Wi Sensor Network Case Study

Improved Essays
CHAPTER 1
1. INTRODUCTION
1.1 WIRELESS SENSOR NETWORK (WSN): Wi-Fi sensor networks (WSN), once in a while called wireless tool and actuator networks (WSAN), are spatially disbursed autonomous sensors to monitor bodily or environmental situations, which include temperature, sound, pressure, and so forth. and to cooperatively pass their expertise through the network to a major location. The extra brand new networks are bi-directional, additionally sanctioning control of device activity. The improvement of wireless sensor networks became impelled by navy applications like area surveillance; in recent times such networks vicinity unit utilized in numerous industrial and shopper applications, along with manner tracking and management, system
…show more content…
every such tool community node has typically many components: a radio transceiver with accomplice degree inner accomplice degreetenna or association to an outside antenna, a microcontroller, associate diploma digital circuit for interfacing with the sensors and an energy deliver, normally a battery or accomplice degree embedded kind of electricity gather. A sensor node may also range in length from that of a shoebox all the way down to the dimensions of a grain of dust, even though functioning "motes" of actual microscopic dimensions have nevertheless to be created. The value of tool nodes is equally variable, ranging from many to many dollars, relying on the complexness of the character device nodes. length and fee constraints on tool nodes lead to corresponding constraints on assets like strength, reminiscence, computational speed and communications information measure. The topology of the WSNs can range from a trustworthy superstar network to a complicated multi-hop wi-fi mesh network. The propagation …show more content…
In region observation, the WSN is deployed over a vicinity wherein some development is to be monitored. A navy example is that using sensors detects enemy intrusion; a civilian example is the geo-fencing of gas or oil pipelines.
1.2.2Health Care Monitoring:
The medical packages may be of two sorts: wearable and constituted. Wearable devices are used at the frame surface of a human or honestly at close proximity of the user. The implantable scientific gadgets are those that are inserted with in natural shape. There are several exclusive packages too e.g. body position dimension and vicinity of the man or woman, universal monitoring of unwell sufferers in hospitals and at houses. body-vicinity networks can gather info regard in gasoline companion man or woman's health, health, and electricity expenditure.
1.2.3 Three Environmental/ Earth sensing: There are numerous packages in observance environmental parameters, examples of which vicinity unit given underneath. They percentage the more challenges of harsh environments and decreased energy offer.

1.2.4 Four Air pollutants

Related Documents

  • Improved Essays

    2. The IEEE 802.11n:- The IEEE 802.11n standard, appear in 2008, And become popular because the jump in data transfer rates from about 54 Mbps to nearly 600 Mbps. The IEEE 802.11n standard was officially completed in 2009 but most of the technical features were ratified in 2007. Most companies supported for the creation of a 60 GHz based standard for WLANs to succeed the 802.11n standard, and a lot of attention and effort was devoted to this activity.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 6 Essay

    • 565 Words
    • 3 Pages

    This specifies the general interface between the network layer (IP etc.) and the Data Link layer (Ethernet, Token Ring etc.) It’s the standard for the upper Data Link layer sublayer, also known as the Logical Link Control layer. It’s responsible for flow and error control. The Data Link layer wants to send some data over the network, 802.2 LLC helps make this possible. b. 802.3 – Ethernet 802.3 is the standard which Ethernet operates by.…

    • 565 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    NS-2 offers a poor graphical support, no Graphical User Interface (GUI), the subscribers have to directly face to text commands of the electronic devices. Because of the continuing modifying the code base, the result may not be consistent and consist bugs. NS-2 cannot simulate issues of the power consumption, bandwidth or energy saving in WSN. NS-2 has a scalability issue no. of nodes cannot be greater than 100.…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Pm3110 Unit 4 Test Paper

    • 1148 Words
    • 5 Pages

    1. What are the four generic architectural components of a public communications network? Define each term? The Generic architectural Components are Subscribers, Subscriber Line, Exchanges and Trunks.…

    • 1148 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    User connectivity will be controlled and authenticated through active directory. User devices will require and object to be created in active directory which will be used to authenticate the device using 802.1x. When a user device is connected to the network it will initially communicate on a VLAN will only be allowed to communicate with active directory. Then once the device has been authenticated it will place the device on the appropriate VLAN that it will operate on. Any device that has not been set up in Active Directory will be placed into a null VLAN which will not grant access to the network.…

    • 707 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    VII. REFERENCES: [1] JaydpSen,”A survey on Wireless Sensor network Security”,Technical report 55-77,International Journal of Communication Networks and Information Security(IJCNIS)Vol 1,No2 August 2009. [2] Vidhani Kumar and Manik Lal Das,”Securing Wireless Sensor Networks with Public Key Techniques Adhoc & Sensor Wireless Networks”,pp189-201,2008. [3]” Security architecture for the Internet Protocol”,RFC 2401,November 2013. [4 ]http://www.ssh.com [5] D.W.Carman,P.S.Krus and B.J.Matt,”Constraints and approaches for distributed sensor network security”,Technical Report 00-010,NAI Labs,Network Associates Inc., Glenwood MD,2012.…

    • 637 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The individual server does the following responsibilities [47]: • Initialization, configuration, and synchronization of WBAN nodes • Monitor and controlling Control and monitor actions of WBAN…

    • 683 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    This paper describes about the notion of Free Wi-Fi in New York City, which is called LinkNYC and elaborates the system in terms of its network configuration. The network diagram will be provided to illustrate the overall system. Moreover, identifying the cost associates in this project. Most important, expounding how this system could affect towards marketing for smartphone users. Introduction…

    • 1026 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Star Life Case Analysis

    • 2131 Words
    • 9 Pages

    Mission Statement The mission of Star Life Inc., guided by relentless focus and determination, will make every day our opportunity to design, develop and market the best medical equipment and tools to equip Health Professionals and organizations for many different and diverse medical situations. We will integrate modern technology and untapped technology to design unique equipment that will fill major needs in the medical industry. Also, reengineer old technology and integrate multipurpose information systems to make Doctors and Health Care professionals more flexible and transparent in their every day fast pace job. We as a company have a mission and a duty to the many Health Care Professionals and Health Care Organizations to equip them…

    • 2131 Words
    • 9 Pages
    Great Essays
  • Great Essays

    Our Wi-Fi network is based on the IEEE 802.11 b/g standards, which is the most commonly used…

    • 884 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    P1 Unit 3 Network Analysis

    • 1515 Words
    • 7 Pages

    Networking P1: DESCRIBE THE TYPES OF NETWORKS AVAILABLE AND HOW THEY RELATE TO PARTICULAR NETWORK STANDARDS AND PROTOCOLS There are many types of wireless networks available. This includes: WAN, LAN, MAN, PAN, WLAN. Below, I will go into detail about each type that will help you understand exactly what each type of network is and what it consists of.…

    • 1515 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Zigbee Attack Essay

    • 1404 Words
    • 6 Pages

    packets. This will drain the battery of the Zigbee module and can be used to disable the device [9]. The second and most overlooked attack is a physical attack on the actual Zigbee device. Zigbee devices are not very secure.…

    • 1404 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Wearable Health Care

    • 1219 Words
    • 5 Pages

    When the Affordable Care Act went into action in 2013, which required all people to acquire health insurance, it was in order to improve the quality of care, increase access to insurance and services, and lower the cost of care. In order to lower the cost of health care, changes by the insurance companies and hospitals had to be executed. Hospitals had to make adjustments to adapt to their new budget. As a result, changes made included position cuts and efficiency improvement. One very recent adjustment of efficiency in the hospital settings has been the addition of new technology like wearable health devices.…

    • 1219 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Patient Safety Trends

    • 949 Words
    • 4 Pages

    Technology in health care has become an active participant in collecting, recording, or transmitting clinical data. There are various types of medical devices and technology used such as cardiovascular (tele) monitors, oxygen saturation monitors, intravenous pumps, feeding pumps, EKGs, ventilators, bed/chair alarms, security alarms and call bells. The purpose of medical-technical equipment is to support nursing care in detecting, prevent, monitor, treat, compensate for injury and disability or alleviate disease (Tunlind, 2015). However the Joint Commission announced their 2014 National Patient Safety Goal on clinical alarm safety due to the increasing amount of injuries and deaths that had occurred from ignoring alarms, turning alarms down…

    • 949 Words
    • 4 Pages
    Improved Essays