Course Material Unit II
Course Material Unit II
b) Time-varying channel :
Time-varying channels include the three mechanisms for radio signal
propagations they are Reflection, Diffraction, and Scattering.
Page 1 of 12
• Reflection –
This occurs when propagating wave carrying information intrudes on an object
that has very large dimensions than the wavelength of the wave.
• Diffraction –
This occurs when the radio path between the transmitter and the receiver is
collided by the surface with sharp edges. This is a phenomenon which causes
the diffraction of the wave from the targeted position.
• Scattering –
This occurs when the medium through from the wave is traveling consists of
some objects which have dimensions smaller than the wavelength of the wave.
While transmitting the signal by the node these are time shifted and this is
called multipath propagation. While when this node signals intensity is dropped
below a threshold value, then this is termed as fade. As a result Handshaking
strategy is widely used so as a healthy communication can be set up.
MAC protocol is the first protocol layer above the Physical Layer in ad hoc.
The primary task of any MAC protocol is to control the access of the nodes to
shared medium.
Page 2 of 12
3. Contention-based protocols with scheduling mechanisms –
• Distributed scheduling is done between nodes.
• Guarantees can be given.
4. Other protocols –
• Combine multiple features of other protocols.
It can also use a completely new approach.
Page 3 of 12
• Naive Routing
The idea deployed in naïve routing is flooding. Each node can overhear its
neighbors within its range. The source node floods the network with route
request packets called as beacons. Destination nodes respond with a route reply
message to the beacon and communication link is established between these
nodes. Beaconing is typically utilized for location tracking, discovering routes
to destinations and tracking neighbors through keep-alive requests. One of the
most important factors that affect performance is the beacon interval in the route
discovery process. If the beacon interval is too small, the number of beacons
generated becomes huge. On the other hand, a higher beacon interval incurs a
lesser number of generated beacons. Popular routing protocols such as DSR,
DSDV and AODV fall under this category.
• Hierarchical Routing
Nodes form clusters based on polling. The cluster head is responsible for all
communications on behalf of the members of the cluster. Group mobility can be
achieved by the cluster head following some metric to devise the mobility
pattern of the nodes in the cluster. LEACH is a common example, where the
cluster head is rotated among the members to facilitate load balancing that can
be deployed for IoT environments.
• Multipath routing
Protocols employing multipath routing seek to and use alternate paths towards
every destination. This distributes the cost of forwarding packets among more
nodes, saving the energy of individual, highly-frequented nodes.
• Probabilistic routing
Routing decision is based on the calculated probabilistic value. A primitive
method to compute these values is by gossiping. Data packets are flooded into
the network like a rumor with a probability p. Unlike other flooding
mechanisms, these packets are forwarded only once and thereby the traffic
overhead is reduced. A highly structured approach is to refer the prior history of
packet delivery and mobility pattern, based on this we can decide which nodes
can form a route to the destination.
Page 4 of 12
Ad-hoc On-Demand Distance Vector (AODV)
AODV computes a loop free single path on demand. A mobile node discovers
and maintains a route to another node only when it needs to communicate. One
observation of AODV is that, though the source actually discovers multiple
paths during the route discovery process, it chooses only the best route and
discards the rest. Also, frequent route breaks cause the intermediate nodes to
drop packets because no alternate path to the destination is available. This
reduces the overall throughput and the packet delivery ratio. Moreover, in high
mobility scenarios, the average end-to-end delay can be significantly high due
to frequent route discoveries. When route failures occur, the process of route
discovery has to begin from scratch consuming more network resources and
overhead.
Page 5 of 12
• Uniform Random Deployment
• Regular Deployment
1. Square Grid
2. Triangle Grid
3. Hexagon Grid
4. Tri-Hexagon Tiling (THT)
Regular Deployment:
Regular deployment refers to placing sensors in a regular form in a sensing area.
This type of deployment can usually be applied in non-harsh environment and
non-large-scale regions. In this paper, four regular deployment strategies are
introduced.
Page 6 of 12
IoT Sensor Deployment Challenges:
The business benefits of IoT coupled with market trends are driving rapid IoT
adoption in every industry vertical like smart cities, building automation,
industrial, healthcare, etc. This growing demand for IoT connectivity is paving
the way to a plethora of sensor types for various use cases such as traffic
sensors, parking meters, pressure sensors, electricity sensors, and so on.
Efficient sensor deployment is one of the key success factors in every IoT
investment and that’s where most enterprises struggle a lot today.
Page 7 of 12
Challenge # 4 Network validations for connectivity SLAs
It is difficult to guarantee a satisfactory level of service if the IoT devices fail to
deliver due to poor connectivity. Currently, RF and RAN design are done based
on statistical models. Once the IoT network is deployed, due to the lack of
network health data, it is not possible to validate your network design
assumptions and performance in the context of the initial SLAs.
In a highly competitive digital marketplace, businesses can’t live with these
challenges for too long.
Deterministic Approach:
Deterministic approaches make use of mathematical methods to guarantee
overlap. Though they require higher discovery latency, they do not need any
synchronization. The searchlight protocol by Bakht et al can ensure discovery
within a definite latency by sequential search. This protocol has two slots -
Active slots and probe slots. The nodes decide to remain awake during active
slots, and sleep during the remaining slots. During an active slot, the node may
send/receive or do both. Successful discovery takes place between two
neighboring nodes whenever their active slots overlap. When a discovery
scheme uses few active slots to discover neighbors within a reasonable time
limit, then it is said to be efficient. In searchlight, each node has two active slots
in t. The first active slot, called the anchor slot, is the first slot in the period. In
the symmetric case, since the position of this anchor slot is fixed in t but the
start times for the t vary for different nodes, the anchor slots for two nodes
overlap only if the difference between the start times of the two periods is less
than a timeslot. The two anchor slots would never meet since the offset remains
constant. The relative position of the anchor slot of one node remains the same
with respect to that of the other node always and is in the range [1, t - 1].
Searchlight introduces a second active slot in t called the probe slot, which
Page 8 of 12
searches for the anchor slot of the other node. Probe-anchor, probe-probe and
anchor-anchor overlaps all result in discovery.
One disadvantage of this scheme is that it is a mobile agnostic method and is
not well suited for mobile scenarios.
Page 9 of 12
Figure 2.3: Learning based approach
After the completion of the learning phase, the framework enters the
experimental phase. In this phase, the framework is tested with the real world
data and optimal decisions are taken.
Data Aggregation:
Data Aggregation is the process of one or more sensor nodes and detects the
information result from the other sensor nodes. The aim of the data aggregation
is removes data redundancy and improves the energy lifetime in wireless sensor
network. Therefore reducing the number of data packets transmitted over the
network because aggregation need less power as compare to multiple packets
sending having same data.
Page 10 of 12
main role of cluster head aggregate data received from cluster members locally
and then transmits the result to base station. The cluster head can share
information with the sink directly via long range transmissions or multi
hopping using other cluster heads.
Data Dissemination
Data Dissemination is the process in which sensor nodes is collecting the data
and communicate to the base station or any other interested node. The source
node is generating the data and the information to be reported is known as
event. Those nodes which are interested in event and seek information are
known as sink. So in this whole process data are routed in sensor network. It is
two steps process; in first step interested nodes are broadcast to their neighbor
nodes in the network and in second step nodes after receiving the request nodes
sends requesting data.
Flooding: If the destination node is not receive the data packet or specified
number of hops is not reached. Then each node broadcast the gathered data until
the packet is reached to their destination node. The main advantage of flooding
is not requires costly topology maintain or route discovery but it face several
problems like implosion, overlap and resource blindness.
Page 11 of 12
Gossiping: The gossiping is the version of flooding approach .In this approach
the packet is sent to a single neighbor chosen from neighbour table randomly
instead of broadcasting each packet to the entire neighbor. This process can take
long time from completion. Gossiping avoids the problem faced in flooding
approach like implosion.
Page 12 of 12