Wireless sensor network and its applicationRoma Vyas
The document discusses wireless sensor networks (WSN) and their applications. It defines a WSN as a collection of sensor nodes that communicate wirelessly and self-organize after deployment. Sensor nodes collect data at regular intervals, convert it to electrical signals, and send it to a base station. The document outlines the components of sensor nodes and describes how WSNs are used for applications like forest fire detection, air/water pollution monitoring, landslide detection, and military surveillance. It also discusses the TinyOS operating system commonly used for WSNs and its features for efficiently utilizing energy in sensor nodes.
The document discusses the LEACH protocol and DECSA improvement for wireless sensor networks. It describes the two phases of LEACH - the set-up phase where cluster heads are chosen and the steady-state phase where data is transmitted. DECSA considers both distance and residual energy to select cluster heads, forming a three-level hierarchy. DECSA prolongs network lifetime by 31% and reduces energy consumption by 40% compared to the original LEACH protocol.
The document discusses fault tolerance techniques in wireless sensor networks (WSNs). It first reviews WSNs and types of failures that can occur, such as energy depletion, hardware failure, and communication link errors. It then covers approaches to fault detection including centralized (Sympathy, Secure Locations) and distributed (node self-detection, clustering). Fault recovery techniques like relay node placement, hop-by-hop TCP, and data aggregation are also summarized. The document aims to provide an overview of key aspects of fault tolerance in WSNs.
This document discusses wireless sensor network applications and energy consumption. It provides examples of WSN applications including disaster relief, environment monitoring, healthcare, and more. It then discusses various factors that influence energy consumption in sensor nodes, including operation states, microcontroller usage, radio transceivers, memory, and the relationship between computation and communication. Specific power consumption numbers are given for different components like radios, sensors, and microprocessors. The goals of optimization for WSNs are discussed as quality of service, energy efficiency, scalability, and robustness.
Sensor Networks Introduction and ArchitecturePeriyanayagiS
This document provides an overview of sensor networks and wireless sensor network architectures. It begins with an introduction to wireless sensor networks and their components. It then discusses the topics, challenges, and enabling technologies for WSNs. The document outlines the architecture of a sensor node and its goals. It provides examples of WSN applications and discusses sensor network deployment considerations. Finally, it addresses the design challenges, operational challenges, and required mechanisms for WSNs to meet their requirements.
This document discusses different types of sensor node hardware: augmented general-purpose computers, dedicated embedded sensor nodes, and system-on-chip devices. It notes that Berkley motes have gained popularity due to their small size, open source software, and commercial availability. The document also outlines programming challenges for sensor networks and different approaches like event-driven execution, node-level software platforms, and state-centric programming.
The document discusses clustering protocols in wireless sensor networks (WSNs). It begins by introducing WSNs and their applications. It then describes the main types of communication in WSNs: direct, multi-hop, and using clustering. Several issues with clustering in WSNs are identified, such as selecting cluster heads and handling node mobility. Popular clustering protocols like LEACH are examined, noting their advantages like data aggregation but also limitations such as unsuitability for large networks. Proposed solutions for improving LEACH involve considering energy levels and traffic load when selecting cluster heads.
This document describes the LEACH (Low-Energy Adaptive Clustering Hierarchy) protocol for wireless microsensor networks. LEACH utilizes randomized rotation of cluster heads to distribute the energy load evenly among the sensors and achieves longer system lifetime. It uses localized coordination and control for data transfers to reduce global network communication. LEACH allows adaptive clustering and uses data aggregation in the clusters to reduce global data transmission and improve system scalability and energy efficiency. Simulation results show that LEACH distributes energy load evenly and outperforms other routing protocols by achieving up to a factor of 4 times increase in system lifetime.
This document discusses various topics related to ad-hoc wireless networks including wireless network concepts, radio propagation mechanisms, characteristics of wireless channels, cellular networks, ad hoc networks, medium access control, routing protocols, multicasting, and transport layer protocols for ad hoc networks. It provides classifications and examples of different types of network architectures, protocols, and issues/challenges in ad hoc wireless networks.
This document provides an overview of call routing in GSM networks. It discusses key components like the Home Location Register (HLR) and Visitor Location Register (VLR) that store subscriber data. It then describes different call routing scenarios like mobile originated calls, mobile terminated calls, and roaming calls. It explains the signaling process and interactions between network elements like the mobile station, base station, MSC, HLR, and other switches. Finally, it briefly discusses the handover process to transfer calls between base stations when a mobile changes location.
The document discusses routing challenges and protocols in wireless sensor networks (WSNs). It covers flooding, hierarchical routing protocols like LEACH, data-centric protocols like directed diffusion, and negotiation-based protocols like SPIN. It also discusses resource constraints in WSNs like limited energy and the need for routing protocols to be energy-efficient. Unique characteristics of WSNs like dynamic topology and varying node densities present new challenges for routing protocol design.
The document summarizes a seminar presentation on wireless sensor networks. It discusses the architecture of WSNs, including sensor nodes, gateways, base stations, and networking topologies. It also covers the advantages and disadvantages of WSNs, their applications in fields like environmental monitoring and medical monitoring, and their future potential to bridge the physical and digital worlds.
This document provides an overview of TCP congestion control algorithms. It describes the basic additive increase/multiplicative decrease approach and key mechanisms like slow start, fast retransmit, and fast recovery. It also discusses algorithms for setting the retransmission timeout value and adaptations made in protocols like New Reno and Cubic.
HiperLAN was developed as a wireless local area network standard by ETSI to provide higher data rates than early 802.11 standards. HiperLAN Type 1 achieved data rates up to 2 Mbps for ad hoc networking. HiperLAN Type 2 was later developed to provide connection-oriented service up to 54 Mbps, with quality of service guarantees, security, and flexibility. It uses OFDM in the 5 GHz spectrum for robust transmission. While early products only achieved 25 Mbps, the standard provides a framework for higher speeds as technologies advance. HiperLAN is intended to complement wired networks by providing wireless connectivity in hotspot areas like offices, homes, and public places.
The document discusses wireless sensor networks and their applications. It describes wireless sensor networks as consisting of individual nodes that can interact with their environment by sensing or controlling physical parameters. It then discusses several applications of wireless sensor networks, including disaster relief, environment monitoring, intelligent buildings, facility management, machine maintenance, agriculture, healthcare, and logistics. Finally, it outlines some key requirements and mechanisms needed to implement wireless sensor networks, including communication, energy efficiency, self-configuration, collaboration, data-centric operation, and exploiting tradeoffs between different needs.
Spread spectrum communication uses wideband noise-like signals that are hard to detect, intercept, or jam. It spreads data over multiple frequencies. There are two main techniques: direct sequence spread spectrum multiplies a data signal by a pseudorandom code, and frequency hopping spread spectrum modulates a narrowband carrier that hops between frequencies. Spread spectrum provides benefits like resistance to interference and jamming, better signal quality, and inherent security. It finds applications in wireless networks, Bluetooth, and CDMA cellular systems.
The document discusses energy conservation techniques in wireless sensor networks. It begins with an introduction to wireless sensor networks and identifies power consumption as a major challenge. It then outlines the typical architecture of a wireless sensor node and examines the power breakdown across different components. The document proceeds to discuss basic approaches to energy conservation, including duty cycling, data-driven, and mobility-based techniques. It also mentions future work in integrating different approaches into a single solution and addresses questions.
This document provides an overview of wireless sensor networks. It discusses key definitions, advantages, applications and challenges. Sensor networks can provide energy and detection advantages over traditional systems. They enable applications in various domains including military, environmental monitoring, healthcare and home automation. The document also outlines enabling technologies and discusses important considerations like network architectures, hardware components, energy consumption and optimization goals.
Distributed Operation
Synchronization
Hidden Terminals
Exposed terminals
Throughput
Access delay
Fairness
Real-time Traffic support
Resource reservation
Ability to measure resource availability
Capability for power control
Adaptive rate control
Use of directional antennas
A personal area network (PAN) allows connection between devices like computers, phones, and PDAs. It can be wired using data cables or wireless. The main wireless PAN technology is the wireless personal area network (WPAN), which uses short-range wireless standards like Bluetooth to connect devices within about 10 meters. WPANs help interconnect devices for sharing data and internet access and are useful for both personal and specialized work like military operations.
The document summarizes contention-based MAC protocols for wireless sensor networks. It discusses the PAMAS protocol, which provides detailed overhearing avoidance and uses two channels - a data channel and control channel. Signaling packets like RTS, CTS, and busy tones are transmitted on the control channel. It also covers concepts like low duty cycles, wake up mechanisms, and protocols like S-MAC that coordinate node schedules to reduce idle listening. Quizzes are included to test understanding of discussed concepts.
This document discusses machine-to-machine (M2M) communication and its differences from the Internet of Things (IoT). It also describes software-defined networking (SDN) and network function virtualization (NFV) and their potential applications to IoT. M2M uses local area networks with proprietary protocols while IoT connects devices globally using IP. SDN separates the control plane from the data plane to simplify network management while NFV virtualizes network functions on commodity servers.
Wireless Sensor Network (WSN) consists of sensor nodes which interact with each other through physical parameters like sunlight, wind, vibration, humidity etc. Routing protocols provide an optimal data transmission route from sensor nodes to sink node to save energy of nodes. From Base Station (BS) Sensor node sends and receives data to or from wireless stations. Clustering mechanism is one of the popular routing mechanisms used in WSN for optimizing the problem in sensor nodes. There are two types of clustering schemes known as homogeneous schemes and heterogeneous schemes. In Homogeneous scheme initial energy is same for each node but in heterogeneous scheme initial energy is different for each node and also used to determine the efficiency of sensor networks. Enhanced Modified LEACH (EMODLEACH) is a reactive protocol which is implemented for homogeneous network model. We have implemented the concept of Efficient Cluster head Replacement scheme and Dual transmitting power level scheme of MODLEACH along with the concept of Efficient Intra Cluster transmission Scheme of TEEN in LEACH. We analyze the PEGASIS protocol and modified the exiting protocol called improved energy balanced routing protocol (IEBRP).This IEBRP is based on cluster formation, cluster routing and other aspects of LEACH protocol.
This document summarizes a seminar presentation on wireless sensor networks (WSNs). It begins with introductions to WSNs, describing them as networks of spatially distributed sensors that monitor conditions like temperature, sound or pollution. It then covers the architecture of WSNs, including special addressing requirements, the architecture of sensor nodes, and differences between WSNs and mobile ad hoc networks. The document discusses applications, design challenges, advantages and disadvantages of WSNs. It concludes by discussing the future potential of WSNs in applications like smart homes and offices.
Low Power Wireless Sensor Network Technologies and Standards for the Internet...Duncan Purves
Presentation on Low Power Wireless Sensor Network Technologies and Standards for the Internet of Things given at Institute of Physics, Sensors & their Applications XVIII Conference, 12 September 2016
This document provides an overview of wireless sensor networks and their applications. It discusses that a sensor network is comprised of sensing, computing, and communication elements that allow an administrator to instrument, observe and react to events in an environment. There are typically four basic components: sensors, an interconnecting network, a central point for information clustering, and computing resources to handle the data. Common applications of sensor networks include military surveillance, environmental monitoring, and infrastructure/facility monitoring.
This document discusses various topics related to ad-hoc wireless networks including wireless network concepts, radio propagation mechanisms, characteristics of wireless channels, cellular networks, ad hoc networks, medium access control, routing protocols, multicasting, and transport layer protocols for ad hoc networks. It provides classifications and examples of different types of network architectures, protocols, and issues/challenges in ad hoc wireless networks.
This document provides an overview of call routing in GSM networks. It discusses key components like the Home Location Register (HLR) and Visitor Location Register (VLR) that store subscriber data. It then describes different call routing scenarios like mobile originated calls, mobile terminated calls, and roaming calls. It explains the signaling process and interactions between network elements like the mobile station, base station, MSC, HLR, and other switches. Finally, it briefly discusses the handover process to transfer calls between base stations when a mobile changes location.
The document discusses routing challenges and protocols in wireless sensor networks (WSNs). It covers flooding, hierarchical routing protocols like LEACH, data-centric protocols like directed diffusion, and negotiation-based protocols like SPIN. It also discusses resource constraints in WSNs like limited energy and the need for routing protocols to be energy-efficient. Unique characteristics of WSNs like dynamic topology and varying node densities present new challenges for routing protocol design.
The document summarizes a seminar presentation on wireless sensor networks. It discusses the architecture of WSNs, including sensor nodes, gateways, base stations, and networking topologies. It also covers the advantages and disadvantages of WSNs, their applications in fields like environmental monitoring and medical monitoring, and their future potential to bridge the physical and digital worlds.
This document provides an overview of TCP congestion control algorithms. It describes the basic additive increase/multiplicative decrease approach and key mechanisms like slow start, fast retransmit, and fast recovery. It also discusses algorithms for setting the retransmission timeout value and adaptations made in protocols like New Reno and Cubic.
HiperLAN was developed as a wireless local area network standard by ETSI to provide higher data rates than early 802.11 standards. HiperLAN Type 1 achieved data rates up to 2 Mbps for ad hoc networking. HiperLAN Type 2 was later developed to provide connection-oriented service up to 54 Mbps, with quality of service guarantees, security, and flexibility. It uses OFDM in the 5 GHz spectrum for robust transmission. While early products only achieved 25 Mbps, the standard provides a framework for higher speeds as technologies advance. HiperLAN is intended to complement wired networks by providing wireless connectivity in hotspot areas like offices, homes, and public places.
The document discusses wireless sensor networks and their applications. It describes wireless sensor networks as consisting of individual nodes that can interact with their environment by sensing or controlling physical parameters. It then discusses several applications of wireless sensor networks, including disaster relief, environment monitoring, intelligent buildings, facility management, machine maintenance, agriculture, healthcare, and logistics. Finally, it outlines some key requirements and mechanisms needed to implement wireless sensor networks, including communication, energy efficiency, self-configuration, collaboration, data-centric operation, and exploiting tradeoffs between different needs.
Spread spectrum communication uses wideband noise-like signals that are hard to detect, intercept, or jam. It spreads data over multiple frequencies. There are two main techniques: direct sequence spread spectrum multiplies a data signal by a pseudorandom code, and frequency hopping spread spectrum modulates a narrowband carrier that hops between frequencies. Spread spectrum provides benefits like resistance to interference and jamming, better signal quality, and inherent security. It finds applications in wireless networks, Bluetooth, and CDMA cellular systems.
The document discusses energy conservation techniques in wireless sensor networks. It begins with an introduction to wireless sensor networks and identifies power consumption as a major challenge. It then outlines the typical architecture of a wireless sensor node and examines the power breakdown across different components. The document proceeds to discuss basic approaches to energy conservation, including duty cycling, data-driven, and mobility-based techniques. It also mentions future work in integrating different approaches into a single solution and addresses questions.
This document provides an overview of wireless sensor networks. It discusses key definitions, advantages, applications and challenges. Sensor networks can provide energy and detection advantages over traditional systems. They enable applications in various domains including military, environmental monitoring, healthcare and home automation. The document also outlines enabling technologies and discusses important considerations like network architectures, hardware components, energy consumption and optimization goals.
Distributed Operation
Synchronization
Hidden Terminals
Exposed terminals
Throughput
Access delay
Fairness
Real-time Traffic support
Resource reservation
Ability to measure resource availability
Capability for power control
Adaptive rate control
Use of directional antennas
A personal area network (PAN) allows connection between devices like computers, phones, and PDAs. It can be wired using data cables or wireless. The main wireless PAN technology is the wireless personal area network (WPAN), which uses short-range wireless standards like Bluetooth to connect devices within about 10 meters. WPANs help interconnect devices for sharing data and internet access and are useful for both personal and specialized work like military operations.
The document summarizes contention-based MAC protocols for wireless sensor networks. It discusses the PAMAS protocol, which provides detailed overhearing avoidance and uses two channels - a data channel and control channel. Signaling packets like RTS, CTS, and busy tones are transmitted on the control channel. It also covers concepts like low duty cycles, wake up mechanisms, and protocols like S-MAC that coordinate node schedules to reduce idle listening. Quizzes are included to test understanding of discussed concepts.
This document discusses machine-to-machine (M2M) communication and its differences from the Internet of Things (IoT). It also describes software-defined networking (SDN) and network function virtualization (NFV) and their potential applications to IoT. M2M uses local area networks with proprietary protocols while IoT connects devices globally using IP. SDN separates the control plane from the data plane to simplify network management while NFV virtualizes network functions on commodity servers.
Wireless Sensor Network (WSN) consists of sensor nodes which interact with each other through physical parameters like sunlight, wind, vibration, humidity etc. Routing protocols provide an optimal data transmission route from sensor nodes to sink node to save energy of nodes. From Base Station (BS) Sensor node sends and receives data to or from wireless stations. Clustering mechanism is one of the popular routing mechanisms used in WSN for optimizing the problem in sensor nodes. There are two types of clustering schemes known as homogeneous schemes and heterogeneous schemes. In Homogeneous scheme initial energy is same for each node but in heterogeneous scheme initial energy is different for each node and also used to determine the efficiency of sensor networks. Enhanced Modified LEACH (EMODLEACH) is a reactive protocol which is implemented for homogeneous network model. We have implemented the concept of Efficient Cluster head Replacement scheme and Dual transmitting power level scheme of MODLEACH along with the concept of Efficient Intra Cluster transmission Scheme of TEEN in LEACH. We analyze the PEGASIS protocol and modified the exiting protocol called improved energy balanced routing protocol (IEBRP).This IEBRP is based on cluster formation, cluster routing and other aspects of LEACH protocol.
This document summarizes a seminar presentation on wireless sensor networks (WSNs). It begins with introductions to WSNs, describing them as networks of spatially distributed sensors that monitor conditions like temperature, sound or pollution. It then covers the architecture of WSNs, including special addressing requirements, the architecture of sensor nodes, and differences between WSNs and mobile ad hoc networks. The document discusses applications, design challenges, advantages and disadvantages of WSNs. It concludes by discussing the future potential of WSNs in applications like smart homes and offices.
Low Power Wireless Sensor Network Technologies and Standards for the Internet...Duncan Purves
Presentation on Low Power Wireless Sensor Network Technologies and Standards for the Internet of Things given at Institute of Physics, Sensors & their Applications XVIII Conference, 12 September 2016
This document provides an overview of wireless sensor networks and their applications. It discusses that a sensor network is comprised of sensing, computing, and communication elements that allow an administrator to instrument, observe and react to events in an environment. There are typically four basic components: sensors, an interconnecting network, a central point for information clustering, and computing resources to handle the data. Common applications of sensor networks include military surveillance, environmental monitoring, and infrastructure/facility monitoring.
The document discusses plans to create an open and decentralized Internet of Things (IoT) network in Athens, Greece called Athens LoRaWAN. It will allow users to own and operate their own IoT infrastructure using low-cost long-range wireless technology. The network aims to be open source, treat all data equally through net neutrality, and keep users' data private through end-to-end encryption. It hopes to support various IoT applications related to environmental monitoring, agriculture, and asset tracking. Milestones include deploying initial gateways and sensors, expanding the community, and eventually connecting other cities in Greece to the network.
The document discusses the LoRa Alliance, an open non-profit association working to enable a global Internet of Things. Key points include:
- The Alliance's vision is for the IoT era to be open and available now using their LoRaWAN open standard protocol
- LoRaWAN is now open and commercially available, with over 155 member companies and 9 announced IoT deployments covering millions of people
- The Alliance is working to address priorities like certification, roaming and geolocation to further the LoRaWAN ecosystem and ensure interoperability.
- Various member companies are showcasing LoRaWAN-enabled IoT products and deployments in areas like smart cities, utilities
1) The document discusses using an Internet of Things (IoT) network based on Long Range (LoRa) wireless technology to create a grassroots hyperlocal weather forecast system.
2) It describes setting up low-cost DIY LoRa gateways and weather sensor nodes to collect data on actual weather conditions and transmit them over the network.
3) This network could enable advanced community-level weather analytics and services by providing "big data" from localized sensor measurements, helping cities like Athens work towards becoming open smart cities.
SODAQ develops environmental Internet of Things solutions powered by solar energy. Their mission is to deploy sustainable sensor networks to monitor critical environments. They create scalable solutions using sensors they developed in-house to measure factors like temperature, humidity, and water quality. SODAQ also develops microcontroller boards and provides training to help companies integrate low-power wide area network technology like LoRa into their IoT applications.
Ignes lo ra - thierry lestable - 29102015 - vfinalThierry Lestable
The document discusses the LoRa Alliance and its mission to enable a global low power wide area network for the Internet of Things. Some key points:
- The LoRa Alliance was founded in 2015 and has over 130 members across 27 countries working to establish an open standard for LPWAN connectivity.
- The Alliance's mission is to create an open specification and certification process for secure, interoperable IoT connectivity through a low power wide area network.
- LoRaWAN is the Alliance's open standard protocol, with the first version (R1.0) published. Eight commercial networks have been deployed and 56 operator trials are ongoing using LoRaWAN.
- The LoRaWAN
The document presents a graduate project on efficient data aggregation from polling points in wireless sensor networks. The proposed system called Mobi-Cluster aims to minimize overall network overhead and energy expenditure associated with multi-hop data retrieval while ensuring balanced energy consumption and prolonged network lifetime. This is achieved through building cluster structures consisting of member nodes that route data to assigned cluster heads, and selecting appropriate polling points to act as intermediaries between clusters and a mobile collector. The key stages of the Mobi-Cluster protocol are described as cluster head selection, polling point selection, cluster head attachment to polling points, data aggregation and forwarding to polling points, and communication between polling points and the mobile collector.
This document summarizes key aspects of wireless sensor networks (WSNs) including common threats, operational paradigms, and key distribution techniques. It discusses the main operational paradigms of WSNs: simple collection and transmittal, forwarding, receive and process commands, self-organization, and data aggregation. For each, it outlines vulnerabilities and potential solutions. It also summarizes three common key distribution schemes: using a single network-wide key, asymmetric cryptography, and pairwise keys. For each it discusses properties and drawbacks regarding resilience, scalability, and memory requirements.
1) Wireless sensor networks consist of hundreds or thousands of low-cost, low-power sensor nodes deployed to monitor environments. They require security to protect data confidentiality, integrity, and availability given their resource constraints and vulnerability to physical attacks.
2) Standard approaches to achieve security include encrypting data for confidentiality, using protocols like uTESLA for integrity and time synchronization for freshness. However, sensor nodes face obstacles like limited memory, energy constraints, and unreliable communication.
3) Wireless sensor networks are susceptible to various network layer attacks like spoofing, selective forwarding, sinkhole attacks, Sybil attacks, and wormholes. Countermeasures include link layer security, geographic routing, multi-path routing, and authentication.
This document discusses security challenges in wireless sensor networks. It covers several topics: why security is needed in WSNs given their mission-critical applications; why security is more complicated in WSNs due to resource constraints of sensor nodes; common security requirements like confidentiality, integrity, and availability; guiding principles for securing WSNs like decentralized management and adaptive security; common attacks against WSNs at different layers of the protocol stack; and open research issues regarding cryptography, key management, secure data aggregation, and other high-level security mechanisms for WSNs.
This document discusses security issues and proposed solutions for wireless sensor networks. It begins by defining wireless sensor networks and describing common applications. It then outlines several security threats like denial of service attacks, wormhole attacks, sybil attacks, and traffic analysis attacks. It also discusses proposed cryptography and authentication schemes to provide data confidentiality, integrity, and freshness. Finally, it advocates for a holistic security approach that considers all network layers rather than focusing on single layers.
The document discusses wireless sensor networks and describes their key characteristics. It notes that wireless sensor networks consist of low-power smart sensor nodes distributed over a large field to enable wireless sensing and data networking. The sensor nodes contain sensors, processors, memory, and radios. Wireless sensor networks can be either unstructured with dense node distribution or structured with few scattered nodes.
Understand LPWA tetchnologies (Sigfox and LoRa)Robert V
What are LPWA networks and what are their advantages ?
What are their characateristics in comparison with other telecom technologies ?
What are the differences between LPWA technologies, especially Sigfox and LoRa ?
LPWAN Technologies for Internet of Things (IoT) and M2M ScenariosPeter R. Egli
Rapid technological advances in the past made possible the miniaturization of network devices to meet the cost and power consumption requirements in IoT and M2M scenarios. What is missing in this picture is a radio technology with both long range capability and a very low cost footprint. Existing radio technologies such as 3G/4G or Short Range Radio do not aptly meet the requirements of IoT scenarios because they are either too expensive or are not able to provide the required range. Other wireless technologies are geared towards high bandwidth which is in most cases not a requirement for IoT.
Emerging LPWAN technologies such as ETSI LTN or LoRAWAN are poised for filling the gap by providing long range (up to 40km) and low power connectivity. These technologies allow low cost radio devices and operation thus enabling scaling up IoT applications.
Low Power Wireless Technologies and Standards for the Internet of ThingsDuncan Purves
Presentation on low power wireless technologies and standards for the Internet of Things (iOT), given at the BCS Communications Management Association AGM on 5th April 2016
This document discusses wireless sensor networks. It outlines their applications such as environmental monitoring, health care, and military uses. It also examines factors that influence sensor network design like fault tolerance, scalability, production costs, and power consumption. The communication architecture of sensor networks is presented, including the application, transport, network, data link, and physical layers. Sensor networks have the potential to be widely used in many applications due to their flexibility and fault tolerance.
WSN security faces many challenges due to limited sensor resources and operating in hostile environments. It requires high security levels to protect sensitive data while maintaining energy efficiency. However, current research has not fully addressed the conflict between security and limited resources. WSNs are vulnerable to various attacks like jamming, eavesdropping, and false routing. Providing security introduces additional processing and power demands on sensors. Many open research problems remain in developing scalable and dynamic security solutions for wireless sensor networks.
UNIT IV WIRELESS SENSOR NETWORKS (WSNS) AND MAC PROTOCOLS 9 Single node architecture: hardware and software components of a sensor node - WSN Network architecture: typical network architectures-data relaying and aggregation strategies -MAC layer protocols: self-organizing, Hybrid TDMA/FDMA and CSMA based MAC- IEEE 802.15.4.
This document discusses wireless sensor networks and MAC protocols. It provides information on single node architecture including hardware and software components of sensor nodes. It also discusses typical WSN network architectures and data aggregation strategies. Finally, it describes various MAC layer protocols including self-organizing, hybrid TDMA/FDMA, and CSMA based protocols like IEEE 802.15.4.
This document discusses wireless sensor networks and their architecture. It describes layered and clustered architectures for organizing sensor networks. Layered architectures arrange sensors in layers around a central base station, allowing for short-range transmissions. Clustered architectures organize sensors into clusters headed by cluster heads that can aggregate and transmit data to the base station. The document also introduces protocols like UNPF that implement layered architectures and LEACH that uses clustering to minimize energy use in sensor networks.
Introduction to wireless sensor networksMudasirRiaz3
Introduction to Wireless Sensor Networks
Data Dissemination and Routing Protocols
Data Gathering
Locationing and Coverage
Testbeds/Applications
Security in Wireless Sensor Networks
Summary & Discussion
This document provides an overview of wireless sensor networks (WSNs). It discusses the background and components of sensor nodes, including sensors, processors, radio transceivers, and power sources. The document also covers sensor network architectures like clustered and layered networks. It describes data dissemination in WSNs using data diffusion models and explores concepts like interests, gradients, and reinforcement. Finally, it introduces the problem of gathering sensor data efficiently to prolong network lifetime and discusses optimizing the energy-delay metric.
Survey on energy efficiency in wireless sensor network using mac protocol wit...Editor Jacotech
Dynamic feature evaluation and concept evaluation is major challenging task in the field of data classification. The continuity of data induced a new feature during classification process, but the classification process is predefined task for assigning data into class. Data comes into multiple feature sub-set format into infinite length. The infinite length not decided the how many class are assigned. Support vector machine is well recognized method for data classification. For the process of support vector machine evaluation of new feature during classification is major problem. The problem of feature evaluation decreases the performance of Support Vector Machine (SVM). For the improvement of support vector machine, particle of swarm optimization technique is used. Particle of swarm optimization controls the dynamic feature evaluation process and decreases the possibility of confusion in selection of class and increase the classification ratio of support vector machine. Particle of swarm optimization work in two phases one used as dynamic population selection and another are used for optimization process of evolved new feature.
This document summarizes and compares three clustering algorithms for wireless sensor networks: LEACH, HEED, and PEGASIS. LEACH is the first protocol to use hierarchical routing to increase network lifetime. It forms clusters with local heads that collect data from members and transmit to the base station. HEED uses residual energy and network topology features to select distributed cluster heads. PEGASIS forms chains between sensors so each transmits to a close neighbor, avoiding hotspots. The document analyzes these algorithms and compares their effects on network lifetime.
This document provides an overview of wireless sensor networks including their components, characteristics, applications, data dissemination schemes, media access control schemes, and architectures. Wireless sensor networks consist of sensor nodes that collect and transmit environmental data via radio frequencies to base stations. They are constrained by limited energy, computation, and communication abilities. Common applications include environment monitoring and medical care. The document discusses clustering, LEACH protocol, TDMA, and address-free architectures used in wireless sensor networks.
This document provides an overview of wireless sensor networks including their components, characteristics, applications, and key technical considerations. Wireless sensor networks consist of sensor nodes that collect and transmit environmental data via radio frequencies to base stations. They have constraints of limited energy, computation, and communication capabilities. Common applications include environmental monitoring and medical care. The document discusses data dissemination schemes, media access control protocols, distributed processing algorithms, and network architectures that aim to maximize sensor network lifetimes and reliability.
Wireless Sensor Networks lecture presented in the Fall of 2005. Covering the following: data-dissemination schemes, media access control schemes, distributed algorithms for collaborative processing, and architecture for a wireless sensor network.
This document provides an overview of wireless sensor networks including their components, characteristics, applications, data dissemination schemes, media access control schemes, and architectures. Wireless sensor networks consist of sensor nodes that collect and transmit environmental data via radio frequencies to base stations. They are constrained by limited energy, computation, and communication abilities. Common applications include environment monitoring and medical care. The document discusses clustering, LEACH protocol, TDMA, and address-free architectures used in wireless sensor networks.
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHijsrd.com
In heterogeneous sensor networks, certain nodes become cluster heads which aggregate the data of their cluster nodes and transfer it to the sink. An Improved Energy leach protocol for cluster head selection in a hierarchically clustered heterogeneous network to reorganize the network topology efficiently is proposed in this research work. The proposed algorithm will use thresholding to improve the cluster head selection. The presented algorithm considers the sensor nodes in wireless network and randomly distributed in the heterogeneous network. The coordinates of the sink and the dimensions of the sensor field are known in prior.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Energy efficient protocol with static clustering (eepsc) comparing with low e...Alexander Decker
This document summarizes a new routing protocol called Energy-Efficient Protocol with Static Clustering (EEPSC) that is proposed to improve energy efficiency in wireless sensor networks compared to the LEACH protocol. EEPSC partitions the network into static clusters during an initial setup phase to eliminate the overhead of dynamic clustering. It then selects high-energy sensor nodes within each cluster to serve as cluster heads and temporary cluster heads to distribute the energy load and extend the lifetime of the network. Simulation results showed that EEPSC outperforms LEACH in terms of network lifetime and power consumption.
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...Journal For Research
In most of today’s application the wireless sensor network (WSN) play an important role.WSN is an autonomous system to monitor physical and environmental conditions. It can sense and compute the information or data or message that transmitted through it. Important design issue of the Wireless sensor networks energy consumption and lifetime of the network. The design of different routing protocol is another important design issue in WSN. There are mainly broad types of routing protocols in wireless sensor networks. This paper mainly deals with different types of cluster based routing protocols in WSN. Clustering algorithms are mainly defined to reduce the energy consumption and improves the life time of the network.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document analyzes and compares the performance of two routing protocols for wireless sensor networks: LEACH and SPIN. LEACH is a hierarchical clustering protocol that randomly selects cluster heads to aggregate and transmit data to the base station. SPIN is a data-centric protocol that uses data negotiation to disseminate data and avoid redundant transmissions. The document simulates both protocols and finds that SPIN has lower overall energy consumption than LEACH due to its negotiation-based approach. Key differences between the protocols include LEACH using clusters and SPIN being flat, with SPIN allowing for possible node mobility and multipath transmission.
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
In the wireless sensor networks (WSNs), the sensor nodes (called motes) are usually scattered in a sensor field an area in which the sensor nodes are deployed. These motes are small in size and have limited processing power, memory and battery life. In WSNs, conservation of energy, which is directly related to network life time, is considered relatively more important souse of energy efficient routing algorithms is one of the ways to reduce the energy conservation. In general, routing algorithms in WSNs can be divided into flat, hierarchical and location based routing. There are two reasons behind the hierarchical routing Low Energy Adaptive Clustering Hierarchy (LEACH) protocol be in explored. One, the sensor networks are dense and a lot of redundancy is involved in communication. Second, in order to increase the scalability of the sensor network keeping in mind the security aspects of communication. Cluster based routing holds great promise for many to one and one to many communication paradigms that are pre valentines or networks.
Energy efficient mac protocols for wireless sensor networkijcsa
Wireless sensor network are the collection of individual nodes which are able to interact with physical
environment statically or dynamically by sensing or controlling physical parameter. Wireless sensor network
become a leading solution in many important applications such as intrusion detection, target tracking,
industrial automation etc. A major problem with WSN is to determining a most efficient protocol for
conserving energy of power source. The design of an energy- efficient Medium Access efficient Control
(MAC) protocol is one of the major issues in wireless sensor networks (WSN). In this paper we study some
characteristics of WSN that are important for the design of MAC layer protocols and give a brief introduction
of some newly come MAC protocols with reference to energy efficiency for WSN. In accordance with channel
access policies, MAC protocols are classified into four types, which are cross layer protocols, TDMA-based,
contention-based and hybrid, these are discussed in this paper.
Modified leach protocol in wireless sensor network a surveyIAEME Publication
This document summarizes a survey of modified LEACH protocols in wireless sensor networks. It begins with an introduction to wireless sensor networks and discusses how the limited battery life of sensor nodes makes energy efficiency critical. It then provides an overview of the original LEACH protocol and its operation. The main part of the document surveys various modifications made to LEACH to improve its energy efficiency, such as using multi-hop routing, selecting cluster heads based on remaining energy levels, and implementing unequal clustering where clusters closer to the base station are smaller. It concludes that incorporating improvements to cluster head selection and multi-hop techniques into LEACH can significantly increase network lifetime by reducing energy consumption.
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfMohamedAbdelkader115
Glad to be one of only 14 members inside Kuwait to hold this credential.
Please check the members inside kuwait from this link:
https://www.rics.org/networking/find-a-member.html?firstname=&lastname=&town=&country=Kuwait&member_grade=(AssocRICS)&expert_witness=&accrediation=&page=1
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxRishavKumar530754
LiDAR-Based System for Autonomous Cars
Autonomous Driving with LiDAR Tech
LiDAR Integration in Self-Driving Cars
Self-Driving Vehicles Using LiDAR
LiDAR Mapping for Driverless Cars
☁️ GDG Cloud Munich: Build With AI Workshop - Introduction to Vertex AI! ☁️
Join us for an exciting #BuildWithAi workshop on the 28th of April, 2025 at the Google Office in Munich!
Dive into the world of AI with our "Introduction to Vertex AI" session, presented by Google Cloud expert Randy Gupta.
its all about Artificial Intelligence(Ai) and Machine Learning and not on advanced level you can study before the exam or can check for some information on Ai for project
International Journal of Distributed and Parallel systems (IJDPS)samueljackson3773
The growth of Internet and other web technologies requires the development of new
algorithms and architectures for parallel and distributed computing. International journal of
Distributed and parallel systems is a bimonthly open access peer-reviewed journal aims to
publish high quality scientific papers arising from original research and development from
the international community in the areas of parallel and distributed systems. IJDPS serves
as a platform for engineers and researchers to present new ideas and system technology,
with an interactive and friendly, but strongly professional atmosphere.
We introduce the Gaussian process (GP) modeling module developed within the UQLab software framework. The novel design of the GP-module aims at providing seamless integration of GP modeling into any uncertainty quantification workflow, as well as a standalone surrogate modeling tool. We first briefly present the key mathematical tools on the basis of GP modeling (a.k.a. Kriging), as well as the associated theoretical and computational framework. We then provide an extensive overview of the available features of the software and demonstrate its flexibility and user-friendliness. Finally, we showcase the usage and the performance of the software on several applications borrowed from different fields of engineering. These include a basic surrogate of a well-known analytical benchmark function; a hierarchical Kriging example applied to wind turbine aero-servo-elastic simulations and a more complex geotechnical example that requires a non-stationary, user-defined correlation function. The GP-module, like the rest of the scientific code that is shipped with UQLab, is open source (BSD license).
This paper proposes a shoulder inverse kinematics (IK) technique. Shoulder complex is comprised of the sternum, clavicle, ribs, scapula, humerus, and four joints.
In tube drawing process, a tube is pulled out through a die and a plug to reduce its diameter and thickness as per the requirement. Dimensional accuracy of cold drawn tubes plays a vital role in the further quality of end products and controlling rejection in manufacturing processes of these end products. Springback phenomenon is the elastic strain recovery after removal of forming loads, causes geometrical inaccuracies in drawn tubes. Further, this leads to difficulty in achieving close dimensional tolerances. In the present work springback of EN 8 D tube material is studied for various cold drawing parameters. The process parameters in this work include die semi-angle, land width and drawing speed. The experimentation is done using Taguchi’s L36 orthogonal array, and then optimization is done in data analysis software Minitab 17. The results of ANOVA shows that 15 degrees die semi-angle,5 mm land width and 6 m/min drawing speed yields least springback. Furthermore, optimization algorithms named Particle Swarm Optimization (PSO), Simulated Annealing (SA) and Genetic Algorithm (GA) are applied which shows that 15 degrees die semi-angle, 10 mm land width and 8 m/min drawing speed results in minimal springback with almost 10.5 % improvement. Finally, the results of experimentation are validated with Finite Element Analysis technique using ANSYS.
2. CONTENTS
Introduction
Definition
Example of WSN
Types of WSN
Characteristics of a
WSN
Power saving protocols
for WSN
Applications
Challenges
Advantages
Disadvantages
Future Scope
Conclusion 2
3. INTRODUCTION
3
Low power wireless sensor Networks are
networks that consists of sensors which are
distributed in an ad hoc manner.
These sensors work with each other to sense
some physical phenomenon and then the
information gathered is processed to get relevant
results.
Low power Wireless sensor networks consists of
protocols and algorithms with self-organizing
capabilities.
4. CONTINUED.........
Sensor networks are highly distributed networks of small,
lightweight wireless node, deployed in large numbers to
monitor the environment or system.
Each node of the sensor networks consist of three subsystem:
Sensor subsystem: senses the environment
Processing subsystem: performs local computations on the
sensed data
Communication subsystem: responsible for message exchange
with neighboring sensor nodes
The features of sensor nodes
Limited sensing region, processing power, energy
4
5. 5
DEFINITION
Low power Wireless Sensor Networks :
Highly distributed networks of small, lightweight wireless
nodes,
Deployed in large numbers,
Monitors the environment or system by measuring phys
parameters such as temperature, pressure, humidity.
Node:
sensing + processing + communication
7. TYPES OF WIRELESS SENSOR NETWORKS
7
Dense collection of nodes
Ad-hoc
deployment
Difficulty in network
maintenance
Few and scarcely
distributed nodes
Pre-planned deployment
Lower network
maintenance
Unstructured WSN Structured WSN
8. CHARACTERISTICS OF A LPWSN
1. Self – Organization
2. Concurrency processing
3. Low cost
4. Restricted energy resources
5. Tiny
6. Small radio range 8
9. 9
POWER SAVING PROTOCOLS
THERE ARE SOME PROTOCOLS WHICH IS USED
FOR POWER SAVING……..
Unified Network Protocol Framework (UNPF)
Low-Energy Adaptive Clustering Hierarchy
(LEACH)
MAC PROTOCOL
NETWORK LAYER
BATTERY MODEL
and some other…
10. 10
LAYERED ARCHITECTURE
A single powerful base station
(BS)
Layers of sensor nodes around
BS
Layer i: All nodes i-hop away
from BS
Applications:
In-building: BS is an access point
Military
Short-distance, low power tt tx
11. 11
UNIFIED NETWORK PROTOCOL
FRAMEWORK (UNPF)
A layered architecture
A set of protocols
Integrates three operations:
Network Initialization & Maintenance Protocol
MAC Protocol
Routing Protocol
12. 12
UNIFIED NETWORK PROTOCOL
FRAMEWORK (UNPF)
Network Initialization & Maintenance Protocol:
BS broadcasts its ID using CDMA common control channel
(BS reaches all nodes in one hop)
Nodes record BS ID & send beacon signal with their own
IDs at their low default power levels
All nodes the BS can hear are at 1-hop distance
The BS broadcasts a control packet with all layer one node
IDs
All nodes send a beacon signal again
The layer one nodes record the IDs they hear-layer 2
The layer one nodes inform the BS of the layer 2
The BS broadcasts the layer2 nodes IDs,…
To maintain: periodic beaconing updates are required
13. 13
POWER SAVING MODE
Turning the transceiver off may not always be
efficient. Operation in a power-saving mode is
energy-efficient only if the time spent in that mode
is greater than a certain threshold
MULTIPLE HOPS
Using several short hops may be more energy
efficient than using one large hop.
14. 14
CLUSTERED ARCHITECTURE
A clustered architecture organizes the sensor nodes into clusters, each
governed by a cluster-head. The nodes in each cluster are involved in
message exchanges with their cluster-heads, and these heads send message
to a BS.
Clustered architecture is useful for sensor networks because of its inherent
suitability for data fusion. The data gathered by all member of the cluster
can be fused at the cluster-head, and only the resulting information needs to
be communicated to the BS.
The cluster formation and election of cluster-heads must be an autonomous,
distributed process.
16. 16
LOW-ENERGY ADAPTIVE CLUSTERING HIERARCHY
(LEACH)
Self-organizing and adaptive clustering protocol
Evenly distributes the energy expenditure among
the sensors
Performs data aggregation where cluster heads
act as aggregation points
Two main phases:
Setup phase: organizing the clusters
Steady-state phase: deals with the actual data
transfers to the BS
17. 17
Setup phase:
Each sensor chooses a random number m between 0 and 1
If m < T(n) for node n, the node becomes a cluster-head where
P : the desired percentage of cluster heads
r : the round number
G : the set of nodes that have not been cluster heads during the last
1 / P rounds
A cluster head advertises its neighbors using a CSMA MAC.
Surrounding nodes decide which cluster to join based on the signal
strength of these messages
Cluster heads assign a TDMA schedule for their members
1 [ * mod(1/ )]( )
0 ,
P
if n G
P r PT n
otherwise
18. 18
Steady-state phase:
All source nodes send their data to their cluster heads
Cluster heads perform data aggregation/fusion through
local transmission
Cluster heads send them back to the BS using a single
direct transmission
After a certain period of time, cluster heads are selected
again through the set-up phase
19. 19
LOW-ENERGY ADAPTIVE CLUSTERING
HIERARCHY (LEACH)
Merits:
Accounting for adaptive clusters and rotating cluster
heads
Opportunity to implement any aggregation function at
the cluster heads
Demerits:
Highly dynamic environments
Continuous updates
Mobility
20. 20
MAC PROTOCOL
During the data transmission phase, the distributed TDMA
receiver oriented channel (DTROC) assignment MAC protocol
is used.
Two steps of DTROC :
Channel allocation : Each node is assigned a reception channel
by the BS, and channel reuse is such that collisions are avoided.
Channel scheduling : The node schedules transmission slots for
all its neighbors and broadcasts the schedule. This enables
collision-free transmission and saves energy, as nodes can turn
off when they are not involved on a send/receive operation.
21. THERE ARE THREE TYPES OF MAC
PROTOCOLS
Fixed-allocation
Demand-based
Contention-based
21
22. 22
Fixed-allocation MAC protocol
Share the common medium through a predetermined assignment.
It is suitable for sensor network that continuously monitor and
generate deterministic data traffic
Provide a bounded delay for each node
However, in the case of bursty traffic, where the channel
requirements of each node may vary over time, it may lead to
inefficient usage of the channel.
23. 23
Demand-based MAC protocol
Used in such cases, where the channel is allocated according to
the demand of the node
Variable rate traffic can be efficiently transmitted
Require the additional overhead of a reservation process
Contention-based MAC protocol
Random-access-based contention for the channel when packets
need to be transmitted
Suitable for bursty traffic
Collisions and no delay guarantees, are not suitable for delay-
sensitive or real-time traffic
24. 24
HYBRID TDMA/FDMA
A pure TDMA scheme minimize the time for which a node has to be
kept on, but the associated time synchronization cost are very high.
A pure FDMA scheme allots the minimum required bandwidth for
each connection
If the transmitter consumes more power, a TDMA scheme is favored,
since it can be switch off in idle slots to save power.
If the receiver consumes greater power, a FDMA scheme is favored,
because the receiver need not expend power for time
synchronization.
26. APPLICATIONS OF LPWSN
Area monitoring
Health care monitoring
Air pollution monitoring
Forest fire detection
Landslide detection
Water quality monitoring
Natural disaster prevention
Industrial monitoring
26
27. 27
Facility management
Intrusion detection into industrial sites
Control of leakages in chemical plants, …
Machine surveillance and preventive maintenance
Embed sensing/control functions into places no cable
has gone before
E.g., tire pressure monitoring
Precision agriculture
Bring out fertilizer/pesticides/irrigation only where
needed
Medicine and health care
Post-operative or intensive care
Long-term surveillance of chronically ill patients or the
elderly
29. ADVANTAGES OF A WSN
Avoids a lot of wiring
Can accommodate new devices at any time
Flexible to go through physical partitions
It can be accessed through a centralized monitor
Infrastructure
29
30. DISADVANTAGES OF WSN
Easy for hackers to hack a network
Comparatively low speed of communication
Gets distracted by various elements
Costly at large
Life of nodes
Energy life 30
31. FUTURE SCOPE
More research work needs to be done in future.
Needs to be implemented in a wireless sensor network
with mobile nodes.
The effects of very large node densities need to be
investigated.
The feasibility of using the clustering technique and data
aggregation needs to be tested in the same wireless
sensor network. 31
33. 33
FUTURE OF WSN
SMART HOME / SMART OFFICE
Sensors controlling
appliances and
electrical devices in the
house.
Better lighting and
heating in office
buildings.
The Pentagon building
has used sensors
extensively.
34. FUTURE SCOPE
34
Intelligent transport,
industry and society,
smart utilities
Connected
Consumer
Electronics
Development of a TDMA/CSMA hybrid MAC
TinyOS currently has a CSMA MAC
Hope to improve throughput by employing TDMA
Time is divided into transmission periods and contention perio
Nodes will contend with each other to join “the transmission
group” during the contention period.
Nodes in the transmission group will be allocated a time-slot in
the transmission period.
Development of data storage engine optimized for fast
retrieval
35. CONCLUSION
This presentation shows all the techniques that are used
for wireless sensor network for low power consumption ,
for example MAC protocol, LEACH, Network layer, ect.
Most of the research on energy efficient controlled
access protocol has come at a cost of control
packets overhead. By investigating this research
area further, an enhanced energy efficiency
protocol may be developed that can revolutionise
WSN’s power consumption.
There are some another protocols which can be used for
less energy consumption like CDMA,FDMA,TDMA.
35