Lecture 3 - Wireless Sensor Network (WSN)
Lecture 3 - Wireless Sensor Network (WSN)
and Networks
1
Definition
2
Definition
q Sensor nodes are small, low-cost, low-power
devices that have following functionality:
§ communicate on short distances
§ sense environmental data
§ perform limited data processing
3
Definition
4
WSN Communication
Architecture
5
Components of Sensor Node
6
Sensor Network Characteristics
7
Sensor Network Characteristics
q Infrastructure-less Scenario
q Frequent Topology Change
q Sensor Anonymity
q Application Specific Services
8
Design Factors
‒ Fault tolerance
• Sensor nodes may fail
ØLack of power, physical damage, or environmental
interference
‒ Scalability
• Large number of nodes, high density
‒ Production costs
• Since the sensor networks consist of a large number of nodes,
the cost of a single node is very important
• The cost of each sensor node has to be kept low
‒ Hardware constraints
• Small size, limited power
9
Design Factors (cont…)
‒ Sensor network topology
• Node deployment and topology maintenance strategy
‒ Environment
• Interior of large machinery
• Bottom of an ocean
• Battlefield beyond the enemy lines
• Home or large building
‒ Transmission media
• RF, Infrared, and Optical medium
‒ Power consumption
• Sensor node lifetime strongly dependent on battery lifetime
• Power consumption in sensing, data processing, and
10
communication
WSN Characteristics: Major differences
between sensor and ad-hoc network
– Number of nodes is higher
– Densely deployment
– Sensor nodes are prone to failure.
– Frequent topology changes
– Broadcast communication paradigm
– Limited processing and power capabilities.
– Possible absence of unique global ID
11
Wireless Sensor and Actor Networks (WSANs)
• WSAN Capabilities
– Observing the physical world
– Processing the data
– Making decisions
– Performing appropriate actions
• WSAN applications:
– battlefield surveillance
– microclimate control in buildings
– nuclear, biological and chemical attack detection
– Home automation
– environmental monitoring
12
WSANs unique characteristics
• Real-time requirement
• Coordination:
– Sensor-Actor Coordination
– Actor-Actor Coordination
13
WSN structure
• A WSN typically has little or no infrastructure
• There are two types of WSNs
– Structured model
– Unstructured model
14
Structured Vs. Unstructured model
• Structured model • Unstructured model
– Deployed in a pre- – Densely deployed (many
planned manner node)
– Fewer nodes – Randomly Deployed
– Lower network – Can have uncovered regions
maintenance – Left unattended to perform
– Lower cost the task
– No uncovered regions – Maintenance is difficult
• managing connectivity
• detecting failures
15
WSN constraints
• Resource constraints
– limited energy
– short communication range
– low bandwidth
– limited processing
– limited storage
• Design constraints
– application dependent
– environment dependent
• size of the network / number of node
• deployment scheme
• network topology (obstacle) 16
Types of sensor network
§ WSNs are deployed everywhere, such as on land,
underground, and underwater
• Depending on the environment
1. terrestrial WSN
• Ad Hoc (unstructured)
• Preplanned (structured)
2. underground WSN
• Preplanned
• more expensive equipment, deployment, maintenance
3. underwater WSN
• fewer sensor nodes( sparse deployment)
• more expensive than terrestrial
• acoustic wave communication
• Limited bandwidth
• long propagation delay 17
Types of sensor network (cont.)
• Depending on the environment …
4. multi-media WSN
• sensor nodes equipped with cameras and microphones
• pre-planned to guarantee coverage
• High bandwidth/low energy, QoS, filtering, data processing
and compressing techniques
5. mobile WSN
• ability to reposition and organize itself in the network
• Start with Initial deployment and spread out to gather
information
• deployment, localization, self-organization, navigation and
control, coverage, energy, maintenance, data process
18
Protocol Stack /architectures
of WSNs
q Protocols should be
§ Power aware
§ Location aware
§ Application aware
19
Communication protocol : Physical
layer
• Responsibility
• Frequency selection
• Carrier frequency generation
• Signal detection
• Modulation
• Data encryption
• Multi-hop communication
• Long distance wireless communication can be expensive
• Overcome shadowing and path loss effects
• Energy-efficiency solutions are being pursued
20
Communication protocol: Physical
layer(cont…)
• Bandwidth choices
• Radio architecture
• Modulation schemes
21
Communication protocol: Physical layer(cont…)
• IEEE 802.15.4-2003
Frequency band Number of Symbol rate Modulation Bit rate (kbps)
channels (kbaud)
868 MHz 1 20 BPSK 20
915 MHz 10 40 BPSK 40
2.4 GHz 16 62.5 16-ary 250
• IEEE 802.15.4-2006
Frequency band Number of Symbol rate Modulation Bit rate (kbps)
channels (kbaud)
868 MHz 1 12,5 20-bit PSSS 250
915 MHz 10 50 5-bt PSSS 250
868 MHz 1 25 16-ary Orthogonal 100
915 MHz 10 62,5 16-ary Orthogonal 250
22
Communication protocol: Physical layer(cont…)
• IEEE 802.15.4a (LR-WPAN)
– DS-UWB Mixture to
– From 110 Kbps to 27 Mbps facilitate global
usage
23
Communication protocol: Physical layer(cont…)
§ Bluetooth Low Energy
– The symbol rate is reduced to 1 Mbps
– The transmitted power is reduced. This fact avoids the usage of
frequency hopping and spreading. It also allows the usage of small
batteries.
– As a result of not using frequency hopping, the system is able to
perform faster device discovery.
– Additional frequencies in the edges of the ISM band, to assure
minimal interference with BT and IEEE 802.11b/g.
24
Communication protocol : Physical layer (Open research
issues)
• Minimizing the energy consumption
• Optimizing of circuitry energy
• reduction of wakeup and startup times
• Optimizing of transmission energy
• Modulation schemes
• Future work
• Hardware design
ØTiny, low-power, low-cost transceiver, sensing, and
processing units need to be designed
ØPower-efficient hardware management strategy
• Strategies to overcome signal propagation effects
• new innovations in low power radio design with emerging
technologies
• exploring ultra-wideband techniques as an alternative for
communication
• creating simple modulation schemes to reduce synchronization and
25
Communication protocol : Data-link layer
• Responsibility
Ø Multiplexing of data streams
Ø Data frame detection
Ø Medium access control
Ø Error control
• Medium Access Control (MAC)
Ø Goals Carrier Sense Multiple Access with Collision Avoidance
(CSMA/CA)
• Creation of the network infrastructure
• Fairly and efficiently share communication resources between
sensor nodes
28
Communication protocol :Data-link layer(cont…)
• Power saving modes of operation
Ø Turn the transceiver off when it is not required (Can be ineffective due to
startup costs)
Ø Threshold approach
• Error control
Ø Simple error control with low complexity encoding/decoding is desirable
Ø FEC (Forward Error Correction)
Ø ARQ (Automatic Repeat request)
29
Communication protocol :Network layer
• Responsibility
Ø Provides special multi-hop wireless protocols between sensor
nodes and the sink node
• Design principles
Ø Power efficiency is important consideration
Ø Sensor networks are mostly data-centric
Ø Data aggregation is useful only when it does not hinder the
collaborative effort of the sensor nodes
Ø Attribute-based addressing & location awareness
30
Communication protocol :Network layer(cont…)
• Routing protocols
Ø Responsible for maintaining the routes in the network and have
to ensure the reliability of data packet communication.
Ø Flat: nodes are assigned equal roles
Ø Location-based: considers node location to route data
Ø Cluster-based: employs cluster heads to do data aggregation
and relay to base station
• Nodes will play different roles
Ø Routing protocols in WSNs differ depending on the application
and network architecture
Ø Important: energy efficiency and traffic flows
31
Communication protocol: Network layer
Taxonomy of Routing Protocols of WSNs:
Classifications of
WSNs Routing
Protocols
Network Structure
Location-
Data-centric Hierarchi
based QoS-based
cal 32
Communication protocol: Network layer (Open
research issues)
• Future research issues should address
– Energy
• Energy efficient packet routing algorithm to extend network
lifetime
– QoS
• guarantees end-to-end delay and energy efficient routing
– Node mobility
• handle frequent topology changes and reliable delivery
– Security
• Experimental studies regarding security applied to different
routing protocols in WSNs should be examined
33
Communication protocol: Transport layer
• Needed when the system is accessed through internet or
external network
• TCP splitting needed
Ø To make sensor networks interact with other networks
Ø Communication between an user node and the sink node
üTCP or UDP via the internet or satellite
Ø Communication between the sink node and a sensor node
üUDP-type protocol, because each senor node has limited memory
34
Communication protocol: Transport layer
• Packet loss
– May be due to
• bad radio communication,
• congestion,
• packet collision,
• memory full,
• node failures
– Detection and recovering
• Improve throughput
• Energy expenditure
35
Communication protocol :Transport layer
• Congestion control/packet recovery
ØHop-by-hop
• intermediate cache
• more energy efficient (shorter
retransmission)
• higher reliability
ØEnd-to-end
• source caches the packet
• Variable reliability
36
Communication protocol :Transport layer
• Adapting TCP
Ø mIP stack 4 - 5 kB
Ø nanoIP 1 kB
Ø PICNIC less than 2 kB
Ø IPv6-based stack 10 kB
• Specific protocols
Ø Sensor transmission control protocol (STCP)
Ø Price-oriented reliable transport protocol (PORT)
Ø GARUDA
Ø Delay sensitive transport (DST)
Ø Pump slowly, fetch quickly (PSFQ)
Ø Event-to-sink reliable transport (ESRT)
Ø Congestion detection and avoidance (CODA)
37
Communication protocol: Transport layer
38
Communication protocol: Transport layer (Open
research issues)
• Cross-layer optimization
– selecting better paths for retransmission
– getting error reports from the link layer
• Fairness
– assign packets with priority
– frequently-changing topology
• Congestion control with active queue
management
39
Communication protocol: Cross-layer interactions
• Collaboration between all the layers to achieve higher
– energy saving
– network performance
– network lifetime
40
Network services
§ Localization
§ Synchronization
§ Coverage
§ Security
41
Network services: Localization
• Problem:
– determining the node’s location (position)
• Solutions:
– global positioning system (GPS)
• Simple
• Expensive
• outdoor
– beacon (or anchor) nodes
• does not scale well in large networks
• problems may arise due to environmental
conditions
– proximity-based
• Make use of neighbor nodes to determine their
position
• then act as beacons for other nodes 42
Network services : Localization
• Other solutions:
– Moore’s algorithm:
• distributed algorithm for location
estimation without the use of GPS or fixed
beacon (anchor) nodes
• algorithm has three phases:
–cluster localization phase
–cluster optimization phase
–cluster transformation phase
43
Network services : Localization
• Other solutions:
– RIPS: Radio Interferometric Positioning System
• Two radio transmitters create an interference
signal at slightly different frequencies
• At least two receivers are needed to measure
relative phase of two signal
• The relative phase offset is a function of the
relative positions
44
Network services :Localization
• Other solutions:
– Secure localization:
• goal is to prevent malicious beacon nodes from providing false
location to sensors
• Sensors must only accept information from authenticated
beacon nodes
• Sensors should be able to request location information at
anytime
• Upon a location request, information exchange must take place
immediately and not at a later time.
• SeRloc, Beacon Suite, DRBTS, SPINE, ROPE
– MAL: Mobile-assisted localization
• Mobile node collects distance information between itself and
static sensor nodes for node localization
• given a graph with measured distance edges 45
Network services : Synchronization
• Time synchronization is important for
–routing
–power conservation
–Lifetime
–Cooperation
–Scheduling
46
Network services : Synchronization
• Uncertainty-driven approach
• Lucarelli’s algorithm
• Reachback firefly algorithm (RFA)
• Timing-sync protocol for sensor network (TPSN)
• CSMNS
• Time synchronization (TSync)
• Global synchronization
47
Network services : Synchronization
• Synchronization protocol classification:
– Application-dependent features approaches
• single-hop vs. multi-hop networks
• stationary vs. mobile networks
• MAC layer-based vs. standard-based
– Synchronization issues
• adjusting their local clocks to a common time scale
• master–slave synchronization
• peer-to-peer synchronization
• clock correction
• untethered clocks
• internal synchronization,
• external synchronization,
• Probabilistic synchronization,
• deterministic synchronization,
• sender to receiver synchronization, and
48
• receiver-to-receiver synchronization.
Network services : Coverage
• Is important in evaluating effectiveness
• Techniques:
49
Network services : Compression and aggregation
• Both of them
Ø reduce communication cost
Ø increase reliability of data transfer
• Data-compression
Ø compressing data before transmission to base
Ø Decompression occurs at the base station
Ø no information should be lost
• Data aggregation
Ø data is collected from multiple sensors
Ø combined together to transmit to base station
Ø Is used in cluster base architectures 50
Network services : Security
• Constraints in incorporating security into a WSN
– limitations in storage
– limitations in communication
– limitations in computation
51
Network services: Open research issues
• localization
Ø efficient algorithms
Ø minimum energy
Ø minimum cost
Ø minimum localization errors
• Coverage: optimizing for better energy conservation
• Time synchronization: minimizing uncertainty errors over long periods
of time and dealing with precision
• Compression and aggregation: Development of various scheme
Ø event-based data collection
Ø continuous data collection
• Secure monitoring: protocols have to monitor, detect, and respond to
attacks
Ø It has done for network and data-link layer (can be improved)
Ø Should be done for different layers of the protocol stack
Ø Cross-layer secure monitoring is another research area
52
Topology of WSNs
• To ensure the effectiveness of packet delivery,
the network connectivity must be guaranteed
by adjusting the transmission power of each
node.
54
Communication protocol: Taxonomy of Routing
Protocols of WSNs
Classifications of
WSNs Routing
Protocols
Network Structure
Location-
Data-centric Hierarchi
based QoS-based
cal
55
Routing protocols : Flat routing
• Each node plays the same role
• Data-centric routing
– Due to not feasible to assign a global id to each node
– Save energy through data negotiation and elimination of
redundant data
• Protocols
– Sensor Protocols for Information via Negotiation
(SPIN)
– Directed diffusion (DD)
– Energy-aware routing
–… 56
Sensor Protocol for Information via
Negotiation (SPIN)
• Network-wide Broadcast Limited by Negotiation and
using Local Communication
• Flooding problems solved:
Ø Implosion – same data from many neighbors
Ø Detection of overlapping regions
Ø Excessive resources consumption (Blindness)
• Needs only Localized Information
• Data Fusion
57
SPIN…
• Resource adaptive algorithm
– When energy is plentiful
• Communicate using the 3-stage handshake protocol
– When energy is approaching a low-energy threshold
• If a node receives ADV, it does not send out REQ
• Energy is reserved to sensing the event
• Advantage
– Simplicity
• Each node performs little decision making when it receives
new data
• Need not forwarding table
– Robust to topology change
• Drawback
– Large overhead
• Data broadcasting
58
Directed Diffusion (DD)
• Feature
– Data-centric routing protocol
– A path is established between sink node and source node
– Localized interactions
• The propagation and aggregation procedures are all based on
local information
• Four elements
– Interest
• A task description which is named by a list of attribute-value pairs
that describe a task
– Gradient
• Path direction, data transmission rate
– Data message
– Reinforcement
• To select a single path from multiple paths
59
Directed Diffusion (DD)
• Advantage
– Small delay
• Always transmit the data through shortest path
– Robust to failed path
• Drawback
– Imbalance of node lifetime
• The energy of node on shortest path is drained faster
than another
– Time synchronization technique
• To implement data aggregation
• Not easy to realize in a sensor network
– The overhead involved in recording information
• Increasing the cost of a sensor node
60
Routing protocols : Hierarchical
• Nodes will play different roles
• Related to scalability and efficient communication
• Mainly two-layer routing
– Select cluster heads
– Routing
• Protocols
– Low Energy Adaptive Clustering Hierarchy (LEACH)
– Power-Efficient Gathering in Sensor Information
Systems (PEGASIS
61
Cluster based routing protocols
• Cluster based routing protocols have been paid much
attention
• Advantages of clustering schemes:
ØMinimizing the total transmission power.
ØBalancing the energy exhausting load among all nodes.
ØLessening routing and topology maintenance overhead.
Ø Eliminating the redundant and highly correlated data in
aggregation
ØScalable for large number of nodes
62
Cluster based routing protocols ….
• The composition of one round of the clustering
process :
ØSetup and
ØSteady Data Transmission State
63
Cluster based routing protocols ….
• Cluster heads are responsible
for : Sink nodes
64
Low Energy Adaptive Clustering Hierarchy (LEACH)
• Randomly select sensor nodes as cluster-heads, so the high
energy dissipation in communicating with the base station is
spread to all sensor nodes in the sensor network.
• Set-up phase
– each sensor node chooses a random number between
0 and 1
– If this random number is less than the threshold T(n),
the sensor node is a cluster- head.
65
LEACH ….
(LEACH)
–Steady phase
• the sensor nodes can begin sensing and
transmitting data to the cluster-heads.
• The cluster-heads also aggregate data from the nodes
in their cluster before sending these data to the base
station.
– After a certain period of time spent on the steady
phase, the network
• goes into the set-up phase again and enters into
another round of selecting the cluster-heads.
66
LEACH ….
67
Power-Efficient Gathering in Sensor Information
Systems (PEGASIS)
• Token-Passing Chain-Based
• Considered Near-Optimal (in a sense)
• Nodes die in random
• Stationary Nodes and Sink
• Every node have a global network map
• Data Fusion
• Greedy chain construction
68
PEGASIS….
• Stationary Nodes
• Global Information
• Limited Scale:
• Information travels many nodes
• Assumes any node can communicate with sink
• Greedy Algorithm Construct Chain – Start at a node far
from sink and gather everyone neighbor by neighbor
• Node i (mod N) is the leader in round i
• Nodes passes token thru the chain to leader from both sides
• Each node fuse its data with the rest
• Leader transmit to sink
69
PEGASIS…
70
Location Based Routing
• Sensor nodes are addressed by means of their locations.
– The distance between neighboring nodes can be estimated on
the basis of incoming signal strengths.
– Relative coordinates of neighboring nodes can be obtained by
exchanging such information between neighbors.
• To save energy, some location based schemes demand that
nodes should go to sleep if there is no activity.
• More energy savings can be obtained by having as many
sleeping nodes in the network as possible
• Protocols:
– Geographic Adaptive Fidelity
– Geographic and Energy Aware Routing
–…
71
QoS-based Routing Algorithms
• Consider delivering a better QoS as an additional
metrics in designing the routing algorithms.
Ø Such algorithms provide additional capabilities to WSNs, where more
sophisticated applications can be developed and improved.
• multimedia communication necessitates
73
Network Design Challenges
q Limited Resources
§ Sensor protocols should bear minimum
communicational & computational latency.
q High Unreliability
§ Sensor networks are deployed in unattended
regions.
74
Network Design Challenges
q Load Balancing
75
Sensor Network Architecture
76
Sensor Network Architecture
q Flat Architecture
§ Sink periodically sends query to all sensors
using flooding.
§ Sensors that possess data matching the query
transmit to query without aggregation.
§ Data packets are relayed via peer node
§ Drawback: Rapid exhaustion of energy due to
bulk of packet transmission.
77
Sensor Network Architecture
q Clustered Architecture
§ Sensors in closed proximity are grouped
together into cluster.
§ One of the cluster member within a cluster is
selected as cluster head (CH).
§ Member node senses data & send them to
their respective CH.
78
Sensor Network Architecture
§ Role of CH:
§ Intra cluster data gathering from member
nodes.
§ Data aggregation
§ Data reporting to sink
§ Sleep scheduling of sensors.
§ Reduction in energy consumption by minimizing
redundant transmissions.
79
Sensor Network Architecture
80
Problem with Stationary Sensor
81
Problem with Stationary Sensor
Failure Failure
82
Problem with Stationary Sensor
Partition – Mobilization as a
solution
83
Medium Access Design Issues
84
Medium Access Design Issues
85
Medium Access Design Issues
86
Mobile Wireless Sensor Network
(MWSN)
87
Components of MWSN
Sink
88
Components of MWSN
Sink
89
Components of MWSN
Sink
90
Components of MWSN
q Mobile Sink
§ M o v e s in o r d e r t o
collect data from
sensor nodes.
Sink
91
Components of MWSN
§ Based on some
algorithm sink moves
to different nodes in
the network
Sink
92
Components of MWSN
§ Based on some
algorithm sink moves
to different nodes in
the network
Sink
93
Components of MWSN
§ Based on some
algorithm sink moves
to different nodes in
the network
Sink
94
Components of MWSN
q Data Mules
§ M o v e s in o r d e r t o
collect data from
sensor nodes.
Sink
95
Components of MWSN
Sink
96
Components of MWSN
Sink
97
Components of MWSN
Sink
98
Components of MWSN
Sink
99
Components of MWSN
Sink
100
MWSNs - Types
q Underwater MWSNs
§ Senses different parameters under the sea
or water levels.
§ Can be linked with Autonomous Underwater
Vehicles (AUVs)
§ Applications: Monitoring-marine life, water
quality.
101
MWSNs - Types
q Terrestrial MWSNs
§ Sensor nodes typically deployed over land
surface.
§ Can be linked with Unmanned Aerial Vehicles
(UAVs)
§ Applications: Wildlife monitoring, surveillance,
object tracking, etc.
102
MWSNs - Types
q Aerial MWSNs
§ Sensor nodes fly on the air and sense data
(physical phenomena or multimedia data)
§ Typical example is Unmanned Aerial Vehicles
(UAVs)
§ Applications: Surveillance, multimedia data
gathering.
103
MWSNs in Daily Life
q Human
§ Cell phone can gather information & deliver
data to an access point.
q Vehicle
§ Sensor equipped on it
§ Sense data from different geographical
location & transmit to road unit side unit
(RSU)
104
MWSNs in Daily Life
q Mobile Robot
§ Controllable sensor node
§ Collect data by predefined instructions
§ Deliver the data to a specific unit.
105
Emerging paradigms of MWSNs
q Human-Centric Sensing
106
Emerging paradigms of MWSNs
q Basic Idea:
§ Humans carry their devices & move around
§ Sensor embedded within the device record
readings
§ Sensory readings are then transmitted.
108
Security Issue
q Resource Consumption
§ Energy Depletion
§ Buffer Overflow
109
Security Issue
q Host Impersonation
q Information Disclosure (hacking)
q Interference
110
WSN Applications
111
General Framework for WSNs
112
Applications of WSNs
113
Medical application of WSN
Wireless Body Sensor Network Using Medical Implant Band (Yuce 2007) 114
Wireless underground sensor networks
115
Monitoring underground facilities
116
Environment monitoring
117
City management with USN
118
City traffic monitoring and control
119
Habitat and environmental monitoring
• Non invasive methods of
monitoring
– PODS project
– The Great Duck Island
Habitat Monitoring
• Earthquake and volcano
monitoring
120
Civilian applications
121
WSN Recent Trends &
Applications
122
Underwater Sensor Networking
123
Underwater Sensor Networking
124
Wireless Multimedia Sensor
Networks
qN e t w o r k s of wirelessly
interconnected devices (camera,
microphone) – to retrieve
multimedia contents (audio/video
streams, still images, scalar data,…)
125
Wireless Multimedia Sensor
Networks
q Important Applications
§ Multimedia Surveillance Sensor Networks
§ Video sensors allows to monitor public
events, private properties, & national
boarders.
§ Traffic Congestion Avoidance System
§ Monitor traffic in cities & highways
§ Provide traffic routing advice to avoid
congestion. 126
Wireless Multimedia Sensor
Networks
127
Futures of WSN
128
Smart Home / Smart Office
qS e n s o r s
c o n t r o l l i n g
appliances and
electrical devices
in the house.
q Better lighting
and heating in
office buildings. 129
Biomedical / Medical
q Health Monitors
§ Glucose
§ Heart rate
§ Cancer detection
q Chronic Diseases
§ Artificial retina
§ Cochlear implants
q Hospital Sensors
§ Monitor vital signs
§ Record anomalies
130
Military
131
Industrial & Commercial
133
Traffic Management & Monitoring
q Sensors embedded in
the roads to:
§ Monitor traffic flows
§ Provide real-time route
updates
134
Applications of WSNs (Open research issues)
• Application-specific characteristics and requirements of
– environmental monitoring
– health monitoring
– industrial monitoring
– Military tracking
• Coupled with today’s technology
• Lead to different hardware platforms and software
development
• more experimental work is necessary to make these
applications more reliable and robust in the real world
• Applying sensor technology to industrial applications
will improve business
135
Research Area Sensor Networks
q Health Monitoring
q Network life time maximization
q Energy efficient routing
q Reliable event detection and transfer
q Energy efficient sensor network for
traffic management.
136
Summary: Design Issues & Challenges
§ WSN will spread to many applications
§ Properties and Requirements are both unique and diversified
§ Challenges in designing WSNs: energy consumption,
scalability, addressing, topology and application specific
• Random deployment: autonomous setup & maintenance
• Infrastructure-less networks: distributed routing
• Hardware energy efficiency
• Distributed synchronization
• Adapting to changes in connectivity
• Real-time communication, QoS
• Security
137
Summary: Design Issues & Challenges
• Scalability
• Fault tolerance
Ø trading off network lifetime for fault tolerance or
accuracy of results
• Power consumption : the major constraint
Ø Trade-offs between energy and communication
overhead savings
Ø Routing Protocol choice is and probably will continue
to be application driven
Ø More Analysis, Simulations and new Ideas are
needed for every category
138
THANK YOU!!
Q&A?
139