0% found this document useful (0 votes)
85 views22 pages

Wireless Sensor Networks

This document discusses wireless sensor networks. It begins by defining sensor networks as highly distributed networks of small, lightweight wireless nodes deployed to monitor environments. Each node consists of sensor, processing, and communication subsystems with limited capabilities. Sensor networks are advantageous as they are robust, reliable, accurate, and fault-tolerant due to many redundant sensors. The document then discusses applications of sensor networks and compares them to ad hoc networks. It outlines issues in designing sensor networks and classifies sensor network protocols. Finally, it describes layered and clustered sensor network architectures and the LEACH clustering protocol.

Uploaded by

GtecEce
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views22 pages

Wireless Sensor Networks

This document discusses wireless sensor networks. It begins by defining sensor networks as highly distributed networks of small, lightweight wireless nodes deployed to monitor environments. Each node consists of sensor, processing, and communication subsystems with limited capabilities. Sensor networks are advantageous as they are robust, reliable, accurate, and fault-tolerant due to many redundant sensors. The document then discusses applications of sensor networks and compares them to ad hoc networks. It outlines issues in designing sensor networks and classifies sensor network protocols. Finally, it describes layered and clustered sensor network architectures and the LEACH clustering protocol.

Uploaded by

GtecEce
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 22

Wireless Sensor Networks

Introduction

Sensor networks are highly distributed networks of small, lightweight


wireless node, deployed in large numbers to monitor the
environment or system.

Each node of the sensor networks consist of three subsystem:


Sensor subsystem: senses the environment
Processing subsystem: performs local computations on the sensed data
Communication subsystem: responsible for message exchange with
neighboring sensor nodes

The features of sensor nodes


Limited sensing region, processing power, energy

The advantage of sensor networks

Robust : a large number of sensors


Reliable :
Accurate : sensor networks covering a wider region
Fault-tolerant : many nodes are sensing the same event

Two important operations in a sensor networks


Data dissemination : the propagation of data/queries throughout the
network
Data gathering : the collection of observed data from the individual
sensor nodes to a sink

The different types of sensors


Seismic, thermal, visual, infrared

Applications of Sensor Networks

Using in military
Battlefield surveillance and monitoring, guidance systems of intelligent
missiles, detection of attack by weapons of mass destruction such as
chemical, biological, or nuclear

Using in nature
Forest fire, flood detection, habitat exploration of animals

Using in health
Monitor the patients heart rate or blood pressure, and sent regularly to
alert the concerned doctor, provide patients a greater freedom of
movement

Using in home (smart home)


Sensor node can built into appliances at home, such as ovens,
refrigerators, and vacuum cleaners, which enable them to interact with
each other and be remote-controlled

Using in office building


Airflow and temperature of different parts of the building can be
automatically controlled

Using in warehouse
Improve their inventory control system by installing sensors on the
products to track their movement

Comparison with Ad Hoc Wireless Networks

Different from Ad Hoc wireless networks


The number of nodes in sensor network can be several orders of
magnitude large than the number of nodes in an ad hoc network.
Sensor nodes are more easy to failure and energy drain, and their
battery sources are usually not replaceable or rechargeable.
Sensor nodes may not have unique global identifiers (ID), so unique
addressing is not always feasible in sensor networks.
Sensor networks are data-centric, the queries in sensor networks are
addressed to nodes which have data satisfying some conditions. Ad Hoc
networks are address-centric, with queries addressed to particular
nodes specified by their unique address.
Data fusion/aggregation: the sensor nodes aggregate the local
information before relaying. The goals are reduce bandwidth
consumption, media access delay, and power consumption for
communication.

Issues and Challenges in


Designing a Sensor Network

Issues and Challenges


Sensor nodes are randomly deployed and hence do not fit into any
regular topology. Once deployed, they usually do not require any human
intervention. Hence, the setup and maintenance of the network should
be entirely autonomous.
Sensor networks are infrastructure-less. Therefore, all routing and
maintenance algorithms need to be distributed.
Energy problem
Hardware and software should be designed to conserve power
Sensor nodes should be able to synchronize with each other in a
completely distributed manner, so that TDMA schedules can be
imposed.
A sensor network should also be capable of adapting to changing
connectivity due to the failure of nodes, or new nodes powering up. The
routing protocols should be able to dynamically include or avoid sensor
nodes in their paths.

Real-time communication over sensor networks must be


supported through provision of guarantees on maximum delay,
minimum bandwidth, or other QoS parameters.
Provision must be made for secure communication over sensor
networks, especially for military applications which carry
sensitive data.

Classification of sensor network protocol

Sensor Network Architecture


The two basic kinds of sensor network architecture
Layered Architecture
Clustered Architecture

Layered Architecture

A layered architecture has a single powerful base station, and the


layers of sensor nodes around it correspond to the nodes that have
the same hop-count to the BS.

In the in-building scenario, the BS acts an access point to a wired


network, and small nodes form a wireless backbone to provide
wireless connectivity.

The advantage of a layered architecture is that each node is


involved only in short-distance, low-power transmissions to nodes of
the neighboring layers.

Layered architecture

Unified Network Protocol Framework (UNPF)

UNPF is a set of protocols for complete implementation of a layered


architecture for sensor networks

UNPF integrates three operations in its protocol structure:


Network initialization and maintenance
MAC protocol
Routing protocol

Network initialization and maintenance

The BS broadcasts its ID using a known CDMA code on the


common control channel.
All node which hear this broadcast then record the BS ID. They
send a beacon signal with their own IDs at their low default power
levels.
Those nodes which the BS can hear form layer one
BS broadcasts a control packet with all layer one node IDs. All
nodes send a beacon signal again.
The layer one nodes record the IDs which they hear (form layer two)
and inform the BS of the layer two nodes IDs.
Periodic beaconing updates neighbor information and change the
layer structure if nodes die out or move out of range.

MAC protocol

During the data transmission phase, the distributed TDMA receiver


oriented channel (DTROC) assignment MAC protocol is used.

Two steps of DTROC :


Channel allocation : Each node is assigned a reception channel by the
BS, and channel reuse is such that collisions are avoided.
Channel scheduling : The node schedules transmission slots for all its
neighbors and broadcasts the schedule. This enables collision-free
transmission and saves energy, as nodes can turn off when they are not
involved on a send/receive operation.

Routing protocol

Downlink from the BS is by direct broadcast on the control channel.


Uplink from the sensor nodes to BS is by multi-hop data forwarding.

The node to which a packet is to be forwarded is selected


considering the remaining energy of the nodes. This achieves a
higher network lifetime.

UNPF-R

Optimize the network performance by make the sensor nodes adaptively


vary their transmission range.
Because while a very small transmission range cause network
partitioning, a very large transmission range reduce the spatial reuse of
frequencies.
The optimal range (R) is determined by simulated annealing
Objective function :
N : the total number of sensors
n : the number of nodes in layer one

: the energy consumption per packet


d : the average packet delay

UNPF-R
If no packet is received by the BS from any sensor node for some
interval of time, the transmission range increase by
. Otherwise,
the transmission range is either decrease by
with probability
0.5 x ( n / N ), or increase by
with probability [ 1 0.5 x ( n / N ) ].
If
, then the transmission range R is adopt. Otherwise, R
is modified to R with probability

T : the temperature parameter

The advantage of the UNPF-R :


Minimize the energy x delay
Maximize the number of nodes which can connect to the BS

Clustered Architecture

A clustered architecture organizes the sensor nodes into clusters,


each governed by a cluster-head. The nodes in each cluster are
involved in message exchanges with their cluster-heads, and these
heads send message to a BS.

Clustered architecture is useful for sensor networks because of its


inherent suitability for data fusion. The data gathered by all member
of the cluster can be fused at the cluster-head, and only the
resulting information needs to be communicated to the BS.

The cluster formation and election of cluster-heads must be an


autonomous, distributed process.

Clustered architecture

Low-Energy Adaptive Clustering Hierarchy (LEACH)

LEACH is a clustering-based protocol that minimizes energy dissipation in


sensor networks. The operation of LEACH is spilt into two phases : setup
and steady.
Setup phase : each sensor node chooses a random number between 0 and 1. If
this is lower than the threshold for node n, T(n), the sensor node becomes a
cluster-head. The threshold T(n) is calculated as

P : the percentage of nodes which are cluster-heads


r : the current round
G : the set of nodes that has not been cluster-heads in the past 1/P rounds

After selection, the cluster-heads advertise their selection to all nodes. All nodes
choose their nearest cluster-head by signal strength (RSSI). The cluster-heads
then assign a TDMA schedule for their cluster members.

Steady phase : data transmission takes place based on the TDMA


schedule, and the cluster-heads perform data aggregation/fusion.
After a certain period of time in the steady phase, cluster-heads are
selected again through the setup phase.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy