TYBSC CS Wireless Sensor Networks and Mobile Communication
TYBSC CS Wireless Sensor Networks and Mobile Communication
(Computer Science)
SEMESTER - VI ( CBCS)
WIRELESS SENSOR
NETWORKS AND
MOBILE
COMMUNICATION
Prof.(Dr.) D. T. Shirke
Offg. Vice-Chancellor,
University of Mumbai,
Published by : Director
Institute of Distance and Open Learning ,
ipin Enterprises University of Mumbai,Vidyanagari, Mumbai -400 098.
Tantia Jogani Industrial Estate, Unit No. 2,
Ground Floor, Sitaram Mill Compound,
DTP Composed : MumbaiJ.R.University Press Mumbai - 400 011
Boricha Marg,
Printed by Vidyanagari, Santacruz (E), Mumbai - 400 098
CONTENTS
Unit No. Title Page No.
1. Introduction 01
4. Routing Protocols 72
SEMESTER VI
THEORY
1
Wireless Sensor ABSTRACT
Networks and Mobile
Communication Wireless sensor network is a type of wireless network consist a collection
of tiny device called sensor node. Sensor node has a resource constraint
means battery power, storage and communication capability. These sensor
nodes are set with radio interface with which they communicated with one
another to form a network. Wireless sensor network has very necessary
application like remote has remote environmental monitoring and target
tracking. The goal of our survey is to present a comprehensive review of
the recent literature on various aspects of wireless sensor networks and
also discuss how wireless sensor network works and advantages and
disadvantages over the traditional network. Wireless sensor networks are
networks composed of a number of sensor nodes that communicate
wirelessly. It’s utilized over a wide range of applications. This paper looks
at the wireless sensor networks from the applications point of view and
surveyed different application areas where the use of such sensor networks
and their specifications, capabilities.
keywords: wireless sensor networks.
1.0 OBJECTIVES
In this lesson, you will be introduced for the types of applications for
which wireless sensor networks are intended and a first intuition about
the types of technical solutions that are required, both in hardware and
in networking technologies. Also, able to understand the capabilities
and limitations of the nodes in a sensor network and principles options
on how individual sensor nodes can be connected into a wireless
sensor network.
The objective of this chapter is to provide an up-to-date treatment of
the fundamental techniques, applications, taxonomy, and challenges of
wireless sensor networks.
Wireless sensor networks aim to gather environmental data and the
node devices placement may be known or unknown a priori. Network
nodes can have actual or logical communication with all devices; such
a communication defines a topology according to the application.
communication technologies continue to undergo rapid advancement.
In recent years, there has been a steep growth in research in the area of
wireless sensor networks (WSNs). In WSNs, communication takes
place with the help of spatially distributed, autonomous sensor nodes
equipped to sense specific information. WSNs can be found in a
variety of both military and civilian applications worldwide. Examples
include detecting enemy intrusion on the battlefield, object tracking,
habitat monitoring, patient monitoring and fire detection. Sensor
networks are emerging as an attractive technology with great promise
for the future. However, challenges remain to be addressed in issues
relating to coverage and deployment, scalability, quality-of-service,
size, computational power, energy efficiency and security. This paper
presents an overview of the different applications of the wireless
sensor networks and various security related issues in WSNs. in the
2
last two to three years a number of theoretical and/or simulation
studies were done on the topic of object-tracking. while these studies Introduction
are useful, they are too general and provide little guidance for the
actual deployment of sensor networks for real- life location-tracking of
an enemy. this thesis focuses on developing an object-tracking
application and prescribes sensor network configurations that work
well with our algorithms. we implement our software using crossbow
hardware technology. the major issues addressed in this project are the
evaluation and efficient use of a wireless sensor network product with
no changes, in a real-world application, and efficient ways to
algorithmically analyze the collected raw data from the specific
wireless sensor networks product. although the focus is the
development of a real-world application using wireless sensor
networks, it also provides be a great opportunity to explore the new
area of wireless communication overall.
1.1 INTRODUCTION
1.1.1 Introduction to Wireless Sensors Networks
wireless sensor network is a wireless network consisting of spatially
distributed autonomous devices that use sensors to monitor physical or
environmental conditions. These autonomous devices, or nodes,
combine with routers and a gateway to create a typical WSN system.
The distributed measurement nodes communicate wirelessly to a
central gateway, which provides a connection to the wired world
where you can collect, process, analyze, and present your
measurement data. To extend distance and reliability in a wireless
sensor network, you can use routers to gain an additional
communication link between end nodes and the gateway. Currently,
wireless sensor networks are beginning to be deployed at an
accelerated pace. It is not unreasonable to expect that in 10-15 years
that the world will be covered with wireless sensor networks with
access to them via the Internet (Figure-1). This can be considered as the
Internet becoming a physical network. This new technology is exciting
with unlimited potential for numerous application areas including
environmental, medical, military, transportation, entertainment, crisis
management, homeland defense, and smart spaces.
4
To realize this vision, a crucial aspect is needed in addition to
computation and control: communication. All these sources of Introduction
information have to be able to transfer the information to the place
where it is needed – an actuator or a user – and they should
collaborate in providing as precise a picture of the real world as is
required. For some application scenarios, such networks of sensors and
actuators are easily built using existing, wired networking
technologies. For many other application types, however, the need to
wire together all these entities constitutes a considerable obstacle to
success: wires constitute a maintenance problem; wires prevent
entities from being mobile; and wires can prevent sensors or actuators
from being close to the phenomenon that they are supposed to control.
Hence, wireless communication between such devices is, in many
application scenarios, an inevitable requirement. Therefore, a new
class of networks has appeared in the last few years: the so- called
Wireless Sensor Network (WSN). These networks consist of
individual nodes that areable to interact with their environment by
sensing or controlling physical parameters; these nodes have to
collaborate to fulfill their tasks as, usually, a single node is incapable
of doing so; and they use wireless communication to enable this
collaboration. In essence, the nodes without such a network contain at
least some computation, wireless communication, and sensing or
control functionalities. Despite the fact that these networks also often
include actuators, the term wireless sensor network has become the
commonly accepted name. Sometimes, other names like “wireless
sensor and actuator networks” are also found.
These WSNs are powerful in that they are amenable to support a lot of
very different real- world applications; they are also a challenging
research and engineering problem because of this very flexibility.
Accordingly, there is no single set of requirements that clearly
classifies all WSNs, and there is also not a single technical solution
that encompasses the entire design space. For example, in many WSN
applications, individual nodes in the network cannot easily be
connected to a wired power supply but rather have to rely on onboard
batteries. In such an application, the energy efficiency of any
proposed solution is hence a very important
figure of merit as a long operation time is usually desirable. In other
applications, power supply might not be an issue and hence other
metrics, for example, the accuracy of the delivered results, can
become more important. Also, the acceptable size and costs of an
individual node can be relevant in many applications. Closely tied to
the size is often the capacity of an onboard battery; the price often has
a direct bearing on the quality of the node’s sensors, influencing the
accuracy of the result that can be obtained from a single node.
Moreover, the number, price, and potentially low accuracy of
individual nodes is relevant when comparing a distributed system of
many sensor nodes to a more centralized version with fewer, more
expensive nodes of higher accuracy. Simpler but numerous sensors
that are close to the phenomenon under study can make the
5
Wireless Sensor architecture of a system both simpler and more energy efficient as they
Networks and Mobile facilitate distributed sampling – detecting objects, for example,
Communication requires a distributed system.
Realizing such wireless sensor networks is a crucial step toward a
deeply penetrating Ambient Intelligence concept as they provide,
figuratively, the “last 100 meters” of pervasive control. To realize
them, a better understanding of their potential applications and the
ensuing requirements is necessary, as is an idea of the enabling
technologies. These questions are answered in the following sections;
a juxtaposition of wireless sensor networks and related networking
concepts such as fieldbuses or mobile ad hoc network is provided as
well.
7
Wireless Sensor More expansive and dynamic than the current TCP/IP network and
Networks and Mobile
Communication Is creating entirely new types of traffic that are quite different from
What one finds on the Internet now. Information collected by and
Transmitted on a sensor network describes conditions of physical
Environments—for example, temperature, humidity, or vibration—
And requires advanced query interfaces and search engines to effec-
Tively support user-level functions. Sensor networks may inter-
Network with an IP core network via a number of gateways, as in
Figure 1.1. A gateway routes user queries or commands to appropriate
Nodes in a sensor network. It also routes sensor data, at times aggre-
Gated and summarized, to users who have requested it or are expected
To utilize the information. A data repository or storage service may
Be present at the gateway, in addition to data logging at each sensor.
Advantages of Sensor Networks
Networked sensing offers unique advantages over traditional cen-
tralized approaches. Dense networks of distributed communicating
sensors can improve signal-to-noise ratio (SNR) by reducing average
distances from sensor to
source of signal, or target. Increased
energy efficiency in communications is enabled by the multihop
topology of the network [184]. Moreover, additional relevant
information from other sensors can be aggregated during this multihop
transmission through in-network processing [104]. But perhaps the
greatest advantages of networked sensing are in improved robustness
9
Wireless Sensor 1.4.2 Home Applications
Networks and Mobile
Communication Home automation is another large application area for wireless sensor
networks. The uses in the industrial applications field described above
also apply to home implmentations. Centralized control of home
appliances has already been implemented by using wired solutions or
other wireless technology solutions. Their replacement by a wireless
sensor network provides a development and maintenance cost reduction,
system flexibility, and stretch ability. WSN also provides total, and secure
control of the home devices. Another area for the use of WSN that is
relevant to home application is the toy industry, a large market. The nature
of wireless networks enable toys to behave in complex and logical ways at
a reasonable cost..
Application Categories
The above applications show that, among the WSN applications, there are
some common features. Holger and Willig (2005) identify the existence of
data “sources” and “sinks” in most of the WSN applications in which the
“sources” are the nodes that sense the data from the environment and the
“sinks” are the nodes where the data arrived, like gateways. The “sinks”
can be WSN components or they can sit outside the system. Holger and
Willig (2005) place the applications based on the sources-and-sinks
interaction in four categories. The first category is “event detection,” is
which the sources, when they detect an event send messages to the sinks.
An event could be a single value, for example, an above threshold
humidity, or a complicated type. Holger and Willig’s second category is
“periodic measurements,” in which the sources periodically send messages
to the sinks. The third category comprises “function approximation and
edge detection” in which the WSN system, based on specific finite values,
approximates an “unknown function.” The final category is “tracking” in
which the event producer is mobile, and thus a WSN is used to detect the
object’s position and possibly its speed and direction.
The preceding section included categories and possible implementations
of wireless sensor networks. According to Haenggi (2005), the
opportunities for the WSNs are “ubiquitous.” Zhao and Guibas (2004) find
that “the main long-term will be the increase in the number of sensors per
application and the increase in the decentralization of sensor control and
processing.” However, the relevant constraints and challenges, that
are mentioned above will be further analyzed in the next sections. They
must be addressed for easier and faster deployment of the wireless sensor
network applications.
The major applications of WSNs
Application of WSNs
11
Wireless Sensor 1. Logistics
Networks and Mobile
Communication Logistics is a multi-player business which has changed significantly in the
last decade. E.g. transport of food. Figure 9 shows one application
scenario, where wireless sensor network nodes are connected to goods
(mostly food because of their perishable nature). The goods are loaded
from a storehouse or warehouse to a good carrier vehicle, in which their
nodes need to be self-organize and form a network of nodes, which can
forward information of the goods’ from one state to the outside world
using a gateway (e.g. a telematics unit).
Logistics benefits clearly from Wireless Sensor Networks. However, the
requirements of logistics for applicable WSNs are challenging.
2. Environmental monitoring
Simple computations and to send/receive data performance done by the
sensor nodes. These nodes are small in size and are embedded into
devices. Data collection is the typical usage where data collected from the
surrounding environment via sensors. Environment monitoring has
become an important field of control and protection, providing real-time
systems and control communication with the physical world. During data
collection sensor nodes
Monitor and manage air quality,
Monitor and manage conditions of traffic,
Monitor and manage weather situations.
Characteristics of an environmental monitoring system
Autonomy. Batteries must be able to power the weather stations during the
whole deployment.
Reliability. The network has to perform simple and predictable operations,
to prevent unexpected crashes.
Robustness. The network must account for a lot of problems such as poor
radio connectivity (e.g., in case of snow fall) or hardware failures.
Flexibility. One must be able to quickly add, move, or remove stations at
any time depending on the needs of the applications.
3. Industrial supervision
The advances in wireless communication, microelectronics, digital
electronics, and highly integrated electronics and the increasing need for
more efficient controlled electric systems make the development of
monitoring and supervisory control tools the object of study of many
researchers.
12
4. Intelligent buildings
Introduction
Wireless Sensor Networks (WSN) has become cardinal towards the
implementation of smart homes, and they are proved to be a permitting
technology for assisted living. WSNs are deemed appropriate for
placement in home environments for diverse applications.
Military applications
WSNs consist of a large number of small sensor nodes. Costing of small
nodes is also less expensive. In military operations, there is always a threat
or security challenges of being attacked by enemies. So if regular use of
small nodes which is less expensive help to reduce the loss.
Figure 9.
Wireless sensor network for logistics.
Figure 10 shows wireless sensor networks for military application. This
application provides suitable sensors which can be used in top secret
missions. These sensors can detect, identify and classify threads based on
the count, number, whether it is armored vehicles or men in foot, type and
amount of weapons they carry, etc., can be detected in advance. This
application provides reliable real time war pictures and better situational
awareness.
Figure 10.
13
Wireless Sensor Wireless sensor network for military application.
Networks and Mobile
Communication TYPES OF APPLICATIONS (Cont. - Types of wireless sensor networks
through)
Many of these applications share some basic characteristics. In most of
them, there is a clear difference between sources of data – the actual
nodes that sense data – and sinks – nodes where the data should be
delivered to. These sinks sometimes are part of the sensor network itself;
sometimes they are clearly systems “outside” the network (e.g. the
firefighter’s PDA communicating with a WSN). Also, there are usually,
but not always, more sources than sinks and the sink is oblivious or not
interested in the identity of the sources; the data itself is much more
important.
The interaction patterns between sources and sinks show some typical
patterns. The most relevant ones are:
Event detection Sensor nodes should report to the sink(s) once they have
detected the occurrence of a specified event. The simplest events can be
detected locally by a single sensor node in isolation (e.g. a temperature
threshold is exceeded); more complicated types of events require the
collaboration of nearby or even remote sensors to decide whether a
(composite) event has occurred (e.g. a temperature gradient becomes too
steep). If several different events can occur, event classification might be
an additional issue.
Periodic measurements Sensors can be tasked with periodically reporting
measured values. Often, these reports can be triggered by a detected event;
the reporting period is application dependent.
Function approximation and edge detection The way a physical value like
temperature changes from one place to another can be regarded as a
function of location. A WSN can be used to approximate this unknown
function (to extract its spatial characteristics), using a limited number of
samples taken at each individual sensor node. This approximate
mapping should be made available at the sink. How and when to update
this mapping depends on the application’s needs, as do the approximation
accuracy and the inherent trade-off against energy consumption.
Similarly, a relevant problem can be to find areas or points of the same
given value. An example is to find the isothermal points in a forest fire
application to detect the border of the actual fire. This can be generalized
to finding “edges” in such functions or to sending messages along the
boundaries of patterns in both space and/or time.
Tracking The source of an event can be mobile (e.g. an intruder in
surveillance scenarios). The WSN can be used to report updates on the
event source’s position to the sink(s), potentially with estimates about
speed and direction as well. To do so, typically sensor nodes have to
cooperate before updates can be reported to the sink. These interactions
can be scoped both in time and in space (reporting events only within a
14
given time span, only from certain areas, and so on). These requirements
can also change dynamically overtime; sinks have to have a means to Introduction
inform the sensors of their requirements at runtime. Moreover, these
interactions can take place only for one specific request of a sink (so-
called “one-shot queries”), or they could be long-lasting relationships
between many sensors and many sinks.
The examples also have shown a wide diversity in deployment options.
They range from well planned, fixed deployment of sensor nodes (e.g. in
machinery maintenance applications) to random deployment by dropping
a large number of nodes from an aircraft over a forest fire. In addition,
sensor nodes can be mobile themselves and compensate for shortcomings
in the deployment process by moving, in a post deployment phase, to
positions such that their sensing tasks can be better fulfilled. They could
also be mobile because they are attached to other objects (in the logistics
applications, for example) and the network has to adapt itself to the
location of nodes.
Closely related to the maintenance options are the options for energy
supply. In some applications, wired power supply is possible and the
question is mute. For self-sustained sensor nodes, depending on the
required mission time, energy supply can be trivial (applications with a
few days of usage only) or a challenging research problem, especially
when no maintenance is possible but nodes have to work for years.
Obviously, acceptable price and size per node play a crucial role in
designing energy supply.
Applications of MANET
Some specific applications of ad hoc networks include industrial and
commercial applications involving cooperative mobile data exchange.
There are many existing and future military networking requirements for
robust, IP-compliant data services within mobile wireless communication
networks, with many of these networks consist of highly dynamic
autonomous topology segments. Advanced features of Mobile ad hoc
networks, including data rates compatible with multimedia applications
global roaming capability, and coordination with other network structures
are enabling new applications.
o Defense applications: Many defense applications require on the fly
communications set-up, and ad hoc/sensor networks are excellent
candidates for use in battlefield management.
o Crisis management applications: These arise, for example, as a
result of natural disasters in which the entire communication
infrastructure is in disarray. Restoring communications quickly is
essential.
o Telemedicine: The paramedic assisting the victim of a traffic accident
in a remote location must access medical records (e.g. X-rays) and
may need video conference assistance from a surgeon for an
emergency intervention. In fact, the paramedic may need to
instantaneously relay back to the hospital the victim's X-rays and other
diagnostic tests from the site of the accident.
o Tele-geoprocessing application: The combination of GPS, GIS
(Geographical Information Systems), and high-capacity wireless
mobile systems enables a new type of application referred to as tele-
geo processing.
o Virtual Navigation: A remote database contains the graphical
representation of building, streets, and physical characteristics of a
large metropolis. They may also "virtually" see the internal layout of
17
Wireless Sensor buildings, including an emergency rescue plan, or find possible points
Networks and Mobile of interest.
Communication
o Education via the internet: educational opportunities available on the
internet or remote areas because of the economic infeasibility of
providing expensive last-mile wire line internet access in these areas to
all subscribers.
o Vehicular area network: This a growing and very useful application
of adhoc network in providing emergency services and other
information. This is equally effective in both urban and rural setup.
The basic and exchange necessary data that is beneficial in a given
situation.
Characteristics of WSN
The characteristics of WSN are as follows −
Resource constraints − Nodes of WSN are smaller in size and get
power from the batteries. It justifies that service provided by the nodes
like communication and computation amount of memory is very
limited.
Communication paradigm − The data centric feature of WSN
explains its data centric nature and justifies that the communication is
restricted to nodes.
Application specific design − WSN is application specific i.e. the
architecture of WSN is based on application.
18
Node failure and unreliable communication − Various factors like
harsh operating conditions leading to instability, unpredictability, nodal Introduction
mobility, environmental interferences makes typical WSN nodes to be
error-prone.
Scalability and density − The number of nodes in WSNs may be large
and densely deployed to a higher degree in various applications.
Dynamic Topologies − Nodes are free to travel randomly at different
speeds in few applications and sometimes may fail to operate, to add or
to replace. So there can be different network topology.
Communication models − WSNs use different communication models
− Flat/ hierarchical /distributed WSNs; or homogeneous/ heterogeneous
WSNs.
Operating Environment
The WSNs are mostly deployed in remote and hazardous locations for
unattended operations because of their ability to withstand harsh
environmental conditions.
Requirements of WSN
The requirements of WSN are explained below:
Flexibility − The architecture of WSN is not fixed. Rather it varies
from application to application which justifies that the protocols and
algorithms have the characteristics of self-organization.
Fault tolerance − The nodes in WSNs have the capability to sustain
the functions carried out in the network even in situations like limited
battery power, interference from external sources, failure rate of nodes,
harsh environmental conditions.
Lifetime − The two major factors that should be taken into
consideration are load balancing and energy saving. These two factors
can enhance the lifetime of the WSN architecture as long as possible.
Scalability − The number of nodes in a WSN network can be large.
Accordingly WSN architecture and protocols should be designed.
Real-time − The Various capabilities like sensing, processing and
communication of WSN are used in various real-world problems so
should follow stringent time.
Security − For example in health care data and military data, the data
offered by WSN network are private which are sensitive in nature. So
security is evident in such architectures.
Production cost − The cost of nodes in WSN network has to be low as
once the nodes run out of the energy it has to be replaced by newer
nodes.
Deployment − In large-scale WSNs, there is random deployment of
nodes whose maintenance and replacements are not practically
possible. So there is a huge requirement of re-configuration and re-
programming.
19
Wireless Sensor Dependability − One can rely on WSN as the architectural design is
Networks and Mobile robust that leads to secure collection of data and reliable delivery with
Communication no loss.
A MANET is a mobile ad-hoc network that contains wireless links and
nodes. It is an infrastructure-less network, and it can change its topology
and configure itself on the fly, it can communicate via multiple hops.
Whereas a Wireless Sensor Network (WSN) is a set of spatially
distributed and dedicated sensors that are interlinked via the wireless
medium for monitoring and recording the physical conditions of the
environment and organizing the collected data at a central location.
Let’s look at the similarities between MANET and WSN
1. Both are infrastructure-less, distributed wireless networks
2. Routing Techniques are more or less the same
3. Both are Ad-hoc networks
4. Topology can change over a period
5. Nodes can be operated on a battery
6. Both wireless channels use unlicensed spectrum (cause of interference)
What makes them different?
1. The data rate of MANETs is more than WSN
2. The number of nodes in the WSN is more than MANETs
3. Mobility is very high in MANETs(since nodes are less) than WSN
4. Sensor nodes of WSN are generally static and cooperate together to
transfer the sensed data
5. Sensor nodes usually consume less energy than MANET’s nodes
6. MANETs are usually close to civilization
7. Public-key cryptography is used in MANETs whereas symmetric key
cryptography used in WSNs for security purposes
8. Compared to MANETs, WSNs are smaller, more powerful, and more
memory-constrained
9. Mostly, MANETs are used for distributed computing whereas WSNs
are used for information gathering from the environment
10. WSNs are more prone to failures than MANETs.
1.6 ENABLING TECHNOLOGIES FOR WIRELESS
SENSOR NETWORKS
Building such wireless sensor networks has only become possible with
some fundamental advances in enabling technologies.
First technology is the miniaturization of hardware. Smaller feature sizes
in chips have driven down the power consumption of the basic
components of a sensor node to a level that the constructions of WSNs
can be planned. This is particularly relevant to microcontrollers and
20
memory chips and the radio modems which are responsible for wireless
communication have become much more energy efficient. Reduced chip Introduction
size and improved energy efficiency is accompanied by reduced cost.
21
Wireless Sensor Next to processing and communication, the actual sensing equipment is
Networks and Mobile the third relevant technology.
Communication
These three basic parts of a sensor node have to accompanied by power
supply. This requires, depending on application, high-capacity batteries
that last for long times, that is, have only a negligible self-discharge rate,
and that can efficiently provide small amounts of current. Ideally, a
sensor node also has a device for energy scavenging, recharging the
battery with energy gathered from the environment – solar cells or
vibration-based power generation are conceivable options. Such a concept
requires the battery to be efficiently chargeable with small amounts of
current, which is not a standard ability. Both batteries and energy
scavenging are still objects of ongoing research.
The counterpart to the basic hardware technologies is software. The first
question to answer here is the principal division of tasks and
functionalities in a single node – the architecture of the operating system
or runtime environment. This environment has to support simple
retasking, cross-layer information exchange, and modularity to allow for
simple maintenance. This software architecture on a single node has to be
extended to a network architecture, where the division of tasks between
nodes, not only on a single node, becomes the relevant question – for
example, how to structure interfaces for application programmers. The
third part to solve then is the question of how to design appropriate
communication protocols.
1.8 CONCLUSION
WSN follows different topologies such as star, tree, mesh, hybrid etc.
Hence one can understand pros and cons of these topologies to derive
advantages of WSN and disadvantages of WSN. Moreover WSN uses
different underlying wireless technologies. Hence one can also refer
advantages and disadvantages of Zigbee, Z-wave, WiFi, and WiFi6 et.
Each such sensor network node typically has many parts: a radio
transceiver with an internal antenna or connection to an external
antenna, a microcontroller, an electronic circuit for interfacing with the
sensors and an energy source, usually a battery or an embedded form
of energy harvesting.
A sensor node might vary in size and size can be a size of a grain of
dust.
22
Sensor collects the analog data from the physical world and an ADC
converts this data to digital data. Introduction
23
2
SENSOR NODE HARDWARE AND
NETWORK ARCHITECTURE
Unit Structure
2.0 Objectives
2.1 Sensor Node Hardware and Network Architecture
2.1.1 Key Definitions of Sensor Networks
2.2 Single-node Architecture
2.2.1 Hardware Components & design Constraints
2.2.2 Hardware Components
2.2.3 Controller
2.2.4 Memory
2.2.5 Communication Devices
2.2.6 Sensors & Actuators
2.2.7 Power Supply
2.3 Operating Systems and Execution Environment
2.4 Introduction to TinyOS and nesC.
2.5 Network architecture
2.5.1 Sensor Networks Scenario
2.5.2 Types of sources and sinks
2.5.3 Single-hop versus multi-hop networks
2.5.4 Multiple sinks and sources
2.6 Optimization goals and figures of merit
2.6.1 Quality of service
2.6.2 Energy efficiency
2.7 Design principles for WSNs
2.7.1 Distributed Organization
2.7.2 In Network Processing Techniques
2.7.3 Adaptive Fidelity & Accuracy
2.7.4 Data Eccentricity
2.7.5 Exploit Local Information
2.7.6 Exploit Activity Patterns
24
2.7.7 Exploit Heterogeneity
Sensor Node Hardware
2.7.8 Component Based Protocol Stacks and Network Architecture
2.7.9 Service interfaces of WSNs
2.7.10 Gateway concepts.
2.8 List of References
2.9 Summary
2.10 Unit End Exercises
2.0 OBJECTIVES
In WSN, the main task of a sensor node is to sense data and sends it to the
base station in multi hop environment for which routing path is essential.
For computing the routing path from the source node to the base station
there is huge numbers of proposed routing protocols exist (Sharma et al.,
2011).
Currently, WSN (Wireless Sensor Network) is the most standard services
employed in commercial and industrial applications, because of its
technical development in a processor, communication, and low-power
usage of embedded computing devices. The wireless sensor network
architecture is built with nodes that are used to observe the surroundings
like temperature, humidity, pressure, position, vibration, sound, etc. These
nodes can be used in various real-time applications to perform various
tasks like smart detecting, a discovery of neighbor nodes, data processing
and storage, data collection, target tracking, monitor and controlling,
synchronization, node localization, and effective routing between the base
station and nodes. Presently, WSNs are beginning to be organized in an
enhanced step. It is not awkward to expect that in 10 to 15 years that the
world will be protected with WSNs with entree to them via the Internet.
This can be measured as the Internet becoming a physical n/w. This
technology is thrilling with infinite potential for many application areas
like medical, environmental, transportation, military, entertainment,
homeland defense, crisis management, and also smart spaces.
25
Wireless Sensor A wireless sensor network (WSN) can be defined as a network of low-size
Networks and Mobile and low-complex devices denoted as nodes that can sense the environment
Communication and communicate the information gathered from the monitored field
through wireless links.
The following are the Key terms and concepts that will be used in sensor
network development techniques.
• Sensor: A transducer that converts a physical phenomenon such as
heat, light, sound, or motion into electrical or other signals that may be
further operated by other apparatus.
• Sensor node: A basic unit in a sensor network, with on-board sensors,
processor, memory, wireless modem, and power supply. It is often
abbreviated as node. When a node has only a single sensor on board,
the node is sometimes referred as a sensor.
• Network topology: A connectivity graph where nodes are sensor nodes
and edges are communication links. In a wireless network, the link
represents a one-hop connection, and the neighbors of a node are those
within the radio range of the node.
• Routing: The process of determining a network path from a packet
source node to its destination.
• Date-centric: Approaches that name, route, or access a piece of
data via properties, such as physical location, that are external to a
communication network. This is to be contrasted with addresscentric
approaches which use logical properties of nodes related to the network
structure.
• Geographic routing: Routing of data based on geographical features
such as locations or regions. This is an example of datecentric
networking.
• In-network: A style of processing in which the data is processed and
combined near where the data is generated.
• Collaborative processing: Sensors cooperatively processing data from
multiple sources in order to serve a high-level task. This typically
requires communication among a set of nodes.
• State: A snapshot about a physical environment (e.g., the number of
signal sources, their locations or spatial extent, speed of movement), or
a snapshot of the system itself (e.g.,the network state).
• Uncertainty: A condition of the information caused by noise in sensor
measurements, or lack of knowledge in models. The uncertainty affects
the system‘s ability to estimate the state accurately and must be
carefully modeled. Because of the ubiquity of uncertainty in the data,
many sensor network estimation problems are cast in a statistical
framework. For example, one may use a covariance matrix to
characterize the uncertainty in a Gaussian-like process or more general
26
probability distributions for non-Gaussian processes.Task: Either high-
level system tasks which may include sensing, communication, Sensor Node Hardware
and Network Architecture
processing, and resource allocation, or application tasks which may
include detection, classification, localization, or tracking.
• Detection: The process of discovering the existence of a physical
phenomenon. A threshold- based detector may flag a detection
whenever the signature of a physical phenomenon is determined to be
significant enough compared with the threshold.
• Classification: The assignment of class labels to a set of physical
phenomena being observed.
• Localization and tracking: The estimation of the state of a physical
entity such as a physical phenomenon or a sensor node from a set of
measurements. Tracking produces a series of estimates over time.
• Value of information or information utility: A mapping of data to a
scalar number, in the context of the overall system task and knowledge.
For example, information utility of a piece of sensor data may be
characterized by its relevance to an estimation task at hand and
computed by a mutual information function.
2.2.3 Controller:
A controller to process all the relevant data, capable of executing arbitrary
code. The controller is the core of a wireless sensor node. It collects data
from the sensors, processes this data, decides when and where to send it,
receives data from other sensor nodes, and decides on the actuator‘s
behavior. It has to execute various programs, ranging from time- critical
signal processing and communication protocols to application programs; it
is the Central Processing Unit (CPU) of the node.
For General-purpose processors applications microcontrollers are used.
These are highly overpowered, and their energy consumption is
excessive. These are used in embedded systems. Some of the key
characteristics of microcontrollers are particularly suited to embedded
systems are their flexibility in connecting with other devices like sensors
and they are also convenient in that they often have memory built in.
A specialized case of programmable processors are Digital Signal
Processors (DSPs). They are specifically geared, with respect to their
architecture and their instruction set, for processing large amounts of
vectorial data, as is typically the case in signal processing applications. In
a wireless sensor node, such a DSP could be used to process data coming
28
from a simple analog, wireless communication device to extract a digital
data stream. In broadband wireless communication, DSPs are an Sensor Node Hardware
and Network Architecture
appropriate and successfully used platform.
2.2.4 Memory:
Some memory to store programs and intermediate data; usually, different
types of memory are used for programs and data. In WSN there is a need
for Random Access Memory (RAM) to store intermediate sensor
readings, packets from other nodes, and so on. While RAM is fast, its
main disadvantage is that it loses its content if power supply is interrupted.
Program code can be stored in Read-Only Memory (ROM) or, more
typically, in Electrically Erasable Programmable Read-Only Memory
(EEPROM) or flash memory (the later being similar to EEPROM but
allowing data to be erased or written in blocks instead of only a byte at a
time). Flash memory can also serve as intermediate storage of data in case
RAM is insufficient or when the power supply of RAM should be shut
down for some time.
29
Wireless Sensor
Networks and Mobile
Communication Transceiver structure has two parts as Radio Frequency (RF) front end and
the baseband part.
1. The radio frequency front end performs analog signal processing in
the actual radio frequency Band.
□ Gain: The gain is the ratio of the output signal power to the input signal
power and is typically given in dB. Amplifiers with high gain are
desirable to achieve good energy efficiency.
□ Power efficiency: The efficiency of the radio front end is given as the
ratio of the radiated power to the overall power consumed by the front
end; for a power amplifier, the efficiency describes the ratio of the
output signal‘s power to the power consumed by the overall power
amplifier.
□ Receiver sensitivity: The receiver sensitivity (given in dBm) specifies
the minimum signal power at the receiver needed to achieve a
prescribed Eb/N0 or a prescribed bit/packet error rate.
2.2.7.2 Capacity:
They should have high capacity at a small weight, small volume, and low
price.
2.2.7.4 Self-discharge:
Their self-discharge should be low. Zinc-air batteries, for example, have
only a very short lifetime (on the order of weeks).
33
Wireless Sensor 2.2.7.6 Relaxation:
Networks and Mobile
Communication Their relaxation effect – the seeming self-recharging of an empty or
almost empty battery when no current is drawn from it, based on chemical
diffusion processes within the cell – should be clearly understood. Battery
lifetime and usable capacity is considerably extended if this effect is
leveraged.
2.2.7.10 Vibrations:
One almost pervasive form of mechanical energy is vibrations: walls or
windows in buildings are resonating with cars or trucks passing in the
streets, machinery often has low frequency vibrations. both amplitude and
frequency of the vibration and ranges from about 0.1 μW/cm3 up to 10,
000 μW/cm3 for some extreme cases. Converting vibrations to electrical
energy can be undertaken by various means, based on electromagnetic,
electrostatic, or piezoelectric principles.
34
2.2.7.11 Pressure variations:
Sensor Node Hardware
Somewhat akin to vibrations, a variation of pressure can also be used as a and Network Architecture
power source.
35
Wireless Sensor For hardware functions such as input and output and memory
Networks and Mobile allocation, the operating system acts as an intermediary between
Communication programs and the computer hardware.
An embedded system is some combination of computer hardware and
software, either fixed in capability or programmable, that is
specifically designed for a particular function.
Embedded operating systems are designed to be used in embedded
computer systems. They are able to operate with a limited number of
resources. They are very compact and extremely efficient by design.
36
Figure shows a timer component that provides a more abstract version of a
simple hardware time. It understands three commands (“init”, “start”, Sensor Node Hardware
and Network Architecture
and “stop”) and can handle one event(“fire”) from another component,
for example, a wrapper component around a hardware timer. It issues
“setRate” commands to this component and can emit a “fired” event
itself.
The important thing to note is that, in staying with the event-based
paradigm, both command and event handlers must run to conclusion; they
are only supposed to perform very simple triggering duties. In particular,
commands must not block or wait for an indeterminate amount of time;
they are simply a request upon which some task of the hierarchically lower
component has to act. Similarly, an event handler only leaves information
in its component’s frame and arranges for a task to be executed later; it
can also send commands to other components or directly report an event
further up.
The actual computational work is done in the tasks. In TinyOS, they also
have to run to completion, but can be interrupted by handlers. The
advantage is twofold: there is no need for stack management and tasks are
atomic with respect to each other. Still, by virtue of being triggered by
handlers, tasks are seemingly concurrent to each other.
The arbitration between tasks – multiple can be triggered by several events
and are ready to execute – is done by a simple, power-aware First In
First Out (FIFO) scheduler, which shuts the node down when there is no
task executing or waiting.
With handlers and tasks all required to run to completion, it is not clear
how a component could obtain feedback from another component about a
command that it has invoked there – for example, how could an
Automatic Repeat Request (ARQ) protocol learn from the MAC protocol
whether a packet had been sent successfully or not? The idea is to split
invoking such a request and the information about answers into two
phases: The first phase is the sending of the command, the second is an
explicit information about the outcome of the operation, delivered by a
37
Wireless Sensor separate event. This split-phase programming approach requires for each
Networks and Mobile command a matching event but enables concurrency under the constraints
Communication of run-to- completion semantics – if no confirmation for a command is
required, no completion event is necessary.
40
2.5.1. Sensor network scenarios
Sensor Node Hardware
2.5.2 Optimization goals and figures of merit and Network Architecture
41
Wireless Sensor obstacles
Networks and Mobile
Communication Multi-hopping also to improves the energy efficiency of communication
as it consumes less energy to use relays instead of direct communication,
the radiated energy required for direct communication over a distance d is
cdα (c some constant, α ≥ 2 the path loss coefficient) and using a relay at
distance d/2 reduces this energy to 2c(d/2)α
This calculation considers only the radiated energy. It should be pointed
out that only multi- hop networks
operating in a store and forward fashion are considered here. In such a
network, a node has to correctly receive a packet before it can forward it
somewhere. Cooperative relaying (reconstruction in case of erroneous
packet reception) techniques are not considered here.
Note how in the scenario in the lower half, both sinks and active sources
are used to forward data to the sinks at the left and right end of the
network.
Three types of mobility: In the scenarios discussed above, all participants
were stationary. But one of the main virtues of wireless communication is
its ability to support mobile participants In wireless sensor networks,
mobility can appear in three main forms
a. Node mobility
b. Sink mobility
c. Event mobility
42
(a) Node Mobility: The wireless sensor nodes themselves can be mobile.
The meaning of such mobility is highly application dependent. In Sensor Node Hardware
and Network Architecture
examples like environmental control, node mobility should not happen; in
livestock surveillance (sensor nodes attached to cattle, for example), it is
the common rule. In the face of node mobility, the network has to
reorganize to function correctly.
(b) Sink Mobility: The information sinks can be mobile. For example, a
human user requested information via a PDA while walking in an
intelligent building. In a simple case, such a requester can interact with
the WSN at one point and complete its interactions before moving on,
In many cases, consecutive
43
Wireless Sensor
Networks and Mobile
Communication
Even if the sensor node does not need to be able to process the IP
protocol, it has to include sufficient information (IP address and port
number, for example) in its own packets;
the gateway then has to extract this information and translate it into IP
packets.
An ensuing question is which source address to use here – the gateway in
a sense has to perform tasks similar to that of a Network Address
Translation (NAT) device.
The more general case is, however, a terminal ―far away requesting
theservice, not immediately able to communicate with any sensor node and
thus requiring the assistance of a gateway node
First of all, again the question is how to find out that there actually is
a sensor network in the desired location, and how to find out about the
existence of a gatewaynode?
47
Wireless Sensor Once the requesting terminal has obtained this information, how to
Networks and Mobile access the actualservices.
Communication
The requesting terminal can instead send a properly formatted request
to this gateway, which acts as an application-level gateway
The gateway translates this request into the proper intra sensor
network protocol interactions
The gateway can then mask, for example, a data-centric data
exchange within the network behind an identity-centric exchange used
in the Internet
It is by no means clear that such an application-level protocol exists
that represents an actual simplification over just extending the actual
sensor network protocols to the remote terminal
In addition, there are some clear parallels for such an application-level
protocol with so- called Web Service Protocols, which can explicitly
describe services and the way they can be accessed
2.9 SUMMARY
The separation of functionalities is justified from the hardware
properties as is it supported by operating systems like TinyOS. These
trade-offs form the basis for the construction of networking
functionalities, geared toward the specific requirements of wireless
sensor network applications.
The wireless sensor networks and their networking architecture will
have many different guises and shapes. For many applications, but by
no means all, multihop communication is the crucial enabling
technology, and most of the WSN research as well as the following
part of this book are focused on this particular form of wireless
networking. Four main optimization goals – WSN-specific forms of
quality of service support, energy efficiency, scalability, and robustness
– dominate the requirements for WSNs and have to be carefully
51
Wireless Sensor arbitrated and balanced against each other. To do so, the design of
Networks and Mobile WSNs departs in crucial aspects from that of traditional networks,
Communication resulting in a number of design principles. Most importantly,
distributed organization of the network, the use of in-network
processing, a data-centric view of the network, and the adaptation of
result fidelity and accuracy to given circumstances are pivotal
techniques to be considered for usage.
The large diversity of WSNs makes the design of a uniform, general-
purpose service interface difficult; consequently, no final solutions to
this problem are currently available. Similarly, the integration of WSNs
in larger network contexts, for example, to allow Internet- based hosts a
simple access to WSN services, is also still a fairly open problem. The
physical layer is mostly concerned with modulation and demodulation
of digital data; this task is carried out by so-called transceivers. In
sensor networks, the challenge is to find modulation schemes and
transceiver architectures that are simple, low cost, but still robust
enough to provide the desired service.
2.10 UNIT END EXERCISES
1. Discuss the 4 different types of controllers.
2. State and explain any 5 characteristics of Transceiver. 10. What are the
transceiver operational states?
3. In Wireless Sensor Networks, state the three types of Mobility. 12.
Write a short note on 4 aspects of optimization goals?
4. List and explain any 5 basic principles for designing network
protocols.
5. What are the requirements for WSN service interfaces?
6. State the reasons why gateways are needed in WSN.
7. Explain Single-node Architecture in Detail?
8. Explain network Architecture?
52
3
MEDIUM ACCESS CONTROL
PROTOCOLS
Unit Structure
3.0 Objectives
3.1 Introduction
3.2 Fundamentals of MAC Protocols
3.2.1 Performance requirements
3.2.2 Common protocols
3.3 MAC Protocols for WSNs
3.3.1 Schedule-based protocols
3.3.2 Random access-based protocols
3.4 Sensor-MAC Case Study
3.4.1 Protocol overview
3.4.2 Periodic listen and sleep operations
3.4.3 Schedule selection and coordination
3.4.4 Schedule synchronization
3.4.5 Adaptive listening
3.4.6 Access control and data exchange
3.4.7 Message passing
3.5 Summary
3.6 List of References
3.7 Unit End Exercises
3.0 OBJECTIVES
To understand fundamental and performance requirements of MAC
protocols
To get familiar with some of the MAC protocols along with the case
study
53
Wireless Sensor 3.1 INTRODUCTION
Networks and Mobile
Communication WSNs are often made up of numerous cheap, low-power, multifunctional
wireless devices that are randomly and hastily placed around a geographic
area. Because to resource constraints, sensing devices can only process
and communicate a finite quantity of data at a time. Yet, it is the combined
effort of these sensing devices that holds out hope for a large impact on a
variety of applications in many different sectors, such as science and
engineering, military scenarios, protecting key infrastructure, and
environmental monitoring.
A high degree of self-organization and coordination between the sensors is
necessary to carry out the duties necessary to support the underlying
application in order to fully utilize the potential benefits of WSNs. The
requirement for the wireless sensor nodes to self-organize into a multi-hop
wireless network lies at the core of this cooperative endeavor to
accomplish communications. To properly complete the task for which they
are deployed, wireless sensor nodes must therefore be equipped with
effective communications and network protocols.
Communication linkages must be established between nearby sensor
nodes in order to construct a multi-hop wireless network infrastructure for
data transfer. Nevertheless, communication in wireless networks is
accomplished via electromagnetic signal transmission in the air, as
opposed to communication over a directed media in wired networks. So,
all sensor network nodes must fairly share this shared communication
medium. A medium access control protocol must be used to accomplish
this. The primary determinant of WSN performance is the selection of the
medium access control protocol.
58
scheduling colliding packets for later retransmissions in order to deal Medium Access Control
with collisions. Protocols
The first long radio links and satellite communications used random
access techniques. One of the earliest such media access protocols was the
ALOHA protocol, often known as pure ALOHA. Simply put, ALOHA
enables nodes to communicate anytime they have data to send. The
creation of numerous methods, such as carrier-sense multiple access
(CSMA), carrier-sense multiple access with collision detection
(CSMA/CD), and carrier-sense multiple access with collision avoidance
(CSMA/CA), was prompted by efforts to enhance the performance of pure
ALOHA.
60
superframe has a defined length. The superframe is additionally Medium Access Control
broken into smaller frames. Each frame's size is not constant and may Protocols
change over time for a single node as well as from one node to
another. Each node must conduct a neighborhood discovery operation
on a regular basis in order to identify nearby nodes according to
SMACS. By giving each detected neighbor a time slot, each node
creates a link with them. The time slots are chosen so that at each slot,
the node only converses with its neighbors. The link construction
mechanism must make sure that there is no interference between
neighboring links, despite the fact that a node and its neighbors are not
needed to transmit at distinct slot times.This is accomplished by
spreading code (CDMA) or randomly selecting a channel from a vast
pool of channels for each link. Each node in the superframe structure
keeps its own time slot schedules with all of its neighbors, and to
communicate, nodes must set their radios to the appropriate frequency
channel or CDMA code.
2. Bluetooth: A centralized TDMA-based protocol serves as the main
media access control mechanism for the developing technology known
as Bluetooth. With one common short-range radio link, Bluetooth is
intended to replace cables and infrared links used to connect various
electronic devices, including cell phones, headsets, PDAs, digital
cameras, laptop computers, and their accessories. The ISM frequency
range at 2.45 GHz is where Bluetooth operates. Its physical layer is
based on a technique for allocating hopping sequences and a
pseudorandom frequency-hopping scheme with a hopping frequency
of 1.6 kHz. With 1-MHz spacing, a set of 79 hop carriers are defined.
Each hop sequence establishes a Bluetooth channel with a 1 Mbps data
rate.A piconet is a collection of devices that communicate via a single
channel.
In order to support broadcasting by a slave to all members of its
piconet, Bluetooth defines four different types of communication
between nodes: intra piconet unicast for slave-to-slave communication
within a piconet; intra piconet broadcast; inter piconet unicast for
piconet-to-piconet communications; and inter piconet broadcast for
piconet-to-all scatternet node communications.
The source slave enters its own MAC address in the data packet's
equivalent field for intra-piconet unicast transmission, sets the packet's
forward field to 1, and sets the destination address to the desired
destination node. The master examines the forward field after
receiving the message. If it is, the master sends the message to the
intended slave device indicated by the destination address of the
original packet, replacing the MAC address field with its own MAC
address.
The source slave writes its own MAC address, sets the forward field to
1, and sets the destination address to 000 for intra piconet broadcast
communication. The forward field is already set when the master
receives the message. The message is then sent to all of the nodes in
61
Wireless Sensor the piconet by the master, who substitutes its own address for the
Networks and Mobile MAC address.
Communication
For inter piconet unicast communication, the source device sends the
data packet with its own MAC address and sets the forward field to 1,
the broadcast field to 1 and the destination address to the relay of the
next piconet. Furthermore, the source device sets the routing vector
field (RVF) of the packet to contain the logical path to the targeted
destination device in the intended piconet. The RVF is a sequence of
tuples of the form (LocId, Mac_Addr), where LocId represents the
identity of the local master and Mac_Addr its corresponding piconet
MAC address. Upon receiving the message, the master forwards it to
the relay node. The relay extracts from the RVF the next pair,
containing the local identity and the MAC address of the master, and
sends the message to this master. This process is repeated until the
RVF becomes empty, signaling that the destination device has been
reached.The relay sends the message to this master by extracting the
following pair from the RVF, which contains the local identity and
MAC address of the master. Up until the RVF is empty, indicating that
the destination device has been reached, this procedure is repeated.
The source device produces a packet with its own MAC address and
sets the forward and broadcast fields to 1 and the destination address to
000 for inter-piconet broadcast communication. The master is then
notified of the packet.The packet is sent to all slaves in the piconet,
including relay nodes, when the master observes that the broadcast
field is set to 1. Relay nodes receive broadcast packets and forward
them to all connected masters save the one from which they originated.
3. Low-Energy Adaptive Clustering Hierarchy (LEACH): Nodes are
clustered using a hierarchical approach using LEACH. Nodes take
turns acting as cluster heads inside each cluster. To establish
communication between nodes and their cluster head, LEACH
employs TDMA. Messages from the cluster head's cluster nodes are
forwarded to the base station.
A TDMA schedule is established by the cluster head node and sent to
every other node in the cluster. Data message collisions are avoided by the
scheduling.The nodes can utilize the schedule to identify the times when
they need to be active as well. With the exception of the head cluster, this
enables each cluster node to turn off its radio components until the
designated time intervals. LEACH presupposes that cluster nodes begin
the cluster setup phase simultaneously and maintain synchronization
throughout. Sending synchronization pulses to every node from the base
station is one method of synchronization that could be used.
LEACH employs a code assignment system based on transmitters to
lessen inter-cluster interference. Direct-sequence spread spectrum (DSSS)
is used to communicate between a node and its cluster head. Each cluster
is given a specific spreading code, which is utilized by all nodes in the
cluster to transmit data to the cluster head. On a first-in, first-served basis,
62
spreading codes are given to cluster heads starting with the first one to Medium Access Control
announce its position and moving on to succeeding cluster heads. Nodes Protocols
must modify their transmission power in order to lessen interference from
neighboring clusters.
The cluster head aggregates the data after receiving data packets from its
cluster nodes and sends the data to the base station. With fixed spreading
code and CSMA, a cluster head and base station can communicate with
one another. The cluster head must sense the channel to make sure no
other cluster heads are currently broadcasting data using the base station
spreading code before it can transmit data to the base station. The cluster
head delays data transmission until the channel is free of traffic if the
channel is felt to be busy. The cluster head delivers the data using the base
station spreading code when this incident takes place.
67
Wireless Sensor During these subintervals, the channel access of competing nodes is
Networks and Mobile controlled by a multi-slotted contention window. SYNC packet
Communication transmission takes place during the first subinterval, while data packet
transmission occurs during the second subinterval. At either of these
subintervals, a competing station chooses a time slot at random, conducts
carrier sensing, and initiates packet transmission if it notices that the
channel is empty. The RTS/CTS handshake is used during data packet
transmission to guarantee exclusive access to the channel. This access
method ensures that both the synchronization and data packets reach the
nearby nodes.
68
Nodes may need to listen to every broadcast from their neighbors in order Medium Access Control
to execute virtual carrier sensing efficiently. It may be necessary for nodes Protocols
to listen to packets that are meant for other nodes as a result. Overhearing
packets could waste a lot of energy. S-MAC permits nodes to enter sleep
mode once they hear the exchange of an RTS or a CTS packet between
two other nodes in order to prevent overhearing.The node enters the sleep
state until the NAV value reaches zero after initializing its NAV with the
value found in the duration field of the RTS or CTS packets.The
overhearing avoidance procedure may result in significant energy savings
because data packets are often larger than control packets. Figure 5 depicts
the collision-avoidance strategy utilized by S-MAC.
69
Wireless Sensor
Networks and Mobile
Communication
3.5 SUMMARY
A new technology called sensor networking has numerous potential uses,
including the protection of vital infrastructure, environmental monitoring,
smart cities, all-pervasive and ubiquitous healthcare, and robotic
exploration. Typically, a WSN is made up of a sizable number of
dispersed, battery-powered nodes that are furnished with one or more
sensors, embedded CPUs, and low-power radios. As a multihop wireless
network, these nodes cooperate with one another. To successfully
complete the task for which they are deployed, wireless sensor nodes
depend on the design of effective MAC-layer protocols for WSNs.
The primary determinant of WSN performance is the selection of the
medium access control protocol. An effective MAC layer protocol for
WSN must take into account a number of factors. Battery-powered sensor
network nodes are typical, and it is frequently challenging, if not
impossible, to replace or recharge them. To increase the network's
lifespan, an efficient MAC-layer protocol design for a WSN must also be
energy efficient. In order to accommodate changes in network size, node
density, and topology, the MAClayer protocol must also be scalable.
Finally, when designing MAC layer protocols for WSNs, access equity,
low latency, high throughput, and bandwidth utilization are also crucial
considerations.
As more WSNs continue to appear, interest in the development of a MAC-
layer protocol for sensor networks is expected to remain high. Also, recent
advancements in cognitive radio are probably going to change how the
70
MAC-layer protocol for WSNs is designed. A wireless network device Medium Access Control
fitted with such a radio will be better able to adapt to and interact with its Protocols
environment while carefully controlling its energy consumption thanks to
the direct environment interaction capabilities of cognitive radios.
71
4
ROUTING PROTOCOLS
Unit Structure
4.0 Objectives
4.1 Introduction
4.2 Data Dissemination and Gathering
4.3 Routing Challenges and Design Issues in Wireless Sensor Networks
4.3.1 Network Scale and Time-Varying Characteristics
4.3.2 Resource Constraints
4.3.3 Sensor Applications Data Models
4.4 Routing Strategies in Wireless Sensor Networks
4.4.1 WSN Routing Techniques
4.4.2 Flooding and Its Variants
4.4.3 Sensor Protocols for Information via Negotiation
4.4.4 Low-Energy Adaptive Clustering Hierarchy
4.4.5 Power-Efficient Gathering in Sensor Information Systems
4.4.6 Directed Diffusion
4.4.7 Geographical Routing
4.5 Summary
4.6 List of References
4.7 Unit End Exercises
4.0 OBJECTIVES
To examine fundamental routing difficulties in WSNs and offer
various development methods for routing protocols in these networks
To draw focus on the particular characteristics of the traffic that is
often generated in WSNs
To understand basic routing strategies used to strike a balance between
responsiveness and energy efficiency
4.1 INTRODUCTION
Whether they are made up of fixed or mobile sensor nodes, WSNs can be
deployed to support a wide range of applications in a number of contexts.
Depending on the application, these sensors are placed in different ways.
For example, sensor nodes are often installed ad hoc in environmental
monitoring and surveillance applications to cover the precise area to be
watched (e.g., C1WSNs). Smart wearable wireless devices and
biologically compatible sensors can be strategically affixed to or
implanted within the human body for medical purposes to monitor the
72
patient's vital signs. As soon as they are deployed, sensor nodes form an Routing Protocols
autonomous wireless ad hoc network that needs little to no
maintenance.After that, sensor nodes work together to complete the duties
required by the application for which they were installed.
The primary duty of wireless sensor nodes is to detect and gather data
from a target domain, process the data, and communicate the information
back to specified sites where the underlying application lives,
notwithstanding the diversity in the goals of sensor applications. The
creation of an energy-efficient routing protocol is necessary to create
pathways between sensor nodes and the data sink in order to do this
operation effectively. The network lifetime must be maximized by the
path selection process. The routing challenge is extremely difficult due to
the features of the environment that sensor nodes normally operate in as
well as significant resource and energy limitations.
4.2 DATA DISSEMINATION AND GATHERING
An essential component of WSNs is how data and queries are transmitted
from the base station to the location where the target phenomena are being
observed. Direct data interchange between each sensor node and the base
station is an easy way to complete this task. Nevertheless, a single-hop
solution is expensive since nodes that are distant from the base station risk
fast running out of energy, substantially reducing the network's
lifetime.This is especially true if the wireless sensors are set up to cover a
big area of land or if they are movable and could wander away from the
base station.
Data sharing between the sensors and base stations is typically done
utilizing multi-hop packet transmission over short communication
distances to solve the drawbacks of the single-hop strategy. In particular in
very dense WSNs, such an approach results in significant energy savings
and lowers communication interference amongst sensor nodes competing
for the channel. Figure 1 shows data forwarding between the sensors that
collect data and the sinks that make it available. Data gathered by the
sensors is transferred to the base station utilizing multi-hop pathways in
response to requests made by the sinks or when particular events take
place in the region being monitored.It is important to note that, depending
on the application, sensor nodes may gather data that has been linked
while travelling to the base station.
73
Wireless Sensor Data packets between the source and the destination must be forwarded by
Networks and Mobile intermediate nodes in a multi-hop WSN. The main purpose of the routing
Communication algorithm is to choose which group of intermediary nodes should be used
to create a data-forwarding path between the source and the destination.
Routing in large-scale networks is, in general, a demanding problem
whose solution must take into account a number of complex design
requirements, such as correctness, stability, and optimality with regard to
several performance metrics. In order to meet the traffic demands of the
supported application while extending the life of the network, it is
necessary to solve additional issues brought about by the fundamental
features of WSNs in combination with severe energy and bandwidth
limits.
4.3 ROUTING CHALLENGES AND DESIGN ISSUES IN
WIRELESS SENSOR NETWORKS
Although WSNs and wired and ad hoc networks have a lot in common,
they also have a few distinctive qualities that make them stand out from
other networks. These distinctive qualities bring novel routing design
requirements that go above and beyond those commonly found in wired
and wireless ad hoc networks into sharp focus. Achieving these design
specifications poses a different and particular set of difficulties. These
difficulties can be attributed to a number of things, including severe
energy constraints, constrained computing and communication
capabilities, the dynamically changing environment in which sensors are
deployed, special data traffic models, and application-level requirements
for quality of service.
74
transmission. The duty cycle of the wireless sensors can be dynamically Routing Protocols
controlled to lower energy consumption. Yet, many mission-critical sensor
applications make the energy management challenge particularly difficult.
Due to the demands of these applications, it is necessary to concurrently
maintain a set level of sensing and communication performance limits.
Hence, the topic of how to create scalable routing algorithms that can
function well under a variety of performance limitations and design
requirements arises.The development of these protocols is fundamental to
the future of WSNs.
77
Wireless Sensor transmitted.A recent history of the traffic must be kept as part of this
Networks and Mobile method in order to track which data packets have already been forwarded.
Communication
Flooding has a number of drawbacks when employed in WSNs, despite
how straightforward its forwarding rule is and how little maintenance it
needs. The first problem with flooding is that it might cause a traffic jam.
Duplicate control or data packets transmitted repeatedly to the same node
result in this unwanted outcome. Flooding's second negative aspect is the
overlap issue it creates. Resource blindness is the third and most severe
disadvantage of flooding. Flooding utilizes a straightforward forwarding
rule that ignores the sensor nodes' energy limitations while routing
packets. As a result, the node's energy may quickly run out, drastically
decreasing the network's lifetime.
Despite its straightforward forwarding rule and reasonably inexpensive
cost A derivative strategy called gossiping has been suggested as a remedy
for flooding's drawbacks. Similar to flooding, gossiping also relies on a
straightforward forwarding rule and does not demand expensive topology
maintenance or sophisticated route discovery techniques. Instead of
broadcasting a data packet to every neighbor as is the case with flooding,
gossiping calls for each node to deliver the incoming packet to a randomly
chosen neighbor. The packet is forwarded to the neighbor picked by the
randomly chosen neighbor after it has been received by that
neighbor.Until the packet arrives at its designated location or the
maximum hop count is reached, this procedure iteratively continues. By
restricting the number of packets each node delivers to its neighbor to one
copy, gossip avoids the implosion issue. A packet may have high latency
while travelling to its destination, especially in a large network. This is
primarily due to the protocol's randomness, which essentially investigates
one path at a time.
79
Wireless Sensor The fundamental operation of SPIN is shown in Figure 3, where sensor
Networks and Mobile node A, the data source, sends an ADV message containing the
Communication information characterizing its data to sensor node B, its close neighbor.
Node B sends a REQ message to request the data after expressing interest
in it. Node B transmits an ADV message after receiving the data to inform
its close neighbors of the new information. Only nodes C, E, and G, three
of these neighbors, show interest in the information. These nodes send
node B a REQ message, and node B responds by sending the requested
data to each of the requesting nodes.
83
Wireless Sensor The chain-based binary technique uses significantly less energy because
Networks and Mobile nodes work in close proximity to one another. In addition, the technique
Communication ensures that the leader will receive the aggregated data after log2N steps
because the hierarchical, treelike structure is balanced. In PEGASIS, a
chain-based binary aggregation approach has been utilized as an
alternative to high parallelism. It has been demonstrated that the strategy
works best with CDMA-capable sensor nodes in terms of the energy-delay
product needed for each round of data collection, a parameter that
balances the energy and delay costs.
86
Directed diffusion can be used to fix link failures brought on by external Routing Protocols
elements that affect the communications channel as well as node failures
or performance degradation brought on by node energy loss or total
depletion. Data loss or a reduction in rate are often indicators of these
failures. An alternative path that is sending at slower rates can be found
and strengthened when a path connecting a sensing node and the data sink
fails. Lossy links can also be negatively reinforced by allowing the
neighbor's cache expire over time or by delivering interests at the
exploratory data rate.
Diffusion that is directed has the ability to save a lot of energy. It can
attain comparatively high performance over non-optimized paths thanks to
its localized interactions.The resulting diffusion processes are also
resilient to a variety of network dynamics. Node addressing is unnecessary
due to its data-centric methodology.The query-on-demand data model,
however, is closely related with the directed diffusion paradigm. This
might restrict its applicability to applications that make sense as a data
model, where the process of interest matching can be carried out quickly
and clearly.
4.5 SUMMARY
The routing challenge is extremely difficult due to the features of WSNs
and the environment in which sensor nodes are frequently installed.In this
chapter, we concentrated on the fundamental problems with routing in
WSNs and discussed various methods for creating routing protocols for
these networks. We provide a quick taxonomy of the fundamental routing
techniques utilized to balance responsiveness and energy efficiency. We
reviewed several protocols that deal with the issue of routing in
contemporary WSNs. The routing issue has several workable solutions
that have come to light. As the use of WSNs in many industries grows,
improvements in network hardware and battery technology will open the
door to realistic, economically viable implementations of these routing
protocols.
88
4.7 UNIT END EXERCISES Routing Protocols
89
5
TRANSPORT CONTROL PROTOCOLS
Unit Structure
5.0 Objectives
5.1 Introduction
5.2 Traditional Transport Control Protocols
5.2.1 TCP
5.2.2 UDP
5.2.3 Mobile IP
5.3 Transport Protocol Design Issues
5.4 Examples of Existing Transport Control Protocols
5.4.1 CODA (Congestion Detection and Avoidance)
5.4.2 ESRT (Event-to-Sink Reliable Transport)
5.4.3 RMST (Reliable Multi segment Transport)
5.4.4 PSFQ (Pump Slowly, Fetch Quickly)
5.4.5 GARUDA
5.4.6 ATP (Ad Hoc Transport Protocol)
5.5 Performance of Transport Control Protocols
5.5.1 Congestion
5.5.2 Packet loss recovery
5.6 Summary
5.7 List of References
5.8 Unit End Exercises
5.0 OBJECTIVES
To understand the different traditional transport controlprotocol
To get familiar with the design issues, examples and performance of
Transport Control Protocols
5.1 INTRODUCTION
Physical, data link, network (or internetworking), transport, and other
higher levels like session, presentation, and application make up the
architecture of computer and communication networks. For its immediate
upper layer, a service consumer, each lower layer serves as a service
90
provider. Via service access points, neighboring layers communicate with Transport Control
one another (SAPs). For instance, the network layer, which sits directly Protocols
above the link layer, receives link services from the data link layer. The
transport layer, which is the layer above it, receives addressing and routing
services from the network layer, while the layers above it receive message
transportation services from the transport layer. In this architecture,
practically all nodes only include the lower three layers.Yet, the transport
and the layers above it only exist at end points or hosts and carry out end-
to-end protocol operations.
End-to-end segment transportation is offered by the transport layer, in
which messages are split up into a series of segments at the source and
then put back together again at the destination nodes. The procedures
utilized to deliver the segments to the target nodes and/or the underlying
delivery protocol structures are not concerns of the transport layer.
Examples of transport protocols include the user datagram protocol
(UDP), the sequenced packet exchange protocol (SPX), the transport
control protocol (TCP), and NWLink (Microsoft's implementation of
IPX/SPX). The Internet frequently uses TCP and UDP.TCP can be
classified as either connection-oriented and connectionless.
5.2.2 UDP
UDP is a transport protocol without connections. This protocol does not
have any techniques for recovering lost information because it exchanges
92
datagrams without a sequence number between the transmitter and the Transport Control
receiver. It cannot guarantee ordered transmission because the datagrams Protocols
do not include a sequence number. Moreover, it lacks features for flow
control or congestion. As UDP does not perform congestion or flow
control, it can end up outperforming TCP in situations where both
protocols are active. A TCP-friendly rate control (TFRC) for UDP has
been suggested in recent years to implement a certain amount of control in
this protocol.When TCP and UDP are available on a connection, the
fundamental principle underlying TFRC is to deliver almost comparable
throughput to both protocols.
5.2.3 Mobile IP
In order to offer terminal mobility in an all-IP network, mobile IP is
presented as a global mobility management solution at the network layer.
TCP/early IP's design did not take mobility into account. Currently, the IP
address serves as both a terminal identity and a network location identifier
for terminals. Addresses are also utilized throughout the routing
procedure. To separate the two, however, there must be some sort of
process. Two new entities and one new IP address are introduced by
mobile IP, which is intended to alleviate this issue.The two new entities
are 1] the home agent (HA), which is situated in the home network of the
mobile terminal and is in charge of managing its IP addresses and packet
forwarding, and 2] the foreign agent (FA), which is situated in the network
that the mobile terminal visits. HA and FA can be addressed worldwide
and have static IP addresses.Care of address (COA), the IP address
acquired from FA after the mobile device enters a new network, is the new
IP address introduced for mobility.
When a terminal enters a new network, it registers with the FA of the new
network and then gets a COA. This is how mobile IP works. The COA is
now communicated to the terminal's HA by either the terminal or the FA.
The HA will then pass the packets to the mobile terminal's COA when a
related terminal sends data to the mobile terminal. Direct packet
transmission occurs from the mobile terminal to the matching
terminal.The triangular routing method, which results in a longer path
from the corresponding terminal to the mobile and, thus, low efficiency, is
hence an asymmetrical routing procedure between the two terminals. Even
though the physical link may have enough bandwidth, the TCP sender is
obliged to drop its rate during the mobility process since handoff comes as
a result of movement and may result in packet loss and TCP timeout.
95
Wireless Sensor
Networks and Mobile
Communication
5.4.5 GARUDA
The downstream reliability category includes GARUDA. It is built on a
two-tier node design, and core sensor nodes are chosen from nodes that
are 3i hops away from the sink (i is an integer). Second-tier nodes are the
noncore nodes that are still present. A nearby core node is selected by each
noncore sensor node to serve as its core node. Core nodes are used by
noncore nodes to recover lost packets. GARUDA detects and notifies
losses via a NACK message. Loss recovery is done in two different ways:
between core sensor nodes and between noncore sensor nodes and their
core node.Retransmission to recover lost packets appears to be a
combination of pure hop by hop and end to end, for this reason. In order to
97
Wireless Sensor ensure the success of single or first packet delivery, GARUDA designs a
Networks and Mobile repeating wait for first packet (WFP) pulse transmission. In order to create
Communication a two-tier node architecture, the hop number and core sensor nodes are
also computed and chosen via pulse transmission. Inconsistency in the
upstream direction and a lack of congestion control are two drawbacks of
GARUDA. At the time of this writing, GARUDA's published results were
devoid of any reliability findings or performance evaluations against
alternative algorithms like PSFQ.
5.5.1 Congestion
End to end and hop by hop are two common methods for reducing
congestion. The source node must identify congestion in either the
receiver-assisted (ACK-based loss detection) mode or the network-
assisted mode in an end-to-end protocol like standard TCP (using explicit
congestion notification). Rate modifications therefore only take place at
the source node. In hop-by-hop congestion control, intermediate nodes
alert the originating connection node when there is congestion. Hop-by-
hop control may be able to clear congestion more quickly than the end-to-
end method while also lowering packet loss and energy usage in sensor
nodes.
98
Here, a straightforward model is presented to assist in understanding how Transport Control
congestion control affects energy efficiency. We make the following Protocols
presumptions:
Between sources and sink nodes, there are h > 1 hops, and each hop
causes a delay d. C is the link capacity.
The network experiences uniform congestion. The frequency of
congestion is f, and it depends on the buffer size, traffic patterns, and
network topology.
Congestion will be noticed when the total rate of source transmission
reaches C(1+a).
The average amount of energy needed to send or receive a packet over
each link is e.
With the end-to-end strategy, 1.5hd is often needed to alert the source of
the beginning of congestion. All nodes can send up to C(1+a)(1.5hd)
packets during this window (between the time that congestion occurs and
the source is alerted), with the exception of the congested link, when
traffic is limited to C(1.5hd). As a result, ne=a.C (1.5hd) can be used to
estimate the number of packets lost in this situation as a result of
congestion.
The time needed to start congestion control corresponds to merely a single
hop's worth of delay (d) in the hop-by-hop method. As a result, before
congestion is reduced, packet loss is roughly equal to nb = aCd.
Let Nd(T) represent the number of packets dropped owing to congestion
during the time interval T, and let Ns(T) represent the number of packets
successfully transmitted via the congested network. Each dropped packet
has made 0.5H hops on average. The energy effectiveness of a congestion
control device is defined as
99
Wireless Sensor The ratio of all packets discarded in the sensor network to all packets
Networks and Mobile received at the sink for hop-by-hop congestion control is the energy tax,
Communication according to CODA. The lower ratio therefore denotes more energy
efficiency. Figure 1 shows CODA’s energy efficiency.
Figure 1: Energy tax in CODA as a function of network size for high- and
low-data-rate traffic. The difference between the data points with and
without CODA indicates the energy saving achieved by CODA
5.6 SUMMARY
We gave a general overview of the wireless sensor network transport
control protocol in this chapter. The drawbacks of the TCP and UDP
protocols were examined, along with the reasons why they weren't
appropriate for wireless sensor networks. Also, a study of various sensor
transport control protocols that are now in use was given, along with a list
of issues with those protocols. Designing transport control methods for
wireless sensor networks requires careful consideration of the following
points:
1. The effectiveness of protocols and the effectiveness of congestion-
control techniques.Efficient techniques provide high throughput while
minimizing packet loss.
2. The reliability of the transport layer, the need for loss recovery at the
transport layer, and the most efficient and effective mechanism.Any
such techniques should ideally have minimal buffering requirements.
3. Fairness between sensor nodes located at various ranges from the sink.
4. Using a cross-layer optimization technique to boost performance.
101
Wireless Sensor 5.7 LIST OF REFERENCES
Networks and Mobile
Communication 1) Protocols and Architectures for Wireless Sensor Network, Holger
Kerl, Andreas Willig, John Wiley and Sons, 2005
2) Wireless Sensor Networks Technology, Protocols, and
Applications,Kazem Sohraby, Daniel Minoli and TaiebZnati, John
Wiley & Sons, 2007
3) Mobile communications, Jochen Schiller,2nd Edition, Addison wisely,
Pearson Education,2012
4) Fundamentals of Wireless Sensor Networks, Theory and Practice,
WaltenegusDargie, Christian Poellabauer, Wiley Series on wireless
Communication and Mobile Computing, 2011
5) Networking Wireless Sensors, Bhaskar Krishnamachari, Cambridge
University Press, 2005
102
6
INTRODUCTION, WIRELESS
TRANSMISSION AND MEDIUM
ACCESS CONTROL
Unit Structure
6.0 Objectives
6.1 Introduction
6.2 Applications
6.3 A short history of wireless communication.
6.4 Wireless Transmission: Frequency for radio transmission
6.5 Signals
6.6 Antennas
6.7 Signal propagation
6.8 Multiplexing
6.9 Modulation
6.10 Cellular systems
6.11 Summary
6.12 List of References
6.13 Unit End Exercises
6.0 OBJECTIVES
To get familiar with wireless transmission and medium access control
To get acquaint with the signaling and propagation involved and
associated with the wireless transmission
6.1 INTRODUCTION
In ten years, what will computers look like? No one can forecast the future
with absolute certainty, but most computers will undoubtedly be portable.
How will consumers utilize computers or other communication tools to
access networks? a growing number wirelessly, that is, without any wires.
How will people spend the most of their time while on vacation at work?
Numerous people will be mobile, which is currently one of the main
features of contemporary civilization. Consider an aircraft with 800 seats,
for instance. Passengers on modern aircraft currently have minimal
103
Wireless Sensor network connection, and future aircraft will provide simple Internet
Networks and Mobile access.
Communication
In this case, the only method of transferring data to and from passengers
will be a mobile network travelling at a high rate of speed above ground
and connected by a wireless link. Consider vehicles with Internet
connection and countless embedded processors that must interact with
devices like cameras, cell phones, CD players, headsets, keyboards,
intelligent traffic signs, and sensors. This wide range of tools and
programmes demonstrates the current importance of mobile
communications.
The definitions of the terms "mobile" and "wireless" as they are used
should be given before showing more applications. User mobility and
device portability are two different types of mobility. The term "user
mobility" describes a user who has access to the same or equivalent
telecommunication services at various locations; in other words, the user
is mobile and the services follow them. Simple call-forwarding solutions
from the telephone or computer desktops that enable roaming (i.e., have
the same appearance no matter which computer a user logs into the
network with) are examples of systems that support user mobility.
When a communication device is portable, it can be moved (with or
without a user). To ensure that communication is still feasible when the
device is moving, numerous procedures both inside the device and in the
network must be in place. The mobile phone system is a common
illustration of a system that supports device portability, as the system
automatically switches the device from one radio transmitter (also known
as a base station) to another if the signal deteriorates. Most of the
scenarios include simultaneous user mobility and gadget portability.
The word "wireless" is applied to gadgets. This only explains how to
connect to a network or other communication partners without using a
wire. Transmission of electromagnetic waves through "the air" takes the
role of the cable (although wireless transmission does not need any
medium).
6.2 APPLICATIONS
Although wireless networks and mobile communications can be
advantageous for many applications, some application settings appear to
be tailor-made for their use. Some of them are included in the sections
below:
1] Vehicles
While some already exist in today's cars, there will be many more wireless
communication systems and mobility-aware applications in cars of the
future. Digital audio broadcasting (DAB) with 1.5 Mbit/s allows for the
reception of music, news, traffic updates, weather forecasts, and other
broadcast information. A universal mobile telecommunications system
(UMTS) phone with 384 kbit/s voice and data connectivity might be
104
available for personal communication. Satellite communication can be Introduction, Wireless
employed in remote places, and the global positioning system is used to Transmission and Medium
identify the car's current location. (GPS). To transmit information quickly Access Control
in an emergency or to preserve a safe distance from one another, nearby
cars create a small ad hoc network.In the event of an accident, not only
will the airbag deploy, but a provider will also receive an emergency call
alerting the police and ambulance service. This technology is already in
some cars. In the future, vehicles will communicate with one another via
an ad-hoc network in order to alert them about accidents and help them
slowdown in time, even before a driver is aware of one. Already, trains,
trucks, and buses send maintenance and logistical data to their base of
operations, improving fleet management and saving time and money.
A typical setup for mobile communications including numerous wireless
devices is shown in Figure 1. Mobile phone networks (GSM, UMTS) and
trunked radio systems (TETRA) will connect to networks with a fixed
infrastructure to form wireless LANs. (WLAN). Additionally, satellite
communication lines may be utilized. It's more likely that the networks
inside each automobile and those between cars would operate
haphazardly.Personal digital assistants (PDA), computers, and mobile
phones, such as those connected via Bluetooth, can all be a part of
wireless pico networks within a car.
Consider instances where there is train or air travel. Here, speed can lead
to a variety of issues. While trains and contemporary aeroplanes may
move at speeds of up to 900 km/h and 350 km/h, respectively, many
technologies cannot function if a mobile device's relative speed is greater
than, for example, 250 km/h for GSM or 100 km/h for AMPS. Only a few
technologies, such as DAB, are capable of speeds of up to 900
km/h(unidirectional only).
2] Emergencies
Just consider the advantages of an ambulance having a reliable wifi
connection to a medical facility. From the accident scene, critical
information regarding injured people can be conveyed to the hospital. For
this specific accident type, the essential preparations can be made, and
professionals can be consulted for an early diagnosis. In the event of a
natural disaster, such as a hurricane or earthquake, wireless networks are
the only available form of communication. Only wireless, decentralized ad
105
Wireless Sensor hoc networks survive in the worst scenarios. In addition to the regular
Networks and Mobile cable telephone system failing, all mobile phone systems needing base
Communication stations also fail if all cabling fails.
3] Business
Today's travelling salesperson requires immediate access to the company's
database to make sure that the files on his or her laptop represent the
current situation, to allow the business to monitor all of its travelling
employees' activities, to maintain consistent databases, etc. The laptop can
become a truly mobile office with wireless connection, but effective and
strong synchronization techniques are required to guarantee data
consistency. Figure 2 depicts what could occur when staff members
attempt to communicate inappropriately.The laptop at home connects to
the Internet using DSL and a WLAN or LAN. When the WLAN coverage
runs out, it is necessary to switch to a different technology, like an
improved version of GSM, before leaving the house.Data rates decrease
when travelling at a higher pace due to interference and other causes. In
addition to gas, some gas stations provide WLAN hot spots.There is
already wifi connectivity available aboard trains. Before getting to the
office, it could be required to switch to a few more different technologies.
Mobile communications should always provide the best access to the
internet, the company's intranet, or the telephone network, regardless of
the time and location.
106
5] Infotainment and more Introduction, Wireless
Transmission and Medium
Internet everywhere? Not if wireless networks are absent! Think about a Access Control
city's travel guide. Static data can be downloaded from a CD-ROM, DVD,
or even the Internet at home. However, wireless networks can deliver
current information at any suitable location. By determining your location
via GPS, a local base station, or triangulation, the tour guide may provide
you with information on a building's past while simultaneously
downloading details about a concert that will be taking place there that
same night over a local wireless network. You can select a seat, pay using
electronic money, and email these details to a service provider. In order to
enable, for instance, ad-hoc gaming networks as soon as players meet to
play together, entertainment and games are a rising area of wireless
network applications.
108
1886 – Heaviside introduced impedance as the ratio of voltage over Introduction, Wireless
current. Hertz started his work to demonstrate the existence of radio waves Transmission and Medium
and published his results in 1888. Access Control
109
Wireless Sensor 1902 – Fessenden patented the Heterodyne receiver. American Cornelius
Networks and Mobile D. Ehret filed patents covering the transmission and reception of coded
Communication signals or speech (Frequency Modulation – FM). Poulsen was the first to
develop the CW transmitter.
1903 – Marconi established a transmission station in South Wellfleet, MA
– the dedication included exchanges of greetings between American
President Theodore Roosevelt and British King Edward VII. G.
1904 – Frank J. Sprague developed the idea of the printed circuit. W.
Pickard filed a patent application for a crystal detector where a thin wire
was in contact with silicon. It was the central component in early radio
receivers called crystal radios. J. C. Bose was granted a patent on point
contact diodes that were used for many years as detectors in the industry.
Fleming suggested the rectifying action of the vacuum-tube diode for
detecting high frequency oscillation – the first practical radio tube.
1905 – Fessenden invented the superheterodyne circuit.
1906 – Lee de Forest patented the general principle of omni-range using a
rotating radio beam keyed to identify the sector forming 360 degree sweep
of the beam. He also invented the three-electrode valve or vacuum tube
triode that was instrumental in the development of transcontinental
telephony in 1913. Poulsen transmitted music by wireless using an arc
transmitter with 1 kW of input power and a 200 feet high antenna that was
heard 300 miles away.
1909 – Marconi and Braun shared the Nobel Prize for Physics for their
contributions to the physics of electric oscillations and radiotelegraphy.
1911 – Von Lieben and Eugen Riesz developed a cascade amplifier. Hugo
Germsback, an American novelist, envisaged the concept of pulse radar in
one of his works where he proposed the use of a pulsating polarized wave,
the reflection of which was detected by an actinoscope.
1911 – Engineers start to realize that the triode can also be used for
transmitter and oscillator – the three-electrode vacuum tube was included
in designs for telephone repeaters in several countries.
1912 – G. A. Campbell developed guided wave filters. Sinding and Larsen
transmitted TV by wireless using 3 channels. The Institute of Radio
Engineers was formed in the US.
1914 – The German physicist Walter Schottky discovered the effect of
electric field on the rate of electron emission from thermionic-emitters
named after him. Fleming discovered the atmospheric refraction and its
importance in the transmission of EM waves around the Earth. Carl R.
Englund was the first to develop the equation of a modulated wave (AM)
and also discovered the frequencies related to sidebands. Frequency
modulation of a carrier was proposed to accommodate more channels
within the available bandwidths.
110
1915 – Schottky stated work on the space-charge-grid tube and a screen Introduction, Wireless
grid tube or Tetrode that achieved good amplification by placing a screen Transmission and Medium
grid between the grid and the anode. Access Control
111
Wireless Sensor 1925 – First conference on frequency allocation was held in Geneva.
Networks and Mobile Joseph Tykocinski-Tykociner demonstrated that the characteristics of a
Communication full size antenna can be replaced with sufficient accuracy from
measurements made on a small short wave in the rage of 3 to 6 m.
1926 – L.E. Lilienfield patented the theory of the Field-Effect Transistor.
Japanese engineers Hidetsugu Yagi and Shintaro Uda developed the Yagi
antenna, a row of aerials consisting of one active antenna and twenty
undriven members as a wave canal. Hulsenback and Company patented
identification of buried objects using CW radar.
1927 – R. V. Hartley developed the mathematical theory of
communications. Harold Stephen Black of Bell Laboratories conceived
the negative feedback amplifier. A. de Hass studied fading and
independently developed diversity reception system.
1928 – Baird conducted the first transatlantic TV broadcast and built the
first color TV. Nyquist published a classic paper on the theory of signal
transmission in telegraphy. He developed the criteria for the correct
reception of telegraph signals transmitted over dispersive channels in the
absence of noise. C.S. Franklin patented the coaxial cable in England to be
used as an antenna feeder.
1929 – L. Cohen proposed circuit tuning by wave resonance (resonant
transmission line) and its application to radio reception. H.A. Affel and L.
Espenscheid of AT&T/Bell Labs created the concept of coaxial cable for a
FDMA multi-channel telephony system. K. Okabe made a breakthrough in
cm-waves when operating his slotted-anode magnetron (5.35 GHz). Hans
Erich Hollmann patented the idea of a reflex klystron with his double-grid
retarding-field tube. W.H. Martin proposed the Decibel as a transmission
unit.
1931 – H. diamond and F. W. Dunmore conceived a radio beacon and
receiving system for blind landing of aircraft. H. E. Hollmann built and
operated the first decimeter transmitter and receiver at the Heinrich Hertz
Institute. He called the device the magnetron.
1932 – The word Telecommunication was coined and the International
Telecommunications Union (ITU) was formed. George C. Southworth and
J. F. Hargreaves developed the circular waveguide. Karl Jansky
accidentally discovered radio noise coming from outer space giving birth
to radio astronomy. R. Darbord developed the UHF Antenna with
parabolic reflector.
1933 – Armstrong demonstrated Frequency Modulation (FM) and
proposed FM radio in 1936. C.E. Cleeton and N. H. Williams made a 30
GHZ CW oscillator using a split-anode magnetron.
1934 – The Federal Communications Commission (FTC) was created in
the US. W.L. Everitt obtained the optimum operating conditions for Class
C amplifiers. F. E. Terman demonstrated a transmission line as a resonant
circuit. German physicist Oskar Ernst Heil applied for a patent on
112
technology relating electrical amplifiers and other control arrangements Introduction, Wireless
that was the theoretical invention of capacitive current control in FETs. Transmission and Medium
Access Control
1935 – C. J. Frank of Boonton Radio Corp demonstrated Q-meter at the
fall meeting of IRE – the ratio of reactance to resistance of a coil as its
“Quality Factor” was first suggested about 1926. A French TV transmitter
was installed on top of the Eiffel Tower. Watson-Watt developed and
patented the first practical radar for use in the detection of airplanes in
England. H. E. Hollmann filed a patent for the multi-cavity magnetron
(granted in 1938).
1936 – H. W. Doherty developed a new high efficiency power amplifier
for modulated waves, Doherty amplifier, at Bell Labs. English engineer
Paul Eisler devised the Printed Circuit. N. H. Jack patented the semi-rigid
coaxial cable using thin soft copper tube as the outer conductor. Harold
Wheeler used two flat copper strips side by side to make a low loss
transmission line that could be rolled to save space. H. T. Friis and A. C.
Beck invented the horn reflector antenna with dual polarization.
1937 – Grote Rober constructed the first radio telescope. W. R. Blair
patented the first anti-aircraft fire control radar. Russell H. Varian and his
brother Sigurd Varian along with William Hansen developed the reflex
Klystron. Alex H. Reeves invented pulse-code modulation for digital
encoding of speech signals.
1938 – E. L. Chaffee determined the optimum load for Class B amplifiers.
IRE published standards on transmitters, receivers and antennas. Claude
Elwood Shannon recognized the parallels between Boolean algebra and
the functioning of electrical switching systems. W. R. Hewlett developed
the Wien-bridge (RC) oscillator. P. H Smith at RCA developed the well
known Smith Chart. N. E. Lindenblad of RCA developed a coaxial horn
antenna. John Turton Randall and Albert Boot developed the cavity
magnetron that becomes the central components to radar systems.
1941 – W. C. Godwin developed the direct-coupled push-pull amplifier
with inverse feedback. Siemens & Halske made the Ge diode – R. S. Ohl
made the Si junction diode. Sidney Warner realized a two-way police FM
radio.
1943 – H. J. Finden developed the frequency synthesizer. Austrian
engineer Rudolf Kompfner developed the traveling wave tube. C. K.
Chang developed frequency modulation of RC oscillators. C. F. Edwards
developed microwave mixers. H. T. Friis developed noise figures of radio
receivers.
1944 – Harold Goldberg suggested pulse frequency position modulation.
E. C Quackenbush of Amphenol developed the VHF coaxial connectors.
Paul Neil of Bell Labs developed Type N connectors. Maurice Deloraine,
P. R. Adams and D. H. Ranson applied for patents covering switching by
pulse displacement a principle later defined as time-slot interchange –
Thus, Time-Division Multiplexing (TDMA) was invented. Radio
113
Wireless Sensor Research Lab developed radar countermeasures (jamming) in the 25 MHz
Networks and Mobile to 6 GHz range.
Communication
1946 – S. L. Ackerman and G. Rappaport developed a radio control
systems for guided missiles. E. M. Williams developed the radio
frequency spectrum analyzer.
1947 – G. E. Mueller and W. A. Tyrrel developed the dielectric rod
antenna. John D. Kraus invented the helical antenna. W. Tyrell proposed
hybrid circuits for microwaves, H. E. Kallaman constructed the VSWR
indictor meter.
1948 – W. H. Branttain, J. Bardeen and W. Shockley of Bell Labs built the
junction transistor. E. L. Ginzton and others developed distributed
wideband amplifier using pentodes in parallel. Shannon laid out the
theoretical foundations of digital communications in a paper entitled “A
Mathematical Theory of Communication.” Paine described the BALUN.
1949 – E. J. Barlow published the principle of operation of Doppler Radar.
1950- J. M. Janssen developed the sampling oscilloscope.
1951- Charles Hard Townes published the principle of the MASER
(Microwave Amplification by Stimulated Emission of Radiation). The
Laboratoire Central des Telecommunications in Paris developed the first
model of a time-division multiplex system connecting subscriber line by
electronic gates handling amplitude modulated pulses.
1952 – C. L. Hogan demonstrated a microwave circulator.
1955 – R. H. DuHamel and D. E. IsBelll develop the log periodic antenna.
John R. Pierce proposed using satellites for communications. Sony
marketed the first transistor radio.
1957 – Soviet Union launched Sputnik I that transmitted telemetry signals
for about 5 months. German physicist Herbert Kroemer originated the
concept of the heterostructure bipolar transistor (HBT).
1958 – Robert Noyce (Intel) and Jack Kilby (TI) produced the first Si
integrated circuit (IC).
1962 – G. Robert-Pierre Marie patented the wide band slot antenna. S. R.
Hofstein and F. P. Heiman developed MOS IC.
1963 – W. S. Mortley and J. H. Rowen developed surface acoustic wave
(SAW) devices. John B. Gunn of IBM demonstrated microwave
oscillations in GaAs and InP diodes. The Institute of Electrical and
Electronic Engineers (IEEE) was formed by merging the IRE and AIEE.
1964 – R. L. Johnson, B. C. De Loach and B. G. Cohen developed the
IMPATT diode oscillator. COMSAT and INTELSAT started launching a
series of communications satellites that were the building blocks in the
global network of international communications satellites.
114
1969 – The first digital radio-relay system went into operation in Japan Introduction, Wireless
using 2 GHz operating frequency. ARPANET was launched (precursor to Transmission and Medium
Internet). Access Control
where c ≅ 3·108 m/s (the speed of light in vacuum) and f the frequency.
For traditional wired networks, frequencies of up to several hundred kHz
are used for distances up to some km with twisted pair copper wires, while
frequencies of several hundred MHz are used with coaxial cable (new
coding schemes work with several hundred MHz even with twisted pair
copper wires over distances of some 100 m). Fiber optics are used for
frequency ranges of several hundred THz, but here one typically refers to
the wavelength which is, e.g., 1500 nm, 1350 nm etc. (infra-red).
At several kHz, or the very low frequency (VLF) band, radio transmission
begins. These waves are incredibly long. Submarines use low-frequency
(LF) waves because they can travel through water and track the surface of
the earth. These frequencies are still used by some radio stations, for
instance in Germany between 148.5 kHz and 283.5 kHz. The transmission
of hundreds of radio stations often takes place in the medium frequency
(MF) and high frequency (HF) bands using either amplitude modulation
(AM) between 520 kHz and 1605.5 kHz, short wave (SW) between 5.9
MHz and 26.1 MHz, or frequency modulation (FM) between 87.5 MHz
and 108 MHz.The frequencies setting the boundaries of these bands are
normally established by national law and vary from one nation to another.
Because of ionosphere reflection, short waves are frequently employed for
(amateur) radio transmission throughout the world. Up to 500 kW of
115
Wireless Sensor transmit power is available, which is significantly more than the 1 W of a
Networks and Mobile cell phone.
Communication
The TV stations follow when we go to higher frequencies. The 174-230
MHz and 470-790 MHz very high frequency (VHF) and ultra-high
frequency (UHF) bands are used to transmit traditional analogue TV. This
frequency range is also used for digital audio broadcasting (DAB) (223–
230 MHz and 1452–1472 MHz), as well as for planned or installed digital
TV (470–862 MHz), which reuses parts of the previous analogue TV
channels. In addition, UHF is utilized for analogue mobile phones (450-
465 MHz), digital GSM (890-960 MHz, 1710-1880 MHz), digital cordless
phones (1880-1900 MHz), 3G cellular networks (1900-1980 MHz, 2020-
2025 MHz, 2110-2190 MHz), and many other applications.
Super high frequencies (SHF) are primarily utilized for fixed satellite
services in the C-band (4 and 6 GHz), Ku-band (11 and 14 GHz), or Ka-
band (between 2 and 40 GHz). (19 and 29 GHz). The extremely high
frequency (EHF) band, which is near to infrared, is where certain devices
are planned. To prevent interference, all radio frequencies are regulated;
for example, German law regulates frequencies between 9 kHz and 275
GHz.
Optical transmission, which is utilized for both wireless communications
and fibre optical networks, is the next step into higher frequencies.For
directed links, such as using laser links to connect several buildings,
infrared (IR) transmission is employed. IrDA, the most used IR
technology, connects laptops, PDAs, and other devices using wavelengths
between 850 and 900 nm. Finally, wireless transmission has been possible
for thousands of years using visible light. Even while interference makes
light less reliable, it is still helpful since it has human receivers built in.
6.5 SIGNALS
Data is physically represented by signals. The only way for users of a
communication system to exchange data is through the signaling of
signals. Data, or bits, are converted into signals and back again via Layer 1
of the ISO/OSI basic reference model. Signals are products of space and
time. The data values are represented by signal parameters. Periodic
signals, particularly those using sine waves as carriers, are the most
intriguing sorts of signals for radio transmission. A sine wave's function as
a whole is:
116
Introduction, Wireless
Transmission and Medium
The signal's amplitude (A), frequency (f), and phase shift (φ) are its Access Control
parameters.As a result, At, the amplitude as a component of the function g
may likewise fluctuate with time. The periodicity of the signal is
expressed by the frequency f, where T = 1/f is the period. (In equations ω,
is often substituted for 2f.) Additionally, the frequency f may alter with
time, so ft. The signal's shift in relation to the same signal without a shift is
finally determined by the phase shift. Figure 4 illustrates an illustration of
shifting a function. This compares a sine function with and without a
phase shift φ, with the same amplitude and frequency, respectively.
6.6 ANTENNAS
Antennas transmit and receive electromagnetic radiation from space
through a wire or coaxial cable(or any other appropriate conductor).The
isotropic radiator, a point in space that radiates equally in all directions,
serves as a theoretical reference antenna. All places with equal power are
situated on a sphere with the antenna at its centre. Figure 7, which shows a
118
two-dimensional cross-section of the actual three-dimensional pattern, Introduction, Wireless
shows that the radiation pattern is symmetric in all directions. Transmission and Medium
Access Control
Figure 13
121
Wireless Sensor to differ from background noise. However, the error rate is too
Networks and Mobile high to establish communication.
Communication Interference range: Within a third even larger radius, the sender may
interfere with other transmission by adding to the background
noise. A receiver will not be able to detect the signals, but the
signals may disturb other signals.
Cells arranged around a transmitter are the result of this straightforward
and excellent plan. Real life, on the other hand, does not take place in a
vacuum; radio transmission must deal with obstacles like our atmosphere,
mountains, structures, moving senders and receivers, etc. The three circles
mentioned above will actually be oddly shaped polygons whose shapes
vary with time and frequency.
6.8 MULTIPLEXING
Multiplexing is not only a fundamental mechanism in communication
systems but also in everyday life. Multiplexing describes how several
users can share a medium with minimum or no interference. One example,
is highways with several lanes. Many users (car drivers) use the same
medium (the highways) with hopefully no interference (i.e., accidents).
This is possible due to the provision of several lanes (space division
multiplexing) separating the traffic. In addition, different cars use the same
medium (i.e., the same lane) at different points in time (time division
multiplexing).
Multiple access schemes are used to allow multiple mobile users to share a
finite quantity of radio spectrum at the same time.
122
These strategies can be classed as narrowband or wideband systems Introduction, Wireless
depending on how the available bandwidth is allocated to the users. Transmission and Medium
Access Control
Narrowband systems
Narrow band systems operate with channels that are significantly narrower
than the coherence bandwidth. Narrow band TDMA allows users to share
the same channel but assigns each user a distinct time slot, allowing a
small number of users to be separated in time on a single channel.
Wideband systems
In wideband systems, a single channel's transmission bandwidth is
substantially wider than the channel's coherence bandwidth. As a result,
multipath fading has a minor impact on the received signal in a wideband
channel, and frequency selective fades only occur in a limited portion of
the signal bandwidth.
For each user to access the network, FDMA assigns a different sub-
band of frequency.
When FDMA is not in use, the channel is left idle rather than being
assigned to other users.
Narrowband systems use FDMA, which is less complicated than
TDMA.
To reduce adjacent channel interference, tight filtering is used.
In FDMA, the base station BS and the mobile station MS transmit and
receive data at the same time.
123
Wireless Sensor 6.8.4 Code Division Multiple Access (CDMA)
Networks and Mobile
Communication Multiple access techniques such as code division multiple access employ a
single channel to broadcast data simultaneously from multiple
transmitters. The following are its characteristics:
Using the same channel, all users can communicate at the same time.
SDMA is fully interference-free.
A single satellite can communicate with many satellites using the same
frequency receiver.
The base station in SDMA can monitor a moving user thanks to the
use of directional spot-beam antennas.
Controls the amount of energy radiated by each user in space.
124
a code word that is orthogonal to the codes of other users, and the receiver Introduction, Wireless
must know the transmitter's code word in order to detect the user. Transmission and Medium
Access Control
Another sort of spread spectrum is hybrid, which is made up of
combinational sequences. Another type that is rarely mentioned is time
hopping.
Spread spectrum systems become bandwidth efficient in a multiple user
scenario because numerous users can share the same spread spectrum
bandwidth without interfering with one another.
6.9 MODULATION
Modulation is a process of changing the characteristics of the wave to be
transmitted by superimposing the message signal on the high-frequency
signal. In this process video, voice and other data signals modify high-
frequency signals – also known as the carrier wave. This carrier wave can
be DC or AC or pulse chain depending on the application used. Usually, a
high-frequency sine wave is used as a carrier wave signal.
These modulation techniques are classified into two major types: analog
and digital or pulse modulation.
Different Types of Modulation
The two types of modulation: analog and digital modulation techniques
have already been discussed. In both the techniques, the baseband
information is converted to Radio Frequency signals, but in analog
modulation, these RF communication signals are a continuous range of
values, whereas in digital modulation these are prearranged discrete states.
126
AM Introduction, Wireless
Transmission and Medium
Digital Modulation Access Control
For better quality and efficient communication, the digital modulation
technique is employed. The main advantages of digital modulation over
analog modulation include permissible power, available bandwidth, and
high noise immunity. In digital modulation, a message signal is converted
from analog to digital message and then modulated by using a carrier
wave.
The carrier wave is keyed or switched on and off to create pulses such that
the signal is modulated. Similar to the analog, here the parameters like
amplitude, frequency, and phase variation of the carrier wave decides the
type of digital modulation.
The types of digital modulation are based on the type of signal and
application used such as Amplitude Shift Keying, Frequency Shift Keying,
Phase Shift Keying, Differential Phase Shift Keying, Quadrature Phase
Shift Keying, Minimum Shift Keying, Gaussian Minimum Shift Keying,
Orthogonal Frequency Division Multiplexing, etc., as shown in the figure.
Amplitude shift keying changes the amplitude of the carrier wave based
on the baseband signal or message signal, which is in digital format. It is
used for low-band requirements and is sensitive to noise.
In frequency-shift keying, the frequency of the carrier wave is varied for
each symbol in the digital data. It needs larger bandwidths as shown in the
figure. Similarly, the phase shift keying changes the phase of the carrier
for each symbol and it is less sensitive to noise.
Frequency Modulation
In order to create a frequency modulated wave, the frequency of the radio
wave is varied in accordance with the amplitude of the input signal.
Frequency Modulation
When the audio wave is modulated with that of the radio frequency carrier
signal, then the generated frequency signal will change its frequency level.
127
Wireless Sensor The variation by which the wave moves upward and downward is to be
Networks and Mobile noted. This is termed as deviation and is generally represented as kHz
Communication deviation.
As an instance, when the signal has a deviation of either + or – 3kHz, then
it is represented as ±3kHz. This means that the carrier signal has up and
downward deviation of 3kHz.
Broadcasting stations that need very high-frequency range in the
frequency spectrum (in the range of 88.5 – 108 MHz), they need certainly
a large amount of deviation which is nearly ±75 kHz. This is called wide-
band frequency modulation. The signals in this range hold the ability to
assist the high quality of transmissions, whereas they require higher
bandwidth too. In general, 200kHz is permitted for every WBFM. And for
narrowband FM, a deviation of ±3 kHz is enough.
While implementing an FM wave, it is more beneficial to know the
effectivity range of the modulation. This stands as the parameter in stating
factors such as knowing the type of signal whether wide band or narrow
band FM signal. It also helps in making sure that the whole receivers or
transmitters that are in the system are programmed to adapt to the
standardized range of modulation as this shows an impact on the factors
such as the channel spacing, bandwidth of the receiver, and others.
So, to signify the modulation level, modulation index and deviation ratio
parameters are to be determined.
The different types of frequency modulation include the following.
Narrow band FM
This is termed as the type of frequency modulation where the
modulation index value is too minimal.
When the modulation index value is < 0.3, then there will be an only
carrier and corresponding sidebands having bandwidth as twice the
modulating signal. So, β ≤ 0.3 is called narrow band frequency
modulation.
The maximum range of modulating frequency is of 3 kHz
The maximum frequency deviation value is 75 kHz
Wide band FM
This is termed as the type of frequency modulation where the
modulation index value is large.
When the modulation index value is > 0.3, then there will be more than
two sidebands having bandwidth as twice the modulating signal. When
the modulation index value increases, then the number of sidebands
gets increased. So, β > 0.3 is called narrow band frequency modulation.
128
The maximum range of modulating frequencies is in between 30 Hz – Introduction, Wireless
15 kHz Transmission and Medium
Access Control
The maximum frequency deviation value is 75 kHz
This frequency modulation needs a higher bandwidth range which is
almost 15 times ahead of the narrow band frequency modulation.
The other types of modulation techniques used in the communication
system are:
Binary phase shift keying
Differential phase-shift keying
Differential quadrature phase shift keying
Offset quadrature phase shift keying
Audio FSK
Multi FSK
Dual-tone FSK
Minimum shift keying
Gaussian minimum shift keying
Trellis coded type of modulation
Figure 14
129
Wireless Sensor In this context, the question of why mobile network operators do not
Networks and Mobile employ strong transmitters with large cells like, for example, radio stations
Communication do, instead of installing thousands of base stations across a nation (which
is rather expensive), emerges.Small cell cellular systems provide the
following benefits:
Figure 15
If traffic demand varies, the fixed frequency assignment to cell clusters
and cells is not very effective. It might make sense to "borrow"
frequencies, for example, if one cell has a strong load while the
neighbouring cell has a light burden. More frequencies are dynamically
assigned to cells with more traffic.While the first fixed method is known
as fixed channel allocation (FCA), this one is known as borrowing channel
allocation (BCA). The GSM system uses FCA because it is easier to use,
but rigorous traffic analysis is needed before installation.
DECT has a dynamic channel allocation (DCA) system in place. In this
system, frequencies can be freely assigned to cells, but they can also only
be borrowed. The risk of interference with cells using the same frequency
exists with dynamic frequency assignment to cells. The adjacent cells can
block the "borrowed" frequency.Such intricate frequency planning and
elaborate channel allocation algorithms are not necessary in cellular
systems that use CDM rather than FDM. Users are distinguished in this
case based on the code they employ rather than frequency. Another issue
with cell planning is that cell size is dependent on the level of load. As a
result, CDM cells are frequently referred to as "breathing." A cell can
cover a wider area when under a light load, but as the load increases, it
contracts. If there are more users in a cell, the noise level will increase,
which is the cause of this.more noise levels result in more route loss and
transmission mistakes. Last but not least, mobile stations farther from the
base station disconnect from the cell. (This is like attempting to talk to
someone who is far away at a busy party.) This behaviour is shown in
figure 16 with a user transmitting a high bit rate stream inside a CDM cell.
Two users leave the cell as a result of this additional user, causing the cell
to decrease. In a real-world scenario, an additional user might ask for a
131
Wireless Sensor video broadcast (at a high bit rate), while the rest speak normally (low bit
Networks and Mobile rate).
Communication
Figure 16
6.11 SUMMARY
Antennas are required for the transmission and receiving of
electromagnetic waves, which are the foundation of wireless
communication. Omni-directional antennas are preferred for mobile
devices while directed antennas are frequently used in mobile phone
system base stations. Electromagnetic waves can experience a variety of
side effects when travelling from originator to receiver. The common
effectsinclude shadowing, fading, reflection, diffraction, and scattering.
Multi-path propagation is one of the main issues in wireless
communication as a result of all these phenomena. As a result of
intersymbol interference, or when one symbol is "smeared" into another
symbol as a result of delay spread, multi-path propagation reduces the
channel bandwidth.
Since wireless transmission uses just one "medium," multiplexing
techniques can be used to increase overall capacity. SDM, FDM, TDM,
and CDM are considered the standard schemes. Data must be "translated"
into a signal with a specific carrier frequency in order to achieve FDM.
Consequently, two modulation steps are possible. Analog modulation
pushes the signal's centre frequency up to the radio carrier whereas digital
modulation encrypts data into a baseband signal. Many bits can be
encoded into a single-phase shift using some cutting-edge techniques,
which increases efficiency.
Spread spectrum technology can be used to implement a number of
functionalities. One is (at least some) security because the signal appears
to be noise to someone who doesn't know the spreading code. The code
space is the foundation for spread spectrum special medium access
techniques.Since the signal is dispersed over a wider bandwidth,
narrowband interference only affects a tiny portion of the signal, making a
transmission more resistant to it thanks to spread spectrum.
Finally, we discussed about Cellular systems. SDM is used by cellular
systems to increase the total capacity of mobile phone systems.Although
these systems necessitate meticulous planning (i.e., matching the cell size
132
to the anticipated traffic), they offer one of the fundamental approaches to Introduction, Wireless
effectively using the limited frequency resources. Transmission and Medium
Access Control
6.12 LIST OF REFERENCES
1) Protocols and Architectures for Wireless Sensor Network, Holger
Kerl, Andreas Willig, John Wiley and Sons, 2005
2) Wireless Sensor Networks Technology, Protocols, and
Applications,Kazem Sohraby, Daniel Minoli and TaiebZnati, John
Wiley & Sons, 2007
3) Mobile communications, Jochen Schiller,2nd Edition, Addison wisely,
Pearson Education,2012
4) Fundamentals of Wireless Sensor Networks, Theory and Practice,
Waltenegus Dargie, Christian Poellabauer, Wiley Series on wireless
Communication and Mobile Computing, 2011
5) Networking Wireless Sensors, Bhaskar Krishnamachari, Cambridge
University Press, 2005
133
7
TELECOMMUNICATION,
SATELLITE AND BROADCAST
SYSTEMS: GSM
Unit Structure
7.0 Objectives
7.1 Introduction
7.2 Mobile services
7.3 System architecture
7.4 Radio interface
7.5 Protocols
7.6 Localization and Calling
7.7 Handover
7.8 Security
7.9 DECT: System architecture
7.10 Protocol architecture
7.11 TETRA
7.12 UMTS and IMT- 2000
7.13 Satellite Systems: History, Applications
7.14 Basics: GEO, LEO, MEO
7.15 Summary
7.16 List of References
7.17 Unit End Exercises
7.0 OBJECTIVES
To understand the concept of GSM and how it is utilised for voice
traffic
To understand DECT architecture
To gain basic insights about: GEO, LEO, MEO
134
7.1 INTRODUCTION Telecommunication,
Satellite and Broadcast
Digital cellular networks are the fastest-growing part of the market for Systems: GSM
mobile and wireless devices. They are wireless extensions of standard
PSTN or ISDN networks, allowing for smooth roaming within the same
country or even globally. These systems are mostly utilised for voice
traffic nowadays. However, because data traffic is always increasing, this
chapter discusses many wireless data transfer strategies using cellular
systems.
The following are the global market figures for cellular networks (GSM
Association, 2002). GSM is the most widely used digital system,
accounting for over 70% of the market. The analogue AMPS system still
has 3% of the market, while the Japanese PDC has 5%. (60 million users).
The rest is split between CDMA (12%) and TDMA (10%) systems, as
well as other technologies. Nearly everyone in Europe (about 370 million
people) uses the digital GSM system, with almost no analogue systems
remaining.In the United States and several other countries that have
absorbed US technology, the situation is different (e.g., South Korea,
Canada). With 107 million TDMA, 135 million CDMA, and just 16
million GSM users (North America only), the digital market is divided
into TDMA, CDMA, and GSM systems. While Europe has only one
digital system, the US market is fragmented into numerous. This causes
serious coverage and service availability issues, and is an example of how
market forces failed to deliver better services (compared to the common
standard in Europe).
The figure below depicts the global number of subscribers to various
mobile phone technology (GSM Association, 2002). The illustration mixes
various versions of the same technology (e.g., GSM working on 900,
1,800, and 1,900 MHz). The graph's two upper lines depict the total
number of users and 1998 predictions. It's interesting to note that no one
predicted mobile communication technology's enormous success. The
graph also demonstrates that analogue systems are no longer in use, with
GSM dominating the present market.Second generation systems include
GSM, TDMA, CDMA, and PDC. It's worth noting that mobile phones are
now used by more people than landlines!In March 2002, the graphs of
mobile and fixed users crossed.
1] Bearer services
Different data transmission protocols are specified by GSM, with the
original GSM allowing for non-voice service data speeds of up to 9600
bit/s. Transparent and opaque, synchronous and asynchronous data
transmission is possible with bearer services. Only the physical layer's
(layer 1) capabilities are used by transparent bearer services for data
transmission. If there are no transmission defects, data transmission has a
136
constant delay and throughput. Forward error correction (FEC), which Telecommunication,
incorporates redundancy into the data stream and aids in the reconstruction Satellite and Broadcast
of the original data in the event of transmission faults, is the only method Systems: GSM
for improving transmission quality. Data rates of 2.4, 4.8, or 9.6 kbit/s are
feasible, depending on the FEC.
Error correction and flow control are implemented via protocols at layers
two and three in non-transparent bearer services. These services
incorporate a radio link protocol while utilising transparent bearer
services. (RLP). This protocol includes high-level data link control
(HDLC) mechanisms and unique selective-reject techniques to force the
retransmission of inaccurate data. Although less than 10-7 bit errors were
obtained, throughput and delay may now differ depending on the quality
of the transmission.
2] Tele services
GSM primarily focuses on teleservices that are voice-oriented. These
include message services, basic data connection with terminals that are
familiar from the PSTN or ISDN, and encrypted voice transfer. (e.g., fax).
However, as telephony is the principal service, the fundamental objective
of GSM was to provide high-quality digital voice transmission, at least
providing the normal bandwidth of 3.1 kHz of analogue phone networks.
While ordinary codecs are used to transmit analogue data for use with
conventional computer modems found in, for example, fax machines,
special codecs (coder/decoder) are utilised for voice
communication.Another service offered by GSM is the emergency
number.A useful service for very simple message transfer is the short
message service(SMS), which offers transmission of messages of up to
160 characters.Another non-voice tele service is group 3 fax, which is
available worldwide. In this service, fax data is transmitted as digital data
over the analog telephone network according to the ITU-T standards T.4
and T.30 using modems.
3] Supplementary services
GSM service providers may provide additional services in addition to tele
and bearer services. These services, which can vary from provider to
provider, provide numerous upgrades for the basic telephony service,
much like ISDN networks.User identification, call forwarding, and phone
redirection are examples of typical services. There may be access to
standard ISDN capabilities like multiparty communication and locked user
groups. Companies are particularly interested in closed user groups
because they enable features like a company-specific GSM sub-network
that is only accessible to group members.
138
FDMA etc.) 16 or 64 kbit/s connections make up the Abis interface. Telecommunication,
Depending on the context (buildings, open space, mountains, etc.) as Satellite and Broadcast
well as projected traffic, a GSM cell can measure between 100 m and Systems: GSM
35 km.
7.5 PROTOCOLS
GSM protocol architecture including signalling protocols and interfaces is
depicted in the diagram below. The Um interface is of particular
significance because the other interfaces are between entities in a fixed
network. All radio-specific functions are handled by Layer 1, the physical
layer. This involves creating bursts in one of five possible formats,
multiplexing bursts into a TDMA frame, synchronisation with the BTS,
detection of idle channels, and downlink channel quality measurement.
The physical layer at Um uses GMSK for digital modulation and provides
data encryption and decryption, but only between MS and BSS over the
air interface, rather than end-to-end.
143
Wireless Sensor 7.6 LOCALIZATION AND CALLING
Networks and Mobile
Communication The automatic, worldwide localization of users is a key aspect of the GSM
system. The system always knows where a user is, and the same phone
number can be used anywhere in the world. Even if a user does not use the
mobile station, GSM performs periodic location updates to provide this
service (assuming the MS is still logged into the GSM network and is not
totally switched off). The current location (just the location area, not the
specific geographical location) is always stored in the HLR, and the VLR
in charge of the MS tells the HLR when the location changes.The HLR
transfers all user data to the new VLR as soon as an MS enters the range
of a new VLR (a new location region). Roaming is the process of
switching VLRs while maintaining continuous availability of all services.
Roaming can take place within a single provider's network, between two
providers in the same country (national roaming is frequently not
supported owing to operator rivalry), or between different carriers in other
countries (international roaming). People usually identify the term
roaming with international roaming because it is this form of roaming that
makes GSM so appealing: one device, 190 countries!
Several numbers are required to locate and address an MS:
146
The authentication of the MS and the switch to encrypted connection are Telecommunication,
the following stages required for communication security.TCH is now Satellite and Broadcast
assigned by the system (if this has not been done). This has the advantage Systems: GSM
of requiring an SDCCH only during the initial setup phases. No TCH has
been blocked if the setup fails. Using a TCH from the start, on the other
hand, has a speed advantage.
The actions that follow are dependent on whether you're using MTC or
MOC. If someone calls the MS, it now responds with 'alerting,' indicating
that the MS is ringing, and 'connect,' indicating that the user has clicked
the connect button. If the MS has initiated the call, the identical
procedures occur in reverse. Both parties can share data after the
connection is acknowledged.
The connection is closed by sending a user-initiated disconnect message
(on both sides), then relinquishing the connection and the radio channel.
7.7 HANDOVER
Handover or handoff refers to the procedure of transferring ongoing call or
data connectivity from one Base Station to another in cellular
telecommunications. When a phone goes to a different cell while a call is
in progress, the MSC (Mobile Switching Center) transfers the call to a
new channel associated with the new Base Station.
When a mobile user A moves from one cell to another, the signal strength
of BSC 1 decreases while the signal strength of BSC 2 improves, allowing
the mobile user to continue making calls or accessing data without
interruption.
147
Wireless Sensor aware of it. The quality of the connection is poor. The 'break before make'
Networks and Mobile policy was implemented by Hard Handoff.
Communication
2] Soft handoff
When radio signals are added or removed from the Base Station, at least
one of the links is retained in Soft Handoff. The'make before break'
principle was implemented by Soft Handoff. Hard Handoff is more
expensive than Soft Handoff.
7.8 SECURITY
GSM provides a variety of security services based on information saved in
the AuC and individual SIMs (which is plugged into an arbitrary MS). The
SIM card stores personal and confidential information and is secured with
a PIN to prevent unwanted access.(The secret key Ki, for example, is
saved in the SIM and is used for authentication andencryption
procedures.) GSM's security services are described in detail below:
Access control and authentication: The first step is to verify that the
SIM user is legitimate. To utilise the SIM, the user must enter a secret
PIN.The subscriber authentication is the next stage. A challenge-
response method is used in this step.
4.8.1 Authentication
A subscriber must be authenticated before he or she may utilise any GSM
network service. The SIM, which stores the individual authentication key
Ki, the user identity IMSI, and the authentication algorithm A3, is used for
authentication. The challenge-response approach is used for
authentication: the access control AC generates a random number RAND
as a challenge, and the SIM within the MS responds with SRES (signed
response) (Refer following Figure). For each IMSI, the AuC generates the
basic random values RAND, signed answers SRES, and cypher keys Kc,
then sends this information to the HLR. The present VLR asks the HLR
for the necessary RAND, SRES, and Kc values.
151
Wireless Sensor The local communication system is linked to the outside world via a
Networks and Mobile global network, which provides its services over the D1 interface. Public
Communication switched telephone networks (PSTN), public land mobile networks
(PLMN), such as GSM, or packet switched public data networks are
examples of global networks. (PSPDN). These networks provide a variety
of services, such as data transportation, address translation, and data
routing between local networks.
In the DECT environment, local networks provide local
telecommunication services that can range from straightforward switching
to clever call forwarding, address translation, etc. Such networks include
analogue or digital private branch exchanges (PBXs) or LANs, such as
those that adhere to the IEEE 802.x family of LAN standards.All normal
network tasks must be integrated in the local or global network, where the
databases home data base (HDB) and visitor data base (VDB) are also
located, despite the DECT system's relatively simple core. With features
that are comparable to those in the HLR and VLR in GSM systems, both
databases facilitate mobility. Incoming calls are automatically routed to
the DECT user's current subsystem, and the current VDB notifies the
HDB of any location changes.
The fixed radio termination (FT) and portable radio termination (PT) make
up the DECT core network, which essentially just offers a multiplexing
service. At the fixed network side and mobile network side, respectively,
FT and PT cover layers one through three. Additionally, a device may
support a number of portable applications (PA).
152
7.10.1 Physical layer Telecommunication,
Satellite and Broadcast
The physical layer of every wireless network includes all operations for Systems: GSM
modulation and demodulation, incoming signal detection, sender/receiver
synchronization, and gathering status data for the management plane. The
physical channel structure is generated by this layer with a predetermined,
guaranteed throughput. The physical layer assigns a channel for data
transmission in response to a request from the MAC layer.
153
Wireless Sensor 7.11 TETRA
Networks and Mobile
Communication Another means of transmitting wireless data are truncated radio
systems.These systems employ a wide range of radio carriers, but they
only ever temporarily pair a user with a particular carrier based on
demand. While traditional systems require organisations like taxi services,
transportation providers with fleet management systems, and rescue teams
to each have their own distinct carrier frequency, trunked radio systems
allow these organisations to share a large number of frequencies for
improved frequency reuse using FDM and TDM approaches. Although
they are not accessible to the general public, these radio systems
frequently provide interfaces to the fixed telephone network, including
voice and data services.These networks are not only more straightforward
than the majority of other networks, but also more dependable and
reasonably priced to set up and run since they just need to service the local
users' operating areas, such as a city taxi service.
ETSI standardised the TETRA system (terrestrial trunked radio)9 in 1991
to enable a uniform system across Europe (ETSI, 2002; TETRA MoU,
2002). This system should take the place of regional systems that
commonly connect to an X.25 packet network, such as MODACOM,
MOBITEX, and COGNITO in Europe.TETRA offers two standards: the
Voice+Data (V+D) service (ETSI, 1998l) and the packet data optimized
(PDO) service (ETSI, 1998m). While V+D offers circuit-switched voice
and data transmission, PDO only offers packet data transmission, either
connection-oriented to connect to X.25 or connectionless for the ISO
CLNS (connectionless network service). The latter service can be point-to-
point or point-to-multipoint, the typical delay for a short message (128
byte) being less than 100 ms. V+D connection modes comprise unicast
and broadcast connections, group communication within a certain
protected group, and a direct ad hoc mode without a base station.
However, delays for short messages can be up to 500 ms or higher
depending on the priority.
TETRA also offers bearer services of up to 28.8 kbit/s for unprotected
data transmission and 9.6 kbit/s for protected transmission. Examples for
end-to-end services are call forwarding, call barring, identification, call
hold, call priorities, emergency calls and group joins. The system
architecture of TETRA is very similar to GSM. Via the radio interface
Um, the mobile station (MS) connects to the switching and management
infrastructure (SwMI), which contains the user data bases (HDB, VDB),
the base station, and interfaces to PSTN, ISDN, or PDN. The system itself,
however, is much simpler in real implementation compared to GSM, as
typically no handover is needed. Taxis usually remain within a certain area
which can be covered by one TETRA cell. Several frequencies have been
specified for TETRA which uses FDD (e.g., 380–390 MHz uplink/390–
400 MHz downlink, 410–420 MHz uplink/420–430 MHz downlink). Each
channel has a bandwidth of 25 kHz and can carry 36 kbit/s. Modulation is
DQPSK. While V+D uses up to four TDMA voice or data channels per
carrier, PDO performs statistical multiplexing. For accessing a channel,
slotted Aloha is used.
154
7.12 UMTS AND IMT- 2000 Telecommunication,
Satellite and Broadcast
Figure below depicts a simplified UMTS reference design that applies to Systems: GSM
both UTRA and non-UTRA solutions (3GPP, 2000). The UTRA network
(UTRAN) is a radio network subsystem that manages cell level mobility
(RNS). Radio channel ciphering and deciphering, handover control, radio
resource management, and other services are all performed by the RNS.
The radio interface Uu (which is similar to the Um interface in GSM)
connects the UTRAN to the user equipment (UE). UTRAN interfaces with
the core network(CN) via the Iu interface (which is comparable to the A
interface in GSM). If there is no dedicated connection between the UE and
the UTRAN, the CN contains capabilities for inter-system handover,
gateways to other networks (fixed or wireless), and location management.
156
Nineteen ninety-eight marked the beginning of a new age of satellite data Telecommunication,
communication with the introduction of global satellite systems for small Satellite and Broadcast
mobile phones, such as, e.g., Iridium and Globalstar. There are currently Systems: GSM
almost 200 geostationary satellites in commercial use which shows the
impressive growth of satellite communication over the last 30 years.
However, satellite networks are currently facing heavy competition from
terrestrial networks with nationwide coverage or at least enough coverage
to support most applications and users.
APPLICATIONS
Satellites have historically been applied in the following fields:
157
Wireless Sensor Low earth orbit (LEO): While some time ago LEO satellites were
Networks and Mobile mainly used for espionage, several of the new satellite systems now
Communication rely on this class using altitudes of 500–1,500 km
Highly elliptical orbit (HEO): This class comprises all satellites with
noncircular orbits. Currently, only a few commercial communication
systems using satellites with elliptical orbits are planned. These
systems have their perigee over large cities to improve communication
quality.
7.15 SUMMARY
GSM has been shown as the most successful second generation digital
cellular network for the most part in this chapter. Although GSM was
originally developed for voice communication, the chapter demonstrated
how allows for more data-oriented transmission. This evolution comprises
the move from a circuit-switched network to a packet-switched system
that is more similar to the internet architecture.Other systems presented
include DECT, thedigital standard for cordless phones, and TETRA, a
trunked radio system. DECT can be used for wireless data transmission on
a campus or indoors, but also for wireless local loops (WLL). For special
scenarios, e.g., emergencies, trunked radio systems such as TETRA can be
the best choice. They offer a fast connection setup (even within
communication groups) and can work in an ad hoc network, i.e., without a
base station. This chapter also presented an overview of current and future
third generation systems. UMTS, a proposal of operators and companies
involved in the GSM business, was discussed in more detail.
159