Case studies of distributed embedded systems Dr. Konstantinos Tatas.

Slides:



Advertisements
Similar presentations
Internet Of Things What is IOT all about The Internet of Things (IoT) incorporates physical devices into business processes using predictive analytics.
Advertisements

Presented by : Poorya Ghafoorpoor Yazdi Eastern Mediterranean University Mechanical Engineering Department Master Thesis Presentation Eastern Mediterranean.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
Introduction to Cyber Physical Systems Yuping Dong Sep. 21, 2009.
. Smart Cities and the Ageing Population Sustainable smart cities: from vision to reality 13 October ITU, Geneva Knud Erik Skouby, CMI/ Aalborg University-Cph.
Arsitektur Jaringan Terkini
45 nm transistor 45nm =.045um (microns)= 450 Angstroms.
Research Directions for the Internet of Things Supervised by: Dr. Nouh Sabry Presented by: Ahmed Mohamed Sayed.
Embedded XINU and Beyond B. Ramamurthy. Embedded XINU Platform WRT54GL Understand the various components CPU, different types of memory, its classification.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
POLITECNICO DI TORINO TRIBUTE and DIMMER. DIMMER - The context One of the major challenges in today’s economy concerns the reduction in energy usage and.
Introduction To Wireless Sensor Networks Wireless Sensor Networks A wireless sensor network (WSN) is a wireless network consisting of spatially distributed.
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
Sensor Networks Lecture 7. Sensor Networks Special case of the general ad hoc networking problem Much more resource constrained than a network of PDAs.
Home Health Care and Assisted Living John Stankovic, Sang Son, Kamin Whitehouse A.Wood, Z. He, Y. Wu, T. Hnat, S. Lin, V. Srinivasan AlarmNet is a wireless.
Learning Micro-Behaviors In Support of Cognitive Assistance AlarmNet is a wireless sensor network (WSN) system for smart health-care that opens up new.
INTERNET OF THINGS SUBBAIYA VASU UDAYARAJAN UOTTAWA CSI 5169 WIRELESS NETWORKS AND MOBILE COMPUTING SUBMITTED TO: PROFESSOR STOJMENOVIC.
Ch.2. Ubiquitous IoT Applications
Smart Grid Technologies Damon Dougherty – Industry Manager.
Ch. 1. The Third ICT Wave The Third ICT Wave.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
Internet de las Cosas The Internet of Things (IoT) Internet der Dinge Internet des Objects.
Introduction to Wireless Sensor Networks
Multimedia & Networking Lab
Microcontroller-Based Wireless Sensor Networks
Opportunities in M-Commerce Standards & Applications Nour El Kadri University of Ottawa.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
IoT, Big Data and Emerging Technologies
45 nm transistor 45nm =.045um (microns)= 450 Angstroms.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Wireless Sensor Network Wireless Sensor Network Based.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
Lecture 8: Wireless Sensor Networks
Internet of Things (Ref: Slideshare)
1 /10 Pascal URIEN, IETF 76 th, Monday November 9 th Hiroshima Japan draft-urien-hip-iot-00.txt HIP support for RFID
IoT Primer Stephen Bates | Energy Huntsville: Tues 15 Dec
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
Wireless Ad Hoc Networks
Wireless sensor and actor networks: research challenges
Wikipedia Edit. Internet of Things It is the idea of enabling everyday objects with software, sensors and network connectivity. The connectivity would.
Wireless Sensor Networks
Mark Gaynor and Bryan Duepner  Mark Gaynor, PhD – Saint Louis University School of Public Health, St. Louis, MO Associate Professor, Department of Health.
Ubiquitous means ‘everywhere’
Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends Prepared by: Ameer Sameer Hamood University of Babylon - Iraq Information.
CPET 565 Mobile Computing Systems Lecture 2 Introduction to Wireless Communication and Networking (2) Hongli Luo Indiana University-Purdue University Fort.
Fire Fighting Robotic Vehicle. Introduction:  It is designed to develop a fire fighting robot using RF technology for remote.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
Internet of Things – Getting Started
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
Wireless sensor networks: a survey
Personal Home Healthcare System for the Cardiac Patient of Smart City Using Fuzzy Logic Shijia Liu.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
Remarks by Dr Mawaki Chango Kara University DigiLexis Consulting
Internet of Things.
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Overview of Wireless Networks:
Radio Frequency Identification (RFID)
UNIT II –Part 2.
Bluetooth Based Smart Sensor Network
Adhoc and Wireless Sensor Networks
Lecture 3: Wireless Sensor Networks
Internet of Things (IoT) for Industrial Development and Automation
Internet of Things (IoT)
Welcome to The World of Internet of Things
Presentation transcript:

Case studies of distributed embedded systems Dr. Konstantinos Tatas

Outline Case study 1: RFID Case study 2: Wireless sensor networks Case study 3: Internet of things

RFID Tags Developed to automate the process of object identification electronic tags (called RFID tags) can be read from a small distance by an RFID reader An RFID reader does not require a direct line-of- sight to the RFID tag. The RFID tag stores the unique Electronic Product Code (EPC) of the attached object.

RFID Tag dimensions Since an RFID tag has to be attached to every object, the cost of an RFID tag is a major issue. RFID tags come in various shapes and sizes and continue to decrease in size RFID tags are implantable and implants have been approved in humans as well as animals.

RFID Reader The RFID reader can act as a gateway to the Internet and transmit the object identity, together with the read-time and the object location (i.e., the location of the reader) to a remote computer system that manages a large database. It is thus possible to track objects in real-time Applications: toll gates, hospitals and large organizations, public transportation systems, tracking of animals, libraries

Electronic product code A typical EPC has a length of 96 bits and contains the following fields: –Header (8 bits): defines the type and the length of all subsequent fields. –EPC Manager (28 bits): specifies the entity (most often the manufacturer) that assigns the object class and serial number in the remaining two fields. –Object Class (24 bits): specifies a class of objects (similar to the optical bar code). –Object Identification Number (36 bits): contains the serial number within theobject class. The EPC is unique product identification, but does not reveal anything about the properties of the product. Two things that have the same properties, but are designed by two different manufacturers, will have completely different EPCs.

Passive RFID tags Passive RFID Tags. No power supply. They get the power needed for their operation from energy harvested out of the electric field that is beamed on them by the RFID reader. The energy required to operate a passive tag of the latest generation is below 30 mW and the cost of such a tag is below 5 ¢. Due to the low level of the available power and the cost pressure on the production of RFID tags, the communication protocols of passive RFID tags do not conform to the standard Internet protocols. Specially designed communication protocols between the RFID tag and the RFID reader that consider the constraints of passive RFID tags have been standardized by the ISO (e.g., ISO C also known as the EPC global Gen 2) and are supported by a number of manufacturers.

Active RFID tags Active RFID Tags –have their own on-board power supply –The lifetime of an active tag is limited by the lifetime of the battery –typically in the order of a year. Active tags can transmit and receive over a longer distance –typically in the order of hundreds of meters, –can have sensors to monitor their environment –sometimes support standard Internet communication protocols. An active RFID tag resembles a small embedded system –More expensive

WSN A set of sensor nodes that each contains –a sensor –a microcontroller –a wireless communication controller

WSN node A sensor node can acquire a variety of physical, chemical, or biological signals to measure properties of its environment.

WSN node constraints Sensor nodes are resource constrained. –They are powered either by a small battery or by energy harvested from its environment, –have limited computational power, a small memory, and constrained communication capabilities.

WSN deployment and operation a number (from few tens to millions) of sensor nodes are deployed, either systematically or randomly, in a sensor field to form an ad hoc self-organizing network The WSN collects data about the targeted phenomenon and transmits the data via an ad- hoc multi-hop communication channel to one or more base stations that can be connected to the Internet.

WSN function Phase 1: detect neighbors and establish communication Phase 2: learn about –the arrangement in which the nodes are connected to each other, –the topology of nodes –build up ad-hoc multi-hop communication channels to a base station In case of the failure of an active node, it must reconfigure the network Applications: –remote environment monitoring, –surveillance, –medical applications, –ambient intelligence, –military The utility of a wireless sensor network is in the collective emergent intelligence of all active sensor nodes, not the contribution of any particular node.

Primary concern for WSN: energy A WSN is operational as long as a minimum number of nodes is active and the connectivity of the active nodes to one of the base stations is maintained. In battery-powered sensor networks, the lifetime of the network depends on the energy capacity of the batteries and the power-consumption of a node. When a sensor node has depleted its energy supply, it will cease to function and cannot forward messages to its neighbors any more. The design of the nodes, the communication protocols, and the design of the system and application software for sensor networks are primarily determined by this quest for energy efficiency and low cost.

WSN + RFID = the future? RFID infrastructure for the interconnection of autonomous low-cost RFID-based sensor nodes has been proposed nodes operate without a battery and harvest the energy either from the environment or the electromagnetic radiation emitted by the RFID reader. Potential for long-lasting, low-cost ubiquitous sensor nodes that may revolutionize many embedded applications.

IoT component: Smart object A smart object is a cyber-physical system or an embedded system, consisting of a thing (the physical entity) and a component (the computer) that processes the sensor data and supports a wireless communication link to the Internet. –Example: smart refrigerator keeps track of the availability and expiry date of food items and places orders

IoT issues The novelty of the IoT is not in the functional capability of a smart object Novelty exists in the expected size of billions or even trillions of smart objects that bring about novel technical and societal issues that are related to size. issues are: –authentic identification of a smart object, –autonomic management and self-organization of networks of smart objects, –diagnostics and maintenance, –intrusion of privacy Safety issues –Autonomous mobile robots and self-driving cars

Key technologies for IoT low-power wireless communication: no need of a physical connection. GPS: makes a smart object location- and time-aware

Smart object categories Goal: an autonomic smart object that –has access to a domain specific knowledge base –is empowered with reasoning capabilities to orient itself in the selected application domain. Based on the capability level of a smart object it can be –activity aware –policy aware –process aware

Ultimate vision: smart planet everyday things around us with an identity in cyberspace capable of acquiring information and intelligence the world economy and support systems will operate more smoothly and efficiently

Social and legal issues in IoT But the life of the average citizen will also be affected by changing the relation of power between those that have access to the acquired information and can control the information and those that do not. IoT devices can be hacked with significant dangers to safety and property

IoT drivers The IoT should extend the interoperability of the internet to the universe of heterogeneous smart objects. Iot must establish a uniform access pattern to things in the physical world.

Logistics The first commercial application of a forerunner of the IoT, the RFID is in the area of logistics There are many quantitative advantages in using RFID technology in supply-chain management: –the movement of goods can be tracked in real-time, –shelf space can be managed more effectively –inventory control is improved –the amount of human involvement in the supply chain management is reduced considerably.

Energy savings Already today, embedded systems contribute to energy savings in many different sectors of our economy and our life. –increased fuel efficiency of automotive engines, –improved energy-efficiency of household appliances, –reduced loss in energy conversion The future: of IoT devices opens many new opportunities for energy savings: –Smart buildings: individual climate and lighting control in residential buildings –Smart grids: reduced energy loss in transmission by the installation of smart grids, –Smart meters: better coordination of energy supply and energy demand Other energy savings: –Physical meetings replaced by virtual meetings –delivery of information goods such as the daily paper, music, and videos by the Internet

Security and safety Automated IoT based access control systems to buildings and homes IoT-based surveillance of public places Smart passports and IoT based identifications (e.g., a smart key to access a hotel room or a smart ski lift ticket) Car-to-car and car-to-infrastructure communication will alert the driver of dangerous traffic scenarios

Industrial computerized observation and monitoring of industrial equipment –reduces maintenance cost –improves the safety in the plant A smart object can monitor its own operation and call for preventive or spontaneous maintenance in case a part wears out or a physical fault is diagnosed Automated fault-diagnosis and simple maintenance are absolutely essential prerequisites for the wide deployment of the IoT technology in the domain of ambient intelligence.

Medical The wide deployment of IoT technology in the medical domain is anticipated. –Health monitoring (heart rate, blood pressure, etc.) –precise control of drug delivery by a smart implant Body area networks that are part of the clothing can monitor the behavior of impaired persons and send out alarm messages if an emergency is developing. Smart labels on drugs can help a patient to take the right medication at the right time and enforce drug compliance. Example: A heart pacemaker can transmit important data via a Bluetooth link to a mobile phone that is carried in the shirt pocket. The mobile phone can analyze the data and call a doctor in case an emergency develops.

Technical issues: internet integration Guaranteeing the safety and information security of IoT-based systems is considered to be a difficult task. Many smart objects will be protected from general Internet access by a tight firewall to avoid that an adversary can acquire control of a smart object.

Naming and identification A well-thought-out naming architecture in order to be able to identify a smart object and to establish an access path to the object is essential. Isolated Objects. The following three different object names have to be distinguished when we refer to the simple case of an isolated object: –Unique object identifier (UID) refers to the physical identity of a specific object. –The Electronic Product Code (EPC) of the RFID community is such a UID. –Object type name refers to a class of objects that ideally have the same properties. –Object role name. In a given use context, an object plays a specific role that is denoted by the object role name.

Composite object naming Composite Objects. Whenever a number of objects are integrated to form a composite object, a new whole, i.e., new object is created that has an emerging identity that goes beyond the identities of the constituent objects. The composite object resembles a new concept (see Sect ) that requires a new name.

IoT vs cloud computing Smart objects that have access to the Internet can take advantage of services that are offered by the cloud The division of work between a smart object and the cloud will be determined, to a considerable degree, by privacy and energy considerations If the energy required to execute a task locally is larger than the energy required to send the task parameters to a server in the cloud, then the task is a candidate for remote processing. However, there are other aspects that influence the decision about work distribution: autonomy of the smart object, response time, reliability, and security.