niteshhhhh

Upload: niteshaul

Post on 06-Apr-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 NITESHHHHH

    1/24

    WIRELESS

    SENSORNETWORKS

    NITESH AUL

    (11081970)

  • 8/3/2019 NITESHHHHH

    2/24

    INTRODUCTION.

    A wireless sensor network (WSN) is a wireless

    network consisting of spatially distributed

    autonomous devices called Nodes to monitor physical

    or environmental conditions.

    WSNs are small , battery powered devices with On-

    Chip processing, communication and sensing

    capabilities.

  • 8/3/2019 NITESHHHHH

    3/24

    INTRODUCTION Conti..

    The distributed measurement nodes communicate

    wirelessly to a central gateway, which provides a

    connection to the wired world where you can collect,

    process, analyze, and present your measurement data.

    To extend distance and reliability in a WSN, you can use

    routers to gain an additional communication link between

    end nodes and the gateway.

  • 8/3/2019 NITESHHHHH

    4/24

  • 8/3/2019 NITESHHHHH

    5/24

    SENSOR NODES.

    A Sensor Node, also known as a 'mote, is a node

    in a wireless sensor network that is capable of

    performing some processing, gathering Sensory

    information and communication with other

    connected nodes in the network and also with the

    base station.

  • 8/3/2019 NITESHHHHH

    6/24

    COMPONENTS OF SENSOR

    NODES.Chip Set

    Transceiver

    Memory

    Power source

    One or more sensors.

  • 8/3/2019 NITESHHHHH

    7/24

    ROUTING.

    Since it is a distributed network having

    multiple nodes , there may be multiple paths

    from the source to the destination. Routing

    methods can be ..

    - Fixed Routing Scheme.

    - Adaptive Routing Scheme.

  • 8/3/2019 NITESHHHHH

    8/24

    ROUTING Conti..

    FIXED Tech. Uses Routing Tables.

    Same path is used every

    time for same source and

    destination.

    Congestion is not

    considered.

    Collisions occur at times.

    ADAPTIVE Tech. Congestion status of the

    route is taken into

    consideration.

    Route can vary every time.

    Collisions are rare.

    No routing tables are used.

  • 8/3/2019 NITESHHHHH

    9/24

    TOPOLOGIES.There are mainly three types of topologies that are applied in the

    establishment of a typical wireless network. These are

    Static: It is the Traditional topology that uses the wires for as

    the communication medium.

    Mobile: It is that topology that uses the microwave for thesending and receipt of data i.e. communication.

    Hybrid: In this topology, we find the combination of both thetopologies. The wireless systems operate on the outside worldand the internal communication takes place through the wires.

  • 8/3/2019 NITESHHHHH

    10/24

    Point To Point Technology.

    This is one of the most reliable topology because there is only

    one point of failure in this topology and that is the host itself.

    This topology is simple enough and requires less expertise but

    when it comes to operate multiple hosts the complexity

    increases in geometric fashion.

    In this topology, each sensor node needs a separate connection.

    Due to the use of this, the cost increases and the management

    become difficult.

  • 8/3/2019 NITESHHHHH

    11/24

  • 8/3/2019 NITESHHHHH

    12/24

    MULTI DROP. In this topology, the bus topology was

    used as to reduce the number of wires . All

    the sensors are connected to each other andthe central host.

    Multidrug network, each sensor node puts its

    information onto a common medium. The

    single-wire connection represents a potential

    single-point failure.

  • 8/3/2019 NITESHHHHH

    13/24

  • 8/3/2019 NITESHHHHH

    14/24

    Web Technology It is that topology in which all the hosts must be operating andconnected all the time. It is possible only when the vendors

    agree on a common protocol so that all the hosts can

    communicate with each other to server to their near system.

    They automatically make a configuration for the reliable

    service. These sensors are co-operating and form a temporary

    configuration to replace the host and in the future.

  • 8/3/2019 NITESHHHHH

    15/24

  • 8/3/2019 NITESHHHHH

    16/24

    OPERATING SYSTEM.

    TinyOS is the first operating system specifically designed for wireless

    Sensor Networks. Tiny OSs component library includes network protocols,

    distributed services sensor drivers, and data acquisition tools. The TinyOS

    system and programs was written in special programming language calledNesC. NesC is the extension of the C-language.

    Contiki , it is another open source Operating System designed specifically

    for WSNs.It supports the multithreading on a perfect application basis.

    Contiki kernel supports IP

    communication in both IP

    v4 and IP

    v6. SOS embed operating system is another OS for WSNs. It supports loadable

    modules.

    LiteOS is another type of OS for WSNs developed in UNIX. It is possible

    to operate one or more WSNs in UNIX.

  • 8/3/2019 NITESHHHHH

    17/24

    USER AUTHENTICATION.

    UA is one of the most important.

    Security services to protect WSN data Access

    from unauthorized users. Providing suitable security.

    UA should provide both Mutual

    Authentication and session key

  • 8/3/2019 NITESHHHHH

    18/24

    SYNCHRONIZATION. Time Synchronization in wireless networks is extremely important for basic

    communication, but it also provides the ability to detect movement,location, and proximity. The synchronization scheduler consists of fourparts: send time, access time, propagation time, and receive time.

    The first is relative timing and is the simplest. It relies on the ordering ofmessages and events. The next method is relative timing in which thenetwork clocks are independent of each other and the nodes keep track ofdrift and offset. The last method is global synchronization where there is aconstant global timescale throughout the network. This is the most complexand the toughest to implement.

  • 8/3/2019 NITESHHHHH

    19/24

    ADVANTAGES. Limited Power . Ability to withstand harsh environmental

    conditions.

    Ability to cope with node failures. Mobility of nodes. Dynamic network topology. Communication failures. Heterogeneity of nodes. Low cost. Small size.

  • 8/3/2019 NITESHHHHH

    20/24

    DISADVANTAGES. Short communication distance.

    It is quite easy for hackers to hack it, as wecant control propagation of waves.

    Comparatively low speed of communication.

    Gets distracted by various elements like Blue-

    tooth.

    Still Costly at large.

  • 8/3/2019 NITESHHHHH

    21/24

    APPLICATION

    MILITARY APPLICATION

    MEDICAL APPLICATION

    HOME APPLICATION

    ENVIRONMENTAL APPLICATION

  • 8/3/2019 NITESHHHHH

    22/24

    REFRENCES. www.google.co.in

    www.ieee.org

    www.techminds.com

  • 8/3/2019 NITESHHHHH

    23/24

    ANY QUERIES.

  • 8/3/2019 NITESHHHHH

    24/24