On the Cost of Shifting Event Processing within Wireless Environments
نویسندگان
چکیده
With the emergence of wireless sensor networks, the issues of event recognition and processing have been partially shifted into the embedded domain. New processing capabilities on small devices allow for physically close event monitoring and fast filtering without having to set up a wired infrastructure beforehand. This opportunity for flexible deployments, local data storage and demand-driven event forwarding opens up new application areas for event-centric architectures. However, the convenience of localized event processing comes at a cost, such as sparse resources or medium contention when relying on wireless communication. Several parameters have to be evaluated to decide whether pushing the application logic into a sensor network is worthwhile, or whether a conventional server-centered deployment is to be preferred. In this paper, we discuss parameters influencing an architectural decision and their interdependencies, illustrate our contribution with the help of an example and provide a generic cost model for estimating this decision.
منابع مشابه
Unauthenticated event detection in wireless sensor networks using sensors co-coverage
Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...
متن کاملQuasi Random Deployment Strategy for Reliable Communication Backbones in Wireless Sensor Networks
Topology construction and topology maintenance are significant sub-problems of topology control. Spanning tree based algorithms for topology control are basically transmission range based type construction algorithms. The construction of an effective backbone, however, is indirectly related to the placement of nodes. Also, the dependence of network reliability on the communication path undertak...
متن کاملA Priority-based Routing Algorithm for Underwater Wireless Sensor Networks (UWSNs)
Advances in low-power electronics design and wireless communication have enabled the development of low cost, low power micro-sensor nodes. These sensor nodes are capable of sensing, processing and forwarding which have many applications such as underwater networks. In underwater wireless sensor networks (UWSNs) applications, sensors which are placed in underwater environments and predicted ena...
متن کاملOptimizing the Event-based Method of Localization in Wireless Sensor Networks
A Wireless Sensor Network (WSN) is a wireless decentralized structure network consists of many nodes. Nodes can be fixed or mobile. WSN applications typically observe some physical phenomenon through sampling of the environment so determine the location of events is an important issue in WSN. Wireless Localization used to determine the position of nodes. The precise localization in WSNs is a co...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007