SlideShare a Scribd company logo
LOW POWER WIRELESS SENSOR
NETWORK
Shikha yadav
12EJTEC075
ECE, 5th sem
1
CONTENTS
 Introduction
 Definition
 Example of WSN
 Types of WSN
 Characteristics of a
WSN
 Power saving protocols
for WSN
 Applications
 Challenges
 Advantages
 Disadvantages
 Future Scope
 Conclusion 2
INTRODUCTION
3
 Low power wireless sensor Networks are
networks that consists of sensors which are
distributed in an ad hoc manner.
 These sensors work with each other to sense
some physical phenomenon and then the
information gathered is processed to get relevant
results.
 Low power Wireless sensor networks consists of
protocols and algorithms with self-organizing
capabilities.
CONTINUED.........
 Sensor networks are highly distributed networks of small,
lightweight wireless node, deployed in large numbers to
monitor the environment or system.
 Each node of the sensor networks consist of three subsystem:
 Sensor subsystem: senses the environment
 Processing subsystem: performs local computations on the
sensed data
 Communication subsystem: responsible for message exchange
with neighboring sensor nodes
 The features of sensor nodes
 Limited sensing region, processing power, energy
4
5
DEFINITION
Low power Wireless Sensor Networks :
Highly distributed networks of small, lightweight wireless
nodes,
Deployed in large numbers,
Monitors the environment or system by measuring phys
parameters such as temperature, pressure, humidity.
Node:
sensing + processing + communication
6
EXAMPLE OF LPWSN
TYPES OF WIRELESS SENSOR NETWORKS
7
 Dense collection of nodes
 Ad-hoc
deployment
 Difficulty in network
maintenance
 Few and scarcely
distributed nodes
 Pre-planned deployment
 Lower network
maintenance
Unstructured WSN Structured WSN
CHARACTERISTICS OF A LPWSN
1. Self – Organization
2. Concurrency processing
3. Low cost
4. Restricted energy resources
5. Tiny
6. Small radio range 8
9
POWER SAVING PROTOCOLS
THERE ARE SOME PROTOCOLS WHICH IS USED
FOR POWER SAVING……..
 Unified Network Protocol Framework (UNPF)
 Low-Energy Adaptive Clustering Hierarchy
(LEACH)
 MAC PROTOCOL
 NETWORK LAYER
 BATTERY MODEL
and some other…
10
LAYERED ARCHITECTURE
 A single powerful base station
(BS)
 Layers of sensor nodes around
BS
 Layer i: All nodes i-hop away
from BS
 Applications:
 In-building: BS is an access point
 Military
 Short-distance, low power tt tx
11
UNIFIED NETWORK PROTOCOL
FRAMEWORK (UNPF)
 A layered architecture
 A set of protocols
 Integrates three operations:
 Network Initialization & Maintenance Protocol
 MAC Protocol
 Routing Protocol
12
UNIFIED NETWORK PROTOCOL
FRAMEWORK (UNPF)
 Network Initialization & Maintenance Protocol:
 BS broadcasts its ID using CDMA common control channel
(BS reaches all nodes in one hop)
 Nodes record BS ID & send beacon signal with their own
IDs at their low default power levels
 All nodes the BS can hear are at 1-hop distance
 The BS broadcasts a control packet with all layer one node
IDs
 All nodes send a beacon signal again
 The layer one nodes record the IDs they hear-layer 2
 The layer one nodes inform the BS of the layer 2
 The BS broadcasts the layer2 nodes IDs,…
 To maintain: periodic beaconing updates are required
13
POWER SAVING MODE
 Turning the transceiver off may not always be
efficient. Operation in a power-saving mode is
energy-efficient only if the time spent in that mode
is greater than a certain threshold
MULTIPLE HOPS
 Using several short hops may be more energy
efficient than using one large hop.
14
CLUSTERED ARCHITECTURE
 A clustered architecture organizes the sensor nodes into clusters, each
governed by a cluster-head. The nodes in each cluster are involved in
message exchanges with their cluster-heads, and these heads send message
to a BS.
 Clustered architecture is useful for sensor networks because of its inherent
suitability for data fusion. The data gathered by all member of the cluster
can be fused at the cluster-head, and only the resulting information needs to
be communicated to the BS.
 The cluster formation and election of cluster-heads must be an autonomous,
distributed process.
15
CLUSTERED ARCHITECTURE
16
LOW-ENERGY ADAPTIVE CLUSTERING HIERARCHY
(LEACH)
 Self-organizing and adaptive clustering protocol
 Evenly distributes the energy expenditure among
the sensors
 Performs data aggregation where cluster heads
act as aggregation points
 Two main phases:
 Setup phase: organizing the clusters
 Steady-state phase: deals with the actual data
transfers to the BS
17
 Setup phase:
 Each sensor chooses a random number m between 0 and 1
 If m < T(n) for node n, the node becomes a cluster-head where
 P : the desired percentage of cluster heads
 r : the round number
 G : the set of nodes that have not been cluster heads during the last
1 / P rounds
 A cluster head advertises its neighbors using a CSMA MAC.
 Surrounding nodes decide which cluster to join based on the signal
strength of these messages
 Cluster heads assign a TDMA schedule for their members
1 [ * mod(1/ )]( )
0 ,
P
if n G
P r PT n
otherwise


 


18
 Steady-state phase:
 All source nodes send their data to their cluster heads
 Cluster heads perform data aggregation/fusion through
local transmission
 Cluster heads send them back to the BS using a single
direct transmission
 After a certain period of time, cluster heads are selected
again through the set-up phase
19
LOW-ENERGY ADAPTIVE CLUSTERING
HIERARCHY (LEACH)
 Merits:
 Accounting for adaptive clusters and rotating cluster
heads
 Opportunity to implement any aggregation function at
the cluster heads
 Demerits:
 Highly dynamic environments
 Continuous updates
 Mobility
20
MAC PROTOCOL
 During the data transmission phase, the distributed TDMA
receiver oriented channel (DTROC) assignment MAC protocol
is used.
 Two steps of DTROC :
 Channel allocation : Each node is assigned a reception channel
by the BS, and channel reuse is such that collisions are avoided.
 Channel scheduling : The node schedules transmission slots for
all its neighbors and broadcasts the schedule. This enables
collision-free transmission and saves energy, as nodes can turn
off when they are not involved on a send/receive operation.
THERE ARE THREE TYPES OF MAC
PROTOCOLS
 Fixed-allocation
 Demand-based
 Contention-based
21
22
 Fixed-allocation MAC protocol
 Share the common medium through a predetermined assignment.
 It is suitable for sensor network that continuously monitor and
generate deterministic data traffic
 Provide a bounded delay for each node
 However, in the case of bursty traffic, where the channel
requirements of each node may vary over time, it may lead to
inefficient usage of the channel.
23
 Demand-based MAC protocol
 Used in such cases, where the channel is allocated according to
the demand of the node
 Variable rate traffic can be efficiently transmitted
 Require the additional overhead of a reservation process
 Contention-based MAC protocol
 Random-access-based contention for the channel when packets
need to be transmitted
 Suitable for bursty traffic
 Collisions and no delay guarantees, are not suitable for delay-
sensitive or real-time traffic
24
HYBRID TDMA/FDMA
 A pure TDMA scheme minimize the time for which a node has to be
kept on, but the associated time synchronization cost are very high.
 A pure FDMA scheme allots the minimum required bandwidth for
each connection
 If the transmitter consumes more power, a TDMA scheme is favored,
since it can be switch off in idle slots to save power.
 If the receiver consumes greater power, a FDMA scheme is favored,
because the receiver need not expend power for time
synchronization.
NETWORK LAYER
25
APPLICATIONS OF LPWSN
 Area monitoring
 Health care monitoring
 Air pollution monitoring
 Forest fire detection
 Landslide detection
 Water quality monitoring
 Natural disaster prevention
 Industrial monitoring
26
27
 Facility management
 Intrusion detection into industrial sites
 Control of leakages in chemical plants, …
 Machine surveillance and preventive maintenance
 Embed sensing/control functions into places no cable
has gone before
 E.g., tire pressure monitoring
 Precision agriculture
 Bring out fertilizer/pesticides/irrigation only where
needed
 Medicine and health care
 Post-operative or intensive care
 Long-term surveillance of chronically ill patients or the
elderly
CHALLENGES
 Hardware :
1. Low cost
2. Tiny sensors
3. Lifetime maximization
4. Robustness and fault tolerance
5. Self-configuration
 Software :
1. Operating systems
2. Security
3. Mobility
28
ADVANTAGES OF A WSN
 Avoids a lot of wiring
 Can accommodate new devices at any time
 Flexible to go through physical partitions
 It can be accessed through a centralized monitor
 Infrastructure
29
DISADVANTAGES OF WSN
 Easy for hackers to hack a network
 Comparatively low speed of communication
 Gets distracted by various elements
 Costly at large
 Life of nodes
 Energy life 30
FUTURE SCOPE
 More research work needs to be done in future.
 Needs to be implemented in a wireless sensor network
with mobile nodes.
 The effects of very large node densities need to be
investigated.
 The feasibility of using the clustering technique and data
aggregation needs to be tested in the same wireless
sensor network. 31
FUTURE SCOPE
32
33
FUTURE OF WSN
SMART HOME / SMART OFFICE
 Sensors controlling
appliances and
electrical devices in the
house.
 Better lighting and
heating in office
buildings.
 The Pentagon building
has used sensors
extensively.
FUTURE SCOPE
34
Intelligent transport,
industry and society,
smart utilities
Connected
Consumer
Electronics
 Development of a TDMA/CSMA hybrid MAC
 TinyOS currently has a CSMA MAC
 Hope to improve throughput by employing TDMA
 Time is divided into transmission periods and contention perio
 Nodes will contend with each other to join “the transmission
group” during the contention period.
 Nodes in the transmission group will be allocated a time-slot in
the transmission period.
 Development of data storage engine optimized for fast
retrieval
CONCLUSION
This presentation shows all the techniques that are used
for wireless sensor network for low power consumption ,
for example MAC protocol, LEACH, Network layer, ect.
Most of the research on energy efficient controlled
access protocol has come at a cost of control
packets overhead. By investigating this research
area further, an enhanced energy efficiency
protocol may be developed that can revolutionise
WSN’s power consumption.
There are some another protocols which can be used for
less energy consumption like CDMA,FDMA,TDMA.
35
REFERENCES
 www.wikipedia.org
 http://stakeholders.ofcom.org.uk/binaries/research/tec
hnology-research/wsn2.pdf
 http://www.researchgate.net/publication/228695105_S
ervice-
36
37

More Related Content

What's hot

Node level simulators
Node level simulatorsNode level simulators
Node level simulators
SyedAhamed44
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
skumartarget
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applications
Deepshika Reddy
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
Jawhar Ali
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issues
Menaga Selvaraj
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
Mahbubur Rahman
 
Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)
Yogesh Fulara
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
Divya Tiwari
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network ppt
Pramod Kuruvatti
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient Routing
ArunChokkalingam
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
Jasleen Kaur (Chandigarh University)
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
YunusKhan38
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
Ganesh Khadsan
 
Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3
Easy n Inspire L
 
Hiperlan
HiperlanHiperlan
Mac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshareMac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshare
Chih-Yu Lin
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architecture
Vidhi603146
 

What's hot (20)

Node level simulators
Node level simulatorsNode level simulators
Node level simulators
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applications
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issues
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network ppt
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient Routing
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
Mac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshareMac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshare
 
Wsn 08
Wsn 08Wsn 08
Wsn 08
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architecture
 

Viewers also liked

Low Power Wireless Sensor Network Technologies and Standards for the Internet...
Low Power Wireless Sensor Network Technologies and Standards for the Internet...Low Power Wireless Sensor Network Technologies and Standards for the Internet...
Low Power Wireless Sensor Network Technologies and Standards for the Internet...
Duncan Purves
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 
The Things Network - Athens
The Things Network - AthensThe Things Network - Athens
The Things Network - Athens
Manolis Nikiforakis
 
Idate digi world 2015 - lora alliance - v(0.2)
Idate   digi world 2015 - lora alliance - v(0.2)Idate   digi world 2015 - lora alliance - v(0.2)
Idate digi world 2015 - lora alliance - v(0.2)
Thierry Lestable
 
WeatherXM at IoT Boussias Conference 2015
WeatherXM at IoT Boussias Conference 2015WeatherXM at IoT Boussias Conference 2015
WeatherXM at IoT Boussias Conference 2015
Manolis Nikiforakis
 
Ignes lo ra - thierry lestable - 29102015 - vfinal
Ignes   lo ra - thierry lestable - 29102015 - vfinalIgnes   lo ra - thierry lestable - 29102015 - vfinal
Ignes lo ra - thierry lestable - 29102015 - vfinal
Thierry Lestable
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
Adit Pathak
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
Understand LPWA tetchnologies (Sigfox and LoRa)
Understand LPWA tetchnologies (Sigfox and LoRa)Understand LPWA tetchnologies (Sigfox and LoRa)
Understand LPWA tetchnologies (Sigfox and LoRa)
Robert Vivanco Salcedo
 
LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M ScenariosLPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
Peter R. Egli
 
Low Power Wireless Technologies and Standards for the Internet of Things
Low Power Wireless Technologies and Standards for the Internet of ThingsLow Power Wireless Technologies and Standards for the Internet of Things
Low Power Wireless Technologies and Standards for the Internet of Things
Duncan Purves
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
Karthik
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 

Viewers also liked (19)

Low Power Wireless Sensor Network Technologies and Standards for the Internet...
Low Power Wireless Sensor Network Technologies and Standards for the Internet...Low Power Wireless Sensor Network Technologies and Standards for the Internet...
Low Power Wireless Sensor Network Technologies and Standards for the Internet...
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
The Things Network - Athens
The Things Network - AthensThe Things Network - Athens
The Things Network - Athens
 
Idate digi world 2015 - lora alliance - v(0.2)
Idate   digi world 2015 - lora alliance - v(0.2)Idate   digi world 2015 - lora alliance - v(0.2)
Idate digi world 2015 - lora alliance - v(0.2)
 
WeatherXM at IoT Boussias Conference 2015
WeatherXM at IoT Boussias Conference 2015WeatherXM at IoT Boussias Conference 2015
WeatherXM at IoT Boussias Conference 2015
 
SODAQ_BrochureFinal
SODAQ_BrochureFinalSODAQ_BrochureFinal
SODAQ_BrochureFinal
 
Ignes lo ra - thierry lestable - 29102015 - vfinal
Ignes   lo ra - thierry lestable - 29102015 - vfinalIgnes   lo ra - thierry lestable - 29102015 - vfinal
Ignes lo ra - thierry lestable - 29102015 - vfinal
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Understand LPWA tetchnologies (Sigfox and LoRa)
Understand LPWA tetchnologies (Sigfox and LoRa)Understand LPWA tetchnologies (Sigfox and LoRa)
Understand LPWA tetchnologies (Sigfox and LoRa)
 
LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M ScenariosLPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
 
Low Power Wireless Technologies and Standards for the Internet of Things
Low Power Wireless Technologies and Standards for the Internet of ThingsLow Power Wireless Technologies and Standards for the Internet of Things
Low Power Wireless Technologies and Standards for the Internet of Things
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 

Similar to Ppt on low power wireless sensor network 5th sem

CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
Kathirvel Ayyaswamy
 
7_adhoc and wireless network (1).ppt
7_adhoc and wireless network (1).ppt7_adhoc and wireless network (1).ppt
7_adhoc and wireless network (1).ppt
leonalmessibd21
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptx
Munazza63
 
WSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.pptWSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.ppt
AbyThomas54
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Editor Jacotech
 
A04560105
A04560105A04560105
A04560105
IOSR-JEN
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
SemayawiAlgaworash
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
Jerry Yoakum
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
ijsrd.com
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
IJERA Editor
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Alexander Decker
 
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
Journal For Research
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
ijsrd.com
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor network
ijcsa
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a survey
IAEME Publication
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
ijsrd.com
 
B05630814
B05630814B05630814
B05630814
IOSR-JEN
 

Similar to Ppt on low power wireless sensor network 5th sem (20)

CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
7_adhoc and wireless network (1).ppt
7_adhoc and wireless network (1).ppt7_adhoc and wireless network (1).ppt
7_adhoc and wireless network (1).ppt
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptx
 
WSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.pptWSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.ppt
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...
 
A04560105
A04560105A04560105
A04560105
 
WSN
WSNWSN
WSN
 
WSN
WSNWSN
WSN
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
 
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor network
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a survey
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
B05630814
B05630814B05630814
B05630814
 

Recently uploaded

weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 

Ppt on low power wireless sensor network 5th sem

  • 1. LOW POWER WIRELESS SENSOR NETWORK Shikha yadav 12EJTEC075 ECE, 5th sem 1
  • 2. CONTENTS  Introduction  Definition  Example of WSN  Types of WSN  Characteristics of a WSN  Power saving protocols for WSN  Applications  Challenges  Advantages  Disadvantages  Future Scope  Conclusion 2
  • 3. INTRODUCTION 3  Low power wireless sensor Networks are networks that consists of sensors which are distributed in an ad hoc manner.  These sensors work with each other to sense some physical phenomenon and then the information gathered is processed to get relevant results.  Low power Wireless sensor networks consists of protocols and algorithms with self-organizing capabilities.
  • 4. CONTINUED.........  Sensor networks are highly distributed networks of small, lightweight wireless node, deployed in large numbers to monitor the environment or system.  Each node of the sensor networks consist of three subsystem:  Sensor subsystem: senses the environment  Processing subsystem: performs local computations on the sensed data  Communication subsystem: responsible for message exchange with neighboring sensor nodes  The features of sensor nodes  Limited sensing region, processing power, energy 4
  • 5. 5 DEFINITION Low power Wireless Sensor Networks : Highly distributed networks of small, lightweight wireless nodes, Deployed in large numbers, Monitors the environment or system by measuring phys parameters such as temperature, pressure, humidity. Node: sensing + processing + communication
  • 7. TYPES OF WIRELESS SENSOR NETWORKS 7  Dense collection of nodes  Ad-hoc deployment  Difficulty in network maintenance  Few and scarcely distributed nodes  Pre-planned deployment  Lower network maintenance Unstructured WSN Structured WSN
  • 8. CHARACTERISTICS OF A LPWSN 1. Self – Organization 2. Concurrency processing 3. Low cost 4. Restricted energy resources 5. Tiny 6. Small radio range 8
  • 9. 9 POWER SAVING PROTOCOLS THERE ARE SOME PROTOCOLS WHICH IS USED FOR POWER SAVING……..  Unified Network Protocol Framework (UNPF)  Low-Energy Adaptive Clustering Hierarchy (LEACH)  MAC PROTOCOL  NETWORK LAYER  BATTERY MODEL and some other…
  • 10. 10 LAYERED ARCHITECTURE  A single powerful base station (BS)  Layers of sensor nodes around BS  Layer i: All nodes i-hop away from BS  Applications:  In-building: BS is an access point  Military  Short-distance, low power tt tx
  • 11. 11 UNIFIED NETWORK PROTOCOL FRAMEWORK (UNPF)  A layered architecture  A set of protocols  Integrates three operations:  Network Initialization & Maintenance Protocol  MAC Protocol  Routing Protocol
  • 12. 12 UNIFIED NETWORK PROTOCOL FRAMEWORK (UNPF)  Network Initialization & Maintenance Protocol:  BS broadcasts its ID using CDMA common control channel (BS reaches all nodes in one hop)  Nodes record BS ID & send beacon signal with their own IDs at their low default power levels  All nodes the BS can hear are at 1-hop distance  The BS broadcasts a control packet with all layer one node IDs  All nodes send a beacon signal again  The layer one nodes record the IDs they hear-layer 2  The layer one nodes inform the BS of the layer 2  The BS broadcasts the layer2 nodes IDs,…  To maintain: periodic beaconing updates are required
  • 13. 13 POWER SAVING MODE  Turning the transceiver off may not always be efficient. Operation in a power-saving mode is energy-efficient only if the time spent in that mode is greater than a certain threshold MULTIPLE HOPS  Using several short hops may be more energy efficient than using one large hop.
  • 14. 14 CLUSTERED ARCHITECTURE  A clustered architecture organizes the sensor nodes into clusters, each governed by a cluster-head. The nodes in each cluster are involved in message exchanges with their cluster-heads, and these heads send message to a BS.  Clustered architecture is useful for sensor networks because of its inherent suitability for data fusion. The data gathered by all member of the cluster can be fused at the cluster-head, and only the resulting information needs to be communicated to the BS.  The cluster formation and election of cluster-heads must be an autonomous, distributed process.
  • 16. 16 LOW-ENERGY ADAPTIVE CLUSTERING HIERARCHY (LEACH)  Self-organizing and adaptive clustering protocol  Evenly distributes the energy expenditure among the sensors  Performs data aggregation where cluster heads act as aggregation points  Two main phases:  Setup phase: organizing the clusters  Steady-state phase: deals with the actual data transfers to the BS
  • 17. 17  Setup phase:  Each sensor chooses a random number m between 0 and 1  If m < T(n) for node n, the node becomes a cluster-head where  P : the desired percentage of cluster heads  r : the round number  G : the set of nodes that have not been cluster heads during the last 1 / P rounds  A cluster head advertises its neighbors using a CSMA MAC.  Surrounding nodes decide which cluster to join based on the signal strength of these messages  Cluster heads assign a TDMA schedule for their members 1 [ * mod(1/ )]( ) 0 , P if n G P r PT n otherwise      
  • 18. 18  Steady-state phase:  All source nodes send their data to their cluster heads  Cluster heads perform data aggregation/fusion through local transmission  Cluster heads send them back to the BS using a single direct transmission  After a certain period of time, cluster heads are selected again through the set-up phase
  • 19. 19 LOW-ENERGY ADAPTIVE CLUSTERING HIERARCHY (LEACH)  Merits:  Accounting for adaptive clusters and rotating cluster heads  Opportunity to implement any aggregation function at the cluster heads  Demerits:  Highly dynamic environments  Continuous updates  Mobility
  • 20. 20 MAC PROTOCOL  During the data transmission phase, the distributed TDMA receiver oriented channel (DTROC) assignment MAC protocol is used.  Two steps of DTROC :  Channel allocation : Each node is assigned a reception channel by the BS, and channel reuse is such that collisions are avoided.  Channel scheduling : The node schedules transmission slots for all its neighbors and broadcasts the schedule. This enables collision-free transmission and saves energy, as nodes can turn off when they are not involved on a send/receive operation.
  • 21. THERE ARE THREE TYPES OF MAC PROTOCOLS  Fixed-allocation  Demand-based  Contention-based 21
  • 22. 22  Fixed-allocation MAC protocol  Share the common medium through a predetermined assignment.  It is suitable for sensor network that continuously monitor and generate deterministic data traffic  Provide a bounded delay for each node  However, in the case of bursty traffic, where the channel requirements of each node may vary over time, it may lead to inefficient usage of the channel.
  • 23. 23  Demand-based MAC protocol  Used in such cases, where the channel is allocated according to the demand of the node  Variable rate traffic can be efficiently transmitted  Require the additional overhead of a reservation process  Contention-based MAC protocol  Random-access-based contention for the channel when packets need to be transmitted  Suitable for bursty traffic  Collisions and no delay guarantees, are not suitable for delay- sensitive or real-time traffic
  • 24. 24 HYBRID TDMA/FDMA  A pure TDMA scheme minimize the time for which a node has to be kept on, but the associated time synchronization cost are very high.  A pure FDMA scheme allots the minimum required bandwidth for each connection  If the transmitter consumes more power, a TDMA scheme is favored, since it can be switch off in idle slots to save power.  If the receiver consumes greater power, a FDMA scheme is favored, because the receiver need not expend power for time synchronization.
  • 26. APPLICATIONS OF LPWSN  Area monitoring  Health care monitoring  Air pollution monitoring  Forest fire detection  Landslide detection  Water quality monitoring  Natural disaster prevention  Industrial monitoring 26
  • 27. 27  Facility management  Intrusion detection into industrial sites  Control of leakages in chemical plants, …  Machine surveillance and preventive maintenance  Embed sensing/control functions into places no cable has gone before  E.g., tire pressure monitoring  Precision agriculture  Bring out fertilizer/pesticides/irrigation only where needed  Medicine and health care  Post-operative or intensive care  Long-term surveillance of chronically ill patients or the elderly
  • 28. CHALLENGES  Hardware : 1. Low cost 2. Tiny sensors 3. Lifetime maximization 4. Robustness and fault tolerance 5. Self-configuration  Software : 1. Operating systems 2. Security 3. Mobility 28
  • 29. ADVANTAGES OF A WSN  Avoids a lot of wiring  Can accommodate new devices at any time  Flexible to go through physical partitions  It can be accessed through a centralized monitor  Infrastructure 29
  • 30. DISADVANTAGES OF WSN  Easy for hackers to hack a network  Comparatively low speed of communication  Gets distracted by various elements  Costly at large  Life of nodes  Energy life 30
  • 31. FUTURE SCOPE  More research work needs to be done in future.  Needs to be implemented in a wireless sensor network with mobile nodes.  The effects of very large node densities need to be investigated.  The feasibility of using the clustering technique and data aggregation needs to be tested in the same wireless sensor network. 31
  • 33. 33 FUTURE OF WSN SMART HOME / SMART OFFICE  Sensors controlling appliances and electrical devices in the house.  Better lighting and heating in office buildings.  The Pentagon building has used sensors extensively.
  • 34. FUTURE SCOPE 34 Intelligent transport, industry and society, smart utilities Connected Consumer Electronics  Development of a TDMA/CSMA hybrid MAC  TinyOS currently has a CSMA MAC  Hope to improve throughput by employing TDMA  Time is divided into transmission periods and contention perio  Nodes will contend with each other to join “the transmission group” during the contention period.  Nodes in the transmission group will be allocated a time-slot in the transmission period.  Development of data storage engine optimized for fast retrieval
  • 35. CONCLUSION This presentation shows all the techniques that are used for wireless sensor network for low power consumption , for example MAC protocol, LEACH, Network layer, ect. Most of the research on energy efficient controlled access protocol has come at a cost of control packets overhead. By investigating this research area further, an enhanced energy efficiency protocol may be developed that can revolutionise WSN’s power consumption. There are some another protocols which can be used for less energy consumption like CDMA,FDMA,TDMA. 35
  • 37. 37