About the sleep timing of nodes in wireless sensor networks

Number of pages: 91 File Format: word File Code: 32112
Year: Not Specified University Degree: Master's degree Category: Electronic Engineering
  • Part of the Content
  • Contents & Resources
  • Summary of About the sleep timing of nodes in wireless sensor networks

    Dissertation for Master's degree (M.Sc)

    Strategy: Electronics

    Abstract:

    A sensor network consists of a large number of sensor nodes that are widely distributed in an environment and collect information from the environment. Since the nodes are powered by batteries An important issue in sensor networks is energy consumption. One of the most common ways to reduce energy consumption in these networks is to sleep nodes when their workload is lower. Sleeping each part of the sensor node will have a different effect on energy consumption.

    Most energy consumption is in the transmitter part, which is controlled by MAC protocols. S-MAC is one of the famous MACs designed specifically for sensor networks. In this MAC, nodes save energy through sleep and activity cycles.

    Many methods have been presented for routing in multi-step sensor networks that try to minimize energy consumption. One of the widely used and data-oriented methods in these networks is the directed propagation method.

    In this thesis, a protocol derived from the MAC protocol will be presented, which is specific for routing. It is directed propagation in sensor networks. This protocol implements the energy saving features that exist in S-MAC and is able to adapt to the network load in different conditions.

    In the application layer, energy consumption can be reduced by using the settings made in the activity of this layer. If the node has the possibility to control the activity of the sensor unit, it can reduce energy consumption by scheduling the activity of this unit and putting it to sleep in the conditions that the application allows. The number of nodes used in the network is usually higher than the number of nodes required to provide coverage on the network, so some of these nodes can be put to sleep and the monitoring work done periodically. Here, a dynamic and probabilistic method to provide the K-layer coverage required by the application on an intruder in the network is presented. This method is able to achieve very high savings and at the same time provide the required coverage. rtl;"> 

    Chapter One: Sensor Networks

    Recent advances in electronic science and wireless communications have made it possible for scientists to realize the idea that they have had in their heads for years.

    Sensor networks are a technology that allows us to closely and imperceptibly monitor a large physical space.

    A sensor network consists of a large number of sensor nodes that are widely distributed in an environment and collect information from the environment. The location of sensor nodes is not necessarily predetermined and clear. Such a feature makes it possible to leave them in dangerous or inaccessible places. On the other hand, this means that the protocols and algorithms of sensor networks must have self-organizing capabilities. Another unique feature of sensor networks is the ability to cooperate and coordinate between sensor nodes. Each sensor node has a processor on its board, and instead of sending all the raw data to the center or to a node that is responsible for processing and concluding the information, it first performs a series of basic and simple processing on the information it has obtained, and then sends the semi-processed data.

    Although each sensor alone has little ability, the combination of hundreds of small sensors offers new possibilities. In fact, the power of wireless sensor networks is in the ability to use a large number of small nodes that are able to organize themselves and be used in many cases such as simultaneous routing, monitoring of environmental conditions, monitoring the health of structures or equipment of a system. Each of the nodes is equipped with a number of sensors (such as sound, temperature, infrared, vibration, radiation or any other sensors), a microprocessor, a radio receiver/transmitter and a power supply.. The nodes of this network can be installed on the ground, in the air, underwater, on the human body or on vehicles. Sensor nodes with the help of each other try to collect environmental information and transfer them to a center called a sink. 1-1 Introduction of wireless sensor networks Today, the discussion of remote control and monitoring systems is one of Challenging topics are in the field of electronics and computer science. Therefore, research is always looking for a solution to meet the specific conditions and expected expectations. Under the conditions of the same quality, the lower the cost-effectiveness ratio, the higher the popularity of the method.

    Recent advances in the field of smart sensor systems, wireless telecommunications, and digital electronics make it possible to build small, low-power and low-cost sensor nodes that They also have the ability to communicate wirelessly. According to the different performance of the sensor networks, each node can be formed from various components according to the defined functions, but in general, each node is formed as a general component, which means: central processing unit, radio transmitter and receiver, power source that can be combined through solar cell batteries, energy source of the system. provide a number of sensors that collect the desired data, such as external storage if needed, GPS locator and other components that can be included in each node depending on the different applications.

    Generally, a wireless sensor network includes a large number of these nodes, whose data is taken into account collectively to measure a parameter, that is, all the information A parameter is collected in a node of the network, which is usually called a base station [1], it is processed and the actual value of that parameter is estimated relatively accurately. In these networks, the failure of a network node has almost no effect on the estimated value.

    In wireless sensor networks, a large number of sensor nodes are located inside the desired location or very close to it to measure the desired parameter. The location of these nodes is not designed in advance. This problem helps in the simple placement of sensors in the network, but instead, the protocols used for these networks must be self-adjusting or self-organizing. Due to the fact that these sensors have a processor inside, to reduce the amount of data transmission, these sensors only send the required data after processing the primary data. Wireless sensor networks are similar to mobile adhoc networks (MANET) in many ways, but the protocols used for adhoc networks are not suitable for wireless sensor networks. In adhoc networks, the main issue for designing protocols is quality of service [2] (Qos), while in wireless sensor networks, the main limitation for designing protocols is the limited energy of sensors. In fact, protocols that minimize power consumption in sensors are more important for wireless sensor networks.

    There are many protocols, techniques and concepts of traditional wireless networks such as cellular networks, ad hoc networks and Bluetooth, which are applicable and are currently used in wireless sensor networks, but the differences cause the need for new protocols and techniques.

    In general, the main differences between wireless sensor networks and adhoc networks are as follows:

    The number of network nodes in wireless sensor networks is much more than adhoc networks.

    Sensors in wireless sensor networks are compactly placed.

    Sensors in wireless sensor networks are more prone to failure. .

    The coordination of wireless sensor networks is constantly changing.

    In most wireless sensor networks, communication is broadcast, while for adhoc networks, communication is point-to-point.

    Sensors are limited in size, power, computing power, and memory.

  • Contents & References of About the sleep timing of nodes in wireless sensor networks

    List:

    Sensor networks

    Introduction of sensor networks. 2

    Architecture of sensor networks. 4

    General characteristics of sensor networks. 6

    Applications of sensor networks. 10

    Important factors in the design of sensor networks. 11

    Fault tolerance. 13. Security. 13

           1-6 Energy saving in sensor nodes. 14

                                1-6-1 Design assumptions. 15

    Design objectives. 18

    1-7 Distributed scheduling methods in hierarchical networks 22

                         1-8 Distributed scheduling methods in non-hierarchical networks. 28

    Chapter Two: Routing in sensor networks

    2-1 Classification of protocols 32

    2-2 desired parameters in the routing protocol 33

    2-3 Routing protocols 35

    SPIN.. 39

    SPIN. 48

    49

    50

    52

    Chapter Three: MAC

    Introduction. 53

    3-1 The difference between MAC protocols designed for sensor networks. 55

    3-2 Limitations in the design of MAC protocols of sensor networks. 56

       3-3   The main sources of energy waste in sensor networks. 60

    3-4 Overview of available MACs. 61

       3-5   S-MAC.. 62

            3-5-1  Periodic listening and falling asleep. 63

    66

    Chapter 4: Proposed Algorithm

    Introduction.. 73

    4-1 Inter-layer Design.. 73

    4-2 Proposed Algorithm.. 75

    4-4 Simulation Results.. 79

    Chapter Five: Application and Problem Layer Coverage Introduction.. 83

    5-1 Previous research.. 86

    5-2 Dynamic K-layer coverage.. 89

    5-3 Proposed algorithm.. 90

    5-4 MAC layer support.. 96

    5-5 Reasons for not providing maximum coverage possible 97

       5-6  Another method of estimating the probability required for dynamic K-layer coverage. 97

    5-7 Methods to solve the problem of k-layer coverage in places.. 104

    5-8 Simulation results.. 100

    Chapter 6: Conclusion.. 104

    Future works.. 107

    References .. 108

    Source:

     

    [1]    I.F. Akyildiz and W. Su and Y. Sankarasubramaniam and E. Cayirci, Wireless Sensor Networks: A Survey IEEE Computer, vol. 38, no. 4, pages 393-422, Mar. 2002

    [2] P. Santi, topology control in wireless adhoc ad sensor networks, ACM computing Survey, Vol.37, No.2, June 2005

    [3] A. Ananda, MunChoon Chan, Rajeev Shorey, Wei Tsang Ooi, Mobile, Wireless and Sensor Networks : Technology, Applications and Future Directions, 2006

    [4]W.Heinzelman,A.P.Chandrakasan,H.Balakrishnan,"An Application-Specific Protocol Architecture for Wireless Microsensor Networks", IEEE Transactions on Wireless Communications, Vol.1,No.4,pp.660-670,Oct 2002

    [5]Sanjay Burman. Cryptography and security - future challenges and issues. Invited Talk, 2007

    [6] M. Hatler, “wireless sensor networks: mass market opportunities on world inc, 2004

    [7] MauriKuorilehto, MarkoHannikainen, Timo D. Hamalainen,” A survey of application distribution in wireless sensor networks, pp. 774-788. Journal of 2005

    [8] D. Culler, D. Estrin, and M. Srivastava, "Overview of sensor networks," Computer, Vol. 37, No. 8, pp. 41-49, August 2004

    [9] ANDREA J. GOLDSMITH, STEPHEN B. WICKER, Design challenges for energy-constrained ad hoc wireless networks, Journal: IEEE Wireless Communications, vol. 9, no. 4, pp. 8-27, 2002

    [10] BhaskarKrishnamachari, Networking Wireless Sensors, Cambridge university press, 2005

    [11] S.Madden, M.Franklin, J.Hellerstein, W.Hong,"TinyDB: An Acquisitional Query Processing system for sensor networks," V.30, pp.122-173, March 2005

    [12]S.Madden, J.Gehrke,"Query Processing in Sensor Networks",IEEE CS and IEEE ComSoc,ISSN:1536-1268,2004

    [13] B.A.Warneke,K.S.J.Pister,Exploring the Limits of System Integration with Smart Dust,ASME International Mechanical Engineering Congress & Exposition,2002

    [14] D. Malan, T. Fulford-Jones, M. Welsh, S. Moulton,” AnAdHocMoulton,"AnAdHoc sensor Network Infrastructure for Emergency Medical Care,Boston,June 2004

    [15] Geoffrey Werner-Allen,"Deploying a Wireless Sensor Network On an Active Volcano"Mar 2006

    [16] A.Mainwaring, J.Polastre, R.Szewczyk, D.Culler, J.Anderson,"Wireless sensor networks for habitat monitoring", PP.88-97, 2002

    [17] [1] I.F. Akyildiz and W. Su and Y. Sankarasubramaniam and E. Cayirci, Wireless Sensor Networks: A Survey IEEE Computer, vol. 38, no. 4, pages 393-422, Mar. 2002

    [18] S.Kumar, T.H.Lai, J.Balogh,"on K-Coverage in a mostly sleeping sensor network", Wireless Networks, Vol. 14, No. 3, pp. 277-294, October 2006

    [19] W.Ye, J.heydemann, D.Strin, "Medium access control with coordinated adaptive sleeping for wireless sensor networks", IEEE/ACM Trans. Netw. ,vol.12, pp.493-506,2004

    [20] T.V.Dam, K.Langendoen, "An adaptive energy-efficient MAC protocol for wireless sensor networks", in Proceedings of the 1st international Conference On Embedded Networked sensor system, Los Angeles, California, USA: ACM, pp.171-180, 2003

    [21] K.Wu, Y.Gao, F.Li,Y.Xiao,"Lightweight deployment-aware scheduling for wireless sensor networks",Mobile Networks & Application,Vol.10,pp.837-852,December 2005

    [22] G.Lu, N.sandagopan, B.Krishnamachari, A.Goel,"Delay efficient sleep scheduling in wireless sensor network",INFOCOM 2005.24th Annual Joint Conference of the IEEE Computer & Communication Societies. Proceedings IEEE,vol.4, pp.2470-2481,2005

    [23] X.Wang, G.Xing, Y.Zhang, C.Lu, R.Pless, C.Gill,"Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks", Proceedings of the 1st international conference on Embedded networked sensor system,pp.28-39,2003

    [24] S.Meguerdichian, F.Koushanfar, M.Potkonjak, M.Srivastava,"Coverage problems in wireless Ad-Hoc sensor networks",INFOCOM 2001.Twentieth Annual Joint Conference of the IEEE Computer & Communications Societies.Proceedings.IEEE,vol.3,2001

    [25] F.Ye, G.Zhong, S.Lu, L.Zhang,"PEAS:a robust energy conserving protocol for long-lived sensor networks",

    [26] Z.Abrams, A.Goel, S.plotkin,"Set K-Cover algorithms for energy efficient monitoring in wireless sensor networks", in proceeding of the third international symposium on information processing in sensor network, Berkeley, California, USA: ACM, pp.424-432, 2004

    [27] B.Chen, K.Jamieson, H.Balakrishnan, R.Morris, "Span:An Energy-Efficient Coordination Algorithm for Topology Maintenance in AD-Hoc Wireless Network," Wireless Networks,vol.8, pp.481-494,2002

    [28] J.Zhao, R.Govindan, "Understanding packet delivery performance in dense wireless sensor networks", Proceedings of the first international conference on Embedded networked sensor system,pp.1-13, 2003

    [29] A.Arora, P.Dutta, S.Bapat, V.Kulathumani, H.Zhang, V.Naik, V.Mittal, H.Cao, M.Demirbas, M.gouda, Y.choi, T.Herman, S.Kulkarni, U.Arumugam, M.Nesterenko ,A.Vora,M.Miyashita,"A line in the sand: A wireless sensor network for target detection, classification and tracking",Computer Networks, vol.46, pp.605-634,2004

    [30] D.Tina, N.D.Georganas, "A coverage-preserving node scheduling scheme for large wireless sensor networks", in proceedings of the 1st ACM workshop on wireless sensor networks and application,Atlanta,Georgia,USA:ACM,pp.32-41,2002

    [31] F.Ye, G.Zhong, S.Lu, L.zhang,"Energy efficient robust sensing coverage in large sensor networks, UCLA Computer Science Department

    [32] P.Wan, C.Yi,"Coverage by randomly deployed wireless sensor networks,"IEEE/ACM Trans.Netw., vol.14,pp.2658-2669,2006

    [33] T.He, S.Krishnamurthy, J.Stankovic, T.Abdelzaher, L.Luo, R.Stoleru, T.Yan, Lin Gu,"Energy-efficient surveillance system using wireless sensor networks", Proceeding of the 2nd international conference on Mobile system, application and services,pp.270-283,2004

    [34] M.Cardei, M.Thai, Y.Li, W.

About the sleep timing of nodes in wireless sensor networks