You are on page 1of 61

KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY

(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

REGULATIONS - 2017

YEAR/SEM: IV/VII SUBJECT CODE&NAME:EC8702-ADHOC&WIRELESS SENSOR NETWORKS

HANDOUT

UNIT – 1 AD HOC NETWORKS – INTRODUCTION AND ROUTING PROTOCOLS

PART-A

1. What is infrared (IR) transmission?


Infrared light transmission is one of the important technologies used in wireless
LAN. It is based on the transmission of infrared light at 900 nm wavelength.

2. List the transmission impediments of wireless channel. (or) (M/J-13)


List the characteristics of wireless channels.
The characteristics of wireless channel are
1. Path loss
2. Fading
3. Interference
4. Doppler Shift
5. Transmission rate constraints

3. Define path loss.


Path loss is defined as the ratio of power of the transmitted signal P t to power of
the same signal received by the receiver Pr .
Path loss = Transmitted power / Received power
For free space, path loss is
Pr = P t Gr Gt λ2/ (4 π d) 2
P t / Pr = (4 π d) 2 / Gr Gt λ2
where, P t – Transmitted power, P r – Received power
Gt – Gain of the transmitting antenna, Gr – Gain of the receiving antenna
λ – Wavelength TX – Transmitter, RX – Receiver
It involves no noise, stationary transmitter and receiver, only direct path
component and is proportional to the distance„d‟ between the T X and RX.

4. What is fading? List the different types of fading.


Fading refers to the fluctuations in signal strength, when received at the receiver.
It occurs due to multipath propagation.
The different types of fading are
1. Slow/long term fading
2. Fast/short term fading

1
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)
5. Why are ad hoc networks needed? (M/J-12)
Ad hoc networking is often needed where an infrastructure network cannot be
deployed and managed. The presence of dynamic and adaptive routing protocols
enables quick formation of ad hoc networks and is suitable for emergency
situations like natural disasters, spontaneous meetings or military conflicts.

PART B

1. What are the differences between wired and wireless network.

2. Explain in detail about characteristics of wireless channel.

2
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Path loss
• Ratio of transmitted power to received power
• Expressed in dB
• Depends on the radio frequency and nature of the ground

3
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Two-ray model
• Line of sight path & reflected path
Pr = Pt Gt Gr (hthr/d2)2

Pr = Pt Gt Gr (λ/4π)2 (1/dγ)

4
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Fast fading
(different version of tx-ed signal)
• Fast fluctuations in amp, phase and delay of the received
signal.
• Fluctuations due to ?
• Interference between multiple copies of the same transmitted
signal reaching the receiver at a little different times.
• Occurs due to three propagation mechanisms

Slow fading (object blockings)


• Shadow fading
• Receiver inside the building or transmitted signal pass through
the wall
• Little variation in received power

5
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Interference
• Interaction of waves that are correlated with each
other.
• Either they travel from the same source
• Or they have same frequency.
• This incident occurs when two waves meet at a point
while traveling along the same transmission medium.
– Adjacent channel interference
– Co-channel interference
– Inter symbol interference

Adjacent channel interference


• Near by freq interfere with on-going
transmission signal
• Avoided by using guard band

6
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Co-channel interference
• Narrow band interference
• Same frequency can be
reused by nearby systems
• Avoided by multiuser
detection mechanism,
directional antennas and
dynamic channel allocation
mechanisms

Inter symbol interference


• Distortion in telecommunication
• One or more symbols interfere with other
symbol
• Due to multipath propagation and consequent
overlapping of individual pulses – blur or
mixture of signal
• Adaptive equalization – allocate the time to
each pulses

7
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Doppler shift
• Transmitter and receiver moves :
– Towards – high freq
– Away – low freq
• Doppler shift
fd =v/λ

V= relative velocity between transmittter and receiver


λ= wavelength of the signal.

Nyquist’s theorem

• Gives the maximum data rate of the channel


(noiseless)
• Number of changes (values or voltages of the
transmitted signal) per second – baud rate
• Ex:
Transmission value 0,1,2,3 --- 00,01,10,11
C = 2xBxlog2L bits/sec
B= bandwidth
L= Number of discrete signal levels/ voltage levels

8
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Shannon’s Theorem
• Find the data rate of noise channel
SNR = 10log10(S/N)
Channel capacity
C = Bxlog2(1+(S/N)) bits/sec

3. Explain about the basic concepts of MANET.


Basic concepts of Ad Hoc
Networks
•What is adhoc network ?
It is a network which is formed
Without any central infrastructure.
•Adhoc network can be formed ?
Instantly
•Communication can be carried out using ?
Radio waves.
•Any where & Any time.
•Dynamic topology
•Data can be exchanged by wireless interface

9
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

MANET Communication
• Single hop communication- direct
• Multi hop communication- for away source
node

4. What are the differences between cellular n/w and MANET network.

10
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)
5. List out the Applications of MANET.

6. Design issues of MANET.

Design issues in ad hoc wireless N/Ws


• Medium access scheme
• Routing
• Multicasting
• Transport layer protocol
• Pricing scheme
• QoS
• Self-organization
• Security
• Addressing and service discovery
• Energy management
• Deployment considerations

11
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Medium access scheme

• Distributed operation
• Synchronization
• Hidden terminal problem
• Exposed terminal problem
• Throughput
• Access delay
• Real time traffic support
• Resource reservation
• Ability to measure resource
availability
• Capability for power control
• Adaptive rate control
• Use of directional antennas

Routing
• Route selected based on hop
count
Requirements of routing
 Minimum delay
 Quick route configuration
 Loop free routing
 Distributed routing approach
 Minimum control overhead
 Scalability
 QoS
 Time sensitive traffic and security
Major design issues
 Mobility
 Bandwidth constraint
 shared channel
 Battery power
 Storage capacity

12
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Multicasting

• What is Multicasting ?
Transmission of Same
message
• To ?
A group of mobile nodes
• In ?
Single transmission.
Major design issues
• Efficiency
• Control overhead
• QoS
• Scalability and security

Transport layer protocol


• Protocols are used to Set up and maintain ?
End-to-end connection.
• Focus on?
Flow control and congestion control
• What is TCP ?
• Transfer Control Protocol.
• It is a connection oriented protocol.
• Used in ?
• Wired Networks.
• Performance in TCP is degraded due to
 frequent path breaks
 High mobility
 Bandwidth
 Power
 Channel error rate
 Frequent network partitions
• TCP is divided into two – More packet loss

13
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

• Performance in TCP is
degraded due to
 frequent path breaks
 High mobility
 Bandwidth
 Power
 Channel error rate
 Frequent network
partitions

Pricing scheme
• 1 (sender node)-5(receiver node)
• 2(power off)
• 1-2-5 (optimal path) – not effective

14
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

QoS
• If there is a better coordination and cooperation between ?
- Service provider and the user
- then high QoS can be achieved.
QOS can differ from application to application.
• Bandwidth and delay are important parameters for ?
• Multimedia applications
• Identifying trusty nodes and routing packets through them are
key parameters of ?
• Defense applications.
• Multiple link disjoint paths and availability are the key
parameters of ?
• Emergency and rescue operations related applications.

Self-organization
• Self – configure
• Self Organization includes ?
- Neighbour discovery.
- Topology organization.
- reorganization.
• Topology can be varied – high mobility, node
failures and frequent N/W partitioning
• Every node maintain the updated information
• Beacon signals – transferred to all nodes

15
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Security
• Passive attack :
• Caused by ?
• Malicious nodes present in the network.
• To obtain ?
• Information being exchanged in network.
• This type of attacks would not disturb network operation.
• Active attack - disturb the N/W operation
 Internal attack –attackers within the network
 External attack - attackers external the network.
• Some other security threats are ?
-DoS (Denial of service)
- Information disclosure and interference.

Addressing and service discovery


• Address of mobile node is ?
Globally unique identifier
• Used for ?
Communication in Adhoc network.
• Since nodes join into a ?
new network and leave from the current network any time
• Any auto configuration scheme is required to ?
Allocate non duplicate addresses to the nodes.
• Adhoc n/w also requires ?
A duplicate address-detection mechanism
• In order to maintain ?
Unique addressing throughout the network.

16
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Energy management
• In a node,
• It is the process of managing ?
- the sources and consumers
• Of ?
- energy
• To ?
- boost up the lifetime of the node in the network.
Four categories.
• Transmission power management
• Battery energy management
• Processor power management
• Device power management

• Functions of energy management mechanisms are ?


• Battery life enhancing of a node
• Determine the routing path with minimum energy consumption.

Deployment considerations

• Low cost deployment


• Short deployment time
• Re-configurability
• Non-estimation of future traffic

17
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

UNIT II
SENSOR NETWORKS – INTRODUCTION & ARCHITECTURES

PART A
1. What are the effects of exposed terminal problem in wireless networks? (N/D-13)
The effects of exposed terminal problem in wireless networks are
1. Channel throughput is reduced
2. Inefficient bandwidth utilization
3. Reusability of radio spectrum affected
2. What are the mechanisms used in the MAC layer?
The mechanisms used in the MAC layer are
1. Contention based protocols
2. Contention based protocols with reservation mechanisms
3. Contention based protocols with scheduling mechanisms
4. Protocols with directional antennas

3. List the five phases of FPRP. (N/D-13)


The five phases of FPRP are
1. Reservation request phase
2. Collision report phase
3. Reservation confirm phase
4. Reservation acknowledge phase
5. Packing/elimination phase

4. Give the difference between AODV and DSR.


• DSR has less routing overhead than AODV.
• AODV has less normalized MAC overhead than DSR.
• DSR is based on a source routing mechanism whereas AODV uses a
combination of
• DSR and DSDV mechanisms.
• AODV has better performance than DSR in higher-mobility scenarios.

DSR has less frequent route discovery processes than AODV

5. Mention any four qualities of service metrics that are used to evaluate the
performance of the network.
The QOS metrics that are used to evaluate the performance of the network are
1. Minimum Bandwidth
2. Maximum Delay
3. Maximum Delay variance (Jitter)
4. Maximum packet loss rate

18
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)
5. Security – Military
6. Availability of network – Emergency

PART B
1. Design issues in MAC protocol.

Design issues
• Bandwidth efficiency
Bandwidth is restricted – MAC
protocol is responsible- divide the bandwidth
into effective manner

Efficiency = bandwidth used for actual data


transmission/ total bandwidth

QoS support
• Due to mobility of nodes from time to time
QoS is not effective

19
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Synchronization
• Transmission between the
sender and receiver nodes
• has to be synchronized for ?
- achieving error free
- Minimized packet loss
transmission.
• Synchronization is also
important in ?
- bandwidth reservation.
• It requires ?
- exchange of control
packets between sender
and receiver.

Hidden terminal problem


- sender nodes are hidden from each other

20
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

21
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

2. Classification of MAC Protocol.

22
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

3. Explain about contention based protocol

Contention based protocols


• No nodes make prior reservation
• When node wants to transmit to other node-
compete with all other node – transmit
• Do not guarantee for QoS
Sender – initiated protocol
Receiver – initiated protocol

4. Contention based protocol with reservation mechanisms.

23
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)
Contention based protocols with reservation
mechanism

• Provide guarantee for QoS


• Reserve the bandwidth prior
Synchronous protocols
Asynchronous protocols

Contention based protocols with


scheduling mechanism

• Packet scheduling at nodes


• Scheduling nodes for accessing the channel

5. Contention based MAC protocol and its types.

Contention based MAC protocol


• No reservation
• Compete all the nodes
• Node capture the channel – winning node
• Protocols are,
 Media access protocol for wireless LAN
 Floor acquisition multiple access protocols
 Busy tone multiple access protocols
 MACA – by invitation
 Media access with reduced handshake

24
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)
UNIT III
WSN NETWORKING CONCEPTS AND PROTOCOLS
PART A
1. List out the issues in Ad Hoc networks.
Medium access scheme
Routing
Multicasting
Transport layer protocol
Pricing scheme
QoS provisioning
Self-organization
2. What is the approach used to find link stability in ABR?
Associativity-based routing (ABR) protocol selects route based on the stability of
the wireless link. A link is classified as stable or unstable based on its temporal
stability. Temporal stability is determined based on number of beacon signal that
node receives from its neighbors.
Large number of beacon signals implies stable link
Lesser number of beacon signals implies unstable link

3. What is the need for power management in Adhoc network? (N/D-15)


In Adhoc networks, the routers are power constrained just as the nodes. There is
limitation in availability of power for operation. The power management is needed
for
1. Efficient utilization of energy
2. Increase in life time of the network
3. Portability, weight, size of the hand held devices
4. Difficulties in replacing batteries
5. Improving channel utilization
6. Selection of optimal transmission power

4. What is hybrid routing protocol?


Hybrid routing protocol combines the features of table driven and on demand
routing protocol. It uses table driven routing at a defined local zone and on-
demand routing beyond routing (local) zones

5. Where is network layer solution used for QoS?


Network layer solution for QoS is used for
1. Enduring end-end resource negotiation
2. Reservation and
3. Reconfiguration

25
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

PART B
1. Major design issues in routing.

ISSUES IN DESIGNING ROUTING PROTOCALS FOR


AD HOC NETWORKS.

• Mobility
• Bandwidth constraint
• Error prone shared broadcast radio channel
• Hidden and exposed terminal problems
• Resource constraints
• Security issues

17

• Mobility cause frequent


path break.

19

26
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Bandwidth Constraint

20

Error Prone Shared


• Collision occur at node because of ?
• Hidden and exposed terminal problem.

21

27
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

2. Types of adhoc routing protocol.

Types of ad hoc routing protocol


• Proactive or table driven routing protocols
• Reactive or on demand routing protocols
• Hybrid routing protocols

22

Proactive
• Other name table driven routing Tables – Updated periodically.
protocol To ?
• Each node maintains a routing Maintain the current stable/
table. available paths.
• Routing table contains up to date This can be achieved by ?
routing information of the entire Exchanging or broadcasting the
network. periodic beacon signals between
• Whenever a node wants to send nodes.
a packet to the receiver node, So that,
- it looks up in own routing table Each node can have the knowledge
To ? about the complete network
Find the routing table topology.
To ? Hence,
Find the routing path Each node can update its routing
From ? table based on beacon signal it
Itself to receiver. has received from its negihbours.
23

28
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Reactive routing protocol


• On demand routing protocols

• Mixed:
• Best features of two.

24

3. Types of proactive routing protocols.

Proactive Routing Protocols


• Protocols which use the concept of Proactive
routing
– Destination sequenced distance vector routing
protocol
– Wireless routing protocol
– Cluster –head gateway switch routing protocol
– Fisheye state routing

25

29
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Destination sequenced distance


vector routing protocol
• @ DSDV Protocol in adhoc.
• One of the Popular proactive routing protocols
• DSDV-each node keeps record of route
information- form of routing table

26

Wireless routing protocol


• It is one of the Proactive routing protocol
• When compare with DSDV , WRP differs-table
maintenance & procedures in updating
routing tables.
• WRP- maintains 4 tables
– Distance table
– Routing table
– Link cost table
– Message re-transmission list
36

30
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

38

39

31
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

4. Explain about reactive routing protocol / on demand routing protocol.

Reactive Routing Protocols


• Dynamic source routing protocol
• Ad hoc On-demand routing protocol
• Temporarily ordered routing algorithm
• Location aided routing
• Associativity based routing
• Signal stability based routing protocol
• Flow oriented routing protocol.

43

• Dynamic Source Routing (DSR) Protocol.


• It discover a route between ?
• Sender and destination when required.
• Operation is based on source routing.
• Sender knows complete route to reach the
destination.
• Each data packet carries the Source route in
the packet header.
44

32
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

• Since each packet carries the complete route


information in the packet.,
• The intermediate nodes do not maintain
routing information to route the packets to
the destination.
• Nodes which use reactive routing protocol
does not maintain routing table.
• Hence, number of messages exchanges
between nodes is very low and hence leads to
less network overhead.

45

47

33
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

AODV Protocol
• Ad hoc on demand routing protocols
• Used in MANET.
• Like DSR (Dynamic Source Routing) AODV Works in
two phases.
- Route discovery
- Route maintenance.
Only difference between DSR & AODV is:
Source will not carry the complete path.
Each node only knows its previous hop and next hop
information of the established path. 55

58

34
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Temporarily Ordered routing Algorithm.


(TORA)
• Reactive Routing protocol.
• Works on ‘link reversal algorithm’
• Main motive of TORA ?
• Reduce
• the transmission of ?
• Control messages in mobile environment.
• Performs ?
- Route discovery
- Route maintenance
- Removing route if not valid.
• Every node maintains local topology based on ?
• Information received from its neighbours.
• In TORA, nodes have an ability to discover the network the partitions. 60

64

35
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

67

68

36
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

5. Explain about CEDAR,ZRP.

81

82

37
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

UNIT- IV
SENSOR NETWORK SECURITY

PART-A

1. What is power consumption and energy efficiency? (M/J-14)

The simplest interpretation of energy efficiency is the energy required to transmit


and receive a single bit. Also, to be suitable for use in WSNs, transceivers should
be switchable between different states, e.g. active and sleeping.
The idle power consumption in each of these states and during switching
between them is very important.

2. What is Receiver Sensitivity?

The receiver sensitivity of the radio front end is given as the ratio of the radiated
power to the overall power consumed by the front end; for a power amplifier; the
efficiency describes the ratio of the output signal‟s power to the power consumed
by the overall power amplifier.

3. What is Active and Passive Sensors? (M/J-13)

Active sensors
This last group of sensors actively probes the environment.
These are quite specific-triggering an explosion is certainly not a lightly under
taken action-and require special attention.

Passive, Omni-directional sensors


These sensors can measure a physical quantity at the point of the sensor node
without actually manipulating the environment by active probing-in this sense,
they are passive.
There is no notion of “direction” involved in these measurements.

Passive, narrow-beam sensors


These sensors are passive as well, but have a well-defined notion of direction of
measurements. A typical example is a camera, which can “take measurements”
in a given direction, but has to be rotated if need be.

38
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

PART-B
1. Explain about sensor node architecture.

Sensor node architecture


• Sensor node is a device used in sensor
network for performing
Data gathering
Processing
Communicating with other sensor nodes

• Sensing Unit
• Processing Unit
• Communication Unit
• Battery

39
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Architecture of a sensor node

Sensing unit
• Measure the physical quantities (temperature,
pressure etc..)
• Produce analog signals.
• ADC: Convert analog to digital signal
• Sensor node is small size, so it consumes
energy during operation.

40
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Processing unit
• It perform specific task, processing data and
control the operation of other components in
the sensor node
• External memory – store the collected
information
• Flash memory – low cost and high storage
capacity

41
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Power supply unit


• Consumes power for sensing, data gathering,
communicating and data processing
• Sensor nodes consumes more power for data
communication
• Changing the sensor node can be costly
• Ensure to take Adequate energy

42
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Hardware subsystems of a sensor node


• Computing subsystem
• Power supply subsystem
• Communication subsystem
• Sensing subsystem

Computing subsystem

• Each sensor node consists of microprocessor


to control the sensor
• Microprocessor is responsible for
Executing and managing communication
protocol
Data processing and manipulation
Error correction and encryption
Digital modulation and demodulation

2. Discuss about hardware subsystem of sensor node.

43
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Power supply subsystem

• Each sensor – battery – limited power


• Power supply subsystem – monitor the
amount of power used by the sensor node

Communication subsystem

• Short range radios are used to enable the


communication between sensor nodes
• Transmit mode – high energy consumption
• Receive mode - high energy consumption
• Idle mode
• Sleep mode

44
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Sensing subsystem

• Sensing the environment and exchanging the


information with each other sensor nodes

3. Discuss about the software subsystems of wsn

Software subsystems of a sensor node


1. Operating system (OS) microcode
2. Sensor drivers
3. Communication Processor
4. Communication drivers
5. Data-processing mini-apps

45
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

46
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Operating system (OS) microcode

• OS microcode is used by High level module of


node resident software
• It protect the software from the machine level
functionality

Sensor drivers

• These drivers manage the


key functions of
transceivers which are
embedded in sensors
• Sensors are plug-in type
• Depending upon the
operating environment of
sensor nodes, the
configuration and settings
must be installed into the
sensor.

47
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Communication Processor

• Routing the packets


• Buffering
• Forwarding packets
• Contention mechanisms using MAC protocols
• Encryption and error correction

Routing the packets

48
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Buffering

Packet forwarding

49
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

4. Data aggregation strategies in WSN.

Data Aggregation Strategies of WSN


• To avoid the usage of more resources and
battery power data sensed by sensor nodes
must be aggregated and disseminated to
other nodes.
• Collecting the information from several nodes-
data aggregation
• Enhance the life time

50
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Continuous packet sensing and Dissemination

• Does not perform actual aggregation – zero


aggregation
• Fixed time interval – sense the data –
immediately transmit the received data to
cluster head
• Need fresh message – very urgent case – CPSD
is required

Programmed packet collection and


dissemination
• Dissemination time interval is set
• Buffer overflow occur before dissemination
time interval, old packet is replaced by new
packet
• This scheme is used when not a critical case.

51
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Continuous packet sensing and Dissemination

• Does not perform actual aggregation – zero


aggregation
• Fixed time interval – sense the data –
immediately transmit the received data to
cluster head
• Need fresh message – very urgent case – CPSD
is required

Continuous packet collection and


dissemination
• Each node uses buffer – to store the collected
and sensed data
• Sensor nodes sense the data – until fill the
buffer
• Buffer is filled – data dissemination will be
started
• It reduces highly network overhead and
consumption of power

52
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Programmed packet collection and


dissemination
• Dissemination time interval is set
• Buffer overflow occur before dissemination
time interval, old packet is replaced by new
packet
• This scheme is used when not a critical case.

Programmed Packet aggregation and


Dissemination
• Each node stored only aggregated data not
sensed data
• Aggregation functions are AVG,MIN,MAX and
STDDEV etc.

53
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Weighted event and demand based


data aggregation
• Below or above the fixed threshold, sensed
data can be stored in each node
• Disseminated to cluster head
• Cluster head set the weight based on distance
between cluster head to sensor node
• Based on the weight data can be disseminated

Data relaying in WSN


• Event node
collect the information and reported to some
other node
• Sink node
collect the events by a node

54
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Data diffusion
Two steps
• Interest propagation
Broadcast interest (temperature) – other node
maintain the received interest
• Data propagation
Data propagation includes the shortest path

5. Algortihms used in wsn.

Algorithms used
• Flooding
• Gossiping
• Rumor routing
• Sequential assignment routing
• Directed diffusion

55
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

Rumor routing

• Agent based routing algorithm


• Packets are in the form of agents or ants
disseminated among nodes to find out
shortest path

Sequential assignment routing

• It generates more number of trees


• From sender node to which node has high
delay and low throughput that path will be
removed

56
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)
UNIT-V
SENSOR NETWORK PLATFORMS AND TOOLS

PART-A

1. What is the two domain classification of QOS?


1. End to End QOS
2.Mobile QOS

2. How to determine the distance in triangulation? (N/D-13)


Triangulation is the method for finding location of unknown nodes is
localization triangulation method in which three or four known nodes along
with (RSSI) signal as distance based measurement are used.

3. What are the different types of energy sufficient routing techniques?


Lifetime Prediction Routing (LPR)
Energy Saving Dynamic Source Routing
Energy Dependent DSR (EDDSR)
Energy Efficient broadcast OLSR

4. What is random access protocol?


The nodes are uncoordinated, and the protocols operate in a fully
distributed manner.
Random access protocols often incorporate a random element.
Very important access protocols is the ALOHA.

5. What is energy efficient routing design?


Energy efficient routing protocol is designed based on the energy
constraint of the sensor node. The designed protocol uses less amount of
energy by reducing number of bits in packets and by making less duty
cycle

PART-B

1. Explain about OLSR.

57
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

2. Explain about Localization

58
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

59
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

60
KONGUNADU COLLEGE OF ENGINEERING AND TECHNOLOGY
(AUTONOMOUS)
NAMAKKAL TRICHY MAIN ROAD, THOTTIAM (Tk) TRICHY (DT)

61

You might also like