logo

Role of Wireless Sensor Network in Data Communication System

   

Added on  2020-04-01

22 Pages5654 Words99 Views
Sensor Network

Table of Contents1.Introduction............................................................................................................................22.Lab Setup................................................................................................................................22.1Task-1.............................................................................................................................11Requirements.........................................................................................................................11Results....................................................................................................................................122.2Task 2 - Single hop communication.............................................................................12Requirements:........................................................................................................................12Results....................................................................................................................................132.3Lab Task-3.....................................................................................................................13Requirements.........................................................................................................................13Results....................................................................................................................................142.4Task 4- Multihop communication...............................................................................14Requirements.........................................................................................................................14Results....................................................................................................................................143.Conclusion............................................................................................................................15

1.Introduction The wireless sensor network plays an important role in data communication systems likecommercial application, industrial application and many real time applications. The largenumber of sensor node devices are spread in multiple fields. The sensor nodes are low powerdevices and it can be in the order of hundred or it may be thousand. Sensor nodes are mainlyused to Comprises a large number of distribution in Wireless sensor network. The sensor nodesare performing many tasks like smart sensing, target tracking, data aggregation, neighbor nodediscovery in single hop and Multihop communication system.Current advances insemiconductor, materials science and networking technologies are motivating the ubiquitousdistribution of large-scale WSNs (Wireless Sensor Networks). In single hop communication to use the channel coding in WSNs with a star molded single-hopstructure, which is similar to the current cellular telephony networks. The single hop sensornetwork have one common node with appropriate sufficient energy and computational powerresources to achieve the difficult channel decoding for entering packets. The larger networks ofnumerous number of nodes will nearly does not have single hop connectivity for multiplereasons. It may be more energy effective to communicate a message through the multi-hopcommunications over small distances in its place of a single hop extensive distancecommunication to the Base Station. A protocol for energy efficient both the single-hop andmulti-hop communications in WSNs is presented and it will be discussed. In the existingapproach, SNs form supportive clusters. Within each and every cluster, SNs can easilycommunicate with each other with the help of multi-hop links, and these SN at the most recenthop communicates with the Base Station by communicating the grouped multi-hop data. The main objective of this project is to provide the solution for tasks like Binary counter, singlehop communication, Single hop communication with acknowledgement and Multihopcommunication. The lab setup will be provided in detailed manner. The task’s requirements willbe provided for each and every tasks. The Micaz board and led's will be discussed in all therequirements. The ActiveMessageC, AMReceiverC and AMSenderC components will be used

for transmission and receive the data. The tasks will be implemented by using Micaz board andled’s.2.Lab Setup VirtualBox is much capable of x86 and AMD64/Intel64 virtualization item for big business and in addition home utilize. It is not exclusively that a VirtualBox is to a greater degree which includes rich, superior item for big business clients, it is additionally the main expert arrangement that is uninhibitedly accessible as Open Source Software under the terms of the GNU General Public License (GPL) rendition (Bakshi, 2017) Virtual MachineVM (Virtual machines) are based on the computer architecture. The virtual machine is a simulation of a computer system. It provides the functionality of a physical computer (Bourennane, n.d.). The implementation may contains the specialized software and hardware. The various types of virtual machines are used and each machine have the numerous functions. There are given below,Process VMSystem VMThe SVM (System Virtual Machine) also called as the full virtualization VM. The system VM provides an additional substitute for a real or physical machine. It offers the functionality desiredto perform complete operating system. A hypervisor is used for the native execution in virtual machine. It share and manage hardware, permitting for more number of environments which are isolated from one another. The modern hypervisor is used for the hardware helped virtualization.The process VM (Virtual Machine) are intended to perform computer programs in an independent platform environment (Hać, 2003).UbuntuIt is an open source OS (Operating system) software for computers. Ubuntu software is based on the debain architecture. Ubuntu is distribution systems of Linux and it is usually run on

PC (Personal Computers). It is widely used for network server. Ubuntu software also runs on the popular architecture and it including ARM machine, AMD and Intel. In Ubuntu, user program run by very low privileges. The advantage of the Ubuntu is cannot smash the user program files or other files. It cannot corrupt the OS. The sudo command is used to allocate temporary rights and privileges for executing administrative responsibilities. Itallows the root version account to continue protected and services to check inexperienced operators from inadvertently building catastrophic changes in system or opening safety holes in Ubuntu. The system requests and requirements differ among Ubuntu products (López and Zhou, 2008).VirtualBox keeps successively running on Linux, Windows and Solaris and it has bolsters a considerable number of visitor working frameworks. However it is not restricted to Windows Similarly, NT 4.0, 20001.XP, Server 2003,2.Vista, 3.Windows 7, 4.Windows 8, 5.Windows 10. VirtualBox is large effectively created with visit discharges and has regularly developing rundown of highlights, upheld visitor working frameworks for the stages it keeps running on. VirtualBox is a group exertion sponsored by a devoted organization. Everybody is urged to contribute. But in case of Oracle, it guarantees the item which dependably meets the proficient quality criteria (Kamila, n.d.).VirtualBox is a unrestricted, it is open source and is a cross-stage application for creating, overseeing and running VM virtual machines. PCs equipment parts are imitated by the host PC, mainly the PC that runs the program. VirtualBox keep running on the OS such as Linux, Solaris and so on. It depends on the OS adaptation, however it means that it pays little mind to the host working framework (Cichoń, Gȩbala and Klonowski, 2013).

The need of VMUtilization of virtual machines is greatly helpful for various reasons. For instance, user might need to run a virtual machine to experiment with programming that user think may be perilous, or user might need to experiment with another working framework without changing the way user PC is now set up. User may likewise need to utilize it for security purposes; for instance, user might need to make a virtual machine only for web based managing account so user can make sure that there are no spyware or trojans getting at user valuable information (Das and Stephen, 2012). At long last, user might need to get it since user can. VirtualBox is totally free – there's no reasonnot to download The way to getThe most straightforward approach to get the most recent rendition of VB VirtualBox is downloaded from the downloading page of VirtualBox site (Hashish, 2011) There user can download the right form for user stage, or in case user are utilizing Linux user can navigate to discover a rundown of guidelines for different Linux dispersions. For every Linux circulation user are given the choice of downloading either theIn case user don't know which rendition of the working framework user are utilizing user are probably utilizing the 32 bit form, thus user need to download the "i386" variant of VirtualBox. Introducing VirtualBox is much as same as introducing some additional program on user stage, so user shouldn't have any issue with establishment. On the off chance that user do stall out

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Wireless Networks Protocols and Security - Assignment
|12
|2482
|16

RF Source Implementation for Communication in Wireless Passive Sensor Network
|25
|8478
|27