Wireless sensor networks deployment strategies for outdoor monitoring First Edition Fadi Al-Turjman 2024 scribd download
Wireless sensor networks deployment strategies for outdoor monitoring First Edition Fadi Al-Turjman 2024 scribd download
com
https://ebookfinal.com/download/wireless-sensor-networks-
deployment-strategies-for-outdoor-monitoring-first-edition-
fadi-al-turjman/
OR CLICK BUTTON
DOWNLOAD EBOOK
https://ebookfinal.com/download/protocols-and-architectures-for-
wireless-sensor-networks-1st-edition-holger-karl/
ebookfinal.com
https://ebookfinal.com/download/dynamic-wireless-sensor-networks-1st-
edition-sharief-m-a-oteafy/
ebookfinal.com
https://ebookfinal.com/download/topology-control-in-wireless-ad-hoc-
and-sensor-networks-1st-edition-paolo-santi/
ebookfinal.com
https://ebookfinal.com/download/wireless-ad-hoc-and-sensor-networks-
management-performance-and-applications-1st-edition-he/
ebookfinal.com
Wireless Sensor Networks From Theory to Applications 1st
Edition Ibrahiem M. M. El Emary (Editor)
https://ebookfinal.com/download/wireless-sensor-networks-from-theory-
to-applications-1st-edition-ibrahiem-m-m-el-emary-editor/
ebookfinal.com
https://ebookfinal.com/download/security-in-sensor-networks-1st-
edition-yang-xiao/
ebookfinal.com
https://ebookfinal.com/download/sensor-technologies-for-civil-
infrastructures-applications-in-structural-health-monitoring-1st-
edition-ming-l-wang/
ebookfinal.com
https://ebookfinal.com/download/hacking-wireless-networks-for-
dummies-1st-ed-edition-kevin-beaver/
ebookfinal.com
Fadi Al-Turjman
MATLAB® is a trademark of The MathWorks, Inc. and is used with permission. The MathWorks
does not warrant the accuracy of the text or exercises in this book. This book’s use or discussion of
MATLAB® software or related products does not constitute endorsement or sponsorship by The
MathWorks of a particular pedagogical approach or particular use of the MATLAB® software.
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
This book contains information obtained from authentic and highly regarded sources.
Reasonable efforts have been made to publish reliable data and information, but the
author and publisher cannot assume responsibility for the validity of all materials or the
consequences of their use. The author and publisher have attempted to trace the copyright
holders of all material reproduced in this publication; we apologize to copyright holders if
permission to publish in this form has not been obtained. If any copyright material has not
been acknowledged, please write and let us know so we may rectify this in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted,
reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means
now known or hereafter invented, including photocopying, microfilming, and recording, or in
any information storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.
copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc.
(CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a nonprofit organization
that provides licenses and registration for a variety of users. For organizations that have been
granted a photocopy license by the CCC, a separate system of payment has been arranged.
P R E FA C E xi
AUTHOR xiii
CHApTER 1 INTRODUCTiON 1
1.1 Contributions 2
1.2 Book Outline 4
References 6
CHApTER 2 D E p L OY M E N T O F W i R E L E S S S E N S O R
N E T wO RKS i N O U T D O O R E N Vi RO N M E N T
MONiTORiNG: A N OVERViE w 7
2.1 esired Network Properties in OEM
D 8
2.1.1 Connectivity 8
2.1.2 Fault-Tolerance 9
2.1.3 Lifetime 10
2.2 R andom vs. Deterministic WSNs Deployment 11
2.2.1 R andom Deployment 12
2.2.2 Deterministic (Grid-Based) Deployment 12
2.3 Summary 16
References 18
CHApTER 3 E F F i C i E N T D E p L OY M E N T O F W i R E L E S S
S E N S O R N E T w O R K S TA R G E T i N G E N V i R O N M E N T
M O N i T O R i N G A pp L i C AT i O N S 21
3.1 R
elated Work 25
3.2 S ystem Models and Problem Definition 27
3.2.1 Network Model and Placement Problem 28
VII
VIII C O N T EN T S
CHApTER 4 O p T i M i Z E D R E L AY P L A C E M E N T F O R W i R E L E S S
S E N S O R N E T w O R K S F E D E R AT i O N i N
E N V i R O N M E N TA L A pp L i C AT i O N S 63
4.1 R
elated Work 66
4.2 O ptimized WSN Federation 67
4.2.1 Definitions and Assumptions 67
4.2.2 Deployment Strategy 68
4.2.2.1 G
rid-Based ORP (GORP) 68
4.2.2.2 Th
e General Non-Grid (ORP) 74
4.3 Performance Evaluation 75
4.3.1 Simulation Environment 75
4.3.2 Performance Metrics and Parameters 75
4.3.3 Baseline Approaches 77
4.3.4 Simulation Model 78
4.3.5 Simulation Results 78
4.4 Conclusion 82
References 82
CHApTER 5 TO wA R D S A U G M E N T i N G F E D E R AT E D W i R E L E S S
85
S E N S O R N E T w O R KS i N F O R E S T RY A pp L i CAT i O N S
5.1 ackground and Related Work
B 87
5.2 System Model 88
5.2.1 Problem Definition 88
5.2.2 Communication Model 89
5.2.3 Network Model 90
5.2.4 Grid Model 91
5.3 Fixing Augmented Network Damage Intelligently
(FADI): The Approach92
5.4 Performance Evaluation 99
5.4.1 Performance Metrics and Parameters 100
5.4.2 Baseline Approaches 100
5.4.3 Simulation Setup and Results 101
5.5 Conclusion 104
References 105
C O N T EN T S IX
CHApTER 6 O p T i M i Z E D H E X A G O N - B A S E D D E p L OY M E N T F O R
L A R G E -S C A L E U bi Q U i T O U S S E N S O R N E T w O R K S 107
6.1 Related Work 109
6.2 System Models 111
6.2.1 N etwork Model 111
6.2.2 E nergy Consumption Model 112
6.2.3 C ommunication Model 112
6.2.4 Cost Model 113
6.2.4.1 Relay Node 113
6.2.4.2 C ognitive Node 114
6.2.5 Problem Definition 116
6.3 The O2D Deployment Strategy 117
6.4 Case Study 125
6.5 Simulation Results and Discussion 128
6.5.1 Simulation Setup 131
6.5.2 Evaluation of the Square-Based Grid 131
6.5.2.1 N ode Reliability (NR) 132
6.5.2.2 I nstantaneous Throughput (IT) 132
6.5.2.3 Delay 132
6.5.3 Evaluation of the Hexagon-Based Grid 134
6.5.3.1 I nstantaneous Throughput (IT) 135
6.5.3.2 N ode Reliability (NR) 136
6.6 Conclusions 138
References 139
CHApTER 7 TO wA R D S P R O L O N G E D L i F E T i M E F O R
D E p L OY E D W i R E L E S S S E N S O R N E T w O R K S iN
XI
X II P REFAc E
X III
XIV AU T H O R
with Taylor & Francis Group, CRC Press, New York. Since 2007, he
has been working on international wireless sensor networks projects
related to remote monitoring, as well as Smart Cities-related deploy-
ments and data delivery protocols using integrated RFID–sensor
networks.
1
I NTRODUCTi ON
1
2 WIREL E S S SENS O R NE T W O RKS
along its length (~70 m). In order to study these variations, a winch
near the top is needed to carry a set of weather monitoring instru-
ments with a very long serial cable connected to a battery powered
data logger at the tree base. However, a few small nodes constructing
the WSN were able to collect the targeted data wirelessly at different
scales and resolutions.
Measuring natural species with a WSN can also enable long term
data collection at scales and resolutions that are difficult, if not impos-
sible, to obtain otherwise. Moreover, due to the local computing and
networking capabilities of WSNs, sensor nodes can be reprogrammed
to do different tasks after deployment on site, based on changes in
the conditions of the WSN itself and the targeted phenomena [1].
Therefore, laboratories can be extended to the monitored site where
no human intervention is required, and real time interaction can be
provided remotely.
Nonetheless, deploying* WSNs in OEM is challenging and needs
further investigation due to harsh operational conditions, vast mon-
itored areas, limited energy budgets, and required 3-D setups. For
instance, most of the proposed OEM applications [2,3,6–9] are applied
in harsh and large-scale areas, such as forests and river surfaces, and
experience bad channel conditions as well as great chances of node
failures and damages. Furthermore, some applications required more
complicated deployment planning when 3-D setups [3,6,8,10], and
long lifetime periods [2,6,9] are required. Therefore, we investigate
efficient deployment plans to address these challenges and fill the lit-
erature gap in this critical research direction. In the following sub-
sections, OEM deployment challenges and motivations behind this
work are detailed. And major research contributions are reviewed in
addition to outlining the remaining contents of this book.
1.1 Contributions
1.2 Book Outline
related work in terms of the average relay node count and distribution,
the scalability of the federated WSNs in large scale applications, and
the robustness of the topologies formed. We elaborate further on this
strategy in Chapter 6 where the hexagonal virtual grid is assumed
instead of the square one. We propose the use of cognitive nodes
(CNs) in the underlying sensor network to provide intelligent infor-
mation processing and knowledge-based services to the end users. We
identify tools and techniques to implement the cognitive functionality
and formulate a strategy for the deployment of CNs in the underlying
sensor network to ensure a high probability of successful data recep-
tion among communicating nodes. From MATLAB® simulations, we
were able to verify that in a network with randomly deployed sensor
nodes, CNs can be strategically deployed at predetermined positions,
to deliver application-aware data that satisfies the end user’s qual-
ity of information requirements, even at high application payloads.
Chapter 7 proposes a 3-D grid-based deployment for heterogeneous
WSNs (consisting of SNs, RNs, and MRNs). The problem is cast
as a Mixed Integer Linear Program (MILP) optimization problem
with the objective of maximizing the network lifetime while main-
taining certain levels of fault-tolerance and cost efficiency. Moreover,
an Upper Bound (UB) on the deployed WSN lifetime, given that
there are no unexpected node/link failures, has been driven. Based on
practical/harsh experimental settings in OEM, intensive simulations
show that the proposed grid-based deployment scheme can achieve an
average of 97% of the expected UB.
Additionally, a typical scenario has been discussed and analyzed in
smart cities while considering genetic based approaches in Chapter 8.
In this chapter, we study the path planning problem for these DCs
while optimizing their counts and their total traveled distances. As
the total collected load on a given DC route cannot exceed its stor-
age capacity, it is important to decide on the size of the exchanged
data packets (images, videos, etc.) and the sequence of the targeted
data sources to be visited. We propose a hybrid heuristic approach for
public data delivery in smart city settings. In this approach, public
vehicles are utilized as DCs that read/collect data from numerously
distributed Access Points (APs) and relay it back to a central process-
ing base station in the city. We also introduce a cost-based fitness
function for DCs election in the smart city paradigm. Our cost-based
6 WIREL E S S SENS O R NE T W O RKS
References
1. I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, A survey
on sensor networks, IEEE Communications Magazine, vol. 40, no. 8,
pp. 102–114, 2002.
2. M. Hefeeda, Forest fire modeling and early detection uses wireless
sensor networks, School of Computing Science, Simon Fraser University,
Vancouver, BC, Technical Report TR-2007-08, August 2007.
3. F. Al-Turjman, Information-centric sensor networks for cognitive IoT:
An overview, Annals of Telecommunications, vol. 72, no. 1, pp. 3–18,
2017.
4. G. Guo and M. Zhou, Using MODIS land surface temperature to eval-
uate forest fire risk of Northeast China, IEEE Geoscience and Remote
Sensing Letters, vol. 1, no. 2, pp. 98–100, 2004.
5. NASA, MODIS—Moderate Resolution Imaging Spectroradiometer.
http://modis.gsfc.nasa.gov/, 2009.
6. G. Tolle, J. Polastre, R. Szewczyk, and D. Culler, A macroscope in the
redwoods, In Proceedings of the ACM Conference on Embedded Networked
Sensor Systems (SenSys), San Diego, CA, 2005, pp. 51–63.
7. J. Cox, MIT’s tree-powered wireless network, Network World. www.
networkworld.com/community/node/33278, 2009.
8. A. Singh, M. Batalin, V. Chen, M. Stealey, B. Jordan, J. Fisher,
T. Harmon, M. Hansen, and W. Kaiser, Autonomous robotic sensing
experiments at San Joaquin river. In Proceedings of the IEEE International
Conference on Robotics and Automation (ICRA), Rome, Italy, 2007,
pp. 4987–4993.
9. B. Son, Y. Her, and J. Kim, A design and implementation of forest-
fires surveillance system based on wireless sensor networks for South
Korea mountains, International Journal of Computer Science and Network
Security (IJCSNS), vol. 6, no. 9, pp. 124–130, 2006.
10. J. Thelen, D. Goense, and K. Langendoen, Radio wave propagation
in potato fields, In Proceedings of the Workshop on Wireless Network
Measurements, Riva del Garda, Italy, April 2005.
2
D EPLOYMENT O F W iRELES S
S ENSO R N E T wORKS iN
O UTD O O R E N V iRONMENT
M ONiTORiN G
An Overview
7
8 WIREL E S S SENS O R NE T W O RKS
2.1.1 Connectivity
2.1.2 Fault-Tolerance
interference, etc. Thus, it is crucial to ensure that WSNs are also fault-
tolerant. As mentioned before, the sources of failure in OEM can
occur because of either node or link failures. These failures are char-
acterized by the Probability of Node Failure (PNF) and Probability
of Disconnected Nodes (PDN) to indicate the harshness level of the
monitored environment.
Three scenarios are considered in the deployed networks to be fault-
tolerant: fault detection, fault diagnosis, and fault recovery [15]. There
are many techniques for fault detection and diagnosis in the literature;
they are classified into self-diagnosis, group detection, and hierar-
chal detection [16]. On the other hand, few fault recovery techniques
are addressed in the literature. They can be classified into node and
link recovery techniques. These recovery techniques assure the ability
of the deployed network to stay operational and fulfill the assigned
task in the presence of a set of nonfunctional nodes/links, so that
sensed and carried data can be recovered. Although both node and
link failures are important to be tolerated together, some deployments
have considered only node failure recovery such as [9], while others
have considered only the link failure recovery as in Reference [17],
which weakens the deployed network performance. Compared to the
complexity of considering a single type of these recovery techniques,
it is trivial to consider both of them in one deployment technique
by employing redundant nodes and maximizing the communication
connectivity.
2.1.3 Lifetime
2.2.1 Random Deployment
Proposals described above are suitable for applications which are not
interested in the exact node positioning. In contrast, some propos-
als have advocated deploying nodes exactly on specific predefined
locations, called grid vertices. These locations are optimized in
terms of the aforementioned network properties and the feasibil-
ity of the location itself in reality (e.g., non-reachable locations are
D E P L OY M EN T O F WIREL E S S SENS O R NE T W O RKS 13
2.3 Summary
17
18 WIREL E S S SENS O R NE T W O RKS
References
1. I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, A survey
on sensor networks, IEEE Communications Magazine, vol. 40, no. 8,
pp. 102–114, 2002.
2. M. Hefeeda, Forest fire modeling and early detection uses wireless
sensor networks, School of Computing Science, Simon Fraser University,
Vancouver, BC, Technical Report TR-2007-08, August 2007.
3. F. Al-Turjman, Information-centric sensor networks for cognitive IoT:
An overview, Annals of Telecommunications, vol. 72, no. 1, pp. 3–18,
2017.
4. M. Younis and K. Akkaya, Strategies and techniques for node place-
ment in wireless sensor networks: A survey, Elsevier Ad Hoc Network
Journal, vol. 6, no. 4, pp. 621–655, 2008.
5. M. Ibnkahla, Ed., Adaptation and Cross Layer Design in Wireless Networks,
CRC Press, Boca Raton, 2008.
6. G. Tolle, J. Polastre, R. Szewczyk, and D. Culler, A macroscope in the
redwoods, In Proceedings of the ACM Conference on Embedded Networked
Sensor Systems (SenSys), San Diego, CA, 2005, pp. 51–63.
7. M. Hamilton, E. Graham, P. Rundel, M. Allen, W. Kaiser, M. Hansen,
and D. Estrin, New approaches in embedded networked sensing for
terrestrial ecological observatories, Environmental Engineering Science,
vol. 24, no. 2, pp. 192–204, 2007.
8. R. Pon, A. Kansal, D. Liu, M. Rahimi, L. Shirachi, W. Kaiser, G. Pottie,
M. Srivastava, G. Sukhatme, and D. Estrin, Networked infomechanical
systems (NIMS): Next generation sensor networks for environmental
monitoring, IEEE MTT-S International Microwave Symposium Digest,
vol. 1, pp. 373–376, 2005.
D E P L OY M EN T O F WIREL E S S SENS O R NE T W O RKS 19
* This chapter has been coauthored with Hossam S. Hassanein and Mohamed A.
Ibnkahla.
21
22 WIREL E S S SENS O R NE T W O RKS
3.1 Related Work
among all of the network nodes, but only among nodes which form
the communication backbone of the network, and thus is adopted
in this chapter. Nodes constructing the network backbone are called
irredundant (critical) nodes in this research. Failure of connectivity
between these nodes may lead to severe effects on the WSNs’ perfor-
mance such as network partitioning and data loss. Accordingly, node
redundancy in Reference [8] is used to overcome such connectivity
problems. Redundant nodes are deployed; the ones not being used for
communication or sensing are turned off. When the network becomes
disconnected, one or more of the redundant nodes is turned on to
repair connectivity. In Reference [22], the lowest number of redun-
dant nodes is added to a disconnected static network, so the network
remains connected. Similarly, authors in Reference [20] focus on
designing an optimized approach for connecting disjointed WSNs
segments by populating the least number of relays. The deployment
area is modeled as a grid with equal-sized cells. The optimization
problem is then mapped by selecting the fewest count of cells to pop-
ulate relay nodes such that all segments are connected. Overlapping
clusters of sensor nodes, which rely on the concept of redundancy as
well, are then used to enhance the network connectivity in Reference
[37]. In Reference [1], a distributed recovery algorithm is developed to
address 1- and 2-connectivity requirements. The idea is to identify the
least set of nodes that should be repositioned in order to reestablish a
particular level of connectivity. Nonetheless, redundant node deploy-
ment becomes an intricate task in huge 3-D spaces, where numer-
ous positioning options are possible with different connectivity levels
(degrees). Therefore, more efforts are required to optimize the deploy-
ment process under such circumstances.
Meanwhile, grid-based deployment should not only guarantee
connectivity in harsh environment monitoring but also should guar-
antee specific network lifetime. Lifetime has several definitions in
the literature. One of the most common lifetime definitions states
“it is the time till the first node death occurs” [15]. Such a defini-
tion may not be appropriate if we are monitoring forest temperature
or humidity because if a node dies, we can still receive similar (or
redundant) information from other nodes in the same area. Therefore,
this definition may only be considered as a lower boundary of other
lifetime definitions and should not reflect the actual network lifetime.
EF FI CIEN T D E P L OY M EN T O F WIREL E S S 27
Similarly, the definition, “it is the time till the last node death occurs,”
can serve as an upper bound of other definitions. Both of these defini-
tions are unrealistic for environmental applications. Another way to
define lifetime could rely on the percentage of alive nodes (which have
enough energy to accomplish their assigned tasks) [15]. But choosing
a percentage threshold is usually arbitrary and does not reflect the
application requirements. In addition, being alive does not mean that
the node is still connected. Therefore, other approaches to evaluate
network lifetime are relying on connectivity and network partitions
[9]. Still these definitions do not satisfy the environment monitoring
applications. For instance, if a set of nodes is destroyed because of the
movement of wild animals or falling trees in the monitored site, the
network can still be considered functional as long as other nodes are
still alive and connected. In References [6,32], the lifetime definitions
rely on the percentage of covered area in the monitored site. But they
are not suitable for environmental applications which are data-driven.
In data-driven applications, we are more interested in sampling data
from the monitored site rather than providing full coverage. Tightly
connecting these data gathering nodes can reduce redundant informa-
tion transmissions, and, hence prolong the overall network lifetime.
Motivated by the benefits of device heterogeneity, as well as the
3-D grid model, our research provides an efficient grid-based deploy-
ment for provisioning WSNs of maximum backbone (critical nodes)
connectivity degree under lifetime constraints and limited cost budget
in environmental applications. For more efficiency and unlike other
grid-based deployments, we find the most feasible grid vertices to be
searched for are those with optimal deployment rather than search-
ing a massive number of grid vertices in large-scale environmental
applications.
(a) (b)
Upper
layer
Lower
layer
SN CH RN BS
Figure 3.1 (a) Two-layer hierarchical architecture and (b) Cubic 3-D grid model for the targeted
wireless sensor network deployment where dashed lines and empty circles represent grid edges and
vertices, respectively.
EF FI CIEN T D E P L OY M EN T O F WIREL E S S 29
y
z
Figure 3.2 An arbitrary shape of the communication range in 3-D space, due to attenuation and
shadowing affecting outdoor wireless signals.
* Path loss is the difference between the transmitted and received power of the signal.
EF FI CIEN T D E P L OY M EN T O F WIREL E S S 31
3.2.3 Lifetime Model
* Wireless signals are weakened because of shadowing and multipath effects. This
refers to the fluctuation of the average received power.
32 WIREL E S S SENS O R NE T W O RKS
* Network partition occurs when one or more nodes are not able to communicate with
the base station.
EF FI CIEN T D E P L OY M EN T O F WIREL E S S 33
J rx = Lβ (3.3)
(
J tx = L ε 1 + ε 2 d γ ) (3.4)
where ε 1, ε 2 and β are hardware specific parameters of the utilized
transceivers, and γ is the path loss exponent.
Based on Equations 3.3 and 3.4, in addition to knowing the initial
energy Ei of each node with its relative position to other nodes, we
can calculate the remaining energy Er per node after the completion
of each round by
Er = Ei − TJ tx − RJ rx − AJ a (3.5)
* The cutoff criterion is not satisfied and the network is still considered operational if
C = 0 and vice versa if C = 1.
34 WIREL E S S SENS O R NE T W O RKS
40
35
Percentage of disconnected CHs/RNs (%)
30
25
20
15
10 Env.
CB
5
–10 0 10 20 30 40 50 60 70 80
Probability of node failure (%)
Figure 3.3 Percentage of disconnected CHs/RNs vs. different probabilities of CH/RN failure.
Exploring the Variety of Random
Documents with Different Content
Fig. 238.—History of St. Benedict.—On the left are the monks of a
neighbouring monastery, who have come to seduce him from his
hermitage in order to place him at their head; but the austerity of his rule
soon dissatisfies them, and they resolve to rid themselves of him. On the
right the monks are offering him a cup of poison, but, on his making the
sign of the cross on the vase, it is shattered to pieces.—From a Fresco by
Spinello d’Arezzo (1390) in the Church of San Miniato, near Florence.
Before the monkish order had been in existence a century, in the
East as in the West, the monastic regulations underwent
considerable relaxation. The monks having become part of the
clerical hierarchy (by force of circumstances, for there was often a
deficiency of clergy), took precedence of the latter; their abbots,
called archimandrites in the Eastern Church, were raised to the
priesthood and to the episcopate; they even took part in councils,
though these functions and duties interfered with their cenobitic life.
This manifest infraction of the primitive discipline, while it lowered
the moral position of the monks, rather increased than otherwise
their social influence, and gave them greater weight in the world.
Their piety, too, was only temporarily distracted from its original
purpose, for men of note like St. Honoratus, St. Maximus, St. Hilary,
St. Dalmatius, the two brothers Romanus and Lupicius, maintained
the true tradition of monkish life; and the famous abbeys of Lérins
and Mount Jura were built. The ascetics of Constantinople, too, were
spoken of in high terms, as keeping up a perpetual psalmody (401–
405). In Palestine, not far from Jerusalem, a multitude of hermits,
under the guidance of St. Euthymius, practised the most rigorous
abstinence.
In Africa, St. Fulgentius, exiled by the Arians, was the promoter of
regular observances—that is, he preached strict obedience to
monastic rule (501–523); while in the West there were founded, in
the midst of the Romagnol Alps, in the towns of Arles and St.
Maurice d’Agaune, three model monasteries, the first
superintendents of which were St. Hilary, St. Cæsarius, and St.
Severinus; and its principal benefactors, Theodoric, King of the
Goths, Theodoric the Great, and Sigismund, King of Burgundy (504–
522). In the monastery of Kildare, governed by St. Bridget, and in
the monastery founded by St. Colomba, in Ireland, which was
afterwards so justly called the Isle of Saints, the teaching of
Christian art, of the liturgy, of ecclesiastical lore and profane
literature, was unequalled in its perfection, and the fame of it
reached even to Gaul.
Fig. 239.—History of St. Benedict.—As his disciples were attempting to put
a stone in place for the construction of their chapel, the devil placed
himself upon it, and the united efforts of several persons failed to
dislodge him; but St. Benedict having blessed the stone, the devil
took flight.—From a Fresco by Spinello d’Arezzo (1390), in the Church
of San Miniato, near Florence.
Such was the general position of cenobitism when St. Benedict
(Fig. 238), the future patriarch of the monks of the West, the
supreme legislator of the monastic order, abandoned his humble cell
at Subiaco (528) to found the immense abbey of Monte-Cassino
(Fig. 239), which was the glory of the age. The Benedictine rule, the
result of profound physiological and philosophical studies, a work of
moral science, of wisdom, and of piety, divided the monks’ time
between prayer and manual labour, to be succeeded by the
cultivation or exercise of the intellect whenever the glory of God, the
interests of the monastery, and the education of the people might
require it. St. Benedict soon had under his control an army of monks
who spread throughout the whole Christian world the rules of their
illustrious chief. Amongst them were St. Maurus and Cassiodorus,
the former minister of Theodoric the Great: one of them founded the
monastery of St. Maur-sur-Loire, in France; the other, that of Vivieri,
in Calabria. Cassiodorus took great pains to collect books of the Old
and the New Testament, with their commentaries. He went to great
expense in collecting all the writings of the Greek and Latin Fathers,
of the Jewish historians as well as of those of the Church, and the
principal works on geography, grammar, and rhetoric, and even the
best treatises on medicine, so that the monks attached to the
infirmary might be fully capable of tending the sick. The monastery
of Vivieri contained one of the richest libraries of the period. We find
in the collection of the Institutions of Cassiodorus the following
remarkable homage paid to the calligraphist monks, who were the
greatest men of letters in that day: “I confess, my brethren, that of
all your physical labours, that of copying books has always been the
avocation most to my taste; the more so, as by this exercise of the
mind upon the Holy Scriptures, you convey to those who will read
what you have written a kind of oral instruction. You preach with the
hand, converting the fingers into organs of speech, announcing
silently to men a theme of salvation; it is as it were fighting the evil
one with pen and ink. For every word written by the antiquary, the
demon receives a severe wound. At rest in his seat, as he copies his
books, the recluse travels through many lands without quitting his
room, and the work of his hands has its influence in places where he
has never been.”
Those whom Cassiodorus calls antiquaries were simply scribes—
that is to say, clerks or monks who deciphered the old manuscripts
and transcribed the books. In the monastery of St. Martin, at Tours,
calligraphy was the sole art practised. St. Fulgentius, a prelate
distinguished both for his learning and eloquence; St. Gregory,
Bishop of Agrigentum, no less celebrated; Mamertus Claudius, who
was a regular walking library, themselves copied manuscripts which
they gave to the Church. Calligraphy and illuminating were also
favourite occupations with many nuns, amongst whom may be cited
St. Melanie the younger, St. Cesarie, St. Harnilde, and St. Renilde, all
Frenchwomen (Fig. 240), who, to use the language of the Christian
annalist, wrote with elegance, rapidity, and correctness.
From the time that the monks were raised to the clerical rank,
after first undergoing an examination, the clerks and monks studied
together just as they had before prayed and lived in common, a
monastery being a complete school of ecclesiastical research and
administration. At Monte-Cassino, at St. Ferréol, at St. Calais, at
Tours, and in many other flourishing abbeys in the sixth century, the
monks, and especially the novices, were instructed in religious and
secular subjects as well as in the duties of the priesthood.
The monastic dress was not in every case the same, for, though
always simple and coarse, it varied in shape and appearance with
the statutes of each order, and according to the necessities of
climate. The cenobites in Egypt wore the lebitus or the colobium, the
pera or melote, and the cuculla. The lebitus was a linen garment
with long sleeves open at the hands, and sometimes up to the wrist.
The pera, a jacket of goatskin, is spoken of in one of the epistles of
St. Paul, who alludes to it as especially worn by holy men and
prophets, when they were driven by threats of persecution into the
desert. The cuculla covered the head, and came half-way over the
shoulders. St. Benedict, who borrowed it from the early monks, had
it so much lengthened as to envelop the whole body; but as in this
shape it would have embarrassed the monks in their manual labour,
he made it a garment only to be worn at ceremonials, and replaced
it for ordinary wear by the scapulary (scapulum), which covered the
head and the back. The Western monks also wore a short mantle—a
sort of cape, called a maforte, according to Sulpicius Severus. The
Greeks and Orientals adopted the pallium, which led to their being
designated agmina palliata (an army in robes), when they assembled
in large numbers. Every Greek who devoted himself to the cenobitic
life was compelled to wear a black pallium.
Fig. 242.—Abbatial Ring and Cross (front and back) of St. Waudru,
patroness of Mons, who died in 670. The cross is in silver, with
gold relief, and studded with precious stones.—Relics
preserved in the Church of St. Waudru, at Mons.
Fig. 243.—The Offering of a Child to an Abbot.—From a
Miniature in a Manuscript published at the Close of
the Thirteenth Century (Burgundian Library,
Brussels).
Fig. 244.—Priory of the Benedictines at Canterbury (Twelfth
Century), plan in relief drawn by Edwin, a monk, about the year
1530.—A, belfry; B, fountain; C, cemetery; D, reservoir, with
conduit pipes; E, Canterbury Cathedral; F, vestry; G, crypt; H,
chapter-house; I, prior’s house; J, infirmary and annexes; K,
kitchen-garden, with well, pumps, and water-pipes; L, cloister;
M, cellar; N, dormitory; O, refectory; P, kitchens; Q, parlour; R,
house for the guests and the poor; S, water-closets; T, baths;
U, granary; V, bakehouse and brewery; X, the chief entrance; Y,
Z, fortified wall of the abbey and the city.—From an Engraving
in vol. i. of the “Architecture Monastique,” by M. Albert Lenoir.
The endowment of each monastery was generally made up of the
property belonging to the monks who had fixed their abode there. If
the novice was an adult, he was obliged to distribute all his goods to
the poor, or to make a solemn grant of them to the abbey, before he
could be admitted to the minor orders. If he was a child whose
parents devoted him to the service of God (Fig. 243), the parents
either made no gift to the community which received the young
novice, or they ceded the income of the lands and the property by
deed of transfer to the monastery. Enriched by these successive
donations, the monasteries, especially those which had acquired a
wide renown for learning or piety, acquired still more wealth through
the largesses of princes, great nobles, and bishops, through the
economical management of the abbots, and the annual produce of
the agricultural and commercial labour of the monks. To the various
arts and trades which were at first carried on by the monks with a
view to do honour to the cause of religion, those of the West
afterwards added others of a more lucrative and worldly character.
In the sixth century we find that they spun and wove their own silk;
that they possessed numerous receipts for preparing liqueurs and
drugs; that they practised medicine, surgery, and the veterinary art.
Pepin the Short, suffering from incurable dropsy, went first to the
monastery of St. Martin at Tours, and afterwards to the abbey of St.
Denis, that “the servants of God” might give him relief by means of
their skill as well as by their prayers.
The Church was very sorely tried during the reign of Charles
Martel, and monastic institutions were also exposed to many
difficulties. In order to win back the secular clergy to the habits of
communal life, the wisest of the bishops grouped around them the
clergy who had remained faithful to their cause, and laid down a
code of regulations for their guidance.
Charlemagne, in the Capitularies, added the following excellent
amendments to the rules of monastic institutions:—“Young men
destined to monastic life must first pass their novitiate, and then
remain in the monastery to learn the rules, before they are sent
forth to fulfil their duties outside. Those who give up the world in
order to avoid the king’s service shall be compelled to serve God in
good faith, or else to resume their former occupation. All clerks shall
be required to make their choice between clerical life in conformity
with the canons, and monastic life in conformity with the
regulations. The abbeys shall not receive too large a number of
serfs, so that the villages may not be depopulated; no community
shall have more members than can be properly looked after by one
superior. Young women shall not take the veil until they are of an
age to choose their own career in life. Laymen are to be disqualified
for governing the interior of a monastery, nor shall they fill the post
of archdeacon.” Charlemagne and Louis the Good-natured became
members of the royal monastery of St. Denis under the title of
“conscript brothers” (fratres conscripti)—an academical rather than a
religious title, but one which nevertheless admitted them to certain
liturgical privileges. The Emperor Lothair, in imitation of his father
and ancestor, also got himself invested with this title by the
monastery of St. Martin-lez-Metz.
The Norman invasion, the feudal wars, the encroachment of the
great vassals, and even of the kings, upon ecclesiastical domains
and rights, impoverished the monastic orders, whose lands remained
untilled for want of hands, and their schoolrooms often empty for
want of teachers and scholars. While the Normans burnt and
pillaged the monasteries, fortified though many of them were, in the
country districts, the urban abbeys, nearly always protected by the
diocesan power, preserved some remnants of their former splendour.
Fig. 245.—Foundation of the secular abbeys of Mons, Maubeuge, and Nivelles. The
canonesses meeting at Nivelles, where Walcand, Bishop of Liége (810 to 832
or 836), promises to give them a code of rules.—From the “Chroniques de
Hainaut,” Manuscript of the Fifteenth Century, in the Burgundian Library,
Brussels.
There existed between the principal abbeys of the same order a
spirit of unity, a brotherly zeal to render help and service, and a
reciprocal interchange of learned and skilful clerks, who went from
one community to another to give it the benefit of their learning or
manual ability. It was in this way that the conventual churches and
buildings were erected and kept in repair; that they became rich in
paintings, statues, and mosaics; that the treasury was filled, and the
library founded and maintained. Rupert, a monk of the Abbey of St.
Gall (Switzerland), before his elevation to the bishopric of Metz, a
learned linguist, poet, and man of letters; Tutilo, his contemporary at
St. Gall, a carver, painter, and sculptor; Regino, Abbot of Prüm, an
excellent musician, author of a Treatise on Harmony, are of
themselves a proof that arts and letters were hidden in the cloisters.
At this epoch of barbarism and ignorance, the Church organized
what was good, strengthened the shattered foundations of the social
edifice, established new monastic institutions and reformed the old,
grouped around her the irresolute, lawless, and undisciplined minds
(Fig. 245), selling the principles of order and peace in opposition to
those of violence and disorder engendered by war.
Fig. 246.—Seal of the Abbey of St. Denis, in the
Twelfth Century, in the National Archives, Paris.—
The saint is clad in his episcopal garb. It is, no
doubt, as the apostle of Gaul that the motto gives
him the title of archbishop.
Never was the monastic order more numerous or better
organized, and at no period, perhaps, were works of mental
intelligence cultivated more ardently or successfully in certain
privileged monasteries, than at this time.
Canterbury, Monte-Cassino, St. Maur, St. Denis (Fig. 246), St.
Martin of Tours, St. Gall, Remiremont, Aix-la-Chapelle, Cologne,
Trèves, St. Trudon, St. Arnulph, St. Clement, and St. Martin of Metz,
the Messinà and the Gorza basilica, were cited as so many foci of
light whence radiated in every direction the good doctrines set forth
in certain remarkable works of art, as well as in learned literary
compositions.
Fig. 247.—The Clergy, with the Cross and the Holy Images, going
in procession before the Emperor.—From a Miniature taken
from a Manuscript of the Fourth Century (Library of M.
Ambroise Firmin-Didot).
In the libraries, which composed the principal wealth of the
religious houses, the cartularies of the diocese were preserved with
great care. The charters of institution, and the patrimonial titles of
the chief abbeys, are both the proof and the reward for the services
rendered to civilisation by the monastic establishments: one abbey
was given a domain on the condition that it put the waste lands into
cultivation; another received its lands with the understanding that it
opened asylums and places of hospitality for the poor and sick, for
pilgrims and for strangers; while a host of documents taken from the
cartularies relate to the instruction of the clerks, the education of the
novices, the splendour of public worship, and the duty of the
ecclesiastical vassals when the suzerain raised the ban and the
arrière-ban, &c., together with all the details of monastic life which
are connected with the various social movements of each territorial
district (Fig. 247).
Outside the abbeys there lived a population whose manual labour
was necessary to their inmates, and profitable to the material
interests of the house. Women, even when doing penance, and
under religious vows, were strictly forbidden to enter the
monasteries. The aged mother of an eminent monk, John of Gorze,
unwilling to separate herself altogether from her son, took up her
abode just outside the walls of his abbey, where she spent her time
in making cloaks for the monks.
It was around the abbatial close, perhaps beneath the shelter of a
second walled enclosure, not so strong nor so high as the first, but
still capable of resisting the attacks of the marauders which were so
frequent in those days of feudal disorder, that were built the shops,
the stalls, and the sheds which served for the sale of the crops, the
cattle, and the agricultural and other produce of the abbatial domain
(Fig. 248). On the anniversary of the festival of the saint to whom
the monastery was dedicated there was a fair—sometimes several—
which attracted large crowds.
St. Romuald, the founder of the Camaldolite order; St. Mayeul,
Abbot of Cluny, and the reformer of the Abbey of St. Denis; St.
Dunstan, the resolute Archbishop of Canterbury, who reformed the
clergy of the British Isles; Adalbert, son of a Duke of Lorraine and
nephew of Hugh Capet, who was elected Bishop of Metz, after
having been monk at Gorze; St. Cadroé, descended from the Kings
of Scotland, Abbot of Vaussey and contemporary of Adalbert, with
whom he was associated in the reformation of the abbeys in the
north-east of France, were among the leading figures who, in the
tenth century, represented the reformed monachism. Unfortunately,
their wholesome influence could not make itself everywhere felt; it
was a period of disorder, of pitiless and bitter wars, of usurpations of
every kind. Upon every side misery reigned supreme; the serfs
attached to the domains of the canonical churches and to the
monasteries left them to find some more certain means of livelihood.
The Cathedral of Metz was in this way deprived of eight hundred
serfs, who were heads of families. The only independent voices
raised on behalf of these victims of oppression came from the great
abbeys, such as Stavelo, St. Arnulph, Cluny, &c., to which monarchs
and popes, under the pretext of dedicating churches (Fig. 249)
which had been recently built or restored, repaired in secret to
consult, with many members of the higher clergy, as to the political
affairs of Christendom.
Fig. 248.—North View of the Abbey of St. Germain-des-Prés, as it still
existed in the Seventeenth Century.—A, outer gates; B, houses in
the enclosure; C, church square; D, church; E, Lady chapel; F,
sacristy; G, small cloister; H, great cloister; I, library; K,
dormitory; L, refectory; M, kitchen; N, dormitory of the Superior;
O, offices; P, inner courtyard; Q, houses for the wine-presses; R,
bakehouse; S, stables; T, garden; V, infirmary; X, infirmary
garden; Y, lavatory; Z, dormitory for the guests. 1, abbey palace;
2, abbey garden; 3, courtyard; 4, outer courtyard; 5, officers’
apartments; 6, stables; 7, barns; 8, houses in the abbatial
enclosure; 9, bailiff’s house; 10, outer gates; 11, bailiwick prisons.
—Fac-simile of an Engraving in the “Histoire de St. Germain-des-
Prés,” by Dom Bouillart, in folio: 1724.
Fig. 249.—Dedication of the Church belonging to the
Monastery of St. Martin-des-Champs, Paris, destroyed
by the Normans and rebuilt by King Henry I. The artist
has represented—1st, the ancient Church of St.
Samson dedicated to St. Martin; 2nd, the counts and
barons who signed the charter for the re-establishment
of the monastery; 3rd, the archbishops and bishops
who were present at the dedication of the new church.
—Fac-simile of an Engraving from Don Meurier’s work,
“Historia Monasterii regalis Sancti Martini” (4to, Paris,
1636).