Sunteți pe pagina 1din 23

Data compression in sensor network

EE- 548 Wireless and Mobile Networks and Security in Wireless Network

Outline
1
2 3 4
Whats Internet of Things (IoT) Data Compression Approaches in IoT Real World Application Future Aspects

EE- 548 Wireless and Mobile Networks and Security in Wireless Network

Internet of Things

EE- 548 Wireless and Mobile Networks and Security in Wireless Network

NEW ERA INTERNET OF THINGS

Advancement in smart technology has made it possible for machines and devices to connect and communicate critical information into business systems. Internet of Things technology is everywhere and emerging applications are aimed at everyday life. In the coming years, machine-to-machine services will be installed in billions of devices, enhancing the way we live and do business.

EE- 548 Wireless and Mobile Networks and Security in Wireless Network

Why the Internet of Things ???


Characteristics
Ambient Intelligence
Flexible Structure

Event Driven

Internet of Things
Semantic Sharing

Complex Access Technologies


EE- 548 Wireless and Mobile Networks and Security in Wireless Network

BUSINESS PERSPECTIVE

Businesses are realizing the capabilities of machine-to-machine technology, which in turn, has caused a widespread adoption and availability of low-cost communication modules. With the ability to deploy a solution more efficiently than ever before, companies are utilizing this technology to aid in:

The collection and sending of mass amounts of data, where it can be analyzed and assist in the decision making process. Increasing business intelligence by extracting information out of monitored machines and using historical information to predict future behaviors.

EE- 548 Wireless and Mobile Networks and Security in Wireless Network

INDUSTRIAL AUTOMATION

Connected Machines Real-time asset monitoring and communication abilities between machinery. Environment Control Companies can now control the temperature inside chambers and sensitive environments. Preventative Maintenance Assets embedded with sensor technology to send out warnings and errors prior to failure.

EE- 548 Wireless and Mobile Networks and Security in Wireless Network

HEALTH CARE INDUSTRY

One of the most exciting sectors that is taking advantage of machine-to-machine technology is in health care. This technology can help control cost and improve the efficiency of service. Internet of Things applications is being used for:

Patient Monitoring Whether a patient is physically in a health care facility or at home, Internet of Things technology will give doctors the ability to monitor patients conditions remotely. Connected Devices Patients will have the ability to monitor their own health conditions at home, and can send off their data to a physician for a diagnosis.

Drug Tracking Hospitals and clinics can track the status and delivery of prescription drugs and monitor dosage

EE- 548 Wireless and Mobile Networks and Security in Wireless Network

For Example : Scanadu Scout

Data Compression Approaches in Internet Of Things

EE- 548 Wireless and Mobile Networks and Security in Wireless Network

IoT and WSN

We concern not only about water, tree and soldier, but also about ocean, forest fires and battlefield.

When WSN is Used ?

To Connect digital world and physical world.

Sensed data Sensed data Sensed data Sensed data Sensed data

Digital World

Sensed data

Physical World

Why do we need cloud computing in IoT ??

EE- 548 Wireless and Mobile Networks and Security in Wireless Network

Internet of Things vs. Cloud Properties

Data Compression: Approach-1 RamerDouglasPeucker algorithm


EE- 548 Wireless and Mobile Networks and Security in Wireless Network

The RamerDouglasPeucker algorithm (RDP) is an algorithm for reducing the number of points
in a curve that is approximated by a series of points.

The algorithm works as follows:

Begin with the first and last points in the path (let's call them A and B respectively). These are always kept.
Find the point between the first and last that is furthest away from the line joining the first and last line (the orthogonal distance). If this point is greater than the allowed tolerance, this point is kept (let's called it X). Repeat this algorithm twice: once using A as the first point and X as the last point, the other time using X as the first point and B as the last point. This algorithm is recursive, and continues until all points have been checked.

Setting of Framework and results!

The Orchestrator is implemented using RaspberryPi and it stores data from sensors into a MySQL database. Python is used to develop command interface for sensors as well as to implement R-DPH algorithm to compress sensor data. Wireless sensor nodes are programmed to send data at periodic intervals to the orchestrator. Each node has temperature, light, and humidity sensors. The orchestrator is connected to the cloud using Wi-Fi and using a sink node it connects with deployed sensor networks.

Cont..

In our development, we use hierarchical gradient based routing. For a given temperature and a humidity taken over a period of time t, we identify series of points with t, h in a series of equally distanced in time scale, utilizing R-DPH a tolerance of error " is defined, compression will implement the point reduction using the given error distance. In the experiment we inferred that interrelated points like temperature and humidity can be correlated to the amount of energy needed to cool down a room for an acceptable human comfort level.
1440

CHART TITLE
427

Series 1

Series 2

Series 3

37.5

NO COMPRESSION
EE- 548 Wireless and Mobile Networks and Security in Wireless Network

E=2

E=3

38.4

88

99

REAL WORLD EXAMPLES

Business Web-A Platform and Marketplace for Business Services


The Business Web is a cloud-based business environment that provides access to the necessary infrastructure, applications, content, and connectivity to deliver end-to-end business services optimized for mobility and ease of participation

Business Web: First-class Internet of Things Integration

ADVANTAGES

Increase in performance of WSNs by optimizing the power. Decreases the transmission time , cost and space. Provides good quality of service compared to aggregation

CHALLENGES

Issues related to fault tolerance and error detection based on big data mining algorithms. Improvement of a virtual network orchestration over the internet.

Short Summary

Internet of Things, Cloud Computing and Services are all aspects of a (Future) Internet

Strengths of each can and should be combined

Examples of successful combinations exist

Both in the public and the business domain

We are at the beginning of an interesting journey

Many challenges still lie ahead

Road is Difficult, but Future is Bright

Any TIME

Any PLACE

Any THING

Thank You!

S-ar putea să vă placă și