Download presentation
Presentation is loading. Please wait.
1
WIRELESS SENSOR NETWORKS
SEMINAR PRESENTATION ON WIRELESS SENSOR NETWORKS GUIDED BY: SUBMITTED BY: ANSHU TOSHNIWAL JAIDEEP JANGIR
2
CONTENTS INTRODUCTION ARCHITECTURE PROTOCOLS ROUTING APPLICATIONS
TOPOLOGY TYPES OF SENSORS
3
INTRODUCTION WSN are used to collect data from the environment.
They consists of large number of sensor nodes and one or more Base Stations. The nodes in the network are connected via Wireless communication channels. Each node has capability to sense data, process the data and send it to rest of the nodes or to Base Station. These networks are limited by the node battery lifetime.
4
ADVANTAGES It avoid lot of wiring.
It can accommodate new devices at any time. Its flexible to go through physical partitions. It can be accessed through a centralised monitor.
5
DISADVANTAGES It is very easy for hackers to hack it as we cant control propagation of waves. Comparitively low speed of communications. Gets distracted by various elements like Blue-tooth. Still costly at large.
6
WSN ARCHITECTURE Wireless Sensor Network Architecture Sensor Node
Gateway Base Station Wireless Sensor Network Architecture
7
Sensor node functionality
Each sensor node contains a computational module (a programmable unit) which provides computation ability, storage, and bidirectional communication with other nodes in the system Two advantages: They can be re-task in the field Easily communicate with the rest of the network
8
Gateway Each sensor patch contains a gateway node
Each gateway node can communicate with the sensor network and provides connectivity to the transit network
9
Transit Network Can consist of a single hop link or a series of networked wireless nodes Each transit network design has different characteristics Robustness Bandwidth Energy efficiency Cost Manageability
10
Base Station Data storage for the collection of sensor patches
WAN connectivity will be wireless Base-Remote link connection to the internet
11
WSN PROTOCOLS Wireless sensor network routing protocols can be classified into following categories. Direct communication Flat protocols (Multihop) Hierarchical Routing Protocols
12
ROUTING MECHANISM Cluster Head Multihop Routing Direct Communication
Hierarchical Routing Cluster Head
13
Applications of WSN Environmental/Habitat monitoring
Acoustic detection Seismic Detection Military surveillance Inventory tracking Medical monitoring Process Monitoring
14
Network Topology A communication network is composed of nodes, each of which has computing power and can transmit and receive messages over communication links. The basic network topologies are Fully connected networks Mesh networks Star networks Ring networks
15
TOPOLOGIES
16
Communication Protocols
Headers. Each message generally has a header identifying its source node, destination node, length of the data field, and other information. This is used by the nodes in proper routing of the message. In encoded messages, parity bits may be included. In packet routing networks, each message is broken into packets of fixed length. The packets are transmitted separately through the network and then reassembled at the destination.
17
Switching Most computer networks use a store-and-forward switching technique to control the flow of information. Each time a packet reaches a node, it is completely buffered in local memory, and transmitted as a whole. Switching techniques : Wormhole Technique- It splits the message into smaller units known as flow control units or flits. The header flit determines the route. As the header is routed, the remaining flits follow it in pipeline fashion Virtual-cut-through Technique- when the header arrives at a node, it is routed without waiting for the rest of the packet.
18
Routing There may be multiple paths from the source to the destination. Therefore, message routing plays an important role. The main performance measures affected by the routing scheme are throughput (quantity of service) and average packet delay (quality of service). Types of Routing Schemes: Token Ring Fixed routing schemes Adaptive routing schemes
19
Power Management NEED - With the advent of ad hoc networks of geographically distributed sensors in remote site environments (e.g. sensors dropped from aircraft for personnel/vehicle surveillance) Power management is employed to increase the lifetimes of sensor nodes. Current research is in designing small MEMS (microelectromechanical systems) RF components for transceivers, including capacitors, inductors, etc. RF-ID (RF identification) devices are transponder microcircuits having an L-C tank circuit that stores power from received interrogation signals, and then uses that power to transmit a response.
20
Hierarchical clustering
observer The essential operation in sensor node clustering is to : Select a set of cluster heads among the nodes in the network. Cluster the rest of the nodes with these heads. Cluster heads are responsible for : Coordination among the nodes within their clusters (intra-cluster coordination). Communication with each other and/or with external observers on behalf of their clusters (inter-cluster communication). CH CH CH
21
Cluster-based approach
Topology management Cell-based approach Cluster-based approach observer
22
TYPES OF SENSORS Mechanical Sensors The Piezoresistive Effect
The Piezoelectric Effect Capacitive Sensors Inductive sensors Optical Transducers Photoelectric effect Photoconductive sensors Junction-based photosensors
23
Cont… Magnetic and Electromagnetic Sensors Magnetoresistive effect
Magnetic Field Sensors Thermal Sensors Thermo-Mechanical Transduction Thermoresistive Effects Thermocouples
24
CONCLUSION The emergence of wireless sensor networks can finally bridge the gap between physical and digital worlds, with the effect as if to establish nervous system for the physical world. It also allows measurement and monitoring in the way that is much closer to the phenomenon than ever before, resulting in continuous and high fidelity of data collected.
25
Future Scope Wireless sensor network has the potential to trigger the next revolution in computing. While its applications and potential benefits can spread far and beyond, and could finally break the barrier between physical and digital worlds to allow disappearance of computation.
26
THANK YOU
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.