SlideShare a Scribd company logo
1 of 206
MATRUSRI ENGINEERING COLLEGE
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
SUBJECT NAME: WIRELESS SENSOR NETWORKS(PE 831 EC)
FACULTY NAME: Mr. M.NARESH
MATRUSRI
ENGINEERING COLLEGE
WIRELESS SENSOR NETWORKS(PE 831 EC)
COURSE OBJECTIVES:
 Determine network architecture, node discovery and localization,
deployment strategies, fault tolerant and network security.
 Build foundation for WSN by presenting challenges of wireless networking
at various protocol layers.
 Determine suitable protocols and radio hardware.
 Evaluate the performance of sensor network and identify bottlenecks.
 Evaluate concepts of security in sensor networks.
COURSE OUTCOMES:
 To understand network architecture, node discovery and localization,
deployment strategies, fault tolerant and network security.
 To understand foundation for WSN by presenting challenges of
wireless networking at various protocol layers
 Study suitable protocols and radio hardware.
 To understand the performance of sensor network and identify
bottlenecks.
 To understand concepts of security in sensor networks.
MATRUSRI
ENGINEERING COLLEGE
CONTENTS:
1.1. Challenges for wireless sensor networks
1.2. Characteristics requirements-required mechanisms,
1.3. Difference between mobile ad-hoc and sensor networks,
1.4. Applications of sensor networks-
1.5 Enabling technologies for wireless sensor networks
UNIT-I
OUTCOMES:
To understand network architecture, node discovery and localization, deployment strategies, fault
tolerant and network security
MATRUSRI
ENGINEERING COLLEGE
INTRODUCTION:
UNIT-I
OUTCOMES:
To understand network architecture, node discovery and localization, deployment strategies, fault
tolerant and network security
MATRUSRI
ENGINEERING COLLEGE
•Wireless sensor networks combine sensing, processing and networking over miniaturized
embedded devices → sensor nodes.
Wireless sensor networks are networks that consists of sensors which are distributed in an ad
hoc manner. These sensors work with each other to sense some physical phenomenon and then
the information gathered is processed to get relevant results.
Wireless sensor networks consists of protocols and algorithms with self-organizing capabilities.
CONTENTS:
Introduction
1.1. Challenges for wireless sensor networks
1.2. Characteristics requirements-required mechanisms,
OUTCOMES:
To understand the challenges and characteristics of wireless sensor networks
MODULE-I
MATRUSRI
ENGINEERING COLLEGE
1.1. Challenges for wireless sensor networks
MATRUSRI
ENGINEERING COLLEGE
INTRODUCTION:
Wireless sensor networks
(WSNs) have been considered as
one of the most important
technologies that are enabled by
recent advances in –
Micro-electronic-mechanical-
systems(MEMS) Wireless
Communication technologies.
.
Introduction
MATRUSRI
ENGINEERING COLLEGE
Infrastructure Based Wireless Network
Typical Wireless Network: Based on Infrastructure -Eg: GSM , UMTS
Base stations connected to a wired backbone network
.
Introduction
MATRUSRI
ENGINEERING COLLEGE
Infrastructure Free Wireless Network
Military Networking: Tanks, Soldiers, etc.,
Finding out empty parking lots in a city, without asking a server
Search and Rescue in an advance
Personal Area Networking (Watch, Glasses, PDA, Medical Appliances….etc.,)
.
1.1. Challenges for wireless sensor networks
MATRUSRI
ENGINEERING COLLEGE
WSN can handle such a wide range of application types. Nonetheless, certain common traits
appear, especially with respect to the characteristics and the required mechanisms of such
systems.
Realizing these characteristics with new mechanisms is the major challenge of the vision of
wireless sensor networks.
Characteristic requirements : The following characteristics are shared among most of the
application examples discussed above:
1. Type of service
2. Quality of service
3. Fault tolerance
4.Lifetime
5. Scalability
6. Wide range of densities
7. Programmability
8. Maintainability
.
1.1. Challenges for wireless sensor networks
MATRUSRI
ENGINEERING COLLEGE
Heterogeneity
The devices deployed maybe of various types and need to collaborate with each other.
Distributed Processing
The algorithms need to be centralized as the processing is carried out on different
nodes.
Low Bandwidth Communication
The data should be transferred efficiently between sensors
Large Scale Coordination
The sensors need to coordinate with each other to produce required results
Utilization of Sensors
The sensors should be utilized in a ways that produce the maximum performance and use less
energy.
Real Time Computation
The computation should be done quickly as new data is always being generated.
.
1.1. Challenges for wireless sensor networks
MATRUSRI
ENGINEERING COLLEGE
 Energy Efficiency
 Limited storage and computation
 Low bandwidth and high error rates
 Errors are common
-Wireless communication
-Noisy measurements
-Node failure are expected
Scalability to a large number of sensor nodes
Survivability in harsh environments
Experiments are time- and space-intensive
.
1.2. Characteristics requirements-required mechanisms
MATRUSRI
ENGINEERING COLLEGE
Required mechanisms
To realize these requirements, innovative mechanisms for a communication network have to be
found, as well as new architectures, and protocol concepts.
A particular challenge here is the need to find mechanisms that are sufficiently specific to the
idiosyncrasies of a given application to support the specific quality of service, lifetime, and
maintainability requirements.
Some of the mechanisms that will form typical parts of WSNs are:
Multi-hop wireless communication
Energy-efficient operation
Auto-configuration
Collaboration and in-network processing
Data centric
Locality
Exploit trade-offs
.
1.2. Characteristics requirements-required mechanisms
MATRUSRI
ENGINEERING COLLEGE
Conventional Networks WSN
General purpose design (many
applications)
Serving a single application or a bouquet of
applications
Network Performance and Latency Energy is the primary challenge
Devices and networks operate in controlled
/ mild environments (or over an
appropriate infrastructure)
Unattended, harsh conditions & hostile
environments
Easily accessible Physical access is difficult / undesirable
Global knowledge is feasible and
centralized management is possible
Localized decisions – no support by central entity
Differences between Conventional and Wireless sensor networks
CONTENTS:
Introduction
1.3. Difference between mobile ad-hoc and sensor networks,
1.4. Applications of sensor networks-
1.5 Enabling technologies for wireless sensor networks
OUTCOMES:
To discuss about difference , applications and enabling techniques in WSNs
MODULE-2
MATRUSRI
ENGINEERING COLLEGE
.
1.3 . Difference between mobile ad-hoc and sensor networks
MATRUSRI
ENGINEERING COLLEGE
An ad hoc network is a network that is setup, for a specific purpose, to meet a quickly appearing
communication need.
The simplest example of an ad hoc network is perhaps a set of computers connected together via
cables to form a small network, like a few laptops in a meeting room. In this example, the aspect of
self- configuration is crucial – the network is expected to work without manual management or
configuration.
Wireless sensor networks mainly use broadcast communication while ad hoc networks
use point-to-point communication.
Unlike ad hoc networks wireless sensor networks are limited by sensors limited power,
energy and computational capability.
Sensor nodes may not have global ID because of the large amount of overhead and large
number of sensors.
.
1.3 . Difference between mobile ad-hoc and sensor networks
MATRUSRI
ENGINEERING COLLEGE
Key characteristic that distinguishes them from remaining networks is the
reasoning of existence:
Collect information from the physical environment – regardless of
how easily accessible that is;
Couple the end-users directly to the sensor measurements ( cyber to physical space);
Provide information that is precisely localized (in spatio-temporal
terms) according to the application demands;
Establish a bi-directional link with the physical space (remote & adaptable actuation
based on the sensing stimulus)
.
1.4. Applications of sensor networks
MATRUSRI
ENGINEERING COLLEGE
Examples of Wireless sensor Networks
.
1.4. Applications of sensor networks
MATRUSRI
ENGINEERING COLLEGE
The applications can be divided in three categories:
1. Monitoring of objects.
2. Monitoring of an area.
3. Monitoring of both area and objects.
Monitoring Area:
1. Environmental and Habitat Monitoring
2. Precision Agriculture
3. Indoor Climate Control
4. Military Surveillance
5. Treaty Verification
6. Intelligent Alarms
.
1.4. Applications of sensor networks
MATRUSRI
ENGINEERING COLLEGE
• Precision agriculture aims at making
cultural operations more efficient,
while reducing environmental
impact.
• The information collected from
sensors is used to evaluate optimum
sowing density, estimate fertilizers
and other inputs needs, and to more
accurately predict crop yields.
. Monitoring objects:
1.4. Applications of sensor networks
MATRUSRI
ENGINEERING COLLEGE
Structural Monitoring
Eco-physiology
Condition-based Maintenance
Medical Diagnostics
Urban terrain mapping
Example: Condition-based Maintenance: Intel fabrication plants
Sensors collect vibration data, monitor wear and tear; report data in real-time
Reduces need for a team of engineers; cutting costs by several orders of magnitude
.
1.4. Applications of sensor networks
MATRUSRI
ENGINEERING COLLEGE
Monitoring Interactions between Objects and Space
Wildlife Habitats
Disaster Management
Emergency Response
Ubiquitous Computing
Asset Tracking
Health Care
Manufacturing Process Flows
.
1.4. Applications of sensor networks
MATRUSRI
ENGINEERING COLLEGE
The Zebra-Net Project
Collar-mounted sensors monitor zebra movement
in Kenya
.
1.4. Applications of sensor networks
MATRUSRI
ENGINEERING COLLEGE
Future of WSN: Smart Home / Smart Office
Sensors controlling appliances and
electrical devices in the house.
Better lighting and heating in office
buildings.
The Pentagon building has used
sensors extensively.
.
1.5 Enabling technologies for wireless sensor networks
MATRUSRI
ENGINEERING COLLEGE
Exploit spatially and temporally dense, in situ, sensing and actuation
Building such wireless sensor
networks has only become
possible with some fundamental
advances in enabling
technologies.
•Miniaturization of hardware
•Energy Scavenging
Cost
MEMS’ is a key technology for manufacturing tiny, low - cost, and low – power sensor
nodes. By integrating different components together into a single process, the size of a
sensor node can significantly be reduced.
.
1.5 Enabling technologies for wireless sensor networks
MATRUSRI
ENGINEERING COLLEGE
Smaller feature sizes in chips have driven down the power consumption of the basic
components of a sensor node - like microcontrollers, memory chips, radio modems, etc.; have
become much more energy efficient.
Reduced chip size and improved energy efficiency is accompanied by reduced cost, which is
necessary to make redundant deployment of nodes affordable.
Next to processing and communication, the actual sensing equipment is the third relevant
technology.
These three basic parts of a sensor node have to accompany by power supply. This requires,
depending on application, high capacity batteries that last for long times, that is, have only a
negligible self-discharge rate, and that can efficiently provide small amounts of current.
.
1.5 Enabling technologies for wireless sensor networks
MATRUSRI
ENGINEERING COLLEGE
To achieve low - power consumption at the node level, it is necessary to incorporate power
awareness and energy optimization in hardware design for sensor networks.
Power consumption can further be reduced through efficiently operating various system
resources using some dynamic power management (DPM) technique
•Ideally, a sensor node also has a device for energy scavenging, recharging the battery
with energy gathered from the environment – solar cells or vibration-based power
generation are conceivable options.
Such a concept requires the battery to be efficiently chargeable with small amounts of
current, which is not a standard ability
1. Discuss challenges and hurdles for wireless sensor networks.
2. Explain the historical background of sensor networks.
3. Various applications of wireless sensor networks.
4. Explain Industrial Automation
5. Discuss about Home Automation
Assignment Question
MATRUSRI
ENGINEERING COLLEGE
Questions & Answers
MATRUSRI
ENGINEERING COLLEGE
S.NO QUESTION Blooms
Taxonomy
Level
Course
Outcome
1. Discuss challenges and hurdles for Wireless Sensor
Networks
L2 CO1
2. Explain the historical background of sensor networks. L2 CO1
3. Differences between wireless sensor networks and mobile
ad hoc networks.
L3 CO1
4. What are the different types of sensors L2 CO1
5. Various applications of wireless sensor networks L4 CO1
Short answer questions
4.
L4
CO1
5.
L2
CO1
Questions & Answers
MATRUSRI
ENGINEERING COLLEGE
S.NO QUESTION Blooms
Taxonomy
Level
Course
Outcome
1. Explain smart home environment. L3 CO1
2. Discuss about Characteristic requirements for WSN L3 CO1
3. What are the Enabling Technologies for Wireless
Sensor Networks, explain in detail
L3 CO1
Long answer questions
INTRODUCTION:
UNIT-II: Architectures
OUTCOMES:
Build foundation for WSN by presenting challenges of wireless networking at various protocol
layers
MATRUSRI
ENGINEERING COLLEGE
A Wireless Sensor Network is one kind of wireless network includes a large number
of circulating, self-directed, minute, low powered devices named sensor nodes
called motes.
These networks certainly cover a huge number of spatially distributed, little,
battery-operated, embedded devices that are networked to caringly collect, process,
and transfer data to the operators, and it has controlled the capabilities of
computing & processing. Nodes are the tiny computers, which work jointly to form
the networks.
Contents:
2.1. Single-node architecture - hardware components,
2.2. Energy consumption of sensor nodes,
2.3. Operating systems and Execution environments
2.4. Network architecture - sensor network scenarios,
2.5. Optimization goals and figures of merit, gateway concepts.
OUTCOMES
Build foundation for WSN by presenting challenges of wireless networking at various protocol layers
UNIT-II: Architectures
MATRUSRI
ENGINEERING COLLEGE
CONTENTS:
2.1. Single-node architecture - hardware components,
OUTCOMES:
Study about architectures of wireless sensor networks
MODULE-I
MATRUSRI
ENGINEERING COLLEGE
2.1. Single-node architecture - hardware components
MATRUSRI
ENGINEERING COLLEGE
.
•Controller A controller to
process all the relevant data,
capable of executing arbitrary
code.
•Memory Some memory to store
programs and intermediate data;
usually, different types of
memory are used for programs
and data.
•Sensors and actuators The actual interface to the physical world: devices that can observe or
control physical parameters of the environment.
• Communication Turning nodes into a network requires a device for sending and receiving
information over a wireless channel
.
2.1. Single-node architecture - hardware components
MATRUSRI
ENGINEERING COLLEGE
•The sensor node is a multi-functional, energy efficient wireless device. The applications of motes
in industrial are widespread.
•A collection of sensor nodes collects the data from the surroundings to achieve specific
application objectives.
•The communication between motes can be done with each other using transceivers. In a
wireless sensor network, the number of motes can be in the order of hundreds/ even thousands.
• In contrast with sensor networks, Ad Hoc networks will have fewer nodes without any
structure.
Power supply As usually no tethered power supply is available, some forms of batteries are
necessary to provide energy. Sometimes, some form of recharging by obtaining energy from the
environment is available as well (e.g. solar cells).
Each of these components has to operate balancing the trade-off between as small an energy
consumption as possible on the one hand and the need to ful-fil their tasks on the other hand.
For example, both the communication device and the controller should be turned off as long as
possible.
2.1. Single-node architecture - hardware components
MATRUSRI
ENGINEERING COLLEGE
Hardware Components:
Power supply
 Microcontrollers vs Microprocessors, FPGAs and ASIC
 Memory
 Communication devices
 Sensors & Actuators
- Passive omni- directional sensors
- Passive narrow- beam sensors
- Active sensors
- Actuators
Memory
The memory component is fairly straightforward. Evidently, there is a need for Random Access
Memory (RAM) to store intermediate sensor readings, packets from other nodes, and so on.
While RAM is fast, its main disadvantage is that it loses its content if power supply is interrupted.
Program code can be stored in Read-Only Memory (ROM) or, more typically, in Electrically Erasable
Programmable Read-Only Memory (EEPROM) or flash memory (the later being similar to EEPROM
but allowing data to be erased or written in blocks instead of only a byte at a time).
2.1. Single-node architecture - hardware components
MATRUSRI
ENGINEERING COLLEGE
Communication device:
Choice of transmission medium
The communication device is used to exchange data between individual nodes. In some cases,
wired communication can actually be the method of choice and is frequently applied in many
sensor Network like settings (using field buses like Profi-bus, LON, CAN, or others).
The communication devices for these networks are custom off-the-shelf components.
Transceivers
For actual communication, both a transmitter and a receiver are required in a sensor node. The
essential task is to convert a bit stream coming from a microcontroller (or a sequence of bytes or
frames) and convert them to and from radio waves.
 For practical purposes, it is usually convenient to use a device that combines these two tasks in
a single entity. Such combined devices are called transceivers.
Usually, half-duplex operation is realized since transmitting and receiving at the same time on a
wireless medium is impractical in most cases (the receiver would only hear the own transmitter
anyway).
.
2.1. Single-node architecture - hardware components
MATRUSRI
ENGINEERING COLLEGE
Transceiver tasks and characteristics
To select appropriate transceivers, a number of characteristics should be taken into account.
The most important ones are:
Service to upper layer
Power consumption and energy efficiency
Carrier frequency and multiple channels
State change times and energy
Data rates
Modulations
Coding
Noise figure The noise figure
Gain
Power efficiency
Receiver sensitivity
Range
Blocking performance
Out of band emission
Carrier sense and RSSI
Frequency stability and Voltage range
.
2.1. Single-node architecture - hardware components
MATRUSRI
ENGINEERING COLLEGE
A fairly common structure of transceivers is
into the Radio Frequency (RF) front end and
the baseband part:
• The radio frequency front end performs
analog signal processing in the actual radio
frequency band, whereas
• The baseband processor performs all signal processing in the digital domain and
communicates with a sensor node’s processor or other digital circuitry.
. Transceiver operational states:
many transceivers can distinguish four operational states :
Transmit in the transmit state, the transmit part of the transceiver is active and the antenna radiates
energy.
Receive in the receive state the receive part is active.
2.1. Single-node architecture - hardware components
MATRUSRI
ENGINEERING COLLEGE
Idle A transceiver that is ready to receive but is not currently receiving anything is said to be in an
idle state.
Sleep In the sleep state, significant parts of the transceiver are switched off.
There are transceivers offering several different sleep states, see reference for a discussion of
sleep states for IEEE 802.11 transceivers. These sleep states differ in the amount of circuitry
switched off and in the associated recovery times and startup energy
.
2.1. Single-node architecture - hardware components
MATRUSRI
ENGINEERING COLLEGE
Sensors and actuators
Without the actual sensors and actuators, a wireless sensor network would be beside the point
entirely.
But as the discussion of possible application areas has already indicated, the possible range of
sensors is vast.
It is only possible to give a rough idea on which sensors and actuators can be used in a WSN
Sensors
Sensors can be roughly categorized into three categories
Passive, omni-directional sensors
Passive, narrow-beam sensors
Active sensors
.
2.1. Single-node architecture - hardware components
MATRUSRI
ENGINEERING COLLEGE
Power supply of sensor nodes
For untethered wireless sensor nodes, the power supply is a crucial system
component. There are essentially two aspects: First, storing energy and providing
power in the required form;
second, attempting to replenish consumed energy by “scavenging” it from some node-
external power source over time.
Storing power is conventionally done using batteries. As a rough orientation, a normal
AA battery stores about 2.2–2.5 Ah at 1.5 V.
Storing energy: Batteries
Traditional batteries
Capacity
Capacity under load
Self-discharge
Efficient recharging, Relaxation, Unconventional energy stores and DC–DC Conversion
.
2.1. Single-node architecture - hardware components
MATRUSRI
ENGINEERING COLLEGE
Energy scavenging
Some of the unconventional energy
stores described above – fuel cells, micro
heat engines, radioactivity
– convert energy from some stored,
secondary form into electricity in a less
direct and easy to use way than a normal
battery would do. The entire energy
supply is stored on the node itself – once
the fuel supply is exhausted, the node
fails.
To ensure truly long-lasting nodes and
wireless sensor networks, such a limited
energy store is unacceptable. Rather,
energy from a node’s environment must
be tapped into and made available
to the node – energy scavenging
should take place.
A MEMS device for converting vibrations to electrical
energy, based on a variable capacitor .Reproduced by
permission of IEEE
CONTENTS:
2.2. Energy Consumption of sensor nodes
2.3. Operating systems and Execution environments
OUTCOMES:
To understand the concepts of energy scavenging and operating systems of WSN
MODULE-2
MATRUSRI
ENGINEERING COLLEGE
.
2.2 Energy Consumption of Sensor Nodes
MATRUSRI
ENGINEERING COLLEGE
At time t1, the decision whether or
not a component (say, the
microcontroller) is to be put into
sleep mode should be taken to
reduce power consumption from
Pactive to Psleep.
If it remains active and the next
event occurs at time tevent, then
a total energy of Eactive =
Pactive(tevent − t1) has be spent
uselessly idling.
Putting the component into sleep mode, on the other hand, requires a time τdown until sleep mode
has been reached; as a simplification, assume that the average power consumption during this phase
is (Pactive + Psleep)/2.
Then, Psleep is consumed until tevent. In total, τdown(Pactive + Psleep)/2 + (tevent − t1 −
τdown)Psleep energy is required in sleep mode as opposed to (tevent − t1)Pactive when remaining
active.
.
2.2 Energy Consumption of Sensor Nodes
MATRUSRI
ENGINEERING COLLEGE
Microcontroller energy consumption
Basic power consumption in discrete operation
states:
Intel Strong ARM
The Intel Strong ARM ,In normal mode, all parts of
the processor are fully powered.
Power consumption is up to 400 mW.
• In idle mode, clocks to the CPU are stopped; clocks that pertain to peripherals are active. Any
interrupt will cause return to normal mode. Power consumption is up to 100 mW.
• In sleep mode, only the real-time clock remains active. Wakeup occurs after a timer interrupt and
takes up to 160 ms. Power consumption is up to 50 μW.
Energy per operation with dynamic power scaling on an Intel
Strong ARM SA-1100
MATRUSRI
ENGINEERING COLLEGE
2.3 Operating systems and Execution Environments
1. Embedded operating systems: The
traditional tasks of an operating system
are controlling and protecting the access
to resources (including support for
input/output) and managing their
allocation to different users as well as the
support for concurrent execution of
several processes and communication
between these processes.
2. 2.Programming paradigms and
application programming interfaces
(concurrent programming):
- Process-based concurrency
- Event- based programming
- Interfaces to the operating
systems
.
2.3 Operating systems and Execution Environments
MATRUSRI
ENGINEERING COLLEGE
Event based programming
model:
Such an event handler can interrupt
the processing of any normal code, but
as it is very simple and short, it can be
required to run to completion in all
circumstances without noticeably
disturbing other code
Event handlers cannot interrupt each other (as this would in turn require complicated stack
handling procedures) but are simply executed one after each other.
CONTENTS:
2.4. Network architecture - sensor network scenarios,
2.5. Optimization goals and figures of merit, gateway concepts
OUTCOMES:
MODULE-3
MATRUSRI
ENGINEERING COLLEGE
To Discuss About network architecture and optimization goals with the figure of Merit Concepts
.
2.4. Network architecture - sensor network scenarios
MATRUSRI
ENGINEERING COLLEGE
Three types of sinks in a very simple single-hop sensor network
Types of Sources and sinks:
-Single hop versus Multi hop
From the basics of radio communication and the inherent power limitation of radio communication
follows a limitation on the feasible distance between a sender and a receiver. Because of this
limited distance, the simple, direct communication between source and sink is not always possible,
specifically in WSNs, which are intended to cover a lot of ground (e.g. in environmental or
agriculture applications) or that operate in difficult radio environments with strong attenuation
.Multi hop network:
2.4. Network architecture - sensor network scenarios
MATRUSRI
ENGINEERING COLLEGE
To overcome such limited distances, an obvious
way out is to use relay stations, with the data
packets taking multi hops from the source to the
sink.
This concept of multi-hop networks is
particularly attractive for WSNs as the sensor
nodes themselves can act as such relay nodes,
foregoing the need for additional equipment
Depending on the particular application, the likelihood of having an intermediate sensor node at
the right place can actually be quite high
.
2.4. Network architecture - sensor network scenarios
MATRUSRI
ENGINEERING COLLEGE
Multiple sources and/or multiple sinks
In many cases, there are multiple sources and/or multiple sinks present. In the most challenging
case, multiple sources should send information to multiple sinks, where either all or some of the
information has to reach all or some of the sinks. Figure illustrates these combinations.
.
2.4. Network architecture - sensor network scenarios
MATRUSRI
ENGINEERING COLLEGE
Three types of
Mobility
 Node mobility
 Sink mobility
 Event mobility
Communication protocols
for WSNs will have to
render appropriate
support for these forms of
mobility.
In particular, event
mobility is quite
uncommon, compared to
previous forms of mobile
or wireless networks.
A mobile sinks moves through a mobile sensor network as a
information being retrieves on its behalf
.
2.5. Optimization goals and figures of merit, gateway concepts
MATRUSRI
ENGINEERING COLLEGE
For all these scenarios and application types, different forms of networking solutions can be found.
The challenging question is how to optimize a network, how to compare these solutions, how to
decide which approach better supports a given application, and how to turn relatively imprecise
optimizing goals into measurable figures of merit? While a general answer appears impossible
considering the large variety of possible applications, a few aspects are fairly evident
1. Quality of service
- Event detection/reporting probability
- Event classification error
- Event detection delay
- Missing reports
- Approximation accuracy
- Tracking accuracy
2. Energy efficiency
- Energy/correctly received
- Energy/reported event
- Delay
- N/w Life time
3. Scalability
4. Robustness
MATRUSRI
ENGINEERING COLLEGE
Area of sensor nodes detecting an event-an elephant-that moves through the network along
with the event source
2.5. Optimization goals and figures of merit, gateway concepts
MATRUSRI
ENGINEERING COLLEGE
2.5. Optimization goals and figures of merit, gateway concepts
Need for Gate ways
For practical deployment, a sensor network only concerned with itself is insufficient. The network
rather has to be able to interact with other information devices,
for example, a user equipped with a PDA moving in the coverage area of the network or with a
remote user, trying to interact with the sensor network via the Internet (the standard example is to
read the temperature sensors in one’s home while traveling and accessing the Internet via a
wireless connection). Figure shows this networking scenario.
.
2.5. Optimization goals and figures of merit, gateway concepts
MATRUSRI
ENGINEERING COLLEGE
1. WSN to Internet communication
A sensor node wants to deliver an alarm
message to some Internet host.
The first problem to solve is akin to ad
hoc networks, namely, how to find the
gateway from within the network.
Basically, a routing problem to a node that offers a specific service has to be solved, integrating
routing and service discovery
.
2.5. Optimization goals and figures of merit, gateway concepts
MATRUSRI
ENGINEERING COLLEGE
2. Internet to WSN communication
The case of an Internet-based entity trying
to access services of a WSN is even more
challenging .
This is fairly simple if this requesting
terminal is able to directly communicate
with the WSN, for example, a mobile
requester equipped with a WSN transceiver,
and also has all the necessary protocol
components at its disposal
In this case, the requesting terminal can be a direct part of the WSN and no particular treatment is
necessary
.
2.5. Optimization goals and figures of merit, gateway concepts
MATRUSRI
ENGINEERING COLLEGE
3. WSN tunneling
In addition to these scenarios describing
actual interactions between a WSN and
Internet terminals, the gateways can also
act as simple extensions of one WSN to
another WSN.
The idea is to build a larger, “virtual” WSN
out of separate parts, transparently
“tunneling” all protocol messages between
these two networks and simply using the
Internet as a transport network.
This can be attractive, but care has to be taken not to confuse the virtual link between two gateway
nodes with a real link; otherwise, protocols that rely on physical properties of a communication
link can get quite confused.
.
Assignment Question
MATRUSRI
ENGINEERING COLLEGE
1. Write short notes on Berkeley Motes.
2. Explain single node architecture.
3. Explain Gateway concepts.
4. Explain network architecture and sensor network scenarios.
5. What is the function of controller in sensor node architecture.
Short answer questions
MATRUSRI
ENGINEERING COLLEGE
Questions & Answers
S.NO QUESTION Blooms
Taxonomy
Level
Course
Outcome
1. What is the difference between single hop and multi-
hop networks?
L2 CO2
2. Short notes on transceiver task in sensor node
architecture?
L2 CO2
3. Explaining about programming challenge? L2 CO2
4. List of routing protocols L1 CO2
5. What is the need of gate way concepts L2 CO2
Questions & Answers
MATRUSRI
ENGINEERING COLLEGE
S.NO QUESTION Blooms
Taxonomy
Level
Course
Outcome
1. Explain network architecture and sensor network
scenarios.
L4 CO2
2. Explain about Gateway concepts. L3 CO2
3. Elaborate on Energy scavenging techniques for sensor
node
L4 CO2
4. Discuss about Optimization goals and Figure of merit L4 CO2
5. L2 CO2
Long answer questions
INTRODUCTION:
The physical layer is mostly concerned with modulation and demodulation of digital data; this task
is carried out by so-called transceivers. In sensor networks, the challenge is to find modulation
schemes and transceiver architectures that are simple, low cost, but still robust enough to provide
the desired service.
Medium Access Control (MAC) protocols is the first protocol layer above the Physical Layer (PHY)
and consequently MAC protocols are heavily influenced by its properties. The fundamental task of
any MAC protocol is to regulate the access of a number of nodes to a shared medium in such a way
that certain application-dependent performance requirements are satisfied.
UNIT-III: Physical Layer and MAC Protocols
OUTCOMES:
Study suitable protocols and radio hardware
MATRUSRI
ENGINEERING COLLEGE
Contents:
3.1. physical layer and transceiver design considerations,
3.2. MAC protocols for wireless sensor networks,
3.3. Low duty cycle protocols and wakeup concepts - S-MAC,
- Zigbee: IEEE 802.15.4 MAC layer,
- the mediation device protocol,
- wakeup radio concepts,
3.4. Address and name management,
3.5. Assignment of MAC addresses,
3.6. Routing protocols
- Energy-efficient routing,
- Geographic routing.
OUTCOMES
Study suitable protocols and radio hardware.
UNIT-III: Physical Layer and MAC Protocols
MATRUSRI
ENGINEERING COLLEGE
CONTENTS:
Introduction
3.1 physical layer and transceiver design considerations
3.2. MAC protocols for wireless sensor networks
OUTCOMES:
Study suitable protocols and radio hardware
MODULE-I
MATRUSRI
ENGINEERING COLLEGE
In sensor networks, the challenge is to find modulation schemes and transceiver architectures that
are simple, low cost, but still robust enough to provide the desired service.
Wireless channel and communication fundamentals:
1. Frequency allocation
2. Modulation and demodulation
3. Wave propagation effects and noise
- Reflection, diffraction, scattering, doppler fading
- Path loss and attenuation
- Noise and interference
- Symbols and bit errors
4. Channel models
5. Spread-spectrum communications
- Direct Sequence Spread Spectrum (DSSS) and
- Frequency Hopping Spread Spectrum (FHSS)
6. Packet transmission and synchronization
- Carrier synchronization
- Bit/symbol synchronization
- Frame synchronization
INTRODUCTION
MATRUSRI
ENGINEERING COLLEGE
Introduction: For actual communication, both a transmitter and a receiver are required in a
sensor node. The essential task is to convert a bit stream coming from a and convert them to and
from radio waves. For practical purposes, it is usually convenient to use a device that combines these
two tasks in a single entity. Such combined devices are called “transceivers”
3.1. Physical Layer and Transceiver Design Considerations
MATRUSRI
ENGINEERING COLLEGE
Some of the most crucial points influencing PHY design in wireless sensor networks are:
• Low power consumption.
• As one consequence: small transmit power and thus a small transmission range.
• As a further consequence: low duty cycle. Most hardware should be switched off or operated in
a low-power standby mode most of the time.
• Comparably low data rates, on the order of tens to hundreds kilobits per second, required.
• Low implementation complexity and costs.
• Low degree of mobility.
• A small form factor for the overall node
In general, in sensor networks, the challenge is to find modulation schemes and transceiver
architectures that are simple, low-cost but still robust enough to provide the desired service.
3.1. Physical Layer and Transceiver Design Considerations
MATRUSRI
ENGINEERING COLLEGE
1. Energy usage profile:
The choice of a small transmit power leads to an energy consumption profile different from
other wireless devices like cell phones.
The radiated energy is small, typically on the order of 0 dBm (corresponding to 1mW). On
the other hand, the overall transceiver (RF front end and baseband part) consumes much
more energy than is actually radiated.
A second key observation is that for small transmit powers the transmit and receive modes
consume more or less the same power; it is even possible that reception requires more
power than transmission.
A third key observation is the relative costs of communications versus computation in a
sensor node. Clearly, a comparison of these costs depends for the communication part on the
BER requirements, range, transceiver type, and so forth, and for the computation part on the
processor type, the instruction mix, and so on.
2. CHOICE OF MODULATION SCHEME:
A crucial point is the choice of modulation scheme. Several factors have to be balanced
here: the required and desirable data rate and symbol rate, the implementation
complexity, the relationship between radiated power and target BER, and the expected
channel characteristics.
Table: Bandwidth efficiency ηBW and Eb/N0[dB] required at the receiver to reach a BER of 10−6 over an AWGN channel
for m-ary orthogonal FSK and PSK
3.1. Physical Layer and Transceiver Design Considerations
MATRUSRI
ENGINEERING COLLEGE
3. Dynamic modulation scaling
To determine the optimal scheme for a given combination of BER target, range, packet sizes and so
forth, such an optimum is only valid for short time; as soon as one of the constraints changes, the
optimum can change, too.
In addition, other constraints like delay or the desire to achieve high throughput can dictate to
choose higher modulation schemes.
Therefore, it is interesting to consider methods to adapt the modulation scheme to the current
situation. Such an approach, called dynamic modulation scaling.
4. Antenna considerations
If the antenna is much smaller than the carrier’s wavelength, it is hard to achieve good antenna
efficiency, that is, with ill-sized antennas one must spend more transmit energy to obtain the same
radiated energy.
with small sensor node cases, it will be hard to place two antennas with suitable distance to achieve
receive diversity
3.1. Physical Layer and Transceiver Design Considerations
MATRUSRI
ENGINEERING COLLEGE
Medium access control (MAC) protocols solve a seemingly simple task: they coordinate
the times where a number of nodes access a shared communication medium
an “un-overseeable” number of protocols have emerged in more than thirty years of
research in this area. They differ, among others, in the types of media they use and in the
performance requirements for which they are optimized.
Medium Access Control (MAC) protocols is the first protocol layer above the Physical
Layer (PHY) and consequently MAC protocols are heavily influenced by its properties.
The fundamental task of any MAC protocol is to regulate the access of a number of nodes
to a shared medium in such a way that certain application-dependent performance
requirements are satisfied
3.2. MAC PROTOCOLS for WSN
MATRUSRI
ENGINEERING COLLEGE
The most important performance requirements for MAC protocols are
throughput ,
efficiency,
stability,
fairness,
low access delay and
low transmission delay
as well as a low overhead
The overhead in MAC protocols can result from per-packet overhead (MAC headers and trailers),
collisions, or from exchange of extra control packets.
 Collisions can happen if the MAC protocol allows two or more nodes to send packets at the same
time. Collisions can result in the inability of the receiver to decode a packet correctly, causing the
upper layers to perform a retransmission.
For time-critical applications, it is important to provide deterministic or stochastic guarantees on
delivery time or minimal available data rate.
Sometimes, preferred treatment of important packets over unimportant ones is required, leading
to the concept of priorities
3.2.Requirements and design constraints for wireless MAC protocols
MATRUSRI
ENGINEERING COLLEGE
3.2.Requirements and design constraints for wireless MAC protocols
1. Hidden Terminal Problem
2. Exposed terminal scenario
we have three nodes A, B, and C that are arranged such that A and B are in mutual range, B and
C are in mutual range, but A and C cannot hear each other. Assume that A starts to transmit a
packet to B and some time later node C also decides to start a packet transmission. A carrier-
sensing operation by C shows an idle medium since C cannot hear A’s signals. When C starts its
packet, the signals collide at B and both packets are useless.
MATRUSRI
ENGINEERING COLLEGE
Important classes of MAC protocols:
1.Fixed assignment protocols
-TDMA, FDMA, CDMA, AND SDMA.
2.Demand assignment protocols
-HIPERLAN/2 protocol
-DQRUMA
-MASCARA protocol
-polling schemes
3. Random access protocols
-CSMA protocols
-non-persistent CSMA
-persistent CSMA
3.2.Requirements and design constraints for wireless MAC protocols
MATRUSRI
ENGINEERING COLLEGE
The RTS/CTS handshake as used in IEEE 802.11 is based on the MACAW protocol
and it uses only a single channel and two special control packets.
3.2.Requirements and design constraints for wireless MAC protocols
MATRUSRI
ENGINEERING COLLEGE
RTS/CTS handshake
in IEEE 802.11
Further problem of the RTS/CTS handshake is its significant overhead of two control packets per
data packet, not counting the acknowledgment packet. If the data packet is small, this overhead
might not pay off and it may be simpler to use some plain CSMA variant
3.2 Requirements and Design constraints for wireless MAC
MATRUSRI
ENGINEERING COLLEGE
Two problems in
RTS/CTS Handshake
3.2 MAC Protocols for WSN
MATRUSRI
ENGINEERING COLLEGE
Balance of requirements
Energy problems on the MAC layer
-Collisions
-Overhearing
-Protocol overhead
-Idle listening
Structure
-contention-based
-schedule-based protocols
Balance of requirements:
3.2 MAC Protocols for WSN
MATRUSRI
ENGINEERING COLLEGE
The balance of requirements is different from traditional (wireless) networks.
Additional requirements come up, first and foremost, the need to conserve energy.
The importance of energy efficiency for the design of MAC protocols is relatively new
and many of the “classical” protocols like ALOHA and CSMA contain no provisions
toward this goal.
 Other typical performance figures like fairness, throughput, or delay tend to play a
minor role in sensor networks.
Fairness is not important since the nodes in a WSN do not represent individuals
competing for bandwidth, but they collaborate to achieve a common goal.
The access/transmission delay performance is traded against energy
conservation, and throughput is mostly not an issue either.
CONTENTS:
3.2. MAC Protocol for wireless sensor networks
3.3. Low duty cycle protocols and wakeup concepts
OUTCOMES:
To presents the fundamentals of MAC protocols and explains the specific requirements
and problems in wireless sensor networks.
MODULE-2
MATRUSRI
ENGINEERING COLLEGE
3.2 MAC Protocols for WSN
MATRUSRI
ENGINEERING COLLEGE
Energy problems on the MAC layer
Further important requirements for MAC protocols are scalability and robustness
against frequent topology changes, as caused for example by nodes powering down
temporarily to replenish their batteries by energy scavenging, mobility, deployment of
new nodes, or death of existing nodes.
The need for scalability is evident when considering very dense sensor networks with
dozens or hundreds of nodes in mutual range.
Nodes transceiver consumes a significant share of energy.
Transceiver can be in one of the four main states : transmitting, receiving, idling, or
sleeping.
Transmitting is costly, receive costs often have the same order of magnitude as
transmit costs, idling can be significantly cheaper but also about as expensive as
receiving, and sleeping costs almost nothing but results in a “deaf” node.
3.2 MAC Protocols for WSN
MATRUSRI
ENGINEERING COLLEGE
Collisions :
Collisions incur useless receive costs at the destination node, useless transmit costs
at the source node, and the prospect to expend further energy upon packet
retransmission.
Hence, collisions should be avoided, either by design (fixed assignment/TDMA or
demand assignment protocols) or by appropriate collision avoidance/hidden-
terminal procedures in CSMA protocols.
Overhearing :
 Uni-cast frames have one source and one destination node.
 However, the wireless medium is a broadcast medium and all the source’s neighbors
that are in receive state hear a packet and drop it when it is not destined to them; these
nodes overhear the packet.
 For higher node densities overhearing avoidance can save significant amounts of
energy. On the other hand, overhearing is sometimes desirable.
3.2 MAC Protocols for WSN
MATRUSRI
ENGINEERING COLLEGE
Protocol overhead :
 Protocol overhead is induced by MAC-related control frames like, for example,
RTS and CTS packets or request packets in demand assignment protocols, and
furthermore by per-packet overhead like packet headers and trailers.
Idle listening:
A node being in idle state is ready to receive a packet but is not currently receiving
anything.
This readiness is costly and useless in case of low network loads; for many radio
modems, the idle state still consumes significant energy.
Switching off the transceiver is a solution; however, since mode changes also cost
energy, their frequency should be kept at “reasonable” levels.
3.2 MAC Protocols for WSN
MATRUSRI
ENGINEERING COLLEGE
Some other protocols are classified into either contention-based or schedule-
based protocols.
This distinction is to be understood by the number of possible contenders upon a
transmit opportunity towards a receiver node:
 In contention-based protocols , any of the receiver’s neighbors might try its luck
at the risk of collisions.
Accordingly, those protocols contain mechanisms to avoid collisions or to reduce
their probability.
In schedule-based protocols ,only one neighbor gets an opportunity and collisions
are avoided. These protocols have a TDMA component, which provides also an
implicit idle listening avoidance mechanism: when a node knows its allocated slots
and can be sure that it communicates (transmits/receives) only in these slots, it can
safely switch off its receiver at all other times
.
3.3. Low duty cycle protocols and wakeup concepts
MATRUSRI
ENGINEERING COLLEGE
Low duty cycle
protocols try to avoid
spending (much) time
in the idle state and to
reduce the
communication
activities of a sensor
node to a minimum.
In an ideal case, the sleep state is left only when a node is about to transmit or receive
packets. To achieve this WAKEUP RADIO Concept is introduced.
In several protocols, a periodic wakeup scheme is used. Such schemes exist in
different flavors.
This approach, nodes spend most of their time in the sleep mode and wake up periodically
to receive packets from other nodes. Specifically, a node A listens onto the channel during
its listen period and goes back into sleep mode when no other node takes the
opportunity to direct a packet to A.
• .
3.3. Low duty cycle protocols and wakeup concepts
MATRUSRI
ENGINEERING COLLEGE
By choosing a small duty cycle, the transceiver is in sleep mode most of the time,
avoiding idle listening and conserving energy.
• By choosing a small duty cycle, the traffic directed from neighboring nodes to a
given node concentrates on a small time window (the listen period) and in heavy
load situations significant competition can occur.
• Choosing a long sleep period induces a significant per-hop latency, since a
prospective transmitter node has to wait an average of half a sleep period before
the receiver can accept packets. In the multi-hop case, the per-hop latencies add up
and create significant end-to-end latencies.
• Sleep phases should not be too short lest the start-up costs outweigh the benefits
There is also a periodic wakeup but nodes can both transmit and receive during their
wakeup phases. When nodes have their wakeup phases at the same time, there is no
necessity for a node wanting to transmit a packet to be awake outside these phases to
rendezvous its receiver.
.
3.2 Sparse topology and energy management (STEM)
MATRUSRI
ENGINEERING COLLEGE
The Sparse Topology and Energy Management (STEM) protocol does not cover all
aspects of a MAC protocol but provides a solution for the idle listening problem
STEM duty cycle for a single node
STEM targets networks that are deployed to wait for and report on the behavior of a
certain event.
MATRUSRI
ENGINEERING COLLEGE
The S-MAC (Sensor-MAC) protocol provides mechanisms to circumvent idle
listening, collisions, and overhearing. As opposed to STEM, it does not require two
different channels.
S-MAC (Sensor –MAC)
S-MAC principle
.
MATRUSRI
ENGINEERING COLLEGE
S-MAC (Sensor –MAC)
S-MAC adopts a periodic wakeup scheme, that is, each node alternates between a
fixed-length listen period and a fixed-length sleep period according to its schedule, as
opposed to STEM, the listen period of S-MAC can be used to receive and transmit
packets.
 S-MAC attempts to coordinate the schedules of neighboring nodes such that their
listen periods
 Start at the same time. A node x’s listen period is subdivided into three different
phases:
. • In the first phase (SYNCH phase),
• In the second phase (RTS phase),
• In the third phase (CTS phase),
S-MAC (Sensor –MAC)
MATRUSRI
ENGINEERING COLLEGE
S-MAC fragmentation and NAV setting
3.2 The Mediation device protocol
MATRUSRI
ENGINEERING COLLEGE
The mediation device protocol is compatible with the peer-to-peer
communication mode of the IEEE 802.15.4 low-rate WPAN standard. It allows each
node in a WSN to go into sleep mode periodically and to wake up only for short times
to receive packets from neighbor nodes. There is no global time reference, each node
has its own sleeping schedule, and does not take care of its neighbors sleep schedules
3.2 The Mediation device protocol
MATRUSRI
ENGINEERING COLLEGE
 Upon each periodic wakeup, a node transmits a short query beacon, indicating
its node address and its willingness to accept packets from other nodes. The node
stays awake for some short time following the query beacon, to open up a window
for incoming packets. If no packet is received during this window, the node goes
back into sleep mode.
 Dynamic synchronization
 Mediation device (MD)
The dynamic synchronization approach achieves this synchronization without
requiring the transmitter to be awake permanently to detect the destinations query
beacon.
To achieve this, a mediation device (MD) is used.
.
3.3 Wakeup radio concepts
MATRUSRI
ENGINEERING COLLEGE
 The ideal situation would be if a node were always in the receiving state when a
packet is transmitted to it, in the transmitting state when it transmits a packet, and in
the sleep state at all other times; the idle state should be avoided.
 The wakeup radio concept strives to achieve this goal by a simple, “powerless”
receiver that can trigger a main receiver if necessary
 One proposed wakeup MAC protocol assumes the presence of several parallel data
channels, separated either in frequency (FDMA) or by choosing different codes in a
CDMA schemes.
A node wishing to transmit a data packet randomly picks one of the channels and
performs a carrier sensing operation. If the channel is busy, the node makes another
random channel choice and repeats the carrier-sensing operation.
 After a certain number of unsuccessful trials, the node backs off for a random time
and starts again.
3.2 Wakeup radio concepts
MATRUSRI
ENGINEERING COLLEGE
If the channel is idle, the node sends a wakeup signal to the intended receiver,
indicating both the receiver identification and the channel to use.
The receiver wakes up its data transceiver, tunes to the indicated channel, and the
data packet transmission can proceed.
Afterward, the receiver can switch its data transceiver back into sleep mode. This
wakeup radio concept has the significant advantage that only the low-power wakeup
transceiver has to be switched on all the time while the much more energy consuming
data transceiver is non sleeping if and only if the node is involved in data transmissions.
 Furthermore, this scheme is naturally traffic adaptive, that is, the MAC becomes
more and more active as the traffic load increases. Periodic wakeup schemes do
not have this property.
There are also some drawbacks. First, to our knowledge, there is no real hardware
yet for such an ultralow power wakeup transceiver. Second, the range of the wakeup
radio and the data radio should be the same.
If the range of the wakeup radio is smaller than the range of the data radio, possibly
not all neighbor nodes can be woken up.
CONTENTS:
3.2. IEEE 802.15.4 MAC protocol
OUTCOMES:
To understand about IEEE 80.15.4 MAC protocols and architecture
MODULE-3
MATRUSRI
ENGINEERING COLLEGE
3.2 IEEE 802.15.4 MAC protocol
MATRUSRI
ENGINEERING COLLEGE
IEEE finalized the IEEE 802.15.4 standard in October 2003 ,the standard covers the
physical layer and the MAC layer of a low-rate Wireless Personal Area Network
(WPAN).
Zig-Bee uses the services offered by IEEE 802.15.4 and adds network construction
(star networks, peer-to-peer/ mesh networks, cluster-tree networks), security,
application services, and more.
The targeted applications for IEEE 802.15.4 are in the area of wireless sensor
networks, home automation, home networking, connecting devices to a PC,
home security, and so on.
Most of these applications require only low-to-medium bitrates (up to some few
hundreds of kbps), moderate average delays without too stringent delay guarantees,
and for certain nodes it is highly desirable to reduce the energy consumption to a
minimum.
.
3.2 IEEE 802.15.4 MAC protocol
MATRUSRI
ENGINEERING COLLEGE
The physical layer offers:
 Bitrates of 20 kbps (a single channel in the frequency range 868–868.6 MHz),
 40 kbps (ten channels in the range between 905 and 928 MHz) and
250 kbps (16 channels in the 2.4 GHz ISM band between 2.4 and 2.485 GHz with
5- MHz spacing between the center frequencies).
 There are a total of 27 channels available,
 But the MAC protocol uses only one of these channels at a time;
 It is not a multichannel protocol.
 The MAC protocol combines both schedule-based as well as contention-based
schemes
. IEEE 802.15.4 MAC Protocol:
Network architecture and types/roles of nodes:
3.2 IEEE 802.15.4 MAC protocol
MATRUSRI
ENGINEERING COLLEGE
The standard distinguishes on the MAC layer two types of nodes:
• A Full Function Device (FFD) can operate in three different roles: it can be a PAN
coordinator (PAN = Personal Area Network), a simple coordinator or a device.
• A Reduced Function Device (RFD) can operate only as a device.
Network architecture and types/roles of nodes
Super-frame structure
GTS management
Data transfer procedures
Slotted CSMA-CA protocol
Non-beaconed mode
3.2 IEEE 802.15.4 MAC protocol
MATRUSRI
ENGINEERING COLLEGE
1.Network architecture and types/roles of nodes:
A device must be associated to a coordinator node (which must be a FFD) and
communicates only with this, this way forming a star network. Coordinators can
operate in a peer-to-peer fashion and multiple coordinators can form a Personal
Area Network (PAN).
The PAN is identified by a 16-bit PAN Identifier and one of its coordinators is
designated as a PAN coordinator.
A coordinator handles among others the following tasks:
It manages a list of associated devices.
It allocates short addresses to its devices.
In the beaconed mode of IEEE 802.15.4, it transmits regularly frame beacon
packets announcing the PAN identifier, a list of outstanding frames, and other
parameters.
It exchanges data packets with devices and with peer coordinators.
.
3.2 IEEE 802.15.4 MAC protocol
MATRUSRI
ENGINEERING COLLEGE
2. Super frame structure:
Super frame structure of IEEE 802.15.4
The coordinator of a star network operating in the beaconed mode organizes
channel access and data transmission with the help of a super frame.
All super frames have the same length. The coordinator starts each super frame by
sending a frame beacon packet.
The frame beacon includes a super frame specification describing the length of the
various components of the following super frame:
1. Active period
2. Inactive period.
The active period is subdivided into
16 time slots.
The first time slot is occupied
by the beacon frame and
the remaining time slots
1. CAP
2. GTSs
.
3.3 IEEE 802.15.4 MAC protocol
MATRUSRI
ENGINEERING COLLEGE
3. GTS management:
The coordinator allocates GTS to devices only when the latter send appropriate
request packets during the CAP.
One flag in the request indicates whether the requested time slot is a transmit slot
or a receive slot.
In a transmit slot, the device transmits packets to the coordinator and in a
receive slot the data flows in the reverse direction. Another field in the request
specifies the desired number of contiguous time slots in the GTS phase.
The coordinator answers the request packet in two steps: An immediate
acknowledgment packet confirms that the coordinator has received the request packet
properly but contains no information about success or failure of the request.
After receiving the acknowledgment packet, the device is required to track the
coordinator’s beacons for some specified time (called Agts DescPersistence Time).
3.3 IEEE 802.15.4 MAC protocol
MATRUSRI
ENGINEERING COLLEGE
4. Data transfer procedures:
Device wants to transmit a data packet to the coordinator, If the device has an
allocated transmit GTS, it wakes up just before the time slot starts and sends its packet
immediately without running any carrier-sense or other collision-avoiding operations.
However, the device can do so only when the full transaction consisting of the data
packet and an immediate acknowledgment sent by the coordinator as well as
appropriate Inter Frame Spaces (IFSs) fit into the allocated time slots.
The other case is a data transfer from the coordinator to a device. If the device has
allocated a receive GTS and when the packet/acknowledgment/IFS cycle fits into these,
the coordinator simply transmits the packet in the allocated time slot without further
coordination. The device has to acknowledge the data packet.
3.3 IEEE 802.15.4 MAC protocol
MATRUSRI
ENGINEERING COLLEGE
Handshake between coordinator and device
when the device retrieves a packet
When the coordinator is not able to use a
receive GTS:
The coordinator announces a buffered packet to
a device by including the devices address into the
pending address field of the beacon frame.
The device’s address is included as long as the
device has not retrieved the packet or a certain
timer has expired.
 When the device finds its address in the
pending address field, it sends a special data
request packet during the CAP.
The coordinator answers this packet with
an acknowledgment packet and continues with
sending the data packet
• 5. Slotted CSMA-CA protocol:
3.3 IEEE 802.15.4 MAC protocol
MATRUSRI
ENGINEERING COLLEGE
 Nodes have to send data or
management/control packets
during the CAP, they use a
slotted CSMA protocol.
The protocol contains no
provisions against hidden-
terminal situations.
 For Example there is no
RTS/CTS handshake. To
reduce the probability of
collisions, the protocol uses
random delays; it is thus a
CSMA-CA protocol.
The time slots making up
the CAP are subdivided into
smaller time slots, called
back-off periods.
.
3.3 IEEE 802.15.4 MAC protocol
MATRUSRI
ENGINEERING COLLEGE
6. Non-beaconed mode:
The IEEE 802.15.4 protocol offers a Non-beaconed mode besides the beaconed
mode.
Some important differences between these modes are the following:
1. In the non-beaconed mode, the coordinator does not send beacon frames nor is
there any GTS mechanism.
2. All packets from devices are transmitted using an un slotted (because of the lack of
time synchronization) CSMA-CA protocol.
3. Coordinators must be switched on constantly but devices can follow their own
sleep schedule.
4. Devices wake up for two reasons: (i) to send a data/control packet to the
coordinators, or (ii) to fetch a packet destined to itself from the coordinator by
using the data request/acknowledgment/ data/acknowledgment handshake
CONTENTS:
3.3. Address and name management
3.4. Assignments for WSN
OUTCOMES:
To study about address , management and Assignments for WSN
MODULE-4
MATRUSRI
ENGINEERING COLLEGE
.
3.3. Address and name management
MATRUSRI
ENGINEERING COLLEGE
Naming and addressing are two fundamental issues in networking.
Names are used to denote things (for example, nodes, data, transactions).
Addresses supply the information needed to find these things.
Use of addresses and names in (sensor) networks:
In most computer and sensor networks, the following types of names, addresses,
and identifiers can be found:
1. Unique Node Identifier(UID)
2. MAC address
3. Network address
4. Network identifiers
5. Resource identifiers
The fundamental tasks of address
management, which are independent of
the type of addresses:
1. Address allocation
2. Address de-allocation
3. Address representation
4. Conflict detection/resolution
5. Binding
.
3.3. Address and name management
MATRUSRI
ENGINEERING COLLEGE
Example for network partition
Any address management scheme for
sensor and ad hoc networks is
occasionally faced with network
partitions and network merge events.
Uniqueness of addresses:
The following uniqueness
requirements for network names and
addresses.
1. Globally unique
2. Network wide unique
3. Locally unique
.
3.3. Address and name management in wireless sensor networks
MATRUSRI
ENGINEERING COLLEGE
MAC addresses are indispensable if the MAC protocol shall employ overhearing
avoidance and go into sleep mode as often as possible. However, do MAC addresses
need to be globally or network wide unique.
since the scope of a MAC protocol is communication between neighboring nodes and
it is sufficient that addresses are locally unique within a two-hop neighborhood.
This requirement ensures that no two neighbors of a selected node have the same
MAC address
It is not really necessary in wireless sensor networks since after all the whole network
is not a collection of individual nodes belonging to individual users but the nodes
collaborate to process signals and events from the physical environment.
The users ultimately are interested in the data and not in the individual or groups of
nodes delivering them, the data can also influence the operation of protocols, which is
the essence of data-centric networking.
Data-centric or content-based addressing schemes are important.
3.4. Assignment of MAC addresses
MATRUSRI
ENGINEERING COLLEGE
The assignment of globally unique MAC addresses is undesirable in sensor networks
with mostly small packets.
An a priori assignment of network wide unique addresses is feasible only if it can be
done with reasonable effort.
But there is still the problem that the overhead to represent addresses can be
considerable although not as large as in globally unique addresses
Dynamic and distributed assignment of network wide and local addresses.
Node randomly picks an address from a given address range and hopes that this
address is unique.
This address range is given by the integers between 0 and 2m − 1 and an address can
thus be represented with m bits. The address space has a size of n = 2m addresses.
A node chooses its address without any prior information, in which case it is best to
use a uniform distribution on the address range since this has maximum entropy.
CONTENTS:
3.5. Routing protocols
OUTCOMES:
To discusses mechanisms for routing and forwarding when the destination of a packet is
identified by a unique node identifier.
MODULE-5
MATRUSRI
ENGINEERING COLLEGE
.
3.5. Routing protocols
MATRUSRI
ENGINEERING COLLEGE
In a multi hop network, intermediate nodes have to relay packets from the source
to the destination node.
 Such an intermediate node has to decide to which neighbor to forward an
incoming packet not destined for itself.
 Typically, routing tables that list the most appropriate neighbor for any given
packet destination are used.
 The construction and maintenance of these routing tables is the crucial task of a
distributed routing protocol
A simple example of routing in a
multi-hop network – node S sends
packets to node D
.1. Energy-efficient uni-cast:
3.5. Routing protocols
MATRUSRI
ENGINEERING COLLEGE
Various example routes for communication
between nodes A and H, showing energy costs per
packet for each link and available battery capacity
for each node
Energy-efficient uni-cast
routing appears to be a
simple problem: take the
network graph, assign to
each link a cost value
that reflects the energy
consumption across this
link, and pick any
algorithm that computes
least-cost paths in a
graph.
.
3.5. Routing protocols
MATRUSRI
ENGINEERING COLLEGE
There are various aspects how energy or power efficiency can be conceived of in a
routing context:
Minimize energy per packet
Maximize network lifetime
- Time until the first node fails.
- Time until there is a spot that is not covered by the network (loss of coverage, a
useful metric only for redundantly deployed networks).
- Time until network partition (when there are two nodes that can no longer
communicate with each other)
Routing considering available battery energy
- Maximum Total Available Battery Capacity
- Minimum Battery Cost Routing (MBCR)
- Min–Max Battery Cost Routing (MMBCR)
- Conditional Max–Min Battery Capacity Routing (CMMBCR)
- Minimize variance in power levels
Minimum Total Transmission Power Routing (MTPR)
The idea behind the relatively large class of geographic routing protocols is
twofold:
1. For many applications, it is necessary to address physical locations, for example, as
“any node in a given region” or “the node at/closest to a given point”. When such
Requirements exist, they have to be supported by a proper routing scheme.
3.5. Routing protocols
MATRUSRI
ENGINEERING COLLEGE
2. Geographic Routing:
When the position of source and destination is known as are the positions of
intermediate nodes, this information can be used to assist in the routing process.
To do so, the destination node has to be specified either geographically (as above) or as
some form of mapping – a location service – between an otherwise specified
destination (e.g. by its identifier) and its (conjectured) current position is necessary
3.5. Routing protocols- Geographic Routing:
MATRUSRI
ENGINEERING COLLEGE
Basics of position-based routing
Simple greedy geographic forwarding
Most forward within r:
.
3.5. Routing protocols- Geographic Routing:
MATRUSRI
ENGINEERING COLLEGE
Nearest with forward progress
Directional routing
The problem of dead ends
Restricted flooding
Right-hand rule to recover greedy routing – GPSR
Performance guarantees of combined greedy/face routing
Combination with ID-based routing, hierarchies
Randomized forwarding and adaptive node activity – GeRaF
Geographic routing without positions – GEM
Simple greedy geographic
forwarding fails in presence of
obstacles
3.5. Routing protocols- Geographic Routing:
MATRUSRI
ENGINEERING COLLEGE
Example for GPSR
Illustrates how a
packet would be
routed from node A
to node Z.
 While at node
A, the packet can be
greedily forwarded
to node D. At node D,
greedy forwarding
fails , so the packet
has to be routed
around the perimeter
of the interior face
defined by BFGCD.
3.5. Routing protocols- Geographic Routing:
MATRUSRI
ENGINEERING COLLEGE
Geo-casting
Geo-casting – sending data to a subset of nodes that are located in an indicated region
is evidently an example of multicasting and thus would not require any further
attention.
Similar to the case of position-based routing, position information of the designated
region and the intermediate nodes can be exploited to increase efficiency
Location Based Multicast:
-Static zone
- Adaptive zone
- Adaptive distances
Finding the right direction
Tessellating the plane
Mesh-based geo-casting
Geo-casting using a uni-cast protocol – GeoTORA
Trajectory-based forwarding (TBF)
.
Assignment Question
MATRUSRI
ENGINEERING COLLEGE
1. Explain in detail about S-MAC Protocol
2. Briefly explain IEEE 802.15.4 MAC Layer.
3. Explain Low duty cycle protocols.
4. What are differences between Zigbee and Bluetooth Technology?
5. Explain sparse topology and energy management protocol.
Short answer questions
MATRUSRI
ENGINEERING COLLEGE
Questions & Answers
S.NO QUESTION Blooms
Taxonomy
Level
Course
Outcome
1. List the factors that are required for PHY design of
WSN
L1 CO3
2. What are the design issues for a routing protocol of
WSNs
L1 CO3
3. Write short notes on GEAR protocol L1 CO3
4. Define contention based protocols. L1 CO3
5. Briefly explain energy efficient routing L2 CO3
Questions & Answers
MATRUSRI
ENGINEERING COLLEGE
S.NO QUESTION Blooms
Taxonomy
Level
Course
Outcome
1. Explain Physical Layer and Transceiver Design
Considerations.
L2 CO3
2. Discuss about IEEE 802.15.4 MAC Layer. L4 CO3
3. How MAC Address Assignment I done in sensor
networks
L2 CO3
4. Briefly explain the wakeup radio concepts L2 CO3
5. Explain in detail about any two routing protocols for
WSNs.
L2 CO3
Long answer questions
INTRODUCTION:
UNIT-IV: INFRASTRUCTURE ESTABLISHMENT
OUTCOMES:
To understand the performance of sensor network and identify bottlenecks.
MATRUSRI
ENGINEERING COLLEGE
• In a densely deployed wireless network, a single node has many neighboring nodes with which
direct communication would be possible when using sufficiently large transmission power. This
is, however, not necessarily beneficial: high transmission power requires lots of energy, many
neighbors are a burden for a MAC protocol, and routing protocols suffer from volatility in the
network when nodes move around and frequently form or sever many links.
• To overcome these problems, topology control can be applied. The idea is to deliberately restrict
the set of nodes that are considered neighbors of a given node. This can be done by controlling
transmission power, by introducing hierarchies in the network and signaling out some nodes to
take over certain coordination tasks, or by simply turning off some nodes for a certain time.
Contents:
4.1. Topology control, clustering,
4.2. Time synchronization,
4.3. localization and positioning,
4.4. sensor tasking and control.
4.5. Operating systems for wireless sensor networks,
4.6. sensor node hardware – berkeley motes,
4.7 programming challenges,
4.8. Node-level software platforms, node-level simulators, state-centric programming
OUTCOMES
UNIT-IV: INFRASTRUCTURE ESTABLISHMENT
MATRUSRI
ENGINEERING COLLEGE
To evaluate the performance of sensor network and identify bottlenecks.
CONTENTS:
4.1. Topology control, clustering,
OUTCOMES:
To know the basics of topology and clustering of network
MODULE-I
MATRUSRI
ENGINEERING COLLEGE
.
4.1. Topology control, clustering
MATRUSRI
ENGINEERING COLLEGE
In a very dense networks, too many nodes might be in range for an efficient operation
• Too many collisions/too complex operation for a MAC protocol, too many paths to
choose from for a routing protocol.
Idea: Make topology less complex
• Topology: Which node is able/allowed to communicate with which other nodes
• Topology control needs to maintain invariants, e.g., connectivity
•A sensor network node that first wakes up executes a protocol to discover which other
nodes it can communicate with (bi directionally).
•This set of neighbors is determined by the radio power of the nodes as well as the local
topography and other conditions that may degrade radio links
4.1. Topology control, clustering
MATRUSRI
ENGINEERING COLLEGE
Options for
Topology control
•The problem of topology control for a sensor network is how to set the radio range for each
node so as to minimize energy usage, while still ensuring that the communication graph of the
nodes remains connected and satisfies other desirable communication properties.
Alternative: Selectively discard some links
• Usually done by introducing hierarchies
4.1. Topology control, clustering
MATRUSRI
ENGINEERING COLLEGE
Flat Networks:
Main option: Control transmission power
• Do not always use maximum power
• Selectively for some links or for a node as a
whole
• Topology looks “thinner”
• Less interference.
. Hierarchical networks – backbone:
4.1. Topology control, clustering
MATRUSRI
ENGINEERING COLLEGE
Construct a backbone network
•Some nodes “control” their neighbors – they form
a (minimal) dominating set
•Each node should have a controlling neighbor.
 Controlling nodes have to be connected
(backbone)
 Only links within backbone and from backbone to
controlled neighbors are used
4.1. Topology control, clustering
MATRUSRI
ENGINEERING COLLEGE
Aspects of topology-control algorithms:
Connectivity – If two nodes connected in G, they have to be connected in G0 resulting from
topology control
Stretch factor – should be small
Hop stretch factor: how much longer are paths in G0 than in G?
Energy stretch factor: how much more energy does the most energy-efficient path
need?
Throughput – removing nodes/links can reduce throughput, by how much?
Robustness to mobility
Algorithm overhead
.
4.1. Topology control, clustering
MATRUSRI
ENGINEERING COLLEGE
 Construct clusters
 Partition nodes into groups (“clusters”)
 Each node in exactly one group
• Except for nodes “bridging” between two or more groups
 Groups can have cluster heads
 Typically: all nodes in a cluster are direct neighbors of their cluster head
 Cluster heads are also a dominating set, but should be separated from each other – they
form an independent set
 Formally: Given graph G=(V,E), construct C ½ V such that
4.1. Topology control, clustering
MATRUSRI
ENGINEERING COLLEGE
 Further options
 How do clusters communicate? Some nodes need to
act as gateways between clusters.
If clusters may not overlap, two nodes need to jointly
act as a distributed gateway
Partition nodes into groups of nodes – Clusters
 Many options for details
 Are there cluster heads? – One controller/representative node per cluster
 May cluster heads be neighbors? If no: cluster heads form an
independent set C:
Typically: cluster heads form
a maximum independent set
 May clusters overlap?
 Do they have nodes in common?
. Maximum independent set:
4.1. Topology control, clustering
MATRUSRI
ENGINEERING COLLEGE
 Computing a maximum independent set is NP-complete
 Can be approximate within ( +3)/5 for small , within ( log log  / log ) else;  bounded
degree
Show: A maximum independent set is also a dominating set
 Maximum independent set not necessarily intuitively desired
solution
 Example: Radial graph, with only (v0,vi) 2 E
.
4.1. Topology control, clustering
MATRUSRI
ENGINEERING COLLEGE
•Use some attribute of nodes to break local
symmetries.
•Node identifiers, energy reserve, mobility,
weighted combinations… - matters not for
the idea as such (all types of variations have
been looked at).
•Make each node a cluster head that locally
has the largest attribute value.
•Once a node is dominated by a cluster-
head, it abstains from local competition,
giving other nodes a chance.
Determining gateways to connect clusters:
Rotating cluster heads
• Multi-hop clusters
• Passive clustering
•Adaptive node activity
CONTENTS:
4.2. Time synchronization,
OUTCOMES:
To discusses the time synchronization problem in wireless sensor
networks
MODULE-2
MATRUSRI
ENGINEERING COLLEGE
4.2. Time synchronization
MATRUSRI
ENGINEERING COLLEGE
Time is an important aspect for many applications and protocols found in
wireless sensor networks.
Nodes can measure time using local clocks, driven by oscillators.
Because of random phase shifts and drift rates of oscillators, the local time
reading of nodes would start to differ – they loose synchronization – without
correction
The time synchronization problem is a standard problem in distributed systems.
Ex: Determination of angle of arrival of a
distant sound event by an array of acoustic
sensors
4.2. Time synchronization
MATRUSRI
ENGINEERING COLLEGE
There are at least two ways to get a more reliable estimate. The first one (and the one
focused on in this chapter) is to keep the sensors clocks as tightly synchronized as
possible, using dedicated time synchronization algorithms.
The second one is to combine the readings of multiple sensors and to “average out”
the estimation errors
It is important to note that the time needed in sensor networks should adhere to
physical time, that is two sensor nodes should have the same idea about the
duration of 1 s and additionally a sensor node’s second should come as close as
possible to 1 s of real time or coordinated universal time (UTC).
The physical time has to be distinguished from the concept of logical time that allows
to determine the ordering of events in a distributed system but does not necessarily
show any correspondence to real time.
Node Clocks and the Problem of Accuracy:
-Oscillator
- Counter Register
- Hardware clock
-Software clock
4.2. Time synchronization
MATRUSRI
ENGINEERING COLLEGE
Properties and structure of time synchronization algorithms;
Physical time Vs Logical time
External Vs Internal Synchronization
Global Vs Local
Absolute Vs Relative
Hardware Vs soft ware
A priori Vs A posteriori
Deterministic Vs Stochastic
Local clock update discipline
performance metrics:
Precision
Energy Costs
Memory requirements
Fault tolerance
.
4.2. Time synchronization
MATRUSRI
ENGINEERING COLLEGE
Time synchronization in wireless sensor networks:
•An algorithm must scale to large mult-ihop networks of unreliable and severely
energy-constrained nodes.
• The scalability requirement refers to both the number of nodes as well as to the
average node degree/node density.
• The precision requirements can be quite diverse, ranging from microseconds to
seconds.
• The use of extra hardware only for time synchronization purposes is mostly ruled out
because of the extra cost and energy penalties incurred by dedicated circuitry.
• The degree of mobility is low.
• There are mostly no fixed upper bounds for packet delivery delay.
• The propagation delay between neighboring nodes is negligible.
• Manual configuration of single nodes is not an option.
• It will turn out that the accuracy of time synchronization algorithms critically depends
on the delay between the reception of the last bit of a packet and the time when it is time
stamped.
CONTENTS:
4.3 Localization and Positioning
4.4 operating systems for wireless sensor networks
OUTCOMES:
To discuss the operating systems for wireless sensor networks and and objectives for a WSN
operating system.
MODULE-3
MATRUSRI
ENGINEERING COLLEGE
4.3 Localization and Positioning
MATRUSRI
ENGINEERING COLLEGE
In many circumstances, it is useful or even necessary for a node in a wireless sensor
network to be aware of its location in the physical world.
Properties of localization and positioning procedures:
Physical position versus symbolic location
Absolute versus relative coordinates
Localized versus centralized computation
Accuracy and precision
Scale
Limitations
Costs
4.3 Localization and Positioning
MATRUSRI
ENGINEERING COLLEGE
Possible Approaches:
1. Proximity
2. Trilateration and Triangulation
3. Scene Analysis
Determining the position of sensor nodes with
the assistance from some anchor points; not all
nodes are necessarily in contact with all anchors
.
4.3 Localization and Positioning
MATRUSRI
ENGINEERING COLLEGE
Positioning in Multi hop Environment:
1. Connectivity in multihop network
2. Multihop range estimation
3. Iterative and collabrative mutilateraion
4. Probabilistic Positioning description and propagation
4.3 Localization and Positioning
MATRUSRI
ENGINEERING COLLEGE
4.3 Localization and Positioning
MATRUSRI
ENGINEERING COLLEGE
.
4.4 Operating Systems for Wireless Sensor Networks
MATRUSRI
ENGINEERING COLLEGE
WSNs can be used to monitor and/or control physical environment in a space
where it is difficult or impossible to do so manually.
A WSN is generally composed of a centralized station (sink) and tens, hundreds, or
perhaps thousands of tiny sensor nodes such as Mote and Mica2 .
WSNs are a special type of distributed network system that is similar to database,
real-time, and embedded systems.
The basic function of WSNs is to collect information and to support certain
applications specific to the task of WSN deployment.
Commercially available sensor nodes are categorized into four groups:
4.4 Operating Systems for Wireless Sensor Networks
MATRUSRI
ENGINEERING COLLEGE
1. Specialized sensing platforms such as the Spec node designed at the University of
California–Berkeley.
2. Generic sensing platforms such as Berkeley motes
3. High-bandwidth sensing platforms such as iMote
4. Gateway platforms such as Stargate
The differences in the sensor types above are in the function of the sensor, frequency of the
microprocessor, memory size, and transceiver bandwidth.
Although these nodes have different characteristics, their basic hardware components are the
same: a physical sensor, a microprocessor or microcontroller, a memory, a radio transceiver, and a
battery.
Each sensor node needs an operating system (OS) that can control the hardware, Provide
hardware abstraction to application software, and fill in the gap between applications and the
underlying hardware
.
4.4 Operating Systems for Wireless Sensor Networks
MATRUSRI
ENGINEERING COLLEGE
Operating system design issues:
Traditional operating systems are system software, including programs that manage
computing resources, control peripheral devices, and provide software abstraction to
the application software.
Traditional OS functions are therefore to manage processes, memory, CPU time, file
system, and devices..
This is often implemented in a modular and layered fashion, including a lower layer
of kernels and a higher layer of system libraries.
Traditional OSs are not suitable for wireless sensor networks because WSNs have
constrained resources and diverse data-centric applications, in addition to a variable
topology.
WSNs need a new type of operating system, considering their special characteristics.
4.4 Operating Systems for Wireless Sensor Networks
MATRUSRI
ENGINEERING COLLEGE
Operating system design issues:
1. Process management and scheduling 2.Memory management
3. kernel model 4. Application program interface (API).
5. Code upgrade and reprogramming
Sensor operating systems (SOS) should embody the following functions:
1. Should be compact and small in size since the sensor nodes have very small
memory.
2. Should provide real-time support, since there are real-time applications, especially
when actuators are involved
3. Should provide efficient resource management mechanisms in order to allocate
microprocessor time and limited memory.
4. Should support reliable and efficient code distribution since the functionality
performed by the sensor nodes may need to be changed after deployment.
5. Should support power management, which helps to extend the system lifetime and
improve its performance.
6. Should provide a generic programming interface up to sensor middleware or
application software.
.
4.4 Operating Systems for Wireless Sensor Networks
MATRUSRI
ENGINEERING COLLEGE
Examples of Operating Systems:
1. TinyOS
2 .Mate,
3 .MagnetOS,
4 .MANTIS,
5 .OSPM
6 .EYES OS
7 .SenOS,
8 .EMERALDS
9 . PicOS
The major issues for the design of operation systems for WSNs are size (memory
requirement), energy-efficient IPCs and task scheduling, effective code distribution
and upgrades, and finally, generic application programming interfaces.
. TinyOS:
4.4 Operating Systems for Wireless Sensor Networks
MATRUSRI
ENGINEERING COLLEGE
The design of tinyos allows application software to access hardware
directly when required.
Tinyos is a tiny microthreaded OS that attempts to address
two issues: how to guarantee concurrent data flows among hardware devices, and
how to provide modularized components with little processing and storage
overhead.
TinyOS uses an event-based model to support high levels of concurrent application in a
very small amount of memory.
It includes a tiny scheduler and a set of components.
The scheduler schedules operation of those components. Each component consists of
four parts: command handlers, event handlers, an encapsulated fixed-size frame, and a
group of tasks.
CONTENTS:
4.5 Sensor Node architecture
4.6 Programming Challenges
OUTCOMES:
To explaining about architecture of sensor node and challenges
MODULE-3
MATRUSRI
ENGINEERING COLLEGE
.
4.5 Sensor Node Hardware
MATRUSRI
ENGINEERING COLLEGE
Sensor node hardware can be grouped into three categories, each of which entails a
different set of trade-offs in the design choices:
1.Augmented general-purpose computers
Ex: low power PCs, embedded PCs (e.g., PC104), custom-designed PCs and
various personal digital assistants (PDA).
2. Dedicated embedded sensor nodes
Ex: Berkeley mote family , the UCLA Medusa family , Ember nodes, and MIT μAMP
3. System-on-chip (SoC) nodes
Ex: smart dust , the BWRC pico radio node , and the PASTA node
Among these hardware platforms, the Berkeley motes, due to their small form factor,
open source software development, and commercial availability, have gained wide
popularity in the sensor network research community.
4.5 Sensor Node Hardware-Berkeley Motes
MATRUSRI
ENGINEERING COLLEGE
The Berkeley motes are a family of embedded sensor nodes sharing roughly the same
architecture.
A comparison of Berkeley motes
MICA MOTE: MICA motes have a two-CPU design
4.5 Sensor Node Hardware-Berkeley Motes
MATRUSRI
ENGINEERING COLLEGE
MCU: an Atmel ATmega103L
-512 KB flash memory
-4 KB of data memory
TR1000 chip set:
-operating at 916 MHz
- Max 50 kbps raw data rate
-40 kbps transmission rate
supports a 51 pin I/O
A sensor/ actuator board can
host :
-a temperature sensor,
- a light sensor,
- an accelerometer,
- a magnetometer,
- a microphone, and
- a beeper
serial I/O (UART)
The energy consumption of various components on a MICA mote.
4.5 Sensor Node Hardware-Berkeley Motes
MATRUSRI
ENGINEERING COLLEGE
A Radio transmission bears the maximum power consumption.
Another observation is that there are huge differences among the power
consumption levels in the active mode, the idle mode, and the suspend mode of the
MCU
Traditional programming technologies rely on operating systems to provide abstraction
for processing, I/O, networking, and user interaction hardware
4.6. Programming Challenges
MATRUSRI
ENGINEERING COLLEGE
Traditional embedded system programming interface
4.6 Programming Challenges
MATRUSRI
ENGINEERING COLLEGE
When applying traditional model to programming networked embedded systems, such
as sensor networks, the application programmers need to explicitly deal with:
 message passing,
event synchronization,
 interrupt handing, and
sensor reading
An application is typically implemented as a finite state machine (FSM) that covers
all extreme cases:
unreliable communication channels,
 long delays,
irregular arrival of messages,
simultaneous events
4.6 Programming Challenges
MATRUSRI
ENGINEERING COLLEGE
For resource-constrained Embedded systems with real-time requirements, several
mechanisms are used in embedded operating systems to
 reduce code size,
 improve response time, and
 reduce energy consumption
Embedded operating systems tend to expose more hardware controls to the
programmers, who now have to directly face device drivers and scheduling algorithms,
and optimize code at the assembly level.
Although these techniques may work well for small, stand-alone embedded systems,
they do not scale up for the Programming of sensor networks for two reasons:
1. Sensor networks are large-scale distributed systems, where global properties are
derivable from program execution in a massive number of distributed nodes.
2. As sensor nodes deeply embed into the physical world, a sensor network should be
able to respond to multiple concurrent stimuli at the speed of changes of the physical
phenomena of interest.
CONTENTS:
4.7. Node-level software platforms
4.8. Node- level simulator
4.9 Sate centric Programming
OUTCOMES:
To understand the concepts of node-level software and simulations
MODULE-4
MATRUSRI
ENGINEERING COLLEGE
4.7. Node-level software platforms
MATRUSRI
ENGINEERING COLLEGE
Most design methodologies for sensor network software are node centric, where
programmers think in terms of how a node should behave in the environment.
 A node-level platform can be a node centric operating system, which provides
hardware and networking abstractions of a sensor node to programmers, or it can be
a language platform, which provides a library of components to programmers.
Typical operating system abstracts the hardware platform by providing a set of
services for applications, including
-file management,
-memory allocation,
-task scheduling,
-peripheral device drivers, and
-networking.
4.7. Node-level software platforms
MATRUSRI
ENGINEERING COLLEGE
Operating System: TinyOS
TinyOS aims at supporting sensor network applications on resource constrained
hardware platforms, such as the Berkeley motes.
To ensure that an application code has an extremely small footprint, TinyOS chooses
to have no file system, supports only
static memory allocation,
implements a simple task model, and
provides minimal device and
networking abstractions
.
4.7. Node-level software platforms
MATRUSRI
ENGINEERING COLLEGE
The Field Monitor
application for
sensing and sending
measurements
4.8 Node-Level Simulators
MATRUSRI
ENGINEERING COLLEGE
Node-level design methodologies are usually associated with simulators that simulate
the behavior of a sensor network on a per-node basis.
Using simulation, designers can quickly study the performance (in terms of timing,
power, bandwidth, and scalability) of potential algorithms without implementing
them on actual hardware and dealing with the vagaries of actual physical phenomena.
A node-level simulator typically has the following components:
Sensor node model
Communication model
Physical environment model:
Statistics and visualization
A sensor network simulator simulates the behavior of a subset of the sensor nodes with
respect to time.
Depending on how the time is advanced in the simulation, there are two types of
execution models:
Cycle-driven simulation (CD) and
Discrete-event simulation (DE)
.
4.8 Node-Level Simulators
MATRUSRI
ENGINEERING COLLEGE
A Cycle-driven (CD) simulation discretizes the continuous notion of real time into
(typically regularly spaced) ticks and simulates the system behavior at these ticks.
At each tick, the physical phenomena are first simulated, and then all nodes are
checked to see if they have anything to sense, process, or communicate.
A Discrete-event (DE) simulator assumes that the time is continuous and an
event may occur at any time. An event is a 2-tuple with a value and a time stamp
indicating when the event is supposed to be handled.
There is no general CD simulator that fits all sensor network simulation tasks. We have
come across a number of homegrown simulators written in
Matlab,
Java, and
C++
Many of them are developed for particular applications and exploit application-specific
assumptions to gain efficiency.
.
4.8 Node-Level Simulators
MATRUSRI
ENGINEERING COLLEGE
DE simulations are sometimes considered as good as actual implementations,
because of their continuous notion of time and discrete notion of events. There are
several open-source or commercial simulators available.
One class of these simulators comprises extensions of classical network simulators,
such as
 ns-2,
 J-Sim (previously known as JavaSim), and
GloMoSim/QualNet.8
(The focus of these simulators is on network modeling, protocols stacks, and
simulation performance).
Another class of simulators, sometimes called softwarein-the-loop simulators,
incorporate the actual node software into the simulation. For this reason, they are
typically attached to particular hardware platforms and are less portable. Examples in
TOSSIM for Berkeley motes and
Em* (pronounced em star) for Linux-based nodes such as Sensoria WINS NG
platforms
Ns-2 simulator and its sensor network extensions:
4.8 Node-Level Simulators-NS 2
MATRUSRI
ENGINEERING COLLEGE
The simulator ns-2 is an open-source network simulator that was originally
designed for wired, IP networks.
Extensions have been made to simulate Wireless/mobile networks (e.g., 802.11 MAC
and TDMA MAC) and more recently sensor networks.
While the original ns-2 only supports logical addresses for each node, the
wireless/mobile extension of it introduces the notion of node locations and a simple
wireless channel model.
This is not a trivial extension, since once the nodes move, the simulator needs to check
for each physical layer event whether the destination node is within the
communication range.
For a large network, this significantly slows down the simulation speed.
MATRUSRI
ENGINEERING COLLEGE
4.8 Node-Level Simulators
There are at least two efforts to extend ns-2 to simulate sensor networks:
1. SensorSim from UCLA9 and
2. NRL sensor network extension from the Navy Research Laboratory
SensorSim aims at providing an energy model for sensor nodes and communication,
so that power properties can be simulated .
It also supports hybrid simulation.
NRL sensor network extension provides a flexible way of modeling physical
phenomena in a discrete event simulator.
Physical phenomena are modeled as network nodes which communicate with real
nodes through physical layers.
The receiving nodes simply have a sensor stack parallel to the network stack that
processes these events.
4.8 Node-Level Simulators
MATRUSRI
ENGINEERING COLLEGE
The main functionality of ns-2 is implemented in C++, while the dynamics of the
simulation (e.g., time-dependent application characteristics) is controlled by Tcl
scripts.
Basic components in ns-2 are the layers in the protocol stack. They implement the
handlers interface, indicating that they handle events.
Events are communication packets that are passed between consecutive layers within
one node, or between the same layers across nodes.
Advantage of ns-2 is its rich libraries of protocols for nearly all network layers and for
many routing mechanisms.
TCP: reno, tahoe, vegas, and SACK implementations
• MAC: 802.3, 802.11, and TDMA
• Ad hoc routing: DSDV,DSR, AODV routing, and TORA
• Sensor network routing: Directed diffusion, geographical routing (GEAR) and
geographical adaptive fidelity (GAF) routing.
.
4.8 Node-Level Simulators-TOSSIM
MATRUSRI
ENGINEERING COLLEGE
TOSSIM is a dedicated simulator for TinyOS applications running on one or more
Berkeley motes.
The key design decisions on building TOSSIM were to make it scalable to a network of
potentially thousands of nodes, and to be able to use the actual software code in the
Simulation.
To achieve these goals, TOSSIM takes a cross-compilation approach that compiles the
nesC source code into components in the simulation
The event-driven execution model of TinyOS greatly simplifies the design of TOSSIM.
By replacing a few low-level components, such as the A/D conversion (ADC), the system
clock, and the radio front end, TOSSIM translates hardware interrupts into discrete event
simulator events.
The simulator event queue delivers the interrupts that drive the execution of a node. The
upper-layer TinyOS code runs unchanged.
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt
Wireless sensor Networks.ppt

More Related Content

What's hot

Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811
praveen369
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
ijujournal
 

What's hot (20)

Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wsn 08
Wsn 08Wsn 08
Wsn 08
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Wireless sensor networks
Wireless sensor networks Wireless sensor networks
Wireless sensor networks
 
Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Mac
MacMac
Mac
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 

Similar to Wireless sensor Networks.ppt

Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
ijsrd.com
 

Similar to Wireless sensor Networks.ppt (20)

Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
file4.pdf
file4.pdffile4.pdf
file4.pdf
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network Models
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IJSRED-V1I2P12
IJSRED-V1I2P12IJSRED-V1I2P12
IJSRED-V1I2P12
 
Chapter
ChapterChapter
Chapter
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor network
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1
 
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
 
Wireless Sensor Network – Theoretical Findings and Applications
Wireless Sensor Network – Theoretical Findings and ApplicationsWireless Sensor Network – Theoretical Findings and Applications
Wireless Sensor Network – Theoretical Findings and Applications
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
 
40120140503011
4012014050301140120140503011
40120140503011
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
533 450-457
533 450-457533 450-457
533 450-457
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
 
WSN_Chapter _1.pptx
WSN_Chapter _1.pptxWSN_Chapter _1.pptx
WSN_Chapter _1.pptx
 
Research Challenges and Characteristic Features in Wireless Sensor Networks
Research Challenges and Characteristic Features in Wireless Sensor NetworksResearch Challenges and Characteristic Features in Wireless Sensor Networks
Research Challenges and Characteristic Features in Wireless Sensor Networks
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor Networks
 

More from MATRUSRI ENGINEERING COLLEGE

More from MATRUSRI ENGINEERING COLLEGE (9)

Digital Communication Pulse code modulation.ppt
Digital Communication Pulse code modulation.pptDigital Communication Pulse code modulation.ppt
Digital Communication Pulse code modulation.ppt
 
Principles of Electronics Communication system.ppt
Principles of Electronics Communication system.pptPrinciples of Electronics Communication system.ppt
Principles of Electronics Communication system.ppt
 
Optical Fiber Communication.ppt
Optical Fiber Communication.pptOptical Fiber Communication.ppt
Optical Fiber Communication.ppt
 
Mobile cellular Communication.ppt
Mobile cellular Communication.pptMobile cellular Communication.ppt
Mobile cellular Communication.ppt
 
Unit-5 Noise.ppt
Unit-5  Noise.pptUnit-5  Noise.ppt
Unit-5 Noise.ppt
 
Unit-4 Pulse analog Modulation.ppt
Unit-4  Pulse analog Modulation.pptUnit-4  Pulse analog Modulation.ppt
Unit-4 Pulse analog Modulation.ppt
 
Unit- 3 Transmitters and Recivers.ppt
Unit- 3  Transmitters and Recivers.pptUnit- 3  Transmitters and Recivers.ppt
Unit- 3 Transmitters and Recivers.ppt
 
Unit- 2 Angle Modulation.ppt
Unit- 2  Angle Modulation.pptUnit- 2  Angle Modulation.ppt
Unit- 2 Angle Modulation.ppt
 
Unit- 1 Amplitude Modulation.ppt
Unit- 1 Amplitude Modulation.pptUnit- 1 Amplitude Modulation.ppt
Unit- 1 Amplitude Modulation.ppt
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 

Wireless sensor Networks.ppt

  • 1. MATRUSRI ENGINEERING COLLEGE DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING SUBJECT NAME: WIRELESS SENSOR NETWORKS(PE 831 EC) FACULTY NAME: Mr. M.NARESH MATRUSRI ENGINEERING COLLEGE
  • 2. WIRELESS SENSOR NETWORKS(PE 831 EC) COURSE OBJECTIVES:  Determine network architecture, node discovery and localization, deployment strategies, fault tolerant and network security.  Build foundation for WSN by presenting challenges of wireless networking at various protocol layers.  Determine suitable protocols and radio hardware.  Evaluate the performance of sensor network and identify bottlenecks.  Evaluate concepts of security in sensor networks. COURSE OUTCOMES:  To understand network architecture, node discovery and localization, deployment strategies, fault tolerant and network security.  To understand foundation for WSN by presenting challenges of wireless networking at various protocol layers  Study suitable protocols and radio hardware.  To understand the performance of sensor network and identify bottlenecks.  To understand concepts of security in sensor networks. MATRUSRI ENGINEERING COLLEGE
  • 3. CONTENTS: 1.1. Challenges for wireless sensor networks 1.2. Characteristics requirements-required mechanisms, 1.3. Difference between mobile ad-hoc and sensor networks, 1.4. Applications of sensor networks- 1.5 Enabling technologies for wireless sensor networks UNIT-I OUTCOMES: To understand network architecture, node discovery and localization, deployment strategies, fault tolerant and network security MATRUSRI ENGINEERING COLLEGE
  • 4. INTRODUCTION: UNIT-I OUTCOMES: To understand network architecture, node discovery and localization, deployment strategies, fault tolerant and network security MATRUSRI ENGINEERING COLLEGE •Wireless sensor networks combine sensing, processing and networking over miniaturized embedded devices → sensor nodes. Wireless sensor networks are networks that consists of sensors which are distributed in an ad hoc manner. These sensors work with each other to sense some physical phenomenon and then the information gathered is processed to get relevant results. Wireless sensor networks consists of protocols and algorithms with self-organizing capabilities.
  • 5. CONTENTS: Introduction 1.1. Challenges for wireless sensor networks 1.2. Characteristics requirements-required mechanisms, OUTCOMES: To understand the challenges and characteristics of wireless sensor networks MODULE-I MATRUSRI ENGINEERING COLLEGE
  • 6. 1.1. Challenges for wireless sensor networks MATRUSRI ENGINEERING COLLEGE INTRODUCTION: Wireless sensor networks (WSNs) have been considered as one of the most important technologies that are enabled by recent advances in – Micro-electronic-mechanical- systems(MEMS) Wireless Communication technologies.
  • 7. . Introduction MATRUSRI ENGINEERING COLLEGE Infrastructure Based Wireless Network Typical Wireless Network: Based on Infrastructure -Eg: GSM , UMTS Base stations connected to a wired backbone network
  • 8. . Introduction MATRUSRI ENGINEERING COLLEGE Infrastructure Free Wireless Network Military Networking: Tanks, Soldiers, etc., Finding out empty parking lots in a city, without asking a server Search and Rescue in an advance Personal Area Networking (Watch, Glasses, PDA, Medical Appliances….etc.,)
  • 9. . 1.1. Challenges for wireless sensor networks MATRUSRI ENGINEERING COLLEGE WSN can handle such a wide range of application types. Nonetheless, certain common traits appear, especially with respect to the characteristics and the required mechanisms of such systems. Realizing these characteristics with new mechanisms is the major challenge of the vision of wireless sensor networks. Characteristic requirements : The following characteristics are shared among most of the application examples discussed above: 1. Type of service 2. Quality of service 3. Fault tolerance 4.Lifetime 5. Scalability 6. Wide range of densities 7. Programmability 8. Maintainability
  • 10. . 1.1. Challenges for wireless sensor networks MATRUSRI ENGINEERING COLLEGE Heterogeneity The devices deployed maybe of various types and need to collaborate with each other. Distributed Processing The algorithms need to be centralized as the processing is carried out on different nodes. Low Bandwidth Communication The data should be transferred efficiently between sensors Large Scale Coordination The sensors need to coordinate with each other to produce required results Utilization of Sensors The sensors should be utilized in a ways that produce the maximum performance and use less energy. Real Time Computation The computation should be done quickly as new data is always being generated.
  • 11. . 1.1. Challenges for wireless sensor networks MATRUSRI ENGINEERING COLLEGE  Energy Efficiency  Limited storage and computation  Low bandwidth and high error rates  Errors are common -Wireless communication -Noisy measurements -Node failure are expected Scalability to a large number of sensor nodes Survivability in harsh environments Experiments are time- and space-intensive
  • 12. . 1.2. Characteristics requirements-required mechanisms MATRUSRI ENGINEERING COLLEGE Required mechanisms To realize these requirements, innovative mechanisms for a communication network have to be found, as well as new architectures, and protocol concepts. A particular challenge here is the need to find mechanisms that are sufficiently specific to the idiosyncrasies of a given application to support the specific quality of service, lifetime, and maintainability requirements. Some of the mechanisms that will form typical parts of WSNs are: Multi-hop wireless communication Energy-efficient operation Auto-configuration Collaboration and in-network processing Data centric Locality Exploit trade-offs
  • 13. . 1.2. Characteristics requirements-required mechanisms MATRUSRI ENGINEERING COLLEGE Conventional Networks WSN General purpose design (many applications) Serving a single application or a bouquet of applications Network Performance and Latency Energy is the primary challenge Devices and networks operate in controlled / mild environments (or over an appropriate infrastructure) Unattended, harsh conditions & hostile environments Easily accessible Physical access is difficult / undesirable Global knowledge is feasible and centralized management is possible Localized decisions – no support by central entity Differences between Conventional and Wireless sensor networks
  • 14. CONTENTS: Introduction 1.3. Difference between mobile ad-hoc and sensor networks, 1.4. Applications of sensor networks- 1.5 Enabling technologies for wireless sensor networks OUTCOMES: To discuss about difference , applications and enabling techniques in WSNs MODULE-2 MATRUSRI ENGINEERING COLLEGE
  • 15. . 1.3 . Difference between mobile ad-hoc and sensor networks MATRUSRI ENGINEERING COLLEGE An ad hoc network is a network that is setup, for a specific purpose, to meet a quickly appearing communication need. The simplest example of an ad hoc network is perhaps a set of computers connected together via cables to form a small network, like a few laptops in a meeting room. In this example, the aspect of self- configuration is crucial – the network is expected to work without manual management or configuration. Wireless sensor networks mainly use broadcast communication while ad hoc networks use point-to-point communication. Unlike ad hoc networks wireless sensor networks are limited by sensors limited power, energy and computational capability. Sensor nodes may not have global ID because of the large amount of overhead and large number of sensors.
  • 16. . 1.3 . Difference between mobile ad-hoc and sensor networks MATRUSRI ENGINEERING COLLEGE Key characteristic that distinguishes them from remaining networks is the reasoning of existence: Collect information from the physical environment – regardless of how easily accessible that is; Couple the end-users directly to the sensor measurements ( cyber to physical space); Provide information that is precisely localized (in spatio-temporal terms) according to the application demands; Establish a bi-directional link with the physical space (remote & adaptable actuation based on the sensing stimulus)
  • 17. . 1.4. Applications of sensor networks MATRUSRI ENGINEERING COLLEGE Examples of Wireless sensor Networks
  • 18. . 1.4. Applications of sensor networks MATRUSRI ENGINEERING COLLEGE The applications can be divided in three categories: 1. Monitoring of objects. 2. Monitoring of an area. 3. Monitoring of both area and objects. Monitoring Area: 1. Environmental and Habitat Monitoring 2. Precision Agriculture 3. Indoor Climate Control 4. Military Surveillance 5. Treaty Verification 6. Intelligent Alarms
  • 19. . 1.4. Applications of sensor networks MATRUSRI ENGINEERING COLLEGE • Precision agriculture aims at making cultural operations more efficient, while reducing environmental impact. • The information collected from sensors is used to evaluate optimum sowing density, estimate fertilizers and other inputs needs, and to more accurately predict crop yields.
  • 20. . Monitoring objects: 1.4. Applications of sensor networks MATRUSRI ENGINEERING COLLEGE Structural Monitoring Eco-physiology Condition-based Maintenance Medical Diagnostics Urban terrain mapping Example: Condition-based Maintenance: Intel fabrication plants Sensors collect vibration data, monitor wear and tear; report data in real-time Reduces need for a team of engineers; cutting costs by several orders of magnitude
  • 21. . 1.4. Applications of sensor networks MATRUSRI ENGINEERING COLLEGE Monitoring Interactions between Objects and Space Wildlife Habitats Disaster Management Emergency Response Ubiquitous Computing Asset Tracking Health Care Manufacturing Process Flows
  • 22. . 1.4. Applications of sensor networks MATRUSRI ENGINEERING COLLEGE The Zebra-Net Project Collar-mounted sensors monitor zebra movement in Kenya
  • 23. . 1.4. Applications of sensor networks MATRUSRI ENGINEERING COLLEGE Future of WSN: Smart Home / Smart Office Sensors controlling appliances and electrical devices in the house. Better lighting and heating in office buildings. The Pentagon building has used sensors extensively.
  • 24. . 1.5 Enabling technologies for wireless sensor networks MATRUSRI ENGINEERING COLLEGE Exploit spatially and temporally dense, in situ, sensing and actuation Building such wireless sensor networks has only become possible with some fundamental advances in enabling technologies. •Miniaturization of hardware •Energy Scavenging Cost MEMS’ is a key technology for manufacturing tiny, low - cost, and low – power sensor nodes. By integrating different components together into a single process, the size of a sensor node can significantly be reduced.
  • 25. . 1.5 Enabling technologies for wireless sensor networks MATRUSRI ENGINEERING COLLEGE Smaller feature sizes in chips have driven down the power consumption of the basic components of a sensor node - like microcontrollers, memory chips, radio modems, etc.; have become much more energy efficient. Reduced chip size and improved energy efficiency is accompanied by reduced cost, which is necessary to make redundant deployment of nodes affordable. Next to processing and communication, the actual sensing equipment is the third relevant technology. These three basic parts of a sensor node have to accompany by power supply. This requires, depending on application, high capacity batteries that last for long times, that is, have only a negligible self-discharge rate, and that can efficiently provide small amounts of current.
  • 26. . 1.5 Enabling technologies for wireless sensor networks MATRUSRI ENGINEERING COLLEGE To achieve low - power consumption at the node level, it is necessary to incorporate power awareness and energy optimization in hardware design for sensor networks. Power consumption can further be reduced through efficiently operating various system resources using some dynamic power management (DPM) technique •Ideally, a sensor node also has a device for energy scavenging, recharging the battery with energy gathered from the environment – solar cells or vibration-based power generation are conceivable options. Such a concept requires the battery to be efficiently chargeable with small amounts of current, which is not a standard ability
  • 27. 1. Discuss challenges and hurdles for wireless sensor networks. 2. Explain the historical background of sensor networks. 3. Various applications of wireless sensor networks. 4. Explain Industrial Automation 5. Discuss about Home Automation Assignment Question MATRUSRI ENGINEERING COLLEGE
  • 28. Questions & Answers MATRUSRI ENGINEERING COLLEGE S.NO QUESTION Blooms Taxonomy Level Course Outcome 1. Discuss challenges and hurdles for Wireless Sensor Networks L2 CO1 2. Explain the historical background of sensor networks. L2 CO1 3. Differences between wireless sensor networks and mobile ad hoc networks. L3 CO1 4. What are the different types of sensors L2 CO1 5. Various applications of wireless sensor networks L4 CO1 Short answer questions
  • 29. 4. L4 CO1 5. L2 CO1 Questions & Answers MATRUSRI ENGINEERING COLLEGE S.NO QUESTION Blooms Taxonomy Level Course Outcome 1. Explain smart home environment. L3 CO1 2. Discuss about Characteristic requirements for WSN L3 CO1 3. What are the Enabling Technologies for Wireless Sensor Networks, explain in detail L3 CO1 Long answer questions
  • 30. INTRODUCTION: UNIT-II: Architectures OUTCOMES: Build foundation for WSN by presenting challenges of wireless networking at various protocol layers MATRUSRI ENGINEERING COLLEGE A Wireless Sensor Network is one kind of wireless network includes a large number of circulating, self-directed, minute, low powered devices named sensor nodes called motes. These networks certainly cover a huge number of spatially distributed, little, battery-operated, embedded devices that are networked to caringly collect, process, and transfer data to the operators, and it has controlled the capabilities of computing & processing. Nodes are the tiny computers, which work jointly to form the networks.
  • 31. Contents: 2.1. Single-node architecture - hardware components, 2.2. Energy consumption of sensor nodes, 2.3. Operating systems and Execution environments 2.4. Network architecture - sensor network scenarios, 2.5. Optimization goals and figures of merit, gateway concepts. OUTCOMES Build foundation for WSN by presenting challenges of wireless networking at various protocol layers UNIT-II: Architectures MATRUSRI ENGINEERING COLLEGE
  • 32. CONTENTS: 2.1. Single-node architecture - hardware components, OUTCOMES: Study about architectures of wireless sensor networks MODULE-I MATRUSRI ENGINEERING COLLEGE
  • 33. 2.1. Single-node architecture - hardware components MATRUSRI ENGINEERING COLLEGE . •Controller A controller to process all the relevant data, capable of executing arbitrary code. •Memory Some memory to store programs and intermediate data; usually, different types of memory are used for programs and data. •Sensors and actuators The actual interface to the physical world: devices that can observe or control physical parameters of the environment. • Communication Turning nodes into a network requires a device for sending and receiving information over a wireless channel
  • 34. . 2.1. Single-node architecture - hardware components MATRUSRI ENGINEERING COLLEGE •The sensor node is a multi-functional, energy efficient wireless device. The applications of motes in industrial are widespread. •A collection of sensor nodes collects the data from the surroundings to achieve specific application objectives. •The communication between motes can be done with each other using transceivers. In a wireless sensor network, the number of motes can be in the order of hundreds/ even thousands. • In contrast with sensor networks, Ad Hoc networks will have fewer nodes without any structure. Power supply As usually no tethered power supply is available, some forms of batteries are necessary to provide energy. Sometimes, some form of recharging by obtaining energy from the environment is available as well (e.g. solar cells). Each of these components has to operate balancing the trade-off between as small an energy consumption as possible on the one hand and the need to ful-fil their tasks on the other hand. For example, both the communication device and the controller should be turned off as long as possible.
  • 35. 2.1. Single-node architecture - hardware components MATRUSRI ENGINEERING COLLEGE Hardware Components: Power supply  Microcontrollers vs Microprocessors, FPGAs and ASIC  Memory  Communication devices  Sensors & Actuators - Passive omni- directional sensors - Passive narrow- beam sensors - Active sensors - Actuators Memory The memory component is fairly straightforward. Evidently, there is a need for Random Access Memory (RAM) to store intermediate sensor readings, packets from other nodes, and so on. While RAM is fast, its main disadvantage is that it loses its content if power supply is interrupted. Program code can be stored in Read-Only Memory (ROM) or, more typically, in Electrically Erasable Programmable Read-Only Memory (EEPROM) or flash memory (the later being similar to EEPROM but allowing data to be erased or written in blocks instead of only a byte at a time).
  • 36. 2.1. Single-node architecture - hardware components MATRUSRI ENGINEERING COLLEGE Communication device: Choice of transmission medium The communication device is used to exchange data between individual nodes. In some cases, wired communication can actually be the method of choice and is frequently applied in many sensor Network like settings (using field buses like Profi-bus, LON, CAN, or others). The communication devices for these networks are custom off-the-shelf components. Transceivers For actual communication, both a transmitter and a receiver are required in a sensor node. The essential task is to convert a bit stream coming from a microcontroller (or a sequence of bytes or frames) and convert them to and from radio waves.  For practical purposes, it is usually convenient to use a device that combines these two tasks in a single entity. Such combined devices are called transceivers. Usually, half-duplex operation is realized since transmitting and receiving at the same time on a wireless medium is impractical in most cases (the receiver would only hear the own transmitter anyway).
  • 37. . 2.1. Single-node architecture - hardware components MATRUSRI ENGINEERING COLLEGE Transceiver tasks and characteristics To select appropriate transceivers, a number of characteristics should be taken into account. The most important ones are: Service to upper layer Power consumption and energy efficiency Carrier frequency and multiple channels State change times and energy Data rates Modulations Coding Noise figure The noise figure Gain Power efficiency Receiver sensitivity Range Blocking performance Out of band emission Carrier sense and RSSI Frequency stability and Voltage range
  • 38. . 2.1. Single-node architecture - hardware components MATRUSRI ENGINEERING COLLEGE A fairly common structure of transceivers is into the Radio Frequency (RF) front end and the baseband part: • The radio frequency front end performs analog signal processing in the actual radio frequency band, whereas • The baseband processor performs all signal processing in the digital domain and communicates with a sensor node’s processor or other digital circuitry.
  • 39. . Transceiver operational states: many transceivers can distinguish four operational states : Transmit in the transmit state, the transmit part of the transceiver is active and the antenna radiates energy. Receive in the receive state the receive part is active. 2.1. Single-node architecture - hardware components MATRUSRI ENGINEERING COLLEGE Idle A transceiver that is ready to receive but is not currently receiving anything is said to be in an idle state. Sleep In the sleep state, significant parts of the transceiver are switched off. There are transceivers offering several different sleep states, see reference for a discussion of sleep states for IEEE 802.11 transceivers. These sleep states differ in the amount of circuitry switched off and in the associated recovery times and startup energy
  • 40. . 2.1. Single-node architecture - hardware components MATRUSRI ENGINEERING COLLEGE Sensors and actuators Without the actual sensors and actuators, a wireless sensor network would be beside the point entirely. But as the discussion of possible application areas has already indicated, the possible range of sensors is vast. It is only possible to give a rough idea on which sensors and actuators can be used in a WSN Sensors Sensors can be roughly categorized into three categories Passive, omni-directional sensors Passive, narrow-beam sensors Active sensors
  • 41. . 2.1. Single-node architecture - hardware components MATRUSRI ENGINEERING COLLEGE Power supply of sensor nodes For untethered wireless sensor nodes, the power supply is a crucial system component. There are essentially two aspects: First, storing energy and providing power in the required form; second, attempting to replenish consumed energy by “scavenging” it from some node- external power source over time. Storing power is conventionally done using batteries. As a rough orientation, a normal AA battery stores about 2.2–2.5 Ah at 1.5 V. Storing energy: Batteries Traditional batteries Capacity Capacity under load Self-discharge Efficient recharging, Relaxation, Unconventional energy stores and DC–DC Conversion
  • 42. . 2.1. Single-node architecture - hardware components MATRUSRI ENGINEERING COLLEGE Energy scavenging Some of the unconventional energy stores described above – fuel cells, micro heat engines, radioactivity – convert energy from some stored, secondary form into electricity in a less direct and easy to use way than a normal battery would do. The entire energy supply is stored on the node itself – once the fuel supply is exhausted, the node fails. To ensure truly long-lasting nodes and wireless sensor networks, such a limited energy store is unacceptable. Rather, energy from a node’s environment must be tapped into and made available to the node – energy scavenging should take place. A MEMS device for converting vibrations to electrical energy, based on a variable capacitor .Reproduced by permission of IEEE
  • 43. CONTENTS: 2.2. Energy Consumption of sensor nodes 2.3. Operating systems and Execution environments OUTCOMES: To understand the concepts of energy scavenging and operating systems of WSN MODULE-2 MATRUSRI ENGINEERING COLLEGE
  • 44. . 2.2 Energy Consumption of Sensor Nodes MATRUSRI ENGINEERING COLLEGE At time t1, the decision whether or not a component (say, the microcontroller) is to be put into sleep mode should be taken to reduce power consumption from Pactive to Psleep. If it remains active and the next event occurs at time tevent, then a total energy of Eactive = Pactive(tevent − t1) has be spent uselessly idling. Putting the component into sleep mode, on the other hand, requires a time τdown until sleep mode has been reached; as a simplification, assume that the average power consumption during this phase is (Pactive + Psleep)/2. Then, Psleep is consumed until tevent. In total, τdown(Pactive + Psleep)/2 + (tevent − t1 − τdown)Psleep energy is required in sleep mode as opposed to (tevent − t1)Pactive when remaining active.
  • 45. . 2.2 Energy Consumption of Sensor Nodes MATRUSRI ENGINEERING COLLEGE Microcontroller energy consumption Basic power consumption in discrete operation states: Intel Strong ARM The Intel Strong ARM ,In normal mode, all parts of the processor are fully powered. Power consumption is up to 400 mW. • In idle mode, clocks to the CPU are stopped; clocks that pertain to peripherals are active. Any interrupt will cause return to normal mode. Power consumption is up to 100 mW. • In sleep mode, only the real-time clock remains active. Wakeup occurs after a timer interrupt and takes up to 160 ms. Power consumption is up to 50 μW. Energy per operation with dynamic power scaling on an Intel Strong ARM SA-1100
  • 46. MATRUSRI ENGINEERING COLLEGE 2.3 Operating systems and Execution Environments 1. Embedded operating systems: The traditional tasks of an operating system are controlling and protecting the access to resources (including support for input/output) and managing their allocation to different users as well as the support for concurrent execution of several processes and communication between these processes. 2. 2.Programming paradigms and application programming interfaces (concurrent programming): - Process-based concurrency - Event- based programming - Interfaces to the operating systems
  • 47. . 2.3 Operating systems and Execution Environments MATRUSRI ENGINEERING COLLEGE Event based programming model: Such an event handler can interrupt the processing of any normal code, but as it is very simple and short, it can be required to run to completion in all circumstances without noticeably disturbing other code Event handlers cannot interrupt each other (as this would in turn require complicated stack handling procedures) but are simply executed one after each other.
  • 48. CONTENTS: 2.4. Network architecture - sensor network scenarios, 2.5. Optimization goals and figures of merit, gateway concepts OUTCOMES: MODULE-3 MATRUSRI ENGINEERING COLLEGE To Discuss About network architecture and optimization goals with the figure of Merit Concepts
  • 49. . 2.4. Network architecture - sensor network scenarios MATRUSRI ENGINEERING COLLEGE Three types of sinks in a very simple single-hop sensor network Types of Sources and sinks: -Single hop versus Multi hop From the basics of radio communication and the inherent power limitation of radio communication follows a limitation on the feasible distance between a sender and a receiver. Because of this limited distance, the simple, direct communication between source and sink is not always possible, specifically in WSNs, which are intended to cover a lot of ground (e.g. in environmental or agriculture applications) or that operate in difficult radio environments with strong attenuation
  • 50. .Multi hop network: 2.4. Network architecture - sensor network scenarios MATRUSRI ENGINEERING COLLEGE To overcome such limited distances, an obvious way out is to use relay stations, with the data packets taking multi hops from the source to the sink. This concept of multi-hop networks is particularly attractive for WSNs as the sensor nodes themselves can act as such relay nodes, foregoing the need for additional equipment Depending on the particular application, the likelihood of having an intermediate sensor node at the right place can actually be quite high
  • 51. . 2.4. Network architecture - sensor network scenarios MATRUSRI ENGINEERING COLLEGE Multiple sources and/or multiple sinks In many cases, there are multiple sources and/or multiple sinks present. In the most challenging case, multiple sources should send information to multiple sinks, where either all or some of the information has to reach all or some of the sinks. Figure illustrates these combinations.
  • 52. . 2.4. Network architecture - sensor network scenarios MATRUSRI ENGINEERING COLLEGE Three types of Mobility  Node mobility  Sink mobility  Event mobility Communication protocols for WSNs will have to render appropriate support for these forms of mobility. In particular, event mobility is quite uncommon, compared to previous forms of mobile or wireless networks. A mobile sinks moves through a mobile sensor network as a information being retrieves on its behalf
  • 53. . 2.5. Optimization goals and figures of merit, gateway concepts MATRUSRI ENGINEERING COLLEGE For all these scenarios and application types, different forms of networking solutions can be found. The challenging question is how to optimize a network, how to compare these solutions, how to decide which approach better supports a given application, and how to turn relatively imprecise optimizing goals into measurable figures of merit? While a general answer appears impossible considering the large variety of possible applications, a few aspects are fairly evident 1. Quality of service - Event detection/reporting probability - Event classification error - Event detection delay - Missing reports - Approximation accuracy - Tracking accuracy 2. Energy efficiency - Energy/correctly received - Energy/reported event - Delay - N/w Life time 3. Scalability 4. Robustness
  • 54. MATRUSRI ENGINEERING COLLEGE Area of sensor nodes detecting an event-an elephant-that moves through the network along with the event source 2.5. Optimization goals and figures of merit, gateway concepts
  • 55. MATRUSRI ENGINEERING COLLEGE 2.5. Optimization goals and figures of merit, gateway concepts Need for Gate ways For practical deployment, a sensor network only concerned with itself is insufficient. The network rather has to be able to interact with other information devices, for example, a user equipped with a PDA moving in the coverage area of the network or with a remote user, trying to interact with the sensor network via the Internet (the standard example is to read the temperature sensors in one’s home while traveling and accessing the Internet via a wireless connection). Figure shows this networking scenario.
  • 56. . 2.5. Optimization goals and figures of merit, gateway concepts MATRUSRI ENGINEERING COLLEGE 1. WSN to Internet communication A sensor node wants to deliver an alarm message to some Internet host. The first problem to solve is akin to ad hoc networks, namely, how to find the gateway from within the network. Basically, a routing problem to a node that offers a specific service has to be solved, integrating routing and service discovery
  • 57. . 2.5. Optimization goals and figures of merit, gateway concepts MATRUSRI ENGINEERING COLLEGE 2. Internet to WSN communication The case of an Internet-based entity trying to access services of a WSN is even more challenging . This is fairly simple if this requesting terminal is able to directly communicate with the WSN, for example, a mobile requester equipped with a WSN transceiver, and also has all the necessary protocol components at its disposal In this case, the requesting terminal can be a direct part of the WSN and no particular treatment is necessary
  • 58. . 2.5. Optimization goals and figures of merit, gateway concepts MATRUSRI ENGINEERING COLLEGE 3. WSN tunneling In addition to these scenarios describing actual interactions between a WSN and Internet terminals, the gateways can also act as simple extensions of one WSN to another WSN. The idea is to build a larger, “virtual” WSN out of separate parts, transparently “tunneling” all protocol messages between these two networks and simply using the Internet as a transport network. This can be attractive, but care has to be taken not to confuse the virtual link between two gateway nodes with a real link; otherwise, protocols that rely on physical properties of a communication link can get quite confused.
  • 59. . Assignment Question MATRUSRI ENGINEERING COLLEGE 1. Write short notes on Berkeley Motes. 2. Explain single node architecture. 3. Explain Gateway concepts. 4. Explain network architecture and sensor network scenarios. 5. What is the function of controller in sensor node architecture.
  • 60. Short answer questions MATRUSRI ENGINEERING COLLEGE Questions & Answers S.NO QUESTION Blooms Taxonomy Level Course Outcome 1. What is the difference between single hop and multi- hop networks? L2 CO2 2. Short notes on transceiver task in sensor node architecture? L2 CO2 3. Explaining about programming challenge? L2 CO2 4. List of routing protocols L1 CO2 5. What is the need of gate way concepts L2 CO2
  • 61. Questions & Answers MATRUSRI ENGINEERING COLLEGE S.NO QUESTION Blooms Taxonomy Level Course Outcome 1. Explain network architecture and sensor network scenarios. L4 CO2 2. Explain about Gateway concepts. L3 CO2 3. Elaborate on Energy scavenging techniques for sensor node L4 CO2 4. Discuss about Optimization goals and Figure of merit L4 CO2 5. L2 CO2 Long answer questions
  • 62. INTRODUCTION: The physical layer is mostly concerned with modulation and demodulation of digital data; this task is carried out by so-called transceivers. In sensor networks, the challenge is to find modulation schemes and transceiver architectures that are simple, low cost, but still robust enough to provide the desired service. Medium Access Control (MAC) protocols is the first protocol layer above the Physical Layer (PHY) and consequently MAC protocols are heavily influenced by its properties. The fundamental task of any MAC protocol is to regulate the access of a number of nodes to a shared medium in such a way that certain application-dependent performance requirements are satisfied. UNIT-III: Physical Layer and MAC Protocols OUTCOMES: Study suitable protocols and radio hardware MATRUSRI ENGINEERING COLLEGE
  • 63. Contents: 3.1. physical layer and transceiver design considerations, 3.2. MAC protocols for wireless sensor networks, 3.3. Low duty cycle protocols and wakeup concepts - S-MAC, - Zigbee: IEEE 802.15.4 MAC layer, - the mediation device protocol, - wakeup radio concepts, 3.4. Address and name management, 3.5. Assignment of MAC addresses, 3.6. Routing protocols - Energy-efficient routing, - Geographic routing. OUTCOMES Study suitable protocols and radio hardware. UNIT-III: Physical Layer and MAC Protocols MATRUSRI ENGINEERING COLLEGE
  • 64. CONTENTS: Introduction 3.1 physical layer and transceiver design considerations 3.2. MAC protocols for wireless sensor networks OUTCOMES: Study suitable protocols and radio hardware MODULE-I MATRUSRI ENGINEERING COLLEGE
  • 65. In sensor networks, the challenge is to find modulation schemes and transceiver architectures that are simple, low cost, but still robust enough to provide the desired service. Wireless channel and communication fundamentals: 1. Frequency allocation 2. Modulation and demodulation 3. Wave propagation effects and noise - Reflection, diffraction, scattering, doppler fading - Path loss and attenuation - Noise and interference - Symbols and bit errors 4. Channel models 5. Spread-spectrum communications - Direct Sequence Spread Spectrum (DSSS) and - Frequency Hopping Spread Spectrum (FHSS) 6. Packet transmission and synchronization - Carrier synchronization - Bit/symbol synchronization - Frame synchronization INTRODUCTION MATRUSRI ENGINEERING COLLEGE
  • 66. Introduction: For actual communication, both a transmitter and a receiver are required in a sensor node. The essential task is to convert a bit stream coming from a and convert them to and from radio waves. For practical purposes, it is usually convenient to use a device that combines these two tasks in a single entity. Such combined devices are called “transceivers” 3.1. Physical Layer and Transceiver Design Considerations MATRUSRI ENGINEERING COLLEGE Some of the most crucial points influencing PHY design in wireless sensor networks are: • Low power consumption. • As one consequence: small transmit power and thus a small transmission range. • As a further consequence: low duty cycle. Most hardware should be switched off or operated in a low-power standby mode most of the time. • Comparably low data rates, on the order of tens to hundreds kilobits per second, required. • Low implementation complexity and costs. • Low degree of mobility. • A small form factor for the overall node
  • 67. In general, in sensor networks, the challenge is to find modulation schemes and transceiver architectures that are simple, low-cost but still robust enough to provide the desired service. 3.1. Physical Layer and Transceiver Design Considerations MATRUSRI ENGINEERING COLLEGE 1. Energy usage profile: The choice of a small transmit power leads to an energy consumption profile different from other wireless devices like cell phones. The radiated energy is small, typically on the order of 0 dBm (corresponding to 1mW). On the other hand, the overall transceiver (RF front end and baseband part) consumes much more energy than is actually radiated. A second key observation is that for small transmit powers the transmit and receive modes consume more or less the same power; it is even possible that reception requires more power than transmission. A third key observation is the relative costs of communications versus computation in a sensor node. Clearly, a comparison of these costs depends for the communication part on the BER requirements, range, transceiver type, and so forth, and for the computation part on the processor type, the instruction mix, and so on.
  • 68. 2. CHOICE OF MODULATION SCHEME: A crucial point is the choice of modulation scheme. Several factors have to be balanced here: the required and desirable data rate and symbol rate, the implementation complexity, the relationship between radiated power and target BER, and the expected channel characteristics. Table: Bandwidth efficiency ηBW and Eb/N0[dB] required at the receiver to reach a BER of 10−6 over an AWGN channel for m-ary orthogonal FSK and PSK 3.1. Physical Layer and Transceiver Design Considerations MATRUSRI ENGINEERING COLLEGE
  • 69. 3. Dynamic modulation scaling To determine the optimal scheme for a given combination of BER target, range, packet sizes and so forth, such an optimum is only valid for short time; as soon as one of the constraints changes, the optimum can change, too. In addition, other constraints like delay or the desire to achieve high throughput can dictate to choose higher modulation schemes. Therefore, it is interesting to consider methods to adapt the modulation scheme to the current situation. Such an approach, called dynamic modulation scaling. 4. Antenna considerations If the antenna is much smaller than the carrier’s wavelength, it is hard to achieve good antenna efficiency, that is, with ill-sized antennas one must spend more transmit energy to obtain the same radiated energy. with small sensor node cases, it will be hard to place two antennas with suitable distance to achieve receive diversity 3.1. Physical Layer and Transceiver Design Considerations MATRUSRI ENGINEERING COLLEGE
  • 70. Medium access control (MAC) protocols solve a seemingly simple task: they coordinate the times where a number of nodes access a shared communication medium an “un-overseeable” number of protocols have emerged in more than thirty years of research in this area. They differ, among others, in the types of media they use and in the performance requirements for which they are optimized. Medium Access Control (MAC) protocols is the first protocol layer above the Physical Layer (PHY) and consequently MAC protocols are heavily influenced by its properties. The fundamental task of any MAC protocol is to regulate the access of a number of nodes to a shared medium in such a way that certain application-dependent performance requirements are satisfied 3.2. MAC PROTOCOLS for WSN MATRUSRI ENGINEERING COLLEGE
  • 71. The most important performance requirements for MAC protocols are throughput , efficiency, stability, fairness, low access delay and low transmission delay as well as a low overhead The overhead in MAC protocols can result from per-packet overhead (MAC headers and trailers), collisions, or from exchange of extra control packets.  Collisions can happen if the MAC protocol allows two or more nodes to send packets at the same time. Collisions can result in the inability of the receiver to decode a packet correctly, causing the upper layers to perform a retransmission. For time-critical applications, it is important to provide deterministic or stochastic guarantees on delivery time or minimal available data rate. Sometimes, preferred treatment of important packets over unimportant ones is required, leading to the concept of priorities 3.2.Requirements and design constraints for wireless MAC protocols MATRUSRI ENGINEERING COLLEGE
  • 72. 3.2.Requirements and design constraints for wireless MAC protocols 1. Hidden Terminal Problem 2. Exposed terminal scenario we have three nodes A, B, and C that are arranged such that A and B are in mutual range, B and C are in mutual range, but A and C cannot hear each other. Assume that A starts to transmit a packet to B and some time later node C also decides to start a packet transmission. A carrier- sensing operation by C shows an idle medium since C cannot hear A’s signals. When C starts its packet, the signals collide at B and both packets are useless. MATRUSRI ENGINEERING COLLEGE
  • 73. Important classes of MAC protocols: 1.Fixed assignment protocols -TDMA, FDMA, CDMA, AND SDMA. 2.Demand assignment protocols -HIPERLAN/2 protocol -DQRUMA -MASCARA protocol -polling schemes 3. Random access protocols -CSMA protocols -non-persistent CSMA -persistent CSMA 3.2.Requirements and design constraints for wireless MAC protocols MATRUSRI ENGINEERING COLLEGE
  • 74. The RTS/CTS handshake as used in IEEE 802.11 is based on the MACAW protocol and it uses only a single channel and two special control packets. 3.2.Requirements and design constraints for wireless MAC protocols MATRUSRI ENGINEERING COLLEGE RTS/CTS handshake in IEEE 802.11
  • 75. Further problem of the RTS/CTS handshake is its significant overhead of two control packets per data packet, not counting the acknowledgment packet. If the data packet is small, this overhead might not pay off and it may be simpler to use some plain CSMA variant 3.2 Requirements and Design constraints for wireless MAC MATRUSRI ENGINEERING COLLEGE Two problems in RTS/CTS Handshake
  • 76. 3.2 MAC Protocols for WSN MATRUSRI ENGINEERING COLLEGE Balance of requirements Energy problems on the MAC layer -Collisions -Overhearing -Protocol overhead -Idle listening Structure -contention-based -schedule-based protocols
  • 77. Balance of requirements: 3.2 MAC Protocols for WSN MATRUSRI ENGINEERING COLLEGE The balance of requirements is different from traditional (wireless) networks. Additional requirements come up, first and foremost, the need to conserve energy. The importance of energy efficiency for the design of MAC protocols is relatively new and many of the “classical” protocols like ALOHA and CSMA contain no provisions toward this goal.  Other typical performance figures like fairness, throughput, or delay tend to play a minor role in sensor networks. Fairness is not important since the nodes in a WSN do not represent individuals competing for bandwidth, but they collaborate to achieve a common goal. The access/transmission delay performance is traded against energy conservation, and throughput is mostly not an issue either.
  • 78. CONTENTS: 3.2. MAC Protocol for wireless sensor networks 3.3. Low duty cycle protocols and wakeup concepts OUTCOMES: To presents the fundamentals of MAC protocols and explains the specific requirements and problems in wireless sensor networks. MODULE-2 MATRUSRI ENGINEERING COLLEGE
  • 79. 3.2 MAC Protocols for WSN MATRUSRI ENGINEERING COLLEGE Energy problems on the MAC layer Further important requirements for MAC protocols are scalability and robustness against frequent topology changes, as caused for example by nodes powering down temporarily to replenish their batteries by energy scavenging, mobility, deployment of new nodes, or death of existing nodes. The need for scalability is evident when considering very dense sensor networks with dozens or hundreds of nodes in mutual range. Nodes transceiver consumes a significant share of energy. Transceiver can be in one of the four main states : transmitting, receiving, idling, or sleeping. Transmitting is costly, receive costs often have the same order of magnitude as transmit costs, idling can be significantly cheaper but also about as expensive as receiving, and sleeping costs almost nothing but results in a “deaf” node.
  • 80. 3.2 MAC Protocols for WSN MATRUSRI ENGINEERING COLLEGE Collisions : Collisions incur useless receive costs at the destination node, useless transmit costs at the source node, and the prospect to expend further energy upon packet retransmission. Hence, collisions should be avoided, either by design (fixed assignment/TDMA or demand assignment protocols) or by appropriate collision avoidance/hidden- terminal procedures in CSMA protocols. Overhearing :  Uni-cast frames have one source and one destination node.  However, the wireless medium is a broadcast medium and all the source’s neighbors that are in receive state hear a packet and drop it when it is not destined to them; these nodes overhear the packet.  For higher node densities overhearing avoidance can save significant amounts of energy. On the other hand, overhearing is sometimes desirable.
  • 81. 3.2 MAC Protocols for WSN MATRUSRI ENGINEERING COLLEGE Protocol overhead :  Protocol overhead is induced by MAC-related control frames like, for example, RTS and CTS packets or request packets in demand assignment protocols, and furthermore by per-packet overhead like packet headers and trailers. Idle listening: A node being in idle state is ready to receive a packet but is not currently receiving anything. This readiness is costly and useless in case of low network loads; for many radio modems, the idle state still consumes significant energy. Switching off the transceiver is a solution; however, since mode changes also cost energy, their frequency should be kept at “reasonable” levels.
  • 82. 3.2 MAC Protocols for WSN MATRUSRI ENGINEERING COLLEGE Some other protocols are classified into either contention-based or schedule- based protocols. This distinction is to be understood by the number of possible contenders upon a transmit opportunity towards a receiver node:  In contention-based protocols , any of the receiver’s neighbors might try its luck at the risk of collisions. Accordingly, those protocols contain mechanisms to avoid collisions or to reduce their probability. In schedule-based protocols ,only one neighbor gets an opportunity and collisions are avoided. These protocols have a TDMA component, which provides also an implicit idle listening avoidance mechanism: when a node knows its allocated slots and can be sure that it communicates (transmits/receives) only in these slots, it can safely switch off its receiver at all other times
  • 83. . 3.3. Low duty cycle protocols and wakeup concepts MATRUSRI ENGINEERING COLLEGE Low duty cycle protocols try to avoid spending (much) time in the idle state and to reduce the communication activities of a sensor node to a minimum. In an ideal case, the sleep state is left only when a node is about to transmit or receive packets. To achieve this WAKEUP RADIO Concept is introduced. In several protocols, a periodic wakeup scheme is used. Such schemes exist in different flavors. This approach, nodes spend most of their time in the sleep mode and wake up periodically to receive packets from other nodes. Specifically, a node A listens onto the channel during its listen period and goes back into sleep mode when no other node takes the opportunity to direct a packet to A.
  • 84. • . 3.3. Low duty cycle protocols and wakeup concepts MATRUSRI ENGINEERING COLLEGE By choosing a small duty cycle, the transceiver is in sleep mode most of the time, avoiding idle listening and conserving energy. • By choosing a small duty cycle, the traffic directed from neighboring nodes to a given node concentrates on a small time window (the listen period) and in heavy load situations significant competition can occur. • Choosing a long sleep period induces a significant per-hop latency, since a prospective transmitter node has to wait an average of half a sleep period before the receiver can accept packets. In the multi-hop case, the per-hop latencies add up and create significant end-to-end latencies. • Sleep phases should not be too short lest the start-up costs outweigh the benefits There is also a periodic wakeup but nodes can both transmit and receive during their wakeup phases. When nodes have their wakeup phases at the same time, there is no necessity for a node wanting to transmit a packet to be awake outside these phases to rendezvous its receiver.
  • 85. . 3.2 Sparse topology and energy management (STEM) MATRUSRI ENGINEERING COLLEGE The Sparse Topology and Energy Management (STEM) protocol does not cover all aspects of a MAC protocol but provides a solution for the idle listening problem STEM duty cycle for a single node STEM targets networks that are deployed to wait for and report on the behavior of a certain event.
  • 86. MATRUSRI ENGINEERING COLLEGE The S-MAC (Sensor-MAC) protocol provides mechanisms to circumvent idle listening, collisions, and overhearing. As opposed to STEM, it does not require two different channels. S-MAC (Sensor –MAC) S-MAC principle
  • 87. . MATRUSRI ENGINEERING COLLEGE S-MAC (Sensor –MAC) S-MAC adopts a periodic wakeup scheme, that is, each node alternates between a fixed-length listen period and a fixed-length sleep period according to its schedule, as opposed to STEM, the listen period of S-MAC can be used to receive and transmit packets.  S-MAC attempts to coordinate the schedules of neighboring nodes such that their listen periods  Start at the same time. A node x’s listen period is subdivided into three different phases: . • In the first phase (SYNCH phase), • In the second phase (RTS phase), • In the third phase (CTS phase),
  • 88. S-MAC (Sensor –MAC) MATRUSRI ENGINEERING COLLEGE S-MAC fragmentation and NAV setting
  • 89. 3.2 The Mediation device protocol MATRUSRI ENGINEERING COLLEGE The mediation device protocol is compatible with the peer-to-peer communication mode of the IEEE 802.15.4 low-rate WPAN standard. It allows each node in a WSN to go into sleep mode periodically and to wake up only for short times to receive packets from neighbor nodes. There is no global time reference, each node has its own sleeping schedule, and does not take care of its neighbors sleep schedules
  • 90. 3.2 The Mediation device protocol MATRUSRI ENGINEERING COLLEGE  Upon each periodic wakeup, a node transmits a short query beacon, indicating its node address and its willingness to accept packets from other nodes. The node stays awake for some short time following the query beacon, to open up a window for incoming packets. If no packet is received during this window, the node goes back into sleep mode.  Dynamic synchronization  Mediation device (MD) The dynamic synchronization approach achieves this synchronization without requiring the transmitter to be awake permanently to detect the destinations query beacon. To achieve this, a mediation device (MD) is used.
  • 91. . 3.3 Wakeup radio concepts MATRUSRI ENGINEERING COLLEGE  The ideal situation would be if a node were always in the receiving state when a packet is transmitted to it, in the transmitting state when it transmits a packet, and in the sleep state at all other times; the idle state should be avoided.  The wakeup radio concept strives to achieve this goal by a simple, “powerless” receiver that can trigger a main receiver if necessary  One proposed wakeup MAC protocol assumes the presence of several parallel data channels, separated either in frequency (FDMA) or by choosing different codes in a CDMA schemes. A node wishing to transmit a data packet randomly picks one of the channels and performs a carrier sensing operation. If the channel is busy, the node makes another random channel choice and repeats the carrier-sensing operation.  After a certain number of unsuccessful trials, the node backs off for a random time and starts again.
  • 92. 3.2 Wakeup radio concepts MATRUSRI ENGINEERING COLLEGE If the channel is idle, the node sends a wakeup signal to the intended receiver, indicating both the receiver identification and the channel to use. The receiver wakes up its data transceiver, tunes to the indicated channel, and the data packet transmission can proceed. Afterward, the receiver can switch its data transceiver back into sleep mode. This wakeup radio concept has the significant advantage that only the low-power wakeup transceiver has to be switched on all the time while the much more energy consuming data transceiver is non sleeping if and only if the node is involved in data transmissions.  Furthermore, this scheme is naturally traffic adaptive, that is, the MAC becomes more and more active as the traffic load increases. Periodic wakeup schemes do not have this property. There are also some drawbacks. First, to our knowledge, there is no real hardware yet for such an ultralow power wakeup transceiver. Second, the range of the wakeup radio and the data radio should be the same. If the range of the wakeup radio is smaller than the range of the data radio, possibly not all neighbor nodes can be woken up.
  • 93. CONTENTS: 3.2. IEEE 802.15.4 MAC protocol OUTCOMES: To understand about IEEE 80.15.4 MAC protocols and architecture MODULE-3 MATRUSRI ENGINEERING COLLEGE
  • 94. 3.2 IEEE 802.15.4 MAC protocol MATRUSRI ENGINEERING COLLEGE IEEE finalized the IEEE 802.15.4 standard in October 2003 ,the standard covers the physical layer and the MAC layer of a low-rate Wireless Personal Area Network (WPAN). Zig-Bee uses the services offered by IEEE 802.15.4 and adds network construction (star networks, peer-to-peer/ mesh networks, cluster-tree networks), security, application services, and more. The targeted applications for IEEE 802.15.4 are in the area of wireless sensor networks, home automation, home networking, connecting devices to a PC, home security, and so on. Most of these applications require only low-to-medium bitrates (up to some few hundreds of kbps), moderate average delays without too stringent delay guarantees, and for certain nodes it is highly desirable to reduce the energy consumption to a minimum.
  • 95. . 3.2 IEEE 802.15.4 MAC protocol MATRUSRI ENGINEERING COLLEGE The physical layer offers:  Bitrates of 20 kbps (a single channel in the frequency range 868–868.6 MHz),  40 kbps (ten channels in the range between 905 and 928 MHz) and 250 kbps (16 channels in the 2.4 GHz ISM band between 2.4 and 2.485 GHz with 5- MHz spacing between the center frequencies).  There are a total of 27 channels available,  But the MAC protocol uses only one of these channels at a time;  It is not a multichannel protocol.  The MAC protocol combines both schedule-based as well as contention-based schemes
  • 96. . IEEE 802.15.4 MAC Protocol: Network architecture and types/roles of nodes: 3.2 IEEE 802.15.4 MAC protocol MATRUSRI ENGINEERING COLLEGE The standard distinguishes on the MAC layer two types of nodes: • A Full Function Device (FFD) can operate in three different roles: it can be a PAN coordinator (PAN = Personal Area Network), a simple coordinator or a device. • A Reduced Function Device (RFD) can operate only as a device. Network architecture and types/roles of nodes Super-frame structure GTS management Data transfer procedures Slotted CSMA-CA protocol Non-beaconed mode
  • 97. 3.2 IEEE 802.15.4 MAC protocol MATRUSRI ENGINEERING COLLEGE 1.Network architecture and types/roles of nodes: A device must be associated to a coordinator node (which must be a FFD) and communicates only with this, this way forming a star network. Coordinators can operate in a peer-to-peer fashion and multiple coordinators can form a Personal Area Network (PAN). The PAN is identified by a 16-bit PAN Identifier and one of its coordinators is designated as a PAN coordinator. A coordinator handles among others the following tasks: It manages a list of associated devices. It allocates short addresses to its devices. In the beaconed mode of IEEE 802.15.4, it transmits regularly frame beacon packets announcing the PAN identifier, a list of outstanding frames, and other parameters. It exchanges data packets with devices and with peer coordinators.
  • 98. . 3.2 IEEE 802.15.4 MAC protocol MATRUSRI ENGINEERING COLLEGE 2. Super frame structure: Super frame structure of IEEE 802.15.4 The coordinator of a star network operating in the beaconed mode organizes channel access and data transmission with the help of a super frame. All super frames have the same length. The coordinator starts each super frame by sending a frame beacon packet. The frame beacon includes a super frame specification describing the length of the various components of the following super frame: 1. Active period 2. Inactive period. The active period is subdivided into 16 time slots. The first time slot is occupied by the beacon frame and the remaining time slots 1. CAP 2. GTSs
  • 99. . 3.3 IEEE 802.15.4 MAC protocol MATRUSRI ENGINEERING COLLEGE 3. GTS management: The coordinator allocates GTS to devices only when the latter send appropriate request packets during the CAP. One flag in the request indicates whether the requested time slot is a transmit slot or a receive slot. In a transmit slot, the device transmits packets to the coordinator and in a receive slot the data flows in the reverse direction. Another field in the request specifies the desired number of contiguous time slots in the GTS phase. The coordinator answers the request packet in two steps: An immediate acknowledgment packet confirms that the coordinator has received the request packet properly but contains no information about success or failure of the request. After receiving the acknowledgment packet, the device is required to track the coordinator’s beacons for some specified time (called Agts DescPersistence Time).
  • 100. 3.3 IEEE 802.15.4 MAC protocol MATRUSRI ENGINEERING COLLEGE 4. Data transfer procedures: Device wants to transmit a data packet to the coordinator, If the device has an allocated transmit GTS, it wakes up just before the time slot starts and sends its packet immediately without running any carrier-sense or other collision-avoiding operations. However, the device can do so only when the full transaction consisting of the data packet and an immediate acknowledgment sent by the coordinator as well as appropriate Inter Frame Spaces (IFSs) fit into the allocated time slots. The other case is a data transfer from the coordinator to a device. If the device has allocated a receive GTS and when the packet/acknowledgment/IFS cycle fits into these, the coordinator simply transmits the packet in the allocated time slot without further coordination. The device has to acknowledge the data packet.
  • 101. 3.3 IEEE 802.15.4 MAC protocol MATRUSRI ENGINEERING COLLEGE Handshake between coordinator and device when the device retrieves a packet When the coordinator is not able to use a receive GTS: The coordinator announces a buffered packet to a device by including the devices address into the pending address field of the beacon frame. The device’s address is included as long as the device has not retrieved the packet or a certain timer has expired.  When the device finds its address in the pending address field, it sends a special data request packet during the CAP. The coordinator answers this packet with an acknowledgment packet and continues with sending the data packet
  • 102. • 5. Slotted CSMA-CA protocol: 3.3 IEEE 802.15.4 MAC protocol MATRUSRI ENGINEERING COLLEGE  Nodes have to send data or management/control packets during the CAP, they use a slotted CSMA protocol. The protocol contains no provisions against hidden- terminal situations.  For Example there is no RTS/CTS handshake. To reduce the probability of collisions, the protocol uses random delays; it is thus a CSMA-CA protocol. The time slots making up the CAP are subdivided into smaller time slots, called back-off periods.
  • 103. . 3.3 IEEE 802.15.4 MAC protocol MATRUSRI ENGINEERING COLLEGE 6. Non-beaconed mode: The IEEE 802.15.4 protocol offers a Non-beaconed mode besides the beaconed mode. Some important differences between these modes are the following: 1. In the non-beaconed mode, the coordinator does not send beacon frames nor is there any GTS mechanism. 2. All packets from devices are transmitted using an un slotted (because of the lack of time synchronization) CSMA-CA protocol. 3. Coordinators must be switched on constantly but devices can follow their own sleep schedule. 4. Devices wake up for two reasons: (i) to send a data/control packet to the coordinators, or (ii) to fetch a packet destined to itself from the coordinator by using the data request/acknowledgment/ data/acknowledgment handshake
  • 104. CONTENTS: 3.3. Address and name management 3.4. Assignments for WSN OUTCOMES: To study about address , management and Assignments for WSN MODULE-4 MATRUSRI ENGINEERING COLLEGE
  • 105. . 3.3. Address and name management MATRUSRI ENGINEERING COLLEGE Naming and addressing are two fundamental issues in networking. Names are used to denote things (for example, nodes, data, transactions). Addresses supply the information needed to find these things. Use of addresses and names in (sensor) networks: In most computer and sensor networks, the following types of names, addresses, and identifiers can be found: 1. Unique Node Identifier(UID) 2. MAC address 3. Network address 4. Network identifiers 5. Resource identifiers The fundamental tasks of address management, which are independent of the type of addresses: 1. Address allocation 2. Address de-allocation 3. Address representation 4. Conflict detection/resolution 5. Binding
  • 106. . 3.3. Address and name management MATRUSRI ENGINEERING COLLEGE Example for network partition Any address management scheme for sensor and ad hoc networks is occasionally faced with network partitions and network merge events. Uniqueness of addresses: The following uniqueness requirements for network names and addresses. 1. Globally unique 2. Network wide unique 3. Locally unique
  • 107. . 3.3. Address and name management in wireless sensor networks MATRUSRI ENGINEERING COLLEGE MAC addresses are indispensable if the MAC protocol shall employ overhearing avoidance and go into sleep mode as often as possible. However, do MAC addresses need to be globally or network wide unique. since the scope of a MAC protocol is communication between neighboring nodes and it is sufficient that addresses are locally unique within a two-hop neighborhood. This requirement ensures that no two neighbors of a selected node have the same MAC address It is not really necessary in wireless sensor networks since after all the whole network is not a collection of individual nodes belonging to individual users but the nodes collaborate to process signals and events from the physical environment. The users ultimately are interested in the data and not in the individual or groups of nodes delivering them, the data can also influence the operation of protocols, which is the essence of data-centric networking. Data-centric or content-based addressing schemes are important.
  • 108. 3.4. Assignment of MAC addresses MATRUSRI ENGINEERING COLLEGE The assignment of globally unique MAC addresses is undesirable in sensor networks with mostly small packets. An a priori assignment of network wide unique addresses is feasible only if it can be done with reasonable effort. But there is still the problem that the overhead to represent addresses can be considerable although not as large as in globally unique addresses Dynamic and distributed assignment of network wide and local addresses. Node randomly picks an address from a given address range and hopes that this address is unique. This address range is given by the integers between 0 and 2m − 1 and an address can thus be represented with m bits. The address space has a size of n = 2m addresses. A node chooses its address without any prior information, in which case it is best to use a uniform distribution on the address range since this has maximum entropy.
  • 109. CONTENTS: 3.5. Routing protocols OUTCOMES: To discusses mechanisms for routing and forwarding when the destination of a packet is identified by a unique node identifier. MODULE-5 MATRUSRI ENGINEERING COLLEGE
  • 110. . 3.5. Routing protocols MATRUSRI ENGINEERING COLLEGE In a multi hop network, intermediate nodes have to relay packets from the source to the destination node.  Such an intermediate node has to decide to which neighbor to forward an incoming packet not destined for itself.  Typically, routing tables that list the most appropriate neighbor for any given packet destination are used.  The construction and maintenance of these routing tables is the crucial task of a distributed routing protocol A simple example of routing in a multi-hop network – node S sends packets to node D
  • 111. .1. Energy-efficient uni-cast: 3.5. Routing protocols MATRUSRI ENGINEERING COLLEGE Various example routes for communication between nodes A and H, showing energy costs per packet for each link and available battery capacity for each node Energy-efficient uni-cast routing appears to be a simple problem: take the network graph, assign to each link a cost value that reflects the energy consumption across this link, and pick any algorithm that computes least-cost paths in a graph.
  • 112. . 3.5. Routing protocols MATRUSRI ENGINEERING COLLEGE There are various aspects how energy or power efficiency can be conceived of in a routing context: Minimize energy per packet Maximize network lifetime - Time until the first node fails. - Time until there is a spot that is not covered by the network (loss of coverage, a useful metric only for redundantly deployed networks). - Time until network partition (when there are two nodes that can no longer communicate with each other) Routing considering available battery energy - Maximum Total Available Battery Capacity - Minimum Battery Cost Routing (MBCR) - Min–Max Battery Cost Routing (MMBCR) - Conditional Max–Min Battery Capacity Routing (CMMBCR) - Minimize variance in power levels Minimum Total Transmission Power Routing (MTPR)
  • 113. The idea behind the relatively large class of geographic routing protocols is twofold: 1. For many applications, it is necessary to address physical locations, for example, as “any node in a given region” or “the node at/closest to a given point”. When such Requirements exist, they have to be supported by a proper routing scheme. 3.5. Routing protocols MATRUSRI ENGINEERING COLLEGE 2. Geographic Routing: When the position of source and destination is known as are the positions of intermediate nodes, this information can be used to assist in the routing process. To do so, the destination node has to be specified either geographically (as above) or as some form of mapping – a location service – between an otherwise specified destination (e.g. by its identifier) and its (conjectured) current position is necessary
  • 114. 3.5. Routing protocols- Geographic Routing: MATRUSRI ENGINEERING COLLEGE Basics of position-based routing Simple greedy geographic forwarding Most forward within r:
  • 115. . 3.5. Routing protocols- Geographic Routing: MATRUSRI ENGINEERING COLLEGE Nearest with forward progress Directional routing The problem of dead ends Restricted flooding Right-hand rule to recover greedy routing – GPSR Performance guarantees of combined greedy/face routing Combination with ID-based routing, hierarchies Randomized forwarding and adaptive node activity – GeRaF Geographic routing without positions – GEM Simple greedy geographic forwarding fails in presence of obstacles
  • 116. 3.5. Routing protocols- Geographic Routing: MATRUSRI ENGINEERING COLLEGE Example for GPSR Illustrates how a packet would be routed from node A to node Z.  While at node A, the packet can be greedily forwarded to node D. At node D, greedy forwarding fails , so the packet has to be routed around the perimeter of the interior face defined by BFGCD.
  • 117. 3.5. Routing protocols- Geographic Routing: MATRUSRI ENGINEERING COLLEGE Geo-casting Geo-casting – sending data to a subset of nodes that are located in an indicated region is evidently an example of multicasting and thus would not require any further attention. Similar to the case of position-based routing, position information of the designated region and the intermediate nodes can be exploited to increase efficiency Location Based Multicast: -Static zone - Adaptive zone - Adaptive distances Finding the right direction Tessellating the plane Mesh-based geo-casting Geo-casting using a uni-cast protocol – GeoTORA Trajectory-based forwarding (TBF)
  • 118. . Assignment Question MATRUSRI ENGINEERING COLLEGE 1. Explain in detail about S-MAC Protocol 2. Briefly explain IEEE 802.15.4 MAC Layer. 3. Explain Low duty cycle protocols. 4. What are differences between Zigbee and Bluetooth Technology? 5. Explain sparse topology and energy management protocol.
  • 119. Short answer questions MATRUSRI ENGINEERING COLLEGE Questions & Answers S.NO QUESTION Blooms Taxonomy Level Course Outcome 1. List the factors that are required for PHY design of WSN L1 CO3 2. What are the design issues for a routing protocol of WSNs L1 CO3 3. Write short notes on GEAR protocol L1 CO3 4. Define contention based protocols. L1 CO3 5. Briefly explain energy efficient routing L2 CO3
  • 120. Questions & Answers MATRUSRI ENGINEERING COLLEGE S.NO QUESTION Blooms Taxonomy Level Course Outcome 1. Explain Physical Layer and Transceiver Design Considerations. L2 CO3 2. Discuss about IEEE 802.15.4 MAC Layer. L4 CO3 3. How MAC Address Assignment I done in sensor networks L2 CO3 4. Briefly explain the wakeup radio concepts L2 CO3 5. Explain in detail about any two routing protocols for WSNs. L2 CO3 Long answer questions
  • 121. INTRODUCTION: UNIT-IV: INFRASTRUCTURE ESTABLISHMENT OUTCOMES: To understand the performance of sensor network and identify bottlenecks. MATRUSRI ENGINEERING COLLEGE • In a densely deployed wireless network, a single node has many neighboring nodes with which direct communication would be possible when using sufficiently large transmission power. This is, however, not necessarily beneficial: high transmission power requires lots of energy, many neighbors are a burden for a MAC protocol, and routing protocols suffer from volatility in the network when nodes move around and frequently form or sever many links. • To overcome these problems, topology control can be applied. The idea is to deliberately restrict the set of nodes that are considered neighbors of a given node. This can be done by controlling transmission power, by introducing hierarchies in the network and signaling out some nodes to take over certain coordination tasks, or by simply turning off some nodes for a certain time.
  • 122. Contents: 4.1. Topology control, clustering, 4.2. Time synchronization, 4.3. localization and positioning, 4.4. sensor tasking and control. 4.5. Operating systems for wireless sensor networks, 4.6. sensor node hardware – berkeley motes, 4.7 programming challenges, 4.8. Node-level software platforms, node-level simulators, state-centric programming OUTCOMES UNIT-IV: INFRASTRUCTURE ESTABLISHMENT MATRUSRI ENGINEERING COLLEGE To evaluate the performance of sensor network and identify bottlenecks.
  • 123. CONTENTS: 4.1. Topology control, clustering, OUTCOMES: To know the basics of topology and clustering of network MODULE-I MATRUSRI ENGINEERING COLLEGE
  • 124. . 4.1. Topology control, clustering MATRUSRI ENGINEERING COLLEGE In a very dense networks, too many nodes might be in range for an efficient operation • Too many collisions/too complex operation for a MAC protocol, too many paths to choose from for a routing protocol. Idea: Make topology less complex • Topology: Which node is able/allowed to communicate with which other nodes • Topology control needs to maintain invariants, e.g., connectivity •A sensor network node that first wakes up executes a protocol to discover which other nodes it can communicate with (bi directionally). •This set of neighbors is determined by the radio power of the nodes as well as the local topography and other conditions that may degrade radio links
  • 125. 4.1. Topology control, clustering MATRUSRI ENGINEERING COLLEGE Options for Topology control •The problem of topology control for a sensor network is how to set the radio range for each node so as to minimize energy usage, while still ensuring that the communication graph of the nodes remains connected and satisfies other desirable communication properties.
  • 126. Alternative: Selectively discard some links • Usually done by introducing hierarchies 4.1. Topology control, clustering MATRUSRI ENGINEERING COLLEGE Flat Networks: Main option: Control transmission power • Do not always use maximum power • Selectively for some links or for a node as a whole • Topology looks “thinner” • Less interference.
  • 127. . Hierarchical networks – backbone: 4.1. Topology control, clustering MATRUSRI ENGINEERING COLLEGE Construct a backbone network •Some nodes “control” their neighbors – they form a (minimal) dominating set •Each node should have a controlling neighbor.  Controlling nodes have to be connected (backbone)  Only links within backbone and from backbone to controlled neighbors are used
  • 128. 4.1. Topology control, clustering MATRUSRI ENGINEERING COLLEGE Aspects of topology-control algorithms: Connectivity – If two nodes connected in G, they have to be connected in G0 resulting from topology control Stretch factor – should be small Hop stretch factor: how much longer are paths in G0 than in G? Energy stretch factor: how much more energy does the most energy-efficient path need? Throughput – removing nodes/links can reduce throughput, by how much? Robustness to mobility Algorithm overhead
  • 129. . 4.1. Topology control, clustering MATRUSRI ENGINEERING COLLEGE  Construct clusters  Partition nodes into groups (“clusters”)  Each node in exactly one group • Except for nodes “bridging” between two or more groups  Groups can have cluster heads  Typically: all nodes in a cluster are direct neighbors of their cluster head  Cluster heads are also a dominating set, but should be separated from each other – they form an independent set  Formally: Given graph G=(V,E), construct C ½ V such that
  • 130. 4.1. Topology control, clustering MATRUSRI ENGINEERING COLLEGE  Further options  How do clusters communicate? Some nodes need to act as gateways between clusters. If clusters may not overlap, two nodes need to jointly act as a distributed gateway Partition nodes into groups of nodes – Clusters  Many options for details  Are there cluster heads? – One controller/representative node per cluster  May cluster heads be neighbors? If no: cluster heads form an independent set C: Typically: cluster heads form a maximum independent set  May clusters overlap?  Do they have nodes in common?
  • 131. . Maximum independent set: 4.1. Topology control, clustering MATRUSRI ENGINEERING COLLEGE  Computing a maximum independent set is NP-complete  Can be approximate within ( +3)/5 for small , within ( log log  / log ) else;  bounded degree Show: A maximum independent set is also a dominating set  Maximum independent set not necessarily intuitively desired solution  Example: Radial graph, with only (v0,vi) 2 E
  • 132. . 4.1. Topology control, clustering MATRUSRI ENGINEERING COLLEGE •Use some attribute of nodes to break local symmetries. •Node identifiers, energy reserve, mobility, weighted combinations… - matters not for the idea as such (all types of variations have been looked at). •Make each node a cluster head that locally has the largest attribute value. •Once a node is dominated by a cluster- head, it abstains from local competition, giving other nodes a chance. Determining gateways to connect clusters: Rotating cluster heads • Multi-hop clusters • Passive clustering •Adaptive node activity
  • 133. CONTENTS: 4.2. Time synchronization, OUTCOMES: To discusses the time synchronization problem in wireless sensor networks MODULE-2 MATRUSRI ENGINEERING COLLEGE
  • 134. 4.2. Time synchronization MATRUSRI ENGINEERING COLLEGE Time is an important aspect for many applications and protocols found in wireless sensor networks. Nodes can measure time using local clocks, driven by oscillators. Because of random phase shifts and drift rates of oscillators, the local time reading of nodes would start to differ – they loose synchronization – without correction The time synchronization problem is a standard problem in distributed systems. Ex: Determination of angle of arrival of a distant sound event by an array of acoustic sensors
  • 135. 4.2. Time synchronization MATRUSRI ENGINEERING COLLEGE There are at least two ways to get a more reliable estimate. The first one (and the one focused on in this chapter) is to keep the sensors clocks as tightly synchronized as possible, using dedicated time synchronization algorithms. The second one is to combine the readings of multiple sensors and to “average out” the estimation errors It is important to note that the time needed in sensor networks should adhere to physical time, that is two sensor nodes should have the same idea about the duration of 1 s and additionally a sensor node’s second should come as close as possible to 1 s of real time or coordinated universal time (UTC). The physical time has to be distinguished from the concept of logical time that allows to determine the ordering of events in a distributed system but does not necessarily show any correspondence to real time.
  • 136. Node Clocks and the Problem of Accuracy: -Oscillator - Counter Register - Hardware clock -Software clock 4.2. Time synchronization MATRUSRI ENGINEERING COLLEGE Properties and structure of time synchronization algorithms; Physical time Vs Logical time External Vs Internal Synchronization Global Vs Local Absolute Vs Relative Hardware Vs soft ware A priori Vs A posteriori Deterministic Vs Stochastic Local clock update discipline performance metrics: Precision Energy Costs Memory requirements Fault tolerance
  • 137. . 4.2. Time synchronization MATRUSRI ENGINEERING COLLEGE Time synchronization in wireless sensor networks: •An algorithm must scale to large mult-ihop networks of unreliable and severely energy-constrained nodes. • The scalability requirement refers to both the number of nodes as well as to the average node degree/node density. • The precision requirements can be quite diverse, ranging from microseconds to seconds. • The use of extra hardware only for time synchronization purposes is mostly ruled out because of the extra cost and energy penalties incurred by dedicated circuitry. • The degree of mobility is low. • There are mostly no fixed upper bounds for packet delivery delay. • The propagation delay between neighboring nodes is negligible. • Manual configuration of single nodes is not an option. • It will turn out that the accuracy of time synchronization algorithms critically depends on the delay between the reception of the last bit of a packet and the time when it is time stamped.
  • 138. CONTENTS: 4.3 Localization and Positioning 4.4 operating systems for wireless sensor networks OUTCOMES: To discuss the operating systems for wireless sensor networks and and objectives for a WSN operating system. MODULE-3 MATRUSRI ENGINEERING COLLEGE
  • 139. 4.3 Localization and Positioning MATRUSRI ENGINEERING COLLEGE In many circumstances, it is useful or even necessary for a node in a wireless sensor network to be aware of its location in the physical world. Properties of localization and positioning procedures: Physical position versus symbolic location Absolute versus relative coordinates Localized versus centralized computation Accuracy and precision Scale Limitations Costs
  • 140. 4.3 Localization and Positioning MATRUSRI ENGINEERING COLLEGE Possible Approaches: 1. Proximity 2. Trilateration and Triangulation 3. Scene Analysis Determining the position of sensor nodes with the assistance from some anchor points; not all nodes are necessarily in contact with all anchors
  • 141. . 4.3 Localization and Positioning MATRUSRI ENGINEERING COLLEGE Positioning in Multi hop Environment: 1. Connectivity in multihop network 2. Multihop range estimation 3. Iterative and collabrative mutilateraion 4. Probabilistic Positioning description and propagation
  • 142. 4.3 Localization and Positioning MATRUSRI ENGINEERING COLLEGE
  • 143. 4.3 Localization and Positioning MATRUSRI ENGINEERING COLLEGE
  • 144. . 4.4 Operating Systems for Wireless Sensor Networks MATRUSRI ENGINEERING COLLEGE WSNs can be used to monitor and/or control physical environment in a space where it is difficult or impossible to do so manually. A WSN is generally composed of a centralized station (sink) and tens, hundreds, or perhaps thousands of tiny sensor nodes such as Mote and Mica2 . WSNs are a special type of distributed network system that is similar to database, real-time, and embedded systems. The basic function of WSNs is to collect information and to support certain applications specific to the task of WSN deployment. Commercially available sensor nodes are categorized into four groups:
  • 145. 4.4 Operating Systems for Wireless Sensor Networks MATRUSRI ENGINEERING COLLEGE 1. Specialized sensing platforms such as the Spec node designed at the University of California–Berkeley. 2. Generic sensing platforms such as Berkeley motes 3. High-bandwidth sensing platforms such as iMote 4. Gateway platforms such as Stargate The differences in the sensor types above are in the function of the sensor, frequency of the microprocessor, memory size, and transceiver bandwidth. Although these nodes have different characteristics, their basic hardware components are the same: a physical sensor, a microprocessor or microcontroller, a memory, a radio transceiver, and a battery. Each sensor node needs an operating system (OS) that can control the hardware, Provide hardware abstraction to application software, and fill in the gap between applications and the underlying hardware
  • 146. . 4.4 Operating Systems for Wireless Sensor Networks MATRUSRI ENGINEERING COLLEGE Operating system design issues: Traditional operating systems are system software, including programs that manage computing resources, control peripheral devices, and provide software abstraction to the application software. Traditional OS functions are therefore to manage processes, memory, CPU time, file system, and devices.. This is often implemented in a modular and layered fashion, including a lower layer of kernels and a higher layer of system libraries. Traditional OSs are not suitable for wireless sensor networks because WSNs have constrained resources and diverse data-centric applications, in addition to a variable topology. WSNs need a new type of operating system, considering their special characteristics.
  • 147. 4.4 Operating Systems for Wireless Sensor Networks MATRUSRI ENGINEERING COLLEGE Operating system design issues: 1. Process management and scheduling 2.Memory management 3. kernel model 4. Application program interface (API). 5. Code upgrade and reprogramming Sensor operating systems (SOS) should embody the following functions: 1. Should be compact and small in size since the sensor nodes have very small memory. 2. Should provide real-time support, since there are real-time applications, especially when actuators are involved 3. Should provide efficient resource management mechanisms in order to allocate microprocessor time and limited memory. 4. Should support reliable and efficient code distribution since the functionality performed by the sensor nodes may need to be changed after deployment. 5. Should support power management, which helps to extend the system lifetime and improve its performance. 6. Should provide a generic programming interface up to sensor middleware or application software.
  • 148. . 4.4 Operating Systems for Wireless Sensor Networks MATRUSRI ENGINEERING COLLEGE Examples of Operating Systems: 1. TinyOS 2 .Mate, 3 .MagnetOS, 4 .MANTIS, 5 .OSPM 6 .EYES OS 7 .SenOS, 8 .EMERALDS 9 . PicOS The major issues for the design of operation systems for WSNs are size (memory requirement), energy-efficient IPCs and task scheduling, effective code distribution and upgrades, and finally, generic application programming interfaces.
  • 149. . TinyOS: 4.4 Operating Systems for Wireless Sensor Networks MATRUSRI ENGINEERING COLLEGE The design of tinyos allows application software to access hardware directly when required. Tinyos is a tiny microthreaded OS that attempts to address two issues: how to guarantee concurrent data flows among hardware devices, and how to provide modularized components with little processing and storage overhead. TinyOS uses an event-based model to support high levels of concurrent application in a very small amount of memory. It includes a tiny scheduler and a set of components. The scheduler schedules operation of those components. Each component consists of four parts: command handlers, event handlers, an encapsulated fixed-size frame, and a group of tasks.
  • 150. CONTENTS: 4.5 Sensor Node architecture 4.6 Programming Challenges OUTCOMES: To explaining about architecture of sensor node and challenges MODULE-3 MATRUSRI ENGINEERING COLLEGE
  • 151. . 4.5 Sensor Node Hardware MATRUSRI ENGINEERING COLLEGE Sensor node hardware can be grouped into three categories, each of which entails a different set of trade-offs in the design choices: 1.Augmented general-purpose computers Ex: low power PCs, embedded PCs (e.g., PC104), custom-designed PCs and various personal digital assistants (PDA). 2. Dedicated embedded sensor nodes Ex: Berkeley mote family , the UCLA Medusa family , Ember nodes, and MIT μAMP 3. System-on-chip (SoC) nodes Ex: smart dust , the BWRC pico radio node , and the PASTA node Among these hardware platforms, the Berkeley motes, due to their small form factor, open source software development, and commercial availability, have gained wide popularity in the sensor network research community.
  • 152. 4.5 Sensor Node Hardware-Berkeley Motes MATRUSRI ENGINEERING COLLEGE The Berkeley motes are a family of embedded sensor nodes sharing roughly the same architecture. A comparison of Berkeley motes
  • 153. MICA MOTE: MICA motes have a two-CPU design 4.5 Sensor Node Hardware-Berkeley Motes MATRUSRI ENGINEERING COLLEGE MCU: an Atmel ATmega103L -512 KB flash memory -4 KB of data memory TR1000 chip set: -operating at 916 MHz - Max 50 kbps raw data rate -40 kbps transmission rate supports a 51 pin I/O A sensor/ actuator board can host : -a temperature sensor, - a light sensor, - an accelerometer, - a magnetometer, - a microphone, and - a beeper serial I/O (UART)
  • 154. The energy consumption of various components on a MICA mote. 4.5 Sensor Node Hardware-Berkeley Motes MATRUSRI ENGINEERING COLLEGE A Radio transmission bears the maximum power consumption. Another observation is that there are huge differences among the power consumption levels in the active mode, the idle mode, and the suspend mode of the MCU
  • 155. Traditional programming technologies rely on operating systems to provide abstraction for processing, I/O, networking, and user interaction hardware 4.6. Programming Challenges MATRUSRI ENGINEERING COLLEGE Traditional embedded system programming interface
  • 156. 4.6 Programming Challenges MATRUSRI ENGINEERING COLLEGE When applying traditional model to programming networked embedded systems, such as sensor networks, the application programmers need to explicitly deal with:  message passing, event synchronization,  interrupt handing, and sensor reading An application is typically implemented as a finite state machine (FSM) that covers all extreme cases: unreliable communication channels,  long delays, irregular arrival of messages, simultaneous events
  • 157. 4.6 Programming Challenges MATRUSRI ENGINEERING COLLEGE For resource-constrained Embedded systems with real-time requirements, several mechanisms are used in embedded operating systems to  reduce code size,  improve response time, and  reduce energy consumption Embedded operating systems tend to expose more hardware controls to the programmers, who now have to directly face device drivers and scheduling algorithms, and optimize code at the assembly level. Although these techniques may work well for small, stand-alone embedded systems, they do not scale up for the Programming of sensor networks for two reasons: 1. Sensor networks are large-scale distributed systems, where global properties are derivable from program execution in a massive number of distributed nodes. 2. As sensor nodes deeply embed into the physical world, a sensor network should be able to respond to multiple concurrent stimuli at the speed of changes of the physical phenomena of interest.
  • 158. CONTENTS: 4.7. Node-level software platforms 4.8. Node- level simulator 4.9 Sate centric Programming OUTCOMES: To understand the concepts of node-level software and simulations MODULE-4 MATRUSRI ENGINEERING COLLEGE
  • 159. 4.7. Node-level software platforms MATRUSRI ENGINEERING COLLEGE Most design methodologies for sensor network software are node centric, where programmers think in terms of how a node should behave in the environment.  A node-level platform can be a node centric operating system, which provides hardware and networking abstractions of a sensor node to programmers, or it can be a language platform, which provides a library of components to programmers. Typical operating system abstracts the hardware platform by providing a set of services for applications, including -file management, -memory allocation, -task scheduling, -peripheral device drivers, and -networking.
  • 160. 4.7. Node-level software platforms MATRUSRI ENGINEERING COLLEGE Operating System: TinyOS TinyOS aims at supporting sensor network applications on resource constrained hardware platforms, such as the Berkeley motes. To ensure that an application code has an extremely small footprint, TinyOS chooses to have no file system, supports only static memory allocation, implements a simple task model, and provides minimal device and networking abstractions
  • 161. . 4.7. Node-level software platforms MATRUSRI ENGINEERING COLLEGE The Field Monitor application for sensing and sending measurements
  • 162. 4.8 Node-Level Simulators MATRUSRI ENGINEERING COLLEGE Node-level design methodologies are usually associated with simulators that simulate the behavior of a sensor network on a per-node basis. Using simulation, designers can quickly study the performance (in terms of timing, power, bandwidth, and scalability) of potential algorithms without implementing them on actual hardware and dealing with the vagaries of actual physical phenomena. A node-level simulator typically has the following components: Sensor node model Communication model Physical environment model: Statistics and visualization A sensor network simulator simulates the behavior of a subset of the sensor nodes with respect to time. Depending on how the time is advanced in the simulation, there are two types of execution models: Cycle-driven simulation (CD) and Discrete-event simulation (DE)
  • 163. . 4.8 Node-Level Simulators MATRUSRI ENGINEERING COLLEGE A Cycle-driven (CD) simulation discretizes the continuous notion of real time into (typically regularly spaced) ticks and simulates the system behavior at these ticks. At each tick, the physical phenomena are first simulated, and then all nodes are checked to see if they have anything to sense, process, or communicate. A Discrete-event (DE) simulator assumes that the time is continuous and an event may occur at any time. An event is a 2-tuple with a value and a time stamp indicating when the event is supposed to be handled. There is no general CD simulator that fits all sensor network simulation tasks. We have come across a number of homegrown simulators written in Matlab, Java, and C++ Many of them are developed for particular applications and exploit application-specific assumptions to gain efficiency.
  • 164. . 4.8 Node-Level Simulators MATRUSRI ENGINEERING COLLEGE DE simulations are sometimes considered as good as actual implementations, because of their continuous notion of time and discrete notion of events. There are several open-source or commercial simulators available. One class of these simulators comprises extensions of classical network simulators, such as  ns-2,  J-Sim (previously known as JavaSim), and GloMoSim/QualNet.8 (The focus of these simulators is on network modeling, protocols stacks, and simulation performance). Another class of simulators, sometimes called softwarein-the-loop simulators, incorporate the actual node software into the simulation. For this reason, they are typically attached to particular hardware platforms and are less portable. Examples in TOSSIM for Berkeley motes and Em* (pronounced em star) for Linux-based nodes such as Sensoria WINS NG platforms
  • 165. Ns-2 simulator and its sensor network extensions: 4.8 Node-Level Simulators-NS 2 MATRUSRI ENGINEERING COLLEGE The simulator ns-2 is an open-source network simulator that was originally designed for wired, IP networks. Extensions have been made to simulate Wireless/mobile networks (e.g., 802.11 MAC and TDMA MAC) and more recently sensor networks. While the original ns-2 only supports logical addresses for each node, the wireless/mobile extension of it introduces the notion of node locations and a simple wireless channel model. This is not a trivial extension, since once the nodes move, the simulator needs to check for each physical layer event whether the destination node is within the communication range. For a large network, this significantly slows down the simulation speed.
  • 166. MATRUSRI ENGINEERING COLLEGE 4.8 Node-Level Simulators There are at least two efforts to extend ns-2 to simulate sensor networks: 1. SensorSim from UCLA9 and 2. NRL sensor network extension from the Navy Research Laboratory SensorSim aims at providing an energy model for sensor nodes and communication, so that power properties can be simulated . It also supports hybrid simulation. NRL sensor network extension provides a flexible way of modeling physical phenomena in a discrete event simulator. Physical phenomena are modeled as network nodes which communicate with real nodes through physical layers. The receiving nodes simply have a sensor stack parallel to the network stack that processes these events.
  • 167. 4.8 Node-Level Simulators MATRUSRI ENGINEERING COLLEGE The main functionality of ns-2 is implemented in C++, while the dynamics of the simulation (e.g., time-dependent application characteristics) is controlled by Tcl scripts. Basic components in ns-2 are the layers in the protocol stack. They implement the handlers interface, indicating that they handle events. Events are communication packets that are passed between consecutive layers within one node, or between the same layers across nodes. Advantage of ns-2 is its rich libraries of protocols for nearly all network layers and for many routing mechanisms. TCP: reno, tahoe, vegas, and SACK implementations • MAC: 802.3, 802.11, and TDMA • Ad hoc routing: DSDV,DSR, AODV routing, and TORA • Sensor network routing: Directed diffusion, geographical routing (GEAR) and geographical adaptive fidelity (GAF) routing.
  • 168. . 4.8 Node-Level Simulators-TOSSIM MATRUSRI ENGINEERING COLLEGE TOSSIM is a dedicated simulator for TinyOS applications running on one or more Berkeley motes. The key design decisions on building TOSSIM were to make it scalable to a network of potentially thousands of nodes, and to be able to use the actual software code in the Simulation. To achieve these goals, TOSSIM takes a cross-compilation approach that compiles the nesC source code into components in the simulation The event-driven execution model of TinyOS greatly simplifies the design of TOSSIM. By replacing a few low-level components, such as the A/D conversion (ADC), the system clock, and the radio front end, TOSSIM translates hardware interrupts into discrete event simulator events. The simulator event queue delivers the interrupts that drive the execution of a node. The upper-layer TinyOS code runs unchanged.