Preview

DISTRIBUTED TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS WITH ASYMMETRIC LINKS

Good Essays
Open Document
Open Document
2742 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
DISTRIBUTED TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS WITH ASYMMETRIC LINKS
A wireless sensor network also known as the adhoc network is used for the purpose of communication, where the communication system is not present especially in natural calamities like earthquakes, floods, or some army or defence purposes. The network comprises of nodes, which communicate with one another using wireless sensors. A wireless connection is developed amidst any two nodes, if the radio broadcast of every node is able to cover one another. If the transmission range is limited then a multihop also might be required, where intermediary nodes transmit the packet till the final node is attained Szu-Chi Wang and S.l. Wei (2004). A strong topology control of the network is important. A wireless sensor network is formed using the amalgamation of wireless powered sensors. Control of the topology through every node for the transmission power adjustment is efficient in increasing the time of the network and raising the capacity of the network. With a decreased transmission power for each node, the range from one node to the other is exposed. In a heterogeneous network the issue intensifies further with varied transmission range where the links that are wireless are not symmetrical in the topology. For a symmetric model, one cannot utilize varied transmission ranges among different nodes. Also if asymmetric links are enabled to be present in the setup, the power of the network setup can be made energy effectual due to variations in the transmission ranges. In this project a wireless asymmetric network is considered with a scattered topology controlled algorithm that allows minimum power for a stationary sensor network, the algorithm congregates instantly. The algorithm is not complex with a bidirectional multi-hop reachability amid two nodes in a given network. Also the interchange amid nodes is restricted to the vicinity, also the algorithm can be scaled to large network arrangements. http://embedsoftdev.com/embedded/wireless-sensor-network-wsn/ Wireless Sensor

You May Also Find These Documents Helpful

  • Satisfactory Essays

    We have considered a 4x4 square grid wireless sensor network, where sinks and sensor nodes both are static. Locations of the sinks are deterministically placed. Locations of our sinks are taken from our deterministic sensor node deployment approach for 4x4 square grid region, where the network is 1-hop and 2-covered. Sinks are placed deterministically on grid cross points. But the sensor node deployment strategy is set to random here. Locations of sensor…

    • 614 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    To prevent the energy consumption of the computational resource such as bandwidth, processor time, battery, a reliable sensor network needs to be developed. This is due to the ener-gy consumption of all nodes during the processing time. The main contributions of this paper are as…

    • 475 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Week 3 iLab Report

    • 1123 Words
    • 4 Pages

    Ciampa, M. (2013). WNA Guide to Wireless LAN’s (3rd ed.). [VitalSource Bookshelf]. Retrieved from http://www.devryu.net/…

    • 1123 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    LYT2 Task2

    • 4061 Words
    • 12 Pages

    This book provides generic approach architecture for the implementation of the wireless sensor networks. It proposes for a move into the routing protocols and improvement of networks through routing optimization, medium access and control of power while at the same time fulfilling the daily goals. It emphasizes on the importance to node information in the many wireless sensor network applications as well as the communication protocol. This solution can be applicable in the case of NHS since the use of wireless sensor networks can greatly help in transferring large data files, including the imaging files to…

    • 4061 Words
    • 12 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Topology Diagram Topology

    • 349 Words
    • 2 Pages

    A network redundant topology where nodes are connected using two concentric rings with four branches.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The topology that should be used in this network is an extended star topology because it is a bit more advanced than the regular star topology. Instead of connecting all devices to a central unit, sub-central devices are added in. This allows more functionality for organization. The Extended Star Topology is all but necessary to prevent degraded signals and it is also better for bigger networks.…

    • 456 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Hand Talk System

    • 11544 Words
    • 47 Pages

    Wireless communication has become an important feature for commercial products and a popular research topic within the last ten years. There are now more mobile phone subscriptions than wired-line subscriptions. Lately, one area of commercial interest has been low-cost, low-power, and short-distance wireless communication used for \personal wireless networks." Technology advancements are providing smaller and more cost effective devices for integrating computational processing, wireless communication, and a host of other functionalities. These embedded communications devices will be integrated into applications ranging from homeland security to industry automation and monitoring. They will also enable custom tailored engineering solutions, creating a revolutionary way of disseminating and processing information. With new technologies and devices come new business activities, and the need for employees in these technological areas. Engineers who have knowledge of embedded systems and wireless communications will be in high demand. Unfortunately, there are few adorable environments available for development and classroom use, so students…

    • 11544 Words
    • 47 Pages
    Powerful Essays
  • Powerful Essays

    Bs311 Unit 3 Essay

    • 3508 Words
    • 15 Pages

    Designing secure key distribution in an ad-hoc network might be an extremely hard task. Any reliance on a certificate of authority is not trivial at all, for the same reasons that reliance in any centralized authority is problematic. Additional problems include the increased packet sizes required by authentication extensions, unicast/multicast routing, Quality of Service support and power aware routing. Furthermore, due to the limited transmission range of wireless network interfaces, multiple hops may be needed to exchange data between nodes in the network (c.f.…

    • 3508 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    Network Design Proposal

    • 846 Words
    • 4 Pages

    Unlimited Security International is a diversified company composed of two segments (Security Solutions, and Fire Protection) that provides vital products and services to customers around the world.…

    • 846 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Wireless Network

    • 268 Words
    • 2 Pages

    Hello all, when it comes to designing a wireless network there are four steps to follow the first is the correct deployment scenario like Ad hoc or peer-to-peer, infrastructure, point-to-point and point-to-multipoint remote wireless bridge, Ethernet to wireless bridge, and wireless gate. However, infrastructure is the most commonly used with an access point connected to a wired infrastructure.…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The first four topologies that will be discussed are the point to point, the star, the bus, and the mesh. A point to point topology is known as the simplest topology because of its permanent link between two end points. Star topology each network host is connected to a central hub with a point-to-point connection to a central node which is called a hub or switch. Bus topology each computer is connected to a single Bus cable, which then sends a signal which travels in both directions from the source to all machines connected on the Bus cable, until it finds the intended recipient. If the machine address for some reason does not match the intended address for the data, then the machine ignores that machine address. However, if the data matches it is accepted. The bad part of this topology is that it has a single point of failure which is the cable and if this happens the whole network can shut down. Mesh-is a fully connected network in which each node is connected to each other. A fully connected network does not need to use switching or broadcasting. However its major disadvantage is that the…

    • 1032 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Network Topology Design

    • 430 Words
    • 2 Pages

    The business IT network infrastructure must be upgraded to accommodate the current and future growth of the company. The initial company network infrastructure design presented in Exhibit 1 provides a visual of the network design that included 10 workstations connected to a single stackable switch. This first network design employed a flat network topology, with workstations and servers configured in a peer to peer configuration that used a single ADSL line for Internet access. Fortunately the stackable network switch design is scalable and has enabled the network infrastructure to grow with the company while minimizing end user impact while changes were implemented. Exhibit 2 depicts the current business network infrastructure configuration which supports 100 employees and supporting services including Active Directory, DNS, DHCP, and file sharing for single sign-on convenience, security and simplified network management.…

    • 430 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Network Topology Design

    • 696 Words
    • 3 Pages

    "Network addresses should be carefully planned managed and documented (Oppenheimer, p. 168)". All of the address names should make sense and should be easily understood. As Oppenhiemer states, I would begin planning by designing a model. Design the model without assigning any addresses (p.168). Once the model is designed, the network engineer will begin to assign blocks of addresses in a hierarchical fashion to allow scalability, and an easy level of understanding. Also important is developing policies and procedures for addressing and naming. This would involve plans for distributing authority for addressing and naming to avoid one department having to manage all addresses and names.…

    • 696 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    A Mobile Ad hoc Networks (MANETs) stand for a structure of wireless mobile hosts that can dynamically and liberally self organize in to temporary and uninformed network topologies, allocating devices and people to faultlessly communicate without any kinds of pre-existing design of communication structure. The appliances of these networks are extremely necessary in areas like lecture theatres, conference halls, battlefields emergency rescue services, battlefields and other places whenever it’s become very difficult to employment the network infrastructures. In a Mobile Ad Hoc Network the network may experience unpredictable and rapid topology changes because of arbitrarily node movement. Routing paths in Mobile Ad hoc Network possibly have multiple hops, and each node in Mobile Ad hoc Network has the responsibility to perform like a router [1]. So each node in the Ad hoc networking is responsible for forwarding data packets to other nodes [2]. Routing in Mobile Ad hoc Network has been a tough job ever while the wireless mobile networks came into reality because of frequently change in network. Development of dynamic routing protocols is a huge challenge in the design of Ad hoc networks which can proficiently find routes among. These protocols are classified into hybrid, pro-active and reactive routing protocols [3] and the identification of the most appropriate routing protocol to be used depends on various facts which are scalability, traffic and mobility models and quality of service.…

    • 8219 Words
    • 33 Pages
    Powerful Essays
  • Good Essays

    Micropower Energy Harvesting

    • 2368 Words
    • 10 Pages

    Autonomy. Today batteries represent the dominant energy source for many devices and alike. In spite of the fact that energy density of batteries has increased by a factor of 3 over the past 15 years, in many cases their presence has a large impact, or even dominate, size and operational cost. For this reason alternative solutions to batteries are the subjects of worldwide extended investigations. One possibility is to replace them with energy storage systems featuring larger energy density, e.g., miniaturized fuel cells. A second possibility consists in providing the energy necessary to the device in a wireless mode; this solution, already used for RFID tag, can be extended to more power hungry devices, but it requires dedicated transmission infrastructures. A third possibility is harvesting energy from the ambient by using for example, vibration/ energy, thermal energy, light or RF radiation. For each type of sources, different ambient situation are considered. They correspond to various level of available power, and hence of generated electrical power. Wireless sensor networks are made of large numbers of small, low-cost sensor nodes working in collaboration to collect data and transmit them to a base station via a wireless network. They are finding…

    • 2368 Words
    • 10 Pages
    Good Essays