1 / 26

Wireless Sensor Networks: Seminar Presentation

This seminar presentation provides an introduction to wireless sensor networks, discussing their architecture, protocols, routing mechanisms, and applications. It also covers different types of sensors and network topologies. The advantages and disadvantages of WSNs are discussed, as well as power management techniques and clustering. The presentation is available at http://powerpointpresentationon.blogspot.com.

tsun
Download Presentation

Wireless Sensor Networks: Seminar Presentation

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SEMINAR PRESENTATION ON WIRELESS SENSOR NETWORKS GUIDED BY: SUBMITTED BY: ANSHU TOSHNIWAL JAIDEEP JANGIR http://powerpointpresentationon.blogspot.com

  2. CONTENTS INTRODUCTION ARCHITECTURE PROTOCOLS ROUTING APPLICATIONS TOPOLOGY TYPES OF SENSORS

  3. INTRODUCTION WSN are used to collect data from the environment. They consists of large number of sensor nodes and one or more Base Stations. The nodes in the network are connected via Wireless communication channels. Each node has capability to sense data, process the data and send it to rest of the nodes or to Base Station. These networks are limited by the node battery lifetime.

  4. ADVANTAGES It avoid lot of wiring. It can accommodate new devices at any time. Its flexible to go through physical partitions. It can be accessed through a centralised monitor.

  5. DISADVANTAGES It is very easy for hackers to hack it as we cant control propagation of waves. Comparitively low speed of communications. Gets distracted by various elements like Blue-tooth. Still costly at large.

  6. WSN ARCHITECTURE Sensor Node Gateway Base Station Wireless Sensor Network Architecture

  7. Sensor node functionality Each sensor node contains a computational module (a programmable unit) which provides computation ability, storage, and bidirectional communication with other nodes in the system Two advantages: They can be re-task in the field Easily communicate with the rest of the network

  8. Gateway Each sensor patch contains a gateway node Each gateway node can communicate with the sensor network and provides connectivity to the transit network

  9. Transit Network Can consist of a single hop link or a series of networked wireless nodes Each transit network design has different characteristics Robustness Bandwidth Energy efficiency Cost Manageability

  10. Base Station Data storage for the collection of sensor patches WAN connectivity will be wireless Base-Remote link connection to the internet

  11. WSN PROTOCOLS Wireless sensor network routing protocols can be classified into following categories. Direct communication Flat protocols (Multihop) Hierarchical Routing Protocols

  12. ROUTING MECHANISM Multihop Routing Direct Communication Hierarchical Routing Cluster Head

  13. Applications of WSN Environmental/Habitat monitoring Acoustic detection Seismic Detection Military surveillance Inventory tracking Medical monitoring Process Monitoring

  14. Network Topology A communication network is composed of nodes, each of which has computing power and can transmit and receive messages over communication links. The basic network topologies are Fully connected networks Mesh networks Star networks Ring networks

  15. TOPOLOGIES

  16. Communication Protocols Headers. Each message generally has a header identifying its source node, destination node, length of the data field, and other information. This is used by the nodes in proper routing of the message. In encoded messages, parity bits may be included. In packet routing networks, each message is broken into packets of fixed length. The packets are transmitted separately through the network and then reassembled at the destination.

  17. Switching Most computer networks use a store-and-forward switching technique to control the flow of information. Each time a packet reaches a node, it is completely buffered in local memory, and transmitted as a whole. Switching techniques : Wormhole Technique- It splits the message into smaller units known as flow control units or flits. The header flit determines the route. As the header is routed, the remaining flits follow it in pipeline fashion Virtual-cut-through Technique-when the header arrives at a node, it is routed without waiting for the rest of the packet.

  18. Routing There may be multiple paths from the source to the destination. Therefore, message routing plays an important role. The main performance measures affected by the routing scheme are throughput (quantity of service) and average packet delay (quality of service). Types of Routing Schemes: Token Ring Fixed routing schemes Adaptive routing schemes

  19. Power Management NEED - With the advent of ad hoc networks of geographically distributed sensors in remote site environments (e.g. sensors dropped from aircraft for personnel/vehicle surveillance) Power management is employed to increase the lifetimes of sensor nodes. Current research is in designing small MEMS (microelectromechanical systems) RF components for transceivers, including capacitors, inductors, etc. RF-ID (RF identification) devices are transponder microcircuits having an L-C tank circuit that stores power from received interrogation signals, and then uses that power to transmit a response.

  20. Hierarchical clustering observer The essential operation in sensor node clustering is to : Select a set of cluster heads among the nodes in the network. Cluster the rest of the nodes with these heads. Cluster heads are responsible for : Coordination among the nodes within their clusters (intra-cluster coordination). Communication with each other and/or with external observers on behalf of their clusters (inter-cluster communication). CH CH CH

  21. Topology management Cluster-based approach observer Cell-based approach

  22. TYPES OF SENSORS Mechanical Sensors The Piezoresistive Effect The Piezoelectric Effect Capacitive Sensors Inductive sensors Optical Transducers Photoelectric effect Photoconductive sensors Junction-based photosensors

  23. Cont… Magnetic and Electromagnetic Sensors Magnetoresistive effect Magnetic Field Sensors Thermal Sensors Thermo-Mechanical Transduction Thermoresistive Effects Thermocouples

  24. CONCLUSION The emergence of wireless sensor networks can finally bridge the gap between physical and digital worlds, with the effect as if to establish nervous system for the physical world. It also allows measurement and monitoring in the way that is much closer to the phenomenon than ever before, resulting in continuous and high fidelity of data collected.

  25. Future Scope Wireless sensor network has the potential to trigger the next revolution in computing. While its applications and potential benefits can spread far and beyond, and could finally break the barrier between physical and digital worlds to allow disappearance of computation.

  26. THANK YOU

More Related