RF Source Implementation for Communication in Wireless Passive Sensor Network

Verified

Added on  2023/03/29

|25
|8478
|27
AI Summary
This document discusses the implementation of RF source for communication in a wireless passive sensor network (WPSN). It explores the use of modulated backscattering (MB) as a design option for sensor nodes to send data by switching their antenna impedance and reflecting the event signal from an RF source. The document investigates the system analytically to obtain interference-free communication connection with the WPSN nodes by analyzing the number of RF resources, output power, transmission frequency, network dimension, and client characteristics. The results show that communication coverage and RF source power can be maintained in WPSN through careful selection of design parameters.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
RF source implementation for
communication in wireless passive
sensor network

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Abstract
A wireless sensor network (WSN) is a wireless network including spatially
distributed autonomous gadgetsusing sensors to cooperatively monitor
physical or environment conditions, such as temperature, audio,vibration,
pressure, motion or pollutants, in different locations. During RF transmission
energy consumed simply byvitally energy-constrained sensor nodes within a
WSN is related to the full lifetime system, however the full life time of
thestrategy is inversely proportional to the power consumed by sensor
nodes. In this regard, modulatedbackscattering (MB) is a promising design
option, by which sensor nodes send their particular data just by
switchingtheir antenna impedance and reflecting the event signal coming
from an RF source. Therefore wireless passivesensor systems (WPSN)
designed to operate making use of MB do not have the life time constraints.
In this we arelikely to investigate the system analytically. To obtain
interference-free communication connection with theWPSN nodes number of
RF resources is analyzed and motivated in terms of output power as well as
the transmissionfrequency associated with RF sources, network dimension,
RF source and WPSN client characteristics. The entire results of this
paperdisclose that communication coverage plus RF Source Power could be
practically maintained in WPSN throughcautious selection of design
parameters.
Document Page
Introduction
A radio frequency (RF) signal refers to a wireless electromagnetic signal used
as a type of communication, if one is talking about wireless electronics.
Radio surf are a form of electromagnetic rays with identified radio
frequencies that will range from 3 kHz to three hundred GHz. Frequency
refers to the pace of oscillation (of radio stations waves.) RF distribution
occurs at the speed associated with light and does not need a moderate like
air in order to journey. RF waves occur from sunlight flares naturally,
lightning, and through stars in space that will radiate RF waves because they
age. Mankind communicates with artificially produced radio waves that
oscillate at various chosen frequencies. RF conversation is used in many
industries which includes television broadcasting, radar techniques,
computer and mobile system networks, remote control, remote
metering/monitoring, and many more.
WSN is one of the most evolving R&D field for microelectronics quickly. Their
apps and market potentials are usually increasing day-by-day. According to
Frost &Sullivan, the particular expected market size is going to be US$
2billion by this year at an approximatelycompound annual development of
41.9%.
WSN aims to monitor and to manage an environment sometimes. The
particular operational system operates to getperiods varying through weeks
to years within an autonomous way. The network iscomposed of many
sensor nodes that can be used on the ground, up,in automobile, inside
building. The Sensor Client comprises of sensing (measuring),processing, and
communication elements. The sink aggregates some or even all the
nodeinformation. Since sensor power cannot support long variety
communication to reach akitchen sink, multi-hop wireless connectivity is
needed to forward data to the remote control sink. Each ofthe dispersed
sensor nodes has the capacity to collect data, process all of them, and route
themin order to sink node. Router nodes are deployed in field to forward
information from sensor nodesin order to remote sink node. To aid node
operation, open supply operating system (OS) ismade for WSN specially. It
utilizes a component-based architecture that enables rapiddevelopment and
implementation while lessening code size as necessary by the
memoryconstraints in sensor systems. It includes network protocols,
dispersed services, sensordrivers, plus data acquisition tools. It really is
event driven execution design, which enables fine-grainedenergy
management, yet allowing arranging flexibility needed for
unpredictablecharacter of wireless communication plus physical world
interfaces.
Document Page
CMOS chipsets optimized for WSN are key to the commercialization success.
Sensing,processing, plus communication can be performed on a single nick
now, additional reducingthe cost plus allowing deployment of many nodes.
Advances in MEMS (Microelectro-mechanical system) technologies will
produce sensors which are even more capableand flexible and yet are tiny
sufficient to fit inside a 1mm3 area. Available MEMS includestress,
temperature, humidity, strain measure, and various pies plus capacitive
transducersfor closeness, position, velocity, and speed and vibration
measurements.
Among the current R&D challenge would be to develop low power
conversation with low coston-node digesting and self-organizing
connectivity/protocols. One more critical challengeis limited power (battery
life). Power performance in WSN can be achieved inthree ways: lower duty
cycle operation, local/in-network processing to reduce data
quantity(transmission time), and multi-hop networking to reduce
requirement for lengthy range transmitting since signal path reduction is an
inverse exponent along with range or distance.The apps are varied. Ships,
airplane, and building can ‘self-detect’ structural faults;earthquake-oriented
sensors in building may locate potential survivors; tsunami-alertingdetectors
might be set up along the considerable coastal lines. Sensors can be used
within battlefieldto get surveillance and reconnaissance. This is merely a
potential list of ever-increasingapps in this certain area.
The introduction of wireless sensor networks had been motivated by
originallymilitary applications like battlefield surveillance. However, cellular
sensorsystems are now used in many commercial and civilian application
places, including commercialprocedure monitoring and control, machine
health supervising, environment and environmentmonitoring, healthcare

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
apps, home automation, and visitors control [1]. Along with oneor more
sensors, every node in a sensor system is equipped with a radio transceiver
or typicallyother wireless communications gadget, a small microcontroller,
and a power source, generally abattery. The particular envisaged size of an
individual sensor node can vary through shoebox-sized nodes down to
gadgets the size of grain of dirt, although functioning 'motes' associated with
genuine microscopic dimensionshave got yet to be created. The price of
sensor nodes is likewise variable, ranging from hundreds ofpounds couple of
pence, depending on the size from the sensor network and the difficulty
required ofindividual nodes. Price and size constraints upon sensor nodes
result in relatedconstraints upon resources such as energy, storage,
computational bandwidth and speed.
Radio Frequency Identification (RFID) systems and Wireless Networks
(WSNs)are growing as the most ubiquitous processing technologies in history
due to theirimportant advantages and their wide applicability. RFID
communication is definitely fast, convenient, and the application can
substantially conserve time, improve services, decrease laborcost,
circumvent product counterfeiting and fraud, raise productivity gains, and
maintainquality standards. Common applications vary from highway toll
collection, providechain management, public transportation, managing
building access, animal monitoring,developing smart home appliances, plus
remote keyless entry for cars to locatingchildren.
RFID systems are mainly utilized to identify objects or to monitor their
location withoutproviding any indication about the health of the object. WSNs
in theother hand, are systems of small, cost-effective products that can
cooperate to gather and provide information by realizing environmental
conditions such as temperatures,light, humidity, pressure, oscillation, and
sound. WSNs offer cost-effectivemonitoring· of critical apps including
industrial control, edge monitoring, environmental· monitoring, army,
home applications, and health care applications.
RFID technology provides received great attention and contains been
deployed extensivelyin industrial applications. On the other hand, networks
have been the focus associated withgreat research activity however they
have been around mainly as a evidence of concept with· the primary
exception of their adoption within military applications. The advancement of
RFIDandWSNs provides followed separate research and development
pathways and has led to distincttechnologies. Nevertheless, there are many
applications in which the identity or the locationof an object is not sufficient
and additional information that can be retrieved via sensing ·environmental
conditions is essential. Even though sensor networks might be utilized in
theseenvironments as well, the place and identity of an item remain critical
informationthat can be retrieved via RFID systems. The perfect solution in
these full situations is theintegration of both technologies simply because
they complement each other.
Document Page
Forms of communication and interferences insurance coverage
o Source-to-source Interference
o Source -to-node Disturbance
Outcomes and numerical analysis
Here, the required quantity of RF sources, I. electronic., k, is investigated
regarding varying event field Deb, RFfrequency f, result power t P.
Remember that in order to minimize the overall power consumption inWPSN,
the outcome power of RF resources needs to be minimized. In this instance,
for your minimumresult power which is sufficient in order to induce the
necessary voltage simply, I. electronic tmin V = 100mV, on thereceiver of
the WPSN nodes, as discussed within Section II, the number of RF sources is
going to be minimum.
Consequently, for the worst-case analysis big t V is set to be 100mV. Except
if stated otherwise, the remainingsimulation parameters are usually D =
4x10-2 km2, 50 r l L = R = Watts, 8. 5 t l G G = dBi, and c = 3´108 ms.
RF Source Result Power
Increasing the RF output power Pt. indicates increasing the range RF L as in
(1). An event industry can be covered by a smaller amount of RF sources if
the conversation range of RF sources is usually increased.
In Fig. 3(a), k decreases with improving t P, and hence, improving RF R
range. Furthermore, this showsthat noted kingdom increases with carrier
rate of recurrence for a specific t L value. This is because WPSN nodes
usemore energy through RF sources when the conversation rate is increased.
Overall performance and selection of wireless technologies
Document Page
When choosing the type(s) of Wi-Fi technology, it is vital to determine plus
understand the medical device features that are to be wirelessly allowed and
the intended use of the healthcare device. The medical gadget functions and
intended utilizes should be appropriately matched using the wireless
technology’s capabilities plus expected performance. In addition, problems
relating to the integrity associated with data transmitted wirelessly
(including latency and throughput, recognition, correction, and corruption
manage and/or prevention) and safety-related requirements of your device
should be thought about. Potential risks that can influence consistent and
timely cellular medical device functions consist of data corruption or
reduction and interference from simultaneous transmitters in a given place,
which increase and transmitted signal mistake rates latency. To get wireless
medical device plus devices systems, error manage processes should be
incorporated to make sure the integrity of information transmitted wirelessly
and to take care of potential risks related to optimum delay of data transfer.
Guidelines such as bit error price, packet loss, plus signal-to-noise ratio are
useful equipment in assessing and guaranteeing data timeliness and ethics
of data transmission.
Think about a RF wireless rate of recurrence band or a commercial Wi-Fi
radio component,
FDA suggests that you consider:
Global availability and band share (e. g., applicable
GlobalTelecommunication Union Radio communication Industry (ITU-R)
4recommendations) for healthcare devices because medical gadgets serve
patientspositioned in multiple geographic locations plus patients might
change their own geographicplaces.
• Whether your device should have secondary or primary radio stations
serviceclassification, which is determined by the wireless frequency music
group you choose.
• Incumbent users of the adjoining and selected bands, if any kind of, and
how they canimpact the medical device’s operation.
• Applicable interference mitigation strategies if you are planning to use a
sharedRF wireless frequency band.
For implantable and body-worn medical devices, tissue
distributioncharacteristics and specific assimilation rate as appropriate.
Risk-based approach to verification and affirmation
Wireless Quality associated with Service - The distribution should include
information toexplain the wireless QoS necessary for the intended use plus

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
use environment of thehealthcare device. This includes addressing any kind
of risks and potential efficiency issuesthat might be associated with
information rates, latency, and marketing communications reliability
asdescribed within Section 3-b.
Wi-Fi coexistence - Any dangers and potential performance problems that
might beassociated with wireless coexistence in a shared wireless
atmosphere should beresolved via testing and evaluation with other wireless
products or even devices that can beexpected to end up being located in the
wireless healthcare device’s intended use atmosphere
Protection of wireless signals plus data - The submitting should identify any
dangers,potential performance problems, and, if appropriate, danger
mitigation measures that mightend up being associated with wireless
security. The particular given information should include the
particularmeasures needed to protect against illegal wireless access to the
healthcare devicemanage or data and to make sure that given information
and information received by a device are usuallyintended for that will device.
For wireless technologies with a discovery mode or even similaractive
connection setting, specific information should be incorporated addressing
thediscovery setting and how outside users could be prevented from sensing
or even connecting tothe healthcare device. See Section 3-d.
EMC of the Wi-Fi technology - Information must be provided about howEMC
continues to be addressed for the device and everything wireless functions.
However, sincementioned in section 3-e., the particular widely used IEC
60601-1-2 general opinion standard does notcurrently address wireless
technology ELECTRONIC COUNTER MEASURE (ECM) adequately. Therefore,
assessment, analysis,plus appropriate mitigation might be essential to
address any risks or even adequatelypotential efficiency issues that might be
associated with the ELECTRONIC COUNTER MEASURE (ECM) of the
wirelessmedical gadget. If modifications to the healthcare device were made
to complete any EMCtesting, make sure you include a description of, plus
justification for, the adjustments.
Test data summaries
RF wireless and EMC outcomes and testing14 besummarized in your
premarket submitting, which should contain the followingdetails:
o Description of the assessments performed (e. g., RF wireless
performance, EMCdefenses and emissions, test levels or limits) and the
protocol used;
o Reference to appropriate medical gadget, RF wireless technology, or
even EMCstandards for the checks;
Document Page
o Explanations for any deviations from the selected standards;
o Mode(s) of device procedure during testing, with an description of
thesignificance of these settings;
o Specific pass/fail requirements for the testing such as particular
device-related acceptability criteria for each device setting or function
tested.
The particular integration of the promising systems of WSNs and RFID will
maximize theirefficiency, give new perspectives to some broad range of
useful apps, and bridgethe distance between the real and the
research/academic world. This is because theproducingbuilt-in technology
will have extended features, scalability, and movability as wellas reduced
unwanted costs.
Expansion of capabilities and benefits: Considering the fact that RFID
networkscan offer critical information, such as the identification and the
location of anitem, by merging RFIDs along with WSNs additional information
can be recovered, whilethe opportunity of exploiting this information is
increased. For instance, within supply chainmanagement we have been able
not only to track foods but also to monitor theirenvironment conditions and
detect whenever perishables go off.
Scalability-portability: RFID systems integrated with WSNs enjoy the
advantagesof Wi-Fi communication. The particular transmission and
processing associated with critical data and infois caused without the burden
and hassle of wired transactions whilstsaving valuable time. Transportable
RFID readers can more speed the collection of information andrelieve
procedures in varying programs. For instance, healthcare applications, which
includesmonitoring everyday medication associated with elderly or
Document Page
monitoring individuals for diagnosingdeceases, can be hugely facilitated
without rendering individuals immobile throughcumbersome data wirings.
Decrease unnecessary costs: Reducing the price of employed services is a
vital factorin many applications which includes industrial ones. The
requirement would be to achievethe desiredgoal along with the minimum
possible cost simply by supporting backup solutions in the event of
undesiredcircumstances. For instance, perishable goods can be monitored to
ensure that in case they arenot really preserved their transport could be
terminated properly, therefore avoiding unnecessaryadditional transport
costs.
Wi-Fi Quality of Service
Cellular Quality of Service (QoS) refers to the necessary level of assistance
and performance needed for the particular wireless functions of the
healthcare device. As the QoS of cellular phone networks might be
acceptable regarding voice communication, it may not be sufficient for
certain healthcare functions. Cable connections lost without warning, failure
to determine connections, or degradation associated with service can have
serious outcomes, especially when the medical device depends heavily on
the wireless link. Such situations may compromise the wireless transmitting
of high-priority medical gadget alarms, time-sensitive continuous physical
waveform data, and current control of therapeutic medical products (such as
wireless footswitches).
When the wireless medical device is going to be part of a network, wireless
QoS needs to be carefully considered in conjunction with the designed use of
the wireless medical gadget. The following should be assessed: suitable
latency, acceptable level of possibility for loss of information inside the
network, accessibility, and transmission priorities of the network.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
SAW VHMS Device
Since SAW devices are small, low power, tolerant to radiation, and work in
harsh environments at temperatures between -200°C and 910°C, the authors
at NASA are investigating them for aerospace applications. For VHMS
applications, a SAW device was fabricated on Langasite (La3Ga5SiO14)
substrate. The sensor has four Orthogonal Frequency Coded (OFC) reflector
gratings that spread the device’s response across multiple frequencies using
OFC reflectors [20]. The gratings are grouped into two reflector banks. To
avoid interference, the reflector banks are positioned on either side of an
interdigitated transducer (IDT) and are spaced so the reflections do not
overlap in time. The reflector banks are spaced 1.722 mm (left) and 3.710
mm (right) from the IDT. The number of fingers in each grating is 98, 99,
100, and 101. The four gratings have frequencies of 300.05, 303.04, 306.10,
and 309.28 MHz arranged in order from f1, f2, f3, to f4, with f1 closest to the
IDT. More diverse frequency arrangements comprising a reflector bank would
allow more code diversity when uniquely identifying the sensor in a
multisensory environment.
The IDT must be broadband and encompass the frequency content of all four
reflectors so it effectively has 23 finger pairs, a center frequency of 304.61
MHz, and a null bandwidth of 13.25 MHz for the main lobe. The reflectors
have a null bandwidth of ~3.061 MHz each. The IDT fingers are 1.5 μm wide
by 899.83 μm in length.
The SAW device can be used to take measurements because physical
changes in the device will result in achange in operating frequency.
Expansion of the SAW device results in a decreased operating frequency due
Document Page
to tensile strain or a temperature increase, while contraction due to
compressive strain or reduced temperature results in
an increase in the operating frequency. These changes are due in part to a
change in the wavelength and a change in the average propagation velocity
of the surface acoustic wave. The velocity changes are due to changes in the
stiffness parameters and the density of the material.
To demonstrate its capabilities, the SAW device is measuring strain on a
panel with bolted side stiffeners to simulate repeatable fastener failure. This
panel is similar to panels suggested by Worden for structural health
monitoring [23]. The aluminum panel is 635 mm wide and 939 mm long. The
panel is 2.29 mm thick, aluminum (6051 alloy). The side stiffeners are made
of 254 mm “L” shaped aluminum (6051 alloy) extrusions that are 1.587 mm
thick. The bolts are spaced 50.8 mm apart. The root of the panel mounts to a
steel plate using 26 bolts and a 629 mm x 50.8 mm x 76.2 mm base plate of
aluminum on top of both the panel and side stiffeners. To distribute the force
from hanging weights, a 629 mm x 25.4 mm x 12.7 mm steel plate attaches
to the end of the panel.
Formulae and Equations Involved
(i) Pr=PtGtGr(λ/4ΠRrf) -------------------------(1)
Pt = Transmitted power by the RF source
Pr = Received power on the passive sensor node,
GtGr = Antenna gains
Rrf = communication range of an RF source.
(ii) Pr= ׀Vt2 ׀/( 8(Rr+Rl))---------------------- (2)
Vt2 = Incident signal from RF source.
Rr+Rl = antenna impedance
(iii) k= ∆/(ΠR2rf)---------------------------------(3)
k= Required number of RF sources to provide MB based
communication coverage
∆= Event area of size
(iv) k= 2 Π ∆ f2 ׀Vt2 /( c2PtGtGr(Rr+Rl))) ------(4)
The above represents the final equation for calculating the number of RF
sources required for interference free communication.
Document Page
Module algorithm: (for k versus pt)
Step 1: Calculate the antenna impedance with the given data’s
Step 2: Find out the gain of the antennas with the given quantity
Step 3: Determine the field size
Step 4: Get the minimum induced voltage in the range of 100 to 150
Step 5: Get the RF frequency from the uhf range
Step 6: Then set the range of the transmitted power from 0.5 to 4
Step 7: through with the help of above parameters calculate the required
number of RF Sources
Step 8: then simulate the results for various transmitted powers
Step 9: Analyze the results
Step 10: stop
Wi-Fi coexistence
A key factor influencing a wireless medical device’s overall performance is
the limited amount of RF spectrum available, which can lead to potential
competition among Wi-Fi technologies for simultaneous entry to the same
spectrum. Because issues among wireless signals should be expected, most
wireless communication technology incorporate methods to manage these
types of conflicts and minimize interruptions in the shared wireless

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
atmosphere. The selection of RF wireless working frequency and modulation
need to take into account other RF Wi-Fi technologies and users that could
be expected to be in the area of the wireless medical gadget system. These
other Wi-Fi systems can pose risks which could result in medical device
transmission loss or delay that needs to be considered in the risk
management procedure.
Adding RFID WSNs and Systems
Accurate and dependable communication: In traditional customer server
networks large informationstreams are transferred through servers to clients.
Nevertheless, in integrated RFID andWSNsthe data flow is mainly moved
from a large number of devices (clients) to a few servers.
Subsequently, computers are expected to process all of the received
information from RFIDsand sensors in a dependable way and to allow the
suitable action to be taken within a briefperiod of time. Dependability and
accuracy are expected for that data transferred to the
furthermoreapplications (or users) of the integrated program within a
tolerable latency. Associated with substantialimportance is the capacity of
the integrated RFID-sensor system to deliver data tothe necessary
destination with reliability and also to provide a confirmation for the
profitablecompletion of a task. The particular accuracy and reliability of the
integratedRFID-sensor network isdependent upon the criticality of the
particular application also. In not so critical appsa lower degree of reliability
is necessary.
Energy efficiency: Considering the fact that each sensor nodes and energetic
RFIDtags present hard to find resources, the integrated RFID-sensor network
should take directly into count this limitation. The particular integrated
system should be energy-efficient to make surethat will accurate and reliable
conversation shall be achieved with the minimal possibleenergy usage.
Document Page
Network maintenance survivability: Taking into consideration the large
number of devices thatcan be used in an integrated RFID-sensor system,
among the most importantrequirements with regard to such a network is the
capability to perform remote device settingsand remote device software
program updates. Thus, we can acquire a high survivability anda competent
maintenance of the network with the acceptable cost. Furthermore, it really
isimportant that the integrated system is able to recover in case of feasible
of devices orprobable Denial of Service (Do’s) attacks. A possible way to
make that happen would be theadoption of invasion tolerant as well as of
minimization mechanisms such as the use ofreplicating critical network
devices.
Precise and reliable communication: Within traditional client server systems
large datastreams are usually transferred from servers in order to clients.
However, in included RFID andWSNsthe data stream is mainly transferred
from a many devices (clients) to a few web servers.
Subsequently, servers are expected in order to process all the received info
from RFIDsand detectors in a reliable way and also to allow the appropriate
action that must be taken within a shortperiod of time. Dependability and
accuracy are also anticipated for the data transferred to the
particularapplications (or users) from the integrated system within an
endurable latency. Of substantialsignificance is the capability of the
incorporated RFID-sensor network to deliver information tothe required
Document Page
destination along with reliability and to provide a verification for the
successfulcompletion of a job. The reliability and precision of an
integratedRFID-sensor network can bealso dependent on the criticality of the
specific application. Within not so critical applicationsa lesser degree of
reliability is required.
Power efficiency: Considering the fact that both nodes and active RFIDtags
present scarce assets, the integrated RFID-sensor system should take
intoaccounts this limitation. The included system should be energy efficient
to ensurethat accurate and dependable communication will be achieved with
all the minimum possibleenergy usage.
Network maintenance survivability: Taking into consideration the large
number of devices thatcan be used in an integrated RFID-sensor system,
among the most importantrequirements regarding such a network is the
capability to perform remote device settingsand remote device software
program updates. Thus, we can acquire a high survivability andan effective
maintenance of the network by having an acceptable cost. Furthermore, it
really isimportant that the integrated system is able to recover in case of
feasible of devices orachievable Denial of Service (DoS) attacks. A possible
way to make that happen would be theadoption of invasion tolerant as well
as of minimization mechanisms such as the use ofreplicating critical network
devices.
Protection of wireless data plus signals
Security of RF Wi-Fi technology is a means to avoid unauthorized access to
patient information or hospital networks and also to ensure that information
and information received by a device are meant for that device.
Authentication plus wireless encryption play important roles in an effective
Wi-Fi security scheme. While most Wi-Fi technologies have encryption

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
techniques available, Wi-Fi encryption might need to be allowed and
assessed for adequacy for the medical devices designed use. In addition, the
safety measures should be well matched among the medical device parts,
accessories, and system, so that as needed, with a host Wi-Fi network.
Security management must also consider that certain wireless technology
incorporate sensing of such as technologies and attempt to create automatic
connections to rapidly assemble and use a system (e. g., a finding mode
such as that accessible in Bluetooth™ communications). For certain varieties
of wireless medical devices, this kind or kind of discovery setting could pose
safety plus effectiveness concerns, for example, exactly where automatic
connections may enable unintended remote control of the healthcare device.
EMC from the wireless technology
FDA suggests that EMC be a fundamental element of the development,
design, tests, and performance for RF wireless medical devices. This would
include consideration of relevant telecommunications standards and rules
and the potential for device RF emissions that might cause EMI with other
equipment. In addition, RF wireless technology (by itself and in conjunction
with the healthcare device) would also need to satisfy applicable FCC
requirements. Riskmanagement activities should include using danger
analysis to identify any possible issues associated with EMC plus determining
risk acceptability requirements based on information about the device and it
is intended use, including not far off misuse, sources of environmental EMD
(e. g., radio transmitters, computer RF wireless equipment), and the
potential for RF exhausts to affect other products.
Details for proper operation plus set-up
Document Page
To help assure correct set-up, configuration, and functionality of the wireless
medical gadget, appropriate information should be supplied to users. The
following are recommended items to consider as part of these details:
o The specific RF Wi-Fi technology type (e. Gary the gadget Guy., IEEE
802. 11b), features of the modulation, and efficient radiated RF power.
o Specification of each RF rate of recurrence or frequency band
associated with transmission and the preferred regularity or frequency
band (if applicable), plus specification of the bandwidth from the
receiving section of the system or even equipment in those rings.
o Suitable FCC labeling.
o The warning that other tools could interfere with the healthcare device
or device program, set up other equipment complies along with CISPR8
emission requirements.
Active Sensor-Tags
Energetic sensor-tags use batteries in order to power their communication
circuitry, sensors andmicro-controllers. Therefore, they have a rather long
variety (approximately 30 m) and they alsocan easily achieve high data plus
sensor activity rates. Nevertheless, because a battery pack isused, the
device price and the weight is improved while the lifetime of the RFID
sensor-tagis limited.
An active RFID sensor-tag created through the incorporation of sensors with
UHFRFID tags and printed upon low-cost environmental paper regarding
frequencies up to 950 Megahertzwas proposed simply by Ferrer-Vidal et al.
[28]. The proposed built-in sensor-tag uses embeddedstandard rechargeable
thin film batteries that will increase the nodes’ lifetime. Given thatpaper is
one of the cheapest natural materials, the particular proposed sensor-tags
an existingattractive benefit that will trigger large-scale ownership of
integrated sensor-tags. Rideet al. [64] have also proposed a good RFID
prototype including realizing capabilities and anelectric battery source on a
low-cost document substrate.
Passive Sensor-Tags
Unaggressive sensor-tags receive operating energy from RFID readers.
Therefore, a battery does notrestrict their lifetime. They offer a number of
advantages such as smaller dimension, lower cost, andlonger living cycle.
The feature associated with unlimited lifetime can be used in applications
wherenone batteries nor wired cable connections are feasible because of the
relatives cost, weight,or due to other reasons. The main limitation from the
Document Page
passive sensor tags is theyhave to be close to an RFID reader to function
properly.The passive sensor-tag with integrated temperature and photo
sensors which you can usefor environmental monitoring has been proposed
by Cho ou al. The particular proposed sensor tagis run by an external ISM
music group RF signal and it feelings ambient temperatureand gentle. Zhou
et al. have suggested a passive UHF RFID tag RF front end along
withmagnetic sensor. Their program includes a 900 MHz RFID front-end
circuit and Amirrebasedmagnetic sensor in regular CMOS process. Among
the main advantages, one canstage its high sensitivity and it is low-power
consumption.
The design of the Wireless Identification and Realizing Platform (WISP) was
suggestedby Sample eating. [66]. WISP is really a battery-free RFID sensor
gadget and as all the passiveRFID tags, is powered with the RF energy
transmitted simply by an RFID reader. WISP isimplemented as a Published
Circuit Board (PCB) as well as range is approximately four. 5 m.WISP could
be the first micro controller built-in as part of a passive UHF RFID tag.An
integrated unaggressive sensor-tag (ICT Tag Sensor) was proposed by
Instrumental. In this passive sensor-tag, power is provided by inductive
coupling, enabling thelabel to operate without batteries. Therefore, the
sensor-tag is ideal for programs wherethe weight and the dimension of a
battery would hinder the sensing capabilities. These types ofpassive sensor-
tags can be customized to support multiple sensors and also to interface
withmany conversation protocols. The onboard microcontroller, the onboard
differentialamp and its multiple sensor features are included among their
particular most importantfeatures. These unaggressive sensor-tags operate
at thirteen. 56 MHz
Microchip within cooperation with Digital Angel have designed and created
anunaggressive implantable sensor-tag which can be utilized to determine
glucose levels in thephysiques of animals and people, without the need for
diabetics in order to draw blood glucoselevels. The particular RFID sensor-tag
is unaggressive, powered by the scanner transmission, avoiding the needfor
a battery pack on the sensor-tag. Many dimension sensors require an
accurate reference pointvoltage; to achieve that, the utilized glucose sensor
has a particular circuit architecture,which supplies precise and stable
dimensions of physiological parameters, enablingfor accurate measurement
associated with glucose concentration. Within October the patent had been
granted06\ and is titled “Embedded Bio-Sensor System”.
The passive sensor-tag that can be used to measure the body temperature
of pets wasfurthermore developed by Digital Angel. The passive sensor-tag
called Bio-thermo is syringeimplantable in a glass-tube form, functions at
134. 2 kHz carrier frequency and comes after theISO 11785 regular. It

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
enables the non-invasive monitoring associated with temperatures in petsin
fact it is able to detect infections plus diseases at an early phase. However,
in Bio-thermothere is absolutely no available memory space to shop memory
data.
Considerations intended for maintenance
Device Life Routine - FDA recommends which you continue to manage the
risks linked to the use of wireless technology referred to above for the entire
life routine of your device. Your own procedures for implementing further
and preventive action should include, and a lot more, analyses for possible
developments in non-conformance information plus complaints, such as
reports associated with failures, that could include erratic or unforeseen
behavior of the medical gadget. 9 Types of such behavior include
reprogramming of stimulation devices, instructions misinterpreted or missed
simply by operating room controllers, unexplained inconsistencies of an
infusion pump, and failure in order to activate alarm signals within alarm
conditions.
Labeling associated with wireless medical devices
In order to facilitate the effective and safe technique wireless medical
device, the proposed labeling ought to include risk mitigation measures that
will address RF wireless problems and any precautions customers should
take. You should be aware that even though labeling statements, such as
alerts, may be helpful, they are not risk mitigation measures or even other
design control actions, and therefore are typically not adequate to avoid
adverse events.
PROBLEM STATEMENT
The objective of this work is to accurately measure the PRR-SINR
interference model with the minimum overhead. In this section, we first
discuss the characteristics of PRR-SINR model. We then motivate this work
using empirical results on TelosB motes.
A. Understanding the PRR-SINR model
According to communication theory, the bit error rate (BER), i.e., the
probability that a transceiver 𝑟 successfully receives an incoming bit ,
denoted by 𝑝𝑟(𝜏 ), is governed by the following model:
𝑝(𝜏 ) = 𝑃 𝑟𝑜𝑏 [signal power of 𝜏𝐼𝑟 + 𝑛𝑟> 𝛽𝑟]
Document Page
where 𝐼𝑟 is the interference experienced at 𝑟, which is equal to the power of
other nodes’ transmissions and electromagnetic signals from the
environment. 𝑛𝑟 is a random variable that equals the power of ambient
noise. 𝛽𝑟 is a constant determined by the modulation scheme and the
transceiver sensitivity. Unfortunately, the above BER-SINR model cannot be
directly measured on commodity radio transceivers.
As a result, most recent empirical studies have adopted a measurement-
based packet-level interference model that correlates packet reception ratio
with SINR and is also referred to as the PRR-SINR model. In the PRR-SINR
model, the probability that a transceiver 𝑟 successfully receives an incoming
packet 𝜔 is given by:
𝑝𝑟(𝜔) = 𝑓( 𝑅𝑆𝑆(𝜔) /𝑅𝑆𝑆(𝐼𝑟) + 𝑛𝑟)
where 𝐼𝑟 is the interference experienced at 𝑟, which is equal to the power of
other nodes’ transmissions and electromagnetic signals from the
environment. 𝑛𝑟 is a random variable that equals the power of ambient
noise. 𝛽𝑟 is a constant determined by the modulation scheme and the
transceiver sensitivity. Unfortunately, the above BER-SINR model cannot be
directly measured on commodity radio transceivers.
As a result, most recent empirical studies have adopted a measurement-
based packet-level interference model that correlates packet reception ratio
with SINR and is also referred to as the PRR-SINR model. In the PRR-SINR
model, the probability that a transceiver 𝑟 successfully receives an incoming
packet 𝜔 is given by:
𝑝𝑟(𝜔) = 𝑓 ( 𝑅𝑆𝑆(𝜔)/𝑅𝑆𝑆(𝐼𝑟) + 𝑛𝑟)
where function 𝑓() can be determined by the measurements of SINR and
PRRs. 𝑛𝑟 is the measured average power of ambient noise. 𝑅𝑆(𝜔) and
𝑅𝑆𝑆(𝐼𝑟) are the signal power of packet 𝜔 and interfering transmissions 𝐼𝑟,
respectively. In contrast to the BER-SINR model, the PRR-SINR model can be
measured on most commodity radio transceivers. In particular, the RSS
values and 𝑛𝑟 in Eq. (2) can be obtained from a radio hardware register
called RSS Indicator (RSSI) that is available on commodity wireless platforms.
And 𝑝(𝜔) can be measured as the link-level packet reception ratio (PRR).
Moreover, the PRR-SINR model is critical for optimizing wireless protocol
performance because it can predict the PRR of a link when it experiences
interference.
Integrating RFID Visitors with Wireless
Sensor Nodes
Document Page
Another possible strategy associated with integrating RFID systems along
with WSNs is by addingRFID readers with nodes. In this integration situation,
the existence of three typesassociated with devices is assumed: the
particular integrated RFID readers/sensor nodes, simple RFID tags,as well as
the sink or base place. This kind of integration was first introduced simply by
Zhanget al.. They called the incorporated RFID reader/sensor node “a smart
node.” The particularintegrated smart nodes can be viewed as sensor nodes
which you can use as RFIDreaders increasing their sensing capabilities.
Sensible nodes are able to relay infoand to be configured since relay nodes
of a WSN. They are able to communicatewith each other simply by creating
an ad hoc conversation network. The integrated RFIDreader/sensor node is
able to function as router and to pass communications to the
rightdestination. To the wise nodes are responsible for collecting information
from simple RFID labelswithin their range and communicate with one another
to relay data towards the sink/base stationexactly where all the data is
gathered and processed by an individual. The structures of this
integratednetwork, highlighted in Figure 18. 3 or more, is similar to the
hierarchical clustering-basedtwo-tiered WSN.
Mix Structures
Within the mix architectureRFID tags plus sensor nodes are bodily distinct
devices but theycoexist in and a built-in network and they work separately.
The main advantage ofthis type of mixed architecture is the recognized fact
that there is no need to design the hardware integrateddevice. Nevertheless,
there is the possibility of communication disturbance between theRFID
tags/readers and sensor nodes because in that full situation they are all
physically distinctdevices. The particular procedures that should be followed
to prevent this interference might causeadditional overhead.
Initially, the particular mix architecture was talked about by Zhang ET 's.
According to Zhanget al. an integrated RFID-sensor system that follows the
combine architecture consistsof 3 types of devices: the smart channels, the
normal RFID tags, as well as the normalsensor nodes. A smart place is a
special device that is composed of anRFID audience, a microprocessor, and a
system interface. Smart stations tend not to presentstrength constraints and
they are able to combination information from RFID and tagsnodes and also
to transmit them to a local sponsor or to a remote LAN.
Details from RFID sensor plus tags nodes can be carried to the basestation.
Because smart channels do not face power restrictions, the traditional
Internetprocess architecture can also be deployed. Therefore, smart stations
are able to execute notjust data processing but also redirecting protocols
and transport methods such as TCP.A conversation protocol that can be used
in such a heterogeneous environment is the802. 11/Wi-Fi technology.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Frequency Selection
The narrowband filter with top quality factor is required for the correct
functionality of this receiver. The particular filter must select the particular
desired 3G CDMA stations, while rejecting all other stations in the 1900MHz
PCS music group in order to prevent saturation from the receiver front-end.
Based on lab measurements for our area, the required 3G CDMA channels
make-up an entire FCC-defined block associated with spectrum in the PCS
music group. Thus, the particular filter can be wideband plus realizable
relatively.
Other Programs
Aside from applications in the field of healthcare and provide chain
management, numerousvarious other real-world scenarios of included WSNs
and RFID can be found. With this section we existing application scenarios in
varied areas of science and executive including firerecognition, monitoring
shipping containers, the health of weapons in battlefields becausewell as
managing cows. In most full cases integrated RFID and WSNs facilitate
treatmentsand provide efficiency. Nevertheless, in every cases different
technical difficulties existed thathad to be overcome to obtain smooth
operation of the incorporated system.
An application of incorporated RFID and sensor systems to notify firefighters
in case of a fire’s ignition, was introduced with a wireless communication
company withinMelbourne, called Telepath. The particular proposed scheme
is based on the particular integration of RFIDpotato chips that operate at 433
MHz and use an amazing air interface protocol plus wirelessthermal sensors.
In the event that a thermal sensor feelings temperatures within 2◦ of the
predeterminedsetting, it transmits it’s unique ID amount to an interrogator.
The next step is the particular cross checkof the tag’s ID number and a
notice is sent to a man or woman cell phone. Thus, themedical personnel are
notified very quickly plus they are able to respond to a fire event fasterand
more efficiently. This method can be extended for notifying people not only
in furthermoresituation of fires but in situation of other emergencies or even
equipment failures also.
A similar approach that may be applied for early fire detections was
proposed byscientists at the University of CA in Berkeley. This approach is
based onthe development of the GPS-enabled wireless sensor, known as
Firebug, which collects real-timedata from sensors regarding approaching
fires and transfers these data via a good RF tagwhich includes a Chipcon
mote. Thus, medical personnel have access to information related tothe
velocity and the intensity of an attack and they are able to respond
appropriately.
Document Page
Some other applications of integrated RFID-sensor networks is the
development of a goodRFID-based memory assistant, which is able to inform
a person when leaving the particularhouse without carrying all of the
necessary items. All the important items are tagged, whilsta pressure sensor
picks up her presence at the house’s front door and activates a good
RFIDreader if something happens to be missing. One more project included
the use of temp sensor tagsattached within a cow’s stomach to predict the
child birth. The device is based onmeasuring the particular cow’s body
temperature and the indicator of an abrupt decent in the cow’sbody
temperature 24 hours just before its calf birth.The sensor-tags are sprinkled
from helicopters and importantinformation will be collected from the disaster
region including the possible existence associated with humandisaster
victims.
Conclusion
As current computing styles continue, wireless sensor systems are widely
perceived as the following major step in the decades-long trend toward
smaller a lot more pervasive devices. Volume restrictions on these new
systems for most applications results in significant power constraints that
must be resolved to be able to improve node lifetimes. Regrettably, energy
sources, such as the electric battery and solar cell, have already been slow
to improve. Like a total result, power must be conserved in the node by
reducing the ability consumption of the circuit elements. While significant
progress has been conducted in processors, timers, plus memories, Wi-Fi
synchronization and communication stay the highest energy tasks in the
wireless sensor node. Therefore, this particular thesis has investigated a
brand new method of synchronizing a network using existing background
wireless signals and suggested a new communication protocol which usually
enables duty-cycled operation of the communication radio in order to save
energy.
Many of today’s normal wireless signals are pervasive, making them a good
potential resource for synchronizing a wireless network. The advantage of
this approach would be that the synchronization signal is created outside the
network, saving power. A survey was performed on many common Wi-Fi
standards to determine their stability as a clock source. Mainly because we
would like to extract the original source using a low-power receiver, an
excellent clock source is high-power, pervasive, periodic, and easy in order
to demodulate.
References
[1] G. Bell, “Bell’s Law for the Birth and Death of Computer Classes,”
Commun. ACM, vol. 51, no. 1, pp 86-94, Jan. 2008.
Document Page
[2] T. Nakagawa et al., “1-cc Computer: Cross-Layer Integration with UWB-IR
Communication and Locationing,” IEEE J. Solid-State Circuits, vol. 43, no. 4,
pp. 964-973, Apr. 2008.
[3] I.F. Akyildiz et al., “A Survey of Sensor Networks,” IEEE Commun. Mag.,
pp. 102-114, Aug. 2002.
[4] K. Romer and F. Mattern, “The Design Space of Wireless Sensor
Networks,” IEEE Wireless Commun., vol. 11, no. 6, pp. 54-61, Dec. 2004.
[5] D. Puccinelli and M. Haenggi, “Wireless Sensor Networks: Applications
and Challenges of Ubiquitous Sensing,” IEEE Circuits Syst. Mag., vol. 5, no. 3,
pp. 19-31, 2005.
[6] J. Yick, B. Mukherjee, and D. Ghosal, “Wireless Sensor Networks Survey,”
J. Comput. Networks, vol. 52, no. 12, pp. 2292-2330, Apr. 2008.
[7] P. Corke et al., “Environmental Wireless Sensor Networks,” in Proc. IEEE,
vol. 98, no. 11, pp. 1903-1917, Nov. 2010.
[8] B.H. Calhoun et al., “Body Sensor Networks: A Holistic Approach from
Silicon to Users,” in Proc. IEEE, vol. 100, no. 1, pp. 91-106, Jan. 2012.
[9] M. Meribout, “A Wireless Sensor Network-Based Infrastructure for Real-
Time and Online Pipeline Inspection,” IEEE Sensors J., vol. 11, no. 11, pp.
2966-2972, Nov. 2011.
[10] B. Carkhuff and R. Cain, “Corrosion Sensors for Concrete Bridges,” IEEE
Instr. Meas. Mag., vol. 6, no. 2, Jun. 2003.
[11] R.A. Swartz and J.P. Lynch, “Strategic Network Utilization in a Wireless
Structural Control System for Seismically Excited Structures,” J. of Structural
Engineering, pp. 597-608, May 2009.
[12] M. Flatscher et al., “A Bulk Acoustic Wave (BAW) Based Transceiver for
an In-Tire-Pressure Monitoring Sensor Node,” IEEE J. Solid-State Circuits, vol.
45, no. 1, pp. 167-177, Jan. 2010.
1 out of 25
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]