SlideShare a Scribd company logo
State of the Art Seminar
Presentation on
IOT-WUSN(Wireless Underground Sensor networks )
Presented by Yohannes Bishaw
EmailJohn.fhy@gmail.com
Contents Covered
Introduction
Types of WUSN
Current technology for WUSN
WUSN design challenges
Conclusion
Application of WUSN
Communication Architecture WUSN
Introduction
The Internet of things (IoT) is the inter-networking of physical
devices, vehicles (also referred to as "connected devices" and "smart
devices"), buildings, and other items—embedded with electronics,
software, sensors, actuators, and network connectivity that enable
these objects to collect and exchange data.
Introduction…
In WUSN the node is completely underground.
 WUSN consist of wireless devices that operate below the ground
surface. These devices are buried completely under dense soil. The
main difference between WUSN and the terrestrial wireless sensor
network is the communication medium.
 Wireless Underground Sensor Networks (WUSN) have the potential to
impact a wide variety of new applications including intelligent
irrigation, soil information monitoring, etc, the internet of tings for
water-saving agriculture.
Types of WSN
Terrestrial WSN  Distributed in given area either in ad-hoc manner
Under Ground WSN Sensors buried underground , agriculture or
in cave or mines that monitors underground conditions.
Under Water WSN  Sensors are located under water.
Multimedia WSN  sensors are equipped with cameras and
microphones.
Types of WSN
Application of wireless underground sensor
network
Environmental monitoring of the water-saving agriculture
Safety detection of mine
Quality monitoring of underground facilities
Navigation of ground vehicle
Intelligent mines
Current technology for underground sensing
The current system consists of a buried sensor and a data logger on the
surface
Very useful for a variety of applications
Suffer from several shortcomings when compared to wireless
underground sensor networks
Concealment
Ease of deployment
Timeliness of data
Reliability
Coverage density
Concealment
In current systems the data loggers are deployed on surface
Communication is easier as no underground communication is
involved
Above ground equipment is vulnerable to agricultural and landscaping
equipment or unacceptable for aesthetic reasons
In WUSN the equipment is underground secure from any theft and
protected from damage
Ease of deployment
Current technology uses wired system
Tough to add new sensors or data loggers
No scalability issues with WUSN as its fully wireless
Timeliness of data
Due to wireless nature the data from sensors is forwarded in real
time to sink
In data loggers the data may be stored for later retrieval
Reliability
Current systems are fully dependent on data loggers
Data logger failure means whole network failure
WUSN eliminate the need of data logger
Each sensor can forward sensor readings independently
WUSN’s are self healing
Coverage density
Current systems require the sensor to be deployed close to the data
logger.
It results in less coverage.
WUSN eliminate the need of data logger.
Sensors can be deployed anywhere , hence increasing the coverage area.
WUSN design challenges
Power Conservation
Topology design
Antenna design
Environmental extremes
Power conservation
Underground sensor nodes require more power as attenuation is more
Difficult to recharge or replace batteries
Solar or any alternate energy form also can’t be used
Power conservation is the key
Should be implemented by using power efficient hardware and
communication protocols
Topology design
Considerations
Application-The density of sensor deployment is dictated by the
application. Security application require dense whereas soil monitoring
less dense deployment.
Power usage minimization-Power usage can be minimized by designing
a topology with a large number of short-distance hops rather than a
smaller number of long-distance hops.
Cost-Deeper and Denser deployments result in more costs. Establish
trade offs.
Underground topology
All sensor devices underground
Sink may be underground or above it
Can be single depth or multi depth
Provides maximum concealment of network
Ground air ground path can be used
Hybrid topology
Mixture of underground and aboveground sensor devices
Power intensive underground hops can be traded for less expensive
hops in a terrestrial network.
Terrestrial devices can be easily recharger or replaced
Network is not fully concealed
Antenna design
Issues to be considered
Variable requirements-Devices near the surface air interface have
different requirements from those deeper inside as they suffer from
reflection.
Size-Lower frequencies require larger antennas, this is a challenge as
sensor device size should be small.
Directionality-The antennas should be oriented for both horizontal
and vertical communication.
Environmental extremes
Underground environment is not ideal for electronic devices
Protection from water, animals, insects etc. is needed.
Devices should be resistant to pressure of people or objects moving
overhead
Communication architecture of sensor networks
Physical layer
Lower frequencies are ideal for WUSN
They face less attenuation but the antenna size becomes large
Lower frequencies result in lesser bandwidth
Due to this the data rate in WUSN is very less
Data link layer
In WUSN the focus should be on less retransmissions
Traditional link layer protocols are contention based or TDMA
based
Collision avoidance using CTS/RTS involves too much overhead
In TDMA based scheme the synchronization may be lost between
nodes
Network layer
Ad hoc routing protocols may be proactive, reactive or geographical
Both proactive and reactive are not applicable to WUSN due to
signaling overhead and synchronization issues
Geographical routing can be helpful for WUSN only in some cases
Routing protocols should be dynamic as link costs change due to
soil conditions, water etc.
Transport layer
Performs function of flow control and congestion control
Congestion control can be done by routing data to terrestrial relays
which are capable of a higher data rate
Window based mechanism for flow control may not be applicable to
WUSN as retransmissions are more
In WUSN retransmission should be less to save energy
Conclusion
We introduced the concept of WUSNs in which sensor devices are
deployed completely below ground. There e are existing applications of
underground sensing, such as soil monitoring for agriculture.
Sensor Networks are emerging as a great aid in improving agricultural
productivity, quality and resource optimization.
Very application dependent and close interaction between agriculture
scientist and ICT researchers will help.
Several challenges like underground wireless channel, less bandwidth,
power conservation etc.
Wireless underground Sensor Network based on IOT water saved agriculture

More Related Content

What's hot

Unit 2 session1
Unit 2 session1Unit 2 session1
Unit 2 session1
Rathish Nair
 
Investigation of energy efficient protocols based on stable clustering for en...
Investigation of energy efficient protocols based on stable clustering for en...Investigation of energy efficient protocols based on stable clustering for en...
Investigation of energy efficient protocols based on stable clustering for en...
journalBEEI
 
Environmental wireless sensors networks
Environmental wireless sensors networksEnvironmental wireless sensors networks
Environmental wireless sensors networks
Achref Ben helel
 
Applications of WSN
Applications of WSNApplications of WSN
Applications of WSN
ADEEBANADEEM
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
Gokuldhev mony
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
Johnsaida Noorbasha
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
Manoj BN
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
Roma Vyas
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
Nishant Bhardwaj
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
GodspowerAgbulu
 
Wireless sensor network applications environment monitoring
Wireless sensor network applications environment monitoringWireless sensor network applications environment monitoring
Wireless sensor network applications environment monitoring
Cliff Cooper, MS, CIH
 
introduction to wireless sensor network
introduction to wireless sensor networkintroduction to wireless sensor network
introduction to wireless sensor network
hcls
 
Wireless Sensor Networking
Wireless Sensor NetworkingWireless Sensor Networking
Wireless Sensor Networking
Vishal Murugadoss
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network ppt
Pramod Kuruvatti
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
Swathi Ch
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
Pramod Kuruvatti
 
Infrastructure Establishment
Infrastructure EstablishmentInfrastructure Establishment
Infrastructure Establishment
juno susi
 
Elec6076 wireless sensor networks
Elec6076   wireless sensor networksElec6076   wireless sensor networks
Elec6076 wireless sensor networksTristan De Candé
 

What's hot (20)

Unit 2 session1
Unit 2 session1Unit 2 session1
Unit 2 session1
 
wireless sensor network ieee
wireless sensor network ieeewireless sensor network ieee
wireless sensor network ieee
 
Investigation of energy efficient protocols based on stable clustering for en...
Investigation of energy efficient protocols based on stable clustering for en...Investigation of energy efficient protocols based on stable clustering for en...
Investigation of energy efficient protocols based on stable clustering for en...
 
Environmental wireless sensors networks
Environmental wireless sensors networksEnvironmental wireless sensors networks
Environmental wireless sensors networks
 
Applications of WSN
Applications of WSNApplications of WSN
Applications of WSN
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
wsn networks
wsn networkswsn networks
wsn networks
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Wireless sensor network applications environment monitoring
Wireless sensor network applications environment monitoringWireless sensor network applications environment monitoring
Wireless sensor network applications environment monitoring
 
introduction to wireless sensor network
introduction to wireless sensor networkintroduction to wireless sensor network
introduction to wireless sensor network
 
Wireless Sensor Networking
Wireless Sensor NetworkingWireless Sensor Networking
Wireless Sensor Networking
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network ppt
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Infrastructure Establishment
Infrastructure EstablishmentInfrastructure Establishment
Infrastructure Establishment
 
Elec6076 wireless sensor networks
Elec6076   wireless sensor networksElec6076   wireless sensor networks
Elec6076 wireless sensor networks
 

Similar to Wireless underground Sensor Network based on IOT water saved agriculture

Wireless underground sensor networks
Wireless underground sensor networksWireless underground sensor networks
Wireless underground sensor networks
Arnav Soni
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
ShubhamTakkar
 
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET Journal
 
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor NetworkEnergetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
IRJET Journal
 
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor NetworksAnalysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
bijcicnjounal
 
Analysis of CoDBR and CEEDBR protocols in underwater wireless sensor networks
Analysis of CoDBR and CEEDBR protocols in underwater wireless sensor networksAnalysis of CoDBR and CEEDBR protocols in underwater wireless sensor networks
Analysis of CoDBR and CEEDBR protocols in underwater wireless sensor networks
bijcicnjournal
 
“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2
Naveena N
 
WSN_Chapter _1.pptx
WSN_Chapter _1.pptxWSN_Chapter _1.pptx
WSN_Chapter _1.pptx
KamakshiMB1
 
SINGLE NODE ARCHITECTURE Hardware components of a sensor node.pptx
SINGLE NODE ARCHITECTURE Hardware components of a sensor node.pptxSINGLE NODE ARCHITECTURE Hardware components of a sensor node.pptx
SINGLE NODE ARCHITECTURE Hardware components of a sensor node.pptx
mydheeswarandseec
 
Underwater sensor network
Underwater sensor networkUnderwater sensor network
Underwater sensor network
frestoadi
 
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
IOSR Journals
 
A Review On Reactive And Proactive Wireless Sensor Networks Protocols
A Review On Reactive And Proactive Wireless Sensor Networks ProtocolsA Review On Reactive And Proactive Wireless Sensor Networks Protocols
A Review On Reactive And Proactive Wireless Sensor Networks Protocols
Mary Montoya
 
Oj3425062509
Oj3425062509Oj3425062509
Oj3425062509
IJERA Editor
 
Pontem Monitoring using IoT
Pontem Monitoring using IoTPontem Monitoring using IoT
Pontem Monitoring using IoT
ijtsrd
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
DeepaDasarathan
 
Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...
Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...
Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...
IRJET Journal
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1
Easy n Inspire L
 

Similar to Wireless underground Sensor Network based on IOT water saved agriculture (20)

Wireless underground sensor networks
Wireless underground sensor networksWireless underground sensor networks
Wireless underground sensor networks
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
 
survey
surveysurvey
survey
 
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor NetworkEnergetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
 
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor NetworksAnalysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networks
 
Analysis of CoDBR and CEEDBR protocols in underwater wireless sensor networks
Analysis of CoDBR and CEEDBR protocols in underwater wireless sensor networksAnalysis of CoDBR and CEEDBR protocols in underwater wireless sensor networks
Analysis of CoDBR and CEEDBR protocols in underwater wireless sensor networks
 
Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1
 
“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2“Securing underwater wireless communication networks” 2
“Securing underwater wireless communication networks” 2
 
WSN_Chapter _1.pptx
WSN_Chapter _1.pptxWSN_Chapter _1.pptx
WSN_Chapter _1.pptx
 
SINGLE NODE ARCHITECTURE Hardware components of a sensor node.pptx
SINGLE NODE ARCHITECTURE Hardware components of a sensor node.pptxSINGLE NODE ARCHITECTURE Hardware components of a sensor node.pptx
SINGLE NODE ARCHITECTURE Hardware components of a sensor node.pptx
 
Underwater sensor network
Underwater sensor networkUnderwater sensor network
Underwater sensor network
 
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
 
A Review On Reactive And Proactive Wireless Sensor Networks Protocols
A Review On Reactive And Proactive Wireless Sensor Networks ProtocolsA Review On Reactive And Proactive Wireless Sensor Networks Protocols
A Review On Reactive And Proactive Wireless Sensor Networks Protocols
 
Oj3425062509
Oj3425062509Oj3425062509
Oj3425062509
 
Pontem Monitoring using IoT
Pontem Monitoring using IoTPontem Monitoring using IoT
Pontem Monitoring using IoT
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...
Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...
Analysis on Data Transmission in Underwater Acoustic Sensor Network for Compl...
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1
 

Recently uploaded

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 

Recently uploaded (20)

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 

Wireless underground Sensor Network based on IOT water saved agriculture

  • 1. State of the Art Seminar Presentation on IOT-WUSN(Wireless Underground Sensor networks ) Presented by Yohannes Bishaw EmailJohn.fhy@gmail.com
  • 2. Contents Covered Introduction Types of WUSN Current technology for WUSN WUSN design challenges Conclusion Application of WUSN Communication Architecture WUSN
  • 3. Introduction The Internet of things (IoT) is the inter-networking of physical devices, vehicles (also referred to as "connected devices" and "smart devices"), buildings, and other items—embedded with electronics, software, sensors, actuators, and network connectivity that enable these objects to collect and exchange data.
  • 4. Introduction… In WUSN the node is completely underground.  WUSN consist of wireless devices that operate below the ground surface. These devices are buried completely under dense soil. The main difference between WUSN and the terrestrial wireless sensor network is the communication medium.  Wireless Underground Sensor Networks (WUSN) have the potential to impact a wide variety of new applications including intelligent irrigation, soil information monitoring, etc, the internet of tings for water-saving agriculture.
  • 5. Types of WSN Terrestrial WSN  Distributed in given area either in ad-hoc manner Under Ground WSN Sensors buried underground , agriculture or in cave or mines that monitors underground conditions. Under Water WSN  Sensors are located under water. Multimedia WSN  sensors are equipped with cameras and microphones.
  • 7. Application of wireless underground sensor network Environmental monitoring of the water-saving agriculture Safety detection of mine Quality monitoring of underground facilities Navigation of ground vehicle Intelligent mines
  • 8. Current technology for underground sensing The current system consists of a buried sensor and a data logger on the surface Very useful for a variety of applications Suffer from several shortcomings when compared to wireless underground sensor networks Concealment Ease of deployment Timeliness of data Reliability Coverage density
  • 9. Concealment In current systems the data loggers are deployed on surface Communication is easier as no underground communication is involved Above ground equipment is vulnerable to agricultural and landscaping equipment or unacceptable for aesthetic reasons In WUSN the equipment is underground secure from any theft and protected from damage
  • 10. Ease of deployment Current technology uses wired system Tough to add new sensors or data loggers No scalability issues with WUSN as its fully wireless Timeliness of data Due to wireless nature the data from sensors is forwarded in real time to sink In data loggers the data may be stored for later retrieval
  • 11. Reliability Current systems are fully dependent on data loggers Data logger failure means whole network failure WUSN eliminate the need of data logger Each sensor can forward sensor readings independently WUSN’s are self healing
  • 12. Coverage density Current systems require the sensor to be deployed close to the data logger. It results in less coverage. WUSN eliminate the need of data logger. Sensors can be deployed anywhere , hence increasing the coverage area.
  • 13. WUSN design challenges Power Conservation Topology design Antenna design Environmental extremes
  • 14. Power conservation Underground sensor nodes require more power as attenuation is more Difficult to recharge or replace batteries Solar or any alternate energy form also can’t be used Power conservation is the key Should be implemented by using power efficient hardware and communication protocols
  • 15. Topology design Considerations Application-The density of sensor deployment is dictated by the application. Security application require dense whereas soil monitoring less dense deployment. Power usage minimization-Power usage can be minimized by designing a topology with a large number of short-distance hops rather than a smaller number of long-distance hops. Cost-Deeper and Denser deployments result in more costs. Establish trade offs.
  • 16. Underground topology All sensor devices underground Sink may be underground or above it Can be single depth or multi depth Provides maximum concealment of network Ground air ground path can be used
  • 17. Hybrid topology Mixture of underground and aboveground sensor devices Power intensive underground hops can be traded for less expensive hops in a terrestrial network. Terrestrial devices can be easily recharger or replaced Network is not fully concealed
  • 18. Antenna design Issues to be considered Variable requirements-Devices near the surface air interface have different requirements from those deeper inside as they suffer from reflection. Size-Lower frequencies require larger antennas, this is a challenge as sensor device size should be small. Directionality-The antennas should be oriented for both horizontal and vertical communication.
  • 19. Environmental extremes Underground environment is not ideal for electronic devices Protection from water, animals, insects etc. is needed. Devices should be resistant to pressure of people or objects moving overhead
  • 20. Communication architecture of sensor networks
  • 21. Physical layer Lower frequencies are ideal for WUSN They face less attenuation but the antenna size becomes large Lower frequencies result in lesser bandwidth Due to this the data rate in WUSN is very less
  • 22. Data link layer In WUSN the focus should be on less retransmissions Traditional link layer protocols are contention based or TDMA based Collision avoidance using CTS/RTS involves too much overhead In TDMA based scheme the synchronization may be lost between nodes
  • 23. Network layer Ad hoc routing protocols may be proactive, reactive or geographical Both proactive and reactive are not applicable to WUSN due to signaling overhead and synchronization issues Geographical routing can be helpful for WUSN only in some cases Routing protocols should be dynamic as link costs change due to soil conditions, water etc.
  • 24. Transport layer Performs function of flow control and congestion control Congestion control can be done by routing data to terrestrial relays which are capable of a higher data rate Window based mechanism for flow control may not be applicable to WUSN as retransmissions are more In WUSN retransmission should be less to save energy
  • 25. Conclusion We introduced the concept of WUSNs in which sensor devices are deployed completely below ground. There e are existing applications of underground sensing, such as soil monitoring for agriculture. Sensor Networks are emerging as a great aid in improving agricultural productivity, quality and resource optimization. Very application dependent and close interaction between agriculture scientist and ICT researchers will help. Several challenges like underground wireless channel, less bandwidth, power conservation etc.