SlideShare a Scribd company logo
1 of 36
Download to read offline
Power Saving in  Wireless Sensor Networks Eng. MshariAlabdulkarim
Energy Saving in WSNs Outline: ,[object Object]
Introduction.
Power Consumption in WSNs.
Sleep-wake Scheduling.
MAC Protocol for WSN.
In-network Processing.
Network Coding.
Communication Protocol.,[object Object]
Energy Saving in WSNs Introduction Wireless Sensor Network? A wireless sensor network is a collection of nodes “sensors” organized into a cooperative network. The nodes communicate wirelessly and often self-organize after being deployed in an ad-hoc fashion. Base Station Detection Sensor Field
Energy Saving in WSNs Introduction (Cont.) What are the components of the wireless sensor? Processor. Memory. RF transceiver. Power source. Sensor.
Energy Saving in WSNs Introduction (Cont.) What is the goal of the sensor node? The goal from the sensor node is to collect the data at regular intervals, then transform the data into an electrical signal and finally send the signal to the sink or the base node.
Energy Saving in WSNs Introduction (Cont.)
Energy Saving in WSNs Introduction (Cont.) Wireless Sensor Network Applications: ,[object Object],environmental and habitat monitoring, precision agriculture, indoor climate control, surveillance, treaty verification, and intelligent alarms. ,[object Object],structural monitoring, condition-based equipment maintenance, medical diagnostics, and urban terrain mapping. ,[object Object],wildlife habitats, disaster management, emergency response, ubiquitous computing environments, asset tracking, healthcare, and manufacturing process flow.
Energy Saving in WSNs Introduction (Cont.) Wireless Sensor Network Example (1):
Energy Saving in WSNs Introduction (Cont.) Wireless Sensor Network Example (2):
Energy Saving in WSNs Introduction (Cont.) Short Video
Energy Saving in WSNs Power Consumption in WSNs The power issue in the wireless sensor network is one of the biggest challenges, because the sensor has a limited source of power which is also hard to replace or recharge “e.g. sensors in the battle field, sensors in a large forest … etc”.  Why limited source of power? Inexpensive nature. Limited size and weight. Redundant nature.
Energy Saving in WSNs sources of power consumption: Useful power consumption: ,[object Object]
Processing query requests.
Forwarding queries and data to the neighbors.Wasteful power consumption: ,[object Object]
Retransmitting because of collisions “e.g. two packets arrived at the same time at the same sensor”.
Overhearing “when a sensor received a packet doesn’t belong to it”.
 Generating and handling control packets.
Over-emitting “when a sensor received a packet while it is not ready”.,[object Object]
In-network Processing.
Network Coding.
Communication Protocol.,[object Object]
Energy Saving in WSNs Power consumption model: Time Wake Wake Sleep Sleep Sleep Sleep and Wake Duty Cycle
Energy Saving in WSNs
Energy Saving in WSNs On-demandScheme: Strategy: Sensor should be awakening just when it receives a packet from neighbors. Advantages: ,[object Object]
The best sleep-wake scheme for the applications with low duty cycle.Disadvantages: ,[object Object]
Not suitable for Disruption Tolerant Network (DTN).,[object Object]
Energy Saving in WSNs Scheduled Rendezvous Scheme (Cont.): Advantages: ,[object Object],Disadvantages: ,[object Object],[object Object]
Energy Saving in WSNs Asynchronous Scheme (Cont.): Advantages: ,[object Object]
Allow each node in the WSN to set its own sleep/wake schedule independently.

More Related Content

What's hot

SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSjuno susi
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...ArunChokkalingam
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks DEBABRATASINGH3
 
The cellular concept
The cellular conceptThe cellular concept
The cellular conceptZunAib Ali
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsAman Gupta
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksSayed Chhattan Shah
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSNMahbubur Rahman
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksGokuldhev mony
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksAneeshGKumar
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksDarpan Dekivadiya
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingArunChokkalingam
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networksAmeer Sameer
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryptionRK Nayak
 

What's hot (20)

SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
 
The cellular concept
The cellular conceptThe cellular concept
The cellular concept
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applications
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
Unit 33-routing protocols for wsn
Unit 33-routing protocols for wsnUnit 33-routing protocols for wsn
Unit 33-routing protocols for wsn
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient Routing
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networks
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryption
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 

Viewers also liked

Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networksahmad abdelhafeez
 
Issues of Wireless Sensor Networks
Issues of Wireless Sensor NetworksIssues of Wireless Sensor Networks
Issues of Wireless Sensor NetworksSouhaiel tekaya
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applicationsDeepshika Reddy
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networksPriya Kaushal
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksBala Lavanya
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsnElham Hormozi
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkIOSR Journals
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Sigma web solutions pvt. ltd.
 
Session 5.6 towards a semantic outlier detection framework in wireless sens...
Session 5.6   towards a semantic outlier detection framework in wireless sens...Session 5.6   towards a semantic outlier detection framework in wireless sens...
Session 5.6 towards a semantic outlier detection framework in wireless sens...semanticsconference
 
Linear books to open world adventure
Linear books to open world adventureLinear books to open world adventure
Linear books to open world adventuresemanticsconference
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkKarthik
 
Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811praveen369
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksKarthik
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkdeawoo Kim
 

Viewers also liked (20)

Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networks
 
Issues of Wireless Sensor Networks
Issues of Wireless Sensor NetworksIssues of Wireless Sensor Networks
Issues of Wireless Sensor Networks
 
Sensor Network
Sensor NetworkSensor Network
Sensor Network
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applications
 
Proyecto base de datos 2
Proyecto base de datos 2Proyecto base de datos 2
Proyecto base de datos 2
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Lecture3 - Machine Learning
Lecture3 - Machine LearningLecture3 - Machine Learning
Lecture3 - Machine Learning
 
Threats in wireless sensor networks
Threats in wireless sensor networksThreats in wireless sensor networks
Threats in wireless sensor networks
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
 
Session 5.6 towards a semantic outlier detection framework in wireless sens...
Session 5.6   towards a semantic outlier detection framework in wireless sens...Session 5.6   towards a semantic outlier detection framework in wireless sens...
Session 5.6 towards a semantic outlier detection framework in wireless sens...
 
Linear books to open world adventure
Linear books to open world adventureLinear books to open world adventure
Linear books to open world adventure
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
 
Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 

Similar to Energy Saving Techniques in Wireless Sensor Networks

Throughput maximization technique in wireless sensor network using data aggr...
Throughput maximization technique in wireless sensor network using data  aggr...Throughput maximization technique in wireless sensor network using data  aggr...
Throughput maximization technique in wireless sensor network using data aggr...jency j
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksJerry Yoakum
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkijcsa
 
MAC Protocol.pdf
MAC Protocol.pdfMAC Protocol.pdf
MAC Protocol.pdfAbyThomas54
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksIDES Editor
 
Ppt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semPpt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semshikhathegreat
 
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORKAN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORKijceronline
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSnanocdac
 
Modified LAEEBA Routing in WBAN
Modified LAEEBA Routing in WBANModified LAEEBA Routing in WBAN
Modified LAEEBA Routing in WBANijsrd.com
 
Wireless sensor networks dcs
Wireless sensor networks dcsWireless sensor networks dcs
Wireless sensor networks dcsAbhishek Raj
 
WSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.pptWSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.pptAbyThomas54
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Editor Jacotech
 

Similar to Energy Saving Techniques in Wireless Sensor Networks (20)

E044033136
E044033136E044033136
E044033136
 
Wsn ppt original
Wsn ppt originalWsn ppt original
Wsn ppt original
 
Throughput maximization technique in wireless sensor network using data aggr...
Throughput maximization technique in wireless sensor network using data  aggr...Throughput maximization technique in wireless sensor network using data  aggr...
Throughput maximization technique in wireless sensor network using data aggr...
 
WSN
WSNWSN
WSN
 
WSN
WSNWSN
WSN
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor network
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
MAC Protocol.pdf
MAC Protocol.pdfMAC Protocol.pdf
MAC Protocol.pdf
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
 
Ppt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semPpt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th sem
 
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORKAN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKS
 
Gm3411871190
Gm3411871190Gm3411871190
Gm3411871190
 
Modified LAEEBA Routing in WBAN
Modified LAEEBA Routing in WBANModified LAEEBA Routing in WBAN
Modified LAEEBA Routing in WBAN
 
Wireless sensor networks dcs
Wireless sensor networks dcsWireless sensor networks dcs
Wireless sensor networks dcs
 
WSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.pptWSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.ppt
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...
 

More from Mshari Alabdulkarim

Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...Mshari Alabdulkarim
 
Generate and test random numbers
Generate and test random numbersGenerate and test random numbers
Generate and test random numbersMshari Alabdulkarim
 
Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...
Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...
Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...Mshari Alabdulkarim
 

More from Mshari Alabdulkarim (6)

Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...
 
Generate and test random numbers
Generate and test random numbersGenerate and test random numbers
Generate and test random numbers
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...
Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...
Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...
 
WPA2
WPA2WPA2
WPA2
 
CDMA
CDMACDMA
CDMA
 

Recently uploaded

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 

Recently uploaded (20)

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 

Energy Saving Techniques in Wireless Sensor Networks

  • 1. Power Saving in Wireless Sensor Networks Eng. MshariAlabdulkarim
  • 2.
  • 9.
  • 10. Energy Saving in WSNs Introduction Wireless Sensor Network? A wireless sensor network is a collection of nodes “sensors” organized into a cooperative network. The nodes communicate wirelessly and often self-organize after being deployed in an ad-hoc fashion. Base Station Detection Sensor Field
  • 11. Energy Saving in WSNs Introduction (Cont.) What are the components of the wireless sensor? Processor. Memory. RF transceiver. Power source. Sensor.
  • 12. Energy Saving in WSNs Introduction (Cont.) What is the goal of the sensor node? The goal from the sensor node is to collect the data at regular intervals, then transform the data into an electrical signal and finally send the signal to the sink or the base node.
  • 13. Energy Saving in WSNs Introduction (Cont.)
  • 14.
  • 15. Energy Saving in WSNs Introduction (Cont.) Wireless Sensor Network Example (1):
  • 16. Energy Saving in WSNs Introduction (Cont.) Wireless Sensor Network Example (2):
  • 17. Energy Saving in WSNs Introduction (Cont.) Short Video
  • 18. Energy Saving in WSNs Power Consumption in WSNs The power issue in the wireless sensor network is one of the biggest challenges, because the sensor has a limited source of power which is also hard to replace or recharge “e.g. sensors in the battle field, sensors in a large forest … etc”. Why limited source of power? Inexpensive nature. Limited size and weight. Redundant nature.
  • 19.
  • 21.
  • 22. Retransmitting because of collisions “e.g. two packets arrived at the same time at the same sensor”.
  • 23. Overhearing “when a sensor received a packet doesn’t belong to it”.
  • 24. Generating and handling control packets.
  • 25.
  • 28.
  • 29. Energy Saving in WSNs Power consumption model: Time Wake Wake Sleep Sleep Sleep Sleep and Wake Duty Cycle
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. Allow each node in the WSN to set its own sleep/wake schedule independently.
  • 37.
  • 38. Energy Saving in WSNs S-MAC Protocol: Stand for: Sensors Medium Access Control. Strategy: All node follow a periodic sleep/wake cycle, where the waking time is about 10% of the sleeping time, and the nodes that are close to each other synchronize their active cycles together. Listen Listen Sleep Sleep Time T
  • 39.
  • 42.
  • 43. Energy Saving in WSNs Questions? What S-MAC, T-MAC, B-MAC are doing? Trying to minimize idle listen as mush as possible. Why radio should listen the channel? To minimize collisions. How can we make collision free without listen the channel? TDMA “Time Division Multiple Access”.
  • 44. Energy Saving in WSNs In-network Processing After the sensors detect phenomena or change, they generate an event to the user and by that we will have a huge number of transmissions which will consume the power of the sensors. Strategy: Reduce the number of transmissions by aggregating several eventsinto a single event. Aggregation takes place if the data arriving to the common node have same attributes of the phenomenon being sensed.
  • 45.
  • 46.
  • 47.
  • 48. Energy Saving in WSNs Communication Protocol The goal from adjusting the communication protocol “Medium Access Control” is to avoid the collisions by scheduling nodes onto different sub-channels that are divided either by time “TDMA”, frequency “FDMA” or orthogonal codes “CDMA”.
  • 49. Energy Saving in WSNs Scheduled Protocol: Strategy: Prevent the collisions by reserving and scheduling the resources. Example: The best protocol considered as scheduled protocol is the TDMA “Time Division Multiple Access”, where the time is divided into N slots and each slot can be used by only one sensor. Frame 1 Frame 2 1 2 3 N 1 2 3 N Time TDMA MAC Protocol
  • 50.
  • 51. Saving the power from being wasted by turning off the radio out the allocated time slot.
  • 52.
  • 53.
  • 55.