homecloud computingcloud data Processingclound of networks
cloud of things

Introduction to Practical Wireless Sensor Network Design and Deployment

Duration: 4 Days

Course Background

This 4 day course covers the implementation of practical wireless based smart sensors and their deployment. It is a theory , concept and practice oriented course based on instructor presentations and breakout groups. The aim is to consider issues such as

  • Choice of micro-processor architecture and features
  • Choice of wireless communication protocol
  • Choice of operating system and programming framework
  • Level of organisation and granularity
  • Security, redundancy and scalability
  • Mobile vs. static sensor considerations
  • Routing, self organisation and repair
  • data dissemination and data acquisition
  • the role of cloud computing

Course Prerequisites and Target Audience

This is an analysis and design oriented course and does not require any extensive programming experience. An awareness of embedded systems programming, computer and embedded systems networking as well as distributed data acquistion, data processing and control would be advantageous.

Course Outline

  • Embedded systems - for novices
  • Embedded systems sensor technologies - an overview
  • Smart sensor = embedded system + sensor + networking + applcation software
  • From smart sensors to collections of smart sensors
  • Making sense of a mass of smart sensor data - data modeling and data fusion
  • Wired networking vs. wireless networking vs. a combination of wired and wireless networking
  • Where should the data be sent to ?
  • Where should the data be processed ?
  • Why data visualisation is needed to make data understandable to decision makers
  • Operating systems - small embedded real time operating systems (RTOS)
  • Operating systems - complex operating systems - Linux and Windows
  • Operating systems for mobile devices - closed source vs. open source
  • Modems for sending data over mobile telephone networks
  • Security - authentication, authorisation, secrecy, undeniability
  • Security threats - MOM (Method, Opportunity, Motive)
  • AdHoc networks - Self organisation, self healing and self adapting networks
  • Combining networks
  • Industrial control applications of wireless sensor networks
  • Emergency and Disaster scenarios
  • Defence and security scenarios
  • Chip technologies ARM, Microchip, 8051, Atmel AVR
  • Chip vendors, solutions and offering - TI, Microchip, Silabs, Atmel, Freescale, ST, NXP
  • Frameworks and operating systems - TinyOS, Contiki, 6lowPAN, Android, Windows Embedded and mobile, embedded Linux, iOS and MacOSX