Wireless Communication Gap Analysis

Improved Essays
2. PRELIMINARIES
The research efforts that proposed for the connectivity and coverage issues in WSNs are based upon a lot of theories and assumptions. The basic concepts of connectivity and coverage have an essential role in understanding this issue. In this section, we describe the notions of connectivity and coverage, the category of sensor nodes, sensing models and communication models.
2.1. Connectivity and coverage
The objective of deploying a WSN is to keep the FoI under strict surveillance and then forward the obtained information to a designated gateway/data sink. Hence, coverage and connectivity are the sufficient conditions for keeping the functionality of a WSN.
Since the data aggregated by a WSN has to be forwarded to the processing
…show more content…
Communication model
Similar to the sensing model, multiple communication models also proposed to mathematically model the complex characteristics of the wireless communication channel. The simplest model is the protocol model in which two nodes can communicate with each other iff they locate in each other’s communication range Rc.
Further, in order to capture other disruptive physical characteristics of the wireless channel (e.g., the multiple path fading, and the interference, etc.) rather than only the diminishing effect of the transmission distance, the authors in [Gupta and Kumar 2000] modeled wireless channels incorporating these effects and called the model as signal-to-interference-plus-noise ratio (SINR) model ot the Physical model. Let Pti denote the transmission power of the node si in node set X . Then, by considering the ambient noise power level N0, the SINR of the received signal emitted by node si can be calculated by (4) where δmin is minimum acceptable SINR that necessary for node sj to achieve successful receptions and decoding. The signal power decays with distance is always assumed to be α > 2 [Gupta and Kumar
…show more content…
Moreover, with similar assumptions, the authors in [Xue and Kumar 2004] showed that each node should be connected to Θ(logn) nearest neighbors for keeping the network connectivity. The critical conditions for the network asymptotically disconnected and the asymptotically connected are 0.074logn and 5.1774logn, respectively. Further, by considering the deterministically located unreliable nodes, the paper [Shakkottai et al. 2005] shows that, in a unit square area, the necessary and sufficient condition for the system to achieve both required connectivity and coverage is Rc2p(n) ∼ logn/n, where p(n) is the probability that a node is

Related Documents

  • Improved Essays

    B. Steady-state phase: Data transmission starts; Nodes forward their data during their assigned TDMA slot to the CH. This transmission utilizes a minimum amount of energy (selected depending on the obtained strength of the CH advertisement). The radio of every non-CH node can be turned off until the nodes assigned TDMA…

    • 547 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    If the sensed parameters at one of the wireless sensor node are not as per the expected parameters, then the controlling action will be taken by the PC master terminal. We have a main PC master terminal which has the VB software already installed into it .The PC master terminal which is used to monitor the status of all the wireless sensor nodes which covers the whole area. This reduces cable connections and accidental potential due complexity of cables. RF transmitter namely IEEE802.15.4 technology standard, is one of the WPAN standards.…

    • 358 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    GUI (Graphical User Interface), Wireshark allows a live view of the network traffic on the network card it is listening to. 2.9 Our approach to improving the throughput of QoS with SDN: 2.9.1 Setup and run Mininet and controller The first step installs Mininet in Ubuntu operation system, we are don't using a virtual machine and then install Ryu controller in OS. 2.9.2 Create custom network…

    • 464 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 6 Essay

    • 565 Words
    • 3 Pages

    This specifies the general interface between the network layer (IP etc.) and the Data Link layer (Ethernet, Token Ring etc.) It’s the standard for the upper Data Link layer sublayer, also known as the Logical Link Control layer. It’s responsible for flow and error control. The Data Link layer wants to send some data over the network, 802.2 LLC helps make this possible. b. 802.3 – Ethernet 802.3 is the standard which Ethernet operates by.…

    • 565 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    CPSC 558 — Adv Networking — Lab Assignment – Simple Data Link A1: Simple Data Link Introduction Build one data line between two nodes, that can send and receive a text string of ‘1’s and ‘0’s. We transmit the string "10010" in one direction and reply with the string "01101". Implementation Language: C++ (or C) Implementation Structure…

    • 888 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Internet Connectivity – Wide range of Internet connectivity should be considered based on the size of the company. Wired and Wireless connections should be arranged with high frequency range. Network…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Nt1330 Unit 7 Exercise 1

    • 756 Words
    • 4 Pages

    The result of this project is the graph generated with the following specifications. The Graph displays the parameters of each of the node present in the respective server. The X-Axis represents the number of nodes of each server. The Y-Axis represents the parameters. Each Legend of the graph.…

    • 756 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 5 Lab Report

    • 1927 Words
    • 8 Pages

    Goals According to the flow chart above, we need to generate a binary sequence of 0's and 1's, the length of which is 2N bits, that occur with equal probability and are mutually independent for which a ‘rand’ function is used. The data is then passed through a QPSK modulator to produce N complex symbols of {±1 , ±1j}. At the receiver, noise is added to the transmitted signal and the resultant signal is then passed through the QPSK demodulator to produce estimates of the transmitted binary data. After that, the demodulator output is compared with the original sequence, and finally an error counter is used to count the number of bit errors.…

    • 1927 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3

    • 408 Words
    • 2 Pages

    1) Cluster size is inversely proportional to channel capacity,larger the cluster size the smaller the number of users. Cluster size is also inversely proportional to co-channel interference i.e higher the cluster size less is co-channel interference. When capacity of the channel is increased the co-channel interference also increases. 2) The possible solutions to increase the capacity of cellular system are: a) Cell Sectorization b) Cell Splitting c…

    • 408 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Itc431 Unit 1 Assignment

    • 1697 Words
    • 7 Pages

    Assignment 2 ITC431 - Networks and Communications Sidharth Arangadan House Jayarajan 11538368 1 1. Define and explain the following terminologies:  Computer networks: A computer network is a group of computer systems or other hardware computing devices which are linked together through a channel called communication channel to establishing communication between wide number of users and also for resource sharing between them.  Personal area networks (PANs): A personal area system - PAN - is a machine system sorted out around a distinctive individual.…

    • 1697 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    With this, a compromised node running malicious code disguised as a legitimate node continuously seeks to find ways to disrupt communication and paralyze the network. However, node compromise attack is severe when the base node is compromised. Therefore, different activities like stealing secrets from the encrypted data, reporting wrong and misleading information to the network, reporting other legitimate nodes as compromised nodes, launching different routing attacks takes place. The best way to counter node compromise is to utilize code testing schemes which employ an optimal program verification process to verify the memory of a sensor node by calculating the hash values of randomly selected memory regions.…

    • 869 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Salvation Army Case Study The Salvation Army Automates Guest Access & Expands BYOD SH: Uses Network Sentry’s Unique Multiple Portal Feature to Unify Guest Experience Network Profile: A Cisco network that integrates 80 different locations. Challenges • Automate the guest access provisioning process for 80 locations • Provide a unified look and feel for 80 access portals, all with different local provisioning • Expand BYOD wireless connectivity options without sacrificing security or compliance Solution: Network Sentry, Bradford’s Security Automation & Orchestration Solution Results • An automated wireless provisioning process that places devices on the appropriate network with the proper level of access • Unified mobile and guest access experiences…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    The pressure comes as consumer tastes are changing. Instead of wandering through stores and making impulse purchases, shoppers use their mobile phones and computers to research prices and cherry-pick promotions, sticking to shopping lists rather than splurging on unneeded items. Even discount retailers are finding it harder to boost sales by lowering prices as many low-income consumers struggle to afford the basics regardless of the price. This is an on-going problem and it has currently affected majority of retail stores.…

    • 1111 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    The layout of a project with both methods you are required to tie into a known point. With traditional methods you are required to transport that known point to the worksite by means of traversing the information by laying out a level circuit. With GNSS you can set up on your control marker then travel straight to the job site and access that information wirelessly. The big difference in this situation is time and money. When laying out property for construction, stakes will be used to mark boundaries, which are inevitably disturbed throughout the construction process.…

    • 1076 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The purpose of this paper is to describe the network configuration, explaining the role of each component and connection of the scenario provided. Specifically, I will discuss the functions of the components and describe how they contribute to the network. Along with this I will modify the appropriate components of the provided database with the information regarding the employees’ computers and the upgrade. Network Configuration Network configuration allows a system admin to set up a network to use to communicate. Per Techopedia, “Network configuration is the process of setting a network 's controls, flow and operation to support the network communication of an organization and/or network owner.”…

    • 923 Words
    • 4 Pages
    Improved Essays