0% found this document useful (0 votes)
85 views18 pages

Chapter - 1: 1.1 General Introduction

The document discusses different types of computer networks including personal area networks, local area networks, metropolitan area networks, wide area networks, and internetworks. It covers advantages and disadvantages of networks. Key aspects covered include wired networking technologies, types of network topologies, and characteristics of different network types.

Uploaded by

StephenKarunakar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views18 pages

Chapter - 1: 1.1 General Introduction

The document discusses different types of computer networks including personal area networks, local area networks, metropolitan area networks, wide area networks, and internetworks. It covers advantages and disadvantages of networks. Key aspects covered include wired networking technologies, types of network topologies, and characteristics of different network types.

Uploaded by

StephenKarunakar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

CHAPTER 1

INTRODUCTION
1.1 GENERAL INTRODUCTION
Usage of various electronic devices like i phones, Android phones, electronic books
and other are rapidly increasing day by day. In the regular architecture these devices downloads the
content from the content provider via communication service provider, cost involved can be paid by
the end user or content provider.
In order to encourage the End-Consumers (EC) to cache previously downloaded
content and to share it with other end-consumers, a peer-to-peer rebate mechanism is proposed .This
mechanism can serve as an incentive so that the end-consumers are enticed to participate in
cooperative content caching in spite of the storage and energy costs. In order for cooperative
caching to provide cost benefits, this peer-to-peer rebate must be dimensioned to be smaller than the
content download cost paid to the CSP. This rebate should be factored in the content providers
overall cost.
Due to their limited storage, mobile handheld devices are not expected to store all
downloaded content for long. This means after downloading and using a purchased electronic
content, a device may remove it from the storage. For example in Amazon Kindle clients (iPhone,
iPad, etc.) an archive mode is available using which a user simply removes a book after reading it,
although it remains archived as a purchased item in Amazons cloud server. Under the above pricing
and data storage model a key question for cooperative caching is: How to store contents in nodes
such that the average content provisioning cost in the network is minimized.
Since its introduction, the Web has been constantly growing and so has the load on
the Internet and Web servers. To overcome these obstacles, different techniques, like caching, have
been introduced. Web caching has proven to be a valuable tool. Three features of Web caching make
it attractive to all Web participants, including users, network managers, and content creators :

Caching reduces network bandwidth usage.


1

Caching reduces user-perceived delays.


Caching reduces loads on the origin server.

One central problem in Web caching is the cache replacement strategy. Cache takes place when the
cache becomes full and old objects1 must be removed to make space for new ones.

CHAPTER 2

2.1 LITERATURE REVIEW


A network consists of two or more computers that are linked in order to share resources
(such as printers and CDs), exchange files, or allow electronic communications. The computers on a
network may be linked through cables, telephone lines, radio waves, satellites, or infrared light
beams.
Advantages of a Network
User access control:
Modern networks almost always have one or more servers which allows centralized
management for users and for network resources to which they have access. User credentials on a
privately-owned and operated network may be as simple as a user name and password, but with
ever-increasing attention to computing security issues, these servers are critical to ensuring that
sensitive information is only available to authorized users.
Information storing and sharing:
Computers allow users to create and manipulate information. Information takes on a life of
its own on a network. The network provides both a place to store the information and mechanisms
to share that information with other network users.
Connections:
Administrators, instructors, and even students and guests can be connected using the campus
network.
Services:
The school can provide services, such as registration, school directories, course schedules,
access to research, and email accounts, and many others. (Remember, network services are
generally provided by servers).
Internet:
The school can provide network users with access to the internet, via an internet gateway.
Computing resources:

The school can provide access to special purpose computing devices which individual users
would not normally own. For example, a school network might have high-speed high quality
printers strategically located around a campus for instructor or student use.
Flexible Access:
School networks allow students to access their information from connected devices
throughout the school. Students can begin an assignment in their classroom, save part of it on a
public access area of the network, then go to the media center after school to finish their work.
Students can also work cooperatively through the network.
Workgroup Computing:
Collaborative software allows many users to work on a document or project concurrently.
For example, educators located at various schools within a county could simultaneously contribute
their ideas about new curriculum standards to the same document, spreadsheets, or website.
Disadvantages of a Network
Expensive to Install:
Large campus networks can carry hefty price tags. Cabling, network cards, routers, bridges,
firewalls, wireless access points, and software can get expensive, and the installation would
certainly require the services of technicians. But, with the ease of setup of home networks, a simple
network with internet access can be setup for a small campus in an afternoon.
Requires Administrative Time:
Proper maintenance of a network requires considerable time and expertise. Many schools
have installed a network, only to find that they did not budget for the necessary administrative
support.
Servers Fail:
Although a network server is no more susceptible to failure than any other computer, when
the files server "goes down" the entire network may come to a halt. Good network design practices
say that critical network services (provided by servers) should be redundant on the network
whenever possible.

Cables May Break:

The Topology chapter presents information about the various configurations of cables. Some
of the configurations are designed to minimize the inconvenience of a broken cable; with other
configurations, one broken cable can stop the entire network.
Security and compliance:
Network security is expensive. It is also very important. A school network would possibly be
subject to more stringent security requirements than a similarly-sized corporate network, because of
its likelihood of storing personal and confidential information of network users, the danger of which
can be compounded if any network users are minors. A great deal of attention must be paid to
network services to ensure all network content is appropriate for the network community it serves.
2.1.1 WIRED NETWORKING
Generally, networks are distinguished based on their geographical span. A network can be as
small as distance between your mobile phone and its Bluetooth headphone and as large as the
Internet itself, covering the whole geographical world, i.e. the Earth.
Personal Area Network
A Personal Area Network or simply PAN is smallest network which is very personal to a
user. This may include Bluetooth enabled devices or infra-red enabled devices. PAN has
connectivity range up to 10 meters. PAN may include wireless computer keyboard and mouse,
Bluetooth enabled headphones, wireless printers and TV remotes for example.
Pico net is an example Bluetooth enabled Personal Area Network which may contain up to 8
devices connected together in a master-slave fashion.
Local Area Network
A computer network spanned inside a building and operated under single administrative
system is generally termed as Local Area Network. Usually, Local Area Network covers an
organizations offices, schools, college/universities etc. Number of systems may vary from as least
as two to as much as 16 million

LAN provides a useful way of sharing resources between end users. Resources like Printers,
File Servers, Scanners and internet is easy sharable among computers. Local Area Networks are
composed of inexpensive networking and routing equipment. It may contain local servers serving
file storage and other locally shared applications. It mostly operates on private IP addresses and
generally do not involve heavy routing. LAN works under its own local domain and controlled
centrally.
LAN uses either Ethernet or Token-ring technology. Ethernet is most widely employed LAN
technology and uses Star topology while Token-ring is rarely [Link] can be wired or wireless or
in both forms at once.
Metropolitan Area Network
MAN, generally expands throughout a city such as cable TV network. It can be in form of
Ethernet, Token-ring, ATM or [Link] Ethernet is a service which is provided by ISPs. This
service enables its users to expand their Local Area Networks. For example, MAN can help an
organization to connect all of its offices in a City.
Backbone of MAN is high-capacity and high-speed fiber optics. MAN is works in between
Local Area Network and Wide Area Network. MAN provides uplink for LANs to WANs or Internet.
Wide Area Network
As name suggests, this network covers a wide area which may span across provinces and
even a whole country. Generally, telecommunication networks are Wide Area Network. These
networks provides connectivity to MANs and LANs. Equipped with very high speed backbone,
WAN uses very expensive network equipment.
WAN may use advanced technologies like Asynchronous Transfer Mode (ATM), Frame
Relay and SONET. WAN may be managed under by more than one administration.
Internetwork

A network of networks is called internetwork, or simply Internet. It is the largest network in


existence on this planet. Internet hugely connects all WANs and it can have connection to LANs and
Home networks. Internet uses TCP/IP protocol suite and uses IP as its addressing protocol. Present
day, Internet is widely implemented using IPv4. Because of shortage of address spaces, it is
gradually migrating from IPv4 to IPv6.
Internet enables its users to share and access enormous amount of information worldwide. It
uses www, ftp, email services, audio and video streaming etc. At huge level, internet works on
Client-Server [Link] uses very high speed backbone of fiber optics. To inter-connect various
continents, fibers are laid under sea known to us as submarine communication cable.
Disadvantages of Wired Technology

Equipment Portability:
Wired technology is not portable. The units must be plugged into power outlets and network
ports in order to function. Moving units takes time, energy and, potentially, information- technology
personnel. These hard-wired requirements can make arranging personnel, furniture and equipment
difficult. Moves of equipment or employees may require running additional network cabling,
installing new electrical outlets and reconfiguring network-port structures. Network configuration
may limit the options for employee and equipment placement.
Space:
Wired-technology products, such as desktop computers, take up more space than equivalent
wireless options. Wires, cables and multiple components require more desktop space than their
wireless counterparts. Office-furniture decisions and employee-space allocation must account for
the added space needs of wired computer and technology products.
Employee Mobility:

Employees are restricted in their work location when using wired office products. Wireless
options allow work in conference rooms, at home, in a coffee shop or at a business contact's
physical location. Some employees, such as sales personnel, may require a wireless unit to perform
their work duties. Opting for wired-technology products may limit the amount and flexibility of
work duties.

Safety:
The physical requirements of a wired-technology product present some opportunities for
damage not noted in wireless products. Cables can be damaged by cleaning crews and mislaid wires
can cause tripping hazards. Additionally, always-on technology systems may be more prone to
electrical surges and damage than wireless units that can be unplugged during storms or power
outages.
Power:
Wired units must have power to operate. Stormy weather, electrical problems or a utilitywire cut can cause work to stop if the only options are wired-technology products. Wireless units
with batteries can continue to function for a period of time after being disconnected from power.
Work stoppage can hurt productivity and customer service.
2.2. WIRELESS NETWORKING
Most wireless networks are based on the IEEE 802.11 standards. A basic wireless network
consists of multiple stations communicating with radios that broadcast in either the 2.4GHz or
5GHz band, though this varies according to the locale and is also changing to enable communication
in the 2.3GHz and 4.9GHz ranges. 802.11 networks are organized in two ways. In infrastructure
mode, one station acts as a master with all the other stations associating to it, the network is known
as a BSS, and the master station is termed an access point (AP). In aBSS, all communication passes
through the AP; even when one station wants to communicate with another wireless station,
messages must go through the AP. In the second form of network, there is no master and stations

communicate directly. This form of network is termed an IBSS and is commonly known as an adhoc network.
802.11 networks were first deployed in the 2.4GHz band using protocols defined by
the IEEE 802.11 and 802.11b standard. These specifications include the operating frequencies and
the MAC layer characteristics, including framing and transmission rates, as communication can
occur at various rates. Later, the 802.11a standard defined operation in the 5GHz band, including
different signaling mechanisms and higher transmission rates. Still later, the 802.11g standard
defined the use of 802.11a signaling and transmission mechanisms in the 2.4GHz band in such a
way as to be backwards compatible with 802.11b networks.
Separate from the underlying transmission techniques, 802.11 networks have a variety of
security mechanisms. The original 802.11 specifications defined a simple security protocol
called WEP. This protocol uses a fixed pre-shared key and the RC4 cryptographic cipher to encode
data transmitted on a network. Stations must all agree on the fixed key in order to communicate.
This scheme was shown to be easily broken and is now rarely used except to discourage transient
users from joining networks. Current security practice is given by the IEEE 802.11i specification
that defines new cryptographic ciphers and an additional protocol to authenticate stations to an
access point and exchange keys for data communication. Cryptographic keys are periodically
refreshed and there are mechanisms for detecting and countering intrusion attempts.
Specifically, WPA requires only the TKIPcipher that is derived from the original WEP cipher.
802.11i permits use of TKIP but also requires support for a stronger cipher, AES-CCM, for
encrypting data. The AES cipher was not required in WPA because it was deemed too
computationally costly to be implemented on legacy hardware.
The term wireless networking refers to technology that enables two or more computers to
Communicate using standard network protocols, but without network cabling. Strictly speaking, any
technology that does this could be called wireless networking. There are two kinds of wireless
networks:
a) An ad-hoc, or peer-to-peer wireless network consists of a number of computers each equipped
With a wireless networking interface card. Each computer can communicate directly with all of the
other wireless enabled computers. They can share files and printers this way, but may not be able to
9

access wired LAN resources, unless one of the computers acts as a bridge to the wired LAN using
special software, this is called "bridging".
b) A wireless network can also use an access point, or base station. In this type of network the
access point acts like a hub, providing connectivity for the wireless computers. It can connect (or
"Bridge") the wireless LAN to a wired LAN, allowing wireless computer access to LAN resources,
such as file servers or existing Internet Connectivity

Wi-Fi
Primarily associated with computer networking, Wi-Fi uses the IEEE 802.11 specification to
create a wireless local-area network that may be secure, such as an office network, or public, such as
a coffee shop. Usually a Wi-Fi network consists of a wired connection to the Internet, leading to
a wireless router that transmits and receives data from individual devices, connecting them not only
to the outside world but also to each other. Wi-Fi range is generally wide enough for most homes or
small offices, and for larger campuses or homes, range extenders may be placed strategically to
extend the signal. Over time the Wi-Fi standard has evolved, with each new version faster than the
last. Current devices usually use the 802.11n or 802.11ac versions of the spec, but backwards
compatibility ensures that an older laptop can still connect to a new Wi-Fi router. However, to see
the fastest speeds, both your computer and the router must use the latest 802.11 version, so when
you upgrade your personal computer, consider a router upgrade to match its speed.

Cellular
Most often associated with wireless phones, a cellular network uses connected transmitters,
or cells, that enable the user to move about while remaining in contact with the network. Cells
transmit at low power levels so as not to interfere with each other and may be spaced far apart in

10

rural areas or close together in cities. Cellular networks rarely offer complete coverage, and due to a
number of factors, you may have experienced "dead zones" with no coverage at all. Also, when
usage is extremely high in a specific area, bandwidth may be insufficient to handle all the traffic,
and the system may block new calls until bandwidth becomes available. The evolution of cellular
networks is enumerated by generations. The first generation was completely analog and supported
the first wireless phones. The second generation, or 2G, used a number of different digital standards
to support compact phones, leading to the wide adoption of wireless phones. To accommodate a
growing need for data as well as voice, 3G offered further bandwidth. Today's widespread use of
smartphones has spurred the wireless providers to build out 4G networks, which support high-speed
data for phones such as the iPhone 5 and Samsung Galaxy S III.

Bluetooth
While both Wi-Fi and cellular networks enable connections to anywhere in the world,
Bluetooth is much more local, with the stated purpose of "replacing the cables connecting devices,"
according to the official Bluetooth website. That's precisely what Bluetooth does; it connects iPods
to car stereos, wireless keyboards and mice to laptops or cell phones to the ubiquitous hands-free
earpieces. Bluetooth uses a low-power signal with a maximum range of 50 feet, but with sufficient
speed to enable transmission of high-fidelity music and streaming video. As with other wireless
technologies, Bluetooth speed increases with each revision of its standard but requires up-to-date
equipment at both ends to deliver the highest possible speed. Also, the latest Bluetooth revisions are
capable of using maximum power only when it's required, preserving battery life.

WiMAX

11

While over-the-air data is fast becoming the realm of cellular providers, dedicated wireless
broadband systems also exist, offering fast Web surfing without connecting to cable or DSL. One
well-known example of wireless broadband is WiMAX, offered by providers such as Clear or
Skyriver. Although WiMAX can potentially deliver data rates of more than 30 megabits per second,
providers offer average data rates of 6 Mbps and often deliver less, making the service significantly
slower than hard-wired broadband. The actual data rates available to someone using WiMAX can
vary widely with their distance from the transmitter. WiMAX is also known as one version of 4G
wireless and has been available in phones as Sprint's 4G technology. However, the company has
been building out a network using LTE, the 4G technology used by AT&T, Verizon and T-Mobile.
Advantages
Many benefits from a wireless network, they are
Convenience: Access your network resources from any location within your wireless network's
coverage area or from any Wi-Fi hotspot.
Mobility: You're no longer tied to your desk, as you were with a wired connection. You and your
employees can go online in conference room meetings.
Productivity: Wireless access to the Internet and to your company's key applications and resources
helps your staff get the job done and encourages collaboration.
Easy setup: You don't have to string cables, so installation can be quick and cost-effective.
Expandable: You can easily expand wireless networks with existing equipment, while a wired
network might require additional wiring.
Security: Advances in wireless networks provide robust security protections.
Cost: Because wireless networks eliminate or reduce wiring costs, they can cost less to operate than
wired networks.

2.2.1 WIRELESS AD HOC NETWORK


A wireless ad hoc network (WANET) is a decentralized type of wireless network.[1][2] The
network is adhoc because it does not rely on a pre existing infrastructure, such as routers in wired
networks or access points in managed (infrastructure) wireless networks. Instead, each node
participates in routing by forwarding data for other nodes, so the determination of which nodes

12

forward data is made dynamically on the basis of network connectivity. In addition to the classic
routing, ad hoc networks can use flooding for forwarding data.
An ad hoc network typically refers to any set of networks where all devices have equal status
on a network and are free to associate with any other ad hoc network device in link range. Ad hoc
network often refers to a mode of operation of IEEE 802.11 wireless [Link] also refers to a
network device's ability to maintain link status information for any number of devices in a 1link
(aka "hop") range, and thus, this is most often a Layer 2 activity. Because this is only a Layer 2
activity, ad hoc networks alone may not support a routable IP network environment without
additional Layer 2 or Layer 3 capabilities. The earliest wireless ad hoc networks were the "packet
radio" (PRNETs) from the 1970s, sponsored by DARPA after the ALOHA net project
Application
The decentralized nature of wireless adhoc networks makes them suitable for a variety of
applications where central nodes can't be relied on and may improve the scalability of networks
compared to wireless managed networks, though theoretical[3] and practical[4] limits to the overall
capacity of such networks have been identified.
Minimal configuration and quick deployment make ad hoc networks suitable for emergency
situations like natural disasters or military conflicts. The presence of dynamic and adaptive routing
protocols enables ad hoc networks to be formed quickly. Wireless adhoc networks can be further
classified by their application:
1. Mobile ad hoc networks (MANET)
2.2.2 Technical requirements
An ad hoc network is made up of multiple nodes connected by links. Links are influenced by
the node's resources (e.g., transmitter power, computing power and memory) and behavioral
properties (e.g., reliability), as well as link properties (e.g. length of link and signal loss, interference
and noise). Since links can be connected or disconnected at any time, a functioning network must be
able to cope with this dynamic restructuring, preferably in a way that is timely, efficient, reliable,
robust, and scalable. The network must allow any two nodes to communicate by relaying the
information via other nodes. A path is a series of links that connects two nodes. Various routing
methods use one or two paths between any two nodes; flooding methods use all or most of the
available paths

13

2.2.3 Medium access control


In most wireless ad hoc networks, the nodes compete for access to shared wireless medium, often
resulting in collisions (interference). Using cooperative wireless communications improves
immunity to interference by having the destination node combine self interference and other
nodeinterference to improve decoding of the desired signal.
2.2.4 Mathematical models
The traditional model is the random geometric graph. These are graph structures consisting of a set
of nodes placed according to a point process in some usually bounded subset of the dimensional
plane, mutually coupled according to a Boolean probability mass function of their spatial separation
(which may be a step function, see unit disk graphs). They can be used to study mathematically the
set of network observables, such as the probability there exists a path of links between every pair of
nodes (connectivity), the distribution of centralities or the distribution of node degrees
2.2.5 Security
Microsoft does not allow advanced encryption and security protocols for wireless Ad hoc networks
on Windows. In fact, the security hole provided by Ad hoc networking is not only the Ad hoc
network itself, but the bridge it provides into other networks (see Ad hoc networks in the article
Wireless security)
.2.3 MOBILE AD HOC NETWORK
A mobile ad hoc network (MANET) is a continuously self configuring, infrastructure
fewer networks of mobile devices connected without wires. Ad hoc is Latin and means "for this
purpose". Each device in a MANET is free to move independently in any direction, and will
therefore change its links to other devices frequently. Each must forward traffic unrelated to its own
use, and therefore be a router. The primary challenge in building a MANET is equipping each
device to continuously maintain the information required to properly route traffic. Such networks
may operate by themselves or may be connected to the larger Internet. They may contain one or
multiple and different transceivers between nodes. This results in a highly dynamic, autonomous
topology

14

MANETs are a kind of Wireless ad hoc network that usually has a routable
networking environment on top of a Link Layer ad hoc network. MANETs consist of a peer to peer,
self forming, self healing network in contrast to a mesh network has a central controller (to
determine, optimize, and distribute the routing table). MANETs circa 20002015 typically
communicate at radio frequencies (30 MHz 5GHz).Multichip relays date back to at least 500 BC.
The growth of laptops and 802.11/Wi-Fi wireless networking have made MANETs a popular
research topic since the mid1990s. Many academic papers evaluate protocols and their abilities,
assuming varying degrees of mobility within a bounded space, usually with all nodes within a few
hops of each other. Different protocols are then evaluated based on measures such as the packet drop
rate, the overhead introduced by the routing protocol, end to end packet delays, network throughput,
ability to scale, etc.
2.4 WIRELESS SENSOR NETWORKS
As wireless devices are generally carried by humans, almost all the desired civilian
and military applications in mobile adhoc networks (MANETs) are tightly coupled with humans
moving behaviors, which are governed by their daily activities. The human daily activities are
regulated by their associated societal duties and working patterns in networks, which are very
dynamic and difficult to predict upon diversified locations and times. By far, it is still not clear how
to specify the complicated human mobility by mobility modeling, which, however, is essential to
design and plan the demanding MANET applications for humans.
Human mobility patterns are manifested by the corresponding human moving
capabilities. Because of the complexity of human activities in networks, finding the essential
mobility metrics which can characterize the human mobility patterns and quantify the human
moving capability as well is a very challenging issue. Furthermore, existing synthetic mobility
models are not suitable to mimic the human moving behaviors in the societal context. Instead, the
inherent properties of human mobility can only be effectively generalized from real human mobility
traces. Recent empirical studies of human mobility traces in respectively showed that human
mobility patterns and moving capability can be effectively manifested by his/her diffusive capability
(order) , which characterizes the relationship between the mean square displacement and the
diffusive process time i.e., ex: In general, the human diffusive behaviors are heavily influenced
according to spatial effects such as trip length or temporal effects such as pause time and return time
15

in mobile wireless networks. Consequently, the study of humandiffusive behaviors from the
collective spatial and temporal effects is desirable. However, a complete dataset recordinghuman
daily activities by moving traces is not available in theresearch community. Therefore, in this paper,
we are motivatedto study the inherent properties of human mobility in bothspatial and temporal
domains and their direct impacts onhuman diffusive movement patterns by collecting a new setof
GPS logged daily moving traces for three [Link], upon the collected traces, we
generalize thehuman mobility properties in spatial domains regarding traveldistance between site
locations and trip displacement; and intemporal domains according to site return time and pause
[Link] results of all these metrics reveal a heavy dependenceon human time-varying societal
duties in different territories.
First, we find that power law is an inherent factor characterizingthe human mobility
in both spatial and temporal [Link] consequence, we show that power law distribution of
tripdisplacement leads to a superdiffusive human movementpattern, while the power law
distribution of pause timeresults in a subdiffusive human movement [Link], we also
find that the complementary cumulativedistribution function (CCDF) of human movement metrics
inspatial and temporal domains always has a transition frompower-law head to exponential tail
delimited by the associatedcharacteristic distance and characteristic time, respectively.
Overall our results provide a deep understanding of humanmoving behaviours. In addition, the
knowledge of power lawproperty and the order of characteristic distance in human(solider) trip
displacement can benefit the military applicationwith supported threat detecting sensors in a
deployed combatenvironment. And the human diffusive mobility patterns canbe applicable to
investigate methods of mitigating the effectsof dynamic motion on soldier performance in the battle
fields.
2.4.1 Advantages
Wireless sensor networks include spatially allotted autonomous instruments that employ sensors to
check environmental or physical conditions. These autonomous instruments, or nodes, blend with
routers and an entrance to make a standard WSN system. The allotted measurement nodes
wirelessly communicate to a central entrance that gives a connection to the wired world in which
users can gather, process, examine and present their evaluated data. To elaborate length and
dependability in a WSN, users can employ routers to achieve an extra communication connection

16

between end nodes and the entrance. WSN provide lowpower, reliable measurement nodes that
function for around 3 years on 4 AA batteries and can be distributed for a remote, longterm
Operation.
1. Reduce your cabling costs
The cabling cost is becoming more and more important in embedded device and
equipment. The cost of integration, maintenance as well as the cabling weight induces non
negligible constraints that can be more costly than the price of cabling alone. BeanAir offers you to
slash these costs by choosing a wireless instrumentation.
2. Radio transmission technology optimized for harsh industrial environment
While the vast majority of Wireless Measurement Systems show their limits in harsh industrial
environment, Bean Air has designed an innovative concept based on Antenna Diversity allowing
optimizing the radio link quality in environments subject to random and diverse disturbance.
3. Hardened and miniaturized Wireless Measurement products
Areas that had been inaccessible to wired measurement instruments are now at reach thanks to
hardened miniaturized wireless measurement device (IP66 enclosure & 30G shock resistant)
4. Geographically locate your measurement events thanks to GPS Geo location
Whether you intend to manage your fleet of vehicles or simply proceed to measurement and testing,
you will need to locate your sensors, components and alarms. The combination of WSN Technology
with the GPS allows you to link measurement events to geolocation.
5. Monitoring software designed to match your needs and blend into your IT infrastructure
The BeanScape (/products/beanscape) is real time supervision and monitoring system that allows
you to view and manage in real time the BeanAir Wireless Sensor Network. The BeanScape is also
equipped with an expert system allowing viewing and interpreting elements such as measurement or
network alarms. The BeanScape (/products/beanscape) integrates an OPC server allowing it to blend
into your IT system. Most engineering platform tools (MatLab, LabView, WinDev) integrate an
OPC client.

17

6. Real time measurement monitoring


Real time measurement monitoring all measurements are recorded and stored on the BeanScape
(/products/beanscape). Each measurement is time stamped and geolocated in real time within a 1Hz
to 5Hz bandwidth. It is therefore possible to efficiently analyze the behaviour of a vehicle and
geolocate it when an alarm is being issued.

18

You might also like