WSN CIE Answers
WSN CIE Answers
CIE 1
1. a. (i) Spatially
b. (i) Records and monitors physical condition of environment
d. (i) Wireless
Components of WSN:
a. Sensors:
Sensors in WSN are used to capture the environmental variables and
which is used for data acquisition. Sensor signals are converted into
electrical signals.
b. Radio Nodes:
It is used to receive the data produced by the Sensors and sends it to the
WLAN access point. It consists of a microcontroller, transceiver,
external memory, and power source.
c. WLAN Access Point :
It receives the data which is sent by the Radio nodes wirelessly,
generally through the internet.
d. Evaluation Software :
The data received by the WLAN Access Point is processed by a software
called as Evaluation Software for presenting the report to the users for
further processing of the data which can be used for processing,
analysis, storage, and mining of the data.
3. Module 2 - Q(6) - Write a short note on (i) Reflection (ii) Diffraction (iii)
Scattering (iv) Doppler fading
Ans:
a. Reflection:
When a waveform propagating in medium A hits the boundary to
another medium B and the boundary layer between them is smooth,
one part of the waveform is reflected back into medium A, another one
is transmitted into medium B, and the rest is absorbed. The amount of
reflected/transmitted/absorbed energy depends on the materials and
frequencies involved.
b. Diffraction:
By Huygen's principle, all points on a wavefront can be considered as
sources of a new wavefront. If a waveform hits a sharp edge, it can by
this token be propagated into a shadowed region.
c. Scattering:
When a waveform hits a rough surface, it can be reflected multiple
times and diffused into many directions.
d. Doppler fading:
When a transmitter and receiver move relative to each other, the
waveforms experience a shift in frequency, according to the Doppler
effect. Too much of a shift can cause the receiver to sample signals at
wrong frequencies.
Ans:
For a controller, typical states are “active”, “idle”, and “sleep”; a radio
modem could turn transmitter, receiver, or both on or off; sensors and
memory could also be turned on or off. The usual terminology is to
speak of a “deeper” sleep state if less power is consumed.
b. Module 1 - Q(5) - 6M - Summarize the Application of Wireless Sensor
Network in detail with Example.
Ans:
Internet of Things (IOT)
Landslide Detection
Disaster relief applications:
Distributed organization:
Both the scalability and the robustness optimization goal, and to some
degree also the other goals, make it imperative to organize the network
in a distributed fashion. That means that there should be no centralized
entity in charge. Rather, the WSNs nodes should cooperatively organize
the network, using distributed algorithms and protocols. Self-
organization is a commonly used term for this principle.
In-network processing:
Aggregation:
Signal processing:
Depending on application, more sophisticated
processing of data can take place within the network
Example-Edge detection: locally exchange raw data
with neighboring nodes, compute edges, only
communicate edge description to far away data sinks
Example-Tracking/angle detection of signal source:
Conceive of sensor nodes as a distributed microphone
array, use it to compute the angle of a single source,
only communicate this angle, not all the raw data
Exploit temporal and spatial correlation
Observed signals might vary only slowly in time - no
need to transmit all data at full rate all the time
Signals of neighboring nodes are often quite similar -
only try to transmit differences.
Adaptive Fidelity
Adapt the effort with which data is exchanged to the currently
required accuracy/fidelity
Example-Event detection
When there is no event, only very rarely send short
“all is well” messages
When event occurs, increase rate of message
exchanges
Example-Temperature
When temperature is in acceptable range, only send
temperature values at low resolution
When temperature becomes high, increase resolution
and thus message length
Data centricity
In typical networks (including ad-hoc networks), network
transactions are addressed to the identities of specific nodes.
("node-centric” or “address-centric” networking paradigm)
In a redundantly deployed sensor networks, specific source of
an event, alarm, etc. might not be important. This focus of
networking transactions on the data directly instead of their
senders & transmitters is called data-centric networking and is
the principal design change.
Implementation options:
Overlay networks and distributed hash tables:
In peer-to-peer networking, the solution for an
efficient lookup of retrieval of data from an unknown
source is usually to form an overlay network,
implementing a Distributed Hash Table(DHT). The
desired data can be identified via a given key (a hash)
and the DHT will provide one (or possibly several)
sources for the data associated with this key.
Publish/Subscribe:
Ans:
When digital computers communicate, they exchange digital data, which are
essentially sequences of symbols.
Each symbol coming from a finite alphabet, the channel alphabet
In the process of modulation, (groups of) symbols from the channel alphabet
are mapped to one of a finite number of waveforms of the same finite length
called the symbol duration
With two different waveforms: a binary modulation results, symbol alphabet
are binary data {0, 1} or bipolar data {−1, 1}
If the size is m ∈ N, m > 2, we talk about m-ary modulation
“Speed” of data transmission/modulation
Symbol rate: The symbol rate is the inverse of the symbol duration; for
binary modulation, it is also called bit rate.
Data rate: The data rate is the rate in bit per second that the modulator
can accept for transmission; it is thus the rate by which a user can
transmit binary data.
Modulation is carried out at the transmitter.
The modulated signal s(t) can be represented as: s(t) = A(t) · cos(ω(t) +
φ(t)) , where
CIE-2
1. a. (iv) both(a) and (b)
b. (ii) controlled access
d. (ii) clustering
e. (ii) beacon frame
h. (iv) overhearing
2. Analyze the various problems in WSN and show how it is resolved with
STEM protocol.
Ans:
The network has a monitor state, where the nodes idle and do nothing,
and also a transfer state, where the nodes exhibit significant sensing
and communication activity.
STEM tries to eliminate idle listening in the monitor state and to
provide a fast transition into the transfer state, if required.
The term “topology” in STEMs name comes from the observation that
as nodes enter and leave the sleep mode network topology changes.
There are two different variants for the transmitter to acquire the
receiver’s attention:
Ans:
SMACS takes care that for a single node the time slots of different links
do not overlap (using a simple greedy algorithm) and furthermore for
each link randomly one out of a large number of frequency
channels/CDMA codes is picked and allocated to the link.
Case 1: (2M)
Node X, Y both so far unconnected Node X sends invitation
message Node Y answers, telling X that is unconnected to any
other node Node X tells Y to pick slot/frequency for the link
Node Y sends back the link specification
Case 2: (2M)
X has some neighbors, Y has no neighbors. Node X will
construct link specification and instruct Y to use it (since Y is
unattached)
Case 3: (3M)
X has no neighbors, Y has some neighbors. Node Y picks link
specification
Case 4: (3M)
Ans:
Power Aware Multiaccess with Signaling(PAMAS) protocol is originally
designed for ad hoc networks. It is one of the oldest contention based MAC
protocol designed with energy efficiency is the main objective.
It provides a detailed overhearing avoidance mechanism while it does
not consider the idle listening problem.
The protocol combines the busy-tone solution and RTS/CTS
handshake.
A distinctive feature of PAMAS is that it uses two channels: a data
channel and a control channel.
All the signaling packets (RTS, CTS, busy tones) are transmitted on
the control channel, while the data channel is reserved for data
packets.
5. a. 6M - Justify how mediation device protocol overcomes idle waiting time
problems
Ans:
THE MEDIATION DEVICE PROTOCOL -
Low duty cycle protocols try to avoid spending (much) time in the idle
state and to reduce the communication activities of a sensor node to a
minimum.
Wakeup radio - sleep state is only when a node is about to transmit or
receive packets spend most of their time in the sleep mode, wake up
periodically to receive packets from other nodes
Sleep phases should not be too short unless the start-up costs
outweigh the benefits.
In other protocols like S-MAC, there is also a periodic wakeup but nodes
can both transmit and receive during their wakeup phases. When nodes
have their wakeup phases at the same time, there is no necessity for a
node wanting to transmit a packet to be awake outside these phases to
rendezvous its receiver.
b. (iii) broadcast
c. (ii) Source-based tree
d. (iv) Multicast Incremental Power
e. (ii) Geo-casting
f. (ii) WHERE
g. (i) Best average case