Computer Network Tutorial

Introduction of Computer Network Types of Computer Network Network Topology Computer Networking Architecture Transmission Modes (Data Flow) Basic Networking Devices Integrate Services Digital Network (ISDN)

Model

OSI Model TCP/IP Model

Physical Layer

Digital Transmission Analog Transmission Transmission Media Switching

Data Link Layer

Error detection and Error correction Data Link Control Multiple Access Aloha

Network Layer

Network Layer - Logical Address Address Mapping Unicast Routing Protocol

Transport Layer

Process to Process Delivery User Datagram Protocol Transmission Control Protocol Stream Control Transmission Protocol Session Layer and Presentation Layer

Application Layer

Domain Name System Application Protocol E-mail Cryptography

Misc

Classes of Routing Protocols Classification of Routing Algorithms Controlled Access Protocols in Computer Networks Differences between IPv4 and IPv6 Fixed and Flooding Routing Algorithms Advantages and Disadvantages of Fibre Optics Cable APIPA Difference between Active and Passive FTP Fiber Optics and its Types Method of Joining and Fusion of Fiber Optic Cable Define Framing in Computer Network Disadvantages of Computer Network Mesh Topology Diagram in Computer Network Ring Topology in Computer Network Star Topology in Computer Networks 4G Mobile Communication Technology Advantages and Disadvantages of LAN Advantages and Disadvantages of MAN Advantages and Disadvantages of WAN Application Layer in OSI Model Cyclic Redundancy Check Example Data link layer in OSI model Difference between Transport and Network Layer Hamming Code Example Network Layer in OSI Model Session Layer in OSI Model Transport Layer in OSI Model Two Port Network in Computer Networks Uses of Computer Networks What is Computer Network What is Framing in a Computer Network Advantages and Disadvantages of Bus Topology Difference between Star Topology and Bus Topology Subnetting in Computer Network Subnetting Questions and Answers What is Bus Topology What is Network Topology and Types in Computer Networks Access Control in Networking Basic Characteristics of Computer Network Benefits of SOCKS5 Proxy in Computer Networks Computer Network viva Questions Difference between BOOTP and RARP Difference Between Network Topologies and Network Protocols Difference between NFC and RFID Difference Between Point-to-Point Link and star Topology Network Differences Between MSS and MTU Differences Between Trunk Port and Access Port Different Modes of Communication in Computer Networks MIME Protocol in Computer Networks Modes of Communication in Computer Networks Network Attack in Computer Network Port Address in Networking Simplest Protocol in Computer Network Sliding Window Protocol in Computer Network Stop And Wait Protocol in Computer Networks TCP 3-Way Handshake Process in Computer Networks What is a Proxy Server What is APPN What is ICMP Protocol What is Point-to-Point Protocol What is Port Address in Networking What is the HDLC Protocol What is VRRP Protocol Difference Between Analog and Digital Signals Difference Between Hub and Repeater Difference between Repeater and Switch Difference Between Transparent Bridge and Source Routing Bridge Source Routing Bridge in Computer Networks Transparent Bridge in Computer Networks Transport Protocol in Computer Networks Types of CSMA in Computer Networks What is Wired and Wireless Networking Network Security in Computer Network Disadvantages of Extranet Difference Between TELNET and FTP Define Protocol in Computer Networks Guided Transmission Media in Computer Network What is a Gateway in a Computer Network IGMP in Computer Networks LAN Protocols in Computer Networks MAN Meaning in Computer Modulation Techniques in Computer Networks Switching in DCN TCP/IP Applications What is IGMP? What is Modem in Networking What is Non-Persistent CSMA Difference between Cell Splitting and Cell Sectoring Forouzen Computer Network Open Loop and Closed Loop Congestion Control Types of Cluster Computing WAP-Wireless Access Point What are the elements of the Transport Protocol Difference between Gateway and Switch Flow Control in Data Link Layer Body Area Network Flooding in Computer Network Token Ring in Computer Networks VoIP in Computer Networks What is Infrared Transmission Congestion Control Techniques Forward Error Correction (FEC) Switching Techniques What is Telnet in Computer Network What are the Types of IPv4 Addresses IEEE 802.6 (DQDB) IEEE 802.15.4 Technology What is HDLC (High-level Data Link Control)? What is SMS Hubbing in Telecom? Circuit Switching in Computer Networks Communication Satellites in Computer Networks Features of HTTP Protocol IMAP4 (Internet Message Access Protocol) Internet Services How to Set up a Wireless Router Internetwork Routing in Computer Networks Distributed Computing System Features of GSM The 802.11 MAC Sublayer Protocol What is IEEE 802.3? What are Hubs and Switches in Computer Networks? What is Modem in a Computer Network? What is multicasting in Computer Networks? GSM -The Mobile Station What is Network Server? Slotted Aloha in Computer Network What is Ethernet in Computer Networks What is Arpanet? Radio Access Network (RAN) TCP 3-Way Handshake Process PING SWEEP (ICMP SWEEP) Print Server Private IP Address Security Services in Computer Networks Protocol Data Unit (PDU) CSMA with Collision Avoidance (CSMA/CA) What is Gateway in Computer Network? Advantages of Networking Data Link Layer Design Issues DHCP in Computer Networks Internet Security Association and Key Management Protocol (ISAKMP) What is Switch Hub? Telnet Full form in Networking Multimedia Systems Quality of Service in Computer Networks What is Carrier Sense Multiple Access (CSMA)? What is Circuit Switching What is Duplex Network? What is Web Protocol Network LAN Technologies Classes in Computer Network Low-Density Parity Check (LDPC) Wireless Internet Service Providers(Wisps) What is Handshaking? Cache Server What Is WSN Network? Check Sum Error Detection Linear Bus Topology Functions of the Transport Layer Infrared Transmission in Computer Networks Digital Signal in Computer Network Digital Data Transmission in Computer Networks Define Checksum with Example Computer Network Security Requirements Brust Errors in Computer Network Back Side Bus (BSB) 2-Dimension Parity Check in Computer Network Router and Brouter Microwave Transmission in Computer Networks Magnetic Media in Computer Network A One-Bit Sliding Window Protocol CDMA-Near-Far Problem Reference Models in Computer Networks Uni-cast, Broadcast, and Multicast in Computer Networks Uses Of Bridges in Computer Networks What are Gateways in Computer Network? How to Set Up a Home Network – A 7-Step Guide GSM in Computer Networks Multicast Routing Protocols in Computer Networks Network Components Types of Ethernet in Computer Networks BGP vs.EIGRP-What's the difference? Green Cloud Computing and its Strategies Packet Switching Router in Computer Network Advantages and Disadvantages of Routers ATM Network Automatic Repeat ReQuest (ARQ) Static Routing Algorithms in Computer Network TDMA – Technology Data Link Layer services provided to the Network Layer Transmission Impairments in Computer Networks Types of Modems What are Elementary Data Link Layer Protocols What is an Ad-hoc Network? What is the IEEE 802.11 Wireless LAN Standards? What Is Tunneling in Computer Networks? What is Twisted Pair Cable Advantages of Unguided Media Ethernet Topology in Computer Network Optical Fiber Modes and Configurations Optical Sources in Optical Fiber Communication 4 Layers of TCP/IP Hierarchical Routing Algorithm in Computer Networks Meaning of Data Communication Metropolitan Area Network Responsibilities of Transport Layer The Functions of Hub in Networking Tree Topology in Computer Network Types of Connections in Computer Network Authentication in Computer Network Buffering in Computer Networks MAC Protocol and its Classification Difference between Circuit Switching and Packet Switching Difference between Session and Cookies Broadcasting in Computer Networks CDMA in Computer Networks CDMA-Technology Components of Computer Network CRC in Data Communication CSMA-CA Protocol in Computer Network Difference between LAN and VLAN DIFFERENCE BETWEEN PHYSICAL AND LOGICAL TOPOLOGY Difference between TDM and FDM Differences Between URL and IP Address Differentiate between Synchronous TDM and Asynchronous TDM in Computer Network Diffеrеntiate Bеtwееn Datagram Approach and Virtual Circuit in Computer Network FDDI in Computer Network Functions of Bridge IEEE 802.11 in Computer Networks Internetworking in Computer Networks MAC in Data Link Layer Mac Sub Layer in Computer Networks MAN Meaning in Computer Radio Wave Transmission Single Sign-On (SSO) Token Passing in Computer Network Types of Data Transmission Types of Transmission Media in Computer Networks Advantagеs and Disadvantagеs of Li-Fi Benefits of Client Server Computing Bus and its Types Characteristics of Analog Signals Characteristics of NOS Choke Packet in Congestion Control Congestion Control Policy CSMA/CA in Computer Network Data Communication and Transmission Techniques Data Compression in Computer Networks Diffеrеncе bеtwееn SSH and Tеlnеt Diffеrеncе bеtwееn Static IP Addrеss and Dynamic IP Addrеssa Fiber Distributed Data Interface Network Time Protocol(NTP) Routing in Adhoc Networks Working of DNS Time Division Multiplexing (TDM) Types of Packet Switching Types of Protocols Types of Transmission Technology Use of Bluetooth in Computer Networks What is BBS? What is Code Correction? IEEE 802.11 Wireless LAN What is Stateless Protocol? Advantages of Networking in Computers DHCP Protocol in Computer Networks Difference between UTP and STP Cable Explain FTP in Computer Network Explain Hierarchical Model Explain HTTP in Computer Network Explain Nested Structure with Example Open Systems Interconnection Model Parallel Database System SMTP in Computer Network Space Division Switching Transmission Control Protocol (TCP) Types of IP Address Types of Routing in Computer Networks What is Duplex Transmission Data Link Layer Protocols Network Layer Protocols Session Layer Protocols

What Is WSN Network?

What Is WSN Network?

Introduction:

The term "wireless sensor network" (WSN) refers to a collection of spatially scattered and specialised sensors used to track and record environmental physical conditions and organise the resulting data in a central location. WSNs monitor a variety of environmental factors, including pressure, humidity, wind speed and direction, temperature, sound, and pollution levels.

A network made up of numerous tiny, low-power gadgets called sensor nodes is known as a wireless sensor network (WSN). These nodes have sensors that can monitor many physical and environmental factors, including temperature, humidity, light, and sound. A self-organising network is created by the nodes' wireless communication with one another and a central node, or base station.

WSNs are frequently utilised in applications like home automation, industrial process control, healthcare monitoring, and environmental monitoring. In comparison to conventional wired networks, they are more flexible, less expensive, and easier to deploy.

Although WSNs were primarily intended to support military operations, their applicability has now been expanded to include health, traffic, and numerous other consumer and industrial sectors.

Several hundred to many thousands of sensor nodes make up a WSN. The sensor node's equipment consists of an antenna, a radio transceiver, a microcontroller, an electrical circuit for the interface, and an energy supply, typically a battery.

The sensor nodes' sizes can also vary, from those of a shoe box to those of a dust particle. Therefore, the price of a sensor may vary from a few pennies to hundreds of dollars depending on its functions, including energy consumption, computing speed, bandwidth, and memory.

Wireless sensor networks (WSNs) are wireless networks that are self-configuring and empty of structure in order to monitor atmospheric or physical situations, such as humidity, vibrations, stress, movement, or contamination.

WSNs work together to transfer data via the network to a centralised area or sink where it may be examined and processed. Through a base station or washbasin, users and the network are connected. By injecting queries into the network and gathering the results from the sink, one can extract the necessary data. Thousands of sensor nodes often make up a wireless sensor network. Radio signals are able to be used by the sensor nodes to communicate with one another. A wireless sensor node has power supplies, radio transceivers, sensing and processing devices, and radio devices.

History Of WSN:

It is useful to briefly look at the history of WSNs to better understand the tradeoffs in today's WSNs. In contrast to the widespread light industrial and consumer WSN applications of today, the origin of WSNs can be traced to military and heavy industrial applications, as is the case with many other modern technologies.

The Sound Surveillance System (SOSUS), created by the American military in the 1950s to find and monitor Soviet submarines, was the first wireless network that resembled a modern WSN in any significant way.

The hydrophones that were dispersed throughout the Atlantic and Pacific oceans for this network's underwater sound sensors Even though it now has more subdued uses like monitoring underwater fauna and volcanic activity, this sensing technology is still in use.

Organisations and academic agencies began using WSNs at some point for things like monitoring the condition of the air, infrastructure monitoring, spotting forest fires, mitigating natural disasters, and weather prediction stations.

Students in engineering then began to promote the use of WSNs in heavy industrial applications, such as distribution of power, waste-water treatment, and specialised factory automation, as they entered the corporate world of the time's leading technological companies, including IBM and Bell Labs.

WSNs were in high demand, but it was difficult to expand beyond these few uses. Prior decades saw the development of massive, expensive sensors and exclusive networking protocols for use in the military, science and technology, and heavy industrial sectors.

hese WSNs prioritised functionality and performance over other factors like technology and installation expenses, protocol rules, electricity consumption, and flexibility. WSNs were unable to be widely adopted and deployed in a wider range of applications due to a combination of high cost and low volume.

The following difficulties confront a contemporary wireless sensor network (WSN):

Limited energy and power: Battery-powered sensors, which are the main component of WSNs, have a certain amount of energy available to them. It becomes challenging to ensure that the network can run for a long period of time without needing frequent battery replacements as a result.

Lack of processing and storage power: Sensor nodes in a WSN are frequently tiny and have little processing and storage power. Complex operations and data storage are made challenging by this.

Heterogeneity: WSNs frequently include a variety of various sensor types and nodes with a range of functions. It is difficult to guarantee that the network can operate properly and efficiently because of this.

Security: Just a few of the attacks that WSNs are at risk of include monitoring, jamming, and mimicking. The network's security must be maintained, as must the data it collects.

Scalability: WSNs frequently need to be capable of supporting a significant number of sensor nodes and managing enormous volumes of data. It is a major issue to make sure the network can scale to meet these needs.

Interfaces: WSNs are typically put in locations where there is a lot of wireless device interference. As a result, it could be difficult to ensure dependable communication between sensor nodes.

Reliability: WSNs are frequently employed in essential applications, such as regulating industrial operations or monitoring the environment, due to their dependability. It is a significant challenge to make sure the network is dependable and capable of operating well in all scenarios.

WSN components include:

Sensors: In a WSN, sensors are used to record ambient variables as well as collect data. Electrical signals from sensors are transformed.

Given the name, a sensor node includes more than just the sensing element. It also has other crucial features, including the ability to process recorded data, connect to servers, and store recorded data. All these characteristics, components, and enrichments make a sensor node responsible for data collection, correlation, and merging information via additional sensors using its individual data and network analysis.

Radio Nodes: The radio nodes receive the data produced by the sensors and deliver it to the WLAN access point. It is made up of a transceiver, external memory, a power source, and a microcontroller.

WLAN access point: It receives information given wirelessly, usually over the internet, by radio nodes.

Evaluation Software: The information obtained by the WLAN Access Point is examined by a programme called Evaluation Software in order to provide the users with a report for additional processing of data that can be used for processing, analysis, retrieval, and data mining.

WSN's challenges include:

Service Level Quality
Risk to security
Efficacy of Energy
ability to deal with node failure and network throughput performance
Optimisation across layers
ability to scale up for large-scale deployment

Network Architecture for Wireless Sensors

The architecture of a WSN typically consists of three layers: the physical layer, which consists of the data connection layer, and the software layer.

The physical layer is in charge of giving the nodes a direct physical link to the base station. In addition to other technologies like infrared and Bluetooth, it often consists of radio waves.
A logical connection between the nodes and the base station is provided by the data link layer. Protocols like the IEEE 802.15.4 protocol are a common part of it.
Giving the nodes the capacity to connect with the base station is the responsibility of the application layer. Ordinarily, it consists of protocols like the ZigBee protocol.

TYPES OF WIRELESS SENSOR NETWORK:

Networks of Wireless Sensors: Types

According to the surroundings, there are five different kinds of wireless sensor networks. Various WSN types include:

1. Terrestrial Wireless Sensor Networks (WSNs): Wireless Sensor Networks (WSNs) on the Ground Terrestrial WSNs, made up of thousands of wireless sensor nodes planted on their own or in advance, are used to effectively connect with base stations on the ground. The sensor nodes are scattered randomly around the intended area and are thrown on a specified plane in an unstructured mode (ad hoc).

Thousands of wireless sensor nodes are deployed either ad hoc (unstructured) or systematically (structured) as part of terrestrial WSNs, which are used to effectively communicate with base stations. Sensor nodes are dropped from a fixed plane into a target area in an ad hoc manner, distributing them randomly throughout the space. Optimal placement, grid layout, and 2D and 3D placement models are all considered in a structured or preplanned manner.

Solar panels are mounted on a battery in WSNs as an alternative source of energy, despite the limited battery power. The WSNs achieve energy conservation through low duty cycle operations, optimum routing, minimising delays, and other techniques.

2. Wireless sensor networks that are underground: Basement WSNs are much more costly than WSNs that are on the surface because of installation, maintenance, hardware expenses, and meticulous scheduling.

Underground Wireless Sensor Networks (UWSNs) are made up of a number of sensor nodes that are placed in the ground to track conditions underground.

Added sink nodes are positioned above the bottom to transfer data from the sensor nodes to the base station, making it challenging to recharge these embedded underground WSNs.

Additionally challenging to recharge are the sensor battery nodes with low battery capacities. Wireless communication is very difficult in the underground environment due to the significant attenuation and signal loss levels.

Wi-Fi sensor networks under the ground In order to monitor conditions underground, UWSNs are made up of numerous sensory nodes that are buried in the earth. Multiple sensor nodes that are buried in the ground make up WSN networks, which keep an eye on conditions there. There are more sinking nodes at the bottom to transport data from each sensor node to the ground station. These subsurface WSNs must be concealed under the ground, making it difficult to recharge them. The base station receives data from the sensor nodes via additional sink nodes that are positioned above the surface.

 3. Wireless underwater sensor networks: Over 70% of the earth's surface is submerged by water. These networks include numerous underwater vehicles and sensor nodes. Data collection from these sensor nodes is carried out by autonomous underwater machines and vehicles.

Communication underwater may be difficult due to a long propagation delay, limited bandwidth, and sensor failures. WSNs have a limited battery that cannot be replaced or recharged underwater.

The development of underwater networking and communication methods is necessary to address the challenge of energy conservation for underwater WSNs.

4. Multimedia Wireless Sensor Networks: These networks are suggested to enable the tracking and monitoring of multimedia events, such as audio, video, and imaging.

These networks contain inexpensive sensor nodes with cameras and speakers. For data retrieval, data compression, and data correlation, these multimedia WSN sensory nodes are interconnected via a wireless network.

A few of the challenges with multitasking WSNs include enormous bandwidth demands, substantial power usage, manufacturing, and methods for compression.

Additionally; substantial bandwidth is required for the correct and efficient delivery of multimedia materials.

5. Wireless Mobile Sensor Networks (MWSNs): MWSNs are networks of mobile sensor nodes that may move freely and communicate with the outside world. The mobile nodes are capable of computation, sensing, and communication.

The flexibility of mobile wireless sensor networks is far greater than that of static sensor networks. Better and more enhanced coverage, increased channel capacity, more energy efficiency, and other advantages distinguish mobile WSNs from static WSNs.

Wireless sensor network classification

Wireless sensor networks are categorised as follows:

1. Static and mobile WSN: In many applications, all sensor nodes are connected to static networks since they do not move. Mobile sensor nodes are needed for some applications, notably in biological systems. They're known as "mobile networks." A form of mobile network is animal surveillance.

2. The deterministic theory and unpredictable WSN: According to the deterministic theory, wireless sensor networks have predetermined and calculated placements for the sensor nodes.

There are just a few applications where sensor nodes can be deployed. Due to a number of reasons, such as hostile operating conditions or severe settings, it is impossible to determine the position of the sensor nodes. Such non-deterministic networks require a complicated system.

3. Multiple base stations and a single base station WSN: A solitary base station A single base station is utilised by WSNs, and it is situated close to the area of the sensor nodes.

A sensor node can send data to the nearest central station in a multi-base station WSN since numerous base stations are used. With this base station, all nodes are in communication.

4. Fixed and portable base stations WSN: It is comparable to sensor nodes in that even the base stations can be stationary or mobile. A permanent position, typically near the sensing area, is present in a static base station.

As a result of the balanced load on the sensor nodes, the portable base station WSN moves throughout the area of sensing.

5. One-hop and multi-hop WSN

In a multi-hop network, connected nodes and cluster managers are used simultaneously to transmit the data in order to conserve energy, compared to a single-hop network where sensor nodes can be set up to point directly at the central station.

6. Self-Configurable and Non-Self-Configurable
A control unit is required for data collection in a non-self-configurable network since sensor networks are unable to configure themselves inside the network. With the help of other sensor nodes, the sensor nodes in wireless sensor networks collaborate to maintain and organise the network and complete the task at hand.

7. Heterogeneous and homogeneous
All sensor nodes in a homogeneous wireless sensor network primarily have comparable levels of energy usage, storage capacity, and processing power. Different sensor nodes in a heterogeneous network need different amounts of computation and energy. Consequently, the processes involved in processing and communicating are separated.

CHARACTERISTICS OF WSN:

A WSN's crucial traits include the following.

  • Limitations on sensor node power usage.
  • Ability to deal with node failures.
  • The nodes' mobility.
  • Diversity among the nodes.
  • Uniformity among nodes.
  • Capacity for large-scale deployment.
  • Endurance in adverse environmental circumstances.
  • Facilitates simple use.

These are a few of the most significant and typical properties of WSN. However, the properties of wireless sensor networks for diverse applications may be very varied. They may also possess similar traits.

Two properties of sensor nodes have been defined.

  • Static features
  • Dynamic Features

Although we have already highlighted a few features, our current concentration is mostly on these two traits.

Static features having a large number of fixed parts in a network is really a popular strategy in situations where the network is constant, or fixed, over space, such as smart buildings, physical infrastructure, or technical investigations. The stationary components would be wired to a constant power source so that wireless components could send data to them using little power and nodes could move.

Dynamic Features when the current topology is no longer optimal, a dynamic active care strategy generates a new one "on the fly" using an initiating technique. The system becomes more energy-efficient as a result of its ability to build an active prior version. Low power consumption, minimal physical security, and a broadcast physical medium are characteristics of these networks. It is not recommended to use asymmetric techniques like RSA because they are ineffective and use excessive energy.

A few characteristics that are relevant numerous qualities could be application-dependent. It might be appropriate or not given much thought in some applications, depending on the situation. Thus, only a few traits are widespread.

The following are some frequent traits to keep in mind when using WSN to create various apps:

  • Efficiency of power
  • Small power
  • Responsiveness and energy limitation
  • Reliability
  • Compressed data
  • Scalability Mobility

Power usage

The taking in of power restrictions for battery-powered nodes. The restricted power resources present many difficulties for sensor networks. The size of the battery is constrained by the size of the nodes. The concerns of effective energy use must be properly taken into account throughout software and hardware design. When using non-rechargeable batteries to power WSN nodes, specific power-management techniques are required.

The three components of the node's power-consuming features must be noted. They are the radio transceiver unit, the digital processor unit, and the sensing circuitry.

Energy is needed for bias waves, amplifiers, and digital filtering in the atmospheric green sensors and the ADC, which make up the sensor networks.

The implementation of the protocol stack and digital signal processing of collected data are typically done on a node's digital processing circuits.

The wireless communication between radio transceiver units, additional nodes, and a distant base station is made possible by a network processor, which packetizes and encodes the data for security and durability.

Low power

Designing wireless sensor nodes with low power consumption—hence the term "low power"—is crucial for achieving a longer lifespan for WSN. Low-power electronics can lower overall power usage. WSN limits the current draw while the devices are "sleeping" and regulates their "awake time," or active time.

Devices like radios or microcontrollers fall within this category. By altering the power setting modes of the devices, such as "always on," "standby," or "hibernation" modes, these networks achieve this. Different power setting modes may be employed with the nodes and their components depending on the situation.

WSN attack types

Wireless sensor networks are vulnerable to a variety of assaults. There are several other measures that can be used to counter these attacks. Attacks are divided into two categories: active attacks and passive attacks.
In an active-type attack, the attacker tries to change or disconnect the network-transmitted messages.

In order to disrupt network operations or otherwise result in a refusal of service, an attacker can reply to previous messages and also insert his own traffic.

The method of passive attack can be limited to listening to and analysing exchanged traffic. Therefore, while it may be difficult to see, this type of attack may be simpler to identify. Since the attacker does not alter the data that is being sent. The attacker's objective is to obtain sensitive information in order to devalue the network's important nodes' data by looking at routing information.

  1. Tampering
  2. Attack using identity replication
  3. Blackhole
  4. wormhole assault
  5. Selected forwarding
  6. Exhaustion
  7. assault by Sybil
  8. Attack with blackmail
  9. Hallo, flood attack
  10. Jamming

Mobility Types in Wireless Sensor Networks

Mobility is a fundamental characteristic of all nodes in ad hoc networks. Mobility in WSNs generally exists to divide the network's components, and it is more explicitly dependent on the application. Applications for wireless sensor networks have been used in a variety of fields, but mobility has not always been a factor.

Thus, where wireless sensor networks are employed, mobility is crucial. We can distinguish three different kinds of mobility in WSNs using the following criteria:

Mobility of sensor nodes
Mobile Sin nodes
movement of a watched object or event
when a sensor node's tiniest constituent is mobile, the first sort of mobility, or sensor node mobility, mostly occurs. A circumstance where sink nodes are able to move independently within the monitored region in order to gather data from the sensor network is referred to as the "second type of mobility." The third form of mobility is the most common when a wireless sensor network is employed for tracking or monitoring tasks and operates according to the event-driven data model.

Similar to this, once a target is being tracked by a wireless sensor network, modelling the movement of the target can be very helpful in predicting the pattern and volume of data that will be produced while the target is being tracked.

WSN challenges

The following are some of the difficulties that wireless sensor networks face:

  1. Performance Scalability of Faults
  2. Production Price Operating Conditions
  3. Level of service
  4. Data Combination
  5. Data Latency and Data Compression

Wi-Fi Sensor Networks: Problems

Wireless sensor networks include a variety of problems, including topology problems, design problems, and others. Numerous types of wireless sensor networks have various design difficulties, most notably:

  1. Small delay
  2. Deficiencies in Fault Coverage
  3. Scalability of Transmitting Media

    Wireless sensor networks have the following topological problems:Mapped Coverage Topology for Sensor Holes

A wireless sensor network has the following main problems:

The WSN's performance and design are primarily impacted by these problems.

Hardware and Operating System for WSN Middleware
Aspects of Wireless Radio Communication Systems for Medium Access Deployment
Localization
Smart Network Models for Programming
Synchronisation Architecture Calibration
querying and being database-focused
Data Dissemination and Aggregation at the Network Layer
Transmission Layer

Limitations

The following are some restrictions placed on wireless sensor networks:

  1. Simply have a few hundred kilobytes of storage space.
  2. Low processor speed (8 MHz) Limited communication range
  3. high power consumption
  4. requires little energy and limits methods
  5. possess batteries with a limited lifespan.
  6. Devices that are passive use little energy.

WSN TOPOLOGIES:

The topologies used by WSNs include star, tree, mesh, hybrid, and others. The benefits and downsides of WSN can then be inferred by understanding the advantages and disadvantages of various topologies. WSN also makes use of several basic wireless technologies. As a result, it is possible to talk about the advantages and disadvantages of various technologies, including WiFi, WiFi 6, Z-wave, and Zigbee.

Four typical topologies for sensor networks exist:

  1. Direct-to-user network
  2. Network star
  3. network of trees
  4. Meshed network
  5. Each of them will be briefly discussed.

Network Topology, Point To Point

There is no central hub in this topology. Direct communication is possible between nodes. This topology is the most prevalent and contains a single data communication channel, providing a secure communication method. Each device can perform the roles of a client and a server.

The Star Network Topology

A centralised communication hub is present in a star network, in contrast to point-to-point networks. There is no direct connectivity between nodes; every interaction must go through this main core. In this instance, the server is the central hub, and the nodes are the clients.

Theory of Tree Networks

The point-to-point and star topologies in this topology are considered to be combined. Root nodes or parent nodes are the terms used to describe the network's core centre. To the parent node, information is transmitted from leaf nodes. Less power usage relative to other networks is this topology's key benefit.

The Mesh Network Topology

Data in the mesh network can 'hop' from one node to another. Without requiring a centralised communication hub, all of the nodes can communicate with one another directly. A single point of failure cannot exist in this arrangement, making it the most reliable for network communication. However, the complexity and energy usage of this structure are enormous.

WSN Applications:

There are many different types of sensors that can be used in wireless sensor networks, including low-sampling-rate ones, seismic, magnetic, thermal, visual, infrared, radar, and acoustic ones. These sensors are cleverly designed to monitor a variety of environmental conditions.

For continuous sensing, event identification, event detection, and local actuator control, sensor nodes are employed. Applications for wireless sensor networks are mostly found in the health, military, environmental, residential, and other commercial sectors.

  • Uses in the military
  • Uses for Health
  • Ecological Applications
  • Household Programmes
  • Applications in Business
  • area observation
  • monitoring of health care
  • Earth/environmental sensing 

Air pollution

  1. Monitoring and spotting forest fires
  2. Identifying landslides
  3. monitoring of water quality: industrial monitoring

1) Operating a Disaster Relief

Drop the sensor nodes from an aircraft onto the fire if it is reported that a region has had a disaster of some kind, such as a wildfire. To develop effective strategies and methods for fighting the fire, track the data from each node and create a temperature map.

2) Applications from the Military

In military operations, the WSNs are particularly helpful for detecting and observing friendly or hostile movements because they can be quickly deployed and are self-organised. In case more supplies, personnel, or ammunition are required on the battlefield, the sensor nodes can be used to monitor the situation. Through the sensor nodes, attacks that are chemical, nuclear, and biological can also be discovered.

EX: The "sniper detection system" is an example of one that can do this. It uses sound sensors to detect approaching fire and uses processing to determine the shooter's location.

3) Developments in the Environment

In the environment, there are a tonne of uses for these sensor networks. Animals and birds can be observed and recorded moving about with these devices. Using these sensors, it is possible to monitor the earth, the soil, the atmosphere, irrigation, and precision farming. Detecting earthquakes, fires, floods, chemical and biological outbreaks, and other natural disasters is another use for them.

EX: Zebra net is a well-known illustration. This system's goal is to track and keep track of the zebras' movements and their interactions with one another and with other species as well.

  1. Maintaining and managing the air quality,
  2. Traffic conditions should be watched for and managed.
  3. Tracking and controlling weather conditions.
  4. A mechanism for monitoring the environment's conditions.

Autonomy.  For the duration of the deployment, batteries must be able to power the weather stations.

Reliability.  For the network to avoid unplanned crashes, processes must be straightforward and predictable.

Robustness.  The network must take into consideration a variety of issues, including hardware malfunctions and poor radio connectivity (for instance, in the event of snowfall).

Flexibility.  According to the demands of the applications, it must be possible to swiftly add, relocate, or remove stations at any moment.

4) The medical applications

Utilising WSNs, a patient can be continuously monitored in health applications. Animal behaviour can be observed, as can its internal workings. One can do diagnostics. Additionally, they support monitoring both patients and doctors as well as keeping an eye on how drugs are administered in hospitals.

Ex: An illustration of this is the "artificial retina," which aids the patient in recognising light and the movement of objects. Along with counting individual items, they can locate objects.

5) Applications for homes


For seamless operation and satisfactory performance, technology is finding its way into our home appliances as it develops. These sensors are used by water monitoring systems as well as refrigerators, microwaves, hoover cleaners, and security systems.

6) Supervising Industries

The creation of monitoring and supervisory control tools is an area of research that many scientists are interested in because of the developments in wireless communication, microelectronics, digital electronics, and highly integrated electronics, as well as the growing demand for more efficient regulated electric systems.

7) Smart structures

With the development of smart homes, wireless sensor networks (WSN) have become essential and have been shown to be a permissive technology for assisted living. WSNs are rated suitable for installation in domestic settings for a variety of purposes.

8) Logistics

The previous ten years have seen tremendous development in the multi-player industry of logistics. Taking food delivery as an example.

The application scenario depicted in Figure 9 involves the connection of wireless sensor network nodes to products, primarily food due to their perishable nature. The commodities must self-organise and create a network of nodes before they can be loaded from a storeroom or warehouse onto a good carrier vehicle.

The information about the commodities between one state and another can then be forwarded by this network of nodes using a gateway (such as a telematics unit). Wireless sensor networks unquestionably assist logistics. The logistics demands for relevant WSNs, however, are difficult.

WSN BENEFITS: 

Because it is adaptable, additional nodes or sensors can be installed at any time.
Physical barriers can affect it, and it is flexible.

Access to every WSN node is possible via a centralised monitoring system.
It is wireless by nature, so there is no need for wires or connections. A wired network is separate from a wireless network.
Numerous industries, like mineral extraction, medical care, surveillance, and agriculture, can make substantial use of WSNs.
It uses a number of security methods that are compatible with the underlying wireless technology and provides customers and users with a reliable network as a consequence.

 It uses a variety of security measures that are compatible with the underlying wireless technology to provide a reliable network for customers or users.

Drawbacks of WSN:

It can be hacked because it is wireless.
It can't be used for high-speed communication because it was built for low-speed applications.
It's a pricey investment, and hardly everyone can afford to build such a network.
There are many things to take into account when designing a WSN, including energy efficiency, bandwidth limitations, node prices, rollout strategy, software and hardware design constraints, and more.
In a WSN with a star topology, a breakdown of the main node results in the disintegration of the whole network.

Conclusion:

A new field of study in sensor networks called routing includes a small but rapidly expanding body of research findings. In this study, we provide a comprehensive examination of sensor network wireless routing techniques.

They are all working towards the same goal of attempting to prolong the sensor network's lifespan while simultaneously avoiding compromises in data transmission. Routing protocols that are based on network structure and protocol operation make up the majority of routing approaches.

The three types of routing protocols—flat-based, hierarchical-based, and position-based—can be categorised according to the structure of a network. Some protocols are further broken down into different types of routing strategies based on how they function, including technique-based, agreement-based, question-based, comprehensible-based, QoS-based, and non-coherent-based routing strategies. The benefits and shortcomings of each routing approach are also highlighted.

There are still numerous problems that need to be resolved in sensor networks, despite the fact that many of these routing strategies appear to be promising. Key WSN-related topics will be covered from the application, design, and technological angles. In addition to the application requirements, we must take into account a variety of characteristics when developing a WSN, including flexibility, energy efficiency, fault tolerance, high sensing fidelity, cheap deployment costs, and rapid deployment. We anticipate that the large range of potential applications will make sensor networks a crucial aspect of our daily lives in the future. The implementation of sensor networks must, however, adhere to a number of requirements, including scalability, cost, hardware, topology modification, environment, and power consumption. Given how severe and particular to sensor networks these limitations are, unique wireless ad hoc network protocols are required.

With wireless sensor networks, it is possible to build an intelligent network that can handle applications that develop in response to user needs. Wireless sensor networks have the potential to create a smart communication paradigm.

In the near future, we anticipate that WSN research will have a significant impact on how we live our daily lives. It will, for instance, design a system for ongoing physiological signal monitoring while patients are at home. As a result, patients will have access to the highest standard of medical treatment in the comfort of their own homes at a lower cost than now required for patient monitoring and increased physiological data utilisation efficiency. It will therefore prevent the anxiety and inconvenience brought on by a protracted hospital stay.