Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Abstract of wireless sensor network
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Abstract of wireless sensor network
Wireless sensor networks has a wide range of applications like environmental monitoring, target tracking, battlefield surveillance. It consists of large number of distributed nodes that organize themselves into multihop wireless sensor network. A typical wireless sensor node consists of three main components: (i) a sensing subsystem including one or more sensors (with associated analog-to-digital converters) for data acquisition; (ii) a processing subsystem including a microcontroller and memory for local data processing; (iii) a radio subsystem for wireless data communication. Typically, these nodes coordinate to perform a common task [1].
The medium access control (MAC) layer has been proposed in wireless sensor networks mainly to reduce energy consumption of sensor nodes. Medium access control (MAC) is an important technique that enables the successful operation of the network. One fundamental task of the MAC protocol is to avoid collisions from interfering nodes [1]. The major sources of the energy waste are collision, overhearing and control packet overhead. The Collision defined as when a transmitted packet is corrupted, it has to be discarded, and follow on re-transmission increase the energy consumption. Collision increases the latency as well. The Overhearing defined as a node picks up packets that are destined to other nodes. The Control packet overhead defined as RTS and CTS request consume energy too. The major source of energy consumption is idle listening. If nothing is sensed, nodes are in the idle mode for most of the time. Idle listening consumes approximately same power as in transmitting and receiving mode [8].
The problems occur by idle listening can be solved by the efficient technique called duty cycle. Dut...
... middle of paper ...
...-MAC each sensor node is synchronized so that each sender can transmit a packet to an intended receiver during their synchronized listening period. These protocols can provide low energy consumption.
In static duty-cycle scheduling all the sensor nodes wakes up with a static duty-cycle ( ). Dynamic duty-cycle scheduling (DS) used to solve the problems occurred in SS. The DSR scheme allows sensor nodes to calculate their duty-cycle according to the current amount of residual energy. In energy harvesting WSNs, the residual energy of nodes can increase over time depending on their harvesting opportunity. Each sensor nodes estimates the prospective increase in residual energy with time so that it can reduce duty-cycle more aggressively (DSP). In DEES when a node needs to transmit a packet only the neighboring nodes gets synchronized until node complete its transmission.
As the Fig 1 showing, the node which generates the packet is the source node. There are many sensor nodes in a 3-D interest area. The packet is delivered among these sensor nodes and finally try to reach one sink node. Sink nodes are deployed on the water surface. In the figure, it is a multiple-sink topology. Multiple sinks equipped both radio-frequency and acoustic modems are fixed on the water surface.The packet is assumed delivered successfully if it reaches any one of the sink nodes because sink nodes use radio-frequency channel to communicate with each other which is several orders of magnitudes faster than acoustic channel.
Ross, J. P., & Meier, A. (2001). Whole-house measurements of standby power consumption. In Energy Efficiency in Household Appliances and Lighting (pp. 278-285). Springer Berlin Heidelberg.
J. A. Gutierrez ,M. Naeve , E. Callaway , M. Bourgeois ,V. Mitter and B. Heile "IEEE 802.15.4:adeveloping standard for low-power low-cost wireless personal area networks", IEEE Network, vol. 15, no. 5, pp.12 -19 2001
Also, it requires a fast and secure communication to monitor real-time connection status to act as Energy Manager. [SANCHEZ]
The rapid progress of embedded MEMS (micro-sensing technologies) and wireless communication has made wireless sensor networks possible. Such an environment may have many wireless nodes which are inexpensive; each node is capable of collecting, storing and processing environmental data, and communicating with neighboring nodes. These sensors are connected with wires in the past but tod...
An Open Shortest Path First (OSPF) protocol enhancement to save energy using Energy Aware Routing (EAR) strategy
Each node (individual computer) in a LAN has its own CPU with which it executes programs, but it also is able to access data and devices anywhere on the LAN. This means that many users can share expensive devices, such as laser printers, as well as data. Users can also use the LAN to communicate with each other, by sending e-mail or engaging in chat sessions. LANS are capable of transmitting data at very fast rates, much faster than data can be transmitted...
Sensor-based networks basically are characterized by their continuous mode of operation and power sources, which increases the fault rates in sensors, knowing that maintenance or replacement of sensors is considered expensive.
It handles communication between body sensors and the communication between the sensors with the personal server (PS). The design of this layer is critical as the sensors are battery-operated and have low bit rates thus it’s important that there is an energy-efficient MAC protocol with QoS provisioning.
The perception layer includes a group of Internet-enabled devices that are able to perceive, detect objects, gather information, and exchange information with other devices through the Internet communication networks. Radio Frequency Identification Devices (RFID), cameras, sensors, Global Positioning Systems (GPS) are some examples of perception layer devices. Forwarding data from the perception layer to the application layer under the constraints of devices’ capabilities, network limitation and the applications’ constraints is the task of the network layer. IOT systems use a combination of short-range networks communication
Networks: The author mentions three major obstacles. First is wireless network capacity. The ability of wireless networks to transfer higher amounts of data at greater speeds without being prone to noise and multipath interference is a real test [2]. Second is the range of wireless networks. The range is limited and does not span across large areas limiting the use of wireless technology. Third is the integration between wired and wireless technologies. The integration among the two technologies is tough, challenging and needs improvement. Networking is an important challenge to pervasive
De Poorter, E., Troubleyn, E., Moerman, I., & Demeester, P. (2011). IDRA: A flexible system architecture for next generation wireless sensor networks. Wireless Networks, 17(6), 1423-1440. doi:http://dx.doi.org/10.1007/s11276-011-0356-5
With the wireless transmission standard 802.11 originating from IEEE, which is often just called Wi-Fi access to the internet has simplified drastically. The key points to its success are the continuous improvement and adaptions to changing demands but also the ease of use accomplished by the interoperability of different devices and also the backward compatibility of each new extension.
main advantage of FM broadcasting is of it is static free. But the drawback to
Wireless technology has become the wave of the future. From cellular phones to wireless point of sale devices, wireless networks and technology is all around us. In order to jump on the wireless train, one must first understand the different standards. To properly and safely utilize wireless technology the user also must understand the various types of wireless security. Once grasping these technologies and standards, anyone can implement a wireless network in their home.