WSN AAT2
WSN AAT2
AAT-II
1.Comparison of Wireless Sensor Networks (WSNs) and
Wireless Mesh Networks (WMNs)
Data Aggregation
Redundant data from multiple sensors is aggregated at intermediary nodes to
reduce transmission overhead. For example, in environmental monitoring, average
temperature readings are sent instead of individual data points, minimizing energy
usage.
Energy-Efficient Routing Protocols
Protocols like LEACH (Low-Energy Adaptive Clustering Hierarchy) dynamically
organize nodes into clusters. Cluster heads communicate with the base station,
reducing the need for direct transmission from every node, saving energy.
Energy Harvesting
Nodes equipped with solar panels or other energy-harvesting mechanisms can
replenish their power. This technique extends network lifetime, especially in
outdoor applications where renewable energy sources are available.
3.When does GPSR enter the perimeter routing mode and how
does it use the right-hand rule in this mode?
When Does GPSR Enter Perimeter Routing Mode?
Greedy Perimeter Stateless Routing (GPSR) uses perimeter routing when greedy
forwarding fails, i.e., when the node cannot find a neighbor closer to the
destination than itself. This situation typically arises in void regions where no direct
path to the destination exists.
This mode efficiently navigates around voids, ensuring the packet reaches a node
closer to the destination or finds an alternative route if possible.
(3, 3.5): This point is within the radio range of both beacons (4, 2)
and (2, 5). Therefore, it's a possible location for Node A.
(3, 4.5): This point is also within the radio range of both beacons.
Hence, it's also a possible location for Node A.
(2, 6): This point is within the radio range of both beacons (2, 5)
and (3, 7). Thus, it's a possible location for Node B.
(4, 5): This point is not within the radio range of beacon (2, 5).
Therefore, it's not a possible location for Node B.
By iteratively sharing and refining information, nodes can collectively improve their
location estimates, especially in scenarios where individual estimates are
uncertain.
Therefore, the location information has low accuracy due to the potential for
significant errors, but relatively high precision within the specified error bounds.
Here are some key factors that affect energy efficiency in MAC protocol design:
1. Access Control
2. Data Encryption
3. Message Integrity
4. Replay Protection
5. Key Management