SlideShare a Scribd company logo
1

]Rushin $hah

February 27, 2014
Localization & Management
of Sensor Networks
Unit - 4
WSN

2

]Rushin $hah

February 27, 2014
Localization & Management
of
Sensor Networks

» Localization in Sensor Network
»Network Management Requirement
»Network Management Model
»Design Issue
» Energy Harvesting in Sensor N/W

3

]Rushin $hah

February 27, 2014
Network Management for Wireless Sensor Networks
Unit 9 of book

4

]Rushin $hah

February 27, 2014
Network Management Requirement
A computer communication network generally consists of three components:





Physical devices


Links (wireless or wired link),



Network nodes (hub, bridge, switch, or router), and



Terminals and Servers;



Protocol; and



Information that is being carried, including applications.

However, the physical devices and protocols are not sufficient to support



effective operation of a communications network.
Network Management (NM) tools and techniques are also required to



help provision network services & ensure co-operation of entities in the network.
5

]Rushin $hah

February 27, 2014
Reasons for Management Function
The reasons for management functions are mainfold and may be
summarized as follows:
 There are many heterogeneous devices and software entities that
comprise the network, and some may fail.
It is the NM responsibility:
- To determine when, where, and why the fault had occurred
- & how to restore these entities.
 ‘Optimization of system performance’ as a distributed system require
NM to collaborate in the process.
For example, in some networks,
Congestion Control through admission control,
by changing routes or through device upgrade
Occurs/done by NM functions.



6

]Rushin $hah

February 27, 2014
Reasons for Management Function
Cont…





For most networks, NM functions


can be used to gather and analyze the behaviour of user
interaction during network interface,



which is very important in planning the long-term evolution of

network capacity and its performance.

7

]Rushin $hah

February 27, 2014
NM : Set of Functions
Network management consist of a set of functions:






Detection of Network faults and abnormalities,



Manage, Control, and Help configured Network components,



Maintain normal operation, and



8

Continuous monitoring of Network status,

Improve Network efficiency and application performance.

]Rushin $hah

February 27, 2014
Why NM, considered as an Application?
To perform the previous tasks, NM needs to





collect real-time information in network devices,



analyze the information, and



apply control based on the information.

Information is often organized as a Management Information Base (MIB) in



each network device.

Usually, there is an Agent in each device





To collect the information and



Report to a network management centre.

Therefore,



“Network Management can be considered as an application.”
9

]Rushin $hah

February 27, 2014
Simple Network Management Protocol


For managing networks, SNMP is broadly use today.



It includes three components:






Network Management System (NMS),
Managed Elements, and
Agents.

Role of NMS :





10

NMS is a set of applications that monitor and/or control managed
elements.
NMS can request management information/attributes from the
agent.
NMS present the results to NM users in figures/tables form.
NMS can also set attributes within the agent.
]Rushin $hah

February 27, 2014
Simple Network Management Protocol


Role of Managed Element :


“ The managed elements are the network devices that are managed ”.



SNMP agents run on each managed element.



The managed elements:
 Collect &

 Provide


Store management information in the MIB and

access through SNMP to the MIBs.

Examples: of managed elements include:
 Routers,
 Switches,

SwRo SeHo

 Servers, and
 Hosts.
11

]Rushin $hah

February 27, 2014
Simple Network Management Protocol


Role of Agents :


SNMP agents are management software modules that reside on

managed elements.


The Agents:


Collect and Store the state of the managed elements



Translate this information into a form compatible with SNMP
MIB.



Exchanges of network management information are through
messages called protocol data units (PDUs).



PDU are sent to nodes and
contain variables that have both attributes and values.

12

]Rushin $hah

February 27, 2014
Simple Network Management Protocol


The SNMP defines five types of messages or PDUs:


Two deal with the reading terminal,



Another two handle terminal configuration, and



The fifth is Trap, used to monitor events in the managed elements.



Each PDU contains both Attributes and Values.



Importance of PDU:


NM information can be exchanged through the PDUs in order to
monitor the managed elements.

13

]Rushin $hah

February 27, 2014
Simple Network Management Protocol


Advantages of SNMP:


Its very simple and widely deployment.



In SNMP version 3 it can obtain more information by a pair of PDUs
such as (GetBulkRequest and GetResponse).

14

]Rushin $hah

February 27, 2014
Simple Network Management Protocol


Disadvantages of SNMP :


It consumes considerable bandwidth since it often gets only one

piece

of

management

information

at

a

time:

GetRequest

(GetNextRequest) and GetResponse.


Due to the usually large number of managed elements, large

bandwidth consumption still exists.


It only manages network elements; it does not support network-level
management.

15

]Rushin $hah

February 27, 2014
Telecom Operation Map


It is proposed by TeleManagement Forum.



It is based on the

Service management


Network management process models.

TOM presents a model for telecommunications management for
network and service management and a view of ‘‘operations.’’



IDEA:
To introduce processes comprising operations and their automation.



TOM only provides a framework for service management.

16

]Rushin $hah

February 27, 2014
Telecom Operation Map : Levels / Layers


Vertical Layers for service management:



Service Development and Operations, and





Network and Systems Management,

Customer Care Process.

Horizontally Layers for service management


Service Fulfilment,



Service Assurance, and



Service Billing.

17

]Rushin $hah

February 27, 2014
Funda


Neither SNMP nor TOM is designed particularly for wireless sensor
networks.



However, by utilizing


The Simplicity of SNMP and



The Layered Framework of TOM

Design of effective & efficient n/w management architecture for
Wireless Sensor Networks is possible.

18

]Rushin $hah

February 27, 2014
Network Management Design Issues


Requirement of NM in WSN:


WSN is a special type of wireless network:
 possibly with

ad hoc structure and

 probably with


limited resources.

Due to these WSN constraints: networking protocols, the application

model, middleware and sensor node OS (operating systems) should
be designed very carefully.


So here, Network management for WSNs is required to use those

limited resources effectively & efficiently.

19

]Rushin $hah

February 27, 2014
The number are
issue

Network Management Design Issues


Importance of NM in WSN: is for following reasons: (Design Issue)
1. In order to deploy an Adaptive and Resource-Efficient algorithm in
WSNs, the current resource level needs to be gathered through network
management.
- For example: the power availability should be known before switching a
sensor node from active (or sleep) mode to sleep (or active) mode.
- Most traditional networks do not have these requirements.
2. Collaboration and Cooperation between sensor nodes are required to
optimize system performance.

- Network management is an effective tool to provide the platform
required for this purpose.
20

]Rushin $hah

February 27, 2014
The number are
issue

Network Management Design Issues
3. Most WSN applications need to know the coverage area so that they
ensure that the entire space is being monitored.

- Topology management can be used in case an uncovered area is
detected.
- Approaches to increasing the coverage area:
I.

Increase the node’s radio power,

II.

Increase the density of deployment of senor nodes, and

III.

Move the sensor nodes around to achieve equal distribution.

4. Nodes in WSNs are usually arranged in an ad hoc manner.
- The parameters of this ad hoc network are obtained by the network
management system.
21

]Rushin $hah

February 27, 2014
For Reference



An issue is whether in the meanwhile, any of the existing network
management solutions (e.g., SNMP, TOM) can be used for WSNs.



SNMP is often used to manage network elements such as switches and
routers.



It uses GetResponse and GetResponse PDUs to collect information
from network elements.



In SNMP, a local management agent should run in each managed
element.



The local agent is a static and passive agent that receives commands
from a manager and returns the corresponding response.

22

]Rushin $hah

February 27, 2014
For Reference



It can also issue Trap messages to the manager when the managed element
encounters a preconfigured event.



Agents in different network elements are independent, and there is not
collaboration among them.



TOM is a new operation and management model that provides a layered
architecture for management and administration.



Each layer has a different management function and set of managed
objects.



TOM can be used to manage most tasks, from the underlying physical
network element to the entire network, as well as the services provided.
23

]Rushin $hah

February 27, 2014
For Reference



SNMP

provides

management,

five

management

configuration

functions:

management,

fault

accounting

management, performance management, and security management;
and


TOM, the management functions are layered in network element
management, network management, and service management.



In each layer, different management functions are embodied.



WSNs need some of these management functions.



Therefore, WSNs need layered management architecture with different
management functions in each layer.
24

]Rushin $hah

February 27, 2014
For Reference



The issue of management architecture for WSNs should also be considered carefully.



A network management platform consists of three major components: manager, agent,
and MIB.



The manager is used to manage and control the entire network and works as an interface
to other systems.



The agent is located in managed elements.



MIB is an object-oriented structured tree that informs the manager and agent about the
organization of management information.



A standardized MIB guarantees that the management products from different vendors
interconnect.



The manager receives management information and commands the managed elements
using a SNMP-like method or mobile-agent-based entities.
25

]Rushin $hah

February 27, 2014
For Reference



The method of accessing management information and the placement
of the manager or agent usually determines the management

architecture.


The agent-based method can save bandwidth since it can report only
final management information.



Although WSNs have a centralized data collecting point (sink), they
are more like distributed networks.



As a result, agent-based hybrid management architectures might be
more suitable for WSNs.

26

]Rushin $hah

February 27, 2014
For Reference



In WSNs, management information can be used to improve system
performance.



For example, if the network management system detects a
dysfunctional sensor node, it can command another sensor node to
take over.



So the issue of integration of network management with the functions
of network protocols and algorithms becomes critical.

27

]Rushin $hah

February 27, 2014
Which factors should be consider
while designing a
Network Management Protocol ?

28

]Rushin $hah

February 27, 2014
Special Features of WSNs in NM function.


Management solutions should be energy efficient, using as little wireless
bandwidth as possible since communication is highly energy demanding.



Management solutions should be scalable. This is especially important
since in future WSNs may consist of tens to thousands of nodes.



Management solutions should be simple & practical since WSNs are
resource-constrained distributed systems.



MIB for WSNs should contain a general information model for sensor
nodes, features of WSNs and WSN applications.



Management solutions for WSNs should provide a general interface to
the applications since applications can perform better when able to access

management information.


Management solutions should be implementable as middleware.

29

]Rushin $hah

February 27, 2014
MANNA : Management Architecture


An optimization problem for monitoring, management provides the
monitoring regions given that the ‘battery and energy consumption rate



for each sensor are known beforehand’.
MANNA
is
a
management
architecture for WSNs proposed by
Ruizetal.



The architecture considers three
management dimensions:



Management Levels, and


30

Management Function Areas,

WSN Functionalities
]Rushin $hah

February 27, 2014
MANNA : Management dimensions
Management Function
Five types of traditional management functions similar to SNMP:

Areas

Management Levels

Similar to those in SNMP

Similar to those in TOM



Fault mng,



Network Element,



Configuration mng,



Network Element Management,



Performance mng,



Network Management,



Security mng, and



Service Management, and



Accounting Management



Business Management.

NOTE: Configuration management has a notably more important role in
MANNA, where all other functions depend on it.
31

]Rushin $hah

February 27, 2014
MANNA : Management dimensions


A number of other functions are proposed by MANNA:



Maintenance,



Sensing,



Processing, and




Configuration,

Communication.

With the Aim of promoting productivity and integrating the functions of
configuration, operation, administration and maintenance of all elements
and services in a WSN

- MANNA architecture includes three architectural elements:
Functional, Physical, and Informational architectures.
32

]Rushin $hah

February 27, 2014
MANNA : Architectural Element


Functional architecture:
- It provides functions executed in

the management entities (manager, agent, and MIB) and
the location scheme for managers and agents.


Physical architecture:
- It is where functional architecture is implemented.
- MANNA uses a lightweight protocol as a communication interface
between management entities.



Information architecture:
- The Architecture element provides an object-oriented model for
mapping manageable resources and supporting object classes.
33

]Rushin $hah

February 27, 2014
MANNA : Managed Object Classes
 Network (information on network behaviour and features such as data

delivery model, network structure, and mobility),
 Managed elements (such as sensor nodes),
 Equipment (the physical components of sensor nodes),
 System (information on operating system),

 Environment (the environment the WSN is running),
 Phenomenon, and
 Connection.

34

]Rushin $hah

February 27, 2014
MANNA : Common Management Functions


An Environment monitoring functions,



A coverage area supervision function,



A topology map discovery function,



An energy-level discovery function,



An energy map generation function, and several others.

35

]Rushin $hah

February 27, 2014
MANNA : dynamic MIB model


MANNA also provides a dynamic MIB model for WSNs:




A communication coverage area map,



A WSN behaviour model,



A node dependence model,



network topology,




A sensing coverage area map,

residual energy, and so on.

-1st sense then communication
coverage area map.
-Then create two model :
behaviour & node dependence
-Now define network topology
and residual energy

In MANNA, the management functions have the lowest granularity and

can be combined into management services.

36

]Rushin $hah

February 27, 2014
Issues Related to Network Management


The most important issues in Network management are
I.
Naming,
II.
Localization,
III. Maintenance, and
IV. Fault tolerance.

37

]Rushin $hah

February 27, 2014
Meaning of Each Issue
Д

Naming is the scheme used to identify a sensor node.
-An efficient naming scheme can lower computation overhead and

make routing protocol energy efficient.
Д

Localization schemes determine the location of sensor nodes since such
information is important for some sensor applications.

Д

The

maintenance

issue

may

involve

actions

such

as

replacing

batteries, keeping connectivity, and configuring sensor nodes.
-The maintenance activity is used to maintain normal operation of the
entire network for as long as possible.
Д

Several factors can cause faults in network operation, including hardware
and software error. Therefore, different schemes must be implemented to
provide fault tolerance.
38

]Rushin $hah

February 27, 2014
Naming


A node in a networked system is identified through Naming.



This identifier is then used for communication between nodes.



Approaches to Naming:



Low-level naming such as node addresses is typically application
independent but topology and location dependent.
High-level naming is usually application dependent and location
independent.



High-level Naming is built on the top of Low-level Naming.



Communication

between

applications

uses

high-level

naming

only, whereas physical communication relies on low-level naming.


Therefore, a binding mechanism is required to realize mapping
39
bbetween

high- and low-level naming.

]Rushin $hah

February 27, 2014
Naming


For example: the domain name system (DNS) in the Internet uses two
types of naming: a domain name and an IP address.


The domain name is used by applications such as Internet browsers.



The IP address is used by routing protocol to guarantee packet
forwarding.



Domain name and IP addresses are often directed to the same host.
The DNS servers map between domain names and IP addresses.



When a Web site is accessed using a domain name, the application
program requests a corresponding IP address from the DNS so as to
set up low-level communications.

40

]Rushin $hah

February 27, 2014
Naming :


traditional hierarchical naming advantages

Although the traditional hierarchical naming approaches can be used
for WSN, but not efficient compared with application oriented low-level

naming, which has the following advantages:






41

It avoids the overhead resulting from mapping between high- and
low-level naming. This feature is attractive for a sensor since it has
limited resources.
Location-dependent addressing is not required. Since the topology of
WSNs is highly variable due to node mobility, node life span, and
wireless channel quality, a location-dependent address would cause
additional problems.
It enables application-specific processing in the network, such as
data compression and data fusion, which in turn reduces data
transmission.
]Rushin $hah

February 27, 2014


Sensor nodes are usually classified by the type of data they gather.



For sensor nodes that gather only one type of data or can have differing

personalities and gather multiple types of data, one name as their
identifier would be sufficient.


The objective of low-level application naming is to realize energy

efficiency and fault tolerance in a variety of environments.

42

]Rushin $hah

February 27, 2014
Localization


Sensor nodes are distributed all over the place for sensing
and data collection.



It is usually helpful if the locations of sensor nodes are also
known.

43

]Rushin $hah

February 27, 2014
Localization :


Advantages of Location Knowledge

Some applications, such as those for tracking of objects, are highly
location dependent;



Location-based Routing, which may also result in energy conservation
is enabled;



Knowledge of location usually enhances security;



Locations are helpful for sensor network management and monitoring;



Locations stimulate the creation of new applications;



Sensor nodes that move can be controlled through knowledge of their
location; and



For applications with low-level naming and/or data-centric WSNs,
knowledge of location information is absolutely necessary.

44

]Rushin $hah

February 27, 2014
Localization :

Classification

Localization
Algorithm

Centralized
Schemes

Distributed
Schemes

Rangebased
Scheme
45

Range-free
Schemes
]Rushin $hah

February 27, 2014
Localization :


Classification

Centralized Scheme


In this scheme Sensor nodes send control messages to a central node

whose location is known.


The central node then computes the location of every sensor node
and informs the nodes of their locations.



Distributed Scheme


Each sensor node determines its own location independently.



The distributed localization can be further grouped into:



46

Range-based schemes and
Range-free schemes.
]Rushin $hah

February 27, 2014
Localization :


Classification

In the range-based approach, some range information, such as time of
arrival, angle of arrival, or time difference of arrival is required.



The range-free algorithms works as follows:


Several seed nodes are distributed in WSNs.



Seed nodes know their own locations, and they periodically

broadcast a control message with their location information.


Sensor nodes that receive these control messages can then estimate
their own locations.

47

]Rushin $hah

February 27, 2014
48

]Rushin $hah

February 27, 2014
Introduction


The development of large scale distributed sensor system is a
significant scientific and engineering challenge.



By placing sensors close to each other can increase signal quality
at reduce cost.

49

]Rushin $hah

February 27, 2014
Taxonomy of localization


Commonly localization is divided in two major categories
1.

Active Localization

2.

Passive Localization

50

]Rushin $hah

February 27, 2014
Active Localization


Active localization technique emit signals into the environment
that are used to measure range to the target.



These signals may be emitted by infrastructure components or
by targets.



Within this category of active localization there are three
subcategories.
1. Non-cooperative target
2. Co-operative target
3. Co-operative infrastructure
51

]Rushin $hah

February 27, 2014
Non Co-Operative Target


In active Non Co-operative system, system elements (Sensors)
emit ranging signals, which are distorted or reflected in flight by

passive elements.


The system element then receive the signals and analyze them to
deduce their location relative to passive elements of the
environment.



Example includes RADAR System and SONAR systems in robots.

52

]Rushin $hah

February 27, 2014
Co-Operative Target


In co-operative target system, targets emit signal with known
characteristics and other element of the system detects the

signal and use information about signal arrival to deduce the
target’s location.

53

]Rushin $hah

February 27, 2014
Co-Operative Infrastructure


In

co-operative

infrastructure

system,

elements

of

the

infrastructure emit signals that target can receive.


The infrastructure itself is assumed to be carefully configured &
synchronized to simplify the processing done by the target.

54

]Rushin $hah

February 27, 2014
Passive Localization


Passive localization techniques differ from active ones in that
they discover ranges and locations by passively monitoring

existing signals in a particular channel.


The term passive does not imply that they emit no
signals, instead of that the signals they emit are out side the
channel

that

is

primarily

analyzed

for

time-of-flight

measurement.
1. Blind source localization
2. Passive Target Localization
3. Passive Self-Localization

55

]Rushin $hah

February 27, 2014
Blind source Localization


In a blind source localization system, a signal source is localized
without any priori knowledge of the type of signal emitted.



Typically this is done by “blind beam forming”, which
effectively cross-correlates the signals from different receivers.

56

]Rushin $hah

February 27, 2014
Passive Target Localization


Passive target localization system is usually based on coherent
combination of signals, with the added assumption of some

knowledge of the source.


By assuming model for the signals generated by the source,
filtering can be applied to improve the performance of the
algorithm.

57

]Rushin $hah

February 27, 2014
Passive Self Localization


In passive self-localization , existing beacon signals from
known infrastructure elements are used by Target to passively

deduce its own location.

58

]Rushin $hah

February 27, 2014
Localization challenges in
Multi hop ad-hoc sensor Networks


Physical layer challenges



Algorithm Design Challenge
- Noisy measurement
- Computation and Communication trade-offs
- Problem setup

59

]Rushin $hah

February 27, 2014
60

]Rushin $hah

February 27, 2014

More Related Content

What's hot (20)

PPTX
Optical Wavelength converters
FAIZAN AHMAD
 
PPT
Precoding
Khalid Hussain
 
PPT
Hamming codes
GIGI JOSEPH
 
PPTX
WLAN of networking.ppt
Umme habiba
 
PPT
Utran architecture(rashmi)
Dr. ABHISHEK K PANDEY
 
PDF
W-LAN (Wireless Local Area Network)
Parvesh Taneja
 
PDF
Intro to wireless sensor network
Vrince Vimal
 
PPT
Switching
Shankar Gangaju
 
PPT
Multiple access techniques for wireless communications
METHODIST COLLEGE OF ENGG & TECH
 
PPTX
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
Soumen Santra
 
PPTX
LTE ADVANCED PPT
Trinath
 
PDF
2.3 time division multiple access
JAIGANESH SEKAR
 
PPTX
Evolution of wireless generations
Burhan Ahmed
 
PPT
Lecture3 Physical Layer
Waqas !!!!
 
PPTX
Ad hoc networks
Darpan Dekivadiya
 
PDF
2. wireless propagation models free space propagation
JAIGANESH SEKAR
 
PPT
Multiple access techniques
Bibhu Prasad
 
PPTX
TinyOS
Sneha Shodhan
 
PPTX
Turbo codes.ppt
Prasant Barik
 
Optical Wavelength converters
FAIZAN AHMAD
 
Precoding
Khalid Hussain
 
Hamming codes
GIGI JOSEPH
 
WLAN of networking.ppt
Umme habiba
 
Utran architecture(rashmi)
Dr. ABHISHEK K PANDEY
 
W-LAN (Wireless Local Area Network)
Parvesh Taneja
 
Intro to wireless sensor network
Vrince Vimal
 
Switching
Shankar Gangaju
 
Multiple access techniques for wireless communications
METHODIST COLLEGE OF ENGG & TECH
 
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION
Soumen Santra
 
LTE ADVANCED PPT
Trinath
 
2.3 time division multiple access
JAIGANESH SEKAR
 
Evolution of wireless generations
Burhan Ahmed
 
Lecture3 Physical Layer
Waqas !!!!
 
Ad hoc networks
Darpan Dekivadiya
 
2. wireless propagation models free space propagation
JAIGANESH SEKAR
 
Multiple access techniques
Bibhu Prasad
 
Turbo codes.ppt
Prasant Barik
 

Similar to Localization & management of sensor networks (20)

PPTX
Network Mnagement for WSN
@zenafaris91
 
PPTX
14 coms 525 tcpip - applications - snmp
Palanivel Kuppusamy
 
PPT
Network management
Mohd Arif
 
PPT
Design of Management Application
Yatish Bathla
 
PDF
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Abdullaziz Tagawy
 
PDF
Network Management 2nd Edition Mani Subramanian
aysellmesxo
 
PPTX
Network management systems in large enterprise
Nour Eldeen Mahmoud Khalifa
 
PPTX
SNMP: A Critical Protocol for Effective Application Layer Network Management
shereenpriscilas1
 
PPTX
Network management ppt
DheerajPachauri
 
PPT
3b716 nms 1
Vandana Jagdish
 
PPTX
Network Management - IntroductionIntorduction to network management
ssuser2f3ce7
 
PPT
(Snmp) simple network management protocol
Gouasmia Zakaria
 
DOC
Performance management strategy
katharine300
 
PPT
Configuration of IoT devices - Systems managament
BharaniDharan195623
 
PPT
Functional Areas of Network Management Configuration Management
jeronimored
 
PDF
Widyatama.lecture.applied networking.iv-week-12.network-management
Djadja Sardjana
 
PPT
unit5NtwManagement.ppt
RevathiMohan14
 
PDF
009694598.pdf
EidTahir
 
PPTX
snmp
حسن رشید
 
PPTX
Summer training at WIPRO
prerna setia
 
Network Mnagement for WSN
@zenafaris91
 
14 coms 525 tcpip - applications - snmp
Palanivel Kuppusamy
 
Network management
Mohd Arif
 
Design of Management Application
Yatish Bathla
 
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Abdullaziz Tagawy
 
Network Management 2nd Edition Mani Subramanian
aysellmesxo
 
Network management systems in large enterprise
Nour Eldeen Mahmoud Khalifa
 
SNMP: A Critical Protocol for Effective Application Layer Network Management
shereenpriscilas1
 
Network management ppt
DheerajPachauri
 
3b716 nms 1
Vandana Jagdish
 
Network Management - IntroductionIntorduction to network management
ssuser2f3ce7
 
(Snmp) simple network management protocol
Gouasmia Zakaria
 
Performance management strategy
katharine300
 
Configuration of IoT devices - Systems managament
BharaniDharan195623
 
Functional Areas of Network Management Configuration Management
jeronimored
 
Widyatama.lecture.applied networking.iv-week-12.network-management
Djadja Sardjana
 
unit5NtwManagement.ppt
RevathiMohan14
 
009694598.pdf
EidTahir
 
Summer training at WIPRO
prerna setia
 
Ad

More from Rushin Shah (10)

PPTX
COLEA : A MATLAB Tool for Speech Analysis
Rushin Shah
 
PPTX
Marker Controlled Segmentation Technique for Medical application
Rushin Shah
 
PPTX
Image feature extraction
Rushin Shah
 
PPTX
Visual pattern recognition
Rushin Shah
 
PPTX
Control aspects in Wireless sensor networks
Rushin Shah
 
PPTX
Transport control protocols for Wireless sensor networks
Rushin Shah
 
PPTX
Wireless sensors networks protocols part 2
Rushin Shah
 
PPTX
Wireless sensors networks protocols
Rushin Shah
 
PPTX
Basics of Wireless sensor networks
Rushin Shah
 
PPTX
6. security in wireless sensor netwoks
Rushin Shah
 
COLEA : A MATLAB Tool for Speech Analysis
Rushin Shah
 
Marker Controlled Segmentation Technique for Medical application
Rushin Shah
 
Image feature extraction
Rushin Shah
 
Visual pattern recognition
Rushin Shah
 
Control aspects in Wireless sensor networks
Rushin Shah
 
Transport control protocols for Wireless sensor networks
Rushin Shah
 
Wireless sensors networks protocols part 2
Rushin Shah
 
Wireless sensors networks protocols
Rushin Shah
 
Basics of Wireless sensor networks
Rushin Shah
 
6. security in wireless sensor netwoks
Rushin Shah
 
Ad

Recently uploaded (20)

PPT
Talk on Critical Theory, Part One, Philosophy of Social Sciences
Soraj Hongladarom
 
PDF
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
PDF
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 
PPTX
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
PDF
SSHS-2025-PKLP_Quarter-1-Dr.-Kerby-Alvarez.pdf
AishahSangcopan1
 
PPTX
Stereochemistry-Optical Isomerism in organic compoundsptx
Tarannum Nadaf-Mansuri
 
PPTX
Growth and development and milestones, factors
BHUVANESHWARI BADIGER
 
PPTX
Soil and agriculture microbiology .pptx
Keerthana Ramesh
 
PDF
community health nursing question paper 2.pdf
Prince kumar
 
PPTX
STAFF DEVELOPMENT AND WELFARE: MANAGEMENT
PRADEEP ABOTHU
 
PDF
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
PDF
0725.WHITEPAPER-UNIQUEWAYSOFPROTOTYPINGANDUXNOW.pdf
Thomas GIRARD, MA, CDP
 
PPTX
Pyhton with Mysql to perform CRUD operations.pptx
Ramakrishna Reddy Bijjam
 
PPSX
Health Planning in india - Unit 03 - CHN 2 - GNM 3RD YEAR.ppsx
Priyanshu Anand
 
PPTX
grade 5 lesson ENGLISH 5_Q1_PPT_WEEK3.pptx
SireQuinn
 
PPTX
Cultivation practice of Litchi in Nepal.pptx
UmeshTimilsina1
 
PDF
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
PPSX
HEALTH ASSESSMENT (Community Health Nursing) - GNM 1st Year
Priyanshu Anand
 
PPTX
grade 5 lesson matatag ENGLISH 5_Q1_PPT_WEEK4.pptx
SireQuinn
 
PPTX
How to Create a PDF Report in Odoo 18 - Odoo Slides
Celine George
 
Talk on Critical Theory, Part One, Philosophy of Social Sciences
Soraj Hongladarom
 
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
SSHS-2025-PKLP_Quarter-1-Dr.-Kerby-Alvarez.pdf
AishahSangcopan1
 
Stereochemistry-Optical Isomerism in organic compoundsptx
Tarannum Nadaf-Mansuri
 
Growth and development and milestones, factors
BHUVANESHWARI BADIGER
 
Soil and agriculture microbiology .pptx
Keerthana Ramesh
 
community health nursing question paper 2.pdf
Prince kumar
 
STAFF DEVELOPMENT AND WELFARE: MANAGEMENT
PRADEEP ABOTHU
 
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
0725.WHITEPAPER-UNIQUEWAYSOFPROTOTYPINGANDUXNOW.pdf
Thomas GIRARD, MA, CDP
 
Pyhton with Mysql to perform CRUD operations.pptx
Ramakrishna Reddy Bijjam
 
Health Planning in india - Unit 03 - CHN 2 - GNM 3RD YEAR.ppsx
Priyanshu Anand
 
grade 5 lesson ENGLISH 5_Q1_PPT_WEEK3.pptx
SireQuinn
 
Cultivation practice of Litchi in Nepal.pptx
UmeshTimilsina1
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
HEALTH ASSESSMENT (Community Health Nursing) - GNM 1st Year
Priyanshu Anand
 
grade 5 lesson matatag ENGLISH 5_Q1_PPT_WEEK4.pptx
SireQuinn
 
How to Create a PDF Report in Odoo 18 - Odoo Slides
Celine George
 

Localization & management of sensor networks

  • 2. Localization & Management of Sensor Networks Unit - 4 WSN 2 ]Rushin $hah February 27, 2014
  • 3. Localization & Management of Sensor Networks » Localization in Sensor Network »Network Management Requirement »Network Management Model »Design Issue » Energy Harvesting in Sensor N/W 3 ]Rushin $hah February 27, 2014
  • 4. Network Management for Wireless Sensor Networks Unit 9 of book 4 ]Rushin $hah February 27, 2014
  • 5. Network Management Requirement A computer communication network generally consists of three components:   Physical devices  Links (wireless or wired link),  Network nodes (hub, bridge, switch, or router), and  Terminals and Servers;  Protocol; and  Information that is being carried, including applications. However, the physical devices and protocols are not sufficient to support  effective operation of a communications network. Network Management (NM) tools and techniques are also required to  help provision network services & ensure co-operation of entities in the network. 5 ]Rushin $hah February 27, 2014
  • 6. Reasons for Management Function The reasons for management functions are mainfold and may be summarized as follows:  There are many heterogeneous devices and software entities that comprise the network, and some may fail. It is the NM responsibility: - To determine when, where, and why the fault had occurred - & how to restore these entities.  ‘Optimization of system performance’ as a distributed system require NM to collaborate in the process. For example, in some networks, Congestion Control through admission control, by changing routes or through device upgrade Occurs/done by NM functions.  6 ]Rushin $hah February 27, 2014
  • 7. Reasons for Management Function Cont…   For most networks, NM functions  can be used to gather and analyze the behaviour of user interaction during network interface,  which is very important in planning the long-term evolution of network capacity and its performance. 7 ]Rushin $hah February 27, 2014
  • 8. NM : Set of Functions Network management consist of a set of functions:    Detection of Network faults and abnormalities,  Manage, Control, and Help configured Network components,  Maintain normal operation, and  8 Continuous monitoring of Network status, Improve Network efficiency and application performance. ]Rushin $hah February 27, 2014
  • 9. Why NM, considered as an Application? To perform the previous tasks, NM needs to   collect real-time information in network devices,  analyze the information, and  apply control based on the information. Information is often organized as a Management Information Base (MIB) in  each network device. Usually, there is an Agent in each device   To collect the information and  Report to a network management centre. Therefore,  “Network Management can be considered as an application.” 9 ]Rushin $hah February 27, 2014
  • 10. Simple Network Management Protocol  For managing networks, SNMP is broadly use today.  It includes three components:     Network Management System (NMS), Managed Elements, and Agents. Role of NMS :     10 NMS is a set of applications that monitor and/or control managed elements. NMS can request management information/attributes from the agent. NMS present the results to NM users in figures/tables form. NMS can also set attributes within the agent. ]Rushin $hah February 27, 2014
  • 11. Simple Network Management Protocol  Role of Managed Element :  “ The managed elements are the network devices that are managed ”.  SNMP agents run on each managed element.  The managed elements:  Collect &  Provide  Store management information in the MIB and access through SNMP to the MIBs. Examples: of managed elements include:  Routers,  Switches, SwRo SeHo  Servers, and  Hosts. 11 ]Rushin $hah February 27, 2014
  • 12. Simple Network Management Protocol  Role of Agents :  SNMP agents are management software modules that reside on managed elements.  The Agents:  Collect and Store the state of the managed elements  Translate this information into a form compatible with SNMP MIB.  Exchanges of network management information are through messages called protocol data units (PDUs).  PDU are sent to nodes and contain variables that have both attributes and values. 12 ]Rushin $hah February 27, 2014
  • 13. Simple Network Management Protocol  The SNMP defines five types of messages or PDUs:  Two deal with the reading terminal,  Another two handle terminal configuration, and  The fifth is Trap, used to monitor events in the managed elements.  Each PDU contains both Attributes and Values.  Importance of PDU:  NM information can be exchanged through the PDUs in order to monitor the managed elements. 13 ]Rushin $hah February 27, 2014
  • 14. Simple Network Management Protocol  Advantages of SNMP:  Its very simple and widely deployment.  In SNMP version 3 it can obtain more information by a pair of PDUs such as (GetBulkRequest and GetResponse). 14 ]Rushin $hah February 27, 2014
  • 15. Simple Network Management Protocol  Disadvantages of SNMP :  It consumes considerable bandwidth since it often gets only one piece of management information at a time: GetRequest (GetNextRequest) and GetResponse.  Due to the usually large number of managed elements, large bandwidth consumption still exists.  It only manages network elements; it does not support network-level management. 15 ]Rushin $hah February 27, 2014
  • 16. Telecom Operation Map  It is proposed by TeleManagement Forum.  It is based on the Service management  Network management process models. TOM presents a model for telecommunications management for network and service management and a view of ‘‘operations.’’  IDEA: To introduce processes comprising operations and their automation.  TOM only provides a framework for service management. 16 ]Rushin $hah February 27, 2014
  • 17. Telecom Operation Map : Levels / Layers  Vertical Layers for service management:   Service Development and Operations, and   Network and Systems Management, Customer Care Process. Horizontally Layers for service management  Service Fulfilment,  Service Assurance, and  Service Billing. 17 ]Rushin $hah February 27, 2014
  • 18. Funda  Neither SNMP nor TOM is designed particularly for wireless sensor networks.  However, by utilizing  The Simplicity of SNMP and  The Layered Framework of TOM Design of effective & efficient n/w management architecture for Wireless Sensor Networks is possible. 18 ]Rushin $hah February 27, 2014
  • 19. Network Management Design Issues  Requirement of NM in WSN:  WSN is a special type of wireless network:  possibly with ad hoc structure and  probably with  limited resources. Due to these WSN constraints: networking protocols, the application model, middleware and sensor node OS (operating systems) should be designed very carefully.  So here, Network management for WSNs is required to use those limited resources effectively & efficiently. 19 ]Rushin $hah February 27, 2014
  • 20. The number are issue Network Management Design Issues  Importance of NM in WSN: is for following reasons: (Design Issue) 1. In order to deploy an Adaptive and Resource-Efficient algorithm in WSNs, the current resource level needs to be gathered through network management. - For example: the power availability should be known before switching a sensor node from active (or sleep) mode to sleep (or active) mode. - Most traditional networks do not have these requirements. 2. Collaboration and Cooperation between sensor nodes are required to optimize system performance. - Network management is an effective tool to provide the platform required for this purpose. 20 ]Rushin $hah February 27, 2014
  • 21. The number are issue Network Management Design Issues 3. Most WSN applications need to know the coverage area so that they ensure that the entire space is being monitored. - Topology management can be used in case an uncovered area is detected. - Approaches to increasing the coverage area: I. Increase the node’s radio power, II. Increase the density of deployment of senor nodes, and III. Move the sensor nodes around to achieve equal distribution. 4. Nodes in WSNs are usually arranged in an ad hoc manner. - The parameters of this ad hoc network are obtained by the network management system. 21 ]Rushin $hah February 27, 2014
  • 22. For Reference  An issue is whether in the meanwhile, any of the existing network management solutions (e.g., SNMP, TOM) can be used for WSNs.  SNMP is often used to manage network elements such as switches and routers.  It uses GetResponse and GetResponse PDUs to collect information from network elements.  In SNMP, a local management agent should run in each managed element.  The local agent is a static and passive agent that receives commands from a manager and returns the corresponding response. 22 ]Rushin $hah February 27, 2014
  • 23. For Reference  It can also issue Trap messages to the manager when the managed element encounters a preconfigured event.  Agents in different network elements are independent, and there is not collaboration among them.  TOM is a new operation and management model that provides a layered architecture for management and administration.  Each layer has a different management function and set of managed objects.  TOM can be used to manage most tasks, from the underlying physical network element to the entire network, as well as the services provided. 23 ]Rushin $hah February 27, 2014
  • 24. For Reference  SNMP provides management, five management configuration functions: management, fault accounting management, performance management, and security management; and  TOM, the management functions are layered in network element management, network management, and service management.  In each layer, different management functions are embodied.  WSNs need some of these management functions.  Therefore, WSNs need layered management architecture with different management functions in each layer. 24 ]Rushin $hah February 27, 2014
  • 25. For Reference  The issue of management architecture for WSNs should also be considered carefully.  A network management platform consists of three major components: manager, agent, and MIB.  The manager is used to manage and control the entire network and works as an interface to other systems.  The agent is located in managed elements.  MIB is an object-oriented structured tree that informs the manager and agent about the organization of management information.  A standardized MIB guarantees that the management products from different vendors interconnect.  The manager receives management information and commands the managed elements using a SNMP-like method or mobile-agent-based entities. 25 ]Rushin $hah February 27, 2014
  • 26. For Reference  The method of accessing management information and the placement of the manager or agent usually determines the management architecture.  The agent-based method can save bandwidth since it can report only final management information.  Although WSNs have a centralized data collecting point (sink), they are more like distributed networks.  As a result, agent-based hybrid management architectures might be more suitable for WSNs. 26 ]Rushin $hah February 27, 2014
  • 27. For Reference  In WSNs, management information can be used to improve system performance.  For example, if the network management system detects a dysfunctional sensor node, it can command another sensor node to take over.  So the issue of integration of network management with the functions of network protocols and algorithms becomes critical. 27 ]Rushin $hah February 27, 2014
  • 28. Which factors should be consider while designing a Network Management Protocol ? 28 ]Rushin $hah February 27, 2014
  • 29. Special Features of WSNs in NM function.  Management solutions should be energy efficient, using as little wireless bandwidth as possible since communication is highly energy demanding.  Management solutions should be scalable. This is especially important since in future WSNs may consist of tens to thousands of nodes.  Management solutions should be simple & practical since WSNs are resource-constrained distributed systems.  MIB for WSNs should contain a general information model for sensor nodes, features of WSNs and WSN applications.  Management solutions for WSNs should provide a general interface to the applications since applications can perform better when able to access management information.  Management solutions should be implementable as middleware. 29 ]Rushin $hah February 27, 2014
  • 30. MANNA : Management Architecture  An optimization problem for monitoring, management provides the monitoring regions given that the ‘battery and energy consumption rate  for each sensor are known beforehand’. MANNA is a management architecture for WSNs proposed by Ruizetal.  The architecture considers three management dimensions:   Management Levels, and  30 Management Function Areas, WSN Functionalities ]Rushin $hah February 27, 2014
  • 31. MANNA : Management dimensions Management Function Five types of traditional management functions similar to SNMP: Areas Management Levels Similar to those in SNMP Similar to those in TOM  Fault mng,  Network Element,  Configuration mng,  Network Element Management,  Performance mng,  Network Management,  Security mng, and  Service Management, and  Accounting Management  Business Management. NOTE: Configuration management has a notably more important role in MANNA, where all other functions depend on it. 31 ]Rushin $hah February 27, 2014
  • 32. MANNA : Management dimensions  A number of other functions are proposed by MANNA:   Maintenance,  Sensing,  Processing, and   Configuration, Communication. With the Aim of promoting productivity and integrating the functions of configuration, operation, administration and maintenance of all elements and services in a WSN - MANNA architecture includes three architectural elements: Functional, Physical, and Informational architectures. 32 ]Rushin $hah February 27, 2014
  • 33. MANNA : Architectural Element  Functional architecture: - It provides functions executed in the management entities (manager, agent, and MIB) and the location scheme for managers and agents.  Physical architecture: - It is where functional architecture is implemented. - MANNA uses a lightweight protocol as a communication interface between management entities.  Information architecture: - The Architecture element provides an object-oriented model for mapping manageable resources and supporting object classes. 33 ]Rushin $hah February 27, 2014
  • 34. MANNA : Managed Object Classes  Network (information on network behaviour and features such as data delivery model, network structure, and mobility),  Managed elements (such as sensor nodes),  Equipment (the physical components of sensor nodes),  System (information on operating system),  Environment (the environment the WSN is running),  Phenomenon, and  Connection. 34 ]Rushin $hah February 27, 2014
  • 35. MANNA : Common Management Functions  An Environment monitoring functions,  A coverage area supervision function,  A topology map discovery function,  An energy-level discovery function,  An energy map generation function, and several others. 35 ]Rushin $hah February 27, 2014
  • 36. MANNA : dynamic MIB model  MANNA also provides a dynamic MIB model for WSNs:   A communication coverage area map,  A WSN behaviour model,  A node dependence model,  network topology,   A sensing coverage area map, residual energy, and so on. -1st sense then communication coverage area map. -Then create two model : behaviour & node dependence -Now define network topology and residual energy In MANNA, the management functions have the lowest granularity and can be combined into management services. 36 ]Rushin $hah February 27, 2014
  • 37. Issues Related to Network Management  The most important issues in Network management are I. Naming, II. Localization, III. Maintenance, and IV. Fault tolerance. 37 ]Rushin $hah February 27, 2014
  • 38. Meaning of Each Issue Д Naming is the scheme used to identify a sensor node. -An efficient naming scheme can lower computation overhead and make routing protocol energy efficient. Д Localization schemes determine the location of sensor nodes since such information is important for some sensor applications. Д The maintenance issue may involve actions such as replacing batteries, keeping connectivity, and configuring sensor nodes. -The maintenance activity is used to maintain normal operation of the entire network for as long as possible. Д Several factors can cause faults in network operation, including hardware and software error. Therefore, different schemes must be implemented to provide fault tolerance. 38 ]Rushin $hah February 27, 2014
  • 39. Naming  A node in a networked system is identified through Naming.  This identifier is then used for communication between nodes.  Approaches to Naming:   Low-level naming such as node addresses is typically application independent but topology and location dependent. High-level naming is usually application dependent and location independent.  High-level Naming is built on the top of Low-level Naming.  Communication between applications uses high-level naming only, whereas physical communication relies on low-level naming.  Therefore, a binding mechanism is required to realize mapping 39 bbetween high- and low-level naming. ]Rushin $hah February 27, 2014
  • 40. Naming  For example: the domain name system (DNS) in the Internet uses two types of naming: a domain name and an IP address.  The domain name is used by applications such as Internet browsers.  The IP address is used by routing protocol to guarantee packet forwarding.  Domain name and IP addresses are often directed to the same host. The DNS servers map between domain names and IP addresses.  When a Web site is accessed using a domain name, the application program requests a corresponding IP address from the DNS so as to set up low-level communications. 40 ]Rushin $hah February 27, 2014
  • 41. Naming :  traditional hierarchical naming advantages Although the traditional hierarchical naming approaches can be used for WSN, but not efficient compared with application oriented low-level naming, which has the following advantages:    41 It avoids the overhead resulting from mapping between high- and low-level naming. This feature is attractive for a sensor since it has limited resources. Location-dependent addressing is not required. Since the topology of WSNs is highly variable due to node mobility, node life span, and wireless channel quality, a location-dependent address would cause additional problems. It enables application-specific processing in the network, such as data compression and data fusion, which in turn reduces data transmission. ]Rushin $hah February 27, 2014
  • 42.  Sensor nodes are usually classified by the type of data they gather.  For sensor nodes that gather only one type of data or can have differing personalities and gather multiple types of data, one name as their identifier would be sufficient.  The objective of low-level application naming is to realize energy efficiency and fault tolerance in a variety of environments. 42 ]Rushin $hah February 27, 2014
  • 43. Localization  Sensor nodes are distributed all over the place for sensing and data collection.  It is usually helpful if the locations of sensor nodes are also known. 43 ]Rushin $hah February 27, 2014
  • 44. Localization :  Advantages of Location Knowledge Some applications, such as those for tracking of objects, are highly location dependent;  Location-based Routing, which may also result in energy conservation is enabled;  Knowledge of location usually enhances security;  Locations are helpful for sensor network management and monitoring;  Locations stimulate the creation of new applications;  Sensor nodes that move can be controlled through knowledge of their location; and  For applications with low-level naming and/or data-centric WSNs, knowledge of location information is absolutely necessary. 44 ]Rushin $hah February 27, 2014
  • 46. Localization :  Classification Centralized Scheme  In this scheme Sensor nodes send control messages to a central node whose location is known.  The central node then computes the location of every sensor node and informs the nodes of their locations.  Distributed Scheme  Each sensor node determines its own location independently.  The distributed localization can be further grouped into:   46 Range-based schemes and Range-free schemes. ]Rushin $hah February 27, 2014
  • 47. Localization :  Classification In the range-based approach, some range information, such as time of arrival, angle of arrival, or time difference of arrival is required.  The range-free algorithms works as follows:  Several seed nodes are distributed in WSNs.  Seed nodes know their own locations, and they periodically broadcast a control message with their location information.  Sensor nodes that receive these control messages can then estimate their own locations. 47 ]Rushin $hah February 27, 2014
  • 49. Introduction  The development of large scale distributed sensor system is a significant scientific and engineering challenge.  By placing sensors close to each other can increase signal quality at reduce cost. 49 ]Rushin $hah February 27, 2014
  • 50. Taxonomy of localization  Commonly localization is divided in two major categories 1. Active Localization 2. Passive Localization 50 ]Rushin $hah February 27, 2014
  • 51. Active Localization  Active localization technique emit signals into the environment that are used to measure range to the target.  These signals may be emitted by infrastructure components or by targets.  Within this category of active localization there are three subcategories. 1. Non-cooperative target 2. Co-operative target 3. Co-operative infrastructure 51 ]Rushin $hah February 27, 2014
  • 52. Non Co-Operative Target  In active Non Co-operative system, system elements (Sensors) emit ranging signals, which are distorted or reflected in flight by passive elements.  The system element then receive the signals and analyze them to deduce their location relative to passive elements of the environment.  Example includes RADAR System and SONAR systems in robots. 52 ]Rushin $hah February 27, 2014
  • 53. Co-Operative Target  In co-operative target system, targets emit signal with known characteristics and other element of the system detects the signal and use information about signal arrival to deduce the target’s location. 53 ]Rushin $hah February 27, 2014
  • 54. Co-Operative Infrastructure  In co-operative infrastructure system, elements of the infrastructure emit signals that target can receive.  The infrastructure itself is assumed to be carefully configured & synchronized to simplify the processing done by the target. 54 ]Rushin $hah February 27, 2014
  • 55. Passive Localization  Passive localization techniques differ from active ones in that they discover ranges and locations by passively monitoring existing signals in a particular channel.  The term passive does not imply that they emit no signals, instead of that the signals they emit are out side the channel that is primarily analyzed for time-of-flight measurement. 1. Blind source localization 2. Passive Target Localization 3. Passive Self-Localization 55 ]Rushin $hah February 27, 2014
  • 56. Blind source Localization  In a blind source localization system, a signal source is localized without any priori knowledge of the type of signal emitted.  Typically this is done by “blind beam forming”, which effectively cross-correlates the signals from different receivers. 56 ]Rushin $hah February 27, 2014
  • 57. Passive Target Localization  Passive target localization system is usually based on coherent combination of signals, with the added assumption of some knowledge of the source.  By assuming model for the signals generated by the source, filtering can be applied to improve the performance of the algorithm. 57 ]Rushin $hah February 27, 2014
  • 58. Passive Self Localization  In passive self-localization , existing beacon signals from known infrastructure elements are used by Target to passively deduce its own location. 58 ]Rushin $hah February 27, 2014
  • 59. Localization challenges in Multi hop ad-hoc sensor Networks  Physical layer challenges  Algorithm Design Challenge - Noisy measurement - Computation and Communication trade-offs - Problem setup 59 ]Rushin $hah February 27, 2014

Editor's Notes

  • #7: Comprise : Be composed of
  • #17: comprise : કમ્પ્રાઇઝ : -નું બનેલું હોવું, -નો સમાવેશ કરવો, -માં સમાવું (ઘટક ભાગ તરીકે)
  • #21: Adaptive: ગ્રહણશીલ Gathered : Brought together in one place
  • #30: Which factors should be consider whiledesigning a Network management protocol ?
  • #37: Granularity (ગ્રેન્યુલારિટિ) : કણિકતા
  • #45: Conservation(કન્સર્વેશન) : કુદરતી પર્યાવરણની સાચવણી કે સંરક્ષણstimulatePronunciation : સ○ક્રિ○ Grammar : સ્ટિમ્યૂલેટMeaning : ઉત્તેજના કે સ્ફૂર્તિ આપવી, ઉદ્દીપ્ત કે ઉત્તેજિત કરવું, –માં પ્રાણ પૂરવો, ઉશ્કેરવું, જાગ્રત કરવું, કાર્યપ્રવૃત્ત કરવું