This document summarizes a technical seminar report on wireless sensor networks submitted by two students, Kapil Dev Dwivedi and Shusma Sandey, to their professor Ravi Ranjan Mishra. The 5-page report includes an abstract, introduction to wireless sensor networks covering their technology, history and architecture, sensor technology, features of WSNs, applications of WSNs including environmental monitoring and health monitoring, standardization, and references.
This is presentation slide for OpenStack Summit Austin 2016.
// Abstraction
Internet of Things is a hot topic today. Many companies are trying to create new business applications on a concept of IoT such as smart city, connected vehicle or smart grid. The platform for IoT applications has some unprecedented characteristics: (1) needs to accept huge number of connections simultaneously (2) needs to be highly reliable and secure (3) needs to be highly scalable.
We have designed, prototyped and evaluated a highly reliable IoT platform for collecting and storing large-scale data.
We explained our use case and architecture of IoT platform. We are tackling the following very high requirements during the process of prototyping and evaluating the platform.
• Receiving and storing messages from over 10M clients concurrently
• Highly reliable architecture of message broking without losing messages
• Instant scale-out to process burst traffic rapidly
We also discussed how we can adopt OpenStack to IoT backend and share ideas for its enhancement.
With the advancements in wireless technology and digital electronics, some tiny devices have started to be used in numerous areas in daily life. These devices are capable of sensing, computation and communicating. They are generally composed of low power radios, several smart sensors and embedded CPUs (Central Processing Units). These devices are used to form wireless sensor network (WSN) which is necessary to provide sensing services and to monitor environmental conditions. In parallel to WSNs, the idea of internet of things (IoT) is developed where IoT can be defined as an interconnection between identifiable devices within the internet connection in sensing and monitoring processes. This paper presents detailed overview of WSNs. It also assesses the technology and characteristics of WSNs. Moreover, it provides a review of WSN applications and IoT applications.
Underwater Wireless Communication is the wireless communication in which acoustic signals (waves) carry digital information through an underwater channel.
This is presentation slide for OpenStack Summit Austin 2016.
// Abstraction
Internet of Things is a hot topic today. Many companies are trying to create new business applications on a concept of IoT such as smart city, connected vehicle or smart grid. The platform for IoT applications has some unprecedented characteristics: (1) needs to accept huge number of connections simultaneously (2) needs to be highly reliable and secure (3) needs to be highly scalable.
We have designed, prototyped and evaluated a highly reliable IoT platform for collecting and storing large-scale data.
We explained our use case and architecture of IoT platform. We are tackling the following very high requirements during the process of prototyping and evaluating the platform.
• Receiving and storing messages from over 10M clients concurrently
• Highly reliable architecture of message broking without losing messages
• Instant scale-out to process burst traffic rapidly
We also discussed how we can adopt OpenStack to IoT backend and share ideas for its enhancement.
With the advancements in wireless technology and digital electronics, some tiny devices have started to be used in numerous areas in daily life. These devices are capable of sensing, computation and communicating. They are generally composed of low power radios, several smart sensors and embedded CPUs (Central Processing Units). These devices are used to form wireless sensor network (WSN) which is necessary to provide sensing services and to monitor environmental conditions. In parallel to WSNs, the idea of internet of things (IoT) is developed where IoT can be defined as an interconnection between identifiable devices within the internet connection in sensing and monitoring processes. This paper presents detailed overview of WSNs. It also assesses the technology and characteristics of WSNs. Moreover, it provides a review of WSN applications and IoT applications.
Underwater Wireless Communication is the wireless communication in which acoustic signals (waves) carry digital information through an underwater channel.
Topic on Underwater Communication which includes both underwater wireless and wired communication . A full detailed overview about the topic has been given. Pictures are given to visualize the topic in better way. Covers a major potion like Hydrophones and SONAR. Can be presented as a seminar topic as well .
In order for the Internet of Things to function properly, a reliable wireless technology needs to be available. Radio frequencies are some of the most popular and effective means for IoT communication.
While wireless communication technology today has become part of our daily life, the
idea of wireless undersea communications may still seem far-fetched. However, research has
been active for over a decade on designing the methods for wireless information transmission
underwater. Human knowledge and understanding of the world’s oceans, which constitute
the major part of our planet, rests on our ability to collect information from remote undersea
locations.
The major discoveries of the past decades, such as the remains of Titanic, or the hydrothermal
vents at bottom of deep ocean, were made using cabled submersibles. Although such
systems remain indispensable if high-speed communication link is to exists between the
remote end and the surface, it is natural to wonder what one could accomplish without the
burden (and cost) of heavy cables.
Hence the motivation, and interest in wireless underwater communications. Together with
sensor technology and vehicular technology, wireless communications will enable new
applications ranging from environmental monitoring to gathering of oceanographic data,
marine archaeology, and search and rescue missions.
Underwater wireless communication networks (UWCNs) consist of sensors and autonomous underwater vehicles (AUVs) that interact, coordinate and share information with each other to carry out sensing and monitoring functions.
Topic on Underwater Communication which includes both underwater wireless and wired communication . A full detailed overview about the topic has been given. Pictures are given to visualize the topic in better way. Covers a major potion like Hydrophones and SONAR. Can be presented as a seminar topic as well .
In order for the Internet of Things to function properly, a reliable wireless technology needs to be available. Radio frequencies are some of the most popular and effective means for IoT communication.
While wireless communication technology today has become part of our daily life, the
idea of wireless undersea communications may still seem far-fetched. However, research has
been active for over a decade on designing the methods for wireless information transmission
underwater. Human knowledge and understanding of the world’s oceans, which constitute
the major part of our planet, rests on our ability to collect information from remote undersea
locations.
The major discoveries of the past decades, such as the remains of Titanic, or the hydrothermal
vents at bottom of deep ocean, were made using cabled submersibles. Although such
systems remain indispensable if high-speed communication link is to exists between the
remote end and the surface, it is natural to wonder what one could accomplish without the
burden (and cost) of heavy cables.
Hence the motivation, and interest in wireless underwater communications. Together with
sensor technology and vehicular technology, wireless communications will enable new
applications ranging from environmental monitoring to gathering of oceanographic data,
marine archaeology, and search and rescue missions.
Underwater wireless communication networks (UWCNs) consist of sensors and autonomous underwater vehicles (AUVs) that interact, coordinate and share information with each other to carry out sensing and monitoring functions.
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...IJMIT JOURNAL
Wireless sensor networks (WSN) is composed of a large number of small nodes with limited functionality.
The most important issue in this type of networks is energy constraints. In this area several researches have
been done from which clustering is one of the most effective solutions. The goal of clustering is to divide
network into sections each of which has a cluster head (CH). The task of cluster heads collection, data
aggregation and transmission to the base station is undertaken. In this paper, we introduce a new approach
for clustering sensor networks based on Particle Swarm Optimization (PSO) algorithm using the optimal
fitness function, which aims to extend network lifetime. The parameters used in this algorithm are residual
energy density, the distance from the base station, intra-cluster distance from the cluster head. Simulation
results show that the proposed method is more effective compared to protocols such as (LEACH, CHEF,
PSO-MV) in terms of network lifetime and energy consumption.
Satellite image processing is a technique to enhance raw images received from cameras or sensors placed on satellites, space probes and aircrafts or pictures taken in normal day to day life in various applications. The process of creating thematic maps as spatial distribution of particular information. These are structured by Spectral Bands. These have constant density and when they overlap their densities get added. It performs image analysis on multiple scale images and catches the comprehensive information of system for different application. Examples of themes are soil, vegetation, water-depth and air. The supervising of such critical events requires a huge volume of surveillance data and extremely powerful real time processing for infrastructure
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
A data dissemination protocol for wireless sensor networks has been engaged for modifying configuration fields and circulating management controls to the mote. Earlier, a data dissemination protocol faces the henceforth two consequences. First, they are works on sink based model; only the sink can circulate data item to other motes. Such model is not suitable for large user wireless sensor networks. Second, those protocols are not provide with any security and hence intruders will make problems to misuse the network. We provided the seDrip protocol. It allows the network mentors to authorize multiple network uses with various permissions to simultaneously and directly distributed data items to the mote. seDrip is implemented in an laboratory of network restricted resources mote to depict its large capability in practice.
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...IJERA Editor
The cloud computing has increased in many organizations. It provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. In this project we propose anIntrusion Detection and Countermeasure in Virtual Network Systems mechanism called NICE to prevent vulnerable virtual machines from being compromised in the cloud. NICE detects and mitigates collaborative attacks in the cloud virtual networking environment. The system performance evaluation demonstrates the feasibility of NICE and shows that the proposed solution can significantly reduce the risk of the cloud system from being exploited and abused by internal and external attackers.
Concepts and evolution of research in the field of wireless sensor networksIJCNCJournal
The field of Wireless Sensor Networks (WSNs) is experiencing a resurgence of interest and a continuous evolution in the scientific and industrial community. The use of this particular type of ad hoc network is becoming increasingly important in many contexts, regardless of geographical position and so, according to a set of possible application. WSNs offer interesting low cost and easily deployable solutions to perform a remote real time monitoring, target tracking and recognition of physical phenomenon. The uses of these sensors organized into a network continue to reveal a set of research questions according to particularities target applications. Despite difficulties introduced by sensor resources constraints, research contributions in this field are growing day by day. In this paper, we present a comprehensive review of most recent literature of WSNs and outline open research issues in this field.
This article presents a study of the state of the art of sensor networks wireless systems, which continue to develop and present a wide variety of Applications. These networks constitute a current and emerging field of study where combines the development of computers, wireless communications and devices mobile phones and integration with other disciplines such as agriculture, biology, medicine, etc. I know presents the main concept, components, topologies, standards, applications, problems and challenges, then delves into security solutions and concludes with basic simulation tools.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
Wireless Sensor Networks consists of a set of resource constrained devices called nodes that communicate wirelessly with each other. Wireless Sensor Networks have become a key application in number of technologies. It also measures the unit of vulnerability to security threats. Several Protocols are projected to make them secure. Some of the protocols within the sensor network specialize in securing data. These protocols are named as data discovery and dissemination protocols. The data discovery and dissemination protocol for wireless sensor networks are utilized for distributing management commands and altering configuration parameters to the sensor nodes. All existing data discovery and dissemination protocols primarily suffer from two drawbacks. Basically, they are support centralized approach (only single station can distribute data item).This approach is not suitable for multiple owner-multiple users. Second, the protocols are not designed with security in mind. This Paper proposes the first distributed knowledge discovery and dissemination protocol called DiDrip which is safer than the existing one. The protocol permits multiple owners to authorize many network users with altogether totally different priorities to at an equivalent time and directly flow into data items to sensor nodes.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Elevating Tactical DDD Patterns Through Object Calisthenics
Seminar report on WSN technology
1. [1]
SUBMITTED TO:-
ER. RAVI RANJAN MISHRA,
Asst. lecturer department of ece,
Mewar University
MEWAR UNIVERSITY
CHITTORGARH,RAJASTHAN
A
Technical seminar report
On
WIRELESS SENSER NETWORK
SUBMITTED BY :-
KAPIL DEV DWIVEDI
10MUBECE128
B-Tech, 3rd year student at Mewar University,
gangrar, chittorgarh (raj.)
SHUSMA SANDEY
10MUBECE112
B-Tech, 3rd year student at Mewar University,
gangrar, chittorgarh (raj.)
in partial fulfillment for the award of the degree
of
BACHELOR OF TECHNOLOGY
In
ELECTRONICS AND COMMUNICATION ENGINEERING
2. [2]
Candidate’s Declaration
I hereby declare that the work, which is being presented in the report, entitled
“WIRELESS SENSER NETWORK” in partial fulfillment for the award
of Degree of “Bachelor of Technology” submitted to the Department of
(ECE) Engineering, Mewar University, gangrar is a record of my own
Investigations carried under the Guidance of Mr. RAVI RANJAN MISHRA
Mewar university
I have not submitted the matter presented in this report any where for the award
of any other Degree.
(KAPIL DEV DWIVEDI)
10MUBECE128
Counter Signed by
Name(s) of Supervisor(s)
.....................................
.....................................
3. [3]
CERTIFICATE
This is to certify that this Dissertation entitled “WIRELESS SENSER NETWORK” has been
successfully carried out by KAPIL DEV DWIVEDI(ROLL No:-10MUBECE128)& SHUSMA
SANDEY(ROLL No:-10MUBECE112), under my supervision and guidance, in partial
fulfillment of the requirement for the award of Bachelor of Technology Degree in Electronics
and Communication Engineering from Mewar University, Gangrar, Chittorgarh for the Year
2010-2014.
Supervisor
4. [4]
ACKNOWLEDGEMENT
Every project begins with an idea and materializes with concrete efforts. In the
beginning, I would like to thank the almighty God who gave me the strength and
capability to work on this Seminar Topic and complete it successfully.
It is indeed gratifying to have the privilege to express my deep sense of Gratitude
and appreciation to my esteemed guides ER. RAVI RANJAN MISHRA
Department of (ECE.) Engineering. for his scholarly painstaking & incessant
encouragement, inspiring supervision & valuable guidance during the course of
investigation.
For all this kind consideration I’m beholden him in my feelings of respect of
regards for him.
I would also like to thank my parents, my classmates, my all teachers and all other
people who helped me in successfully completing my topic.
KAPIL DEV DWIVEDI
(ROLL No:-10MUBECE128)
SHUSMA SANDEY
(ROLL No:-10MUBECE112)
5. [5]
CONTENTS:
1. ABSTRACT ……………………………………………………….6
2. INTRODUCTION ………………………………………………...7-11
2.1 WSN TECHNOLOGY
2.2 HISTORY OF WSN
2.3 ARCHITECTURE OF WSN
3 SENSOR TECHNOLOGY…………………………………….11-14
3.1 DEFINITION
3.2 TYPE OF SENSOR
3.3 TRENDS OF SENSOR
4 FEATURES …………………………………………………….14-16
4.1 AD-HOCK DEPLOYMENT
4.2 UN-ATTENDED OPERATION
4.3 UNMETERED
4.4. DYNAMIC CHANGES
5.. APPLICATIONS ………………………………………………16-19
5.1 ENVIORNMENT MONITERING
5.2 HELTH MONITERING
5.3 TRAFIC CONTROL
5,4 SMART BUILDING
6. STANDERDISATION……………………………………………20
7 CONCLUSION ………………………………………………..….21
6. [6]
8. . REFERENCES………………………………….......................22
ABSTRACT
Wireless sensor networks (WSNs) enable new applications and require
non-conventional paradigms for protocol design due to several constraints.
Owing to the requirement for low device complexity together with low
energy consumption (i.e., long network lifetime), a proper balance between
communication and signal/data processing Capabilities must be found. This
motivates a huge effort in research activities, standardization process, and
industrial investments on this field since the last decade. This survey paper
aims at reporting an overview of WSNs technologies, main applications and
standards, features in WSNs design, and evolutions. In particular, some
peculiar applications, such as those based on environmental monitoring,
are discussed and design strategies highlighted; a case study based on a
real implementation is also reported. Trends and possible evolutions are
traced. Emphasis is given to the IEEE 802.15.4 technology, which enables
many applications of WSNs. Some example of performance characteristics
of 802.15.4-based networks are shown and discussed as a function of the
size of the WSN and the data type to be exchanged among nodes.
7. [7]
1. INTRODUCTION
A wireless sensor network (WSN) consists of spatially
distributed autonomous sensors to monitor physical or environmental conditions,
such as temperature, sound, pressure, etc. and to cooperatively pass their data
through the network to a main location. The more modern networks are bi-
directional, also enabling control of sensor activity. The development of wireless
sensor networks was motivated by military applications such as battlefield
surveillance; today such networks are used in many industrial and consumer
applications, such as industrial process monitoring and control, machine health
monitoring, and so on.
1.1 WSN TECHNOLOGY
The WSN is built of "nodes" – from a few to several hundreds or even thousands,
where each node is connected to one (or sometimes several) sensors. Each such
sensor network node has typically several parts: a radio transceiver with an
internal antenna or connection to an external antenna, a microcontroller, an
electronic circuit for interfacing with the sensors and an energy source, usually
a battery or an embedded form of energy harvesting. A sensor node might vary in
size from that of a shoebox down to the size of a grain of dust, although
functioning "motes" of genuine microscopic dimensions have yet to be created.
The cost of sensor nodes is similarly variable, ranging from a few to hundreds of
dollars, depending on the complexity of the individual sensor nodes. Size and cost
constraints on sensor nodes result in corresponding constraints on resources such
as energy, memory, computational speed and communications bandwidth. The
topology of the WSNs can vary from a simple star network to an advanced multi-
hop wireless mesh network. The propagation technique between the hops of the
network can be routing or flooding.
8. [8]
2.2 HISTORY
The origins of the research on WSNs can be traced back to the Distributed Sensor
Networks(DSN) program at the Defense Advanced Research Projects Agency
(DARPA) at around 1980. By this time, the ARPANET (Advanced Research Projects
Agency Network) had been operational for a number of years, with about 200
hosts at universities and research institutes. DSNs were assumed to have many
spatially distributed low-cost sensing nodes that collaborated with each other but
operated autonomously, with information being routed to whichever node was
best able to use the information. At that time, this was actually an ambitious
program. There were no personal computers and workstations; processing was
mainly performed on minicomputers and the Ethernet was just becoming
popular. Technology components for a DSN were identified in a Distributed
Sensor Nets workshop in 1978 (Proceedings of the Distributed Sensor Nets
Workshop, 1978). these included sensors (acoustic), communication and
processing modules, and distributed software. Researchers at Carnegie Mellon
University (CMU) even developed a communication-oriented operating system
called Accent (Rashid & Robertson, 1981), which allowed flexible, transparent
access to distributed resources required for a fault-tolerant DSN. A demonstrative
application of DSN was a helicopter tracking system (Myers et al., 1984), using
a distributed array of acoustic microphones by means of signal abstractions and
matching techniques, developed at the Massachusetts Institute of Technology
(MIT). Even though early researchers on sensor networks had in mind the vision
of a DSN, the technology was not quite ready. More specifically, the sensors were
rather large and This work was carried out during the tenure of an ERCIM “Alain
Bensoussan” Fellowship Program and is part of the MELODY Project, which is
funded by the Research Council of Norway under the contract number
187857/S10.
9. [9]
In the new wave of sensor network research, networking techniques and
networked information processing suitable for highly dynamic ad hoc
environments and resource constrained sensor nodes have been the focus.
Further, the sensor nodes have been much smaller in size (i.e. pack of cards to
dust particle) and much cheaper in price, and thus many new civilian applications
of sensor networks such as environment monitoring, vehicular sensor network
and body sensor network have emerged. Again, DARPA acted as a pioneer in the
new wave of sensor network research by launching an initiative research program
called SensIT. Which provided the present sensor networks with new capabilities
such as ad hoc networking, dynamic querying and tasking, reprogramming and
multitasking. At the same time, the IEEE noticed the low expense and high
capabilities that sensor networks offer. The organization has defined the IEEE
802.15.4 standard (IEEE 802.15 WPAN Task Group 4, n.d.) for low data rate
wireless personal area networks. Based on IEEE 802.15.4, ZigBee Alliance (ZigBee
Alliance, n.d.) has published the ZigBee standard which specifies a suite of high
level communication protocols which can be used by WSNs. Currently, WSN has
been viewed as one of the most important technologies for the 21st century (21
Ideas for the 21st Century,1999). Countries such as China have involved WSNs in
their national strategic research programmer’s (Ni, 2008). The
commercialization’s of WSNs are also being accelerated by new formed
companies like Crossbow Technology (Crossbow Technology, n.d.) and Dust
Networks
10. [10]
2.3 WSN ARCHITECTURE
The architecture of wsn consist of sensor microcontroller unit antenna and
transmitter & receiver of the system.sens0r and control units are connected
to the battery for required power supply voltage sensor sense the physical
environment and send the input to the A/D converter to convert it into digital
form and then it is send to the control unit of microcontroller from where the
o/p’s are controlled by the mechanism stored in microcontroller unit
11. [11]
The topology of the WSNs can vary from a simple star network to an
advanced multi-hop wireless mesh network. The propagation technique
between the hops of the network can be routing or flooding.
Typical multi-hop wireless sensor network architecture
3. SENSOR
Sensors are the very important part of any sensor network it is the primery
hub of wireless sensor networks. All wireless technology is depend upon
these sensors in our general life we use many sensors ,do u know that how
much sensors are working in your system or in your mobile cell. U can not
think about a network without sensor
12. [12]
3.1 DEFINITION
A 'sensor' is a device that measures a physical quantity and converts it into
a 'signal' which can be read by an observer or by an instrument. For
example, a mercury thermometer converts the measured temperature into
the expansion and contraction of a liquid which can be read on a calibrated
glass tube.
3.2 TYPE OF SENSOR
There are a lot of different types of sensors. Sensors are used in everyday
objects.
Thermal sensors
A sensor that detects temperature. Thermal sensors are found in many
laptops and computers in order to sound an alarm when a certain
temperature has been exceeded.
13. [13]
temperature sensors: thermometers
heat sensors: bolometer, calorimeter
Electromagnetic sensors
An electronic device used to measure a physical quantity such as pressure
or loudness and convert it into an electronic signal of some kind (e.g.
a voltage).
electrical resistance sensors: ohmmeter
electrical voltage sensors: voltmeter
electrical power sensors: watt-hour meter
magnetism sensors: magnetic compass
metal detectors
Radar
Mechanical sensors
Pressure sensors: barometer
Vibration and shock sensors
Motion sensors
A motion sensor detects physical movement in a given area.
radar gun, tachometer
Car sensors
reversing sensor
rain sensor
14. [14]
3.3 The trend of sensors
Because of certain disadvantages of physical contact sensors, newer
technology non-contact sensors have become prevalent in industry,
performing well in many applications. The recent style of non-contact
sensors shows that “Thin (g) is In”. Market trends show that form and size
are important. Users are looking for smaller and more accurate sensors.
New technologies for the sensing chips are breaking application barriers.
For the future, the trend will be to continue to provide smaller, more
affordable sensors that have the flexibility to fit even more applications in
both industrial and commercial environments.
4. FEATURES:
In spite of the diverse applications, sensor networks pose a number of
unique technical features due to the following factors:
15. [15]
4.1. Ad hoc deployment:
Most sensor nodes are deployed in regions which have no infrastructure at all. A
typical way of deployment in a forest would be tossing the sensor nodes from an
aeroplane. In such a situation, it is up to the nodes to identify its connectivity and
distribution.
4.2 .Unattended operation:
In most cases, once deployed, sensor networks have no human intervention. Hence
the nodes themselves are responsible for reconfiguration in case of any changes.
4.3. Unmetered:
The sensor nodes are not connected to any energy source. There is only a finite
source Of energy, which must be optimally used for processing and
communication? An interesting fact is That communication dominates processing
in energy consumption. Thus, in order to make optimal Use of energy,
communication should be minimized as much as possible.
4.4 Dynamic changes:
It is required that a sensor network system be adaptable to changing Connectivity
(for e.g., due to addition of more nodes, failure of nodes etc.) as well as changing
Environmental stimuli. Thus, unlike traditional networks, where the focus is on
maximizing channel throughput or minimizing node deployment, the major
consideration in a sensor network is to extend the system lifetime as well as the
system robustness.
16. [16]
5. APPLICATIONS
The original motivation behind the research into WSNs was military application.
Examples of military sensor networks include large-scale acoustic ocean
surveillance systems for the detection of submarines, self-organized and
randomly deployedWSNs for battlefield surveillance and attaching microsensors
to weapons for stockpile surveillance (Pister, 2000). As the costs for sensor nodes
and communication networks have been reduced, many other potential
applications including those for civilian purposes have emerged. The following are
a few examples.
5.1 Environmental Monitoring
Environmental monitoring (Steere et al., 2000) can be used for animal tracking,
forest surveillance, flood detection, and weather forecasting. It is a natural
candidate for applying WSNs, because the variables to be monitored, e.g.
temperature, are usually distributed over a large region. One example is that
researchers from the University of Southampton have built a glacial environment
monitoring system using WSNs in Norway (Martinez et al., 2005). They collect
data from sensor nodes installed within the ice and the sub-glacial sediment
without the use of wires which could disturb the environment.
17. [17]
5.2 Health Monitoring
WSNs can be embedded into a hospital building to track and monitor patients and
all medical resources. Special kinds of sensors which can measure blood pressure,
body temperature and electrocardiograph (ECG) can even be knitted into clothes
to provide remote nursing for the elderly. When the sensors are worn or
implanted for healthcare purposes, they form a special kind of sensor network
called a body sensor network (BSN). BSN is a rich interdisciplinary area which
revolutionizes the healthcare system by allowing inexpensive, continuous
and ambulatory health monitoring with real-time updates of medical records via
the Internet.
18. [18]
5.3 TRAFFIC CONTROL
Sensor networks have been used for vehicle traffic monitoring and control for
some time. At many crossroads, there are either overhead or buried sensors to
detect vehicles and to control the traffic lights. Furthermore, video cameras are
also frequently used to monitor road segments with heavy traffic. However, the
traditional communication networks used to connect these sensors are costly,
and thus traffic monitoring is usually only available at a few critical points in a city
(Chong & Kumar, 2003). WSNs will completely change the landscape of traffic
monitoring and control by installing cheap sensor nodes in the car, at the parking
lots, along the roadside, etc. Street line, Inc. (Street line, Inc., n.d.) is a company
which uses sensor network technology to help drivers find unoccupied parking
places and avoid traffic jams. The solutions provided by Street line can
significantly improve the city traffic management and reduce the emission of
carbon dioxide.
5.4 SMART BUILDINGS
The New York Times Building - a Smart Building
The headquarters of the New York Times is an example of how different
smart building technologies can be combined to reduce energy
consumption and to increase user comfort. Overall, the building consumes
30% less energy than traditional office skyscrapers. Opened in November
2007 and designed by Renzo Piano, the building has a curtain wall which
serves as a sunscreen and changes color during the day. This wall consists
of ceramic rods, “a supporting structure for the screen and an insulated
window unit” (Hart, 2008).
19. [19]
The building is further equipped with lighting and shading control systems
based on ICT technologies. The lighting system ensures that electrical light
is only used when required. Further day lighting measures include a garden
in the centre of the ground floor which is open to the sky as well as a large
area skylight. The electrical ballasts in the lighting system are equipped
with chips that allow each ballast to be controlled separately. The shading
system tracks the position of the sun and relies on a sensor network to
automatically actuate the raising and lowering of the shades. The high-tech
HVAC system is equipped with sensors that measure the temperature. It is
further able to rely on free air cooling, i.e. fresh air on cool mornings is
brought into the HVAC system. An automated building system monitors in
parallel “the air conditioning, water cooling, heating, fire alarm, and
generation systems” (Siemens, 2008). The system relies on a large-scale
sensor network composed of different kinds of sensors which deliver real-
time information. Consequently, energy can be saved as only as few
systems are turned on as needed.
20. [20]
5.5 SECURITY
While the future of WSNs is very prospective, WSNs will not be successfully
deployed if security, dependability and privacy issues are not addressed
adequately. These issues become more important because WSNs are usually used
for very critical applications. Furthermore, WSNs are very vulnerable and thus
attractive to attacks because of their limited prices andhuman-unattended
deployment .IT provide kee management, authentication, intrusion detection,
privacy protection which makes WSN secure.
6. Standardization
In the area of WSNs, several standards are currently either ratified or under
development. The major standardization bodies are the Institute of Electrical and
Electronics Engineers (IEEE), the Internet Engineering Task Force (IETF), the
International Society for Automation (ISA) and the HART Communication
Foundation, etc. These standardization bodies have different focuses and they
provide global, open standards for interoperable, low-power wireless sensor
devices. Table 1 provides the comparisons of different standards currently
available for the communication protocols of WSNs.
6.1 IEEE 802.15.4
IEEE 802.15.4 is a standard which specifies the physical layer and MAC layer for
low-rate wireless personal area networks. It is the basis for the ZigBee and
Wireless HART specification, each of which further attempts to offer a complete
networking solution by developing the upper layers which are not covered by the
standard. The features of IEEE 802.15.4 include (IEEE 802.15 WPAN Task Group 4,
n.d.):
• Data rates of 250 kbps, 40 kbps, and 20 kbps.
• Two addressing modes; 16-bit short and 64-bit IEEE addressing.
• Support for critical latency devices, such as joysticks.
• CSMA-CA channel access.
• Automatic network establishment by the coordinator.
• Fully handshaked protocol for transfer reliability.
• Power management to ensure low power consumption.
• 16 channels in the 2.4GHz ISM band, 10 channels in the 915MHz ISM band and
one channel in the 868MHz band.
21. [21]
7. conclusion
WSNs have been identified as one of the most prospective technologies in this
century. This chapter provides information concerning both its history and current
state of the art. In concrete terms, the authors provide an overview about the
hardware, software and networking protocol design of this important technology.
The authors also discuss the security and ongoing standardization of this
technology. Depending on applications, many other techniques such as
localization, synchronization and in-network processing can be important, which
are not discussed in this chapter.
22. [22]
8. References
21 Ideas for the 21st Century (1999). Business Week pp. 78–167.
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y. & Cayirci, E. (2002). A survey on
sensor networks, IEEE Communications Magazine 40(8): 102–114.
Barrenetxea, G., Ingelrest, F., Schaefer, G. & Vetterli, M. (2008). Wireless
sensor networks for Environmental monitoring: The sensorscope experience,
Proc. of 20th IEEE International Zurich Seminar on Communications (IZS’08).
BSN Research in Imperial College London (n.d.).
http://ubimon.doc.ic.ac.uk/bsn/m621.html.
Chong, C.-Y. & Kumar, S. P. (2003). Sensor networks: Evolution, opportunities,
and challenges,Proceedings of the IEEE 91(8): 1247–1256. Connolly, M. &
O’Reilly, F. (2005). Sensor networks and the food industry, Proc. of Workshop
On Real World Wireless Sensor Networks (REALWSN’05).Contiki (n.d.).
Crossbow Technology (n.d.). http://www.xbow.com Dust Networks, Inc. (n.d.).
http://www.dustnetworks.com. Expo 2010 Shanghai China (n.d.).
http://www.expo2010.cn. Hill, J. L. (2003). System Architecture for Wireless
Sensor Networks, PhD thesis, Doctor of Philosophy In Computer Science,
University of California at Berkeley, USA.Howitt, I., Manges, W. W., Kuruganti,
P. T., Allgood, G., Gutierrez, J. A. & Conrad, J. M. (2006). Wireless industrial
sensor networks: Framework for qos assessment and qos Management, ISA
Transactions 45(3): 347–359.
IEEE 802.15 WPAN Task Group 4 (n.d.).
http://www.ieee802.org/15/pub/TG4.html.
IPSO Alliance - promoting the use of IP for Smart Objects (n.d.). http://www.ipso-
alliance.org.