Unit 4 -Sensor Networks
Unit 4 -Sensor Networks
MOBILE NETWORKS
213INT3311
UNIT 4
SENSOR NETWORKS
Dr. S.P. BALAKANNAN,
IT, KALASALINGAM UNIVERSITY
4.1 Wireless Sensor Networks- Introduction
2
Architecture
4.1 Wireless Sensor Networks- Introduction
5
• Sensor
A transducer
converts physical phenomenon e.g. heat, light, motion, vibration,
and sound into electrical signals
• Sensor node
basic unit in sensor network
contains on-board sensors, processor, memory, transceiver, and
power supply
• Sensor network
consists of a large number of sensor nodes
nodes deployed either inside or very close to the sensed
phenomenon
4.1 Wireless Sensor Networks- Introduction
6
Transceiver
Sensor 1
Power Source
Micro-Controller ADC
Sensor 2
External Memory
4.1 Wireless Sensor Networks- Introduction
7
WSN MANET
Similarity Wireless Multi-hop networking
Characteristics
Power consumption constraints for nodes using batteries or
energy harvesting
Ability to cope with node failures (resilience)
Mobility of nodes
Heterogeneity of nodes
Scalability to large scale of deployment
Ability to withstand harsh environmental conditions
Ease of use
Cross-layer design
4.2 DARPA Efforts
9
Contention-based MAC
Contention-based MAC protocol is also known as a random access
MAC protocol.
It allows all nodes to transmit data on the shared medium, but they
have to compete with each other to access the medium.
One example of contention-based MAC is CSMA/CA.
In CSMA/CA, each node senses the medium before transmitting the
data.
If the medium is idle, the node can transmit data immediately.
However, if the channel is busy the node has to wait for a random
time also known as back-off time.
This back-off time reduces the chances of collisions.
4.3 Fundamentals of MAC
14
Scheduled-based MAC
Scheduled-based MAC is also known as a deterministic MAC
protocol.
Where each node follows a predetermined schedule and transmits
the data according to its given time slot.
The data collision is completely nullified in scheduled-based MAC.
An example of Scheduled based MAC is TDMA (Time Division
Multiple Access).
In TDMA the time is divided into fixed slots and each node is
allocated a specific time frame in which they can transmit the data.
During this time slot, other nodes remain silent..
4.3 Fundamentals of MAC
16
Hybrid MAC
Hybrid MAC is a combination of different protocols such as contention-based MAC and
scheduled-based MAC to optimize the performance of wireless sensor networks.
For example, contention-based MAC protocols, such as CSMA/CA (Carrier Sense Multiple
Access with Collision Avoidance), allow nodes to access the medium based on a random
backoff interval, which reduces collisions but may result in inefficient utilization of the
medium.
On the other hand, scheduled-based MAC protocols, such as TDMA (Time Division Multiple
Access), divide the medium into time slots and assign them to different nodes, which can
achieve high utilization but may not be flexible enough to adapt to changing network
conditions.
Hybrid MAC solved the issue by using other MAC protocols, During transmission of data if
the channel is idle or the channel has low traffic then Hybrid MAC switches to contention-
based MAC.
If the traffic in the channel increases then it is switched to scheduled-based MAC such as
TDMA.
4.3 Fundamentals of MAC
18
Cross-Layer MAC
Cross-layer MAC allows the different layers in the protocol stack, typically including physical,
MAC, and network layers, to interact and share information with one another.
Firstly MAC layers gather information about the state of the channel whether the channel is busy
or not.
This information will be further used to control the other parameters such as data transmission
rate, packet loss rate, and delay.
Once the parameters have been determined, the MAC layer sends the data packets to the PHY
layer for transmission over the wireless channel.
After the data transmission, the PHY layer sends feedback to the MAC layer about the success or
failure of the transmission.
If the transmission was unsuccessful. Based on the feedback MAC layer repeats the transmission
Overall, the working of Cross-Layer MAC involves the interaction between the MAC and PHY
layers to improve the efficiency of data transmission and energy consumption in WSNs.
By optimizing the transmission parameters
4.3 Fundamentals of MAC
20
The IEEE 802.11e standard expands on the existing IEEE 802.11 WLAN
standard by incorporating Quality of Service (QoS) support.
This design allows the MAC layer to communicate with the physical layer
to adjust to the changing channel conditions, such as interference, noise,
and fading.
4.4 Flat Routing
21
Advantages:
1. Simplicity: Flat routing protocols are simpler than
hierarchical protocols. They are easier to configure and
require less maintenance.
2. Lower Latency: Flat routing protocols have lower latency
than hierarchical protocols. This is because there are no
additional layers or segments that introduce delays.
3. Flexibility: Flat routing protocols are more flexible than
hierarchical protocols. They can be used in a variety of
network topologies and can adapt to changes more easily.
4.4 Flat Routing
27
Disadvantages:
2. Less Traffic Control: Flat routing protocols have less traffic control than
hierarchical protocols. This can lead to unnecessary routing updates and
loops, which can increase network congestion and reduce network
efficiency.
Directed Diffusion (DD) is a routing protocol for wireless sensor networks that allows
communication between source and sink nodes.
Data-centric: DD is data-centric, meaning all routing decisions are made through local
interactions between neighbors.
Local data fusion and compression: DD can use local data fusion and compression
algorithms to reduce the amount of information circulating in the network.
DD can be used in random and mesh topology networks. To improve energy efficiency,
DD can be combined with Passive Clustering (PC), which divides the network into small
clusters.
4.5 Directed Diffusion
29
4.6 SPIN - Sensor Protocol for Information via
Negotiation
30
This message will say about type of data contained by the advertising
node. Interested nodes which got the ADV message send REQ message
requesting for the data.
The node having the data sends the data to the interested nodes.
The nodes after receiving data send ADV message, and the process
continues.
4.6 SPIN - Sensor Protocol for Information via
Negotiation
31
4.6 SPIN - Sensor Protocol for Information via
Negotiation
32
The data is described in the ADV packet using high level data
descriptors, which are good enough to identify the data. These high
level data descriptors are called meta-data.
4.6 SPIN - Sensor Protocol for Information via
Negotiation
33
How it works
Uses declarative queries to abstract the network's physical
characteristics from the user.
A query optimizer generates an efficient query plan for in-
network query processing.
4.7 COGUR
38
Benefits
Reduces resource usage, extends the lifetime of a sensor
network, and shields the user from the physical characteristics
of the network.
Applications
Environmental control, warehouse inventory, health care, and
military environments
The Cougar approach is suitable for wireless sensor networks
(WSNs) because it abstracts the user from knowing the
execution plan of its queries.
4.8 Hierarchical Routing
39
Advantages of HRP
Scalability: Hierarchical routing protocols exhibit excellent
scalability by partitioning the network into smaller segments or
areas. This division reduces the demand for routing tables and
updates on each router, enhancing network efficiency and
decreasing overall network traffic.
Better Traffic Control: Hierarchical routing protocols demonstrate
superior traffic management compared to flat routing protocols. The
hierarchical framework enables more efficient traffic control,
mitigating the need for unnecessary routing updates and preventing
loops in the network.
Easy to Manage: The organisational framework in these protocols
facilitates simplified management and maintenance. Segmentation
of the network into manageable sections enhances the ease of
troubleshooting and diagnosing issues.
4.8 Hierarchical Routing
43
Disadvantages of HRP
Complexity: Hierarchical routing protocols tend to be more
intricate compared to flat routing protocols. The presence of
additional layers and segments necessitates more extensive
configuration, posing potential challenges in implementation.
https://www.geeksforgeeks.org/hierarchical-routing/
4.8 Hierarchical Routing
45
Protocols
Some examples of CBR protocols include:
CBR Mobile-WSN: This protocol uses adaptive Time Division
Multiple Access (TDMA) scheduling, a round free cluster head
protocol, and sends data to cluster heads based on signal
strength.
CBRP: This is an early hierarchical ad-hoc routing protocol
where nodes dynamically form clusters to minimize discovery
traffic.
4.10 Scalable Coordination – LEACH, TEEN, APTEEN
51
LEACH
In the context of mobile networks, "scalable coordination"
within the LEACH protocol refers to its ability to efficiently
manage communication and data aggregation in large-scale
sensor networks by dynamically forming clusters with localized
coordination, allowing the network to expand without
significantly impacting performance, thus achieving scalability
even as the number of nodes increases.
LEACH uses localized coordination to enable scalability and
robustness for dynamic networks, and incorporates data fusion
into the routing protocol to reduce the amount of information
that must be transmitted to the base station.
4.10 Scalable Coordination – LEACH, TEEN, APTEEN
52
□ Suitable for periodic data collection but not for real-time applications.
transmission.
□ Uses two thresholds (hard and soft) to minimize unnecessary
if no threshold is crossed.
4.10 Scalable Coordination – LEACH, TEEN, APTEEN
57
4.10 Scalable Coordination – LEACH, TEEN, APTEEN
58
Application Scenarios