Wireless networks that build themselves

Mar 07, 2008

From traffic lights to mobile phones, small computers are all around us. Enabling these ‘embedded systems’ to create wireless communications networks automatically will have profound effects in areas from emergency management to healthcare and traffic control.

Networks of mobile sensors and other small electronic devices have huge potential. Applications include emergency management, security, helping vulnerable people to live independently, traffic control, warehouse management, and environmental monitoring.

One scenario investigated by European researchers was a road-tunnel fire. With fixed communications destroyed and the tunnel full of smoke, emergency crews would normally struggle to locate the seat of the blaze and people trapped in the tunnel.

Wireless sensors could cut through the chaos by providing the incident control room with information on visibility, temperatures, and the locations of vehicles and people. Firefighters inside the tunnel could then receive maps and instructions through handheld terminals or helmet-mounted displays.

For this vision to become reality, mobile devices have to be capable of forming self-organising wireless networks spanning a wide variety of communications technologies. Developing software tools to make this possible was the task of the RUNES project.

Intelligent networking

‘Ad-hoc’ mobile networks are very different from the wireless computer networks in homes and offices, explains Dr Lesley Hanna, a consultant and dissemination manager for RUNES. Without a human administrator, an ad-hoc network must assemble itself from any devices that happen to be nearby, and adapt as devices move in and out of wireless range. And where office networks use powerful computers with separate routers, the building blocks of ad-hoc mobile networks are low-power devices that must do their own wireless routing, forwarding signals from other devices that would otherwise be out of radio range.

A typical network could contain tens or even hundreds of these ‘embedded systems’, ranging from handheld computers down to ‘motes’: tiny units each equipped with a sensor, a microcontroller and a radio that can be scattered around an area to be monitored. Other devices could be mounted at fixed points, carried by robots, or worn as ‘smart clothing’ or ‘body area networks’.

Wireless standards are not the issue: most mobile devices use common protocols, such as GSM, Wi-Fi, Bluetooth and ZigBee. The real challenge, suggests Hanna, is to build self-managing networks that work reliably on a large scale, with a variety of operating systems and low-power consumption.

Middleware and more

The EU-funded RUNES (Reconfigurable Ubiquitous Networked Embedded Systems) covered 21 partners in nine countries. Although RUNES was led by Ericsson, it had an academic bias, with twice as many universities as industrial partners, and most of the resulting software is publicly available.

RUNES set out to create middleware: software that bridges the gap between the operating systems used by the mobile sensor nodes, and high-level applications that make use of data from the sensors. RUNES middleware is modular and flexible, allowing programmers to create applications without having to know much about the detailed working of the network devices supplying the data. This also makes it easy to incorporate new kinds of mobile device, and to re-use applications.

Interoperability was a challenge, partly because embedded systems themselves are so varied. At one end of the spectrum are powerful environments, such as Java, while at the other are simple systems designed for wireless sensors. For devices with small memories, RUNES developed middleware modules that can be uploaded, used to carry out specific tasks, and then overwritten.

Project partners also worked on an operating system and a simulator. Contiki is an open-source operating system designed for networked, embedded systems with small amounts of memory. Simics, a simulator allowing large networks to be tested in ways that are impractical with real hardware, is commercially available from project partner Virtutech.

Taking the plunge

The tunnel fire scenario was valuable in demonstrating what networks of this kind can achieve. Using real sensor nodes, routers, gateways and robots developed during the project, a demonstration setup showed how, for instance, a robot router can manoeuvre itself to cover a gap in the network’s wireless coverage.

“A lot of people have been looking at embedded systems networking, but so far there has been a reluctance to take the plunge commercially,” says Hanna. “RUNES’ open-source model is an excellent way to stimulate progress, and it should generate plenty of consultancy work for the academic partners.”

Source: ICT Results

Explore further: Danish TDC to buy Norway's Get for $2.2 billion

add to favorites email to friend print save as pdf

Related Stories

Engineer aims to connect the world with ant-sized radios

Sep 10, 2014

(Phys.org) —A Stanford engineering team has built a radio the size of an ant, a device so energy efficient that it gathers all the power it needs from the same electromagnetic waves that carry signals to ...

T-Mobile to sell phones that call, text on Wi-Fi (Update)

Sep 10, 2014

T-Mobile will sell more than 100 smartphone models with a built-in feature that taps into Wi-Fi networks to make phone calls and send texts when customers can't connect to the wireless carrier's cellular network.

Intel is linking into fashion with MICA bracelet

Sep 04, 2014

Wait, that Intel? The chipmaker is involved in a bracelet to retail at Barneys? Yes, because retail ties in with wearables; women in office settings will look for accessories beyond fitness bands and sensor ...

Intel says world's smallest 3G modem has been launched

Aug 27, 2014

Analysts say why not. Intel is going after its own comfortable stake in the mobile market, where connectivity for wearables and "Internet of Things" household items will be in high demand. Intel on Tuesday ...

Michigan team finds security flaws in traffic lights

Aug 21, 2014

What if attackers could manipulate traffic lights so that accidents would happen with mayhem as the result? That is a question many would rather put off for another day but authorities feeling responsible ...

3Qs: Password and cloud security

Sep 08, 2014

The recent news that hackers accessed celebrities' cloud accounts and released their intimate photos online has prompted many to question the security of sensitive data stored on people's own smartphones and in the cloud. ...

Recommended for you

Cutting congestion on the data network highway

Sep 12, 2014

Perhaps no other consumer-driven technology has made such incredible advances in such a relatively short space of time as the mobile phone. Today's smartphones are used to stream videos, access social media ...

User comments : 1

Adjust slider to filter visible comments by rank

Display comments: newest first

superhuman
not rated yet Mar 08, 2008
Even the scenario they developed to showcase benefits isn't that appealing tbh. Most of those wireless sensors would have to be installed in that tunnel prior to fire, if fire destroyed fixed communication then it most likely destroyed power supply, so all those devices would need to have power supply of their own which would make them more bulky and expensive. Also with tunnel full of smoke there aren't really any good sensors which would be able to detect trapped humans (all I can think of are rather expensive infrared cameras).

Thats the main reason why embedded systems aren't really popular - despite of some fancy scenarios there aren't many areas nowadays where such a network would give obvious benefits when compared to other solutions.

And as for the tunnel fire scenario, I think that instead of this ad-hoc network it would be much more helpful to develop a special mobile cell network node with powerful directional antennas that would provide connection to trapped peoples cell phones. Then rescue teams would be able to:
1. locate mobile phones which should be close to people thereby indirectly locating people
2. call those phones to contact survivors and get more information to/from them

That would provide much more benefit imo.