Information Structure and Network Protocols for Remote Monitoring of Air- Quality Wang Huiran Xi’an University Of Engineering Science and Technology MA.

Slides:



Advertisements
Similar presentations
Client/Server Computing (the wave of the future) Rajkumar Buyya School of Computer Science & Software Engineering Monash University Melbourne, Australia.
Advertisements

REST Introduction 吴海生 博克软件(杭州)有限公司.
Mobile Experimentation Closing an Educational Gap for New Student Generations? Authors: Ricardo Jorge G. da Silva Nunes da Costa Gustavo.
PROF. MAULIK PATEL CED, GPERI Mobile Computing Gujarat Power Engineering and Research Institute 1 Prepared By: Prof. Maulik Patel.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Introduction to Your Name Goes Here
A Data Fusion Approach for Power Saving in Wireless Sensor Networks Reporter : Chi-You Chen.
Internet Routing Instability Labovitz et al. Sigcomm 1997 Largely adopted from Ion Stoica’s slide at UCB.
Middleware Technologies compiled by: Thomas M. Cosley.
Infrastructure Introduction EXTERNAL Integration OO Structure Open Service Provision Web Services Discussion Summary Maryland Arguments.
Applied Cryptography for Network Security
Energy Efficiency in Buildings and Intelligent Urban Lighting Barcelona Pilot Catherine Murphy-O’Connor – Eduardo Jiménez Indra Software.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to the course January 9, Points to Cover  What is GIS?  GIS and Geographic Information Science  Components of GIS Spatial data.
Introduction to Computer and Programming CS-101 Lecture 6 By : Lecturer : Omer Salih Dawood Department of Computer Science College of Arts and Science.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Introduction - What is Jini Technology?
Network Management System The Concept –From a central computer, network administrator can manage entire network Collect data Give commands –Moving gradually.
Information Security and Computer Systems: An Integrated Approach Mark A. Holliday and Bill Kreahling, Dept of Mathematics and Computer Science Western.
Definition of Computational Science Computational Science for NRM D. Wang Computational science is a rapidly growing multidisciplinary field that uses.
Introduction to Telecommunications Babak Esfandiari (with material by Roger Impey and Qusay Mahmoud)
WAVE: A Tutorial Roberto A. Uzcátegui Guillermo Acosta-Marum IEEE Communications Magazine,May Presenter – Renato Iida.
Mobile Communication The SMS implies of several additional elements in the network architecture There is also another Element called.
Content Sharing over Smartphone-Based Delay- Tolerant Networks.
SEMINOR. INTRODUCTION 1. Middleware is connectivity software that provides a mechanism for processes to interact with other processes running on multiple.
Robert Fourer, Jun Ma, Kipp Martin Optimization Services and the Stylized “OS” Logo are registered in the US Patent & Trademark Office. All other product.
Authors: B. Sc. Stanislava Stanković, School of Electrical Engineering, University of Belgrade B. Sc. Marko Stanković, School of Electrical Engineering,
A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time Lusheng Ji†, Joint work with Changxi Zheng‡, Dan Pei†, Jia Wang†, Paul Francis‡
Introduction to Student Name Student Class.
Cloud Networked Robotics Speaker: Kai-Wei Ping Advisor: Prof Dr. Ho-Ting Wu 2013/04/08 1.
Presented By:- Sudipta Dhara Roll Table of Content Table of Content 1.Introduction 2.How it evolved 3.Need of Middleware 4.Middleware Basic 5.Categories.
World Wide Web “WWW”, "Web" or "W3". World Wide Web “WWW”, "Web" or "W3"
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
©2012 LIESMARS Wuhan University Building Integrated Cyberinfrastructure for GIScience through Geospatial Service Web Jianya Gong, Tong Zhang, Huayi Wu.
REMOTE AND MOBILE EXPERIMENTATION PUSHING THE BOUNDARIES OF AN UBIQUITOUS LEARNING PLACE Authors: Ricardo Jorge G. da Silva Nunes da Costa
SDN Management Layer DESIGN REQUIREMENTS AND FUTURE DIRECTION NO OF SLIDES : 26 1.
Computer Science in Context Evangelos E. Milios Professor and Graduate Coordinator Faculty of Computer Science Dalhousie University.
Unit 9: Distributing Computing & Networking Kaplan University 1.
1 © NOKIA WWRF-Reference-Framework.PPT/ 26 June 2002 / Kimmo Raatikainen WWRF Reference Framework Nokia’s Perspective WWRF WG2 Meeting 26 June 2002 Kimmo.
Chapter 9 Network Management
Communication and Security in Machine-to-Machine Systems Date │ Reporter │ 李雅樺 1.
Fuego Core 2005/7 Possible Directions Kimmo Raatikainen Principal Scientist Helsinki Institute for Information Technology
Distributed Systems 0. Overview Simon Razniewski Faculty of Computer Science Free University of Bozen-Bolzano A.Y. 2014/2015.
TCCICOMPUTERCO ACHING.COM Diploma Programming Course In Ahmedabad.
SOURCE:2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING AUTHER: MINGLIU LIU, DESHI LI, HAILI MAO SPEAKER: JIAN-MING HONG.
Smog “Trends” -- Atlanta and Elsewhere Annual Peak Observed Concentration, EPD, US EPA.
12. DISTRIBUTED WEB-BASED SYSTEMS Nov SUSMITHA KOTA KRANTHI KOYA LIANG YI.
The evolution of monitoring services : RNP Case
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
HTTP and Abstraction on the Internet
Agricultural Science and Technology Innovation Cooperation
Pertemuan 19 Introduction to TCP/IP
Introduction to Your Name Goes Here
The evolution of monitoring services : RNP Case
Packet Switching To improve the efficiency of transferring information over a shared communication line, messages are divided into fixed-sized, numbered.
Scenarios, Niches, Architectures
Introduction There are many situations in which we might use replicated data Let’s look at another, different one And design a system to work well in that.
Enhancements to Mesh Discovery
MESSAGE PROJECT CONTRIBUTION
Internet Indirection Infrastructure
ECE369 Computer Networks Prof. Hong Liu
Cloud-Enabling Technology
GCSE Computer Science.
Research Article Title
2019/5/2 Using Path Label Routing in Wide Area Software-Defined Networks with OpenFlow ICNP = International Conference on Network Protocols Presenter:Hung-Yen.
Chapter 4 Network Management Standards and Models
Chapter 4 Network Management Standards and Models
A Protocol Reconfiguration Framework with Autonomic Aspects
Presentation transcript:

Information Structure and Network Protocols for Remote Monitoring of Air- Quality Wang Huiran Xi’an University Of Engineering Science and Technology MA Ruifang Xi’an Jiaotong University August 20, 2005

Content 1. INTRODUCTION 2. ARCHITECTURE OF AIR-QUALITY REMOTE MONITORING SYSTEM 3. INFORMATION MODEL FOR AIR-QUALITY MONITORING 4. PROTOCOLS FOR AIR QUALITY REMOTE MONITORING 5. CONCLUSIONS

1. INTRODUCTION The air is one of the fundamental elements human beings have to rely upon Scientists are involved in monitoring of air-quality over Internet Previous studies concentrated on developments of the application software for monitoring systems, did not involve in study of the architecture and infrastructure of air quality monitoring systems. We established an information base (MNIB), and a proprietary network protocol (ARMP) for monitoring systems

2.ARCHITECTURE OF MONITORING SYSTEM 2.1 physical structure

2.ARCHITECTURE OF MONITORING SYSTEM 2.2 Architecture

3. INFORMATION MODEL FOR AIR-QUALITY MONITORING 3.1 Monitoring Information Structure

3. INFORMATION MODEL FOR AIR-QUALITY MONITORING 3.2 Monitoring Information Base

3. INFORMATION MODEL FOR AIR-QUALITY MONITORING 3.3 The so2Mean object group

3. INFORMATION MODEL FOR AIR-QUALITY MONITORING Algorithm for mean contents of pollutants Mean typeAlgorithm Hourly meanSampling time longer than 45 minutes Daily meanSampling time longer than 18 hours Monthly mean Contains at least 12 daily means evenly distributed over the month Yearly mean Contains at least 144 daily means evenly distributed over the year

4. PROTOCOLS FOR AIR QUALITY REMOTE MONITORING 4.1 Messages of ARMP Protocol

4. PROTOCOLS FOR AIR QUALITY REMOTE MONITORING 4.2 Operations of ARMP Protocol

5. CONCLUSIONS ( 1 ) We present a architecture for air-quality remote monitoring systems. This architecture consists of monitoring controllers, monitoring agents, MNIB (MoNitoring Information Base), and the protocol stack. (2) We establish an information model for remote monitoring systems, and put forward the concept of MNIB with a tree-like structure. (3) In addition to storing information about content of pollutants, we may define algorithm and controlling information in the MNIB. (4) We design a proprietary application layer protocol, i.e. ARMP. The message of ARMP is composed of 3 parts. (5) ARMP operates in 4 modes, that is, monitor, monitor- next, set, and trap mode.

谢谢! Thank you !