You are on page 1of 12

UBIQUTOUS COMPUTING:

A sensor network is a network of many smart devices, called nodes, which are spatially distributed in
order to perform an application-oriented global task. The primary component of the network is the
sensor, essential for monitoring real-world physical conditions or variables such as temperature, humidity,
presence (absence), sound, intensity, vibration, pressure, motion, and pollutants, among others, at
different locations. The important design and implementation requirements of a typical sensor network
are energy efficiency, memory capacity, computational speed and bandwidth.
A sensor network essentially performs three basic functions:
(i) Sensing,
(ii) Communicating and
(iii) Computation
by using the three fundamental components: hardware, software and algorithms, respectively.
Conventionally, a sensor network is considered a wireless network, however, some sensor networks are
wired or hybrid types.
The basic goals of a WSN are to:
(i) determine the value of physical variables at a given location,
(ii) detect the occurrence of events of interest, and estimate parameters of the detected event
or events,
(iii) classify a detected object, and
(iv) track an object (w3.antd.nist.gov).
Thus, the important requirements of a WSN are:
(i) use of a large number of sensors,
(ii) attachment of stationary sensors,
(iii) low energy consumption,
(iv) self-organization capability,
(v) collaborative signal processing, and
(vi) Querying ability.

WSN

WRITE2ADNANALAMKHAN@GMAIL.COM FOR UBIQUTOUS COMPUTING 1


Application of Wireless Sensor Network:

WRITE2ADNANALAMKHAN@GMAIL.COM FOR UBIQUTOUS COMPUTING 2


WSN DOMESTIC Application:

WRITE2ADNANALAMKHAN@GMAIL.COM FOR UBIQUTOUS COMPUTING 3


WSN Health services:

Smart Cars:
WRITE2ADNANALAMKHAN@GMAIL.COM FOR UBIQUTOUS COMPUTING 4
WSN Transport System:

WSN Surveillance:

WRITE2ADNANALAMKHAN@GMAIL.COM FOR UBIQUTOUS COMPUTING 5


WSN in Supply Chain Management:

Grand Challenges of WSN:


Large Scale Distributed processing requiring decentralization
Long life-time requirement
Reliability (no-repair failure model)
Deployment
Configuration and Network Management
Programming the Sensor Network
Others.

WRITE2ADNANALAMKHAN@GMAIL.COM FOR UBIQUTOUS COMPUTING 6


Pervasive computing (also called ubiquitous computing) is the next generation computing environments
with information & communication technology everywhere and available all the time for everyone.
There are two related fields for Pervasive computing, distributed system and mobile computing.
A distributed system is the collection of multiple computers connected via network and is used to solve
computational problems. The key features of distributed systems are discussed as follows:
Remote communication, In this two users or systems can communicate with each other remotely. Fault-
tolerance, in this case the system must be able to work properly in case of failure of any of its component.
High availability refers to the availability of a system most of the time, so that you can accomplish your
new task, update, access previous information or download the data. Remote information access, it
allows to access a particular computer remotely over the internet. Security provides protection of
information from unauthorized activities.
Mobile Computing refers as mobility, means a device that can change its location and it is in portable
form.
Pervasive computing also includes four main features: effective use of smart spaces, invisibility, localized
scalability and masking uneven conditioning.
Pervasive computing has specific/distinct requirement and special working mechanisms as against
conventional computing. The major aspects are given below:
Cyber foraging enhances the computer resources of a wireless mobile computer by taking used of wired
hardware infrastructure available in the neighborhood of the mobile device.
In adaption strategy, whenever there is mismatch between the supply and demand of resource, the
system will have to change its strategy to provide a good quality service to its user. Pervasive computing
system has to be context aware.
Historically, the term sensor has meant dumb sensorsomething like a strain gauge or thermocouple
that generates a signal but involves no local computing
Sensor is a device that has capabilities to measure physical attributes and convert them into signals for
the observer.
Wireless Sensor Network (WSN) comprises over several components called nodes.
The available nodes perform several roles.
The distributed nodes that collect the information are called source node .while the node that gathers the
information from all source node is called the sink node and sometime the gateway node. The sink node
could have relatively high computing power.

WRITE2ADNANALAMKHAN@GMAIL.COM FOR UBIQUTOUS COMPUTING 7


Smart Sensors:
Integration of a dumb sensor with a simple microcontroller, a limited amount of memory, a short-range
wireless transceiver, and a small battery.

Design of WSN Node:

WRITE2ADNANALAMKHAN@GMAIL.COM FOR UBIQUTOUS COMPUTING 8


Wireless Sensor and Actuator Network (WSAN) is a variant of WSN.It has one additional type of
component that is an actuator. It shifts from monitoring to control.
WSN Protocols:
As per the special requirements of WSN, traditional protocols are not suitable
Energy-aware protocols increases the lifetime of WSN
Some protocols are following:
Network Structure
Flat based
Hierarchical
Location based
Energy conservation in wireless sensor networks: A survey (Research Paper)
In the last years, wireless sensor networks (WSNs) have gained increasing attention from both the
research community and actual users. As sensor nodes are generally battery-powered devices, the critical
aspects to face concern how to reduce the energy consumption of nodes, so that the network lifetime can
be extended to reasonable times. In this paper the energy consumption for the components of a typical
sensor node, and discuss the main directions to energy conservation in WSNs. Then, we present a
systematic and comprehensive taxonomy of the energy conservation schemes, which are subsequently
discussed in depth. Special attention has been devoted to promising solutions which have not yet
obtained a wide attention in the literature, such as techniques for energy efficient data acquisition. Finally
we conclude the paper with insights for research directions about energy conservation in WSNs.
1. Research activity about wireless sensor networks with mobile data collectors has well characterized the
behavior of the network.
2. mobility-based energy conservation schemes are relatively new in WSN.
3. The Nodes discovery scheme can be targeted to the mobility pattern of sinks/relays by exploiting its
distinctive characterization.
4. An efficient data transfer protocol specifically targeted to communications between a node and a
mobile element.
5. Adaptive Data Transfer (ADT) protocol is proposed for exploiting the past history and tune the
communication parameters so as to reduce data transfer times.
6. Problem transmission scheduling.
7. The energy consumption relationship with reference to Quality of Service parameters are addressed in
this paper, such as the fraction of reported data or the maximum latency.
8. Design protocol.
Types of Wireless Networks
According to the relative mobility of hosts and routers, there are three different types of wireless
networks:
Fixed Wireless Network (Fixed N/W device)
Wireless Network with Fixed Access Points (Fixed hotspots)
Mobile Ad hoc Network (MANET) (Peer to peer routing)

Mobile Ad hoc Network (MANET) depicts coverage area.

WRITE2ADNANALAMKHAN@GMAIL.COM FOR UBIQUTOUS COMPUTING 9


Mobile Ad hoc Network
A sensor network is typically a fixed ad hoc network. Network components in a sensor network are
wireless sensors instead of general-purpose computers
Characteristics:
1. Autonomous and infrastructure-less
2. Multi-hop routing
3. Dynamic network topology
4. Device heterogeneity
5. Energy constrained operation
6. Bandwidth constrained variable capacity links
7. Limited physical security
8. Network scalability
9. Self-creation, self-organization and self-administration
Applications:
1. Tactical N/W
2. Emergency services
3. Commercial and Civilian Environment
4. Domestic and enterprise network
5. Education
6. Entertainment
7. Sensor N/W
8. Context aware services
9. Coverage extension
Protocols
1. Proactive Protocols routes continuously updated
2. Reactive Protocols react on demand
3. Hybrid of the two, based on the way they find new routes or update existing ones.
4. Routing protocols:
a) Link State Protocols are more reliable, easier to debug and less bandwidth-intensive
b) Distance-Vector Protocols are more complex and more compute- and memory-intensive

Attacks on MANET:

WRITE2ADNANALAMKHAN@GMAIL.COM FOR UBIQUTOUS COMPUTING 10


Why we need Protocol Security???
Answer: Protocols were designed by assuming and expecting (not Enforced) that all nodes are cooperative
MANET Security Solutions:
Protocol Security
Communication Security
Physical Security
What Protocol Security does?
Detection of malicious nodes
Guarantee of correct route discovery
Confidentiality of network topology
Stability against attacks
Name of Security protocols:

ARIADNE (Extension of DSR) -

SLSP Secure Link State Routing Protocol

ARAN Authenticated Routing for Ad Hoc Networks

SAODV (Extension of AODV) Secure Ad Hoc On Demand Distance Vector

SRP Secure Routing Protocol

SAR Security-aware Ad Hoc Routing Protocol

SEAD Secure Efficient Ad Hoc Distance Vector Routing Protocol

A mobile ad-hoc network (MANET) is a self-configuring network where nodes, connected by wireless
links, can move freely and thus the topology of the network changes constantly. The reasoning is that
both MANETs and WSNs are auto configurable networks of nodes connected by wireless links, where
resources are scarce, and where traditional protocols and networking algorithms are inadequate.
WRITE2ADNANALAMKHAN@GMAIL.COM FOR UBIQUTOUS COMPUTING 11
Although, both types of networks indeed have many similarities, the differences are also such that WSN
can arguably be considered a whole different research field.
Similarities probably the main reason why WSNs immediately resemble an ad hoc network is because
both are distributed wireless networks. Routing between two nodes may involve the use of intermediate
relay nodes (also known as multihop routing).ad hoc and sensor nodes are usually battery powered and
therefore there is a big concern on minimizing power consumption.
Both networks use a wireless channel placed in an unlicensed spectrum that is prone to interference by
other radio technologies operating in the same frequency. Self-management is necessary because of the
distributed nature of both networks.
MANETs are usually close to humans, like sensors with environment.
The topology of the network may change dynamically, not due to node mobility like in ad hoc networks,
but because some nodes will fail.E.g. Sensors with locomotives and animals. Another failure reason is
sleep-awake network cycle or protocol. Another reasons are minimum usage of sensors or old batteries
provides less respond time or hardware failure

WRITE2ADNANALAMKHAN@GMAIL.COM FOR UBIQUTOUS COMPUTING 12

You might also like