WSN Paper
WSN Paper
WSN Paper
1
4."Data gathering" is to transmit data that has been collected by the sensor nodes
to the base station.
5.Hierarchical routing protocols imposes a "structure" on the network.
3.What is shadowing?
Ans. In the context of wireless communication, shadowing refers to the
attenuation or weakening of a radio signal due to the obstruction or absorption of
the signal by physical objects, such as buildings, trees, or terrain. This effect can
cause signal fading and signal strength variations in different locations, even
within a small area. Shadowing is one of the main causes of signal loss and
degradation in wireless communication, and it can be mitigated through
techniques such as antenna diversity, power control, and frequency hopping.
2
4.What is Data dissemination?
Ans. Data dissemination refers to the process of distributing or broadcasting data
to a large number of users or recipients, often over a network or through wireless
communication. This can involve the transmission of various types of data, such
as multimedia, sensor data, or software updates, to individual devices or groups
of devices in a timely and efficient manner. Data dissemination is a critical
component in many applications and domains, such as IoT, smart cities,
emergency response, and social networks, where the timely and accurate
distribution of information can significantly impact the decision-making and
actions of users.
4
These types of sensor nodes are used to collect data from different sources. They
are equipped with sensors that can measure various parameters such as
temperature, humidity, pressure, and light. Data acquisition nodes are usually
deployed in large numbers to cover a wide area and provide comprehensive data
about environmental conditions. These nodes are powered by batteries and are
designed to consume minimal power to extend their operational lifetime.
2. Processing nodes:
Processing nodes are responsible for analyzing and processing the data received
from data acquisition nodes. They are equipped with more powerful processors
and memory than data acquisition nodes, allowing them to handle more complex
data analysis tasks. These nodes are usually connected to a central node, which
acts as a gateway between the WSN and the external world.
3. Routing nodes:
Routing nodes are responsible for forwarding data from one node to another in a
WSN. They are equipped with a radio transceiver and a routing protocol that
enables them to communicate with other nodes in the network. Routing nodes
can be used to create different network topologies, including mesh, star, and tree.
4. Sink nodes:
Sink nodes are also known as base stations or gateway nodes. They are
responsible for collecting data from all the nodes in the network and forwarding
it to an external system for further processing. Sink nodes usually have more
processing power and memory than other nodes in the network to handle the
large amounts of data received from multiple nodes.
5. Actuator nodes:
Actuator nodes are responsible for controlling physical devices such as motors,
valves, and switches. These nodes are connected to a WSN and can be controlled
remotely using wireless communication protocols. Actuator nodes are typically
5
used in industrial automation and control systems to control the operation of
machines and equipment.
6. Hybrid nodes:
Hybrid nodes are sensor nodes that can perform multiple functions. They can be
equipped with sensors for data acquisition, processors for data processing, and
radios for wireless communication. Hybrid nodes are versatile and can be used in
a wide range of applications, including environmental monitoring, healthcare,
and smart homes.
3. Data Accuracy: WSNs are designed to collect data about the physical
world. Therefore, it is essential to ensure that the collected data is accurate
and reliable. The accuracy of data can be improved by using appropriate
sensor technologies, signal processing techniques, and data fusion
algorithms.
7
7. Fault Tolerance: WSNs are subject to various types of faults, including
node failures, link failures, and network partitions. Thus, ensuring that the
network can continue to operate even in the presence of these faults is
another important optimization goal. This can be achieved by using fault-
tolerant routing protocols, redundancy, and self-healing algorithms.
8
4. Agriculture: WSNs can be used to monitor the growth, health, and
productivity of crops, livestock, and fish. The collected data can be used for
precision farming, irrigation, and pest control.
5. Smart Homes and Buildings: WSNs can be used to monitor and control
various aspects of homes and buildings, such as energy consumption,
temperature, lighting, and security. The collected data can be used to
optimize the energy usage, improve the indoor environment, and enhance
the safety.
1. Sensor: The sensor is the primary component of the sensor node that senses
the physical or environmental parameter, such as temperature, humidity,
light, or motion. It converts the analog signals into digital signals that can
be processed by the microcontroller.
4. Memory: The memory is a component that stores the data and programs of
the sensor node. It consists of two types of memory: volatile memory, such
as RAM, for temporary storage of data and instructions, and non-volatile
memory, such as ROM, for permanent storage of programs and data.
13
2. Low Latency:
Another critical requirement of a MAC protocol is low latency. The MAC
protocol must ensure that the devices can transmit and receive data quickly to
minimize the delay in data transmission. The protocol should provide efficient
scheduling and data transfer mechanisms that reduce the time required to
complete a communication transaction.
3. High Reliability:
The MAC protocol must ensure high reliability in data transmission. The
protocol should provide mechanisms to detect and correct errors and minimize
the impact of noise and interference on the wireless channel. The protocol should
also ensure that the data is transmitted without loss or duplication.
4. Scalability:
The MAC protocol must be scalable to support a large number of devices in the
WSN. The protocol should provide efficient mechanisms for channel access,
synchronization, and collision avoidance. The protocol should also be able to
adapt to the changing network topology and traffic patterns.
5. Fairness:
The MAC protocol must ensure that all devices in the WSN have an equal
opportunity to access the wireless channel. The protocol should provide
mechanisms to prevent any device from monopolizing the channel or delaying
the transmission of other devices.
6. Security:
The MAC protocol must provide security mechanisms to prevent unauthorized
access to the wireless channel and protect the data transmitted in the network.
The protocol should provide encryption, authentication, and access control
mechanisms to ensure the integrity and confidentiality of the data.
14
In conclusion, a MAC protocol is an essential component of a Wireless Sensor
Network (WSN). The MAC protocol must meet several requirements, including
low power consumption, low latency, high reliability, scalability, fairness, and
security. These requirements are critical for the efficient operation of the WSN
and the successful deployment of various applications such as environmental
monitoring, healthcare, and smart cities.
15
2. Listen Mode: After the sleep timer expires, the node wakes up and enters
the listen mode, during which it turns on its radio and listens for incoming
packets. During the listen mode, the node can receive data packets from
other nodes and can also send packets to the base station or other nodes in
the network.
4. Backoff and Sleep: After the node has successfully transmitted or received
data, it goes back to sleep mode to conserve energy. If the node fails to
transmit or receive data after a fixed number of retries, it goes back to sleep
mode and tries again in the next listen cycle.
The periodic listen and sleep operation in S-MAC can significantly reduce the
energy consumption of sensor nodes by avoiding unnecessary idle listening and
by efficiently using the available wireless channel. By controlling the duty cycle
and other parameters, the protocol can optimize the trade-off between energy
consumption and communication performance, such as latency, throughput, and
packet loss. S-MAC is a widely used protocol in WSNs and has been shown to
be effective in many applications, such as environmental monitoring, healthcare,
and smart cities.
1. Direct Routing: In direct routing, each sensor node sends data directly to
the sink node. This strategy is simple but may not be suitable for large-scale
WSNs as it could result in high traffic and lead to congestion, which would
further increase energy consumption.
2. Flat Routing: In flat routing, all the nodes are at the same level, and the data
is forwarded hop-by-hop until it reaches the sink node. This approach
requires that every node participate in the routing process, which may lead
to network overhead and potential congestion.
Each of these routing strategies has its advantages and disadvantages, and the
choice of the routing strategy depends on the specific requirements of the
application and network.
4. How Power-efficient gathering in sensor information systems (PEGASIS)
routing protocol works?
Ans. Power-efficient gathering in sensor information systems (PEGASIS) is a
hierarchical routing protocol designed for Wireless Sensor Networks (WSNs) to
improve energy efficiency and prolong network lifetime. Here's how PEGASIS
works:
1. Node Selection: In PEGASIS, the nodes are first arranged in a chain, and
then each node selects its closest neighbor to form a one-dimensional chain.
2. Cluster Formation: In the next step, nodes are divided into clusters, where
each cluster contains a fixed number of nodes. The cluster heads are
selected based on the remaining energy level of the nodes.
3. Cluster Head Chain Formation: The cluster heads then form a chain, where
each cluster head selects the next closest cluster head as its successor.
6. Successor Selection: After a node transmits its data to its successor, it turns
off its transmitter to conserve energy. The next time it needs to transmit
data, it turns on its transmitter and selects the next closest cluster head as its
successor.
5. What are the issues need to consider to design transport protocols for WSNs.
Ans. Designing transport protocols for Wireless Sensor Networks (WSNs) is a
challenging task due to several factors that need to be considered. Here are some
of the key issues that need to be addressed when designing transport protocols for
WSNs:
1. Energy Efficiency: Since the sensor nodes in WSNs are typically battery-
powered, energy efficiency is a critical consideration. The transport
protocol should minimize the energy consumption during data transfer and
ensure that the nodes are not drained of their energy resources quickly.
4. Node Failure: Since the sensor nodes in WSNs are prone to failures due to
factors such as battery exhaustion or physical damage, the transport
protocol should be able to detect and recover from node failures to ensure
data integrity and reliability.
6. Security: WSNs may transmit sensitive data, and hence the transport
protocol should support security mechanisms such as encryption,
authentication, and confidentiality to protect the data from unauthorized
access.
7. Scalability: WSNs may comprise a large number of nodes, and hence the
transport protocol should be scalable to handle large-scale networks.
20
1. Data Encoding: In SPIN, the data is encoded in a specific format, which
includes the data type, data value, and other metadata. This format enables
efficient data aggregation and processing.
SPIN is a lightweight and scalable protocol that can handle a large number of
nodes. Its negotiation-based approach enables efficient and adaptive data
dissemination, which reduces the network traffic and energy consumption. SPIN
has been widely used in WSN applications such as environmental monitoring,
healthcare, and military surveillance.
21
1. Explain range for signal propagation in wireless transmission.
Ans. The range of signal propagation in wireless transmission refers to the
maximum distance that a wireless signal can travel between a transmitter and a
receiver while still maintaining a reliable and usable signal strength. The range of
signal propagation is determined by several factors:
2. Transmit Power: The transmit power of the wireless signal also affects the
range of propagation. The higher the transmit power, the greater the range
of propagation. However, higher transmit power also leads to greater
energy consumption and may cause interference with other devices.
4. Antenna Type: The type of antenna used for transmission and reception
also affects the range of propagation. Antennas with higher gain can
increase the range of propagation by focusing the signal in a specific
direction.
22
It's important to note that the range of signal propagation is not a fixed value and
can vary depending on the specific wireless system, the environment, and other
factors. In practical applications, the range of propagation is often determined
through empirical testing and optimization to ensure reliable and effective
wireless communication.
1. Voice Calls: GSM supports circuit-switched voice calls, which allow users
to make and receive phone calls using their mobile devices. GSM uses
Time Division Multiple Access (TDMA) technology to allocate radio
frequencies to multiple calls simultaneously.
2. SMS (Short Message Service): SMS allows users to send and receive text
messages using their mobile devices. SMS messages are limited to 160
characters and can be sent and received even when voice calls are not
possible.
23
5. Roaming: GSM enables users to use their mobile devices while traveling in
other countries or regions. This is possible through international roaming
agreements between different GSM network operators.
6. Caller ID: GSM supports caller ID, which allows users to see the phone
number of the incoming call before answering the call.
7. Call Waiting: GSM supports call waiting, which allows users to receive
incoming calls while they are already on a call. The user can choose to put
the current call on hold and answer the incoming call.
24
information such as phone number, address book, and other data. The UE
connects to the UMTS network through the Radio Access Network (RAN).
Node B: Node B is a base station that communicates with the UE over the
air interface using WCDMA (Wideband Code Division Multiple Access)
technology. Node B is responsible for managing the radio resources, signal
transmission, and reception.
3. Core Network:
The core network provides the backbone for the UMTS network, and it includes
several components:
Mobile Switching Center (MSC): The MSC is responsible for call routing
and control. It provides connections between the UE and the Public
Switched Telephone Network (PSTN) or other networks.
Serving GPRS Support Node (SGSN): The SGSN is responsible for packet
switching and routing in the UMTS network. It manages the user's
mobility, location management, and packet delivery.
25
Gateway GPRS Support Node (GGSN): The GGSN provides an interface
between the UMTS network and external packet data networks, such as the
internet. It is responsible for packet routing, forwarding, and charging.
Home Location Register (HLR): The HLR is a database that stores user-
specific information, such as the user's phone number, address book, and
other data.
26
GEO
(Geostationary LEO (Low Earth MEO (Medium
Attribute Earth Orbit) Orbit) Earth Orbit)
Cost Expensive Affordable Affordable
Satellite internet,
TV broadcasting, Earth observation, Navigation,
continuous low-latency mobile
Applications coverage communication communication
In summary, GEO satellites orbit at a high altitude, take 24 hours to orbit the
Earth, provide global coverage, have high latency, are expensive to launch and
maintain, and are best suited for continuous coverage applications. LEO satellites
orbit at a low altitude, take 90 minutes to orbit the Earth, provide regional
coverage, have low latency, are affordable to launch and maintain, and are best
suited for low-latency communication and Earth observation applications. MEO
satellites orbit at a medium altitude, take between 2 to 12 hours to orbit the Earth,
provide regional coverage, have medium latency, are affordable to launch and
maintain, and are best suited for navigation and mobile communication
applications.
27
HSCSD achieves its higher data transmission speed by allocating multiple time
slots in the GSM network to a single user, rather than using only one time slot as
in CSD. The number of time slots allocated to a user depends on the bandwidth
required by the application and the availability of time slots in the network.
HSCSD is a simple and reliable technology that can be used for applications that
require a dedicated circuit-switched connection, such as remote monitoring and
control systems, point-of-sale terminals, and telemetry applications. However,
the use of dedicated connections means that HSCSD is not efficient for bursty
data transmission, and its data rates are limited compared to more modern
wireless technologies such as GPRS and LTE.
3. Multiple Users: DECT allows multiple users to share the same base station
and frequency channel, supporting up to 12 simultaneous calls.
28
4. Interference-Free: DECT uses Frequency Hopping Spread Spectrum
(FHSS) technology to minimize interference from other wireless devices
operating in the same frequency band.
6. Low Power Consumption: DECT handsets and base stations are designed to
operate on low power, enabling long battery life and energy-efficient
operation.
DECT systems are widely used for cordless telephony and are also used in a
variety of other applications, including wireless headsets, baby monitors, home
automation, and security systems.
29
1. Component-based architecture: TinyOS is designed using a component-
based architecture that allows developers to create modular, reusable
components that can be easily combined to create complex applications.
30
9. Active development community: TinyOS has a large and active
development community that contributes to the ongoing development and
improvement of the operating system.
Overall, TinyOS provides a powerful and flexible platform for developing low-
power wireless sensor network applications, with a range of features designed to
optimize performance, efficiency, and scalability.
31
4. Re-evaluation: Once the congestion has been resolved, network devices re-
evaluate the network parameters and adjust their behavior as needed. For
example, if the congestion was caused by an increase in traffic, the device
may increase the transmission window or adjust the congestion control
algorithm to allow for a higher data rate.
3. Amplifier - This is a device that increases the strength of the radio signal to
ensure that it can be transmitted over long distances.
Together, these components work in tandem to ensure that the radio subsystem
can transmit and receive signals over long distances with minimal loss of data.
They are essential components of any mobile communication system and are
critical to the functioning of modern communication technology.
33
5.Discuss the advantage of cellular systems with small cells.
Ans. Cellular systems with small cells have several advantages:
2. Improved coverage: Small cells can be deployed in areas where macro cells
have poor coverage, such as indoors or in densely populated areas. This
improves the overall coverage of the network and provides better service to
users.
3. Lower latency: Small cells reduce the distance between the user and the
base station, resulting in lower latency and faster data transfer rates.
4. Lower power consumption: Small cells use less power than macro cells,
which reduces energy costs and makes it easier to deploy them in areas
without access to a reliable power supply.
34