SlideShare una empresa de Scribd logo
1 de 19
DISTRIBUTED
SENSOR
NETWORK
Sensor network:
• It consists of multiple detection stations called
sensor node
• It is equipped with a transducer,
microcomputer & transceiver and power
source.
• In sensor networks is basic on the defense
application at the beginning, especially the
Distributed Sensor Networks (DSN).
Types of sensor network:
• There are many types of sensors.
• They are used to measure and/or detect
a huge variety of conditions
Some are:
• Common sensor
• Bandwidth monitoring sensor
• Web server (HTTP) sensor
• SNMP sensor etc..
Distributed sensor network:
The implementation of sensor network using
distributed control architecture
Reasons:
• Sensor nodes are prone to failure
• For better collection of data
• To provide nodes with backup in case of
failure of the central node
History:
• In 1978,Defence Advanced Research Project
Agency developed Distributed sensor
network.
Standards:
There are a number of standardization bodies
in the field of WSNs including WAVE2M and
IEEE
Operating system:
• Operating systems such as eCos or
μC/OS used for sensor networks.
• TinyOS is perhaps the first operating
system for WSN
• LiteOS and Contiki are the other new
operating systems
Hardware:
• WSN is to produce low cost and tiny sensor
nodes.
• Node contains: radio, battery, microcontroller,
analog circuit, and sensor interface.
Software:
Algorithms and protocols need to address
the following issues:
• Lifetime maximization
• Robustness and fault tolerance
• Self-configuration
Working:
Layers used in data transmission:
Characteristics:
• Power consumption using batteries or energy
harvesting
• Ability to cope with node failures
• Mobility of nodes
• Dynamic network topology
• Scalability to large scale of deployment
• Ability to withstand harsh environmental
conditions
• Ease of use
Routing technique:
Security Requirements:
• Authentication
• Secrecy
• Countermeasures
• Key Establishment
Application:
It consists of spatially distributed autonomous
sensors to monitor physical or environmental
conditions.
Military application:
Services:
• Battlefield surveillance
• Targeting
• Battle damage assessment
• Nuclear, biological and
chemical attack detection
Environmental Application:
• habitat monitoring
• agriculture research
• fire detection
• traffic control.
• no interruption to the
environment
Health Applications:
• Widely used in health care area
• Monitor patient physiological
data.
• To control the drug
administration track.
Recent development of Home
Applications:
• Home application will step into our normal life
in the future.
Conclusion:
• The features of distributed sensor
network is developing abruptly.
• DSN has many advantages and is used in
several fields.
“It is going to make an evolution in
the Technology world”.
By,
I. Madhumithah
V. Kalpana
M.Sc(CS)
G.VENKATASWAMY
NAIDU COLLEGE

Más contenido relacionado

La actualidad más candente

Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
 
Packet switching
Packet switchingPacket switching
Packet switchingasimnawaz54
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocolPradeep Kumar TS
 
Heterogeneous mesh network (ad hoc)
Heterogeneous mesh network (ad hoc)Heterogeneous mesh network (ad hoc)
Heterogeneous mesh network (ad hoc)Javed Khan
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networksSweta Kumari Barnwal
 
Mac protocols
Mac protocolsMac protocols
Mac protocolsjuno susi
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor NetworkGanesh Khadsan
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolArunChokkalingam
 
Tapestry
TapestryTapestry
TapestrySutha31
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPTKalpanaC14
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 
Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3Easy n Inspire L
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsnDeepaDasarathan
 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR) Pradeep Kumar TS
 

La actualidad más candente (20)

Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Heterogeneous mesh network (ad hoc)
Heterogeneous mesh network (ad hoc)Heterogeneous mesh network (ad hoc)
Heterogeneous mesh network (ad hoc)
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networks
 
6lowpan
6lowpan6lowpan
6lowpan
 
Infrared lan's
Infrared lan'sInfrared lan's
Infrared lan's
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
Tapestry
TapestryTapestry
Tapestry
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
 
Overview on NUMA
Overview on NUMAOverview on NUMA
Overview on NUMA
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR)
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 

Destacado

PFC_Analysis of IEEE 802.15.4 in WBSN
PFC_Analysis of IEEE 802.15.4 in WBSNPFC_Analysis of IEEE 802.15.4 in WBSN
PFC_Analysis of IEEE 802.15.4 in WBSNmanuay
 
Framework for preserving security and privacy in peer-to-peer content distrib...
Framework for preserving security and privacy in peer-to-peer content distrib...Framework for preserving security and privacy in peer-to-peer content distrib...
Framework for preserving security and privacy in peer-to-peer content distrib...UOC Universitat Oberta de Catalunya
 
Quality of service aware mac protocol for body sensor networks
Quality of service aware mac protocol for body sensor networksQuality of service aware mac protocol for body sensor networks
Quality of service aware mac protocol for body sensor networksIffat Anjum
 
Integrated modeling and simulation framework for wireless sensor networks
Integrated modeling and simulation framework for wireless sensor networksIntegrated modeling and simulation framework for wireless sensor networks
Integrated modeling and simulation framework for wireless sensor networksDaniele Gianni
 
MICS Band Wireless Body Sensor Network
MICS Band Wireless Body Sensor NetworkMICS Band Wireless Body Sensor Network
MICS Band Wireless Body Sensor NetworkMyo Naung Lwin
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 

Destacado (8)

PFC_Analysis of IEEE 802.15.4 in WBSN
PFC_Analysis of IEEE 802.15.4 in WBSNPFC_Analysis of IEEE 802.15.4 in WBSN
PFC_Analysis of IEEE 802.15.4 in WBSN
 
Framework for preserving security and privacy in peer-to-peer content distrib...
Framework for preserving security and privacy in peer-to-peer content distrib...Framework for preserving security and privacy in peer-to-peer content distrib...
Framework for preserving security and privacy in peer-to-peer content distrib...
 
Quality of service aware mac protocol for body sensor networks
Quality of service aware mac protocol for body sensor networksQuality of service aware mac protocol for body sensor networks
Quality of service aware mac protocol for body sensor networks
 
Ecg
EcgEcg
Ecg
 
Integrated modeling and simulation framework for wireless sensor networks
Integrated modeling and simulation framework for wireless sensor networksIntegrated modeling and simulation framework for wireless sensor networks
Integrated modeling and simulation framework for wireless sensor networks
 
MICS Band Wireless Body Sensor Network
MICS Band Wireless Body Sensor NetworkMICS Band Wireless Body Sensor Network
MICS Band Wireless Body Sensor Network
 
Wireless Body Sensor Networks
Wireless Body Sensor Networks Wireless Body Sensor Networks
Wireless Body Sensor Networks
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 

Similar a Distributed sensor network

Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its applicationRoma Vyas
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptxJavaTech1
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksGokuldhev mony
 
Wireless applications in various areas
Wireless applications in various areasWireless applications in various areas
Wireless applications in various areasAmulya Anu
 
Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Yogesh Fulara
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitecturePeriyanayagiS
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey915086731
 
An overview of a wireless sensor network communication
An overview of a wireless sensor network communicationAn overview of a wireless sensor network communication
An overview of a wireless sensor network communicationphbhagwat
 
An overview of a wireless sensor network communication ppt
An overview of a wireless sensor network communication pptAn overview of a wireless sensor network communication ppt
An overview of a wireless sensor network communication pptphbhagwat
 
Module 1 Lec 1-6- WSN-EC6128.pdf
Module 1 Lec 1-6- WSN-EC6128.pdfModule 1 Lec 1-6- WSN-EC6128.pdf
Module 1 Lec 1-6- WSN-EC6128.pdfShreyaPandey184291
 
Living on the iot edge
Living on the iot edgeLiving on the iot edge
Living on the iot edgeSteve Mylroie
 
Enhancing the Performance of WSN
Enhancing the Performance of WSNEnhancing the Performance of WSN
Enhancing the Performance of WSNDheeraj Kumar
 

Similar a Distributed sensor network (20)

Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
LEACH Protocol
LEACH ProtocolLEACH Protocol
LEACH Protocol
 
Sem
SemSem
Sem
 
Ioe module 4
Ioe module 4Ioe module 4
Ioe module 4
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Wireless applications in various areas
Wireless applications in various areasWireless applications in various areas
Wireless applications in various areas
 
Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey
 
An overview of a wireless sensor network communication
An overview of a wireless sensor network communicationAn overview of a wireless sensor network communication
An overview of a wireless sensor network communication
 
An overview of a wireless sensor network communication ppt
An overview of a wireless sensor network communication pptAn overview of a wireless sensor network communication ppt
An overview of a wireless sensor network communication ppt
 
Module 1 Lec 1-6- WSN-EC6128.pdf
Module 1 Lec 1-6- WSN-EC6128.pdfModule 1 Lec 1-6- WSN-EC6128.pdf
Module 1 Lec 1-6- WSN-EC6128.pdf
 
Living on the iot edge
Living on the iot edgeLiving on the iot edge
Living on the iot edge
 
IDS WSN.ppt
IDS WSN.pptIDS WSN.ppt
IDS WSN.ppt
 
TinyOS Course 00: Introduction to WSN
TinyOS Course 00: Introduction to WSNTinyOS Course 00: Introduction to WSN
TinyOS Course 00: Introduction to WSN
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Wsn handbook
Wsn handbookWsn handbook
Wsn handbook
 
Enhancing the Performance of WSN
Enhancing the Performance of WSNEnhancing the Performance of WSN
Enhancing the Performance of WSN
 

Más de Madhumithah Ilango (9)

Project confiration-letter-sample
Project confiration-letter-sampleProject confiration-letter-sample
Project confiration-letter-sample
 
4 g technology
4 g technology4 g technology
4 g technology
 
Network security
Network security Network security
Network security
 
Clientserver
ClientserverClientserver
Clientserver
 
Bit info
Bit infoBit info
Bit info
 
Network simulator
Network  simulatorNetwork  simulator
Network simulator
 
Network security
Network security Network security
Network security
 
Gps
GpsGps
Gps
 
4 g technology
4 g technology4 g technology
4 g technology
 

Último

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Distributed sensor network

  • 2. Sensor network: • It consists of multiple detection stations called sensor node • It is equipped with a transducer, microcomputer & transceiver and power source. • In sensor networks is basic on the defense application at the beginning, especially the Distributed Sensor Networks (DSN).
  • 3. Types of sensor network: • There are many types of sensors. • They are used to measure and/or detect a huge variety of conditions Some are: • Common sensor • Bandwidth monitoring sensor • Web server (HTTP) sensor • SNMP sensor etc..
  • 4. Distributed sensor network: The implementation of sensor network using distributed control architecture Reasons: • Sensor nodes are prone to failure • For better collection of data • To provide nodes with backup in case of failure of the central node
  • 5. History: • In 1978,Defence Advanced Research Project Agency developed Distributed sensor network. Standards: There are a number of standardization bodies in the field of WSNs including WAVE2M and IEEE
  • 6. Operating system: • Operating systems such as eCos or μC/OS used for sensor networks. • TinyOS is perhaps the first operating system for WSN • LiteOS and Contiki are the other new operating systems
  • 7. Hardware: • WSN is to produce low cost and tiny sensor nodes. • Node contains: radio, battery, microcontroller, analog circuit, and sensor interface. Software: Algorithms and protocols need to address the following issues: • Lifetime maximization • Robustness and fault tolerance • Self-configuration
  • 9. Layers used in data transmission:
  • 10. Characteristics: • Power consumption using batteries or energy harvesting • Ability to cope with node failures • Mobility of nodes • Dynamic network topology • Scalability to large scale of deployment • Ability to withstand harsh environmental conditions • Ease of use
  • 12. Security Requirements: • Authentication • Secrecy • Countermeasures • Key Establishment Application: It consists of spatially distributed autonomous sensors to monitor physical or environmental conditions.
  • 13.
  • 14. Military application: Services: • Battlefield surveillance • Targeting • Battle damage assessment • Nuclear, biological and chemical attack detection
  • 15. Environmental Application: • habitat monitoring • agriculture research • fire detection • traffic control. • no interruption to the environment
  • 16. Health Applications: • Widely used in health care area • Monitor patient physiological data. • To control the drug administration track.
  • 17. Recent development of Home Applications: • Home application will step into our normal life in the future.
  • 18. Conclusion: • The features of distributed sensor network is developing abruptly. • DSN has many advantages and is used in several fields. “It is going to make an evolution in the Technology world”.