Sensor Data Acquisition

From Federation of Earth Science Information Partners
(Difference between revisions)
Jump to: navigation, search
(Replaced content with "back to EnviroSensing Cluster main page")
Line 1: Line 1:
 
back to [[EnviroSensing Cluster]] main page
 
back to [[EnviroSensing Cluster]] main page
 +
 +
==Overview==
 +
Traditionally, environmental sensor data from remote field sites were manually acquired during infrequent site visits. However, with today's technology, these data can now be acquired in real-time. Indeed, there are several methods of automating data acquisition and transmission, but there is insufficient knowledge among the environmental sensor community about their availability and functionality. Moreover, there are several factors that should be taken into consideration when choosing a remote data acquisition method, including (a) how immediately the data are needed, (b) bandwidth, (c) hardware and network protocols, (d) line-of-sight, (e) power consumption, and (f) security. Here, we provide an overview of these methods and recommend best practices for their implementation.
 +
 +
 +
==Introduction==
 +
 +
 +
==Methods==
 +
 +
==Best Practices==
 +
 +
==Case Studies==
 +
 +
==Resources==
 +
 +
==References==

Revision as of 16:28, 21 April 2014

back to EnviroSensing Cluster main page

Contents

Overview

Traditionally, environmental sensor data from remote field sites were manually acquired during infrequent site visits. However, with today's technology, these data can now be acquired in real-time. Indeed, there are several methods of automating data acquisition and transmission, but there is insufficient knowledge among the environmental sensor community about their availability and functionality. Moreover, there are several factors that should be taken into consideration when choosing a remote data acquisition method, including (a) how immediately the data are needed, (b) bandwidth, (c) hardware and network protocols, (d) line-of-sight, (e) power consumption, and (f) security. Here, we provide an overview of these methods and recommend best practices for their implementation.


Introduction

Methods

Best Practices

Case Studies

Resources

References

Personal tools
Namespaces

Variants
Actions
Navigation
Toolbox