The document discusses wireless sensor networks and their applications. It describes wireless sensor networks as consisting of individual nodes that can interact with their environment by sensing or controlling physical parameters. It then discusses several applications of wireless sensor networks, including disaster relief, environment monitoring, intelligent buildings, facility management, machine maintenance, agriculture, healthcare, and logistics. Finally, it outlines some key requirements and mechanisms needed to implement wireless sensor networks, including communication, energy efficiency, self-configuration, collaboration, data-centric operation, and exploiting tradeoffs between different needs.
This document discusses the basic transmission theory and calculations for satellite link design. It covers parameters like transmitted power, antenna gains, free space path loss, and the Friis transmission equation. It then discusses practical losses in the atmosphere and antennas. Thermal noise power and noise figure are defined. The concepts of system noise temperature and noise properties of cascaded stages are explained. References for further reading on satellite communication are provided.
Minimize energy per packet (or per bit)
Maximize network lifetime
Routing considering available battery energy
Maximum Total Available Battery Capacity
Minimum Battery Cost Routing (MBCR)
Min– Max Battery Cost Routing (MMBCR)
Conditional Max – Min Battery Capacity Routing (CMMBCR)
Minimize variance in power levels
Minimum Total Transmission Power Routing (MTPR)
This document discusses localization techniques in wireless sensor networks. It begins with introducing wireless sensor networks and their components. It then discusses the need for localization to track objects within sensor networks. There are two main types of localization schemes - range-based which uses distance or angle measurements, and range-free which uses approximate distance estimates. Examples of range-based techniques include time of arrival, time difference of arrival, received signal strength indicator, and angle of arrival. Range-free techniques include proximity and distance-based localization using hop counts. The document compares the advantages and disadvantages of different localization methods.
This document discusses routing protocols in wireless sensor networks. It begins with an introduction to routing challenges in WSNs such as limited energy, processing, and storage in sensor nodes. It then covers different routing techniques including flat routing protocols like SPIN, directed diffusion, and rumor routing. Hierarchical routing protocols discussed include LEACH, PEGASIS, TEEN, and APTEEN. Finally, it briefly mentions location-based routing and the GEAR protocol.
Interconnect Parameter in Digital VLSI DesignVARUN KUMAR
This document discusses key interconnect parameters for VLSI design including capacitance, resistance, and inductance. It notes that as device sizes shrink, wire lengths increase which leads to greater parasitic effects that must be considered. The document outlines how capacitance depends on shape and surroundings and can be modeled as parallel plates. Resistance is defined by resistivity, length and cross-sectional area, with aluminum a common interconnect material. Inductance also becomes important at higher frequencies. Models are simplified by ignoring less dominant effects.
Energy efficient cluster head selection in LEACH protocolARUNP116
This document presents a summary of an energy efficient cluster head selection method for the LEACH protocol in wireless sensor networks. It discusses the LEACH protocol and its phases/operations. It also identifies weaknesses in the standard LEACH approach. The authors then propose selecting two cluster heads based on residual energy to perform data gathering, aggregation, and transmission to the base station. Cluster heads would be selected considering residual energy and distance factors to balance energy consumption across the network. This proposed approach aims to improve system efficiency and prolong the network lifetime.
Low-energy adaptive clustering hierarchy ("LEACH") is a TDMA-based MAC protocol which is integrated with clustering and a simple routing protocol in wireless sensor networks (WSNs)
Vijayanand Metri presented a seminar on wireless sensor networks under the guidance of Prof. Surekha of the computer science and engineering department at GEC Haveri. The presentation covered the introduction, architecture, types, characteristics, features, issues, applications, advantages, and disadvantages of wireless sensor networks. It discussed sensor nodes, ad hoc deployment, unattended operation, environmental monitoring, health monitoring, and concluded that WSNs consist of small sensor nodes that can solve many open issues practically and cost-effectively.
This document summarizes a seminar presentation on wireless sensor networks (WSNs). It begins with introductions to WSNs, describing them as networks of spatially distributed sensors that monitor conditions like temperature, sound or pollution. It then covers the architecture of WSNs, including special addressing requirements, the architecture of sensor nodes, and differences between WSNs and mobile ad hoc networks. The document discusses applications, design challenges, advantages and disadvantages of WSNs. It concludes by discussing the future potential of WSNs in applications like smart homes and offices.
This ppt is about Smart Antenna which includes history, Introduction, Working of smart antenna and where this smart antennas can be used.This ppt also tells about the types of smart antenna and the main principle of working of smart antenna. Smart antennas mainly categorized as Adaptive and switched beam array.Among these two adaptive antenna is used for the efficient utilisation of frequency spectrum.
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
Wireless sensor networks consist of large numbers of sensor nodes that monitor parameters and communicate wirelessly. The SPIN protocol family was developed to address the limitations of sensor nodes, particularly their limited energy, computation, and communication capabilities. SPIN uses meta-data negotiation and resource awareness to disseminate data between nodes more efficiently than flooding protocols. SPIN-1 is a simple three-stage handshake protocol that reduces energy costs. SPIN-2 builds upon SPIN-1 with an additional energy conservation heuristic to further prolong network lifetime. Evaluation shows SPIN consumes significantly less energy than flooding for data dissemination in wireless sensor networks.
Data aggregation in wireless sensor network , 11751 d5811praveen369
The document discusses data aggregation in wireless sensor networks. It explains that sensor networks aim to gather and aggregate data in an energy efficient manner to extend network lifetime. It describes various data aggregation approaches like centralized, LEACH, and TAG. It also discusses cluster-based and tree-based aggregation where nodes aggregate and transmit data to parent nodes or cluster heads. The document outlines types of queries for sensor networks and benefits of data aggregation in reducing traffic and energy consumption while improving data accuracy.
This document discusses different methods of fibre splicing used to join optical fibers, including fusion splicing, mechanical splicing, and array splicing. Fusion splicing involves heating the fiber ends and fusing them together, while mechanical splicing uses tubes, V-grooves, or other guides to hold the fibers in alignment without heating. Array splicing allows simultaneously splicing multiple fibers in a ribbon using techniques like electric arc fusion or V-groove chips. Average splice losses are typically 0.1 dB or less depending on the splicing technique and fiber type.
The document describes two wireless sensor network routing protocols: LEACH and PEGASIS. LEACH uses local processing to reduce global communication and randomly rotates cluster heads to distribute energy load. PEGASIS forms chains between nodes so that each node only communicates with a close neighbor, extending network lifetime compared to LEACH by up to 3 times. Both protocols aim to improve energy efficiency through data aggregation and minimizing transmission distances in wireless sensor networks.
The document summarizes a seminar presentation on wireless sensor networks. It discusses the architecture of WSNs, including sensor nodes, gateways, base stations, and networking topologies. It also covers the advantages and disadvantages of WSNs, their applications in fields like environmental monitoring and medical monitoring, and their future potential to bridge the physical and digital worlds.
A smart antenna consists of an antenna array that can change its pattern in response to the signal environment to improve communication system performance. There are two main types: switched beam arrays, which use multiple fixed beams with one beam activated towards the desired signal; and adaptive arrays, which use algorithms to minimize interfering signals and maximize signal-to-interference ratio (SIR). The goals of a smart antenna system are to improve signal gain, interfere rejection, and power efficiency.
Optical switches enable signals in optical fibers or integrated optical circuits to be selectively switched from one circuit to another. They operate using mechanical means such as physically shifting fibers, or electro-optic, magneto-optic, or other methods. Optical switches can be slow, for alternate routing around faults, or fast, for logic operations using electro-optic or magneto-optic effects. Optical networks transmit data digitally as light through connected fiber strands and include SDH/SONET, opaque, partially transparent, and all-optical networks. All-optical networks perform all operations and functions optically without opto-electronics conversion.
This document provides an overview of microwave tubes, including their components and operating principles. It discusses cavity resonators, rectangular cavity resonators, limitations of conventional vacuum tubes at high frequencies, and types of microwave tubes like klystrons, traveling wave tubes (TWTs), and magnetrons. Magnetrons are used in microwave ovens and produce hundreds of watts of microwave power by directing an electron beam in a circular pattern using a strong magnetic field. TWTs amplify signals in the microwave frequency range from 500 MHz to 300 GHz using an electron beam interacting with a slow-wave structure.
Wavelength division multiplexing (WDM) allows multiple optical carrier signals to be transmitted through a single optical fiber by using different wavelengths of laser light. In WDM, signals from different sources are combined by a multiplexer and transmitted through the fiber. At the receiving end, a demultiplexer splits the signal into its different wavelength components and sends each to the corresponding receiver. WDM can be divided into coarse WDM (CWDM) and dense WDM (DWDM). CWDM uses wider spacing between wavelengths and supports fewer channels, while DWDM uses narrower spacing and supports more channels. WDM enables multiplying the effective bandwidth of fiber optic systems and reducing transmission costs.
EC8702 adhoc and wireless sensor networks iv eceGOWTHAMMS6
This document outlines the syllabus for a course on Adhoc and Wireless Sensor Networks. It covers five units: (1) Introduction to Adhoc Networks and routing protocols, (2) Introduction to sensor networks and architectures, (3) Networking concepts and protocols for sensor networks, (4) Security issues in sensor networks, and (5) Sensor network platforms and tools. Some key topics discussed include characteristics of adhoc networks, challenges in routing, components and applications of wireless sensor networks, and medium access schemes. The objectives are for students to learn the fundamentals and apply their knowledge to identify suitable protocols based on network requirements and understand security and transport layer issues in these networks.
The document discusses smart grids as a modernization of existing power systems. It describes smart grids as using information technology and communication networks to create a more decentralized, efficient and renewable-based electric grid. Some key benefits of smart grids include improved energy efficiency, higher power reliability, lower costs for consumers, and better integration of renewable energy sources. However, smart grids also face challenges such as high installation costs and potential cybersecurity and privacy issues. The document provides an overview of smart grid components and technologies as well as examples of smart grid pilot projects being implemented in India.
This document discusses scattering matrices (S-parameters) which relate the incoming and outgoing wave amplitudes at the ports of a network. It provides definitions and formulations for S-parameters, including that an S-matrix is a square matrix that describes the scattering properties of passive, linear, and time-invariant microwave networks. Key advantages of S-parameters are that matched loads are used, eliminating termination effects, and power can be easily measured at high frequencies. Loss factors like return loss, insertion loss, transmission loss, and reflection loss are also defined in terms of S-parameters.
Internet of Things and its Enabling Technologies - RFIDSwetha Kogatam
The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure.infrastructure is one such technology which enables the Internet of things.When the RFID readers abides by appropriate communication protocols and are connected to the terminal of Internet, the readers distributed throughout the world can identify, track and monitor the objects attached with tags globally, automatically, and in real time, if needed. This is the so-called Internet of Things (IOT).
This document provides an overview of smart grids. It defines a smart grid as an intelligent electricity delivery system that allows for two-way communication between energy suppliers and consumers. Smart meters installed in homes and businesses monitor energy consumption and transmit that data back to energy providers. Energy providers can then track usage and automatically adjust supply levels to match demand. The document outlines the key components of smart grids like smart meters and information transfer systems. It discusses advantages such as reduced blackouts and energy costs but also disadvantages such as potential security and privacy issues if the systems are hacked. The conclusion states that while smart grids provide more efficient energy allocation, widespread adoption may be challenging due to financial and regulatory hurdles.
Spread spectrum communication uses wideband noise-like signals that are hard to detect, intercept, or jam. It spreads data over multiple frequencies. There are two main techniques: direct sequence spread spectrum multiplies a data signal by a pseudorandom code, and frequency hopping spread spectrum modulates a narrowband carrier that hops between frequencies. Spread spectrum provides benefits like resistance to interference and jamming, better signal quality, and inherent security. It finds applications in wireless networks, Bluetooth, and CDMA cellular systems.
This document describes the LEACH (Low-Energy Adaptive Clustering Hierarchy) protocol for wireless microsensor networks. LEACH utilizes randomized rotation of cluster heads to distribute the energy load evenly among the sensors and achieves longer system lifetime. It uses localized coordination and control for data transfers to reduce global network communication. LEACH allows adaptive clustering and uses data aggregation in the clusters to reduce global data transmission and improve system scalability and energy efficiency. Simulation results show that LEACH distributes energy load evenly and outperforms other routing protocols by achieving up to a factor of 4 times increase in system lifetime.
The document discusses clustering protocols in wireless sensor networks (WSNs). It begins by introducing WSNs and their applications. It then describes the main types of communication in WSNs: direct, multi-hop, and using clustering. Several issues with clustering in WSNs are identified, such as selecting cluster heads and handling node mobility. Popular clustering protocols like LEACH are examined, noting their advantages like data aggregation but also limitations such as unsuitability for large networks. Proposed solutions for improving LEACH involve considering energy levels and traffic load when selecting cluster heads.
Vijayanand Metri presented a seminar on wireless sensor networks under the guidance of Prof. Surekha of the computer science and engineering department at GEC Haveri. The presentation covered the introduction, architecture, types, characteristics, features, issues, applications, advantages, and disadvantages of wireless sensor networks. It discussed sensor nodes, ad hoc deployment, unattended operation, environmental monitoring, health monitoring, and concluded that WSNs consist of small sensor nodes that can solve many open issues practically and cost-effectively.
This document summarizes a seminar presentation on wireless sensor networks (WSNs). It begins with introductions to WSNs, describing them as networks of spatially distributed sensors that monitor conditions like temperature, sound or pollution. It then covers the architecture of WSNs, including special addressing requirements, the architecture of sensor nodes, and differences between WSNs and mobile ad hoc networks. The document discusses applications, design challenges, advantages and disadvantages of WSNs. It concludes by discussing the future potential of WSNs in applications like smart homes and offices.
This ppt is about Smart Antenna which includes history, Introduction, Working of smart antenna and where this smart antennas can be used.This ppt also tells about the types of smart antenna and the main principle of working of smart antenna. Smart antennas mainly categorized as Adaptive and switched beam array.Among these two adaptive antenna is used for the efficient utilisation of frequency spectrum.
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
Wireless sensor networks consist of large numbers of sensor nodes that monitor parameters and communicate wirelessly. The SPIN protocol family was developed to address the limitations of sensor nodes, particularly their limited energy, computation, and communication capabilities. SPIN uses meta-data negotiation and resource awareness to disseminate data between nodes more efficiently than flooding protocols. SPIN-1 is a simple three-stage handshake protocol that reduces energy costs. SPIN-2 builds upon SPIN-1 with an additional energy conservation heuristic to further prolong network lifetime. Evaluation shows SPIN consumes significantly less energy than flooding for data dissemination in wireless sensor networks.
Data aggregation in wireless sensor network , 11751 d5811praveen369
The document discusses data aggregation in wireless sensor networks. It explains that sensor networks aim to gather and aggregate data in an energy efficient manner to extend network lifetime. It describes various data aggregation approaches like centralized, LEACH, and TAG. It also discusses cluster-based and tree-based aggregation where nodes aggregate and transmit data to parent nodes or cluster heads. The document outlines types of queries for sensor networks and benefits of data aggregation in reducing traffic and energy consumption while improving data accuracy.
This document discusses different methods of fibre splicing used to join optical fibers, including fusion splicing, mechanical splicing, and array splicing. Fusion splicing involves heating the fiber ends and fusing them together, while mechanical splicing uses tubes, V-grooves, or other guides to hold the fibers in alignment without heating. Array splicing allows simultaneously splicing multiple fibers in a ribbon using techniques like electric arc fusion or V-groove chips. Average splice losses are typically 0.1 dB or less depending on the splicing technique and fiber type.
The document describes two wireless sensor network routing protocols: LEACH and PEGASIS. LEACH uses local processing to reduce global communication and randomly rotates cluster heads to distribute energy load. PEGASIS forms chains between nodes so that each node only communicates with a close neighbor, extending network lifetime compared to LEACH by up to 3 times. Both protocols aim to improve energy efficiency through data aggregation and minimizing transmission distances in wireless sensor networks.
The document summarizes a seminar presentation on wireless sensor networks. It discusses the architecture of WSNs, including sensor nodes, gateways, base stations, and networking topologies. It also covers the advantages and disadvantages of WSNs, their applications in fields like environmental monitoring and medical monitoring, and their future potential to bridge the physical and digital worlds.
A smart antenna consists of an antenna array that can change its pattern in response to the signal environment to improve communication system performance. There are two main types: switched beam arrays, which use multiple fixed beams with one beam activated towards the desired signal; and adaptive arrays, which use algorithms to minimize interfering signals and maximize signal-to-interference ratio (SIR). The goals of a smart antenna system are to improve signal gain, interfere rejection, and power efficiency.
Optical switches enable signals in optical fibers or integrated optical circuits to be selectively switched from one circuit to another. They operate using mechanical means such as physically shifting fibers, or electro-optic, magneto-optic, or other methods. Optical switches can be slow, for alternate routing around faults, or fast, for logic operations using electro-optic or magneto-optic effects. Optical networks transmit data digitally as light through connected fiber strands and include SDH/SONET, opaque, partially transparent, and all-optical networks. All-optical networks perform all operations and functions optically without opto-electronics conversion.
This document provides an overview of microwave tubes, including their components and operating principles. It discusses cavity resonators, rectangular cavity resonators, limitations of conventional vacuum tubes at high frequencies, and types of microwave tubes like klystrons, traveling wave tubes (TWTs), and magnetrons. Magnetrons are used in microwave ovens and produce hundreds of watts of microwave power by directing an electron beam in a circular pattern using a strong magnetic field. TWTs amplify signals in the microwave frequency range from 500 MHz to 300 GHz using an electron beam interacting with a slow-wave structure.
Wavelength division multiplexing (WDM) allows multiple optical carrier signals to be transmitted through a single optical fiber by using different wavelengths of laser light. In WDM, signals from different sources are combined by a multiplexer and transmitted through the fiber. At the receiving end, a demultiplexer splits the signal into its different wavelength components and sends each to the corresponding receiver. WDM can be divided into coarse WDM (CWDM) and dense WDM (DWDM). CWDM uses wider spacing between wavelengths and supports fewer channels, while DWDM uses narrower spacing and supports more channels. WDM enables multiplying the effective bandwidth of fiber optic systems and reducing transmission costs.
EC8702 adhoc and wireless sensor networks iv eceGOWTHAMMS6
This document outlines the syllabus for a course on Adhoc and Wireless Sensor Networks. It covers five units: (1) Introduction to Adhoc Networks and routing protocols, (2) Introduction to sensor networks and architectures, (3) Networking concepts and protocols for sensor networks, (4) Security issues in sensor networks, and (5) Sensor network platforms and tools. Some key topics discussed include characteristics of adhoc networks, challenges in routing, components and applications of wireless sensor networks, and medium access schemes. The objectives are for students to learn the fundamentals and apply their knowledge to identify suitable protocols based on network requirements and understand security and transport layer issues in these networks.
The document discusses smart grids as a modernization of existing power systems. It describes smart grids as using information technology and communication networks to create a more decentralized, efficient and renewable-based electric grid. Some key benefits of smart grids include improved energy efficiency, higher power reliability, lower costs for consumers, and better integration of renewable energy sources. However, smart grids also face challenges such as high installation costs and potential cybersecurity and privacy issues. The document provides an overview of smart grid components and technologies as well as examples of smart grid pilot projects being implemented in India.
This document discusses scattering matrices (S-parameters) which relate the incoming and outgoing wave amplitudes at the ports of a network. It provides definitions and formulations for S-parameters, including that an S-matrix is a square matrix that describes the scattering properties of passive, linear, and time-invariant microwave networks. Key advantages of S-parameters are that matched loads are used, eliminating termination effects, and power can be easily measured at high frequencies. Loss factors like return loss, insertion loss, transmission loss, and reflection loss are also defined in terms of S-parameters.
Internet of Things and its Enabling Technologies - RFIDSwetha Kogatam
The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure.infrastructure is one such technology which enables the Internet of things.When the RFID readers abides by appropriate communication protocols and are connected to the terminal of Internet, the readers distributed throughout the world can identify, track and monitor the objects attached with tags globally, automatically, and in real time, if needed. This is the so-called Internet of Things (IOT).
This document provides an overview of smart grids. It defines a smart grid as an intelligent electricity delivery system that allows for two-way communication between energy suppliers and consumers. Smart meters installed in homes and businesses monitor energy consumption and transmit that data back to energy providers. Energy providers can then track usage and automatically adjust supply levels to match demand. The document outlines the key components of smart grids like smart meters and information transfer systems. It discusses advantages such as reduced blackouts and energy costs but also disadvantages such as potential security and privacy issues if the systems are hacked. The conclusion states that while smart grids provide more efficient energy allocation, widespread adoption may be challenging due to financial and regulatory hurdles.
Spread spectrum communication uses wideband noise-like signals that are hard to detect, intercept, or jam. It spreads data over multiple frequencies. There are two main techniques: direct sequence spread spectrum multiplies a data signal by a pseudorandom code, and frequency hopping spread spectrum modulates a narrowband carrier that hops between frequencies. Spread spectrum provides benefits like resistance to interference and jamming, better signal quality, and inherent security. It finds applications in wireless networks, Bluetooth, and CDMA cellular systems.
This document describes the LEACH (Low-Energy Adaptive Clustering Hierarchy) protocol for wireless microsensor networks. LEACH utilizes randomized rotation of cluster heads to distribute the energy load evenly among the sensors and achieves longer system lifetime. It uses localized coordination and control for data transfers to reduce global network communication. LEACH allows adaptive clustering and uses data aggregation in the clusters to reduce global data transmission and improve system scalability and energy efficiency. Simulation results show that LEACH distributes energy load evenly and outperforms other routing protocols by achieving up to a factor of 4 times increase in system lifetime.
The document discusses clustering protocols in wireless sensor networks (WSNs). It begins by introducing WSNs and their applications. It then describes the main types of communication in WSNs: direct, multi-hop, and using clustering. Several issues with clustering in WSNs are identified, such as selecting cluster heads and handling node mobility. Popular clustering protocols like LEACH are examined, noting their advantages like data aggregation but also limitations such as unsuitability for large networks. Proposed solutions for improving LEACH involve considering energy levels and traffic load when selecting cluster heads.
This document compares and contrasts several common cluster-based routing algorithms for wireless sensor networks, including LEACH, TEEN, APTEEN, HEED, and PEGASIS. It discusses the advantages and disadvantages of each algorithm, with a focus on their approaches to energy efficiency. LEACH randomly selects cluster heads and uses TDMA, but assumes equal energy levels and that all nodes can reach the base station. TEEN and APTEEN add thresholds to improve energy efficiency for time-critical applications. HEED selects cluster heads based on both residual energy and node degree to balance energy use. The document provides an overview of the key clustering algorithms and issues to consider when choosing an approach.
This document summarizes and compares three clustering algorithms for wireless sensor networks: LEACH, HEED, and PEGASIS. LEACH is the first protocol to use hierarchical routing to increase network lifetime. It forms clusters with local heads that collect data from members and transmit to the base station. HEED uses residual energy and network topology features to select distributed cluster heads. PEGASIS forms chains between sensors so each transmits to a close neighbor, avoiding hotspots. The document analyzes these algorithms and compares their effects on network lifetime.
This document discusses clustering in wireless sensor networks. It begins with introducing wireless sensor networks and describing their architecture and applications. It then discusses the objective of clustering in wireless sensor networks, which is to minimize energy dissipation and maximize network lifetime. Various clustering algorithms are described, including LEACH and EEUC. EEUC is an energy-efficient unequal clustering algorithm that forms clusters of unequal size to reduce energy consumption of nodes farther from the base station. The document concludes that EEUC helps balance energy consumption among nodes and improves network lifetime.
Wireless sensor networks have recently come into prominence because they hold the
potential to revolutionize many segments. The Wireless Sensor Network (WSN) is made up of a
collection of sensor nodes, which were small energy constrained devices. Routing technique is one of
the research area in wireless sensor network. So by designing an efficient routing protocol for
reducing energy consumption is the important factor. In this paper, a brief introduction to routing
challenges in WSN have been mentioned. This paper also provides the basic classification of routing
protocols in WSNs along with the most energy efficient protocol named LEACH along with its
advantages and disadvantages. This paper also focus on some of the improved version of LEACH
protocol.
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...Munisekhar Gunapati
A three-layer framework is proposed for mobile data collection in wireless sensor networks, which includes the sensor layer, cluster head layer, and mobile collector (called SenCar) layer. The framework employs distributed load balanced clustering and dual data uploading, which is referred to as LBC-MIMO. The objective is to achieve good scalability, long network lifetime and low data collection latency. At the sensor layer, a distributed load balanced clustering (LBC) algorithm is proposed for sensors to self-organize themselves into clusters. In contrast to existing clustering methods, our scheme generates multiple cluster heads in each cluster to balance the work load and facilitate dual data uploading. At the cluster head layer, the inter-cluster transmission range is carefully chosen to guarantee the connectivity among the clusters. Multiple cluster heads within a cluster cooperate with each other to perform energy-saving inter-cluster communications. Through inter-cluster transmissions, cluster head information is forwarded to SenCar for its moving trajectory planning. At the mobile collector layer, SenCar is equipped with two antennas, which enables two cluster heads to simultaneously upload data to SenCar in each time by utilizing multi-user multiple-input and multiple-output (MU-MIMO) technique. The trajectory planning for SenCar is optimized to fully utilize dual data uploading capability by properly selecting polling points in each cluster. By visiting each selected polling point, SenCar can efficiently gather data from cluster heads and transport the data to the static data sink. Extensive simulations are conducted to evaluate the effectiveness of the proposed LBC-MIMO scheme. The results show that when each cluster has at most two cluster heads, LBC-MIMO achieves over 50 percent energy saving per node and 60 percent energy saving on cluster heads comparing with data collection through multi-hop relay to the static data sink, and 20 percent shorter data collection time compared to traditional mobile data gathering.
This project report summarizes a wireless sensor network project completed by three students. It describes the objectives and types of routing protocols used in wireless sensor networks, focusing on the LEACH hierarchical routing protocol. It then discusses some weaknesses of LEACH and proposes an improved DECSA algorithm that selects cluster heads based on both distance and remaining energy to try to overcome LEACH's energy imbalance issues and extend network lifetime.
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...divya_prabha
This document presents a synopsis for a seminar on an improved energy efficient routing protocol for wireless sensor networks. It begins with an introduction to wireless sensor networks and routing techniques, focusing on hierarchical routing protocols. It then describes the Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol and some of its variants. The main focus is on an Improved LEACH (I-LEACH) protocol, which aims to maximize network lifetime and minimize average energy consumption per node by selecting cluster heads based on residual energy, number of neighbors, and distance to the base station. The synopsis concludes with an outline of the seminar presentation and includes diagrams of the LEACH and I-LEACH protocols.
The document provides an overview of routing protocols in wireless sensor networks. It discusses several categories of routing protocols including data-centric, hierarchical, and location-based. For hierarchical routing protocols, it summarizes LEACH, PEGASIS, HEED, P-LEACH, H-LEACH, and other variants that aim to improve energy efficiency. It provides brief descriptions of how each protocol operates and highlights drawbacks. The document also summarizes several data-centric routing protocols including Directed Diffusion, Rumor Routing, and their limitations.
The document discusses various methods of leaching, which is the process of extracting soluble constituents from a solid material using a liquid solvent. It describes several common leaching techniques used in industries like food processing, pharmaceuticals, and metals extraction. These include counter-current leaching systems that improve extraction efficiency, as well as equipment used for leaching like agitated vessels, thickeners, extractors, and the Kennedy and Bollman extractors.
This document discusses power aware routing protocols for wireless sensor networks. It begins by describing wireless sensor networks and how they are used to monitor environmental conditions. It then classifies routing protocols for sensor networks based on their functioning, node participation style, and network structure. Specific examples are provided for different types of routing protocols, including LEACH, TEEN, APTEEN, SPIN, Rumor Routing, and PEGASIS. Chain-based and clustering routing protocols are also summarized.
EDEEC and LEACH are clustering protocols for wireless sensor networks. EDEEC is for heterogeneous networks where nodes have different energy levels, while LEACH is for homogeneous networks. The document compares the performance of EDEEC and LEACH in terms of network lifetime, energy consumption, and total data transmission. Simulation results show that EDEEC outperforms LEACH by prolonging network lifetime, reducing energy consumption rate over time, and increasing total data transmitted to the base station.
This document presents a hierarchical clustering algorithm for wireless sensor networks. It begins with introductions to wireless sensor networks and their architecture. It then discusses routing protocols, applications, quality of service aspects, and types of clustering for wireless sensor networks. The main body of the document describes the evolution of hierarchical clustering, and presents the hierarchical clustering algorithm and a dynamic energy efficient hierarchical routing algorithm. It provides details on the simulation methods and concludes that hierarchical clustering and routing algorithms can efficiently reduce energy consumption in sensor nodes.
The document discusses the LEACH protocol and DECSA improvement for wireless sensor networks. It describes the two phases of LEACH - the set-up phase where cluster heads are chosen and the steady-state phase where data is transmitted. DECSA considers both distance and residual energy to select cluster heads, forming a three-level hierarchy. DECSA prolongs network lifetime by 31% and reduces energy consumption by 40% compared to the original LEACH protocol.
The document summarizes the key stages of hydrometallurgical processes. It discusses three main stages: leaching, solution concentration and purification, and metal recovery. Leaching involves dissolving metals from ores using techniques like heap, vat, or agitation leaching. Solution concentration and purification removes impurities. Metal recovery precipitates metals from the solution chemically or electrochemically, such as via electrowinning. Hydrometallurgy is more environmentally friendly than pyrometallurgy and can process lower grade ores, but requires more time and has challenges with separation and impurities.
This document discusses energy-efficient sensor networks. It defines sensor networks and sensor nodes, which consist of sensing, processing, and communication devices. Common sensor node applications include environmental monitoring, structural health monitoring, medical diagnostics, and more. The document outlines challenges for sensor nodes related to limited resources and need for energy efficiency. It then discusses various techniques for conserving energy at the MAC layer and network layer, including efficient routing protocols like Directed Diffusion, LEACH, and GEAR.
Wireless sensor networks (WSNs) are composed of distributed nodes that communicate wirelessly to monitor environmental conditions like temperature, sound, and pressure. Each node contains sensors that collect data and transmit it back to a gateway. WSNs originated in the 1980s with the Defense Advanced Research Projects Agency's Distributed Sensor Networks program. Recent advances in computing, communication, and microelectromechanical technologies have enabled the development and proliferation of low-cost, small sensor nodes. WSNs are used in applications where wired networks cannot reach, like environmental and infrastructure monitoring. Their advantages include scalability and ease of deployment, though they have limitations in resources like battery power and bandwidth.
A wireless sensor network (WSN) consists of spatially distributed sensor nodes that monitor environmental or physical conditions cooperatively. Key features of WSNs include large numbers of low-cost nodes with strict energy constraints, short-range wireless connections, and data-centric routing where data is aggregated and fused as it travels towards base stations. WSNs require specialized protocols for tasks like media access control, data dissemination, and energy-efficient operation. WSNs have applications in environmental monitoring, medical care, military operations, and more.
Energy efficient protocol with static clustering (eepsc) comparing with low e...Alexander Decker
This document summarizes a new routing protocol called Energy-Efficient Protocol with Static Clustering (EEPSC) that is proposed to improve energy efficiency in wireless sensor networks compared to the LEACH protocol. EEPSC partitions the network into static clusters during an initial setup phase to eliminate the overhead of dynamic clustering. It then selects high-energy sensor nodes within each cluster to serve as cluster heads and temporary cluster heads to distribute the energy load and extend the lifetime of the network. Simulation results showed that EEPSC outperforms LEACH in terms of network lifetime and power consumption.
This document provides an overview of various medium access control (MAC) protocols for wireless sensor networks. It discusses distributed and centralized MAC protocols, including DFWMAC, EY-NPMA, ISMA, RAP, RAMA, Zhang's and Acampora's proposals, and DTMP. It also covers hybrid access protocols like RRA, PRMA, RRA-ISA, DQRUMA, and MASCARA. Additionally, it summarizes MAC protocols like S-MAC, T-MAC, B-MAC, P-MAC, Y-MAC, and Z-MAC and discusses their key characteristics and performance results.
The document discusses wireless sensor networks and energy-efficient routing. It introduces WSNs and outlines their typical energy consumption from transmission, reception, and sensing. It describes deterministic and random deployment strategies and their impact on energy use. The document then examines WSN routing protocols and strategies, including flooding, interest-based, and location-based. It analyzes hierarchical protocols like LEACH and DECSA, noting how DECSA improves on LEACH by considering distance and residual energy to better balance energy consumption and prolong network lifetime.
The document discusses a mid-project presentation on implementing the LEACH protocol for wireless sensor networks. It provides an introduction to WSNs and their applications, challenges, and an overview of the LEACH protocol. The LEACH protocol uses randomized rotation of cluster heads and data aggregation to improve energy efficiency. The presentation outlines the pros and cons of LEACH and future work implementing it in Java.
Wireless sensor networks use large numbers of small, low-cost sensors that communicate wirelessly to monitor conditions like temperature, sound, pollution levels, pressure, etc. Sensors collect data and pass it to a base station, which can be accessed through the internet. Wireless sensor networks can be used for applications like environmental monitoring, smart grids, healthcare, agriculture, and more. They face challenges related to power efficiency, security, scalability and operating in different environments.
The document discusses different types of wireless networks including Mobile Ad Hoc Networks (MANETs), Wireless Sensor Networks (WSNs), and Vehicular Ad Hoc Networks (VANETs). It provides an overview of the key characteristics of each network type, such as their topology, communication paradigms, and constraints. MANETs allow nodes to connect and communicate in a decentralized manner without infrastructure support. WSNs consist of dense deployments of low-cost sensor nodes that collect and transmit data. VANETs are similar to MANETs but involve vehicle-to-vehicle communication and have more predictable mobility patterns.
Energy Efficient Clustering: Wireless Sensor NetworkShivang Rana
- Clustering algorithms aim to organize wireless sensor nodes into clusters to optimize energy efficiency and enable scalability. Clustering involves selecting certain sensor nodes as cluster heads that aggregate data from member nodes and transmit to the base station.
- The document discusses several clustering objectives like load balancing, fault tolerance, reducing energy consumption and latency. It also introduces some popular clustering routing protocols like LEACH, PEGASIS and TEEN.
- LEACH is one of the most widely used clustering algorithms that selects cluster heads randomly and rotates this role to balance energy usage among nodes and prolong network lifetime. It forms clusters based on received signal strength.
INTRODUCTION TO WIRELESS SENSOR NETWORKS.
This powerpoint generally defines Wireless Sensor Networks, the advantages, disadvantages and the general types.
Wireless sensor networks are composed of small, low-cost sensor nodes that are densely deployed to monitor environmental conditions. Each node has sensing, processing and communication capabilities. Sensor networks have many applications including military surveillance, environmental monitoring, health monitoring, smart homes/offices, and inventory management. Routing data efficiently in sensor networks faces challenges due to the large number of nodes, limited energy/resources of nodes, and dynamic network topology changes. Common routing architectures include layered architectures where nodes are organized in layers based on distance from the base station, and clustered architectures where nodes are organized into clusters with cluster heads routing data.
This document discusses wireless sensor networks and their architecture. It describes layered and clustered architectures for organizing sensor networks. Layered architectures arrange sensors in layers around a central base station, allowing for short-range transmissions. Clustered architectures organize sensors into clusters headed by cluster heads that can aggregate and transmit data to the base station. The document also introduces protocols like UNPF that implement layered architectures and LEACH that uses clustering to minimize energy use in sensor networks.
Uniform Distribution Technique of Cluster Heads in LEACH Protocolidescitation
A sensor network is composed of a large number of
sensor nodes that are densely deployed either inside the
phenomenon or very close to it. Clustering provides an effective
way for prolonging the lifetime of a wireless sensor network.
Current clustering algorithms usually utilize two techniques,
selecting cluster heads (CHs) with more residual energy and
rotating cluster heads periodically, to distribute the energy
consumption among nodes in each cluster and extend the
network lifetime. LEACH (Low-Energy Adaptive Clustering
Hierarchy), a clustering-based protocol that utilizes
randomized rotation of local cluster base stations (cluster-
heads) to evenly distribute the energy load among the sensors
in the network. But LEACH cannot select the cluster-heads
uniformly throughout the network. Hence, some nodes in the
network have to transmit their data very far to reach the CHs,
causing the energy in the system to be large. Here we have an
approach to address this problem for selecting CHs and their
corresponding clusters. The goal of this paper is to build such
a wireless sensor network in which each sensor node remains
inside the transmission range of CHs and its lifetime is
enlarged.
This document presents an overview of wireless sensor networks. It discusses the architecture, which includes sensor nodes, gateways, and a base station. It also covers routing protocols, applications like environmental monitoring, and network topologies. Finally, it describes different types of sensors used in wireless sensor networks like mechanical, optical, magnetic, and thermal sensors. The document concludes that wireless sensor networks can bridge the physical and digital worlds by establishing a nervous system for physical monitoring and data collection.
1. A wireless sensor network consists of hundreds of thousands of sensor nodes that communicate wirelessly. Each node contains sensors, computing devices, radio transceivers, and power components.
2. The nodes self-organize into a network infrastructure using multi-hop communication. They measure environmental conditions like temperature and transmit the data back to a base station.
3. The main challenges for wireless sensor networks include limited resources of each node, fault tolerance, long network lifetime, scalability, and adaptability to changing conditions and tasks. Energy-efficient communication protocols and in-network processing are required to address these challenges.
This document discusses wireless sensor networks (WSNs) and methods to enhance their performance. It defines WSNs as networks comprised of sensor nodes that collect and transmit data to base stations. The document outlines the components of WSNs including sensor nodes, microcontrollers, radio transceivers and power sources. It also discusses some key performance parameters like energy consumption, delay, and throughput. Some challenges in WSNs are described as congestion control problems, routing problems, and power consumption issues. Protocols like PCCP and LEACH are presented as ways to address these challenges by prioritizing traffic, clustering nodes, and rotating cluster heads to balance energy usage. Potential applications of WSNs include environmental monitoring, surveillance,
The document provides an overview of the Delhi Metro system including its rolling stock, routes, and key vehicle systems. It summarizes:
1) The Delhi Metro system initially used trains manufactured by a Japanese-Indian consortium but are now built by BEML in India. The network consists of over 7 lines and 400 stations.
2) Vehicle systems described include the train formation, traction motors, bogies, couplers, pneumatic brakes, auxiliary power supply, and the train integrated management system (TIMS).
3) TIMS centrally monitors and controls train systems, detects faults, and provides information to operators and maintenance staff. It interfaces with door controls, brakes, air conditioning and other vehicle
Goals of a well designed inverter,Application,Types of power conveter,Introduction to inverters,Properties of an ideal inverter, Block diagram of an inverter ,Pulse Width Modulation,Inverter operation
This document provides an overview of embedded systems and the AVR microcontroller. It discusses how embedded systems combine hardware and software to perform tasks like processing and storing data. Examples of embedded systems include those used in biotechnology, telecom, military, automotive, and consumer electronics. It then describes the AVR microcontroller, its features, memory segments, pin descriptions, and how to interface it with hardware using Embedded C. Code examples are provided to blink LEDs and interface with 7-segment displays and LCDs.
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfMohamedAbdelkader115
Glad to be one of only 14 members inside Kuwait to hold this credential.
Please check the members inside kuwait from this link:
https://www.rics.org/networking/find-a-member.html?firstname=&lastname=&town=&country=Kuwait&member_grade=(AssocRICS)&expert_witness=&accrediation=&page=1
Fluid mechanics is the branch of physics concerned with the mechanics of fluids (liquids, gases, and plasmas) and the forces on them. Originally applied to water (hydromechanics), it found applications in a wide range of disciplines, including mechanical, aerospace, civil, chemical, and biomedical engineering, as well as geophysics, oceanography, meteorology, astrophysics, and biology.
It can be divided into fluid statics, the study of various fluids at rest, and fluid dynamics.
Fluid statics, also known as hydrostatics, is the study of fluids at rest, specifically when there's no relative motion between fluid particles. It focuses on the conditions under which fluids are in stable equilibrium and doesn't involve fluid motion.
Fluid kinematics is the branch of fluid mechanics that focuses on describing and analyzing the motion of fluids, such as liquids and gases, without considering the forces that cause the motion. It deals with the geometrical and temporal aspects of fluid flow, including velocity and acceleration. Fluid dynamics, on the other hand, considers the forces acting on the fluid.
Fluid dynamics is the study of the effect of forces on fluid motion. It is a branch of continuum mechanics, a subject which models matter without using the information that it is made out of atoms; that is, it models matter from a macroscopic viewpoint rather than from microscopic.
Fluid mechanics, especially fluid dynamics, is an active field of research, typically mathematically complex. Many problems are partly or wholly unsolved and are best addressed by numerical methods, typically using computers. A modern discipline, called computational fluid dynamics (CFD), is devoted to this approach. Particle image velocimetry, an experimental method for visualizing and analyzing fluid flow, also takes advantage of the highly visual nature of fluid flow.
Fundamentally, every fluid mechanical system is assumed to obey the basic laws :
Conservation of mass
Conservation of energy
Conservation of momentum
The continuum assumption
For example, the assumption that mass is conserved means that for any fixed control volume (for example, a spherical volume)—enclosed by a control surface—the rate of change of the mass contained in that volume is equal to the rate at which mass is passing through the surface from outside to inside, minus the rate at which mass is passing from inside to outside. This can be expressed as an equation in integral form over the control volume.
The continuum assumption is an idealization of continuum mechanics under which fluids can be treated as continuous, even though, on a microscopic scale, they are composed of molecules. Under the continuum assumption, macroscopic (observed/measurable) properties such as density, pressure, temperature, and bulk velocity are taken to be well-defined at "infinitesimal" volume elements—small in comparison to the characteristic length scale of the system, but large in comparison to molecular length scale
Concept of Problem Solving, Introduction to Algorithms, Characteristics of Algorithms, Introduction to Data Structure, Data Structure Classification (Linear and Non-linear, Static and Dynamic, Persistent and Ephemeral data structures), Time complexity and Space complexity, Asymptotic Notation - The Big-O, Omega and Theta notation, Algorithmic upper bounds, lower bounds, Best, Worst and Average case analysis of an Algorithm, Abstract Data Types (ADT)
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYijscai
With the increased use of Artificial Intelligence (AI) in malware analysis there is also an increased need to
understand the decisions models make when identifying malicious artifacts. Explainable AI (XAI) becomes
the answer to interpreting the decision-making process that AI malware analysis models use to determine
malicious benign samples to gain trust that in a production environment, the system is able to catch
malware. With any cyber innovation brings a new set of challenges and literature soon came out about XAI
as a new attack vector. Adversarial XAI (AdvXAI) is a relatively new concept but with AI applications in
many sectors, it is crucial to quickly respond to the attack surface that it creates. This paper seeks to
conceptualize a theoretical framework focused on addressing AdvXAI in malware analysis in an effort to
balance explainability with security. Following this framework, designing a machine with an AI malware
detection and analysis model will ensure that it can effectively analyze malware, explain how it came to its
decision, and be built securely to avoid adversarial attacks and manipulations. The framework focuses on
choosing malware datasets to train the model, choosing the AI model, choosing an XAI technique,
implementing AdvXAI defensive measures, and continually evaluating the model. This framework will
significantly contribute to automated malware detection and XAI efforts allowing for secure systems that
are resilient to adversarial attacks.
This paper proposes a shoulder inverse kinematics (IK) technique. Shoulder complex is comprised of the sternum, clavicle, ribs, scapula, humerus, and four joints.
Sorting Order and Stability in Sorting.
Concept of Internal and External Sorting.
Bubble Sort,
Insertion Sort,
Selection Sort,
Quick Sort and
Merge Sort,
Radix Sort, and
Shell Sort,
External Sorting, Time complexity analysis of Sorting Algorithms.
We introduce the Gaussian process (GP) modeling module developed within the UQLab software framework. The novel design of the GP-module aims at providing seamless integration of GP modeling into any uncertainty quantification workflow, as well as a standalone surrogate modeling tool. We first briefly present the key mathematical tools on the basis of GP modeling (a.k.a. Kriging), as well as the associated theoretical and computational framework. We then provide an extensive overview of the available features of the software and demonstrate its flexibility and user-friendliness. Finally, we showcase the usage and the performance of the software on several applications borrowed from different fields of engineering. These include a basic surrogate of a well-known analytical benchmark function; a hierarchical Kriging example applied to wind turbine aero-servo-elastic simulations and a more complex geotechnical example that requires a non-stationary, user-defined correlation function. The GP-module, like the rest of the scientific code that is shipped with UQLab, is open source (BSD license).
The role of the lexical analyzer
Specification of tokens
Finite state machines
From a regular expressions to an NFA
Convert NFA to DFA
Transforming grammars and regular expressions
Transforming automata to grammars
Language for specifying lexical analyzers
Data Structures_Linear data structures Linked Lists.pptxRushaliDeshmukh2
Concept of Linear Data Structures, Array as an ADT, Merging of two arrays, Storage
Representation, Linear list – singly linked list implementation, insertion, deletion and searching operations on linear list, circularly linked lists- Operations for Circularly linked lists, doubly linked
list implementation, insertion, deletion and searching operations, applications of linked lists.
The Fluke 925 is a vane anemometer, a handheld device designed to measure wind speed, air flow (volume), and temperature. It features a separate sensor and display unit, allowing greater flexibility and ease of use in tight or hard-to-reach spaces. The Fluke 925 is particularly suitable for HVAC (heating, ventilation, and air conditioning) maintenance in both residential and commercial buildings, offering a durable and cost-effective solution for routine airflow diagnostics.
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...Infopitaara
A Boiler Feed Pump (BFP) is a critical component in thermal power plants. It supplies high-pressure water (feedwater) to the boiler, ensuring continuous steam generation.
⚙️ How a Boiler Feed Pump Works
Water Collection:
Feedwater is collected from the deaerator or feedwater tank.
Pressurization:
The pump increases water pressure using multiple impellers/stages in centrifugal types.
Discharge to Boiler:
Pressurized water is then supplied to the boiler drum or economizer section, depending on design.
🌀 Types of Boiler Feed Pumps
Centrifugal Pumps (most common):
Multistage for higher pressure.
Used in large thermal power stations.
Positive Displacement Pumps (less common):
For smaller or specific applications.
Precise flow control but less efficient for large volumes.
🛠️ Key Operations and Controls
Recirculation Line: Protects the pump from overheating at low flow.
Throttle Valve: Regulates flow based on boiler demand.
Control System: Often automated via DCS/PLC for variable load conditions.
Sealing & Cooling Systems: Prevent leakage and maintain pump health.
⚠️ Common BFP Issues
Cavitation due to low NPSH (Net Positive Suction Head).
Seal or bearing failure.
Overheating from improper flow or recirculation.
2. WIRELESS SENSOR NETWORK
A Wireless Sensor Network (WSN) of spatially distributed
autonomous sensors to monitor physical or environmental
conditions, such as temperature, sound,
pressure,humidity,wind direction and speed,vibration
intensity,power-line voltage, etc. and to cooperatively pass
their data through the network to a main location. Provide a
bridge between the real physical and virtual worlds Allow the
ability to observe the previously unobservable at a fine
resolution over large spatio-temporal scales Applications in
Disaster,Surveillance,Agriculture,etc
3. Direct communication with BS
•Each sensor sends its data directly to the base
station.
•Possibly optimal if either the base station is
close to the nodes, or the energy required to
receive data is large.
4. Minimum energy multi-hop routing
•Nodes route data destined ultimately for the base station through
intermediate nodes.
•The intermediate nodes are chosen such that the transmit amplifier
energy is minimized.
•Rather than just one (high-energy) transmit of the data, each data
message must go through n (low-energy) transmits and n receives
•Shorten system lifetime as the nodes closest to the base station are
the ones to die out first since they are the ones most used as
“routers” for other sensors’ data.
5. Clustering
•Nodes are organized into clusters that
communicate with a local base station, and these
local base stations transmit the data to the global
base station, where it is accessed by the end-user.
•If the base station is an energy-constrained node,
it would die quickly, as it is being heavily utilized.
6. LEACH
•Low-Energy Adaptive Clustering Hierarchy
•Clustering-based protocol
•Select sensor nodes as CHs by rotation, so
the high energy dissipation in communicating
with the BS is distributed evenly to all sensor
nodes in the network.
8. Assumption
•The base station is fixed and located far from
the sensors.
•All nodes in the network are homogeneous
and energy constrained.
9. Key Features
•Localized coordination and control for
set-up and operation.
•Randomized rotation of the cluster “base
stations” or “cluster-heads” and the
corresponding clusters.
•Local compression to reduce global
communication.
10. LEACH
•The nodes organize themselves into local clusters, with one node
acting as the local base station or cluster-head.
•Cluster-head nodes broadcast their status to the other sensors in the
network.
•Each sensor node determines to which cluster it wants to belong by
choosing the cluster-head.
•Each cluster-head creates a schedule for the nodes in its cluster.
• Once the cluster-head has all the data from the nodes in its cluster,
the cluster-head node aggregates the data and then transmits the
compressed data to the base station.