data compression in sensor network

21
Data compression in sensor network EE- 548 Wireless and Mobile Networks and Security in Wireless Network

Upload: nafisansari

Post on 16-Oct-2015

35 views

Category:

Documents


0 download

DESCRIPTION

R-DPH algorithm

TRANSCRIPT

Data compression in sensor network

Data compression in sensor networkEE- 548 Wireless and Mobile Networks and Security in Wireless NetworkEE- 548 Wireless and Mobile Networks and Security in Wireless NetworkOutlineWhats Internet of Things (IoT)1Data Compression Approaches in IoT2Real World Application3Future Aspects4Internet of ThingsEE- 548 Wireless and Mobile Networks and Security in Wireless NetworkNEW ERA INTERNET OF THINGS

Advancement in smart technology has made it possible for machines and devices to connect and communicate critical information into business systems. Internet of Things technology is everywhere and emerging applications are aimed at everyday life. In the coming years, machine-to-machine services will be installed in billions of devices, enhancing the way we live and do business.

EE- 548 Wireless and Mobile Networks and Security in Wireless Network

EE- 548 Wireless and Mobile Networks and Security in Wireless Network Why the Internet of Things ???Event DrivenAmbient IntelligenceFlexible Structure Semantic SharingComplex Access TechnologiesInternet of ThingsCharacteristics

BUSINESS PERSPECTIVEEE- 548 Wireless and Mobile Networks and Security in Wireless NetworkBusinesses are realizing the capabilities of machine-to-machine technology, which in turn, has caused a widespread adoption and availability of low-cost communication modules. With the ability to deploy a solution more efficiently than ever before, companies are utilizing this technology to aid in:

The collection and sending of mass amounts of data, where it can be analyzed and assist in the decision making process. Increasing business intelligence by extracting information out of monitored machines and using historical information to predict future behaviors.

EE- 548 Wireless and Mobile Networks and Security in Wireless NetworkINDUSTRIAL AUTOMATIONConnected Machines Real-time asset monitoring and communication abilities between machinery. Environment Control Companies can now control the temperature inside chambers and sensitive environments. Preventative Maintenance Assets embedded with sensor technology to send out warnings and errors prior to failure.

EE- 548 Wireless and Mobile Networks and Security in Wireless NetworkHEALTH CARE INDUSTRYOne of the most exciting sectors that is taking advantage of machine-to-machine technology is in health care. This technology can help control cost and improve the efficiency of service. Internet of Things applications is being used for:Patient Monitoring Whether a patient is physically in a health care facility or at home, Internet of Things technology will give doctors the ability to monitor patients conditions remotely. Connected Devices Patients will have the ability to monitor their own health conditions at home, and can send off their data to a physician for a diagnosis. Drug Tracking Hospitals and clinics can track the status and delivery of prescription drugs and monitor dosage

For Example : Scanadu ScoutData Compression Approaches in Internet Of Things

EE- 548 Wireless and Mobile Networks and Security in Wireless NetworkIoT and WSNWe concern not only about water, tree and soldier, but also about ocean, forest fires and battlefield.

10embedded()()

data-intensive2020301

Digital World

SenseddataSenseddataSenseddataSenseddataSenseddataSenseddataPhysical WorldWhen WSN is Used ?To Connect digital world and physical world.

11Why do we need cloud computing in IoT ??EE- 548 Wireless and Mobile Networks and Security in Wireless NetworkInternet of Things vs. Cloud Properties

Data Compression: Approach-1 RamerDouglasPeuckeralgorithmEE- 548 Wireless and Mobile Networks and Security in Wireless Network

TheRamerDouglasPeucker algorithm(RDP) is analgorithmfor reducing the number of points in a curve that is approximated by a series of points.The algorithm works as follows:Begin with the first and last points in the path (let's call them A and B respectively). These are always kept.Find the point between the first and last that is furthest away from the line joining the first and last line (the orthogonal distance).If this point is greater than the allowed tolerance, this point is kept (let's called it X).Repeat this algorithm twice: once using A as the first point and X as the last point, the other time using X as the first point and B as the last point.This algorithm is recursive, and continues until all points have been checked.

The Orchestrator is implemented using Raspberry-Pi and it stores data from sensors into a MySQL database. Python is used to develop command interface for sensors as well as to implement R-DPH algorithm to compress sensor data. Wireless sensor nodes are programmed to send data at periodic intervals to the orchestrator. Each node has temperature, light, and humidity sensors. The orchestrator is connected to the cloud using Wi-Fi and using a sink node it connects with deployed sensor networks. Setting of Framework and results!

Cont..In our development, we use hierarchical gradient based routing. For a given temperature and a humidity taken over a period of time t, we identify series of points with t, h in a series of equally distanced in time scale, utilizing R-DPH a tolerance of error " is defined, compression will implement the point reduction using the given error distance. In the experiment we inferred that interrelated points like temperature and humidity can be correlated to the amount of energy needed to cool down a room for an acceptable human comfort level.

EE- 548 Wireless and Mobile Networks and Security in Wireless NetworkREAL WORLD EXAMPLESBusiness Web-A Platform and Marketplace for Business Services

The Business Web is a cloud-based business environment that provides access to the necessary infrastructure, applications, content, and connectivity to deliver end-to-end business services optimized for mobility and ease of participationBusiness Web:First-class Internet of Things Integration

ADVANTAGESIncrease in performance of WSNs by optimizing the power.Decreases the transmission time , cost and space.Provides good quality of service compared to aggregation CHALLENGESIssues related to fault tolerance and error detection based on big data mining algorithms. Improvement of a virtual network orchestration over the internet.

Short SummaryInternet of Things, Cloud Computing and Services are all aspects of a (Future) InternetStrengths of each can and should be combinedExamples of successful combinations existBoth in the public and the business domainWe are at the beginning of an interesting journeyMany challenges still lie ahead

Road is Difficult, but Future is Bright Any TIME Any PLACE Any THINGThank You!23