SlideShare a Scribd company logo
1 of 26
Download to read offline
1
CHAPTER-1
1. ABSTRACT
Wireless sensor networks (WSNs) enable new applications and require non-conventional
paradigms for protocol design due to several constraints. Owing to the requirement for low
device complexity together with low energy consumption (i.e., long network lifetime), a proper
balance between communication and signal/data processing Capabilities must be found. This
motivates a huge effort in research activities, standardization process, and industrial investments
on this field since the last decade.
This survey paper aims at reporting an overview of WSNs technologies, main applications and
standards, features in WSNs design, and evolutions. In particular, some peculiar applications,
such as those based on environmental monitoring, are discussed and design strategies
highlighted; a case study based on a real implementation is also reported.
Trends and possible evolutions are traced. Emphasis is given to the IEEE 802.15.4 technology,
which enables many applications of WSNs. Some example of performance characteristics of
802.15.4-based networks are shown and discussed as a function of the size of the WSN and the
data type to be exchanged among nodes.
2
1
3
CHAPTER-2
INTRODUCTION
A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to
monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to
cooperatively pass their data through the network to a main location. The more modern networks
are bi-directional, also enabling control of sensor activity. The development of wireless sensor
networks was motivated by military applications such as battlefield surveillance; today such
networks are used in many industrial and consumer applications, such as industrial process
monitoring and control, machine health monitoring, and so on.
2.1WSN TECHNOLOGY
The WSN is built of "nodes" – from a few to several hundreds or even thousands, where each
node is connected to one (or sometimes several) sensors. Each such sensor network node has
typically several parts: a radio transceiver with an internal antenna or connection to an external
antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy
source, usually a battery or an embedded form of energy harvesting.
A sensor node might vary in size from that of a shoebox down to the size of a grain of dust,
although functioning "motes" of genuine microscopic dimensions have yet to be created. The
cost of sensor nodes is similarly variable, ranging from a few to hundreds
of dollars, depending on the complexity of the individual sensor nodes. Size and cost constraints
on sensor nodes result in corresponding constraints on resources such as energy, memory,
computational speed and communications bandwidth. The topology of the WSNs can vary from
a simple star network to an advanced multi-hop wireless mesh network. The propagation
technique between the hops of the network can be routing or flooding.
4
2.2HISTORY OF WSN
The origins of the research on WSNs can be traced back to the Distributed Sensor Networks
(DSN) program at the Defense Advanced Research Projects Agency (DARPA) at around 1980.
By this time, the ARPANET (Advanced Research Projects Agency Network) had been
operational for a number of years, with about 200 hosts at universities and research institutes.
DSNs were assumed to have many spatially distributed low-cost sensing nodes that collaborated
with each other but operated autonomously, with information being routed to whichever node
was best able to use the information.
At that time, this was actually an ambitious program. There were no personal computers and
workstations; processing was mainly performed on minicomputers and the Ethernet was just
becoming popular. Technology components for a DSN were identified in a Distributed Sensor
Nets workshop in 1978 (Proceedings of the Distributed Sensor Nets Workshop, 1978). These
included sensors (acoustic), communication and processing modules, and distributed software.
Researchers at Carnegie Mellon University (CMU) even developed a communication-oriented
operating system called Accent (Rashid & Robertson, 1981), which allowed flexible,
transparent access to distributed resources required for a fault-tolerant DSN. A demonstrative
application of DSN was a helicopter tracking system (Myers et al., 1984), using a distributed
array of acoustic microphones by means of signal abstractions and matching techniques,
developed at the Massachusetts Institute of Technology (MIT). Even though early researchers
on sensor networks had in mind the vision of a DSN, the technology was not quite ready. More
specifically, the sensors were rather large and This work was carried out during the tenure of an
ERCIM “Alain Bensoussan” Fellowship Program and is part of the MELODY Project, which is
funded by the Research Council of Norway under the contract number187857/S10.
In the new wave of sensor network research, networking techniques and networked information
processing suitable for highly dynamic ad hoc environments and resource constrained sensor
nodes have been the focus. Further, the sensor nodes have been much smaller in size (i.e. pack
of cards to dust particle) and much cheaper in price, and thus many new civilian applications of
sensor networks such as environment monitoring, vehicular sensor network and body sensor
5
network have emerged. Again, DARPA acted as a pioneer in then new wave of sensor network
research by launching an initiative research program called SensIT. Which provided the present
sensor networks with new capabilities such as ad hoc networking, dynamic querying and
tasking, reprogramming and multitasking. At the same time, the IEEE noticed the low expense
and high capabilities that sensor networks offer. The organization has defined the IEEE
802.15.4 Standard (IEEE 802.15 WPAN Task Group 4, n.d.) for low data rate wireless personal
area networks. Based on IEEE 802.15.4, ZigBee Alliance(ZigBee Alliance, n.d.) has published
the ZigBee standard which specifies a suite of high level communication protocols which can be
used by WSNs. Currently, WSN has been viewed as one of the most important technologies for
the 21st
century (21 Ideas for the 21st Century,1999). Countries such as China have
Involved WSNs in their national strategic research programmer’s (Ni, 2008). The
Commercializations of WSNs are also being accelerated by new formed
Companies like Crossbow Technology (Crossbow Technology, n.d.) and Dust
Networks
2.3 WSN ARCHITECTURE
The architecture of WSN consists of sensor microcontroller unit antenna and transmitter &
receiver of the system. Sensor and control units are connected to the battery for required power
supply voltage sensor sense the physical environment and send the input to the A/D converter to
convert it into digital form and then it is send to the control unit of microcontroller from where
the O/P’s are controlled by the mechanism stored in microcontroller unit
6
2.3.1Clustered Architecture
A clustered architecture organizes the sensor nodes into clusters, each governed by a
cluster-head. The nodes in each cluster are involved in message exchanges with their cluster-
heads, and these heads send message to a BS.
Clustered architecture is useful for sensor networks because of its inherent suitability for data
fusion. The data gathered by all member of the cluster can be fused at the cluster-head, and only
the resulting information needs to be communicated to the BS.
The cluster formation and election of cluster-heads must be an autonomous, distributed process.
7
2.3.2LAYERED ARCHITECTURE
A layered architecture has a single powerful base station, and the layers of sensor nodes around it
correspond to the nodes that have the same hop-count to the BS.
In the in-building scenario, the BS acts an access point to a wired network, and small nodes form
a wireless backbone to provide wireless connectivity.
The advantage of a layered architecture is that each node is involved only in short-distance, low-
power transmissions to nodes of the neighboring layers.
Fig.2 LAYERED ARCHITECTURE
8
2.4Applications of WSN
 Global scale
 Battle field
 Factories
 Buildings
 Homes
 bodies
Fig.3-application of WSN
9
Applications of Sensor Networks
Using in military Battlefield surveillance and monitoring, guidance systems of intelligent
missiles, detection of attack by weapons of mass destruction such as chemical, biological, or
nuclear
Using in nature
Forest fire, flood detection, habitat exploration of animals
Using in health
Monitor the patient’s heart rate or blood pressure, and sent regularly to alert the concerned
doctor, provide patients a greater freedom of movement
Using in home (smart home)
Sensor node can built into appliances at home, such as ovens, refrigerators, and vacuum
cleaners, which enable them to interact with each other and be remote-controlled
Using in office building
Airflow and temperature of different parts of the building can be automatically controlled
Using in warehouse
Improve their inventory control system by installing sensors on the products to track their
movement
10
The topology of the WSNs can vary from a simple star network to anadvanced multi-hop
wireless mesh network. The propagation technique between the hops of the network can be
routing or flooding.
Fig:-Typical multi-hop wireless sensor network architecture
11
CHAPTER-3
3. SENSOR
Sensors are the very important part of any sensor network it is the primery hub of wireless
sensor networks. All wireless technology is depend upon these sensors in our general life we
use many sensors, do u know that how much sensors are working in your system or in your
mobile cell. U cannot think about a network without sensor
Fig.4 sensors
DEFINITION
A 'sensor' is a device that measures a physical quantity and converts it into a 'signal' which
can be read by an observer or by an instrument. For example, a mercury thermometer
converts the measured temperature into the expansion and contraction of a liquid which can
be read on a calibrated glass tube.
12
3.2 TYPE OF SENSOR
There are a lot of different types of sensors. Sensors are used in everyday objects.
3.2.1Thermal sensors
A sensor that detects temperature. Thermal sensors are found in many laptops and computers in
order to sound an alarm when a certain temperature has been exceeded.
 temperature sensors: thermometers

 heat sensors: bolometer, calorimeter
3.2.2Electromagnetic sensors
An electronic device used to measure a physical quantity such as pressure or loudness and
convert it into an electronic signal of some kind (e.g. a voltage).
 Electrical resistance sensors: ohmmeter
 electrical voltage sensors: voltmeter
 electrical power sensors: watt-hour meter
 magnetism sensors: magnetic compass
 metal detectors
 Radar
3.2.3Mechanical sensors
 Pressure sensors: barometer

 Vibration and shock sensors
13
Motion sensors
A motion sensor detects physical movement in a given area.
 radar gun, tachometer
Car sensors
 reversing sensor
 rain sensor
3.3The trend of sensors
Because of certain disadvantages of physical contact sensors, newer technology non-contact
sensors have become prevalent in industry, performing well in many applications. The recent
style of non-contact sensors shows that “Thin (g) is In”. Market trends show that form and
size are important.
Users are looking for smaller and more accurate sensors. New technologies for the sensing
chips are breaking application barriers. For the future, the trend will be to continue to provide
smaller, more affordable sensors that have the flexibility to fit even more applications in both
industrial and commercial environments.
14
CHAPTER-4
4. FEATURES:
In spite of the diverse applications, sensor networks pose a number of unique technical
features due to the following factors:
4.1. Ad hoc deployment:
Most sensor nodes are deployed in regions which have no infrastructure at all. A typical way
of deployment in a forest would be tossing the sensor nodes from an aeroplane. In such a
situation, it is up to the nodes to identify its connectivity and distribution.
4.2 .Unattended operation:
In most cases, once deployed, sensor networks have no human intervention. Hence the nodes
themselves are responsible for reconfiguration in case of any changes.
4.3. Unmetered:
The sensor nodes are not connected to any energy source. There is only a finite source Of
energy, which must be optimally used for processing and communication? An interesting fact
is That communication dominates processing in energy consumption. Thus, in order to make
optimal Use of energy, communication should be minimized as much as possible.
4.4 Dynamic changes:
It is required that a sensor network system be adaptable to changing Connectivity (for e.g., due
to addition of more nodes, failure of nodes etc.) as well as changing Environmental stimuli.
Thus, unlike traditional networks, where the focus is on maximizing channel throughput or
minimizing node deployment, the major consideration in a sensor network is to extend the
system lifetime as well as the system robustness.
15
CHAPTER-5
5. APPLICATIONS
Fig.5 Application of WSN
The original motivation behind the research into WSNs was military application. Examples of
military sensor networks include large-scale acoustic ocean surveillance systems for the
detection of submarines, self-organized and randomly deployed WSNs for battlefield
surveillance and attaching micro sensors to weapons for stockpile surveillance (Pester, 2000).
16
As the costs for sensor nodes and communication networks have been reduced, many other
potential applications including those for civilian purposes have emerged. The following are a
few examples.
5.1 Environmental Monitoring
Environmental monitoring (Steered et al., 2000) can be used for animal tracking, forest
surveillance, flood detection, and weather forecasting. It is a natural candidate for applying
WSNs, because the variables to be monitored, e.g. temperature, are usually distributed over a
large region. One example is that researchers from the University of Southampton have built a
glacial environment monitoring system using WSNs in Norway (Martinez et al., 2005). They
collect data from sensor nodes installed within the ice and the sub-glacial sediment without
the use of wires which could disturb the environment.
Fig:6 - Environmental Monitor
17
5.2 Health Monitoring
WSNs can be embedded into a hospital building to track and monitor patients and all medical
resources. Special kinds of sensors which can measure blood pressure, body temperature and
electrocardiograph (ECG) can even be knitted into clothes to provide remote nursing for the
elderly. When the sensors are worn or implanted for healthcare purposes, they form a special
kind of sensor network called a body sensor network (BSN). BSN is a rich interdisciplinary area
which revolutionizes the healthcare system by allowing inexpensive, continuous and ambulatory
health monitoring with real-time updates of medical records via the Internet.
5.3 TRAFFIC CONTROL
Sensor networks have been used for vehicle traffic monitoring and control for some time. At
many crossroads, there are either overhead or buried sensors to detect vehicles and to control
the traffic lights. Furthermore, video cameras are also frequently used to monitor road
segments with heavy traffic. However, the traditional communication networks used to
connect these sensors are costly, and thus traffic monitoring is usually only available at a few
critical points in a city (Chong & Kumar, 2003). WSNs will completely change the landscape
of traffic monitoring and control by installing cheap sensor nodes in the car, at the parking
lots, along the roadside, etc. Street line, Inc. (Street line, Inc., n.d.) is a company which uses
sensor network technology to help drivers find unoccupied parking places and avoid traffic
jams. The solutions provided by Street line can significantly improve the city traffic
management and reduce the emission of carbon dioxide.
18
5.4 SMART BUILDINGS
The New York Times Building - a Smart Building
The headquarters of the New York Times is an example of how different smart building
technologies can be combined to reduce energy consumption and to increase user comfort.
Overall, the building consumes 30% less energy than traditional office skyscrapers. Opened
in November 2007 and designed by Renzo Piano, the building has a curtain wall which
serves as a sunscreen and changes color during the day. This wall consists of ceramic rods,
“a supporting structure for the screen and an insulated window unit” (Hart, 2008).
Fig.7 –Smart building
The building is further equipped with lighting and shading control systems based on ICT
technologies. The lighting system ensures that electrical light is only used when required.
Further day lighting measures include a garden in the centre of the ground floor which is
open to the sky as well as a large area skylight.
19
The electrical ballasts in the lighting system are equipped with chips that allow each ballast
to be controlled separately. The shading system tracks the position of the sun and relies on
a sensor network to automatically actuate the raising and lowering of the shades.
The high-tech HVAC system is equipped with sensors that measure the temperature. It is
further able to rely on free air cooling, i.e. fresh air on cool mornings is brought into the
HVAC system. An automated building system monitors in parallel “the air conditioning,
water cooling, heating, fire alarm, and generation systems” (Siemens, 2008).
The system relies on a large-scale sensor network composed of different kinds of sensors
which deliver real-time information. Consequently, energy can be saved as only as few
systems are turned on as needed.
5.5 SECURITY
While the future of WSNs is very prospective, WSNs will not be successfully deployed if
security, dependability and privacy issues are not addressed adequately. These issues
become more important because WSNs are usually used for very critical applications.
Furthermore, WSNs are very vulnerable and thus attractive to attacks because of their
limited prices andhuman-unattended deployment .IT provide kee management,
authentication, intrusion detection, privacy protection which makes WSN secure.
20
CHAPTER-6
6. Routing Protocols for
Flooding
Flooding is an old routing mechanism that may also be used in sensor networks. In Flooding, a node
received data or the management packets to its neighbors by broadcasting, unless a maximumhops for that
packet are reached or the destination of the packets is arrived. here are some deficiencies for this
routing technique [ Implosion: is the case where a duplicated data or packets are sent to the same node.
Overlap: iftwo sensor nodes cover an overlapping measuring region, both of them willsense/detect the same
data. As a result, their neighbor nodes will receive duplicated data or messages. Resource blindness: A
WSN protocol must be energy resource-aware and adapts its sensing, communication and computation to .
Gossiping
Gossiping protocol is an alternative to flooding mechanism. In Gossiping, nodes ca the
incomingdata/packets to randomly selected neighbor node. Once a gossiping node
receives the messages, it can forward the data back to that neighbor or to another one
randomly selected neighbor node. This technique assists in energy conservation by
randomization. Gossiping can solve the implosion probl
SPIN
SPIN (Sensor Protocols for Information via Negotiation) is a family of adaptive protocols for WSNs.
Their design goal is to avoid the drawbacks of flooding protocols mentioned above by utilizing data
negotiation and resource-adaptive algorithms.
Directed delusion
Directed delusion is another data dissemination and aggregation protocol. It is a data- centric and
application aware routing protocol for WSNs. It aimsat naming all data generated by sensor nodes by
attribute-value pairs.
21
LEACH
LEACH (Low Energy Adaptive Clustering Hierarchy) is a self-organizing, adaptive clustering-based
protocol that uses randomized rotation of cluster-heads to evenly distribute the energy load among
the sensor nodes in the network
PEGASIS
PEGASIS (Power-E_client GAthering in Sensor Information Systems) is a greedy chain- based
power e_cient algorithm.
The key features of PEGASIS are
 The BS is fixedat a far distance from the sensor nodes.
 The sensor nodes are homogeneous and energy constrained with uniform energy.
 No mobilityof sensor nodes.
GEAR
GEAR (Geographical and Energy Aware Routing) is a recursive data dissemination protocol WSNs.
It uses energy aware and geographically informed neighbor selection Heuristics to rout a packet to the
targeted region
22
23
CHAPTER-7
7. STANDARDIZATION
In the area of WSNs, several standards are currently either ratified or under development. The
major standardization bodies are the Institute of Electrical and Electronics Engineers (IEEE),
the Internet Engineering Task Force (IETF), the International Society for Automation (ISA)
and the HART Communication Foundation, etc. These standardization bodies have different
focuses and they provide global, open standards for interoperable, low-power wireless sensor
devices. Table 1 provides the comparisons of different standards currently available for the
communication protocols of WSNs.
6.2 IEEE 802.15.4
IEEE 802.15.4 is a standard which specifies the physical layer and MAC layer for
low-rate wireless personal area networks. It is the basis for the ZigBee and
Wireless HART specification, each of which further attempts to offer a complete
networking solution by developing the upper layers which are not covered by the
standard. The features of IEEE 802.15.4 include (IEEE 802.15 WPAN Task Group4, n.d.):
• Data rates of 250 kbps, 40 kbps, and 20 kbps.
• Two addressing modes; 16-bit short and 64-bit IEEE addressing.
• Support for critical latency devices, such as joysticks.
• CSMA-CA channel access.
• Automatic network establishment by the coordinator.
• Fully handshaked protocol for transfer reliability.
• Power management to ensure low power consumption.
24
• 16 channels in the 2.4GHz ISM band, 10 channels in the 915MHz ISM band and one channel
in the 868MHz band.
25
8. CONCLUSION
WSNs have been identified as one of the most prospective technologies in this century. This
chapter provides information concerning both its history and current state of the art. In concrete
terms, the authors provide an overview about the hardware, software and networking protocol
design of this important technology.
The authors also discuss the security and ongoing standardization of this technology.
Depending on applications, many other techniques such as localization, synchronization and
in-network processing can be important, which are not discussed in this chapter.
26
CHAPTER-8
8. REFERENCES
21 Ideas for the 21st Century (1999). Business Week pp. 78–167.
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y. &Cayirci, E. (2002). A survey on sensor
networks, IEEE Communications Magazine40 (8): 102–114.
Barrenetxea, G., Ingelrest, F., Schaefer, G. &Vetterli, M. (2008). Wireless sensor networks for
Environmental monitoring: The sensorscope experience, Proc. of20th IEEE International
Zurich Seminar on Communications (IZS’08). BSN Research in Imperial College London
(n.d.).http://ubimon.doc.ic.ac.uk/bsn/m621.html.
Chong, C.-Y. & Kumar, S. P. (2003). Sensor networks: Evolution, opportunities, and
challenges, Proceedings of the IEEE91 (8): 1247–1256. Connolly, M. & O’Reilly, F. (2005).
Sensor networks and the food industry, Proc. of Workshop OnReal World Wireless Sensor
Networks (REALWSN’05).Contain (n.d.). Crossbow Technology (n.d.). http://www.xbow.com
Dust Networks, Inc. (n.d.).http://www.dustnetworks.com. Expo 2010 Shanghai China (n.d.).
http://www.expo2010.cn. Hill, J. L. (2003). System Architecture
for Wireless Sensor Networks, PhD thesis, Doctor of Philosophy In Computer Science,
University of California at Berkeley, USA.Howitt, I., Manges, W. W., Kuruganti, P. T., All
good, G., Gutierrez, J. A. & Conrad, J. M. (2006). Wireless industrial sensor networks:
Framework for qos assessment and qos Management, ISA Transactions 45(3): 347–359.
IEEE 802.15 WPAN Task Group 4 (n.d.).
http://www.ieee802.org/15/pub/TG4.html.IPSO Alliance - promoting the use of IP for Smart
Objects (n.d.). http://www.ipso-alliance.org.

More Related Content

What's hot

Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Yogesh Fulara
 
wireless body area networks(WBAN)
wireless body area networks(WBAN)wireless body area networks(WBAN)
wireless body area networks(WBAN)kramsheeda
 
Seminar on smart antenna systems
Seminar on smart antenna systemsSeminar on smart antenna systems
Seminar on smart antenna systemsAshok Behuria
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsnnehabsairam
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network reportGanesh Khadsan
 
Intro to wireless sensor network
Intro to wireless sensor networkIntro to wireless sensor network
Intro to wireless sensor networkVrince Vimal
 
Body sensor networks: challenges & applications
Body sensor networks: challenges & applicationsBody sensor networks: challenges & applications
Body sensor networks: challenges & applicationsVasily Ryzhonkov
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its applicationRoma Vyas
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksAneeshGKumar
 
border-security-using-wins
 border-security-using-wins border-security-using-wins
border-security-using-winsAakashkumar276
 
Electronics seminar topics
Electronics seminar topicsElectronics seminar topics
Electronics seminar topics123seminarsonly
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksjuno susi
 
Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless CommunicationShubham Srivastava
 
paper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrokpaper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrokejbyun77
 
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarInternet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarRAJESHKUMARG12
 

What's hot (20)

Manet
ManetManet
Manet
 
Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)
 
wireless body area networks(WBAN)
wireless body area networks(WBAN)wireless body area networks(WBAN)
wireless body area networks(WBAN)
 
Seminar on smart antenna systems
Seminar on smart antenna systemsSeminar on smart antenna systems
Seminar on smart antenna systems
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsn
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
 
Intro to wireless sensor network
Intro to wireless sensor networkIntro to wireless sensor network
Intro to wireless sensor network
 
Body sensor networks: challenges & applications
Body sensor networks: challenges & applicationsBody sensor networks: challenges & applications
Body sensor networks: challenges & applications
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Fog computing
Fog computingFog computing
Fog computing
 
Digital jewellery ppt
Digital jewellery pptDigital jewellery ppt
Digital jewellery ppt
 
border-security-using-wins
 border-security-using-wins border-security-using-wins
border-security-using-wins
 
Electronics seminar topics
Electronics seminar topicsElectronics seminar topics
Electronics seminar topics
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Finger reader
Finger readerFinger reader
Finger reader
 
Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless Communication
 
paper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrokpaper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrok
 
Wireless microservers
Wireless microserversWireless microservers
Wireless microservers
 
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarInternet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
 

Similar to seminar report on wireless Sensor network

Report on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKNishant Bhardwaj
 
A Review On Reactive And Proactive Wireless Sensor Networks Protocols
A Review On Reactive And Proactive Wireless Sensor Networks ProtocolsA Review On Reactive And Proactive Wireless Sensor Networks Protocols
A Review On Reactive And Proactive Wireless Sensor Networks ProtocolsMary Montoya
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Networkijtsrd
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor networkrahulkumargiri
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
 
WSN_Chapter _1.pptx
WSN_Chapter _1.pptxWSN_Chapter _1.pptx
WSN_Chapter _1.pptxKamakshiMB1
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksabdullah roomi
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSnanocdac
 
wireless sensor netw
wireless sensor netwwireless sensor netw
wireless sensor netwaibad ahmed
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Securityijtsrd
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
 
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...IJNSA Journal
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkShubhamTakkar
 

Similar to seminar report on wireless Sensor network (20)

Report on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORK
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
A Review On Reactive And Proactive Wireless Sensor Networks Protocols
A Review On Reactive And Proactive Wireless Sensor Networks ProtocolsA Review On Reactive And Proactive Wireless Sensor Networks Protocols
A Review On Reactive And Proactive Wireless Sensor Networks Protocols
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
 
Ii2414621475
Ii2414621475Ii2414621475
Ii2414621475
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
gcettb presentation on sensor network
gcettb presentation on sensor networkgcettb presentation on sensor network
gcettb presentation on sensor network
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
 
WSN_Chapter _1.pptx
WSN_Chapter _1.pptxWSN_Chapter _1.pptx
WSN_Chapter _1.pptx
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKS
 
wireless sensor netw
wireless sensor netwwireless sensor netw
wireless sensor netw
 
G017344246
G017344246G017344246
G017344246
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
 
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 

More from Jawhar Ali

seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomwareJawhar Ali
 
seminar report on Sql injection
seminar report on Sql injectionseminar report on Sql injection
seminar report on Sql injectionJawhar Ali
 
seminar report on kingapp application
seminar report on kingapp applicationseminar report on kingapp application
seminar report on kingapp applicationJawhar Ali
 
seminar report on school management system
seminar report on school management systemseminar report on school management system
seminar report on school management systemJawhar Ali
 
seminar presentation on apache-spark
seminar presentation on apache-sparkseminar presentation on apache-spark
seminar presentation on apache-sparkJawhar Ali
 
seminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyseminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyJawhar Ali
 
seminar presentation on Digital Jwellery
seminar presentation on Digital Jwelleryseminar presentation on Digital Jwellery
seminar presentation on Digital JwelleryJawhar Ali
 
powerpoint presentation on sixth sense Technology
powerpoint presentation  on sixth sense Technologypowerpoint presentation  on sixth sense Technology
powerpoint presentation on sixth sense TechnologyJawhar Ali
 
Powerpoint presentation on 5G wireless technology
Powerpoint presentation on 5G wireless technologyPowerpoint presentation on 5G wireless technology
Powerpoint presentation on 5G wireless technologyJawhar Ali
 
powerpoint presentation on Google glass
powerpoint presentation on Google glasspowerpoint presentation on Google glass
powerpoint presentation on Google glassJawhar Ali
 
Table Of Contents Google Glass
Table Of Contents Google GlassTable Of Contents Google Glass
Table Of Contents Google GlassJawhar Ali
 
introduction and abstract on Google Glass Major report
introduction and abstract on  Google Glass Major reportintroduction and abstract on  Google Glass Major report
introduction and abstract on Google Glass Major reportJawhar Ali
 
Candidate declaration on Google Glass
Candidate declaration on Google GlassCandidate declaration on Google Glass
Candidate declaration on Google GlassJawhar Ali
 
front Page on Google Glass
 front Page on Google Glass front Page on Google Glass
front Page on Google GlassJawhar Ali
 
Table of contents on blood bank management system
Table of contents on blood bank management systemTable of contents on blood bank management system
Table of contents on blood bank management systemJawhar Ali
 
List of figures in Blood bank management system
List of figures in Blood bank management systemList of figures in Blood bank management system
List of figures in Blood bank management systemJawhar Ali
 
Full report on blood bank management system
Full report on  blood bank management systemFull report on  blood bank management system
Full report on blood bank management systemJawhar Ali
 
Cand declaration
Cand declaration Cand declaration
Cand declaration Jawhar Ali
 
Training report on web developing
Training report on web developingTraining report on web developing
Training report on web developingJawhar Ali
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptJawhar Ali
 

More from Jawhar Ali (20)

seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
 
seminar report on Sql injection
seminar report on Sql injectionseminar report on Sql injection
seminar report on Sql injection
 
seminar report on kingapp application
seminar report on kingapp applicationseminar report on kingapp application
seminar report on kingapp application
 
seminar report on school management system
seminar report on school management systemseminar report on school management system
seminar report on school management system
 
seminar presentation on apache-spark
seminar presentation on apache-sparkseminar presentation on apache-spark
seminar presentation on apache-spark
 
seminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyseminar presentation on Face ricognition technology
seminar presentation on Face ricognition technology
 
seminar presentation on Digital Jwellery
seminar presentation on Digital Jwelleryseminar presentation on Digital Jwellery
seminar presentation on Digital Jwellery
 
powerpoint presentation on sixth sense Technology
powerpoint presentation  on sixth sense Technologypowerpoint presentation  on sixth sense Technology
powerpoint presentation on sixth sense Technology
 
Powerpoint presentation on 5G wireless technology
Powerpoint presentation on 5G wireless technologyPowerpoint presentation on 5G wireless technology
Powerpoint presentation on 5G wireless technology
 
powerpoint presentation on Google glass
powerpoint presentation on Google glasspowerpoint presentation on Google glass
powerpoint presentation on Google glass
 
Table Of Contents Google Glass
Table Of Contents Google GlassTable Of Contents Google Glass
Table Of Contents Google Glass
 
introduction and abstract on Google Glass Major report
introduction and abstract on  Google Glass Major reportintroduction and abstract on  Google Glass Major report
introduction and abstract on Google Glass Major report
 
Candidate declaration on Google Glass
Candidate declaration on Google GlassCandidate declaration on Google Glass
Candidate declaration on Google Glass
 
front Page on Google Glass
 front Page on Google Glass front Page on Google Glass
front Page on Google Glass
 
Table of contents on blood bank management system
Table of contents on blood bank management systemTable of contents on blood bank management system
Table of contents on blood bank management system
 
List of figures in Blood bank management system
List of figures in Blood bank management systemList of figures in Blood bank management system
List of figures in Blood bank management system
 
Full report on blood bank management system
Full report on  blood bank management systemFull report on  blood bank management system
Full report on blood bank management system
 
Cand declaration
Cand declaration Cand declaration
Cand declaration
 
Training report on web developing
Training report on web developingTraining report on web developing
Training report on web developing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 

Recently uploaded

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 

Recently uploaded (20)

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 

seminar report on wireless Sensor network

  • 1. 1 CHAPTER-1 1. ABSTRACT Wireless sensor networks (WSNs) enable new applications and require non-conventional paradigms for protocol design due to several constraints. Owing to the requirement for low device complexity together with low energy consumption (i.e., long network lifetime), a proper balance between communication and signal/data processing Capabilities must be found. This motivates a huge effort in research activities, standardization process, and industrial investments on this field since the last decade. This survey paper aims at reporting an overview of WSNs technologies, main applications and standards, features in WSNs design, and evolutions. In particular, some peculiar applications, such as those based on environmental monitoring, are discussed and design strategies highlighted; a case study based on a real implementation is also reported. Trends and possible evolutions are traced. Emphasis is given to the IEEE 802.15.4 technology, which enables many applications of WSNs. Some example of performance characteristics of 802.15.4-based networks are shown and discussed as a function of the size of the WSN and the data type to be exchanged among nodes.
  • 2. 2 1
  • 3. 3 CHAPTER-2 INTRODUCTION A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. The more modern networks are bi-directional, also enabling control of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on. 2.1WSN TECHNOLOGY The WSN is built of "nodes" – from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts: a radio transceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting. A sensor node might vary in size from that of a shoebox down to the size of a grain of dust, although functioning "motes" of genuine microscopic dimensions have yet to be created. The cost of sensor nodes is similarly variable, ranging from a few to hundreds of dollars, depending on the complexity of the individual sensor nodes. Size and cost constraints on sensor nodes result in corresponding constraints on resources such as energy, memory, computational speed and communications bandwidth. The topology of the WSNs can vary from a simple star network to an advanced multi-hop wireless mesh network. The propagation technique between the hops of the network can be routing or flooding.
  • 4. 4 2.2HISTORY OF WSN The origins of the research on WSNs can be traced back to the Distributed Sensor Networks (DSN) program at the Defense Advanced Research Projects Agency (DARPA) at around 1980. By this time, the ARPANET (Advanced Research Projects Agency Network) had been operational for a number of years, with about 200 hosts at universities and research institutes. DSNs were assumed to have many spatially distributed low-cost sensing nodes that collaborated with each other but operated autonomously, with information being routed to whichever node was best able to use the information. At that time, this was actually an ambitious program. There were no personal computers and workstations; processing was mainly performed on minicomputers and the Ethernet was just becoming popular. Technology components for a DSN were identified in a Distributed Sensor Nets workshop in 1978 (Proceedings of the Distributed Sensor Nets Workshop, 1978). These included sensors (acoustic), communication and processing modules, and distributed software. Researchers at Carnegie Mellon University (CMU) even developed a communication-oriented operating system called Accent (Rashid & Robertson, 1981), which allowed flexible, transparent access to distributed resources required for a fault-tolerant DSN. A demonstrative application of DSN was a helicopter tracking system (Myers et al., 1984), using a distributed array of acoustic microphones by means of signal abstractions and matching techniques, developed at the Massachusetts Institute of Technology (MIT). Even though early researchers on sensor networks had in mind the vision of a DSN, the technology was not quite ready. More specifically, the sensors were rather large and This work was carried out during the tenure of an ERCIM “Alain Bensoussan” Fellowship Program and is part of the MELODY Project, which is funded by the Research Council of Norway under the contract number187857/S10. In the new wave of sensor network research, networking techniques and networked information processing suitable for highly dynamic ad hoc environments and resource constrained sensor nodes have been the focus. Further, the sensor nodes have been much smaller in size (i.e. pack of cards to dust particle) and much cheaper in price, and thus many new civilian applications of sensor networks such as environment monitoring, vehicular sensor network and body sensor
  • 5. 5 network have emerged. Again, DARPA acted as a pioneer in then new wave of sensor network research by launching an initiative research program called SensIT. Which provided the present sensor networks with new capabilities such as ad hoc networking, dynamic querying and tasking, reprogramming and multitasking. At the same time, the IEEE noticed the low expense and high capabilities that sensor networks offer. The organization has defined the IEEE 802.15.4 Standard (IEEE 802.15 WPAN Task Group 4, n.d.) for low data rate wireless personal area networks. Based on IEEE 802.15.4, ZigBee Alliance(ZigBee Alliance, n.d.) has published the ZigBee standard which specifies a suite of high level communication protocols which can be used by WSNs. Currently, WSN has been viewed as one of the most important technologies for the 21st century (21 Ideas for the 21st Century,1999). Countries such as China have Involved WSNs in their national strategic research programmer’s (Ni, 2008). The Commercializations of WSNs are also being accelerated by new formed Companies like Crossbow Technology (Crossbow Technology, n.d.) and Dust Networks 2.3 WSN ARCHITECTURE The architecture of WSN consists of sensor microcontroller unit antenna and transmitter & receiver of the system. Sensor and control units are connected to the battery for required power supply voltage sensor sense the physical environment and send the input to the A/D converter to convert it into digital form and then it is send to the control unit of microcontroller from where the O/P’s are controlled by the mechanism stored in microcontroller unit
  • 6. 6 2.3.1Clustered Architecture A clustered architecture organizes the sensor nodes into clusters, each governed by a cluster-head. The nodes in each cluster are involved in message exchanges with their cluster- heads, and these heads send message to a BS. Clustered architecture is useful for sensor networks because of its inherent suitability for data fusion. The data gathered by all member of the cluster can be fused at the cluster-head, and only the resulting information needs to be communicated to the BS. The cluster formation and election of cluster-heads must be an autonomous, distributed process.
  • 7. 7 2.3.2LAYERED ARCHITECTURE A layered architecture has a single powerful base station, and the layers of sensor nodes around it correspond to the nodes that have the same hop-count to the BS. In the in-building scenario, the BS acts an access point to a wired network, and small nodes form a wireless backbone to provide wireless connectivity. The advantage of a layered architecture is that each node is involved only in short-distance, low- power transmissions to nodes of the neighboring layers. Fig.2 LAYERED ARCHITECTURE
  • 8. 8 2.4Applications of WSN  Global scale  Battle field  Factories  Buildings  Homes  bodies Fig.3-application of WSN
  • 9. 9 Applications of Sensor Networks Using in military Battlefield surveillance and monitoring, guidance systems of intelligent missiles, detection of attack by weapons of mass destruction such as chemical, biological, or nuclear Using in nature Forest fire, flood detection, habitat exploration of animals Using in health Monitor the patient’s heart rate or blood pressure, and sent regularly to alert the concerned doctor, provide patients a greater freedom of movement Using in home (smart home) Sensor node can built into appliances at home, such as ovens, refrigerators, and vacuum cleaners, which enable them to interact with each other and be remote-controlled Using in office building Airflow and temperature of different parts of the building can be automatically controlled Using in warehouse Improve their inventory control system by installing sensors on the products to track their movement
  • 10. 10 The topology of the WSNs can vary from a simple star network to anadvanced multi-hop wireless mesh network. The propagation technique between the hops of the network can be routing or flooding. Fig:-Typical multi-hop wireless sensor network architecture
  • 11. 11 CHAPTER-3 3. SENSOR Sensors are the very important part of any sensor network it is the primery hub of wireless sensor networks. All wireless technology is depend upon these sensors in our general life we use many sensors, do u know that how much sensors are working in your system or in your mobile cell. U cannot think about a network without sensor Fig.4 sensors DEFINITION A 'sensor' is a device that measures a physical quantity and converts it into a 'signal' which can be read by an observer or by an instrument. For example, a mercury thermometer converts the measured temperature into the expansion and contraction of a liquid which can be read on a calibrated glass tube.
  • 12. 12 3.2 TYPE OF SENSOR There are a lot of different types of sensors. Sensors are used in everyday objects. 3.2.1Thermal sensors A sensor that detects temperature. Thermal sensors are found in many laptops and computers in order to sound an alarm when a certain temperature has been exceeded.  temperature sensors: thermometers   heat sensors: bolometer, calorimeter 3.2.2Electromagnetic sensors An electronic device used to measure a physical quantity such as pressure or loudness and convert it into an electronic signal of some kind (e.g. a voltage).  Electrical resistance sensors: ohmmeter  electrical voltage sensors: voltmeter  electrical power sensors: watt-hour meter  magnetism sensors: magnetic compass  metal detectors  Radar 3.2.3Mechanical sensors  Pressure sensors: barometer   Vibration and shock sensors
  • 13. 13 Motion sensors A motion sensor detects physical movement in a given area.  radar gun, tachometer Car sensors  reversing sensor  rain sensor 3.3The trend of sensors Because of certain disadvantages of physical contact sensors, newer technology non-contact sensors have become prevalent in industry, performing well in many applications. The recent style of non-contact sensors shows that “Thin (g) is In”. Market trends show that form and size are important. Users are looking for smaller and more accurate sensors. New technologies for the sensing chips are breaking application barriers. For the future, the trend will be to continue to provide smaller, more affordable sensors that have the flexibility to fit even more applications in both industrial and commercial environments.
  • 14. 14 CHAPTER-4 4. FEATURES: In spite of the diverse applications, sensor networks pose a number of unique technical features due to the following factors: 4.1. Ad hoc deployment: Most sensor nodes are deployed in regions which have no infrastructure at all. A typical way of deployment in a forest would be tossing the sensor nodes from an aeroplane. In such a situation, it is up to the nodes to identify its connectivity and distribution. 4.2 .Unattended operation: In most cases, once deployed, sensor networks have no human intervention. Hence the nodes themselves are responsible for reconfiguration in case of any changes. 4.3. Unmetered: The sensor nodes are not connected to any energy source. There is only a finite source Of energy, which must be optimally used for processing and communication? An interesting fact is That communication dominates processing in energy consumption. Thus, in order to make optimal Use of energy, communication should be minimized as much as possible. 4.4 Dynamic changes: It is required that a sensor network system be adaptable to changing Connectivity (for e.g., due to addition of more nodes, failure of nodes etc.) as well as changing Environmental stimuli. Thus, unlike traditional networks, where the focus is on maximizing channel throughput or minimizing node deployment, the major consideration in a sensor network is to extend the system lifetime as well as the system robustness.
  • 15. 15 CHAPTER-5 5. APPLICATIONS Fig.5 Application of WSN The original motivation behind the research into WSNs was military application. Examples of military sensor networks include large-scale acoustic ocean surveillance systems for the detection of submarines, self-organized and randomly deployed WSNs for battlefield surveillance and attaching micro sensors to weapons for stockpile surveillance (Pester, 2000).
  • 16. 16 As the costs for sensor nodes and communication networks have been reduced, many other potential applications including those for civilian purposes have emerged. The following are a few examples. 5.1 Environmental Monitoring Environmental monitoring (Steered et al., 2000) can be used for animal tracking, forest surveillance, flood detection, and weather forecasting. It is a natural candidate for applying WSNs, because the variables to be monitored, e.g. temperature, are usually distributed over a large region. One example is that researchers from the University of Southampton have built a glacial environment monitoring system using WSNs in Norway (Martinez et al., 2005). They collect data from sensor nodes installed within the ice and the sub-glacial sediment without the use of wires which could disturb the environment. Fig:6 - Environmental Monitor
  • 17. 17 5.2 Health Monitoring WSNs can be embedded into a hospital building to track and monitor patients and all medical resources. Special kinds of sensors which can measure blood pressure, body temperature and electrocardiograph (ECG) can even be knitted into clothes to provide remote nursing for the elderly. When the sensors are worn or implanted for healthcare purposes, they form a special kind of sensor network called a body sensor network (BSN). BSN is a rich interdisciplinary area which revolutionizes the healthcare system by allowing inexpensive, continuous and ambulatory health monitoring with real-time updates of medical records via the Internet. 5.3 TRAFFIC CONTROL Sensor networks have been used for vehicle traffic monitoring and control for some time. At many crossroads, there are either overhead or buried sensors to detect vehicles and to control the traffic lights. Furthermore, video cameras are also frequently used to monitor road segments with heavy traffic. However, the traditional communication networks used to connect these sensors are costly, and thus traffic monitoring is usually only available at a few critical points in a city (Chong & Kumar, 2003). WSNs will completely change the landscape of traffic monitoring and control by installing cheap sensor nodes in the car, at the parking lots, along the roadside, etc. Street line, Inc. (Street line, Inc., n.d.) is a company which uses sensor network technology to help drivers find unoccupied parking places and avoid traffic jams. The solutions provided by Street line can significantly improve the city traffic management and reduce the emission of carbon dioxide.
  • 18. 18 5.4 SMART BUILDINGS The New York Times Building - a Smart Building The headquarters of the New York Times is an example of how different smart building technologies can be combined to reduce energy consumption and to increase user comfort. Overall, the building consumes 30% less energy than traditional office skyscrapers. Opened in November 2007 and designed by Renzo Piano, the building has a curtain wall which serves as a sunscreen and changes color during the day. This wall consists of ceramic rods, “a supporting structure for the screen and an insulated window unit” (Hart, 2008). Fig.7 –Smart building The building is further equipped with lighting and shading control systems based on ICT technologies. The lighting system ensures that electrical light is only used when required. Further day lighting measures include a garden in the centre of the ground floor which is open to the sky as well as a large area skylight.
  • 19. 19 The electrical ballasts in the lighting system are equipped with chips that allow each ballast to be controlled separately. The shading system tracks the position of the sun and relies on a sensor network to automatically actuate the raising and lowering of the shades. The high-tech HVAC system is equipped with sensors that measure the temperature. It is further able to rely on free air cooling, i.e. fresh air on cool mornings is brought into the HVAC system. An automated building system monitors in parallel “the air conditioning, water cooling, heating, fire alarm, and generation systems” (Siemens, 2008). The system relies on a large-scale sensor network composed of different kinds of sensors which deliver real-time information. Consequently, energy can be saved as only as few systems are turned on as needed. 5.5 SECURITY While the future of WSNs is very prospective, WSNs will not be successfully deployed if security, dependability and privacy issues are not addressed adequately. These issues become more important because WSNs are usually used for very critical applications. Furthermore, WSNs are very vulnerable and thus attractive to attacks because of their limited prices andhuman-unattended deployment .IT provide kee management, authentication, intrusion detection, privacy protection which makes WSN secure.
  • 20. 20 CHAPTER-6 6. Routing Protocols for Flooding Flooding is an old routing mechanism that may also be used in sensor networks. In Flooding, a node received data or the management packets to its neighbors by broadcasting, unless a maximumhops for that packet are reached or the destination of the packets is arrived. here are some deficiencies for this routing technique [ Implosion: is the case where a duplicated data or packets are sent to the same node. Overlap: iftwo sensor nodes cover an overlapping measuring region, both of them willsense/detect the same data. As a result, their neighbor nodes will receive duplicated data or messages. Resource blindness: A WSN protocol must be energy resource-aware and adapts its sensing, communication and computation to . Gossiping Gossiping protocol is an alternative to flooding mechanism. In Gossiping, nodes ca the incomingdata/packets to randomly selected neighbor node. Once a gossiping node receives the messages, it can forward the data back to that neighbor or to another one randomly selected neighbor node. This technique assists in energy conservation by randomization. Gossiping can solve the implosion probl SPIN SPIN (Sensor Protocols for Information via Negotiation) is a family of adaptive protocols for WSNs. Their design goal is to avoid the drawbacks of flooding protocols mentioned above by utilizing data negotiation and resource-adaptive algorithms. Directed delusion Directed delusion is another data dissemination and aggregation protocol. It is a data- centric and application aware routing protocol for WSNs. It aimsat naming all data generated by sensor nodes by attribute-value pairs.
  • 21. 21 LEACH LEACH (Low Energy Adaptive Clustering Hierarchy) is a self-organizing, adaptive clustering-based protocol that uses randomized rotation of cluster-heads to evenly distribute the energy load among the sensor nodes in the network PEGASIS PEGASIS (Power-E_client GAthering in Sensor Information Systems) is a greedy chain- based power e_cient algorithm. The key features of PEGASIS are  The BS is fixedat a far distance from the sensor nodes.  The sensor nodes are homogeneous and energy constrained with uniform energy.  No mobilityof sensor nodes. GEAR GEAR (Geographical and Energy Aware Routing) is a recursive data dissemination protocol WSNs. It uses energy aware and geographically informed neighbor selection Heuristics to rout a packet to the targeted region
  • 22. 22
  • 23. 23 CHAPTER-7 7. STANDARDIZATION In the area of WSNs, several standards are currently either ratified or under development. The major standardization bodies are the Institute of Electrical and Electronics Engineers (IEEE), the Internet Engineering Task Force (IETF), the International Society for Automation (ISA) and the HART Communication Foundation, etc. These standardization bodies have different focuses and they provide global, open standards for interoperable, low-power wireless sensor devices. Table 1 provides the comparisons of different standards currently available for the communication protocols of WSNs. 6.2 IEEE 802.15.4 IEEE 802.15.4 is a standard which specifies the physical layer and MAC layer for low-rate wireless personal area networks. It is the basis for the ZigBee and Wireless HART specification, each of which further attempts to offer a complete networking solution by developing the upper layers which are not covered by the standard. The features of IEEE 802.15.4 include (IEEE 802.15 WPAN Task Group4, n.d.): • Data rates of 250 kbps, 40 kbps, and 20 kbps. • Two addressing modes; 16-bit short and 64-bit IEEE addressing. • Support for critical latency devices, such as joysticks. • CSMA-CA channel access. • Automatic network establishment by the coordinator. • Fully handshaked protocol for transfer reliability. • Power management to ensure low power consumption.
  • 24. 24 • 16 channels in the 2.4GHz ISM band, 10 channels in the 915MHz ISM band and one channel in the 868MHz band.
  • 25. 25 8. CONCLUSION WSNs have been identified as one of the most prospective technologies in this century. This chapter provides information concerning both its history and current state of the art. In concrete terms, the authors provide an overview about the hardware, software and networking protocol design of this important technology. The authors also discuss the security and ongoing standardization of this technology. Depending on applications, many other techniques such as localization, synchronization and in-network processing can be important, which are not discussed in this chapter.
  • 26. 26 CHAPTER-8 8. REFERENCES 21 Ideas for the 21st Century (1999). Business Week pp. 78–167. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y. &Cayirci, E. (2002). A survey on sensor networks, IEEE Communications Magazine40 (8): 102–114. Barrenetxea, G., Ingelrest, F., Schaefer, G. &Vetterli, M. (2008). Wireless sensor networks for Environmental monitoring: The sensorscope experience, Proc. of20th IEEE International Zurich Seminar on Communications (IZS’08). BSN Research in Imperial College London (n.d.).http://ubimon.doc.ic.ac.uk/bsn/m621.html. Chong, C.-Y. & Kumar, S. P. (2003). Sensor networks: Evolution, opportunities, and challenges, Proceedings of the IEEE91 (8): 1247–1256. Connolly, M. & O’Reilly, F. (2005). Sensor networks and the food industry, Proc. of Workshop OnReal World Wireless Sensor Networks (REALWSN’05).Contain (n.d.). Crossbow Technology (n.d.). http://www.xbow.com Dust Networks, Inc. (n.d.).http://www.dustnetworks.com. Expo 2010 Shanghai China (n.d.). http://www.expo2010.cn. Hill, J. L. (2003). System Architecture for Wireless Sensor Networks, PhD thesis, Doctor of Philosophy In Computer Science, University of California at Berkeley, USA.Howitt, I., Manges, W. W., Kuruganti, P. T., All good, G., Gutierrez, J. A. & Conrad, J. M. (2006). Wireless industrial sensor networks: Framework for qos assessment and qos Management, ISA Transactions 45(3): 347–359. IEEE 802.15 WPAN Task Group 4 (n.d.). http://www.ieee802.org/15/pub/TG4.html.IPSO Alliance - promoting the use of IP for Smart Objects (n.d.). http://www.ipso-alliance.org.