SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 3 (Sep-Oct. 2012), PP 09-14
www.iosrjournals.org
www.iosrjournals.org 9 | Page
Wireless Micro-Sensor Network Models
Ms. Swapnali S. Maske1
, Mrs. Tejaswini A. Pawar2
1
Department of Information Technology, BVCOE, Shivaji University, Kolhapur, India.
2
Department of Computer Science and Engineering, BVCOE, Shivaji University, Kolhapur, India.
Abstract: Wireless sensor network is important in sensing, Collecting and disseminating information about
environmental Phenomenon. This paper contain emerging field to classify wireless micro sensor network
according to different communication functions, data delivery models and network dynamics. This taxonomy
will aid in defining appropriate communication infra structure for diff. sensor network application subspaces. It
allows network designer to choose the Protocol architecture. According to their application this taxonomy will
enable new sensor network models to define for use in further research in this area. The overall communication
behavior in a wireless micro sensor Network is application driven. It is useful to decouple the application
communication used for information dissemination from the infrastructure communication used to configure
and optimize the Network. This separation will aid network designers in selecting the appropriate sensor
network architecture that will best match the characteristics of the communication traffic of a given application.
This will allow the network protocol to achieve the application-specific goals of energy-efficiency, low latency,
and high accuracy in the sensing application. We also believe that a sensor-initiated proactive path recovery
approach with local patching will be beneficial in efficient information dissemination in wireless micro-sensor
networks. The taxonomy presented will be helpful in designing and evaluating future network protocols for
wireless micro-sensor networks. Often, it is possible to implement a sensor network for a specific phenomenon
in a number of different ways. Consider the problem of monitoring a tornado. One option would be to fly
airplanes to sense the tornado (mobile phenomenon; mobile sensors; continuous data delivery). Another would
be to have a sensor grid statically placed on the ground and report data as the tornado passes through (mobile
phenomenon; static sensors; continuous data delivery). Yet another would be to release lightweight sensors into
the tornado (static phenomenon; mobile sensors; Continuous data delivery).
I. Introduction
Development in hardware and wireless network technology introduce a new area were small wireless
devices will provide access to information any time, anywhere as well as actively participate in creating smart
environment. Sensor networks hold the promise of revolutionizing sensing a wide range of application domains.
This is because of their reliability, accuracy, flexibility, cast -effectiveness and case of development. Sensor are
rapidly deployed in remote inhospitable area for a surveillance application sensors are used to analyze the
motion of a tornado; Sensors are used in forest for fire detection; sensors are attached to tool cabs in a large
metropolitan area to study the traffic conditions and plan routes effectively. There is wide range of applications
for sensor network with differing requirements. In report the classification wireless micro-sensor networks from
a communication protocol perspective, I look at characteristic and goals of typical micro-sensor network as well
as different types of communication that required achieving their goals.
The remaining report is organized as Chapter 2 contains Performance Metrics of Sensor Network.
Chapter 3 contains Architecture of Sensor Network. Chapter 4 contains The Data Delivery Models. Chapter 5
contains the Network Dynamic Models for Sensor Network. Chapter 6 contains Some Network Protocol,
Following are the terminologies used in the report.
1.1 Sensor
The device that implements the physical sensing of environmental phenomena and reporting of
measurements (through wireless communication). Typically it consists of five Components-sensing hardware,
memory battery, embedded processor, and trance-receiver [1]. The basic sensor network is shown in Figure 1.1.
Wireless Micro-Sensor Network Models
www.iosrjournals.org 10 | Page
Fig. 1.1 The basic sensor network
1.2 Observer
The end user interested in obtaining information disseminated by the sensor network about the
phenomena.
The observer may indicate interests (or queries) to the network and receive response to these queries [2].
1.3 Phenomenon
The entity of interest to the observer that is being served and optionally analyzed/filtered the sensor
networks. There may be multiple phenomena under observation concurrently in the same network.
While monitoring the phenomena some latency and accuracy must be restricted. In a typical sensor network
individuals sensor serve the local values and disseminate information to other sensors and to the observer.
Sensors network shares many challenges of traditional wireless network. This include limited energy available
to each node band width-limited, error-prone channel communication in sensor network is end-to-end. The
function of network is to repeat information about phenomenon to observer. The observer not necessarily aware
of the sensor networks infrastructure and individual sensor as end point communication.
II. Performance Metrics
Following are the metrics to evaluate sensor network protocols.
2.1 Energy Efficient
As sensor nodes are battery operated, protocols must be energy efficient or maximize system lifetime
2.2 Scalability
It is also a critical footer for large-scale network it is likely that locating interactions through hierarchy and
aggregation will be critical for ensuring scalability.
2.3 System Lifetime
System lifetime is the time until half of nodes die or by application directed metrics such as when the network
stop providing the application with desired information about phenomena.
2.4 Latency
The observer is interested in knowing about the phenomena within a given delay. The precise semantics of
latency are application dependent.
2.5 Accuracy
Primary object of observer is to obtain the accurate information, where accuracy is determined by given
application. The given infrastructure should be adaptive that the application obtain desired accuracy and latency
with minimum energy used.
2.6 Fault tolerance
Due to surrounding physical conditions the sensor may fail, or also fails because of their energy ran out. This is
difficult to replace the existing sensor, so the network is fault tolerance so that actual network condition is
transparent to given application.
Wireless Micro-Sensor Network Models
www.iosrjournals.org 11 | Page
II. Sensor Network Architecture
A Sensor network is a tool for measuring and relaying information about the phenomena to the
observer within the desired performance bond and deployment cost.
The organization of the network as shown in following Figure 3.1
Fig. 3.1 Sensor network architecture
3.1 Infrastructure
The infrastructure consist of the sensor and their deployment status [2], more precisely it consist of
characteristics of sensor e.g. sensing accuracy, memory size, battery life, transmission ranges and deployment
strategy (e.g. sensor density, sensor location and mobility.)
3.2 Network Protocols
The network protocol is responsible creating paths and accomplishing communication between the sensors and
observation.
3.3 Application / Observer
The observer interest queries about the phenomenon as approximated by distributed data that the sensor is
capable of serving.
These queries could be static or dynamic. The translation of data could be done by the application
software at the observer and /or the sensor nodes or directed by human observer.
The network protocol in a sensor network is responsible for all communication both among sensors as well as
between the sensors and observer.
In order to determine how the network protocol behaves for diff. scenario’s, it is important to classify their
feature. In next session different types of communication required in sensor network.
3.4 Communication models
The communication within a sensor network can be classified in to two-category application and
infrastructure [1].
Application communication relates to the transfer of sensor data with the goal of informing the observer
about the phenomena within application communication, there are two modes co-operative and non co-
operative.
Non co-operative sensors do not cooperate at the application revel for information transfer.
The extreme case will be when no sensor communication with its neighbors. All sensors were independently.
Co-operative sensors might be required to communicate with its neighbor s either periodically or after the
occurrence of specific event.
Infrastructure communication refers to the communication needed to configure, maintain and optimize
operation. The infrastructure communication is needed to keep the network functional ensure robust operation
in dynamic environment as well as optimize overall performance.
A sensor network requires both the application and infrastructure communication. In static sensor networks an
initial phase of infrastructure communion is needed to set up the networks furthermore, if the sensors are
mobile, additional communications needed for path discovery/ reconfiguration.
III. Data Delievery Models
Sensor networks can be classified in terms of data delivery models required by applications (observer)
interest as
1.Continues
2. Event driven
3.Observer initiated
4. Hybrid
4.1 Continues
Wireless Micro-Sensor Network Models
www.iosrjournals.org 12 | Page
In the Continues models the sensor communicates their data continuously at a pre-specified rate [1] [2].
Clustering is the most efficient for static networks where data is continuously transmitted.
4.2 Event Driven
In the event driven data models the sensors reporting information only if an event of interest occurs,
here observer is interested in the occurrence of a specific phenomenon or a set of phenomenon [1] [2].
4.3 Observer Initiated
In the observer initiated (or request reply) model the sensors only report their results in response to an explicit
request from the observer (either directly, or indirectly through other sensors)
4.4 Hybrid
Hybrid models are one where the above three approaches can co exists in the network.
In this way we have only classify the data delivery from the application perspective. For any of the above
models the communication approaches can be classified as 1. Flooding (Broadcast based) 2. Unicast 3.
Multicast. In flooding approach sensor broadcast information in neighboring node and it rebroadcast this data
until reaches to the observer.
IV. Network Dynamics Models
A path is formed between phenomena and the observer by a sensor network the sensor network
protocol creates and maintains this path (or multiple paths) under dynamic condition while meeting the
application requirements of low energy, low latency, high accuracy and fault tolerance.
There are several approaches to construct and maintain path between the observer and the
phenomenon. They are classified as static sensor network and mobile / dynamic sensor network, the important
point is mobility because it is most common source of dynamic conditions other source includes sensors failure
and change in observer interest.
5.1 Static Sensor Network
There is no motion among communication sensors, the observer and the phenomenon. An example is a
group of sensors spread for temperature sensing.
In this type of network, sensor nodes requires an initial one time setup infrastructure communication to create
the path between the observer and the sensors with the remaining traffic exclusively application
communication.
5.2 Dynamic Sensors Network
In dynamic sensor network, either the sensors themselves, the observer or the phenomenon are mobile,
whenever a phenomenon associated with sensors moves, the path between observer and phenomenon get failed,
in such situation either observer or the sensor must rebuild a new path. There are two types of rebuilding of new
paths between observer and sensors.
The first approaches is observer-initiated approach, in this case during initial setup the observer can
build multiple paths between itself and the phenomenon. The observer can use the most beneficial path, if path
fails another path can be used, if all paths fail, the observer must rebuild new paths. This observer initiated
approach is a reactive approach where path recovery action is only taken after observe a broken path [1] [2].
Another approach is sensor-initiated approach. In sensor initiated path recovery procedure, path recovery is
initiated by a sensor that is currently a part of logical path between the observer & the phenomenon. It is
planning to move out of range. The sensors perform some local patching by broadcasting a participation request
to neighboring sensor for given logical flow to build a new path. If any sensor sends participation reply message
then the new path is build, if none of sensor reply then sensor can default to sending a path invalidation request
to the observation so that the observer can start building the path.
Dynamic sensor networks can be further classified by considering the motion of the components. This
motion is important. Each of following requires different infrastructure; data delivery models and protocols
5.2.1 Mobile observer
In this case the observer is mobile with respect to the sensors and phenomena. An example of this
paradigm is sensors deployed in an inhospitable area for environment monitoring. For example, a plane might
fly over a field periodically to collect information from a sensor network. Thus the observer, in the plane, is
moving relative to the sensors and phenomena on the ground.
Wireless Micro-Sensor Network Models
www.iosrjournals.org 13 | Page
Fig. 5.2.1 Mobile observer
5.2.2 Mobile sensors
In this case, the sensors are moving with respect to each other and the observer. For example, consider
traffic monitoring implemented by attaching sensors to taxis. As the taxis move, the attached sensors
continuously communicate with each other about their own observations of the traffic conditions. If the sensors
are co-operative, the communication paradigm imposes additional constraints such as detecting the link layer
addresses of the neighbors and constructing localization and in formation dissemination structures. We know
that the overhead of maintaining a globally unique sensor ID in a hierarchical fashion like an IP address is
expensive and not needed. Instead, these sensors should communicate only with their neighbors with the link
layer MAC address. In such networks, the above-mentioned proactive algorithm with local patching for
repairing a path can be used so that the information about the phenomenon is always available to the observer
regardless of the Mobility of the individual sensors.
Fig. 5.2.2 Mobile sensor
5.2.3 Mobile Phenomena
In this case, the phenomenon itself is moving. A typical example of this paradigm is sensors deployed
for animal detection. In this case the infrastructure level communication should be event-driven. Depending on
the density of the phenomena, it will be inefficient if all the sensor nodes are active all the time. Only the
sensors in the vicinity of the mobile phenomenon need to be active. The number of active sensors in the vicinity
of the phenomenon can be determined by application specific goals such as accuracy, latency, and energy
efficiency.
Fig 5.2.3 Mobile phenomenon
V. Overview Of Some Network Protocols
In this section we consider several existing protocols for sensor networks and analyze them in the
context of our taxonomy.
Wireless Micro-Sensor Network Models
www.iosrjournals.org 14 | Page
6.1 Ad Hoc Routing Protocol
Ad hoc routing protocols may be used as the network protocol for sensor networks [2]. However, such
protocols will generally not be good candidates for sensor networks because of the following reasons:
(i) Sensors have low battery power and low available memory;
(ii) The routing table size scales with the network size;
(iii) These networks are designed for end-to-end communication and react inappropriately to mobility;
(iv) Their addressing requirements may be inappropriate for sensor networks;
(v) Ad hoc routing protocols do not support cooperative dissemination;
As ad hoc routing protocols do not inherently support data aggregation or fusion, they will not perform well in
sensor network applications.
6.2 LEACH
LE
ACH is an energy efficient protocol for sensor networks designed for sensor networks with continuous data
delivery mechanism and no mobility [2]. LEACH uses a clustering architecture where member nodes send their
data to the local cluster-head. Cluster-heads aggregate the data from each sensor and then send this information
to the observer node. LEACH uses rotation of the cluster head in order to evenly distribute the energy load.
Once clusters are formed, cluster members use TDMA to communicate with the cluster-head. Thus LEACH is
suitable for networks where every node has data to send at regular intervals. However, it needs to be extended
for event driven models as well as for mobile sensors.
6.3 Direct Diffusion
Directed Diffusion (DD) is a data-centric protocol, where nodes are not addressed by their addresses
but by the data they sense [2]. Attribute-value pairs name data. In directed diffusion observer nodes express the
interest in term of a query, which diffuses through the network using local interactions. Once a sensor node that
satisfies the query (source node) is reached, that node starts transmitting data to the sink node, again using local
interactions. The absence of a notion of a global id (e.g., IP address) makes directed diffusion efficient for
networks with mobility as well. Directed diffusion is applicable for Event-driven and query-driven networks as
defined in our taxonomy.
VI. Conclusion
The overall communication behavior in a wireless micro sensor Network is application driven. It is
useful to decouple the application communication used for information dissemination from the infrastructure
communication used to configure and optimize the Network. This separation will aid network designers in
selecting the appropriate sensor network architecture that will best match the characteristics of the
communication traffic of a given application.
This will allow the network protocol to achieve the application-specific goals of energy-efficiency, low latency,
and high accuracy in the sensing application. We also believe that a sensor-initiated proactive path recovery
approach with local patching will be beneficial in efficient information dissemination in wireless micro-sensor
networks.
The taxonomy presented will be helpful in designing and evaluating future network protocols for
wireless micro-sensor networks.
Often, it is possible to implement a sensor network for a specific phenomenon in a number of different
ways. Consider the problem of monitoring a tornado. One option would be to fly airplanes to sense the tornado
(mobile phenomenon; mobile sensors; continuous data delivery). Another would be to have a sensor grid
statically placed on the ground and report data as the tornado passes through (mobile phenomenon; static
sensors; continuous data delivery). Yet another would be to release lightweight sensors into the tornado (static
phenomenon; mobile sensors; Continuous data delivery).
The accuracy is a function of the sensing technology of the sensors and their distance from the
phenomenon. However, since the performance is measured at the observer end, it is also a function of the
performance of the communication model. We hope that this taxonomy will assist in developing relevant
simulation models to enable empirical study of the performance of the different sensor network organizations
and assist in making design and deployment decisions.
References
[1] Sameer Tilak, Nael B, Abu-Ghazaleh and Wendi Heizelmn,”A Taxonomy of Wireless Micro Sensor Network Models”,
[2] Sameer Tilak, Nael B, Abu-Ghazaleh and Wendi Heizelmn ,” The Updatesd A Taxonomy of Wireless Micro Sensor Network
Models”,ACM And Mobile Computing Review, April 2002,Volume 1,Number 2.

Mais conteúdo relacionado

Mais procurados

WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKTejas Wasule
 
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networkscscpconf
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
 
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksMulti-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
 
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKIAEME Publication
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNIAEME Publication
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbalIAESIJEECS
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
 
Wireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and ComparisonsWireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and ComparisonsCSCJournals
 
Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueIDES Editor
 
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...chokrio
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
 

Mais procurados (20)

WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
L010527175
L010527175L010527175
L010527175
 
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
 
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksMulti-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
 
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORK
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
Wireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and ComparisonsWireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and Comparisons
 
Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias Technique
 
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
 
A0320105
A0320105A0320105
A0320105
 
Ijnsa050204
Ijnsa050204Ijnsa050204
Ijnsa050204
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
 

Destaque

Development Of GUI Based Programme For Thermal Characterisation And Life Expe...
Development Of GUI Based Programme For Thermal Characterisation And Life Expe...Development Of GUI Based Programme For Thermal Characterisation And Life Expe...
Development Of GUI Based Programme For Thermal Characterisation And Life Expe...IOSR Journals
 
Chaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption SchemeChaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption SchemeIOSR Journals
 
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...IOSR Journals
 
Behavioral Analysis of Second Order Sigma-Delta Modulator for Low frequency A...
Behavioral Analysis of Second Order Sigma-Delta Modulator for Low frequency A...Behavioral Analysis of Second Order Sigma-Delta Modulator for Low frequency A...
Behavioral Analysis of Second Order Sigma-Delta Modulator for Low frequency A...IOSR Journals
 
Detection of Cancer in Pap smear Cytological Images Using Bag of Texture Feat...
Detection of Cancer in Pap smear Cytological Images Using Bag of Texture Feat...Detection of Cancer in Pap smear Cytological Images Using Bag of Texture Feat...
Detection of Cancer in Pap smear Cytological Images Using Bag of Texture Feat...IOSR Journals
 
An Approach to Improve Brain Disorder Using Machine Learning Techniques
An Approach to Improve Brain Disorder Using Machine Learning TechniquesAn Approach to Improve Brain Disorder Using Machine Learning Techniques
An Approach to Improve Brain Disorder Using Machine Learning TechniquesIOSR Journals
 
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...IOSR Journals
 
Tracking your emails with mailtracking.com
Tracking your emails with mailtracking.comTracking your emails with mailtracking.com
Tracking your emails with mailtracking.combelieve52
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesIOSR Journals
 
An Application Jeevan – Kushalaiah Method to Find Lagrangian Multiplier in Ec...
An Application Jeevan – Kushalaiah Method to Find Lagrangian Multiplier in Ec...An Application Jeevan – Kushalaiah Method to Find Lagrangian Multiplier in Ec...
An Application Jeevan – Kushalaiah Method to Find Lagrangian Multiplier in Ec...IOSR Journals
 
Context Based Web Indexing For Semantic Web
Context Based Web Indexing For Semantic WebContext Based Web Indexing For Semantic Web
Context Based Web Indexing For Semantic WebIOSR Journals
 
Transient Power Flow in Micro grids with Signal Stability Energy
Transient Power Flow in Micro grids with Signal Stability EnergyTransient Power Flow in Micro grids with Signal Stability Energy
Transient Power Flow in Micro grids with Signal Stability EnergyIOSR Journals
 
A Distinctive Scheme for Extraction of Symmetrical Components along with Harm...
A Distinctive Scheme for Extraction of Symmetrical Components along with Harm...A Distinctive Scheme for Extraction of Symmetrical Components along with Harm...
A Distinctive Scheme for Extraction of Symmetrical Components along with Harm...IOSR Journals
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...IOSR Journals
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...IOSR Journals
 
Characterization of Arsenic contaminated Rice (Oryza Sativa L.) through RAPD ...
Characterization of Arsenic contaminated Rice (Oryza Sativa L.) through RAPD ...Characterization of Arsenic contaminated Rice (Oryza Sativa L.) through RAPD ...
Characterization of Arsenic contaminated Rice (Oryza Sativa L.) through RAPD ...IOSR Journals
 
Data Classification Algorithm Using k-Nearest Neighbour Method Applied to ECG...
Data Classification Algorithm Using k-Nearest Neighbour Method Applied to ECG...Data Classification Algorithm Using k-Nearest Neighbour Method Applied to ECG...
Data Classification Algorithm Using k-Nearest Neighbour Method Applied to ECG...IOSR Journals
 

Destaque (20)

Development Of GUI Based Programme For Thermal Characterisation And Life Expe...
Development Of GUI Based Programme For Thermal Characterisation And Life Expe...Development Of GUI Based Programme For Thermal Characterisation And Life Expe...
Development Of GUI Based Programme For Thermal Characterisation And Life Expe...
 
Custom keys
Custom keysCustom keys
Custom keys
 
Chaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption SchemeChaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption Scheme
 
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
 
Behavioral Analysis of Second Order Sigma-Delta Modulator for Low frequency A...
Behavioral Analysis of Second Order Sigma-Delta Modulator for Low frequency A...Behavioral Analysis of Second Order Sigma-Delta Modulator for Low frequency A...
Behavioral Analysis of Second Order Sigma-Delta Modulator for Low frequency A...
 
Detection of Cancer in Pap smear Cytological Images Using Bag of Texture Feat...
Detection of Cancer in Pap smear Cytological Images Using Bag of Texture Feat...Detection of Cancer in Pap smear Cytological Images Using Bag of Texture Feat...
Detection of Cancer in Pap smear Cytological Images Using Bag of Texture Feat...
 
An Approach to Improve Brain Disorder Using Machine Learning Techniques
An Approach to Improve Brain Disorder Using Machine Learning TechniquesAn Approach to Improve Brain Disorder Using Machine Learning Techniques
An Approach to Improve Brain Disorder Using Machine Learning Techniques
 
B0451217
B0451217B0451217
B0451217
 
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...
Network Lifespan Maximization For Wireless Sensor Networks Using Nature-Inspi...
 
Tracking your emails with mailtracking.com
Tracking your emails with mailtracking.comTracking your emails with mailtracking.com
Tracking your emails with mailtracking.com
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
 
An Application Jeevan – Kushalaiah Method to Find Lagrangian Multiplier in Ec...
An Application Jeevan – Kushalaiah Method to Find Lagrangian Multiplier in Ec...An Application Jeevan – Kushalaiah Method to Find Lagrangian Multiplier in Ec...
An Application Jeevan – Kushalaiah Method to Find Lagrangian Multiplier in Ec...
 
Context Based Web Indexing For Semantic Web
Context Based Web Indexing For Semantic WebContext Based Web Indexing For Semantic Web
Context Based Web Indexing For Semantic Web
 
Transient Power Flow in Micro grids with Signal Stability Energy
Transient Power Flow in Micro grids with Signal Stability EnergyTransient Power Flow in Micro grids with Signal Stability Energy
Transient Power Flow in Micro grids with Signal Stability Energy
 
A Distinctive Scheme for Extraction of Symmetrical Components along with Harm...
A Distinctive Scheme for Extraction of Symmetrical Components along with Harm...A Distinctive Scheme for Extraction of Symmetrical Components along with Harm...
A Distinctive Scheme for Extraction of Symmetrical Components along with Harm...
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
 
Characterization of Arsenic contaminated Rice (Oryza Sativa L.) through RAPD ...
Characterization of Arsenic contaminated Rice (Oryza Sativa L.) through RAPD ...Characterization of Arsenic contaminated Rice (Oryza Sativa L.) through RAPD ...
Characterization of Arsenic contaminated Rice (Oryza Sativa L.) through RAPD ...
 
Data Classification Algorithm Using k-Nearest Neighbour Method Applied to ECG...
Data Classification Algorithm Using k-Nearest Neighbour Method Applied to ECG...Data Classification Algorithm Using k-Nearest Neighbour Method Applied to ECG...
Data Classification Algorithm Using k-Nearest Neighbour Method Applied to ECG...
 
C0941533
C0941533C0941533
C0941533
 

Semelhante a Wireless Micro-Sensor Network Models

EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
 
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed SurveyComparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Surveytheijes
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Applicationijsrd.com
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 
IJSRED-V1I2P12
IJSRED-V1I2P12IJSRED-V1I2P12
IJSRED-V1I2P12IJSRED
 
Mobility_Research_paper
Mobility_Research_paperMobility_Research_paper
Mobility_Research_paperPiyush Jalan
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkCassie Romero
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyeSAT Publishing House
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a surveyeSAT Journals
 
Wireless Sensor Networks Are Defined As The Distribution...
Wireless Sensor Networks Are Defined As The Distribution...Wireless Sensor Networks Are Defined As The Distribution...
Wireless Sensor Networks Are Defined As The Distribution...Amy Alexander
 
Comparative Performance Analysis of Wireless Communication Protocols for Inte...
Comparative Performance Analysis of Wireless Communication Protocols for Inte...Comparative Performance Analysis of Wireless Communication Protocols for Inte...
Comparative Performance Analysis of Wireless Communication Protocols for Inte...chokrio
 
Identifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyClayton Hatathlie
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Securityijtsrd
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architectureAdeel Javaid
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 

Semelhante a Wireless Micro-Sensor Network Models (20)

EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
F0361026033
F0361026033F0361026033
F0361026033
 
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed SurveyComparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
 
Wireless sensor Networks.ppt
Wireless sensor Networks.pptWireless sensor Networks.ppt
Wireless sensor Networks.ppt
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
J0525460
J0525460J0525460
J0525460
 
IJSRED-V1I2P12
IJSRED-V1I2P12IJSRED-V1I2P12
IJSRED-V1I2P12
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Mobility_Research_paper
Mobility_Research_paperMobility_Research_paper
Mobility_Research_paper
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a survey
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a survey
 
Wireless Sensor Networks Are Defined As The Distribution...
Wireless Sensor Networks Are Defined As The Distribution...Wireless Sensor Networks Are Defined As The Distribution...
Wireless Sensor Networks Are Defined As The Distribution...
 
Comparative Performance Analysis of Wireless Communication Protocols for Inte...
Comparative Performance Analysis of Wireless Communication Protocols for Inte...Comparative Performance Analysis of Wireless Communication Protocols for Inte...
Comparative Performance Analysis of Wireless Communication Protocols for Inte...
 
Identifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities Survey
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architecture
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 

Mais de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Último

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Wireless Micro-Sensor Network Models

  • 1. IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 3 (Sep-Oct. 2012), PP 09-14 www.iosrjournals.org www.iosrjournals.org 9 | Page Wireless Micro-Sensor Network Models Ms. Swapnali S. Maske1 , Mrs. Tejaswini A. Pawar2 1 Department of Information Technology, BVCOE, Shivaji University, Kolhapur, India. 2 Department of Computer Science and Engineering, BVCOE, Shivaji University, Kolhapur, India. Abstract: Wireless sensor network is important in sensing, Collecting and disseminating information about environmental Phenomenon. This paper contain emerging field to classify wireless micro sensor network according to different communication functions, data delivery models and network dynamics. This taxonomy will aid in defining appropriate communication infra structure for diff. sensor network application subspaces. It allows network designer to choose the Protocol architecture. According to their application this taxonomy will enable new sensor network models to define for use in further research in this area. The overall communication behavior in a wireless micro sensor Network is application driven. It is useful to decouple the application communication used for information dissemination from the infrastructure communication used to configure and optimize the Network. This separation will aid network designers in selecting the appropriate sensor network architecture that will best match the characteristics of the communication traffic of a given application. This will allow the network protocol to achieve the application-specific goals of energy-efficiency, low latency, and high accuracy in the sensing application. We also believe that a sensor-initiated proactive path recovery approach with local patching will be beneficial in efficient information dissemination in wireless micro-sensor networks. The taxonomy presented will be helpful in designing and evaluating future network protocols for wireless micro-sensor networks. Often, it is possible to implement a sensor network for a specific phenomenon in a number of different ways. Consider the problem of monitoring a tornado. One option would be to fly airplanes to sense the tornado (mobile phenomenon; mobile sensors; continuous data delivery). Another would be to have a sensor grid statically placed on the ground and report data as the tornado passes through (mobile phenomenon; static sensors; continuous data delivery). Yet another would be to release lightweight sensors into the tornado (static phenomenon; mobile sensors; Continuous data delivery). I. Introduction Development in hardware and wireless network technology introduce a new area were small wireless devices will provide access to information any time, anywhere as well as actively participate in creating smart environment. Sensor networks hold the promise of revolutionizing sensing a wide range of application domains. This is because of their reliability, accuracy, flexibility, cast -effectiveness and case of development. Sensor are rapidly deployed in remote inhospitable area for a surveillance application sensors are used to analyze the motion of a tornado; Sensors are used in forest for fire detection; sensors are attached to tool cabs in a large metropolitan area to study the traffic conditions and plan routes effectively. There is wide range of applications for sensor network with differing requirements. In report the classification wireless micro-sensor networks from a communication protocol perspective, I look at characteristic and goals of typical micro-sensor network as well as different types of communication that required achieving their goals. The remaining report is organized as Chapter 2 contains Performance Metrics of Sensor Network. Chapter 3 contains Architecture of Sensor Network. Chapter 4 contains The Data Delivery Models. Chapter 5 contains the Network Dynamic Models for Sensor Network. Chapter 6 contains Some Network Protocol, Following are the terminologies used in the report. 1.1 Sensor The device that implements the physical sensing of environmental phenomena and reporting of measurements (through wireless communication). Typically it consists of five Components-sensing hardware, memory battery, embedded processor, and trance-receiver [1]. The basic sensor network is shown in Figure 1.1.
  • 2. Wireless Micro-Sensor Network Models www.iosrjournals.org 10 | Page Fig. 1.1 The basic sensor network 1.2 Observer The end user interested in obtaining information disseminated by the sensor network about the phenomena. The observer may indicate interests (or queries) to the network and receive response to these queries [2]. 1.3 Phenomenon The entity of interest to the observer that is being served and optionally analyzed/filtered the sensor networks. There may be multiple phenomena under observation concurrently in the same network. While monitoring the phenomena some latency and accuracy must be restricted. In a typical sensor network individuals sensor serve the local values and disseminate information to other sensors and to the observer. Sensors network shares many challenges of traditional wireless network. This include limited energy available to each node band width-limited, error-prone channel communication in sensor network is end-to-end. The function of network is to repeat information about phenomenon to observer. The observer not necessarily aware of the sensor networks infrastructure and individual sensor as end point communication. II. Performance Metrics Following are the metrics to evaluate sensor network protocols. 2.1 Energy Efficient As sensor nodes are battery operated, protocols must be energy efficient or maximize system lifetime 2.2 Scalability It is also a critical footer for large-scale network it is likely that locating interactions through hierarchy and aggregation will be critical for ensuring scalability. 2.3 System Lifetime System lifetime is the time until half of nodes die or by application directed metrics such as when the network stop providing the application with desired information about phenomena. 2.4 Latency The observer is interested in knowing about the phenomena within a given delay. The precise semantics of latency are application dependent. 2.5 Accuracy Primary object of observer is to obtain the accurate information, where accuracy is determined by given application. The given infrastructure should be adaptive that the application obtain desired accuracy and latency with minimum energy used. 2.6 Fault tolerance Due to surrounding physical conditions the sensor may fail, or also fails because of their energy ran out. This is difficult to replace the existing sensor, so the network is fault tolerance so that actual network condition is transparent to given application.
  • 3. Wireless Micro-Sensor Network Models www.iosrjournals.org 11 | Page II. Sensor Network Architecture A Sensor network is a tool for measuring and relaying information about the phenomena to the observer within the desired performance bond and deployment cost. The organization of the network as shown in following Figure 3.1 Fig. 3.1 Sensor network architecture 3.1 Infrastructure The infrastructure consist of the sensor and their deployment status [2], more precisely it consist of characteristics of sensor e.g. sensing accuracy, memory size, battery life, transmission ranges and deployment strategy (e.g. sensor density, sensor location and mobility.) 3.2 Network Protocols The network protocol is responsible creating paths and accomplishing communication between the sensors and observation. 3.3 Application / Observer The observer interest queries about the phenomenon as approximated by distributed data that the sensor is capable of serving. These queries could be static or dynamic. The translation of data could be done by the application software at the observer and /or the sensor nodes or directed by human observer. The network protocol in a sensor network is responsible for all communication both among sensors as well as between the sensors and observer. In order to determine how the network protocol behaves for diff. scenario’s, it is important to classify their feature. In next session different types of communication required in sensor network. 3.4 Communication models The communication within a sensor network can be classified in to two-category application and infrastructure [1]. Application communication relates to the transfer of sensor data with the goal of informing the observer about the phenomena within application communication, there are two modes co-operative and non co- operative. Non co-operative sensors do not cooperate at the application revel for information transfer. The extreme case will be when no sensor communication with its neighbors. All sensors were independently. Co-operative sensors might be required to communicate with its neighbor s either periodically or after the occurrence of specific event. Infrastructure communication refers to the communication needed to configure, maintain and optimize operation. The infrastructure communication is needed to keep the network functional ensure robust operation in dynamic environment as well as optimize overall performance. A sensor network requires both the application and infrastructure communication. In static sensor networks an initial phase of infrastructure communion is needed to set up the networks furthermore, if the sensors are mobile, additional communications needed for path discovery/ reconfiguration. III. Data Delievery Models Sensor networks can be classified in terms of data delivery models required by applications (observer) interest as 1.Continues 2. Event driven 3.Observer initiated 4. Hybrid 4.1 Continues
  • 4. Wireless Micro-Sensor Network Models www.iosrjournals.org 12 | Page In the Continues models the sensor communicates their data continuously at a pre-specified rate [1] [2]. Clustering is the most efficient for static networks where data is continuously transmitted. 4.2 Event Driven In the event driven data models the sensors reporting information only if an event of interest occurs, here observer is interested in the occurrence of a specific phenomenon or a set of phenomenon [1] [2]. 4.3 Observer Initiated In the observer initiated (or request reply) model the sensors only report their results in response to an explicit request from the observer (either directly, or indirectly through other sensors) 4.4 Hybrid Hybrid models are one where the above three approaches can co exists in the network. In this way we have only classify the data delivery from the application perspective. For any of the above models the communication approaches can be classified as 1. Flooding (Broadcast based) 2. Unicast 3. Multicast. In flooding approach sensor broadcast information in neighboring node and it rebroadcast this data until reaches to the observer. IV. Network Dynamics Models A path is formed between phenomena and the observer by a sensor network the sensor network protocol creates and maintains this path (or multiple paths) under dynamic condition while meeting the application requirements of low energy, low latency, high accuracy and fault tolerance. There are several approaches to construct and maintain path between the observer and the phenomenon. They are classified as static sensor network and mobile / dynamic sensor network, the important point is mobility because it is most common source of dynamic conditions other source includes sensors failure and change in observer interest. 5.1 Static Sensor Network There is no motion among communication sensors, the observer and the phenomenon. An example is a group of sensors spread for temperature sensing. In this type of network, sensor nodes requires an initial one time setup infrastructure communication to create the path between the observer and the sensors with the remaining traffic exclusively application communication. 5.2 Dynamic Sensors Network In dynamic sensor network, either the sensors themselves, the observer or the phenomenon are mobile, whenever a phenomenon associated with sensors moves, the path between observer and phenomenon get failed, in such situation either observer or the sensor must rebuild a new path. There are two types of rebuilding of new paths between observer and sensors. The first approaches is observer-initiated approach, in this case during initial setup the observer can build multiple paths between itself and the phenomenon. The observer can use the most beneficial path, if path fails another path can be used, if all paths fail, the observer must rebuild new paths. This observer initiated approach is a reactive approach where path recovery action is only taken after observe a broken path [1] [2]. Another approach is sensor-initiated approach. In sensor initiated path recovery procedure, path recovery is initiated by a sensor that is currently a part of logical path between the observer & the phenomenon. It is planning to move out of range. The sensors perform some local patching by broadcasting a participation request to neighboring sensor for given logical flow to build a new path. If any sensor sends participation reply message then the new path is build, if none of sensor reply then sensor can default to sending a path invalidation request to the observation so that the observer can start building the path. Dynamic sensor networks can be further classified by considering the motion of the components. This motion is important. Each of following requires different infrastructure; data delivery models and protocols 5.2.1 Mobile observer In this case the observer is mobile with respect to the sensors and phenomena. An example of this paradigm is sensors deployed in an inhospitable area for environment monitoring. For example, a plane might fly over a field periodically to collect information from a sensor network. Thus the observer, in the plane, is moving relative to the sensors and phenomena on the ground.
  • 5. Wireless Micro-Sensor Network Models www.iosrjournals.org 13 | Page Fig. 5.2.1 Mobile observer 5.2.2 Mobile sensors In this case, the sensors are moving with respect to each other and the observer. For example, consider traffic monitoring implemented by attaching sensors to taxis. As the taxis move, the attached sensors continuously communicate with each other about their own observations of the traffic conditions. If the sensors are co-operative, the communication paradigm imposes additional constraints such as detecting the link layer addresses of the neighbors and constructing localization and in formation dissemination structures. We know that the overhead of maintaining a globally unique sensor ID in a hierarchical fashion like an IP address is expensive and not needed. Instead, these sensors should communicate only with their neighbors with the link layer MAC address. In such networks, the above-mentioned proactive algorithm with local patching for repairing a path can be used so that the information about the phenomenon is always available to the observer regardless of the Mobility of the individual sensors. Fig. 5.2.2 Mobile sensor 5.2.3 Mobile Phenomena In this case, the phenomenon itself is moving. A typical example of this paradigm is sensors deployed for animal detection. In this case the infrastructure level communication should be event-driven. Depending on the density of the phenomena, it will be inefficient if all the sensor nodes are active all the time. Only the sensors in the vicinity of the mobile phenomenon need to be active. The number of active sensors in the vicinity of the phenomenon can be determined by application specific goals such as accuracy, latency, and energy efficiency. Fig 5.2.3 Mobile phenomenon V. Overview Of Some Network Protocols In this section we consider several existing protocols for sensor networks and analyze them in the context of our taxonomy.
  • 6. Wireless Micro-Sensor Network Models www.iosrjournals.org 14 | Page 6.1 Ad Hoc Routing Protocol Ad hoc routing protocols may be used as the network protocol for sensor networks [2]. However, such protocols will generally not be good candidates for sensor networks because of the following reasons: (i) Sensors have low battery power and low available memory; (ii) The routing table size scales with the network size; (iii) These networks are designed for end-to-end communication and react inappropriately to mobility; (iv) Their addressing requirements may be inappropriate for sensor networks; (v) Ad hoc routing protocols do not support cooperative dissemination; As ad hoc routing protocols do not inherently support data aggregation or fusion, they will not perform well in sensor network applications. 6.2 LEACH LE ACH is an energy efficient protocol for sensor networks designed for sensor networks with continuous data delivery mechanism and no mobility [2]. LEACH uses a clustering architecture where member nodes send their data to the local cluster-head. Cluster-heads aggregate the data from each sensor and then send this information to the observer node. LEACH uses rotation of the cluster head in order to evenly distribute the energy load. Once clusters are formed, cluster members use TDMA to communicate with the cluster-head. Thus LEACH is suitable for networks where every node has data to send at regular intervals. However, it needs to be extended for event driven models as well as for mobile sensors. 6.3 Direct Diffusion Directed Diffusion (DD) is a data-centric protocol, where nodes are not addressed by their addresses but by the data they sense [2]. Attribute-value pairs name data. In directed diffusion observer nodes express the interest in term of a query, which diffuses through the network using local interactions. Once a sensor node that satisfies the query (source node) is reached, that node starts transmitting data to the sink node, again using local interactions. The absence of a notion of a global id (e.g., IP address) makes directed diffusion efficient for networks with mobility as well. Directed diffusion is applicable for Event-driven and query-driven networks as defined in our taxonomy. VI. Conclusion The overall communication behavior in a wireless micro sensor Network is application driven. It is useful to decouple the application communication used for information dissemination from the infrastructure communication used to configure and optimize the Network. This separation will aid network designers in selecting the appropriate sensor network architecture that will best match the characteristics of the communication traffic of a given application. This will allow the network protocol to achieve the application-specific goals of energy-efficiency, low latency, and high accuracy in the sensing application. We also believe that a sensor-initiated proactive path recovery approach with local patching will be beneficial in efficient information dissemination in wireless micro-sensor networks. The taxonomy presented will be helpful in designing and evaluating future network protocols for wireless micro-sensor networks. Often, it is possible to implement a sensor network for a specific phenomenon in a number of different ways. Consider the problem of monitoring a tornado. One option would be to fly airplanes to sense the tornado (mobile phenomenon; mobile sensors; continuous data delivery). Another would be to have a sensor grid statically placed on the ground and report data as the tornado passes through (mobile phenomenon; static sensors; continuous data delivery). Yet another would be to release lightweight sensors into the tornado (static phenomenon; mobile sensors; Continuous data delivery). The accuracy is a function of the sensing technology of the sensors and their distance from the phenomenon. However, since the performance is measured at the observer end, it is also a function of the performance of the communication model. We hope that this taxonomy will assist in developing relevant simulation models to enable empirical study of the performance of the different sensor network organizations and assist in making design and deployment decisions. References [1] Sameer Tilak, Nael B, Abu-Ghazaleh and Wendi Heizelmn,”A Taxonomy of Wireless Micro Sensor Network Models”, [2] Sameer Tilak, Nael B, Abu-Ghazaleh and Wendi Heizelmn ,” The Updatesd A Taxonomy of Wireless Micro Sensor Network Models”,ACM And Mobile Computing Review, April 2002,Volume 1,Number 2.