* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download A Survey of Context-Aware Mobile Computing Research
Survey
Document related concepts
Transcript
Sensor Networks
金仲達教授
清華大學資訊系統與應用研究所
九十三學年度第一學期
Sources
“Comm ’n Sense: Research Challenges in
Embedded Networked Sensing,” D. Estrin,
http://lecs.cs.ucla.edu
“A Survey on Sensor Network,”
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E.
Cayirci, Georgia Institute of Technology
IEEE Communications Magazine, Aug. 2002
Pervasive Computing
Sensor Networks-1
Introduction
Mark Weiser envisioned a world in which
computing is pervasive
What we need is to instrument the physical
world with pervasive networks of sensor-rich,
embedded computation
Such systems fulfill two of Weiser’s objectives:
Ubiquity: by inject computation into the physical
world with high spatial density
Invisibility: by having the nodes and collective of
nodes operate autonomously
Pervasive Computing
Sensor Networks-2
Introduction
What is required is the ability to easily deploy
flexible sensing, computation, and actuation
capabilities into our physical environments such
that the devices themselves are general-purpose
and can organize and adapt to support several
application types
Pervasive Computing
Sensor Networks-3
Vision
• Embed numerous distributed
devices to monitor/interact
with physical world
• Exploit spatially and
temporally dense, in situ,
sensing and actuation
• Network these devices so
that they can coordinate to
perform higher-level tasks.
• Requires robust distributed
systems of hundreds or
thousands of devices.
Pervasive Computing
Sensor Networks-4
Sensor Nodes and Networks
Sensor nodes = sensing, data processing, and
communicating capacity
Sensor network: a large number of sensor nodes
that are densely deployed either inside the
phenomenon or very close to it
Sensor node position not engineered or predecided
protocols or algorithms must be self-organizing
Cooperative effort of sensor nodes with in network
processing
Pervasive Computing
Sensor Networks-5
Applications
Scientific: eco-physiology,
biocomplexity mapping
Infrastructure: Contaminant
flow monitoring
www.jamesreserve.edu
Engineering: adaptive
structures
Pervasive Computing
Sensor Networks-6
Other Applications (I)
Environmental
Healthy
Forest fire detection, biocomplexity mapping of the
environment, flood detection, precision agriculture
Telemonitoring of human physiological data, tracking
and monitoring doctors and patients inside a hospital,
drug administration in hospitals
Military:
Monitoring friendly forces, equipment and
ammunition; battlefield surveillance; reconnaissance
of opposing forces and terrain; targeting; battle
damage assessment; nuclear, biological and chemical
attack detection and reconnaissance
Pervasive Computing
Sensor Networks-7
Other Applications (II)
Home
Commercial
Home automation
Smart environment
….
Environmental control in office buildings
Interactive museums
Detecting and monitoring car thefts
Managing inventory control
Vehicle tracking and detection
Monitoring product quality
Monitoring disaster areas
Pervasive Computing
Sensor Networks-8
Challenges
Tight coupling to the physical world and embedded in
unattended “control systems”
Untethered, small form-factor, nodes present stringent
energy constraints
Different from traditional Internet, PDA, mobility applications
that interface primarily and directly with human users
Living with small, finite, energy source is different from fixed but
reusable resources such as BW, CPU, storage
Communications is primary consumer of energy
Sending a bit over 10 or 100 meters consumes as much energy
as thousands/millions of operations
Pervasive Computing
Sensor Networks-9
New Design Themes
Long-lived systems that can be untethered and
unattended
Low-duty cycle operation with bounded latency
Exploit redundancy
Tiered architectures (mix of form/energy factors)
Self-configuring systems that can be deployed
ad hoc
Measure and adapt to unpredictable environment
Exploit spatial diversity and density of sensor/actuator
nodes
Pervasive Computing
Sensor Networks-10
Approach
Leverage data processing inside the network
Exploit computation near data to reduce
communication
Achieve desired global behavior with adaptive
localized algorithms (i.e., do not rely on global
interaction or information)
Dynamic, messy (hard to model), environments
preclude pre-configured behavior
Can’t afford to extract dynamic state information
needed for centralized control or even Internet-style
distributed control
Pervasive Computing
Sensor Networks-11
Why can’t we simply adapt Internet
protocols and “end to end” architecture?
Internet routes data using IP addresses in
Packets and Lookup tables in routers
Humans get data by “naming data” to a search
engine
Many levels of indirection between name and IP
address
Works well for the Internet, and for support of
Person-to-Person communication
Embedded, energy-constrained (un-tethered,
small-form-factor), unattended systems can’t
tolerate communication overhead of indirection
Pervasive Computing
Sensor Networks-12
vs. Ad Hoc Networks
Large number of sensor nodes (several orders of
magnitude higher)
Densely deployed
Prone to failures
Network topology changes very frequently
Mainly use a broadcast paradigm vs. point-topoint in ad hoc networks
Limited in power, computational capacities, and
memory
May not have global identification (ID)
Pervasive Computing
Sensor Networks-13
Communication Architecture
Factors of design consideration
Transmission media
Production costs
Power consumption
Fault tolerance
NW topology
HW constraints
Environment
Scalability
Pervasive Computing
Sensor Networks-14
Fault Tolerance
The ability to sustain sensor network
functionalities without any interruption due to
sensor node failures
The reliability Rk(t) or fault tolerance of a sensor
node can be modeled with the Poisson
distribution to capture the probability of not
having a failure within the time interval (0,t)
Rk(t) = exp(-λkt) , for node k
Pervasive Computing
Sensor Networks-15
Scalability
The number of sensor nodes
10 -> 100 -> 1000 -> 10000 -> ….
Depending on the application
New schemes must be able to utilize the high
density
The density
μ(R) = (N . π R2)/A
A: region area
R: radio transmission range
N: the number of scattered sensor nodes
Pervasive Computing
Sensor Networks-16
Production Costs
The cost of a single node is very important to
justify the overall cost of the network
The cost of a sensor node should be much less than
US$1
The state-of-art technology allows a Bluetooth radio
system to be less than US$10
10 times more expensive the the targeted price
Pervasive Computing
Sensor Networks-17
Hardware
4 basic units: sensing unit, processing unit,
transceiver unit, power unit
Sensing: sensors, Analog-to-digital converters (ADCs)
Additional application-dependent units
Location finding system, power generator, mobilizer….
Pervasive Computing
Sensor Networks-18
Hardware Constraints
Constraints
Size
Power
Operate in very high densities
Low cost
Dispensable
Autonomous
Adaptive to environment
Pervasive Computing
Sensor Networks-19
Sensor Network Topology
Topology maintenance and change in 3 phases
Predeployment and deployment phase
Post-deployment phase
Be thrown in as a mass or placed one by one
Change in sensor nodes’ position, reachability, available
energy, malfunctioning, and task details
Redeployment of additional nodes phase
Additional sensor nodes can be redeployed
Pervasive Computing
Sensor Networks-20
Environment
Nodes are densely deployed either very close or
directly inside the phenomenon to be observed
Usually work unattended in remote geographic
areas
in the interior of large machinery
at the bottom of an ocean
in a biologically or chemically contaminated field
in a battlefield beyond the enemy lines
in a home or large building
….
Pervasive Computing
Sensor Networks-21
Transmission Media
Often by wireless medium
Radio:
Used by most sensors
μAMPS sensor uses a Bluetooth-compatible 2.4 GHz
transceiver with an integrated frequency synthesizer
Infrared:
License-free, robust to interference from electrical
devices
cheaper and easier to build
Optical: Smart Dust mote
Both infrared and optical require line of sight
Pervasive Computing
Sensor Networks-22
Power Consumption
In some application scenarios, replenishment of
power resources might be impossible
In a multihop ad hoc sensor network, each node
plays dual role of data originator and data router
Battery lifetime
cause significant topological changes
require rerouting of packets and reorganization of the
network
Power consumption
sensing, communication, and data processing
Pervasive Computing
Sensor Networks-23
Design Issues According to Protocol
Stack
Physical layer:
MAC protocol
power-aware; minimize
collision with neighbors’
broadcasts
Network layer
Simple, robust modulation,
transmission, receiving
routing data supplied by
transport layer
Transport layer
maintain flow of data
Pervasive Computing
Sensor Networks-24
Three Management Planes
The power management plane, e.g.
The mobility management plane
Detects and registers movement of sensor nodes
maintain route back to the user, keep track of their neighbor
The task management plane
Turn off its receiver after receiving a message
Broadcasts low in power and cannot participate in routing
messages
balances and schedules sensing tasks for a specific region
They are needed for sensor nodes to work powerefficiently, route data in a mobile network, share
resources between sensor nodes
Pervasive Computing
Sensor Networks-25
Physical Layer
Responsibility
Frequency selection, carrier frequency generation,
signal detection, modulation, and data encryption.
915 MHz industrial, scientific, and medical (ISM)
band has been widely used
Long distance wireless communication can be
expensive in terms of power
A good modulation is critical for reliable comm.
Binary and M-ary modulation schemes
Ultra wideband (UWB) or impulse radio (IR) are
promising
Pervasive Computing
Sensor Networks-26
Physical Layer Open Issues
Modulation schemes
Simple and low-power modulation schemes
Strategies to overcome signal propagation
effects
Hardware design
Tiny, low-power, low-cost transceiver, sensing, and
processing units
Power-efficient hardware management strategies
Pervasive Computing
Sensor Networks-27
Data Link Layer
Responsibility
Medium Access Control protocol
Multiplexing of data streams, data frame detection,
medium access and error control
Reliable point-to-point and point-to-multipoint
creation of the network infrastructure
fairly and efficiently share communication resources
Existing MAC protocols cannot be used
Cellular system: infrastructure-based
Bluetooth and mobile ad hoc network (MANET)
much larger number, power and radio range, frequent
topology change, power conservation needed
Pervasive Computing
Sensor Networks-28
Some Proposed MAC Protocols
Pervasive Computing
Sensor Networks-29
Example MAC Protocols
Self-Organizing Medium Access Control for
Sensor Networks (SMACS) and the EavesdropAnd-Register (EAR) Algorithm
Nodes to discover their neighbors and establish
communication without the need for any local or
global master nodes
No necessity for networkwide synchronization
using a random wake-up schedule during connection
phase and turning the radio off during idle time slots
EAR attempts to offer continuous service to the
mobile nodes
Pervasive Computing
Sensor Networks-30
Data Link Open Issues
MAC for mobile sensor networks
more extensive mobility in the sensor nodes and
targets
Determination of lower bounds on the energy
required for sensor network self-organization
Error control coding schemes
Power-saving modes of operation
Pervasive Computing
Sensor Networks-31
Network Layer
Design principles
Power efficiency
Sensor networks are mostly data-centric
Data aggregation is useful only when it does not
hinder the collaborative effort of the sensor nodes.
An ideal sensor network has attribute-based
addressing and location awareness
Also providing internetworking with external
networks
Pervasive Computing
Sensor Networks-32
Energy-Efficient Route
Available power:PA
Energy required (α)
Maximum minimum PA node route
Min PA is larger than
the min PAs
Maximum PA route
Minimum energy route
Minimum hop route
Pervasive Computing
Sensor Networks-33
Data Centric Route
Use interest dissemination
Often require attribute-based naming
Sinks broadcast the interest, or
Sensor nodes broadcast an advertisement and wait
for a request
Query by using attributes of phenomenon
Data aggregation
Solve the implosion and overlap problems
Pervasive Computing
Sensor Networks-34
Proposed Schemes
Flooding
Gossiping
Implosion (duplicated
message), overlap (both
sensors detect the same
event), resource blindness
(not considering resource
constraints)
Relay packets to randomly
selected neighbor
Negotiation (SPIN)
Pervasive Computing
Sensor Networks-35
More Schemes
Small minimum energy communication network
Sequential assignment routing
Low-energy adaptive clustering hierarchy
Directed diffusion
Pervasive Computing
Sensor Networks-36
Protocol Summary
Pervasive Computing
Sensor Networks-37
Application Layer Protocols
Sensor management
nodes do not have global identifications and are
infrastructureless
Providing administrative tasks
Introducing the rules related to data aggregation, attributebased naming, and clustering to the sensor nodes
Exchanging data related to the location finding algorithms
Time synchronization of the sensor nodes
Moving sensor nodes
Turning sensor nodes on and off
Querying the sensor network configuration and the status of
nodes, and reconfiguring the sensor network
Authentication, key distribution, and security in data
communications
Pervasive Computing
Sensor Networks-38
Application Layer Protocols
Task assignment and data advertisement
interest dissemination
Advertisement of available data
Sensor query and data dissemination
issue queries, respond to queries and collect incoming replies
Sensor query and tasking language (SQTL) supports 3 types of
events
Receive defines events generated by a sensor node when the
sensor node receives a message
every defines events occurring periodically due to timer
timeout
expire defines events occurring when a timer is expired
Different types of SQDDP can be developed for various
applications. The use of SQDDPs may be unique to each
application
Pervasive Computing
Sensor Networks-39
Pervasive Computing
Sensor Networks-40
Research Areas
Constructs for “in network” distributed
processing
system organized around naming data, not nodes
“programming” large collections of distributed
elements
Localized algorithms that achieve system-wide
properties
Time and location synchronization
energy-efficient techniques for associating time and
space with data to support collaborative processing
Experimental infrastructure
Pervasive Computing
Sensor Networks-41
Constructs for in NW Processing
Nodes pull, push, store named data (using tuple
space) to create effic. processing points in NW
e.g. duplicate suppression, aggregation, correlation
Nested queries reduce overhead relative to
“edge processing”
Complex queries support
collaborative signal proc.
propagate function
describing desired
locations/nodes/data
(e.g. ellipse for tracking)
Pervasive Computing
Sensor Networks-42
Self-organization with Localized Alg.
Self-configuration and reconfiguration essential
to lifetime of unattended systems in dynamic,
constrained energy, environment
Efficient, multi-hop topology formation: node
measures neighborhood to determine participation,
duty cycle, and/or power level
Beacon placement: candidate beacon measures
potential reduction in localization error
Requires large solution space; not seeking
unique optimal
Investigating applicability, convergence, role of
selective global information
Pervasive Computing
Sensor Networks-43
Time and Location Synchronization
Common time coordinate for in situ processing,
correlation of events
Developing methods that balance communication
(energy) cost with other variables (e.g., precision,
scope, lifetime, cost, form factor)
Post facto pulse synchronization
Common spatial coordinate for 3-space related
tasks and network operation (e.g., geo-routing)
Methods not rely on GPS or RF RSSI (due to envir.)
Multi-modal localization using acoustic time of flight
measurements, RF synchronization, and imaging to
identify bad data sources (NLOS)
Pervasive Computing
Sensor Networks-44
Experimental Infrastructure
PC-104+
(off-the-shelf)
Software
• Directed Diffusion
• TinyOS (UCB/Culler)
• Measurement, Simulation
Pervasive Computing
UCB Mote
(Pister/Culler)
Sensor Networks-45
Berkeley Motes & TinyOS
孫文宏
Berkeley Motes
1st generation
2nd generation
Pervasive Computing
Sensor Networks-47
System of MICA Motes
Pervasive Computing
Sensor Networks-48
MICA Motes
Processor and radio board MPR300
Sensor board –
MTS310
Base station/interface board MIB300
Pervasive Computing
Sensor Networks-49
MICA Motes
Pervasive Computing
Sensor Networks-50
MICA Motes
Pervasive Computing
Sensor Networks-51
Sensor Board
Microphone
Sounder
Magnetometer
1.25 in
Temperature
Sensor
Pervasive Computing
Light
Sensor
2.25 in
Accelerometer
Sensor Networks-52
Processor/Radio Board
Pervasive Computing
Sensor Networks-53
Processor/Radio Board
Pervasive Computing
Sensor Networks-54
TinyOS
TinyOS = application/binary image, executable
on an ATmega processor
event-driven, 2-level scheduling, single-shared stack
no kernel, no process management, no memory
management,
no virtual memory
Main (includes Scheduler)
simple FIFO
scheduler, part
Application (User Components)
of the main
Actuating
Communication
Sensing
Communication
Hardware Abstractions
Pervasive Computing
Sensor Networks-55
TinyOS
f:\avrgcc
\cygwin
\tinyos-1.x\apps {cnt_to_leds, cnt_to_rfm, sense, …}
\docs {connector.pdf, tossim.pdf, …}
\tools {toscheck, inject, verify, …}
\tos
{shared/system components, …}
……………
………..
Pervasive Computing
Sensor Networks-56
Programming Model
Application
Component
2 types: modules and configurations.
Module
Configuration
A configuration is a component that "wires" other
components together. Every NesC application has a
single top-level configuration.
Interface
Pervasive Computing
Sensor Networks-57
Programming Model
comp3
comp1:
module
comp2:
configuration
Pervasive Computing
comp4
application:
configuration
Sensor Networks-58
Reference
Crossbow
http://www.xbow.com
MICA Motes
http://www.xbow.com/Products/Wireless_Sensor_Networks.htm
TinyOS
http://today.cs.berkeley.edu/tos/
TinyOS support
http://today.cs.berkeley.edu/tos/support.html
TinyOS tutorial
http://today.cs.berkeley.edu/tos/tinyos-1.x/doc/tutorial/index.html
PADSFTP/TinyOS
Pervasive Computing
Sensor Networks-59
Directed Diffusion:
A Scalable and Robust
Communication Paradigm
for Sensor Networks
Chalermek Intanagonwiwat (USC/ISI)
Ramesh Govindan (USC/ISI)
Deborah Estrin (USC/ISI and UCLA)
The Goal
Pervasive Computing
Embed numerous devices
to monitor and interact
with physical world
Network these devices so
that they can coordinate
to perform higher-level
tasks
Requires robust
distributed systems of
tens of thousands of
devices
Sensor Networks-61
The Challenge: Dynamics!
The physical world is dynamic
Dynamic operating conditions
Dynamic availability of resources
Devices must adapt automatically to the
environment
… particularly energy!
Too many devices for manual configuration
Environmental conditions are unpredictable
Unattended and un-tethered operation is key to
many applications
Pervasive Computing
Sensor Networks-62
Energy Is the Bottleneck Resource
Communication VS Computation Cost
E R4
10 m: 5000 ops/transmitted bit
100 m: 50,000,000 ops/transmitted bit
Short distance communication => multi-hop
Cannot assume global knowledge, cannot preconfigure networks
Get desired global behavior thru localized interactions
Empirically adapt to observed environment
Can leverage data processing/aggregation inside
the network
Pervasive Computing
Sensor Networks-63
Research Theme
What communication primitives can be
employed in such unattended sensor networks?
Assume no structured sensor fields, but task-specific
A user of the network contact one of the sensors in
the field and pose queries (interrogation):
e.g., “Give me periodic reports about animal location in
region A every t seconds”
Interrogation propagated to sensor nodes in region A
Sensor nodes in region A are tasked to collect data
Data are sent back to the users every t seconds
Dissemination mechanisms for tasks and events?
Pervasive Computing
Sensor Networks-64
Issues to Be Addressed
Scalable to thousands of sensor nodes
Sensor nodes may fail, lose battery power, be
temporarily unable to communication, …
=> communication mechanisms must be robust
Minimize energy usage
=> a data dissemination mechanism for sensors
Directed Diffusion
Pervasive Computing
Sensor Networks-65
Directed Diffusion
In-network data processing (aggregation,
caching)
Distributed algorithm with localized interaction
Application-aware communication primitives
expressed in terms of named data (not in terms of
the nodes generating or requesting data)
=> data-centric
Data generated by sensors named by attribute-value
Sensor nodes need not have globally unique address,
but need to distinguish between neighbors
Pervasive Computing
Sensor Networks-66
Basic Ideas
A node requests data by sending interests for
named data (diffusion)
Gradients are set up in network to draw events
Data matching the interest is drawn towards
that node along multiple reverse paths
The network reinforces one or more paths
Intermediate nodes can cache, transform, or
aggregate data, and may direct interests based
on previously cached data
Interest/data propagation, aggregation decided
by localized interactions (with local naming)
Pervasive Computing
Sensor Networks-67
Naming
Task descriptions are named by a list of
attribute-value pairs
This specifies an interest for data matching the
attributes
Pervasive Computing
Sensor Networks-68
Basic Directed Diffusion
Setting up gradients (flooding)
Source
Data rate = 1ms
Broadcast
periodically
Sink
Interest = Interrogation
Gradient = Who is interested
Pervasive Computing
Sensor Networks-69
Basic Directed Diffusion
Sending data and reinforcing the best path
Source
Sink
Low rate event
Reinforcement = Increased interest
e.g. 1st neighbor sending the event
Pervasive Computing
Sensor Networks-70
Multiple Sources and Sinks
Pervasive Computing
Sensor Networks-71
Directed Diffusion and Dynamics
Source
Sink
Recovering
from node failure
Low rate event
High rate event
Pervasive Computing
Reinforcement
Sensor Networks-72
Directed Diffusion and Dynamics
Source
Sink
Stable path
Low rate event
High rate event
Pervasive Computing
Sensor Networks-73
Local Behavior Choices
For propagating interests
In our example, flood
More sophisticated
behaviors possible: e.g.
based on cached
information, GPS
For setting up gradients
For data transmission
Multi-path delivery with
selective quality along
different paths
probabilistic forwarding
single-path delivery, etc.
For reinforcement
data-rate gradients are
set up towards neighbors
who send an interest.
reinforce paths, or parts
thereof, based on observed
delays, losses, variances etc.
Others possible:
probabilistic gradients,
energy gradients, etc.
other variants: inhibit certain
paths because resource
levels are low
Pervasive Computing
Sensor Networks-74
Simulation Study of Diffusion
Key metric
Average Dissipated Energy per event delivered
indicates energy efficiency and network lifetime
Compare diffusion to
flooding
centrally computed tree (omniscient multicast)
Pervasive Computing
Sensor Networks-75
Diffusion Simulation Details
Simulator: ns-2
Network Size: 50-250 Nodes
Transmission Range: 40m
Constant Density: 1.95x10-3 nodes/m2 (9.8
nodes in radius)
MAC: Modified Contention-based MAC
Energy Model: Mimic a realistic sensor radio
[Pottie 2000]
660 mW in transmission, 395 mW in reception, and
35 mw in idle
Pervasive Computing
Sensor Networks-76
Diffusion Simulation
Surveillance application
5 sources are randomly selected within a 70m x 70m
corner in the field
5 sinks are randomly selected across the field
High data rate is 2 events/sec
Low data rate is 0.02 events/sec
Event size: 64 bytes
Interest size: 36 bytes
All sources send the same location estimate for base
experiments
Pervasive Computing
Sensor Networks-77
Average Dissipated Energy
(Standard 802.11 Energy Model)
Average Dissipated Energy
(Joules/Node/Received Event)
0.14
Diffusion
0.12
Flooding
Omniscient Multicast
0.1
0.08
0.06
0.04
0.02
0
0
50
100
150
200
250
300
Network Size
Standard 802.11 is dominated by idle energy
Pervasive Computing
Sensor Networks-78
Average Dissipated Energy
(Sensor Radio Energy Model)
Average Dissipated Energy
(Joules/Node/Received Event)
0.018
0.016
Flooding
0.014
0.012
0.01
0.008
Omniscient Multicast
0.006
0.004
Diffusion
0.002
0
0
50
100
150
200
Network Size
250
300
Diffusion can outperform flooding and even omniscient
multicast. WHY ?
Pervasive Computing
Sensor Networks-79
Average Dissipated Energy
(Joules/Node/Received Event)
Impact of In-network Processing
0.025
Diffusion Without
Suppression
0.02
0.015
0.01
Diffusion With
Suppression
0.005
0
0
50
100
150
200
250
300
Network Size
Application-level suppression allows diffusion to reduce
traffic and to surpass omniscient multicast.
Pervasive Computing
Sensor Networks-80
Average Dissipated Energy
(Joules/Node/Received Event)
Impact of Negative Reinforcement
0.012
0.01
Diffusion Without
Negative Reinforcement
0.008
0.006
0.004
Diffusion With Negative
Reinforcement
0.002
0
0
50
100
150
200
250
300
Network Size
Reducing high-rate paths in steady state is critical
Pervasive Computing
Sensor Networks-81
Summary of Diffusion Results
Under the investigated scenarios, diffusion
outperformed omniscient multicast and flooding
Application-level data dissemination has the
potential to improve energy efficiency
significantly
All layers have to be carefully designed
Duplicate suppression is only one simple example out
of many possible ways.
Aggregation (in progress)
Not only network but also MAC and application level
Experimentation on our testbed in progress
Pervasive Computing
Sensor Networks-82
More Information
SCADDS project
ns-2: network simulator (with diffusion supports)
http://www.isi.edu/scadds
http://www.isi.edu/nsnam/dist/ns-src-snapshot.tar.gz
Our testbed and software
http://www.isi.edu/scadds/testbeds.html
Pervasive Computing
Sensor Networks-83
Pervasive Computing
Sensor Networks-84