You are on page 1of 8

INTRODUCTION

Advances in technology has provided the availability of small and low-cost sensor
nodes with capability of sensing various types of physical and environmental conditions,
data processing, and wireless communication. Variety of sensing capabilities results in
profusion of application areas. However, the characteristics of Wireless Sensor Networks
(WSN) require more effective methods for data forwarding and processing.
The purpose of this report to provide general knowledge of WSNs, application
opportunities, and proposed routing for WSNs. Since there are too many routing algorithms
for data forwarding problem in WSNs, only some of them will be presented in details.
However, a full comparison of all methods will be given.

What is Wireless Sensor Network?


A wireless sensor network (WSN) is a wireless network consisting of distributed self-
organized autonomous devices using sensors to cooperatively monitor physical or
environmental conditions, such as vibration, motion, temperature, sound etc.
A WSN node mainly consists of four main parts:
1- Processing unit,
2- Sensor
3- Transceiver
4- Energy Source Unit
Depending on usage purpose there may be additional components such as
localization unit, energy producer, position changer etc. In the figure below, general
architecture of WSN node and a real example is represented

Figure 1: WSN Node acrhitecture and a real example.


Note.  Haroun, I.,Lambadaris, I., Hafez, R. (September, 2005). Building Wireless Sensor Networks. Retrieved March 26, 2007
from the World Wide Web: http://www.mwrf.com/Articles/ArticleID/11071/11071.html
WSN nodes generally have small sizes up to the size of a coin. However, the sizes of
WSN nodes may be furtherly decreased with future advances in micro-electro-mechanical
systems (MEMS). Due to low bandwidth and low energy sources, transmission range of
nodes is restricted with about approximately 30 meters. Thus, dense deployment of nodes is
required for more reliable data transmission. The processing capacity of WSN nodes is also
low both because of data processed by WSN nodes are too small and energy is limited.
In contrast to multi-threaded/multi-process general-purpose operating systems,
WSN nodes use less complex operating systems and event-driven programming models. In
contrast to modern operating systems, which consist of millions of lines of code,   WSN
operating systems codes consists of just a few thousands of lines. Some examples of WSN
node operating systems are:
-          TinyOS
-          Contiki
-          MANTIS
-          BTnut
-          SOS
-          Nano-RK
Also it should be considered that, since WSN node hardware is similar to embedded systems, it is
possible to use some embedded operating systems such as eCos, uC/OS for sensor networks.

Application Areas
            There are many commercially available sensor types to monitor variety of
conditions including:
o Temperature
o Humidity
o Movement
o Lightning condition
o Pressure
o Soil makeup
o Noise levels
o Presence or absence of certain kinds of objects
o Mechanical stress levels on attached objects
o The current characteristics such as speed, direction and size of an object
As a result of availability of different kinds of sensors, there are various the
applications of WSNs. A general categorization of WSN applications may include military
applications, environmental applications, health applications and other commercial
applications.
Military Applications:
Dense deployment of disposable and low-cost sensor nodes makes WSN concept
beneficial for battle fields. Some military applications of WSNs are:

o Monitoring friendly forces, equipment and ammunition.


o Battlefield surveillance
o Exploration of opposing forces and terrain
o Targeting
o Battle damage assessment
o Nuclear, biological and chemical attack detection

Environmental Applications:
Although there are some other techniques to monitor environmental conditions,
random distribution and self organization of WSNs make them suitable for environmental
monitoring. Some applications include:
o Biocomplexity mapping of environment
o Detection of natural disasters, such as fire, flood and eartquake detection
o Precision agriculture
o Habitat monitoring
o Pollution detection
o Planetary exploration

Health Applications:
Tiny sizes and light-weight structure of WSN nodes provides many functionality in health
applications, including:

o Telemonitoring of human physiological data


o Tracking and monitoring doctors and patients
o Drug administration

Other Commercial Applications:


In addition to all of above, there are many commercial applications of WSNs including

o Home automation for smart home environments


o Interactive museums
o Environmental control in buildings
o Detecting and monitoring burglary/ thieving
o Vehicle tracking and detection
o Managing inventory control

Routing Techniques
Sharing information between physically separated hosts/ sources requires both
physical connections between these hosts in terms of cables, links, etc. and a common
language, called protocol, to make these hosts understand each other. Networking concept
is built on variations of this principle. As in other networks, in WSNs we also need some
routing techniques / protocols between nodes to provide connectivity among them in order
to gather desired data. Although WSNs have some similarities with traditional networks,
currently available routing protocols can not be directly applied to WSNs because of some
characteristics of WSNs listed below:low processing capacity

o difficult operations conditions


o limited energy source
o low bandwidth
o huge population in WSNs
o Non-predetermined position of sensor nodes

Design Issues of WSNs


Design of routing protocols in WSNs is influenced by many challenging factors to be
addressed. Some of them are:

o Node deployment
o Data reporting method
o Node/link heterogeneity
o Fault tolerance
o Scalability
o Transmission media
o Connectivity
o Data aggregation
o Quality of service

Figure 2: Routing protocols in WSNs.


Note. J. N. AL-Karaki, A. E. Kamal, “Routing Techniques in Wireless Sensor Networks: A Survey”, IEEE Wireless Communications,
Volume 11, Issue 6, Dec. 2004 Page(s):6 - 28 

As illustrated in figure 2, almost all routing methods can be classified into three categories depending on networks
structure:

o Flat routing
o Hierarchical routing
o Location-based routing

Furthermore, these protocols can be classified into subgroups listed below,


depending on protocol operation.

o Negotiation-based routing
o Multipath-based routing
o Query-based routing
o QoS-based routing
o Coherent based routing

               In addition to above, depending on route determination, routing protocols cans be classified
into four categories as follows:
 

o Proactive routing protocols: All routes are computed before they are used.
o Reactive routing protocols: Routes are computed as they are needed.
o Hybrid routing protocols: uses both proactive and reactive routing protocols.
o Cooperative routing protocols: Nodes send data to a central node where more processing
power and route information is available.  

Although in some special cases sensor nodes have mobilizers to change the position,
most of the sensor nodes are static, i.e. remains in same position, therefore it is preferable
to have table-driven routing protocols rather than reactive protocols.

Flat Routing
            In flat networks, each node typically plays the same role and sensor nodes
collaborate together to perform the sensing task. Due to the large number of such nodes, it
is not feasible to assign a global identifier to each node. This consideration has led to data
centric routing, where the Base Station (BS) sends queries to certain regions and waits for
data from the sensors located in the selected regions. Two main types of algorithms in flat
routing are flooding, where each node forwards data to all its neighbor so to much
redundant data occurs, and data-centric routing where there is no global identifiers for
nodes, instead data is identified using attribute based naming.

Sensor Protocols for Information via Negotiation ( SPIN )


This protocol uses the idea of distributing only the data that other nodes do not have,
assuming the nodes in close proximity have similar data. Thus nodes avoid sending redundant data.
Protocol starts when SPIN node gathers new data. Node broadcasts an ADV message containing
metadata of newly obtained data. Any neighbor interested in that data sends a REQ message. After
that the actual DATA is sent to neighbor node. Operation of SPIN network is illustrated in figure 2.

Figure 3: The SPIN protocol.


Note.Wendi Heinzelman, Joanna Kulik, and Hari Balakrishnan, Adaptive Protocols for Information Dissemination in Wireless Sensor Networks,
Proc. 5th ACM/IEEE Mobicom Conference, Seattle, WA, August 1999.

 Important advantage of SPIN protocol is that each node only knows its single-hop
neighbors therefore topological changes in network localized, i.e. does not affect whole
network. On the other hand, SPIN protocol does not guarantee delivery of data because
intermediate nodes between source and destination nodes may not be interested in
advertised data, therefore such data may not be forwarded to destination.

Directed Diffusion:
In spite of SPIN, where availability of data is advertised, in directed diffusion the BS broadcasts interest
which describes a task required to be done by the network. Up on receiving the interest, each sensor node then stores
the interest entry in its cache and sets up a gradient toward itself to the nodes from which it receives the interest.
When a node has data for broadcasted interest, it sends data through the interest’s gradient choosing only best paths
to avoid further flooding. The steps of directed diffusion process are illustrated in Figure 4.
Figure 4 : Example of Directed Diffusion. (a) Propagate interest, (b) set up gradient and (c) send data.
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. Wireless sensor networks: a survey. Computer Networks, 38(4):393–422, April
2002. 

Minimum Cost Forwarding Algorithm ( MCFA ):


In MCFA each node records the estimated least cost from itself to Base Station. Initially at each node, the
least cost is set to infinity ( ∞ ). The BS broadcasts a message with the cost set zero. Whenever a node receives the
broadcast message, compares the cost of message with its estimated least cost. If the estimated cost on the message
plus the cost of current link is less than what the node has, the estimate on the message and the estimate recorded by
the node is updated and then message is broadcasted to neighbors, otherwise the broadcast message is discarded.
The figure 5 illustrates steps of this process.

Figure 5: Minimum Cost Forwarding Algorithm


a) each node set its least cost to BS as ∞
b) BS broadcast a message with least cost set to zero
c) if cost of message+link cost < local cost, update local cost and cost on the message, then re-broadcast the
message
d) if cost of message+link cost >= local cost, discart message  

 
Important disadvantage of MCFA is that, the nodes that are far away from the base station may get more
broadcasts than those close to the BS. A solution to this problem is to use a backoff algorithm to constrain nodes
from sending broadcasts until a * lc  time elapsed from the time when message is updated, where a denotes a
predefined constant and lc  is the link cost of received message.
Gradient Based Routing ( GBR): The paradigm in GBR is calculation of a parameter, called height of the
node, which is the minimum path between node and Base Station (BS) in terms of the number of hops between
them. The difference between a node’s height and the height of its neighbor is called gradient of the link between
them. While forwarding data, nodes choose the links which have largest gradient. 

Figure 6: Gradient Based Routing. 

 
In order to prolong network life time, GBR balances the traffic over the links using three different data
distribution techniques:

1. Stochastic Scheme: if there are two or more links having same gradient, randomly choose one of them.
2. Energy Based Scheme: if the available energy of the node decreases below of a certain level, the node
increases its height to prevent other nodes sending data to it.
3. Stream Based Scheme: new streams are not forwarded to the nodes which are already being a part of other
streams.

Other flat routing techniques are:

o  Information-driven sensor querying and constrained anisotropic diffusion routing


o COUGAR
o ACQUIRE
o Energy-Aware Routing

Hierarchical Routing
Although this type of routing methods originally proposed in wired networks with
their special advantages related to scalability and efficient communication, they also provide
energy-efficient routing in WSNs. Some techniques that belong to this family are:

o LEACH protocol
o  Power-Efficient Gathering in Sensor Information Systems
o Threshold-Sensitive Energy Efficient Protocols
o Small Minimum energy communication network ( MECN )
o Self-organizing protocol
o Hierarchical power-aware routing
o Two-Tier Data Dissemination
Location-Based Routing
In this type of protocols sensor nodes are addressed depending on their locations.
Relative coordinates of neighboring nodes is obtained either by exchanging information
between neighbor nodes or by directly communicating with a Global Positioning System
(GPS). Some techniques that belong to this family are:

o Geographic Adaptive Fidelity


o Geographic and Energy Aware Routing (GEAR)
o MFR, DIR, and GEDIR
o The Greedy Other Adaptive Face Routing (GOAFR)
o SPAN

Conclusion
In this report I have tried to explain main concepts of WSN, its features,
applications, and finally some proposed routing protocols.  I have mentioned that flexible
and low-cost structures of WSNs make them applicable for various types of projects. The
current situation of WSN can be considered under three different aspects
1) Electrical engineering perspective: hardware structure and power consumption of
WSN can be minimized further using benefits of nanotechnology.
2) Network engineering perspective: although there are lots of proposed routing
methods for WSNs, still new methods are need and currently existing ones need to be
improved.
3) Project managing perspective: benefits of WSN, as a whole or partially can be
used in various projects

You might also like