July 2004 doc.: 15-04-0311-01-0005 Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [TG5 CFA Response: Applications for the Mesh Networks] Date Submitted: [01 July, 2004] Source: [ ISHIKAWA Chiaki and OKUMA Yasuyuki] Company [YRP Ubiquitous Networking Laboratory] Address [2-20-1 Nishigotanda, Shinagawa, Tokyo, 141-0031, Japan] Voice:[+81-3-5437-2270], FAX: [+81-3-5437-2271], E-Mail:[[email protected], [email protected]] Re: [Response to IEEE P802.15.TG5 Call For Applications, Document number 15-04-0267-00-0005] Abstract: [Applications for the Mesh Networks] Purpose: [Use as one of the sets of criteria for establishing the Mesh Networks] Notice: This document has been prepared to assist the IEEE P802.15. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P802.15. Submissio n Slide 1 ISHIKAWA Chiaki and OKUMA Yasuyuki YRP Ubiquitous Networking Laboratory July 2004 doc.: 15-04-0311-01-0005 TG5 CFA Response: Applications for Mesh Network ISHIKAWA Chiaki OKUMA Yasuyuki YRP Ubiquitous Networking Laboratory
Submissio n Slide 2 ISHIKAWA Chiaki and OKUMA Yasuyuki YRP Ubiquitous Networking Laboratory July 2004 doc.: 15-04-0311-01-0005 Why MESH network is needed ? (1/2) CFA mentions and defines full and partial MESH topology and we use the definition to explain our rational below. In view of the applications mentioned in the following, we observe that the device node for human-machine interaction (HMI) is best placed at the root of device node tree for a centralized control system. Such a node with HMI accepts human input and the control message flows from it through the tree-like partial mesh topology network. Also, the control message from such centralized controller reach the controlled node directly. (In this sense, this is more like star-topology, but generally speaking, we can have devices that can only be reached by means of hop device, e.g. across a corner wall, so general tree-like topology is definitely required.) Thus the controller is at the root of the tree and in this sense we use partial mesh, which is tree. Submissio n Slide 3 ISHIKAWA Chiaki and OKUMA Yasuyuki YRP Ubiquitous Networking Laboratory July 2004 doc.: 15-04-0311-01-0005
Why MESH network is needed ? (2/2) Even in such centralized control system that uses tree-like topology for humaninitiated control message flow, actuator devices and sensors within communication distance (in close proximity) should communicate with each other using full mesh topology so that we can attain optimum control of the whole system by allowing the local optimization among autonomous nodes. For example, the medical support system mentioned in the following also can be best served by full MESH topology communication among nodes in close proximity and this is also the requirement from the application (emergency conditions of patients need to alerted to medical staff close by). When aggregates of nodes under control are merged or divided, we need to consider the creation of meta-MESH that consists of element subnetworks. (e.g. The hotel conference hall example in the following.). Thus, the typical applications we consider do use and need MESH. As a matter of fact, we think that aside from the very simple sensor networks, any complex application networks that will be part of legacy application systems are highly like to require/use MESH topology. Submissio n Slide 4 ISHIKAWA Chiaki and OKUMA Yasuyuki YRP Ubiquitous Networking Laboratory July 2004 doc.: 15-04-0311-01-0005
Environment Control ( Home control & Hall control) The environment control system considered here uses wireless personal controller which manages the device nodes embedded in lighting fixtures, air-conditioners, TVs, audio visual equipment, door locks, windows, etc.. Here we distinguish two cases based on the size of the rooms which are controlled. . + A small-scale system (e.g. home, etc.) + A large-scale system (e.g. school, office, ball rooms and conference rooms at hotels, etc.) In the latter scenario, the size of room is generally large. Also, we assume that the larger hall (conference room room) is reconstructed from small halls (conference rooms) by changing partitions. Submissio n Slide 5 ISHIKAWA Chiaki and OKUMA Yasuyuki YRP Ubiquitous Networking Laboratory July 2004 doc.: 15-04-0311-01-0005 Security System The information from the various wireless sensor installed in a house or office is used, by the existence and whereabout (location) of the persons, the level of security is changed automatically. Accident or a intrusion by suspicious person is prevented, and safety is secured. Submissio n Slide 6 ISHIKAWA Chiaki and OKUMA Yasuyuki
YRP Ubiquitous Networking Laboratory July 2004 doc.: 15-04-0311-01-0005 Medical support Sensors are used to monitor patient health conditions continuously. Doctors and nurses carry wireless terminals. These sensors and monitoring terminals are connected via wireless mesh network, and thus the patient information is shared among medical staff, thus resulting in safe and reliable medical care. We can avoid the initial cost of communication infrastructure by using wireless mesh network for movable instruments, fixed-location medical instruments, instruments attached to patients' beds, and terminals carried by medical staff members. We need to use secure communication (e.g. encrypted communication) so that the patient information is available only to the authorized personnel only even when we use multi-hop communication paths. We need to protect the control message in a similar manner. (Figure NEXT PAGE.) Submissio n Slide 7 ISHIKAWA Chiaki and OKUMA Yasuyuki YRP Ubiquitous Networking Laboratory July 2004 doc.: 15-04-0311-01-0005 Medical support : patient Submissio n
:patient & sensor :Doctor / Nurse & Monitor Slide 8 :instrument ISHIKAWA Chiaki and OKUMA Yasuyuki YRP Ubiquitous Networking Laboratory July 2004 doc.: 15-04-0311-01-0005 Factory Assembly Line Monitoring and Control We mention this application in passing, since this is actually very similar to medical support system mentioned in the preceding pages although superficially they look very different. We replace the legacy monitoring and controlling of factory assembly line based on wire with a wireless system. The merit of such system is the flexibility to cope with the assembly line layout. Movable monitoring stations, fixed-location machines, terminals carried by assembly line works and managers are all connected into MESH network. Use of wireless communication brings about flexibility and avoids the initial
layout of wire networks. As in the medical support system application example, secure communication channel must be used to protect the sensivitve monitoring information and control message. Submissio n Slide 9 ISHIKAWA Chiaki and OKUMA Yasuyuki YRP Ubiquitous Networking Laboratory July 2004 doc.: 15-04-0311-01-0005 Required Feature Comparison. Home Control Ease of use (fromthe Should be Easy. (*1) viewpoint of end user). Ease of deployment Should be Easy (*3) (fromthe installer's viewpoint). Range Short Power consumption Lower the better. Throughput rate Relatively low Complexity Relatively simple. Security Important (*9) Security: key Necessary
management (issueing/re-keying of devices necessary?) Reliability Yes Submissio n Hall Control Should be Easy Security System Should be easy. Medical Support Should be easy Factory Control Should be easy.(*2) Easier the better. (*4) Easier the better. Easier the better. Easier the better. Medium(*5) Lower the better. Relatively low. Relatively simple Important (*9) Necessary Short Lower the better. Relatively low Relatively simple Important
Necessary Short Should be low. (*6) Medium/High (*7) medium/complex (*8) Topmost priority (*10) Necessary short/medium Lower the better Medium/High medium/complex Topmost priority (*9) Necessary Yes Yes YES! (*11) Yes Slide 10 ISHIKAWA Chiaki and OKUMA Yasuyuki YRP Ubiquitous Networking Laboratory July 2004 doc.: 15-04-0311-01-0005 Required Feature Comparison. (contd) Home Control Hall Control Security System Medical Support Factory Control
Tree-like + mesh (*12) Tree-like + mesh (*12) Tree-like+ mesh (*12) Tree-like + mesh (*13:) Tree-like + mesh Topology requirements Nature of data flow(1) Control message flows fromsingle node in a top-down manner. Nature of data flow(2) Sensor data may be exchanged in a full mesh manner locally. WAN connectivity Likely static/dynamic Static topology QoS in the face of n/a mobility Control message flows fromsingle node in a top down manner. Sensor data may be exchanged in a full mesh manner locally. Unlikely (*14) Dynamic (*15) Control message flows fromsingle node in a top down manner. Sensor data may be exchanged in a full mesh manner locally. Unlikely (*14) Static Control message flows fromsingle node in a
top down manner. Sensor data may be exchanged in a full mesh manner locally. Unlikely (*14) Dynamic (*16) Control message flows fromsingle node in a top down manner. Sensor data may be exchanged in a full mesh manner locally. Unlikely (*14) Dynamic n/a n/a Yes Yes *1: Since non-IT professionals are likely to use these, it should be easy. *2: In the case of factories, it may be that adequate training is given and the ease of use may not be the utmost importance. *3: In the case of Home control system, the initial installment by professionals, and the subsequent addition of home electronic appliance ought to be handled differently. The latter should be easy for ordinary people. Submissio n Slide 11 ISHIKAWA Chiaki and OKUMA Yasuyuki YRP Ubiquitous Networking Laboratory July 2004
doc.: 15-04-0311-01-0005 Required Feature Comparison. (contd) *4 : the change of hall configuration by means of rearranging partition wall/curtain ought to be easy since this is handled by hotel personnel. *5: Halls may require longer distance, say, than home control system. *6: Considering the potential interference with medical gears, the power consumption / emission should be small! *7: for medical and factory use, the monitoring and control requires frequent data exchange. *8: control systems on the left column may be relatively simple. Medical support and factory control may require complex control and monitoring. *9: we don't want random stranger walking close-by to turn on/off devices randomly. *10: we now have added privacy issues concerning monitored data. *11: All these control application requires that they are available when needed. In medical application, it is a life-and-death issue. *12: In the control applications, the control message is likely to be distributed in a tree-like fashion. However, the sensor data are likely to be exchanged locally in a full mesh fashion. *13: sensor data is likely to be propagated to nearby doctors in a full mesh fashion. Comment *11 also applies. *14: WAN connection may be convenient, but it is not desirable due to security reasons. *15:halls/ conference rooms are re-partitioned occasionally. *16: pieces of equipment are moved to bedside or to operation rooms, and doctors carry controllers. Submissio n Slide 12 ISHIKAWA Chiaki and OKUMA Yasuyuki YRP Ubiquitous Networking Laboratory July 2004 doc.: 15-04-0311-01-0005 Goods Handling System (with privacy twist)
Building a MESH network using user terminals and fully functional tags attached to goods, we can track the movement of goods without much efforts on the side of the user by means of the capability to detect new node. We can classify goods according certain criteria easily: We can divide the MESH into a subnet of searched goods and the other subnet of other goods. Searched goods can notify the user terminal their positional information. If a tag is equipped with indicator device (e.g. LED), such indicator can be turned on. When we handle goods in this manner (e.g., at make-shift delivery station, at home, etc.), we can expect such goods to be hand-carried by people. In such cases, if we can identify a tag over a period of time, we can trace the user behavior (i.e., movement). Such tracing is undesirable in security-conscious settings. We need to have a mechanism to disable such tracing. In the case of such security-conscious application, we need a disabling function so that tags don't join MESH network automatically so that the tags people carry don't reveal information to unintended networks. Submissio n Slide 13 ISHIKAWA Chiaki and OKUMA Yasuyuki YRP Ubiquitous Networking Laboratory
Introduction to Astronomy Beginnings Learning the Sky Observing Tools What you will see Advanced observing Learn the Sky 88 Constellations Only about half visible in the Northern Hemisphere Bright stars About 25-30 Stars How can you learn the sky?
To access CUPE National's resources, contact a shop steward or the executive of your local and they will send a request to our staff representative. Getting to Know Your Collective Agreement Your collective agreement is just that, an agreement between...
Research Funded by a US Department of Education, Teacher Quality Enhancement Partnership Grant. The University Supervisor. Provide a systematic and consistent presence during the student teaching experience. Provide program information to the cooperating teacher and teacher candidate.
Domain Key Normal Form "if every constraint on the relation is a logical consequence of the definition of keys and domains" DK/NF Terms Constraint "a rule governing static values of attributes" Key "unique identifier of a tuple" Domain "description of...
(De Cive) Marx: "For labour, life activity, productive life itself, appears to man in the first place merely as a means of satisfying a need - the need to maintain physical existence. Yet the productive life is the life of...
Ready to download the document? Go ahead and hit continue!