Final Module
Final Module
MODULE 5
Presented by
Tanvi Gursale (17104A1007)
Smita Baikar (17104A1014)
Priyesh Shivkar (17104A1015)
1
Contents
• Types of wireless sensor network
• Design Issues
• Medium access control layer
• Responsibility of MAC layer
• Characteristics of MAC Protocols in WSNs
• Major sources of energy waste
• Mac protocols
1. S-MAC
2. SMAC
3.EAR
2
• Direct Diffusion.
• Sequential Assignment Routing(SAR).
• Minimum Cost Forwarding Algorithm.
• Coherent And Non-Coherent Processing.
• Cluster Based Routing Protocol(CBRP).
• Low Energy Adaptive Clustering Hierarchy (LEACH).
• Threshold-Sensitive Energy Efficient(TEEN).
• SPIN(Sensor Protocol for Information via Negotiation-based
Adaptive Routing).
• Power-Efficient Gathering in Sensor Information System(PEGASIS).
• Negotiation-based Routing, Multipath-based Routing, Query based
routing and Location –Based Routing.
• High Level Application Layer Support Distributed Query Processing.
• Data Aggregation.
3
• Adapting to the Inherent Dynamic Nature of WSNs: Some important goals
that current research in this area.
• Role of The Scalable Coordination Architectures for Deeply Distributed
Systems (SCADDS).
• Cognitive Radio Wireless Sensor Network.
• Prospective capabilities of a wireless sensor with CR.
• Advantages , challenges and Potential Applications of CR in Wireless
sensor networks.
• Introduction to Nanosensor networks.
• Types of Nanosensors..
• manufacturing of nanosensors.
• Wireless nanosensor network architectures.
• Applications of wireless nanosensor networks.
4
Types of wireless sensor network
Depending on the environment, the types of networks are decided so that
those can be deployed underwater, underground, on land, and so on.
Different types of WSNs include:
• Terrestrial WSNs
• Underground WSNs
• Underwater WSNs
• Multimedia WSNs
5
Terrestrial Network Underground Network
Fig: 1 Fig: 2
6
Underwater Network Multimedia Network
Fig: 3 Fig: 4
7
Design Issues
Routing protocols designed for traditional sensor network cannot be used directly in
WSNs for the following reasons.
8
Medium access
control layer
Introduction to the MAC layer.
The MAC( Medium Access Control) is
a sublayer is a sub layer between
physical layer and data link layer.
In most networks, multiple nodes
share a communication medium for
transmitting their data packets
The medium access control (MAC)
protocol is primarily responsible for
regulating access to the shared
medium.
Fig: 5
9
Characteristics of MAC Protocols in WSNs
Wireless nodes are mostly concerned with energy
consumption
10
Mac protocols
S-MAC(The Sensor-Mac)
• The Sensor- MAC (S-MAC) protocol explores design for energy
conservation in the MAC layer.
• It reduces energy consumption from the following sources:
Collision, overhearing unnecessary traffic, and idle listing.
11
Major sources of energy waste
1] Collision
Networ
Collisio
n
k
Fig: 6
B A
Fig: 7
13
3]Idle listening
14
Periodic listen and sleep in S-MAC
Every node sleeps for sometime and then wakes to see that if any other node
wants to talk to him
Fig: 8
15
Schedule
Maintenance
A t
A
t
t
Node Schedule
B
A t
Node Schedule
Fig: 9
16
Maintaining the Synchronisation
Fig: 10
17
Sync or data sending
(a) (c)
(b) (d)
Fig: 11
18
D Transmission
Overhearing problem will create a
collision on node
B
C A B D
Fig: 12
19
SMACS ( Self Organizing Mac) for WSN’s
20
Network Topology
A
D
F
Fig: 12
21
Fig: 13
22
EAR ( Eaves-drop and register protocol)
23
ROUTING LAYER
24
Fig: 14
25
Network Structure Based
• Flat Routing
All SNs play the same role.
• Hierarchical Routing
SNs plays different role.
• Adaptive Routing
Adapt to the current network conditions and
available energy levels.
26
Direct Diffusion
Fig: 15 27
• DD is very useful for application requiring
processing of queries.
• Bs and sensors creates gradients of
information in their respective
neighbourhoods.
28
Sequential Assignment Routing(SAR)
• QOS involved
• The routing scheme in SAR is dependent on three
factors
• Energy Resources
• Qos on each path
• The primary level of each packet.
• To avoid single route failure, a multi-path with a tree
rooted at the source SN to the destination SNs coupled
with a localized path restoration scheme is employed.
• SAR minimized the average weighted Qos metric over
the life time of the network.
29
Sequential Assignment Routing(SAR)
30
Fig: 16
Advantages: -
• Less power consumption.
• Fault-tolerance and easy recovery.
• Minimize the average weighted QoS metric
throughout the lifetime of the network.
• SAR maintains multiple paths from nodes to BS.
Disadvantages: -
• The main disadvantage of this protocol is the
overhead involved in maintaining tables and
states at each node.
31
Minimum Cost Forwarding Algorithm
• Assume the direction of routing is always
known i.e. towards the fixed base station.
• No need for a node to have a unique ID or
routing table.
• Each node maintain the least cost estimate
from itself to BS.
• It broadcast message to neighbour and
neighbour check if it is on the least cost path
between source and BS then it rebroadcast.
32
Minimum Cost Forwarding Algorithm
Fig: 17
33
Coherent And Non-Coherent
Processing
• In Non-coherent data processing routing, SNs
locally process the raw data before being sent
to other SNs for further processing.
• The SNs that perform further processing called
aggregators.
• In coherent routing the data is forwarded to
aggregators after minimum processing of time
stamping and duplicate suppression.
34
Hierarchical Routing
• Hierarchical routing allows to partition the
network into autonomous routing domains.
Fig: 18
35
Cluster Based Routing Protocol(CBRP)
• In CBRP the nodes of a wireless network are
divided into clusters.
• The diameter of a cluster is only two hop and
clusters can be disjoint or overlapping.
• Each cluster elects node as clusterheads,
responsible for the routing process.
• Clusterheads communicate with each other
through gateway node.
36
Cluster Based Routing Protocol(CBRP)
Fig: 19
37
Low Energy Adaptive Clustering
Hierarchy (LEACH)
• LEACH randomly selects a few SNs as CHs and
rotates this role amongst the cluster members
so as to evenly distribute the energy
dissipation.
• Set-up phase
• Steady phase
38
Low Energy Adaptive Clustering
Hierarchy (LEACH)
39
Fig: 20
Low Energy Adaptive Clustering
Hierarchy (LEACH)
Fig: 21
40
Advantages:-
• Completely distributed
• No global knowledge of the network
• Increases the lifetime of the network
Disadvantages:-
• It is not applicable to networks deployed in
large regions and no use of meta data.
41
Threshold-Sensitive Energy
Efficient(TEEN)
• In TEEN SNs sense their environment
continuously, thereby making it appropriate
for real time application.
42
Fig: 22
Threshold-Sensitive Energy
Efficient(TEEN)
• Hard Threshold(HT):This is a threshold value
for the sensed attribute.it is the absolute
value of the attribute beyond which, the SN
sensing this value must switch on its
transmitter and report to its CH.
• Soft Threshold(sT):This is a small change in the
value of the sensed attribute which triggers
the SN to switch on its transmitter and
transmit once the HT has been crossed.
43
Adaptive Periodic TEEN(APTEEN)
• APTEEN combines the features of proactive
and reactive networks.
44
Fig: 23
Fig: 24 45
SPIN-based Adaptive Routing
Fig: 25 46
Power-Efficient Gathering in Sensor
Information System(PEGASIS)
Advantages: -
• Extend network lifetime.
• Bandwidth consumed in communication is
reduced.
Disadvantages: -
• Delay incurred for packets during transmission to
the BS.
• To obtain a global knowledge is difficult.
• Very long delay.
47
Negotiation-based Routing
• It uses high level data descriptors in order to
eliminate redundant data transmission.
• Communication decision are also made based
on the available resources.
• The main idea behind negotiation-based
routing in WSNs is to supress duplicate
information and prevent redundant data from
being sent to the next sensor or the BS.
48
Multipath-based Routing
• Network performance and possibly lifetime, in
WSNs can be significantly improved if the routing
protocol is able to maintain multiple paths to a
destination.
• The path along the diagonal is shortest in length
and if this path is used all the time in responding
the persistent query, the energy of the sensors
lying on this path, could get depleted at a much
faster rate than rest of the network.
49
Query based routing
• In this type of routing, the destination node
propagates a query for data from a node
throughout the network.
• A node having data matching the query send it
back to the node which requested it.
• In this routing, all the SNs have tables consisting
of the sensing tasks queries that they received,
and send back data matching these task
whenever they received it.
• Example: Direct Diffusion Routing.
50
Location –Based Routing
• Sensor nodes are addressed based on their
location.
• It assumes that each node known about its
own location by using the GPS.
• Network divided into a zone.
• In order to conserve energy, some location
based schemes demand that SNs should go to
sleep if there is no activity.
51
High Level Application Layer Support
Distributed Query Processing
• The number of messages generated in
distributed query processing is several
magnitudes less than in centralized scheme.
• There are two approaches for processing
sensor queries:
1] Warehousing.
2]Distributed.
52
Data Aggregation
• Data aggregation is any process in which
information is gathered and expressed in a
summary form, for purposes such as statistical
analysis.
• It reduces the number of transmission thereby
improving bandwidth and energy utilization in
WSN.
53
Fig: 26
54
Fig: 27
55
Adapting to the Inherent
Dynamic Nature of WSNs:
56
Important goals that current
research in this area
• Exploit spatial diversity and density of
sensor/actuator nodes
• Spontaneously create and assemble
network
• Adaptability to drastic changes in the traffic
• Finer control over the precision and
coverage
57
Role of The Scalable Coordination
Architectures for Deeply Distributed
Systems (SCADDS)
• Adaptive fidelity.
• Use additional sensors (redundancy) to
extend lifetime.
• Neighboring nodes are free to talk.
• Adaptive Self-Configuring Ensor Network
Topologies (Ascent) focuses on how to
decide which nodes should join the routing
infrastructure.
58
Cognitive Radio Wireless Sensor
Network
59
• Cognitive techniques have been used in wireless
networks to circumvent the limitations imposed
by conventional WSNs.
• The cognitive technique is the process of knowing
through perception, planning, reasoning, acting,
and continuously updating and upgrading with a
history of learning.
• CR has the ability to know the unutilized
spectrum in a license and unlicensed spectrum
band, and utilize the unused spectrum
opportunistically.
60
Prospective capabilities of a wireless
sensor with CR.
• Spectrum sensing
• Spectrum sharing
• Prediction
• Fairness
• Routing
• Reconfiguration capability
• Environment sensing
• Trust and security
• Power control
61
CR-WSNs model
Fig: 28
62
Advantages of Using CR in WSNs
• Efficient Spectrum Utilization
• Multiple Channels Utilization
• Energy Efficiency
• Global Operability
• Application Specific Spectrum Band Utilization
• Financial Advantages to the Incumbents by
Renting or Leasing
• Avoiding Attacks
63
Challenges
• Detection, False Alarm, and Miss-Detection
Probability
• Hardware
• Topology Changes
• Fault Tolerance
• Manufacturing Costs
• Clustering
• Channel Selection
64
Potential Application Areas of
CR-WSNs
• Military and Public Security Applications
• Health Care
• Home Appliances and Indoor Applications
• Bandwidth-Intensive Applications
65
NANO SENSOR NETWORKS
66
Fig: 29
67
Fig: 30 68
Fig: 31
69
Fig: 32
70
Fig: 33 71
Fig: 34 72
Fig: 35 73
Fig: 36
74
Fig: 37 75
References
1. http://ieeexplore.ieee.org/document/4469516/
2. https://www.isi.edu/scadds/projects/smac/
3. https://www.youtube.com/results?search_query=s+mac+protocol
4. https://ac.els-cdn.com/S1877050915029002/1-s2.0-S1877050915029002-
main.pdf?_tid=03f3d39c-147c-11e8-b572-
00000aacb360&acdnat=1518938531_b077d0979d40d087d5faf4235fdc1c
09
5. https://www3.nd.edu/~cpoellab/teaching/cse40815/Chapter6.pdf
76
Thank You…
77