SlideShare a Scribd company logo
1 of 24
1
Wireless Sensor Network
Lifetime Constraints
Musaab M. Jasim
Yildiz university
Computer department
2
Outline
 Introduction of WSN.
 Generic energy consumption of WSN .
 WSN Deployments
 Deterministic deployment .
 Random deployment .
 WSN Routing Protocols
 WSN Routing Strategies .
 Routing Protocols in WSNs.
 Energy- Efficient Routing Protocol Algorithms
 LEACH (Low Energy Adaptive Clustering Hierarchy).
 DECSA (Distance-Energy Cluster Structure Algorithm).
 Conclusion .
3
Introduction of WSN
Introduction of WSN
The convergence of the Internet, communications, and information technologies,
coupled with recent engineering advances, is paving the way for a new generation
of inexpensive sensors and actuators, capable of achieving a high order of spatial
and temporal resolution and accuracy and this generation of devices led to widely
distribution of the Wireless Sensor Network (WSN) in recent years . WSNs have
become a subject of interest for many different applications .
A wireless sensor network is an infrastructure comprised of large numbers of nodes
which involve sensing (measuring), computing, and communication elements that
gives an administrator the ability to instrument, observe, react to events and
phenomena in a specified environment where these nodes are deployed. These
nodes fall in two types
(1) sensor node which gather the sensing data and direct it to
(2) sink node which be interested for this data .
4
Introduction of WSN
the both types of nodes are limited in their power resources because it usually run
on batteries and this imposes a hard limit on the lifespan of a WSN especially for
large-scale WSNs when it integrate with other networks .
To maximize the lifetime of WSN , we need to comprehend some important aspects
,such as : how the power of nodes is consumed in general form , what the influence
of the nodes deployment ways on the node's power is , and the major role of
routing protocol on manage the WSNs and minimize the energy consumption.
5
6
Generic energy consumption
of WSN
Generic energy consumption of WSN.
 The major energy consumption of a node (usually in free rectangular area)
includes the energy which is consumed for:
1. message reception .
2. message transmission .
3. event sensing.
 The energy for event sensing is generally linearly proportional to the time period
of operation and is assumed to be
 The energy for message reception depends only on the number of received
messages.
 the energy dissipation for transmitting a message to a receiver with a distance
(d) away being
 the energy dissipation for receiving a message is
7
is the average power consumption.
is a time interval.
L(d) denotes the propagation loss in DB
L(d0)
the propagation loss at a reference
distance
Β
k
the path loss exponent
sensing message bits
Eelec energy consumption by the
electronic circuit
8
WSN Deployments
WSN Deployments
 Deployment is application dependent process which concerned with
setting up an operational sensor network in a real-world environment to
provide completely area coverage with different levels of nodes density
and take into account that each sensor has a probability (P) to be active
and it can be cover a circular region centered at itself with radius (r) ,
There are two major sorts of deployment are distinguished in WSNs :
1. Deterministic deployment the deployment method in which the nodes of WSN are
distributed in a structured way by putting them in pre-planned positions. There are
many models of this deployment such as :
9
B- Grid-based deployment
A- Linear-based deployment .
 Square Grid
WSN Deployments
10
B- Grid-based deployment
 Equilateral Triangle grid
Deployment
 Tri-Hexagon Tiling (THT).
2. Random deployment The deployment methods in which the nodes of WSN are
randomly distributed over the desired area by, e.g., dropping them out of an
helicopter as in the volcano monitoring system or in a hostile environment .
It may be a one-time activity where the installation and use of a sensor network are
strictly separate actions. Or, it may be a continuous process, with more nodes being
deployed at any time during the use of the network . there two types of random
deployment :
WSN Deployments
11
Random deployment types
II. Non-uniform random deploymentI. Uniform random deployment
• It deployment of WSN nodes in different
density level over the entire sensing
area ,where all nodes in the network
are homogeneous with the same
available energy .
• It attempts to balance the
communication load of each sub-region.
• It is considered as the solution of the
“Energy Holes problem” , where
nodes are deployed with a high density
on a location with high energy
consumption, whereas, a low density
for a location with low energy
consumption .
• It is deployment of WSN nodes in
randomly fashion with the same
density over the entire sensing area,
where all nodes are homogeneous with
the same available energy .
• It can achieve the best network
sensing coverage in the initial phase.
• It suffers from the “Energy Holes
problem” , where nodes located at an
area with high energy consumption will
run out of available energy and die off
quickly .
WSN Deployments
12
Models
Non-uniform random deployment
Rectangle model
Uniform random deployment
Coronas Model
where the desired sensing area is assumed
to be a rectangle with length L and width W,
i.e. the area is A = L × W. and the data sink is
assumed to be beside an edge of the
sensing area as base-station, and the sensor
node deploy in non-uniform random way with
sensing radius is R and available sensing
area is πR2.
A message transmitted from corona Ci is
forwarded by sensor nodes in coronas Ci−1,
Ci−2, and so on until it reaches corona C1
from where it is transmitted to the sink which
reside in the center. Corona width is chosen
such that a message is forwarded by only
one sensor in each corona.
13
WSN Routing Protocols
WSN Routing Protocols
Routing protocols in WSN
 It play a major role in managing the network , since the different data
forwarding mechanisms lead to different amount and different distribution of
energy consumption in WSN. So, the good choice of routing protocol for
the certain types of deployment under particular radio features plays the
main role in saving the nodes power , thus maximize of the WSN
lifespan
 The routing protocol in WSN has extra tasks in addition to its ordinary
tasks to provide shortest path between source and destination , as shown
below :
1. minimizing energy consumed per packet .
2. maximize time to network partition .
3. minimizing variance in node power levels .
4. minimizing maximum node cost .
so , it are considered the substantial responsible about the network lifespan .
14
WSN Routing Protocols
WSN Routing Strategies
 At present , array of routing protocols for WSNs are existent, which use
different strategies to address one or more of the restrictions and the
most commonly utilized strategies are :
1. Flooding strategy: it means that every node which receives new
information will forward it to all its neighbors until it reaches its
destination ,such as: Temporally-Ordered Routing Algorithm(TORA).
2. Interest advertisement-request strategy: In this routing protocol
strategy the information is described by meta-data which initially is
exchanged between the nodes. Nodes which acquired new data
advertise it via its meta-data classification. Neighboring nodes which
have an interest in that kind of data reply with a request, achieves
a high energy efficiency compared to flooding strategy, such as:
Sensor Protocols for Information via Negotiation(SPIN).
3. Spatial Location Strategy: A third strategy routing found in WSN
routing protocols uses the knowledge about the spatial position of
sensor nodes to query the WSN in a localized way. If the
deployment of sensor nodes is known, queries for data can be
directed to the area of interest 15
WSN Routing Protocols
WSN Routing Protocol Types
 Routing protocols can be classified by several different ways and
considerations , it mat be classified based on “ how and when they
acquire routes in the network” to :
I. Reactive Protocols, Such as : Ad-hoc On-Demand Distance Vector
(AODV).
II. Proactive Protocols, Such as : Optimized Link State Routing
(OLSR).
Or may be based on the network structure to :
I. Flat-based routing protocols where each node plays the same role
and is typically assigned the same functionality.
II. Hierarchical-based routing protocols(also known as clustering-based
routing protocol) where the nodes have to self-organize themselves
into several local clusters, each of which has one node serving as
the cluster-head. A cluster-head collects all the messages in that
cluster and then forwards an aggregate message to a remote base
station (BS). the Low Energy Adaptive Clustering Hierarchy
protocol (LEACH) is considered one of the most common protocol
in this categorize . 16
17
Energy- Efficient Routing Protocol
Algorithms
Energy- Efficient Routing Protocol Algorithms
2. Location based routing protocols
It needs some location information of the sensor nodes. Location
information can be obtained from GPS (Global Positioning System)
signals, received radio signal strength, etc. Using location information,
an optimal path can be formed without using flooding techniques.
3. Hierarchical routing protocols
It is used to perform energy efficient routing, i.e., higher energy nodes
can be used to process and send the information; low energy nodes
are used to perform the sensing in the area of interest. e.g. LEACH,
TEEN, APTEEN.
18
Energy-
efficient
routing
protocol
algorithms
Data centric Location
based
Hierarchical
1. Data centric protocols
it are query based and they
depend on the naming of the
desired data.
 Energy efficient routing algorithm can be categorized as show in the
diagram below :
Energy- Efficient Routing Protocol Algorithms
In this presentation we will address to two types of these algorithms
1. LEACH (Low Energy Adaptive Clustering Hierarchy)
It is hierarchical clustering algorithm which arranges the nodes in the
network into small clusters and chooses one of them as the cluster-head.
Node first senses its target and then sends the relevant information to its
cluster-head. Then the cluster head aggregates and compresses the
information received from all the nodes and sends it to the base station.
Because The nodes chosen as the cluster head drain out more energy as
compared to the other nodes as it is required to send data to the base
station which may be far located.
19
So, LEACH uses random rotation of the
nodes required to be the cluster-heads
to evenly distribute energy consumption
in the network
Its operations can be divided into two
phases:-
i. Setup phase .
ii. Steady phase .
20
LEACH ‘s phases algorithms
Steady phaseSet up phase
Energy- Efficient Routing Protocol Algorithms
Energy- Efficient Routing Protocol Algorithms
 DECSA (Distance-Energy Cluster Structure Algorithm)
It is hierarchical routing algorithm based on the same concepts of the
classic clustering routing algorithm LEACH and it is considered an improved
version of LEACH. The WSN structure under this algorithm is divided in
three hierarchal level , which divides the nodes into four categories: Base
Station(BS) , Base Station Cluster head(BCH), ordinary cluster head
node (CH), and common sensor node (SN). As shown in figure below
21
The DECSA algorithm is a distributed
competitive unequal clustering algorithm,
it considers both the distance and
residual energy information of nodes.
Its operations can be divided into two
stages :-
i. Initialization stage.
ii. Stable working stage
And to minimize energy consumption,the
stable working stage should be greatly
longer than the initialization stage.
So if we compare the “LEACH” with “DECSA”
We will realize that “LEACH” :
1. It does not consider the location of sensor nodes, and the selection of cluster
head nodes is random, causing the uneven distribution of cluster head nodes
That is, the cluster-heads can concentrate a specific area within the network.
2. It cannot guarantee a good cluster-head distribution .
3. It is not good for unbalanced-energy network and it leads to the early death
of some nodes in this network because it does not consider the residual
energy of nodes where its algorithm supposes the initial energy of all nodes
are same, and the energy consumption of becoming cluster head node are
basically the same in the first cluster head election.
while the “DECSA”
1. It improves the process of cluster head selecting and the process of cluster
forming.
2. It reduces the adverse effect on the energy consumption of the cluster head,
resulting from the non-uniform distribution of nodes in network
3. It avoided the direct communication between the Base Sensor and cluster
head, which has low energy and far away from Base Sensor.
thus it effectively balances the energy consumption and prolongs of the WSN
lifetime . 22
Energy- Efficient Routing Protocol Algorithms
we addressed the WSN lifetime and we realized that the lifespan of WSN is
affected by many reasons such as nodes deployment manner , the energy
of transceiver and the amount of overheads signals which are forwarded
via network , and we realized the "Energy Hole" problem and we
comprehend the solutions of it . and infer that the different data forwarding
mechanisms lead to different amount of and different distribution of energy
consumption , thus the good choice of routing protocol for the certain types
of deployment under particular radio features plays the main role in saving
the nodes power , thus maximize of the WSN lifespan and this make the
routing protocol is the major engine of the saving energy in the WSN . then
we addressed the WSN routing protocol types and understand its
mechanisms and its influences on the WSN lifetime , then study the
LEACH and DECSA efficient-energy clustering routing algorithms and we
concluded the DECSA has a better performance than the original LEACH
protocol.
23
Conclusion
At the end , I want to thank
Associated Prof. Dr. Ali Gökhan Yavuz
for your help and support
And say
“ thank you to all attendees “
Teşekkür Ederim
24

More Related Content

What's hot

GSM Network - Distributed Service Model
GSM Network - Distributed Service ModelGSM Network - Distributed Service Model
GSM Network - Distributed Service Model
Reni Sagayaraj
 
WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)
Sajid Marwat
 
Gsm presentation shaikot
Gsm presentation shaikotGsm presentation shaikot
Gsm presentation shaikot
sivakumar D
 

What's hot (20)

GSM Network - Distributed Service Model
GSM Network - Distributed Service ModelGSM Network - Distributed Service Model
GSM Network - Distributed Service Model
 
Basics of DWDM Technology
Basics of DWDM TechnologyBasics of DWDM Technology
Basics of DWDM Technology
 
Introduction to Evolved Packet Core Networks
Introduction to Evolved Packet Core NetworksIntroduction to Evolved Packet Core Networks
Introduction to Evolved Packet Core Networks
 
Mpls L3_vpn
Mpls L3_vpnMpls L3_vpn
Mpls L3_vpn
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
Sigtran Workshop
Sigtran WorkshopSigtran Workshop
Sigtran Workshop
 
OTN for Beginners
OTN for BeginnersOTN for Beginners
OTN for Beginners
 
WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
MPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicMPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - Basic
 
Gsm presentation shaikot
Gsm presentation shaikotGsm presentation shaikot
Gsm presentation shaikot
 
Signaling system 7
Signaling system 7 Signaling system 7
Signaling system 7
 
MPLS VPN
MPLS VPNMPLS VPN
MPLS VPN
 
Tcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerTcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication header
 
SDH Frame Structure
SDH Frame StructureSDH Frame Structure
SDH Frame Structure
 
IMS-PSTN Interworking Flow
IMS-PSTN Interworking FlowIMS-PSTN Interworking Flow
IMS-PSTN Interworking Flow
 
MPLS & BASIC LDP
MPLS & BASIC LDPMPLS & BASIC LDP
MPLS & BASIC LDP
 
LTE - Long Term Evolution
LTE - Long Term EvolutionLTE - Long Term Evolution
LTE - Long Term Evolution
 
OFDM Basics
OFDM BasicsOFDM Basics
OFDM Basics
 
VoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack Explained
 

Viewers also liked

wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
Eisha Madhwal
 
Kablosuz Sensör Ağlarda Konumlandırma - Locatization in WSNs
Kablosuz Sensör Ağlarda Konumlandırma - Locatization in WSNsKablosuz Sensör Ağlarda Konumlandırma - Locatization in WSNs
Kablosuz Sensör Ağlarda Konumlandırma - Locatization in WSNs
Veysi Ertekin
 
GOAT: Development of a Wireless Sensor Network analysis tool
GOAT: Development of a Wireless Sensor Network analysis toolGOAT: Development of a Wireless Sensor Network analysis tool
GOAT: Development of a Wireless Sensor Network analysis tool
Sergio Barrachina Muñoz
 

Viewers also liked (20)

Wsn
WsnWsn
Wsn
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Aodv
AodvAodv
Aodv
 
Mitigating routing misbehavior in mobile ad hoc networks
Mitigating routing misbehavior in mobile ad hoc networks Mitigating routing misbehavior in mobile ad hoc networks
Mitigating routing misbehavior in mobile ad hoc networks
 
Energy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANETEnergy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANET
 
Wsn 08
Wsn 08Wsn 08
Wsn 08
 
Energy Efficient Wireless Internet Access
Energy Efficient Wireless Internet AccessEnergy Efficient Wireless Internet Access
Energy Efficient Wireless Internet Access
 
Mac
MacMac
Mac
 
Kablosuz Sensör Ağlarda Konumlandırma - Locatization in WSNs
Kablosuz Sensör Ağlarda Konumlandırma - Locatization in WSNsKablosuz Sensör Ağlarda Konumlandırma - Locatization in WSNs
Kablosuz Sensör Ağlarda Konumlandırma - Locatization in WSNs
 
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...
Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...
 
Kablosuz sensör Ağlarda Konumlandırma (Locatization in WSNs)
Kablosuz sensör Ağlarda Konumlandırma (Locatization in WSNs)Kablosuz sensör Ağlarda Konumlandırma (Locatization in WSNs)
Kablosuz sensör Ağlarda Konumlandırma (Locatization in WSNs)
 
Problématique de l'énergie pour les réseaux de capteurs isolés Dominique Jute...
Problématique de l'énergie pour les réseaux de capteurs isolés Dominique Jute...Problématique de l'énergie pour les réseaux de capteurs isolés Dominique Jute...
Problématique de l'énergie pour les réseaux de capteurs isolés Dominique Jute...
 
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
 
GOAT: Development of a Wireless Sensor Network analysis tool
GOAT: Development of a Wireless Sensor Network analysis toolGOAT: Development of a Wireless Sensor Network analysis tool
GOAT: Development of a Wireless Sensor Network analysis tool
 
Issues of Wireless Sensor Networks
Issues of Wireless Sensor NetworksIssues of Wireless Sensor Networks
Issues of Wireless Sensor Networks
 
An Energy Efficient Protocol To Increase Network Life In WSN
An Energy Efficient Protocol To Increase Network Life In WSNAn Energy Efficient Protocol To Increase Network Life In WSN
An Energy Efficient Protocol To Increase Network Life In WSN
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networks
 
Realization Of Energy Harvesting Wireless Sensor Network (Eh Wsn) With Spec...
Realization Of Energy Harvesting Wireless Sensor Network (Eh Wsn)   With Spec...Realization Of Energy Harvesting Wireless Sensor Network (Eh Wsn)   With Spec...
Realization Of Energy Harvesting Wireless Sensor Network (Eh Wsn) With Spec...
 
Abitseminar
AbitseminarAbitseminar
Abitseminar
 
Energy efficient routing protocol
Energy efficient routing protocolEnergy efficient routing protocol
Energy efficient routing protocol
 

Similar to Wireless sensor network lifetime constraints

Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...
IJMER
 

Similar to Wireless sensor network lifetime constraints (20)

Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing Protocol
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
 
Fuzzy based clustering and energy efficient
Fuzzy based clustering and energy efficientFuzzy based clustering and energy efficient
Fuzzy based clustering and energy efficient
 
Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...Application of Weighted Centroid Approach in Base Station Localization for Mi...
Application of Weighted Centroid Approach in Base Station Localization for Mi...
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
 
Ijetr021229
Ijetr021229Ijetr021229
Ijetr021229
 
Ijetr021229
Ijetr021229Ijetr021229
Ijetr021229
 
A Review On Reactive And Proactive Wireless Sensor Networks Protocols
A Review On Reactive And Proactive Wireless Sensor Networks ProtocolsA Review On Reactive And Proactive Wireless Sensor Networks Protocols
A Review On Reactive And Proactive Wireless Sensor Networks Protocols
 
Jm2416491652
Jm2416491652Jm2416491652
Jm2416491652
 
Multiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networksMultiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networks
 
G017344246
G017344246G017344246
G017344246
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
 
2 ijcse-01208
2 ijcse-012082 ijcse-01208
2 ijcse-01208
 
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
 

More from mmjalbiaty (7)

Mathematics and applications of the Hartley and Fourier Transforms
Mathematics and applications of the Hartley and Fourier TransformsMathematics and applications of the Hartley and Fourier Transforms
Mathematics and applications of the Hartley and Fourier Transforms
 
Image Interpolation Techniques with Optical and Digital Zoom Concepts
Image Interpolation Techniques with Optical and Digital Zoom ConceptsImage Interpolation Techniques with Optical and Digital Zoom Concepts
Image Interpolation Techniques with Optical and Digital Zoom Concepts
 
Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...
Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...
Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...
 
Bicubic interpolation codes
Bicubic interpolation codesBicubic interpolation codes
Bicubic interpolation codes
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraints
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
 
Ivr system
Ivr systemIvr system
Ivr system
 

Recently uploaded

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 

Recently uploaded (20)

PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 

Wireless sensor network lifetime constraints

  • 1. 1 Wireless Sensor Network Lifetime Constraints Musaab M. Jasim Yildiz university Computer department
  • 2. 2 Outline  Introduction of WSN.  Generic energy consumption of WSN .  WSN Deployments  Deterministic deployment .  Random deployment .  WSN Routing Protocols  WSN Routing Strategies .  Routing Protocols in WSNs.  Energy- Efficient Routing Protocol Algorithms  LEACH (Low Energy Adaptive Clustering Hierarchy).  DECSA (Distance-Energy Cluster Structure Algorithm).  Conclusion .
  • 4. Introduction of WSN The convergence of the Internet, communications, and information technologies, coupled with recent engineering advances, is paving the way for a new generation of inexpensive sensors and actuators, capable of achieving a high order of spatial and temporal resolution and accuracy and this generation of devices led to widely distribution of the Wireless Sensor Network (WSN) in recent years . WSNs have become a subject of interest for many different applications . A wireless sensor network is an infrastructure comprised of large numbers of nodes which involve sensing (measuring), computing, and communication elements that gives an administrator the ability to instrument, observe, react to events and phenomena in a specified environment where these nodes are deployed. These nodes fall in two types (1) sensor node which gather the sensing data and direct it to (2) sink node which be interested for this data . 4
  • 5. Introduction of WSN the both types of nodes are limited in their power resources because it usually run on batteries and this imposes a hard limit on the lifespan of a WSN especially for large-scale WSNs when it integrate with other networks . To maximize the lifetime of WSN , we need to comprehend some important aspects ,such as : how the power of nodes is consumed in general form , what the influence of the nodes deployment ways on the node's power is , and the major role of routing protocol on manage the WSNs and minimize the energy consumption. 5
  • 7. Generic energy consumption of WSN.  The major energy consumption of a node (usually in free rectangular area) includes the energy which is consumed for: 1. message reception . 2. message transmission . 3. event sensing.  The energy for event sensing is generally linearly proportional to the time period of operation and is assumed to be  The energy for message reception depends only on the number of received messages.  the energy dissipation for transmitting a message to a receiver with a distance (d) away being  the energy dissipation for receiving a message is 7 is the average power consumption. is a time interval. L(d) denotes the propagation loss in DB L(d0) the propagation loss at a reference distance Β k the path loss exponent sensing message bits Eelec energy consumption by the electronic circuit
  • 9. WSN Deployments  Deployment is application dependent process which concerned with setting up an operational sensor network in a real-world environment to provide completely area coverage with different levels of nodes density and take into account that each sensor has a probability (P) to be active and it can be cover a circular region centered at itself with radius (r) , There are two major sorts of deployment are distinguished in WSNs : 1. Deterministic deployment the deployment method in which the nodes of WSN are distributed in a structured way by putting them in pre-planned positions. There are many models of this deployment such as : 9 B- Grid-based deployment A- Linear-based deployment .  Square Grid
  • 10. WSN Deployments 10 B- Grid-based deployment  Equilateral Triangle grid Deployment  Tri-Hexagon Tiling (THT). 2. Random deployment The deployment methods in which the nodes of WSN are randomly distributed over the desired area by, e.g., dropping them out of an helicopter as in the volcano monitoring system or in a hostile environment . It may be a one-time activity where the installation and use of a sensor network are strictly separate actions. Or, it may be a continuous process, with more nodes being deployed at any time during the use of the network . there two types of random deployment :
  • 11. WSN Deployments 11 Random deployment types II. Non-uniform random deploymentI. Uniform random deployment • It deployment of WSN nodes in different density level over the entire sensing area ,where all nodes in the network are homogeneous with the same available energy . • It attempts to balance the communication load of each sub-region. • It is considered as the solution of the “Energy Holes problem” , where nodes are deployed with a high density on a location with high energy consumption, whereas, a low density for a location with low energy consumption . • It is deployment of WSN nodes in randomly fashion with the same density over the entire sensing area, where all nodes are homogeneous with the same available energy . • It can achieve the best network sensing coverage in the initial phase. • It suffers from the “Energy Holes problem” , where nodes located at an area with high energy consumption will run out of available energy and die off quickly .
  • 12. WSN Deployments 12 Models Non-uniform random deployment Rectangle model Uniform random deployment Coronas Model where the desired sensing area is assumed to be a rectangle with length L and width W, i.e. the area is A = L × W. and the data sink is assumed to be beside an edge of the sensing area as base-station, and the sensor node deploy in non-uniform random way with sensing radius is R and available sensing area is πR2. A message transmitted from corona Ci is forwarded by sensor nodes in coronas Ci−1, Ci−2, and so on until it reaches corona C1 from where it is transmitted to the sink which reside in the center. Corona width is chosen such that a message is forwarded by only one sensor in each corona.
  • 14. WSN Routing Protocols Routing protocols in WSN  It play a major role in managing the network , since the different data forwarding mechanisms lead to different amount and different distribution of energy consumption in WSN. So, the good choice of routing protocol for the certain types of deployment under particular radio features plays the main role in saving the nodes power , thus maximize of the WSN lifespan  The routing protocol in WSN has extra tasks in addition to its ordinary tasks to provide shortest path between source and destination , as shown below : 1. minimizing energy consumed per packet . 2. maximize time to network partition . 3. minimizing variance in node power levels . 4. minimizing maximum node cost . so , it are considered the substantial responsible about the network lifespan . 14
  • 15. WSN Routing Protocols WSN Routing Strategies  At present , array of routing protocols for WSNs are existent, which use different strategies to address one or more of the restrictions and the most commonly utilized strategies are : 1. Flooding strategy: it means that every node which receives new information will forward it to all its neighbors until it reaches its destination ,such as: Temporally-Ordered Routing Algorithm(TORA). 2. Interest advertisement-request strategy: In this routing protocol strategy the information is described by meta-data which initially is exchanged between the nodes. Nodes which acquired new data advertise it via its meta-data classification. Neighboring nodes which have an interest in that kind of data reply with a request, achieves a high energy efficiency compared to flooding strategy, such as: Sensor Protocols for Information via Negotiation(SPIN). 3. Spatial Location Strategy: A third strategy routing found in WSN routing protocols uses the knowledge about the spatial position of sensor nodes to query the WSN in a localized way. If the deployment of sensor nodes is known, queries for data can be directed to the area of interest 15
  • 16. WSN Routing Protocols WSN Routing Protocol Types  Routing protocols can be classified by several different ways and considerations , it mat be classified based on “ how and when they acquire routes in the network” to : I. Reactive Protocols, Such as : Ad-hoc On-Demand Distance Vector (AODV). II. Proactive Protocols, Such as : Optimized Link State Routing (OLSR). Or may be based on the network structure to : I. Flat-based routing protocols where each node plays the same role and is typically assigned the same functionality. II. Hierarchical-based routing protocols(also known as clustering-based routing protocol) where the nodes have to self-organize themselves into several local clusters, each of which has one node serving as the cluster-head. A cluster-head collects all the messages in that cluster and then forwards an aggregate message to a remote base station (BS). the Low Energy Adaptive Clustering Hierarchy protocol (LEACH) is considered one of the most common protocol in this categorize . 16
  • 17. 17 Energy- Efficient Routing Protocol Algorithms
  • 18. Energy- Efficient Routing Protocol Algorithms 2. Location based routing protocols It needs some location information of the sensor nodes. Location information can be obtained from GPS (Global Positioning System) signals, received radio signal strength, etc. Using location information, an optimal path can be formed without using flooding techniques. 3. Hierarchical routing protocols It is used to perform energy efficient routing, i.e., higher energy nodes can be used to process and send the information; low energy nodes are used to perform the sensing in the area of interest. e.g. LEACH, TEEN, APTEEN. 18 Energy- efficient routing protocol algorithms Data centric Location based Hierarchical 1. Data centric protocols it are query based and they depend on the naming of the desired data.  Energy efficient routing algorithm can be categorized as show in the diagram below :
  • 19. Energy- Efficient Routing Protocol Algorithms In this presentation we will address to two types of these algorithms 1. LEACH (Low Energy Adaptive Clustering Hierarchy) It is hierarchical clustering algorithm which arranges the nodes in the network into small clusters and chooses one of them as the cluster-head. Node first senses its target and then sends the relevant information to its cluster-head. Then the cluster head aggregates and compresses the information received from all the nodes and sends it to the base station. Because The nodes chosen as the cluster head drain out more energy as compared to the other nodes as it is required to send data to the base station which may be far located. 19 So, LEACH uses random rotation of the nodes required to be the cluster-heads to evenly distribute energy consumption in the network Its operations can be divided into two phases:- i. Setup phase . ii. Steady phase .
  • 20. 20 LEACH ‘s phases algorithms Steady phaseSet up phase Energy- Efficient Routing Protocol Algorithms
  • 21. Energy- Efficient Routing Protocol Algorithms  DECSA (Distance-Energy Cluster Structure Algorithm) It is hierarchical routing algorithm based on the same concepts of the classic clustering routing algorithm LEACH and it is considered an improved version of LEACH. The WSN structure under this algorithm is divided in three hierarchal level , which divides the nodes into four categories: Base Station(BS) , Base Station Cluster head(BCH), ordinary cluster head node (CH), and common sensor node (SN). As shown in figure below 21 The DECSA algorithm is a distributed competitive unequal clustering algorithm, it considers both the distance and residual energy information of nodes. Its operations can be divided into two stages :- i. Initialization stage. ii. Stable working stage And to minimize energy consumption,the stable working stage should be greatly longer than the initialization stage.
  • 22. So if we compare the “LEACH” with “DECSA” We will realize that “LEACH” : 1. It does not consider the location of sensor nodes, and the selection of cluster head nodes is random, causing the uneven distribution of cluster head nodes That is, the cluster-heads can concentrate a specific area within the network. 2. It cannot guarantee a good cluster-head distribution . 3. It is not good for unbalanced-energy network and it leads to the early death of some nodes in this network because it does not consider the residual energy of nodes where its algorithm supposes the initial energy of all nodes are same, and the energy consumption of becoming cluster head node are basically the same in the first cluster head election. while the “DECSA” 1. It improves the process of cluster head selecting and the process of cluster forming. 2. It reduces the adverse effect on the energy consumption of the cluster head, resulting from the non-uniform distribution of nodes in network 3. It avoided the direct communication between the Base Sensor and cluster head, which has low energy and far away from Base Sensor. thus it effectively balances the energy consumption and prolongs of the WSN lifetime . 22 Energy- Efficient Routing Protocol Algorithms
  • 23. we addressed the WSN lifetime and we realized that the lifespan of WSN is affected by many reasons such as nodes deployment manner , the energy of transceiver and the amount of overheads signals which are forwarded via network , and we realized the "Energy Hole" problem and we comprehend the solutions of it . and infer that the different data forwarding mechanisms lead to different amount of and different distribution of energy consumption , thus the good choice of routing protocol for the certain types of deployment under particular radio features plays the main role in saving the nodes power , thus maximize of the WSN lifespan and this make the routing protocol is the major engine of the saving energy in the WSN . then we addressed the WSN routing protocol types and understand its mechanisms and its influences on the WSN lifetime , then study the LEACH and DECSA efficient-energy clustering routing algorithms and we concluded the DECSA has a better performance than the original LEACH protocol. 23 Conclusion
  • 24. At the end , I want to thank Associated Prof. Dr. Ali Gökhan Yavuz for your help and support And say “ thank you to all attendees “ Teşekkür Ederim 24