WSN Unit 5 Notes
WSN Unit 5 Notes
Course File
Department of
ELECTRONICS AND COMMUNICATION ENGINEERING
COURSE FILE CONTENTS
Sl. Topic Page no.
No.
1. Department Vision and Mission 1
2. Course Description 1
3. Course Overview 1
4. Course Pre-requisites 2
5. Marks Distribution 2
6. POs and PSOs 2
7. Course outcomes (COs) 3
8. CO mapping with POs and PSOs 3
9. Syllabus, Textbooks and Reference Books 4
10. Gaps in syllabus 4
11. Course plan/Lesson Plan 5
12. Lecture Notes 6
Unit-I Overview of Wireless Sensor Networks 6
Unit-II Architectures 21
Unit-III Networking Sensors 37
Unit-IV Infrastructure Establishment 66
Unit-V Sensor Network Platforms and Tools 99
13. Unit wise Question Bank
a. Short answer questions 2/3 Marks 112
b. Long answer questions 7/8 Marks
14. Previous University Question papers 116
15. Internal Question Papers with Key 123
16. Unit wise Assignment Questions 147
17. Content Beyond Syllabus 150
18. Methodology used to identify Weak and bright students
156
Date: Prepared by
Verifying authority:
1. Head of the Department: …………………………………..
2.
3.
PRINCIPAL
3
MATRUSRI ENGINEERING COLLEGE
Saidabad, Hyderabad-500 059.
(Approved by AICTE & Affiliated to Osmania University)
DEPARTMENT MISSION
M1: To provide the learning ambience to nurture the young minds with theoretical and
Practical knowledge to produce employable and competent engineers.
M2: To provide a strong foundation in fundamentals of electronics and communication
engineering to make students explore advances in research for higher learning.
M3: To inculcate awareness for societal needs, continuous learning and professional
practices.
M4: To imbibe team spirit and leadership qualities among students
COURSE DESCRIPTOR
Programme BE
Semester VIII sem
Course Type Professional Elective-III
Theory Practical
3 1 3 - -
Course Faculty
Mr. M.NARESH`
I. COURSEOVERVIEW:
4
must consider factors such as the environment, the applications design objectives, cost,
hardware, and system constraints.
Current Activities in WSN: Developing test bed for target tracking Using Passive Infrared
and Ultrasonic Sensors Improving the delivery rate in low power wireless networks .Guided
Navigation of Friendly Vehicle towards tracked Object. Design and development of smart
mines and explosive ordinance for intelligent activation and deactivation and safe recovery
based on secure WSN. Design of a data mule for data collection from remotely placed sensor
nodes
The course gives the thorough concepts of the wireless sensor networks, applications
examples. It also gives detailed study of sensor node architecture and various protocols used
in wireless sensor networks. It also covers issues related to topology, clustering
,synchronization and operating execution environment used for wireless sensor networks.
Finally a survey of architecture and security protocols is discussed
II. COURSEPRE-REQUISITES:
III. MARKSDISTRIBUTION:
SEE CIA
Subject Total Marks
Examination Examination
Wireless Sensor Networks 70 30 100
5
PO9 diverse teams, and in multidisciplinary settings.
VIII. SYLLABUS :
6
UNIT I- No .of
Hrs
Challenges for Wireless Sensor Networks-Characteristics requirements-required
mechanisms, Difference between mobile ad-hoc and sensor networks, Applications of 6
sensor networks- Enabling Technologies for Wireless Sensor Networks
UNIT II-
Single-Node Architecture - Hardware Components, Energy Consumption of Sensor
Nodes, Operating Systems and Execution Environments
6
Network Architecture - Sensor Network Scenarios, Optimization Goals and Figures of
Merit, Gateway Concepts.
UNIT III-
Physical Layer and Transceiver Design Considerations, MAC Protocols for Wireless
Sensor Networks, Low Duty Cycle Protocols and Wakeup Concepts - S-MAC, Zigbee:
IEEE 802.15.4 MAC Layer, The Mediation Device Protocol, Wakeup Radio Concepts, 6
Address and Name Management, Assignment of MAC Addresses, Routing Protocols-
Energy-Efficient Routing, Geographic Routing.
UNIT IV-
Topology Control, Clustering, Time Synchronization, Localization and Positioning,
Sensor Tasking and Control. Operating Systems for Wireless Sensor Networks, Sensor
6
Node Hardware – Berkeley Motes, Programming Challenges, Node-level software
platforms, Node-level Simulators, State-centric programming,
UNIT V-
Security Architectures, Survey of Security protocols for Wireless Sensor Networks and
their Comparisons. 4
TEXT BOOKS:
1. Holger Karl and Andreas Willig, “Protocols and Architectures for Wireless Sensor
Networks,” John Wiley, 2005.
2. Feng Zhao and Leonidas J. Guibas, “Wireless Sensor Networks - An Information
Processing pproach,” Elsevier, 2007.
3. FazemSohraby, Daniel Minoli, and TaiebZnati, “Wireless Sensor Networks- Technology,
Protocols and Applications,” John Wiley, 2007.
REFERENCES:
PPT/BB/
7
Lecture Topics to be covered OHP/ No. Relevant Text
No. e- of COs Book/Reference
Book
material Hrs
1 UNIT-I: Challenges for Wireless PPT & e- John Wiley,2005
content 2 CO 1
Sensor Networks
2 Characteristics requirements, PPT & e- John Wiley, 2005
content 1 CO 1
required mechanisms,
Difference between mobile ad-hoc PPT & e- John Wiley, 2005
3 1 CO 1
and sensor networks content
8
LECTURE NOTES
9
UNIT – V
10
UNIT-V
5.1 Introduction
11
1.1. Introduction
Wireless Sensor Networks (WSNs) are used in many applications in military, ecological,
and health-related areas.
These applications often include the monitoring of sensitive information such as enemy
movement on the battlefield or the location of personnel in a building.
Security is therefore important in WSNs. However, WSNs suffer from many constraints,
including low computation capability, small memory, limited energy resources,
susceptibility to physical capture, and the use of insecure wireless communication channels.
These constraints make security in WSNs a challenge.
These issues are classified into five categories: cryptography, key management, secure
routing, secure data aggregation, and intrusion detection.
Advances in wireless communication and electronics have enabled the development of low-
cost, low power multi functional sensor nodes.
These tiny sensor nodes, consisting of sensing, data processing, and communication
components, make it possible to deploy Wireless Sensor Networks (WSNs), which represent
a significant improvement over traditional wired sensor networks.
WSNs can greatly simplify system design and operation, as the environment being
monitored does not require the communication or energy infrastructure associated with
wired networks.
WSNs are expected to be solutions to many applications, such as detecting and tracking the
passage of troops and tanks on a battlefield, monitoring environmental pollutants, measuring
traffic flows on roads, and tracking the location of personnel in a building.
Many sensor networks have mission-critical tasks and thus require that security be
considered.
Improper use of information or using forged information may cause unwanted information
leakage and provide inaccurate results.
While some aspects of WSNs are similar to traditional wireless ad hoc networks, important
distinctions exist which greatly affect how security is achieved.
12
The differences between sensor networks and ad hoc networks are
The number of sensor nodes in a sensor network can be several orders of magnitude higher
than the nodes in an ad hoc network.
Sensor nodes are densely deployed.
Sensor nodes are prone to failures due to harsh environments and energy constraints.
The topology of a sensor network changes very frequently due to failures or mobility.
Sensor nodes are limited in computation, memory, and power resources.
Sensor nodes may not have global identification
These differences greatly affect how secure data-transfer schemes are implemented in
WSNs. For example, the use of radio transmission, along with the constraints of small size
low cost, and limited energy, make WSNs more susceptible to denial-of-service attack.
Advanced anti-jamming techniques such as frequency-hopping spread spectrum and
physical tamper-proofing of nodes are generally impossible in a sensor network due to the
requirements of greater design complexity and higher energy consumption.
Furthermore, the limited energy and processing power of nodes makes the use of public key
cryptography nearly impossible.
Instead, most security schemes make use of symmetric key cryptography.
One thing required in either case is the use of keys for secure communication.
Managing key distribution is not unique to WSNs, but again constraints such as small
memory capacity make centralized keying techniques impossible.
In addition to key distribution, secure routing protocols must be considered.
These protocols are concerned with how a node sends messages to other nodes or a base
station.
13
5.2 Security Architectures
Sensing units are usually composed of two subunits: sensors and analog-to-digital converters
(ADCs).
The ADCs convert the analog signals produced by the sensors to digital signals based on the
observed phenomenon.
The processing unit, which is generally associated with a small storage unit, manages the
procedures that make the sensor node collaborate with the other nodes.
A transceiver unit connects the node to the network. One of the most important units is the
power unit.
A power unit may be finite (e.g., a single battery) or may be supported by power scavenging
devices (e.g., solar cells). Most of the sensor network routing techniques and sensing tasks
require knowledge of location, which is provided by a location finding system.
Finally, a mobilizer may sometimes be needed to move the sensor node, depending on the application.
14
The protocol stack used in sensor nodes contains physical, data link, network, transport, and
application layers defined as follows:
Physical layer: responsible for frequency selection, carrier frequency generation, signal
deflection, modulation, and data encryption
Data link layer: responsible for the multiplexing of data streams, data frame detection, medium
access, and error control; as well as ensuring reliable point-to-point and point-to-multipoint
connections
Network layer: responsible for specifying the assignment of addresses and how packets are
forwarded
Transport layer: responsible for specifying how the reliable transport of packets will take place
Application layer: responsible for specifying how the data are requested and provided for both
individual sensor nodes and interactions with the end user
Constraints in WSN’S:
Individual sensor nodes in a WSN are inherently resource constrained.
They have limited processing capability, storage capacity, and communication bandwidth.
Each of these limitations is due in part to the two greatest constraints — limited energy and
physical size.
Table 1 shows several currently available sensor node platforms.
The design of security services in WSNs must consider the hardware constraints of the sensor
nodes:
Table 1: Variety of real-life sensor nodes
1.Energy:
2.Computation
3.Memory:
4. Transmission ran
15
5.3 Survey of Security protocols for Wireless Sensor Networks
The goal of security services in WSNs is to protect the information and resources from attacks and
misbehavior.
The security requirements in WSNs include:
• Availability, which ensures that the desired network services are available even in the presence of
denial-of-service attacks
• Authorization, which ensures that only authorized sensors can be involved in providing
information to network services
• Authentication, which ensures that the communication from one node to another node is
genuine, that is, a malicious node cannot masquerade as a trusted network node
• Confidentiality, which ensures that a given message cannot be understood by anyone other than
the desired recipients
• Integrity, which ensures that a message sent from one node to another is not modified by
malicious intermediate nodes
• Non repudiation, which denotes that a node cannot deny sending a message it has previously
sent
• Freshness, which implies that the data is recent and ensures that no adversary can replay old
messages Moreover, as new sensors are deployed and old sensors fail, we suggest that forward and
backward secrecy should also be considered:
• Forward secrecy: a sensor should not be able to read any future messages after it leaves the
network.
• Backward secrecy: a joining sensor should not be able to read any previously transmitted
message. The security services in WSNs are usually centered around cryptography.
Evolution:
We suggest using the following metrics to evaluate whether a security scheme is appropriate in
WSNs. Security: a security scheme has to meet the requirements discussed above.
• Resiliency: in case a few nodes are compromised, a security scheme should still protect against
the attacks.
• Energy efficiency: a security scheme must be energy efficient so as to maximize node and
network lifetime.
• Flexibility: key management needs to be flexible so as to allow for different network deployment
methods, such as random node scattering and predetermined node placement.
• Scalability: a security scheme should be able to scale without compromising the security
requirements.
16
• Fault-tolerance: a security scheme should continue to provide security services in the presence
of faults such as failed nodes.
• Self-healing: sensors may fail or run out of energy. The remaining sensors may need to be
reorganized to maintain a set level of security.
• Assurance: assurance is the ability to disseminate different information at different levels to end-
user . A security scheme should offer choices with regard to desired reliability, latency, and so on.
WSNs are vulnerable to various types of attacks. According to the security requirements in WSNs,
these attacks can be categorized as:
Attacks on secrecy and authentication
Attacks on network availability:
Stealthy attacks against service integrity:
In these attacks, keeping the sensor network available for its intended use is essential. DoS attacks
against WSNs may permit real-world damage to the health and safety of people
Attacks on Physical Network: The physical layer is responsible for frequency selection, carrier
frequency generation, signal detection, modulation, and data encryption.
Jamming
Tampering
Attacks on Link layer:
Collisions
Exhaustion
Unfairness
Attacks on Network and routing layer:
Spoofed, Altered, or Replayed Routing Information
Selective Forwarding
Sinkhole
Sybil
Wormholes
Hello Flood Attacks
Acknowledgment Spoofing
Attacks on Transport layer:
Flooding
De-synchronization
17
Survey of Security protocols for WSN: Cryptography in WSNs
Selecting the most appropriate cryptographic method is vital in WSNs because all security services
are ensured by cryptography.
Cryptographic methods used in WSNs should meet the constraints of sensor nodes and be
evaluated by code Size, Data size, Processing time, and Power consumption.
Public key cryptography: average energy costs of digital signature and key exchange computations
18
Symmetric key cryptography: average RC5 and skipjack execution times
Symmetric key cryptography: average energy numbers for AES and SHA-1
The performance of symmetric key cryptography is mainly decided by the following factors:
• Instruction set
Key management is a core mechanism to ensure the security of network services and applications
in WSNs. The goal of key management is to establish required keys between sensor nodes which
must exchange data.
19
5.4. Comparison of key management protocols in WSNs
Many routing protocols have been specifically designed for WSNs. These routing protocols can be
divided into three categories according to the network structure:
flat-based routing,
hierarchical-based routing, and
location-based routing
In flat-based routing, all nodes are typically assigned equal roles or functionality.
In hierarchical-based routing, nodes play different roles in the network.
In location-based routing, sensor node positions are used to route data in the network.
Most network layer attacks against sensor networks fall into one of the categories described above,
namely:
• Spoofed, altered, or replayed routing information • Wormholes
• Selective forwarding • Sybil
• Sinkhole • Acknowledgment spoofing
• Hello flood attacks
20
A secure routing protocol depends on an appropriate key management scheme in a WSN, which
has been discussed earlier.
Before a routing protocol starts, sensor nodes should have been loaded with proper keys (e.g., the
key for confidentiality, authentication, etc.). One of the fundamental security services in sensor
networks is broadcast authentication, which enables the base station to broadcast authenticated data
to the entire sensor network.
Broadcast authentication
• Most proposals rely on public key cryptography for the authentication. However, public key
cryptography is impractical for WSNs;
• Even one-time signature schemes that are based on symmetric key cryptography have too much
overhead.
Secure routing
The goal of a secure routing protocol is to ensure the integrity, authentication, and availability of
messages.
semantic security,
data authentication,
replay protection,
weak freshness, and
low communication overhead.
21
SPINS identifies two types of freshness:
weak freshness and strong freshness.
Weak freshness provides partial message ordering and carries no delay information while strong
freshness provides a total order on a request–response pair and allows for delay estimation
Data aggregation (fusion) protocols aim at eliminating redundant data transmitted across
the network and are essential for energy-constrained WSNs.
Traditional data aggregation techniques include simple types of queries such as SUM,
COUNT, AVERAGE, and MIN/MAX.
According to the protocol operation, secure data aggregation can be classified into two categories:
Cipher based.
22
QUESTION BANK
Short answer questions.
Long answer questions.
23
UNIT -1
26
PREVIOUS UNIVERSITY QUESTION PAPERS
(Attach image of 05 old University Question Papers)
27
28
29
30
31
32
33
INTERNAL QUESTION PAPERS WITH KEY
34
MATRUSRI ENGINEERING COLLEGE
SAIDABAD, HYDERABAD – 500 059
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
I Internal Assessment (2020-21)
Class/Branch: BE VIII -SEM ECE (A &B)
Max Marks: 20
Subject: WIRELESS SENSOR NETWORKS (PE831EC) Duration:
1Hour
Answer all questions from PART-A and any two from PART-B
Q. Question Marks CO BL
No
PART-A
3X2=6Marks
1. What are the challenges of Wireless sensor 2 CO1 L1
Networks?
2. Differentiate between mobile ad-hoc and sensor 2 CO1 L4
networks.
3. Compare Single-hop versus Multi-hop 2 CO2 L4
Networks
PART-B
2X7=14Marks
4. Explain Hardware components of typical 7
CO2 L2
sensing nodes?
5. a. Discuss the characteristic requirements of 4
WSN. 3
CO1 L2
b. Explain in detail about Applications of
sensor networks.
6. Write short notes on
a. TinyOS and nesC 4 CO2 L1
b. Gate-way concepts 3
Bloom's level wise Marks Distribution Course Outcome wise Marks Distribution
Marks Marks
20 16
14
15 15 11
9
10 10
4
5 5
0 0
Level Level Level CO 1 CO 2
1 2 4
BL- Bloom's Taxonomy Levels [1-Remember, 2-Understand, 3-Apply, 4-Analyze, 5-Evaluate, 6- Create]
CO- Course Outcomes.
35
Scheme
Challenges: 2M
2. Differentiate between mobile ad-hoc and sensor networks.
Differences: 2M
Comparisons: 2M
3. Compare Single-hop versus Multi-hop Networks
Key
1Q. What are the challenges of Wireless sensor Networks?
2M
Answer:
o Energy Efficiency
o Wireless communication
o Noisy measurements
36
o Heterogeneity
o Utilization of Sensors
o Mobile: Different mobility patters like (in WSN- Sinks might be mobile ,
37
PART-B
5. Power supply as usually no tethered power supply is available, some form of batteries are
necessary to provide energy. Sometimes, some form of recharging by obtaining energy from the
environment is available as well.
Each of these components has to operate balancing the trade-off between as small an energy
consumption as possible on the one hand and the need to fulfill their tasks on the other hand. For
example, both the communication device and the controller should be turned off as long as
possible. To wake up again, the controller could, for example, use a preprogrammed timer to be
reactivated after some time. Alternatively, the sensors could be programmed to raise an interrupt if
a given event occurs – say, a temperature value exceeds a given threshold or the communication
device detects an incoming transmission. Supporting such alert functions requires appropriate
interconnection between individual components. Moreover, both control and data information has
38
to be exchanged along these interconnections. This interconnection can be very simple – for
example, a sensor could simply report an analog value to the controller – or it could be endowed
with some intelligence of its own, preprocessing sensor data and only waking up the main
controller if an actual event has been detected – for example, detecting a threshold crossing for a
simple temperature sensor. Such preprocessing can be highly customized to the specific sensor yet
remain simple enough to run continuously, resulting in improved energy efficiency.
The controller is the core of a wireless sensor node. It collects data from the sensors, processes this
data, decides when and where to send it, receives data from other sensor nodes, and decides on the
actuator’s behavior. It has to execute various programs, ranging from time-critical signal processing
and communication protocols to application programs; it is the Central Processing Unit (CPU) of
the node
Some examples for microcontrollers
Intel Strong ARM, Texas Instruments MSP 430, Atmel ATmega
Memory: The memory component is fairly straightforward. Evidently, there is a need for Random
Access Memory (RAM) to store intermediate sensor readings, packets from other nodes, and so on.
While RAM is fast, its main disadvantage is that it loses its content if power supply is interrupted.
Program code can be stored in Read-Only Memory (ROM) or, more typically, in Electrically
Erasable Programmable Read-Only Memory (EEPROM) or flash memory (the later being similar
to EEPROM but allowing data to be erased or written in blocks instead of only a byte at a time).
Flash memory can also serve as intermediate storage of data in case RAM is insufficient or when
the power supply of RAM should be shut down for some time. The long read and write access
delays of flash memory should be taken into account, as well as the high required energy.
Choice of transmission medium:
The communication device is used to exchange data between individual nodes. In some cases,
wired communication can actually be the method of choice and is frequently applied in many
sensor networks like settings (using field buses like Profi bus, LON, CAN, or others). The
communication devices for these networks are custom off-the-shelf components.
Transceivers:
For actual communication, both a transmitter and a receiver are required in a sensor node. The
essential task is to convert a bit stream coming from a microcontroller (or a sequence of bytes or
frames) and convert them to and from radio waves. For practical purposes, it is usually convenient
to use a device that combines these two tasks in a single entity. Such combined devices are called
transceivers.
39
1. Type of service: the service type rendered by a conventional communication network is
evident – it moves bits from one place to another. For a WSN, moving bits is only a means to an
end, but not the actual purpose. Rather, a WSN is expected to provide meaningful information
and/or actions about a given task: “People want answers, not numbers” (Steven Glaser, UC
Berkeley, in . Additionally, concepts like scoping of interactions to specific geographic regions or
to time intervals will become important. Hence, new paradigms of using such a network are
required, along with new interfaces and new ways of thinking about the service of a network.
2. Quality of Service: Closely related to the type of a network’s service is the quality of that
service. Traditional quality of service requirements – usually coming from multimedia-type
applications – like bounded delay or minimum bandwidth are irrelevant when applications are
tolerant to latency [26] or the bandwidth of the transmitted data is very small in the first place. In
some cases, only occasional delivery of a packet can be more than enough; in other cases, very high
reliability requirements exist. In yet other cases, delay is important when actuators are to be
controlled in a real-time fashion by the sensor network. The packet delivery ratio is an insufficient
metric; what is relevant is the amount and quality of information that can be extracted at given
sinks about the observed objects or area. Therefore, adapted quality concepts like reliable detection
of events or the approximation quality of a, say, temperature map is important.
3. Fault tolerance: since nodes may run out of energy or might be damaged, or since the
wireless communication between two nodes can be permanently interrupted, it is important that the
WSN as a whole is able to tolerate such faults. To tolerate node failure, redundant deployment is
necessary, using more nodes than would be strictly necessary if all nodes functioned correctly.
4. Lifetime: In many scenarios, nodes will have to rely on a limited supply of energy (using
batteries). Replacing these energy sources in the field is usually not practicable, and
simultaneously, a WSN must operate at least for a given mission time or as long as possible. Hence,
the lifetime of a WSN becomes a very important figure of merit. Evidently, an energy-efficient way
of operation of the WSN is necessary. As an alternative or supplement to energy supplies, a limited
power source (via power sources like solar cells, for example) might also be available on a sensor
node. Typically, these sources are not powerful enough to ensure continuous operation but can
provide some recharging of batteries. Under such conditions, the lifetime of the network should
ideally be infinite. The lifetime of a network also has direct trade-offs against quality of service:
investing more energy can increase quality but decrease lifetime. Concepts to harmonize these
trade-offs are required. The precise definition of lifetime depends on the application at hand. A
simple option is to use the time until the first node fails (or runs out of energy) as the network
lifetime. Other options include the time until the network is disconnected in two or more partitions,
the time until 50% (or some other fixed ratio) of nodes have failed, or the time when for the first
time a point in the observed region is no longer covered by at least a single sensor node (when
40
using redundant deployment, it is possible and beneficial to have each point in space covered by
several sensor nodes initially).
5. Scalability: since a WSN might include a large number of nodes, the employed
architectures and protocols must be able scale to these numbers.
6. Wide range of densities: In a WSN, the number of nodes per unit area – the density of the
network – can vary considerably. Different applications will have very different node densities.
Even within a given application, density can vary over time and space because nodes fail or move;
the density also does not have to homogeneous in the entire network (because of imperfect
deployment, for example) and the network should adapt to such variations.
7. Programmability: Not only will it be necessary for the nodes to process information, but
also they will have to react flexibly on changes in their tasks. These nodes should be
programmable, and their programming must be changeable during operation when new tasks
become important. A fixed way of information processing is insufficient.
8. Maintainability: As both the environment of a WSN and the WSN itself change (depleted
batteries, failing nodes, new tasks), the system has to adapt. It has to monitor its own health and
status to change operational parameters or to choose different trade-offs (e.g. to provide lower
quality when energy resource become scarce). In this sense, the network has to maintain itself; it
could also be able to interact with external maintenance mechanisms to ensure its extended
operation at a required quality To realize these requirements, innovative mechanisms for a
communication network have to be found, as well as new architectures, and protocol concepts. A
particular challenge here is the need to find mechanisms that are sufficiently specific to the
idiosyncrasies of a given application to support the specific quality of service, lifetime, and
maintainability requirements.
Some of the mechanisms that will form typical parts of WSNs are:
a. Multi-hop wireless communication
b. Energy-efficient operation
c. Auto-configuration
d. Collaboration and in-network processing
e. Data centric
f. Locality
g. Exploit trade-offs
Answer: The claim of wireless sensor network proponents is that this technological vision will
facilitate many existing application areas and bring into existence entirely new ones. On the basis
41
of nodes that have such sensing and/or actuation faculties, in combination with computation and
communication abilities, many different kinds of applications can be constructed, with very
different types of nodes, even of different kinds within one application.
1. Disaster relief applications: One of the most often mentioned application types for WSN
are disaster relief operations. A typical scenario is wildfire detection: Sensor nodes are equipped
with thermometers and can determine their own location (relative to each other or in absolute
coordinates). These sensors are deployed over a wildfire, for example, a forest, from an airplane.
They collectively produce a “temperature map” of the area or determine the perimeter of areas with
high temperature that can be accessed from the outside, for example, by firefighters equipped with
Personal Digital Assistants (PDAs). Similar scenarios are possible for the control of accidents in
chemical factories, for example. Some of these disaster relief applications have commonalities with
military applications, where sensors should detect, for example, enemy troops rather than wildfires.
In such an application, sensors should be cheap enough to be considered disposable since a large
number is necessary; lifetime requirements are not particularly high.
2. Environment control and biodiversity mapping: WSNs can be used to control the
environment, for example, with respect to chemical pollutants – a possible application is garbage
dump sites. Another example is the surveillance of the marine ground floor; an understanding of its
erosion processes is important for the construction of offshore wind farms. Closely related to
environmental control is the use of WSNs to gain an understanding of the number of plant and
animal species that live in a given habitat (biodiversity mapping). The main advantages of WSNs
here are the long-term, unattended, wire free operation of sensors close to the objects that have to
be observed; since sensors can be made small enough to be unobtrusive, they only negligibly
disturb the observed animals and plants. Often, a large number of sensors is required with rather
high requirements regarding lifetime.
3. Intelligent buildings: Buildings waste vast amounts of energy by inefficient Humidity,
Ventilation, Air Conditioning (HVAC) usage. A better, real-time, high-resolution monitoring of
temperature, airflow, humidity, and other physical parameters in a building by means of a WSN can
considerably increase the comfort level of inhabitants and reduce the energy consumption.
Improved energy efficiency as well as improved convenience are some goals of “intelligent
buildings” , for which currently wired systems like BACnet, LonWorks, or KNX are under
development or are already deployed ; these standards also include the development of wireless
components or have already incorporated them in the standard.
4. Facility management: In the management of facilities larger than a single building, WSNs
also have a wide range of possible applications. Simple examples include keyless entry applications
where people wear badges that allow a WSN to check which person is allowed to enter which areas
of a larger company site. This example can be extended to the detection of intruders, for example of
42
vehicles that pass a street outside of normal business hours. A wide area WSN could track such a
vehicle’s position and alert security personnel – this application shares many commonalities with
corresponding military applications. Along another line, a WSN could be used in a chemical plant
to scan for leaking chemicals
5. Machine surveillance and preventive maintenance: One idea is to fix sensor nodes to
difficult to reach areas of machinery where they can detect vibration patterns that indicate the need
for maintenance. Examples for such machinery could be robotics or the axles of trains. Other
applications in manufacturing are easily conceivable. The main advantage of WSNs here is the
cable free operation, avoiding a maintenance problem in itself and allowing a cheap, often
retrofitted installation of such sensors. Wired power supply may or may not be available depending
on the scenario; if it is not available, sensors should last a long time on a finite supply of energy
since exchanging batteries is usually impractical and costly. On the other hand, the size of nodes is
often not a crucial issue, nor is the price very heavily constrained.
6. Precision agriculture: Applying WSN to agriculture allows precise irrigation and
fertilizing by placing humidity/soil composition sensors into the fields. A relatively small number is
claimed to be sufficient, about one sensor per 100 m × 100 m area. Similarly, pest control can profit
from a high-resolution surveillance of farm land. Also, livestock breeding can benefit from
attaching a sensor to each pig or cow, which controls the health status of the animal (by checking
body temperature, step counting, or similar means) and raises alarms if given thresholds are
exceeded.
7. Medicine and health care: Along somewhat similar lines, the use of WSN in health care
applications is a potentially very beneficial, but also ethically controversial, application.
Possibilities range from postoperative and intensive care, where sensors are directly attached to
patients – the advantage of doing away with cables is considerable here – to the long-term
surveillance of (typically elderly) patients and to automatic drug administration (embedding sensors
into drug packaging, raising alarms when applied to the wrong patient, is conceivable). Also,
patient and doctor tracking systems within hospitals can be literally life saving.
8. Logistics: In several different logistics applications, it is conceivable to equip goods
(individual parcels, for example) with simple sensors that allow a simple tracking of these objects
during transportation or facilitate inventory tracking in stores or warehouses
9. Telematics: Partially related to logistics applications are applications for the telematics
context, where sensors embedded in the streets or roadsides can gather information about traffic
conditions at a much finer grained resolution than what is possible today . Such a so called
“intelligent roadside” could also interact with the cars to exchange danger warnings about road
conditions or traffic jams ahead.
In addition to these, other application types for WSNs that have been mentioned in the literature
43
include airplane wings and support for smart spaces , applications in waste water treatment plants ,
instrumentation of semiconductor processing chambers and wind tunnels , in “smart kindergartens”
where toys interact with children , the detection of floods , interactive museums , monitoring a bird
habitat on a remote island , and implanting sensors into the human body (for glucose monitoring or
as retina prosthesis) .
o The Above shows a timer component that provides a more abstract version of a simple
hardware
o It understands three commands (“init”, “start”, and “stop”) and can handle one event (“fire”)
from another component, for example, a wrapper component around a hardware timer. It issues
“setRate” commands to this component and can emit a “fired” event itself.
44
o The important thing to note is that, in staying with the event-based paradigm, both
command and event handlers must run to conclusion; they are only supposed to perform very
simple triggering duties.
o In particular, commands must not block or wait for an indeterminate amount of time; they
are simply a request upon which some task of the hierarchically lower component has to act.
o Similarly, an event handler only leaves information in its component’s frame and arranges
for a task to be executed later; it can also send commands to other components or directly report an
event further up.
o The actual computational work is done in the tasks. In TinyOS, they also have to run to
completion, but can be interrupted by handlers.
o The advantage is twofold: there is no need for stack management and tasks are atomic with
respect to each other. Still, by virtue of being triggered by handlers, tasks are seemingly concurrent
to each other.
o The arbitration between tasks – multiple can be triggered by several events and are ready to
execute – is done by a simple, power-aware First In First Out (FIFO) scheduler, which shuts the
node down when there is no task executing or waiting.
o With handlers and tasks all required to run to completion, it is not clear how a component
could obtain feedback from another component about a command that it has invoked there – for
example, how could an Automatic Repeat Request (ARQ) protocol learn from the MAC protocol
whether a packet had been sent successfully or not? The idea is to split invoking such a request and
the information about answers into two phases:
o The first phase is the sending of the command, the second is an explicit information about
the outcome of the operation, delivered by a separate event. This split-phase programming
approach requires for each command a matching event but enables concurrency under the
constraints of run-to-completion semantics – if no confirmation for a command is required, no
completion event is necessary.
o The nesC language formalizes this intuition by allowing a programmer to define interface
types that define commands and events that belong together. This allows to easily express split-
phase programming style by putting commands and their corresponding completion events into the
same interface. Components then provide certain interfaces to their users and in turn use other
interfaces from underlying components
45
example, a user equipped with a PDA moving in the coverage area of the network or with a remote
user, trying to interact with the sensor network via the Internet
Assume that the initiator of a WSN–Internet communication resides in the WSN – for example, a
sensor node wants to deliver an alarm message to some Internet host. The first problem to solve is
akin to ad hoc networks, namely, how to find the gateway from within the network. Basically, a
routing problem to a node that offers a specific service has to be solved, integrating routing and
service discovery.
An event notification to “Alice” needs decisions about, among others, gateway choice,
mapping “Alice” to a concrete IP address, and translating an intra-WSN event notification message
to an Internet application message.
46
The case of an Internet-based entity trying to access services of a WSN is even more
challenging . This is fairly simple if this requesting terminal is able to directly communicate with
the WSN, for example, a mobile requester equipped with a WSN transceiver, and also has all the
necessary protocol components at its disposal. In this case, the requesting terminal can be a direct
part of the WSN and no particular treatment is necessary.
The above figure shows Requesting sensor network information from a remote terminal
entails choices about which network to address, which gateway node of a given network, and how
and where to adapt application-layer protocol in the Internet to WSN-specific protocols
3. WSN tunneling
The idea is to build a larger, “virtual” WSN out of separate parts, transparently “tunneling” all
protocol messages between these two networks and simply using the Internet as a transport
network. This can be attractive, but care has to be taken not to confuse the virtual link between two
gateway nodes with a real link; otherwise, protocols that rely on physical properties of a
communication link can get quite confused (e.g. time synchronization or localization protocols).
Such tunnels need not necessarily be in the form of fixed network connections; even mobile nodes
carried by people can be considered as means for intermediate interconnection of WSNs.
47
MATRUSRI ENGINEERING COLLEGE
SAIDABAD, HYDERABAD – 500 059
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
I I _ Internal Assessment (2020-21)
Class/Branch: BE VIII -SEM ECE (A &B) Max Marks: 20
Q. Question Marks CO BL
No
PART-A
3X2=6Marks
1. What is Geography routing in WSNs 2 CO3 L1
2. Draw and Explain MICA MOTE -Berkley mote 2 CO4 L2
Hardware
3. List out the Attacks in Wireless sensor networks 2 CO5 L1
PART-B
2X7=14Marks
4. (a).Discuss in detail about Physical layer and 4
transceiver design considerations in WSNs.
(b)Wakeup Radio Concepts CO3 L2
3
5. Explain timing - synchronization protocol for 7
CO4 L2
sensor networks.
6. (a)Differentiate the Security routing Protocols 4
(b) Classifications and Comparison of Key 3
CO5 L4
management Protocols
Marks Marks
10 9 9 9
20 16 8
15 6
10 7 4
4
5 2
0 0
Level Level Level CO 3 CO 4 CO 5
1 2 4
48
Scheme
Diagram: 1M Explanation: 1M
3. List out the Attacks in Wireless sensor networks
List of Attacks: 2 M
4 (a). Discuss in detail about Physical layer and transceiver design considerations in
WSNs
Design considerations: 4M
(b). Wakeup Radio Concepts
Explanation: 3M
5. Explain timing - synchronization protocol for sensor networks.
Key
PART-A
1. What is Geography routing in WSNs ? 2M
Ans: The idea behind the relatively large class of geographic routing protocols is twofold: For
many applications, it is necessary to address physical locations, for example, as “any node in a
given region” or “the node at/closest to a given point”. When such Requirements exist, they have to
be supported by a proper routing scheme. When the position of source and destination is known as
are the positions of intermediate nodes, this information can be used to assist in the routing process.
To do so, the destination node has to be specified either geographically (as above) or as some form
of mapping – a location service – between an otherwise specified destination (e.g. by its identifier)
and its (conjectured) current position is necessary.
The first aspect – sending data to arbitrary nodes in a given region – is usually referred to as
Geocasting. The second aspect is called position-based routing (in particular in combination with a
location service);
In wireless sensor networks, usually the geocasting aspect of geographic routing is considerably
more important. Since nodes are considered as interchangeable and are only distinguished by
external aspects, in particular their position, a location service is usually not necessary.
49
Simple greedy geographic forwarding
Ans: Among all hardware sensor node platforms, the Berkeley motes are more popular, due to their
small form factor, open source software development, and commercial availability, have gained
wide popularity in the sensor network research community.
MCU: an Atmel ATmega103L
-512 KB flash memory
-4 KB of data memory
TR1000 chip set:
-operating at 916 MHz
- Max 50 kbps raw data rate
-40 kbps transmission rate
supports a 51 pin I/O
A sensor/ actuator board can host :
-a temperature sensor,
- a light sensor,
- an accelerometer,
- a magnetometer,
- a microphone, and
- a beeper
serial I/O (UART)
50
Tampering
LINK LAYER
Collisions
Exhaustion
Unfairness
NETWORK LAYER
Spoofed, Altered, or Replayed Routing Information
Selective Forwarding
Sinkhole
Sybil
Wormholes
Acknowledgment Spoofing
TRANSPORT LAYER:
Flooding
De-synchronization
PART-B
4(a). Discuss in detail about Physical layer and transceiver design considerations in WSNs.
4M
Ans: Some of the most crucial points influencing PHY design in wireless sensor networks are:
Low power consumption.
As one consequence: small transmit power and thus a small transmission range.
As a further consequence: low duty cycle. Most hardware should be switched off or
operated in
A low-power standby mode most of the time.
Comparably low data rates, on the order of tens to hundreds kilobits per second, required.
Low implementation complexity and costs.
Low degree of mobility.
A small form factor for the overall node
Energy usage profile:
The choice of a small transmits power leads to an energy consumption profile different from
other wireless devices like cell phones.
The radiated energy is small, typically on the order of 0 dBm (corresponding to 1mW). On
the other hand, the overall transceiver (RF front end and baseband part) consumes much more
energy than is actually radiated.
A second key observation is that for small transmit powers the transmit and receive modes
consume more or less the same power; it is even possible that reception requires more power than
transmission.
51
A third key observation is the relative costs of communications versus computation in a
sensor node. Clearly, a comparison of these costs depends for the communication part on the BER
requirements, range, transceiver type, and so forth, and for the computation part on the processor
type, the instruction mix, and so on
2. Choice of modulation scheme:
A crucial point is the choice of modulation scheme. Several factors have to be balanced here: the
required and desirable data rate and symbol rate, the implementation complexity, the relationship
between radiated power and target BER, and the expected channel characteristics
4. Antenna considerations
If the antenna is much smaller than the carrier’s wavelength, it is hard to achieve good antenna
efficiency, that is, with ill-sized antennas one must spend more transmit energy to obtain the same
radiated energy.with small sensor node cases, it will be hard to place two antennas with suitable
distance to achieve receive diversity.
The ideal situation would be if a node were always in the receiving state when a packet is
transmitted to it, in the transmitting state when it transmits a packet, and in the sleep state at all
other times; the idle state should be avoided.
The wakeup radio concept strives to achieve this goal by a simple, “powerless” receiver
that can trigger a main receiver if necessary.
One proposed wakeup MAC protocol assumes the presence of several parallel data
channels, separated either in frequency (FDMA) or by choosing different codes in a CDMA
schemes.
A node wishing to transmit a data packet randomly picks one of the channels and performs
a carrier sensing operation. If the channel is busy, the node makes another random channel choice
and repeats the carrier-sensing operation.
After a certain number of unsuccessful trials, the node backs off for a random time and
starts again.
If the channel is idle, the node sends a wakeup signal to the intended receiver, indicating
both the receiver identification and the channel to use.
The receiver wakes up its data transceiver, tunes to the indicated channel, and the data
packet transmission can proceed.
Afterward, the receiver can switch its data transceiver back into sleep mode. This wakeup
radio concept has the significant advantage that only the low-power wakeup transceiver has to be
52
switched on all the time while the much more energy consuming data transceiver is non sleeping if
and only if the node is involved in data transmissions.
Furthermore, this scheme is naturally traffic adaptive, that is, the MAC becomes more
and more active as the traffic load increases. Periodic wakeup schemes do not have this property
There are also some drawbacks. First, to our knowledge, there is no real hardware yet for
such an ultralow power wakeup transceiver. Second, the range of the wakeup radio and the data
radio should be the same.
If the range of the wakeup radio is smaller than the range of the data radio, possibly not all
neighbor nodes can be woken up
Time is an important aspect for many applications and protocols found in wireless sensor networks.
Nodes can measure time using local clocks, driven by oscillators.
Because of random phase shifts and drift rates of oscillators, the local time reading of nodes would
start to differ – they loose synchronization – without correction.
The time synchronization problem is a standard problem in distributed systems.
There are at least two ways to get a more reliable estimate. The first one (and the one
focused on in this chapter) is to keep the sensors clocks as tightly synchronized as possible, using
dedicated time synchronization algorithms.
The second one is to combine the readings of multiple sensors and to “average out” the
estimation errors
It is important to note that the time needed in sensor networks should adhere to physical
time, that is two sensor nodes should have the same idea about the duration of 1 s and additionally a
sensor node’s second should come as close as possible to 1 s of real time or coordinated universal
time (UTC).
The physical time has to be distinguished from the concept of logical time that allows to
determine the ordering of events in a distributed system but does not necessarily show any
correspondence to real time.
53
Global Vs Local
Absolute Vs Relative
A priori Vs A posteriori
Deterministic Vs Stochastic
Performance metrics:
Precision
Energy Costs
Memory requirements
Fault tolerance
• The scalability requirement refers to both the number of nodes as well as to the average
node degree/node density.
• The precision requirements can be quite diverse, ranging from microseconds to seconds.
• The use of extra hardware only for time synchronization purposes is mostly ruled out because of
the extra cost and energy penalties incurred by dedicated circuitry.
• The degree of mobility is low
There are mostly no fixed upper bounds for packet delivery delay.
• The propagation delay between neighboring nodes is negligible.
• Manual configuration of single nodes is not an option.
• It will turn out that the accuracy of time synchronization algorithms critically depends on the
delay between the reception of the last bit of a packet and the time when it is time stamped.
5. (a)Differentiate the Security routing Protocols 3M
54
55
MATRUSRI ENGINEERING COLLEGE
SAIDABAD, HYDERABAD – 500 059
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
I Internal Assessment(2019-20)
Class/Branch: BE VIII -SEM ECE (A & B) Max Marks :20
Subject: WIRELESS SENSOR NETWORKS Duration :1Hour
Answer all questions from PART-A, and any two from PART-B
Bloom's level wise Marks Distribution Course Outcome wise Marks Distribution
Marks Marks
20 20
15
10 10
18 16
5 11
7
0 2 0
Level 1 Level 2 Level 5 CO 1 CO 2
BL- Bloom's Taxonomy Levels [1-Remember, 2-Understand , 3-Apply, 4-Analyze, 5-Evaluate, 6- Create]
CO- Course Outcomes.
56
MATRUSRI ENGINEERING COLLEGE
SAIDABAD, HYDERABAD – 500 059
DEPARTMENT OF ELECTRONICS &COMMUNICATION ENGINEERING
57
UNIT WISE ASSIGNMENT QUESTIONS
58
Assignment-1
Short Questions:
1. Discuss challenges and hurdles for Wireless Sensor Networks.
2. Explain the historical background of sensor networks.
3. Explain single node architecture.
4. Explain Gateway concepts.
5. Various applications of wireless sensor networks.
6. Differences between wireless sensor networks and mobile ad hoc networks.
Long Questions:
1. Explain hardware components of a typical sensing node.
2. Explain smart home environment.
3. Explain different network models of WSNS.
4. Explain the energy consumption of sensor nodes.
5. Explain network architecture and sensor network scenarios.
Assignment-2
Short Questions:
1. Explain briefly mobile IP.
2. Explain energy efficient routing.
3. Explain Clustering.
4. Explain low duty cycle protocols.
5. What are the design factors for routing protocol of WSN.
6. What are performance metrics for WSN.
Long Questions:
1. Discuss in detail about IEEE 802.15.14 PHY layer main parameters.
2. Explain sensor network specific MAC protocol.
3. Bring out the differences between Zigbee and Bluetooth.
4. Explain the importance of localization and positioning procedures in WSN.
5. Explain information driven sensor quering (IDSQ) algorithm.
Assignment-3
Short Questions:
1. Write short notes on Berkeley Motes.
2. What do you mean by simulation of wireless network.
3. What do you mean by node level simulators.
4. What are the programming challenges for WSN.
Long Questions:
1. What do you mean by state centric programming and explain its significance over generic distributed
systems.
2. Explain how multi-target tracking problem is solved using state centric programming.
3. Write about NS2 simulator.
4. Write short notes on MICA motes.
5. What are the design issues for an operating system for WSN.
59
Assignment-4
Short Questions:
1. Write short notes on Berkeley Motes.
2. What do you mean by simulation of wireless network.
3. What do you mean by node level simulators.
4. What are the programming challenges for WSN.
Long Questions:
1. What do you mean by state centric programming and explain its significance over generic
distributed systems.
2. Explain how multi-target tracking problem is solved using state centric programming.
3. Write about NS2 simulator.
4. Write short notes on MICA motes.
5. What are the design issues for an operating system for WSN.
Assignment-5
Short Questions:
60
CONTENT BEYOND SYLLABUS
Sl.No. TOPIC Mode of Relevance with POs and
Teaching PSOs
1. Applications PPT PO 3,PO4,PSO 2
2. Platform for Innovation PPT PO 3,PO4,PSO 2
TOPIC Description:
A. Applications
Wireless sensor networks have inspired many applications. Some of them are futuristic while a
large number of them are practically useful. The diversity of applications in the latter category
is remarkable – environment monitoring, target tracking, pipeline (water, oil, gas) monitoring,
structural health monitoring, precision agriculture, health care, supply chain management, active
volcano monitoring, transportation, human activity monitoring, and underground mining, to
name a few.
1. Traffic Control
Ground transportation is a vital and complex socioeconomic infrastructure. Operationally, it
is linked with and provides support for a variety of systems, such as supply-chain,
emergency response, and public health.
In urban areas, this results in potential congestion. The 2009 Urban Mobility Report, issued
by the Texas Transportation Institute, reveals that in 2007, congestion caused urban Americans to
travel 4.2 billion hours more and to purchase an extra 2.8 billion gallons of fuel. The total
congestion cost is estimated to be $87.2 billion – an increase of more than 50% over the previous
decade. Unfortunately, building new roads is not a feasible solution for many cities of the world
owing to the lack of free space and the high cost of demolition of old roads (streets). Many
consider better regulation of transportation systems as the only sustainable solution to road
congestion.
One approach to dealing with congestions is to put in place distributed sensing systems that
reduce congestion. These systems gather information about the density, sizes, and speed of
vehicles on roads; infer congestions; and suggest to drivers some alternative routes and
emergency exits
61
o Almost all road vehicles, including those with polymer body panels, contain a large mass of
steel. Since the magnetic permeability of steel is much higher than the surrounding air, it has the
capacity to concentrate the flux lines of the Earth’s magnetic field.
o The concentration of magnetic flux (disturbance) at a particular location varies as the
vehicle moves and can be detected from a distance of up to 15m (Weaver 2003).
o Figure demonstrates how an AMR sensor can be used to measure the disturbance in the
Earth’s magnetic field caused by a moving vehicle.
o It is possible to distinguish between different types of vehicles (car, bus, minibus, truck,
etc.) by modeling a vehicle as a composition of many dipole magnets (Caruso and Withanawasam
1999). These dipoles have north–south orientations that cause distortions in the Earth’s magnetic
field. The extent of the distortions of the dipoles depends on, among other things, the
permeability of the dipoles.
o For example, the engine and wheel areas exert stronger distortions than the other parts of a
vehicle, and for each vehicle class of interest, it is possible to produce a unique model. When a
vehicle passes close to a magnetic sensor, or drives over it, the sensor can detect the different
dipole moments of the various parts of the vehicle. The field variation reveals a detailed magnetic
signature.
2. Health Care
A wide range of health care applications have been proposed for wireless sensor networks,
including monitoring patients with Parkinson’s Disease, epilepsy, heart patients, patients
rehabilitating from stroke or heart attack, and elderly people. Unlike other types of applications
discussed so far, health care applications do not function as stand-alone systems. Rather, they are
integral parts of a comprehensive and complex health and rescue system.
62
Figure Block diagram of the MIT node for traffic monitoring
Figure illustrates the signal processing steps of the artificial retina. A camera embedded in a pair of
spectacles directs its output to a real-time digital signal processor (DSP) for data reduction and
processing. The camera can be combined with a laser pointer for automatic focusing. The output of
the DSP is compressed and transmitted through a wireless link to the implanted sensor array, which
decodes the image and produces a corresponding electrical signal.
Another area of application for wireless sensor networks is the monitoring of gas, water, and oil
pipelines. The management of pipelines presents a formidable challenge. Their long length, high
value, high risk, and often difficult access conditions require continuous and unobtrusive
monitoring. Leakages can occur due to excessive deformations caused by earthquakes, landslides,
or collisions with an external force; corrosion, wear, material flaws or even intentional damage to
the structure. To detect leakages, it is vital to understand the characteristics of the substance the
pipelines transport. For example, fluid pipelines generate a hot-spot at the location of the leak,
63
whereas gas pipelines generate a cold-spot due to the gas pressure relaxation. Likewise, fluid
travels at a higher propagation velocity in metal pipelines than in polyvinyl chloride (PVC). There
are a large number of commercially available sensors (fiber optics, temperature sensors, and
acoustic sensors) to detect and localize thermal anomalies.
4. Precision Agriculture
Another interesting area where wireless sensor networks motivated a large number of researchers is
precision agriculture. Traditionally, a large farm is taken as a homogeneous field in terms of
resource distribution and its response to climate change, weeds, and pests. Accordingly, farmers
administer fertilizers, pesticides, herbicides, and water resources. In reality, a large field exhibits
wide spatial diversity in soil types, nutrient content, and other important factors. Therefore, treating
it as a uniform field can cause inefficient use of resources and loss of productivity.
Precision agriculture is a method of farm management that enables farmers to produce more
efficiently through a frugal use of resources. This encompasses different aspects, such as micro-
monitoring soil, crop, and climate change in a field, and providing a decision support system
(DSS). Precision agriculture uses Geographic Information System management tools; GPS, radar,
aerial images, etc., to accurately diagnose a field and apply vital farming resources. A large number
of technologies have been developed over the last several years to facilitate and automate precision
agriculture. Some of these are:
Yield monitors:
Yield mapping:
Variable rate fertilizer:
Weed mapping:
Variable spraying:
Topography and boundaries:
Salinity mapping:
Guidance systems:
5. Underground Mining
Underground mining is one of the most dangerous working environments in the world. Perhaps the
incident of 3 August 2007 at the Crandall Canyon mine, Utah, USA, is a good example of the
danger associated with underground mining. It also highlights some of the contributions of wireless
sensor networks to facilitate safe working conditions and rescue operations. In this fateful incident,
six miners were trapped inside the coal mine. Though their precise location was not known, experts
estimated that the men were trapped 457m below ground, 5.5 km away from the mine entrance.
There were different opinions about the exact cause of the accident. The owners of the mine
claimed that a natural earthquake was the cause. Seismologists at the University of Utah observed
64
that seismic waves of 3.9 magnitudes were recorded on the same day in the area of the mine,
leading scientists to suspect that mine operations were the cause of the seismic spikes.
65
METHODOLOGY USED TO IDENTIFY WEAK AND BRIGHT STUDENTS:
We continuously assess the learning capabilities of the students by conducting quiz and subjective
tests, and by giving assignments.
Based on the evaluation of students work and results, students will be counseled by student
counselors using appropriate approach.
As a part of university curriculum, all the courses are required to have tutorial classes which are
also scheduled along with regular classes in the time table.
Faculty members help the slow learners by solving more number of similar problems.
Handouts will be given to the students.
Regular assignments will be given. Solutions to the assignment will be provided for the students.
As a part of curriculum special classes are also being arranged for Lateral entry students.
1. Monthly consolidated attendance report will be taken by the class teacher and the same will be
distributed among the counselors.
2. Counselors counsel the students in terms of having less regularity and performance of students in
mid as well as Semester end examinations. The same is being communicated to parents also in
parent teacher meeting conducted once/twice in a semester.
3. The information regarding the regularity and performance of students in mid as well as Semester
end examinations will also be communicated to parents from time-to-time through post.
4. As a part of supporting weak students tutorial and remedial classes were also being conducted.
5. Special counseling is also being conducted by the faculty to motivate the slow learners.
6. Enhancement of library hours.
b. EFFORTS TO ENGAGE BRIGHT STUDENTS:
66
67
END
68