Download presentation
Presentation is loading. Please wait.
Published byLester Payne Modified over 6 years ago
1
Threshold sensitive Energy Efficient sensor Network (TEEN)
2
CONTENTS 1. Introduction 2. Features 3. Operational flow of TEEN
4. Functioning 5. APTEEN 6. Timeline for APTEEN 7. Applications of TEEN 8. Advantages of TEEN 9. TEEN Drawback 10. Conclusion
3
INTRODUCTION A Routing Protocol for Enhanced Efficiency in Wireless Sensor Networks It is targeted at reactive networks and is the first protocol developed for reactive networks It’s a hierarchical protocol designed to respond to sudden changes in the sensed attributes It uses data centric mechanism.
4
FEATURES Time critical data reaches the user almost instantaneously.
The soft threshold can be varied, depending on the criticality of the sensed attribute and the target application.
5
A smaller value of the soft threshold gives a more accurate picture of the network, at the expense of increased energy consumption. At every cluster change time, the attributes are broadcast afresh and so, the user can change them as required
6
OPERATIONAL FLOW OF TEEN
7
In TEEN protocol cluster head formation process is based on LEACH (Low Energy Adaptive clustering in Hierarchy). First, the clusters are formed, and then CH broadcasts two thresholds to all the member nodes: a) hard threshold (HT) b) soft threshold (ST). At every cluster change time, these two attributes are also broadcast by CH.
8
FUNCTIONING Hard Threshold (HT): It is the absolute value of the attribute beyond which, the node sensing this value must switch on its transmitter and report to its cluster head. Soft Threshold (ST): This is a small change in the value of the sensed attribute which triggers the node to switch on its transmitter and transmit.
9
APTEEN 1. The TEEN protocol is succeeded by the APTEEN (Adaptive Periodic Threshold-sensitive Energy Efficient Sensor Network) protocol which aims at capturing periodic data aggregations and respond to time-critical events. 2. In APTEEN once the CHs are decided, in each cluster period, the cluster head first broadcasts the following parameters: a) Attributes (A) c) Threshold b) Schedule d) Count Time
10
TIMELINE FOR APTEEN
11
This protocol is best suited for time critical applications such as:
APPLICATIONS OF TEEN This protocol is best suited for time critical applications such as: a) intrusion detection, b) explosion detection etc.
12
ADVANTAGES OF TEEN Reliable data delivery
suitable for application where the data requirement by the end user is totally event driven.
13
TEEN DRAWBACK If the thresholds are not reached, the nodes will never communicate, the user will not get any data from the network at all and will not come to know even if all the nodes die. not well suited for applications where the user needs to get data on a regular basis.
14
There are no collisions in the cluster.
TDMA scheduling of the nodes can be used to avoid this problem.
15
CONCLUSION 1. We introduce a new network protocol, TEEN for reactive networks. 2. well suited for time critical applications 3. quite efficient in terms of energy consumption and response time. 4. It allows the user to control the energy consumption and accuracy to suit the application
16
YOU CAN WRITE US AT : queries@thesisscientist.com
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.