Free Essay

Fault Tolerance in Wsn

In: Computers and Technology

Submitted By peshalbhattarai
Words 3094
Pages 13
Table of Content
TABLE OF CONTENT ........................................................................................................................... 1
ABSTRACT ............................................................................................................................................ 2
INTRODUCTION .................................................................................................................................... 3
FAULT TOLERANCE IN WSN .............................................................................................................. 4
LITERATURE REVIEW .......................................................................................................................... 6
RESEARCH OBJECTIVES .................................................................................................................... 7
METHODOLOGY ................................................................................................................................... 8
SIGNIFICANCE .................................................................................................................................... 10
LIMITATION ......................................................................................................................................... 10
POTENTIAL CONTRIBUTIONS (IMPLICATION OF RESEARCH) .................................................... 11
REFERENCES ..................................................................................................................................... 12
APPENDICES ...................................................................................................................................... 13

Page | 1

ABSTRACT
In the last ten years, wireless sensor networks (WSNs) have increasingly gained the attention of researchers. Depending on the applications of WSNs, the sensor nodes are usually dispersed in harsh environments, such as on the ocean floor or in an active volcano, making these nodes more prone to failures. Hence, fault tolerance seems as an essential characteristic that should be considered in the architecture level of these networks. On the other hand, WSNs are battery-powered so that there is a trade-off between preserving the energy and meeting the quality of service requirements of the network. So we are planning for a low computation and efficient algorithm for Distributed Fault detection (DFD) and Fault Tolerance. The main concept is to efficiently use different kinds of the redundancy, time and space. We validate our DFD algorithm through simulation and probabilistic analysis.

Page | 2

INTRODUCTION
Traditional wireless networks are used as a replacement for their wired counterparts.
They provide network infrastructure. In recent years a new type of wireless network emerged very rapidly with a different goal. It provides an effective way for sensing, processing and communicating monitored data. This new type of wireless network is termed as Wireless Sensor Network (WSN). The micro-electro-mechanical systems
(MEMS) technology, wireless communications and digital electronics together enabled the development of low-power, low-cost, multifunctional tiny sensor nodes.
These sensor nodes are densely deployed in the physical phenomenon and collaboratively form a wireless sensor network. These tiny sensor nodes consist of sensing, data processing, and communicating components. The main characteristics of these sensor nodes are in its infrastructure-less and self-organizing capability. The sensor nodes are deployed randomly and they can perform their task in an unattended manner. Another vital feature of sensor network is the cooperation between sensor nodes. Sensor nodes contain on-board processors. Instead of sending raw data sensor nodes transmit partially processed data by carrying out computation locally. Sensor networks are generally used to monitor temperature, humidity, pressure, mechanical stress level, vehicular movement etc. Different types of sensors such as seismic, thermal, infrared, acoustic are used for monitoring.
Sensor Networks can be used for continuous monitoring or event detection. It has widespread application areas which includes:
• Disaster Management
• Military Application
• Environment Monitoring
• Health Care
In spite of all its advantages there are some limitations that influence the performance of WSN. The prominent among such factors are Energy Constraint,
Hardware Constraints, fault tolerance, scalability and so on. Many researchers are currently trying to overcome such limitations and they become successful to rise above these limitations to some extent.
Fault tolerance is the ability of a system to perform its function correctly even in the presence of internal faults. Basic causes behind fault tolerance are fault and failure.
A failure occurs when an actual running system deviates from this specified behaviour. The cause of a failure is called an error. An error represents an invalid system state, one that is not allowed by the system behaviour specification. The error itself is the result of a defect in the system or fault. In other words, a fault is the root cause of a failure. The main concept of all fault tolerance techniques is some form of masking redundancy. This means that components that are prone to failure are
Page | 3

replicated in such a way that if a component fails, one or more of the non-failed replicas will continue to provide service with no appreciable disruption.

Fault Tolerance in WSN
Fault tolerance emerged early as a major concern during design of digital computing systems. Fault tolerance is the ability of a system to perform its function correctly even in the presence of internal faults. Basic causes behind fault tolerance are fault and failure. A failure occurs when an actual running system deviates from this specified behaviour. The cause of a failure is called an error. An error represents an invalid system state, one that is not allowed by the system behaviour specification.
The error itself is the result of a defect in the system or fault. In other words, a fault is the root cause of a failure. The main concept of all fault tolerance techniques is some form of masking redundancy. This means that components that are prone to failure are replicated in such a way that if a component fails, one or more of the non-failed replicas will continue to provide service with no appreciable disruption.
Wireless Sensor Network has due to its wide application areas and limitless future potentials emerge as a premier research topic. WSN consist of thousands of low power low cost tiny sensor nodes. The small size and low cost puts restriction on the hardware and software capabilities of sensor nodes. Sensor nodes are equipped with a limited irreplaceable power source, less processing ability, minimal memory.
Energy is the most important restriction of a WSN. With this limited energy source
WSN have to continue its application from day to years. So there is a trade-off between conserving energy for lifetime increment and maintaining Quality of Service by implementing complex fault tolerance techniques. Sensor nodes are prone to failure due to lack of energy, faults in hardware. Due to its inhospitable working environment often faults in communication occurs in WSN. The harsh environmental condition e.g. fire and rain also cause node misbehaviour, failure of nodes of a particular area, sink failure etc. WSN application fails due to sensor nodes failure; sink failure, communication link error, malicious attack and so on. WSNs are used for many safety and time critical application. In which a failure has an adverse impact on both human and environment. So, Fault tolerance is one of the critical issues in WSN and it need to be tackled with differently. Faults can occur and handled in WSN in four different levels. They are:

Hardware Level
In hardware malfunctioning of any hardware components of a sensor node can cause level faults. Costs of Sensor nodes are low. Therefore its components are not high quality. So they are prone to failure. Sensor nodes have limited irreplaceable
Page | 4

energy source. This strict energy constraint is main hurdle in providing quality of service in WSN application. Sensor nodes are deployed in harsh environment, which can cause failure of sensor nodes as well as sink.

Software Level
Software bugs are common source of errors in WSN. There are two types of software in WSN: system software such as operating system and middleware such as communication, routing etc. It is difficult to provide fault tolerance at hardware level in an economic way. Therefore Fault tolerant approaches are generally applied at middleware level.

Network Communication Level
Failure in network communication occurs due to fault in wireless communication links. This type of failure generally related to harsh physical environment. Error correction and retransmission will enhance the quality of service in this level but they increase overhead and delay.

Application Level
Faults in multiple nodes, sink and network communication link may cause failure of a
WSN application. Addressing fault tolerance at application level is very efficient. But application level fault tolerance is application specific to some extent. But it can address any types of failure like sink, node and communication link. Different types of
Faults in different level cause failure of two main components of WSN: sink and node. Failure of these components can be handled by hardware software or application level.

Page | 5

Literature Review
Numerous fault detection and recovery techniques are proposed in literatures. Some review of existing fault detection and recovery approaches for WSN are presented in this section. A survey on fault tolerance in WSN can be found in different paper with a detailed description on fault detection and recovery is available.
In [1] they had proposed a distributed Bayesian algorithm for sensor fault detection and correction. The algorithm considered that measurement errors due to faulty equipment are likely to be uncorrelated. [2] Had proposed a weighted median fault detection scheme that used spatial correlations among the sensor measurements
(e.g., temperature, humidity).A probabilistic approach to diagnose intermittent WSN faults. The simulation results indicated that the DFD algorithm’s accuracy increased as the number of diagnostic rounds in- creased when neighboring sensor nodes exchanged measurements in each round [3]. DFD algorithm that identified faulty sensor nodes based on comparisons between neighboring sensor nodes’ data. The
DFD algorithm used time redundancy to tolerate transient faults in sensing and communication [4]. [5] Proposed a DFD scheme that detected faulty sensor nodes by exchanging data and mutually testing neighboring nodes. Agnostic diagnosis for detecting silent failures (i.e., failures with unknown types and symptoms). The proposed detection technique exploited the fact that a sensor node’s metrics (e.g., radio on-time, number of packets transmit- ted in a time interval) exhibited certain correlation patterns, the violation of which indicated potential silent failures. The detection accuracy of the proposed scheme was close to 100% for small WSNs, whereas the detection accuracy decreased sharply and the false alarm rate increased as the WSN size increased [6]. Application layer approaches to achieve fault tolerance is discussed in [7]. Technique for handling sink and node failure in a multi-sink WSN is proposed in [8]. In this method all sinks gather knowledge about the topology of WSN by collecting information from each node of the network. Then the sinks exchange their information to create a unique global topology. From this global topology, multiple redundant routes for each sensor node are computed, and forwarding tables are built. Finally, these forwarding tables are transmitted to the respective sensor nodes. Now maximum sensor nodes have more than one routing paths to different sink. So, when a sink fail the failure handled automatically by routing the data to other sinks using alternative routing paths. If a routing path becomes unavailable due to node failure then this situation can be handled by routing the data through redundant path. This technique incorporates a large overhead for collecting topology information, computing the global topology and transmitting the forwarding table. An approach for recovery from node and sink failure is discussed in [9]. It partition the sensor network into different cells, where a cell
Page | 6

contains one data sink s and any sensor that has a smaller hop count to s than to any other data sink. If a sensor has the same hop count to two or more data sinks, then that node is termed as border node and it will belong to the cell of each of these data sinks and it contains addresses related to all cells. If some data sink fails this protocol recover from it by attaching the boarder node only to the non- 58 failed cell and the border node then contain only the address related to the non-failed cell. Then border node broadcast the address related to its non-failed cell and other nodes from the failed sink’s cell attach themselves to boarder node’s non-failed cell. Here node failure is also handled in a very similar manner. Base stations can be attacked and even compromised like any other sensor node on the network. Candidate base stations are base stations with similar characteristics like currently active base stations. They just pretend to be ordinary nodes on the sensor network. But when there is a base station compromise/failure they are resorted to play base station roles. This approach is elaborated in [10]. It is very efficient for failure recovery but providing candidate base station with each primary base station is not cost effective.
A scheme for handling node failure in a clustered WSN is proposed in [11]. Here nodes of a cluster are classified into different types like head node, boundary node, pre boundary node and internal node. When a node is going to die it send a failure report to its entire neighbour. Now each type of receiving node starts its own recovery mechanism. This scheme only deal with node failure due to energy exhaustion and it also assume that the failing node broadcasts its failure report before die out completely. Research Objectives
The main objective of the thesis is to develop new approaches for providing energy efficiency, longer lifetime, and fault tolerance for WSNs, which are mainly used for time critical applications like disaster management. A number of algorithms have been proposed in the literature to solve these problems. A detailed literature survey will be done for developing an idea about the solution. This thesis studies the performances of some existing algorithms and proposes novel algorithms for fulfilling its objective. Performances of all algorithms will be studied and will implement in a simulation environment and will analysis the simulation results.

Page | 7

Research Questions.
General


How can fault tolerance be improved in WSNs?

Specific



How can fault tolerance algorithm be energy efficient?
How can Distributed Fault Detection algorithm be improved?

Methodology

To structure the work to be done, a project management approach will be followed.
The work will be divided in 4 activities that will be subdivided in Tasks.
A1
A2
A3
A4

Curricular Year
Related Work
Development and testing
Elaboration of the Thesis

Back-­‐ ground

Develop-­‐ ment and

Testing

A4 - Elaboration of the thesis

A2 – Related Work

A graphical presentation of the activities showing their interdependencies in shown in Figure below:

Page | 8

Background
The Background is composed of 4 tasks:


Methodologies for Scientific Research



Knowledge Extraction



Simulation Environments



Research Planning

Related Work
State of the art
To enlarge the knowledge and improve the concept of this thesis, an ongoing study on the related work is in progress aimed mainly at fault tolerance areas although other complimentary areas are also being studied such as distributed fault detection and energy efficient algorithms. During this task a comparison matrix/methodology will be defined. A common approach would be to use statistics for this purpose.

Elaboration of the thesis
The elaboration of the thesis will be made during all phases of this research but after the results are obtained and tested against the other algorithms, finally it will be the time to conclude the thesis and hopefully the results will be a good contribution to the scientific community that acts not only in WSNs but also other technologies that need Fault tolerance algorithm.

Page | 9

Significance
The world’s need for monitoring has increasing since the recent attacks to critical infrastructures. Monitoring is now ubiquitous and could be present in: Monitoring space (environmental and habitat monitoring, precision agriculture) Monitoring things
(indoor climate control, surveillance and intelligent alarms) Monitoring space and things (the interactions of things with each other and the surrounding space). So in order to achieve a good result there should be some algorithm to detect and tolerate the level of fault that can occur in the system. For example:





Wildlife habitats;
Disaster management;
Emergency response;
Healthcare;

Limitation

With the advances in processing power, sensor accuracy, miniaturization and production costs, WSNs will be used in a wider range of applications in the near future. Already deployed WSNs serve as a proof of concept, providing the means to monitor environmental data formerly impossible to collect due to the inaccessibility or characteristics of the environments where such physical phenomena take place.
Research on this field is very promising and has been attracting the scientific community for the last years. Some of the more active research areas are WSN as a service network, Database like network (query), Distributed processing and storage algorithms, Routing protocols, Network Auto-Setup (self-organization and self- maintenance), Fault tolerance algorithm. Recent developments prove that there are many applications feasible with the available technology; assuring that in a near future WSNs will become commodities in what concerns sense and instrument the physical world. Furthermore WSNs are a factor of progress, enhancing productivity in sectors such as agriculture, transport and construction. The fault tolerance algorithm proposed will be tested against the other technologies available and in case of less satisfactory results, the reasons will be assessed and the algorithms will be optimized to achieve better performance.

Page | 10

Potential Contributions (Implication of Research)

The proposed thesis will focus on contributing to the scientific community with a
Fault tolerance algorithm more accurate and effective that the ones in use. The development of Fault tolerance algorithms for wireless sensor networks will try to accomplish the following over the other algorithms:


Better accuracy;



Better performance;



Better efficiency;



Scalability;



Energy efficient;

Page | 11

References
[1] Bhaskar Krishnamachari and Sitharama Iyengar, "Distributed Bayesian algorithms for fault-tolerant event region detection in wireless sensor network”. IEEE
Transactions on Computers, 2004.
[2] Gao Jian-Liang, Xu Yong-Jun, and Li Xiao-Wei, "Weighted-median based distributed fault detection for wireless sensor networks". Journal of Software, 2007.
[3] P. Khilar and S. Mahapatra," Intermittent fault diagnosis in wireless sensor networks”, 2007.
[4] M. Lee and Y. Choi, " Fault detection of wireless sensor networks. Elsevier
Computer Communications”, 2008.
[5] Peng Jiang, "A new method for node fault detection in wireless sensor networks”,
2009
[6] Xin Miao, Kebin Liu, Yuan He, Dimitris Papadias, Qiang Ma, and Yunhao Liu,
"Discovering silent failures in wireless sensor networks". IEEE Transactions on
Wireless Communications, 2013
[7] H. liu, A. Nayak, I. Stojmenovi´c, “Fault Tolerant Algorithms/Protocols in Wireless
Sensor Networks”, Guide to Wireless Sensor Networks, Springer, 2009.
[8] J. Deng, R. Han, S. Mishra, “Enhancing Base Station Security in Wireless Sensor
Networks”, Department of Computer Science, University of Colorado, Tech. Report
CUCS-951-03, 2003.
[9] H. Lee, A. Klappenecker, K. Lee, L. Lin, “Energy Efficient Data Management for
Wireless Sensor Networks with Data Sink Failure”, IEEE International Conference on
Mobile Ad-hoc and Sensor Systems conference, November 2005.
[10] N. Evarist, Y Lin, “Candidate Base Stations a Security Solution for
Compromised Base Stations in Wireless Sensor Networks”.
[11] G. Venkataraman, S. Emmanuel, S. Thambipillai, “Energy-efficient clusterbased scheme for failure management in sensor networks”, April 2008

Page | 12

Appendices

Time Table
1. Curricular Year
2. Related Work
3.Development and testing
3a.Development of the framework components 3b.Comparative analysis
3c.Elaboration of the thesis
4. Documentation

June 10 to July 15,2015
July 15 to September 30,2015
September 30 to October 30,2015
October 30 to December 25,2015
December 25 to February 15,2015
February 15 to April 15,2015
April 15 to July 05,2015

Page | 13

Page | 14

Similar Documents

Premium Essay

Nt1310 Unit 7 Exercise 1

...1. Energy: The sensor nodes are generally inaccessible after deployment and normally they have a finite source of energy that must be optimally used for processing and communication to extend their lifetime. It is a well known fact that communication requires significant energy. In order to make optimal use of energy, therefore communication should be minimized as much as possible. 2. Redundancy: Due to the frequent node failures and inaccessibility of failed nodes, WSNs are required to have high redundancy of nodes so that the failure of few nodes can be negligible. 3. System Lifetime: The WSNs should function as long as possible. Their system lifetime can be measured by using generic parameters such as time until the nodes die or by using...

Words: 1568 - Pages: 7

Free Essay

Prolonging the Lifetime of Wireless Sensor Network.

...INTRODUCTION Wireless Sensor Networks (WSNs) are distributed embedded systems composed of a large number of low- cost, low-power, multifunctional sensor nodes. The sensor nodes are small in size and communicate wirelessly in short distances. These tiny sensor nodes can perform sensing, data processing and communicating. They are densely deployed in the desired environment. A sensor network consists of multiple detection stations called sensor nodes, each of which is small, lightweight and portable. Every sensor node is equipped with a transducer, microcomputer, transceiver and power source. The transducer generates electrical signals based on sensed physical effects and phenomena. The microcomputer processes and stores the sensor output. The transceiver, which can be hard-wired or wireless, receives commands from a central computer and transmits data to that computer. The power for each sensor node is derived from the electric utility or from a battery. Sensors use a signal of some sort, from the environment and convert it to readable form for purpose of information transfer. Each sensor node has multiple modalities for sensing the environment such as acoustic, seismic, light, temperature, etc. However, each sensor can sense only one modality at a time. The sensor nodes in the target tracking WSN use collaboration with the neighboring nodes. This requires data exchange between sensor nodes over an ad hoc wireless network with no central coordination medium. There...

Words: 1981 - Pages: 8

Premium Essay

Nt1310 Unit 3 Assignment 1

...work efficiently or the terrain is not appropriate to deploy stationary nodes which are connected via wired links. This makes ANET very useful in emergency condition. 3.2.1 Types of Ad Hoc Network: MANET A mobile ad hoc network (MANET), sometimes also known as a mobile mesh network (MMN), is a self-configuring network of mobile devices connected by wireless links. Each device in a mobile ad hoc network is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. Fig: 3.3 Typical MANET Wireless Mesh Network (WMN) A wireless mesh network (WSN) is a communications network made up of radio nodes organized in a mesh topology. Fig: 3.4 Wireless mesh network Wireless Sensor Network (WSN) A wireless sensor network is a wireless network consisting of spatially distributed autonomous model using sensors to cooperatively monitor physical or environmental conditions, such as sound, temperature, vibration, motion or pollutants, pressure, at different locations. 3.4Mobile Ad-Hoc network (MANET) Also known as mobile mesh is a self configuring collection of mobile devices connects via wireless links. All devices in Mobile Ad-Hoc network are connected to the other by wireless links, but because the network is an ANET, the node can be move in any direction without any constraints. The link among two or more devices changes dynamically. This is the primary challenge...

Words: 1702 - Pages: 7

Premium Essay

The Internet of Things

...See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/263893131 TruSMS: A trustworthy SMS spam control system based on trust management Article in Future Generation Computer Systems · July 2014 Impact Factor: 2.79 · DOI: 10.1016/j.future.2014.06.010 CITATIONS READS 4 2,022 4 authors, including: Zheng Yan Raimo Kantola Xidian University Aalto University 88 PUBLICATIONS 588 CITATIONS 91 PUBLICATIONS 298 CITATIONS SEE PROFILE All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately. SEE PROFILE Available from: Zheng Yan Retrieved on: 12 April 2016 This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution and sharing with colleagues. Other uses, including reproduction and distribution, or selling or licensing copies, or posting to personal, institutional or third party websites are prohibited. In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or institutional repository. Authors requiring further information regarding Elsevier’s archiving and manuscript policies are encouraged to visit: http://www.elsevier.com/authorsrights Author's personal copy ...

Words: 18072 - Pages: 73

Premium Essay

An Evolution of Computer Science Research

...Abbreviated version of this report is published as "Trends in Computer Science Research" Apirak Hoonlor, Boleslaw K. Szymanski and M. Zaki, Communications of the ACM, 56(10), Oct. 2013, pp.74-83 An Evolution of Computer Science Research∗ Apirak Hoonlor, Boleslaw K. Szymanski, Mohammed J. Zaki, and James Thompson Abstract Over the past two decades, Computer Science (CS) has continued to grow as a research field. There are several studies that examine trends and emerging topics in CS research or the impact of papers on the field. In contrast, in this article, we take a closer look at the entire CS research in the past two decades by analyzing the data on publications in the ACM Digital Library and IEEE Xplore, and the grants awarded by the National Science Foundation (NSF). We identify trends, bursty topics, and interesting inter-relationships between NSF awards and CS publications, finding, for example, that if an uncommonly high frequency of a specific topic is observed in publications, the funding for this topic is usually increased. We also analyze CS researchers and communities, finding that only a small fraction of authors attribute their work to the same research area for a long period of time, reflecting for instance the emphasis on novelty (use of new keywords) and typical academic research teams (with core faculty and more rapid turnover of students and postdocs). Finally, our work highlights the dynamic research landscape in CS, with its focus constantly ...

Words: 15250 - Pages: 61

Premium Essay

Summary Management Information System

...MIS Summary chapter 5 ‘’IT infrastructure and emerging technologies’’ -IT infrastructure: shared technology resources that provide the platform for firm’s specific information system applications. (Including investments) Service platform (Figure 5.1, page 196) 1. Computing platforms that connect employees customers and suppliers in an digital environment. 2. Telecommunication services (provide data, voice and video connectivity) 3. Data management services that store and manage corporate data 4. Application software services (that provide enterprise-wide capabilities) 5. Physical facilities management services that develop and manage physical installations 6. IT management services that plan and develop infrastructure, coordinate with business units for IT services, manage accounting and provide project management services 7. IT standard services that that provides information which system to be used 8. IT education services that provide training in how to use systems for employees 9. IT research and development services Evolution era’s IS (Figure 5.2!, page 198) 1. General purpose mainframe and minicomputer era (1959- present) =IBM mainframes run by professionals. Changed by minicomputers which was cheaper and decentralized computing. 2. Personal computer era (1981- now) =First real computer. Wintel PC became standard desktop. 3. Client server era (1983- now) =laptops (Clients) are networked to server computer that provides client computer with...

Words: 5045 - Pages: 21

Premium Essay

Internet

...The Future of the Internet A Compendium of European Projects on ICT Research Supported by the EU 7th Framework Programme for RTD European Commission I nform ati on S oc i et y and M ed ia Europe Direct is a service to help you find answers to your questions about the European Union New freephone number * 00 800 6 7 8 9 10 11 Certain mobile telephone operators do not allow access to 00800 numbers or these calls may be billed. In certain cases, these calls may be chargeable from telephone boxes or hotels. «The views expressed are those of the authors and not necessarily those of the European Commission or any of its officials» A great deal of additional information on the European Union is available on the Internet. It can be accessed through the Europa server (http://www.europa.eu). Cataloguing data can be found at the end of this publication. ISBN 978-92-79-08008-1 © European Communities, 2008 Reproduction is authorised provided the source is acknowledged. Printed in Belgium PRINTED ON CHLORE FREE PAPER The Future of the Internet A Compendium of European Projects on ICT Research Supported by the EU 7th Framework Programme for RTD European Commission I nform ati on S oc i et y and M ed ia ••• 2 Preface 5 priorities identified by the Internet Governance Forum: openness, security, access, diversity and critical Internet resources. The use of the Internet in public policies will considerably grow in areas such as education, culture, health and e-government...

Words: 66329 - Pages: 266

Free Essay

Ask for a Collectible

...18 Learn the discipline, pursue the art, and contribute ideas at www.architecturejournal.net input for better outcomes Green Computing Environmentally Sustainable Infrastructure Design Green Maturity Model for Virtualization Application Patterns for Green IT Architecture Journal Profile: Udi Dahan Profiling Energy Usage for Efficient Consumption Project Genome: Wireless Sensor Network for Data Center Cooling Green IT in Practice: SQL Server Consolidation in Microsoft IT Contents Foreword by Diego Dagum 1 18 Environmentally Sustainable Infrastructure Design by Lewis Curtis A comprehensive understanding of environmental sustainability needs for IT infrastructure system design. 2 Green Maturity Model for Virtualization by Kevin Francis and Peter Richardson The authors present a study on the maturity of virtualization practices and offer a sustainability roadmap for organizations planning a green agenda. 9 Application Patterns for Green IT by Dan Rogers and Ulrich Homann A complete analysis on power-efficient applications design, considering tools that help the architect achieve scalability without deriving in energy waste. 16 Architecture Journal Profile: Udi Dahan For this issue’s interview, we catch up with Udi Dahan, noted expert on SOA and .NET development, and four-time Microsoft MVP. 22 Profiling Energy Usage for Efficient Consumption by Rajesh Chheda, Dan Shookowsky, Steve Stefanovich, and Joe Toscano This article suggests...

Words: 29810 - Pages: 120

Free Essay

Green Computing

...18 Learn the discipline, pursue the art, and contribute ideas at www.architecturejournal.net input for better outcomes Green Computing Environmentally Sustainable Infrastructure Design Green Maturity Model for Virtualization Application Patterns for Green IT Architecture Journal Profile: Udi Dahan Profiling Energy Usage for Efficient Consumption Project Genome: Wireless Sensor Network for Data Center Cooling Green IT in Practice: SQL Server Consolidation in Microsoft IT Contents Foreword by Diego Dagum 1 18 Environmentally Sustainable Infrastructure Design by Lewis Curtis A comprehensive understanding of environmental sustainability needs for IT infrastructure system design. 2 Green Maturity Model for Virtualization by Kevin Francis and Peter Richardson The authors present a study on the maturity of virtualization practices and offer a sustainability roadmap for organizations planning a green agenda. 9 Application Patterns for Green IT by Dan Rogers and Ulrich Homann A complete analysis on power-efficient applications design, considering tools that help the architect achieve scalability without deriving in energy waste. 16 Architecture Journal Profile: Udi Dahan For this issue’s interview, we catch up with Udi Dahan, noted expert on SOA and .NET development, and four-time Microsoft MVP. 22 Profiling Energy Usage for Efficient Consumption by Rajesh Chheda, Dan Shookowsky, Steve Stefanovich, and Joe Toscano This article suggests...

Words: 29810 - Pages: 120

Free Essay

Management Information Systems

...Find more on www.studymaterial.ca ADMS 2511 MIS Notes Ch 1 – Modern Organization in the Global, Web-Based Environment Management information systems (MIS)- deals with the planning of info tech to help people perform tasks related to info processing and management Information technology (IT)- any computer-based tool used with info to support the needs of an org Importance of Planning for IT -a new info system can apply to the whole org, or a specific area of the org Application portfolios- are groups of new system proposals (apps that have to be added/modified) IT Planning -begins with an organizational strategic plan -states  the  firm’s  mission,  goals,  and  steps  to  reach  those  goals -IT architecture describes  the  way  an  org’s  info  resources  should  be  used  to  accomplish  its  mission -includes both technical (hardware operating systems) and managerial aspects (managing the IT dpt, how area managers will be involved) IT strategic plan- LT goals that describe the IT infrastructure and major IT initiatives to achieve the organization’s  goals -it must meet three main objectives: -must  be  aligned  with  the  org’s  strategic  plan -must provide for an IT architecture that networks users, apps, and databases -must efficiently allocate IS resources among different projects so they can all be completed on time, within budget, and function properly IT steering committee- composed of managers/staff who rep diff organizational units -they  establish  IT  priorities...

Words: 24496 - Pages: 98