UNIT 5 NOTES
UNIT 5 NOTES
Wireless Sensor Network (WSN) middleware serves as a crucial layer between the
application and the low-level network protocols in a WSN. Here are some key
principles underlying WSN middleware:
Middleware architecture
Middleware architecture serves as an intermediary layer between the application and
the underlying operating system or hardware, providing a set of services and
abstractions to facilitate communication, data management, and other functionalities.
1. Data Storage: This involves selecting appropriate data storage solutions such as
databases (relational, NoSQL), file systems, or data lakes. Each has its own strengths
and is chosen based on factors like data structure, volume, velocity, and access
patterns.
2. Data Processing: Refers to the manipulation and transformation of data to derive
insights or prepare it for consumption. Batch processing (e.g., MapReduce) and real-
time/stream processing (e.g., Apache Kafka, Apache Flink) are common paradigms
used depending on latency requirements.
3. Data Access: Encompasses mechanisms for accessing and retrieving data from
storage. APIs, query languages (e.g., SQL), and web services (RESTful APIs) are used
to interact with databases and other data sources.
4. Data Integration: Involves combining data from different sources or formats to
provide a unified view. ETL (Extract, Transform, Load) processes, data pipelines, and
data virtualization are used to integrate disparate data sources.
5. Data Modeling: The process of defining the structure and relationships of data
entities in a system. This includes conceptual, logical, and physical data modeling,
which helps in designing efficient databases and ensuring data integrity.
6. Data Governance: Establishes policies and procedures for managing data assets,
ensuring compliance, security, and data quality. It involves metadata management,
data lineage, access control, and regulatory compliance.
7. Data Security: Encompasses measures to protect data from unauthorized access,
alteration, or destruction. Encryption, access controls, authentication, and auditing
are commonly used to ensure data security.
8. Data Analytics: Involves the application of statistical, machine learning, or AI
techniques to analyze data and extract meaningful insights. Data visualization tools,
predictive analytics, and business intelligence platforms aid in data analysis.
9. Data Quality: Ensures that data is accurate, consistent, and reliable for decision-
making. Data profiling, cleansing, validation, and monitoring processes are used to
improve and maintain data quality.
10. Data Lifecycle Management: Governs the lifecycle of data from creation to archival
or deletion. It includes data retention policies, backup and recovery, data archival,
and disposal procedures.
11. Scalability and Performance: Data architecture must be scalable to accommodate
growing data volumes and user loads. Distributed databases, sharding, caching, and
load balancing techniques are employed to ensure system performance.
12. Metadata Management: Manages metadata, which provides context and
information about the data. It includes metadata repositories, data dictionaries, and
schema registries to facilitate data discovery, understanding, and governance.
It offers a range of networking devices such as switches, routers, and wireless access points
tailored for small to medium-sized businesses (SMBs).
MiLAN products are known for their reliability, affordability, and ease of use, making them
popular choices for SMBs looking to establish or expand their network infrastructure.
1. IrisNet:
IrisNet is an optical network technology developed by a consortium of
companies and research institutions.
It aims to provide high-speed, high-capacity optical networking solutions for
data centers, telecommunications, and internet infrastructure.
IrisNet focuses on leveraging wavelength-division multiplexing (WDM) and
dense wavelength-division multiplexing (DWDM) techniques to increase the
bandwidth and efficiency of optical communication networks.
By utilizing optical fibers and advanced modulation techniques, IrisNet offers
increased data transmission rates and scalability, meeting the growing
demand for bandwidth-intensive applications and services.
Sensor nodes are used in WSN with the onboard processor that manages and
monitors the environment in a particular area. They are connected to the Base
Station which acts as a processing unit in the WSN System.
Base Station in a WSN System is connected through the Internet to share data.
Applications of WSN:
1. Quality of Service
2. Security Issue
3. Energy Efficiency
4. Network Throughput
5. Performance
6. Ability to cope with node failure
7. Cross layer optimisation
8. Scalability to large scale of deployment
A modern Wireless Sensor Network (WSN) faces several challenges, including:
Limited power and energy: WSNs are typically composed of battery-powered
sensors that have limited energy resources. This makes it challenging to ensure
that the network can function for
long periods of time without the need for frequent battery replacements.
Limited processing and storage capabilities: Sensor nodes in a WSN are
typically small and have limited processing and storage capabilities. This makes
it difficult to perform complex tasks or store large amounts of data.
Heterogeneity: WSNs often consist of a variety of different sensor types and
nodes with different capabilities. This makes it challenging to ensure that the
network can function effectively and
efficiently.
Security: WSNs are vulnerable to various types of attacks, such as
eavesdropping, jamming, and spoofing. Ensuring the security of the network
and the data it collects is a major challenge.
Scalability: WSNs often need to be able to support a large number of sensor
nodes and handle large amounts of data. Ensuring that the network can scale to
meet these demands is a significant
challenge.
Interference: WSNs are often deployed in environments where there is a lot of
interference from other wireless devices. This can make it difficult to ensure
reliable communication between sensor nodes.
Reliability: WSNs are often used in critical applications, such as monitoring the
environment or controlling industrial processes. Ensuring that the network is
reliable and able to function correctly
in all conditions is a major challenge.
Components of WSN:
1. Sensors:
Sensors in WSN are used to capture the environmental variables and which is
used for data acquisition. Sensor signals are converted into electrical signals.
2. Radio Nodes:
It is used to receive the data produced by the Sensors and sends it to the WLAN
access point. It consists of a microcontroller, transceiver, external memory, and
power source.
3. WLAN Access Point:
It receives the data which is sent by the Radio nodes wirelessly, generally
through the internet.
4. Evaluation Software:
The data received by the WLAN Access Point is processed by a software called
as Evaluation Software for presenting the report to the users for further
processing of the data which can be used for processing, analysis, storage, and
mining of the data.
Performance and traffic management are crucial aspects of network and system
administration, ensuring optimal operation and resource utilization.
1. Performance Management:
Monitoring: Regularly monitor network and system performance metrics such
as bandwidth usage, latency, throughput, CPU utilization, and memory usage.
Analysis: Analyze performance data to identify trends, bottlenecks, and areas
for improvement. This helps in troubleshooting issues and optimizing resource
allocation.
Optimization: Implement optimization techniques such as load balancing,
caching, compression, and content delivery networks (CDNs) to improve
performance and responsiveness.
Capacity Planning: Forecast future resource requirements based on historical
data and growth projections. This ensures that systems are adequately
provisioned to handle increasing workloads.
2. Traffic Management:
Traffic Shaping: Control the flow of network traffic by shaping or prioritizing
certain types of traffic. This helps in managing bandwidth usage and ensuring
quality of service (QoS) for critical applications.
Quality of Service (QoS): Prioritize network traffic based on service level
agreements (SLAs) or application requirements. QoS mechanisms such as
traffic classification, queuing, and scheduling ensure that critical traffic
receives preferential treatment.
Traffic Engineering: Optimize network traffic routes and paths to improve
performance, reduce congestion, and maximize resource utilization.
Techniques like route optimization, traffic rerouting, and dynamic path
selection are used to achieve this.
Content Delivery: Distribute content closer to end-users using CDNs or edge
computing to reduce latency and improve response times. Content caching
and replication techniques help in delivering content efficiently and reducing
bandwidth usage.
Security and Compliance: Implement traffic management policies to enforce
security measures such as access control, encryption, and intrusion
detection/prevention. Compliance with regulatory requirements such as
GDPR, HIPAA, or PCI DSS is also ensured through traffic management
mechanisms.
Network security involves protecting networks and their resources from unauthorized
access, misuse, modification, or denial of service. Here are the fundamentals of
network security:
1. Access Control:
Implement strong authentication mechanisms to verify the identity of users
and devices accessing the network.
Enforce least privilege access policies to ensure that users and devices only
have access to resources necessary for their roles.
2. Firewalls:
Deploy firewalls to monitor and control incoming and outgoing network
traffic based on predetermined security rules.
Use stateful inspection to track the state of active connections and make
intelligent decisions on allowing or blocking traffic.
3. Intrusion Detection and Prevention Systems (IDPS):
Employ IDPS to monitor network traffic for signs of malicious activity or policy
violations.
IDPS can detect and respond to security threats in real-time, either by alerting
administrators or automatically taking action to block or mitigate the threat.
4. Encryption:
Utilize encryption protocols such as SSL/TLS for securing data in transit and
VPNs for establishing secure communication channels over public networks.
Encrypt sensitive data at rest using encryption algorithms to protect it from
unauthorized access if the storage medium is compromised.
5. Virtual Private Networks (VPNs):
Use VPNs to create secure, encrypted tunnels over public networks, allowing
remote users or branch offices to securely access the corporate network.
VPNs ensure confidentiality and integrity of data transmitted over the network
by encrypting traffic between endpoints.
6. Network Segmentation:
Segment the network into distinct security zones or segments to isolate
critical assets and restrict lateral movement of attackers in case of a breach.
Use VLANs, subnetting, and access control lists (ACLs) to enforce
segmentation and control traffic flow between network segments.
7. Patch Management:
Regularly update network devices, operating systems, and software
applications with security patches to address known vulnerabilities and
minimize the risk of exploitation.
Employ automated patch management solutions to streamline the process
and ensure timely application of patches.
8. Security Policies and Procedures:
Establish comprehensive security policies and procedures that define
acceptable use of resources, password management, incident response, and
other security-related practices.
Educate employees and users about security best practices and enforce
compliance with security policies through regular training and awareness
programs.
9. Logging and Monitoring:
Maintain logs of network activities, including user authentication events,
access attempts, and security incidents, for auditing and forensic analysis.
Implement real-time monitoring solutions to detect anomalies, unauthorized
access attempts, and suspicious behavior on the network.
10. Physical Security:
Secure physical access to network infrastructure, data centers, and critical
network components to prevent unauthorized tampering or theft.
Implement measures such as access controls, surveillance cameras, and
environmental controls to safeguard physical assets and infrastructure.
Network security faces numerous challenges due to the evolving threat landscape,
increasing complexity of networks, and rapid technological advancements.
1. Attacks:
Denial of Service (DoS) / Distributed Denial of Service (DDoS): Overwhelms a
target system with excessive traffic or requests, rendering it inaccessible to legitimate
users.
Man-in-the-Middle (MitM): Intercepts and potentially alters communication
between two parties without their knowledge. This allows attackers to eavesdrop on
sensitive information or manipulate data.
Phishing: Uses deceptive emails, messages, or websites to trick users into revealing
sensitive information such as login credentials or financial details.
Malware: Malicious software designed to infiltrate, damage, or control computer
systems. This includes viruses, worms, trojans, ransomware, and spyware.
SQL Injection: Exploits vulnerabilities in web applications to inject malicious SQL
queries, allowing attackers to manipulate databases and steal or modify data.
Cross-Site Scripting (XSS): Injects malicious scripts into web pages viewed by other
users, enabling attackers to steal session cookies or redirect users to phishing sites.
Brute Force Attacks: Repeatedly tries different combinations of usernames and
passwords until the correct credentials are found, typically used to gain unauthorized
access to accounts or systems.
Zero-Day Exploits: Attacks targeting vulnerabilities in software or systems that are
not yet known to the vendor or have no available patch.
2. Security Protocols and Mechanisms:
Transport Layer Security (TLS) / Secure Sockets Layer (SSL): Encrypts data
transmitted over networks to ensure confidentiality and integrity. TLS/SSL protocols
secure communication between clients and servers, protecting against eavesdropping
and MitM attacks.
Virtual Private Network (VPN): Establishes encrypted tunnels over public
networks, enabling secure communication between remote users and corporate
networks. VPNs protect data in transit and provide anonymity by masking IP
addresses.
Intrusion Detection Systems (IDS) / Intrusion Prevention Systems (IPS): Monitor
network traffic for suspicious activities or known attack patterns. IDS detect and alert
administrators to potential threats, while IPS actively block or mitigate attacks in real-
time.
Firewalls: Filter and control incoming and outgoing network traffic based on
predefined security rules. Firewalls protect against unauthorized access, DoS attacks,
and malware by enforcing access policies and blocking malicious traffic.
Multi-Factor Authentication (MFA): Requires users to provide multiple forms of
authentication, such as passwords, biometrics, or security tokens, to access systems or
services. MFA enhances security by adding an extra layer of protection against
unauthorized access.
Encryption: Protects sensitive data from unauthorized access or interception by
encrypting it at rest and in transit. Encryption algorithms such as AES, RSA, and ECC
ensure confidentiality and integrity of data stored on devices or transmitted over
networks.
Security Patching and Updates: Regularly apply security patches and updates to
software, operating systems, and devices to address known vulnerabilities and
mitigate the risk of exploitation by attackers.
By employing a combination of these security protocols and mechanisms, organizations can
strengthen their defenses against various cyber threats and protect their networks, systems,
and data from unauthorized access or malicious activities.