Pub Date : 2013-11-14DOI: 10.1109/IWMN.2013.6663775
Filip Barac, M. Gidlund, Tingting Zhang
Forward Error Correction is a preemptive manner of improving communication reliability. Albeit not a part of IEEE 802.15.4-2006 standard, its application in Industrial Wireless Sensor Networks has been widely considered. Nevertheless, this study is the first performance analysis on real error traces with sufficiently lightweight channel codes, with respect to IEEE 802.15.4-2006 and industrial wireless communication timing constraints. Based on these constraints and bit error properties from the collected traces, the use of Reed-Solomon (15,7) block code is suggested, which can be implemented in software. Experiments show that bit error nature on links affected by multipath fading and attenuation in industrial environments is such that RS(15,7) can correct ≥95% of erroneously received packets, without the necessity for interleaving. On links under IEEE 802.11 interference, typically up to 50% of corrupted packets can be recovered by combining RS(15,7) with symbol interleaving, which has proven to be more effective than its bit counterpart. The optimal interleaving depth is found empirically and it is shown that simple bit-interleaved 1/3 repetition code achieves at least 90% of correcting performance of RS(15,7) code on uninterfered links that operate ≥10 dB above the sensitivity threshold.
{"title":"Channel coding and interleaving in Industrial WSN: abiding to timing constraints and bit error nature","authors":"Filip Barac, M. Gidlund, Tingting Zhang","doi":"10.1109/IWMN.2013.6663775","DOIUrl":"https://doi.org/10.1109/IWMN.2013.6663775","url":null,"abstract":"Forward Error Correction is a preemptive manner of improving communication reliability. Albeit not a part of IEEE 802.15.4-2006 standard, its application in Industrial Wireless Sensor Networks has been widely considered. Nevertheless, this study is the first performance analysis on real error traces with sufficiently lightweight channel codes, with respect to IEEE 802.15.4-2006 and industrial wireless communication timing constraints. Based on these constraints and bit error properties from the collected traces, the use of Reed-Solomon (15,7) block code is suggested, which can be implemented in software. Experiments show that bit error nature on links affected by multipath fading and attenuation in industrial environments is such that RS(15,7) can correct ≥95% of erroneously received packets, without the necessity for interleaving. On links under IEEE 802.11 interference, typically up to 50% of corrupted packets can be recovered by combining RS(15,7) with symbol interleaving, which has proven to be more effective than its bit counterpart. The optimal interleaving depth is found empirically and it is shown that simple bit-interleaved 1/3 repetition code achieves at least 90% of correcting performance of RS(15,7) code on uninterfered links that operate ≥10 dB above the sensitivity threshold.","PeriodicalId":218660,"journal":{"name":"2013 IEEE International Workshop on Measurements & Networking (M&N)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125020662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-14DOI: 10.1109/IWMN.2013.6663796
Iñaki Ucar, D. Morató, E. Magaña, M. Izal
Network traffic monitoring systems have to deal with a challenging problem: the traffic capturing process almost invariably produces duplicate packets. In spite of this, and in contrast with other fields, there is no scientific literature addressing it. This paper establishes the theoretical background concerning data duplication in network traffic analysis: generating mechanisms, types of duplicates and their characteristics are described. On this basis, a duplicate detection and removal methodology is proposed. Moreover, an analytical and experimental study is presented, whose results provide a dimensioning rule for this methodology.
{"title":"Duplicate detection methodology for IP network traffic analysis","authors":"Iñaki Ucar, D. Morató, E. Magaña, M. Izal","doi":"10.1109/IWMN.2013.6663796","DOIUrl":"https://doi.org/10.1109/IWMN.2013.6663796","url":null,"abstract":"Network traffic monitoring systems have to deal with a challenging problem: the traffic capturing process almost invariably produces duplicate packets. In spite of this, and in contrast with other fields, there is no scientific literature addressing it. This paper establishes the theoretical background concerning data duplication in network traffic analysis: generating mechanisms, types of duplicates and their characteristics are described. On this basis, a duplicate detection and removal methodology is proposed. Moreover, an analytical and experimental study is presented, whose results provide a dimensioning rule for this methodology.","PeriodicalId":218660,"journal":{"name":"2013 IEEE International Workshop on Measurements & Networking (M&N)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121558773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-14DOI: 10.1109/IWMN.2013.6663803
A. Leone, G. Rescio, P. Siciliano
Falling down events can cause trauma, disability and death among older people. Accelerometer-based devices are able to detect falls in controlled environments. This kind of solution often presents poor performance in real conditions. The aim of this work is the development of a computationally low-cost algorithm for feature extraction and the implementation of a Machine Learning scheme for people fall detection, by using a tri-axial MEMS wearable wireless accelerometer. The proposed approach allows to generalize the detection of fall events in several practical conditions. It appears invariant to the age, weight, height of people and to the relative positioning area (even in the upper part of the waist), overcoming the drawbacks of well-known threshold-based approaches in which several parameters need to be manually estimated according to the specific features of the end-user. In order to limit the workload, the specific study on posture analysis has been avoided and a polynomial kernel function is used while maintaining high performance in terms of specificity and sensitivity. The supervised clustering step is achieved by implementing an One-Class Support Vector Machine classifier in a stand-alone PC.
{"title":"Supervised wearable wireless system for fall detection","authors":"A. Leone, G. Rescio, P. Siciliano","doi":"10.1109/IWMN.2013.6663803","DOIUrl":"https://doi.org/10.1109/IWMN.2013.6663803","url":null,"abstract":"Falling down events can cause trauma, disability and death among older people. Accelerometer-based devices are able to detect falls in controlled environments. This kind of solution often presents poor performance in real conditions. The aim of this work is the development of a computationally low-cost algorithm for feature extraction and the implementation of a Machine Learning scheme for people fall detection, by using a tri-axial MEMS wearable wireless accelerometer. The proposed approach allows to generalize the detection of fall events in several practical conditions. It appears invariant to the age, weight, height of people and to the relative positioning area (even in the upper part of the waist), overcoming the drawbacks of well-known threshold-based approaches in which several parameters need to be manually estimated according to the specific features of the end-user. In order to limit the workload, the specific study on posture analysis has been avoided and a polynomial kernel function is used while maintaining high performance in terms of specificity and sensitivity. The supervised clustering step is achieved by implementing an One-Class Support Vector Machine classifier in a stand-alone PC.","PeriodicalId":218660,"journal":{"name":"2013 IEEE International Workshop on Measurements & Networking (M&N)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124499907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-14DOI: 10.1109/IWMN.2013.6663789
Poussy A. Amr, Nashwa Abdelbaki
IPv4 address space is exhausted. Internet Engineering Task Force (IETF) developed IPv6 -the upgrade of IPv4- to satisfy the continual increase of the IP address needs. The Internet is so ramified and enormous that the complete transition from IPv4 to IPv6 is slow. Therefore, their coexistence is inevitable. Manually configured tunnels are an important solution to allow this co-existence that allows transmitting native IPv6 packets over IPv4 networks. Meanwhile, VoIP is also gaining momentum with expectation to occupy considerable percentage of Internet traffic. In this paper, we compare the Voice over Internet Protocol (VoIP) network performance delivering Real-Time Quality-of-Service over manually configured tunnels versus conventional IPv4 and IPv6 networks. The measurements are collected out of probing a single call transferred over a network congested with HTTP, FTP or Video. The comparison performance criteria are jitter, network delay, throughput and packet loss percentage. Also the call user satisfaction is assessed by Mean Opinion Score.
IPv4地址空间耗尽。处理步骤Internet Engineering Task Force (IETF)开发了IPv4的升级版IPv6,以满足不断增长的IP地址需求。互联网是如此分散和庞大,从IPv4到IPv6的完全过渡是缓慢的。因此,两者共存是不可避免的。手动配置隧道是允许这种共存的重要解决方案,允许在IPv4网络上传输本地IPv6数据包。与此同时,VoIP也在获得动力,预计将占据相当大比例的互联网流量。在本文中,我们比较了通过手动配置隧道提供实时服务质量的互联网协议语音(VoIP)网络性能与传统的IPv4和IPv6网络。这些测量是通过探测通过HTTP、FTP或视频拥塞的网络传输的单个呼叫来收集的。比较性能标准是抖动、网络延迟、吞吐量和丢包率。此外,呼叫用户满意度的评估是平均意见得分。
{"title":"VoIP performance evaluation over IPv4-6 and manually configured tunnels","authors":"Poussy A. Amr, Nashwa Abdelbaki","doi":"10.1109/IWMN.2013.6663789","DOIUrl":"https://doi.org/10.1109/IWMN.2013.6663789","url":null,"abstract":"IPv4 address space is exhausted. Internet Engineering Task Force (IETF) developed IPv6 -the upgrade of IPv4- to satisfy the continual increase of the IP address needs. The Internet is so ramified and enormous that the complete transition from IPv4 to IPv6 is slow. Therefore, their coexistence is inevitable. Manually configured tunnels are an important solution to allow this co-existence that allows transmitting native IPv6 packets over IPv4 networks. Meanwhile, VoIP is also gaining momentum with expectation to occupy considerable percentage of Internet traffic. In this paper, we compare the Voice over Internet Protocol (VoIP) network performance delivering Real-Time Quality-of-Service over manually configured tunnels versus conventional IPv4 and IPv6 networks. The measurements are collected out of probing a single call transferred over a network congested with HTTP, FTP or Video. The comparison performance criteria are jitter, network delay, throughput and packet loss percentage. Also the call user satisfaction is assessed by Mean Opinion Score.","PeriodicalId":218660,"journal":{"name":"2013 IEEE International Workshop on Measurements & Networking (M&N)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130467910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-14DOI: 10.1109/IWMN.2013.6663787
L. Angrisani, D. Capriglione, L. Ferrigno, G. Miele
Generally, the voice quality of a VoIP call can be analyzed through the measurement of suitable metrics at the application layer of the International Organization for Standardization/Open Systems Interconnection (ISO/OSI) protocol stack. However, the peculiarities of such a kind of measurements make very difficult to provide to each user a value representative of the quality of each VoIP call.
{"title":"Quality assessment of VoIP services: A proposal based on the measurement of the IP Packet Delay Variation","authors":"L. Angrisani, D. Capriglione, L. Ferrigno, G. Miele","doi":"10.1109/IWMN.2013.6663787","DOIUrl":"https://doi.org/10.1109/IWMN.2013.6663787","url":null,"abstract":"Generally, the voice quality of a VoIP call can be analyzed through the measurement of suitable metrics at the application layer of the International Organization for Standardization/Open Systems Interconnection (ISO/OSI) protocol stack. However, the peculiarities of such a kind of measurements make very difficult to provide to each user a value representative of the quality of each VoIP call.","PeriodicalId":218660,"journal":{"name":"2013 IEEE International Workshop on Measurements & Networking (M&N)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132243057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-14DOI: 10.1109/IWMN.2013.6663794
P. V. Amoli, T. Hämäläinen
Previously, Network Intrusion Detection Systems (NIDS) detected intrusions by comparing the behaviour of the network to the pre-defined rules or pre-observed network traffic, which was expensive in terms of both cost and time. Unsupervised machine learning techniques have overcome these issues and can detect unknown and complex attacks within normal or encrypted communication without any prior knowledge. NIDS monitors bytes, packets and network flow to detect intrusions. It is nearly impossible to monitor the payload of all packets in a high-speed network. On the other hand, the content of packets does not have sufficient information to detect a complex attack. Since the rate of attacks within encrypted communication is increasing and the content of encrypted packets is not accessible to NIDS, it has been suggested to monitor network flows. As most network intrusions spread within the network very quickly, in this paper we will propose a new real-time unsupervised NIDS for detecting new and complex attacks within normal and encrypted communications. To achieve having a real-time NIDS, the proposed model should capture live network traffic from different sensors and analyse specific metrics such as number of bytes, packets, network flows, and the time explicitly and implicitly, of packets and network flows, in the different resolutions. The NIDS will flag the time slot as an anomaly if any of those metrics passes the threshold, and it will send the time slot to the first engine. The first engine clusters different layers and dimensions of the network's behaviour and correlates the outliers to purge the intrusions from normal traffic. Detecting network attacks, which produce a huge amount of network traffic (e.g. DOS, DDOS, scanning) was the aim of proposing the first engine. Analysing statistics of network flows increases the feasibility of detecting intrusions within encrypted communications. The aim of proposing the second engine is to conduct a deeper analysis and correlate the traffic and behaviour of Bots (current attackers) during DDOS attacks to find the Bot-Master.
{"title":"A real time unsupervised NIDS for detecting unknown and encrypted network attacks in high speed network","authors":"P. V. Amoli, T. Hämäläinen","doi":"10.1109/IWMN.2013.6663794","DOIUrl":"https://doi.org/10.1109/IWMN.2013.6663794","url":null,"abstract":"Previously, Network Intrusion Detection Systems (NIDS) detected intrusions by comparing the behaviour of the network to the pre-defined rules or pre-observed network traffic, which was expensive in terms of both cost and time. Unsupervised machine learning techniques have overcome these issues and can detect unknown and complex attacks within normal or encrypted communication without any prior knowledge. NIDS monitors bytes, packets and network flow to detect intrusions. It is nearly impossible to monitor the payload of all packets in a high-speed network. On the other hand, the content of packets does not have sufficient information to detect a complex attack. Since the rate of attacks within encrypted communication is increasing and the content of encrypted packets is not accessible to NIDS, it has been suggested to monitor network flows. As most network intrusions spread within the network very quickly, in this paper we will propose a new real-time unsupervised NIDS for detecting new and complex attacks within normal and encrypted communications. To achieve having a real-time NIDS, the proposed model should capture live network traffic from different sensors and analyse specific metrics such as number of bytes, packets, network flows, and the time explicitly and implicitly, of packets and network flows, in the different resolutions. The NIDS will flag the time slot as an anomaly if any of those metrics passes the threshold, and it will send the time slot to the first engine. The first engine clusters different layers and dimensions of the network's behaviour and correlates the outliers to purge the intrusions from normal traffic. Detecting network attacks, which produce a huge amount of network traffic (e.g. DOS, DDOS, scanning) was the aim of proposing the first engine. Analysing statistics of network flows increases the feasibility of detecting intrusions within encrypted communications. The aim of proposing the second engine is to conduct a deeper analysis and correlate the traffic and behaviour of Bots (current attackers) during DDOS attacks to find the Bot-Master.","PeriodicalId":218660,"journal":{"name":"2013 IEEE International Workshop on Measurements & Networking (M&N)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116438887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-14DOI: 10.1109/IWMN.2013.6663783
Carlo Sansone, S. Manfredi, Edmondo Di Tucci, S. D. Vito, G. Fattoruso, F. Tortorella
The problem of estimating the pollutants in urban areas is one of the most active research in recent years due to the increasing concerns about their influence on human health. Solide state sensors, increasingly small and inexpensive, are being used to build compact multisensor devices. Suffering from sensors instabilities and cross-sensitivities, they need ad-hoc calibration procedures in order to reach satisfying performance levels. In this paper we propose a novel approach based on Nonlinear AutoRegressive eXogenous model (NARX) to estimate pollutants in urban area and detecting alerts with respect to law limits. We compared our proposal with two other techniques, based on a Feed Forward Neural Network and a Semi Supervised Learning approach, respectively. Numerical simulations have been carried out to validate the proposed approach on a real dataset.
{"title":"A novel approach for detecting alerts in urban pollution monitoring with low cost sensors","authors":"Carlo Sansone, S. Manfredi, Edmondo Di Tucci, S. D. Vito, G. Fattoruso, F. Tortorella","doi":"10.1109/IWMN.2013.6663783","DOIUrl":"https://doi.org/10.1109/IWMN.2013.6663783","url":null,"abstract":"The problem of estimating the pollutants in urban areas is one of the most active research in recent years due to the increasing concerns about their influence on human health. Solide state sensors, increasingly small and inexpensive, are being used to build compact multisensor devices. Suffering from sensors instabilities and cross-sensitivities, they need ad-hoc calibration procedures in order to reach satisfying performance levels. In this paper we propose a novel approach based on Nonlinear AutoRegressive eXogenous model (NARX) to estimate pollutants in urban area and detecting alerts with respect to law limits. We compared our proposal with two other techniques, based on a Feed Forward Neural Network and a Semi Supervised Learning approach, respectively. Numerical simulations have been carried out to validate the proposed approach on a real dataset.","PeriodicalId":218660,"journal":{"name":"2013 IEEE International Workshop on Measurements & Networking (M&N)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122102001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-14DOI: 10.1109/IWMN.2013.6663779
G. Scarpato, T. Caputo, A. Caputo, W. D. Cesare, A. Esposito, M. Vadursi
The main purpose of this work is the design and implementation of an integrated wireless network as support to the multiparametric geophysical monitoring network of the Campi Flegrei volcanic area, in view of the increased need for seismic monitoring, which is a consequence of the drilling of an exploration well for scientific purposes. The goal is to increase the performance of the transmission system in terms of speed, real-time availability and reliability, given the high seismic risk and hazard associated with the experiment. The drilling is part of the international research project called “Campi Flegrei Deep Drilling Project” (CFDDP). For this purpose, in the first half of 2012, it was necessary to enhance the multiparametric monitoring network of Campi Flegrei, creating a subnet of seismic sensors, with limited geographical extension, but concentrated around the area of the well realization. The data acquisition from the monitoring center “Osservatorio Vesuviano”, section of Naples of the INGV, is guaranteed by a system of radio links in the 5 GHz band, due to the high interference in the typical band 802.11 and the highly urbanized area of interest. The subnet has shown a good cost/benefit ratio as regards the transmission, and it has proved to be useful for the monitoring purposes in order to detect in real time possible anomalies related to the drilling.
这项工作的主要目的是设计和实施一个集成无线网络,作为对Campi Flegrei火山区多参数地球物理监测网络的支持,因为为了科学目的而钻探勘探井增加了地震监测的需求。考虑到与实验相关的高地震风险和危害,目标是在速度、实时可用性和可靠性方面提高传输系统的性能。此次钻探是国际研究项目“Campi Flegrei Deep drilling project”(CFDDP)的一部分。为此,在2012年上半年,有必要加强Campi Flegrei的多参数监测网络,创建一个地震传感器子网,其地理扩展有限,但集中在油井实现区域周围。由于典型802.11频段的高干扰和高度城市化地区的利益,INGV那不勒斯部分的监测中心“Osservatorio Vesuviano”的数据采集由5 GHz频段的无线电链路系统保证。该子网在传输方面显示出良好的成本/效益比,并且已被证明用于监测目的,以便实时检测与钻井相关的可能异常。
{"title":"A wireless network as support to the monitoring of Campi Flegrei volcano in Italy","authors":"G. Scarpato, T. Caputo, A. Caputo, W. D. Cesare, A. Esposito, M. Vadursi","doi":"10.1109/IWMN.2013.6663779","DOIUrl":"https://doi.org/10.1109/IWMN.2013.6663779","url":null,"abstract":"The main purpose of this work is the design and implementation of an integrated wireless network as support to the multiparametric geophysical monitoring network of the Campi Flegrei volcanic area, in view of the increased need for seismic monitoring, which is a consequence of the drilling of an exploration well for scientific purposes. The goal is to increase the performance of the transmission system in terms of speed, real-time availability and reliability, given the high seismic risk and hazard associated with the experiment. The drilling is part of the international research project called “Campi Flegrei Deep Drilling Project” (CFDDP). For this purpose, in the first half of 2012, it was necessary to enhance the multiparametric monitoring network of Campi Flegrei, creating a subnet of seismic sensors, with limited geographical extension, but concentrated around the area of the well realization. The data acquisition from the monitoring center “Osservatorio Vesuviano”, section of Naples of the INGV, is guaranteed by a system of radio links in the 5 GHz band, due to the high interference in the typical band 802.11 and the highly urbanized area of interest. The subnet has shown a good cost/benefit ratio as regards the transmission, and it has proved to be useful for the monitoring purposes in order to detect in real time possible anomalies related to the drilling.","PeriodicalId":218660,"journal":{"name":"2013 IEEE International Workshop on Measurements & Networking (M&N)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122884509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-14DOI: 10.1109/IWMN.2013.6663805
Rym Chéour, M. W. Jmal, A. Lay-Ekuakille, F. Derbel, O. Kanoun, M. Abid
The wireless sensor networks are experiencing an extraordinary rise which is reflected by their omnipresence in various fields of application. They offer numerous challenges ranging from the stringent power constraints of each node, the need of cross-out to adapt to different conditions and the limited computation capabilities. To overcome these shortcomings and to follow the rapid hardware obsolescence and the need for functionality updates, it is necessary to use a simulation tool that can help designing and testing new hardware and software solutions. As there are many simulators, we make an attempt in this paper to specify the important ones related to energy consumption.
{"title":"Choice of efficient simulator tool for wireless sensor networks","authors":"Rym Chéour, M. W. Jmal, A. Lay-Ekuakille, F. Derbel, O. Kanoun, M. Abid","doi":"10.1109/IWMN.2013.6663805","DOIUrl":"https://doi.org/10.1109/IWMN.2013.6663805","url":null,"abstract":"The wireless sensor networks are experiencing an extraordinary rise which is reflected by their omnipresence in various fields of application. They offer numerous challenges ranging from the stringent power constraints of each node, the need of cross-out to adapt to different conditions and the limited computation capabilities. To overcome these shortcomings and to follow the rapid hardware obsolescence and the need for functionality updates, it is necessary to use a simulation tool that can help designing and testing new hardware and software solutions. As there are many simulators, we make an attempt in this paper to specify the important ones related to energy consumption.","PeriodicalId":218660,"journal":{"name":"2013 IEEE International Workshop on Measurements & Networking (M&N)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124480511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-14DOI: 10.1109/IWMN.2013.6663791
Ermanno Battista, V. Casola, S. Marrone, N. Mazzocca, Roberto Nardone, V. Vittorini
This paper introduces a modeling approach to the design and evaluation of large wireless sensor networks against the topology of the network and the monitoring application and taking into account the performance degradation due to the power consumption. The model is built by composing Stochastic Activity Network (SAN) models of the nodes and a Markovian Agent Model (MAM) of the whole network. The SAN models are used to conduct a performance analysis of the nodes (i.e. to measure their sampling time) and evaluate their mean time to discharge. The MAM is used to compose the results of the SAN model analysis into a complex topology-aware model able to evaluate the Packet Delivery Ratio (PDR) and the power consumption of the network. The possibility to model spatially distributed interdependencies featured by the MAM makes the integrated model a concrete, scalable mean to evaluate different design choices and perform meaningful what-if analyses. The model has been validated by comparing the analysis results with real node values: specifically we present the experimental results obtained by using TelosB nodes equipped with TinyOs.
{"title":"An integrated lifetime and network quality model of large WSNs","authors":"Ermanno Battista, V. Casola, S. Marrone, N. Mazzocca, Roberto Nardone, V. Vittorini","doi":"10.1109/IWMN.2013.6663791","DOIUrl":"https://doi.org/10.1109/IWMN.2013.6663791","url":null,"abstract":"This paper introduces a modeling approach to the design and evaluation of large wireless sensor networks against the topology of the network and the monitoring application and taking into account the performance degradation due to the power consumption. The model is built by composing Stochastic Activity Network (SAN) models of the nodes and a Markovian Agent Model (MAM) of the whole network. The SAN models are used to conduct a performance analysis of the nodes (i.e. to measure their sampling time) and evaluate their mean time to discharge. The MAM is used to compose the results of the SAN model analysis into a complex topology-aware model able to evaluate the Packet Delivery Ratio (PDR) and the power consumption of the network. The possibility to model spatially distributed interdependencies featured by the MAM makes the integrated model a concrete, scalable mean to evaluate different design choices and perform meaningful what-if analyses. The model has been validated by comparing the analysis results with real node values: specifically we present the experimental results obtained by using TelosB nodes equipped with TinyOs.","PeriodicalId":218660,"journal":{"name":"2013 IEEE International Workshop on Measurements & Networking (M&N)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131563614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}