireless Sensor Network Devices. Third Annual IEEE Communications
Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks
(IEEE SECON 2006), 2006a VA, USA. IEEE, 286-295.

WANG, Q., HEMPSTEAD, M. & YANG, W. A Realistic Power Consumption


Model for Wireless Sensor Network Devices. Third Annual IEEE Communications
Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks
(IEEE SECON 2006), 2006b VA, USA. IEEE, 286-295.

WEDDELL, A. S., HARRIS, N. R. & WHITE, N. M. Alternative Energy Sources


for Sensor Nodes: Rationalized Design for Long-Term Deployment. IEEE
Instrumentation and Measurement Technology Conference Proceedings, 12-15
May 2008. 1370-1375.

WERNER-ALLEN, G., LORINCZ, K., WELSH, M., MARCILLO, O.,


JOHNSON, J., RUIZ, M. & LEES, J. 2006. Deploying a Wireless Sensor Network
on an Active Volcano. IEEE Internet Computing, 10, 18-25.

WOOD, A., VIRONE, G., DOAN, T., CAO, Q., SELAVO, L., WU, Y., FANG,
L., HE, Z., LIN, S., STANKOVIC, J., 2006. ALARM-NET: wireless sensor
networks for assisted-living and residential monitoring; . In: CS-2006-01, T. R.
(ed.). Department of Computer Science, University of Virginia: Charlottesville,
VA, USA.

XU, S. & SAADAWI, T. 2001. Does the IEEE 802.11 MAC protocol work well in
multihop wireless ad hoc networks? Comm. Mag., 39, 130-137.

XU, Y., BIEN, S., MORI, Y., HEIDEMANN, J. & ESTRIN, D. 2003. Topology
Control Protocols to Conserve Energy in Wireless Ad Hoc Networks. California:
Center for Embedded Networked Computing.

YIN, G., YANG, G., WU, Y. & ZHANG, B. 2008. Energy-Efficient Routing
Algorithms for Wireless Sensor Networks. Internet Computing in Science and
Engineering, 2008. ICICSE '08. Harbin: IEEE.

YOUNG HAN NAM , INTERDISCIPLINARY PROGRAM IN MED., BIOL.


ENG. MAJOR, SEOUL NAT. UNIV, SOUTH KOREA , CHEE, Z. H. Y. J. &
PARK, K. S. 29 Oct-1 Nov 1998. Development of remote diagnosis system

44
integrating digital telemetry for medicine. Engineering in Medicine and Biology
Society, 1998. Proceedings of the 20th Annual International Conference of the
IEEE 3

YOUNIS., K. A. A. M. 2005. A survey on routing protocols for wireless sensor


networks. The Journal of Ad Hoc Networks, 3, 325-349.

Z. TAN, Y. L., AND Z. ZHANG. March 2011. Performance requirement on


energy efficiency in WSNs.
In 3rd International IEEE Conference on Computer Research and Development
(ICCRD).

ZHANG, L., YANG, W., RAO, Q., NAI, W. & DONG, D. 2013. An Energy
Saving Topology management Algorithm Based on Dijkstra in Wireless Sensor
Networks. Journal of Information & Computational Science. IEEE Computer
Society.

45

You might also like