WSN Unit 2
WSN Unit 2
WSN Unit 2
RAVINDRA BABU
UNIT-II
NETWORKING TECHNOLOGIES
Syllabus: Physical Layer and Transceiver Design Considerations, Personal area networks (PANs),
hidden node and exposed node problem, Topologies of PANs, MANETs, WANETs.
1
WIRELESS SENSORS & NETWORKS Mr. V. NAVEEN RAJA & Mr. A. RAVINDRA BABU
Next one is Antenna considerations, the desired small form factor of the overall sensor
nodes restricts the size and the number of antennas. If the antenna is much smaller than the
carriers wavelength, it is hard to achieve good antenna efficiency, that is, with ill-sized antennas
one must spend more transmit energy to obtain the same radiated energy. With small sensor node
cases, it will be hard to place two antennas with suitable distance to achieve receive diversity. The
antennas should be spaced apart at least 4050% of the wavelength used to achieve good effects
from diversity.
Finally, the ability to do physical layer multicasting is useful. By physical layer multicasting,
we mean that a signal can be sent to multiple receivers at the same time, but not necessarily
broadcast. The desired receivers are able to receive the desired signal, and the other receivers to
filter it out, at the physical layer. Of course, the filtering can be done higher in the protocol stack as
well, but that consumes more resources than physical layer multicasting.
(a) Narrow band Technologies: Narrow-band technologies employ a radio bandwidth, W, that is
narrow in the sense that it is on the order of the symbol rate. In fact, if M-ary symbols are used
(using higher-level modulation schemes), then each symbol conveys bits of information.
Therefore the bandwidth efficiency is where R is the data rate in bits per unit time. is often
described in bits per second per hertz. Note that the Shannon capacity, in bits per second per
hertz, can be expressed as: ---------------- (1)
Where
In Majority of traditional systems bandwidth is limited due to regulatory and/or licensing
constraints in narrow frequencies. An important objective in the design of such systems is to
maximize achievable data rate. Therefore, it becomes desirable to increase , which may increase
the . Since real modulation schemes do not achieve capacity, so the modulation schemes like
4QAM, 16QAM and 64-QAM are used.
(b) Spread spectrum technologies: The advantages of spread spectrum systems over narrow
band systems includes
Low probability of detection
Low probability of interrupt
Ability to communicate with low power
Noise-like signals and noise-like interference to other receivers
Robustness to narrow-band interference
Multiple-access to the same frequency band by several transmitters
Robustness to multipath channel impairments
Properly designed spread spectrum systems can achieve higher effective SNR than equal-rate
narrowband systems, for the same transmit power. This gain, at the expense of bandwidth, is often
quantified as processing gain, which is the ratio of transmission bandwidth to data bandwidth.
2
WIRELESS SENSORS & NETWORKS Mr. V. NAVEEN RAJA & Mr. A. RAVINDRA BABU
Advantages 3 through 5 are especially useful for sensor networks. In addition, spread spectrum is
good for physical layer multicasting. There are a variety of spread spectrum technologies, the most
widespread of which is Direct-Sequence Spread Spectrum (DS-SS). In DS-SS, a narrowband signal
is spread into a wideband signal, by modulating it with a high rate chip sequence. The chip
sequence is pseudorandom, giving the resultant signal its characteristic properties. Another
common variety of spread spectrum is Frequency Hopping Spread Spectrum (FH-SS). In FH-SS, the
spreading is achieved by hopping the signal over a wide range of frequencies, where the
sequence of hopped to frequencies is pseudo-random.
The technologies are now compared according to various criteria, and rated. The ratings are
collected together in TABLE- 2.1. The ratings are on a scale of 1 to 5, with 1 being the worst rating
(very poor) and 5 being the best (very good).
3
WIRELESS SENSORS & NETWORKS Mr. V. NAVEEN RAJA & Mr. A. RAVINDRA BABU
Examples-1:
1. Blue tooth wireless PAN:
These are referred as Pico nets. Pico nets are Ad hoc networks.
Pico nets work over a range of 200metres and transmit data of about 2100 Kbit/ sec.
The Bluetooth technology is based on IEEE 802.15 standard.
The wearable and portable computer devices communicate with each other.
In this process of hand shake, an electric field is generated around people, and they emit
Pico amps.
These emissions complete the circuit and hence an exchange of information takes place.
Examples-2:
2. ZigBee:
It is a short-range, low-power computer networking protocol that complies with the IEEE
802.15.4 standard.
In the U.S., ZigBee devices operate in the 902-928 MHz and 2.4 GHz unlicensed bands.
ZigBee employs DS-SS modulation with a gross data rate of 40 kb/s in the 900 MHz band
and 250 kb/s in the 2.4 GHz band.
There are three types of ZigBee devices:
ZigBee Coordinator (ZC): Forming the root of the network tree and bridging to other
networks ,
ZigBee Router (ZR): It can run an application function as well as act as an
intermediate router by passing data from other devices.
ZigBee End Device (ZED): It contains just enough functionality to talk to its parent
node. It can sleep most of the time, extending its battery life.
Examples-3:
3. Ultra-Wide Band(UWB):
It is a radio technology useful for short-range, high-bandwidth communications that does
not create harmful interference to users sharing the same band.
A pulse-based UWB method is the basis of the IEEE 802.15.4a draft standard
Examples-4:
4. Wi-Fi or WiMAX
Wi-Fi or WiFi is a technology for wireless local area networking with devices based on the
IEEE 802.11 standards.
In WSN, to exchange data two exchange control frames are used before transmitting data
1. Request to Send(RTS)
2. Clear to Send(CTS)
RTS/CTS is the optional mechanism used by the 802.11 wireless networking protocol to reduce
frame collisions introduced by the hidden node problem. The RTS/CTS frames can cause a new
problem called the exposed terminal problem. These control frames duty includes
1. If sender sees CTS, transmits data.
2. If other node sees CTS, will idle for specified period.
3. If other node sees RTS but not CTS, free to send
4
WIRELESS SENSORS & NETWORKS Mr. V. NAVEEN RAJA & Mr. A. RAVINDRA BABU
(a) (b)
Figure 2.1 (a) & (b) Hidden node problem
5
WIRELESS SENSORS & NETWORKS Mr. V. NAVEEN RAJA & Mr. A. RAVINDRA BABU
(a) (b)
Figure 2.3 (a) & (b) Exposed Node/terminal problem
6
WIRELESS SENSORS & NETWORKS Mr. V. NAVEEN RAJA & Mr. A. RAVINDRA BABU
Example of MANETs: Node 1 and node 3 are not within range of each other, however the node 2
can be used to forward packets between node 1and node 2. The node 2 will act as a router and
these three nodes together form an ad-hoc Network.
7
WIRELESS SENSORS & NETWORKS Mr. V. NAVEEN RAJA & Mr. A. RAVINDRA BABU
3. Autonomous terminal: In MANET, each mobile node is an independent node (could function
as host/router).
4. Dynamic topology: Nodes are free to move arbitrarily with different speeds; thus, the
network topology may change randomly and at unpredictable time.
5. Light-weight terminals: The nodes at MANET are mobile with less CPU capability, low
power storage and small memory size.
6. Shared Physical Medium: The wireless communication medium is accessible to any entity
with the appropriate equipment and adequate resources.
8
WIRELESS SENSORS & NETWORKS Mr. V. NAVEEN RAJA & Mr. A. RAVINDRA BABU
allowed to join and leave the wireless network. As soon as an adversary comes in the radio
range of a node it will be able to communicate with that node.
3. Cooperativeness: Routing algorithm for MANETs usually assumes that nodes are
cooperative and non-malicious. As a result a malicious attacker can easily become an
important routing agent and disrupt network operation.
4. Limited power supply: The nodes in mobile ad-hoc network need to consider restricted
power supply, which will cause several problems. A node in mobile ad-hoc network may
behave in a selfish manner when it is finding that there is only limited power supply.
5. Adversary inside the Network: The mobile nodes within the MANET can freely join and leave
the network. The nodes within network may also behave maliciously. This is hard to detect
that the behavior of the node is malicious. Thus this attack is more dangerous than the
external attack.
1) Proactive Protocols: Proactive, or table-driven routing protocols. In proactive routing, each node
has to maintain one or more tables to store routing information, and any changes in network
topology need to be reflected by propagating updates throughout the network in order to
maintain a consistent network view. Examples of such schemes are the conventional routing
schemes: Destination sequenced distance vector (DSDV). They attempt to maintain consistent, up-
to-date routing information of the whole network. It minimizes the delay in communication and
allows nodes to quickly determine which nodes are present or reachable in the network.
2) Reactive Protocols: Reactive routing is also known as on-demand routing protocol since they do
not maintain routing information or routing activity at the network nodes if there is no
communication. If a node wants to send a packet to another node then this protocol searches for
the route in an on-demand manner and establishes the connection in order to transmit and
receive the packet. The route discovery occurs by flooding the route request packets throughout
the network. Examples of reactive routing protocols are the Ad-hoc On-demand Distance Vector
routing (AODV) and Dynamic Source Routing (DSR).
3) Hybrid Protocols: They introduces a hybrid model that combines reactive and proactive routing
protocols. The Zone Routing Protocol (ZRP) is a hybrid routing protocol that divides the network
into zones. ZRP provides a hierarchical architecture where each node has to maintain additional
topological information requiring extra memory.
9
WIRELESS SENSORS & NETWORKS Mr. V. NAVEEN RAJA & Mr. A. RAVINDRA BABU
10
WIRELESS SENSORS & NETWORKS Mr. V. NAVEEN RAJA & Mr. A. RAVINDRA BABU
11
WIRELESS SENSORS & NETWORKS Mr. V. NAVEEN RAJA & Mr. A. RAVINDRA BABU
12
WIRELESS SENSORS & NETWORKS Mr. V. NAVEEN RAJA & Mr. A. RAVINDRA BABU
7) Real time guarantees: It is essential in VANET, as many safety related applications depend
on strict time guarantees. This feature is necessarily required in time sensitive road safety
applications to avoid collisions
13
WIRELESS SENSORS & NETWORKS Mr. V. NAVEEN RAJA & Mr. A. RAVINDRA BABU
EDR: Used in vehicles to register all important parameters, such as velocity, acceleration,
etc. especially during abnormal situations (accidents).
Forward radar: Used to detect any forward obstacles as far as 200 meters
Positioning System: Used to locate vehicles
Computing platform: Inputs from various components are used to generate useful
information
2.6.7 Intelligent vehicular ad hoc networks: InVANETs are a kind of artificial intelligence that
helps vehicles to behave in intelligent manners during vehicle-to-vehicle collisions, accidents.
Vehicles are using radio waves to communicate with each other.
14