A Wireless Sensor Network Architecture for Diversiform Deployment Environments

نویسنده

  • Linfeng Liu
چکیده

Network architecture is the foundation of network system. Wireless sensor networks (WSN) are always concentrated some key technologies under specific applications, and some prototype systems are developed according to specific applications of environments, but the research on WSN architecture is relatively weak currently. WSN is a highly complex distributed system, the defects in traditional WSN architectures are firstly studied, then the typical requirement objectives of WSN are acquired by analysis, and a set of design principles for WSN model is concluded. Because the WSN is mostly intended for variable and inhospitable environments, where persistent and continuous energy supply is lacking, the environment adaptive and energy efficient capabilities are integrant for WSN architecture. According with other objectives scalability and service-customized, an environment adaptive, energy efficient, hierarchical structure and sub-facets functions architecture model of WSN (EAWNA) is proposed. Furthermore, the design methods, general characteristics and functions of every lay or every module are described and discussed. At last, from the abstract levels of component framework, EAWNA is described formally besides all component layers entities are defined. EAWNA has not only the double characteristics: environment adaptive and energy efficient, but also has the traits such as multi-dimensional scalability, service-customized, and cross-layer interaction. EAWNA model can supply a theoretical framework and a kind of unified description method for diversified protocols in WSN.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quasi Random Deployment Strategy for Reliable Communication Backbones in Wireless Sensor Networks

Topology construction and topology maintenance are significant sub-problems of topology control. Spanning tree based algorithms for topology control are basically transmission range based type construction algorithms. The construction of an effective backbone, however, is indirectly related to the placement of nodes. Also, the dependence of network reliability on the communication path undertak...

متن کامل

Design and evaluation of two distributed methods for sensors placement in Wireless Sensor Networks

Adequate coverage is one of the main problems for distributed wireless sensor networks and The effectiveness of that highly depends on the sensor deployment scheme. Given a finite number of sensors, optimizing the sensor deployment will provide sufficient sensor coverage and save power of sensors for movement to target location to adequate coverage. In this paper, we apply fuzzy logic system to...

متن کامل

Wireless sensor network design through genetic algorithm

In this paper, we study WSN design, as a multi-objective optimization problem using GA technique. We study the effects of GA parameters including population size, selection and crossover method and mutation probability on the design. Choosing suitable parameters is a trade-off between different network criteria and characteristics. Type of deployment, effect of network size, radio communication...

متن کامل

Design and evaluation of two distributed methods for sensors placement in Wireless Sensor Networks

Adequate coverage is one of the main problems for distributed wireless sensor networks and The effectiveness of that highly depends on the sensor deployment scheme. Given a finite number of sensors, optimizing the sensor deployment will provide sufficient sensor coverage and save power of sensors for movement to target location to adequate coverage. In this paper, we apply fuzzy logic system to...

متن کامل

Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design

Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JNW

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2011