Monday, September 30, 2019
Wireless Sensor Networks
1. Introduction The increasing interest in wireless sensor networks can be promptly understood simply by thinking about what they essentially are: a large number of small sensing self-powered nodes which gather information or detect special events and communicate in a wireless fashion, with the end goal of handing their processed data to a base station. Sensing, processing and communication are three key elements whose combination in one tiny device gives rise to a vast number of applications [A1], [A2]. Sensor networks provide endless opportunities, but at the same time pose formidable challenges, uch as the fact that energy is a scarce and usually non-renewable resource. However, recent advances in low power VLSI, embedded computing, communication hardware, and in general, the convergence of computing and communications, are making this emerging technology a reality [A3]. Likewise, advances in nanotechnology and Micro Electro-Mechanical Systems (MEMS) are pushing toward networks of tiny distributed sensors and actuators. 2. Applications of Sensor Networks Possible applications of sensor networks are of interest to the most diverse fields. Environmental monitoring, warfare, child education, surveillance, micro-surgery, and griculture are only a few examples [A4]. Through joint efforts of the University of California at Berkeley and the College of the Atlantic, environmental monitoring is carried out off the coast of Maine on Great Duck Island by means of a network of Berkeley motes equipped with various sensors [B6]. The nodes send their data to a base station which makes them available on the Internet. Since habitat monitoring is rather sensitive to human presence, the deployment of a sensor network provides a noninvasive approach and a remarkable degree of granularity in data acquisition [B7]. The same idea lies behind thePods project at the University of Hawaii at Manoa [B8], where environmental data (air temperature, light, wind, relative humidity and rain fall) are gathered by a network of weather sensors embedded in the communication units deployed in the South-West Rift Zone in Volcanoes National Park on the Big Island of Hawaii. A major concern of the researchers was in this case camouflaging the sensors to make them invisible to curious tourists. In Princetonââ¬â¢s Zebranet Project [B9], a dynamic sensor network has been created by attaching special collars equipped with a low-power GPS system to the necks of zebras to onitor their moves and their behavior. Since the network is designed to operate in an infrastructure-free environment, peer-to-peer swaps of information are used to produce redundant databases so that researchers only have to encounter a few zebras in order to collect the data. Sensor networks can also be used to monitor and study natural phenomena which intrinsically discourage human presence, such as hurricanes and forest fires. Joint efforts between Harvard University, the University of New Hampshire, and the University of North Carolina have recently led to the deployment of a wireless sensor etwork to monitor eruptions at Volcan Tungurahua, an active volcano in central Ecuador. A network of Berkeley motes monitored infrasonic signals during eruptions, and data were transmitted over a 9 km wireless link to a base station at the volcano observatory [B10]. Intelââ¬â¢s Wireless Vineyard [B11] is an example of using ubiquitous computing for agricultural monitoring. In this application, the network is expected not only to collect and interpret data, but also to use such data to make decisions aimed at detecting the presence of parasites and enabling the use of the appropriate kind of insecticide.Data collection relies on data mules, small devices carried by people (or dogs) that communicate with the nodes and collect data. In this project, the attention is shifted from reliable information collection to active decisionmaking based on acquired data. Just as they can be used to monitor nat ure, sensor networks can likewise be used to monitor human behavior. In the Smart Kindergarten project at UCLA [B12], wirelessly-networked, sensor-enhanced toys and other classroom objects supervise the learning process of children and allow unobtrusive monitoring by the teacher. Medical research and healthcare can greatly benefit rom sensor networks: vital sign monitoring and accident recognition are the most natural applications. An important issue is the care of the elderly, especially if they are affected by cognitive decline: a network of sensors and actuators could monitor them and even assist them in their daily routine. Smart appliances could help them organize their lives by reminding them of their meals and medications. Sensors can be used to capture vital signs from patients in real-time and relay the data to handheld computers carried by medical personnel, and wearable sensor nodes can store patient data such as identification, history, and treatments.With these ideas in mind, Harvard University is cooperating with the School of Medicine at Boston University to develop CodeBlue, an infrastructure designed to support wireless medical sensors, PDAs, PCs, and other devices that may be used to monitor and treat patients in various medical scenarios [B13]. On the hardware side, the research team has Martin Haenggi is with the Department of Electrical Engineering, University of Notre Dame, Notre Dame, IN 46556; Fax +1 574 631 4393; [emailà protected]@nd. edu. Daniele Puccinelli is also with the Department of Electrical Engineering, University of Notre Dame, Notre Dame, IN 46556. reated Vital Dust, a set of devices based on the MICA21 sensor node platform (one of the most popular members of the Berkeley motes family), which collect heart rate, oxygen saturation, and EKG data and relay them over a medium-range (100 m) wireless network to a PDA [B14]. Interactions between sensor networks and humans are already judged controversial. The US has recently app roved the use of a radio-frequency implantable device (VeriChip) on humans, whose intended application is accessing the medical records of a patient in an emergency. Potential future repercussions of this decision have been discussed in the media.An interesting application to civil engineering is the idea of Smart Buildings: wireless sensor and actuator networks integrated within buildings could allow distributed monitoring and control, improving living conditions and reducing the energy consumption, for instance by controlling temperature and air flow. Military applications are plentiful. An intriguing example is DARPAââ¬â¢s self-healing minefield [B15], a selforganizing sensor network where peer-to-peer communication between anti-tank mines is used to respond to attacks and redistribute the mines in order to heal breaches, complicating the progress of enemy troops.Urban warfare is another application that distributed sensing lends itself to. An ensemble of nodes could be deploy ed in a urban landscape to detect chemical attacks, or track enemy movements. PinPtr is an ad hoc acoustic sensor network for sniper localization developed at Vanderbilt University [B16]. The network detects the muzzle blast and the acoustic shock wave that originate from the sound of gunfire. The arrival times of the acoustic events at different sensor nodes are used to estimate the position of the sniper and send it to the base station with a special data aggregation and routing service.Going back to peaceful applications, efforts are underway at Carnegie Mellon University and Intel for the design of IrisNet (Internet-scale Resource-Intensive Sensor Network Services) [B17], an architecture for a worldwide sensor web based on common computing hardware such as Internet-connected PCs and low-cost sensing hardware such as webcams. The network interface of a PC indeed senses the virtual environment of a LAN or the Internet rather than a physical environment; with an architecture based on the concept of a distributed database [B18], this hardware can be orchestrated into a global sensor system hat responds to queries from users. 3. Characteristic Features of Sensor Networks In ad hoc networks, wireless nodes self-organize into an infrastructureless network with a dynamic topology. Sensor networks (such as the one in Figure 1) share these traits, but also have several distinguishing features. The number of nodes in a typical sensor network is much higher than in a typical ad hoc network, and dense deployments are often desired to ensure coverage and connectivity; for these reasons, sensor network hardware must be cheap. Nodes typically have stringent energy limitations, which make them more failure-prone. They are enerally assumed to be stationary, but their relatively frequent breakdowns and the volatile nature of the wireless channel nonetheless result in a variable network topology. Ideally, sensor network hardware should be power-efficient, small, inexpensive, and reliable in order to maximize network lifetime, add flexibility, facilitate data collection and minimize the need for maintenance. Lifetime Lifetime is extremely critical for most applications, and its primary limiting factor is the energy consumption of the nodes, which need to be self-powering. Although it is often assumed that the transmit power associated with acket transmission accounts for the lionââ¬â¢s share of power consumption, sensing, signal processing and even hardware operation in standby mode consume a consistent amount of power as well [C19], [C20]. In some applications, extra power is needed for macro-scale actuation. Many researchers suggest that energy consumption could be reduced by considering the existing interdependencies between individual layers in the network protocol stack. Routing and channel access protocols, for instance, could greatly benefit from an information exchange with the physical layer. At the physical layer, benefits can be obtained wi th ower radio duty cycles and dynamic modulation scaling (varying the constellation size to minimize energy expenditure THIRD QUARTER 2005 IEEE CIRCUITS AND SYSTEMS MAGAZINE 21 External Infrastructure Gateway Base Station Sensing Nodes Figure 1. A generic sensor network with a two-tiered archi1 tecture. See Section 5 for a hardware overview. [D35]). Using low-power modi for the processor or disabling the radio is generally advantageous, even though periodically turning a subsystem on and off may be more costly than always keeping it on. Techniques aimed at reducing the idle mode leakage current in CMOS-based rocessors are also noteworthy [D36]. Medium Access Control (MAC) solutions have a direct impact on energy consumption, as some of the primary causes of energy waste are found at the MAC layer: collisions, control packet overhead and idle listening. Powersaving forward error control techniques are not easy to implement due to the high amount of computing power that they require a nd the fact that long packets are normally not practical. Energy-efficient routing should avoid the loss of a node due to battery depletion. Many proposed protocols tend to minimize energy consumption on forwarding aths, but if some nodes happen to be located on most forwarding paths (e. g. , close to the base station), their lifetime will be reduced. Flexibility Sensor networks should be scalable, and they should be able to dynamically adapt to changes in node density and topology, like in the case of the self-healing minefields. In surveillance applications, most nodes may remain quiescent as long as nothing interesting happens. However, they must be able to respond to special events that the network intends to study with some degree of granularity. In a self-healing minefield, a number of sensing mines ay sleep as long as none of their peers explodes, but need to quickly become operational in the case of an enemy attack. Response time is also very critical in control applications (sensor/actuator networks) in which the network is to provide a delay-guaranteed service. Untethered systems need to self-configure and adapt to different conditions. Sensor networks should also be robust to changes in their topology, for instance due to the failure of individual nodes. In particular, connectivity and coverage should always be guaranteed. Connectivity is achieved if the base station can be reached from any node.Coverage can be seen as a measure of quality of service in a sensor network [C23], as it defines how well a particular area can be observed by a network and characterizes the probability of detection of geographically constrained phenomena or events. Complete coverage is particularly important for surveillance applications. Maintenance The only desired form of maintenance in a sensor network is the complete or partial update of the program code in the sensor nodes over the wireless channel. All sensor nodes should be updated, and the restrictions on the size of the new code should be the same as in the case of wired programming.Packet loss must be accounted for and should not impede correct reprogramming. The portion of code always running in the node to guarantee reprogramming support should have a small footprint, and updating procedures should only cause a brief interruption of the normal operation of the node [C24]. The functioning of the network as a whole should not be endangered by unavoidable failures of single nodes, which may occur for a number of reasons, from battery depletion to unpredictable external events, and may either be independent or spatially correlated [C25]. Faulttolerance is particularly crucial as ongoing maintenance s rarely an option in sensor network applications. Self-configuring nodes are necessary to allow the deployment process to run smoothly without human interaction, which should in principle be limited to placing nodes into a given geographical area. It is not desirable to have humans configure node s for habitat monitoring and destructively interfere with wildlife in the process, or configure nodes for urban warfare monitoring in a hostile environment. The nodes should be able to assess the quality of the network deployment and indicate any problems that may arise, as well as adjust to hanging environmental conditions by automatic reconfiguration. Location awareness is important for selfconfiguration and has definite advantages in terms of routing [C26] and security. Time synchronization [C27] is advantageous in promoting cooperation among nodes, such as data fusion, channel access, coordination of sleep modi, or security-related interaction. Data Collection Data collection is related to network connectivity and coverage. An interesting solution is the use of ubiquitous mobile agents that randomly move around to gather data bridging sensor nodes and access points, whimsically named dataMULEs (Mobile Ubiquitous LAN Extensions) in [C28]. The predictable mobility of the data sink can be used to save power [C29], as nodes can learn its schedule. A similar concept has been implemented in Intelââ¬â¢s Wireless Vineyard. It is often the case that all data are relayed to a base station, but this form of centralized data collection may shorten network lifetime. Relaying data to a data sink causes non-uniform power consumption patterns that may overburden forwarding nodes [C21]. This is particularly harsh on nodes providing end links to base stations, which may end up relaying traffic coming from all ther nodes, thus forming a critical bottleneck for network throughput [A4], [C22], as shown in Figure 2. An interesting technique is clustering [C30]: nodes team up to form clusters and transmit their information to their cluster heads, which fuse the data and forward it to a 22 IEEE CIRCUITS AND SYSTEMS MAGAZINE THIRD QUARTER 2005 sink. Fewer packets are transmitted, and a uniform energy consumption pattern may be achieved by periodic re-clustering. Data redundancy is minimized, as the aggregation process fuses strongly correlated measurements. Many applications require that queries be sent to sensing nodes.This is true, for example, whenever the goal is gathering data regarding a particular area where various sensors have been deployed. This is the rationale behind looking at a sensor network as a database [C31]. A sensor network should be able to protect itself and its data from external attacks, but the severe limitations of lower-end sensor node hardware make security a true challenge. Typical encryption schemes, for instance, require large amounts of memory that are unavailable in sensor nodes. Data confidentiality should be preserved by encrypting data with a secret key shared with the intended receiver. Data integrity should be ensured to revent unauthorized data alteration. An authenticated broadcast must allow the verification of the legitimacy of data and their sender. In a number of commercial applications, a serious disservice to the user of a sensor network is compromising data availability (denial of service), which can be achieved by sleep-deprivation torture [C33]: batteries may be drained by continuous service requests or demands for legitimate but intensive tasks [C34], preventing the node from entering sleep modi. 4. Hardware Design Issues In a generic sensor node (Figure 3), we can identify a power module, a communication block, a processing unit ith internal and/or external memory, and a module for sensing and actuation. Power Using stored energy or harvesting energy from the outside world are the two options for the power module. Energy storage may be achieved with the use of batteries or alternative devices such as fuel cells or miniaturized heat engines, whereas energy-scavenging opportunities [D37] are provided by solar power, vibrations, acoustic noise, and piezoelectric effects [D38]. The vast majority of the existing commercial and research platforms relies on batteries, which dominate the no de size. Primary (nonrechargeable) batteries are often chosen, predominantlyAA, AAA and coin-type. Alkaline batteries offer a high energy density at a cheap price, offset by a non-flat discharge, a large physical size with respect to a typical sensor node, and a shelf life of only 5 years. Voltage regulation could in principle be employed, but its high inefficiency and large quiescent current consumption call for the use of components that can deal with large variations in the supply voltage [A5]. Lithium cells are very compact and boast a flat discharge curve. Secondary (rechargeable) batteries are typically not desirable, as they offer a lower energy density and a higher cost, not to mention the fact that in most pplications recharging is simply not practical. Fuel cells [D39] are rechargeable electrochemical energy- conversion devices where electricity and heat are produced as long as hydrogen is supplied to react with oxygen. Pollution is minimal, as water is the main byproduct of the reaction. The potential of fuel cells for energy storage and power delivery is much higher than the one of traditional battery technologies, but the fact that they require hydrogen complicates their application. Using renewable energy and scavenging techniques is an interesting alternative. Communication Most sensor networks use radio communication, even if lternative solutions are offered by laser and infrared. Nearly all radio-based platforms use COTS (Commercial Off-The-Shelf) components. Popular choices include the TR1000 from RFM (used in the MICA motes) and the CC1000 from Chipcon (chosen for the MICA2 platform). More recent solutions use industry standards like IEEE 802. 15. 4 (MICAz and Telos motes with CC2420 from Chipcon) or pseudo-standards like Bluetooth. Typically, the transmit power ranges between ? 25 dBm and 10 dBm, while the receiver sensitivity can be as good as ? 110 dBm. THIRD QUARTER 2005 IEEE CIRCUITS AND SYSTEMS MAGAZINE 23 Base Station Critical Nodes F igure 2.A uniform energy consumption pattern should avoid the depletion of the resources of nodes located in the vicinities of the base station. Communication Hardware Power Sensors (? Actuators) ADC Memory Processor Figure 3. Anatomy of a generic sensor node. Spread spectrum techniques increase the channel reliability and the noise tolerance by spreading the signal over a wide range of frequencies. Frequency hopping (FH) is a spread spectrum technique used by Bluetooth: the carrier frequency changes 1600 times per second on the basis of a pseudo-random algorithm. However, channel synchronization, hopping sequence search, and the high data rate ncrease power consumption; this is one of the strongest caveats when using Bluetooth in sensor network nodes. In Direct Sequence Spread Spectrum (DSSS), communication is carried out on a single carrier frequency. The signal is multiplied by a higher rate pseudo-random sequence and thus spread over a wide frequency range (typical DSSS radios h ave spreading factors between 15 and 100). Ultra Wide Band (UWB) is of great interest for sensor networks since it meets some of their main requirements. UWB is a particular carrier-free spread spectrum technique where the RF signal is spread over a spectrum as large as several GHz.This implies that UWB signals look like noise to conventional radios. Such signals are produced using baseband pulses (for instance, Gaussian monopulses) whose length ranges from 100 ps to 1 ns, and baseband transmission is generally carried out by means of pulse position modulation (PPM). Modulation and demodulation are indeed extremely cheap. UWB provides built-in ranging capabilities (a wideband signal allows a good time resolution and therefore a good location accuracy) [D40], allows a very low power consumption, and performs well in the presence of multipath fading. Radios with relatively low bit-rates (up to 100 kbps) re advantageous in terms of power consumption. In most sensor networks, high data rates are not needed, even though they allow shorter transmission times thus permitting lower duty cycles and alleviating channel access contention. It is also desirable for a radio to quickly switch from a sleep mode to an operational mode. Optical transceivers such as lasers offer a strong power advantage, mainly due to their high directionality and the fact that only baseband processing is required. Also, security is intrinsically guaranteed (intercepted signals are altered). However, the need for a line of sight and recise localization makes this option impractical for most applications. Processing and Computing Although low-power FPGAs might become a viable option in the near future [D41], microcontrollers (MCUs) are now the primary choice for processing in sensor nodes. The key metric in the selection of an MCU is power consumption. Sleep modi deserve special attention, as in many applications low duty cycles are essential for lifetime extension. Just as in the case of the rad io module, a fast wake-up time is important. Most CPUs used in lower-end sensor nodes have clock speeds of a few MHz. The memory requirements depend on the pplication and the network topology: data storage is not critical if data are often relayed to a base station. Berkeley motes, UCLAââ¬â¢s Medusa MK-2 and ETHZââ¬â¢s BTnodes use low-cost Atmel AVR 8-bit RISC microcontrollers which consume about 1500 pJ/instruction. More sophisticated platforms, such as the Intel iMote and Rockwell WINS nodes, use Intel StrongArm/XScale 32-bit processors. Sensing The high sampling rates of modern digital sensors are usually not needed in sensor networks. The power efficiency of sensors and their turn-on and turn-off time are much more important. Additional issues are the physical ize of the sensing hardware, fabrication, and assembly compatibility with other components of the system. Packaging requirements come into play, for instance, with chemical sensors which require contact with the envi ronment [D42]. Using a microcontroller with an onchip analog comparator is another energy-saving technique which allows the node to avoid sampling values falling outside a certain range [D43]. The ADC which complements analog sensors is particularly critical, as its resolution has a direct impact on energy consumption. Fortunately, typical sensor network applications do not have stringent resolution requirements.Micromachining techniques have allowed the miniaturization of many types of sensors. Performance does decrease with sensor size, but for many sensor network applications size matters much more than accuracy. Standard integrated circuits may also be used as temperature sensors (e. g. , using the temperaturedependence of subthreshold MOSFETs and pn junctions) or light intensity transducers (e. g. , using photodiodes or phototransistors) [D44]. Nanosensors can offer promising solutions for biological and chemical sensors while concurrently meeting the most ambitious miniaturiza tion needs. 5. Existing Hardware PlatformsBerkeley motes, made commercially available by Crossbow, are by all means the best known sensor node hardware implementation, used by more than 100 research organizations. They consist of an embedded microcontroller, low-power radio, and a small memory, and they are powered by two AA batteries. MICA and MICA2 are the most successful families of Berkeley motes. The MICA2 platform, whose layout is shown in Figure 4, is equipped with an Atmel ATmega128L and has a CC1000 transceiver. A 51-pin expansion connector is available to interface sensors (commercial sensor boards designed for this specific platform are available).Since the MCU is to handle 24 IEEE CIRCUITS AND SYSTEMS MAGAZINE THIRD QUARTER 2005 medium access and baseband processing, a fine-grained event-driven real-time operating system (TinyOS) has been implemented to specifically address the concurrency and resource management needs of sensor nodes. For applications that require a bet ter form factor, the circular MICA2Dot can be used: it has most of the resources of MICA2, but is only 2. 5 cm in diameter. Berkeley motes up to the MICA2 generation cannot interface with other wireless- enabled devices [E47]. However, the newer generations MICAz and Telos support IEEE 802. 15. , which is part of the 802. 15 Wireless Personal Area Network (WPAN) standard being developed by IEEE. At this point, these devices represent a very good solution for generic sensing nodes, even though their unit cost is still relatively high (about $100ââ¬â$200). The proliferation of different lowerend hardware platforms within the Berkeley mote family has recently led to the development of a new version of TinyOS which introduces a flexible hardware abstraction architecture to simplify multi-platform support [E48]. Tables 1 and 2 show an overview of the radio transceivers and the microcontrollers most commonly used in xisting hardware platforms; an overview of the key features of the pl atforms is provided in Table 3. Intel has designed its own iMote [E49] to implement various improvements over available mote designs, such as increased CPU processing power, increased main memory size for on-board computing and improved radio reliability. In the iMote, a powerful ARM7TDMI core is complemented by a large main memory and non-volatile storage area; on the radio side, Bluetooth has been chosen. Various platforms have been developed for the use of Berkeley motes in mobile sensor networks to enable investigations into controlled mobility, which facilitates eployment and network repair and provides possibilities for the implementation of energy-harvesting. UCLAââ¬â¢s RoboMote [E50], Notre Dameââ¬â¢s MicaBot [E51] and UC Berkeleyââ¬â¢s CotsBots [E52] are examples of efforts in this direction. UCLAââ¬â¢s Medusa MK-2 sensor nodes [E53], developed for the Smart Kindergarten project, expand Berkeley motes with a second microcontroller. An on-board power management a nd tracking unit monitors power consumption within the different subsystems and selectively powers down unused parts of the node. UCLA has also developed iBadge [E54], a wearable sensor node with sufficient computational power to process the sensed data.Built around an ATMega128L and a DSP, it features a Localization Unit designed to estimate the position of iBadge in a room based on the presence of special nodes of known location attached to the ceilings. In the context of the EYES project (a joint effort among several European institutions) custom nodes [E55], [C24] have been developed to test and demonstrate energy-efficient networking algorithms. On the software side, a proprietary operating system, PEEROS (Preemptive EYES Real Time Operating System), has been implemented. The Smart-Its project has investigated the possibility of embedding computational power into objects, leading o the creation of three hardware platforms: DIY Smartits, Particle Computers and BTnodes. The DIY S mart-its [E56] have been developed in the UK at Lancaster University; their modular design is based on a core board that provides processing and communication and can be extended with add-on boards. A typical setup of Smart-its consists of one or more sensing nodes that broadcast their data to a base station which consists of a standard core board connected to the serial port of a PC. Simplicity and extensibility are the key features of this platform, which has been developed for the creation of Smart Objects.An interesting application is the Weight Table: four load cells placed underneath a coffee table form a Wheatstone bridge and are connected to a DIY node that observes load changes, determines event types like placement and removal of objects or a person moving a finger across the surface, and also retrieves the position of an object by correlating the values of the individual load cells after the event type (removed or placed) has been recognized [E57]. Particle Computers have been developed at the University of Karlsruhe, Germany. Similarly to the DIY platform, the Particle Smart-its are based on a core board quipped with a Microchip PIC; they are optimized for energy efficiency, scalable communication and small scale (17 mm ? 30 mm). Particles communicate in an ad hoc fashion: as two Particles come close to one another, THIRD QUARTER 2005 IEEE CIRCUITS AND SYSTEMS MAGAZINE 25 Oscillator 7. 3728-MHz DS2401P Silicon Serial No. Antenna Connector Connector LEDs Battery Connection 32. 768-kHz Oscillator 14. 7456-MHz Oscillator ATMEL ATMega 128L CPU CC1000 Transceiver ATMEL AT45DB041 Data Flash Figure 4. Layout of the MICA2 platform. they are able to talk. Additionally, if Particles come near a gateway device, they can be connected to Internet-enabled evices and access services and information on the Internet as well as provide information [E58]. The BTnode hardware from ETHZ [E47] is based on an Atmel ATmega128L microcontroller and a Bluetooth module. Altho ugh advertised as a low-power technology, Bluetooth has a relatively high power consumption, as discussed before. It also has long connection setup times and a lower degree of freedom with respect to possible network topologies. On the other hand, it ensures interoperability between different devices, enables application development through a standardized interface, and offers a significantly higher bandwidth (about 1 Mbps) ompared to many low-power radios (about 50 Kbps). Moreover, Bluetooth support means that COTS hardware can be used to create a gateway between a sensor network and an external network (e. g. , the Internet), as opposed to more costly proprietary solutions [E59]. MIT is working on the ? AMPS (? -Adaptive Multidomain Power-aware Sensors) project, which explores energy-efficiency constraints and key issues such as selfconfiguration, reconfigurability, and flexibility. A first prototype has been designed with COTS components: three stackable boards (processing, radio and power) and an ptional extension module. The energy dissipation of this microsensor node is reduced through a variety of poweraware design techniques [D45] including fine-grain shutdown of inactive components, dynamic voltage and frequency scaling of the processor core, and adjustable radio transmission power based on the required range. Dynamic voltage scaling is a technique used for active power management where the supply voltage and clock frequency of the processor are regulated depending on the computational load, which can vary significantly based on the operational mode [D36], [C20]. The main oal of second generation ? AMPS is clearly stated in [D46] as breaking the 100 ? W average power barrier. Another interesting MIT project is the Pushpin computing system [E60], whose goal is the modelling, testing, and deployment of distributed peer-to-peer sensor networks consisting of many identical nodes. The pushpins are 18 mm ? 18 mm modular devices with a power substrate, an in frared communication module, a processing module (Cygnal C8051F016) and an expansion module (e. g. , for sensors); they are powered by direct contact between the power substrate and layered conductive sheets. 26 MCU Max.Freq. [MHz] Memory Data Size [bits] ADC [bits] Architecture AT90LS8535 (Atmel) 4 8 kB Flash, 512B EEPROM, 512B SRAM 8 10 AVR ATMega128L (Atmel) 8 128 kB Flash, 4 kB EEPROM, 4 kB SRAM 8 10 AVR AT91FR4081 (Atmel) 33 136 kB On-Chip SRAM, 8 Mb Flash 32 ââ¬â Based on ARM core (ARM7TDMI) MSP430F149 (TI) 8 60 kB + 256B Flash, 2 kB RAM 16 12 Von Neumann C8051F016 (Cygnal) 25 2304B RAM, 32 kB Flash 8 10 Harvard 8051 PIC18F6720 (Microchip) 25 128 kB Flash, 3840B SRAM, 1 kB EEPROM 8 10 Harvard PIC18F252 (Microchip) 40 32 K Flash, 1536B RAM, 256B EEPROM 8 10 Harvard StrongARM SA-1110 (Intel) 133 ââ¬â 32 ââ¬â ARM v. 4PXA255 (Intel) 400 32 kB Instruction Cache, 32 kB Data 32 ââ¬â ARM v. 5TE Cache, 2 kB Mini Data Cache Table 2. Microcontrollers used in sensor node p latforms. Radio (Manufacturer) Band [MHz] Max. Data Rate [kbps] Sensit. [dBm] Notes TR1000 (RFM) 916. 5 115. 2 ? 106 OOK/ASK TR1001 (RFM) 868. 35 115. 2 ? 106 OOK/ASK CC1000 (Chipcon) 300ââ¬â1,000 76. 8 ? 110 FSK, ? 20 to 10 dBm CC2420 (Chipcon) 2,400 250 ? 94 OQPSK, ? 24 to 0 dBm, IEEE 802. 15. 4, DSSS BiM2 (Radiometrix) 433. 92 64 ? 93 9XStream (MaxStream) 902ââ¬â928 20 ? 114 FHSS Table 1. Radios used in sensor node platforms. IEEE CIRCUITS AND SYSTEMS MAGAZINE THIRD QUARTER 2005MIT has also built Tribble (Tactile reactive interface built by linked elements), a spherical robot wrapped by a wired skinlike sensor network designed to emulate the functionalities of biological skin [E61]. Tribbleââ¬â¢s surface is divided into 32 patches with a Pushpin processing module and an array of sensors and actuators. At Lancaster University, surfaces provide power and network connectivity in the Pin&Play project. Network nodes come in different form factors, but all share the Pin&Play connector, a custom component that allows physical connection and networking through conductive sheets which re embedded in surfaces such as a wall or a bulletin board [E62]. Pin&Play falls in between wired and wireless technologies as it provides network access and power across 2D surfaces. Wall-mounted objects are especially suited to be augmented to become Pin&Play objects. In a demonstration, a wall switch was augmented and freely placed anywhere on a wall with a Pin&Play surface as wallpaper. For applications which do not call for the minimization of power consumption, high-end nodes are available. Rockwellis WINS nodes and Sensoriaââ¬â¢s WINS 3. 0 Wireless Sensing Platform are equipped with more powerful rocessors and radio systems. The embedded PC modules based on widely supported standards PC/104 and PC/104-plus feature Pentium processors; moreover, PC/104 peripherals include digital I/O devices, sensors and actuators, and PC-104 products support almost all PC software. PFU Systemsââ¬â¢ Plug-N-Run products, which feature Pentium processors, also belong to this category. They offer the capabilities of PCs and the size of a sensor node, but lack built-in communication hardware. COTS components or lower-end nodes may be used in this sense [C32]. Research is underway toward the creation of sensor nodes that are more capable than the motes, yet maller and more power-efficient than higher-end nodes. Simple yet effective gateway devices are the MIB programming boards from Crossbow, which bridge networks of Berkeley motes with a PC (to which they interface using the serial port or Ethernet). In the case of Telos motes, any generic node (i. e. , any Telos mote) can act as a gateway, as it may be connected to the USB port of a PC and bridge it to the network. Of course, more powerful gateway devices are also available. Crossbowââ¬â¢s Stargate is a powerful embedded computing platform (running Linux) with enhanced communication and sensor signal process ing capabilities based n Intel PXA255, the same X-Scale processor that forms the core of Sensoria WINS 3. 0 nodes. Stargate has a connector for Berkeley motes, may be bridged to a PC via Ethernet or 802. 11, and includes built-in Bluetooth support. 6. Closing Remarks Sensor networks offer countless challenges, but their versatility and their broad range of applications are eliciting more and more interest from the research community as well as from industry. Sensor networks have the potential of triggering the next revolution in information technology. The challenges in terms of circuits and systems re numerous: the development of low-power communication hardware, low-power microcontrollers, MEMSbased sensors and actuators, efficient AD conversion, and energy-scavenging devices is necessary to enhance the potential and the performance of sensor networks. System integration is another major challenge that sensor networks offer to the circuits and systems research community. We believ e that CAS can and should have a significant impact in this emerging, exciting area. 27 Platform CPU Comm. External Memory Power Supply WesC (UCB) AT90LS8535 TR1000 32 kB Flash Lithium Battery MICA (UCB, Xbow) ATMega128L TR1000 512 kB Flash AAMICA2 (UCB, Xbow) ATMega128L CC1000 512 kB Flash AA MICA2Dot (UCB, Xbow) ATMega128L CC1000 512 kB Flash Lithium Battery MICAz (UCB, Xbow) ATMega128L CC2420 512 kB Flash AA Telos (Moteiv) MSP430F149 CC2420 512 kB Flash AA iMote (Intel) ARM7TDMI Core Bluetooth 64 kB SRAM, 512 kB Flash AA Medusa MK-2 (UCLA) ATMega103L TR1000 4 Mb Flash Rechargeable Lithium Ion AT91FR4081 iBadge (UCLA) ATMega128L Bluetooth, TR1000 4 Mb Flash Rechargeable Lithium Ion DIY (Lancaster University) PIC18F252 BiM2 64 Kb FRAM AAA, Lithium, Rechargeable Particle (TH) PIC18F6720 RFM TR1001 32 kB EEPROM AAA or Lithium Coin Battery or RechargeableBT Nodes (ETHZ) ATMega128L Bluetooth, CC1000 244 kB SRAM AA ZebraNet (Princeton) MSP430F149 9XStream 4 Mb Flash Lithium Ion Pushpin (MIT) C8051F016 Infrared ââ¬â Power Substrate WINS 3. 0 (Sensoria) PXA255 802. 11b 64 MB SDRAM, 32 MB + 1 GB Flash Batteries Table 3. Hardware features of various platforms. THIRD QUARTER 2005 IEEE CIRCUITS AND SYSTEMS MAGAZINE Acknowledgments The support of NSF (grants ECS 03-29766 and CAREER CNS 04-47869) is gratefully acknowledged. References General References [A1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, ââ¬Å"A survey on sensor networks,â⬠in IEEE Communications Magazine, pp. 02ââ¬â114, Aug. 2002. [A2] L. B. Ruiz, L. H. A. Correia, L. F. M. Vieira, D. F. Macedo, E. F. Nakamura, C. M. S. Figueiredo, M. A. M. Vieira, E. H. B. Maia, D. Camara, A. A. F. Loureiro, J. M. S. Nogueira, D. C. da Silva Jr. , and A. O. Fernandes, ââ¬Å"Architectures for wireless sensor networks (In Portuguese),â⬠in Proceedings of the 22nd Brazilian Symposium on Computer Networks (SBRCââ¬â¢04), Gramado, Brazil, pp. 167ââ¬â218, May 2004. Tutorial. ISBN: 85-8 8442-82-5. [A3] C. Y. Chong and S. P. Kumar, ââ¬Å"Sensor networks: Evolution, opportunities, and challenges,â⬠in IEEE Proceedings, pp. 1247ââ¬â1254, Aug. 003. [A4] M. Haenggi, ââ¬Å"Opportunities and Challenges in Wireless Sensor Networks,â⬠in Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, M. Ilyas and I. Mahgoub, eds. , Boca Raton, FL, pp. 1. 1ââ¬â1. 14, CRC Press, 2004. [A5] J. Hill, System Architecture for Wireless Sensor Networks. Ph. D. thesis, University of California at Berkeley, Spring 2003. Applications [B6] A. Mainwaring, J. Polastre, R. Szewczyk, D. Culler, and J. Anderson, ââ¬Å"Wireless sensor networks for habitat monitoring,â⬠in First ACM Workshop on Wireless Sensor Networks and Applications, Atlanta, GA, Sept. 002. [B7] A. Cerpa, J. Elson, D. Estrin, L. Girod, M. Hamilton, and J. Zhao, ââ¬Å"Habitat monitoring: Application driver for wireless communications technology,â⬠in ACM SIGCOMM Workshop on Data Comm unications in Latin America and the Caribbean, San Jose, Costa Rica, Apr. 2001. [B8] E. Biagioni and K. Bridges, ââ¬Å"The application of remote sensor technology to assist the recovery of rare and endangered species,â⬠International Journal of High Performance Computing Applications, vol. 16, pp. 315ââ¬â324, Aug. 2002. [B9] P. Juang, H. Oki, Y. Wang, M. Martonosi, L. Peh, and D.Rubenstein, ââ¬Å"Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with ZebraNet,â⬠in Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X), San Jose, CA, Oct. 2002. [B10] G. Werner-Allen, J. Johnson, M. Ruiz, J. Lees, and M. Welsh, ââ¬Å"Monitoring volcanic eruptions with a wireless sensor network,â⬠in Proceedings of the Second European Workshop on Wireless Sensor Networks (EWSNââ¬â¢05), Jan. 2005. [B11] J. Burrell, T. Brooke, and R. Beckwith, ââ¬Å"Vineyard comp uting: Sensor networks in agricultural production,â⬠IEEE Pervasive Computing, vol. , no. 1, pp. 38ââ¬â45, 2004. [B12] M. Srivastava, R. Muntz, and M. Potkonjak, ââ¬Å"Smart kindergarten: Sensor- based wireless networks for smart developmental problem-solving enviroments,â⬠in Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MobiComââ¬â¢01), Rome, Italy, pp. 132ââ¬â138, 2001. [B13] T. Fulford-Jones, D. Malan, M. Welsh, and S. Moulton, ââ¬Å"CodeBlue: An ad hoc sensor network infrastructure for emergency medical care,â⬠in International Workshop on Wearable and Implantable Body Sensor Networks, London, UK, 2004. [B14] D. Myung, B. Duncan, D. Malan, M. Welsh, M.Gaynor, and S. Moulton, ââ¬Å"Vital dust: Wireless sensors and a sensor network for realtime patient monitoring,â⬠in 8th Annual New England Regional Trauma Conference, Burlington, MA, 2002. [B15] ââ¬Å"Self-healing Minesâ⬠http://www. darpa. mil/ ato/programs/SHM/. [B16] M. Maroti, G. Simon, A. Ledeczi, and J. Sztipanovits, ââ¬Å"Shooter localization in urban terrain,â⬠IEEE Computer, vol. 37, pp. 60ââ¬â61, Aug. 2004. [B17] P. Gibbons, B. Karp, Y. Ke, S. Nath, and S. Seshan, ââ¬Å"IrisNet: An architecture for a worldwide sensor web,â⬠IEEE Pervasive Computing, vol. 2, no. 4, pp. 22ââ¬â33, 2003. [B18] P. Gibbons, B. Karp, Y. Ke, S.Nath, and S. Seshan, ââ¬Å"IrisNet: An Architecture for Enabling Sensor-Enriched Internet Service,â⬠Tech. Rep. IRP-TR-03-04, Intel Research, Pittsburgh, PA, June 2003. Characteristic Features Lifetime [C19] A. Goldsmith and S. Wicker, ââ¬Å"Design challenges for energy-constrained ad hoc wireless networks,â⬠IEEE Wireless Communications Magazine, vol. 9, pp. 8ââ¬â27, Aug. 2002. [C20] L. Yuan and G. Qu, ââ¬Å"Energy-efficient Design of Distributed Sensor Networks,â⬠in Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, M. Ilyas and I. M ahgoub, eds. , Boca Raton, FL, pp. 38. 1ââ¬â38. 19, CRC Press, 2004. [C21] M.Haenggi, ââ¬Å"Twelve Reasons not to Route over Many Short Hops,â⬠in IEEE Vehicular Technology Conference (VTCââ¬â¢04 Fall), Los Angeles, CA, Sept. 2004. [C22] M. Haenggi, ââ¬Å"Energy-Balancing Strategies for Wireless Sensor Networks,â⬠in IEEE International Symposium on Circuits and Systems (ISCASââ¬â¢03), Bangkok, Thailand, May 2003. Coverage [C23] S. Meguerdichian, F. Koushanfar, M. Potkonjak, and M. Srivastava, ââ¬Å"Coverage problems in wireless ad-hoc sensor networks,â⬠in Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOMââ¬â¢01), vol. 3, Anchorage, AK, pp. 1380ââ¬â1387, Apr. 001. Maintenance [C24] N. Reijers and K. Loangendoen, ââ¬Å"Efficient code distribution in wireless sensor networks,â⬠in Second ACM International Workshop on Wireless Sensor Networks and Applications, San Diego, CA, Sept. 2003. [C 25] D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, ââ¬Å"Highly resilient, energy efficient multipath routing in wireless sensor networks,â⬠in Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHocââ¬â¢01), Long Beach, CA, pp. 251ââ¬â254, 2001. Localization and Synchronization [C26] M. Mauve, H. Hartenstein, H. Fuessler, J. Widmer, and W.Effelsberg, ââ¬Å"Positionsbasiertes Routing fuer die Kommunikation zwischen Fahrzeugen,â⬠itââ¬âInformation Technology (formerly it + ti)ââ¬âMethoden und innovative Anwendungen der Informatik und Informationstechnik, vol. 44, pp. 278ââ¬â286, Oct. 2002. [C27] F. Sivrikaya and B. Yener, ââ¬Å"Time synchronization in sensor networks: A survey,â⬠IEEE Network, vol. 18, pp. 45ââ¬â50, Julyââ¬âAug. 2004. Data Collection, Routing, and Architectures [C28] R. C. Shah, S. Roy, S. Jain, and W. Brunette, ââ¬Å"Data MULEs: Modeling and analysis of a three-tier arch itecture for sparse sensor networks,â⬠in Ad Hoc Networks Journal, vol. 1, pp. 215ââ¬â233, Elsevier, Sept. 2003. [C29] A.Chakrabarti, A. Sabharwal, and B. Aazhang, ââ¬Å"Using predictable observer mobility for power efficient design of sensor networks,â⬠in Information Processing in Sensor Networks (IPSNââ¬â¢03), Palo Alto, CA, Apr. 2003. [C30] O. Younis and S. Fahmy, ââ¬Å"HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad-hoc Sensor Networks,â⬠in IEEE Transactions on Mobile Computing, vol. 3, pp. 366ââ¬â379, 2004. [C31] R. Govindan, J. Hellerstein, W. Hong, S. Madden, M. Franklin, and S. Shenker, ââ¬Å"The Sensor Network as a Database,â⬠Tech. Rep. 02ââ¬â771, University of Southern California, 2002. ftp://ftp. usc. edu/pub/csinfo/ tech-reports/papers/02-771. df. [C32] M. Yarvis and W. Ye, ââ¬Å"Tiered Architectures in Sensor Networks,â⬠in Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, M. Ilyas and I. Mahgoub, eds. , Boca Raton, FL, pp. 13. 1ââ¬â13. 22, CRC Press, 2004. Security [C33] F. Stajano and R. Anderson, ââ¬Å"The resurrecting duckling: Security issues for ad-hoc wireless networks,â⬠in 7th International Workshop on Security Protocols, Cambridge, UK, Apr. 1999. [C34] T. Martin, M. Hsiao, D. Ha, and J. Krishnaswami, ââ¬Å"Denial-of-service attacks on battery-powered mobile computers,â⬠in Proceedings of the 2nd IEEE Pervasive Computing Conference, Orlando, FL, pp. 09ââ¬â318, Mar. 2004. Hardware [D35] C. Schurgers, O. Aberthorne, and M. Srivastava, ââ¬Å"Modulation scaling for energy aware communication systems,â⬠in Proceedings of the 2001 International Symposium on Low Power Electronics and Design, 28 IEEE CIRCUITS AND SYSTEMS MAGAZINE THIRD QUARTER 2005 Huntington Beach, CA, pp. 96ââ¬â99, Aug. 2001. [D36] A. P. Chandrakasan, R. Min, M. Bhardwaj, S. Cho, and A. Wang, ââ¬Å"Power aware wireless microsensor systems,â⬠in 28th European Solid- State Circuits Conference (ESSCIRCââ¬â¢02), Florence, Italy, 2002. [D37] S. Roundy, P. Wright, and J. Rabaey, ââ¬Å"A study of low level vibrations as a power source for ireless sensor nodes,â⬠Computer Communications, vol. 26, pp. 1131ââ¬â1144, July 2003. [D38] J. Kymissis, C. Kendall, J. Paradiso, and N. Gershenfeld, ââ¬Å"Parasitic power harvesting in shoes,â⬠in Proceedings of the 2nd IEEE International Symposium on Wearable Computers (ISWCââ¬â¢04), Pittsburgh, PA, Oct. 1998. [D39] A. J. Appleby, Fuel Cell Handbook, New York, NY: Van Reinhold Co. , 1989. [D40] W. C. Chung and D. S. Ha, ââ¬Å"An Accurate Ultra WideBand (UWB) Ranging for precision asset location,â⬠in International Conference on UWB Systems and Technologies, Reston, VA, Nov. 2002. [D41] M. Vieira, D. da Silva Jr. C. C. Jr. , and J. da Mata, ââ¬Å"Survey on wireless sensor network devices,â⬠in Proceedings of the 9th IEEE International Conference on Emerging Techno logies and Factory Automation (ETFAââ¬â¢03), Lisbon, Portugal, Sept. 2003. [D42] B. A. Warneke and K. S. J. Pister, ââ¬Å"MEMS for distributed wireless sensor networks,â⬠in Proceedings of the 9th International Conference on Electronics, Circuits and Systems (ICECSââ¬â¢02), vol. 1, Dubrovnik, Croatia, pp. 291ââ¬â294, 2002. [D43] Z. Karakehayov, ââ¬Å"Low-Power Design for Smart Dust Networks,â⬠in Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, M.Ilyas and I. Mahgoub, eds. , Boca Raton, FL, pp. 37. 1ââ¬â37. 12, CRC Press, 2004. [D44] B. Warneke, ââ¬Å"Miniaturizing Sensor Networks with MEMS,â⬠in Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, M. Ilyas and I. Mahgoub, eds. , Boca Raton, FL, pp. 5. 1ââ¬â5. 19, CRC Press, 2004. [D45] R. Min, M. Bhardwaj, S. Cho, A. Sinha, E. Shih, A. Wang, and A. P. Chandrakasan, ââ¬Å"An Architecture for a Power-Aware Distributed Microsensor Node,â⬠in IEEE Wor kshop on Signal Processing Systems (SiPSââ¬â¢00), Lafayette, LA, Oct. 2000. [D46] D. D. Wentzloff, B. H.Calhoun, R. Min, A. Wang, N. Ickes, and A. P. Chandrakasan, ââ¬Å"Design considerations for next generation wireless power-aware microsensor nodes,â⬠in Proceedings of the 17th International Conference on VLSI Design, Mumbai, India, pp. 361ââ¬â367, 2004. Existing Platforms [E47] J. Beutel, O. Kasten, M. Ringwald, F. Siegemund, and L. Thiele, ââ¬Å"Poster abstract: Btnodesââ¬âa distributed platform for sensor nodes,â⬠in Proceedings of the First International Conference on Embedded Networked Sensor Systems (SenSys-03), Los Angeles, CA, Nov. 2003. [E48] V. Handziski, J. Polastre, J. H. Hauer, C. Sharp, A. Wolisz, and D. Culler, ââ¬Å"Flexible hardware abstraction for wireless sensor networks,â⬠in Proceedings of the 2nd International Workshop on Wireless Sensor Networks (EWSN 2005), Istanbul, Turkey, Jan. 2005. [E49] R. M. Kling, ââ¬Å"Intel Mote: An En hanced Sensor Network Node,â⬠in International Workshop on Advanced Sensors, Structural Health Monitoring and Smart Structures at Keio University, Tokyo, Japan, Nov. 2003. [E50] K. Dantu, M. Rahimi, H. Shah, S. Babel, A. Dhariwal, and G. Sukhatme, ââ¬Å"Robomote: Enabling Mobility In Sensor Networks,â⬠Tech. Rep.CRES-04-006, University of Southern California. [E51] M. B. McMickell, B. Goodwine, and L. A. Montestruque, ââ¬Å"MICAbot: A robotic platform for large-scale distributed robotics,â⬠in Proceedings of International Conference on Intelligent Robots and Systems (ICRAââ¬â¢03), vol. 2, Taipei, Taiwan, pp. 1600ââ¬â1605, 2003. [E52] S. Bergbreiter and K. S. J. Pister, ââ¬Å"CotsBots: An Off-the-Shelf Platform for Distributed Robotics,â⬠in Proceedings of the 2003 IEEE International Conference on Intelligent Robots and Systems (ICRAââ¬â¢03), Las Vegas, NV, Oct. 2003. [E53] A. Savvides and M. B.Srivastava, ââ¬Å"A distributed computation platform for wireless embedded sensing,â⬠in 20th International Conference on Computer Design (ICCDââ¬â¢02), Freiburg, Germany, Sept. 2002. [E54] S. Park, I. Locher, and M. Srivastava, ââ¬Å"Design of a wearable sensor badge for smart kindergarten,â⬠in 6th International Symposium on Wearable Computers (ISWC2002), Seattle, WA, pp. 13. 1ââ¬â13. 22, Oct. 2002. [E55] L. F. W. van Hoesel, S. O. Dulman, P. J. M. Havinga, and H. J. Kip, ââ¬Å"Design of a low-power testbed for Wireless Sensor Networks and verification,â⬠Tech. Rep. R-CTIT-03-45, University of Twente, Sept. 2003. [E56] M.Strohbach, ââ¬Å"The smart-its platform for embedded contextaware systems,â⬠in Proceedings of the First International Workshop on Wearable and Implantable Body Sensor Networks, London, UK, Apr. 2004. [E57] A. Schmidt, M. Strohbach, K. V. Laerhoven, and H. -W. Gellersen, ââ¬Å"Ubiquitous interactionââ¬âUsing surfaces in everyday environments as pointing devices,â⬠in 7th ERCIM Wo rkshop ââ¬Å"User Interfaces For All,â⬠Chantilly, France, 2002. [E58] M. Beigl, A. Krohn, T. Zimmer, C. Decker, and P. Robinson, ââ¬Å"Aware- Con: Situation aware context communication,â⬠in The Fifth International Conference on Ubiquitous Computing (Ubicompââ¬â¢03), Seattle, WA, Oct. 003. [E59] J. Beutel, O. Kasten, F. Mattern, K. Roemer, F. Siegemund, and L. Thiele, ââ¬Å"Prototyping sensor network applications with BTnodes,â⬠in IEEE European Workshop on Wireless Sensor Networks (EWSNââ¬â¢04), Berlin, Germany, Jan. 2004. [E60] J. Lifton, D. Seetharam, M. Broxton, and J. Paradiso, ââ¬Å"Pushpin computing system overview: A platform for distributed, embedded, ubiquitous sensor networks,â⬠in Proceedings of the Pervasive Computing Conference, Zurich, Switzerland, Aug. 2002. [E61] J. A. Paradiso, J. Lifton, and M. Broxton, ââ¬Å"Sensate mediaââ¬âmultimodal electronic skins as dense sensor networks,â⬠BT Technology Journal, vol. 2, pp. 32ââ¬â 44, Oct. 2004. [E62] K. V. Laerhoven, N. Villar, and H. -W. Gellersen, ââ¬Å"Pin&Mix: When Pins Become Interaction Components. . . ,â⬠in Physical Interaction (PI03)ââ¬â Workshop on Real World User Interfacesâ⬠ââ¬âMobile HCI Conference, Udine, Italy, Sept. 2003. Daniele Puccinelli received a Laurea degree in Electrical Engineering from the University of Pisa, Italy, in 2001. After spending two years in industry, he joined the graduate program in Electrical Engineering at the University of Notre Dame, and received an M. S. Degree in 2005. He is currently working toward his Ph. D. degree.His research has focused on cross-layer approaches to wireless sensor network protocol design, with an emphasis on the interaction between the physical and the network layer. Martin Haenggi received the Dipl. Ing. (M. Sc. ) degree in electrical engineering from the Swiss Federal Institute of Technology in Zurich (ETHZ) in 1995. In 1995, he joined the Signal and Information Process ing Laboratory at ETHZ as a Teaching and Research Assistant. In 1996 he earned the Dipl. NDS ETH (post-diploma) degree in information technology, and in 1999, he completed his Ph. D. thesis on the analysis, design, and optimization of ellular neural networks. After a postdoctoral year at the Electronics Research Laboratory at the University of California in Berkeley, he joined the Department of Electrical Engineering at the University of Notre Dame as an assistant professor in January 2001. For both his M. Sc. and his Ph. D. theses, he was awarded the ETH medal, and he received an NSF CAREER award in 2005. For 2005/06, he is a CAS Distinguished Lecturer. His scientific interests include networking and wireless communications, with an emphasis on ad hoc and sensor networks. THIRD QUARTER 2005 IEEE CIRCUITS AND SYSTEMS MAGAZINE 29
Sunday, September 29, 2019
Stop Thief!
It was Christmas, the mall was pretty vivid and splashy, there were all sorts of ornaments hanging around the mall. As I moved from shop to shop, I saw beautiful new fashioned clothes, iPods, wooden antiques, decoration items and Santa of course. Different types of Christmas cards, greetings, bouquet, and box of chocolates, teddies and Santa costumes were displayed on every corner waiting to be sold out. This was my first trip to Canada and I was really enjoying the every cold chilli weather of the country.I was about to travel the following day to my uncle who had shifted there 15 years ago. And I was really very eager to see my cousins for the first time. As I was walking through the mall when I just saw what I was waiting for, a shop decorated with fine beautiful painting perfect for a beautiful house like my uncles one, I looked at the paintings and then I looked to the money in my purse which I had been saving for 2 years I wanted to buy one for my uncle so that he says ââ¬Å"O h! Dear how sweet of youâ⬠¦!â⬠Suddenly, breaking into my day dreams a boy of 24 or so just like my big brother suited in a detective uniform with black hat, and black glasses, his face covered came running past me shouting ââ¬Å"stop him, catch him donââ¬â¢t let him goâ⬠and tripped at my feet. I said sorry to him and gave him a hand to get up, he got up and gave me a slight push and I felt something tickle down my purse as he wiped his clothes and kept running I thought for a while that are all Canadians manner less that they run away without even saying a ââ¬Å"Thank Youâ⬠.I then just dismissed the subject and forgot about it and kept walking thinking to buy the painting I was looking forward to and some winter clothes to help me stay alive here in this cold, as I entered a shop I took the perfect jeans and some winter clothes thinking I would next buy the painting, I went happily to the counter waiting for the bill to be given to me when I got the amount I was not really shocked because that amount was not much but when I looked to my purse I was more shocked when I looked inside, the zip was open and the money was gone I had no hope now that I would find it again.
Saturday, September 28, 2019
HRM & Employment Relations Essay Example | Topics and Well Written Essays - 1500 words
HRM & Employment Relations - Essay Example bloggers to the creation of content that captures the attention of the public ensures that the repetitive action of content creation and content regeneration never ceases, because the audiences are always looking to read and respond to the blogs. Therefore, blogging reinforces effective networking, without encouraging or displacing the consolidation of the blogging networks (). Nevertheless, blogging is a highly personal style of writing to a highly impersonal audience, meaning that it is an effective way of helping interpret the thought process of both the bloggers and the audience who read and responds to the blogs, considering the fact that each of these parties does it on their own terms and in their own style of understanding and reacting to the subject matter (). Then impact of blogs is that it is of the most effective ways of having an organization discuss organizational issues at lengths with the employees, meaning that blogging can highly improve the communication within an organization (). Therefore, blogging is a valuable tool for organizations, since it can make it possible for the organization to understand the feelings, thought process and reaction of individual employees regarding different organizational issues. This is because, blogging entails the application of a highly personalized mode of communication, meaning that it is easy for the organization to understand each of the contributors to the organizational blogs (). However, blogs can be a potential disaster, since they may result in the employees and the organization creating a conflict and misunderstanding regarding various subjects of blogging, which would in turn be transmitted into the physical work environment. Blogs have an influence on face-to-face communication, cons idering the fact that the interaction that is online between the audience and the bloggers is the same that will eventually be transmitted into physical communication (). This means that blogging forms the content of the
Friday, September 27, 2019
What is about 'mercy killing' Essay Example | Topics and Well Written Essays - 1250 words
What is about 'mercy killing' - Essay Example The base of democracy or fundamental human rights mean individuals free will and rights. If so, giving a right to choose pleasant death to a person is also needed. Along the path from life to death, it is essential to choose the way and timing according to ones own faith about death. I am of the opinion that euthanasia should not be allowed unless a patient is very much pain that can end up killing them. Euthanasia has elicited a big debate across the countries in the world whereby some approve the practice while others detest it. These reactions are based on the view that people take towards the practice based on their cultures and traditions. In my cultural context, euthanasia is considered the same as killing another person. A life of a person is very precious, it is a like a taboo that a person should not terminate the life of another irrespective of the means used. There are some areas where euthanasia is totally banned such that even the patient cannot seek it. I do not think is right because the patient knows what they are going through. The procedure of ââ¬Ëmercy killingââ¬â¢ it is not popular across many populations, therefore it skips the minds of many to imagine whether such a procedure is ever done anywhere in the world. I initially never though there was ever such a procedure until I went to high school. In most cases, the less developed parts of the world have ve ry little awareness on this procedure. However, in the developed world, people are very much aware and at times patients request the procedure to be done to them. In this regard, there is no option other that the doctor heed to the patientââ¬â¢s need if the laws allow it. Myself included, a majority of the people have some basic understanding of euthanasia. Across the population, it is important that people understand what this procedure entails; this is because very few are able
Thursday, September 26, 2019
Workplace Monitoring - How Much Is Too Much Essay
Workplace Monitoring - How Much Is Too Much - Essay Example Despite the battle over privacy issues, employers remain firm in enforcing workplace monitoring for a number of reasons. A survey by the American Management Association in 2001 revealed the following as the top reasons: (1) Legal compliance ââ¬â to provide some degree of legal protection for both company and consumer and falls under ââ¬Å"due diligenceâ⬠of a company to keep adequate records; (2) Legal liability ââ¬â to prevent employees from accessing offensive graphic material on computer screens that could escalate hostility in the workplace environment; (3) Performance review ââ¬â to allow supervisors to review, evaluate and improve job performance of customer service and consumer relations personnel based on taped field calls and other sources procured through monitoring; (4) Productivity measures ââ¬â to ensure all activities and communications in the workplace are business related; (5) Security concerns ââ¬â to protect the value of proprietary corpora te information.3 2. Duke L. & Tech. Rev., ââ¬Å"Monitoring employee e-mail: Efficient workplaces vs. employee privacyâ⬠, iBRIEF/ eCommerce, Issue No. 0026, 25 July 2001, 2 May 2007 . 3. American Management Association, ââ¬Å"2001 AMA survey workplace monitoring and surveillance summary of key findingsâ⬠, AMA Research, 2001, 2 May 2007 . There are many ways by which workplace monitoring is performed. But the main idea is that employers have the right to monitor every business activity performed during office hours. In telephone monitoring, an employer may choose to listen to employeesââ¬â¢ phone calls at work for reasons of quality control. Some protection may be accorded to the employee if he is calling from a phone designated for personal calls but if he tries to use a business phone for
Wednesday, September 25, 2019
U.S. GAAP vs. IFRS Research Paper Example | Topics and Well Written Essays - 500 words
U.S. GAAP vs. IFRS - Research Paper Example This allows matching of the accounting contract costs, as well as revenue with the accounting periods in which the construction work takes place (Bohusova, 2009). Another factor is that the accounting of fixed price construction contracts is done using percentage of the completion technique. According to Intermediate Accounting (2008), under such as case, the completed contract method is not permitted; there is no specific guidance on software revenue recognition and the guidance on sales of real estate is limitedâ⬠(p.102). On the other hand, U.S. GAAP is based on rules; thus, it lacks an extensive guidance regarding revenue recognition specific to the type of contract or industry. Its revenue recognition is divided into two levels with the first part being the guidance in concepts statements. In the second level is the guidance for revenue recognition in particular industries, as well as transactions that are economically different. Revenue recognition in this case depends on two criteria that must be met as defined in the FASB Concepts Statement No.5, which notes that revenue must be realizable, as well as earned (Bohusova, 2009). Another point of difference is that in this case, the accounting for the construction contracts uses the percentage-of-completion method only on condition that certain criteria are met; if not the completed contract method is applied. Finally, GAAP unlike IFRS provides for a detailed on the recognition of software revenue, as well as on accounting for real estate sales (Int ermediate Accounting, 2008). In IFRS financial statement, the net income is exclusive of the interest expenses and interest revenues. IFRS reports on interest income with regard to financing activities only happens when the future economic benefits are put in place. On the other hand, GAAP performs report of its income under investing
Tuesday, September 24, 2019
Media Analysis Essay Example | Topics and Well Written Essays - 1250 words
Media Analysis - Essay Example There are radio studios from where the radio signals originate. When a show is being held at a radio studio, the sound waves go into the microphone and are passed to a transmitter, which uses an antenna to send the waves through the air as radio signals. The frequency of the radio signals matches the one in the radio being used, and thus we are able to listen to whatever is being aired from the radio studio. Radio was developed from the idea of telephone and telegraph, all of which are pretty much related. Radio was first used as wireless telegraphy. Radio was not invented right away, but it was the discovery of radio waves which was a major breakthrough. It is because of these waves that the scientists were able to invent the radio, which is has been one of the major forms of communication. It all started back in the 1860s, when a Scottish physicist realized that there existed a kind of waves called radio waves. After a few years, an American dentist was able to perform wireless tel egraphy and established the first form of wireless aerial communication. After him, an Italian inventor, Guglielmo Marconi, was able to establish radio communication and send a wireless telegram across the English Channel. At first, these wireless telegrams were basically dots and dashes, a form of Morse code, but gradually future events demanded that some kind of wireless communication must be present, to communicate with each other in time of need. Therefore, in 1899, the United States army developed wireless communication, and the Navy adopted it too. Before this, the Navy was using pigeons and visual signals to spread the message across. During the first few years of radio, the signals were very distorted and the message could not be spread across clearly. Therefore, AM broadcasting was introduced which amplified the signal received by the radio receiver, and thus increased the clarity if the message being sent. Through this, the first speech was declared from New York City to S an Francisco and across the Atlantic Ocean. Then in 1933, a much improved version came into being, the FM- Frequency Modulation. It increased the clarity of the audio messages being received by the radio receiver by removing the noise static, caused by the electrical device. This was great improvement over the AM broadcast and led to the development of FM broadcasting, which is the main type of radio broadcasting today. Radio communication is possible by the existence of radio waves. These waves have opened a gateway to different forms of communication, and not just the transistor radio or a household radio receiver. Other than AM and FM broadcasting, radio waves are also used to provide picture and sound in televisions, which have antennas connected to them. These antennas catch the radio signals and receive picture and voice through AM and FM radio waves. Satellites, also make use of radio signals to indicate their position to the computers on Earth, and radio waves are also used to communicate with the devices that have been put in the Solar system, such as the Mars Rover. Cell phones and satellite phones which have become increasingly popular in the past decade, also make use of radio waves to connect to telephone networks, which link the call to the desired destination. Other than this, radio waves are also used in remote controls that are used for televisions, and remote controlled cars and also even to detonate explosives. Nowadays,
Monday, September 23, 2019
Creation Research Paper Example | Topics and Well Written Essays - 250 words
Creation - Research Paper Example Conversely, the Buddhist worldview places little emphasis on the creation story and/or the understanding of such a concept as God; choosing instead to focus upon the Four Noble Truths and the Eightfold Path as a means of personal enlightenment. However, it was ultimately stated by the Buddha that the world came into existence over the course of millions and millions of years in which life quite literally evolved within it. Rather than being spoken into existence within the space of a moment in time, the creation story of Buddhism is a seamless and continual loop of life death and rebirth that culminates in the world as we see it today (Schell 2). In such a way, there is not a definitive beginning or end to the earth and the life that it has. Conversely, the Christian approach has a definitive beginning and end. For this reason, the necessity of the faith to have a final rescuer, a redeemer, and a second coming is understood. Benstead, George. "Christian Creation Story." Innovations Learning - Welcome to Innovations Learning. N.p., 11Ã Apr.Ã 2011. Web. 24Ã Feb.Ã 2013.
Sunday, September 22, 2019
Interpersonal Relations in Management Essay Example | Topics and Well Written Essays - 2250 words
Interpersonal Relations in Management - Essay Example Creting idel imges of me nd the outer world is wht describes my personlity. I therefore, live in the present, nd reject who I m t the moment while concentrting who I wnt to be. Since it is impossible to rech the idel, I do not perceive the world s it is nd often disppoint in life. I my thus describe myself s nve person, but lso the one who enjoys life nd sees everything in the best colors. My ego-self is constntly judging nd rejecting its rising stte nd trying to fit itself into certin idel. It is not just being where it is nd llowing itself to unfold freely. s result, it does not understnd where it is for it is invested in being somewhere in prticulr, being certin wy, or in stisfying prticulr idel. nd even if this idel is tken from spiritul techings, the sme mechnism of ego ctivity is in opertion. Trpped in the ego-self, I do not trust tht Being myself will tke me where I need to go. 2. Second, nd eqully importnt, is the bility nd willingness to be tem member, plying dily roles in such fshion tht the whole is lwys greter thn the sum of it's prts. It must be recognized nd ccepted tht no tem is ever stronger thn the wekest member, so tht ech member must be ssigned to mke full use of tlents possessed. 3. 3. Third, tht ll individuls re equl nd tht ech nd ever one must fully recognize tht equlity nd with full cceptnce of the other, but tht we re ll humn beings; ech with our own prticulr weknesses nd strengths; so tht in full tem fshion one's strengths re emphsized nd weknesses re minimized. 4. Finlly, there is the mtter of "fir ply" nd honesty in never ending episode tht is lwys dpted to one's dily life nd the conditions tht emerge in specil situtions. Trustworthiness derives lmost solely from honesty nd fir ply, nd it is the most bsic requisite for success in democrcy. Vlues, beliefs nd spirtions Grown-up person is the one with bunch of experience over his/her shoulders who is conscious nd determined of certin principles nd priorities in life nd who hs come to self identity through the pth of mistkes nd often disppointments. person usully becomes more responsible in ctions nd stedy in opinions when becoming prent. Coming up to the comprehension of importnt notions in life which identify one's personlity prent tries to tech the child most of success, freedom, honesty, intimcy or rcism. However, the child due to his/her individul fetures will identify this issues on his/her own; the prent's obligtion is only to outline the understnding of these concepts so tht they would be their unflinching beliefs nd priorities when mking decisions or stnding behind the choice.I remember myself being child nd remember my vision of these issues. It hs gretly chnged s I becme older nd now I would do my best now so tht my child chooses the pth of life giving miss to my mistkes. First I would li ke to give n dvice regrding the perception of Success. ll my life I reched for success nd found myself decent cndidte to
Saturday, September 21, 2019
Loyalty Program Essay Example for Free
Loyalty Program Essay We go through 7 strategy steps to design a loyalty program for Cabo San Viejo which are as follows: à Before we suggest a customer rewards or loyalty program, it is important to understand what is the companyââ¬â¢s long term vision, For whom this program is to be implemented i. e. who are the companyââ¬â¢s best customers, what are their needs and expectations, the reasons for having such a program and the expected outcome. So the first question is: What is Cabo San Viejoââ¬â¢s long term vision? Was the company directing its activities in overall achievement of this vision? The vision of the company was to help people live healthier lives. Initially there was a gap between the operational objectives of making people lose weight by way of low calorie diet and the vision of getting people to live healthier lives by inculcating sustainable lifestyle ways. However, this gap had been bridged but the positioning gap remained. Who were Cabo San Viejoââ¬â¢s targeted customers? Was there any gap between targeted and actual customers? If we go by the vision statement, anybody wanting to live a better and healthier life was Cabo San Viejoââ¬â¢s targeted customers. These could include smokers, obese men and women, even obese children, stressed couples or singles, workaholic professionals, over worked top executives and managers etc. However, Cabo San Viejo was attracting mostly females (70%-80% of the guests) with an increasing average age over the years, the last average being 57 in the year 2004. Thus, mostly older females were visiting the resort who wanted to indulge themselves and feel better about their body and themselves. Also, their household income was high. Comparing this with the summer guests, the latter group had less income and was also comparatively younger in population. Thus, we can link the age, income level and affordability. Usually younger people are less wealthy and thus find such vacations expensive. Not only this, the perception of Cabo San Viejo first as a fat camp and then as a boot camp was discouraging people to come there. Also, 67% of guests came through word of mouth indicating that the above line marketing was performing poorly. Campaigns targeting specific groups of people showing indulgence in activities of their interest like hiking for young crowd, spa treatment for women, consultation for couples etc would be likely to bring out the varied health solutions offered by Cabo San Viejo. What were the needs of the guests at Cabo San Viejo? Was there any gap in meeting the needs or their expectations? The individual needs of the customers varied quite a lot. To understand and cater to the needs of the customers, the company had efficiently trained its reservation staff who helped customers choose the appropriate package as according to their goals and objectives. The very fact that 95% of the customers rated their experience as either very good or outstanding shows that Cabo San Viejo was operating efficiently. However, if Cabo San Viejo was to target a more demanding and younger customer base in future, it would have to exceed is current delivery promise. The needs have been met but the expectations of repeat customers have not been satisfied some of whom have expressed their resentment for not being rewarded for their continued patronization. Therefore we have recognized: Perception of Cabo San Viejo as a boot camp needed to be changed. â⬠¢Young customers needed to be attracted. As they had higher expectations and smaller pockets, loyalty program needed to focus on value proposition by means of discounts etc. â⬠¢Older customers were mostly wealthier and would not be looking for a value deal like the younger customers. Cabo San Viejo had around 5000 repeat customers each year which a healthy figure is making up about 60% of the total arrival figure. Around 3500 new guests arrive each year of which 32% revisited within 5-6 years and 62% of repeat visitors returned again within 5-6 years. The primary reason for not returning was the high costs. Here we reiterate that to attract more repeat customers, value must be offered. Why does Cabo San Viejo need a customer loyalty program? â⬠¢Retention: One of the primary reasons for most loyalty programs is o retain the loyal customers by appreciating them and the business they generate for the company by making them feel special and good about their association with the company. â⬠¢Offer enhanced value proposition: A loyalty program which offers a value deal to its customers who need it will get Cabo San Viejo more patronization. However, it is to be understood that not all customers need or expect value deals. Enhanced Satisfaction: Recognition by way of loyalty program makes a customer feel good and thus enhances satisfaction which in turn leads to more positive word of mouth. â⬠¢Positive Word of Mouth: Around 60% of Cabo San Viejoââ¬â¢s customers called in for inquiry based on word of mouth. â⬠¢Enhance image as a responsive company: Cabo San Viejo explicitly encourages customers to complain if unsatisfied. It is through such feedbacks that Cabo San Viejo has got to know that customers expect such a program implementation. Whenever a company asks for and receives complaints, it is best to respond or may lead to customer resentment. Counter Competition: If not rewarded for loyalty, customers may switch to other competitors. How much is the desired/expected impact? Having analyzed this, we now estimate the impact. The impact of a loyalty program is usually incremental and observed over a period of time. The expected increase in retention is say, 10%1 over a period of say, 5 years2. Also, people coming from reference is expected to increase over the years enabling the company to cut marketing costs elsewhere. 1The expected retention percentage is found either based on internal company data or industry expert advice.
Friday, September 20, 2019
Concepts Of Leadership And Management Assignment
Concepts Of Leadership And Management Assignment 1.0 Introduction Leadership and management practices are useful to individuals success and that of our organisation. For the benefit of this training programme which is to improve leadership and management in the organisation, this material will equip us on ways to obtain professional information on leadership and management and serve as a self-study exercise for us to have knowledge of basic management and leadership skills which can be applied at various departments in our organisation. It will also make us understand the theories of leadership and management, how to improve motivation and performance through the application of relevant leadership skills and the development and effectiveness of teams. At the end of the training programme, I expect us to see leadership and management skills and practices as a tool of driving the organisation to further development and success. 1.1 Analysis of the concepts of leadership and management Leadership can be defined as a process by which a person influences others to accomplish an objective and directs the organisation in a way that makes it more cohesive and coherent. If you have the desire and willpower, you can become an effective leader. Good leaders are developing through a never ending process of self-study, education, training and experience. While leadership is learned, the skills and knowledge possess by the leaders can be influenced by his or hers attributes or traits such as beliefs, values, ethics and characters. To inspire someone working under us into higher ground of teamwork, there are certain things we must be, know and do. These do not come naturally, but are acquired through continual work practices. Good leaders are continually working and studying to improve the leadership skills in them. Directors of banks do set-up sales target for each of the branches at the beginning of financial year and new products are normally added to the services of the organisation. This shows that goals and objectives have been put in place for followers to work towards. Through this, the sales will be improved and new customers will join the service of the bank considering the new products introduced by the leadership teams. Managers are important group involved in business activity. We normally believe that managers are responsible for getting things done usually through other people. When job roles are giving to us, our respective line managers normally help us in achieving this either through supervision or working together with us. The term manager may refer to a number of different people within a business. Some job titles include the word manager, such as personal manager. Other job holders may also be managers even though their titles do not say it. Managers act on behalf of the owners of a company which is leader. They are accountable for the activities of the company either to the director or shareholders, set objectives for the organisation; make sure the business achieves its objectives, by managing others and ensure that corporate values are maintained in dealing with other business, customers, employees and the general public. It is the act of getting people together to accomplish desired go als and objectives using available resources efficiently and effectively. As a manager in one of the branches, a lot of means will be laid down to achieve the target that has been put in place by the leader such as help (conference/lecture or training) to make other staffs see the big picture of how they are fitted into the plan and achieving it. Management texts contain leadership. Actually, leadership is an important function of management and it is mentioned as one of the five functions of management (Planning, Organizing, Staffing, Leading or Directing and Control). Both roles are very much tied to human interactions and thus personalities and traits are essential requirements. Also, leadership and management exists at every level of management, however, the amount of each varies according to the management hierarchy. For example, the board of this organisation has more of a leadership task which is to provide vision to the company and plan to achieve it, while the head of any department rarely goes beyond determining what the next task should be. Leadership and management task within the organisation depends upon how much it allows for leadership in a particular role? As we all know, our organisation was established to provide effective, efficient and affordable health care delivery services to the people in this locality and beyond. The location also positioned it to become a notable centre for the treatment of accident victims. Also, our objectives include making provision for: A full range of hospital and specialist services to the community; clinical facilities for the education of medical and other students; facilities for medical research etc. For, Irrua Specialist Teaching Hospital to grow and remain healthy, we have to know some elementary skills of management and leadership-skills that will assist us to avoid the crisis situation where we need to do whatsoever that will make us excel in all our services. These elementary skills of management and leadership consist problem solving and decision making, planning, meeting management, delegation, communications and managing ourselves. These basic skills are also fundamental from which to develop more advanced practices in management and leadership. Whenever organisations leaders struggle, its often because they do not know the basics ââ¬â not because they arent doing what they supposed to do in implementing basic practices in management and leadership. Knowledge and skills contributes directly to the process of leadership and management while other attributes give the leader and manager certain qualities that make them different. Skills, knowledge and attributes make the leader or manager, which is one of the factors of leadership and management. The leadership and management process of an organisation involves-developing a vision for the organisation; aligning people with that vision through communication; and motivating people to action through empowerment and through basic need fulfilment. The leadership process creates uncertainty and change in the organisation. In contrast, the management process involves-planning and budgeting; organizing and staffing; and controlling and problem solving. The management process reduces uncertainty and stabilizes the organisation. Paul Hersey and Ken Blanchard give better explanation of the difference between leadership and management. Leadership is not a concept exclusive to or within management. It is a broader concept on its own. Management is thought of as a special kind of leadership in which the accomplishment of organisational goals is paramount. Leadership is influencing the behaviour of someone. Management is planning an objective and achieving that objective. Leadership requires a follower and a leader has to figure out how to influence the follower. Manager has to figure out an objective and theoretically, he may do the job himself and manage the objective. Managers have large number of people under them and they have to lead them to do the work assigned them as part of the organisations plan to achieve the objectives while one can accept leadership as a concept which has utility as a concept separate from management. 1.2 Evaluation of the key management and leadership theories Management and leadership theories focus on what qualities distinguish between leaders and followers in an organisation. For instance, development of the plan for our organisation started with a leadership and management retreat. The aims were to engender a harmonious industrial climate through inter-union, inter-association, inter-staff, and staff association-management interaction and to provide a forum for the leaders and managers to deliberate and proffer advice on pertinent issues of management to enable us move the institution forward. Participants were the Chairman, Board of Management, the Chief Medical Director and other members of staffs. There were lecture, workshop and group activities. The objectives were with the full realization because the staffs are not ignorant and fully participated. This practice looked at variables such as situational factor and skill levels. The participative style of leadership explained by Rensis Likart theories of leadership which encourages decision making by subordinates and their leadership style that involves employee-centred leader were employed. Our organisation also used Blake and Mouton theories of leadership that explained the degree to which a leader considers the needs of team members, their interest, and area of personal development, emphasises objectives, organisational work output and great productivity when deciding the best ways to accomplish a task. This plan would have been carried out without considering various union/staffs relations by our leaders/managers thereby having different management and leadership styles/theories differs from that stated above. 1.3 Assessment of the challenges of leadership and management practices We are usually faced by some challenges such as low level of funding; recruitment exercise; opening of new hospital offices/complex; social policy directives; and developments in ICT. Our leaders and managers have the ability to sense change and respond to it effectively. They have been able to predict a decline of health care delivery services due lack of a new technique being available in other hospitals; anticipate possible solutions to changes that may affect the organisation; have a clear vision of the main objectives of the organisation during periods of change and be able to guide the organisation to achieve these; organise and motivate employees to accept challenges and ensure stability and minimise or prevent disruption. For example, there were challenges of delivering adequate health care services to the people of the community some years back, the leaders and the managers quickly identified the symptoms that have caused these challenges. Among these were low productivity and high labour turnover. As soon as these challenges were identified, managers and leaders found the cause of the trouble and developed a strategy for better status of the organisation. Strategies they employed for good status of the organisation include changing people-through hiring and firing, reassignments of duties, training, pay increases or counselling. They also carried out restructure work through job redesign, job enrichment and redefinition of roles. Systems were also improved. These include communication systems, reward systems, information and reporting systems, budgets and stock control. 2.1 Analysis of the key motivational theories and how they influence organisational success It is important for any organisation to motivate its employees. The motivational theories of Maslow, McGregor, McClelland and Herzberg explain content theories of motivation. They simply explained the specific factors that motivate people. They answer the question what drives behaviour? Also, Vroom, Porter and Lawler, and Adams explain process theories of motivation. They are concerned with the thought processes that influence behaviour. If employees are watched closely, fear of wage cuts or redundancy may force them to maintain their effort even though they are not motivated. This is negative motivation. A lack of motivation may lead to reduced effort and lack of commitment. In the long run, a lack of motivation may result in high levels of absenteeism, industrial disputes and falling productivity and profit for the organisation. Irrua Specialist Teaching Hospital management has been acting according to Fredrick Herzbergs theory of motivation by being giving recognition for effort o f its staff. We are normally taking into consideration in everything the management of this organisation embark upon! This is a kind of motivation that simply gives us job satisfaction and thereby makes the workers more productive. Herzbergs ideas are linked with job enrichment. This is where workers have their jobs expanded, so that they can experience more of their job process. Improved maintenance factors such as pay or conditions also remove dissatisfaction of staffs. For example, better canteen facilities within our organization make workers less dissatisfied about the environment. All these allow the workers to be more involved and motivated. 2.2 Evaluation of the role of leadership and management in employee motivation It is important for leaders and managers to find out what satisfies the needs of its employees? Organisations have found out that even if employees are satisfied with pay and condition of work, they still complain that their employer does not do a good job in motivating them. Motivation is vital because even at the most fundamental level, it is expensive to get another set of staff than that to keep existing one. Employees want to be involved and regarded and making them happy means they will be at service of the organisation for longer period. Have it in mind that at most not convenient time, leader and manager need to motivate staff. If our employees are doing well and assisting to drive the organisation forward, In this case, we do let them know how much we cherish them on regular basis. Whenever we offer them any gifts or passed any information that is of their advantage across both works equally well. This shows, we put them in mind. If our staffs enjoy socializing with us like they do working with us, then we are doing something good and right. It is important that you lead by good characters when there is an issue with staff, if you expect your employees to work late, then you should stay at work too for such period. At the same time, if you dont want staff coming in at 10am on first working day of the week, then make sure youre at work very early. Its not always about hours of working; show your staff respect and you will hopefully get it back. They will observe you on the way you discus with people around and act in same circumstances, so it is important to behave in the way you will like them to behave as well. Investing in employee is paramount, not only will it mean we are getting the best and latest in the organisation but they will appreciate us for being able to develop under our cares. We make sure we fully research courses to send our employee on to acquire the full training. It is equally good to get feedback from employee on how the course has improved their standard individually. Communicating with our employee is high on our list of priorities. Most of them like a leader or manager they can easily reach whenever there are problems. We do hold frequent job discussion with our employee to make sure they are most happy, doing on good and arent confused about anything. Apart from this, we do communicate with our employee everyday. Exchanging greetings are simple motivational techniques but can make a world of difference. The figure below explains how our leaders and managers make decisions for employees motivation, having first identified the employees needs. Revise Incentive Identify the need/ motivation motivation Result/ Outcome Satisfaction If need is not satisfied Identify the need/motivation ââ¬â our organisation try as much as possible for employee to be involved in decisions so that they can feel wanted and recognised as important to the company Incentive ââ¬â Set up discussion with employees about goals and working practices of the organisation Satisfaction ââ¬â This is a situation where the employee feels their opinion and contribution is valuable Result and Outcome ââ¬â By meeting above condition, the employee are willing to take more responsibility 2.3 Analysis of the contribution of performance management techniques as organisational processes Managers use performance management techniques to test employees working status on a regular basis. By examining each employees performance, our organisation also measures the overall effectiveness of its workforce and how well the company achieves its objectives. Assigning roles to workers that improve their strengths is a difficult job. Workforce optimisation is a plan to put the right people in the best job roles to maximize their work output. By doing regular appraisals, our leaders and managers easily track employees performance and suggest if they need more training or if they could be more productive with different responsibilities. Another performance management technique we usually employ is compensation package. Overall morale always increase most especially when the employee sees the process to be fair. A happy worker is a hard worker. Incentive-based programs that permit the employee in using less paper or being energy efficient both save on our expenses and the employees are rewarded for putting forth the extra energy needed. The fewer costs our organisation has, the more profit it realizes. 3.1 Analysis of the development of teams Organisations often try to improve the productivity and motivation of people working in groups/teams. The planned, systematic process designed to improve the efforts of people who work together to achieve goals is referred to as development of teams. Team can be described as an internally organized set of people with specific roles for different members to achieve a specific goal while group can be referred to as a collection of people with something in common, such as being in the same place or having their individuals interest. Meredith Belbin (1981) found that successful teams consisted of a mix of individuals, each of whom performed a different role. For instance, monitoring and evaluation team that was set up under the chief medical directors office is a kind of team of different calibers and positions within our organisation. They work on projects with specific term of reference and present biannual and annual reports with veritable indices to the leadership of this organisation. This is not like working in a group; working in a team entails accountability rather than individual accountability and results in a joint work products. The characteristic and goals of the individual members of the team helped to determine the teams characteristics and goals. .According to Belbin, each person has a preferred role and for a team to be effective, all the roles need to be filled. Our organisation selects people that are capable to fill one or more of the roles. Individual member of the team was influenced more st rongly because of their role. This is unlike group with large number of people where very few people take part in the project while others are not and unable to participate effectively in team decisions. Effectiveness of team depend s on the blend of the individual skills and abilities of its members. Team development is based on the idea that before organisations can improve performance, team members must be able to work together effectively. This exercise is used to help team members develop trust, open up communication channels, make sure everyone understood the goals of the team, help individuals make decisions with the commitment of all members, prevent the leader from dominating the team, openly examine and resolve conflicts and to review work activities. 3.2 Analysis of the roles and models of team leadership Leadership of teams must get members of team to work with each other. This is one method that involves low levels of risk among members. The role of team leader include to be able able to organise joint projects or some form of exchange between members of the team. The leaders of the team work together or exchange roles with members for this approach to be effective. This is one method that involves low levels of risk among members. The working spirit was further developed by communication and swapping of team members. This technique was used when our organisation took over the challenges of training medical students from another medical institution and there is a need to avoid conflict. These ideas develop social interaction among the employees. Keeping every single activity connected to the others help team leaders and organisation to achieve what they actually planed. Members are enjoying while performing their roles and are also discovering something new about themselves, their co-workers, and the organisation as a whole. Researching and learning about the team current issues definitely help team leaders in creating the actual activities that the members can participate-in. This affords lapses of any kind for members not to participate in the activities of the team. 3.3 Evaluation of the role and usefulness of teams within the organisation The leader of any team of an organisation aims to create team/group that is effective and efficient. If the team leader or organisation can motivate the team members to work harder in order to achieve goals, the sense of pride in the teams own competence will create job satisfaction for the leadership of the team/team members and employees in general. Looking at the opportunities given to the employees of our organisation and most especially in most units or teams that has so far set- up, the participants are willing to carry out responsibilities for the betterment of the organisation. In some instance, membership of units or teams can be made up of top officials of an organisation which may not interest ordinary employees of the organisation. The introduction of different units or teams in our organisation has contributed immensely for the achievement of our goals and objectives. In term of motivation, employees in team situations are more satisfied and motivated than when we are working under more traditional regimes and have a positive influence on employee commitment and identification. The team work also serves to gain competitive advantage over other organisations. Our organisations provide leaders and managers with legitimate authority to lead. There is need for individuals to imbibe this strong leadership and management trait for optimal effectiveness. In nowadays changing work environment, we need leaders that can challenge the status quo and inspire and persuade organisation members. We also need team leaders to assist in changing and improving a smoothly running place of work.
Subscribe to:
Comments (Atom)