SlideShare a Scribd company logo
NETWORK MANAGEMENT
FOR
WIRELESS SENSOR
NETWORKS
Pertemuan 07
Oleh Albert Sagala
INTRODUCTION
• In this chapter we first briefly introduce
traditional network management models,
then identify issues and requirements of a
network management system for WSNs and
present an existing network management
architecture. Issues of naming and localization
as they relate to WSN management are also
discussed.
ABS/NETWORK MANAGEMENT FOR WSN 2
NETWORK MANAGEMENT
REQUIREMENTS
ABS/NETWORK MANAGEMENT FOR WSN 3
TRADITIONAL NETWORK
MANAGEMENT MODELS
• Simple Network Management Protocol
– The simple network management protocol (SNMP) for
managing networks is in broad use today. It includes three
components: a network management system NMS),
managed elements, and agents. NMS is a set of
applications that monitor and/or control managed
elements. It can request management information (or
attributes) from the agent and present the results to NM
users in the form of figures or tables. It can also set
attributes within the agent.
• Telecom Operation Map
• Neither SNMP nor TOM is designed particularly for
wireless sensor networks.
ABS/NETWORK MANAGEMENT FOR WSN 4
EXAMPLE OF MANAGEMENT
ARCHITECTURE: MANNA
ABS/NETWORK MANAGEMENT FOR WSN 5
NETWORK MANAGEMENT DESIGN
ISSUES
• WSN is a special type of wireless network,
possibly with ad hoc structure and probably
with limited resources. Due to these WSN
constraints, networking protocols, the
application model, middleware, and sensor
node operating systems should be designed
very carefully. Network management for
WSNs is required to use those limited
resources effectively and efficiently.
ABS/NETWORK MANAGEMENT FOR WSN 6
Network management is much more important for
WSNs than for traditional networks for the following
reasons:
1. In order to deploy an adaptive and resource-
efficient algorithm in WSNs, the current
resource level needs to be gathered through
network management. For example, the
power availability should be known before
switching a sensor node from active (or
sleep) mode to sleep (or active) mode. Most
traditional networks do not have these
requirements.
ABS/NETWORK MANAGEMENT FOR WSN 7
2. Most WSN applications need to know the
coverage area so that they ensure that the
entire space is being monitored. Topology
management can be used in case an uncovered
area is detected. Generally, there are three
approaches to increasing the coverage area: (1)
increase the node’s radio power, (2) increase
the density of deployment of senor nodes, and
(3) move the sensor nodes around to achieve
equal distribution.
ABS/NETWORK MANAGEMENT FOR WSN 8
3. Nodes in WSNs are usually arranged in an ad
hoc manner. The parameters of this ad hoc
network are obtained by the network
management system.
4. Collaboration and cooperation between
sensor nodes are required to optimize system
performance. Network management is an
effective tool to provide the platform required
for this purpose.
ABS/NETWORK MANAGEMENT FOR WSN 9
OTHER ISSUES RELATED TO NETWORK
MANAGEMENT
ABS/NETWORK MANAGEMENT FOR WSN 10
Naming
• A node in a networked system is identified through naming.
This identifier is then used for communication between
nodes. Generally, there are two traditional approaches to
naming: low level and high level. Low-level naming such as
node addresses is typically application independent but
topology and location dependent.
• On the other hand, high-level naming is usually application
dependent and location independent. High-level naming is
built on the top of low-level naming.
• Communication between applications uses high-level
naming only, whereas physical communication relies on
low-level naming.
ABS/NETWORK MANAGEMENT FOR WSN 11
• For example, the domain name system (DNS)
in the Internet uses two types of naming: a
domain name and an IP address. The domain
name is used by applications such as Internet
browers, and the IP address is used by routing
protocol to guarantee packet forwarding.
ABS/NETWORK MANAGEMENT FOR WSN 12
Localization
• Sensor nodes are distributed all over the place for sensing and
data collection. It is usually helpful if the locations of sensor
nodes are also known. Advantages of this knowledge are that
(1) some applications, such as those for tracking of objects,
are highly location dependent; (2) location-based routing,
which may also result in energy conservation is enabled; (3)
knowledge of location usually enhances security; (4) locations
are helpful for sensor network management and monitoring;
(5) locations stimulate the creation of new applications; (6)
sensor nodes that move can be controlled through knowledge
of their location; and (7) for applications with low-level
naming and/or data-centric WSNs, knowledge of location
information is absolutely necessary.
ABS/NETWORK MANAGEMENT FOR WSN 13

More Related Content

Similar to network management_WSN ppt_group 35.pdf

WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
Murtadha Alsabbagh
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
IRJET Journal
 
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed SurveyComparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
theijes
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networks
Auwal Amshi
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
KhushbooGupta145
 
De3211001104
De3211001104De3211001104
De3211001104
IJMER
 
Efficient Cluster Head Selection in Wireless Sensor Networks.
Efficient Cluster Head Selection in Wireless  Sensor Networks.Efficient Cluster Head Selection in Wireless  Sensor Networks.
Efficient Cluster Head Selection in Wireless Sensor Networks.
Sanjay Shelar
 
SDN and it’s Application in Wireless Mesh Network
SDN and it’s Application in Wireless Mesh NetworkSDN and it’s Application in Wireless Mesh Network
SDN and it’s Application in Wireless Mesh Network
Milap Bhanderi
 
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor NetworkAggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
ijsrd.com
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing Protocol
IJRES Journal
 
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A ReviewEnhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
IRJET Journal
 
Direct_studies_report13
Direct_studies_report13Direct_studies_report13
Direct_studies_report13
Farhad Gholami
 
A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor Network
IJMER
 
WSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptxWSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptx
RamprakashSingaravel1
 
WSN_Chapter _1.pptx
WSN_Chapter _1.pptxWSN_Chapter _1.pptx
WSN_Chapter _1.pptx
KamakshiMB1
 
Es24906911
Es24906911Es24906911
Es24906911
IJERA Editor
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
ijwmn
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
Braj Raj Singh
 
A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsn
Ayman Adel
 

Similar to network management_WSN ppt_group 35.pdf (20)

WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
 
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed SurveyComparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networks
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
 
De3211001104
De3211001104De3211001104
De3211001104
 
Efficient Cluster Head Selection in Wireless Sensor Networks.
Efficient Cluster Head Selection in Wireless  Sensor Networks.Efficient Cluster Head Selection in Wireless  Sensor Networks.
Efficient Cluster Head Selection in Wireless Sensor Networks.
 
SDN and it’s Application in Wireless Mesh Network
SDN and it’s Application in Wireless Mesh NetworkSDN and it’s Application in Wireless Mesh Network
SDN and it’s Application in Wireless Mesh Network
 
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor NetworkAggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing Protocol
 
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A ReviewEnhancing Data Transmission and Protection in Wireless Sensor Node- A Review
Enhancing Data Transmission and Protection in Wireless Sensor Node- A Review
 
Direct_studies_report13
Direct_studies_report13Direct_studies_report13
Direct_studies_report13
 
A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor Network
 
WSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptxWSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptx
 
WSN_Chapter _1.pptx
WSN_Chapter _1.pptxWSN_Chapter _1.pptx
WSN_Chapter _1.pptx
 
Es24906911
Es24906911Es24906911
Es24906911
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsn
 

Recently uploaded

P5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civilP5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civil
AnasAhmadNoor
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
2. protection of river banks and bed erosion protection works.ppt
2. protection of river banks and bed erosion protection works.ppt2. protection of river banks and bed erosion protection works.ppt
2. protection of river banks and bed erosion protection works.ppt
abdatawakjira
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
uqyfuc
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
Mechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineeringMechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineering
sachin chaurasia
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
ijseajournal
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
mahaffeycheryld
 
Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...
cannyengineerings
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
AI-Based Home Security System : Home security
AI-Based Home Security System : Home securityAI-Based Home Security System : Home security
AI-Based Home Security System : Home security
AIRCC Publishing Corporation
 
smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...
um7474492
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
ijaia
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
Dwarkadas J Sanghvi College of Engineering
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
Kamal Acharya
 

Recently uploaded (20)

P5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civilP5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civil
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
2. protection of river banks and bed erosion protection works.ppt
2. protection of river banks and bed erosion protection works.ppt2. protection of river banks and bed erosion protection works.ppt
2. protection of river banks and bed erosion protection works.ppt
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
Mechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineeringMechatronics material . Mechanical engineering
Mechatronics material . Mechanical engineering
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
 
Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...Pressure Relief valve used in flow line to release the over pressure at our d...
Pressure Relief valve used in flow line to release the over pressure at our d...
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
AI-Based Home Security System : Home security
AI-Based Home Security System : Home securityAI-Based Home Security System : Home security
AI-Based Home Security System : Home security
 
smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
 

network management_WSN ppt_group 35.pdf

  • 2. INTRODUCTION • In this chapter we first briefly introduce traditional network management models, then identify issues and requirements of a network management system for WSNs and present an existing network management architecture. Issues of naming and localization as they relate to WSN management are also discussed. ABS/NETWORK MANAGEMENT FOR WSN 2
  • 4. TRADITIONAL NETWORK MANAGEMENT MODELS • Simple Network Management Protocol – The simple network management protocol (SNMP) for managing networks is in broad use today. It includes three components: a network management system NMS), managed elements, and agents. NMS is a set of applications that monitor and/or control managed elements. It can request management information (or attributes) from the agent and present the results to NM users in the form of figures or tables. It can also set attributes within the agent. • Telecom Operation Map • Neither SNMP nor TOM is designed particularly for wireless sensor networks. ABS/NETWORK MANAGEMENT FOR WSN 4
  • 5. EXAMPLE OF MANAGEMENT ARCHITECTURE: MANNA ABS/NETWORK MANAGEMENT FOR WSN 5
  • 6. NETWORK MANAGEMENT DESIGN ISSUES • WSN is a special type of wireless network, possibly with ad hoc structure and probably with limited resources. Due to these WSN constraints, networking protocols, the application model, middleware, and sensor node operating systems should be designed very carefully. Network management for WSNs is required to use those limited resources effectively and efficiently. ABS/NETWORK MANAGEMENT FOR WSN 6
  • 7. Network management is much more important for WSNs than for traditional networks for the following reasons: 1. In order to deploy an adaptive and resource- efficient algorithm in WSNs, the current resource level needs to be gathered through network management. For example, the power availability should be known before switching a sensor node from active (or sleep) mode to sleep (or active) mode. Most traditional networks do not have these requirements. ABS/NETWORK MANAGEMENT FOR WSN 7
  • 8. 2. Most WSN applications need to know the coverage area so that they ensure that the entire space is being monitored. Topology management can be used in case an uncovered area is detected. Generally, there are three approaches to increasing the coverage area: (1) increase the node’s radio power, (2) increase the density of deployment of senor nodes, and (3) move the sensor nodes around to achieve equal distribution. ABS/NETWORK MANAGEMENT FOR WSN 8
  • 9. 3. Nodes in WSNs are usually arranged in an ad hoc manner. The parameters of this ad hoc network are obtained by the network management system. 4. Collaboration and cooperation between sensor nodes are required to optimize system performance. Network management is an effective tool to provide the platform required for this purpose. ABS/NETWORK MANAGEMENT FOR WSN 9
  • 10. OTHER ISSUES RELATED TO NETWORK MANAGEMENT ABS/NETWORK MANAGEMENT FOR WSN 10
  • 11. Naming • A node in a networked system is identified through naming. This identifier is then used for communication between nodes. Generally, there are two traditional approaches to naming: low level and high level. Low-level naming such as node addresses is typically application independent but topology and location dependent. • On the other hand, high-level naming is usually application dependent and location independent. High-level naming is built on the top of low-level naming. • Communication between applications uses high-level naming only, whereas physical communication relies on low-level naming. ABS/NETWORK MANAGEMENT FOR WSN 11
  • 12. • For example, the domain name system (DNS) in the Internet uses two types of naming: a domain name and an IP address. The domain name is used by applications such as Internet browers, and the IP address is used by routing protocol to guarantee packet forwarding. ABS/NETWORK MANAGEMENT FOR WSN 12
  • 13. Localization • Sensor nodes are distributed all over the place for sensing and data collection. It is usually helpful if the locations of sensor nodes are also known. Advantages of this knowledge are that (1) some applications, such as those for tracking of objects, are highly location dependent; (2) location-based routing, which may also result in energy conservation is enabled; (3) knowledge of location usually enhances security; (4) locations are helpful for sensor network management and monitoring; (5) locations stimulate the creation of new applications; (6) sensor nodes that move can be controlled through knowledge of their location; and (7) for applications with low-level naming and/or data-centric WSNs, knowledge of location information is absolutely necessary. ABS/NETWORK MANAGEMENT FOR WSN 13