SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN
0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME
140
DESIGN OF OPTIMAL SYSTEM -LEVEL FOR EMBEDDED
WIRELESS SENSOR UNIT
Sajida Begum. PhD Scholar,
Dr. Sardar Ali,
Professor & Head Of EEE Dept RITS,Chevella.
ABSTRACT
This paper presents wireless sensor node structure to obtain high communication bandwidth
with the flexibility to efficiently implement novel communication protocols. Since the wireless sensor
devices are very useful for high range of applications. So far limited processing, storage and effective
energy sources are available for practice. Therefore this design of sensor storage unit challenges to
support the application especially with optimization under flexible power consumption and also
capable for radio communication system for high performance. This unit is design using commercial
controllers and radio communication technology. The ability of the sensor unit system is optimize
through its performance by using unconventional protocols and demonstrated in four cases, such as
power management, synchronization, location and get up.
1 INTRODUCTION
The wireless sensors are embedded to combine the functions, like, sensing, computation, and
communication in a single device. The power of individual element is able to deploy a large number
of nodes that are integrated with a physical environment that automatically configure into distributed
sensing platform. Usage scenarios range from the real-time tracking, to monitoring of environmental
conditions, to ubiquitous computing environments, to in situ monitoring of the health of structures or
equipment. While often referred to as networked sensors, they can also be actuators that extend the
reach of cyberspace into the physical world. The core design challenge for wireless embedded sensors
lies in coping with their harsh resource constraints. Embedded processors with kilobytes of memory
are used to implement complex, distributed, ad-hoc networking protocols. These constraints derive
from the vision that these devices will be produced in vast quantities, must be small and inexpensive,
and ideally will operate off of ambient power. As Moore’s law marches on, these deviceswill get
smaller, not just grow more powerful at a given size. One of the most difficult resource constraints to
meet in the context of wireless embedded sensors is power consumption. As physical size decreases,
so does energy capacity. Because communication is often the single largest energy consumer, the
optimization of wireless communication protocols is key to meeting energy constraints. Mature
devices, such as cell phones and pagers, use specialized communication protocols on ASICs that
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN
ENGINEERING AND TECHNOLOGY (IJARET)
ISSN 0976 - 6480 (Print)
ISSN 0976 - 6499 (Online)
Volume 4, Issue 3, April 2013, pp. 140-146
© IAEME: www.iaeme.com/ijaret.asp
Journal Impact Factor (2013): 5.8376 (Calculated by GISI)
www.jifactor.com
IJARET
© I A E M E
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN
0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME
141
provide ultra-low-power implementations of these protocols [1]. This efficiency is possible because
they target a narrow set of well-defined application scenarios. The complex tradeoffs between power
consumption, bandwidth, and latency can be explored and evaluated with respect to specific
performance goals. The result can be seen in the standby battery life of about a week in cell phones
while pagers run for months off of a AAA battery. Application specific pager protocols trade latency
and bandwidth for decreased energy consumption. The power of networked embedded devices is their
flexibility and universality. The wide range of applications being targeted by embedded wireless
sensors makes it difficult to develop general-purpose protocols that are efficient for all applications.
This paper presents the architecture of a wireless embedded sensor node that enables
application specific optimization of communication protocols. Much work has focused on the design
of low-power radio circuits, reconfigurable logic, and data path optimizations. Our focus is on
architectural support for system-level optimization.
2 DESIGN STRUCTURE OF THE SYSTEM
The goal of our design is to provide an open platform for experimenting with wireless embedded
networks. It must be compact, low power and flexible in order to meet a wide range of experimental
goals. The design is based on the architecture presented in [2]. It has a central microcontroller that
performs all sensing, communication and computation. An event driven OS is used to multiplex the
concurrent flows of information across this single controller, which is connected to an RF transceiver,
a secondary storage device, a sensor oriented I/O system, and a power management subsystem.
Secondary controllers are not used to abstract the raw characteristics of the I/O devices from the main
processing unit. While this places higher demands on the central controller, it allows the controller to
exploit the sensors and radio based on situational requirements. One of the key differences between
our design and that described in [2] is that we have incorporated hardware support to increase radio
bandwidth and time synchronization accuracy while maintaining the ability to implement a wide
range of networking protocols. It also has greater capacity, a richer sensor interface, and better power
management.
Fig 1: Mica node Overview.
2.2 Operating Principle
The Mica hardware platform has been designed to support the TinyOS execution model
presented in [2]. TinyOS is an event-based operating system where all system functions are broken
down into individual components that interact through narrow command and event interfaces. The
component-based structure of TinyOS allows for an application designer to select from a variety of
system components in order to meet application specific goals. One of the key principles of TinyOS is
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN
0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME
142
that there are no long-running threads in the system. Each component acts as like a finite state
machine using commands and events to transition from one state to the next. There is no blocking or
waiting in system components. This is intended to project the natural interface of hardware into
software. This projection allows for a migration of the hardware/software boundary. A core part of the
TinyOS runtime model is that commands and events execute quickly and run to completion, just as
commands to hardware modules are accepted quickly. There is no mechanism for suspending and
preempting a command. One of the consequences of this approach to system design is that commands
and events cannot perform long running computation. If they did, time critical system events could
not proceed. To allow for general computation inside a TinyOS component the concept of a task is
introduced. A component can post tasks to a system scheduler for background processing. When
executed, they run to completion and are not preempted by other tasks. At most one task is active in
the system at any time. However, low-level system events are able to preempt tasks. This allows for
complex computation to be performed in the background without interfering with the low-level event
flow that may have real-time constraints. In this model, tasks simulate the parallelism that is inherent
in many hardware components. The use of the TinyOS programming model has a significant impact
on the design of our communications subsystem. The fine-grain multithreading it provides allows us
to interleave application-level and protocol-level processing on a single controller. Without a
hardware boundary between application and protocol processing arbitrary communication interfaces
can be constructed.
3.1 Transmission of Wireless Data
To communicate over the radio, protocols must be built on top of it. Figure 2 illustrates the
key phases of a packet-based wireless communication protocol and provides a framework for
discussing architectural alternatives and the impact they have on application performance. The first
step in many wireless protocols is to encode the data for transmission. The coding schemes are
designed to increase the probability of a successful transmission by preventing and correcting slight
errors. The actual transmission begins with a start symbol that to signals to the receiver that a packet
is coming. It is then followed by a synchronization signal and the encoded data. As the transmission
proceeds, the transmitter must precisely control timing of each bit transition. Skewed bit transitions
can cause the sender and receiver to get out of synch, resulting in an unsuccessful transmission. Most
protocols include a media access control (MAC) phase prior to the actual transmission. MAC
protocols are designed to allow multiple transmitters to share a single communication channel. One of
the simplest MAC protocols is collision avoidance (CSMA). Just prior to transmitting, the sender
checks whether the channel is idle. If so, it proceeds, otherwise it waits for the channel to become
idle. For a receiver, the first part of data reception is to detect that a transmission has begun. The
channel is monitored by sampling the receive pin. There is there is often a significant amount of noise
on the communication channel that must be filtered and ignored while listening for the start symbol.
The length and format of the start symbol can be optimized for the expected noise levels. In order to
properly detect the start symbol, the receiver must sample the channel at least twice as fast as the
transmission speed. Otherwise the relative phase of the sampling and the transmission may result in
the receiver missing the start symbol. Once detected, the receiver must then synchronize itself to the
exact phase of the incoming transmission. This synchronization step is critical in allowing the receiver
to determine the start and end of the bit windows being used by the transmitter. Synchronization
requires the incoming transmission to be sampled repeatedly so the exact timing of the bit transitions
can be determined. Once synchronized, receiver then samples the value of the incoming signal at the
center of each bit. Precise care must be taken to minimize skew in the sampling rate and timing. As
the individual bits are extracted from the radio, they are assembled into blocks that are the encoded
version of actual data messages. Finally, the blocks are decoded back into the original data and
assembled into a packet. The decoding process can often correct bit errors in the received signal and
reproduce the original data.
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN
0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME
143
4.3 Mica Hardware Protocol Processing
In the Mica platform we develop an architecture that maintains the flexibility created by
directly interfacing with the radio but then exploit dedicated hardware to improve efficiency. Instead
of including additional hardware as an abstraction layer, we use it in the form of protocol accelerators.
We place hardware accelerators are alongside the communication path between the controller and the
radio. At any time, the controller can directly interact with the radio with exact precision. However,
when appropriate the controller can enlist the help of the hardware accelerators. The accelerators are
designed to automatically perform some of the CPU intensive portions of communication protocols.
In our implementation, we use hardware accelerators for synchronization, bit timing, and bit
sampling. While reducing CPU use, the hardware accelerators do not abstract away what operations
are being performed. The architecture is designed to maintain a tight coupling between the application
and the communication protocol while providing increased efficiency. In our hardware-accelerated
protocols, we continue to rely on programmed I/O to perform the start symbol detection. However,
once detected we offload the overhead of synchronization to a timing hardware accelerator. The
timing accelerator automatically captures the exact timing of the edge transition of the timing pulse.
The incoming signal is automatically sampled every .25 us. By searching for the start symbol prior to
engaging the timing hardware accelerator, we avoid the timing problems seen with the UART.
Detection of the start symbol gives us an indication of when the timing pulse will arrive and keeps us
from of assuming every pulse is the timing pulse. Additionally, unlike the UART our timing
mechanism exposes the value captured instead of only keeping it for internal use. If desired this
timing information can even be propagated up into an application Once the timing information is
captured, software then uses it to configure a serialization accelerator that automatically times and
samples the individual bits. During the majority of a transmission and reception, the main data path
only deals with the byte-oriented interface provided by the serializer. The individual bits are handled
in hardware. Each of these hardware accelerators has been built out of standard microcontroller
functional units. They are implemented by combining the functionality of input capture registers,
timer controlled output pins and the SPI communication hardware. The input capture register is used
to automatically capture the timing pulse. The captured value can then be use to configure the timing
register controlling an output pin. One of the control options is to have the hardware automatically
toggle the output pin each time the counter expires. Once configured, this output pin becomes a
clocking signal that times each arriving bit. Finally, SPI hardware is then used to capture the value of
the radio signal each time the clock line is triggered by the counter.
LOW POWER USAGES
Fig 5: Phases of Transmission and Reception for Communication
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN
0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME
144
5 EVALUATION OPTIMIZATION
To demonstrate the functionality of our architecture we have used the Mica node to
implement a traditional, packet-based protocol stack. It consists of an Active Messages [13] based
application interface where tagged messages are automatically dispatched to application message
handlers. Internal to the protocol implementation, there is a packet layer that can optionally perform
CRC checks on each packet as well as a data-encoding layer that performs single error correction,
dual error detection encoding on each byte allowing single-bit transmission errors to be fixed
automatically. In addition to delivering high bandwidth data communication using standard protocols,
we have also been able to demonstrate how the flexibility we provided plays a critical role in enabling
systems-level optimizations. We show this by implementing four application specific protocols that
improve overall system performance for their intended application. The first of these is a protocol that
explores the tradeoff between transmitter and receiver overhead.
5.1 Low Power Usages
In sensor networks, multi-hop routing topologies are built by having intermediate nodes act as
relays for remote nodes. These routing nodes must listen for communication and propagate messages
towards their destination. While listening, the radio consumes almost as much energy as when
transmitting. Even when no communication is taking place, considerable amounts of energy is spent
searching for the next packet. In many application scenarios, the energy spent while waiting for a
transmission can represent more than 90% of a node’s total energy budget. Embedded sensor
researchers have claimed that high-level protocols must be used to reduce energy consumed of nodes
when not actively transmitting [14]. One solution is to have windows of communication periods and
windows of sleep periods[15]. However, it has been shown that in some situations poor interaction
between high-level power saving techniques and low-level communication protocols can actually lead
to an increase in energy consumption when using windowing mechanisms [16]. We have been able to
show that alternative is to modify the lowest levels of the communication stack. Unlike windowing,
which layer itself on top of standard low-level protocols, we change the underlying communication
protocol to optimize for the receiver power consumption. Instead of having the sender simply transmit
a start symbol followed by a packet, we can require that the sender first transmit a preamble to get the
attention of any possible receiver. It can then follow with the start symbol and packet. This algorithm
is depicted in Figure 5. The receiver then only has to listen often enough to pick up any portion of the
attention signal. Precise control over the power state of the radio allows the protocol to turn off the
radio between each sample. The duty cycle of the receiver becomes proportional to the length of this
preamble. Once detected, the preamble will cause the receiver to search for the pending start symbol.
This protocol optimization trades power consumption on the sender for power consumption on the
receiver. The sender must transmit longer, but the receiver can sample the radio channel less
frequently. The optimal ratio is dependent on the communication patterns of the application. We have
implemented a version of this scheme where the receiver has a 10% duty cycle and the sender must
transmit a preamble of 5 bits. The 10% receiver duty cycle not only results in a 90% reduction of
radio power consumption, it also produced a 33% reduction in the CPU overhead associated with
monitoring the radio. On the other hand, the sender only incurs a slight increase in overhead – less
than 1% overhead on a 30-byte packet. This slight overhead increase is because the sample rate of the
receiver is 3000 times per second. Fine-grained control is used to power-on, sample, and power-off
the radio in 30us. Application level windowing protocols generally have window sizes of seconds or
more. Depending on application specific goals, the receiver overhead can be reduced arbitrarily at the
expense of bandwidth, latency, and transmission overhead. Moreover, an application can change the
protocol at runtime based on network activity. This simple optimization demonstrates the benefits that
are enabled by our architecture for flexible communication protocols by exploiting the ability to tailor
protocols to application specific criteria.
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN
0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME
145
Table 1: Power Consumption Details of Sensor
1. Cost checking = (radio on time)* (radio power consumption
2. Power consumption = checking frequency)* (cost of checking)
3. Average wakeup time = ½ (checking period)= ½ *(checking
frequency)
1. Cost checking = (radio on time)* (radio power consumption
2. Power consumption = checking frequency)* (cost of checking)
3. Average wakeup time = ½ (checking period)= ½ *(checking frequency)
REFERENCES
1. McMahan, M.L., Evolving Cellular Handset Architectures but a Continuing, Insatiable Desire
for DSP MIPS. 2000, Texas Instruments Incorporated.
2. Hill, J., et al. System architecture directions for networked sensors. in ASPLOS 2000. 2000.
3. Atmel Corporation, Atmega103(L) Datasheet.2001, Atmel Corporation:
http://www.atmel.com/atmel/acrobat/doc0945.pdf.
4. Atmel Corporation, AT90S2323/LS2323/S2343/LS2343 Datasheet. 2001:
http://www.atmel.com/atmel/acrobat/doc1004.pdf.
5. Dallas Semiconductor, DS2401 Silicon Serial Number: http://pdfserv.maxim-
ic.com/arpdf/DS2401.pdf.
6. RF Monolithics, I., TR1000 Data Sheet. 1999: http://www.rfm.com/products/data/tr1000.pdf.
7. Atmel Corporation, AT45DB041B Datasheet. 2001:
http://www.atmel.com/atmel/acrobat/doc1938.pdf.
8. Maxim, Maxim 1-Cell to 2-Cell, Low-Noise, High-Efficiency, Step-Up DC-DC Converter,
MAXIM1678. 1998: http://pdfserv.maxim-ic.com/arpdf/MAX1678.pdf.
9. Energizer, Alkaline AA battery data sheet: www.energizer.com.
10. Homewood, M. and M. McLaren. Meiko CS-2 interconnect. Elan-Elite design. 1993.
11. The Official Bluetooth Website: http://www.bluetooth.com/.
12. RF Monolithics Inc, RFM DR2000 Development Board. 2000:
http://www.rfm.com/products/data/dr2000manual.pdf.
13. von Eicken, T., et al. Active messages: a mechanism for integrated communication and
computation. in 19th Annual International Symposium on Computer Architecture. 1992.
14. Estrin, D., Directed Diffusion. 2000.
15. Wei Ye, J.H.a.D.E., An Energy-Efficient MAC Protocol for Wireless Sensor Networks. 2001:
Submitted for review, July 2001.
16. M. Stemm, P.G., D. Harada, R. Katz. Reducing power consumption of network interfaces in
hand-held devices. in International Workshop on Mobile Multimedia Communications
(MoMuc-3). 1996. Princeton, NJ.
17. Lamport, L., Time, clocks, and the ordering of events in a distributed system. Comm., 1978.
ACM 21(7): p. 558-565.
18. Mills, D.L., Internet time synchronization: the Network Time Protocol. IEEE Trans.
Communications, 1991. COM-39(10): p. 1482-1493.
19. Doherty, L., K.S.J. Pister, and L.E. Ghaoui. Convex position estimation in wireless sensor
networks. in IEEE Infocom. 2001: IEEE Computer Society Press.
20. Borriello, J.H.a.G., Location Systems of Ubiuitous Computing. Computer, 2001. 34(8): p. 57-
66.
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN
0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME
146
21. Bahl, P. and V. Padmanabhan, RADAR: An in-building RF-based user location and tracking
system. IEEE Infocom, 2000. 2: p. 775-784.
22. Priyantha, N.B., A. Chakraborty, and H. Balakrishnan. The Circket Location-Support System.
in MobiCom 2000. 2000. Boston, Massachusetts.
23. J.L. Da Silva Jr., J.S., M. J. Ammer, C. Guo, S. Li, R. Shah, T. Tuan, M. Sheets, J.M. Ragaey,
B. Nikolic, A Sangiovanni-SSVincentelli, P. Wright., Design Methodology for Pico Radio
Networks. 2001, Berkeley Wireless Research Center.
24. Pottie, G. and W. Kaiser, Wireless Integrated Network Sensors (WINS): Principles and
Approach. Communications of the ACM, 2000. 43.
25. B. Atwood, B.W., and K.S.J. Pister. Preliminary circuits for smart dust. in Southwest
Symposioum on Mixed-Signal Design. 2000. San Diego, Ca.
26. K.S.J Pister, J.M.K., B.E. Boser, Smart Dust: Wireless Networks of Millimeter-Scale Sensor
Nodes. Electronics Research Laboratory Research Summary, 1999
27. Neeraj Tiwari, Rahul Anshumali and Prabal Pratap Singh, “Wireless Sensor Networks:
Limitation, Layerwise Security Threats, Intruder Detection” International Journal of
Electronics and Communication Engineering &Technology (IJECET) Volume 3, Issue 2,
2012, pp. 22 - 31, ISSN PRINT: 0976- 6464, ISSN ONLINE: 0976 –6472
28. Mrs.R.Rajasree, Dr.G.Kalivarathan, “Analysis of Programming Aspects of Wireless Sensor
Networks And Non Uniformity Issues-A Feasible Study” International Journal of Electronics
and Communication Engineering &Technology (IJECET) Volume 3, Issue 3, 2012, pp. 219 -
226, ISSN PRINT: 0976- 6464, ISSN ONLINE: 0976 –6472

More Related Content

What's hot

A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNIAEME Publication
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKIAEME Publication
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsIOSR Journals
 
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 PlatformImplementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 PlatformIRJET Journal
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Applicationijsrd.com
 
Real time approach of piezo actuated beam for wireless seismic measurement us...
Real time approach of piezo actuated beam for wireless seismic measurement us...Real time approach of piezo actuated beam for wireless seismic measurement us...
Real time approach of piezo actuated beam for wireless seismic measurement us...eSAT Journals
 
Remote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networksRemote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networkseSAT Journals
 
Design of a Wireless Sensor Network from an Energy Management Perspective
Design of a Wireless Sensor Network from an Energy Management PerspectiveDesign of a Wireless Sensor Network from an Energy Management Perspective
Design of a Wireless Sensor Network from an Energy Management Perspective?? ?
 
Scheduling for interference mitigation using enhanced intercell interference ...
Scheduling for interference mitigation using enhanced intercell interference ...Scheduling for interference mitigation using enhanced intercell interference ...
Scheduling for interference mitigation using enhanced intercell interference ...eSAT Journals
 
Ijarcet vol-2-issue-4-1659-1662
Ijarcet vol-2-issue-4-1659-1662Ijarcet vol-2-issue-4-1659-1662
Ijarcet vol-2-issue-4-1659-1662Editor IJARCET
 
Modern Street Lightening System with Intensity Control using GSM
Modern Street Lightening System with Intensity Control using GSMModern Street Lightening System with Intensity Control using GSM
Modern Street Lightening System with Intensity Control using GSMpaperpublications3
 
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...chokrio
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksabdullah roomi
 
A Review of Physical, Data and Network Layer Specification and its Protocols ...
A Review of Physical, Data and Network Layer Specification and its Protocols ...A Review of Physical, Data and Network Layer Specification and its Protocols ...
A Review of Physical, Data and Network Layer Specification and its Protocols ...Editor IJMTER
 
A Framework for Wireless LAN Monitoring and Its Applications 
A Framework for Wireless LAN Monitoring and Its Applications A Framework for Wireless LAN Monitoring and Its Applications 
A Framework for Wireless LAN Monitoring and Its Applications 2012engg
 
Survey on routing techniques for manets and wireless sensor networks
Survey on routing techniques for manets and wireless sensor networksSurvey on routing techniques for manets and wireless sensor networks
Survey on routing techniques for manets and wireless sensor networksIAEME Publication
 

What's hot (19)

A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORK
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network Models
 
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 PlatformImplementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
 
SEDRP
SEDRPSEDRP
SEDRP
 
Real time approach of piezo actuated beam for wireless seismic measurement us...
Real time approach of piezo actuated beam for wireless seismic measurement us...Real time approach of piezo actuated beam for wireless seismic measurement us...
Real time approach of piezo actuated beam for wireless seismic measurement us...
 
Remote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networksRemote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networks
 
Design of a Wireless Sensor Network from an Energy Management Perspective
Design of a Wireless Sensor Network from an Energy Management PerspectiveDesign of a Wireless Sensor Network from an Energy Management Perspective
Design of a Wireless Sensor Network from an Energy Management Perspective
 
Scheduling for interference mitigation using enhanced intercell interference ...
Scheduling for interference mitigation using enhanced intercell interference ...Scheduling for interference mitigation using enhanced intercell interference ...
Scheduling for interference mitigation using enhanced intercell interference ...
 
Ijarcet vol-2-issue-4-1659-1662
Ijarcet vol-2-issue-4-1659-1662Ijarcet vol-2-issue-4-1659-1662
Ijarcet vol-2-issue-4-1659-1662
 
Ai04606213215
Ai04606213215Ai04606213215
Ai04606213215
 
Modern Street Lightening System with Intensity Control using GSM
Modern Street Lightening System with Intensity Control using GSMModern Street Lightening System with Intensity Control using GSM
Modern Street Lightening System with Intensity Control using GSM
 
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
A Review of Physical, Data and Network Layer Specification and its Protocols ...
A Review of Physical, Data and Network Layer Specification and its Protocols ...A Review of Physical, Data and Network Layer Specification and its Protocols ...
A Review of Physical, Data and Network Layer Specification and its Protocols ...
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
A Framework for Wireless LAN Monitoring and Its Applications 
A Framework for Wireless LAN Monitoring and Its Applications A Framework for Wireless LAN Monitoring and Its Applications 
A Framework for Wireless LAN Monitoring and Its Applications 
 
Survey on routing techniques for manets and wireless sensor networks
Survey on routing techniques for manets and wireless sensor networksSurvey on routing techniques for manets and wireless sensor networks
Survey on routing techniques for manets and wireless sensor networks
 

Viewers also liked

Modeling and simulation of four bar planar mechanisms using adams
Modeling and simulation of four bar planar mechanisms using adamsModeling and simulation of four bar planar mechanisms using adams
Modeling and simulation of four bar planar mechanisms using adamsIAEME Publication
 
Experimental evaluation of the durability properties of high performance
Experimental evaluation of the durability properties of high performanceExperimental evaluation of the durability properties of high performance
Experimental evaluation of the durability properties of high performanceIAEME Publication
 
A strategic wind form integration method to polluted distibuted system with s...
A strategic wind form integration method to polluted distibuted system with s...A strategic wind form integration method to polluted distibuted system with s...
A strategic wind form integration method to polluted distibuted system with s...IAEME Publication
 
Experimental investigation of machining parameters of electric
Experimental investigation of machining parameters of electricExperimental investigation of machining parameters of electric
Experimental investigation of machining parameters of electricIAEME Publication
 
Solving np hard problem artificial bee colony algorithm
Solving np hard problem  artificial bee colony algorithmSolving np hard problem  artificial bee colony algorithm
Solving np hard problem artificial bee colony algorithmIAEME Publication
 
Measurement of end to end delays in ad hoc 802
Measurement of end to end delays in ad hoc 802Measurement of end to end delays in ad hoc 802
Measurement of end to end delays in ad hoc 802IAEME Publication
 
Hybrid recommendation technique for automated personalized poi selection
Hybrid recommendation technique for automated personalized poi selectionHybrid recommendation technique for automated personalized poi selection
Hybrid recommendation technique for automated personalized poi selectionIAEME Publication
 
Maturity period and curing as important quality control parameters
Maturity period and curing as important quality control parametersMaturity period and curing as important quality control parameters
Maturity period and curing as important quality control parametersIAEME Publication
 

Viewers also liked (8)

Modeling and simulation of four bar planar mechanisms using adams
Modeling and simulation of four bar planar mechanisms using adamsModeling and simulation of four bar planar mechanisms using adams
Modeling and simulation of four bar planar mechanisms using adams
 
Experimental evaluation of the durability properties of high performance
Experimental evaluation of the durability properties of high performanceExperimental evaluation of the durability properties of high performance
Experimental evaluation of the durability properties of high performance
 
A strategic wind form integration method to polluted distibuted system with s...
A strategic wind form integration method to polluted distibuted system with s...A strategic wind form integration method to polluted distibuted system with s...
A strategic wind form integration method to polluted distibuted system with s...
 
Experimental investigation of machining parameters of electric
Experimental investigation of machining parameters of electricExperimental investigation of machining parameters of electric
Experimental investigation of machining parameters of electric
 
Solving np hard problem artificial bee colony algorithm
Solving np hard problem  artificial bee colony algorithmSolving np hard problem  artificial bee colony algorithm
Solving np hard problem artificial bee colony algorithm
 
Measurement of end to end delays in ad hoc 802
Measurement of end to end delays in ad hoc 802Measurement of end to end delays in ad hoc 802
Measurement of end to end delays in ad hoc 802
 
Hybrid recommendation technique for automated personalized poi selection
Hybrid recommendation technique for automated personalized poi selectionHybrid recommendation technique for automated personalized poi selection
Hybrid recommendation technique for automated personalized poi selection
 
Maturity period and curing as important quality control parameters
Maturity period and curing as important quality control parametersMaturity period and curing as important quality control parameters
Maturity period and curing as important quality control parameters
 

Similar to IJARET Wireless Sensor Design Optimization

Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSIAEME Publication
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSIAEME Publication
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop TransmissionIOSR Journals
 
Review on operating systems and routing protocols for wireless sensor
Review on operating systems and routing protocols for wireless sensorReview on operating systems and routing protocols for wireless sensor
Review on operating systems and routing protocols for wireless sensorIAEME Publication
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architectureAdeel Javaid
 
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...IAEME Publication
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...IRJET Journal
 
Analysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networksAnalysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networksiaemedu
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
 
Air Programming on Sunspot with use of Wireless Networks
Air Programming on Sunspot with use of Wireless NetworksAir Programming on Sunspot with use of Wireless Networks
Air Programming on Sunspot with use of Wireless Networksijsrd.com
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksAmy Moore
 

Similar to IJARET Wireless Sensor Design Optimization (20)

Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
 
40120140503011
4012014050301140120140503011
40120140503011
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
Review on operating systems and routing protocols for wireless sensor
Review on operating systems and routing protocols for wireless sensorReview on operating systems and routing protocols for wireless sensor
Review on operating systems and routing protocols for wireless sensor
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architecture
 
50120140505008
5012014050500850120140505008
50120140505008
 
Ly3421472152
Ly3421472152Ly3421472152
Ly3421472152
 
Ly3421472152
Ly3421472152Ly3421472152
Ly3421472152
 
Ly3421472152
Ly3421472152Ly3421472152
Ly3421472152
 
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
 
K010426371
K010426371K010426371
K010426371
 
Analysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networksAnalysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networks
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
Air Programming on Sunspot with use of Wireless Networks
Air Programming on Sunspot with use of Wireless NetworksAir Programming on Sunspot with use of Wireless Networks
Air Programming on Sunspot with use of Wireless Networks
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
 
Nano rk rtss_05
Nano rk rtss_05Nano rk rtss_05
Nano rk rtss_05
 
I018135565
I018135565I018135565
I018135565
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

IJARET Wireless Sensor Design Optimization

  • 1. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 140 DESIGN OF OPTIMAL SYSTEM -LEVEL FOR EMBEDDED WIRELESS SENSOR UNIT Sajida Begum. PhD Scholar, Dr. Sardar Ali, Professor & Head Of EEE Dept RITS,Chevella. ABSTRACT This paper presents wireless sensor node structure to obtain high communication bandwidth with the flexibility to efficiently implement novel communication protocols. Since the wireless sensor devices are very useful for high range of applications. So far limited processing, storage and effective energy sources are available for practice. Therefore this design of sensor storage unit challenges to support the application especially with optimization under flexible power consumption and also capable for radio communication system for high performance. This unit is design using commercial controllers and radio communication technology. The ability of the sensor unit system is optimize through its performance by using unconventional protocols and demonstrated in four cases, such as power management, synchronization, location and get up. 1 INTRODUCTION The wireless sensors are embedded to combine the functions, like, sensing, computation, and communication in a single device. The power of individual element is able to deploy a large number of nodes that are integrated with a physical environment that automatically configure into distributed sensing platform. Usage scenarios range from the real-time tracking, to monitoring of environmental conditions, to ubiquitous computing environments, to in situ monitoring of the health of structures or equipment. While often referred to as networked sensors, they can also be actuators that extend the reach of cyberspace into the physical world. The core design challenge for wireless embedded sensors lies in coping with their harsh resource constraints. Embedded processors with kilobytes of memory are used to implement complex, distributed, ad-hoc networking protocols. These constraints derive from the vision that these devices will be produced in vast quantities, must be small and inexpensive, and ideally will operate off of ambient power. As Moore’s law marches on, these deviceswill get smaller, not just grow more powerful at a given size. One of the most difficult resource constraints to meet in the context of wireless embedded sensors is power consumption. As physical size decreases, so does energy capacity. Because communication is often the single largest energy consumer, the optimization of wireless communication protocols is key to meeting energy constraints. Mature devices, such as cell phones and pagers, use specialized communication protocols on ASICs that INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND TECHNOLOGY (IJARET) ISSN 0976 - 6480 (Print) ISSN 0976 - 6499 (Online) Volume 4, Issue 3, April 2013, pp. 140-146 © IAEME: www.iaeme.com/ijaret.asp Journal Impact Factor (2013): 5.8376 (Calculated by GISI) www.jifactor.com IJARET © I A E M E
  • 2. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 141 provide ultra-low-power implementations of these protocols [1]. This efficiency is possible because they target a narrow set of well-defined application scenarios. The complex tradeoffs between power consumption, bandwidth, and latency can be explored and evaluated with respect to specific performance goals. The result can be seen in the standby battery life of about a week in cell phones while pagers run for months off of a AAA battery. Application specific pager protocols trade latency and bandwidth for decreased energy consumption. The power of networked embedded devices is their flexibility and universality. The wide range of applications being targeted by embedded wireless sensors makes it difficult to develop general-purpose protocols that are efficient for all applications. This paper presents the architecture of a wireless embedded sensor node that enables application specific optimization of communication protocols. Much work has focused on the design of low-power radio circuits, reconfigurable logic, and data path optimizations. Our focus is on architectural support for system-level optimization. 2 DESIGN STRUCTURE OF THE SYSTEM The goal of our design is to provide an open platform for experimenting with wireless embedded networks. It must be compact, low power and flexible in order to meet a wide range of experimental goals. The design is based on the architecture presented in [2]. It has a central microcontroller that performs all sensing, communication and computation. An event driven OS is used to multiplex the concurrent flows of information across this single controller, which is connected to an RF transceiver, a secondary storage device, a sensor oriented I/O system, and a power management subsystem. Secondary controllers are not used to abstract the raw characteristics of the I/O devices from the main processing unit. While this places higher demands on the central controller, it allows the controller to exploit the sensors and radio based on situational requirements. One of the key differences between our design and that described in [2] is that we have incorporated hardware support to increase radio bandwidth and time synchronization accuracy while maintaining the ability to implement a wide range of networking protocols. It also has greater capacity, a richer sensor interface, and better power management. Fig 1: Mica node Overview. 2.2 Operating Principle The Mica hardware platform has been designed to support the TinyOS execution model presented in [2]. TinyOS is an event-based operating system where all system functions are broken down into individual components that interact through narrow command and event interfaces. The component-based structure of TinyOS allows for an application designer to select from a variety of system components in order to meet application specific goals. One of the key principles of TinyOS is
  • 3. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 142 that there are no long-running threads in the system. Each component acts as like a finite state machine using commands and events to transition from one state to the next. There is no blocking or waiting in system components. This is intended to project the natural interface of hardware into software. This projection allows for a migration of the hardware/software boundary. A core part of the TinyOS runtime model is that commands and events execute quickly and run to completion, just as commands to hardware modules are accepted quickly. There is no mechanism for suspending and preempting a command. One of the consequences of this approach to system design is that commands and events cannot perform long running computation. If they did, time critical system events could not proceed. To allow for general computation inside a TinyOS component the concept of a task is introduced. A component can post tasks to a system scheduler for background processing. When executed, they run to completion and are not preempted by other tasks. At most one task is active in the system at any time. However, low-level system events are able to preempt tasks. This allows for complex computation to be performed in the background without interfering with the low-level event flow that may have real-time constraints. In this model, tasks simulate the parallelism that is inherent in many hardware components. The use of the TinyOS programming model has a significant impact on the design of our communications subsystem. The fine-grain multithreading it provides allows us to interleave application-level and protocol-level processing on a single controller. Without a hardware boundary between application and protocol processing arbitrary communication interfaces can be constructed. 3.1 Transmission of Wireless Data To communicate over the radio, protocols must be built on top of it. Figure 2 illustrates the key phases of a packet-based wireless communication protocol and provides a framework for discussing architectural alternatives and the impact they have on application performance. The first step in many wireless protocols is to encode the data for transmission. The coding schemes are designed to increase the probability of a successful transmission by preventing and correcting slight errors. The actual transmission begins with a start symbol that to signals to the receiver that a packet is coming. It is then followed by a synchronization signal and the encoded data. As the transmission proceeds, the transmitter must precisely control timing of each bit transition. Skewed bit transitions can cause the sender and receiver to get out of synch, resulting in an unsuccessful transmission. Most protocols include a media access control (MAC) phase prior to the actual transmission. MAC protocols are designed to allow multiple transmitters to share a single communication channel. One of the simplest MAC protocols is collision avoidance (CSMA). Just prior to transmitting, the sender checks whether the channel is idle. If so, it proceeds, otherwise it waits for the channel to become idle. For a receiver, the first part of data reception is to detect that a transmission has begun. The channel is monitored by sampling the receive pin. There is there is often a significant amount of noise on the communication channel that must be filtered and ignored while listening for the start symbol. The length and format of the start symbol can be optimized for the expected noise levels. In order to properly detect the start symbol, the receiver must sample the channel at least twice as fast as the transmission speed. Otherwise the relative phase of the sampling and the transmission may result in the receiver missing the start symbol. Once detected, the receiver must then synchronize itself to the exact phase of the incoming transmission. This synchronization step is critical in allowing the receiver to determine the start and end of the bit windows being used by the transmitter. Synchronization requires the incoming transmission to be sampled repeatedly so the exact timing of the bit transitions can be determined. Once synchronized, receiver then samples the value of the incoming signal at the center of each bit. Precise care must be taken to minimize skew in the sampling rate and timing. As the individual bits are extracted from the radio, they are assembled into blocks that are the encoded version of actual data messages. Finally, the blocks are decoded back into the original data and assembled into a packet. The decoding process can often correct bit errors in the received signal and reproduce the original data.
  • 4. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 143 4.3 Mica Hardware Protocol Processing In the Mica platform we develop an architecture that maintains the flexibility created by directly interfacing with the radio but then exploit dedicated hardware to improve efficiency. Instead of including additional hardware as an abstraction layer, we use it in the form of protocol accelerators. We place hardware accelerators are alongside the communication path between the controller and the radio. At any time, the controller can directly interact with the radio with exact precision. However, when appropriate the controller can enlist the help of the hardware accelerators. The accelerators are designed to automatically perform some of the CPU intensive portions of communication protocols. In our implementation, we use hardware accelerators for synchronization, bit timing, and bit sampling. While reducing CPU use, the hardware accelerators do not abstract away what operations are being performed. The architecture is designed to maintain a tight coupling between the application and the communication protocol while providing increased efficiency. In our hardware-accelerated protocols, we continue to rely on programmed I/O to perform the start symbol detection. However, once detected we offload the overhead of synchronization to a timing hardware accelerator. The timing accelerator automatically captures the exact timing of the edge transition of the timing pulse. The incoming signal is automatically sampled every .25 us. By searching for the start symbol prior to engaging the timing hardware accelerator, we avoid the timing problems seen with the UART. Detection of the start symbol gives us an indication of when the timing pulse will arrive and keeps us from of assuming every pulse is the timing pulse. Additionally, unlike the UART our timing mechanism exposes the value captured instead of only keeping it for internal use. If desired this timing information can even be propagated up into an application Once the timing information is captured, software then uses it to configure a serialization accelerator that automatically times and samples the individual bits. During the majority of a transmission and reception, the main data path only deals with the byte-oriented interface provided by the serializer. The individual bits are handled in hardware. Each of these hardware accelerators has been built out of standard microcontroller functional units. They are implemented by combining the functionality of input capture registers, timer controlled output pins and the SPI communication hardware. The input capture register is used to automatically capture the timing pulse. The captured value can then be use to configure the timing register controlling an output pin. One of the control options is to have the hardware automatically toggle the output pin each time the counter expires. Once configured, this output pin becomes a clocking signal that times each arriving bit. Finally, SPI hardware is then used to capture the value of the radio signal each time the clock line is triggered by the counter. LOW POWER USAGES Fig 5: Phases of Transmission and Reception for Communication
  • 5. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 144 5 EVALUATION OPTIMIZATION To demonstrate the functionality of our architecture we have used the Mica node to implement a traditional, packet-based protocol stack. It consists of an Active Messages [13] based application interface where tagged messages are automatically dispatched to application message handlers. Internal to the protocol implementation, there is a packet layer that can optionally perform CRC checks on each packet as well as a data-encoding layer that performs single error correction, dual error detection encoding on each byte allowing single-bit transmission errors to be fixed automatically. In addition to delivering high bandwidth data communication using standard protocols, we have also been able to demonstrate how the flexibility we provided plays a critical role in enabling systems-level optimizations. We show this by implementing four application specific protocols that improve overall system performance for their intended application. The first of these is a protocol that explores the tradeoff between transmitter and receiver overhead. 5.1 Low Power Usages In sensor networks, multi-hop routing topologies are built by having intermediate nodes act as relays for remote nodes. These routing nodes must listen for communication and propagate messages towards their destination. While listening, the radio consumes almost as much energy as when transmitting. Even when no communication is taking place, considerable amounts of energy is spent searching for the next packet. In many application scenarios, the energy spent while waiting for a transmission can represent more than 90% of a node’s total energy budget. Embedded sensor researchers have claimed that high-level protocols must be used to reduce energy consumed of nodes when not actively transmitting [14]. One solution is to have windows of communication periods and windows of sleep periods[15]. However, it has been shown that in some situations poor interaction between high-level power saving techniques and low-level communication protocols can actually lead to an increase in energy consumption when using windowing mechanisms [16]. We have been able to show that alternative is to modify the lowest levels of the communication stack. Unlike windowing, which layer itself on top of standard low-level protocols, we change the underlying communication protocol to optimize for the receiver power consumption. Instead of having the sender simply transmit a start symbol followed by a packet, we can require that the sender first transmit a preamble to get the attention of any possible receiver. It can then follow with the start symbol and packet. This algorithm is depicted in Figure 5. The receiver then only has to listen often enough to pick up any portion of the attention signal. Precise control over the power state of the radio allows the protocol to turn off the radio between each sample. The duty cycle of the receiver becomes proportional to the length of this preamble. Once detected, the preamble will cause the receiver to search for the pending start symbol. This protocol optimization trades power consumption on the sender for power consumption on the receiver. The sender must transmit longer, but the receiver can sample the radio channel less frequently. The optimal ratio is dependent on the communication patterns of the application. We have implemented a version of this scheme where the receiver has a 10% duty cycle and the sender must transmit a preamble of 5 bits. The 10% receiver duty cycle not only results in a 90% reduction of radio power consumption, it also produced a 33% reduction in the CPU overhead associated with monitoring the radio. On the other hand, the sender only incurs a slight increase in overhead – less than 1% overhead on a 30-byte packet. This slight overhead increase is because the sample rate of the receiver is 3000 times per second. Fine-grained control is used to power-on, sample, and power-off the radio in 30us. Application level windowing protocols generally have window sizes of seconds or more. Depending on application specific goals, the receiver overhead can be reduced arbitrarily at the expense of bandwidth, latency, and transmission overhead. Moreover, an application can change the protocol at runtime based on network activity. This simple optimization demonstrates the benefits that are enabled by our architecture for flexible communication protocols by exploiting the ability to tailor protocols to application specific criteria.
  • 6. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 145 Table 1: Power Consumption Details of Sensor 1. Cost checking = (radio on time)* (radio power consumption 2. Power consumption = checking frequency)* (cost of checking) 3. Average wakeup time = ½ (checking period)= ½ *(checking frequency) 1. Cost checking = (radio on time)* (radio power consumption 2. Power consumption = checking frequency)* (cost of checking) 3. Average wakeup time = ½ (checking period)= ½ *(checking frequency) REFERENCES 1. McMahan, M.L., Evolving Cellular Handset Architectures but a Continuing, Insatiable Desire for DSP MIPS. 2000, Texas Instruments Incorporated. 2. Hill, J., et al. System architecture directions for networked sensors. in ASPLOS 2000. 2000. 3. Atmel Corporation, Atmega103(L) Datasheet.2001, Atmel Corporation: http://www.atmel.com/atmel/acrobat/doc0945.pdf. 4. Atmel Corporation, AT90S2323/LS2323/S2343/LS2343 Datasheet. 2001: http://www.atmel.com/atmel/acrobat/doc1004.pdf. 5. Dallas Semiconductor, DS2401 Silicon Serial Number: http://pdfserv.maxim- ic.com/arpdf/DS2401.pdf. 6. RF Monolithics, I., TR1000 Data Sheet. 1999: http://www.rfm.com/products/data/tr1000.pdf. 7. Atmel Corporation, AT45DB041B Datasheet. 2001: http://www.atmel.com/atmel/acrobat/doc1938.pdf. 8. Maxim, Maxim 1-Cell to 2-Cell, Low-Noise, High-Efficiency, Step-Up DC-DC Converter, MAXIM1678. 1998: http://pdfserv.maxim-ic.com/arpdf/MAX1678.pdf. 9. Energizer, Alkaline AA battery data sheet: www.energizer.com. 10. Homewood, M. and M. McLaren. Meiko CS-2 interconnect. Elan-Elite design. 1993. 11. The Official Bluetooth Website: http://www.bluetooth.com/. 12. RF Monolithics Inc, RFM DR2000 Development Board. 2000: http://www.rfm.com/products/data/dr2000manual.pdf. 13. von Eicken, T., et al. Active messages: a mechanism for integrated communication and computation. in 19th Annual International Symposium on Computer Architecture. 1992. 14. Estrin, D., Directed Diffusion. 2000. 15. Wei Ye, J.H.a.D.E., An Energy-Efficient MAC Protocol for Wireless Sensor Networks. 2001: Submitted for review, July 2001. 16. M. Stemm, P.G., D. Harada, R. Katz. Reducing power consumption of network interfaces in hand-held devices. in International Workshop on Mobile Multimedia Communications (MoMuc-3). 1996. Princeton, NJ. 17. Lamport, L., Time, clocks, and the ordering of events in a distributed system. Comm., 1978. ACM 21(7): p. 558-565. 18. Mills, D.L., Internet time synchronization: the Network Time Protocol. IEEE Trans. Communications, 1991. COM-39(10): p. 1482-1493. 19. Doherty, L., K.S.J. Pister, and L.E. Ghaoui. Convex position estimation in wireless sensor networks. in IEEE Infocom. 2001: IEEE Computer Society Press. 20. Borriello, J.H.a.G., Location Systems of Ubiuitous Computing. Computer, 2001. 34(8): p. 57- 66.
  • 7. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 146 21. Bahl, P. and V. Padmanabhan, RADAR: An in-building RF-based user location and tracking system. IEEE Infocom, 2000. 2: p. 775-784. 22. Priyantha, N.B., A. Chakraborty, and H. Balakrishnan. The Circket Location-Support System. in MobiCom 2000. 2000. Boston, Massachusetts. 23. J.L. Da Silva Jr., J.S., M. J. Ammer, C. Guo, S. Li, R. Shah, T. Tuan, M. Sheets, J.M. Ragaey, B. Nikolic, A Sangiovanni-SSVincentelli, P. Wright., Design Methodology for Pico Radio Networks. 2001, Berkeley Wireless Research Center. 24. Pottie, G. and W. Kaiser, Wireless Integrated Network Sensors (WINS): Principles and Approach. Communications of the ACM, 2000. 43. 25. B. Atwood, B.W., and K.S.J. Pister. Preliminary circuits for smart dust. in Southwest Symposioum on Mixed-Signal Design. 2000. San Diego, Ca. 26. K.S.J Pister, J.M.K., B.E. Boser, Smart Dust: Wireless Networks of Millimeter-Scale Sensor Nodes. Electronics Research Laboratory Research Summary, 1999 27. Neeraj Tiwari, Rahul Anshumali and Prabal Pratap Singh, “Wireless Sensor Networks: Limitation, Layerwise Security Threats, Intruder Detection” International Journal of Electronics and Communication Engineering &Technology (IJECET) Volume 3, Issue 2, 2012, pp. 22 - 31, ISSN PRINT: 0976- 6464, ISSN ONLINE: 0976 –6472 28. Mrs.R.Rajasree, Dr.G.Kalivarathan, “Analysis of Programming Aspects of Wireless Sensor Networks And Non Uniformity Issues-A Feasible Study” International Journal of Electronics and Communication Engineering &Technology (IJECET) Volume 3, Issue 3, 2012, pp. 219 - 226, ISSN PRINT: 0976- 6464, ISSN ONLINE: 0976 –6472