13 resultados para Cognitive Radio Sensor Networks (CRSN)
em Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland
Resumo:
Wireless sensor networks and its applications have been widely researched and implemented in both commercial and non commercial areas. The usage of wireless sensor network has developed its market from military usage to daily use of human livings. Wireless sensor network applications from monitoring prospect are used in home monitoring, farm fields and habitant monitoring to buildings structural monitoring. As the usage boundaries of wireless sensor networks and its applications are emerging there are definite ongoing research, such as lifetime for wireless sensor network, security of sensor nodes and expanding the applications with modern day scenarios of applications as web services. The main focus in this thesis work is to study and implement monitoring application for infrastructure based sensor network and expand its usability as web service to facilitate mobile clients. The developed application is implemented for wireless sensor nodes information collection and monitoring purpose enabling home or office environment remote monitoring for a user.
Resumo:
In this thesis the design of bandpass filters tunable at 400 MHz – 800 MHz was under research. Microwave filters are vital components which provide frequency selectivity in wide variety of electronic systems operating at high frequencies. Due to the occurrence of multi-frequency bands communication and diverse applications of wireless devices, requirement of tunable filters exists. The one of potential implementation of frequency-agile filters is frontends and spectrum sensors in Cognitive Radio (CR). The principle of CR is to detect and operate at a particular available spectrum without interfering with the primary user’s signals. This new method allows improving the efficiency of utilizing allocated spectrum such as TV band (400 MHz – 800 MHz). The focus of this work is development of sufficiently compact, low cost tunable filters with quite narrow bandwidth using currently available lumped-element components and PCB board technology. Filter design, different topologies and methods of tuning of bandpass filters are considered in this work. As a result, three types of topologies of bandpass filter were simulated and realised. They use digitally tunable capacitors (DTCs) for adjusting central frequency at TV "white space" spectrum. Measurements revealed that schematics presented in this work have proper output response and filters are successfully tuned by DTCs.
Resumo:
Wireless sensor networks (WSNs) are the key enablers of the internet of things (IoT) paradigm. Traditionally, sensor network research has been to be unlike the internet, motivated by power and device constraints. The IETF 6LoWPAN draft standard changes this, defining how IPv6 packets can be efficiently transmitted over IEEE 802.15.4 radio links. Due to this 6LoWPAN technology, low power, low cost micro- controllers can be connected to the internet forming what is known as the wireless embedded internet. Another IETF recommendation, CoAP allows these devices to communicate interactively over the internet. The integration of such tiny, ubiquitous electronic devices to the internet enables interesting real-time applications. This thesis work attempts to evaluate the performance of a stack consisting of CoAP and 6LoWPAN over the IEEE 802.15.4 radio link using the Contiki OS and Cooja simulator, along with the CoAP framework Californium (Cf). Ultimately, the implementation of this stack on real hardware is carried out using a raspberry pi as a border router with T-mote sky sensors as slip radios and CoAP servers relaying temperature and humidity data. The reliability of the stack was also demonstrated during scalability analysis conducted on the physical deployment. The interoperability is ensured by connecting the WSN to the global internet using different hardware platforms supported by Contiki and without the use of specialized gateways commonly found in non IP based networks. This work therefore developed and demonstrated a heterogeneous wireless sensor network stack, which is IP based and conducted performance analysis of the stack, both in terms of simulations and real hardware.
Resumo:
Diplomityö käsittelee IPSec-protokollan (IP Security Protocol) implementointia UMTS:n (Universal Mobile Telecommunications System) pakettikytkentäiseen verkkoon. Runkoverkkoa käytetään mobiilikäyttäjän datan siirtämiseen sekä verkkoelementtien väliseen ohjausinformaation välitykseen. Koska UMTS:n runkoverkot ovat IP-pakettikytkentäisiä verkkoja, IPSec-protokollaa voidaan käyttää lähetettyjen IP-datasähkeiden suojaamiseen. IPSec- ja IKE-protokollien (Internet Key Exchange) käyttö on koettu monimutkaiseksi kiinteissä verkoissa. Tämän saman ongelman edessä tulevat olemaan myös operaattorit, kun he alkavat rakentaa UMTS-verkkojaan. On kuitenkin muistettava se, että tulevaisuudessa lähes kaikki data mukaanlukien ääni ja video on tarkoitus siirtää IP-protokollan avulla. IP-teknologiaan perustuva tiedonsiirron kasvu lisää IPSec-protokollan merkitystä ei ainoastaan runkoverkossa mutta myös radioliityntäverkoissa sekä SS7-merkinantoverkoissa (Signaling System No. 7). Diplomityö on tehty osaksi diplomi-insinöörin tutkintoa Lappeenrannan teknillisessä yliopistossa. Työ on tehty Nokia Networksin palveluksessa Helsingissä, vuosien 2002 ja 2003 välisenä aikana.
Resumo:
Työn teoriaosuudessa tutustutaan ensin yleisimpiin paikannusmenetelmiin. Käsiteltävänä ovat GPS-satelliittipaikannus sekä radiosoluverkkojen paikannusmenetelmät solupaikannuksesta monimutkaisempiin signaalin ominaisuuksia tutkiviin menetelmiin. Teoriaosuudessa käsitellään myös IEEE 802.11 –standardin PHY- ja MAC-kerrosten toimintaa sekä WLAN-verkon siirtotien ominaisuuksia paikannuksen kannalta. Ennen paikannusjärjestelmän toteuttamista työssä esitellään menetelmiä ja tuloksia muista tutkimuksista samalta tutkimusalueelta. Työssä toteutetaan paikannusjärjestelmä sekä solupaikannusta että signaalitasopaikannusta hyödyntäen. Solupaikannusjärjestelmälle määritellään palvelurajapinta, jonka kautta paikannuspalvelua voidaan hyödyntää muissa palveluissa. Kaksi paikannuspalvelun päälle luotua palvelua esitellään lyhyesti malliesimerkkeinä. Signaalitasopaikannuksen osalta kuvataan kaksi menetelmään kuuluvaa vaihetta ja yksittäisten komponenttien toiminta näissä vaiheissa. Paikannusmenetelmien tarkkuutta tutkitaan mittausten avulla ja testituloksista muodostetaan paikannustarkkuutta kuvaavat tilastot. Solupaikannuksen keskimääräinen virhe on ±50 metriä. Vastaavasti signaalitasopaikannuksen virhe on ±4 metriä ja parannettua algoritmia käyttäen ±3 metriä.
Resumo:
Yleinen tapa betonin kuivumisnopeuden mittaamiseen on käyttää pieniä testivaluja kuivumisen arvioimiseen. Tälle epätarkalle tekniikalle olisi hyvä löytää korvaaja. Tässä kandidaatintyössä tutkitaan soveltuvatko lämpötila-anturilliset RFID-tunnisteet betonin kuivumisnopeuden mittaamiseen ja onko tällä tekniikalla potentiaalia syrjäyttää vanhat toimintatavat. Tämän lisäksi työssä tutkitaan laajemmin RFID-tekniikan ja erityisesti anturillisten RFID-tunnisteiden hyödyntämistä rakennusteollisuudessa. RFID-tekniikka soveltuu moniin rakennusteollisuuden käyttökohteisiin, kuten tiedon hallinnointiin ja rakenteiden kunnon seurantaan. Erilaisten elementtien, materiaalien, työkalujen yms. identifioinnilla pystytään saavuttamaan selkeitä hyötyjä ja RFID on oiva työkalu tähän. Rakenteiden kunnon seurannassa on yleistä käyttää anturiverkkoja. Näiden osalta yleisempää on käyttää langallisia verkkoja, mutta langattomuus on yleistymässä näissäkin. RFID tarjoaa myös näiden osalta uusia hyötyjä. Lämpötila-anturilliset RFID-tunnisteet soveltuvat hyvin betonin kuivumisnopeuden mittaamiseen. Tunnisteiden avulla lämpötila pystytään mittaamaan betonin sisältä. Sisäinen lämpötilan avulla betonin kuivumisnopeus pystytään määrittämään tarkemmin. Tämä tekniikka on myös nopeampi ja edullisempi kuin vanhat toimintatavat.
Resumo:
This thesis comprises seven peer-reviewed articles and examines systems and applications suitable for increasing Future Force Warrior performance, minimizing collateral damage, improving situational awareness and Common Operational Picture. Based on a literature study, missing functionalities of Future Force Warrior were identified and new ideas, concepts and solutions were created as part of early stages of Systems of Systems creation. These introduced ideas have not yet been implemented or tested in combat and for this reason benefit analyses are excluded. The main results of this thesis include the following: A new networking concept, Wireless Polling Sensor Network, which is a swarm of a few Unmanned Aerial Vehicles forming an ad-hoc network and polling a large number of fixed sensor nodes. The system is more robust in a military environment than traditional Wireless Sensor Networks. A Business Process approach to Service Oriented Architecture in a tactical setting is a concept for scheduling and sharing limited resources. New components to military Service Oriented Architecture have been introduced in the thesis. Other results of the thesis include an investigation of the use of Free Space Optics in tactical communications, a proposal for tracking neutral forces, a system for upgrading simple collaboration tools for command, control and collaboration purposes, a three-level hierarchy of Future Force Warrior, and methods for reducing incidents of fratricide.
Resumo:
The continuous technology evaluation is benefiting our lives to a great extent. The evolution of Internet of things and deployment of wireless sensor networks is making it possible to have more connectivity between people and devices used extensively in our daily lives. Almost every discipline of daily life including health sector, transportation, agriculture etc. is benefiting from these technologies. There is a great potential of research and refinement of health sector as the current system is very often dependent on manual evaluations conducted by the clinicians. There is no automatic system for patient health monitoring and assessment which results to incomplete and less reliable heath information. Internet of things has a great potential to benefit health care applications by automated and remote assessment, monitoring and identification of diseases. Acute pain is the main cause of people visiting to hospitals. An automatic pain detection system based on internet of things with wireless devices can make the assessment and redemption significantly more efficient. The contribution of this research work is proposing pain assessment method based on physiological parameters. The physiological parameters chosen for this study are heart rate, electrocardiography, breathing rate and galvanic skin response. As a first step, the relation between these physiological parameters and acute pain experienced by the test persons is evaluated. The electrocardiography data collected from the test persons is analyzed to extract interbeat intervals. This evaluation clearly demonstrates specific patterns and trends in these parameters as a consequence of pain. This parametric behavior is then used to assess and identify the pain intensity by implementing machine learning algorithms. Support vector machines are used for classifying these parameters influenced by different pain intensities and classification results are achieved. The classification results with good accuracy rates between two and three levels of pain intensities shows clear indication of pain and the feasibility of this pain assessment method. An improved approach on the basis of this research work can be implemented by using both physiological parameters and electromyography data of facial muscles for classification.
Resumo:
Cyber security is one of the main topics that are discussed around the world today. The threat is real, and it is unlikely to diminish. People, business, governments, and even armed forces are networked in a way or another. Thus, the cyber threat is also facing military networking. On the other hand, the concept of Network Centric Warfare sets high requirements for military tactical data communications and security. A challenging networking environment and cyber threats force us to consider new approaches to build security on the military communication systems. The purpose of this thesis is to develop a cyber security architecture for military networks, and to evaluate the designed architecture. The architecture is described as a technical functionality. As a new approach, the thesis introduces Cognitive Networks (CN) which are a theoretical concept to build more intelligent, dynamic and even secure communication networks. The cognitive networks are capable of observe the networking environment, make decisions for optimal performance and adapt its system parameter according to the decisions. As a result, the thesis presents a five-layer cyber security architecture that consists of security elements controlled by a cognitive process. The proposed architecture includes the infrastructure, services and application layers that are managed and controlled by the cognitive and management layers. The architecture defines the tasks of the security elements at a functional level without introducing any new protocols or algorithms. For evaluating two separated method were used. The first method is based on the SABSA framework that uses a layered approach to analyze overall security of an organization. The second method was a scenario based method in which a risk severity level is calculated. The evaluation results show that the proposed architecture fulfills the security requirements at least at a high level. However, the evaluation of the proposed architecture proved to be very challenging. Thus, the evaluation results must be considered very critically. The thesis proves the cognitive networks are a promising approach, and they provide lots of benefits when designing a cyber security architecture for the tactical military networks. However, many implementation problems exist, and several details must be considered and studied during the future work.
Resumo:
The wide adaptation of Internet Protocol (IP) as de facto protocol for most communication networks has established a need for developing IP capable data link layer protocol solutions for Machine to machine (M2M) and Internet of Things (IoT) networks. However, the wireless networks used for M2M and IoT applications usually lack the resources commonly associated with modern wireless communication networks. The existing IP capable data link layer solutions for wireless IoT networks provide the necessary overhead minimising and frame optimising features, but are often built to be compatible only with IPv6 and specific radio platforms. The objective of this thesis is to design IPv4 compatible data link layer for Netcontrol Oy's narrow band half-duplex packet data radio system. Based on extensive literature research, system modelling and solution concept testing, this thesis proposes the usage of tunslip protocol as the basis for the system data link layer protocol development. In addition to the functionality of tunslip, this thesis discusses the additional network, routing, compression, security and collision avoidance changes required to be made to the radio platform in order for it to be IP compatible while still being able to maintain the point-to-multipoint and multi-hop network characteristics. The data link layer design consists of the radio application, dynamic Maximum Transmission Unit (MTU) optimisation daemon and the tunslip interface. The proposed design uses tunslip for creating an IP capable data link protocol interface. The radio application receives data from tunslip and compresses the packets and uses the IP addressing information for radio network addressing and routing before forwarding the message to radio network. The dynamic MTU size optimisation daemon controls the tunslip interface maximum MTU size according to the link quality assessment calculated from the radio network diagnostic data received from the radio application. For determining the usability of tunslip as the basis for data link layer protocol, testing of the tunslip interface is conducted with both IEEE 802.15.4 radios and packet data radios. The test cases measure the radio network usability for User Datagram Protocol (UDP) based applications without applying any header or content compression. The test results for the packet data radios reveal that the typical success rate for packet reception through a single-hop link is above 99% with a round-trip-delay of 0.315s for 63B packets.
Resumo:
Kiristyville markkinoille on aina tuotava jotain uutta tarjottavaa ja SDH-kortti on yksi sellainen tuote jonka Nokia Networks julkistaa osaksi uutta Nokia Flexihub Nodea. Tavoitteena on suunnitella VC-12kanavoitu STM-1 kortti yhdistämään ylemmän tason tietoliikenneverkko suuren kapasiteetin radioon. Ennen kuin markkinoilla on valmis tuote, on sen takana valtaisa määrä työtä. Erilaisia dokumentteja on pitänyt tuottaa ja sopimuksia tehdä. Esimerkiksi vaatimusmäärittelyt on oltava selvät, jotta tiedetään mitä tuotteelta halutaan. Tätä ennen on kuitenkin pitänyt ymmärtää miten SDHtoimii ja miten otsikkotavuja käsitellään. Myös erilaiset piirivalinnat aiheuttavat miettimistä, sillä markkinoilla on runsaasti valmiita piirejä SDH signaalinkäsittelyyn. Varma tiedonsiirto on tärkeää puhelinoperaattorille ja siksi joudutaan miettimään varmennuksia ja niiden toteuttamista. Myös synkronointi on tärkeä osa SDH järjestelmää ja sen toteuttaminen hyvin on tärkeää. Hälytykset on otettava huomioon ja mietittävä, miten niiden käsittely saadaan hoidettua järkevästi, ilman että mikään järjestelmän osa ruuhkautuu kohtuuttomasti. Tässä Diplomityössä on tutustuttu SDH-järjestelmään, otsikkotavujen käsittelyyn ja vaatimusmäärittelyihin.
Resumo:
General Packet Radio Service (GPRS) mahdollistaa pakettimuotoisen tiedonsiirron GSM-verkossa. Se tarjoaa yhteyden pakettidataverkkoihin, nostaen samalla tiedonsiirtonopeutta radiorajapinnassa. Radioresurssit ovat varattuna vain silloin kun on jotain lähetettävää, tehden täten radioresurssien käytön paljon tehokkaammaksi. Tämä diplomityö keskittyy GPRS protokollaan ja erityisesti sen datapinossa olevaan Radio Link Control (RLC) kerrokseen. RLC-kerros huolehtii GPRS- puhelimen ja tukiaseman välisen yhteyden luotettavuudesta. Työn tavoitteena on tutkia RLC-kerroksen toiminnallisuutta ja sen luotettavuutta heikossa kentässä, sekä selvittää heikon kentän vaikutusta uudelleenlähetyksiin. Työn tuloksena saadaan arvio signaalin voimakkuuden sekä uudelleen lähetysten vaikutuksesta GPRS:n datansiirtonopeuteen. Tämä työ käsittelee myös lyhyesti GSM-järjestelmää, koska lukijan on näin helpompaa ymmärtää myös GPRS-järjestelmän vaatimia teknisiä muutoksia. Tämä diplomityö on tehty osana Nokia Matkapuhelimet Oyj:ssä käynnissä olevaa GPRS tuotekehitysprojektia. Työn tuloksia käytetään testauksen tukena ja niitä on käytetty apuna RLC-kerroksen luotettavuustestauksen suunnittelussa.
Resumo:
Security issues in telecommunication networks have become more important due to the development of the industry. The number of network elements and services has increased in the radio network as in the core network side, which has increased the number of security related issues. Ericsson has developed an OSS-RC product for operation and maintenance porpoises into the telecommunication networks. OSS-RC is used in a number of telecommunications operators, which have Ericsson's products used in their telecommunication networks. Ericsson provides product installation and maintenance support and guidance, but despite this, the product may have security related issues, either due to lack of following the instructions, human error or defect in the product itself or in a third party products attached. Ericsson’s Operation and Maintenance Security Service for OSS-RC networks aims to provide tools for checking the security level of the O&M product so that it meets all requirements and Ericsson’s own security related rules. Each customer has a unique telecommunications network structure and services, and so the security service has to be to create individually depending on the customer. The purpose of this thesis is to define the basic instructions for creating the security service for different customers.