Structural Health Monitoring Sukun Kim, David Culler James Demmel, Gregory Fenves, Steve Glaser Thomas Oberheim, Shamim Pakzad UC Berkeley NEST Retreat.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Medium Access Issues David Holmer
24-1 Chapter 24. Congestion Control and Quality of Service (part 1) 23.1 Data Traffic 23.2 Congestion 23.3 Congestion Control 23.4 Two Examples.
NET0183 Networks and Communications Lecture 28 TCP: a transport layer protocol... the story continues... Sagan halda áfram 8/25/20091 NET0183 Networks.
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Router Buffer Sizing and Reliability Challenges in Multicast Aditya Akella 02/28.
Chapter 11 Data Link Control
Performance Improvement of TCP in Wireless Cellular Network Based on Acknowledgement Control Osaka University Masahiro Miyoshi, Masashi Sugano, Masayuki.
Introduction 1 Lecture 14 Transport Layer (Transmission Control Protocol) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer.
Receiver-driven Layered Multicast S. McCanne, V. Jacobsen and M. Vetterli SIGCOMM 1996.
Transport Layer 3-1 Fast Retransmit r time-out period often relatively long: m long delay before resending lost packet r detect lost segments via duplicate.
Transport Layer 3-1 Transport Layer r To learn about transport layer protocols in the Internet: m TCP: connection-oriented protocol m Reliability protocol.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
CSEE W4140 Networking Laboratory Lecture 7: TCP flow control and congestion control Jong Yul Kim
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Structural Health Monitoring of the Golden Gate Bridge Sukun Kim, David Culler James Demmel, Gregory Fenves, Steve Glaser Thomas Oberheim, Shamim Pakzad.
CSEE W4140 Networking Laboratory Lecture 7: TCP congestion control Jong Yul Kim
1 Chapter 3 Transport Layer. 2 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4.
Findings in Reliable Bulk Data Transfer Experiments GGB project Sukun Kim, David Culler, James Demmel, Gregory Fenves, Steve Glaser, Shamim Pakzad NEST.
Data Communication and Networks
17/10/2003TCP performance over ad-hoc mobile networks. 1 LCCN – summer 2003 Uri Silbershtein Roi Dayagi Nir Hasson.
Structural Health Monitoring of the Golden Gate Bridge Sukun Kim, David Culler James Demmel, Gregory Fenves, Steve Glaser Thomas Oberheim, Shamim Pakzad.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
Timing-sync Protocol for Sensor Networks (TPSN) Presenter: Ke Gao Instructor: Yingshu Li.
Computer Measurement Group, India Reliable and Scalable Data Streaming in Multi-Hop Architecture Sudhir Sangra, BMC Software Lalit.
Courtesy: Nick McKeown, Stanford 1 TCP Congestion Control Tahir Azim.
Data Transfer Case Study: TCP  Go-back N ARQ  32-bit sequence # indicates byte number in stream  transfers a byte stream, not fixed size user blocks.
Transport Layer3-1 Chapter 3 outline r 3.1 Transport-layer services r 3.2 Multiplexing and demultiplexing r 3.3 Connectionless transport: UDP r 3.4 Principles.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
CS540/TE630 Computer Network Architecture Spring 2009 Tu/Th 10:30am-Noon Sue Moon.
BMAC - Versatile Low Power Media Access for Wireless Sensor Networks.
Data Link Layer We have now discussed the prevalent shared channel technologies  Ethernet/IEEE  Wireless LANs (802.11) We have now covered chapters.
Implementation of Decentralized Damage Localization in Wireless Sensor Networks Fei Sun Master Project Advisor: Dr. Chenyang Lu.
Chapter 12 Transmission Control Protocol (TCP)
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
11.1 Chapter 11 Data Link Control Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
Multiple Access.
Versatile Low Power Media Access for Wireless Sensor Networks Sarat Chandra Subramaniam.
Multi-channel Wireless Sensor Network MAC protocol based on dynamic route.
Winter 2008CS244a Handout 71 CS244a: An Introduction to Computer Networks Handout 7: Congestion Control Nick McKeown Professor of Electrical Engineering.
A+MAC: A Streamlined Variable Duty-Cycle MAC Protocol for Wireless Sensor Networks 1 Sang Hoon Lee, 2 Byung Joon Park and 1 Lynn Choi 1 School of Electrical.
TCP OVER ADHOC NETWORK. TCP Basics TCP (Transmission Control Protocol) was designed to provide reliable end-to-end delivery of data over unreliable networks.
Chapter Two Fundamentals of Data and Signals Data Communications and Computer Networks: A Business User's Approach Eighth Edition.
Data Transfer Case Study: TCP  Go-back N ARQ  32-bit sequence # indicates byte number in stream  transfers a byte stream, not fixed size user blocks.
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
Data Link Layer Flow and Error Control. Flow Control Flow Control Flow Control Specifies the amount of data can be transmitted by sender before receiving.
Congestion Control: UDP. What is Congestion Control? Refers to the management of packet loss and signal degradation Handled by both Network and Transport.
Transmission Control Protocol (TCP) TCP Flow Control and Congestion Control CS 60008: Internet Architecture and Protocols Department of CSE, IIT Kharagpur.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
DATA LINK CONTROL. DATA LINK LAYER RESPONSIBILTIES  FRAMING  ERROR CONTROL  FLOW CONTROL.
Data Link Layer.
Reliable Transmission
Chapter Two Fundamentals of Data and Signals
Topics discussed in this section:
Chapter 3 outline 3.1 transport-layer services
Structural Health Monitoring
TCP - Part II Relates to Lab 5. This is an extended module that covers TCP flow control, congestion control, and error control in TCP.
TCP over SoNIC Abhishek Kumar Maurya
The Impact of Multihop Wireless Channel on TCP Performance
Chapter 11 Data Link Control
Chapter-5 Traffic Engineering.
Transport Layer: Congestion Control
Chapter 3 outline 3.1 Transport-layer services
Error Checking continued
Presentation transcript:

Structural Health Monitoring Sukun Kim, David Culler James Demmel, Gregory Fenves, Steve Glaser Thomas Oberheim, Shamim Pakzad UC Berkeley NEST Retreat – Jun 4, 2004

Structure Monitoring Data Acquisition Data Collection Processing & Feedback

Overview Low cost structure monitoring - Monitor structure, and analyze the health of structure based on sensed data at low cost Low cost structure monitoring - Monitor structure, and analyze the health of structure based on sensed data at low cost For Golden Gate Bridge, monitor vibration of bridge, and detect unusual behavior by wind, earthquake, or local damage For Golden Gate Bridge, monitor vibration of bridge, and detect unusual behavior by wind, earthquake, or local damage Extend reach of Wireless Sensor Network in a different direction – high fidelity sampling Extend reach of Wireless Sensor Network in a different direction – high fidelity sampling High accuracy, high frequency with low jitter, large amount of data High accuracy, high frequency with low jitter, large amount of data

Challenges Data Acquisition Data Acquisition Accelerometer Board Accelerometer Board High Frequency Sampling & Jitter High Frequency Sampling & Jitter Data Collection Data Collection Large-scale Reliable Data Transfer Large-scale Reliable Data Transfer Signal processing & System Identification Signal processing & System Identification

Accelerometer Board ADXL 202ESilicon Designs 1221L Range-2G ~ 2G-0.1G ~ 0.1G System noise floor200(μG/√Hz)30(μG/√Hz) Price$10$150 Both accelerometers for two axis Both accelerometers for two axis Thermometer Thermometer 16bit ADC 16bit ADC

HighFrequencySampling Jitter Histogram 0μs0μs10μs Sampling Other job Non-preemptible portion (atomic section) Preemptible task portion

Large-scale Reliable Transfer Explicit open handshake - Data description and size of cluster is sent as a transfer request Explicit open handshake - Data description and size of cluster is sent as a transfer request Data transfer is composed of multiple rounds. In each round, sender sends packets missing in the previous round Data transfer is composed of multiple rounds. In each round, sender sends packets missing in the previous round Tear-down is implicit Tear-down is implicit Sender Receiver Open Ack for Open Ack for Data Block 1 Data Block 2 Data Block 3 Data Block 4 DONE

Considering loss rate of 3%, actual relative throughput is 91%, which is higher than 85% of channel utilization ratio. This is because control packets do not follow 10 packets/s. Considering loss rate of 3%, actual relative throughput is 91%, which is higher than 85% of channel utilization ratio. This is because control packets do not follow 10 packets/s. Throttle for data packet is fixed at 10 pkt/s Throttle for data packet is fixed at 10 pkt/s Optimal case: window size is infinite Optimal case: window size is infinite For the case with window size 16, throughput is 88% of optimal case. For the case with window size 16, throughput is 88% of optimal case.

Status Measure acceleration from multiple boards synchronously Measure acceleration from multiple boards synchronously Sather tower Sather tower PowerBar building PowerBar building Data is available on the web Data is available on the web

Questions

Signal Processing and System Identification Signal Processing Signal Processing Analog low-pass filter with threshold frequency 25Hz is used Analog low-pass filter with threshold frequency 25Hz is used Averaging is used. If noise follows Gaussian distribution, by averaging N numbers, noise decreases by a factor of sqrt(N) Averaging is used. If noise follows Gaussian distribution, by averaging N numbers, noise decreases by a factor of sqrt(N) System Identification System Identification Identifying model of target system Identifying model of target system By matching input to system and output from system, construct a mathematical system model (Box-Jenkins multi-input multi-output model) By matching input to system and output from system, construct a mathematical system model (Box-Jenkins multi-input multi-output model)

Conclusion New challenges are analyzed which are brought by structure monitoring to wireless sensor network New challenges are analyzed which are brought by structure monitoring to wireless sensor network High accuracy accelerometer, high frequency sampling with low jitter, low-pass filter, averaging, large-scale reliable data collection High accuracy accelerometer, high frequency sampling with low jitter, low-pass filter, averaging, large-scale reliable data collection Temperature Gravity Variation Accelerometer variation Acoustic Noise nG μGμG mG G Challenges versus Accuracy Local Damage Detection Large Scale Earthquake Nuclear Test Detection Traffic Identification nG μGμG mG G Possible Applications versus Accuracy

Table of Contents Overview Overview Data Acquisition Data Acquisition Accelerometer Board Accelerometer Board High Frequency Sampling & Jitter High Frequency Sampling & Jitter Data Collection Data Collection Large-scale Reliable Data Transfer Large-scale Reliable Data Transfer Signal processing & System Identification Signal processing & System Identification Conclusion Conclusion Challenges & Future Work Challenges & Future Work

HighFrequencySampling Made by David Gay Made by David Gay Up to 6.67KHz with 4 bytes sample Up to 6.67KHz with 4 bytes sample MicroTimer – Supports one timer, micro second level granularity MicroTimer – Supports one timer, micro second level granularity BufferLog – Has two buffers. One is filled up by upper layer application while the other buffer is written to flash memory as a background task BufferLog – Has two buffers. One is filled up by upper layer application while the other buffer is written to flash memory as a background task

Jitter Test (1KHz, 5KHz, 6.67KHz) Peak to Peak is time to fill up buffer Peak to Peak is time to fill up buffer Spiky portion is time to write buffer to flash Spiky portion is time to write buffer to flash Can sample as long as the former is larger than the latter Can sample as long as the former is larger than the latter

Jitter Test Histogram (1KHz, 5KHz, 6.67KHz) Jitter is within 10µs Jitter is within 10µs Peak at 625ns – Wakeup time from sleep mode Peak at 625ns – Wakeup time from sleep mode

Jitter Analysis Sampling Other job Non-preemptible portion (atomic section) Preemptible task portion Jitter Sample CC+T(k1)C+T(k2)... F(k2) F(k3)

Table of Contents Overview Overview Data Acquisition Data Acquisition Accelerometer Board Accelerometer Board High Frequency Sampling & Jitter High Frequency Sampling & Jitter Data Collection Data Collection Large-scale Reliable Data Transfer Large-scale Reliable Data Transfer Signal processing & System Identification Signal processing & System Identification Conclusion Conclusion Challenges & Future Work Challenges & Future Work

Large-scale Reliable Data Transfer 4Byte of data and 4Byte of time stamp at 100Hz in 100 nodes, transfer 40pkt/s – Sample data for 5 minutes, and collect data for more than 5 hours!!! 4Byte of data and 4Byte of time stamp at 100Hz in 100 nodes, transfer 40pkt/s – Sample data for 5 minutes, and collect data for more than 5 hours!!! Efficient and reliable data transfer is crucial Efficient and reliable data transfer is crucial RAM to RAM one-hop transfer is implemented as a building block - LRX RAM to RAM one-hop transfer is implemented as a building block - LRX

LRX component (continued) Explicit open handshake - Data description and size of cluster is sent as a transfer request Explicit open handshake - Data description and size of cluster is sent as a transfer request Data transfer is composed of multiple rounds. In each round, sender sends packets missing in the previous round Data transfer is composed of multiple rounds. In each round, sender sends packets missing in the previous round Tear-down is implicit Tear-down is implicit Sender Receiver Open Ack for Open Ack for Data Block 1 Data Block 2 Data Block 3 Data Block 4 DONE

Considering loss rate of 3%, actual relative throughput is 91%, which is higher than 85% of channel utilization ratio. This is because control packets do not follow 10 packets/s. Considering loss rate of 3%, actual relative throughput is 91%, which is higher than 85% of channel utilization ratio. This is because control packets do not follow 10 packets/s. Throttle for data packet is fixed at 10 pkt/s Throttle for data packet is fixed at 10 pkt/s Optimal case: window size is infinite Optimal case: window size is infinite For the case with window size 16, throughput is 88% of optimal case. For the case with window size 16, throughput is 88% of optimal case.

As loss rate increases, retransmission increases, and throughput decreases As loss rate increases, retransmission increases, and throughput decreases

Channel Utilization TOS_MsgLRX (only data)LRX (Window Size 16) Total Data (bytes) Meta Data (bytes) Real Data (bytes) Channel Utilization (%) Comparison to TOS_Msg (%) LRX (data only) is the theoretical limit of LRX (when window size is infinite) LRX (data only) is the theoretical limit of LRX (when window size is infinite) Usage LRX lowers channel utilization by 15% Usage LRX lowers channel utilization by 15%

Table of Contents Overview Overview Data Acquisition Data Acquisition Accelerometer Board Accelerometer Board High Frequency Sampling & Jitter High Frequency Sampling & Jitter Data Collection Data Collection Large-scale Reliable Data Transfer Large-scale Reliable Data Transfer Signal processing & System Identification Signal processing & System Identification Conclusion Conclusion Challenges & Future Work Challenges & Future Work

Signal Processing As an analog signal processing low-pass filter is used, which filters high frequency noise As an analog signal processing low-pass filter is used, which filters high frequency noise For accelerometer board, low-pass filter with threshold frequency 25Hz is used. Then ADC should sample at frequency much higher than 50Hz by Nyquist theorem, and imperfect low- pass filter For accelerometer board, low-pass filter with threshold frequency 25Hz is used. Then ADC should sample at frequency much higher than 50Hz by Nyquist theorem, and imperfect low- pass filter As a digital signal processing, averaging is used. If noise follows Gaussian distribution, by averaging N numbers, noise decreases by a factor of sqrt(N) As a digital signal processing, averaging is used. If noise follows Gaussian distribution, by averaging N numbers, noise decreases by a factor of sqrt(N)

System Identification Identifying model of target system Identifying model of target system By matching input to system and output from system, we can construct a mathematical system model. By matching input to system and output from system, we can construct a mathematical system model. Usual process is (1) fitting a general Box-Jenkins multi-input multi-output model to sampled data. (2) And natural frequencies, damping ratios and mode shape are then estimated using the estimated Box-Jenkins model. Usual process is (1) fitting a general Box-Jenkins multi-input multi-output model to sampled data. (2) And natural frequencies, damping ratios and mode shape are then estimated using the estimated Box-Jenkins model. Most part of system identification is under development on civil engineering side. Most part of system identification is under development on civil engineering side.

Table of Contents Overview Overview Data Acquisition Data Acquisition Accelerometer Board Accelerometer Board High Frequency Sampling & Jitter High Frequency Sampling & Jitter Data Collection Data Collection Large-scale Reliable Data Transfer Large-scale Reliable Data Transfer Signal processing & System Identification Signal processing & System Identification Conclusion Conclusion Challenges & Future Work Challenges & Future Work

Conclusion New challenges are analyzed which are brought by structure monitoring to wireless sensor network New challenges are analyzed which are brought by structure monitoring to wireless sensor network High accuracy accelerometer, high frequency sampling with low jitter, low-pass filter, averaging, large-scale reliable data collection High accuracy accelerometer, high frequency sampling with low jitter, low-pass filter, averaging, large-scale reliable data collection Temperature Gravity Variation Accelerometer variation Acoustic Noise nG μGμG mG G Challenges versus Accuracy Local Damage Detection Large Scale Earthquake Nuclear Test Detection Traffic Identification nG μGμG mG G Possible Applications versus Accuracy

Table of Contents Overview Overview Data Acquisition Data Acquisition Accelerometer Board Accelerometer Board High Frequency Sampling & Jitter High Frequency Sampling & Jitter Data Collection Data Collection Large-scale Reliable Data Transfer Large-scale Reliable Data Transfer Signal processing & System Identification Signal processing & System Identification Conclusion Conclusion Challenges & Future Work Challenges & Future Work

Challenges & Future Work Calibrating acceleration value to temperature Calibrating acceleration value to temperature Time synchronization – RBS, TPSN Time synchronization – RBS, TPSN To maximize utility of channel, we need to monitor channel quality (loss rate), and throttle packet injection rate accordingly To maximize utility of channel, we need to monitor channel quality (loss rate), and throttle packet injection rate accordingly Using LRX as a building block, multi-hop data collection need be implemented Using LRX as a building block, multi-hop data collection need be implemented TASK TASK

Backup Slides

Cost Comparison Conventional piezoelectric accelerometer with PC system costs $40,000 Conventional piezoelectric accelerometer with PC system costs $40,000 Budget for structure monitoring budget is $1,000,000 level Budget for structure monitoring budget is $1,000,000 level Wireless sensor network with MEM accelerometer costs $500 Wireless sensor network with MEM accelerometer costs $500 Cheaper by a factor of 100 Cheaper by a factor of 100

Shaking Table Test Silicon Design 1221L is more quite, but less sensitive to dynamic movement Silicon Design 1221L is more quite, but less sensitive to dynamic movement

Noise Floor Test Blue – Seismic Vault Blue – Seismic Vault Red – McCone Hall Red – McCone Hall

Jitter Analysis (continued) Assume that the probability of timer event occurring at any point in atomic section i is same, then jitter will follow C+X(i). Assume that the probability of timer event occurring at any point in atomic section i is same, then jitter will follow C+X(i). Since jitter distribution of every atomic section begins from C, the frequency is highest near C and decreases as moving farther. And frequency drop at C+T(i) by F(i), since atomic section i will not have any distribution beyond C+T(i). Since jitter distribution of every atomic section begins from C, the frequency is highest near C and decreases as moving farther. And frequency drop at C+T(i) by F(i), since atomic section i will not have any distribution beyond C+T(i). Actually there is a peak at C, because when program is in preemptible section, it will immediately service timer event after context switch time C. Actually there is a peak at C, because when program is in preemptible section, it will immediately service timer event after context switch time C. Jitter Sample CC+T(k1)C+T(k2)... F(k2) F(k3) T(i): execution time of atomic section i T(i): execution time of atomic section i X(i): a random variable uniformly distributed in [0, T(i)] X(i): a random variable uniformly distributed in [0, T(i)] C: context switch time C: context switch time F(i): frequency of occurrence of atomic section i F(i): frequency of occurrence of atomic section i

Calculation of Transfer Timer Let us assume each node store 4Byte of data and 4Byte of time stamp at 100Hz. And assume there are 100 nodes, radio throughput is 1.2KB/s, and data is collected to one base station. If acceleration data worthy 5 minutes is collected, each node will transfer 240,000Bytes. 100 nodes will transfer 24,000,000Bytes. Since the end link to base station is a bottleneck, it will take more than 5 hours. We can see bandwidth is narrow compared to aggressive data sampling. Even if we alleviate this problem using multi-channel or multi- tier network, still we will be in short of bandwidth. Let us assume each node store 4Byte of data and 4Byte of time stamp at 100Hz. And assume there are 100 nodes, radio throughput is 1.2KB/s, and data is collected to one base station. If acceleration data worthy 5 minutes is collected, each node will transfer 240,000Bytes. 100 nodes will transfer 24,000,000Bytes. Since the end link to base station is a bottleneck, it will take more than 5 hours. We can see bandwidth is narrow compared to aggressive data sampling. Even if we alleviate this problem using multi-channel or multi- tier network, still we will be in short of bandwidth.

LRX component Transfers one data cluster, which is composed of several blocks. Transfers one data cluster, which is composed of several blocks. One block fits into one packet, so the number of blocks is equal to window size. One block fits into one packet, so the number of blocks is equal to window size. Each data cluster has a data description. After looking at data description, receiver may deny data (receiver already has that data, or that data is not useful anymore). Each data cluster has a data description. After looking at data description, receiver may deny data (receiver already has that data, or that data is not useful anymore).

Sender

Receiver

Sender Receiver Open Ack for Open Ack for Data Block 1 Data Block 2 Data Block 3 Data Block 4 DONE

Sender Receiver Open Data Block 1 Data Block 2 Open Ack for Open

Sender Receiver Open Data Block 1 Data Block 2 Open Ack for Open Ack for Open

Sender Receiver Ack for Data Block 1 Data Block 2 Data Block 3 Data Block 4 DONE Data Block 2 Ack for Data

Sender Receiver Ack for Data Block 1 Data Block 2 Data Block 3 Data Block 4 DONE Data Block 4 Ack for Data

Sender Receiver Data Block 1 Data Block 2 Data Block 3 Data Block 4 DONE Data Block 4 Ack for Data DONE

Sender Receiver Ack for Data Block 1 Data Block 2 Data Block 3 Data Block 4 Data Block 2 Ack for Data Block 3

Why Sender times out There are two reasons why only sender times out and stimulate receiver for Ack. The first reason is shown in Figure 16. If sender doesn’t time out, for a receiver to make sure Ack is delivered to sender, receiver should get acknowledgement from sender for Ack itself. This is not good. So it is clear that sender should timeout. Given that sender times out, timeout of receiver makes no difference except that channel is wasted by unnecessary Ack from receiver. So timeout in only sender side is desirable. As a second reason, if receiver times out, in case like Figure 18 (if first Data after Ack is lost), second Data always collide with resent Ack of receiver. This is not a good phenomenon. Therefore, after sending last packet in each round, if acknowledgement does not come, sender sends the last packet in that round again to stimulate acknowledgement. However, this does not mean receiver has no timeout. Receiver waits sufficient amount of time, and if nothing happens, it regards the situation as a failure. There are two reasons why only sender times out and stimulate receiver for Ack. The first reason is shown in Figure 16. If sender doesn’t time out, for a receiver to make sure Ack is delivered to sender, receiver should get acknowledgement from sender for Ack itself. This is not good. So it is clear that sender should timeout. Given that sender times out, timeout of receiver makes no difference except that channel is wasted by unnecessary Ack from receiver. So timeout in only sender side is desirable. As a second reason, if receiver times out, in case like Figure 18 (if first Data after Ack is lost), second Data always collide with resent Ack of receiver. This is not a good phenomenon. Therefore, after sending last packet in each round, if acknowledgement does not come, sender sends the last packet in that round again to stimulate acknowledgement. However, this does not mean receiver has no timeout. Receiver waits sufficient amount of time, and if nothing happens, it regards the situation as a failure.

Imperfect Low-pass Filter Frequency Amplitude Filtering threshold

Time Synchronization Temporal jitter is handled by high frequency sampling component. Spatial jitter should be solved by time synchronization. ITP [8] is a time synchronization protocol widely used in Internet. In wireless sensor network, there were several studies. In RBS [9], synchronization is done among receivers, eliminating sender’s jitter in media access. TPSN [10] put time stamp after obtaining channel. This gives even better synchronization accuracy than RBS (10μs compared to 20μs). Still there is a source of jitter at receiver side. As we saw in jitter for sampling, handling interrupt by radio can be delayed by atomic section of other activity. As suggested in [10], putting time stamp at MAC layer in receiver side will eliminate this jitter. Temporal jitter is handled by high frequency sampling component. Spatial jitter should be solved by time synchronization. ITP [8] is a time synchronization protocol widely used in Internet. In wireless sensor network, there were several studies. In RBS [9], synchronization is done among receivers, eliminating sender’s jitter in media access. TPSN [10] put time stamp after obtaining channel. This gives even better synchronization accuracy than RBS (10μs compared to 20μs). Still there is a source of jitter at receiver side. As we saw in jitter for sampling, handling interrupt by radio can be delayed by atomic section of other activity. As suggested in [10], putting time stamp at MAC layer in receiver side will eliminate this jitter.

Table of Contents Overview Overview Data Acquisition Data Acquisition Accelerometer Board Accelerometer Board High Frequency Sampling & Jitter High Frequency Sampling & Jitter Data Collection Data Collection Large-scale Reliable Data Transfer Large-scale Reliable Data Transfer Signal processing & System Identification Signal processing & System Identification Conclusion Conclusion Challenges & Future Work Challenges & Future Work

Acknowledgement This work is supported, in part, by the National Science Foundation under Grant No. EIA This work is supported, in part, by the National Science Foundation under Grant No. EIA