431 - copy

Upload: karthikktnk

Post on 06-Apr-2018

232 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/2/2019 431 - Copy

    1/24

    Page | 1

    ABSTRACT

    Dragging the world towards wireless galaxy various sensors are already in a

    broad use Today as part of different devices or as standalone devices connected to a

    network usually toMonitor industrial processes, equipments or installations.

    The advancements in technology, wireless communications have

    enhanced development of small, low power and low cost devices. Such devices when

    organized into a network, present a powerful platform that can be used in many

    interesting applications.

    Bluetooth is a low cost, short-range, wireless technology with small

    footprint, low power consumption and reasonable throughput. Bluetooth wireless

    technology has become global technology specification for always on wireless

    communication not just as point to point but was a network technology as well.

  • 8/2/2019 431 - Copy

    2/24

    Page | 2

    List Of Figures

    NAME Pg.No.

    1. Piconet.. 112. A Scatter net. 123. Wireless sensor network Architecture.. 144. A Bluetooth based smart pressure sensor node 165. Software Architecture of Gateway 186. Bluetooth hardware architecture 21

  • 8/2/2019 431 - Copy

    3/24

  • 8/2/2019 431 - Copy

    4/24

    Page | 4

    SPREAD SPECTRUM

    Basic principle:

    Spread Spectrum modulation techniques are defined as being those techniques

    in which The bandwidth of the transmitted signal is much greater than the bandwidth

    of the original message, and the bandwidth of the transmitted signal is determined by

    the message to be transmitted and by an additional signal known as the Spreading

    Code.

    TYPES OF SPREAD SPECTRUM

    1. Frequency hopping Spread Spectrum2. Direct sequence Spread Spectrum

  • 8/2/2019 431 - Copy

    5/24

    Page | 5

    FREQUENCY HOPPING SPREAD SPECTRUM

    FHSS is a very robust technology, with little influence from noises, reflections, other radio

    stations or other environment factors. In addition, the number of simultaneously active systems in

    the same geographic area (collocated systems) is significantly higher than the

    equivalent number for DSSS systems.

    All these features make the FHSS technology the one to be selected for installations

    designed to cover big areas where a big number of collocated systems is required and where the

    use of directional antennas in order to minimize environment factors influence is impossible.

    Typical applications for FHSS include cellular deployments for fixed Broadband Wireless

    Access (BWA), where the use of DSSS is virtually impossible because of its limitations.

    Basic Principle

    The frequency of the carrier is periodically modified (hopped) following a specific

    sequence of frequencies.

  • 8/2/2019 431 - Copy

    6/24

    Page | 6

    FHSS main parameters

    FHSS is defined (in IEEE 802.11) in the 2.4 GHz band as operating over 79 frequencies

    ranging from 2.402 GHz to 2.480 GHz (country specific bands have different frequencies, defined

    in IEEE 802.11 and IEEE 802.11.d).

    Each of the frequencies is GFSK modulated, with a channel width of 1 MHz. The rates

    defined are 1 Mbps and 2 Mbps (there are products in the market operating at 3 Mbps,

    too)

    System Behavior using FHSS

    1.- Systems Collocation

    2.- Noise and Interference Immunity

    3.- The Near / Far problem

    4.- Throughput

    5.- Multipath Immunity

    6.- Time and frequency diversity

    7.- Security

    8.- Bluetooth interference

    Systems Collocation

    The issue: How many independent systems may operate simultaneously without

    interference?

    For FHSS systems, IEEE 802.11 defines 79 different hops for the carrier

    frequency. Using these 79 frequencies, IEEE 802.11 defines 78 hopping sequences (each with 79

    hops) grouped in three sets of 26 sequences each. Sequences from same set encounter minimum

    collisions and therefore may be allocated to collocated systems.

    Theoretically, 26 FHSS systems may be collocated, but collisions will still occur

    in significant amounts. To lower the amount of collisions to acceptable

    levels, the actual number of FHSS collocated systems should be around 15.

  • 8/2/2019 431 - Copy

    7/24

    Page | 7

    All the above is correct for the case in which the FHSS collocated systems operate independently,

    without any synchronization among their hopping sequences.

    If synchronization is allowed, 79 systems could be collocated (theoretically), each one of

    themusing at any moment in time, one of the 79 available frequencies. However, this would

    require expensive filters in the radio circuitry.

    Actual products require about 6 MHz separation allowing the collocation of about 12

    systems, without any collision! While such synchronization is not always allowed in the unlicensed

    band of 2.4 GHz, it is common practice in the licensed bands.

    The possibility of having collocated systems without collisions, has a tremendous impact

    on the aggregate capacity / throughput of the installation as well as its efficiency in terms of bps

    per Hz (see Throughput section, later in this paper).

    For installations requiring big coverage and multiple collocated cells, it would

    be much easier to use FHSS. DSSS could be used, too, but then, mechanically collocated cells

    (antennas installed on same pole) should be made non overlapping cells at the radio level

    through the use of directional antennas But directional antennas means limited coverage

    requiring more systems to be installed which are difficult to design because of the collocation

    issueThis severe limitation of DSSS is in effect for the 2Mbps flavor of DSSS as well as for the

    11Mbpsone.

    2. Noise and Interference Immunity

    The issue: Capability to operate when other radio signals are present in the same band.

    FHSS systems operate with SNR (Signal to Noise Ratio) of about 18 dB.DSSS systems,

    because of the more efficient modulation technique used (PSK), can operate with SNR as low as 12

    dB.

    3- Near / Far problem

    The issue: The problems generated to a receiver by other active transmitters

    located in its proximity, are known as Near / Far problems.

    The interfering signals described above may be generated for example by a foreign radio

    transmitter located close to my receiver. The signals generated by the foreign transmitter,

  • 8/2/2019 431 - Copy

    8/24

    Page | 8

    being received by my receiver at higher power levels, could blind it , making it unable to hear its

    partner.

    While the problem is critical in DSSS systems, if the receiver is FHSS, the worst

    case will be that the foreign transmitter will block SOME hops, forcing my FHSS system to

    work in less than optimum conditions, but allowing it to work!

    4- Throughput

    The issue: What amount of data is actually carried by the system (measured in bps).

    The RATE of a system is defined as the amount of data (per second) carried by a system

    WHEN IT IS ACTIVE. As most communications systems are not able to carry data 100% of the

    time, an additional parameter - the THROUGHPUT

    It is defined, as the AVERAGE amount of data (per second) carried by the system. The

    average is calculated over long periods of time. Obviously, the throughput of a system is lower than

    its rate.

    In addition, when looking for the amount of data carried, the overhead introduced by the

    communication protocol should be considered.

    5- Multipath

    The issue: Environments with reflective surfaces (such as buildings, office walls, etc.)

    generate multiple possible propagation paths between transmitter and receiver and therefore the

    receiver receives multiple copies of the original (transmitted) signal, shifted in time.

    The multiple copies of the original signal arrive at the receiver with different instantaneous

    amplitudes and phases. The mixing of these copies at the receiver results in having some

    frequencies canceling one another, while other frequencies will sum up. The result is a process of

    selective fading of frequencies in the spectrum of the received signal.

    FHSS systems operate with narrow band signals located around different carrier

    frequencies.Ifat a specific moment, the FHSS system is using a carrier frequency significantly

    faded as a result of multipath, the FHSS receiver could not get enough energy to detect the radiosignal. (narrow rectangle in fig.3b). The resultant loss of information is corrected by re-

    transmitting the lost packets.

  • 8/2/2019 431 - Copy

    9/24

    Page | 9

    6- Time and frequency diversity

    Both DSSS and FHSS retransmit lost packets, until the receiving part acknowledges correct

    reception. A packet could be lost because of noises or multipath effects.

    This capability of a system to repeat unsuccessful transmissions at later moments in time is

    known as time diversity.

    DSSS systems use time diversity, but the problem is that they retransmit on the

    same 22 MHz sub band! If the noise is still there or if the topography of the site did not change,

    and as a result the multipath effects will be again present, the transmission could be again

    unsuccessful! The multipath effects are a function of frequency.

    For same topography, some frequencies encounter multipath effects, while others do not.

    FHSS systems use time diversity (they retransmit lost packets at later moments in time)

    but they also use frequency diversity (packets may be retransmitted on different frequencies /

    hops). Even if some hops (frequencies) encounter multipath effects or noises, others will not, and

    the FHSS system will succeed in executing its transmission.

    7.- SecurityThe issue: Protecting the transmission against eavesdropping IEEE 802.11 compliant DSSS

    systems use one well known spreading sequence of 11 chips, andcan modulate one of the 14

    channel defined in the standard. As the sequence used is known, the carrier frequency is fixed for a

    given system, and the number of possible frequencies is limited, it would be quite easy for a

    listener to tune in on the DSSS transmission.

    Message protection should be achieved by encrypting the data. This option increases the

    price of the product, while lowering its performance, because of the processing power needed for

    the encryption process.

    In FHSS, the frequencies to be used in the hopping sequence may be selected by the

    user. In the unlicensed band, any group of 26 frequencies or more (out of the 79 available) is

    legal. To tune in, a listener should know the number of frequencies selected in the system,

    the actual

    frequencies, the hopping sequence, as well as the dwell time! The FHSS modulation acts as a

  • 8/2/2019 431 - Copy

    10/24

    Page | 10

    layer 1 encryption process. There could be no need for application level encryption!

    8.- Bluetooth / IEEE 802.15 WPAN interference

    The issue: System behavior in the presence of Bluetooth / IEEE 802.15 collocated systemsBluetooth radio is a FHSS operating in the 2.4 GHz band, with a dwell time of 0.625ms (1,600

    hops per second).

    When DSSS executes a transmission, it is using 22 MHz for the duration of the transmitted

    frame. When FHSS executes a transmission, it is using 1 MHz for the duration of the transmitted

    frame. The chances of having Bluetooth hitting the 22 MHz band used by DSSS are higher than

    the chances of it hitting the 1 MHz band used by FHSS.

    Based on the above observation, we can conclude that, basically, DSSS is more sensitive to

    Bluetooth interference than FHSS.

  • 8/2/2019 431 - Copy

    11/24

    Page | 11

    BLUETOOTH

    Bluetooth operates in the unlicensed ISM band at 2.4 GHz frequency band and use

    frequency hopping spread spectrum technique. A typical blue tooth device has a range of about 10meters and can be extended to 100 meters. A Communication channels supports total bandwidth of

    1 Mb/sec. A single connection supports a maximum asymmetric data transfer rate of 721 Kbps

    maximum of three channels.

    BLUETOOTH-NETWORKS

    In Bluetooth, a piconet is a collection of up to 8 devices that frequencies hop together. Each

    piconet has one master usually a device that initiated establishment of the piconet, and up to 7 slave

    devices. Masters blue tooth address is used for definition of the frequency hopping sequence. Slave

    devices use the masters clock to synchronize their clocks to be able to hop simultaneously.

    APICONET

  • 8/2/2019 431 - Copy

    12/24

    Page | 12

    When a device wants to establishment a piconet it has to perform inquiry to discover other

    blue tooth devices in the range. Inquiry procedure is defined in such a way to ensure that two

    devices will after some time, visit the same frequency same time when that happens, required

    information is exchanged and devices can use paging procedure to establish connection.

    When more than 7 devices need to communicate, there are two options. The first one is to

    put one or more devices into the park state. Blue tooth defines three low power modes sniff, hold,

    and park. When a device is in the park mode then it disassociates from and piconet, but still

    maintains timing synchronization with it. Master of the piconet periodically broadcasts beacons

    (warning) to invite the slave to rejoin the piconet or to allow the slave to rejoin. The slave can rejoin

    the piconet only if there are less than seven slaves already in the piconet. If not so, the master has to

    park one of the active slaves first. All these actions cause delay and for some applications it can be

    unacceptable for eg : process control applications, that requires response from the command center

    (central control room).

    Scatter net consists of several piconets connected by devices participating in multiple

    piconet. These devices can be slaves in all piconet or master in one piconet and slave in other

    piconet. Using scatter net higher throughput is available and multi-hop connections between devices

    in different piconets are possible. i.e. theunit can communicate in one piconet at time so they jump

    from pioneer to another depending upon the channel parameter.

    A SCATTER NET

  • 8/2/2019 431 - Copy

    13/24

    Page | 13

    BLUETOOTH BASED SMART SENSOR NETWORKS

    The main challenge in front of Bluetooth developers now is to prove interoperability

    between different manufactures devices and to provide numerous interesting applications. One of

    such applications is wireless sensor networks.

    Wireless sensor networks comprise number of small devices equipped with a sensing unit,

    microprocessor, and wireless communication interface and power source.

    1. An important feature of wireless sensor networks is collaboration of network nodes duringthe task execution.

    2. Another specific characteristics of wireless sensor network is Data-centric natureAs deployment of smart sensor nodes is not planned in advanced and positions of nodes in

    the field are not determined, it could happen that some sensor nodes end in such positions that they

    either cannot perform required measurement or the error probability is high. For that a redundant

    number of smart nodes are deployed in this field. These nodes then communicate, collaborate and

    share data, thus ensuring better results.

    Smart sensor nodes scattered in the field, collect data and send it to users via

    gateway using multiple hop routes.

  • 8/2/2019 431 - Copy

    14/24

    Page | 14

    A WIRELESS SENSOR NETWORK

    The main functions of a gateway are

    1. Communication with sensor networks Shortage wireless communication is used. It provides functions like discovery of smart sensor nodes, generic methods of

    sending and receiving data to and from sensors, routing.

    2. Gateway logic It controls gateway interfaces and data flow and from sensor network. It provides an abstraction level that describes the existing sensors and their

    characteristics.

    It provides functions for uniform access to sensors regardless of their type,

  • 8/2/2019 431 - Copy

    15/24

    Page | 15

    location or network topology, inject queries and tasks and collect replies.

    3. Communication with users Gateway communication with users or other sensor networks over the internet,

    WAN, satellite or some shortage communication technology.

    From the user point of view, querying and tasking are two main services provided bywireless sensor networks.

    Queries are used when user requires only the current value of the observedphenomenon.

    Tasking is a more complex operation and is used when a phenomenon has to be observe

    Over a large period of time. Both queries and tasks of time to the network by the gateway which

    also collects replies and forwards them to users.

    SENSOR NETWORK IMPLEMENTATION

    The main goal of our implementation was to build a hardware platform and generic software

    solutions that can serve as the basis and a test bench for the research of wireless sensor network

    protocols.

    Implemented sensor network consists of several nodes and a gateway. Each smart node can

    have several sensors and is equipped with a micro controlled and blue tooth radio module.

    Gateway and smart nodes are members of the piconet and hence maximum seven smartnodes can exist simultaneously in the network.For example, a pressure sensor is implemented, as

    Bluetooth node in a following way.

    The sensor is connected to the Bluetooth node consists of the pressure sensing element,

    smart signal-conditioning circuitry including calibration and temperature compensation, and the

    Transducer Electronic Data Sheet (TEDS). These features are built directly into the sensor

    microcontroller used for node communication control plus memory for TEDS configuration

    information.

  • 8/2/2019 431 - Copy

    16/24

    Page | 16

    SMART SENSOR NODE ARCHITECTURE

    The architecture shown in figure can easily be developed for specific sensor configurations

    such as thermocouples, strain gauges, and other sensor technologies and can include sensor signal

    conditioning as well as communications functions.

    Conditioned along sensor signal is digitized and digital data is then processed using stored

    TEDS data. The pressure sensor node collects data from multiple sensors and transmits the data via

    Bluetooth wireless communications in the 2.4GHz base band to a network hub or other internet

    appliance such as a computer.

    The node can supply excitation to each sensor, or external sensor power can be supplied. Up

    to eight channels are available on each node for analog inputs as well as digital output. The sensor

  • 8/2/2019 431 - Copy

    17/24

  • 8/2/2019 431 - Copy

    18/24

    Page | 18

    Implementation Of Gateways

    Complete software functionality is developed in java

    It can be implemented by the use of either bluetooth PCMCIA CARD or using infraredconnection

    Java community undertook the first effort towards bluetooth stack API application Ex-JSR-82 JABWT

  • 8/2/2019 431 - Copy

    19/24

    Page | 19

    Applications of Smart Sensor Networks

    Military applications Monitoring friendly forces, equipment and communition Reconnaissance of opposing forces and terrain Battlefield surveillance Battle damage assessment Nuclear, biological and chemical attack detectionEnvironmental applications Forest fire detection Biocomplexity mapping of the environment Flood detection and Precision agricultureHealth applications Tele-monitoring of human physiological data Tracking and monitoring patients and doctors inside a hospital Drug administration in hospitalsIndutrial safety Monitoring building and vehicle Managing inventory control Monitoring the status of different machines in factories,along with the air pllution or fire

    monitoring.

  • 8/2/2019 431 - Copy

    20/24

    Page | 20

    Bluetooth module Hardware Architecture

    The CPU core allows the blue tooth module to handle inquiries and filter page request

    without involving the host device. The host controller can be programmed to answer certain page

    messages and authenticate remote links. The link manager(LM) software runs on the CPU core.

    The LM discovers other remote LMs and communicates with them via the link manager protocol

    (LMP) to perform its service provider role using the services of the underlying LC. The link

    manager is a software function that uses the services of the link controller to perform link setup,

    authentication, link configuration, and other protocols. Depending on the implementation, the

    link controller and link manager functions may not reside in the same processor.

    Another function component is of course, the antenna, which may be integrated on

    thePCB or come as a standalone item. A fully implemented blue tooth module also

    incorporateshigher-level software protocols, which govern the functionality and interoperability

    with othermodules.

    Gate way plays the role of the Piconets master in the sensor network. It controls

    establishments of the network, gathers information about the existing smart sensor nodes and

    sensor attached to them and provides access to them.

  • 8/2/2019 431 - Copy

    21/24

    Page | 21

    Discovery of the smart sensor nodes

    Smart sensor node discovery is the first procedure that is executed upon the gateway

    installation. It goals to discover all sensor nodes in the area and to build a list of sensors

    characteristics and network topology. Afterwards, it is executed periodically to facilitate

    addition of new or removal of the existing sensors. The following algorithm is proposed.

    When the gateway is initialized, it performs bluetooth inquiry procedure. When the blue

    tooth device is discovered, the major and minor device classes are checked. These parameters are

    set by each smart node to define type of the device and type of the attached sensors. Service

    class field can be used to give some additional description of offered services. If discovered

    device is not smart node it is discarded. Otherwise service database of the discovered smart node

    is searched for sensor services. As currently there is no specific sensor profile, then database is

    searched for the serial port profile connection parameters. Once connection strings is obtained from

    the device. Blue tooth link is established and data exchange with smart mode can start.

  • 8/2/2019 431 - Copy

    22/24

    Page | 22

    CONCLUSION

    Blue tooth represents a great chance for sensor-networked architecture. This

    architecture heralds wireless future for home and also for industrial implementation.

    With a blue tooth RF link, users only need to bring the devices within range, and the

    devices will automatically link up and exchange information.

    Thus implementation of blue tooth technology for sensor networks not only cuts wiring

    cost but also integrates the industrial environment to smarter environment.

    Today, with a broader specifications and a renewed concentration on

    interoperability, manufacturers are ready to forge ahead and take blue toothproducts tothe

    market place. Embedded design can incorporate the blue tooth wireless technology into a

    range of new products to meet the growing demand for connected information appliances.

    FUTURE TASKS

    -enabled data concentrator

    for data acquisition and analysis.

  • 8/2/2019 431 - Copy

    23/24

    Page | 23

    REFERENCES

    G.I.Pottie, W.J.KaiserWireless Integrated network sensors,Communications of the

    ACM, May 2002.

    C.Shen, C.Srisathapomphatsensor networking architecture and application, IEEC

    personal communication. Aug,2001.

    r networks, RTCBPA, June 2003.

  • 8/2/2019 431 - Copy

    24/24

    Page | 24