JAWAHARLAL NEHRU GOVERNMENT ENGINEERING
COLLEGE
DEPARTMENT OF ELECTRONICS AND COMMUNICATION
ENGINEERING
WIRELESS AND MOBILE
COMMUNICATION
WIRELESS
SUBMITTED BY:
EC-606
SENSOR
ANCHAL SHARMA (21010104016)
BAGGA (21010104017)
ANSH GULERIA (21010104019)
THAKUR (21010104020)
ANIKET
ANSHIKA
SUBMITTED TO:
ER. NITASHA BISH
COUSRSE ADVISO
NETWORK
OIC, ECE
ARYAN SHARMA (21010104021) ASHIMA DEPARTMENT
RANA (21010104022)
INDEX
SERIAL NO. CONTENT PAGE NO.
1 INTRODUCTION 3
2 ARCHITECTURE 4
3 PROTOCOLS 5-7
4 APPLICATIONS 8
ADVANTAGES &
5 9
DISADVANTAGES
6 REFERENCES 10
INTRODUCTION
A Wireless Sensor Network is one kind of wireless network that includes a large number of circulating, self-directed,
minute, low powered devices named sensor nodes called motes.
These networks certainly cover a huge number of spatially distributed, little, battery-operated, embedded devices that
are networked to caringly collect, process, and transfer data to the operators, and it has controlled the capabilities of
computing & processing.
A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using
sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration,
pressure, motion or pollutants, at different locations
NETWORK ARCHITECTURE
NETWORK ARCHITECTURE
Layered Network Architecture Clustered Network Architecture
The network uses hundreds of sensor nodes as The separately sensor nodes add into groups known as
well as a base station. clusters which depend on the “Leach Protocol” because it
uses clusters.
PROTOCOLS
WSN ROUTING PROTOCOLS
Node Center Protocol Data Centric Routing Source/Destination
Protocol Protocol Routing Protocol
In data centric routing techniques >Protocols are called destination
In node centric protocols the
the prime focus is on the initiated protocols when the path
destination node is specified with
transmission of information setup generation originates from
some numeric identifiers.
specified by certain attributes the destination node. Examples are
rather than collecting data from directed diffusion (DD) & LEACH.
E.g.- Low Energy Adaptive
certain nodes. >In source routing protocol the
Clustering Hierarchy (LEACH).
source node advertises when it has
E.g.- Sensor Protocol for data to share and then the route is
Information via Negotiation generated from the source side to
the destination. Example is SPIN.
Low energy adaptive clustering hierarchy (LEACH) Sensor protocols for information via negotiation
(SPIN)
>LEACH is a routing protocol that organizes the cluster
such that the energy is equally divided in all the sensor >This protocol is defined to use to remove the
nodes in the network. deficiency like flooding that occurs in other
protocols.
>In LEACH protocol several clusters are produced of
sensor nodes and one node defined as cluster head >Three messages namely ADV, REQ and DATA are
and act as routing node for all the other nodes in the used in SPIN. The node broadcast an ADV packet to
cluster. all the other nodes .
>LEACH protocol apply randomization and cluster >ADV is the packet in which the data sent.
head is selected from the group of nodes so this
selection of cluster head from several nodes on >REQ is used for permission to transmit data
temporary basis make this protocol more long lasting
as battery of a single node is not burdened for long.
CATEGORIES OF ROUTINING PROTOCOLS
Network Organization Route Discovery Protocol Operations
Flat Based Reactive Negotiation Based
Hierarchical Proactive Multipath Based
Based
Query Based
Hybrid
Location QoS Based
Based
Coherent Based
7
Water Quality Transportation Forest Fire
Monitoring and logistics Detection
Environmental
Smart
monitoring
Buildings
Smart Grids Precision
and Energy Applications of agriculture and
Control
Systems
WSN animal
tracking
Health Landslide
Care Monitoring
Industrial Urban Terrain
Entertainment Tracking
Applications
ADVANTAGES DISADVANTAGES
• Limited Range:
• Real-time Monitoring:
Wireless signals have limited coverage compared to wired
WSNs offer instant monitoring for swift responses. networks.
• Cost-effective Deployment: • Interference and Reliability:
Lower installation and maintenance costs. Susceptible to interference and reliability issues.
• Scalability: • Security Risks:
Easily expandable without major infrastructure changes. Vulnerable to data breaches and unauthorized access.
• Flexibility and Mobility: • Power Constraints:
Allows for dynamic monitoring and easy repositioning. Battery-powered sensors require frequent recharging.
• Energy Efficiency: • Complex Management:
Maximizes battery life through energy management techniques. Managing distributed sensors can be intricate and demanding.
REFERENCES:
1. T.S. Rappaport, Wireless Communication Principles, Pearson.
2. A.F. Molisch, Wireless Communications, John Wiley Inc
3. https://www.intechopen.com/chapters/56541
4. https://www.elprocus.com/architecture-of-wireless-sensor-network-and-
applications/
5. https://www.researchgate.net/figure/Low-energy-adaptive-clustering-
hierarchy-LEACH-Protocol-SPIN-Sensor-Protocols-for_fig3_329613357
THANK YOU
6