Sie sind auf Seite 1von 31

AUTOMATIC WIRELESS HEALTH

MONITORING SYSTEM USING WIRELESS


STETHOSCOPE AND FALL SENSOR FOR
ELDERLY PEOPLE

Name
BSc Report
Project report submitted in
partial fulfilment of the requirements for the
Degree of Bachelor of Electrical Engineering

Supervisor: Engr. Muhammad Mushtaq wali

School of Electrical Engineering,


The University of Faisalabad
14 June 2015

BSc Project Report 2015

School of Electrical Engineering

DECLARATION
I understand that all my project work must be my own unaided work. If I make use of material
from any other source I must clearly identify it as such in any interviews, reports or
examinations. I understand that my reports must be written unaided in my own words apart
from any quoted material which I must clearly identify in the correct manner.
I understand that the work which I shall present for assessment must be work carried out by
myself only during the project period which has not been previously prepared. Where any
such previous work is made use of in the project, I shall make this clear in any interviews,
reports or examinations.
I understand that a violation of these conditions may result in a mark of zero for the
component or components of assessed work affect.
Print Name:

Signature:

Reg No:

Date:

Course: Bachelor of Electrical


Engineering

BSc Project Report 2015

School of Electrical Engineering

ABSTRACT
Write your abstract here which should be of atleast 200 words. Also mention keywords as
below.

Keywords: mention key words split by commas.

BSc Project Report 2015

School of Electrical Engineering

ACKNOWLEDGEMENTS
You may use this space to thank your friend, family or teachers who have inspired and
supported you. This should not be more than a page.

BSc Project Report 2015

School of Electrical Engineering

TABLE OF CONTENTS
Declaration............................................................................................................ii
Abstract................................................................................................................iii
Acknowledgements..............................................................................................iv
List of Figures.....................................................................................................vii
List of Tables........................................................................................................xi
List Of Acronyms................................................................................................xii
CHAPTER 1 Introduction..................................................................................1
1.1

OVERVIEW....................................................................................................................1

1.2

PROBLEM STATEMENT..................................................................................................1

1.3

AIMS AND OBJECTIVES.................................................................................................2

1.4

IDEA OF RESOURCE REQUIREMENTS............................................................................2

1.5

SECURITY CONSTRAINTS OF PROJECT..........................................................................2

1.6

REPORT OUTLINE..........................................................................................................2

1.6.1

Chapter 1..............................................................................................................2

1.6.2

Chapter 2..............................................................................................................2

1.6.3

Chapter 3..............................................................................................................3

1.6.4

Chapter 4..............................................................................................................3

1.6.5

Chapter 5..............................................................................................................4

1.6.6

Chapter 6..............................................................................................................4

CHAPTER 2 Architecture Of IP Multicast........................................................5


2.1

OVERVIEW....................................................................................................................5

2.2

IP MULTICAST...............................................................................................................5
5

BSc Project Report 2015


2.3

School of Electrical Engineering

MULTICAST CLASSIFICATION........................................................................................5

2.3.1

Any Source Multicast:...........................................................................................5

2.3.2

Source Filtered Multicast:....................................................................................5

2.3.3

Source Specific Multicast:....................................................................................5

2.4

ADDRESS ALLOCATION.................................................................................................6

CHAPTER 3 Name of chapter 3........................................................................7


3.1

OVERVIEW....................................................................................................................7

3.2

SATELLITE NETWORKS..................................................................................................7

3.2.1

Lower Earth Orbit................................................................................................7

3.2.2

Medium Earth Orbit.............................................................................................8

CHAPTER 4 Methodology................................................................................9
4.1

OVERVIEW....................................................................................................................9

4.2

OVERVIEW OF OPNET MODELLER..............................................................................9

4.2.1

Network Domain.................................................................................................10

4.2.2

Node Domain......................................................................................................11

4.2.3

Process Domain..................................................................................................12

4.2.4

External System Domain....................................................................................13

4.3

WHY OPNET..............................................................................................................13

CHAPTER 5 Simulation Results & Analysis...................................................15


5.1

OVERVIEW..................................................................................................................15

5.2

IGMP BEHAVIOUR......................................................................................................15

5.2.1

IGMP Behaviour in Scenario 1..........................................................................15

CHAPTER 6 Conclusion & Further Work.......................................................17


6.1

CONCLUSIONS.............................................................................................................17

6.2

FURTHER WORK..........................................................................................................18
6

BSc Project Report 2015

School of Electrical Engineering

6.2.1

Reliable Multicast...............................................................................................18

6.2.2

Satellite Multicast Security Protocols................................................................19

6.2.3

Mobile Multicast.................................................................................................19

References...........................................................................................................20
Appendix.............................................................................................................22

BSc Project Report 2015

LIST

OF

School of Electrical Engineering

FIGURES

Figure 1.1: Different types of multicast protocols discussed in this report................................3


Figure 2.1: Unicast with four receivers.......................................................................................5
Figure 3.1: LEO, MEO and GEO satellite orbits around the earth [22].....................................7
Figure 4.1: Project Workflow of a Simulation [30]..................................................................10
Figure 4.2: Different Levels of OPNET Simulation Model [31]..............................................11
Figure 4.3: A typical Node Model.............................................................................................12
Figure 4.4: typical Process Model............................................................................................12
Figure 4.5: OPNET External System Domain [31]..................................................................13
Figure 5.1: IGMP messages being sent by hosts to DRs..........................................................16

BSc Project Report 2015

LIST

OF

School of Electrical Engineering

TABLES

Table 2.1: Ranges and usage of IP Multicast Address................................................................9


Table 2.2:Description of well-known multicast addresses [7]..................................................10
Table 2.3: Description of IGMPv1 packet format [9]...............................................................13
Table 2.4: Description of MLD packet format..........................................................................17
Table 2.5: MLD messages against the Type field.....................................................................17
Table 2.6: Values of TTL Scope Control [16]...........................................................................18
Table 4.1: Stream Index of Packet Streams..............................................................................54
Table 4.2: Description of different states of satellites process model......................................56
Table 5.1: Configuration parameters of Video Conferencing application................................63

BSc Project Report 2015

School of Electrical Engineering

LIST OF ACRONYMS
LASER

Light amplification by stimulated emission of radiation.

(Students ! mention all acronyms in your thesis as I mentioned one example


above)

10

CHAPTER 1
INTRODUCTION
1.1 Overview
These days the requirement of communication networks at reduce bandwidth consumption are
in great demand all over the world, it is cost effective as it requires pairing of the multicasting
over the satellite networks in contrast with unicast networks. It will provide network provision
to remote places specially when there is no terrestrial infrastructure.
The objective of multicasting is to send a data to a multi receiver environment instead of
unicasting or broadcasting i.e. a data transmission to one receiver or all the receivers
respectively. In IP multicast, the multicast sender transmits only one copy of a packet to a
network and network makes duplicate copies of data for every host wishing to receive it. The
advantages of IP multicast are enormous e.g. processing overhead is minimized at sender side
and bandwidth is saved because sender is sending only one copy of data over a network. The
satellite is an effective medium for users which are geographically dispersed as minimum
numbers of hops are used for communication in satellite network while covering a vast area.
This project will emphasize on the strategies and adjustments that are required for integrating
satellite with multicasting networks and a multicast application over satellite network i.e.
Light Video Conferencing will be simulated in OPNET (Operation Network).

1.2 Problem Statement


.
Moreover the implementation of multicasting over the satellite network is an ultimate
challenge as IGMP quires and requests over satellite network can consume huge bandwidth
when there are no designated routers between end users and satellites. It could result in IGMP
1

flooding over satellite which could result in unreliable network design. This project is based
on a simulation of multicast application (video conferencing) among terrestrial LANs
interconnected via fixed GEO satellite.

1.3 Aims and Objectives

1.4 Idea of Resource Requirements


1.5 Security Constraints of Project
1.6 Report Outline
1.6.1 Chapter 1
This chapter gives a brief overview of the report. It starts with the introduction of combining
multicast techniques with the satellite networks. This chapter also identifies the motivation,
problem statement, aims and objectives of the research. Furthermore the resource
requirements and limitations of the research are also described.

1.6.2 Chapter 2
This chapter greatly emphasizes on the IP Multicast technology. It starts from introduction of
Multicast, illustrates different types of Multicast and describes multicast addressing.
Moreover the membership management and routing protocols are also described as follow;

Figure 1.1: Different types of multicast protocols discussed in this report

1.6.3 Chapter 3
This chapter describes an overview of the multicast support in satellite environment. It starts
from illustrating different types of satellite orbits around the earth, identifies different
advantages of adapting multicast technology over satellite networks, describes IP Multicast
scoping and address mapping in satellite networks. Furthermore satellite network quality of
service, IP packet encapsulation over satellite network and different network roles of satellites
are discussed. Finally keeping in view two different network scenarios, the behavior of IGMP
over satellite network is discussed.

1.6.4 Chapter 4
This chapter describes the methodology implemented in this project and explains the choice
of network simulator being adopted.

Moreover a brief overview of OPNET and its

advantages over its competitor simulators are described. An understanding of architecture of


the multicasting is developed while keeping in view two different scenarios i.e. Multicasting
over Satellite with Designated Routers and Multicasting over Satellite Without Designated
Routers. Moreover the configurations of all the devices are described and finally the design of
Satellite Node is explained via illustration of its Node Model and Process Model.

1.6.5 Chapter 5
This chapter mainly emphasizes on the explanation of simulation results being produced by
the two different scenarios and find out the best scenario in terms of utilization.

1.6.6 Chapter 6
This is the final chapter of the project report. It concludes the project and provides
recommendations for the future work.

CHAPTER 2
ARCHITECTURE OF IP MULTICAST
2.1 Overview
This chapter highlights the concepts of ....

2.2 IP Multicast
The IP Multicast is a proficient approach to allocate information to multiple destinations from
a single source. . [1]. Initially internet

Figure 2.2: Unicast with four receivers.


The figure 2.1 is showing a ..

2.3 Multicast Classification


There are three different

2.3.1 Any Source Multicast:


ASM provides ....

2.3.2 Source Filtered Multicast:


The idea behind ......s [3].

2.3.3 Source Specific Multicast:


The .....

2.4 Address Allocation


Multicast addresses arrangement
though there are certain ranges of the address space fixed as shown in the below table [6].
Start Address

End Address

224.0.0.0

224.0.0.255

224.0.1.0

238.255.255.25
5

239.0.0.0

239.255.255.25
5

Usage
This range is held in reserve for special
multicast addresses.
The multicast addresses in the range are
globally scoped across internet.
Local

administratively

scoped

multicast

addresses are described by this range

Table 2.1: Ranges and usage of IP Multicast Address


The intermediate range of above table is also known .. multicast
addresses [7]

CHAPTER 3
NAME OF CHAPTER 3
3.1 Overview
The satellite communication is playing a vital role in wireless communication industry. This
chapter describes an overview of the multicast support in satellite environment and identifies
different

advantages

of

adapting

multicast

technology

over

satellite

networks. ..............................................different network scenarios is discussed.

3.2 Satellite Networks


The

satellite

networking

applications

and

technologies

has

been

.many positive effects in technological and economical


evolution because of the following reasons
1) Coverage throughout the world
2) Can .............
3) For the ..... [9].
There are three types of satellite orbits, based on the distance from the earth as shown in the
below figure.

Figure 3.3: LEO, MEO and GEO satellite orbits around the earth [22].

3.2.1 Lower Earth Orbit


This orbit is nearest ............................[2].

3.2.2 Medium Earth Orbit


The MEO ....... revolution.
re [21].

CHAPTER 4
METHODOLOGY
4.1 Overview
This chapter emphasizes on the methodology being used in this project to analyze
i...

4.2 Overview of OPNET Modeller


For the analysis of predefine scenarios the real test beds approach is always expensive and
requires high effort for the remodeling of the scenarios. Whereas the simulators has resolved
these issues by attaining as real as possible adaptable results. OPNET was initially
developed at Massachusetts Institute of technology (MIT) in USA in 1987. OPNET offers
comprehensive environment for the development of model design of simulation and
performance analysis of wide variety of networks [32]. The work flow of OPNET for desired
results from a certain network model can be shown as follow:

Figure 4.4: Project Workflow of a Simulation [30]


The four modeling domains or hierarchical levels of OPNET allow it to provide certain extent
of flexibility to the designers to support a wide range of features. These modeling domains are
as follow

4.2.1 Network Domain


The project editor develops the network model which represents the gadgets or the physical
equipment being used for the simulation. It can develop a network model in terms of
geographic contest. It is constructed by two main classes of components i.e. communication
links and communication nodes. Complex topologies can be constructed in project editor via
creation of unlimited nested sub network.

10

Figure 4.5: Different Levels of OPNET Simulation Model [31]

4.2.2 Node Domain


The modelling of the communication devices, linked together at network model is provided
by node domain. It utilises the functional elements and the data steams between them to show
the internal architecture of the node. Node models are constructed by small blocks known as
modules which include defined (transmitters, receivers) and programmable modules (queues,
processors and external systems).
These modules are interconnected by three types of links i.e. packet streams, statistic wires
and logical associations. The packet streams are responsible to convey the packets between
modules similarly control information between modules is conveyed by statistic wires and a
binding between the modules is shown by logical associations i.e. between and transmitter

11

and receiver module to show them a pair. A typical node model is shown by the figure 4.3.

Figure 4.6: A typical Node Model

4.2.3 Process Domain


The behaviour of each programmable module in the node domain is shown by process domain
which could be one process model or nested process models as required. The process models
operate according to the desired interrupts. These models are developed in Proto-C, which
utilises a library of Kernel Procedures, graphical state-transition-diagrams and data
items/statements of embedded C/C++ language. A typical process model is shown in the
figure 4.4.

Figure 4.7: typical Process Model


There are three types are states shown in the figure 4.4. The initial state shows the starting of
process execution. The forced state or green state is the one which do not permit any break
12

while the process is running whereas the unforced state or red state is doing the opposite
function. The movement between different states of processes are defined by transitions
which can be associated with conditions. Moreover each state has two portions at its top and
bottom known as Enter Executives and Exit Executives respectively. Further to the Header
Block, the ProtoC code for each state is defined in these portions [31].

4.2.4 External System Domain


The external system module (esys) in the node domain involves the mechanism to
communicate with other external simulators such that the data exchange between simulators
can happen while they run synchronously. The interaction of OPNET with the external
simulator is controlled by the respected process model. The external system behaves like a
black box to an OPNET simulation meanwhile data exchange can take place between them as
shown in the figure 4.5.

Figure 4.8: OPNET External System Domain [31]

4.3 Why OPNET


OPNET Technologies have developed the OPNET with four hierarchical levels and an
intuitive graphic user interface (GUI) with a lot of documentation, which makes it perfect for
this project. OPNET supports in making different scenarios to investigate the different
characteristics i.e. scalability, efficiency, performance and viability of a network. Moreover
OPNET contains a variety of existing components in its library which supports the designer to
13

go through a vast range of network specifications, which minimizes the effort of the
developer, implementation period and volume of errors. Furthermore to some limit, it allows
to implement individual algorithms
Generally the simulation approaches are cost effective and profitable but OPNET is one of the
best simulators being employed in network research and development. Without any expense it
enables the designer to modify the existing scenario by duplicate scenario method and most
of the network tools are predefined which can be utilized and reformed accordingly. Moreover
it can interact with the external simulators via external system domain.
The OPNET do have competitors especially NS-2, which is an open source simulator. But it
has some negative aspects as well for example it does not have much documentation and
mostly its out of date. NS-2 also involves two programming languages, so it could take long
time to learn it whereas OPNET have a huge documentation and uses only one language
(Proto-C). Since NS2 needs Linux Operating System to operate properly whereas OPNET can
be installed easily on MS Windows. Moreover the number of tools for the analyzing the NS-2
trace file or creating scenarios is not enough in NS-2 and most of the developers have to
create the required tool by their own. Finally NS-2 have some scalability issues in big
simulations (number of nodes can vary from few hundreds to thousands) and can consumes a
large memory [26].
While keeping in view the above comparison, OPNET is proved to be the better choice to do
this project.

14

CHAPTER 5
SIMULATION RESULTS & ANALYSIS
5.1 Overview
This chapter describes the result and analysis of two different scenarios .

5.2 IGMP Behaviour


The simulation is run for five minutes and the ..s can be explained as
follow;

5.2.1 IGMP Behaviour in Scenario 1


Since in this scenario the . sent by the hosts to the designated routers.

15

Figure 5.9: IGMP messages being sent by hosts to DRs


The left most spikes in the above figure shows that all the multicast receivers are sending
IGMP Membership Report to the 224.0.6.1 at 10 seconds except Lib_Wkstn which is not the
part of multicast group. The central spikes are showing those IGMP Membership Reports
which were sent in response to IGMP Membership Queries from the DRs. These IGMP
Membership Queries will be shown in the figure 5.2. Moreover the right side spikes in the
figure 5.1 shows IGMP Leave message being sent at 180seconds.

16

CHAPTER 6
CONCLUSION & FURTHER WORK
6.1 Conclusions
This dissertation has been started from the introduction of Multicasting, its classifications,
addressing and its advantages over the other transmission mechanisms for example it saves
the scare bandwidth as it minimizes the unwanted router processing and load at sender by
multicasting a single copy of data. Different membership management protocols like three
versions of Internet Group Management Protocols and two versions of Multicast Listener
Discovery protocols were discussed in detail. Furthermore different routing protocols like
Distance Vector Multicast Routing Protocol, Multicast Extensions to OSPF and Protocol
Independent Multicast (Sparse and Dense Modes) were discussed in details.
The satellite communication role and different orbits of satellite communication were
reviewed. Moreover different satellite network roles and advantages of satellite over the
terrestrial communication networks were discussed while reviewing certain applications like
ATM and DVB-RCS. The main idea of this project was to combine the multicasting over the
satellite network and analyzing behavior of IGMP over satellite network while reviewing
two different IP multicast scenarios. Different issues like bandwidth utilization and delay over
the satellite link were analyzed in both the scenarios.
It was noticed that the scenario 2 in which the end users were directly connected to the
satellite, involves the IGMP Membership Queries , Requests and Leave Messages across the
satellite link which results in scare bandwidth wastage and could result in IGMP flooding for
a huge number of receivers. On the other hand the scenario 1 involved the designated routers
between the end users and satellites so that all the IGMP messaging was done between the
17

designated routers and the end users. Moreover this scenario employs PIM messages over the
satellite link for multicast application to work.
Both the scenarios were simulated in OPNET and from the results of chapter 5, it was
observed that scenario 1 is more reliable than the other scenario as the multiple response of
IGMP traffic over the satellite in scenario 2 consumes more bandwidth than the PIM-SM
messages over the satellite in scenario 1. Secondly as more traffic is involved in scenario 2 so
there are more delay as compare to the scenario1. Moreover the scenario 1 is more reliable at
the user end because the number of multicast receiver at the user end can be increased in the
same infrastructure.
Hence from the results the scenario 1 is found to be the better scenario in term of optimized
link utilization and offers more benefits to the network operator than other scenario.

6.2 Further Work


This project work can be extended further in the following areas

6.2.1 Reliable Multicast


The

reliable

multicast

provides

way

of

guarantee

..losion. There are some possible solutions for reliable


multicast as follow [27]
1)

Distributed loss recovery

2)

Router aided recovery

3)

FEC based recovery

Further work can be done in this project by reviewing the above mechanisms and developing
new reliable multicast protocols for UDP based multicast applications.

18

6.2.2 Satellite Multicast Security Protocols


In

wireless

communication

tellite.

6.2.3 Mobile Multicast


The existing sender and the recipients in this project are fixed which can be changed to
mobile. This alteration will require to deal with dynamic membership and the movement of
the group members between home [29]. This mobile multicast
solution can be reviewed with satellite network of this project.

19

REFERENCES
[1]

S. Liqi, Summary of IP Multicast, University of Calgary,2005. [online] Available:

http://pages.cpsc.ucalgary.ca/~mahanti/teaching/W05/CPSC601/. [Accessed: Jun. 1,2012]


[2]

E.C.Onuora, Multicasting over satellite networks, Master Thesis, School of

Engineering Design and Technology, University of Bradford, Bradford, 2010.

20

21

Das könnte Ihnen auch gefallen