A Study on the Use of Wireless Sensor Networks in a Retail Store Dawud Gordon TU Braunschweig Institute of Operating Systems and Computer Networks www.ibr.cs.tu-bs.de/dus.

Slides:



Advertisements
Similar presentations
Hiltronics Computers Getting Your Website Up! Frank Hill President/CEO Hiltronics Computers.
Advertisements

Computer Engineering and Networks Technische Informatik und Kommunikationsnetze Jan Beutel, ETH Zurich Wireless Sensor Networks for Extreme Environments.
Prestige 2.0 Commercial Thermostat with Internet Connectivity.
A Long-Term Sensory Logging Device for Subject Monitoring Dawud Gordon, Florian Witt, Hedda Schmidtke and Michael Beigl TU Braunschweig Institute of Operating.
March 13, 2006 Location Tracking System & Sensor Based Communications For Mining Response to RIN 1219-AB44.
Team 7 / May 24, 2006 Web Based Automation & Security Client Capstone Design Advisor Prof. David Bourner Team Members Lloyd Emokpae (team Lead) Vikash.
Panoptes: A Scalable Architecture for Video Sensor Networking Applications Wu-chi Feng, Brian Code, Ed Kaiser, Mike Shea, Wu-chang Feng (OGI: The Oregon.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Autonomic Wireless Sensor Networks: Intelligent Ubiquitous Sensing G.M.P. O’Hare, M.J. O’Grady, A. Ruzzelli, R. Tynan Adaptive Information Cluster (AIC)
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Six –
2008/7/3 NanoMon: An Adaptable Sensor Network Monitoring Software Misun Yu, Haeyong Kim, and Pyeongsoo Mah Embedded S/W Research Division Electronics and.
Maximum Network lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Mihaela Cardei, Jie Wu, Mingming Lu, and Mohammad O. Pervaiz Department.
Effort in hours Duration Over Weeks Or Months Inception Launch Web Lifecycle Methodology Maintenance Phases Copyright Wonderlane Studios.
Technical Training: DAP-1360 Wireless N Access Point DAP-1360.
1. PROJECT GOAL Our final product will be an interactive public website which will allow the user to view various aspects of our current and future infrastructure.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
FI-WARE – Future Internet Core Platform FI-WARE Interface to Networks and Devices (I2ND) July 2011 High-level description.
An adaptive framework of multiple schemes for event and query distribution in wireless sensor networks Vincent Tam, Keng-Teck Ma, and King-Shan Lui IEEE.
TEMPLATE DESIGN © GroupNotes: Encouraging Proactive Student Engagement in Lectures through Collaborative Note-taking on.
1 Y-MAC: An Energy-efficient Multi-channel MAC Protocol for Dense Wireless Sensor Networks Youngmin Kim, Hyojeong Shin, and Hojung Cha International Conference.
BACK-END FOR MONITORING MESH NETWORK ACTIVITY Ajayi Olabode Oluwaseun Department of Computer Science University of the Western Cape, Private Bag x17, Bellville.
May Team Information Client Department of Electrical and Computer Engineering, Iowa State University Faculty Advisor Professor Gary Tuttle Team Members.
Fault Diagnosis System for Wireless Sensor Networks Praharshana Perera Supervisors: Luciana Moreira Sá de Souza Christian Decker.
D-Bridge: A Platform for Developing Low-Cost WSN Product Solutions Dawud Gordon and Michael Beigl Technische Universität Braunschweig Institute of Operating.
PRJ566 Project Planning and Management
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
DYNAMIC WAP BASED VOTING SYSTEM Bertrand COLAS Submission date: May 2002 School of Computing Bachelor of Engineering with Honours in Computer.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
SUS Commander Sean Merritt. Background Department of Natural Resources uses a Software Update Server to update the user’s PCs. The log files are cryptic.
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
Computer Emergency Notification System (CENS)
IntroductionRelated work 2 Contents Publish/Subscribe middleware Conclusion and Future works.
Institut für Computertechnik ICT Institute of Computer Technology Remote Control and Reconfiguration of Laboratories for Education and Training Vienna.
Who Is Peeping at Your Passwords at Starbucks? To Catch an Evil Twin Access Point DSN 2010 Yimin Song, Texas A&M University Chao Yang, Texas A&M University.
FYP: LYU0001 Wireless-based Mobile E-Commerce on the Web Supervisor: Prof. Michael R. Lyu By: Tony, Wat Hong Fai Harris, Yan Wai Keung.
The group will focus on the design of a “smart” device. This includes researching the best method of design and fabricating the design to create a working.
Classroom Presenter: Multicasting Michael Mayes Brian Temple.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Wireless Sensor Network Wireless Sensor Network Based.
A Study of Wireless Virtual Network Computing Kiran Erra.
CONTI'20041 Event Management in Distributed Control Systems Gheorghe Sebestyen Technical University of Cluj-Napoca Computers Department.
Project Cost Estimate Form PLAN IT! Todd Crosby. The Project Cost Estimate Form These are your best “educated guesses” – it is expected that data will.
1 NIH eRA Database Resource Plan Last Updated: 6/19/2003 by eRA Operations for Techrep Meeting “Doing more with less”
A Utility-based Approach to Scheduling Multimedia Streams in P2P Systems Fang Chen Computer Science Dept. University of California, Riverside
Providing User Context for Mobile and Social Networking Applications A. C. Santos et al., Pervasive and Mobile Computing, vol. 6, no. 1, pp , 2010.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
4 m 9K Copyright 2002 Forum 9000, LLC Slide 1 Forum 9000 Quality Systems for Quality Care.
ELECTRONIC DOCUMENT SHARING AND MANAGEMENT BY: EDWARD DISI JUSTIN HEIN BROM ESPY Senior Design 1.
A Web-based Console for Controlling a Wireless Sensor network Team A: Thang Nguyen – Duc Duong Course CSCI 5234: Web Security Instructor: Dr. T. Andrew.
February 1999T. Haupt, DATORR meeting1 Gateway System New Generation of WebFlow.
Structure-Free Data Aggregation in Sensor Networks.
ORT Braude College – Software Engineering Department WristQue: A Personal Sensor Wirstband Brian D. Mayton, Nan Zhao, Matt Aldrich, Nicholas Gillian, and.
Horizon Photo-mote. ability to access photographs and images stored online, with the aid of a wireless remote remote enables the user to identify and.
Troubleshooting Windows Vista Lesson 11. Skills Matrix Technology SkillObjective DomainObjective # Troubleshooting Installation and Startup Issues Troubleshoot.
RMTP-II Security Considerations Brian Whetten GlobalCast Communications.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
 Abstract  Introduction  Literature Survey  Conclusion on Literature Survey  Threat model and system architecture  Proposed Work  Attack Scenarios.
Vital Signs Monitoring system
Unit 6 Application Design Practice Assignment.
Unit 6 Application Design Sample Assignment.
A Study of Wireless Virtual Network Computing
Comparison of LAN, MAN, WAN
Relate to Clients on a business level
Task Manager & Profile Interface
Presentation transcript:

A Study on the Use of Wireless Sensor Networks in a Retail Store Dawud Gordon TU Braunschweig Institute of Operating Systems and Computer Networks

Dawud Gordon Pervasive ’09 2 Table of Contents  Introduction  Trial Setup  Requirements Analysis  Results  Conclusion  Work in Progress  Question and Answer

Dawud Gordon Pervasive ’09 3 Introduction  Evaluate WSNs in retail enviroment  Authors Dawud Gordon Masayuki Iwai Michael Beigl  Trial implementation in Akihabara town, Tokyo Created by Masayuki Iwai

Dawud Gordon Pervasive ’09 4 Introduction (cont.)  Goals of study Gather experience Reduce development effort Open market for high-level developers  Methods: Requirements analysis Improve requirement definition Specify weak spots

Dawud Gordon Pervasive ’09 5 Trial Setup  In-store front-end Network ▫Objects + nodes ▫Sink nodes/bridges Display ▫Monitor ▫Countertop  Central back-end Server-based client analysis Feedback to in-store system  Output To owner To client

Dawud Gordon Pervasive ’09 6 Setup (cont.) XBridge WWW server Client analysis XBridge Firewall

Dawud Gordon Pervasive ’09 7 Setup (Cont.)

Dawud Gordon Pervasive ’09 8 Requirements  Phase 1: Mr. Iwai – application requirements Eliminates client/user stakeholder from this analysis  Phase 2: After Akihabara trial Document Mr. Iwai‘s needs

Dawud Gordon Pervasive ’09 9 Requirements - Configuration  Application needs to adapt Changing conditions in store Market analysis  Dynamic changes during runtime  By developer/SmartStore server Remote access from WWW (through firewall) OTAC  By store owner Remotely from application within LAN OTAC  Multiple nodes at once + acked config Allows reconfig of entire application Saves time during development

Dawud Gordon Pervasive ’09 10 Requirements - Sensors  Vibration Think ballswitch Differentiation: ▫At rest ▫In user‘s hand  Light sensor Large lux ranges ▫Bottoming out ▫Saturation Differentiation Store interior Store front

Dawud Gordon Pervasive ’09 11 Requirements - Interactivity  Realtime input event reporting Allows systems to have interactive feel Delay detracts from user experience

Dawud Gordon Pervasive ’09 12 Requirements - Power  Battery changes effort-expensive  Store‘s hours System not active Sleep mode ▫Save battery ▫Reduce maintenance ▫Manual override higher priority  Battery TTD TTD = 24 hrs

Dawud Gordon Pervasive ’09 13 Requirements - Range  2 scenarios present  High-density 10m sink-to-node  Low-density 40m sink-to-node WWW Server Client analysis WWW server Client analysis

Dawud Gordon Pervasive ’09 14 Requirements - Security  Problem: Config interference Broadcast affects all in range multiple apps  Grouping mechanism  Inclusion  NOT real security Prevents interference, not attack

Dawud Gordon Pervasive ’09 15 Conclusion  Trial provided good results Sensory Interactivity Power Range  System still too technical HW ▫Bridge ▫Node Not accessable to high-level developers

Dawud Gordon Pervasive ’09 16 Work in Progress  Abstraction from HW level Think: HTML Point + click  Akiba Sensor Node In development Will fulfill requirements  D-Bridge Prototype Embedded application Webserver