About the sleep timing of nodes in wireless sensor networks

Number of pages: 118 File Format: word File Code: 30913
Year: Not Specified University Degree: Master's degree Category: Electronic Engineering
  • Part of the Content
  • Contents & Resources
  • Summary of About the sleep timing of nodes in wireless sensor networks

    Dissertation for Master's degree (M.Sc)

    Abstract:

    A sensor network consists of a large number of sensor nodes that are widely distributed in an environment and gather information from the environment. Since the nodes are powered by batteries, an important issue that is considered in sensor networks is energy consumption. One of the methods that are very common in these networks to reduce energy consumption is to sleep the nodes in There are times when their workload is lower. Putting each part of the sensor node to sleep will have a different effect on energy consumption.

    The most energy consumption is in the transmitter part, which is controlled by MAC protocols. S-MAC is one of the famous MACs designed specifically for sensor networks. In this MAC nodes save energy through sleep and activity cycles. They have energy. One of the widely used and data-oriented methods in these networks is the directed propagation method.

    In this dissertation, a protocol derived from the MAC protocol will be presented, which is specific for directed propagation routing in sensor networks. This protocol has implemented the energy saving features that exist in S-MAC and is able to adapt to the network load in different conditions.

    In the application layer, energy consumption can be reduced by using the settings that are made in the activity of this layer. If the node has the possibility to control the activity of the sensor unit, it is possible to reduce the energy consumption by scheduling the activity of this unit and putting it to sleep in the conditions that the application allows. Since the number of nodes used in the network It is usually higher than the number of nodes required to provide coverage on the network, so some of these nodes can be put to sleep and the monitoring work done periodically. Here, a dynamic and probabilistic method to provide K-layer coverage required by the application on an intruder in the network is presented. This method is able to achieve very high savings and at the same time provide the required coverage. which they have nurtured for years, to put into practice.

    Sensor networks are a technology that allows us to monitor a wide physical space accurately and imperceptibly.

    A sensor network consists of a large number of sensor nodes that are widely distributed in an environment and collect information from the environment. The location of sensor nodes is not necessarily predetermined and clear. Such a feature makes it possible to leave them in dangerous or inaccessible places

    On the other hand, this means that the protocols and algorithms of sensor networks must have self-organizing capabilities. Another unique feature of sensor networks is the ability to cooperate and coordinate between sensor nodes. Each sensor node has a processor on its board, and instead of sending all the raw data to the center or to a node that is responsible for processing and concluding information, it first performs a series of basic and simple processing on the information it has obtained, and then sends the semi-processed data.

    Although each sensor alone has little ability, the combination of hundreds of small sensors offers new possibilities. In fact, the power of wireless sensor networks is in the ability to use a large number of small nodes that are able to organize themselves and be used in many cases such as simultaneous routing, monitoring of environmental conditions, monitoring the health of structures or equipment of a system. Each of the nodes is equipped with a number of sensors (such as sound, temperature, infrared, vibration, radiation or any other sensors), a microprocessor, a radio receiver/transmitter and a power supply. The nodes of this network can be installed on the ground, in the air, underwater, on the human body, or on vehicles. The sensor nodes, with the help of each other, try to collect environmental information and transfer them to a center called a sink. 1-1 Introduction of wireless sensor networks Today, the discussion of remote control and monitoring systems is one of the most challenging topics in the field of electronics and computer science.Therefore, research is always looking for a solution to meet specific conditions and expected expectations. Under the conditions of the same quality, the lower the cost-effectiveness ratio, the higher the popularity of the method.

    Recent advances in the field of smart sensor systems, wireless telecommunications, and digital electronics allow the construction of small, low-power, and low-cost sensor nodes that can communicate wirelessly. also have According to the different performance of the sensor networks, each node can be formed from various components according to the defined functions, but in general, each node is formed as a general component, which means: central processing unit, radio transmitter and receiver, power source that can be combined through solar cell batteries, energy source of the system. provide a number of sensors that collect the desired data, such as external storage if needed, GPS locator and other components that can be included in each node depending on the different applications. Generally, a wireless sensor network includes a large number of these nodes, whose data is considered collectively to measure a parameter, that is, all the collected information of a parameter in a node of The network, which is usually called the base station [1], is processed and the actual value of that parameter is estimated relatively accurately. In these networks, the failure of a network node has almost no effect on the estimated value.

    In wireless sensor networks, a large number of sensor nodes are located inside the desired location or very close to it for measuring the desired parameter. The location of these nodes is not designed in advance. This problem helps in the simple placement of sensors in the network, but instead, the protocols used for these networks must be self-adjusting or self-organizing. Due to the fact that these sensors have a processor inside, in order to reduce the volume of data transmission, these sensors only send the required data after processing the primary data. Wireless sensor networks are similar to mobile adhoc networks (MANET) in many ways, but the protocols used for adhoc networks are not suitable for wireless sensor networks. In adhoc networks, the main issue for designing protocols is quality of service [2] (Qos), while in wireless sensor networks, the main limitation for designing protocols is the limited energy of sensors. In fact, protocols that minimize the power consumption of sensors are more important for wireless sensor networks.

    There are many protocols, techniques and concepts of traditional wireless networks such as cellular networks, ad hoc networks and Bluetooth, which are applicable and are currently used in wireless sensor networks, but the differences cause the need for new protocols and techniques.

    In general, the main differences between wireless sensor networks and adhoc networks are It is as follows:

    The number of network nodes in wireless sensor networks is much more than adhoc networks.

    Sensors in wireless sensor networks are compactly placed.

    Sensors in wireless sensor networks are more prone to failure.

    The coordination of wireless sensor networks is constantly changing.

    In most wireless sensor networks, communication is broadcast. For adhoc networks, communication is point-to-point. Sensors are limited in size, power, computing power, and memory. The difference between sensor networks and other networks is in the nature of data. The axis [3] and also the resources of radio and processing are very limited in them, so that the proposed methods for data transmission in other networks and even networks that have a similar structure to sensor networks (such as ad hoc networks) cannot be used in these networks.

    Techniques and methods used in such networks are highly dependent on the nature of the network application, network structure, atmospheric and environmental conditions, and limitations. Effective factors are network performance parameters and cost.

    The main goal of all the efforts to provide solutions is to have a system of simple, easy and low-cost control systems, which can finally respond to the needs of our customers in the face of limitations (broadband, energy, environmental interference, feeding, etc.). ) To provide slow standing and general conditions according to the request and desire (transmission of large volume of information with rich content, high durability and longevity, low cost, etc.)

  • Contents & References of About the sleep timing of nodes in wireless sensor networks

    List:

    Chapter One: Sensor Networks

    Introduction.. 1

    Introduction of sensor networks. 2

    Architecture of sensor networks. 4

    General characteristics of sensor networks. 6

    Applications of sensor networks. 10

    Important factors in the design of sensor networks. 11

    1-5-1 Routing. 11

    1-5-2 Limited energy. 11

    1-5-3 Scalability. 12

         1-5-4 Delay time. 13

    1-5-5 Low cost. 13

    Fault tolerance. 13

    1-5-7

           1-6 Energy saving in sensor nodes. 14

                                1-6-1 Design assumptions. 15

    Design objectives. 18

    1-7 Distributed scheduling methods in hierarchical networks. 22

                         1-8 Distributed scheduling methods in non-hierarchical networks. 28

    Chapter Two: Routing in sensor networks

    2 Introduction.. 31

              2-1 Classification of protocols. 32

              2-2 desired parameters in the routing protocol. 33

                2-2-1 Network dynamics. 33

                2-2-2 Placement of sensors in the network. 34

                 2-2-3  Energy limitation. 34

                 2-2-4  Information transmission model. 34

                 2-2-5 Data combination. 35

        2-3 routing protocols. 35

    2-3-1 Flood method. 35

           2-3-2 The method of spreading rumours. 37

    2-3-3 SPIN method.. 39

                2-3-4  Directed diffusion method. 42

    2-3-5 Comparison of directed diffusion method and SPIN method. 48

            2-3-6 Geographical routing method. 49

                2-3-7  Release method of the emitter 50

    2-3-8 One-step absorption diffusion method. 52

    Chapter Three: MAC

    Introduction. 53

    3-1 The difference between MAC protocols designed for sensor networks. 55

    3-2 Limitations in the design of MAC protocols of sensor networks. 56

       3-3   The main sources of energy waste in sensor networks. 60

    3-4 Overview of available MACs. 61

       3-5   S-MAC.. 62

            3-5-1  Periodic listening and falling asleep. 63

    3-5-2 Collision prevention. 66

    Chapter 4: Proposed Algorithm

    Introduction.. 73

    4-1 Inter-layer Design.. 73

    4-2 Proposed Algorithm.. 75

    4-4 Simulation Results.. 79

    Chapter Five: Application Layer and Coverage Issue

    Introduction.. 83

    5-1 Previous research.. 86

    5-2 Dynamic K-layer coverage.. 89

    5-3 Proposed algorithm.. 90

    5-4 MAC layer support.. 96

    5-5 Reasons for not providing the maximum possible coverage. 97

       5-6  Another method of estimating the probability required for dynamic K-layer coverage. 97

       5-7  methods to solve the problem of k-layer cover by place. 104

    5-8 simulation results.. 100

    Sixth chapter: conclusion.. 104

    Future works.. 107

    References .. 108

    Source:

    References

    [1] I.F. Akyildiz and W. Su and Y. Sankarasubramaniam and E. Cayirci, Wireless Sensor Networks: A Survey IEEE Computer, vol. 38, no. 4, pages 393-422, Mar. 2002

    [2] P. Santi, topology control in wireless adhoc ad sensor networks, ACM computing Survey, Vol.37, No.2, June 2005

    [3] A. Ananda, MunChoon Chan, Rajeev Shorey, Wei Tsang Ooi, Mobile, Wireless and Sensor Networks : Technology, Applications and Future Directions, 2006

    [4]W.Heinzelman,A.P.Chandrakasan,H.Balakrishnan,"An Application-Specific Protocol Architecture for Wireless Microsensor Networks", IEEE Transactions on Wireless Communications, Vol.1,No.4,pp.660-670,Oct 2002

    [5]Sanjay Burman. Cryptography and security - future challenges and issues. Invited Talk, 2007

    [6] M. Hatler, “wireless sensor networks: mass market opportunities on world inc, 2004

    [7] MauriKuorilehto, MarkoHannikainen, Timo D. Hamalainen,” A survey of application distribution in wireless sensor networks, pp. 774-788. Journal of 2005

    [8] D. Culler, D. Estrin, and M. Srivastava, "Overview of sensor. Srivastava, "Overview of sensor networks," Computer, Vol. 37, No. 8, pp. 41-49, August 2004

    [9] ANDREA J. GOLDSMITH, STEPHEN B. WICKER, Design challenges for energy-constrained ad hoc wireless networks, Journal: IEEE Wireless Communications, vol. 9, no. 4, pp. 8-27, 2002

    [10] BhaskarKrishnamachari, Networking Wireless Sensors, Cambridge university press, 2005

    [11] S.Madden, M.Franklin, J.Hellerstein, W.Hong,"TinyDB: An Acquisitional Query Processing system for sensor networks," V.30, pp.122-173, March 2005

    [12]S.Madden, J.Gehrke,"Query Processing in Sensor Networks",IEEE CS and IEEE ComSoc,ISSN:1536-1268,2004

    [13] B.A.Warneke,K.S.J.Pister,Exploring the Limits of System Integration with Smart Dust,ASME International Mechanical Engineering Congress & Exposition,2002

    [14] D.Malan,T.Fulford-Jones,M.Welsh,S.Moulton,"An AdHoc sensor Network Infrastructure for Emergency Medical Care,Boston,June 2004

    [15] Geoffrey Werner-Allen,"Deploying a Wireless Sensor Network On an Active Volcano"Mar 2006

    [16] A.Mainwaring, J.Polastre, R.Szewczyk, D.Culler, J.Anderson,"Wireless sensor networks for habitat monitoring", PP.88-97, 2002

    [17] [1] I.F. Akyildiz and W. Su and Y. Sankarasubramaniam and E. Cayirci, Wireless Sensor Networks: A Survey IEEE Computer, vol. 38, no. 4, pages 393-422, Mar. 2002

    [18] S.Kumar, T.H.Lai, J.Balogh,"on K-Coverage in a mostly sleeping sensor network", Wireless Networks, Vol. 14, No. 3, pp. 277-294, October 2006

    [19] W.Ye, J.heydemann, D.Strin, "Medium access control with coordinated adaptive sleeping for wireless sensor networks", IEEE/ACM Trans. Netw. ,vol.12, pp.493-506,2004

    [20] T.V.Dam, K.Langendoen, "An adaptive energy-efficient MAC protocol for wireless sensor networks", in Proceedings of the 1st international Conference On Embedded Networked sensor system, Los Angeles, California, USA: ACM, pp.171-180, 2003

    [21] K.Wu, Y.Gao, F.Li,Y.Xiao,"Lightweight deployment-aware scheduling for wireless sensor networks",Mobile Networks & Application,Vol.10,pp.837-852,December 2005

    [22] G.Lu, N.sandagopan, B.Krishnamachari, A.Goel,"Delay efficient sleep scheduling in wireless sensor network",INFOCOM 2005.24th Annual Joint Conference of the IEEE Computer & Communication Societies. Proceedings IEEE,vol.4, pp.2470-2481,2005

    [23] X.Wang, G.Xing, Y.Zhang, C.Lu, R.Pless, C.Gill,"Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks", Proceedings of the 1st international conference on Embedded networked sensor system,pp.28-39,2003

    [24] S.Meguerdichian, F.Koushanfar, M.Potkonjak, M.Srivastava,"Coverage problems in wireless Ad-Hoc sensor networks",INFOCOM 2001.Twentieth Annual Joint Conference of the IEEE Computer & Communications Societies.Proceedings.IEEE,vol.3,2001

    [25] F.Ye, G.Zhong, S.Lu, L.Zhang,"PEAS:a robust energy conserving protocol for long-lived sensor networks",

    [26] Z.Abrams, A.Goel, S.plotkin,"Set K-Cover algorithms for energy efficient monitoring in wireless sensor networks", in proceeding of the third international symposium on information processing in sensor network, Berkeley, California, USA: ACM, pp.424-432, 2004

    [27] B.Chen, K.Jamieson, H.Balakrishnan, R.Morris, "Span:An Energy-Efficient Coordination Algorithm for Topology Maintenance in AD-Hoc Wireless Network," Wireless Networks,vol.8, pp.481-494,2002

    [28] J.Zhao, R.Govindan, "Understanding packet delivery performance in dense wireless sensor networks", Proceedings of the first international conference on Embedded networked sensor system,pp.1-13, 2003

    [29] A.Arora, P.Dutta, S.Bapat, V.Kulathumani, H.Zhang, V.Naik, V.Mittal, H.Cao, M.Demirbas, M.gouda, Y.choi, T.Herman, S.Kulkarni, U.Arumugam, M.Nesterenko , A. Vora, M. Miyashita,"A line in the sand: A wireless sensor network for target detection, classification and tracking", Computer Networks, vol.46, pp.605-634, 2004

    [30] D.

About the sleep timing of nodes in wireless sensor networks