Ec8702-Adhoc and Wireless Sensor Networks-Unit Notes
Ec8702-Adhoc and Wireless Sensor Networks-Unit Notes
Ec8702-Adhoc and Wireless Sensor Networks-Unit Notes
com
EC8702
Ad Hoc and Wireless Sensor Networks
UNIT-I AD HOC NETWORKS –
INTRODUCTION AND ROUTING PROTOCOLS
www.rejinpaul.com
Computer Network
Wireless communication
1. Fundamentals
• Users can communicate from remote areas
• Information can be communicated without
wires, cables or any electrical conductors
• Examples of wireless devices are
Cordless telephones
Mobiles
GPS units
Satellite television
Wireless computer parts
www.rejinpaul.com
Wireless devices
Cordless telephones
Mobiles
GPS units
Satellite television
Wireless computer parts
www.rejinpaul.com
Wireless communication
www.rejinpaul.com
Applications
www.rejinpaul.com
Disadvantages
More attack by unauthorized users
Cellular systems
• 1960 - Analog communication
•Provide voice and data communication
Working
Coverage area is divided into non-overlapping
cells – mobile devices
Fixed point base station
Mobile switching center – allocating channels
www.rejinpaul.com
Various levels…
• 1G- Advanced Mobile Phone Services (FDMA+
30KHz FM modulated voice channel)
• 2G – Global System for Mobile communication
(100kbps)
• 3G- different data rate depends on the
mobility and location
www.rejinpaul.com
Cordless phones
• 1970s - initiated
• Low cost and short wireless link
• Radio waves with specific frequency
• Specific distance from base station
• It uses Base station and handset
• BS call as Electrical signal– radio signal –
handset of the user
• Radio signal – electrical signal – speaker -
sound form
• Base station & handset --- > frequency pair
www.rejinpaul.com
Wireless LAN
• It link more wireless devices by wireless
distribution method
• Limited area – home, school computer lab,
office building etc..
• IEEE 802.11 standard – high frequency radio
waves
• WLAN – LAWN
• WLAN – AP – internet
www.rejinpaul.com
Cond….
• AP- transmits and receives the radio
frequency signals - routers
• AP -- client
• Clients – several devices….
• CSMA/CA for path sharing also include
encryption method -- security
www.rejinpaul.com
Satellite communication
• It connect any where on the earth
• It rotate around the earth for gathering and
transmitting useful information
Working Principle
• Satellite (sensors) earthstation
• Earth station – GHz signals Satellite
• Satellite – signal to earth (all stations with in
coverage area)
• Tracking and command system – uplink and
down link
• Bigger in size, consumes more power and more
expensive
www.rejinpaul.com
Bluetooth technology
• Short distance commn. using short wavelength
• IEEE 802.15.1
• Uses ultra high frequency radio waves
• Connecting two point to point devices
• It transmits voice and data
• Range – 32 feet (10 meters)
• Data rate – 1 Mbps
www.rejinpaul.com
Zigbee
• low cost and low power
consumption
• Radio communication for
prolong period without
recharging
• IEEE 802.15.4
• Machine to machine
network
• Data rate 250kbps
• Coverage range 30m
• Coverage area is higher
than bluetooth
www.rejinpaul.com
WiMAX
• Worldwide process for Microwave access -
broadband wireless technology
• IEEE 802.16
• Data rate 30-40 Mbps
• Higher speed over greater distance
www.rejinpaul.com
• Gamma radiation
• X-ray radiation
• Ultraviolet radiation
• Visible radiation
• Infrared radiation
• Microwave radiation
• Radio waves
www.rejinpaul.com
Electromagnetic spectrum
www.rejinpaul.com
www.rejinpaul.com
Radio waves
Gamma rays
• Wavelength : <0.01nm
• Highest frequency
• Medical applications - treat the cancer patient
• Produced by atomic nucleus
www.rejinpaul.com
Ultraviolet radiation
X-rays
Auctioning method
• Allocated based on higher bidding company in
auction
Example
ITU designed ISM frequency bands for unlimited
usage – wireless LAN
www.rejinpaul.com
Propagation mechanism
www.rejinpaul.com
Reflection
• Electromagnetic waves – hit on an object
(larger dimension> wavelength)- reflected
wave
• 180 degree phase shift b/w incident wave and
reflected wave
www.rejinpaul.com
Diffraction
• Waves hit an edge of the object – propagated
in different direction
• Hit in Impenetrable (hidden) object –
diffraction
• Amount of diffraction is frequency dependent
• Low frequency -- > diffraction more
www.rejinpaul.com
Scattering
• Waves hit at irregular objects ( trees, walls
with rough surfaces, furniture and vehicles)
• Propagate into number of outgoing weaker
signal
www.rejinpaul.com
Path loss
• Ratio of transmitted power to received power
• Expressed in dB
• Depends on the radio frequency and nature of the ground
www.rejinpaul.com
www.rejinpaul.com
www.rejinpaul.com
Two-ray model
• Line of sight path & reflected path
Pr = Pt Gt Gr (hthr/d2)2
Pr = Pt Gt Gr (λ/4π)2 (1/dγ)
www.rejinpaul.com
Fading
• Fluctuations in signal strength when received
by the receiver.
Fast fading/ Small scale fading
Slow fading/Large scale fading
www.rejinpaul.com
Fast fading
(different version of tx-ed signal)
• Fast fluctuations in amp, phase and delay of the received
signal.
• Fluctuations due to ?
• Interference between multiple copies of the same transmitted
signal reaching the receiver at a little different times.
• Occurs due to three propagation mechanisms
www.rejinpaul.com
Interference
• Interaction of waves that are correlated with each
other.
• Either they travel from the same source
• Or they have same frequency.
• This incident occurs when two waves meet at a point
while traveling along the same transmission medium.
– Adjacent channel interference
– Co-channel interference
– Inter symbol interference
www.rejinpaul.com
Co-channel interference
• Narrow band interference
• Same frequency can be
reused by nearby systems
• Avoided by multiuser
detection mechanism,
directional antennas and
dynamic channel allocation
mechanisms
www.rejinpaul.com
Doppler shift
• Transmitter and receiver moves :
– Towards – high freq
– Away – low freq
• Doppler shift
fd =v/λ
• Nyquist’s theorem
• Shannon’s theorem
www.rejinpaul.com
Nyquist’s theorem
Shannon’s Theorem
• Find the data rate of noise channel
SNR = 10log10(S/N)
Channel capacity
C = Bxlog2(1+(S/N)) bits/sec
www.rejinpaul.com
Basic concepts of Ad Hoc
Networks
•What is adhoc network ?
It is a network which is formed
Without any central infrastructure.
• Adhoc network can be formed ?
Instantly
• Communication can be carried out using ?
Radio waves.
•Any where & Any time.
•Dynamic topology
•Data can be exchanged by wireless interface
www.rejinpaul.com
MANET Communication
• Single hop communication- direct
• Multi hop communication- for away source
node
www.rejinpaul.com
PROTOCOLS
• 1970- Norman Abramson & co – ALOHA –
Single hop
• 1973 – DARPA(DEFENCE RADIO) – PRNET –
Multi hop
• PRNET(PACKET RADIO NETWORK)
– ALOHA + CSMA : to access the common
wireless channel
• IETF – ad hoc working group – standard
protocol & functional specifications
www.rejinpaul.com
• Military applications
soldiers – safety vehicles
• Emergency services
search and rescue operations also fire fighting areas
• Commercial applications
Data base maintenance in industry as well as on-
line payment for e-commerce applications
• Education
For organizing conferences, meetings, lectures,
virtual class rooms etc -- in universities, school &
colleges
www.rejinpaul.com
• Distributed operation
• Synchronization
• Hidden terminal problem
• Exposed terminal problem
• Throughput
Access delay
• Real time traffic support
• Resource reservation
• Ability to measure resource
availability
• Capability for power control
• Adaptive rate control
• Use of directional antennas
www.rejinpaul.com
Routing
• Route selected based on hop
count
Requirements of routing
Minimum delay
Quick route configuration
Loop free routing
Distributed routing approach
Minimum control overhead
Scalability
QoS
Time sensitive traffic and security
Major design issues
Mobility
Bandwidth constraint
shared channel
Battery power
Storage capacity
www.rejinpaul.com
Multicasting
• What is Multicasting ?
Transmission of Same
message
• To ?
A group of mobile nodes
• In ?
Single transmission.
Major design issues
• Efficiency
• Control overhead
• QoS
• Scalability and security
www.rejinpaul.com
• Performance in TCP is
degraded due to
frequent path breaks
High mobility
Bandwidth
Power
Channel error rate
Frequent network
partitions
www.rejinpaul.com
Pricing scheme
• 1 (sender node)-5(receiver node)
• 2(power off)
• 1-2-5 (optimal path) – not effective
www.rejinpaul.com
QoS
• If there is a better coordination and cooperation between ?
- Service provider and the user
- then high QoS can be achieved.
QOS can differ from application to application.
• Bandwidth and delay are important parameters for ?
• Multimedia applications
• Identifying trusty nodes and routing packets through them are
key parameters of ?
• Defense applications.
• Multiple link disjoint paths and availability are the key
parameters of ?
• Emergency and rescue operations related applications.
www.rejinpaul.com
Self-organization
• Self – configure
• Self Organization includes ?
- Neighbour discovery.
- Topology organization.
- reorganization
• Topology can be varied – high mobility, node
failures and frequent N/W partitioning
• Every node maintain the updated information
• Beacon signals – transferred to all nodes
www.rejinpaul.com
Security
• Passive attack :
• Caused by ?
• Malicious nodes present in the network.
• To obtain ?
• Information being exchanged in network.
• This type of attacks would not disturb network operation.
• Active attack - disturb the N/W operation
Internal attack –attackers within the network
External attack - attackers external the network.
• Some other security threats are ?
-DoS (Denial of service)
- Information disclosure and interference.
www.rejinpaul.com
Energy management
• In a node,
• It is the process of managing ?
- the sources and consumers
• Of ?
- energy
• To ?
- boost up the lifetime of the node in the network.
Four categories.
• Transmission power management
• Battery energy management
• Processor power management
• Device power management
Deployment considerations
WSN
www.rejinpaul.com
www.rejinpaul.com
WSN
www.rejinpaul.com
www.rejinpaul.com
www.rejinpaul.com
www.rejinpaul.com
Characteristics of MANET
www.rejinpaul.com
MANET
www.rejinpaul.com
MANET Architecture
www.rejinpaul.com
www.rejinpaul.com
• Networking:
Wired n/ w routing protocol- not suitable for MANET
Re –design protocol-
To improve robustness and adaptability
Enabling tech/ are used to provide end to end reliable
data delivery.
Locating receiver node is difficult- high mobility.
Localization mechanism-determine location of a mobile
node.
www.rejinpaul.com
MANET Operations
Each node act as router
Exchanges its own information to its
neighbors as beacon messages
Discover forwarder nodes to forward packets
Broadcast the packet to all other neighbors
which are in its transmission range
Mobile can join the network and leave the
network at any time
www.rejinpaul.com
MANET Routing
Process of finding path in
a network
Routing is a big
challenging issue due to
dynamic topology
MANET Routing protocols
Proactive or table-driven
routing protocol
On-demand or reactive
routing protocol
Hybrid routing protocol
www.rejinpaul.com
Applications of MANET
• Commercial Environments
E- commerce
Business
Vehicular services
• Home and enterprise networking
• Educational applications
Set up virtual class rooms
Set up communication during conferences, official
meetings etc
• Disaster management
• Medical emergency
• Military applications
www.rejinpaul.com
Sensors
www.rejinpaul.com
WSN
Distributed network
Formed by small, lightweight wireless nodes
It is deployed to monitor the environment
For measuring the physical parameters like
temperature, pressure, humidity, sound, characteristics
of objects and their motion
WSN is configured automatically with out any human
intervention
Sensor nodes are small, powerful and inexpensive
It performs multi-hop communication
Coverage area is limited due to low energy and simple
antenna
For data transmission, each node has to form ad hoc
network
WSN is a special type of MANET
www.rejinpaul.com
WSNs Vs MANET
www.rejinpaul.com
www.rejinpaul.com
Sensor subsystem
Processing subsystem
Communication subsystem
Advantages
• Many sensor nodes are sensing same
event which tends to fault tolerant
• Data dissemination – Spreading
information
• Data gathering
www.rejinpaul.com
Limitations
• Cannot be protected from physical attack
• have very little storage capacity
• Works in short communication
• It provide little energy
• troubled processing power
www.rejinpaul.com
www.rejinpaul.com
www.rejinpaul.com
www.rejinpaul.com
Terrestrial WSNs
Consists of hundreds to
thousands of WS nodes.
Deployed in Ad-Hoc or
structured manner-
communicating with base
station.
Sensor nodes dropped from
a plane and randomly place
into target area. d
In preplanned deployment,
grid deployment,2-d, 3-d
placement models are used.
www.rejinpaul.com
Underground WSNs
• No. of sensor nodes- hidden in the
ground.
• Monitor underground conditions.
• Nodes- more expensive than terrestrial
WSNs.
• Maintenance, careful planning- require
high cost.
• Suitable components- reliable
communication-soil, rocks and other
mineral components.
www.rejinpaul.com
www.rejinpaul.com
www.rejinpaul.com
www.rejinpaul.com
Cond…
• Communication between underground
sensor nodes-big challenge
• Due to signal losses and high level
attenuation.
• Require sink nodes to fwd message from
the sensor nodes to the base station.
• Limited battery power-very difficult to
recharge.
www.rejinpaul.com
Multimedia WSNs
• Used to enable tracking and monitoring
purpose.
• Information in the form of imaging , video and
audio.
• Low cost sensor nodes equipped with
microphones and cameras.
• Challenges-high energy consumption, high
bandwidth Requirement, QoS, Data
processing and compression techniques.
www.rejinpaul.com
Tracking
www.rejinpaul.com
Tracking
www.rejinpaul.com
Mobile WSN
• Collection of mobile nodes.
• Have capability to compute, sense and
communicate with physical environment.
• Each mobile node can communicate with
other sensor nodes if it is in the visibility
of other sensor nodes.
• Data can be distributed using dynamic
routing.
www.rejinpaul.com
www.rejinpaul.com
www.rejinpaul.com
www.rejinpaul.com
www.rejinpaul.com
www.rejinpaul.com
www.rejinpaul.com
www.rejinpaul.com
www.rejinpaul.com
www.rejinpaul.com
www.rejinpaul.com
• Architecture Types:
– Layered
– Clustured.
www.rejinpaul.com
Layered Architecture
www.rejinpaul.com
www.rejinpaul.com
MAC Protocol
• For the data transmission,
• Distributed TDMA Receiver Oriented Channel
(DTROC) assignment MAC protocol is used.
• Two operations of DTROC protocol are:
– Channel allocating
– Channel scheduling
www.rejinpaul.com
UNPF - R
• It makes the sensor nodes
• To ?
• Vary their communication range
• To ?
• Improve performance.
• Small transmission range would make many network
partitions
• Whereas, large Covered area may reduce spatial reuse of
frequencies.
www.rejinpaul.com
www.rejinpaul.com
Clustured Architecture
• It organized the nodes in n/w into clusters.
• Each cluster contains – Cluster head
• Nodes in each cluster would Exchange
message within the cluster.
• Each cluster head can also communicate with
the BS which is an access point and connected
to a wired network.
www.rejinpaul.com
Clustered architecture
• Used in ?
• Sensor networks to achieve data fusion.
• Clustering can be extended to various numbers of depths
hierarchically.
• Data collected by all the cluster members can be fused to
cluster head and the resulting information can be
communicated to BS.
• The cluster formation and the selection of cluster heads are
fully autonomous and distributed process.
• This could be achieved through network layer protocols such
as Low-Energy Adaptive Clustering Hierarchy.
www.rejinpaul.com
• What is LEACH ?
• One of the clustering based protocols
• What it do ?
• It minimizes energy dissipation
• In ?
• Sensor networks.
www.rejinpaul.com
UNIT-II
• In ad hoc network,
• Each node contends for common shared wireless channel.
• To ?
Transmit data packet @ the same time
• If all the nodes are starting to transmit data packet
simultaneously,
- Then data would be corrupted.
• So , a suitable shared medium access control mechanism has to
be deployed .
• In a such a way that all nodes share the common channel in an
efficient manner.
• This task can be performed by a protocol called MAC.
• Responsibility of MAC Protocol:
– Transmitting data packets from one device to another device across a shared
channel.
www.rejinpaul.com
Condt..
• Maximization of utilization of channel
• Minimize the delay
• Support different types of traffic
• It should be robust in equipment failure and
N/W failure
• Require well power control
• Provide QoS support
• Provide time synchronization among nodes
www.rejinpaul.com
Design issues
• Bandwidth efficiency
Bandwidth is restricted – MAC
protocol is responsible- divide the bandwidth
into effective manner
QoS support
• Due to mobility of nodes from time to time
QoS is not effective
www.rejinpaul.com
Synchronization
• Transmission between the
sender and receiver nodes
• has to be synchronized for ?
- achieving error free
-Minimized packet loss
transmission.
• Synchronization is also
important in ?
- bandwidth reservation.
• It requires ?
-exchange of control
packets between sender
and receiver.
www.rejinpaul.com
• Contention – Based
Protocols
• Contention based
protocols with
reservation mechanism
• Contention based
protocols with
scheduling mechanism
www.rejinpaul.com
www.rejinpaul.com
Reservation Contention
www.rejinpaul.com
www.rejinpaul.com
Synchronous protocol
• Time synchronization among all nodes
• So all nodes about reservation
www.rejinpaul.com
Asynchronous protocol
• Not required global time synchronization
• Use relative time information make
reservation
www.rejinpaul.com
MACA protocol
• Alternate for CSMA
• CSMA- sense the
channel & transmit
www.rejinpaul.com
Condt..
• Drawbacks of CSMA is overcome by MACA
• It use RTS and CTS
www.rejinpaul.com
www.rejinpaul.com
IEEE 802.11
• What is this ?
• IEEE 802.11 refers to the set
of standards
• that define ?
Communication
• For ?
wireless LANs (wireless local
area networks, or WLANs).
• The technology behind
802.11 is branded to
consumers as Wi-Fi.
www.rejinpaul.com
Architecture
Operates into 2 modes:
• Infrastructure less
mode
• Infrastructure based
mode.
When two or more
stations communicate
with each other,
They form, Basic service
set (BSS).
www.rejinpaul.com
• Radio techniques:
- 2.4 GHz ISM band.
- Increases reliability & throughput
www.rejinpaul.com
• PMD Performs:
-Encoding, Decoding , Modulation and Demodulation of
signals.
• PLCP provides:
-Service access point and a clear channel assignment carrier
sense signal to the MAC Layer of WLAN.
www.rejinpaul.com
MAC Layer
• 2 MAC Protocols used in WLAN.
• 1) Point Coordination Function (PCF)
• 2) Distributed Coordination Function (DCF)
• PCF:
- Centralized scheme
- Polling scheme
• DCF:
- Distributed scheme.
- Based on CSMA/CA
IFS
• Time interval
• Between ?
the transmission
• Of ?
two successive frames
• By ?
Any node.
www.rejinpaul.com
SIFS
• Shortest IFS and takes highest priority to
access the medium.
www.rejinpaul.com
PIFS
• The waiting time values between SIFS and
DIFS.
www.rejinpaul.com
DIFS
• This amount of waiting time can be used by
the nodes if it operates under DCF mode.
www.rejinpaul.com
EIFS
• Extended Inter Frame Spacing :
• It is the longest IFS and gets least priority to
access the medium.
www.rejinpaul.com
UNIT-III
WSN NETWORKING CONCEPTS
AND PROTOCOLS
www.rejinpaul.com
3
www.rejinpaul.com
4
www.rejinpaul.com
5
www.rejinpaul.com
6
www.rejinpaul.com
7
www.rejinpaul.com
8
www.rejinpaul.com
9
www.rejinpaul.com
10
www.rejinpaul.com
11
www.rejinpaul.com
12
www.rejinpaul.com
13
www.rejinpaul.com
14
www.rejinpaul.com
Integrity
15
www.rejinpaul.com
16
www.rejinpaul.com
• Mobility
• Bandwidth constraint
• Error prone shared broadcast radio channel
• Hidden and exposed terminal problems
• Resource constraints
• Security issues
17
www.rejinpaul.com
Mobility
18
www.rejinpaul.com
19
www.rejinpaul.com
Bandwidth Constraint
20
www.rejinpaul.com
21
www.rejinpaul.com
22
www.rejinpaul.com
Proactive
• Other name table driven routing Tables – Updated periodically.
protocol To ?
• Each node maintains a routing Maintain the current stable/
table. available paths.
• Routing table contains up to date This can be achieved by ?
routing information of the entire Exchanging or broadcasting the
network. periodic beacon signals between
• Whenever a node wants to send nodes.
a packet to the receiver node, So that,
- it looks up in own routing table
Each node can have the knowledge
To ? about the complete network
Find the routing table topology.
To ? Hence,
Find the routing path Each node can update its routing
From ? table based on beacon signal it
Itself to receiver. has received from its negihbours.
23
www.rejinpaul.com
• Mixed:
• Best features of two.
24
www.rejinpaul.com
25
www.rejinpaul.com
Destination sequenced distance
vector routing protocol
• @ DSDV Protocol in adhoc.
• One of the Popular proactive routing protocols
• DSDV-each node keeps record of route
information- form of routing table
26
www.rejinpaul.com
27
www.rejinpaul.com
Cond...
• Each route broadcast message includes
• List of ID of Destination node
• No of hop required
• Next hop
• Recent sequence number
• Metric parameter
28
www.rejinpaul.com
29
www.rejinpaul.com
31
www.rejinpaul.com
32
www.rejinpaul.com
33
www.rejinpaul.com
34
www.rejinpaul.com
35
www.rejinpaul.com
37
www.rejinpaul.com
38
www.rejinpaul.com
39
www.rejinpaul.com
3 PHASES
• Neighbour discovery
• Information dissemination
• Route Computation
41
www.rejinpaul.com
42
www.rejinpaul.com
43
www.rejinpaul.com
45
www.rejinpaul.com
Advantage of DSR
• Bandwidth usage is limited
• How ?
• By avoiding the periodic table updates.
• However,
• At the time of route discovery:
• The sender node has to exchange control messages
to establish a path between source and destination.
• DSR protocol comprises two phases
• Route discovery and Route maintenance.
46
www.rejinpaul.com
47
www.rejinpaul.com
48
www.rejinpaul.com
49
www.rejinpaul.com
50
www.rejinpaul.com
51
www.rejinpaul.com
52
www.rejinpaul.com
53
www.rejinpaul.com
54
www.rejinpaul.com
AODV Protocol
• Ad hoc on demand routing protocols
• Used in MANET.
• Like DSR (Dynamic Source Routing) AODV Works in
two phases.
- Route discovery
- Route maintenance.
Only difference between DSR & AODV is:
Source will not carry the complete path.
Each node only knows its previous hop and next hop
information of the established path. 55
www.rejinpaul.com
56
www.rejinpaul.com
57
www.rejinpaul.com
58
www.rejinpaul.com
59
www.rejinpaul.com
61
www.rejinpaul.com
62
www.rejinpaul.com
63
www.rejinpaul.com
64
www.rejinpaul.com
65
www.rejinpaul.com
66
www.rejinpaul.com
67
www.rejinpaul.com
68
www.rejinpaul.com
69
www.rejinpaul.com
70
www.rejinpaul.com
71
www.rejinpaul.com
72
www.rejinpaul.com
73
www.rejinpaul.com
74
www.rejinpaul.com
SSA
75
www.rejinpaul.com
76
www.rejinpaul.com
FORP
77
www.rejinpaul.com
80
www.rejinpaul.com
81
www.rejinpaul.com
82
www.rejinpaul.com
83
www.rejinpaul.com
84
www.rejinpaul.com
85
www.rejinpaul.com
86
www.rejinpaul.com
87
www.rejinpaul.com
88
www.rejinpaul.com
89
www.rejinpaul.com
90
www.rejinpaul.com
91
www.rejinpaul.com
92
www.rejinpaul.com
93
www.rejinpaul.com
94
www.rejinpaul.com
95
www.rejinpaul.com
96
www.rejinpaul.com
UNIT - IV
SENSOR NETWORK SECURITY
www.rejinpaul.com
• Sensing Unit
• Processing Unit
• Communication Unit
• Battery
www.rejinpaul.com
Sensing unit
• Measure the physical quantities (temperature,
pressure etc..)
• Produce analog signals.
• ADC: Convert analog to digital signal
• Sensor node is small size, so it consumes
energy during operation.
www.rejinpaul.com
Processing unit
• It perform specific task, processing data and
control the operation of other components in
the sensor node
• External memory – store the collected
information
• Flash memory – low cost and high storage
capacity
www.rejinpaul.com
Communication unit
• Communication media are
Radio frequency
Optical communication
www.rejinpaul.com
• Computing subsystem
• Power supply subsystem
• Communication subsystem
• Sensing subsystem
www.rejinpaul.com
Computing subsystem
Communication subsystem
Sensing subsystem
Sensor drivers
Communication Processor
Buffering
www.rejinpaul.com
Packet forwarding
www.rejinpaul.com
www.rejinpaul.com
Encryption
www.rejinpaul.com
Error correction
www.rejinpaul.com
Error Correction 1
www.rejinpaul.com
Communication drivers
Data-processing mini-apps
Data diffusion
Two steps
• Interest propagation
Broadcast interest (temperature) – other node
maintain the received interest
• Data propagation
Data propagation includes the shortest path
www.rejinpaul.com
Algorithms used
• Flooding
• Gossiping
• Rumor routing
• Sequential assignment routing
• Directed diffusion
www.rejinpaul.com
Flooding
Gossiping
Rumor routing
Directed Diffusion
• It improves the data diffusion
• For each path gradient is assigned.
• For positive path, data transmission is allowed
• For negative path, data transmission is
prevented
www.rejinpaul.com
Self-organizing
Hybrid TDMA/FDMA
• S-MAC
• T-MAC
• D-MAC
• B-MAC
• X-MAC
• Wise - MAC