Computer Technos

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, 16 October 2011

Self-Organized Networks

Posted on 10:42 by Unknown
The physical layer of a WSN is nothing new: radio-frequency transmission at unlicensed bands. LOS is not required. The data-link layer monitors the channels and transmits frames only when the channel is idle. The network layer and transport layer require more discussion. Like ad hoc networks, the routing paths between each two nodes cannot be determined and configured prior to deployment because there is no predefined fixed infrastructure in WSNs. Sensor nodes have to discover multihop routes to relevant nodes themselves. This is often done via routing data dissemination, in which packets that contain the transmitter and the distance to the root are flooded in the network. A sensor node, upon receiving such packets, will be able to find a “ parent ” who is closer to the root; hence, a distribution tree can be generated. Data collection from sensor nodes can be routed back to the root following the distribution tree.

Task or query dissemination throughout a sensor network is data-centric in association with data aggregation, a routing scheme known as directed diffusion. Sensor nodes are not addressed uniformly using numeric identifications; instead, the addressing and naming schemes are correlated with the application. They are identified by “ attribute – value ” pairs in their data. A task in the form of some attribute inquiry is sent out from some nodes in the hope of obtaining relevant data from other nodes, and then all participating nodes form a routing gradient toward the originators. In the case where a WSN is used as a platform of the sensory database, the applications and underlying routing schemes must support declarative queries, thereby making the detail of in-network query processing and optimization transparent to the user. Power consumption is another crucial factor when it comes to in-network aggregation support of query processing. Sophisticated power-aware query processing and packet routing schemes have been devised to reduce the overall power consumption of a WSN.

Sensory data delivery can be performed in several ways. Sensor node can actively report readings periodically to its parent or only report when an event occurs. The delivery procedure can also be initiated by a user issuing a command that is diffused across the network. Depending on the design objectives, a WSN may apply different data delivery models to different sensor nodes. For example, some high-level roots in the distribution tree may employ a request-and-response mechanism for queries, whereas some low-level sensor nodes may simply report data continuously.

Compared with mobile ad hoc network, network communication over WSNs imposes additional constraints other than node mobility and power consumption. Sensors node are more prone to failure, and their computational capability and memory capacity are greatly limited. When designing a protocol stack of a WSN, these constraints have to be taken into account. Specifically, because complete raw data forwarding is not necessary in many circumstances, data aggregation may be conducted at various levels of the distribution tree to reduce the amount of data being transferred upward to the gateway while still providing sufficient information to other nodes. Furthermore, data aggregation can be combined with applications of the WSN to further improve the efficiency of data collection and dissemination schemes. This reflects one of the most important characteristics of WSNs: cross-layer design. The well-known sensor operating system is TinyOS, which is an open-source, event-based embedded operating system developed at the University of California, Berkeley. TinyOS provides a set of components for networking, memory management, and power management, as well as data acquisition and query processing tools. The programming language supported by TinyOS is nesC, a C-like language for embedded network system development.

Source of Information : Elsevier Wireless Networking Complete 2010
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Wireless | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Windows 7 Shortcut Keys
    Longtime users of Windows have probably grown accustomed to navigating around the Windows user interface using the keyboard. This especially...
  • Windows on Mac: Virtualization Solutions
    If you’d prefer to join the ever-increasing ranks of Mac switchers—you traitor, you—you can still run Windows and, more important, Windows a...
  • Customizing Library Folders in Windows 7
    In your library folders, you can customize view options based on the contents. In the toolbar of the Pictures and Music library folders, Win...
  • Windows 7 BitLocker Drive Encryption
    In Windows Vista, you had the BitLocker Drive Encryption feature that allowed you to encrypt the content of entire volumes. In Windows 7, Mi...
  • Using Windows 7’s Performance Options
    While all the performance tools are available individually throughout the system, Windows 7 introduces a nice list of available tools, if yo...
  • Windows 7 - Installing and Configuring a Printer
    If your printer is already installed and operational at this point, you can skip this section and skim ahead for others that may be of inter...
  • Considering Centralized versus Group Sharing
    One of the most important preparation steps for your server is determining how to store the data you create. The two common methods are cent...
  • Berkeley Motes
    The Berkeley motes are a family of embedded sensor nodes sharing roughly the same architecture. Let us take the MICA mote as an example. The...
  • Using Windows 7 Ease of Access Tools
    If you have difficulty using a mouse or typing, have slightly impaired vision, or are deaf or hard of hearing, you can adjust the appearance...
  • Troubleshooting Boot and Startup Problems - Driver Loading in Safe Mode
    How does Windows know which device drivers and services are part of standard and networking-enabled safe mode? The answer lies in the HKLM\S...

Categories

  • Access 2010
  • BlackBerr
  • BlackBerry
  • Computer Science
  • Cyber Security
  • Exchange Server 2010
  • File Utilities
  • Foursquare
  • Google
  • Hardware
  • Internet
  • iPad
  • Linux
  • Lync Server
  • Microsoft Virtualization
  • Mobile Web
  • Networking
  • News
  • Security
  • Server Architectures
  • Smartphone
  • Ubuntu Linux
  • Windows
  • Windows 7
  • Windows Home Server
  • Windows Security
  • Windows Server 2008
  • Windows Server 2008 Hyper-V
  • Windows XP
  • Wireless

Blog Archive

  • ►  2012 (66)
    • ►  August (5)
    • ►  July (9)
    • ►  June (9)
    • ►  May (8)
    • ►  April (9)
    • ►  March (9)
    • ►  February (8)
    • ►  January (9)
  • ▼  2011 (85)
    • ►  December (5)
    • ►  November (6)
    • ▼  October (7)
      • Standardization in the Wireless World
      • ZigBee
      • Self-Organized Networks
      • Wireless Sensor Node
      • WSN Applications
      • Wireless Sensor Networks
      • Satellite
    • ►  September (8)
    • ►  August (9)
    • ►  July (9)
    • ►  June (7)
    • ►  May (7)
    • ►  April (4)
    • ►  March (6)
    • ►  February (8)
    • ►  January (9)
  • ►  2010 (230)
    • ►  December (13)
    • ►  November (3)
    • ►  October (2)
    • ►  September (10)
    • ►  August (31)
    • ►  July (32)
    • ►  June (23)
    • ►  May (2)
    • ►  April (21)
    • ►  March (32)
    • ►  February (28)
    • ►  January (33)
  • ►  2009 (119)
    • ►  December (33)
    • ►  November (31)
    • ►  October (35)
    • ►  September (20)
Powered by Blogger.

About Me

Unknown
View my complete profile