Cloud Connectivity and Embedded Sensory Systems (eBook)
XXIII, 285 Seiten
Springer New York (Verlag)
978-1-4419-7545-4 (ISBN)
Sensor networks are meant to create awareness in space and time. They may bemeasuring the presence of an object or a condition, characterizing an object stream or asituational pattern, or even detect abnormalities that are to occur. This book provides new theory on the design of wireless sensor networks, based on concepts developed for large-scale, distributed computing environments known as cloud computing. It provides a single-source entry into the world of intelligent sensory networks, with a step-by-step discussion of building case studies that capture the requirements, taking into account practical limitations of creating ambient intelligence. The reader will not only achieve a better understanding of sensory clouds, swarms andflocks but is also guided by examples of how to design such networks taking the typicalcharacteristics of diverse application areas into account.
Preface 6
The Book 8
Contents 10
List of Figures 15
List of Tables 20
Part I Clouds into the Sensors Edge 21
Highlights 21
Sensors-in-the-Cloud 21
Software Migration 21
Software Is Virtual Hardware! 22
System Optimization 22
1 Introduction to Cloud Connectivity 23
1.1 Embedded Systems 24
1.1.1 Characteristics of Embedded Systems 25
1.1.2 What Makes Embedded Systems Special 27
1.1.3 Encapsulated Architecture 28
1.1.4 Dichotomized Architecture 29
1.1.5 Expanded Architecture 29
1.2 Network Processing Architectures 30
1.2.1 Statically Structured Network Processing 30
1.2.1.1 Cluster Computing 30
1.2.1.2 Grid Computing 31
1.2.1.3 Legion Processor 32
1.2.2 Dynamically Structured Network Computing 32
1.2.2.1 Ubiquitous Computing 33
1.2.2.2 Nomadic Computing 33
1.2.2.3 Pervasive Computing 34
1.2.3 The Network Is the Computer''TM'' 35
1.3 Intelligent Sensor Networking 35
1.3.1 Various Sensing Principles 36
1.3.2 Sensory Networks 37
1.3.3 Sensor Networks Design Methodology 39
1.4 Expansion of the Ambient Intelligence Approach 41
1.4.1 Situational Computing 42
1.4.2 Autonomic Computing 43
1.4.3 Organic Computing 44
1.5 Cloud Computing Concepts 45
1.5.1 The Road to the Cloud 46
1.5.1.1 Where Are/Were the Barriers? 46
1.5.1.2 What Are the Growth Dimensions? 47
1.5.2 Commercial Clouds 48
1.5.3 Server Farms 50
1.5.4 Network Extenders 50
1.6 Cloud-Sourcing 52
1.6.1 Business Models 52
1.6.1.1 Hardware-as-a-Service 52
1.6.1.2 Enterprise and Utility Computing 52
1.6.1.3 Software-as-a-Service 53
1.6.1.4 Games-as-a-Service 53
1.6.1.5 Systems-as-a-Service 53
1.6.1.6 Networks-as-a-Service 53
1.6.1.7 Infrastructure-as-a-Service 54
1.6.2 Cloud Economics 54
1.7 Internet-of-Things 55
1.7.1 Very-Thin-Clients 56
1.7.2 Android-in-the-Cloud 56
1.7.3 Sensing-into-the-Cloud 58
1.8 Summary 60
References 61
2 Software-from-the-Cloud 63
2.1 The Nature of the Cloud 65
2.1.1 Virtualization 66
2.1.2 Looking into the Cloud 69
2.1.3 The Other Cloud 72
2.2 Connection-Set Architecture 73
2.2.1 Software Connects 73
2.2.2 Skeleton Injector 74
2.2.3 Synchronization 76
2.3 Software Migration Concept 77
2.3.1 Software Components 78
2.3.2 Introducing AUTOSAR 80
2.3.3 The AUTOSAR Case 82
2.3.3.1 Basic Software (BSW) 83
2.3.3.2 Software Components (SWCs) 84
2.3.3.3 Runtime Environment (RTE) 87
2.4 Topological Impact 88
2.4.1 Homological Sensor Networks 89
2.4.2 Configuration of Embedded Software 91
2.4.3 Adaptive Reconfiguration 93
2.5 SoftWare Is Virtual HardWare 94
2.5.1 Elasticity 95
2.5.1.1 Hot-Swapping 96
2.5.1.2 Agile Software 97
2.5.1.3 Opportunistic Computing 97
2.5.2 Heterogeneity 98
2.5.3 Optimization 98
2.6 Summary 99
References 99
Part II Cloud-Centric Systems 102
Highlights 102
Every Network Tells a Story 102
Story-Teller Configures the Network 102
Through the Looking Glass 103
Everything-as-a-Service 103
3 System Requirements, Understanding, and Design Environment 104
3.1 System Design Methodology 105
3.1.1 The Traditional Ways 105
3.1.2 Embedded System Design 108
3.1.3 Model-Based Design 110
3.2 Neural Network System Control 112
3.2.1 Neural Network Theory 113
3.2.2 Neural Control 116
3.2.3 Neural Controller Design 117
3.2.4 The Modular Hierarchy 121
3.3 Networked System Design 124
3.3.1 Making a Story 125
3.3.2 The Path Diagram 128
3.3.3 The Wiring Diagram 129
3.3.4 The Sequence Diagram 129
3.4 System Case Study 130
3.4.1 Case Outline 131
3.4.2 Refining the Story 133
3.4.3 Moving to Scenes 134
3.5 Summary 136
References 136
4 Sensor-Centric System Developments 139
4.1 Wireless Sensor Network Technologies 140
4.1.1 Wireless Communication Protocols 141
4.1.1.1 RFID 141
4.1.1.2 TinyOS 143
4.1.1.3 ZigBee 144
4.1.1.4 Bluetooth Low Energy 145
4.1.2 Power Management 146
4.1.3 Power Harvesting 149
4.2 Personal-Area Networks 149
4.2.1 Body Sensor Networks 149
4.2.2 (Serious) Gaming 152
4.2.3 Business- and Edu-tainment 152
4.3 Monitoring and Observation 153
4.3.1 Wear-Free Transmission 153
4.3.2 Care, Comfort, and Concern Monitoring 154
4.3.3 Security Surveillance 155
4.3.4 Environmental Monitoring 157
4.4 Monitoring and Control 158
4.4.1 Smart Structures 158
4.4.2 Traffic Control 159
4.4.3 Smart Power Grid 160
4.4.4 Industrial Automation 161
4.5 Collective Intelligence 161
4.5.1 Collision Avoidance 164
4.5.2 Tracking in a Billiard System 167
4.5.3 Trajectory Modeling 169
4.5.3.1 Moving Object Extraction 169
4.5.3.2 Trajectory Extraction 171
4.5.3.3 Learning on the WiCa Platform 174
4.5.4 Cellular Neural Network Learning 175
4.5.5 Moving Target Detection 176
4.5.5.1 The Algorithm in Basic CNN Operations 178
4.5.5.2 Verification and Test 181
4.5.5.3 Experiment Evaluation 183
4.6 Multi-sensor Intelligence 185
4.6.1 Intelligence Gathering 185
4.6.2 Multi-sensor Fusion 186
4.7 Summary 187
References 188
Part III Everything-in-the-Cloud 192
Highlights 192
Everything-in-the-Cloud 192
Enforced Security 192
Enforced Safety 193
Noise Society Impact 193
5 Security Considerations 194
5.1 Reliability 194
5.1.1 Basic Concepts 195
5.1.2 Probing Cases 196
5.1.3 Software Metrics 198
5.2 Trustability 199
5.2.1 Trusted Circuits 199
5.2.2 Trusting-in-the-Edge 202
5.2.3 Secure Mobility 203
5.3 Resiliency 204
5.3.1 Fault Tolerance 204
5.3.1.1 Majority Voting 204
5.3.1.2 Multiple Versions 205
5.3.1.3 Mutual Trust 206
5.3.2 Fault-Tolerance in Computing 206
5.3.3 Secure Communications 207
5.3.4 Redundancies in Large-Scale Sensor Networks 208
5.3.4.1 Homogeneous Multi-sensor Arrays 209
5.3.4.2 Heterogeneous Multi-sensor Fusion 209
5.3.4.3 Heterogeneous Multi-level Subsumption 209
5.3.4.4 What Comes Next in Secure Sensor Networks? 210
5.4 Authentication 212
5.4.1 Sensor Accreditation 213
5.4.2 Sympathetic Testing for Trustability Assessment 213
5.4.3 Remote Entrusting 216
5.5 Security-as-a-Service 216
5.6 Summary 218
References 218
6 Safety Considerations 221
6.1 Adversity Action Detection 221
6.1.1 Jamming 223
6.1.2 Tampering 223
6.1.3 Invading 223
6.1.4 Antipathetic Testing for Malfeasance Assessment 223
6.2 Byzantine Generals 224
6.2.1 Faults 224
6.2.2 Signed Messages 225
6.2.3 Missing Communications 225
6.3 Emergent Behavior Detection 225
6.3.1 Information Reporting and Management 225
6.3.2 Anomaly Detection 228
6.3.3 Nuisance Alarms 230
6.3.4 Redundancy by Intelligent Agents 232
6.4 Identity Assurance 234
6.4.1 Biometric Authentication 234
6.4.2 BASE for Multi-modal Sensing 238
6.5 Safety in Transactions 240
6.5.1 e-Traveling Card 241
6.5.1.1 Local-Traffic-Card 241
6.5.1.2 Long-Distance-Card 244
6.5.1.3 Bonvoyage 246
6.5.2 The i-Coin 248
6.6 Safety-as-a-Service 250
6.7 Summary 250
References 250
Part IV Last-Mile-from-the-Cloud 253
Highlights 253
Centralized Compute Power 253
System Virtualization 253
Thinking-in-the-Cloud 254
HPC-from-the-Cloud 254
7 Bringing the Cloud Back to Home 255
7.1 Net-Centric Home Automation 255
7.1.1 Home-Networks anno 2000 256
7.1.1.1 Power-Line Networks 256
7.1.1.2 Specialized Line Networks 257
7.1.1.3 Wireless Networks 257
7.1.2 Operating the Home anno 2010 259
7.1.2.1 Power-Line Communication 259
7.1.2.2 DLNA 260
7.1.2.3 The Internet 260
7.1.3 The Home Outside the House 260
7.2 HomeHuman Interfaces 262
7.2.1 Home Imagers 262
7.2.1.1 Principle of 3-D Measurement 264
7.2.1.2 Multiple Cameras 265
7.2.2 Panoramic Visualizations 268
7.2.2.1 The Principle of Panoptics 268
7.2.2.2 Digital Portrait 269
7.2.2.3 e-Paper/Reader 270
7.2.2.4 Catadioptric Displays 271
7.2.2.5 Dome-Projection 275
7.2.2.6 Hologram 276
7.2.2.7 Living Wall 276
7.3 Media Inviter 276
7.3.1 Integrated Media Community 276
7.3.1.1 Basic Operations 277
7.3.1.2 The System 278
7.3.2 Home-Inviter Interface 280
7.3.2.1 Sub-ordination 280
7.3.2.2 Co-ordination 281
7.3.2.3 Auto-ordination 282
7.3.3 Multimedia Home Automation 283
7.3.4 Multimedia Home Security 284
7.4 Futuristic Home Environment 285
7.4.1 The Intelligent Ball 285
7.4.2 Complexities of Operation 286
7.4.3 HPC-from-the-Cloud 287
7.4.4 Green Computing 291
7.5 Summary 291
References 292
8 Afterwords 294
8.1 Cloud 294
8.2 Sensor 295
8.3 And Everything in Between 296
8.4 Panta Rei 297
Index 298
Erscheint lt. Verlag | 10.11.2010 |
---|---|
Zusatzinfo | XXIII, 285 p. |
Verlagsort | New York |
Sprache | englisch |
Themenwelt | Mathematik / Informatik ► Informatik ► Web / Internet |
Informatik ► Weitere Themen ► CAD-Programme | |
Technik ► Elektrotechnik / Energietechnik | |
Technik ► Nachrichtentechnik | |
Schlagworte | Cloud Computing • Distributed Computing • Embedded Sensor Networks • Embedded Systems • Intelligent Sensor Networks • Unattended sensor networks • USN |
ISBN-10 | 1-4419-7545-4 / 1441975454 |
ISBN-13 | 978-1-4419-7545-4 / 9781441975454 |
Haben Sie eine Frage zum Produkt? |
Größe: 9,0 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich