CN104821953A - Application reconfiguration zonal network system and method applicable to perimeter intrusion prevention - Google Patents

Application reconfiguration zonal network system and method applicable to perimeter intrusion prevention Download PDF

Info

Publication number
CN104821953A
CN104821953A CN201510128190.XA CN201510128190A CN104821953A CN 104821953 A CN104821953 A CN 104821953A CN 201510128190 A CN201510128190 A CN 201510128190A CN 104821953 A CN104821953 A CN 104821953A
Authority
CN
China
Prior art keywords
node
application
nodes
leader cluster
bunch
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510128190.XA
Other languages
Chinese (zh)
Other versions
CN104821953B (en
Inventor
李凤荣
房卫东
尚琳
朱磊基
张帅
邱云周
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Institute of Microsystem and Information Technology of CAS
Original Assignee
Shanghai Institute of Microsystem and Information Technology of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Institute of Microsystem and Information Technology of CAS filed Critical Shanghai Institute of Microsystem and Information Technology of CAS
Priority to CN201510128190.XA priority Critical patent/CN104821953B/en
Publication of CN104821953A publication Critical patent/CN104821953A/en
Application granted granted Critical
Publication of CN104821953B publication Critical patent/CN104821953B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Alarm Systems (AREA)

Abstract

The present invention relates to an application reconfiguration zonal network system applicable to perimeter intrusion prevention. The system uses a three-tier architecture of integrated application, network transmission and physical perception, and includes two functional entities, namely super nodes and worker nodes. Users upload new application codes to the super nodes through networks; the worker nodes and the super nodes communicate with each other via the network. The super nodes comprise gateway nodes located in a physical perception architecture, control terminals located in an integrated application architecture and backbone network nodes located in a network transmission architecture; the worker nodes are front-end monitoring devices located in a plurality of detection areas, and comprise two categories: cluster head nodes and cluster member nodes, which have cognitive ability; the cluster head nodes and the cluster member nodes can dynamically perceive changes in the environment and can self-adaptively reconfigure node application codes according to the changes in the environment; and the front-end monitoring devices are connected to the backbone network nodes via the gateway nodes. The present invention also relates to a working method of the system described above. With the adoption of the present invention, sensing nodes can be constantly adjusted with the changes of application requirements dynamically.

Description

A kind of application being applicable to enclose boundary's anti-intrusion reconstructs banded net system and method
Technical field
The present invention relates to banded net system communication technical field, particularly relate to a kind of application being applicable to enclose boundary's anti-intrusion and reconstruct banded net system and method.
Background technology
Enclosing boundary's anti-intrusion, mine safety monitoring, pipe safety is monitored, and a lot of field such as intelligent grid monitoring, ribbon sensing net all shows advantage and wide application prospect.The PIPENET system of the CSAIL development in laboratory of america's MIT is a kind of strip wireless sensor network system, and this system provides the service of tap water pipeline intellectual monitoring towards Boston area.The FireFly series wireless sensor node that Carnegie Mellon university of U.S. Real-Time Multimedia Systems Laboratory develops is used for safety of coal mines aspect, disposed by the band shape of sensor node, complete the location to miner in danger and rescue.The one-dimensional that strip sensor network in these practical application scenes presents, and is had obvious otherness by the planar sensor network of large quantity research before.
Enclosing boundary's anti-intrusion system is one of important applied field of ribbon sensing net.Within the system, sensor node is laid along enclosing boundary, by autonomous networking and fusion perception, forms a banded sensing region, thus realizes detecting the function of enclosing boundary's intrusion target.Under the environment such as strand, inland, outlying area, the diversity of the anti-intrusion such as civil airport, the south water to north, anti-intrusion system needs to possess environment universality, can the extensive banded net that changes of the change of adaptive environment condition and application demand due to its good collaboration capabilities and the focus tenability of complex task being become to research.
Perception data, from changeable physical environment, is unpredictable and uncontrollable, and the Processing tasks demand of user to perception data is also normal to be changed along with the change of environment, and the different demand to network of user also can be different; Network topology is constantly change (as some node failure), and these changes can cause the change that node is applied, and therefore, the application task that in whole service process, system performs is continuous dynamic change.And the restriction of the resource and competence of sensing node own and the diversity of external environment and unpredictability, will cannot all apply disposable being deployed in network.Therefore, how to provide flexible and changeable application task on the net in resource-constrained band shape, efficiently, automatically carrying out application reconstruct is that the banded net of anti-intrusion moves towards the practical matter of utmost importance that must solve, at present, main research about planar wireless sense network application reconfiguration technique has Mate and the Hyun-Chong Kim of Berkeley to reconstruct for the application of certain node failure respectively, Beijing University of Post & Telecommunication study several, the application of even many node failures reconstruct.
Summary of the invention
Technical problem to be solved by this invention is to provide a kind of application being applicable to enclose boundary's anti-intrusion and reconstructs banded net system and method, make sensing node with the change of application demand continuous dynamic conditioning.
The technical solution adopted for the present invention to solve the technical problems is: provide a kind of application being applicable to enclose boundary's anti-intrusion to reconstruct banded net system, adopt integrated application, Internet Transmission, phy-aware three-tier architecture, comprise supernode and working node two kinds of functional entitys, user uploads new application code to supernode by network; Network is adopted to communicate between described supernode and working node, described supernode comprise be arranged in phy-aware framework gateway node, be arranged in the control terminal of integrated application framework and be arranged in the backbone network node of network transmission architecture, described working node is the front end monitoring equipment being distributed in multiple surveyed area, be divided into two classes: leader cluster node and bunch member node, both there is cognitive ability, the function of dynamic perception environmental change and environmentally change self-adapting reconstruction node application code; Described front end monitoring equipment is connected with backbone network node by gateway node.
Described bunch of member node closes recombination function, and leader cluster node judges that current environment changes, and determines the need of triggering application reconstruct.
Described control terminal is smart mobile phone control end, computer control end and/or dull and stereotyped control end.
Described front end monitoring equipment comprise climbing transducer, in the air cross over transducer, aerial parabolic transducer, destroy siderail sensors, pick up in intrusion sensor and people, car, animal classification identification and locator any one or multiple.
The technical solution adopted for the present invention to solve the technical problems is: also provide a kind of above-mentioned application being applicable to enclose boundary's anti-intrusion to reconstruct the method for work of banded net system, comprise the following steps:
(1) supernode and working node initialization operation;
(2) the working node sub-clustering stage: working node is with 802.11DCF or CSMA competitive way competitive channel, each working node calculates the sub-clustering factor, with the person that sends packet at first, energy at most or safe class be up to criterion election bunch head, 1 hop neighbor sensing node adds certain cluster head by energy efficiency strategy, leader cluster node opens reconstructed module, and bunch member node closes reconstructed module;
(3) working node perception environmental change: leader cluster node collects the environmental data that bunch member gathers, and utilizes the experience accumulated in the domain knowledge base preset in knowledge base to analyze environmental data, judges whether gather environment changes; Leader cluster node according to the channel loading of transmission current bunch, and obtains other channel load information and periphery disturbed condition at other time slots, determines whether preferred channels changes, and as changed, bunch head broadcast transmission channel gives bunch member;
(4) leader cluster node triggers application reconstruct: analyze according to spectrum information, network traffics distribution, sensing data content and user's request information, judge that change carries out adjustment Adaptive change event the need of to code, if amplitude of variation exceedes changes of threshold, need adjustment, leader cluster node triggers application reconstruct, then obtain application code and revise knowledge base, then order performs subsequent operation; Otherwise, return step (3);
(5) leader cluster node obtains application code, first judges whether this locality has existed application code corresponding to subsequent work state, if had, performs next step; If there is no, judging whether this residue energy of node reaches setting threshold value, the application code operation needed for if so, obtaining to the inquiry of other leader cluster node limited number of times; Otherwise, the direct execution sub-clustering stage, reselect leader cluster node, the knowledge base information of former leader cluster node is sent to new leader cluster node, perform to the application code operation needed for other leader cluster node limited number of times inquiry acquisition, inquiry times depends on network node quantity, bunch size and residue energy of node;
(6) bunch member node given by delivery applications code, detect bunch member condition, if check that bunch member node state of discovery has problem, bunch member node asks leader cluster node to send reconfiguration code again, after leader cluster node receives a large amount of bunches of member node reconstruct failures, leader cluster node is issued and is recovered safe condition order, allows a bunch member node recover previous safe condition;
(7) working node performs application code: working node performs application code, achieves reconfiguring of application task, and returns step (3).
Described step (1) also comprises following sub-step:
(11) supernode knowledge base initialization: according to the difference of banded net application, user's request, manually in advance the knowledge in related application field is arranged in the knowledge base of node;
(12) initialization of working node operating state: the different types of data, employing frequency and the different disposal method to sampled data that adopt according to sensing node, control appliance broadcast arranges the application code of each working node, and working node initialization knowledge base is empty.
The experience formed in bunch head running, represent with weights the probability that the environmental change that ambient data may cause occurs, the probability of weights raw respective change more occurred frequently is higher, and along with the operation of sensing node, knowledge base constantly accumulates and obtains and preserve.
Beneficial effect
Owing to have employed above-mentioned technical scheme, the present invention compared with prior art, has following advantage and good effect:
Banded net system of the present invention is the network of highly redundant, the fault of respective nodes can be tolerated, the present invention mainly for the network application caused by environmental change be adapted to adjustment, application self-adapting technology is incorporated into working node:, working node code can in system operation auto-update, working node is made to possess cognitive ability, can with environment, the application of the change adjustment of user's request oneself, realize the target of banded net system flexible and changeable application under circumstances, system is made to adapt to the needs of automatic operation under long-time unattended environment and adjustment better, the banded net system of anti-intrusion realizes the (personnel walked about as hovered of personnel targets in fence coverage, the personnel on boundary are enclosed in climbing or malicious sabotage, be not intended to the personnel that boundary is enclosed in touching, the personnel enclosing boundary are crossed in low latitude, enclose the personnel walked about inside boundary), vehicle target, engineering construction behavior, regular interference signals etc. are detection and differentiation effectively, systematic protection is comprehensive, good reliability.
The present invention can support the dynamic restructuring of sensing task, namely according to user's request, applied environment change, reconfigure the task of network system, sensing node different times performs different application codes, the sensing node of resource-constrained realizes the reconstruct of sensing task, thus on the basis without the need to increasing too many investment, greatly improve function and the service efficiency of banded net system.
Accompanying drawing explanation
Fig. 1 is system schematic of the present invention;
Fig. 2 is workflow diagram of the present invention;
Fig. 3 is that in the present invention, working node receives broadcasted application reconfiguration code process chart.
Embodiment
Below in conjunction with specific embodiment, set forth the present invention further.Should be understood that these embodiments are only not used in for illustration of the present invention to limit the scope of the invention.In addition should be understood that those skilled in the art can make various changes or modifications the present invention, and these equivalent form of values fall within the application's appended claims limited range equally after the content of having read the present invention's instruction.
Embodiments of the present invention relate to a kind of application being applicable to enclose boundary's anti-intrusion and reconstruct banded net system and method, as shown in Figure 1, described system adopts integrated application, Internet Transmission, phy-aware three-tier architecture, comprise supernode and working node two kinds of functional entitys, user can pass through legacy network (WiFi, ZigBee, bluetooth, 2G, 3G, 4G LTE, 5G etc.) upload new application code to supernode, wireless sense network is adopted between supernode and working node, WiFi or other conventional network communications, supernode comprises gateway node, control terminal, backbone network node, working node refers to the front end monitoring equipment being distributed in multiple surveyed area.
Described control terminal is smart mobile phone control end, computer control end and/or dull and stereotyped control end;
Described working node is distributed in the front end monitoring equipment in multiple detected region, perception monitoring water quality information, engineering entity monitor message, anti-intrusion monitor message, wide area video information, other information etc., front-end detection equipment is connected with backbone network by gateway;
Described working node refers to front end monitoring equipment, be divided into two classes: leader cluster node, bunch member node, both there is dynamic sensing environmental change and environmentally change the function of self-adapting reconstruction node application code, because of sensing node energy limited, bunch member node closes recombination function, leader cluster node judges that current environment changes, and determines the need of triggering application reconstruct.
Described front end monitoring equipment comprises climbing transducer, cross over transducer, aerial parabolic transducer in the air, destroy siderail sensors, pick up intrusion sensor and people, car, animal classification identification and locator any one or multiple.
With reference to Fig. 2, introduce a kind of method idiographic flow being applicable to enclose the application reconstruct of boundary's anti-intrusion of the present invention:
(1) supernode and working node initialization operation
The supernode such as control appliance, gateway node knowledge base initialization: according to the difference of banded net application, user's request, manually in advance the knowledge in related application field is arranged in the knowledge base of node;
The initialization of working node operating state: the different types of data, employing frequency and the different disposal method to sampled data that adopt according to sensing node, control appliance broadcast arranges the application code of each working node, and working node initialization knowledge base is empty.
(2) the working node sub-clustering stage
Working node with competitive way competitive channels such as 802.11DCF or CSMA, each node calculate sub-clustering factor, send at first packet person, energy at most or safe class the most high be criterion, elect bunch head;
1 hop neighbor working node waits at most clustering algorithm to add certain cluster head by energy, and leader cluster node opens reconstructed module, and bunch member node closes reconstructed module, and the node of banded net is along zonal distribution, and the range of management of different bunches is close to regular hexagon or circle.
(3) working node perception environmental change
Leader cluster node collects the environmental data that bunch member gathers, and utilizes the experience accumulated in the domain knowledge base preset in knowledge base to analyze environmental data, judges whether gather environment changes.Bunch head is according to the channel loading of transmission current bunch, and obtain other channel load information, periphery disturbed condition at other time slots, determine whether preferred channels changes, as changed, bunch head broadcast transmission channel gives bunch member, and (experience formed in bunch head running, namely represents with weights the probability that the environmental change that ambient data may cause occurs, weights are higher, and the probability that respective change occurs is higher; During initialization, knowledge base is empty, and along with the operation of working node, knowledge base constantly accumulates and obtains and preserve.
(4) leader cluster node triggers application reconstruct: analyze according to information such as spectrum information, network traffics distribution, sensing data content, user's requests, judge that change carries out adjustment Adaptive change event the need of to code, if amplitude of variation exceedes changes of threshold, need adjustment, bunch head triggers application reconstruct, then obtain application code and revise knowledge base, then order performs subsequent operation; Otherwise, return step (3).
(5) leader cluster node obtains application code, first judges whether this locality has existed application code corresponding to subsequent work state, if had, performs next step; If there is no, judging whether this residue energy of node reaches setting threshold value, the application code operation needed for if so, obtaining to other bunch of head limited number of time inquiry; Otherwise, in the direct execution sub-clustering stage, reselect a bunch head, the knowledge base information of former bunch of head is sent to new bunch of head, perform to the application code operation needed for other bunch of head limited number of time inquiry acquisition, inquiry times depends on network node quantity, bunch size, residue energy of node.
(6) bunch member node given by delivery applications code, detect bunch member condition, if check that bunch member node state of discovery has problem, node can ask a bunch hair to send reconfiguration code again, after a bunch head receives great deal of nodes reconstruct failure, bunch head can be issued and recover safe condition order, allows a bunch member node recover previous safe condition.
(7) working node performs application code: working node performs application code, achieves reconfiguring of application task, returns step (3).
In system operation, control terminal and gateway node, according to spectrum information, network traffics distribute, sensing data content, the information such as user's request are analyzed, particularly software release upgrade, the demands such as the patch installation of program, judge that change carries out adjustment Adaptive change demand the need of to code, if amplitude of variation exceedes changes of threshold, need adjustment, mobile or fixing control terminal, gateway node broadcasted application reconfiguration code, working node receives application reconfiguration code as shown in Figure 3, whether receive before judging and be this broadcasted application reconfiguration code, if received, directly abandon, otherwise carry out the security inspections such as version, if dangerous, directly abandon, otherwise upgrade and perform application code, the banded net system of Shi Wei circle anti-intrusion conforms and meets consumers' demand, and working node also can based on historical experience, becoming better and better of work.

Claims (7)

1. the application being applicable to enclose boundary's anti-intrusion reconstructs banded net system, it is characterized in that, adopt integrated application, Internet Transmission, phy-aware three-tier architecture, comprise supernode and working node two kinds of functional entitys, user uploads new application code to supernode by network; Network is adopted to communicate between described supernode and working node, described supernode comprise be arranged in phy-aware framework gateway node, be arranged in the control terminal of integrated application framework and be arranged in the backbone network node of network transmission architecture, described working node is the front end monitoring equipment being distributed in multiple surveyed area, be divided into two classes: leader cluster node and bunch member node, both there is cognitive ability, the function of dynamic perception environmental change and environmentally change self-adapting reconstruction node application code; Described front end monitoring equipment is connected with backbone network node by gateway node.
2. the application being applicable to enclose boundary's anti-intrusion according to claim 1 reconstructs banded net system, it is characterized in that, described bunch of member node closes recombination function, and leader cluster node judges that current environment changes, and determines the need of triggering application reconstruct.
3. the application being applicable to enclose boundary's anti-intrusion according to claim 1 reconstructs banded net system, it is characterized in that, described control terminal is smart mobile phone control end, computer control end and/or dull and stereotyped control end.
4. the application being applicable to enclose boundary's anti-intrusion according to claim 1 reconstructs banded net system, it is characterized in that, described front end monitoring equipment comprise climbing transducer, in the air cross over transducer, aerial parabolic transducer, destroy siderail sensors, pick up in intrusion sensor and people, car, animal classification identification and locator any one or multiple.
5. the application that being applicable to as described in claim arbitrary in claim 1-4 encloses boundary's anti-intrusion reconstructs a method of work for banded net system, it is characterized in that, comprises the following steps:
(1) supernode and working node initialization operation;
(2) the working node sub-clustering stage: working node is with 802.11DCF or CSMA competitive way competitive channel, each working node calculates the sub-clustering factor, with the person that sends packet at first, energy at most or safe class be up to criterion election bunch head, 1 hop neighbor sensing node adds certain cluster head by energy efficiency strategy, leader cluster node opens reconstructed module, and bunch member node closes reconstructed module;
(3) working node perception environmental change: leader cluster node collects the environmental data that bunch member gathers, and utilizes the experience accumulated in the domain knowledge base preset in knowledge base to analyze environmental data, judges whether gather environment changes; Leader cluster node according to the channel loading of transmission current bunch, and obtains other channel load information and periphery disturbed condition at other time slots, determines whether preferred channels changes, and as changed, bunch head broadcast transmission channel gives bunch member;
(4) leader cluster node triggers application reconstruct: analyze according to spectrum information, network traffics distribution, sensing data content and user's request information, judge that change carries out adjustment Adaptive change event the need of to code, if amplitude of variation exceedes changes of threshold, need adjustment, leader cluster node triggers application reconstruct, then obtain application code and revise knowledge base, then order performs subsequent operation; Otherwise, return step (3);
(5) leader cluster node obtains application code, first judges whether this locality has existed application code corresponding to subsequent work state, if had, performs next step; If there is no, judging whether this residue energy of node reaches setting threshold value, the application code operation needed for if so, obtaining to the inquiry of other leader cluster node limited number of times; Otherwise, the direct execution sub-clustering stage, reselect leader cluster node, the knowledge base information of former leader cluster node is sent to new leader cluster node, perform to the application code operation needed for other leader cluster node limited number of times inquiry acquisition, inquiry times depends on network node quantity, bunch size and residue energy of node;
(6) bunch member node given by delivery applications code, detect bunch member condition, if check that bunch member node state of discovery has problem, bunch member node asks leader cluster node to send reconfiguration code again, after leader cluster node receives a large amount of bunches of member node reconstruct failures, leader cluster node is issued and is recovered safe condition order, allows a bunch member node recover previous safe condition;
(7) working node performs application code: working node performs application code, achieves reconfiguring of application task, and returns step (3).
6. method of work according to claim 5, is characterized in that, described step (1) also comprises following sub-step:
(11) supernode knowledge base initialization: according to the difference of banded net application, user's request, manually in advance the knowledge in related application field is arranged in the knowledge base of node;
(12) initialization of working node operating state: the different types of data, employing frequency and the different disposal method to sampled data that adopt according to sensing node, control appliance broadcast arranges the application code of each working node, and working node initialization knowledge base is empty.
7. method of work according to claim 6, it is characterized in that, the experience formed in bunch head running, the probability that the environmental change that ambient data may cause occurs is represented with weights, the probability of weights raw respective change more occurred frequently is higher, and along with the operation of sensing node, knowledge base constantly accumulates and obtains and preserve.
CN201510128190.XA 2015-03-23 2015-03-23 A kind of band-like net system and method for application reconstruct being suitable for enclosing boundary's anti-intrusion Active CN104821953B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510128190.XA CN104821953B (en) 2015-03-23 2015-03-23 A kind of band-like net system and method for application reconstruct being suitable for enclosing boundary's anti-intrusion

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510128190.XA CN104821953B (en) 2015-03-23 2015-03-23 A kind of band-like net system and method for application reconstruct being suitable for enclosing boundary's anti-intrusion

Publications (2)

Publication Number Publication Date
CN104821953A true CN104821953A (en) 2015-08-05
CN104821953B CN104821953B (en) 2018-09-14

Family

ID=53732116

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510128190.XA Active CN104821953B (en) 2015-03-23 2015-03-23 A kind of band-like net system and method for application reconstruct being suitable for enclosing boundary's anti-intrusion

Country Status (1)

Country Link
CN (1) CN104821953B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1633098A (en) * 2005-01-28 2005-06-29 北京邮电大学 Wireless sensor network system and method supporting task reconfiguration
CN1809012A (en) * 2006-02-14 2006-07-26 北京邮电大学 Wireless sensor network system and method supporting reconstruction of environment adaptive application
CN102420824A (en) * 2011-11-30 2012-04-18 中国科学院微电子研究所 Restructurable Internet of things node intrusion detection method
CN103781142A (en) * 2013-10-28 2014-05-07 西安邮电大学 Method for deploying application codes based on trust in wireless sensor network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1633098A (en) * 2005-01-28 2005-06-29 北京邮电大学 Wireless sensor network system and method supporting task reconfiguration
CN1809012A (en) * 2006-02-14 2006-07-26 北京邮电大学 Wireless sensor network system and method supporting reconstruction of environment adaptive application
CN102420824A (en) * 2011-11-30 2012-04-18 中国科学院微电子研究所 Restructurable Internet of things node intrusion detection method
CN103781142A (en) * 2013-10-28 2014-05-07 西安邮电大学 Method for deploying application codes based on trust in wireless sensor network

Also Published As

Publication number Publication date
CN104821953B (en) 2018-09-14

Similar Documents

Publication Publication Date Title
CN103945179B (en) A kind of intelligent video monitoring system based on distributed wireless sensor network
CN206250848U (en) Power distribution network monitoring running state device
US8624729B2 (en) Monitoring method, a monitoring system and a sensor station
WO2013125265A1 (en) Radio communication apparatus, radio communication method, and radio communication system
CN106790390A (en) A kind of city Cooperative Security monitoring system based on the networking of street lamp lamp
EP2675196B1 (en) Method for processing content network information, base station and content network system
CN103314564A (en) System and method for machine-to-machine application based congestion control
CN102547247A (en) Field intelligent monitoring system based on long-distance wireless mesh network
CN105898898A (en) Information monitoring system based on wireless sensor network
CN107306212B (en) Intelligent household alarm method and device, intelligent prevention and control terminal and household intelligent gateway
CN110213734A (en) A kind of dynamic data packet communication method and system based on intelligent building Internet of Things
CN113098988B (en) Data transmission method and data transmission system
CN107197030B (en) Method and system for controlling working state of terminal equipment of Internet of things
CN104503417A (en) System for monitoring hydropower station
CN114979581A (en) Graph-passing ad hoc network system for industrial video monitoring
CN103871185B (en) The anti-external force processing method of transmission line of electricity, Apparatus and system
CN104349338B (en) A kind of method and system being monitored to sensor access gateway
KR20130054705A (en) Multi-purpose intelligent monitoring device using ubiquitous sensor network based on binary code division multiple access
CN106899990B (en) Networking self-optimization method, device and system
Correa et al. Design and implementation of an embedded edge-processing water quality monitoring system for underground waters
CN103249064B (en) A kind of radio sensor network data collection method and system
CN112135096A (en) Intelligent monitoring safety coefficient based on enterprise park monitoring
CN104821953A (en) Application reconfiguration zonal network system and method applicable to perimeter intrusion prevention
CN114007149B (en) Monitoring method, device, system, storage medium and processor of power system
KR102372906B1 (en) Image monitorimg device for notifying disaster situation using tvws band and operation method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant