SlideShare une entreprise Scribd logo
1  sur  22
Seminar Report on
ENHANCING THE PERFORMANCE OF WSN
SUBMITTED BY: DHEERAJ KUMAR
( ROLL NO.- 1409131029)
DEPARTMENT OF ELECTRONICS ENGINEERING
JSS ACADEMY OF TECHNICAL EDUCATION
C-20/1 SECTOR-62, NOIDA
2016- 2017 TABLE OF CONTENTS
Page
ABSTRACT ....................................................................................................................3
LIST OF FIGURES...........................................................................................................4
LIST OF ABBREVIATIONS ..............................................................................................5
CHAPTER 1 (INTRODUCTION)....................................................................................6
1.1. What is WSN?......................................………………………………………………6
1.2 History………………………………………………………………................................ 7
1.3 WSN Architecture………………………………………………………………................9
CHAPTER 2 (ENHANCING THE PERFORMANCE OF WSN) .......................................10
2.1 Performance Parameters …..………………………………………………………..……10
2.1.1 Energy Consumption.........................................................10
2.1.2 Delay..................................................................................10
2.1.3 Throughput........................................................................11
2.2 Challenges in WSN ……………....…,….……………………………………………………11
2.2.1 Congestion Control Problems............................................11
2.2.1 Routing and Energy Consumption Problems ....................12
2.3 Priority Based Congestion Control Protocol .……………………………………..13
2.4 Low Energy Adaptive Clustering Hierarchy Protocol(LEACH) ..…………..14
CHAPTER 3 (APPLICATIONS OF WSN) ...................................................................16
CHAPTER 4 (RESEARCH CHALLENGES IN WSN) .....................................................19
CHAPTER 5 (CONCLUSION) ..................................................................................23
2
REFERENCES ……......................................................................................................24ABSTRACT
3
In the current time and next decades, Wireless Sensor Networks (WSNs) represents a new
category of ad hoc networks consisting of small nodes with three functions: sensing,
computation, and wireless communications capabilities. Many routing, power management, and
data dissemination protocols have been designed for WSNs where energy awareness is an
essential design issue to improve the overall performance of WSN. There are many approaches
and techniques explored for the optimization of energy usage in wireless sensor networks.
Routing represents one of these areas in which attempts for efficient utilization of energy have
been made. In this report, we report on the current state of the research on optimizing the
performance of WSN using various advanced approaches. There are various directions to
enhance and optimize the performance as: avoiding congestion and keep it within certain
controlled value, selecting the optimum routing approach, reducing the level of power
consumption to increase the life time of the sensor node and others. So, the major objective of
this paper is to investigate the various techniques used in improving and enhancing the
performance of WSN to let it be more reliable in various applications like: health care and
biomedical treatment, environment monitoring, military survival lance , target tracking,
greenhouse monitoring,…etc .LIST OF FIGURES
Figure 1.1 …………………………………………………………………………………..6
Figure 1.2 …………………………………………………………………………………..9
Figure 2.1 …………………………………………………………………………………..12
Figure 2.2 …………………………………………………………………………………..13
4
Figure 2.3
…………………………………………………………………………………..15LIST OF
ABBREVIATIONS
WSN Wireless Sensor Network
BS Base Station
DSN Distributed Sensor Network
WPAN Wireless Personal Area Network
PCCP Priority Based Congestion Control Protocol
5
LEACH Low Energy Adaptive Clustering HierarchyCHAPTER 1
INTRODUCTION
1.1 What is WSN?
The wireless sensor network is some type of an adhoc network. Mainly it consists of small light
weighted wireless nodes called sensor nodes, deployed in physical or environmental condition. It
measure the physical parameters such as sound, pressure, temperature, and humidity. These
sensor nodes deployed in large or thousand numbers and collaborate to form an ad hoc network
capable of reporting to data collection sink (base station).
Figure-1.1 Architecture of Sensor Network
6
Wireless sensor network have various applications like habitat monitoring, building monitoring,
health monitoring, military survival lance and target tracking. However wireless sensor network
is a resource constraint if we talk about energy, computation, memory and limited communication
capabilities. A typical wireless sensor network is comprised of tens, hundreds, or even thousands
of sensor nodes. Typically each sensor node is composed of a microcontroller, a radio transceiver,
one or more micro sensors, power source and other components. The microcontroller samples the
micro sensors, send the data, either with or without processing, through radio links to the
locations where the information is needed. Due to the limited radio range and the relatively larger
target areas, in many cases a multiple hop ad hoc wireless network is formed for the information
transmission. The devices that gather the information from the wireless sensor networks are
defined as base stations. There may be one or more base stations for a wireless sensor network.
The base stations may be static or mobile. However, for many applications, the sensor nodes
themselves are not moving, either due to the scenario requirements, or technical or economical
hindrance. All sensor nodes in the wireless sensor network are interacting with each other or by
intermediate sensor nodes. A sensor nodes that generates data, based on its sensing mechanisms
observation and transmit sensed data packet to the base station (sink). This process basically
direct transmission since the base station may locate very far away from sensor nodes needs.
More energy to transmit data over long distances so that a better technique is to have fewer nodes
sends data to the base station. These nodes called aggregator nodes and processes called data
aggregation in wireless sensor network.
1.2 History
The origin of the research on WSNs can be traced back to the Distributed Sensor Networks(DSN)
program at the Defense Advanced Research Projects Agency (DARPA) at around 1980. By this
time, the ARPANET (Advanced Research Projects Agency Network) had been operational for a
number of years, with about 200 hosts at universities and research institutes. DSNs were assumed
to have many spatially distributed low-cost sensing nodes that collaborated with each other but
7
operated autonomously, with information being routed to whichever node was best able to use the
information. At that time, this was actually an ambitious program. There were no personal
computers and workstations; processing was mainly performed on minicomputers and the
Ethernet was just becoming popular. Technology components for a DSN were identified in a
Distributed Sensor Nets workshop in 1978 (Proceedings of the Distributed Sensor Nets
Workshop, 1978). these included sensors (acoustic), communication and processing modules,
and distributed software. Researchers at Carnegie Mellon University (CMU) even developed a
communication-oriented operating system called Accent (Rashid & Robertson, 1981), which
allowed flexible, transparent access to distributed resources required for a fault-tolerant DSN. A
demonstrative application of DSN was a helicopter tracking system (Myers et al., 1984), using a
distributed array of acoustic microphones by means of signal abstractions and matching
techniques, developed at the Massachusetts Institute of Technology (MIT). Even though early
researchers on sensor networks had in mind the vision of a DSN, the technology was not quite
ready. More specifically, the sensors were rather large and This work was carried out during the
tenure of an ERCIM “Alain Bensoussan” Fellowship Program and is part of the MELODY
Project, which is funded by the Research Council of Norway under the contract number
187857/S10.
In the new wave of sensor network research, networking techniques and networked information
processing suitable for highly dynamic ad hoc environments and resource constrained sensor
nodes have been the focus. Further, the sensor nodes have been much smaller in size (i.e. pack of
cards to dust particle) and much cheaper in price, and thus many new civilian applications of
sensor networks such as environment monitoring, vehicular sensor network and body sensor
network have emerged. Again, DARPA acted as a pioneer in the new wave of sensor network
research by launching an initiative research program called SensIT. Which provided the present
sensor networks with new capabilities such as ad hoc networking, dynamic querying and tasking,
reprogramming and multitasking. At the same time, the IEEE noticed the low expense and high
capabilities that sensor networks offer. The organization has defined the IEEE 802.15.4 standard
(IEEE 802.15 WPAN Task Group 4, n.d.) for low data rate wireless personal area networks.
Countries such as China have involved WSNs in their national strategic research programmer’s
8
(Ni, 2008). The commercialization’s of WSNs are also being accelerated by new formed
companies like Crossbow Technology (Crossbow Technology, n.d.) and Dust Networks.
1.3 WSN Architecture
The architecture of WSN consist of sensor microcontroller unit antenna and transmitter &
receiver of the system, sensor and control units are connected to the battery for required power
supply voltage sensor sense the physical environment and send the input to the A/D converter to
convert it into digital form and then it is send to the control unit of microcontroller from where
the o/p’s are controlled by the mechanism stored in microcontroller unit.
Figure-1.2 Basic Block Diagram
CHAPTER 2
ENHANCING THE PERFORMANCE OF WSN
9
2.1 Performance Parameters
2.1.1 Energy Consumption
This is a primary design factor for any WSN. Power consumption should be made minimal in
order to prolong the lifetime of the network. In fact, “power conservation” is a distinguishing
factor between designing a WSN and designing other classes of wireless networks. The latter
may consider QoS parameters (like, delay, throughput, fairness, etc.) as key design requirements.
Based on this observation, research activities target the development of power-aware protocols
and algorithms for sensor networks. That is, power-awareness should be incorporated in every
stage of designing a WSN. In fact, power-awareness imposes constraints on the size and
complexity of a sensor node’s platform. In this context, hardware of sensor nodes should be
designed to be power-efficient.
2.1.2 Delay
Delay can take a long time for a packet to be delivered across intervening networks. In reliable
protocols where a receiver acknowledges delivery of each chunk of data, it is possible to measure
this as round-trip time. Due to congestion problem some time traffic will be occurs in the
network. So delay will be increases and reliability of data transmission also decreases. Delay
factor directly affect on network performance.
2.1.3 Throughput
Throughput is the amount of work done in a cycle.With the advent of sensor nodes with higher
communication and sensing capabilities, the challenge arises in forming a data gathering network
10
to maximize the network capacity. The channel sharing for higher data transmission leads to
interfering problems. The effects of interferences become increasingly important when
simultaneous transmissions are done in order to increase wireless network capacity. In such cases,
achieving a high throughput and low delay is difficult.
2.2 Challenges in WSN
2.2.1 Congestion Control Problems
The network congestion occurs when either:
- The incoming traffic exceeds the capacity of the outgoing link, or
- Link bandwidth drops because of channel fading caused by path loss.
Figure-2.1 Congestion Control Problem at a BS
2.2.2 Routing and Energy Consumption Problems
11
The limited energy supply of sensor nodes necessitates energy-awareness at most layers of
networking protocol stack including the network layer. In addition, many applications of sensor
networks require the deployment of a large number of sensor nodes making it impractical to build
a global addressing scheme. Moreover, in contrary to contemporary communication networks
almost all applications of sensor networks require the flow of sensed data from multiple sources
to a particular sink. These unique characteristics of sensor networks have made efficient routing
of sensor data one of the technical challenges in wireless sensor networks. While a number of
routing protocols pursued a data centric methodology by naming the data, some considered
clustering the sensor nodes in order to decrease the number of transmitted messages to the sink
node and have a more scalable setup. Other protocols either adopted a location-based routes setup
or strived to achieve energy saving through activation of a limited subset of nodes. In addition,
with the increasing interest in the applications that require certain end-to-end performance
guarantees, a few routing protocols have been proposed for providing energyefficient relaying of
delay-constrained data. While the goals of most published techniques are increasing network
lifetime and on-time delivery of data through clever architecture and management of the network,
none of the work considered the possibility of relocating the sink (gateway) node for enhanced
network performance.
Figure-2.2 Network Topologies with different Routes
12
2.3 Priority Based Congestion Control Protocol
• PCCP is a congestion control mechanism based on node priority index that is introduced
to reflect the importance of each sensor node.
• Nodes are assigned a priority based on the function they perform and its location.
• Nodes near the sink have a higher priority.
• The congestion is detected based on the ratio of sending rate to the packet arrival rate. If
the sending rate is lower, it implies that congestion has occurred.
Priority based Congestion Control Protocol, which introduced node priority index to reflect the
importance of each sensor node. This utilizes a cross-layer optimization and imposes a hop-by-
hop approach to control congestion. A new Queue based Congestion Control Protocol with
priority support, using the queue length as an indication of congestion degree. In this approach,
the rate assignment to each traffic source is based on its priority index as well as its current
congestion degree. A node priority-based congestion control protocol for wireless sensor
networks. In this, the node priority index is introduced to reflect the importance of each node and
uses packet inter-arrival time along with packet service time to measure a parameter defined as
congestion degree and imposes hop-by-hop control based measurement as well as node priority
index.
2.4 Low Energy Adaptive Clustering Hierarchy Protocol (LEACH)
• LEACH arranges the nodes in the network into small clusters and chooses one of them as
the cluster-head.
13
Figure-2.3 Diagram showing LEACH Protocol
• Nodes first senses its target and then sends the relevant information to its cluster-head.
Then the cluster head aggregates and compresses the information received from all the
nodes and sends it to the base station.
• The nodes chosen as the cluster head drain out more energy as compared to the other
nodes as it is required to send data to the base station which may be far located.
• Hence LEACH uses random rotation of the nodes required to be the cluster-heads to
evenly distribute energy consumption in the network.
CHAPTER 3
APPLICATIONS OF WSN
14
The applications for WSNs involve tracking, monitoring and controlling. WSNs are mainly
utilized for habitat monitoring, object tracking, nuclear reactor control, fire detection, and traffic
monitoring. Area monitoring is a very common application of WSNs, in which the WSN is
deployed over a region where some incident might be monitored. E.g., a substantial variety of
sensor nodes may very well be deployed over the battlefield to detect enemy intrusions rather
than using landmines. When the sensors detect case being monitored (heat, pressure, sound, light,
electro-magnetic flux, vibration, etc.), the big event needs to be reported to at least one in the
base stations, which often can than
take some appropriate action (e.g., send some text online or even a satellite). Wireless sensor
networks are utilized extensively within the water/wastewater industries. Facilities not wired for
power or data transmission can be monitored using industrial wireless I/O devices and sensor
nodes powered by solar panels or battery packs. Wireless sensor networks are able to use
numerous sensors to detect the existence of vehicles for vehicles detection. Wireless sensor
networks may also be employed to control the temperature and humidity levels inside
commercial greenhouses. If the temperature and humidity drops below specific levels, the
greenhouse manager might be notified via e-mail or a cellular telephone text, or host systems can
trigger misting systems, open vents, first
turn on fans, or control a multitude of system responses. Because some wireless sensor networks
are super easy to install, they've also been simple move if the needs with the application change .
There are lots of applications of WSN:
1. Process Management: Area monitoring is a very common using WSNs. In area monitoring,
the WSN is deployed spanning a region where some phenomenon is usually to be monitored. A
military example may be the use of sensors detect enemy intrusion; a civilian example would be
the geo-fencing of gas or oil pipelines. Area monitoring is most important part.
2. Healthcare monitoring: The medical applications might be of two sorts: wearable and
implanted. Wearable devices are applied to the body surface of the human or maybe at close
proximity from the user. The implantable medical devices are the ones that are inserted inside
your body. There are numerous other applications too e.g. body position measurement and of the
person, overall monitoring of ill patients in hospitals and also at homes.
15
3. Environmental/Earth sensing: There are numerous applications in monitoring environmental
parameters samples of which are given below. They share any additional challenges of harsh
environments and reduced power supply.
4. Polluting of the environment monitoring: Wireless sensor networks have been deployed in
lots of cities (Stockholm, London and Brisbane) to monitor the power of dangerous gases for
citizens. These can leverage the random wireless links instead of wired installations that also
make them more mobile for testing readings in several areas.
5. Forest fire detection: A network of Sensor Nodes is usually positioned in a forest to detect
every time a fire has begun. The nodes is usually with sensors to measure temperature, humidity
and gases which are produced by fire within the trees or vegetation. The first detection is
necessary to get a successful action of the fire fighters; As a result of Wireless as Sensor
Networks, the fire brigade are able to know when a fire begins you bet it can be spreading.
6. Landslide detection: A landslide detection system uses a wireless sensor network to detect the
slight movements of soil and modifications to various parameters that will occur before or
throughout a landslide. With the data gathered it may be possible to know the appearance of
landslides before it genuinely happens.
7. Water quality monitoring: Water quality monitoring involves analyzing water properties in
dams, rivers, lakes & oceans, and also underground water reserves. The application of many
wireless distributed sensors enables the creation of a accurate map on the water status, and allows
the permanent deployment of monitoring stations in locations of difficult access, while not
manual data retrieval.
8. Natural disaster prevention: Wireless sensor networks can effectively act to avoid the results
of disasters, like floods .Wireless nodes have successfully been deployed in rivers where changes
in the water levels have to be monitored in real time.
9. Industrial monitoring:
a. Machine health monitoring: Wireless sensor networks happen to be developed for machinery
condition based maintenance (CBM) as they offer significant personal savings and enable new
functionality .In wired systems, installing enough sensors can often be tied to the price of wiring.
16
Previously inaccessible locations, rotating machinery, hazardous or restricted areas, and mobile
assets can now be reached with wireless sensors.
b. Data logging: Wireless sensor networks are also employed for the gathering of web data for
monitoring of environmental information; this is often as easy as the monitoring from the
temperature in a very fridge to the level of water in overflow tanks in nuclear power plants. The
statistical
information will then be employed to show how systems have been working. The main benefit of
WSNs over conventional loggers is the "live" data feed which is possible.
c. Water/Waste water monitoring: Monitoring the high quality and level of water includes many
activities including checking the quality of underground or surface water and ensuring a country’s
water infrastructure for your benefit of both human and animal .It may be helpful to protect the
wastage of water.
d. Structural Health Monitoring: Wireless sensor networks enables you to monitor the fitness of
civil infrastructure and related geophysical processes all around real time, and more than very
long stretches through data logging, using appropriately interfaced sensors.
CHAPTER 4
RESEARCH CHALLENGES IN WSN
A brief history on the research in SN, but more interesting may be the overview within the
technical challenges and issues is presented, from where we could cite several relevant items:
WSN working in a harsh environment; the ability with the network (leastways the neighbors); the
network control and routing; querying and tasking (should be as simple and intuitive as it can be);
plus security issues (low latency, survivable, low probability of detecting communications, high
reliability).
17
1. Security: Security is often a broadly used term encompassing the characteristics of
authentication, integrity, privacy, non repudiation, and anti-playback. The greater the dependency
on the info supplied by the networks may be increased, the more potential risk of secure
transmission of information in the networks has increased. To the secure transmission of
numerous kinds of information over networks, several cryptographic, steganography and other
techniques are utilized
that happen to be renowned. In this section, we discuss the network security fundamentals you
bet the techniques are meant for wireless sensor networks.
2. Cryptography: The encryption-decryption techniques devised for your traditional wired
networks usually are not feasible to be employed directly for the wireless networks in particular
for wireless sensor networks. WSNs include things like tiny sensors which really suffer from the
possible lack of processing, memory and battery Applying the security mechanisms for instance
encryption could also increase delay, jitter and packet loss in wireless sensor networks when
applying encryption schemes to WSNs like, what sort of keys are generated or disseminated.
How a keys are managed, revoked, assigned to your new sensor put into the network or renewed
for ensuring robust to protect the network Adoption of pre-loaded keys or embedded keys could
hardly be an efficient
solution.
3. Steganography: While cryptography aims at hiding necessary of a message, steganography
aims at hiding a good the message. Steganography is the art of covert communication by
embedding a note in to the multimedia data (image, sound, video, etc.) . The leading objective of
steganography is to modify the carrier in a fashion that is just not perceptible and hence, it looks
the same as
ordinary.
4. Physical Layer Secure Access: Physical layer secure access in wireless sensor networks may
very well be offered by using frequency hopping. A dynamic mixture of the parameters like
hopping set (available frequencies for hopping), dwell time (interval per hop) and hopping
pattern (the sequence in which the frequencies in the available hopping set is used) could be
combined with a little expense of memory, processing and resources. Important points in physical
18
layer secure access will be the efficient design in order that the hopping sequence is modified in
less time than is required to discover it and for employing this both sender and receiver should
maintain a synchronized clock. A scheme as proposed in may be utilized which introduces secure
physical layer access employing the singular vectors while using channel synthesized
modulation. Attacks against wireless sensor networks may very well be broadly considered from
two different levels of views. One is the attack from the security mechanisms and this band are
brilliant from the basic mechanisms (like routing mechanisms). Ideas signalize the most
important attacks in wireless sensor networks .
5. Localization: It is amongst the key techniques in wireless sensor network. The place
estimation method is usually classified into Target / source localization and node self-
localization. In target localization, we mainly introduce the energy-based method. Then we
investigate the node self-localization methods. Considering that the widespread adoption on the
wireless sensor network, the localization methods are wide and varied in several applications.
There are some challenges using some special scenarios. With this paper, we present a wide
survey these challenges: localization in non-line-of-sight, node selection criteria for localization
in energy-constrained network, scheduling the sensor node to optimize the tradeoff between
localization performance and energy consumption, cooperative node localization, and localization
algorithm in heterogeneous network. Finally, we introduce the evaluation criteria for localization
in wireless sensor network. The entire process of estimating the unknown node position inside the
network is known as node self-localization. And WSN comprises a large number of inexpensive
nodes which are densely deployed in a very region of interests to measure certain phenomenon.
The leading objective would be to determine the location of the target. Localization is significant
travelers have an uncertainty with the exact location of some fixed or mobile devices. One
example has been in the supervision of humidity and temperature in forests and/or fields, where
thousands of sensors are deployed by way of plane, giving the operator minimal possible ways to
influence may location of node. An efficient localization algorithm might utilize all the free
information from the wireless sensor nodes to infer the positioning of the individual devices.
Another application will be the positioning of an mobile robot determined by received signal
strength from your number of radio beacons placed at known locations around the factory floor.
19
The primary function of an location estimation method to calculate the geographic coordinates of
network nodes with unknown position in the deployment area. Localization in wireless sensor
networks is the process of determining the geographical positions of sensors. Only a number of
the sensors (anchors) inside the networks have prior knowledge about their geographical
positions. Localization algorithms utilize location information of anchors and estimates of
distances between neighboring nodes to discover the positions in the rest of the sensors.
6. Power-Consumption: A wireless sensor node can be a popular solution when it is difficult or
impossible to perform a mains supply towards sensor node. However, because the wireless sensor
node is normally positioned in a hard to reach location, changing the battery regularly will not be
free and inconvenient. An essential take into account the introduction of a wireless sensor node is
making sure that there's always adequate energy accessible to power the system. The facility
consumption rate for sensors in the wireless sensor network varies greatly good protocols the
sensors use for communications. The Gossip-Based Sleep Protocol (GSP) implements routing
and many MAC functions in a energy conserving manner. The effectiveness of GSP has already
been demonstrated via simulation. However, no prototype system has become previously
developed. GSP was implemented for the Mica2 platform and measurements were conducted to
discover the improvement in network lifetime. Results for energy consumption, transmitted and
received power, minimum voltage supply necessary for operation, effect of transmission power
on energy consumption, and different methods for measuring time of a sensor node are presented.
The behavior of sensor nodes when they're all around their end of lifetime is described and
analyzed.
20
CHAPTER 5
CONCLUSION
In the current time, there is a new era of ubiquitous computing . One type of such ubiquitous is
wireless sensor technologies which is characterized with a great potential in opening a world of
sensing applications. This paper provides the different approaches used in enhancing the
performance of such WSN with great focus on three important factors: congestion control,
optimal routing approaches and reducing the consumption power. However the consumption
power was touched in deep since Wireless sensor networks are battery powered, therefore
prolonging the network lifetime through a power aware node organization is highly desirable. An
efficient method for energy saving is to schedule the sensor node activity such that every sensor
alternates between sleep and active state. One solution is to organize the sensor nodes in disjoint
covers, such that every cover completely monitors all the targets. These covers are activated in
turn, in a round-robin fashion, such that at a specific time only one sensor set is responsible for
sensing the targets, while all other sensors are in a low-energy, sleep state.
21
REFERNCES
1. Heinzelman W. R., Chandrakasan A., Balakrishnan H, Jan. 2000, “Energy-efficient
communication protocol for wireless microsensor networks,” Proc. of the 33rd Annual Hawaii
International Conference on System Sciences (HICSS), pp. 1-10.
2. Marta M,. Cardei v, Oct. 2009, “Improved sensor network lifetime with multiple mobile
sinks”, Elsevier Pervasive and Mobile Computing, vol. 5, no. 5, pp. 542–555.
3. https://www.researchgate.net/post/what_are_the_future_significance_using_wsnwireless_sens
or_network
4. http://ijtir.hctl.org/vol14/IJTIR_Article_201504011.pdf
5. Energy Consumption in Wireless Sensor Networks using GSP, María Gabriela Calle Torres,
Electronics Engineer, Universidad Pontificia Bolivariana, Medellín, Colombia, 1995.
6. Anil Kumar Khurana; Vishal Srivastava, QoS and Energy Efficient Routing Protocols in
WSN, Edition on Wired and Wireless Networks: Advances and Applications, Volume 3 -
November 2013 of HCTL Open Science and Technology Letters (STL), ISSN: 2321-
6980,ISBN: 978-1-62951-015-6.
22

Contenu connexe

Tendances

Energy efficient and scheduling techniques for increasing life time in wirele...
Energy efficient and scheduling techniques for increasing life time in wirele...Energy efficient and scheduling techniques for increasing life time in wirele...
Energy efficient and scheduling techniques for increasing life time in wirele...
IAEME Publication
 
An Authenticated Trust and Reputation Calculation and Management System for C...
An Authenticated Trust and Reputation Calculation and Management System for C...An Authenticated Trust and Reputation Calculation and Management System for C...
An Authenticated Trust and Reputation Calculation and Management System for C...
1crore projects
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
ijsrd.com
 

Tendances (19)

A Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor networkA Survey of provenance management in wireless sensor network
A Survey of provenance management in wireless sensor network
 
Kz2418571860
Kz2418571860Kz2418571860
Kz2418571860
 
An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...
 
A Predetermined Position-Wise Node Deployment for Optimizing Lifetime in Visu...
A Predetermined Position-Wise Node Deployment for Optimizing Lifetime in Visu...A Predetermined Position-Wise Node Deployment for Optimizing Lifetime in Visu...
A Predetermined Position-Wise Node Deployment for Optimizing Lifetime in Visu...
 
O4102103111
O4102103111O4102103111
O4102103111
 
Adaptive and online one class support vector machine-based outlier detection
Adaptive and online one class support vector machine-based outlier detectionAdaptive and online one class support vector machine-based outlier detection
Adaptive and online one class support vector machine-based outlier detection
 
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
 An Efficient Approach for Data Gathering and Sharing with Inter Node Communi... An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
 
A survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor NetworkA survey on Object Tracking Techniques in Wireless Sensor Network
A survey on Object Tracking Techniques in Wireless Sensor Network
 
Energy efficient and scheduling techniques for increasing life time in wirele...
Energy efficient and scheduling techniques for increasing life time in wirele...Energy efficient and scheduling techniques for increasing life time in wirele...
Energy efficient and scheduling techniques for increasing life time in wirele...
 
SENSOR NETWORKS BASED ON DISTRIBUTED WIRELESS SENSING
SENSOR NETWORKS BASED ON DISTRIBUTED WIRELESS SENSINGSENSOR NETWORKS BASED ON DISTRIBUTED WIRELESS SENSING
SENSOR NETWORKS BASED ON DISTRIBUTED WIRELESS SENSING
 
Semantics in Sensor Networks
Semantics in Sensor NetworksSemantics in Sensor Networks
Semantics in Sensor Networks
 
Brema tarigan 09030581721015
Brema tarigan 09030581721015Brema tarigan 09030581721015
Brema tarigan 09030581721015
 
Novel Methodology of Data Management in Ad Hoc Network Formulated using Nanos...
Novel Methodology of Data Management in Ad Hoc Network Formulated using Nanos...Novel Methodology of Data Management in Ad Hoc Network Formulated using Nanos...
Novel Methodology of Data Management in Ad Hoc Network Formulated using Nanos...
 
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORKTHRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
 
An Authenticated Trust and Reputation Calculation and Management System for C...
An Authenticated Trust and Reputation Calculation and Management System for C...An Authenticated Trust and Reputation Calculation and Management System for C...
An Authenticated Trust and Reputation Calculation and Management System for C...
 
F010524057
F010524057F010524057
F010524057
 
A Survey of Various Data Communication Schemes in WSN
A Survey of Various Data Communication Schemes in WSNA Survey of Various Data Communication Schemes in WSN
A Survey of Various Data Communication Schemes in WSN
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
 
Embedding Wireless Intelligent Sensors Based on Compact Measurement for Struc...
Embedding Wireless Intelligent Sensors Based on Compact Measurement for Struc...Embedding Wireless Intelligent Sensors Based on Compact Measurement for Struc...
Embedding Wireless Intelligent Sensors Based on Compact Measurement for Struc...
 

Similaire à Report on Enhancing the performance of WSN

Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technology
Kapil Dev
 
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Swapnil Jagtap
 
234-Article Text-423-1-10-20210316.pdf
234-Article Text-423-1-10-20210316.pdf234-Article Text-423-1-10-20210316.pdf
234-Article Text-423-1-10-20210316.pdf
NiharikaDubey17
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
ijwmn
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
ijwmn
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
ijwmn
 

Similaire à Report on Enhancing the performance of WSN (20)

Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technology
 
Report on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORK
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
 
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
 
A Review On Reactive And Proactive Wireless Sensor Networks Protocols
A Review On Reactive And Proactive Wireless Sensor Networks ProtocolsA Review On Reactive And Proactive Wireless Sensor Networks Protocols
A Review On Reactive And Proactive Wireless Sensor Networks Protocols
 
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
 
SEDRP
SEDRPSEDRP
SEDRP
 
Energy Consumption in chain based routing protocol in wireless sensor network
Energy Consumption in chain based routing protocol in wireless sensor networkEnergy Consumption in chain based routing protocol in wireless sensor network
Energy Consumption in chain based routing protocol in wireless sensor network
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
234-Article Text-423-1-10-20210316.pdf
234-Article Text-423-1-10-20210316.pdf234-Article Text-423-1-10-20210316.pdf
234-Article Text-423-1-10-20210316.pdf
 
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor NetworkEnergetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
 
Communication cost minimization in wireless sensor and actor networks for roa...
Communication cost minimization in wireless sensor and actor networks for roa...Communication cost minimization in wireless sensor and actor networks for roa...
Communication cost minimization in wireless sensor and actor networks for roa...
 
Akansu master's project ws ns
Akansu master's project ws nsAkansu master's project ws ns
Akansu master's project ws ns
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
 
Design and implementation of a centralized approach for multi-node localizatio
Design and implementation of a centralized approach for multi-node localizatioDesign and implementation of a centralized approach for multi-node localizatio
Design and implementation of a centralized approach for multi-node localizatio
 
BORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdf
BORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdfBORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdf
BORDER_SECURITY_USING_WIRELESS_INTEGRATE.pdf
 

Dernier

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Dernier (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 

Report on Enhancing the performance of WSN

  • 1. Seminar Report on ENHANCING THE PERFORMANCE OF WSN SUBMITTED BY: DHEERAJ KUMAR ( ROLL NO.- 1409131029) DEPARTMENT OF ELECTRONICS ENGINEERING JSS ACADEMY OF TECHNICAL EDUCATION C-20/1 SECTOR-62, NOIDA
  • 2. 2016- 2017 TABLE OF CONTENTS Page ABSTRACT ....................................................................................................................3 LIST OF FIGURES...........................................................................................................4 LIST OF ABBREVIATIONS ..............................................................................................5 CHAPTER 1 (INTRODUCTION)....................................................................................6 1.1. What is WSN?......................................………………………………………………6 1.2 History………………………………………………………………................................ 7 1.3 WSN Architecture………………………………………………………………................9 CHAPTER 2 (ENHANCING THE PERFORMANCE OF WSN) .......................................10 2.1 Performance Parameters …..………………………………………………………..……10 2.1.1 Energy Consumption.........................................................10 2.1.2 Delay..................................................................................10 2.1.3 Throughput........................................................................11 2.2 Challenges in WSN ……………....…,….……………………………………………………11 2.2.1 Congestion Control Problems............................................11 2.2.1 Routing and Energy Consumption Problems ....................12 2.3 Priority Based Congestion Control Protocol .……………………………………..13 2.4 Low Energy Adaptive Clustering Hierarchy Protocol(LEACH) ..…………..14 CHAPTER 3 (APPLICATIONS OF WSN) ...................................................................16 CHAPTER 4 (RESEARCH CHALLENGES IN WSN) .....................................................19 CHAPTER 5 (CONCLUSION) ..................................................................................23 2
  • 4. In the current time and next decades, Wireless Sensor Networks (WSNs) represents a new category of ad hoc networks consisting of small nodes with three functions: sensing, computation, and wireless communications capabilities. Many routing, power management, and data dissemination protocols have been designed for WSNs where energy awareness is an essential design issue to improve the overall performance of WSN. There are many approaches and techniques explored for the optimization of energy usage in wireless sensor networks. Routing represents one of these areas in which attempts for efficient utilization of energy have been made. In this report, we report on the current state of the research on optimizing the performance of WSN using various advanced approaches. There are various directions to enhance and optimize the performance as: avoiding congestion and keep it within certain controlled value, selecting the optimum routing approach, reducing the level of power consumption to increase the life time of the sensor node and others. So, the major objective of this paper is to investigate the various techniques used in improving and enhancing the performance of WSN to let it be more reliable in various applications like: health care and biomedical treatment, environment monitoring, military survival lance , target tracking, greenhouse monitoring,…etc .LIST OF FIGURES Figure 1.1 …………………………………………………………………………………..6 Figure 1.2 …………………………………………………………………………………..9 Figure 2.1 …………………………………………………………………………………..12 Figure 2.2 …………………………………………………………………………………..13 4
  • 5. Figure 2.3 …………………………………………………………………………………..15LIST OF ABBREVIATIONS WSN Wireless Sensor Network BS Base Station DSN Distributed Sensor Network WPAN Wireless Personal Area Network PCCP Priority Based Congestion Control Protocol 5
  • 6. LEACH Low Energy Adaptive Clustering HierarchyCHAPTER 1 INTRODUCTION 1.1 What is WSN? The wireless sensor network is some type of an adhoc network. Mainly it consists of small light weighted wireless nodes called sensor nodes, deployed in physical or environmental condition. It measure the physical parameters such as sound, pressure, temperature, and humidity. These sensor nodes deployed in large or thousand numbers and collaborate to form an ad hoc network capable of reporting to data collection sink (base station). Figure-1.1 Architecture of Sensor Network 6
  • 7. Wireless sensor network have various applications like habitat monitoring, building monitoring, health monitoring, military survival lance and target tracking. However wireless sensor network is a resource constraint if we talk about energy, computation, memory and limited communication capabilities. A typical wireless sensor network is comprised of tens, hundreds, or even thousands of sensor nodes. Typically each sensor node is composed of a microcontroller, a radio transceiver, one or more micro sensors, power source and other components. The microcontroller samples the micro sensors, send the data, either with or without processing, through radio links to the locations where the information is needed. Due to the limited radio range and the relatively larger target areas, in many cases a multiple hop ad hoc wireless network is formed for the information transmission. The devices that gather the information from the wireless sensor networks are defined as base stations. There may be one or more base stations for a wireless sensor network. The base stations may be static or mobile. However, for many applications, the sensor nodes themselves are not moving, either due to the scenario requirements, or technical or economical hindrance. All sensor nodes in the wireless sensor network are interacting with each other or by intermediate sensor nodes. A sensor nodes that generates data, based on its sensing mechanisms observation and transmit sensed data packet to the base station (sink). This process basically direct transmission since the base station may locate very far away from sensor nodes needs. More energy to transmit data over long distances so that a better technique is to have fewer nodes sends data to the base station. These nodes called aggregator nodes and processes called data aggregation in wireless sensor network. 1.2 History The origin of the research on WSNs can be traced back to the Distributed Sensor Networks(DSN) program at the Defense Advanced Research Projects Agency (DARPA) at around 1980. By this time, the ARPANET (Advanced Research Projects Agency Network) had been operational for a number of years, with about 200 hosts at universities and research institutes. DSNs were assumed to have many spatially distributed low-cost sensing nodes that collaborated with each other but 7
  • 8. operated autonomously, with information being routed to whichever node was best able to use the information. At that time, this was actually an ambitious program. There were no personal computers and workstations; processing was mainly performed on minicomputers and the Ethernet was just becoming popular. Technology components for a DSN were identified in a Distributed Sensor Nets workshop in 1978 (Proceedings of the Distributed Sensor Nets Workshop, 1978). these included sensors (acoustic), communication and processing modules, and distributed software. Researchers at Carnegie Mellon University (CMU) even developed a communication-oriented operating system called Accent (Rashid & Robertson, 1981), which allowed flexible, transparent access to distributed resources required for a fault-tolerant DSN. A demonstrative application of DSN was a helicopter tracking system (Myers et al., 1984), using a distributed array of acoustic microphones by means of signal abstractions and matching techniques, developed at the Massachusetts Institute of Technology (MIT). Even though early researchers on sensor networks had in mind the vision of a DSN, the technology was not quite ready. More specifically, the sensors were rather large and This work was carried out during the tenure of an ERCIM “Alain Bensoussan” Fellowship Program and is part of the MELODY Project, which is funded by the Research Council of Norway under the contract number 187857/S10. In the new wave of sensor network research, networking techniques and networked information processing suitable for highly dynamic ad hoc environments and resource constrained sensor nodes have been the focus. Further, the sensor nodes have been much smaller in size (i.e. pack of cards to dust particle) and much cheaper in price, and thus many new civilian applications of sensor networks such as environment monitoring, vehicular sensor network and body sensor network have emerged. Again, DARPA acted as a pioneer in the new wave of sensor network research by launching an initiative research program called SensIT. Which provided the present sensor networks with new capabilities such as ad hoc networking, dynamic querying and tasking, reprogramming and multitasking. At the same time, the IEEE noticed the low expense and high capabilities that sensor networks offer. The organization has defined the IEEE 802.15.4 standard (IEEE 802.15 WPAN Task Group 4, n.d.) for low data rate wireless personal area networks. Countries such as China have involved WSNs in their national strategic research programmer’s 8
  • 9. (Ni, 2008). The commercialization’s of WSNs are also being accelerated by new formed companies like Crossbow Technology (Crossbow Technology, n.d.) and Dust Networks. 1.3 WSN Architecture The architecture of WSN consist of sensor microcontroller unit antenna and transmitter & receiver of the system, sensor and control units are connected to the battery for required power supply voltage sensor sense the physical environment and send the input to the A/D converter to convert it into digital form and then it is send to the control unit of microcontroller from where the o/p’s are controlled by the mechanism stored in microcontroller unit. Figure-1.2 Basic Block Diagram CHAPTER 2 ENHANCING THE PERFORMANCE OF WSN 9
  • 10. 2.1 Performance Parameters 2.1.1 Energy Consumption This is a primary design factor for any WSN. Power consumption should be made minimal in order to prolong the lifetime of the network. In fact, “power conservation” is a distinguishing factor between designing a WSN and designing other classes of wireless networks. The latter may consider QoS parameters (like, delay, throughput, fairness, etc.) as key design requirements. Based on this observation, research activities target the development of power-aware protocols and algorithms for sensor networks. That is, power-awareness should be incorporated in every stage of designing a WSN. In fact, power-awareness imposes constraints on the size and complexity of a sensor node’s platform. In this context, hardware of sensor nodes should be designed to be power-efficient. 2.1.2 Delay Delay can take a long time for a packet to be delivered across intervening networks. In reliable protocols where a receiver acknowledges delivery of each chunk of data, it is possible to measure this as round-trip time. Due to congestion problem some time traffic will be occurs in the network. So delay will be increases and reliability of data transmission also decreases. Delay factor directly affect on network performance. 2.1.3 Throughput Throughput is the amount of work done in a cycle.With the advent of sensor nodes with higher communication and sensing capabilities, the challenge arises in forming a data gathering network 10
  • 11. to maximize the network capacity. The channel sharing for higher data transmission leads to interfering problems. The effects of interferences become increasingly important when simultaneous transmissions are done in order to increase wireless network capacity. In such cases, achieving a high throughput and low delay is difficult. 2.2 Challenges in WSN 2.2.1 Congestion Control Problems The network congestion occurs when either: - The incoming traffic exceeds the capacity of the outgoing link, or - Link bandwidth drops because of channel fading caused by path loss. Figure-2.1 Congestion Control Problem at a BS 2.2.2 Routing and Energy Consumption Problems 11
  • 12. The limited energy supply of sensor nodes necessitates energy-awareness at most layers of networking protocol stack including the network layer. In addition, many applications of sensor networks require the deployment of a large number of sensor nodes making it impractical to build a global addressing scheme. Moreover, in contrary to contemporary communication networks almost all applications of sensor networks require the flow of sensed data from multiple sources to a particular sink. These unique characteristics of sensor networks have made efficient routing of sensor data one of the technical challenges in wireless sensor networks. While a number of routing protocols pursued a data centric methodology by naming the data, some considered clustering the sensor nodes in order to decrease the number of transmitted messages to the sink node and have a more scalable setup. Other protocols either adopted a location-based routes setup or strived to achieve energy saving through activation of a limited subset of nodes. In addition, with the increasing interest in the applications that require certain end-to-end performance guarantees, a few routing protocols have been proposed for providing energyefficient relaying of delay-constrained data. While the goals of most published techniques are increasing network lifetime and on-time delivery of data through clever architecture and management of the network, none of the work considered the possibility of relocating the sink (gateway) node for enhanced network performance. Figure-2.2 Network Topologies with different Routes 12
  • 13. 2.3 Priority Based Congestion Control Protocol • PCCP is a congestion control mechanism based on node priority index that is introduced to reflect the importance of each sensor node. • Nodes are assigned a priority based on the function they perform and its location. • Nodes near the sink have a higher priority. • The congestion is detected based on the ratio of sending rate to the packet arrival rate. If the sending rate is lower, it implies that congestion has occurred. Priority based Congestion Control Protocol, which introduced node priority index to reflect the importance of each sensor node. This utilizes a cross-layer optimization and imposes a hop-by- hop approach to control congestion. A new Queue based Congestion Control Protocol with priority support, using the queue length as an indication of congestion degree. In this approach, the rate assignment to each traffic source is based on its priority index as well as its current congestion degree. A node priority-based congestion control protocol for wireless sensor networks. In this, the node priority index is introduced to reflect the importance of each node and uses packet inter-arrival time along with packet service time to measure a parameter defined as congestion degree and imposes hop-by-hop control based measurement as well as node priority index. 2.4 Low Energy Adaptive Clustering Hierarchy Protocol (LEACH) • LEACH arranges the nodes in the network into small clusters and chooses one of them as the cluster-head. 13
  • 14. Figure-2.3 Diagram showing LEACH Protocol • Nodes first senses its target and then sends the relevant information to its cluster-head. Then the cluster head aggregates and compresses the information received from all the nodes and sends it to the base station. • The nodes chosen as the cluster head drain out more energy as compared to the other nodes as it is required to send data to the base station which may be far located. • Hence LEACH uses random rotation of the nodes required to be the cluster-heads to evenly distribute energy consumption in the network. CHAPTER 3 APPLICATIONS OF WSN 14
  • 15. The applications for WSNs involve tracking, monitoring and controlling. WSNs are mainly utilized for habitat monitoring, object tracking, nuclear reactor control, fire detection, and traffic monitoring. Area monitoring is a very common application of WSNs, in which the WSN is deployed over a region where some incident might be monitored. E.g., a substantial variety of sensor nodes may very well be deployed over the battlefield to detect enemy intrusions rather than using landmines. When the sensors detect case being monitored (heat, pressure, sound, light, electro-magnetic flux, vibration, etc.), the big event needs to be reported to at least one in the base stations, which often can than take some appropriate action (e.g., send some text online or even a satellite). Wireless sensor networks are utilized extensively within the water/wastewater industries. Facilities not wired for power or data transmission can be monitored using industrial wireless I/O devices and sensor nodes powered by solar panels or battery packs. Wireless sensor networks are able to use numerous sensors to detect the existence of vehicles for vehicles detection. Wireless sensor networks may also be employed to control the temperature and humidity levels inside commercial greenhouses. If the temperature and humidity drops below specific levels, the greenhouse manager might be notified via e-mail or a cellular telephone text, or host systems can trigger misting systems, open vents, first turn on fans, or control a multitude of system responses. Because some wireless sensor networks are super easy to install, they've also been simple move if the needs with the application change . There are lots of applications of WSN: 1. Process Management: Area monitoring is a very common using WSNs. In area monitoring, the WSN is deployed spanning a region where some phenomenon is usually to be monitored. A military example may be the use of sensors detect enemy intrusion; a civilian example would be the geo-fencing of gas or oil pipelines. Area monitoring is most important part. 2. Healthcare monitoring: The medical applications might be of two sorts: wearable and implanted. Wearable devices are applied to the body surface of the human or maybe at close proximity from the user. The implantable medical devices are the ones that are inserted inside your body. There are numerous other applications too e.g. body position measurement and of the person, overall monitoring of ill patients in hospitals and also at homes. 15
  • 16. 3. Environmental/Earth sensing: There are numerous applications in monitoring environmental parameters samples of which are given below. They share any additional challenges of harsh environments and reduced power supply. 4. Polluting of the environment monitoring: Wireless sensor networks have been deployed in lots of cities (Stockholm, London and Brisbane) to monitor the power of dangerous gases for citizens. These can leverage the random wireless links instead of wired installations that also make them more mobile for testing readings in several areas. 5. Forest fire detection: A network of Sensor Nodes is usually positioned in a forest to detect every time a fire has begun. The nodes is usually with sensors to measure temperature, humidity and gases which are produced by fire within the trees or vegetation. The first detection is necessary to get a successful action of the fire fighters; As a result of Wireless as Sensor Networks, the fire brigade are able to know when a fire begins you bet it can be spreading. 6. Landslide detection: A landslide detection system uses a wireless sensor network to detect the slight movements of soil and modifications to various parameters that will occur before or throughout a landslide. With the data gathered it may be possible to know the appearance of landslides before it genuinely happens. 7. Water quality monitoring: Water quality monitoring involves analyzing water properties in dams, rivers, lakes & oceans, and also underground water reserves. The application of many wireless distributed sensors enables the creation of a accurate map on the water status, and allows the permanent deployment of monitoring stations in locations of difficult access, while not manual data retrieval. 8. Natural disaster prevention: Wireless sensor networks can effectively act to avoid the results of disasters, like floods .Wireless nodes have successfully been deployed in rivers where changes in the water levels have to be monitored in real time. 9. Industrial monitoring: a. Machine health monitoring: Wireless sensor networks happen to be developed for machinery condition based maintenance (CBM) as they offer significant personal savings and enable new functionality .In wired systems, installing enough sensors can often be tied to the price of wiring. 16
  • 17. Previously inaccessible locations, rotating machinery, hazardous or restricted areas, and mobile assets can now be reached with wireless sensors. b. Data logging: Wireless sensor networks are also employed for the gathering of web data for monitoring of environmental information; this is often as easy as the monitoring from the temperature in a very fridge to the level of water in overflow tanks in nuclear power plants. The statistical information will then be employed to show how systems have been working. The main benefit of WSNs over conventional loggers is the "live" data feed which is possible. c. Water/Waste water monitoring: Monitoring the high quality and level of water includes many activities including checking the quality of underground or surface water and ensuring a country’s water infrastructure for your benefit of both human and animal .It may be helpful to protect the wastage of water. d. Structural Health Monitoring: Wireless sensor networks enables you to monitor the fitness of civil infrastructure and related geophysical processes all around real time, and more than very long stretches through data logging, using appropriately interfaced sensors. CHAPTER 4 RESEARCH CHALLENGES IN WSN A brief history on the research in SN, but more interesting may be the overview within the technical challenges and issues is presented, from where we could cite several relevant items: WSN working in a harsh environment; the ability with the network (leastways the neighbors); the network control and routing; querying and tasking (should be as simple and intuitive as it can be); plus security issues (low latency, survivable, low probability of detecting communications, high reliability). 17
  • 18. 1. Security: Security is often a broadly used term encompassing the characteristics of authentication, integrity, privacy, non repudiation, and anti-playback. The greater the dependency on the info supplied by the networks may be increased, the more potential risk of secure transmission of information in the networks has increased. To the secure transmission of numerous kinds of information over networks, several cryptographic, steganography and other techniques are utilized that happen to be renowned. In this section, we discuss the network security fundamentals you bet the techniques are meant for wireless sensor networks. 2. Cryptography: The encryption-decryption techniques devised for your traditional wired networks usually are not feasible to be employed directly for the wireless networks in particular for wireless sensor networks. WSNs include things like tiny sensors which really suffer from the possible lack of processing, memory and battery Applying the security mechanisms for instance encryption could also increase delay, jitter and packet loss in wireless sensor networks when applying encryption schemes to WSNs like, what sort of keys are generated or disseminated. How a keys are managed, revoked, assigned to your new sensor put into the network or renewed for ensuring robust to protect the network Adoption of pre-loaded keys or embedded keys could hardly be an efficient solution. 3. Steganography: While cryptography aims at hiding necessary of a message, steganography aims at hiding a good the message. Steganography is the art of covert communication by embedding a note in to the multimedia data (image, sound, video, etc.) . The leading objective of steganography is to modify the carrier in a fashion that is just not perceptible and hence, it looks the same as ordinary. 4. Physical Layer Secure Access: Physical layer secure access in wireless sensor networks may very well be offered by using frequency hopping. A dynamic mixture of the parameters like hopping set (available frequencies for hopping), dwell time (interval per hop) and hopping pattern (the sequence in which the frequencies in the available hopping set is used) could be combined with a little expense of memory, processing and resources. Important points in physical 18
  • 19. layer secure access will be the efficient design in order that the hopping sequence is modified in less time than is required to discover it and for employing this both sender and receiver should maintain a synchronized clock. A scheme as proposed in may be utilized which introduces secure physical layer access employing the singular vectors while using channel synthesized modulation. Attacks against wireless sensor networks may very well be broadly considered from two different levels of views. One is the attack from the security mechanisms and this band are brilliant from the basic mechanisms (like routing mechanisms). Ideas signalize the most important attacks in wireless sensor networks . 5. Localization: It is amongst the key techniques in wireless sensor network. The place estimation method is usually classified into Target / source localization and node self- localization. In target localization, we mainly introduce the energy-based method. Then we investigate the node self-localization methods. Considering that the widespread adoption on the wireless sensor network, the localization methods are wide and varied in several applications. There are some challenges using some special scenarios. With this paper, we present a wide survey these challenges: localization in non-line-of-sight, node selection criteria for localization in energy-constrained network, scheduling the sensor node to optimize the tradeoff between localization performance and energy consumption, cooperative node localization, and localization algorithm in heterogeneous network. Finally, we introduce the evaluation criteria for localization in wireless sensor network. The entire process of estimating the unknown node position inside the network is known as node self-localization. And WSN comprises a large number of inexpensive nodes which are densely deployed in a very region of interests to measure certain phenomenon. The leading objective would be to determine the location of the target. Localization is significant travelers have an uncertainty with the exact location of some fixed or mobile devices. One example has been in the supervision of humidity and temperature in forests and/or fields, where thousands of sensors are deployed by way of plane, giving the operator minimal possible ways to influence may location of node. An efficient localization algorithm might utilize all the free information from the wireless sensor nodes to infer the positioning of the individual devices. Another application will be the positioning of an mobile robot determined by received signal strength from your number of radio beacons placed at known locations around the factory floor. 19
  • 20. The primary function of an location estimation method to calculate the geographic coordinates of network nodes with unknown position in the deployment area. Localization in wireless sensor networks is the process of determining the geographical positions of sensors. Only a number of the sensors (anchors) inside the networks have prior knowledge about their geographical positions. Localization algorithms utilize location information of anchors and estimates of distances between neighboring nodes to discover the positions in the rest of the sensors. 6. Power-Consumption: A wireless sensor node can be a popular solution when it is difficult or impossible to perform a mains supply towards sensor node. However, because the wireless sensor node is normally positioned in a hard to reach location, changing the battery regularly will not be free and inconvenient. An essential take into account the introduction of a wireless sensor node is making sure that there's always adequate energy accessible to power the system. The facility consumption rate for sensors in the wireless sensor network varies greatly good protocols the sensors use for communications. The Gossip-Based Sleep Protocol (GSP) implements routing and many MAC functions in a energy conserving manner. The effectiveness of GSP has already been demonstrated via simulation. However, no prototype system has become previously developed. GSP was implemented for the Mica2 platform and measurements were conducted to discover the improvement in network lifetime. Results for energy consumption, transmitted and received power, minimum voltage supply necessary for operation, effect of transmission power on energy consumption, and different methods for measuring time of a sensor node are presented. The behavior of sensor nodes when they're all around their end of lifetime is described and analyzed. 20
  • 21. CHAPTER 5 CONCLUSION In the current time, there is a new era of ubiquitous computing . One type of such ubiquitous is wireless sensor technologies which is characterized with a great potential in opening a world of sensing applications. This paper provides the different approaches used in enhancing the performance of such WSN with great focus on three important factors: congestion control, optimal routing approaches and reducing the consumption power. However the consumption power was touched in deep since Wireless sensor networks are battery powered, therefore prolonging the network lifetime through a power aware node organization is highly desirable. An efficient method for energy saving is to schedule the sensor node activity such that every sensor alternates between sleep and active state. One solution is to organize the sensor nodes in disjoint covers, such that every cover completely monitors all the targets. These covers are activated in turn, in a round-robin fashion, such that at a specific time only one sensor set is responsible for sensing the targets, while all other sensors are in a low-energy, sleep state. 21
  • 22. REFERNCES 1. Heinzelman W. R., Chandrakasan A., Balakrishnan H, Jan. 2000, “Energy-efficient communication protocol for wireless microsensor networks,” Proc. of the 33rd Annual Hawaii International Conference on System Sciences (HICSS), pp. 1-10. 2. Marta M,. Cardei v, Oct. 2009, “Improved sensor network lifetime with multiple mobile sinks”, Elsevier Pervasive and Mobile Computing, vol. 5, no. 5, pp. 542–555. 3. https://www.researchgate.net/post/what_are_the_future_significance_using_wsnwireless_sens or_network 4. http://ijtir.hctl.org/vol14/IJTIR_Article_201504011.pdf 5. Energy Consumption in Wireless Sensor Networks using GSP, María Gabriela Calle Torres, Electronics Engineer, Universidad Pontificia Bolivariana, Medellín, Colombia, 1995. 6. Anil Kumar Khurana; Vishal Srivastava, QoS and Energy Efficient Routing Protocols in WSN, Edition on Wired and Wireless Networks: Advances and Applications, Volume 3 - November 2013 of HCTL Open Science and Technology Letters (STL), ISSN: 2321- 6980,ISBN: 978-1-62951-015-6. 22