This survey presents most recent formation techniques and mechanisms for the WSNs. A key factor in this is the way the network is formed. In all cases for the design of any application, one of the main objectives is to keep the WSN alive and functional as long as possible. Despite the open problems in WSNs, there are already a high number of applications available. The wireless sensor network architecture is built with nodes that are used to observe the surroundings like temperature, humidity, Nowadays, wireless sensor networks (WSNs) emerge as an active research area in which challenging topics involve energy consumption, routing algorithms, selection of sensors location according to a given premise, robustness, efficiency, and so forth. Currently, WSN (Wireless Sensor Network) is the most standard services employed in commercial and industrial applications, because of its technical development in a processor, communication, and low-power usage of embedded computing devices.
Performance Modeling Of Receiver Initiated Protocol For Wireless Sensor Networks Series Of OpenIntroductionsimulation environment and analyzed the performance of RC-MAC and as well. Finally, the paper overviews a series of open issues which drive further research in the area. We focus on recent works and present a discussion of their advantages and drawbacks. The analysis is focused on whether a single or multiple sinks are employed, nodes are static or mobile, the formation is event detection based or not, and network backbone is formed or not.It all rest on the applications desires that which parameter is more favourite. Several applications give importance to throughput and they have not much to do with delay. Out of massive usage of wireless sensor networks, few applications demand quick data transfer including minimum possible interruption.A key factor in this is the way the network is formed. In all cases for the design of any application, one of the main objectives is to keep the WSN alive and functional as long as possible. Some application fields include tracking, monitoring, surveillance, building automation, military applications, and agriculture, among others.The survey is dedicated to recent works and presents a discussion of their advantages and drawbacks.This paper is organized as follows: Section 2 presents the WSN generalities and the way the reviewed works are classified according to several features. In the former, nodes are autonomous and the communication is only between neighboring nodes while, for the latter, the network formation is controlled by a single device.The analysis is focused on whether a single or multiple sinks are employed, nodes are static or mobile, the formation is event detection based or not, and network backbone is formed or not. In this paper, the reviewed research works are classified into distributed and centralized techniques. RI-MAC at-tempts to minimize the time a sender and its intended receiver oc-cupy the wireless medium to nd a rendezvous time for exchang-The design complexity of a WSN depends on the specific application requirements such as the number of nodes, the power consumption, the life span of the sensors, information to be sensed and its timing, geography of where the sensors are placed, the environment, and the context.Research ArticleA Receiver-Initiated MAC Protocol for Wireless SensorNetworks Based on Tree TopologyInhye Park, Joonhwan Yi, and Hyungkeun LeeDepartment of.This survey presents most recent formation techniques and mechanisms for the WSNs. This information is then forwarded to a leader node or to a base station known as sink.Wireless MAC protocols Carrier Sense Multiple Access Multiple Access with Collision Avoidance (MACA) and MACAW MACA By Invitation IEEE 802.11 IEEE 802.15.4 and ZigBee Characteristics of MAC Protocols in Sensor Networks Energy Efciency Scalability AdaptabilityMAC protocol, calledReceiver-Initiated MAC (RI-MAC), that uses receiver-initiated data transmission in order to efciently and ef-fectively operate over a wide range of trafc loads. The sensor information is usually collected through the available gateways in a given topology. Wireless Sensor NetworksWireless sensor networks (WSN) are composed of a finite set of sensor devices geographically distributed in a given indoor or outdoor environment (usually predefined). Section 6 depicts the advantages and disadvantages of the reviewed works finally, Section 7 presents the concluding remarks with a series of opened questions which drive further research in the area. Section 5 shows the commonly used standards and protocols for WSN. The logical topology is mainly defined based on the nodes logical role (tasks, etc.). However, this may not be the case for all applications. For instance, there can be a WSN with both types of topologies being the same (mesh, star, etc.). Network nodes can have actual or logical communication with all devices such a communication defines a topology according to the application. Zenmate vpn free download for macThe main advantages of this approach are as follows: (i) Centralized schemes allow more efficient energy management (see Section 5). It also forwards this data to a sink node (Figure 1). In such cases, this device is responsible for the processing, coordination, and management of the sensed information activities. The strategy is defined based on the network available resources.Centralized formation techniques are suitable for networks in which the processing power capacity relies mostly on a unique device. The main characteristics of distributed networks include the following: (i) There are autonomous devices. (iv) Context information availability allows a better application design (placement of nodes, application awareness, etc.).In Distributed formation techniques, the information is managed by each node and decisions are locally taken and limited to its neighborhood (single-hop neighbors). (iii) Network coverage analysis is simplified. A sensor network using this strategy is able to achieve an emergent behavior in which nodes interact individually and coordinate autonomously (Figure 2). The former have to assure the execution of specific tasks with comparable performance to the centralized solutions.One of the most important distributed techniques in recent years has been self-organization. (vi) Their flexibility allows targeting harsh environments.The complexity of the forwarding information process requires robust algorithms. (v) Interconnection devices (routers, bridges, etc.) are not required. (iii) It is suitable for distributed applications (multiagent systems, self-organized systems, etc.) (iv) The information is mainly forwarded to a single node. This central node is responsible for providing network operation services such as node localization, event detection, and traffic routing. Centralized Wireless Sensor NetworksCentralized networks take directions from a unique device. Examples of these techniques are found in nature (insect colonies, biological cells, the flock of birds, the foraging behavior of ants, etc.). ![]() A brief discussion of this type of networks is given below. The classes are Hierarchical Networks, Static Networks, and Defined Operational Networks. Recent research works suggest the use of auxiliary network devices these devices can be responsible for doing a specific activity inside the network such as knowing the complete environment to define a route, control of nodes movements, and definition of a target node, to improve the overall WSN application performance.A further classification can also be made according to the dynamics of the node roles. Each sensor node receives all messages directly through the sink node. They proposed a centralized technique to guarantee high mobility between sink nodes.Self-configuration is used to find the appropriate sink for the registration process there are some metrics used for choosing appropriate sink, how the information is gathering, and so on. It employs a multihop forwarding strategy and addresses the sensor the localization problem. This kind of networks is usually implemented using the 802.15.4 protocol.For instance, presents a multisink environment architecture (ICatchYou) based on the protocol 802.15.4. The network control is performed in a hierarchical way and is defined based on the roles. Traffic forwarding nodes have a lower precedence than fully functional nodes (sense, coordinate, process, and forward information). Besides, energy consumption or scalability is not taken into account. The technique can be applied to mobile scenarios, but an implementation is not reported in this paper. Their algorithms are inefficient because all nodes send broadcast messages and may cause a flooding of the network. The second scenario presents best results because nodes achieved a better performance with a higher distance.In this proposal, the authors do not present final results and they do not guarantee the full functionality of the sensor in the environment, although multihop offers some advantages and it is also easier to guarantee an efficient fast handover between sink nodes. Nodes are mobile the node movements are defined following a target.
0 Comments
Leave a Reply. |
AuthorChristina ArchivesCategories |