Using Raspberry Pi for Measuring Pedestrian Visiting Patterns via WiFi-Signals in Uncontrolled Field Studies

Size: px
Start display at page:

Download "Using Raspberry Pi for Measuring Pedestrian Visiting Patterns via WiFi-Signals in Uncontrolled Field Studies"

Transcription

1 Using Raspberry Pi for Measuring Pedestrian Visiting Patterns via WiFi-Signals in Uncontrolled Field Studies Peter M. Kielar, Pavel Hrabák, Marek Bukáček, and André Borrmann Abstract Research on pedestrian behavior requires empirical field studies. A number of methods for data acquisition are available. However, a low-budget approach that can be applied to measure pedestrian destination choice in large-scale uncontrolled field studies is still missing. The measurement of destination choice patterns is important for validating strategic models, which describe in which order pedestrians visit locations to perform activities. We propose a Raspberry Pi setup for WiFi-based tracking of pedestrians by their handhelds in an anonymized manner. The method is useful for recording the microscopic and macroscopic crowd dynamics of large-scale uncontrolled field studies, e.g. public events. Furthermore, we provide a concept for strategic model validation that is based on the measurements. 1 Introduction In pedestrian dynamics research, empirical data is used to validate computational models of pedestrian behavior. Validation is a process that evaluates if a computational model can forecast or simulate specific features of the real world with certain accuracy. Models that describe strategic pedestrian behavior [11] are used for simulating destination choices of pedestrians in complex environments (e.g. transport hubs or Peter M. Kielar Technische Universität München, Arcisstr. 21, D Munich peter.kielar@tum.de Pavel Hrabák Czech Technical University, Thákurova 9, Prague 6 pavel.hrabak@fit.cvut.cz Marek Bukáček Czech Technical University, Břehová 7, Prague 1 marek.bukacek@fjfi.cvut.cz André Borrmann Technische Universität München, Arcisstr. 21, D Munich andre.borrmann@tum.de 1

2 2 Peter M. Kielar, Pavel Hrabák, Marek Bukáček, and André Borrmann public events). Hence, strategic models describe how pedestrians repetitively find destinations to visit. The resulting visiting patterns are the spatial choice sequences in which people perform activities [9]. In order to validate models that simulate the strategic decision making in complex environments, data of a large spatiotemporal coverage is mandatory. The method of choice to acquire raw data for strategic model validation purposes is to measure the WiFi-signatures of the mobile devices of pedestrians in large-scale studies [4, 6]. The analysis of the signatures provides the localization and unique identification of individuals. Furthermore, the method can measure the duration the devices stayed at a location. In contemporary research, WiFi-signature are measured by exploiting the local network infrastructure [6] or utilizing commercial devices [4]. Unfortunately, applying such methods in uncontrolled field studies is seldom possible. Many environments do not provide a network infrastructure (e.g. open air festivals) or the existing infrastructures may not be accessed due to security reasons. Furthermore, the application of commercial WiFi-measuring devices in large-scale field studies can generate high costs. To overcome these issues, we provide a solution for WiFi-signature measuring based on Raspberry Pi computers. The approach enables researchers to set up a low-budget measuring infrastructure in large-scale uncontrolled field studies to capture WiFi-signature of people that have mobile devices with active WiFi. The WiFi-signatures enable to analyze the pedestrian visiting patterns for validating strategical models of pedestrian dynamics. 2 Related work Modeling pedestrian behavior is typically approached in a behavior concept comprising a strategic, a tactical, and an operational behavioral layer [11]. Each layers can comprise different models that describe pedestrian behavior and each model needs to be validated to proof its practical applicability amd validity. Operational behavior models address the movement of pedestrians. The validation criteria of operational models are typically based on the fundamental diagram [3] and observable crowd-behavior phenomena [10]. Tactical behavior models typically address directed wayfinding behavior [12]. Wayfinding models are validated based on data that captures the route choices of pedestrians from GPS-based studies [2] or laboratory experiments [7]. Strategical behavior describes how pedestrians solve the destination choices problem [9, 11, 13]. This means that a pedestrian repetitively selects a location to visit. After a destination choice, the pedestrian walks to the location and performs the activity at the destination. Typical activities are buying a coffee, waiting for the bus, or enjoying a street performance. However, strategic pedestrian behavior is complex in the sense that multiple personal and environmental factors influence and guide the destination choice process of pedestrians [9, 13]. The process of validating strategic models needs large data sets of visiting patterns. Such data can only be acquired by large-scale uncontrolled field studies, e.g.

3 Using Raspberry Pi for Measuring Pedestrian Visiting Patterns in Field Studies 3 public events. Furthermore, laboratory experiments that use virtual worlds are not suited for strategic data acquisition because the interaction of a large number of pedestrians in a complex environment demands an extremely high number of interacting participants over multiple hours. The challenges in measuring data for strategic model validation purposes is to reach a high-level of data coverage and data accuracy. In contemporary research, the analysis of WiFi-signatures of pedestrians mobile devices is a method to approach this challenge [5, 6]. WiFi-signatures are especially suited for validating strategic models because they can provide information about the localization and identification of individual WiFi-devices over a long time period. A WiFi-signature comprise the unique MAC-address (Media-Access-Control- Address) of the mobile devices and the RSSI (Received Signal Strength Indicator) of the signal [1]. The RSSI is a relative parameter of a signal for which large values indicate a better signal strength. The free-space path loss function [8] can estimate the distance between a WiFi-sender and a receiver by means of the RSSI. Unfortunately, all obstacles introduce damping and decrease the RSSI values. This damping leads to a bad noise to signal ratio, which can distort distance estimations. 3 Methodology In this section, we provide the methodological aspects of setting up a WiFi-signature measuring network for validating strategic models of pedestrian behavior based on Raspberry Pi computers. Figure 1 shows the general approach of the methodology. We explain each aspect of the method in the following subsections. Device Assembly Further Hardware Raspberry Pi Operating System Measuring Software Uncontrolled Field Study Scenario Analysis Setup Devices Conduct Study Remove Devices Scenario Layout Device Obstacles Activity Area Post-Processing Extract Data Filter Data Extract Visiting Patterns Model Validation Fig. 1 This schema shows the core aspects of the paper s approach. Initially, the hardware and software are assembled. The assembly has to be setup for multiple devices. In a field study, the devices are placed at the activity locations of the scenario. Therefore, the scenario has to be analyzed first. After the study, the measured data is post-processed. The validation of a pedestrian behavior simulation with focus on strategic behavior can be done with the processed data.

4 4 Peter M. Kielar, Pavel Hrabák, Marek Bukáček, and André Borrmann Fig. 2 This figure shows hardware in a waterproof box. The setup comprises a power bank, a USB-powerconnector, a WiFi-dongle, a microsd-card, and a Raspberry Pi. 3.1 Device assembly Here, we provide information for the software and hardware assembly of the measuring devices. A goal of this research is to use a set of low-cost hardware devices that read WiFisignals from pedestrians mobile devices in field studies. Typically, all locations of a scenario where pedestrians can perform activities are points of interest and need to be equipped with at least a single measurement device. Furthermore, all measuring devices have to operate power-independent because it is not guaranteed that every point of interest provides a stable power supply. Our solution to the aforementioned requirement is to use a Raspberry Pi hardware, a portable USB-based power bank with mah, and a microsd-card with a Linux operating system. Each device reads WiFi-signals via a low-cost USB- WiFi-dongle that is able to operate in the so-called monitor mode. This mode changes the operative behavior of the dongle to listening. Thus, the dongle will capture all incoming signals. The availability of the monitor mode is hardware and driver dependent. Any USB-WiFi-dongle that supports monitor mode can be used. However, every dongle-type provides different physical WiFi-properties. Finally, most large-scale field studies are conducted in open-air conditions. Therefore, we used waterproof boxes to protect the hardware. Figure 2 shows the hardware setup. The basis of the software is the ArchLinux operation system. Furthermore, we utilize the scapy and the hashlib Python libraries. The scapy library provides code to access received WiFi-signals. Each read signal comprises the RSSI and the MAC address of an incoming signal. We encrypt received MAC addresses by computing a SHA-256 hash before storing data in a file. In large-scale field studies, multiple measuring devices are used. Hence, all devices use the identical private-key for hashing. This provides the identical hash value for the same MAC address. The time at which the signal was received is the device s system time and is also stored in the data file. The used Raspberry Pi computers do not provide an internal real-time clock. Thus, we applied a time-server concept so that the devices reads the current time if connected a setup computer. Another solution is to set the internal time of the devices by the command line. The clock on all used devices needs to be synchronized for good analysis results.

5 Using Raspberry Pi for Measuring Pedestrian Visiting Patterns in Field Studies 5 Fig. 3 The figure shows the layout of the music festival field study based on data from VABEG Event Safety Limited. The positions of the measuring devices are indicated as blue circles. Stationary obstacles are indicated with gray lines and polygons. Visitors can interact with areas (e.g. buy food) which shown in dark pink. Other areas are explicitly named. Restrooms Music Music Entrance Exit Restrooms ckerbach 0m 10m 20m 30m N Music 3.2 Use in uncontrolled field studies The setup of a measuring network in uncontrolled field studies starts with analyzing the scenario. In this process, we used maps, layouts, and general information provided by the organizer and operator of the area of the study. The analysis focuses on identifying locations where pedestrians can perform activities. These are for example shops, restrooms, dedicated entrances, or leisure areas. At least all spatially clearly distinguishable locations should be equipped with measuring devices. We tested the WiFi-measuring method in two open-air case studies: a music festival and a Christmas market. Figure 3 shows the layouts and test positions of the measuring devices for the music festival. Details of the Christmas market study are given in [15]. The power supply enables to run the devices approximately 12 hours. Therefore, we activated all devices and started the measuring procedure via Ethernet connection before mounting the devices at available spaces at the locations. It is recommended to find mounting positions with a minimum of obstacles towards the area where the crowd will perform activities at the destination and with some distance to the ground. We also marked the different locations on a map and via GPS. 3.3 Post-processing The measured WiFi-data comprises the encrypted MAC address, the date and time of measuring, the RSSI, and the number of the Raspberry Pi device, which did the measurement. The post-processing of the data includes following operations: 1. Extract the data of all devices and merge all data files into a single file. 2. Remove duplicate data entries by deleting data entries with a smaller (worse) RSSI value if all other data elements of the signal are identical. 3. Sort the data based on the encrypted MAC address, the date, and the time.

6 Peter M. Kielar, Pavel Hrabák, Marek Bukáček, and André Borrmann 4. Compute the free-space path loss for all RSSI values for the data. This provides the estimated distance for each measurement. 5. Remove all data entries that exceed a maximal estimated distance threshold d. This provides an estimated maximal distance to the measuring devices. 6. Remove all data entries that exceed a minimal estimated distance threshold k and cover a time-span of s. This deletes data of staff members near the devices. 7. Remove all data entries if the number of entries for a single MAC address is smaller than a threshold z. This reduces data from passers-by. 8. Aggregate the data for each device and each encrypted MAC address. Typical study dependent parameters we applied in the field studies are: d 1 = 10m, d 1 = 5m, k = 2m, s = 120min, and z = Strategic model validation The post-processing of the WiFi-measurements provides a data set for each Raspberry Pi device and each encrypted MAC address. Both data sets are sorted regarding the time and date of each signal. Figure 4 provides data samples of the music festival field study. We use this data to describe two validation principles of strategic pedestrian behavior models. Strategic models that are implemented in microscopic pedestrian simulations determine the sequence in which each pedestrian visits locations. Therefore, the microscopic decisions of pedestrians lead to macroscopic properties of the crowd. These properties describe the number of pedestrians at any destination over time. The first validation approach addresses the macroscopic properties of strategic models and uses the device-based data of the WiFi-measurements. If the strategic model predicts the destination choice dynamics of a crowd correctly, the number of pedestrians at destinations over time will correspond to the measured data. We (a) [people] restroom west music south-west restroom south [time in hours] (b) [activity] near music near bar near restroom near entrance near food Fig. 4 The figure provides example data of the music festival study. (a) shows the number of WiFidevices with an estimated maximal distance of 10 m from the measuring devices over time in hours. We applied a discrete 1D-Gaussian filter of size 5 for smoothing. (b) shows the visiting sequence of a pedestrian with an estimated maximal distance of 5 m to the measuring devices. Leisure areas are close to restrooms. Diagonal lines indicate inaccuracies due to missing data. [hours on festival]

7 Using Raspberry Pi for Measuring Pedestrian Visiting Patterns in Field Studies 7 propose a comparison metric for the data that is based on grouping the data into the operational phases of a field study, e.g. rush-hour, music performance, or entry. The method compares the mean number of pedestrian of the study and of the simulation in each phase at each destination. The second validation focuses on the microscopic visiting patterns of simulated pedestrians and uses the encrypted MAC address data. The data provides an estimator for the destination visiting sequences of pedestrians. The validation evaluates if the visiting sequences of individual people of the study and the simulation correspond. The comparisons should use categories of destination, e.g. group shops with the same goods. Thereafter, the procedural conformity of the simulated and measured activity-sequences can be compared. 4 Accuracy discussion The WiFi-method to acquire data of the pedestrian dynamics of a large-scale scenario provides a method to validate strategic models of pedestrian behavior. However, we have to be aware of important inaccuracies in measuring WiFi-signals: The percentage of people p% that have a handheld with active WiFi is unknown. We applied the value p = 81.43% based on the Christmas market field study [15]. The mobile devices check for WiFi-networks in intervals. The duration between two checks is dependent on the devices hardware and the operating system. The estimated distance is computed via the free-space path loss function. In field studies, this function provides a quite inaccurate estimator for the real distance between a mobile device and a measuring device [1]. The research field on WiFilocalization [14] provides improvements for the distance estimations. Each WiFi-receiver and -sender does have different wave propagation and signal strength properties. In order to improve the accuracy of the measurement, the properties of the devices have to be identified accurately. We conducted a laboratory experiment with different mobile devices to evaluate the wave propagation properties of the applied USB-WiFi-dongles and measuring device positioning. 5 Conclusion In this paper, we presented a WiFi-based method to acquire pedestrian visiting patterns in large-scale uncontrolled field studies for strategic model validation. The method is based on Raspberry Pi computers and is a low-cost approach that does not require an WiFi-infrastructure. The measured data is anonymized via encryption and provides the number of pedestrians with an active WiFi-device in proximity to measurement devices and the location visiting sequences of pedestrians. Strategic models describe the destination choices of pedestrians. Hence, these models provide an approach to simulate the pedestrian dynamics of complex large-

8 8 Peter M. Kielar, Pavel Hrabák, Marek Bukáček, and André Borrmann scale environments. We explained a microscopic and a macroscopic validation approach for validating strategic models based on post-processed WiFi-data. The method still needs to be improved regarding the accuracy of the measurements but provides a unique approach for validating strategic models by data of large-scale uncontrolled field studies. Acknowledgements We like to thank Antonin Danalet for discussions. Furthermore, the authors like to thank Daniel H. Biedermann and Micheal Rosteck for conducting the Christmas market field study. This work was partially supported by by the Federal Ministry for Education and Research (BMBF) under the grant FKZ 13N12823, by the Czech Science Foundation under the grant GA S, and by Czech Technical University under the grant SGS15/214/ OHK4/3T/14. References 1. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Std (2016) 2. Biedermann, D.H., Kielar, P.M., Riedl, A.M., Borrmann, A.: Oppilatio+ - A data and cognitive science based approach to analyze pedestrian flows in networks. Collective Dynamics 1(0), 1 30 (2016) 3. Chattaraj, U., Seyfried, A., Chakroborty, P.: Comparison of pedestrian fundamental diagram across cultures. Advances in Complex Systems 12(3), (2009) 4. Daamen, W., Yuan, Y., Duives, D., Hoogendoorn, S.P.: Comparing Three Types of Real-time Data Collection Techniques: Counting Cameras, Wi-Fi Sensors and GPS Trackers. In: Conference on Pedestrian and Evacuation Dynamics, pp (2016) 5. Danalet, A., Farooq, B., Bierlaire, M.: A Bayesian approach to detect pedestrian destinationsequences from WiFi signatures. Transportation Research Part C: Emerging Technologies 44, (2014) 6. Danalet, A., Tinguely, L., de Lapparent, M., Bierlaire, M.: Location choice with longitudinal WiFi data. Journal of Choice Modelling 18, 1 17 (2016) 7. Dijkstra, J., Vries, B.D., Jessurun, J.: Wayfinding search strategies and matching familiarity in the built environment through virtual navigation. Transportation Research Procedia 2, (2014) 8. Friis, H.T.: A note on a simple transmission formula. Proceedings of the IRE 34(5), (1946) 9. Gärling, T.: Human information processing in sequential spatial choice. Wayfinding Behavior: Cognitive Mapping and other Spatial Processes pp (1999) 10. Helbing, D., Buzna, L., Johansson, A., Werner, T.: Self-organized pedestrian crowd dynamics: Experiments, simulations, and design solutions. Transportation Science 39(1), 1 24 (2005) 11. Hoogendoorn, S.P., Bovy, P.H.L.: Pedestrian route-choice and activity scheduling theory and models. Transportation Research Part B: Methodological 38(2), (2004) 12. Kielar, P.M., Borrmann, A.: Coupling Spatial Task Solving Models to Simulate Complex Pedestrian Behavior Patterns. In: Conference on Pedestrian and Evacuation Dynamics (2016) 13. Kielar, P.M., Borrmann, A.: Modeling pedestrians interest in locations: A concept to improve simulations of pedestrian destination choice. Simulation Modelling Practice and Theory 61, (2016) 14. Liu, C., Wu, K., He, T.: Sensor localization with ring overlapping based on comparison of received signal strength indicator. In: Mobile Ad-hoc and Sensor Systems, 2004 IEEE International Conference on, pp IEEE (2004) 15. Rostek, M.: Evaluierung von messgeräten zur detektion von fußgängerströmen. Bachelor s thesis

A Unified Pedestrian Routing Model Combining Multiple Graph-Based Navigation Methods

A Unified Pedestrian Routing Model Combining Multiple Graph-Based Navigation Methods A Unified Pedestrian Routing Model Combining Multiple Graph-Based Navigation Methods Peter M. Kielar, Daniel H. Biedermann, Angelika Kneidl, André Borrmann Abstract The navigation behavior of pedestrians

More information

A Framework for A Graph- and Queuing System-Based Pedestrian Simulation

A Framework for A Graph- and Queuing System-Based Pedestrian Simulation A Framework for A Graph- and Queuing System-Based Pedestrian Simulation Srihari Narasimhan IPVS Universität Stuttgart Stuttgart, Germany Hans-Joachim Bungartz Institut für Informatik Technische Universität

More information

Construction site pedestrian simulation with moving obstacles

Construction site pedestrian simulation with moving obstacles Construction site pedestrian simulation with moving obstacles Giovanni Filomeno 1, Ingrid I. Romero 1, Ricardo L. Vásquez 1, Daniel H. Biedermann 1, Maximilian Bügler 1 1 Lehrstuhl für Computergestützte

More information

Reliable Routing In VANET Using Cross Layer Approach

Reliable Routing In VANET Using Cross Layer Approach Reliable Routing In VANET Using Cross Layer Approach 1 Mr. Bhagirath Patel, 2 Ms. Khushbu Shah 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 er.bhagirath@gmail.com,

More information

How Do Pedestrians find their Way? Results of an experimental study with students compared to simulation results

How Do Pedestrians find their Way? Results of an experimental study with students compared to simulation results How Do Pedestrians find their Way? Results of an experimental study with students compared to simulation results Angelika Kneidl Computational Modeling and Simulation Group, Technische Universität München,

More information

Modular Rapid Monitoring System

Modular Rapid Monitoring System Modular Rapid Monitoring System Timothy Kritzler and Joseph Mintun Sponsor: Martin Engineering, Illinois Advisors: Dr. Malinowski and Dr. Ahn Bradley University Electrical and Computer Engineering October

More information

ABOUT SWISSTRAFFIC TABLE OF CONTENTS

ABOUT SWISSTRAFFIC TABLE OF CONTENTS Document Date: February 2017 Document Version: 2.3 SWISSTRAFFIC 2017 ABOUT SWISSTRAFFIC SWISSTRAFFIC is a planning and consulting firm operating internationally in the fields of mobility, road safety and

More information

TRAFFIC DATA FUSION OF VEHICLE DATA TO DETECT SPATIOTEMPORAL CONGESTED PATTERNS

TRAFFIC DATA FUSION OF VEHICLE DATA TO DETECT SPATIOTEMPORAL CONGESTED PATTERNS 19th ITS World Congress, Vienna, Austria, 22/26 October 2012 EU-00014 TRAFFIC DATA FUSION OF VEHICLE DATA TO DETECT SPATIOTEMPORAL CONGESTED PATTERNS H. Rehborn*, M. Koller#, B. S. Kerner* *Daimler AG,

More information

AN AGENT-BASED APPROACH TO THE SIMULATION OF PEDESTRIAN MOVEMENT AND FACTORS THAT CONTROL IT

AN AGENT-BASED APPROACH TO THE SIMULATION OF PEDESTRIAN MOVEMENT AND FACTORS THAT CONTROL IT AN AGENT-BASED APPROACH TO THE SIMULATION OF PEDESTRIAN MOVEMENT AND FACTORS THAT CONTROL IT 1. Why another model? Planned as part of a modular model able to simulate rent rate / land value / land use

More information

WhatsUp Gold Wireless v16.4

WhatsUp Gold Wireless v16.4 WhatsUp Gold Wireless v16.4 Contents Welcome to WhatsUp Gold Wireless Wireless Overview... 1 Wireless accessibility... 3 Using WhatsUp Gold Wireless Discovering wireless devices... 4 Modifying wireless

More information

Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services

Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services Jina Han Department of Information and Computer Engineering Ajou University Suwon, South Korea hangn0808@ajou.ac.kr

More information

CH : 15 LOCAL AREA NETWORK OVERVIEW

CH : 15 LOCAL AREA NETWORK OVERVIEW CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

A Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data

A Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data A Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data Wei Yang 1, Tinghua Ai 1, Wei Lu 1, Tong Zhang 2 1 School of Resource and Environment Sciences,

More information

WhatsUp Gold v16.0 Wireless User Guide

WhatsUp Gold v16.0 Wireless User Guide WhatsUp Gold v16.0 Wireless User Guide Contents Welcome to WhatsUp Gold Wireless Wireless Overview... 1 Wireless licensing and accessibility... 3 Using WhatsUp Gold Wireless Discovering wireless devices...

More information

Building Augmented You-are-here Maps through Collaborative Annotations for the Visually Impaired

Building Augmented You-are-here Maps through Collaborative Annotations for the Visually Impaired Building Augmented You-are-here Maps through Collaborative Annotations for the Visually Impaired Limin Zeng, Gerhard Weber Technische Universität Dresden Institut für Angewandte Informatik {limin.zeng,gerhard.weber}@tu-dresden.de

More information

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Link Estimation and Tree Routing

Link Estimation and Tree Routing Network Embedded Systems Sensor Networks Link Estimation and Tree Routing 1 Marcus Chang, mchang@cs.jhu.edu Slides: Andreas Terzis Outline Link quality estimation Examples of link metrics Four-Bit Wireless

More information

Cisco Connected Mobile Experiences (CMX) Hyperlocation Quick Start Guide

Cisco Connected Mobile Experiences (CMX) Hyperlocation Quick Start Guide Cisco Connected Mobile Experiences (CMX) Hyperlocation Quick Start Guide This document details the procedure involved in using the Hyperlocation add-ons to the Cisco 3600 and Cisco 3700 Access Points to

More information

ISSN (PRINT): , (ONLINE): , VOLUME-6, ISSUE-1,

ISSN (PRINT): , (ONLINE): , VOLUME-6, ISSUE-1, DESIGN OF MULTIMODE GATEWAY FOR DATA ACQUISITION TO HIGH END DATA MONITORING USING IEEE802.15.4 Madhhav G.Raut 1 & Pradip B.Dahikar 2 Hislop College,Civil Lines, Nagpur & Kamala Nehru Mahavidyalaya,Nagpur,India

More information

Model-based Real-Time Estimation of Building Occupancy During Emergency Egress

Model-based Real-Time Estimation of Building Occupancy During Emergency Egress Model-based Real-Time Estimation of Building Occupancy During Emergency Egress Robert Tomastik 1, Satish Narayanan 2, Andrzej Banaszuk 3, and Sean Meyn 4 1 Pratt & Whitney 400 Main St., East Hartford,

More information

Connected Mobile Experiences (CMX) Aligning Use Cases and Technology

Connected Mobile Experiences (CMX) Aligning Use Cases and Technology Connected Mobile Experiences (CMX) Aligning Use Cases and Technology Jagdish Girimaji, Manager, Product Marketing Daryl Coon, Product Manager, Product and Solutions Marketing PSOEWN-3246 Agenda Introduction

More information

Running Reports. Choosing a Report CHAPTER

Running Reports. Choosing a Report CHAPTER 13 CHAPTER WCS reporting is necessary to monitor the system and network health as well as troubleshoot problems. A number of reports can be generated to run on an immediate and scheduled basis. Each report

More information

ITS (Intelligent Transportation Systems) Solutions

ITS (Intelligent Transportation Systems) Solutions Special Issue Advanced Technologies and Solutions toward Ubiquitous Network Society ITS (Intelligent Transportation Systems) Solutions By Makoto MAEKAWA* Worldwide ITS goals for safety and environment

More information

Mobile Millennium Using Smartphones as Traffic Sensors

Mobile Millennium Using Smartphones as Traffic Sensors Mobile Millennium Using Smartphones as Traffic Sensors Dan Work and Alex Bayen Systems Engineering, Civil and Environmental Engineering, UC Berkeley Intelligent Infrastructure, Center for Information Technology

More information

Distributed Sequential Access MAC Protocol for Single-Hop Wireless Networks

Distributed Sequential Access MAC Protocol for Single-Hop Wireless Networks Wireless Pers Commun DOI 10.1007/s11277-013-1142-8 Distributed Sequential Access MAC Protocol for Single-Hop Wireless Networks Ki-seok Lee Cheeha Kim Springer Science+Business Media New York 2013 Abstract

More information

Public Sensing Using Your Mobile Phone for Crowd Sourcing

Public Sensing Using Your Mobile Phone for Crowd Sourcing Institute of Parallel and Distributed Systems () Universitätsstraße 38 D-70569 Stuttgart Public Sensing Using Your Mobile Phone for Crowd Sourcing 55th Photogrammetric Week September 10, 2015 Stuttgart,

More information

INTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com

INTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com INTRODUCTION DATA COMMUNICATION Satish Chandra satish0402.weebly.com The term telecommunication means communication at a distance. The word data refers to information presented in whatever form is agreed

More information

SCIENCE & TECHNOLOGY

SCIENCE & TECHNOLOGY Pertanika J. Sci. & Technol. 25 (S): 137-146 (2017) SCIENCE & TECHNOLOGY Journal homepage: http://www.pertanika.upm.edu.my/ The Development of Personal Portable Wireless Range Extender for IEEE 802.11

More information

ENSC 427, Spring 2012

ENSC 427, Spring 2012 ENSC 427, Spring 2012 Outline A Study of VANET Networks Introduction DSRC channel allocation Standards : IEEE 802.11p + IEEE 1604 PHY LAYER MAC LAYER Communication Walkthrough Ns-3, Node Mobility, SUMO

More information

Video and Voice Backup over Mobile WiMAX

Video and Voice Backup over Mobile WiMAX Spring 2012 ENSC 427: COMMUNICATION NETWORKS Video and Voice Backup over Mobile WiMAX Group 6 Jae Sung Park Sujin Tom Lee 301083039 301054284 jsp6@sfu.ca stl9@sfu.ca www.sfu.ca/~jsp6 1 Abstract Most of

More information

CMX Analytics Documentation

CMX Analytics Documentation CMX Analytics Documentation Version 10.3.1 CMX Analytics Definitions Detected Signals Signals sent from devices to WIFI Access Points (AP) are the basis of CMX Analytics. There are two types of signals

More information

Part I: Introduction to Wireless Sensor Networks. Xenofon Fafoutis

Part I: Introduction to Wireless Sensor Networks. Xenofon Fafoutis Part I: Introduction to Wireless Sensor Networks Xenofon Fafoutis Sensors 2 DTU Informatics, Technical University of Denmark Wireless Sensor Networks Sink Sensor Sensed Area 3 DTU Informatics,

More information

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

Publishing CitiSense Data: Privacy Concerns and Remedies

Publishing CitiSense Data: Privacy Concerns and Remedies Publishing CitiSense Data: Privacy Concerns and Remedies Kapil Gupta Advisor : Prof. Bill Griswold 1 Location Based Services Great utility of location based services data traffic control, mobility management,

More information

Chapter Topics. The History of the Internet. Chapter 7: Computer Networks, the Internet, and the World Wide Web

Chapter Topics. The History of the Internet. Chapter 7: Computer Networks, the Internet, and the World Wide Web Chapter Topics Chapter 7: Computer Networks, the Internet, and the World Wide Web CS10051: Intro. to Computer Science Kent State University History of the Internet History of the World Wide Web Internet

More information

Research on Approach of Equipment Status and Operation Information Acquisition Based on Equipment Control Bus

Research on Approach of Equipment Status and Operation Information Acquisition Based on Equipment Control Bus Research on Approach of Equipment Status and Operation Information Acquisition Based on Equipment Control Bus Xu Li a, *, Chen Meng, Huixia Jiang, Cheng Wang Army Engineering University, Shijiazhuang 050003,

More information

Performance of Multicast over Unicast in Wi-Fi

Performance of Multicast over Unicast in Wi-Fi Performance of Multicast over Unicast in Wi-Fi Ruben Groot Roessink University of Twente P.O. Box 217, 7500AE Enschede The Netherlands r.grootroessink@student.utwente.nl ABSTRACT This paper describes research

More information

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Geetha.S, Dr.G.Geetharamani Asst.Prof, Department of MCA, BIT Campus Tiruchirappalli, Anna University,

More information

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste Goal and Outline 15-441 15-641 Computer Networking Lecture 3: Packet Switched Networks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15 441 F16 Goal: gain a basic understanding of how you can build a

More information

UJIINDOORLOC - A NEW MULTI-BUILDING AND MULTI- FLOOR DATABASE FOR WLAN FINGERPRINT-BASED INDOOR LOCALIZATION PROBLEMS

UJIINDOORLOC - A NEW MULTI-BUILDING AND MULTI- FLOOR DATABASE FOR WLAN FINGERPRINT-BASED INDOOR LOCALIZATION PROBLEMS UJIINDOORLOC - A NEW MULTI-BUILDING AND MULTI- FLOOR DATABASE FOR WLAN FINGERPRINT-BASED INDOOR LOCALIZATION PROBLEMS Carried out by Joaquín Torres-Sospedra et al. at 2 Spanish universities. Largest &

More information

Energy Aware Dynamic Data Driven Distributed Traffic Simulations

Energy Aware Dynamic Data Driven Distributed Traffic Simulations Energy Aware Dynamic Data Driven Distributed Traffic Simulations Michael Hunter, Bhargava Chilukuri, Randall Guensler, Haobing Liu, Michael Rodgers School of Civil & Environmental Engineering Richard Fujimoto,

More information

Smart City Signage Powered by BoldVu

Smart City Signage Powered by BoldVu Smart City Signage Powered by BoldVu Smart City Initiatives Improve Attract Optimize Traffic management, public safety, waste management, parking, connectivity & mobility Business investment, education,

More information

An Solution of Network Service Oriented Operator Network Intrusion Prevention

An Solution of Network Service Oriented Operator Network Intrusion Prevention International Symposium on Computers & Informatics (ISCI 2015) An Solution of Network Service Oriented Operator Network Intrusion Prevention Jie Li, Yang Li DIGITAL CHINA(CHINA)LIMITED, Beijing, China

More information

Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 5. Medium Access Control CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

The INtelligent Airport (TINA)

The INtelligent Airport (TINA) (TINA) A Self-Organising, Wired/Wireless Converged Machine Ian White and Richard Penty, Cambridge University Engineering Department Jon Crowcroft, Cambridge University Computer Laboratory Jaafar Elmirghani,

More information

Pervasive Computing. OpenLab Jan 14 04pm L Institute of Networked and Embedded Systems

Pervasive Computing. OpenLab Jan 14 04pm L Institute of Networked and Embedded Systems Pervasive Computing Institute of Networked and Embedded Systems OpenLab 2010 Jan 14 04pm L4.1.01 MISSION STATEMENT Founded in 2007, the Pervasive Computing Group at Klagenfurt University is part of the

More information

Quick Start Guide. System Release 1.0. Upgrade Notice Install Connectorized Radio Install Integrated Radio Power On Configure Units for Radio Link

Quick Start Guide. System Release 1.0. Upgrade Notice Install Connectorized Radio Install Integrated Radio Power On Configure Units for Radio Link Quick Start Guide System Release 1.0 Upgrade Notice Install Connectorized Radio Install Integrated Radio Power On Configure Units for Radio Link SPECIAL SOFTWARE UPGRADE NOTICE Important! All users of

More information

cs/ee 143 Fall

cs/ee 143 Fall cs/ee 143 Fall 2018 5 2 Ethernet 2.1 W&P, P3.2 3 Points. Consider the Slotted ALOHA MAC protocol. There are N nodes sharing a medium, and time is divided into slots. Each packet takes up a single slot.

More information

Construction Progress Management and Interior Work Analysis Using Kinect 3D Image Sensors

Construction Progress Management and Interior Work Analysis Using Kinect 3D Image Sensors 33 rd International Symposium on Automation and Robotics in Construction (ISARC 2016) Construction Progress Management and Interior Work Analysis Using Kinect 3D Image Sensors Kosei Ishida 1 1 School of

More information

Optimized Wireless LAN Plan An AirTight Service. For

Optimized Wireless LAN Plan An AirTight Service. For Optimized Wireless LAN Plan An AirTight Service For Sample Customer The Global Leader in Wireless Vulnerability Management AirTight Networks 339 N. Bernardo Avenue #200 Mountain View, CA 94043 www.airtightnetworks.com

More information

Double-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs

Double-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs Double-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs Presented by: Hao Liang Broadband Communications Research (BBCR) Lab 2012.7.6 Outline Introduction and Related Work

More information

Elchin Mammadov. Overview of Communication Systems

Elchin Mammadov. Overview of Communication Systems Overview of Communication Systems About Me Studying towards the Masters of Applied Science in Electrical and Computer Engineering. My research area is about implementing a communication framework (software

More information

Multi-Camera Calibration, Object Tracking and Query Generation

Multi-Camera Calibration, Object Tracking and Query Generation MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Multi-Camera Calibration, Object Tracking and Query Generation Porikli, F.; Divakaran, A. TR2003-100 August 2003 Abstract An automatic object

More information

CONCLUSIONS AND SCOPE FOR FUTURE WORK

CONCLUSIONS AND SCOPE FOR FUTURE WORK Introduction CONCLUSIONS AND SCOPE FOR FUTURE WORK 7.1 Conclusions... 154 7.2 Scope for Future Work... 157 7 1 Chapter 7 150 Department of Computer Science Conclusion and scope for future work In this

More information

A hybrid multi-scale approach for simulation of pedestrian dynamics

A hybrid multi-scale approach for simulation of pedestrian dynamics A hybrid multi-scale approach for simulation of pedestrian dynamics A. Kneidl a, D. Hartmann b, A. Borrmann c a kneidl@tum.de, Technische Universität München, 80290 München, Germany b hartmann.dirk@siemens.com,

More information

HOW TO USE TECHNOLOGY TO UNDERSTAND HUMAN MOBILITY IN CITIES? Stefan Seer Mobility Department Dynamic Transportation Systems

HOW TO USE TECHNOLOGY TO UNDERSTAND HUMAN MOBILITY IN CITIES? Stefan Seer Mobility Department Dynamic Transportation Systems HOW TO USE TECHNOLOGY TO UNDERSTAND HUMAN MOBILITY IN CITIES? Stefan Seer Mobility Department Dynamic Transportation Systems Sustainable transport planning requires a deep understanding on human mobility

More information

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

Objectives. Learn how computers are connected. Become familiar with different types of transmission media Objectives Learn how computers are connected Become familiar with different types of transmission media Learn the differences between guided and unguided media Learn how protocols enable networking 2 Objectives

More information

Selection of controllers and integrated systems

Selection of controllers and integrated systems maxon motor: Selection of controllers and integrated systems 2017 maxon motor ag maxon_control-system-selection, WJ, Animated Version V2.31 Criteria to find the base drive controller family Base criteria

More information

Walking is Good for the Health of Your Wi-Fi. Jussi Kiviniemi Ekahau

Walking is Good for the Health of Your Wi-Fi. Jussi Kiviniemi Ekahau Walking is Good for the Health of Your Wi-Fi Jussi Kiviniemi Ekahau Agenda What makes a good Wi-Fi network? From Tampa to Miami in 2 hours Site survey methodologies Annotation & documentation About me

More information

COMMON MODULES: Aerospace Electronics, Computer & Mobile Technology, and Microelectronics specialisations and the Minor in Business Management

COMMON MODULES: Aerospace Electronics, Computer & Mobile Technology, and Microelectronics specialisations and the Minor in Business Management COURSE MODULES LEVEL 3.1 & 3.2 6-Month Internship In this module, students will be attached to sponsoring companies for a period of approximately six months. During their internships, students will undertake

More information

Local Area Networks and the Network Protocol Stack

Local Area Networks and the Network Protocol Stack Local Area Networks and the CSC362, Information Security Introduction problems inherent in transmitting packets network topologies network protocol stack Packet Switching Problems packet switching can

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

DESIGN AND IMPLEMENTATION OF THE REMOTE CONTROL OF THE MANIPULATOR

DESIGN AND IMPLEMENTATION OF THE REMOTE CONTROL OF THE MANIPULATOR ACTA UNIVERSITATIS AGRICULTURAE ET SILVICULTURAE MENDELIANAE BRUNENSIS Volume 62 158 Number 6, 2014 http://dx.doi.org/10.11118/actaun201462061521 DESIGN AND IMPLEMENTATION OF THE REMOTE CONTROL OF THE

More information

!"# $ I. Introduction

!# $ I. Introduction !"# $ LAGRIT (Laboratoire de gestion des réseaux informatiques et de télécommunications) * LACIME (Laboratoire de communications et d'intégration de la microélectronique) Department of Electrical Engineering,

More information

Christian Brothers High School, Lewisham. Year 12 Information Processes & Technology. Assessment Task 3: Communications Systems.

Christian Brothers High School, Lewisham. Year 12 Information Processes & Technology. Assessment Task 3: Communications Systems. Name: Teacher: Christian Brothers High School, Lewisham Year 12 Information Processes & Technology Assessment Task 3: Communications Systems June 2001 Outcomes Assessed: H1.1, H1.2, H2.1, H3.1, H5.2. Weighting:

More information

Introduction. 1.1 Industrial Wireless Communication Products P1-1-1

Introduction. 1.1 Industrial Wireless Communication Products P1-1-1 Introduction. Industrial Wireless Communication Products P-- WLAN Products - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - DSSS RF Products - - - - - - - - - - - - - - - - - - - - - - - -

More information

2. Network functions are associated with only one layer of the OSI model. 4. Not all Transport layer protocols are concerned with reliability.

2. Network functions are associated with only one layer of the OSI model. 4. Not all Transport layer protocols are concerned with reliability. Chapter 2: Network Standards and the OSI Model TRUE/FALSE 1. Standards assist in network design. T PTS: 1 REF: 39 2. Network functions are associated with only one layer of the OSI model. F PTS: 1 REF:

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Optimized DTN-Routing for Urban Public Transport Systems

Optimized DTN-Routing for Urban Public Transport Systems Optimized DTN-Routing for Urban Public Transport Systems Tobias Pögel Institute of Operating Systems and Computer Networks Technische Universität Braunschweig, Germany poegel@ibr.cs.tu-bs.de Abstract Communication

More information

Outline. Multi-Channel Reliability and Spectrum Usage in Real Homes Empirical Studies for Home-Area Sensor Networks. Smart Grid

Outline. Multi-Channel Reliability and Spectrum Usage in Real Homes Empirical Studies for Home-Area Sensor Networks. Smart Grid Multi-Channel Reliability and Spectrum Usage in Real Homes Empirical Studies for Home-Area Sensor Networks Experimental methodology Empirical study in homes Spectrum study of existing wireless signals

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

Lab 9. Julia Janicki. Introduction

Lab 9. Julia Janicki. Introduction Lab 9 Julia Janicki Introduction My goal for this project is to map a general land cover in the area of Alexandria in Egypt using supervised classification, specifically the Maximum Likelihood and Support

More information

A Raspberry Pi Based System for ECG Monitoring and Visualization

A Raspberry Pi Based System for ECG Monitoring and Visualization A Raspberry Pi Based System for ECG Monitoring and Visualization S. Pisa, E. Pittella, E. Piuzzi, L. Cecchini, M. Tomassi Dept. of Information Engineering, Electronics and Telecommunications Sapienza University

More information

A New Distance Independent Localization Algorithm in Wireless Sensor Network

A New Distance Independent Localization Algorithm in Wireless Sensor Network A New Distance Independent Localization Algorithm in Wireless Sensor Network Siwei Peng 1, Jihui Li 2, Hui Liu 3 1 School of Information Science and Engineering, Yanshan University, Qinhuangdao 2 The Key

More information

On Design of 3D and Multimedia Extension of Information System Using VRML

On Design of 3D and Multimedia Extension of Information System Using VRML On Design of 3D and Multimedia Extension of Information System Using VRML Jiří Žára Daniel Černohorský Department of Computer Science & Engineering Czech Technical University Karlovo nam 13 121 35 Praha

More information

Lecture 8 Wireless Sensor Networks: Overview

Lecture 8 Wireless Sensor Networks: Overview Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam

More information

Review of Topology and Access Techniques / Switching Concepts

Review of Topology and Access Techniques / Switching Concepts Review of Topology and s / Concepts BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Three base wired topologies Bus, star, ring Two wireless topologies Ad-hoc, infrastructure

More information

Chapter - 1 INTRODUCTION

Chapter - 1 INTRODUCTION Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system

More information

Mobile Diagnostics for Personal Electrics Transportation Devices

Mobile Diagnostics for Personal Electrics Transportation Devices Mobile Diagnostics for Personal Electrics Transportation Devices Item Type text; Proceedings Authors Gilchrist, Zachary A. Publisher International Foundation for Telemetering Journal International Telemetering

More information

CS 4758: Automated Semantic Mapping of Environment

CS 4758: Automated Semantic Mapping of Environment CS 4758: Automated Semantic Mapping of Environment Dongsu Lee, ECE, M.Eng., dl624@cornell.edu Aperahama Parangi, CS, 2013, alp75@cornell.edu Abstract The purpose of this project is to program an Erratic

More information

Evaluation of Information Dissemination Characteristics in a PTS VANET

Evaluation of Information Dissemination Characteristics in a PTS VANET Evaluation of Information Dissemination Characteristics in a PTS VANET Holger Kuprian 1, Marek Meyer 2, Miguel Rios 3 1) Technische Universität Darmstadt, Multimedia Communications Lab Holger.Kuprian@KOM.tu-darmstadt.de

More information

#65 MONITORING AND PREDICTING PEDESTRIAN BEHAVIOR AT TRAFFIC INTERSECTIONS

#65 MONITORING AND PREDICTING PEDESTRIAN BEHAVIOR AT TRAFFIC INTERSECTIONS #65 MONITORING AND PREDICTING PEDESTRIAN BEHAVIOR AT TRAFFIC INTERSECTIONS Final Research Report Luis E. Navarro-Serment, Ph.D. The Robotics Institute Carnegie Mellon University Disclaimer The contents

More information

Monitoring Location Servers and Site

Monitoring Location Servers and Site 8 CHAPTER This chapter describes how to monitor location servers by configuring and viewing alarms, events, and logs. It also describes how to use Cisco WCS to view location server, client and asset tag

More information

Networking Basics. Crystal Printer Network Installation Guidelines

Networking Basics. Crystal Printer Network Installation Guidelines Networking Basics & Crystal Printer Network Installation Guidelines 1. Overview This guide is intended to provide the necessary basic knowledge of wireless networking needed to enable the Crystal printer

More information

The MSAP is available only in the root virtual domain from 7.3 Release.

The MSAP is available only in the root virtual domain from 7.3 Release. 10 CHAPTER Cisco Mobility Services Advertisement Protocol () provides requirements for clients and servers and describes the message exchanges between them. Mobile devices can retrieve service advertisements

More information

Cisco Smart+Connected Communities

Cisco Smart+Connected Communities Brochure Cisco Smart+Connected Communities Helping Cities on Their Digital Journey Cities worldwide are becoming digital or are evaluating strategies for doing so in order to make use of the unprecedented

More information

Dynamic Adaptive Disaster Simulation: A Predictive Model of Emergency Behavior Using Cell Phone and GIS Data 1

Dynamic Adaptive Disaster Simulation: A Predictive Model of Emergency Behavior Using Cell Phone and GIS Data 1 Dynamic Adaptive Disaster Simulation: A Predictive Model of Emergency Behavior Using Cell Phone and GIS Data 1, Zhi Zhai, Greg Madey Dept. of Computer Science and Engineering University of Notre Dame Notre

More information

Definition, Detection, and Evaluation of Meeting Events in Airport Surveillance Videos

Definition, Detection, and Evaluation of Meeting Events in Airport Surveillance Videos Definition, Detection, and Evaluation of Meeting Events in Airport Surveillance Videos Sung Chun Lee, Chang Huang, and Ram Nevatia University of Southern California, Los Angeles, CA 90089, USA sungchun@usc.edu,

More information

Wireless and Mobile Networks 7-2

Wireless and Mobile Networks 7-2 Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected

More information

Types of Computer Networks. ICS 614: Computer Networks Concepts and Principles 11

Types of Computer Networks. ICS 614: Computer Networks Concepts and Principles 11 Types of Computer Networks ICS 614: Computer Networks Concepts and Principles 11 Types of networks Networks are categorized by distribution, size, and architecture. A network can be as simple as a single

More information

The MAC Address Format

The MAC Address Format Directing data is what addressing is all about. At the Data Link layer, this is done by pointing PDUs to the destination MAC address for delivery of a frame within a LAN. The MAC address is the number

More information

Available online at ScienceDirect. Transportation Research Procedia 2 (2014 )

Available online at  ScienceDirect. Transportation Research Procedia 2 (2014 ) Available online at www.sciencedirect.com ScienceDirect Transportation Research Procedia 2 (2014 ) 189 194 The Conference on in Pedestrian and Evacuation Dynamics 2014 (PED2014) Time-Of-Flight technology

More information

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD. Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture

More information

A Dynamic TDMA Protocol Utilizing Channel Sense

A Dynamic TDMA Protocol Utilizing Channel Sense International Conference on Electromechanical Control Technology and Transportation (ICECTT 2015) A Dynamic TDMA Protocol Utilizing Channel Sense ZHOU De-min 1, a, LIU Yun-jiang 2,b and LI Man 3,c 1 2

More information

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z This glossary provides definitions of terms and acronyms that are used in Premier as well as informative industry terms. Select the first letter of the word you want to find. A B C D E F G H I J K L M

More information

Connecting LANs. Required reading: Forouzan 17.1 to 17.1 Garcia 6.11 (intro ) CSE 3213, Fall Instructor: N. Vlajic

Connecting LANs. Required reading: Forouzan 17.1 to 17.1 Garcia 6.11 (intro ) CSE 3213, Fall Instructor: N. Vlajic 1 Connecting LANs Required reading: Forouzan 17.1 to 17.1 Garcia 6.11 (intro + 6.11.1) CSE 3213, Fall 20105 Instructor: N. Vlajic Connecting Devices 2 Why Connecting Devices in LANs? (1) LANs do not normally

More information

Mobile Incident Command and Accountability System An Emergency Responder Prototype and Pilot System

Mobile Incident Command and Accountability System An Emergency Responder Prototype and Pilot System Mobile Incident Command and Accountability System An Emergency Responder Prototype and Pilot System ESRI Homeland Security Conference Chris Couper 916 641 4492 ccouper@us.ibm.com IBM MICAS 9/13/2005 Challenges

More information

Smart City, Internet of Things, Security and Privacy

Smart City, Internet of Things, Security and Privacy Smart City, Internet of Things, Security and Privacy Peter Waher Abstract. This course contains a series of lectures and practical laboratory assignments spanning four days that provide the participants

More information