SlideShare une entreprise Scribd logo
1  sur  36
Power Saving in  Wireless Sensor Networks Eng. MshariAlabdulkarim
Energy Saving in WSNs Outline: ,[object Object]
Introduction.
Power Consumption in WSNs.
Sleep-wake Scheduling.
MAC Protocol for WSN.
In-network Processing.
Network Coding.
Communication Protocol.,[object Object]
Energy Saving in WSNs Introduction Wireless Sensor Network? A wireless sensor network is a collection of nodes “sensors” organized into a cooperative network. The nodes communicate wirelessly and often self-organize after being deployed in an ad-hoc fashion. Base Station Detection Sensor Field
Energy Saving in WSNs Introduction (Cont.) What are the components of the wireless sensor? Processor. Memory. RF transceiver. Power source. Sensor.
Energy Saving in WSNs Introduction (Cont.) What is the goal of the sensor node? The goal from the sensor node is to collect the data at regular intervals, then transform the data into an electrical signal and finally send the signal to the sink or the base node.
Energy Saving in WSNs Introduction (Cont.)
Energy Saving in WSNs Introduction (Cont.) Wireless Sensor Network Applications: ,[object Object],environmental and habitat monitoring, precision agriculture, indoor climate control, surveillance, treaty verification, and intelligent alarms. ,[object Object],structural monitoring, condition-based equipment maintenance, medical diagnostics, and urban terrain mapping. ,[object Object],wildlife habitats, disaster management, emergency response, ubiquitous computing environments, asset tracking, healthcare, and manufacturing process flow.
Energy Saving in WSNs Introduction (Cont.) Wireless Sensor Network Example (1):
Energy Saving in WSNs Introduction (Cont.) Wireless Sensor Network Example (2):
Energy Saving in WSNs Introduction (Cont.) Short Video
Energy Saving in WSNs Power Consumption in WSNs The power issue in the wireless sensor network is one of the biggest challenges, because the sensor has a limited source of power which is also hard to replace or recharge “e.g. sensors in the battle field, sensors in a large forest … etc”.  Why limited source of power? Inexpensive nature. Limited size and weight. Redundant nature.
Energy Saving in WSNs sources of power consumption: Useful power consumption: ,[object Object]
Processing query requests.
Forwarding queries and data to the neighbors.Wasteful power consumption: ,[object Object]
Retransmitting because of collisions “e.g. two packets arrived at the same time at the same sensor”.
Overhearing “when a sensor received a packet doesn’t belong to it”.
 Generating and handling control packets.
Over-emitting “when a sensor received a packet while it is not ready”.,[object Object]
In-network Processing.
Network Coding.
Communication Protocol.,[object Object]
Energy Saving in WSNs Power consumption model: Time Wake Wake Sleep Sleep Sleep Sleep and Wake Duty Cycle
Energy Saving in WSNs
Energy Saving in WSNs On-demandScheme: Strategy: Sensor should be awakening just when it receives a packet from neighbors. Advantages: ,[object Object]
The best sleep-wake scheme for the applications with low duty cycle.Disadvantages: ,[object Object]
Not suitable for Disruption Tolerant Network (DTN).,[object Object]
Energy Saving in WSNs Scheduled Rendezvous Scheme (Cont.): Advantages: ,[object Object],Disadvantages: ,[object Object],[object Object]
Energy Saving in WSNs Asynchronous Scheme (Cont.): Advantages: ,[object Object]
Allow each node in the WSN to set its own sleep/wake schedule independently.

Contenu connexe

Tendances

Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
Chandra Meena
 
Power Management in Wireless Sensor Network
Power Management in Wireless Sensor NetworkPower Management in Wireless Sensor Network
Power Management in Wireless Sensor Network
Bhavik Panchal
 

Tendances (20)

Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACH
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
OLSR | Optimized Link State Routing Protocol
OLSR | Optimized Link State Routing ProtocolOLSR | Optimized Link State Routing Protocol
OLSR | Optimized Link State Routing Protocol
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networks
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Network Mnagement for WSN
Network Mnagement for WSNNetwork Mnagement for WSN
Network Mnagement for WSN
 
Leach
Leach Leach
Leach
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network ppt
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
 
wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architecture
 
Dsdv
DsdvDsdv
Dsdv
 
Power Management in Wireless Sensor Network
Power Management in Wireless Sensor NetworkPower Management in Wireless Sensor Network
Power Management in Wireless Sensor Network
 

En vedette

Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
Elham Hormozi
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Sigma web solutions pvt. ltd.
 
Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811
praveen369
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
rajatmal4
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
Maha Saad
 

En vedette (20)

Issues of Wireless Sensor Networks
Issues of Wireless Sensor NetworksIssues of Wireless Sensor Networks
Issues of Wireless Sensor Networks
 
Sensor Network
Sensor NetworkSensor Network
Sensor Network
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applications
 
Proyecto base de datos 2
Proyecto base de datos 2Proyecto base de datos 2
Proyecto base de datos 2
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Lecture3 - Machine Learning
Lecture3 - Machine LearningLecture3 - Machine Learning
Lecture3 - Machine Learning
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networks
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
 
Session 5.6 towards a semantic outlier detection framework in wireless sens...
Session 5.6   towards a semantic outlier detection framework in wireless sens...Session 5.6   towards a semantic outlier detection framework in wireless sens...
Session 5.6 towards a semantic outlier detection framework in wireless sens...
 
Linear books to open world adventure
Linear books to open world adventureLinear books to open world adventure
Linear books to open world adventure
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
 
Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 

Similaire à Power Saving in Wireless Sensor Networks

Similaire à Power Saving in Wireless Sensor Networks (20)

E044033136
E044033136E044033136
E044033136
 
Wsn ppt original
Wsn ppt originalWsn ppt original
Wsn ppt original
 
Throughput maximization technique in wireless sensor network using data aggr...
Throughput maximization technique in wireless sensor network using data  aggr...Throughput maximization technique in wireless sensor network using data  aggr...
Throughput maximization technique in wireless sensor network using data aggr...
 
WSN
WSNWSN
WSN
 
WSN
WSNWSN
WSN
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor network
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
MAC Protocol.pdf
MAC Protocol.pdfMAC Protocol.pdf
MAC Protocol.pdf
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
 
Ppt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semPpt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th sem
 
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORKAN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKS
 
Gm3411871190
Gm3411871190Gm3411871190
Gm3411871190
 
Modified LAEEBA Routing in WBAN
Modified LAEEBA Routing in WBANModified LAEEBA Routing in WBAN
Modified LAEEBA Routing in WBAN
 
Wireless sensor networks dcs
Wireless sensor networks dcsWireless sensor networks dcs
Wireless sensor networks dcs
 
WSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.pptWSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.ppt
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
 

Plus de Mshari Alabdulkarim (6)

Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...
 
Generate and test random numbers
Generate and test random numbersGenerate and test random numbers
Generate and test random numbers
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...
Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...
Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...
 
WPA2
WPA2WPA2
WPA2
 
CDMA
CDMACDMA
CDMA
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Power Saving in Wireless Sensor Networks

  • 1. Power Saving in Wireless Sensor Networks Eng. MshariAlabdulkarim
  • 2.
  • 9.
  • 10. Energy Saving in WSNs Introduction Wireless Sensor Network? A wireless sensor network is a collection of nodes “sensors” organized into a cooperative network. The nodes communicate wirelessly and often self-organize after being deployed in an ad-hoc fashion. Base Station Detection Sensor Field
  • 11. Energy Saving in WSNs Introduction (Cont.) What are the components of the wireless sensor? Processor. Memory. RF transceiver. Power source. Sensor.
  • 12. Energy Saving in WSNs Introduction (Cont.) What is the goal of the sensor node? The goal from the sensor node is to collect the data at regular intervals, then transform the data into an electrical signal and finally send the signal to the sink or the base node.
  • 13. Energy Saving in WSNs Introduction (Cont.)
  • 14.
  • 15. Energy Saving in WSNs Introduction (Cont.) Wireless Sensor Network Example (1):
  • 16. Energy Saving in WSNs Introduction (Cont.) Wireless Sensor Network Example (2):
  • 17. Energy Saving in WSNs Introduction (Cont.) Short Video
  • 18. Energy Saving in WSNs Power Consumption in WSNs The power issue in the wireless sensor network is one of the biggest challenges, because the sensor has a limited source of power which is also hard to replace or recharge “e.g. sensors in the battle field, sensors in a large forest … etc”. Why limited source of power? Inexpensive nature. Limited size and weight. Redundant nature.
  • 19.
  • 21.
  • 22. Retransmitting because of collisions “e.g. two packets arrived at the same time at the same sensor”.
  • 23. Overhearing “when a sensor received a packet doesn’t belong to it”.
  • 24. Generating and handling control packets.
  • 25.
  • 28.
  • 29. Energy Saving in WSNs Power consumption model: Time Wake Wake Sleep Sleep Sleep Sleep and Wake Duty Cycle
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. Allow each node in the WSN to set its own sleep/wake schedule independently.
  • 37.
  • 38. Energy Saving in WSNs S-MAC Protocol: Stand for: Sensors Medium Access Control. Strategy: All node follow a periodic sleep/wake cycle, where the waking time is about 10% of the sleeping time, and the nodes that are close to each other synchronize their active cycles together. Listen Listen Sleep Sleep Time T
  • 39.
  • 42.
  • 43. Energy Saving in WSNs Questions? What S-MAC, T-MAC, B-MAC are doing? Trying to minimize idle listen as mush as possible. Why radio should listen the channel? To minimize collisions. How can we make collision free without listen the channel? TDMA “Time Division Multiple Access”.
  • 44. Energy Saving in WSNs In-network Processing After the sensors detect phenomena or change, they generate an event to the user and by that we will have a huge number of transmissions which will consume the power of the sensors. Strategy: Reduce the number of transmissions by aggregating several eventsinto a single event. Aggregation takes place if the data arriving to the common node have same attributes of the phenomenon being sensed.
  • 45.
  • 46.
  • 47.
  • 48. Energy Saving in WSNs Communication Protocol The goal from adjusting the communication protocol “Medium Access Control” is to avoid the collisions by scheduling nodes onto different sub-channels that are divided either by time “TDMA”, frequency “FDMA” or orthogonal codes “CDMA”.
  • 49. Energy Saving in WSNs Scheduled Protocol: Strategy: Prevent the collisions by reserving and scheduling the resources. Example: The best protocol considered as scheduled protocol is the TDMA “Time Division Multiple Access”, where the time is divided into N slots and each slot can be used by only one sensor. Frame 1 Frame 2 1 2 3 N 1 2 3 N Time TDMA MAC Protocol
  • 50.
  • 51. Saving the power from being wasted by turning off the radio out the allocated time slot.
  • 52.
  • 53.
  • 55.