Government Technology

First IP-Powered Wireless Sensor Network Debuts


October 30, 2006 By

Arch Rock Corporation has introduced the first wireless sensor network that can be accessed and operated as a full-fledged member of the IT infrastructure, allowing enterprises to use standard Internet management tools to gain visibility and control down to the level of individual sensor nodes.

Arch Rock Primer Pack is a complete wireless sensor network (WSN) that is simple enough to be deployed in an hour as a pilot network in a factory, office building or data center, yet sophisticated enough to be seamlessly integrated into enterprise applications as a set of standards-compliant web services.

Using Arch Rock's powerful APIs (application programming interfaces) and working in their development environment of choice, users can rapidly create custom applications to monitor physical conditions without doing the cumbersome embedded programming typically required to build sensor network applications. Sensor data becomes immediately available to the plant manager or field worker on his mobile device of choice, or to the office worker in his web browser or enterprise planning application (e.g., ERP or DSS).

Through an unprecedented level of IP and web services integration, Primer Pack gives users full access to embedded WSN services through common IT methodologies. Individual sensor nodes can be assigned IP addresses, DNS names and web pages, and can be directly managed using pervasive IP tools such as SNMP, ping and traceroute. Standard Internet provisioning and troubleshooting techniques, as well as authentication and other security measures, can be applied to single nodes, groups of nodes or the entire WSN.

Wireless Sensor Network: No Longer an Internet Outsider

Dr. David Culler, Arch Rock founder and chief technology officer, said, "Sensor networks in the past have been approached as technology 'islands,' divorced from the broad set of widely-used Internet standards. Primer Pack uses those standards as the basis for bringing the sensor network into the web services environment and integrating it with enterprise applications. For the first time users can access and remotely manage the sensor network just as they would any other networked device.

"In addition, there's been far too much 'assembly required': users have been left on their own to pull together the elements of WSNs -- microcontrollers, radios, wireless protocols, interfaces, commissioning and management tools -- and then tediously hand-code their applications. As a turnkey, customizable WSN system, Primer Pack eliminates these obstacles and fully incorporates the physical world of sensors into the digital world of IT."

"Users have been waiting for a sensor network solution that requires no training to set up or write custom applications, yet doesn't compromise functionality," said Arch Rock CEO Roland Acra. "Pilot networks created with Primer Pack can help enterprises in fields as diverse as manufacturing, retail, energy management and freight logistics to build and test applications or model an environment's RF characteristics, paving the way for a smooth large-scale production rollout. For wireless device developers and IT system integrators, Primer Pack provides a service-oriented architecture (SOA) platform to assess the functionality and performance of their solutions in advance of customer deployments."

Primer Pack is a complete out-of-the-box WSN application platform that monitors physical conditions in a wide variety of environments.

Additionally, Primer Pack sensor node software is the first commercial implementation of TinyOS 2.0, the latest version of the de facto standard embedded operating system created specifically for sensor networks. Arch Rock has enhanced TinyOS 2.0 for increased robustness and energy-efficiency, allowing it to conserve maximum power even while remote wirelessly-connected nodes maintain a high level of responsiveness. The hardware independence designed into TinyOS 2.0 means the sensor node hardware can be unbundled and coupled with multi-vendor sensor node hardware offerings (e.g., microcontroller and radio chips from Intel, Texas Instruments, Atmel, Ember) to let Arch Rock, OEM or system integrator partners create wide-ranging future solutions geared to specific applications.


| More

Comments

Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Maintain Your IT Budget with Consistent Compliance Practices
Between the demands of meeting federal IT compliance mandates, increasing cybersecurity threats, and ever-shrinking budgets, it’s not uncommon for routine maintenance tasks to slip among state and local government IT departments. If it’s been months, or even only days, since you have maintained your systems, your agency may not be prepared for a compliance audit—and that could have severe financial consequences. Regardless of your mission, consistent systems keep your data secure, your age
Best Practice Guide for Cloud and As-A-Service Procurements
While technology service options for government continue to evolve, procurement processes and policies have remained firmly rooted in practices that are no longer effective. This guide, built upon the collaborative work of state and local government and industry executives, outlines and explains the changes needed for more flexible and agile procurement processes.
Fresh Ideas In Online Security for Public Safety Organizations
Lesley Carhart, Senior Information Security Specialist at Motorola Solutions, knows that online and computer security are more challenging than ever. Personal smartphones, removable devices like USB storage drives, and social media have a significant impact on security. In “Fresh Ideas in Online Security for Public Safely Organizations,” Lesley provides recommendations to improve your online security against threats from social networks, removable devices, weak passwords and digital photos.
View All

Featured Papers