SlideShare a Scribd company logo
Experimental topic
Correlation Associativity
b/w
Sensor Information Network Architecture
&
Software Define Wireless Network
via
MWSN , MANETS , VANETS
Presentation by: Iqra Khalil
Type/ Mode of presentation:
academic
 Software-defined networking (SDN) is an umbrella term
encompassing several kinds of network technology aimed
at making the network as agile and flexible as the
virtualized server and storage infrastructure of the modern
data center.
 software defined networking (SDN) paradigm promises to
simplify network configuration and resource management
dramatically.
Software Define Wireless Network
 A centralized approach to network control:
centralized approach to network control raises crucial
problems about which network element(s) should run
network control operations but makes network optimization
easier.
 Energy consumption
problem
 SDWN must support duty cycles:
The most obvious way to reduce the energy consumption is turning the
radio off when it is not utilized, that is, using duty cycles.
 SDWN must support in-network data aggregation :
Energy consumption can be reduced by removing
the redundancy from the data circulating in the network,
that is, by using data aggregation techniques.
solution
Protocol Architecture
Forwarding layer algorithm
 Mobile wireless sensor networks (MWSNs) can be defined
as a wireless sensor network (WSN) in which sensor nodes
are mobile. MWSNs are an emerging field of research in
contrast to their well establish predecessor.
 MWSNs are much more versatile than static sensor
networks as they can be deployed in any scenario and cope
with rapid topology changes.
 Advantages over static wireless network:
1. better energy efficiency 2- improved coverage 3-
enhanced target tracking 4- superior channel capacity .
Mobile Wireless Sensor Network(MWSN)
Problem reference:
WaterGrid: A wireless Sensor Grid for Riverin Water
Management by Muhammad Hussain Mughal (2014
IEEE).
Case study
Correlation Associativity b/w Sensor Information Network Architecture & Software Define Wireless Network via MWSN , MANETS , VANETS
 A wireless ad hoc network (WANET) is a decentralized
type of wireless network. The network is ad hoc because
it does not rely on a pre existing infrastructure, such as
routers in wired networks or access points in managed
(infrastructure) wireless networks.
 Wireless Ad hoc networks are networks in which communication
links are based on wireless technologies and the network structure
or topology is not pre-defined rather build through dynamic
network connectivity.
 Relation with other ad hoc networks:
WANET ⊃ WSN , ⊃ (MANETS ⊃ VANETS)
WANET
 A Mobile Ad-hoc network is a wireless ad-hoc network which is used to exchange
informtion. A Mobile Ad-hoc network is a wireless ad-hoc network which is used to
exchange information .
 Mobile Ad Hoc Network is basically a combination of wireless network having no fixed
nodes and not a fixed infrastructure. In MANETs, devices can move freely. Nodes within
the range of other wireless devices make a virtual infrastructure. Furthermore; there is
also not a centralized body to control the communications between nodes.
 Form by wireless hosts, which may be mobile. No infrastructure required for the
connection. Nodes between hops may continuously contain multiple hops. Nodes acts as
routers to forward packets for each other and nodes keep changing the routes
 In mobile Ad Hoc Network, nodes connected to each other without any physical
connection e.g. coaxial cables or fiber optics cable. All of these are wireless devices and
their position is not fixed. They move from one point to another and if any one of them
moved away from the range of other nodes then communication between them will also
be dropped.
nfrmation.
MANETS
 On wireless computer networks, ad-hoc mode is a method
for wireless devices to directly communicate with each
other. Operating in ad-hoc mode allows all wireless devices
within range of each other to discover and communicate in
peer-to-peer fashion without involving central access
points (including those built in to broadband wireless
routers).
 To set up an ad-hoc wireless network, each
wireless adapter must be configured for ad-hoc mode
versus the alternative infrastructure mode.
What is Ad-Hoc Mode in Wireless Networking?
 Applications:
 It is use in military environment such as when there is any war
for soldiers to contact with each other MANET is used
 Use in civilian environments like in vehicle networks,
conferences/stadiums, outside activities etc
 It is use in emergency situations like in search-and-rescue
operations , in policing and fire fighting etc.
MANETS
 In 2005, northern areas of Pakistan were destructed by a
massive attack of earth quake and all the ways of
communication had been disconnected. This is only one example
of breakdown of communication in Pakistan. The same disasters
are occurring all around the world in different forms such as
Tornados, Hurricanes and earth quakes and so on. The main
issue is that after having these disastrous attacks, one really
needs to communicate the people of the affected areas as soon
as possible in order to know the amount of destruction and
about causalities over there. In that case, one really need a fast
way of communication which is more probable reliable and easy
to connect.
MANETS:case study
 In that case, we can put our trust on Ad -HOC mobile
network which is the only fastest way of communication
between different wireless nodes. In MANETs, the initial or
the source node pass on information to the next available
node and ask about the location of final node. The next
available node move on further information to very next
node available to it and ask about the final destination. The
information is passing on from one node to another back
and forth and in this way the source node knows the final
destination node location and hence finally communication
between two entities going on.
MANETS:case study
 This facilitates querying, monitoring, and tasking of sensor networks.
 serves the role of middleware that abstracts a network of sensor nodes
as a collection of massively distributed objects.
 ITS execution environment provides a set of configuration and
communication primitives that enable scalable and energy-efficient
organization of and interactions among sensor objects.
 On top the execution environment is a programmable substrate that
provides mechanisms to create associations and coordinate activities
among sensor nodes.
 Users then access information within a sensor network using
declarative queries, or perform tasks using programming script.
Sensor information Network Architecture
Model of sensor network and SI network
Middleware
 Information Abstraction:
A sensor network is conceptually viewed as a collection
of datasheets which are relational.
 Sensor Query and Tasking Language (SQLT):
SQTL plays the role of a programming interface between sensor
applications and the SINA middleware.
It is a procedural scripting language,designed to be
flexible and compact, with a capability to interpret
simple declarative query statements.
SI networks:SQLT
 Further capabilities:
1- sensor hardware access (e.g., getTemperature, turnOn)
2- Location aware (e.g., isNeighbor, getPosition)
3- communication primitives (e.g , tell , execute)
4-Events
 receive:
Events generated when a message is received by a sensor node
 every
Events triggered periodically by a timer
 Expire:
Events caused by the expiration of a timer
SI Network: SQLT
 A sensor execution environment (SEE), running on
each sensor node, is responsible for dispatching
incoming messages, examining all arrival SQTL
messages, and performing the appropriate operation
for each type of action specified in the messages.
Sensor Execution Environment
Complete SQTL code for the coordinated
vehicle tracking algorithm.
Correlation Associativity b/w Sensor Information Network Architecture & Software Define Wireless Network via MWSN , MANETS , VANETS
Correlation Associativity b/w Sensor Information Network Architecture & Software Define Wireless Network via MWSN , MANETS , VANETS
Simulation setup
conclusion
Ad

More Related Content

What's hot (18)

Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor Network
IJCI JOURNAL
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
ijwmn
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
Alexander Decker
 
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
cscpconf
 
026 icsca2012-s065
026 icsca2012-s065026 icsca2012-s065
026 icsca2012-s065
auwalaumar
 
Wsn
WsnWsn
Wsn
nishantshah2381
 
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
IJMTST Journal
 
Survey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANETSurvey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANET
IJMTST Journal
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
pijans
 
Security issues in Mobile Ad-Hoc Networks
Security issues in Mobile Ad-Hoc NetworksSecurity issues in Mobile Ad-Hoc Networks
Security issues in Mobile Ad-Hoc Networks
International Journal of Engineering Inventions www.ijeijournal.com
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKS
nanocdac
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
sophiabelthome
 
Jm2416491652
Jm2416491652Jm2416491652
Jm2416491652
IJERA Editor
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORK
IAEME Publication
 
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In ManetsIEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
ijiert bestjournal
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
IAEME Publication
 
A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor Network
IJMER
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architecture
Adeel Javaid
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor Network
IJCI JOURNAL
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
ijwmn
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
Alexander Decker
 
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
cscpconf
 
026 icsca2012-s065
026 icsca2012-s065026 icsca2012-s065
026 icsca2012-s065
auwalaumar
 
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
IJMTST Journal
 
Survey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANETSurvey on Certificate Revocation in MANET
Survey on Certificate Revocation in MANET
IJMTST Journal
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
pijans
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKS
nanocdac
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
sophiabelthome
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORK
IAEME Publication
 
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In ManetsIEAACK-Secure Detection System For Packet-Dropping Attack In Manets
IEAACK-Secure Detection System For Packet-Dropping Attack In Manets
ijiert bestjournal
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
IAEME Publication
 
A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor Network
IJMER
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architecture
Adeel Javaid
 

Similar to Correlation Associativity b/w Sensor Information Network Architecture & Software Define Wireless Network via MWSN , MANETS , VANETS (20)

Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-network
Sanjeev Kumar Jaiswal
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
Amy Moore
 
Mobile adhoc networks
Mobile adhoc networksMobile adhoc networks
Mobile adhoc networks
FathimaFarsana9
 
Discovery and verification Documentation
Discovery and verification DocumentationDiscovery and verification Documentation
Discovery and verification Documentation
Sambit Dutta
 
H010524049
H010524049H010524049
H010524049
IOSR Journals
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
Prof Ansari
 
AODV information
AODV informationAODV information
AODV information
anilds02
 
F0361026033
F0361026033F0361026033
F0361026033
ijceronline
 
20CS501Mobile Computing Unit 4 Mobile Ad-Hoc Networks.ppt
20CS501Mobile Computing Unit 4 Mobile Ad-Hoc Networks.ppt20CS501Mobile Computing Unit 4 Mobile Ad-Hoc Networks.ppt
20CS501Mobile Computing Unit 4 Mobile Ad-Hoc Networks.ppt
Sathya454753
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
Chandra Meena
 
Project report a dhoc wireless network
Project report a dhoc wireless networkProject report a dhoc wireless network
Project report a dhoc wireless network
Shiza Kokab
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
207088 633815660985047486
207088 633815660985047486207088 633815660985047486
207088 633815660985047486
Sathish Pilla
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ijwmn
 
CHAPTER-1234
CHAPTER-1234CHAPTER-1234
CHAPTER-1234
Bilal Anjum
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
Ganesh Khadsan
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
journalBEEI
 
Some Aspects of Wireless Sensor Networks
Some Aspects of Wireless Sensor NetworksSome Aspects of Wireless Sensor Networks
Some Aspects of Wireless Sensor Networks
pijans
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
Jawhar Ali
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-network
Sanjeev Kumar Jaiswal
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
Amy Moore
 
Discovery and verification Documentation
Discovery and verification DocumentationDiscovery and verification Documentation
Discovery and verification Documentation
Sambit Dutta
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
Prof Ansari
 
AODV information
AODV informationAODV information
AODV information
anilds02
 
20CS501Mobile Computing Unit 4 Mobile Ad-Hoc Networks.ppt
20CS501Mobile Computing Unit 4 Mobile Ad-Hoc Networks.ppt20CS501Mobile Computing Unit 4 Mobile Ad-Hoc Networks.ppt
20CS501Mobile Computing Unit 4 Mobile Ad-Hoc Networks.ppt
Sathya454753
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
Chandra Meena
 
Project report a dhoc wireless network
Project report a dhoc wireless networkProject report a dhoc wireless network
Project report a dhoc wireless network
Shiza Kokab
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
207088 633815660985047486
207088 633815660985047486207088 633815660985047486
207088 633815660985047486
Sathish Pilla
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ijwmn
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
Ganesh Khadsan
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
journalBEEI
 
Some Aspects of Wireless Sensor Networks
Some Aspects of Wireless Sensor NetworksSome Aspects of Wireless Sensor Networks
Some Aspects of Wireless Sensor Networks
pijans
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
Jawhar Ali
 
Ad

Recently uploaded (20)

Peer Assesment- Libby.docx..............
Peer Assesment- Libby.docx..............Peer Assesment- Libby.docx..............
Peer Assesment- Libby.docx..............
19lburrell
 
GENERAL QUIZ PRELIMS | QUIZ CLUB OF PSGCAS | 4 MARCH 2025 .pdf
GENERAL QUIZ PRELIMS | QUIZ CLUB OF PSGCAS | 4 MARCH 2025 .pdfGENERAL QUIZ PRELIMS | QUIZ CLUB OF PSGCAS | 4 MARCH 2025 .pdf
GENERAL QUIZ PRELIMS | QUIZ CLUB OF PSGCAS | 4 MARCH 2025 .pdf
Quiz Club of PSG College of Arts & Science
 
"Bridging Cultures Through Holiday Cards: 39 Students Celebrate Global Tradit...
"Bridging Cultures Through Holiday Cards: 39 Students Celebrate Global Tradit..."Bridging Cultures Through Holiday Cards: 39 Students Celebrate Global Tradit...
"Bridging Cultures Through Holiday Cards: 39 Students Celebrate Global Tradit...
AlionaBujoreanu
 
How to Change Sequence Number in Odoo 18 Sale Order
How to Change Sequence Number in Odoo 18 Sale OrderHow to Change Sequence Number in Odoo 18 Sale Order
How to Change Sequence Number in Odoo 18 Sale Order
Celine George
 
Cyber security COPA ITI MCQ Top Questions
Cyber security COPA ITI MCQ Top QuestionsCyber security COPA ITI MCQ Top Questions
Cyber security COPA ITI MCQ Top Questions
SONU HEETSON
 
Conditions for Boltzmann Law – Biophysics Lecture Slide
Conditions for Boltzmann Law – Biophysics Lecture SlideConditions for Boltzmann Law – Biophysics Lecture Slide
Conditions for Boltzmann Law – Biophysics Lecture Slide
PKLI-Institute of Nursing and Allied Health Sciences Lahore , Pakistan.
 
MCQS (EMERGENCY NURSING) DR. NASIR MUSTAFA
MCQS (EMERGENCY NURSING) DR. NASIR MUSTAFAMCQS (EMERGENCY NURSING) DR. NASIR MUSTAFA
MCQS (EMERGENCY NURSING) DR. NASIR MUSTAFA
Dr. Nasir Mustafa
 
Final Evaluation.docx...........................
Final Evaluation.docx...........................Final Evaluation.docx...........................
Final Evaluation.docx...........................
l1bbyburrell
 
libbys peer assesment.docx..............
libbys peer assesment.docx..............libbys peer assesment.docx..............
libbys peer assesment.docx..............
19lburrell
 
How to Configure Extra Steps During Checkout in Odoo 18 Website
How to Configure Extra Steps During Checkout in Odoo 18 WebsiteHow to Configure Extra Steps During Checkout in Odoo 18 Website
How to Configure Extra Steps During Checkout in Odoo 18 Website
Celine George
 
INDIA QUIZ FOR SCHOOLS | THE QUIZ CLUB OF PSGCAS | AUGUST 2024
INDIA QUIZ FOR SCHOOLS | THE QUIZ CLUB OF PSGCAS | AUGUST 2024INDIA QUIZ FOR SCHOOLS | THE QUIZ CLUB OF PSGCAS | AUGUST 2024
INDIA QUIZ FOR SCHOOLS | THE QUIZ CLUB OF PSGCAS | AUGUST 2024
Quiz Club of PSG College of Arts & Science
 
How to Share Accounts Between Companies in Odoo 18
How to Share Accounts Between Companies in Odoo 18How to Share Accounts Between Companies in Odoo 18
How to Share Accounts Between Companies in Odoo 18
Celine George
 
Unit 5 ACUTE, SUBACUTE,CHRONIC TOXICITY.pptx
Unit 5 ACUTE, SUBACUTE,CHRONIC TOXICITY.pptxUnit 5 ACUTE, SUBACUTE,CHRONIC TOXICITY.pptx
Unit 5 ACUTE, SUBACUTE,CHRONIC TOXICITY.pptx
Mayuri Chavan
 
IPL QUIZ | THE QUIZ CLUB OF PSGCAS | 2025.pdf
IPL QUIZ | THE QUIZ CLUB OF PSGCAS | 2025.pdfIPL QUIZ | THE QUIZ CLUB OF PSGCAS | 2025.pdf
IPL QUIZ | THE QUIZ CLUB OF PSGCAS | 2025.pdf
Quiz Club of PSG College of Arts & Science
 
114P_English.pdf114P_English.pdf114P_English.pdf
114P_English.pdf114P_English.pdf114P_English.pdf114P_English.pdf114P_English.pdf114P_English.pdf
114P_English.pdf114P_English.pdf114P_English.pdf
paulinelee52
 
UPSA JUDGEMENT.pdfCopyright Infringement: High Court Rules against UPSA: A Wa...
UPSA JUDGEMENT.pdfCopyright Infringement: High Court Rules against UPSA: A Wa...UPSA JUDGEMENT.pdfCopyright Infringement: High Court Rules against UPSA: A Wa...
UPSA JUDGEMENT.pdfCopyright Infringement: High Court Rules against UPSA: A Wa...
businessweekghana
 
The History of Kashmir Lohar Dynasty NEP.ppt
The History of Kashmir Lohar Dynasty NEP.pptThe History of Kashmir Lohar Dynasty NEP.ppt
The History of Kashmir Lohar Dynasty NEP.ppt
Arya Mahila P. G. College, Banaras Hindu University, Varanasi, India.
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-14-2025 .pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 5-14-2025  .pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 5-14-2025  .pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-14-2025 .pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
Module_2_Types_and_Approaches_of_Research (2).pptx
Module_2_Types_and_Approaches_of_Research (2).pptxModule_2_Types_and_Approaches_of_Research (2).pptx
Module_2_Types_and_Approaches_of_Research (2).pptx
drroxannekemp
 
Rebuilding the library community in a post-Twitter world
Rebuilding the library community in a post-Twitter worldRebuilding the library community in a post-Twitter world
Rebuilding the library community in a post-Twitter world
Ned Potter
 
Peer Assesment- Libby.docx..............
Peer Assesment- Libby.docx..............Peer Assesment- Libby.docx..............
Peer Assesment- Libby.docx..............
19lburrell
 
"Bridging Cultures Through Holiday Cards: 39 Students Celebrate Global Tradit...
"Bridging Cultures Through Holiday Cards: 39 Students Celebrate Global Tradit..."Bridging Cultures Through Holiday Cards: 39 Students Celebrate Global Tradit...
"Bridging Cultures Through Holiday Cards: 39 Students Celebrate Global Tradit...
AlionaBujoreanu
 
How to Change Sequence Number in Odoo 18 Sale Order
How to Change Sequence Number in Odoo 18 Sale OrderHow to Change Sequence Number in Odoo 18 Sale Order
How to Change Sequence Number in Odoo 18 Sale Order
Celine George
 
Cyber security COPA ITI MCQ Top Questions
Cyber security COPA ITI MCQ Top QuestionsCyber security COPA ITI MCQ Top Questions
Cyber security COPA ITI MCQ Top Questions
SONU HEETSON
 
MCQS (EMERGENCY NURSING) DR. NASIR MUSTAFA
MCQS (EMERGENCY NURSING) DR. NASIR MUSTAFAMCQS (EMERGENCY NURSING) DR. NASIR MUSTAFA
MCQS (EMERGENCY NURSING) DR. NASIR MUSTAFA
Dr. Nasir Mustafa
 
Final Evaluation.docx...........................
Final Evaluation.docx...........................Final Evaluation.docx...........................
Final Evaluation.docx...........................
l1bbyburrell
 
libbys peer assesment.docx..............
libbys peer assesment.docx..............libbys peer assesment.docx..............
libbys peer assesment.docx..............
19lburrell
 
How to Configure Extra Steps During Checkout in Odoo 18 Website
How to Configure Extra Steps During Checkout in Odoo 18 WebsiteHow to Configure Extra Steps During Checkout in Odoo 18 Website
How to Configure Extra Steps During Checkout in Odoo 18 Website
Celine George
 
How to Share Accounts Between Companies in Odoo 18
How to Share Accounts Between Companies in Odoo 18How to Share Accounts Between Companies in Odoo 18
How to Share Accounts Between Companies in Odoo 18
Celine George
 
Unit 5 ACUTE, SUBACUTE,CHRONIC TOXICITY.pptx
Unit 5 ACUTE, SUBACUTE,CHRONIC TOXICITY.pptxUnit 5 ACUTE, SUBACUTE,CHRONIC TOXICITY.pptx
Unit 5 ACUTE, SUBACUTE,CHRONIC TOXICITY.pptx
Mayuri Chavan
 
114P_English.pdf114P_English.pdf114P_English.pdf
114P_English.pdf114P_English.pdf114P_English.pdf114P_English.pdf114P_English.pdf114P_English.pdf
114P_English.pdf114P_English.pdf114P_English.pdf
paulinelee52
 
UPSA JUDGEMENT.pdfCopyright Infringement: High Court Rules against UPSA: A Wa...
UPSA JUDGEMENT.pdfCopyright Infringement: High Court Rules against UPSA: A Wa...UPSA JUDGEMENT.pdfCopyright Infringement: High Court Rules against UPSA: A Wa...
UPSA JUDGEMENT.pdfCopyright Infringement: High Court Rules against UPSA: A Wa...
businessweekghana
 
Module_2_Types_and_Approaches_of_Research (2).pptx
Module_2_Types_and_Approaches_of_Research (2).pptxModule_2_Types_and_Approaches_of_Research (2).pptx
Module_2_Types_and_Approaches_of_Research (2).pptx
drroxannekemp
 
Rebuilding the library community in a post-Twitter world
Rebuilding the library community in a post-Twitter worldRebuilding the library community in a post-Twitter world
Rebuilding the library community in a post-Twitter world
Ned Potter
 
Ad

Correlation Associativity b/w Sensor Information Network Architecture & Software Define Wireless Network via MWSN , MANETS , VANETS

  • 1. Experimental topic Correlation Associativity b/w Sensor Information Network Architecture & Software Define Wireless Network via MWSN , MANETS , VANETS Presentation by: Iqra Khalil Type/ Mode of presentation: academic
  • 2.  Software-defined networking (SDN) is an umbrella term encompassing several kinds of network technology aimed at making the network as agile and flexible as the virtualized server and storage infrastructure of the modern data center.  software defined networking (SDN) paradigm promises to simplify network configuration and resource management dramatically. Software Define Wireless Network
  • 3.  A centralized approach to network control: centralized approach to network control raises crucial problems about which network element(s) should run network control operations but makes network optimization easier.  Energy consumption problem
  • 4.  SDWN must support duty cycles: The most obvious way to reduce the energy consumption is turning the radio off when it is not utilized, that is, using duty cycles.  SDWN must support in-network data aggregation : Energy consumption can be reduced by removing the redundancy from the data circulating in the network, that is, by using data aggregation techniques. solution
  • 7.  Mobile wireless sensor networks (MWSNs) can be defined as a wireless sensor network (WSN) in which sensor nodes are mobile. MWSNs are an emerging field of research in contrast to their well establish predecessor.  MWSNs are much more versatile than static sensor networks as they can be deployed in any scenario and cope with rapid topology changes.  Advantages over static wireless network: 1. better energy efficiency 2- improved coverage 3- enhanced target tracking 4- superior channel capacity . Mobile Wireless Sensor Network(MWSN)
  • 8. Problem reference: WaterGrid: A wireless Sensor Grid for Riverin Water Management by Muhammad Hussain Mughal (2014 IEEE). Case study
  • 10.  A wireless ad hoc network (WANET) is a decentralized type of wireless network. The network is ad hoc because it does not rely on a pre existing infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks.  Wireless Ad hoc networks are networks in which communication links are based on wireless technologies and the network structure or topology is not pre-defined rather build through dynamic network connectivity.  Relation with other ad hoc networks: WANET ⊃ WSN , ⊃ (MANETS ⊃ VANETS) WANET
  • 11.  A Mobile Ad-hoc network is a wireless ad-hoc network which is used to exchange informtion. A Mobile Ad-hoc network is a wireless ad-hoc network which is used to exchange information .  Mobile Ad Hoc Network is basically a combination of wireless network having no fixed nodes and not a fixed infrastructure. In MANETs, devices can move freely. Nodes within the range of other wireless devices make a virtual infrastructure. Furthermore; there is also not a centralized body to control the communications between nodes.  Form by wireless hosts, which may be mobile. No infrastructure required for the connection. Nodes between hops may continuously contain multiple hops. Nodes acts as routers to forward packets for each other and nodes keep changing the routes  In mobile Ad Hoc Network, nodes connected to each other without any physical connection e.g. coaxial cables or fiber optics cable. All of these are wireless devices and their position is not fixed. They move from one point to another and if any one of them moved away from the range of other nodes then communication between them will also be dropped. nfrmation. MANETS
  • 12.  On wireless computer networks, ad-hoc mode is a method for wireless devices to directly communicate with each other. Operating in ad-hoc mode allows all wireless devices within range of each other to discover and communicate in peer-to-peer fashion without involving central access points (including those built in to broadband wireless routers).  To set up an ad-hoc wireless network, each wireless adapter must be configured for ad-hoc mode versus the alternative infrastructure mode. What is Ad-Hoc Mode in Wireless Networking?
  • 13.  Applications:  It is use in military environment such as when there is any war for soldiers to contact with each other MANET is used  Use in civilian environments like in vehicle networks, conferences/stadiums, outside activities etc  It is use in emergency situations like in search-and-rescue operations , in policing and fire fighting etc. MANETS
  • 14.  In 2005, northern areas of Pakistan were destructed by a massive attack of earth quake and all the ways of communication had been disconnected. This is only one example of breakdown of communication in Pakistan. The same disasters are occurring all around the world in different forms such as Tornados, Hurricanes and earth quakes and so on. The main issue is that after having these disastrous attacks, one really needs to communicate the people of the affected areas as soon as possible in order to know the amount of destruction and about causalities over there. In that case, one really need a fast way of communication which is more probable reliable and easy to connect. MANETS:case study
  • 15.  In that case, we can put our trust on Ad -HOC mobile network which is the only fastest way of communication between different wireless nodes. In MANETs, the initial or the source node pass on information to the next available node and ask about the location of final node. The next available node move on further information to very next node available to it and ask about the final destination. The information is passing on from one node to another back and forth and in this way the source node knows the final destination node location and hence finally communication between two entities going on. MANETS:case study
  • 16.  This facilitates querying, monitoring, and tasking of sensor networks.  serves the role of middleware that abstracts a network of sensor nodes as a collection of massively distributed objects.  ITS execution environment provides a set of configuration and communication primitives that enable scalable and energy-efficient organization of and interactions among sensor objects.  On top the execution environment is a programmable substrate that provides mechanisms to create associations and coordinate activities among sensor nodes.  Users then access information within a sensor network using declarative queries, or perform tasks using programming script. Sensor information Network Architecture
  • 17. Model of sensor network and SI network Middleware
  • 18.  Information Abstraction: A sensor network is conceptually viewed as a collection of datasheets which are relational.  Sensor Query and Tasking Language (SQLT): SQTL plays the role of a programming interface between sensor applications and the SINA middleware. It is a procedural scripting language,designed to be flexible and compact, with a capability to interpret simple declarative query statements. SI networks:SQLT
  • 19.  Further capabilities: 1- sensor hardware access (e.g., getTemperature, turnOn) 2- Location aware (e.g., isNeighbor, getPosition) 3- communication primitives (e.g , tell , execute) 4-Events  receive: Events generated when a message is received by a sensor node  every Events triggered periodically by a timer  Expire: Events caused by the expiration of a timer SI Network: SQLT
  • 20.  A sensor execution environment (SEE), running on each sensor node, is responsible for dispatching incoming messages, examining all arrival SQTL messages, and performing the appropriate operation for each type of action specified in the messages. Sensor Execution Environment
  • 21. Complete SQTL code for the coordinated vehicle tracking algorithm.
  翻译: