Tax Consequences of Stock Options: ISOs, NSOs, ESPPs and RSUs
Ubiquitous and Secure Networks and ServicesUbiquitous and...
Transcript of Ubiquitous and Secure Networks and ServicesUbiquitous and...
Ubiquitous and Secure Networks and Services: Architectures and Models
Ubiquitous and Secure Networks and ServicesUbiquitous and Secure Networks and ServicesUbiquitous and Secure Networks and ServicesUbiquitous and Secure Networks and ServicesRedesRedes y y ServiciosServicios UbicuosUbicuos y y SegurosSeguros
Unit 3: Architectures and Models
José Fernán Martínez OrtegaJosé Fernán Martínez [email protected], [email protected]
© José Fernán Martínez Ortega 1
Ubiquitous and Secure Networks and Services: Architectures and Models
UNIT 3: Architectures and Models
INTRODUCTIONINTRODUCTIONUNIT 3: Architectures and Models
© José Fernán Martínez Ortega 2
Ubiquitous and Secure Networks and Services: Architectures and Models
Evolution to pervasive computingEvolution to pervasive computing
© José Fernán Martínez Ortega 3
Ubiquitous and Secure Networks and Services: Architectures and Models
Distributed System FeaturesDistributed System Features
HeterogeneityExtensibilityExtensibilitySecurityScalabilityFault managementFault managementConcurrencyTTransparency
© José Fernán Martínez Ortega 4
Ubiquitous and Secure Networks and Services: Architectures and Models
Architectural ModelsArchitectural Models
To identify the functionality of the simple system components.
To manage problems associated to component localization in To manage problems associated to component localization in
the network (distributed patterns, information, workload).
T l l ti hi t ( i ti To analyze relationships among components (communication
patterns),
Starting point:
ServersSe e s
Clients
P t P
© José Fernán Martínez Ortega 5
Peer to Peer …
Ubiquitous and Secure Networks and Services: Architectures and Models
General Software LevelsGeneral Software Levels Platform
Hardware Hardware. Operating System. Low level software layers. Low level software layers.
Middleware
“Heterogeneity problem”.
Application and services
© José Fernán Martínez Ortega 6
Ubiquitous and Secure Networks and Services: Architectures and Models
Towards a Middleware approachTowards a Middleware approach
¿What is distributed cooperation?
Application/Service Application/Service
© José Fernán Martínez Ortega 7
Ubiquitous and Secure Networks and Services: Architectures and Models
Middl S iMiddl S iMiddleware ServicesMiddleware Services
Object Oriented
Message Oriented
Transaction OrientedClustering of ServicesDistributed Processing Distributed Processing
PlatformsPlatforms
DB Oriented
RPC Oriented
© José Fernán Martínez Ortega 8
Oriented
Ubiquitous and Secure Networks and Services: Architectures and Models
So WhatSo WhatSo…What So…What about WSN?about WSN?about WSN?about WSN?
© José Fernán Martínez Ortega 9
Ubiquitous and Secure Networks and Services: Architectures and Models
UNIT 3: Architectures and Models
PLATFORM LAYERPLATFORM LAYERUNIT 3: Architectures and Models
© José Fernán Martínez Ortega 10
Ubiquitous and Secure Networks and Services: Architectures and Models
Bird’s Eye ViewBird’s Eye View
© José Fernán Martínez Ortega 11
Ubiquitous and Secure Networks and Services: Architectures and Models
TmoteTmote SkySky Developed in the Berkeley University. Features:USB interfaceUSB interface. Built-in antenna – 125 mts. Flash memory for software installation. Flash memory for software installation.
© José Fernán Martínez Ortega 12
Ubiquitous and Secure Networks and Services: Architectures and Models
T tT t SkSkTmoteTmote SkySkyProcessing Unit Interfacesg
Microcontroller MSP430F1611 Digital 6 GPIO
RAM 10 KB RAM Analogical 6 ADC
ROM 48 KB (FLASH) Serial I2C SPI USBROM 48 KB (FLASH) Serial I2C, SPI, USB
Speed 8 MHz Sensors Humidity, light, temperature
Operating TinyOS and Contiki Gateway Ethernet
System
Radiofrequency OthersTransceiver Chipcon CC2420 Power source AA BatteriesTransceiver Chipcon CC2420 Power source AA Batteries
Band 2400 – 2483.5 MHz Power idle 5.1 uA
Bit rate 250 Kbps Power (Rx/Tx) 19.5 mA / 21.8 mA
Modulation O-QPSK Cost Unit 130 $
Range (out-door), (in-door) Gateway Tmote Connect
Protocol 802.15.4 Licence BSD (Op. System)
© José Fernán Martínez Ortega 13
Security 802.15.4 Extras None
Ubiquitous and Secure Networks and Services: Architectures and Models
Crossbow FamilyCrossbow Family Monitorization and data acquisition
Radio 916 MHz 2 4 GHz (ZigBee compliant) Radio 916 MHz -2.4 GHz (ZigBee compliant) Different HW and SW platforms Families: Families: First Generation (MICAz, MICA 2, Telos B) Second Generation (Imote 2)
© José Fernán Martínez Ortega 14
Different Crossbow motes. More information at www.xbow.com. Used underCrossbow’s terms of use: http://www.xbow.com/terms-of-use.html.
Ubiquitous and Secure Networks and Services: Architectures and Models
ImoteImote 22Processing Unit Interfaces
Microcontroller Intel PXA271 Digital DIO
RAM 256 KB Analogical 8 x ADC
ROM 32 MB (FLASH) Serial 3 UART, 2 I2C, 2 SPI, , SDIO, GPIO( ) , , , , ,
Speed 13-416 MHz Sensors Sensor plug-in interface
Operating System TinyOS Gateway Mini-USB(local) or Ethernet (base station)
Radiofrequency OthersTransceiver CC2420 Power source AA Batteries
Band 2.4 GHz Power idle 31 uA
Bit rate 250 Kbps Power (Rx/Tx) 44 mA / 44 mA
Modulation O-QPSK Cost 404 $ unit
Range 75-(out-door), 20- (in-door) Gateway None
Protocol No specified Licence BSD (op. syst.)
© José Fernán Martínez Ortega 15
Security No specified Extras None
Ubiquitous and Secure Networks and Services: Architectures and Models
d f h ld f h lRadiofrequency TechnologiesRadiofrequency TechnologiesBluetooth ZigBee Z-wave WiFi WavenisBluetooth ZigBee Z wave WiFi Wavenis
Frecuency Band2.4 GHz
2.4 GHz/
5.2 GHz
868MHz
915MHz
2.4 GHz/
5.2 GHz
433/868/915MHz
(2,4GHz)
D t dData speed1 Mbps 250 Kbps few Kbps 5.5/11 MHz 4,8 / 19,2 / 250 Kbps
Deployment
Reliability
Low consumption
Range Range
Low cost
Range in-door (10m) (20m) (50m) (50m) (until 200m)
Standard protocol
Availability
© José Fernán Martínez Ortega 16
Ubiquitous and Secure Networks and Services: Architectures and Models
Open issuesOpen issuesSi tSize vs. costs.Integration of new functionalities (circuits).N l ti f tNew encapsulation formats.New personalized solutions.P ti (h ti )Power consumption (harvesting).MAC, HW components and software must be
improved.Consumption reduction.Uncorrelated antennas.Reliability (embedding QoS and security).
© José Fernán Martínez Ortega 17
Ubiquitous and Secure Networks and Services: Architectures and Models
Operating Operating SytemsSytems
Contiki
MagnetOS
SOS
TinyOS
Squawk© José Fernán Martínez Ortega 18
Squawk
Ubiquitous and Secure Networks and Services: Architectures and Models
OSOS k lk lTinyOSTinyOS -- BerkeleyBerkeley Application = scheduler + graph of components.
Compiled into one executable. Event-driven architecture. Single shared stack Single shared stack. No kernel/user space differentiation.
© José Fernán Martínez Ortega 19
Ubiquitous and Secure Networks and Services: Architectures and Models
UNIT 3: Architectures and Models
MIDDLEWARE LAYERMIDDLEWARE LAYERUNIT 3: Architectures and Models
© José Fernán Martínez Ortega 20
Ubiquitous and Secure Networks and Services: Architectures and Models
WSN Software TechnologiesWSN Software Technologies
Design Analysis for WSN.
Distribution.Data source availability.Bandwidth and resources.Cooperating applications.Quality of Service (QoS). Security.
© José Fernán Martínez Ortega 21
Ubiquitous and Secure Networks and Services: Architectures and Models
Middleware at whole!!Middleware at whole!! Middleware must provide: Middleware must provide:
Appropriate interfaces for a wide range of applications.pp
Run-time environment for coordination.Mechanisms to achieve efficient
resource use.
Middleware services:
Independency of network services and Independency of network services and low level layers.
Facilities for interacting with other in-network applicationsnetwork applications.
Increase availability and reliability. Guaranteeing scalability.
© José Fernán Martínez Ortega 22
Ubiquitous and Secure Networks and Services: Architectures and Models
WSN Middleware FeaturesWSN Middleware Features
Nodes are small-scale devices.Nodes and sensors (actuators) are limited by power
supply (batteries) – Harvested!Nodes are likely to fail (batteries, environment).Nodes are resource constrained.
© José Fernán Martínez Ortega 23
Ubiquitous and Secure Networks and Services: Architectures and Models
WSN Middleware ChallengesWSN Middleware Challenges Supporting the configuration lifecycle Supporting the configuration lifecycle Working in network with thousands of nodes Providing abstraction of the network Fulfilling main requirements: energy efficient, reliability and scalability
Allowing event-based or periodic i ticommunication
Providing self-configuring and self-managementg
Paying attention to the time and localization concepts
Providing application knowledge in the WSN Providing application knowledge in the WSN infrastructure
Supporting real-time applications needs
© José Fernán Martínez Ortega 24
Supporting security issues
Ubiquitous and Secure Networks and Services: Architectures and Models
WSN Middleware ApproachesWSN Middleware Approaches
© José Fernán Martínez Ortega 25
Ubiquitous and Secure Networks and Services: Architectures and Models
MatéMaté –– Virtual MachineVirtual Machine
Figure 2: Maté Architecture and Execution Model:Capsules, Contexts, and Stacks. [Levis2002] Levis, Pand Culler, D. “Maté: A Tiny Virtual Machine for Sensor
© José Fernán Martínez Ortega 26
Networks”. 10th International Conference onArchitectural Support for Programming Languages(ASPLOS X), 2002.
Ubiquitous and Secure Networks and Services: Architectures and Models
SSAgents in WSNAgents in WSNAgents WSN NodesAgents WSN Nodes
AutonomyCapacity of maintain some taskunder control without externalattention.
Capacity to reach objective withoutnetwork intervention.
Asynchronous working capacity
Start to work when the agentsreceive some information.
It senses stimulus and reacts.
Collaboration and The agents exchange data for The nodes need to work togethercoordination achieving a common task. for reducing interactions among
nodes.Communication Capacity to interaction with
th tCapacity to exchange data.
other agents.Objective driven The agents can reach their
objectives with someinformation
The sensed data by the nodes areused in order to reach networkgoalsinformation. goals
Reactivity Capacity to provide a resultwhen something happens.
Capacity to detect and react tounforeseen events.
Mobility Capacity to migrate Capacity to migrate between nodes
© José Fernán Martínez Ortega 27
Mobility Capacity to migrate. Capacity to migrate between nodes.
Ubiquitous and Secure Networks and Services: Architectures and Models
UNIT 3: Architectures and Models
USE CASE: AN EVENTUSE CASE: AN EVENT--DRIVEN MIDDLEWARE: DRIVEN MIDDLEWARE: MICRO SUBSCRIPTION MANAGEMENTMICRO SUBSCRIPTION MANAGEMENT
UNIT 3: Architectures and Models
MICRO SUBSCRIPTION MANAGEMENT MICRO SUBSCRIPTION MANAGEMENT SYSTEM (µSMS)SYSTEM (µSMS)
© José Fernán Martínez Ortega 28
Ubiquitous and Secure Networks and Services: Architectures and Models
Origin of This Middleware Approach Origin of This Middleware Approach The µSMS Middleware was developed as part of a project of
the 6th Framework Programme: Solving Major Problems in Micro Sensorial WirelessSolving Major Problems in Micro Sensorial Wireless
Networks
µSWN Project was working for 3 years from October 2006 to November 2009.
The µSWN Consortium was composed of 10 partners from The µSWN Consortium was composed of 10 partners from different European countries: Spain, France, Greece and Lithuania.
© José Fernán Martínez Ortega 29
Lithuania.
Ubiquitous and Secure Networks and Services: Architectures and Models
Origin of This Middleware Approach Origin of This Middleware Approach µSWN’s project main objectives:To research generic and reusable Software-Hardware
solutions for WSNs that are common to existent andsolutions for WSNs that are common to existent and potential future applications.
To research and develop a Middleware architectureTo research and develop a Middleware architectureenabling a platform for reusable components to ease futuredevelopments regarding similar systems under real-timerestrictions.
To apply WSN technology to three real world scenarios:Surveillance Multi tracking and Critical monitoringSurveillance, Multi-tracking and Critical-monitoring.
© José Fernán Martínez Ortega 30
Ubiquitous and Secure Networks and Services: Architectures and Models
The Middleware Architectural ContextThe Middleware Architectural Context Architectural Approach Architectural Approach
© José Fernán Martínez Ortega 31
Ubiquitous and Secure Networks and Services: Architectures and Models
Middleware ComponentsMiddleware ComponentsImplements:
µComponent Stereotype for UML • Load• Unload• Run• Destroy
<<use>>S b ib / S b ib
eventProduced
• Subscribe/unSubscribe• Publish/unPublish• publishExternalEvent• listEvents• trownEvent
Communication between receptacles and interfaces can be performed through eventsthrough eventsBasic operations: (Un)Publications and (Un)Subscriptions
Two interaction modes: PUSH and PULL. Direct calls to component methods can be also enable
© José Fernán Martínez Ortega 32
Direct calls to component methods can be also enable
Ubiquitous and Secure Networks and Services: Architectures and Models
Middleware Middleware KKernelernel<<I>>µComponent
<< manages >> <<subsystem>>Framework
<< manages >>
<< implements >>
Subscriber << instantiates >> Event_t
1 .. * 11 1
ERT ESTEDT EQ
[Martinez2011] J. F. Martínez, M. S. Familiar, I.Corredor, A. B. García, S. Bravo and Lourdes López,“Composition and deployment of e-Health services
© José Fernán Martínez Ortega 33
over Wireless Sensor Networks”. Mathematical andComputer Modelling, Elsevier, vol. 53, num. 3-4, pp.485-503, 2011.
Ubiquitous and Secure Networks and Services: Architectures and Models
µOpen Distributed InterµOpen Distributed Inter--Component Communication ProtocolComponent Communication Protocol
Data Unit: Event
EventType key value key valueEventType key value key value
UINT16 UINT8 UINT8UINT16 UINT16
Event Type: Type of event that will be dispatched.E.g. Temperature Threshold
key-value pairs: event’s useful data.E.g. Celsius-38º; Farenheit-100º
[Martinez2011] J. F. Martínez, M. S. Familiar, I.Corredor, A. B. García, S. Bravo and Lourdes López,“Composition and deployment of e-Health services
© José Fernán Martínez Ortega 34
E.g. Celsius 38 ; Farenheit 100over Wireless Sensor Networks”. Mathematical andComputer Modelling, Elsevier, vol. 53, num. 3-4, pp.485-503, 2011.
Ubiquitous and Secure Networks and Services: Architectures and Models
µOpen Distributed InterµOpen Distributed Inter--Component Communication ProtocolComponent Communication Protocol
Publications and Subscriptions
Network Agent
A Subscription generates an entry in Event Routing Table
© José Fernán Martínez Ortega 35
A Subscription generates an entry in Event Routing TableEventType, ProducerID, ConsumerID and Event Filter
Ubiquitous and Secure Networks and Services: Architectures and Models
O Di t ib t d I tO Di t ib t d I t C t C i ti P t lC t C i ti P t lµOpen Distributed InterµOpen Distributed Inter--Component Communication ProtocolComponent Communication Protocol
Event dispatching (intra-node)
© José Fernán Martínez Ortega 36
Ubiquitous and Secure Networks and Services: Architectures and Models
O Di t ib t d I tO Di t ib t d I t C t C i ti P t lC t C i ti P t lµOpen Distributed InterµOpen Distributed Inter--Component Communication ProtocolComponent Communication Protocol
Event dispatching (inter-node)p g ( )
[Martinez2011] J. F. Martínez, M. S. Familiar, I.Corredor, A. B. García, S. Bravo and Lourdes López,“Composition and deployment of e-Health servicesover Wireless Sensor Networks”. Mathematical and
© José Fernán Martínez Ortega 37
over Wireless Sensor Networks . Mathematical andComputer Modelling, Elsevier, vol. 53, num. 3-4, pp.485-503, 2011.
Ubiquitous and Secure Networks and Services: Architectures and Models
µOpen Distributed InterµOpen Distributed Inter Component Communication ProtocolComponent Communication ProtocolµOpen Distributed InterµOpen Distributed Inter--Component Communication ProtocolComponent Communication Protocol Event dispatching (inter-node)
External Event StructureEventType key value key value key value
EXTERNAL_EVENT CON_ID PRO_ID
EventType
EVENT
key value key value key value
UINT16 UINT8 UINT8 UINT8
nodeID
µComponent
UINT16 UINT16UINT16 UINT16
nodeID
µComponent
LocalUINT16
EventType key value key value
UINT16
Local Event
EventType key value key value
UINT16 UINT8 UINT8UINT16 UINT16
© José Fernán Martínez Ortega 38
[Martinez2011] J. F. Martínez, M. S. Familiar, I. Corredor, A. B. García, S. Bravo and Lourdes López, “Composition and deployment of e-Health services over Wireless SensorNetworks”. Mathematical and Computer Modelling, Elsevier, vol. 53, num. 3-4, pp. 485-503, 2011.
Ubiquitous and Secure Networks and Services: Architectures and Models
V lid ti S iV lid ti S iValidation ScenarioValidation Scenario System deployment at Versme Sanatorium, Birstonas (Lithuania)
Three real world validation scenarios
[Martinez2011] J. F. Martínez, M. S. Familiar, I.Corredor, A. B. García, S. Bravo and Lourdes López,“Composition and deployment of e-Health servicesover Wireless Sensor Networks”. Mathematical andComputer Modelling, Elsevier, vol. 53, num. 3-4, pp.485-503, 2011.
© José Fernán Martínez Ortega 39
Surveillance, Multi-tracking and Critical Monitoring
Ubiquitous and Secure Networks and Services: Architectures and Models
Validation ScenarioValidation Scenario Surveillance Scenario
ObjectivesTo detect intruders, patients and medical staff crossing a virtual , p g
perimeter rounding the SanatoriumDeployment
Fixed nodes connected to PIRs S ill A tFixed nodes connected to PIRsBracelet nodes (mobile nodes)
Fixed node with PIRsuSWN CAD
Surveillance Agent
[Martínez2010] J. F. Martínez, S. Bravo, A. B. García,I. Corredor, M.S. Familiar, L. Lopez, V. Hernandez andA. Da Silva, “Pervasive surveillance-agent system
[Martinez2011] J. F. Martínez, M. S. Familiar, I. Corredor, A. B.García, S. Bravo and Lourdes López, “Composition and
© José Fernán Martínez Ortega 40
based on wireless sensor networks: design anddeployment”, Measurement Science andTechnology, vol. 21, num. 12, 2010.
p pdeployment of e-Health services over Wireless SensorNetworks”. Mathematical and Computer Modelling, Elsevier,vol. 53, num. 3-4, pp. 485-503, 2011.
Ubiquitous and Secure Networks and Services: Architectures and Models
Validation ScenarioValidation Scenario Multi-tracking scenariog
ObjectivesTo track patients wearing bracelet nodes
DeploymentDeployment Grid of fixed nodes (beacons)Bracelet nodes (mobile nodes)
M lti t ki ti
Multi-tracking Agent
[Mar
Corr
“Com
overC
om485-
Grid deployment
Multi-tracking operation
rtinez2011]J.
F.redor,A
.B.G
arcíam
positionand
der
Wireless
Sensorm
puterM
odelling,-503,2011.
Martínez,
M.
S.a,S.B
ravoand
Loeploym
entof
e-He
rN
etworks”.
Math
Elsevier,vol.53, .Fam
iliar,I.
ourdesLópez,
ealthservices
hematical
andnum
.3-4,pp.
© José Fernán Martínez Ortega 41
Ubiquitous and Secure Networks and Services: Architectures and Models
Validation ScenarioValidation Scenario Critical Monitoring Scenario
ObjectivesTo monitor vital signs of patients (heart rate and body temperature)g ( y )To monitor environmental parameters (temperature and humidity)
DeploymentFixed nodes (out-door and in-door deployment) Critical Monitoring Fixed nodes (out door and in door deployment)Bracelet nodes (mobile nodes) with biomedical sensors
Out-door deployment In-door deploymentBracelet node
gAgent
Bracelet node
© José Fernán Martínez Ortega 42
Ubiquitous and Secure Networks and Services: Architectures and Models
ReferencesReferences [Fok2006] Fok, C. Roman, G., Lu, C. “Agilla: A Mobile Agent Middleware for Sensor Networks.”
School of Engineering and Applied Science. Washington University, St. Louis. 2006. [Hadim2006] Hadim, S., Mohamed, N. “Middleware Challenges and Approaches for Wireless Sensor
Networks”. IEEE DISTRIBUTED SYSTEMS ONLINE, Vol. 7, No. 3; March 2006., , ; [Levis2002] Levis, P and Culler, D. “Maté: A Tiny Virtual Machine for Sensor Networks”. 10th
International Conference on Architectural Support for Programming Languages (ASPLOS X), 2002. [Liu2003] T. Liu and M. Martonosi. “Impala: A middleware system for managing autonomic, pararell
sensor systems” Symposium on Principles and Practice of Pararell Programming (PpoPP’03) Junesensor systems Symposium on Principles and Practice of Pararell Programming (PpoPP 03), June 2003
[Lu2001] Lu, C. "Berkley Motes and TinyOS”. www.cs.virginia.edu/~cl7v/cs851-talks/tinyos_chenyang.ppt
[Martíne 2010] J F Martíne S Bra o A B García I Corredor M S Familiar L Lope V [Martínez2010] J. F. Martínez, S. Bravo, A. B. García, I. Corredor, M.S. Familiar, L. Lopez, V. Hernandez and A. Da Silva, “Pervasive surveillance-agent system based on wireless sensor networks: design and deployment”, Measurement Science and Technology, vol. 21, num. 12, 2010.
[Martinez2011] J. F. Martínez, M. S. Familiar, I. Corredor, A. B. García, S. Bravo and Lourdes López, “Composition and deployment of e-Health services over Wireless Sensor Networks”. Mathematical and Computer Modelling, Elsevier, vol. 53, num. 3-4, pp. 485-503, 2011.
[Oracle] Oracle. “The Squawk Virtual Machine”. labs.oracle.com/projects/squawk/squawk-rjvm.html [RUNES] “Reconfigurable Ubiquitous Networked Embedded Systems” http://www.ist-runes.org/]
© José Fernán Martínez Ortega 43
[ ] g q y p g ]
Ubiquitous and Secure Networks and Services: Architectures and Models
Bibli hBibli hBibliographyBibliography Analysis and validation of Wireless Sensor Networks Software Technologies. Luis D. Rosado ,
Advisor: José F. Martinez. Final project, ETSIT – UPM January 2008. C iti d d l i f H lth i Wi l S N t k J é F Composition and deploying of e-Health services over Wireless Sensor Networks José F.
Martínez, Miguel S. Familiar, Iván Corredor , Ana B. García, Sury Bravo, Lourdes López, Journal of Mathematical and Computer Modelling, Special issue: Telecommunications Software Engineering: Emerging Methods, Models and Tools, Elsevier, ISSN: 0895-7177, 2010.
Middleware for Self adaptative Environments in Wireless Sensor Networks Iván Corredor Middleware for Self-adaptative Environments in Wireless Sensor Networks, Iván Corredor, Master Thesis Dissertation, Advisor: José-F Martínez, EUITT – UPM, October 2009
Pervasive Surveillance-Agent System based on Wireless Sensor Networks: Design and Deployment. José F Martínez, Sury Bravo, Ana B García, Iván Corredor, Miguel S Familiar, Lourdes López Vicente Hernández and Antonio Da Silva Journal of Measurement Science and TechnologyLópez, Vicente Hernández and Antonio Da Silva, Journal of Measurement Science and Technology, Special Issue on Wireless Sensor Networks, December 2010, IOPscience. ISSN: 0957-0233.
Problem Solving for Wireless Sensor Networks, Ana-B García, José-F Martínez, Juan-M López, Anggliki Prayati, Luis Redóndo., Springer Verlag Series: Computer Communications and Networks, ISBN 978-1-84800-202-9, 2008.S 9 8 8 800 0 9, 008
Reasoning System for Wireless Sensor Networks, Marta Zuazua, Master Thesis Dissertation, Advisor: José-F Martínez, EUITT – UPM, September 2010
Virtualization on Wireless Sensor Networks, Patricia Vicente, Final project, Advisor: José F. Martinez, EUITT – UPM September 2010.p
Wireless Sensor Network Subscription Management System, Miguel S. Familiar, Final project, Advisor: José F. Martinez, EUITT – UPM February 2009.
More WSN resources. http://www.diatel.upm.es/jfmartin/jfmartin_ENG.html
© José Fernán Martínez Ortega 44