Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

440

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

ASSIGNMENT-2

WIRELESS SENSOR NETWORKS (20ECE417)


Name: L.Bindu Sree
ROLL NUMBER : 21691A0440
BRANCH & SECTION: ECE – A
1. Discuss Contention free protocol with example. How it is different
from contention-based protocol. Is TDMA a Contention free protocol?
Contention-Free Protocols
Concept:
 allow only one sensor node to access the channel at any given time
 thereby avoiding collisions and message retransmissions
 assuming a perfect medium and environment
 i.e., no other competing networks or misbehaving devices exist that could
otherwise cause collisions or even jam a channel
 Contention-free protocols allocate resources to individual nodes to ensure
exclusive resource access by only one node at any given time
 Exposes a number of desirable characteristics
 node knows exactly when it has to turn on its radio
 during all other times, radio can be turned off to preserve energy
 fixed slot allocations impose upper bounds on delay
 difficult to design schedules for large networks
 difficult to handle changes in topology, density, traffic load
Contention-free protocols are communication protocols that avoid collisions by
scheduling access to a shared communication medium in a coordinated manner. In
these protocols, devices are granted exclusive access to the medium, ensuring that no
two devices transmit simultaneously.
Important attributes:
1. Collision-Free Communication: Guaranteed because access is explicitly managed.
2. Deterministic Access: Devices know when they can transmit.
3. Efficient for Heavy Traffic: Perform better in high-load conditions since collisions
are avoided.
Contention-free protocols include, for example, Time Division Multiple Access
(TDMA):
 The communication channel is separated into time slots in TDMA.
 To prevent collisions, each device is given a distinct time slot for data transmission.
 For instance, cellular networks assign customers time periods for both downlink and
uplink communication.
Polling: To find out if a device has data to relay, a central controller asks each device
in turn.
 Token passing is when a token moves throughout the network and can only be
transmitted by the device that is holding it.
Example: TDMA (Time Division Multiple Access)
TDMA divides the communication channel into time slots. Each device is assigned a
specific slot for transmission, ensuring no overlap.
 Application: Cellular networks, satellite communication.
Contention-Based Protocols
Contention-based protocols, on the other hand, allow devices to transmit whenever
they need to, which may lead to collisions. Devices must have mechanisms to detect
and resolve collisions.
Key Features:
1. Non-Deterministic Access: Devices compete for access to the medium.
2. Collision Possible: Collisions can occur, requiring retransmission.
3. Efficient for Low Traffic: Perform well under low network load as there is minimal
overhead.
Example: CSMA/CD (Carrier Sense Multiple Access with Collision Detection)
 How It Works: Devices sense the medium before transmitting. If a collision occurs,
they wait for a random time and retry.
 Application: Ethernet.

Difference Between Contention-Free and Contention-Based Protocols:

Aspect Contention-Free Protocols Contention-Based Protocols


Access Scheduled, deterministic Random, competitive
Collision Handling No collisions Collisions detected and
resolved
Efficiency Better for high traffic Better for low traffic
Complexity Higher (requires scheduling) Lower (simpler mechanisms)
Examples TDMA, FDMA, Polling CSMA/CD, CSMA/CA
Is TDMA a Contention-Free Protocol?
Yes, TDMA is a contention-free protocol because it allocates fixed time slots to devices,
ensuring that only one device transmits at any given time, thus avoiding collisions
entirely.
TDMA is a protocol that does not include contention. By allocating time slots to devices,
TDMA prevents collisions and offers deterministic access to the medium by guaranteeing
that only one device transmits at a time during its given slot.
Consider a satellite communication system with three units using the same frequency as
an example of TDMA:
 Device A broadcasts during Time Slot 1.
 Device B broadcasts during Time Slot 2.
 Device C broadcasts during Time Slot 3.
This removes competition by guaranteeing that every device has sole access to the media
during its allotted time.
Q2) (i) Discuss various types of dissemination protocol for large sensor network.
(ii) Explain Table-driven (Proactive routing).
ANS:
(i) Types of Dissemination Protocols for Large Sensor Networks:
In sensor networks, dissemination methods guarantee effective data transfer, frequently
disseminating data to several network nodes from one or more sources. These protocols
fall under one of the following categories based on the application:
 Protocols for Data-Centric Distribution
Instead than using node identifiers to distribute data, these protocols use content,
including attribute-value pairs.
For instance:
 Directed Diffusion: Queries that define necessary data properties are used to
spread data.
 Metadata negotiation is used by SPIN (Sensor Protocols for Information by
Negotiation) to cut down on redundancy and save energy.
Use: Applicable when nodes require particular kinds of data rather than data from
particular nodes.
 Protocols for Hierarchical Dissemination:
These protocols effectively distribute data by using a hierarchical structure.
For instance:
 LEACH (Low Energy Adaptive Clustering Hierarchy): Information is sent
to the base station after being combined at cluster heads.
 Only when threshold conditions are satisfied does TEEN (Threshold-
sensitive Energy Efficient sensor network) send data.
Use: Ideal for applications where energy efficiency is crucial and there are a lot of nodes.
(ii) Table-Driven (Proactive) Routing:
Devices can always know the way to any destination thanks to table-driven or proactive
routing protocols, which keep routing tables for every node in the network up to date.
Important attributes:
 Routing Table Maintenance: Nodes keep track of all destination routes, which are
updated either on a regular basis or if the network topology shifts.
 Low Latency: Data packets are sent instantly since routes are already calculated.
 Increased Overhead: Especially in dynamic networks, frequent updates use energy
and bandwidth.
 Scalability Issues: Because of the size of routing tables and update overhead, this
solution is not appropriate for very large networks.
Proactive Routing Protocol Examples:
1. Destination-Sequenced Distance-Vector, or DSDV, avoids loops by using a distance
vector approach using sequence numbers.
2. Nodes broadcast their routing tables to their neighbours on a regular basis.
Link-state routing with wireless network optimisations is used by OLSR (Optimised
Link State Routing).
3. shares link-state data with specific neighbours on a regular basis.
Cluster head Gateway Switch Routing, or CGSR, groups nodes into clusters and
assigns cluster heads to oversee communication within and between clusters.
Advantages:
 Proactive routing has the benefit of low latency for connections that are already
established.
 Route availability right away.
The drawbacks of proactive routing include:
 high overhead because tables are updated frequently.
 ineffective in networks that are sparse or extremely dynamic.
Q3) Elaborate about (i)Secure network Encryption Protocol (SNEP) (ii)μTESLA
Protocol
ANS:
(i) Secure Network Encryption Protocol (SNEP)
A lightweight security protocol called SNEP was created for wireless sensor networks
(WSNs) with limited resources. It offers freshness, integrity, secrecy, and verification of
data. A fundamental component of the SPINS (Security Protocols for Sensor Networks)
system, SNEP is designed to satisfy the unique needs of WSNs, including low power
consumption and constrained processing capacity.
One of SNEP's benefits is its effective utilisation of energy and computing resources.
 offers several security features in one protocol.
 Because it is lightweight, it can be scaled for huge networks.
SNEP applications:
 networks for environmental monitoring.
 networks of military sensors.
 systems for smart home security.
(ii) μTESLA Protocol:
Another lightweight security mechanism that is a component of the SPINS architecture is
called μTESLA (Micro Timed Efficient Stream Loss-tolerant Authentication). It tackles
the issue of securely broadcasting data in a resource-constrained context by concentrating
on delivering authenticated broadcast in wireless sensor networks.
Advantages of μTESLA:
 lightweight and effective, making it appropriate for sensor nodes with constrained
processing capacity.
 Safe from unwanted broadcasts and replay attacks.
 uses a single MAC per message, which lowers overhead.
Limitations of μ TESLA:
 demands precise node-to-node time synchronisation.
 Attacks using delayed messages could occur if synchronisation is not accurate.
Applications of μ TESLA:
 Update WSN firmware securely.
 IoT devices that use broadcast authentication.
 vital warning systems in networks for disaster management or the military.
Q4) Explain the purpose of a gateway in a Wireless Sensor Network (WSN). How
does the gateway concept enable communication between WSNs and the internet?
Provide a basic overview of its role and significance in bridging the two networks.
ANS:
In a Wireless Sensor Network (WSN), a gateway serves as an essential bridge that links
the WSN to other networks, including the internet or other private networks. It acts as the
conduit for the transmission of sensor node data to external systems for processing,
archiving, and additional analysis. Additionally, the gateway makes it easier for external
systems to provide control orders to the sensor nodes.
Roles and Functions of a Gateway in WSN:
1. Translation of Protocols:

 Sensor nodes frequently employ communication protocols (such as LoRa,


BLE, and Zigbee) that are incompatible with TCP/IP and other common
internet protocols.
 These protocols are translated by the gateway, allowing the WSN and external
networks to communicate with ease.
2. Aggregation of Data:
 Gateways frequently aggregate or preprocess data from several sensors before
delivering it in order to save bandwidth and increase efficiency.
3. Forwarding and Routing:
 serves as a routing point to transfer information between the external network
and the WSN.
How the Gateway Concept Enables Communication Between WSNs and the
Internet
1. Interoperability of Protocols:
 Whereas the internet depends on reliable protocols like HTTP and MQTT,
WSNs usually use lightweight protocols like Zigbee or LoRaWAN.
 By acting as protocol converters, gateways make it possible to send and
encapsulate sensor data in formats that are compatible with the internet.
2. IP addressing:
 Due to resource limitations, the majority of sensor nodes do not use IP
addresses. The gateway serves as the network's internet representative by
allocating an IP address for external communication.
3. Forwarding Data:
 The gateway uses the internet to send the data gathered by the sensor nodes to
databases, cloud servers, or user interfaces.
Significance of Gateways in Bridging WSNs and the Internet:
1) Facilitates Integration of IoT:
WSN integration into the larger Internet of Things (IoT) ecosystem is made feasible by
gateways, which enable sensor data to support automation, real-time analytics, and
decision-making.
2) Accessibility from a distance:
Gateways allow users to remotely monitor and control sensor networks by connecting
WSNs to the internet.
3) Scalability:
Gateways centralise internet connectivity, making it easier to handle big WSN
deployments.

You might also like