You are on page 1of 21

WIRELESS SENSOR

NETWORK:
ARCHITECTURE AND PROTOCOL
INTRODUCTION

The WSN is built of "nodes" from a few to several hundreds or even thousands, where
each node is connected to one (or sometimes several) sensors. Each such sensor network
node has typically several parts: a radio transceiver with an internal antenna or connection to
an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors
and an energy source, usually a battery or an embedded form of energy harvesting. A
sensor node might vary in size from that of a shoebox down to the size of a grain of dust,
although functioning "motes" of genuine microscopic dimensions have yet to be created. The
cost of sensor nodes is similarly variable, ranging from a few to hundreds of dollars,
depending on the complexity of the individual sensor nodes. Size and cost constraints on
sensor nodes result in corresponding constraints on resources such as energy, memory,
computational speed and communications bandwidth. The topology of the WSNs can vary
from a simple star network to an advanced multi-hop wireless mesh network.
Wireless sensor network (WSN) is widely considered as one of the most important
technologies for the twenty-first century. In the past decades, it has received
tremendous attention from both academia and industry all over the world. A WSN
typically consists of a large number of low-cost, low-power, and multifunctional wireless
sensor nodes, with sensing, wireless communications and computation capabilities.
These sensor nodes communicate over short distance via a wireless medium and
collaborate to accomplish a common task, for example, environment monitoring, military
surveillance, and industrial process control The basic philosophy behind WSNs is that,
while the capability of each individual sensor node is limited, the aggregate power of the
entire network is sufficient for the required mission.
APPLICATION OF WSN

Area monitoring: Area monitoring by WSNs has wide application in military field. The sensors are spread over the
area where the activity has to be checked. It can help in detecting enemy intrusions. Apart from military, in daily life it
is also used for geo fencing around gas and oil pipelines to prevent thefts and detect leakage as soon as possible.

Health monitoring: In health monitoring range it can be of two types, either wearable or implanted. Wearable
sensors are those which are kept in close proximity of the body and implanted ones are medical devices, which are
placed inside the body of the person. It is helpful in full body monitoring of the patient and sensing the body position
and energy expenditure of the person.

Environmental/ earth monitoring : It is the widest field of WSNs applications , as sensors can be used to check air
and water quality , forest fire and landslide detection and like this it can also help in detecting natural disasters like
floods and earthquakes. A complete network of nodes is created over the place which is to be monitored.

Industrial monitoring: It can be used for machine health monitoring in big industries and hence offer significant cost
saving. Similarly it can be used for data centre monitoring, data logging, waste water monitoring, monitoring structural
health of building and also in wine production fields and cellars.
ADVANTAGES OF WSN

The advantages of wireless sensor networks might be summarized as the


following :
1. Network setups can be carried out without fixed infrastructure.
2. Suitable for the non-reachable places such as over the sea, mountains, rural
areas or deep forests.
3. Flexible if there is random situation when additional workstation is needed.
4. Implementation pricing is cheap.
5. It avoids plenty of wiring.
6. It might accommodate new devices at any time.
7. its flexible to undergo physical partitions.
8. It can be accessed by using a centralized monitor.
DISADVANTAGES OF WSN

The disadvantages of wireless sensor networks can be summarized as follows::


1. Less secure because hackers can enter the access point and obtain all the
information.
2. Lower speed as compared to a wired network.
3. More complicated to configure compared to a wired network.
4. Easily troubled by surroundings (walls, microwave, large distances due to
signal attenuation, etc).
5. It is easy for hackers to hack it we couldnt control propagation of waves.
6. Comparatively low speed of communication.
7. Gets distracted by various elements like Blue-tooth.
8. Still Costly (most importantly).
ARCHITECTURE
STRUCTURE OF WSN
STRUCTURE OF NODE
ORGANISATION OF WSN
STRUCTURE OF WSN

These networks work on the orders of algorithms. The sensors sense the physical parameters ( i.e.,
temperature, pressure , hotness etc ) and transmit them further . The signal conditioning system which
modulates the signal and passes it to the multiplexer or instrumentation amplifier. After completing the
procedure it transmitted in form of radio frequencies. The receiver at the base station receives the
information and thus the work of WSN is completed.
STRUCTURE OF NODE
ORGANISATION OF WSN

It consists of several different layers. The need of all the layers is given below:

1. Application layer

Responsible for traffic management and provide software for different applications that
translate the data in an understandable form or send queries to obtain information.

2. Transport layer

The function of this layer is to avoid congestion and provide reliability. Many several
protocols are available to provide this function. Major requirement of this layer is to
access other networks. Basic function of this layer is to accept data from above layers
and then to split it into smaller units and ensure their transfer to the desired end.
3. Network layer

This layer is used for routing. It has a lot of challenges but the major challenge is the limited
memory and non availability of a Global ID for sensors. Thus the sensors cannot be self organized
unlinked the computer process in which each system has a Global IP address. There are many
routing protocols available for this layer. For egg. The "LEACH" protocol.

4. Data link layer

This layer is present for detecting errors and then correcting them . Data link layer supervises the
multiplexing mechanism and accounts for the errors and provide medium access.

5. Physical layer

Provides an interface for the transmission of bits or data over physical medium . This layer is
responsible for providing carrier frequency , for signal detection , signal modulation and data
encryption.
PROTOCOLS
CATEGORY REPRESENTATIVE PROTOCOLS
LOCATION-BASED PROTOCOLS
DATA-CENTRIC PROTOCOLS
HIERARCHICAL PROTOCOLS
MOBILITY-BASED PROTOCOLS
MULTIPATH-BASED PROTOCOLS
HETEROGENEITY-BASED PROTOCOLS
QOS-BASED PROTOCOLS
LOCATION-BASED PROTOCOLS

S.No. PROTOCOLS ADVANTAGES DISADVANTAGES


Geographic Adaptive Fidelity
1. (GAF) Optimize the High overhead
performance of WSN Doesnt take care
Highly Scalable of QoS during data
transmission

2. Geographic and Energy Aware Increase the Network Limited Scalability


Routing (GEAR) lifetime Limited Mobility
Reduces Energy
Consumption

3. Trajectory Based Forwarding Increase the reliability High overhead


(TBF) Increase the Network
Management

4. Bounded Voronoi Greedy Simple, easy to Overhead in


Forwarding (BVGF) understand determining voronoi
partitions
5. Coordination of Power Saving Reduces the energy consumption Scalability is limited
with Routing (SPAN) of nodes High overhead
Less over head No QoS
Supports data aggregation

6. Geographic Random It is virtually stateless User involvement is required


Forwarding (GeRaF) It itself does not create multi hop in each stage
overhead More time is required to get
Easily integrated with awake/ efficient output
asleep schedules to save energy

7. Minimum Energy Maintains energy network with Fault tolerant depends upon
Communication Network low power specific application
(MECN) Fault tolerant
Optimal spanning

8. Small Minimum Energy Less Energy than MECN Maximum power usage
Communication Network Links maintenance cost is less No. of broadcast messages is
(SMECN) large
DATA-CENTRIC PROTOCOLS

Data-centric protocols differ from traditional address-centric protocols in


the manner that the data is sent from source sensors to the sink. In
address-centric protocols, each source sensor that has the appropriate
data responds by sending its data to the sink independently of all other
sensors. However, in data-centric protocols, when the source sensors
send their data to the sink, intermediate sensors can perform some form
of aggregation on the data originating from multiple source sensors and
send the aggregated data toward the sink. This process can result in
energy savings because of less transmission required to send the data
from the sources to the sink.
HIERARCHICAL PROTOCOLS
Protocol Proactive Energy Network Data Data Location- (Qos- Scalability
Conservatio Life Time Based Aggregat Based Support-
n-on ion ed

Leach Yes Very Good Good No Yes No No Good

Pegasus Yes Very Good Very Good Yes Yes No No Good

Layered Yes Very Good Very Good Yes Yes No No Good


Pegasus

TEEN Yes Good Very Good Yes Yes No No Good

APTEEN Yes Good Better Yes Yes No No Good


MOBILITY-BASED PROTOCOLS
S. No. Protocol Advantages Disadvantages
1 Data Mules Achieve cost-effective connectivity in sparse Latency for this type of network is high.
sensor networks. Encounter unexpected failures such as loss of a MULE or
Data transfers only occur at short distances inability to reach sensors because of change in terrain
leading to power savings. causing limitations in mobility.
Fewer infrastructures are needed.

2 SEAD It distributes most of the data successfully. Packet delivery delay to the sink increases
It minimizes the energy cost

3 Dynamic Design of proxies reduces the cost of Large flooding overhead.


Proxy Tree- transmitting data from the source and sinks High packet delivery delay.
Based Data proxies.
Dissemination
4 TTDD Increase energy efficiency and decrease Packet delivery delay occurs
the latency due to their connectivity
capability.
Fewer infrastructures are needed.

5 Tree-Based Throughput is very high. Needs more memory for tree construction and sink
Efficient Data Less control packet overhead. management.
Dissemination
Protocol
MULTIPATH-BASED PROTOCOLS
Considering data transmission between source sensors and the sink, there are two routing paradigms: single-path routing and
multipath routing. In single-path routing, each source sensor sends its data to the sink via the shortest path. In multipath routing, each
source sensor finds the first k shortest paths to the sink and divides its load evenly among these paths .

Protocol Path Route Traffic Number of Path Improved


Disjointedness Maintenance Distribution Paths Chooser Performance
Parameters
Braided Partially New route Not Not limited Sink node Data transmission
Multipath disjoint discovery when applicable delay
Routing all the active caused by path
paths have failed failure
Packet loss rate
caused
by path failure
Route discovery
and
path maintenance
overhead

N-to-1 Node-disjoint Not Per-packet Packet Not limited Source node


Multipath mentioned splitting salvaging Intermediate
Routing nodes
Reliability
HETEROGENEITY-BASED PROTOCOLS

In heterogeneity sensor network architecture, there are two types of sensors namely line-powered
sensors which have no energy constraint, and the battery-powered sensors having limited lifetime,
and hence should use their available energy efficiently by minimizing their potential of data
communication and computation.

QOS-BASED PROTOCOLS
In addition to minimizing energy consumption, it is also important to consider quality of service
(QoS) requirements in terms of delay, reliability, and fault tolerance in routing in WSNs.
FUTURE SCOPE

The proposed scheme is able to defend against the active attacks,


however not included the passive attack. So it can be extended to the
other security attacks.
Battery consumption poses one of the challenging issues in the WSN
network designing. During the data aggregation the node will require more
power than the rest of the nodes. So aggregation selector and rotator
mechanism can be developed that enable the load sharing.
A new scheme can be proposed for less overhead, less computation and
better security.
MADE BY:-
SNIGDHA POKHRIYAL
HARSHITA SRIVASTAVA
VAISHALI MITTAL

THANK YOU

You might also like