You are on page 1of 6

I)

The types of nodes used in the system can be stationary node or mobile based on the object type:

- Sensor node
- Cluster head node
- Sink node
- Base station

For example, in the train and vehicle, the mobile nodes can be deployed. However, in the building and
the open area ranging withing the 2000 KM of periphery, stationary node can be scattered in a sensor
field, which is an area where the sensor nodes are deployed. Following sensor node can be used for the
fire detection:

- Temperature Sensor
- Smoke Detector
- Humidity Sensor
- Light Sensor

There are four basic components in a sensor network:

- an assembly of deployed or localized sensors


- an interconnecting network
- a central point of data collecting
- a set of computing resources at the central point to handle data correlation, event trending,
status querying and data mining

The communication between nodes can be done at different stages. At the first stage, once the data is
their inside their server, the standard Ethernet wired communication can be used. But to communicate
with their servers with gateway, GPRS is used.

Technology Range Speed


Ethernet 100m 10Mbps to 100Gbps
802.11 250m outdoor 7.2 to 150 Mbps

The application is not constrained as the deployment is done in the city area where we have abandoned
power supply available. The sensor nodes can communicate among themselves using radio signals. A
wireless sensor node is equipped with sensing and computing devices, radio transceivers and power
components. The individual nodes in a wireless sensor network (WSN) are inherently resource
constrained: they have limited processing speed, storage capacity, and communication bandwidth. After
the sensor nodes are deployed, they are responsible for self-organizing an appropriate network
infrastructure often with multi-hop communication with them. Then the onboard sensors start collecting
information of interest. Wireless sensor devices also respond to queries sent from a “control site” to
perform specific instructions or provide sensing samples. The working mode of the sensor nodes may be
either continuous or event driven. Global Positioning System (GPS) and local positioning algorithms can
be used to obtain location and positioning information. Wireless sensor devices can be equipped with
actuators to “act” upon certain conditions.
The sensor nodes are usually scattered in a sensor field as shown in the following figure. Each of these
scattered sensor nodes has the capabilities to collect data and route data back to the sink and the end
users. Data are routed back to the end user by a multi-hop infrastructure-less architecture through the
sink as shown in the following figure. The sink may communicate with the task manager node via
Internet or Satellite.

II)

The cluster deployment pattern of sensor nodes can be used in the proposed system. Wireless sensor
nodes that are deployed at different places can collect data such as temperature and humidity and
deliver this highly important data in raw or processed form to a center via a base station (or sink node),
where incoming data can be analyzed automatically. The messages are transferred to other sensor
nodes towards the sink using multi-hop technique. When the sink receives multiple messages from
different direction, it realizes that there is a chance of fire. Thus, it sends a requirement packet to the
originating nodes and receives actual data along with the location of the originating node in response.
These data is used to generate a map of the location of the fire.

For example if there are 5 cluster levels (CL1 to CL5) in the system, every cluster in CL1 will have a
cluster head dynamically elected using LEACH. Nodes in L5 will send data to cluster head of L5 that
aggregates the data and send data to node to cluster head of L4. Nodes in Nodes in L4 will send data to
cluster head of L4 that aggregates the data along with data of L5 and send to cluster head of L3 and so
on. The lowest level cluster head tries to connect and send data to the base station.
III)

The network protocol stack should possess the following characteristics:

- Limited power
- Wireless
- Real time
- Location critical
- Robustness
- Scalability
- Self configuration
- Performance
- Quality

IV)

Yes, we need the time synchronization algorithm in the proposed system. The attributes/properties
required in the proposed protocol are as follows:

- Precision: Either the dispersion among a group of peers, or extreme error with respect to an
external standard.
- Lifetime: Which can range from persistent synchronization that lasts as long as the network
operates, to nearly immediate (useful, for example, if nodes want to compare the detection
time of a single event).
- Scope and Availability: The geographic span of lumps that are synchronized, and
completeness of coverage within that region.
- Efficiency: The time and energy expenditures needed to succeed synchronization.
- Light weight: The complexity of the system is designed low so that it can be programmed in
the sensor nodes. By having the time synchronization protocol tightly integrated with the
hardware the delay and variation of the processing may be smaller
- Cost and Form Factor: Which can become particularly important in wireless sensor
networks that involve thousands of tiny, one-use sensor nodes. The services provided by
existing time synchronization methods fall into many different points in this parameter
space. All of them make tradeoffs—no single method is optimal along all axes.

Large size WSNs use multi-hop communication for synchronization which reduces the time
synchronization accuracy level and also consumes more energy. Therefore, to enhance the precision
level of clock synchronization and to decrease the energy consumption, the TPSN protocol can be used.
With the TPSN timing synchronization protocol, we can improve the clock synchronization accuracy level
as well as reduce the energy consumption by reducing the communication range. Here, the root node
root node synchronizes all or part of the nodes in the sensor field in a hierarchical way. Before
synchronization, the root node constructs the hierarchy by broadcasting a level discovery packet . The
first level of the hierarchy is level 0, which is where the root node resides. This process continues until all
the nodes in the sensor field has a level number.

Since the proposed model consists of a set of stationary sensor nodes and a set of mobile nodes, these
mobile nodes have a locomotion capability which allows them to move throughout a sensing region.
These mobile nodes comprise of GPS system to broadcast the global time. The time synchronization
algorithm used here needs to efficiently exploits mobility of mobile nodes to synchronize the stationary
sensor nodes with global time. The mobile nodes are preferred for time synchronization because of the
following advantages:

- Long Network Life Time


- Improved Performance
- Accurate Clock Synchronization
- Additional Channel Capacity

V)

No, the proposed system does not need to implement the localization algorithm because the placement
of sensor node is already known.

VI)

Yes, clustering will be used in the proposed system. The method of transmission from the sensor to the
cluster head and the cluster head to the sink is based on the existing cluster structure. That is, the
methods for partitioning the sensor network into clusters and election of cluster heads are done by the
underlying cluster-based routing protocol.

LEACH is a protocol for forming efficient clustering; sensor nodes form local clusters by themselves and
distribute energy evenly. One node-forming cluster acts as a cluster head, and the sensor node with the
most energy operates as a cluster head; when its energy capacity becomes smaller than those of the
other nodes, another node with the most energy then performs the role of cluster head. The battery
drains quickly when a sensor node acts as a cluster head; the burden on the node operating as the
cluster head is, therefore, reduced by rotating the cluster heads. LEACH is currently on of the most
popular method for environmental monitoring system. However, LEACH may waste a lot of energy since
each individual cluster head operates independently in a fire monitoring system with a large number of
sensor nodes. The number of related clusters increases as the fire spreads widely. Increases in the
number of cluster heads sending information and the number of transmissions in the sensor network
will result in a reduction in energy efficiency.

The major difference between the sensor network cluster organization of an EFMP and that of existing
cluster-based routing protocols is that the fire monitoring system has a hierarchical cluster structure
that can be reorganized dynamically. As illustrated in the following figure, the cluster heads are layered
and classified into master heads and slave heads. The structural difference between a general cluster
structure and the proposed system general cluster structure is the presence of a master head that
collects and manages data from cluster heads. The master head collects information from the cluster
heads and sends the collected information to the sink node.
VII)

We can use the proactive routing algorithm in the fire monitoring system application because each
node in proactive routing protocols contains its own table of routing information. In other words,
the nodes in such type of routing protocols build routes before there is a need for these routes.
Whereas, in reactive routing protocols, the nodes build routes only when these routes are needed.
Consequently, the route discovery process in proactive protocols is performed faster than that
process exists in reactive protocols. Also, it relies on periodic dissemination of routing information to
maintain consistent and accurate routing tables across all nodes of the network.

VIII)

We can use TDMA MAC within a cluster and sensor MAC (SMAC) protocol among clusters in the fire
monitoring system that can satisfy the following requirement:

- Energy efficient: Large number of sensor nodes are deployed in the target region, which
have limited battery and not possible to recharge or replace it So it is necessary to use the
energy efficient protocol at every layer.
- Latency: All the data collected at a node are sent to the sink node so that immediate action
should be taken at sink Latency basically depends upon the traffic in the network, collision
and bandwidth of the network
- Throughput: Throughput requirement is also dependent upon the application Some sensor
application requires more data for that application throughput should be high.
- Fairness: It is necessary to ensure that the sink node is receiving data from at the node fairly
in low bandwidth WSN.
- Security: WSN MAC protocols need to secure for any application of WSN The unsecure MAC
protocol can cause to energy wastage.

The task of the MAC protocol is that they manages the transmission among the nodes and detect the
collision. In the fire monitoring system, , there is node which is power full than the reaming senor field
which controls the entire sensor field. And they allocate outside the sensor which is called base station.

S-MAC use such method near decrease energy consumption and by auto configuration. If a node is
periodically sleep they reduce the power feeding. Cluster and virtual cluster are also to auto
synchronization on the sleep modes. The primary components of SMAC are:

- Periodic Listen and Sleep: Nodes periodically sleep to reduce duty cycle to ~10%.
- Collision Avoidance: Perform carrier sense before initiating a transmission to avoid collision.
- Overhearing Avoidance: A node can go to sleep whenever its neighbor is talking with
another node.
- Message Passing: Message can be passed by dividing into fragments and transmit all in burst

IX)

The protocol stack for WSNs consists of five standard protocol layers trimmed to satisfy typical sensors
features, namely, application layer , transport layer , network layer , data-link layer, and physical layer .
These layers address network dynamics and energy efficiency. Functions such as localization, coverage,
storage, synchronization, security, and data aggregation and compression are network services that
enable proper sensors functioning. Implementation of WSNs protocols at different layers in the protocol
stack aims at minimizing energy consumption , and end-to-end Congestion control: end-to-end delay,
and maintaining system efficiency.

The network protocol stack has five layers and it satisfies the characteristics mentioned in part III as
follows:

- Application: It links the user applications with the underlying layer.


- Transport: Allows connecting the WSN to the external network where some nodes act as a
gateway to external network.
- Network: Enables routing of packets in the sensor network in energy efficient manner
- Data Link: Enables most of the communication tasks within one hop. It also creates and
maintains the list of neighboring nodes.
- Physical: Provides management of the wireless interface

You might also like