Syllabus:
Basics of Wireless, Sensors and Applications: Applications, Classification of sensor networks, Architecture of sensor network, Physical layer, MAC layer, Link layer.
π― PYQ Analysis for Unit 3
PYQs will be added after analysis β check back soon.
Section 1: Introduction to Wireless Sensor Networks (WSN)
1.1 What is a WSN?
A Wireless Sensor Network (WSN) is a distributed network of small, low-power devices called sensor nodes (or motes) that collaboratively sense, process, and transmit data about physical or environmental conditions to a central location called the base station or sink.
Each sensor node is capable of:
- Sensing physical phenomena (temperature, humidity, pressure, motion, etc.)
- Local data processing
- Wireless communication with neighboring nodes or the base station
WSNs operate without fixed infrastructure and are often deployed in harsh, inaccessible, or remote environments.
Key characteristics of WSN:
- Large scale β hundreds to thousands of nodes
- Resource constrained β limited battery, memory, and processing power
- Self-organizing β nodes form network autonomously
- Data-centric β users query data, not specific nodes
- Application-specific β design varies by application
1.2 WSN vs MANET β Key Differences
| Feature | WSN | MANET |
|---|---|---|
| Primary goal | Data collection from environment | Communication between mobile users |
| Node count | Hundreds to thousands | Tens to hundreds |
| Node mobility | Mostly static | Highly mobile |
| Energy | Very limited (battery-powered, often not replaceable) | Limited but usually rechargeable |
| Processing power | Very low | Moderate to high |
| Communication | Many-to-one (convergecast to sink) | Peer-to-peer |
| Topology | Semi-static | Highly dynamic |
| Data model | Data-centric (event-driven or periodic) | Address-centric (node IDs) |
| Node identity | Usually not important | Important (routing by address) |
| Deployment | Random/planned in hostile areas | Random in open environments |
| Failure tolerance | Must tolerate node failures | Less tolerance expected |
| Traffic pattern | Periodic or event-driven small packets | Bursty, varied traffic |
| Security | Hard to secure (physical access) | Easier to secure |
1.3 Key Constraints of Sensor Nodes
Energy
- Sensor nodes are battery-powered with no or limited recharging capability.
- Energy is the most critical constraint β determines network lifetime.
- Energy consumption breakdown:
- Communication (radio) β dominant (~70β80%)
- Sensing β moderate
- Processing β relatively low
- Nodes must minimize idle listening, overhearing, and collisions.
Memory
- Typical sensor nodes have very limited RAM (4β256 KB) and Flash memory (32 KBβ1 MB).
- Limits the complexity of algorithms that can run on the node.
- Protocols must be lightweight and compact.
Processing Power
- Microcontrollers like ATmega128, MSP430, or ARM Cortex-M are used.
- Clock speeds in the range of 4β16 MHz β far less than general-purpose CPUs.
- Complex computations (encryption, compression) must be carefully designed.
Communication Range
- Typical range: 10 m to 100 m (depends on power and environment).
- Long-range transmission is costly in energy β multi-hop routing is used instead.
- Radio transceivers operate in the ISM (Industrial, Scientific, Medical) bands.
Section 2: Applications of Sensor Networks
WSNs are deployed across a wide range of domains. The key driving factor is the ability to place sensors in locations that are inaccessible, hazardous, or impractical for wired sensing.
2.1 Military Applications
Military applications were among the first motivators for WSN research.
- Battlefield surveillance β monitor troop movements, detect enemy activity
- Enemy tracking β track vehicles, equipment, and personnel positions
- Nuclear, biological, chemical (NBC) detection β sense hazardous agents
- Damage assessment β evaluate post-attack damage in real time
- Smart weapons guidance β sensors embedded in munitions
Example: DARPA-funded programs like SensIT and Smart Dust were early WSN research initiatives for military use.
2.2 Environmental Monitoring
- Forest fire detection β deploy nodes across forests; detect temperature/smoke anomalies before fires spread
- Flood monitoring β measure water levels in rivers and trigger alerts
- Weather monitoring β distributed sensing of temperature, humidity, wind, precipitation
- Landslide detection β detect ground movement patterns
- Volcanic activity monitoring β deploy sensors near volcanoes to detect seismic activity
- Ecosystem monitoring β track wildlife behavior, habitat conditions (e.g., Great Duck Island project)
2.3 Healthcare Applications
- Patient monitoring β continuous monitoring of heart rate, blood pressure, SpO2, temperature
- Hospital asset tracking β track wheelchairs, IV pumps, defibrillators using RFID + sensors
- Elderly care β detect falls, monitor vital signs, alert caregivers
- Drug administration β ensure correct dosage and timing
- Post-operative monitoring β track recovery outside ICU
- Epidemic detection β monitor spread of infectious diseases
2.4 Industrial Applications
- Machine health monitoring β detect vibration, temperature anomalies in motors/turbines
- Process control β monitor chemical, pressure, flow in industrial pipelines
- Structural health monitoring β monitor bridges, dams, buildings for cracks, stress
- Supply chain management β track goods in warehouses and during transit
- Worker safety β detect toxic gas levels in mines or chemical plants
2.5 Smart Home Applications
- Automation β automatic control of lighting, HVAC, appliances based on occupancy
- Security β motion detectors, door/window sensors, surveillance
- Energy management β monitor and optimize power usage
- Smart meters β real-time electricity/water/gas consumption tracking
- Elderly/children monitoring β detect unusual activity patterns
2.6 Agriculture (Precision Farming)
- Soil monitoring β soil moisture, pH, nitrogen levels for optimal irrigation and fertilization
- Crop monitoring β detect crop diseases, pest activity
- Microclimate sensing β temperature and humidity inside greenhouses
- Livestock tracking β GPS + sensors to track animal health and location
- Irrigation automation β activate/deactivate irrigation based on soil moisture thresholds
2.7 Disaster Management
- Earthquake early warning β detect seismic activity, estimate magnitude
- Tsunami detection β underwater pressure sensors detect wave patterns
- Flood early warning β river/reservoir level monitoring
- Post-disaster search and rescue β deploy sensors in rubble to detect survivors
- Infrastructure assessment β monitor buildings after disasters
2.8 Transportation
- Traffic monitoring β measure vehicle flow, detect congestion, control traffic lights
- Vehicle tracking β fleet management, cargo tracking
- Parking management β detect occupancy of parking spots
- Road condition monitoring β ice detection, pothole detection
- Railway safety β track status of rail lines, bridge loads
Section 3: Classification of Sensor Networks
Sensor networks can be classified along multiple dimensions based on deployment, mobility, communication model, and other factors.
3.1 By Deployment Strategy
| Type | Description | Pros | Cons |
|---|---|---|---|
| Random/Unplanned | Nodes dropped from aircraft or scattered randomly | Fast deployment, suitable for hazardous areas | Coverage gaps, redundancy needed |
| Deterministic/Planned | Nodes placed at specific locations by hand | Optimal coverage, known topology | Time-consuming, not feasible in hostile areas |
3.2 By Mobility
| Type | Description | Use Case |
|---|---|---|
| Static | Nodes remain fixed after deployment | Environment monitoring, structural monitoring |
| Mobile | Nodes (or some nodes) move during operation | Animal tracking, robot-assisted sensing |
| Hybrid | Some nodes static, some mobile (mobile sinks) | Data mule-based collection |
3.3 By Communication Model
| Type | Description |
|---|---|
| Single-hop | Each sensor node communicates directly with the base station |
| Multi-hop | Data is relayed through intermediate nodes to reach the base station |
Multi-hop is preferred when nodes are far from the base station, as it saves transmit energy.
Single-hop: Multi-hop:
[S1] ----\ [S1] -> [S2] -> [S3] -> [BS]
[S2] ----- [BS] [S4] -> [S5] ---------> [BS]
[S3] ----/
3.4 By Data Aggregation
| Type | Description |
|---|---|
| With Aggregation | Intermediate nodes (cluster heads) combine/summarize data before forwarding β reduces traffic |
| Without Aggregation | Raw data forwarded directly to base station β higher accuracy but more energy consumption |
3.5 By Power Source
| Type | Description |
|---|---|
| Battery-powered | Fixed energy budget; node dies when battery depletes |
| Energy harvesting | Solar, vibration, thermal energy used to recharge β potentially infinite lifetime |
| Hybrid | Battery + energy harvesting backup |
3.6 By Sensing Type
| Type | Sensors Used | Examples |
|---|---|---|
| Scalar | Single value per reading | Temperature, pressure, humidity sensors |
| Multimedia | High bandwidth, stream data | Camera (image/video), microphone (audio) |
Multimedia WSNs (MWSNs) have additional challenges: higher data rates, more processing, and much more energy consumption.
Section 4: Architecture of Sensor Network
4.1 Sensor Node β Block Diagram
A sensor node (mote) typically consists of four main subsystems:
+-------------------------------------------------------+
| SENSOR NODE |
| |
| +------------------+ +------------------------+ |
| | SENSING UNIT | | PROCESSING UNIT | |
| | | | | |
| | [Sensors] | | [Microcontroller] | |
| | | | | | | |
| | [ADC] | | [Memory] | |
| | (Analog to | | (Flash + SRAM) | |
| | Digital) | | | |
| +--------+---------+ +-----------+------------+ |
| | | |
| +---------+ +-------------+ |
| | | |
| +------v--v-------+ |
| | COMMUNICATION | |
| | UNIT | |
| | [Radio | |
| | Transceiver] | |
| | (TX + RX) | |
| +-----------------+ |
| |
| +---------------------------------------------------+|
| | POWER UNIT ||
| | [Battery] + [Energy Harvesting (optional)] ||
| | [Power Management Circuit] ||
| +---------------------------------------------------+|
+-------------------------------------------------------+
Sensing Unit:
- Sensors β transduce physical quantity into analog electrical signal
- ADC (Analog-to-Digital Converter) β converts analog signal to digital for processing
Processing Unit:
- Microcontroller β executes sensing, processing, MAC, routing protocols
- Memory β Flash (program storage) and SRAM (data/stack)
Communication Unit:
- Radio Transceiver β handles wireless transmission and reception
- Typically a short-range low-power radio (e.g., CC2420, nRF24L01)
Power Unit:
- Battery β primary energy source (AA, coin cell, or custom)
- Energy harvesting β solar panel, piezoelectric, thermoelectric (optional)
- Power regulation circuit β converts and regulates voltage
4.2 Network Architecture
A WSN follows a layered network architecture:
+------------------+
| User / Cloud | <-- Applications, dashboards, data analytics
+--------+---------+
|
(Internet)
|
+--------+---------+
| Base Station | <-- Sink node; collects all data, high-power device
| (Sink) | connected to the internet
+--------+---------+
|
(Multi-hop
wireless)
|
+--------+---------+
| Cluster Heads | <-- Aggregator nodes; collect data from member nodes
+--------+---------+
|
+--------+---------+
| Sensor Nodes | <-- Leaf nodes; sense and transmit data
+------------------+
Sensor Nodes: Smallest, most numerous, most resource-constrained. Sense the environment and send data to cluster heads or directly to the base station.
Cluster Heads (CHs): Elected periodically; aggregate data from cluster members. Have higher energy or are rotated among nodes. Reduce total traffic.
Base Station (Sink): Powerful node (often connected to mains power) that receives data from the entire network. Acts as a gateway to the internet.
Internet / User: End user accesses data via web/mobile applications.
4.3 Data Flow Diagram
Physical World
|
| (Physical phenomenon)
v
[Sensor Node]
| Sense -> ADC -> Process -> Compress/Encrypt
|
v (Radio transmission)
[Neighboring Node / Cluster Head]
| Aggregate / Forward
v
[Base Station / Sink]
| Protocol conversion, store data
v
[Internet]
|
v
[User Application]
(Query, visualization, alerts)
4.4 Network Topology Types
Flat Architecture
All sensor nodes are peers. Each node communicates directly or via multi-hop to the base station. No special roles.
[S1] - [S2] - [S3]
\ |
[S4] - [S5]-[BS]
β
Simple, robust, decentralized
β Poor scalability, high energy cost for nodes far from BS
Hierarchical / Cluster-based Architecture
Nodes organized into clusters. Each cluster has a Cluster Head (CH) that aggregates data.
Cluster 1: Cluster 2:
[S1][S2][S3] [S6][S7][S8]
| |
[CH1] [CH2]
\ /
----> [BS] <----
β
Scalable, energy-efficient (data aggregation), extends lifetime
β CH may become energy bottleneck; requires CH election protocol (e.g., LEACH)
Tree-based Architecture
Hierarchical tree rooted at the base station.
[BS]
/ \
[CH1] [CH2]
/ \ / \
[S1][S2] [S3][S4]
β
Structured, easy routing
β Vulnerable to node failure (single point)
Section 5: Physical Layer
The Physical (PHY) layer is responsible for the actual transmission and reception of raw bits over the wireless channel.
5.1 Wireless Transmission Basics
- Data is transmitted as electromagnetic waves through the air.
- Key parameters: frequency, bandwidth, modulation, transmit power, antenna gain
- Wireless channel introduces path loss, shadowing, multipath fading, and interference
5.2 Frequency Bands Used in WSN (ISM Bands)
WSNs primarily use ISM (Industrial, Scientific, Medical) bands β unlicensed spectrum:
| Band | Frequency | Standard | Notes |
|---|---|---|---|
| Low | 868 MHz | IEEE 802.15.4 | Europe; 1 channel; better range |
| Medium | 915 MHz | IEEE 802.15.4 | Americas; 10 channels |
| High | 2.4 GHz | IEEE 802.15.4 / WiFi / Bluetooth | Global; 16 channels; most common |
Trade-offs:
- Lower frequency β better range, less path loss, but narrower bandwidth
- Higher frequency β more channels available, but more path loss
5.3 Modulation Techniques
Modulation converts digital data into analog signals suitable for wireless transmission.
BPSK β Binary Phase Shift Keying
- Two phase states: 0Β° and 180Β°
- 1 bit per symbol
- Simple, robust, used in low-data-rate WSN
- Used in 868/915 MHz band of IEEE 802.15.4
Bit: 0 1 0 1
| | | |
Phase: 0Β° 180Β° 0Β° 180Β°
QPSK β Quadrature Phase Shift Keying
- Four phase states: 0Β°, 90Β°, 180Β°, 270Β°
- 2 bits per symbol β higher spectral efficiency
- Used in 2.4 GHz band of IEEE 802.15.4 (O-QPSK variant)
Dibits: 00=0Β°, 01=90Β°, 10=180Β°, 11=270Β°
FSK β Frequency Shift Keying
- Different frequencies represent different bits
- More immune to amplitude noise
- Used in Bluetooth and some proprietary WSN radios
5.4 IEEE 802.15.4 Standard (Zigbee Physical Layer)
IEEE 802.15.4 is the foundational standard for low-rate wireless personal area networks (LR-WPAN), used by Zigbee, 6LoWPAN, and WirelessHART.
| Parameter | Value |
|---|---|
| Standard | IEEE 802.15.4-2003/2006/2011 |
| Frequency bands | 868 MHz, 915 MHz, 2.4 GHz |
| Data rate | 20/40/250 kbps |
| Modulation | BPSK (868/915 MHz), O-QPSK (2.4 GHz) |
| Spreading | DSSS (Direct Sequence Spread Spectrum) |
| Range | 10β100 m |
| Channels | 1 + 10 + 16 = 27 total |
| TX power | 1β100 mW |
PHY Frame Structure (IEEE 802.15.4):
+----------+----------+----------+----------+----------+
| Preamble | SFD | PHR | PHY | Payload |
| (4 bytes)|(1 byte) |(1 byte) | Payload | (PSDU) |
| | | | Length | 0-127 B |
+----------+----------+----------+----------+----------+
- Preamble: synchronization
- SFD (Start Frame Delimiter): marks start of data
- PHR (PHY Header): contains payload length
- PSDU: actual data payload
5.5 Propagation Models
Propagation models describe how signal strength drops as distance increases.
Free Space Model
Analogy: Like a light bulb in an empty room β the further you go, the dimmer it gets, and it drops off with the square of the distance.
- Signal power decreases with dΒ² (double the distance β 4Γ weaker signal)
- Assumes clear line-of-sight, no obstacles or reflections
- Optimistic model β real environments are messier
Two-Ray Ground Reflection Model
Analogy: Like shouting across an empty field β your voice travels directly to the listener, but also bounces off the ground and arrives slightly later, partially cancelling your direct signal.
- More realistic β signal travels via two paths: direct path + ground-reflected path
- Signal power decreases with dβ΄ β drops off much faster than free space
- Used for longer distances over flat terrain (outdoor fields, farmland)
| Model | Power drop | When to use |
|---|---|---|
| Free Space | dΒ² | Short range, clear line-of-sight |
| Two-Ray | dβ΄ | Longer outdoor distances, flat terrain |
5.6 Energy Consumption at Physical Layer
The PHY layer is the dominant energy consumer in a sensor node.
| Operation | Energy Cost |
|---|---|
| Transmitting | Highest |
| Receiving | High (similar to TX) |
| Idle listening | Significant (radio ON but not receiving) |
| Sleep mode | Very low |
Key insight: Idle listening wastes almost as much energy as active receiving. MAC protocols exploit sleep scheduling to minimize idle listening.
Section 6: MAC Layer
The Medium Access Control (MAC) layer controls how sensor nodes share the wireless channel. In WSN, MAC design is energy-centric, unlike traditional MACs that focus on throughput and fairness.
6.1 Role of MAC in WSN
- Coordinate channel access β prevent collisions among nodes
- Energy efficiency β minimize idle listening, overhearing, collisions
- Latency β acceptable delay for data delivery
- Scalability β support varying network sizes
- Adaptability β handle changes in network topology
6.2 Sources of Energy Waste at MAC Layer
These are the four primary causes of energy wastage:
| Source | Description |
|---|---|
| Idle Listening | Radio ON and listening when no data is arriving β wasted energy |
| Overhearing | Receiving packets addressed to other nodes β wasted reception |
| Collision | Two nodes transmit simultaneously β packet corrupted β retransmit |
| Control Overhead | Transmission of control packets (RTS, CTS, ACK) consumes energy |
Energy Waste Sources:
βββββββββββββββββββββββ
β Idle Listening β β Most common waste
β Overhearing β β Dense networks
β Collision β β Contention-based MACs
β Control Overhead β β Excessive handshaking
βββββββββββββββββββββββ
6.3 Types of MAC Protocols
WSN MAC protocols fall into three categories:
Schedule-Based (TDMA)
- Time is divided into slots; each node is assigned specific slots to transmit.
- No collisions, no idle listening during off-slots.
- Examples: TDMA, TRAMA, S-MAC (partial)
β
No collisions
β
Predictable latency
β
Energy-efficient
β Requires time synchronization
β Less adaptive to dynamic traffic
Contention-Based (CSMA)
- Nodes compete for the channel; listen before transmitting.
- Examples: CSMA/CA (IEEE 802.15.4), ALOHA
β
No synchronization needed
β
Adapts to traffic load
β Collisions possible
β Idle listening waste
Hybrid
- Combines TDMA and CSMA features.
- Examples: Z-MAC, TDMA+CSMA hybrid
β
Flexibility of CSMA + efficiency of TDMA
β More complex design
6.4 S-MAC Protocol (Sensor MAC)
S-MAC is one of the most important energy-efficient MAC protocols for WSN.
Key Idea: Nodes follow a periodic sleep/listen cycle. During the listen period, they can send/receive. During sleep, the radio is OFF.
Operation:
- Each node follows a duty cycle: Listen for a short period, then sleep.
- Nodes exchange SYNC packets to synchronize their schedules.
- Neighboring nodes form virtual clusters β nodes with the same schedule.
- Nodes on different schedules have border nodes that follow both schedules.
Duty Cycle:
|<--------- Period T -------->|
| Listen | Sleep | Listen | Sleep |
|<--Tl--->|<-------Ts------->|<--Tl--->|<-------Ts------->|
Duty cycle = Tl / T (typically 10%)
Frame Structure during Listen:
| SYNC | DATA |
| slot | slot |
- SYNC slot: Nodes exchange synchronization information
- DATA slot: Actual data transmission using RTS/CTS/DATA/ACK
Virtual Clusters:
+--Group A (same schedule)--+ +--Group B--+
| [S1] [S2] [S3] | | [S4] [S5] |
| | | | | |
| [S3]=border node=====+====+=[S4] |
+---------------------------+ +-----------+
Border nodes follow both Group A and Group B schedules.
Message Passing (RTS/CTS):
Sender: |--RTS-->| |--DATA-->|
Receiver: | |<--CTS---| |--ACK-->|
Nodes that overhear RTS or CTS go to sleep for the duration of the transmission (reduces overhearing).
β
Reduces idle listening dramatically
β
Good for low-traffic WSN
β Latency increases with more hops (adaptive listening reduces this)
β Border nodes wake up more, consuming extra energy
6.5 IEEE 802.15.4 MAC
The IEEE 802.15.4 MAC supports two modes:
Beacon-Enabled Mode (Superframe Structure)
A coordinator (e.g., cluster head or PAN coordinator) sends periodic beacons to synchronize the network.
|<---------------------- Superframe ---------------------------->|
| Beacon | CAP (Contention Access Period) | CFP (TDMA slots) |
| | CSMA-CA based | GTS (Guaranteed |
| | | Time Slots) |
Active: |<-------Active portion-------->|<----Inactive------->|
(nodes sleep here)
- CAP: Contention-based (CSMA-CA) for general data
- CFP: TDMA-like guaranteed time slots (GTS) for time-critical data
Non-Beacon Mode
No synchronization. Nodes use unslotted CSMA-CA:
- Node wants to transmit β Backs off random number of slots
- Perform CCA (Clear Channel Assessment) β check if channel is idle
- If idle β transmit; If busy β wait and retry
- After fixed retries, declare failure
Slotted CSMA-CA (Beacon mode):
CW=2 (initial contention window)
BE=macMinBE (initial backoff exponent)
1. Set NB=0, CW=2, BE=macMinBE
2. Delay random(0, 2^BE - 1) backoff periods
3. Perform CCA
4. If idle: decrement CW; if CW=0, transmit
5. If busy: NB++, BE=min(BE+1, macMaxBE), CW=2
6. If NB > macMaxCSMABackoffs: declare failure
6.6 Z-MAC (Zebra MAC)
Z-MAC is a hybrid MAC protocol that uses:
- CSMA under low traffic (flexible, low latency)
- TDMA under high traffic (efficient, collision-free)
Each node is assigned a TDMA slot but can also use others' slots when idle. Switches between modes based on detected contention.
6.7 Comparison: TDMA vs CSMA/CA for WSN
| Feature | TDMA | CSMA/CA |
|---|---|---|
| Collisions | None | Possible |
| Idle listening | Minimal (sleep in off-slots) | Can be significant |
| Synchronization | Required | Not required |
| Latency | Predictable | Variable |
| Overhead | Slot assignment overhead | Backoff overhead |
| Scalability | Poor (fixed slot assignment) | Better |
| Adaptability | Low | High |
| Energy efficiency | Very high | Moderate |
| Suitable for | Periodic data, time-critical | Bursty traffic, simple deployment |
Section 7: Link Layer
The Link Layer (Data Link Layer) ensures reliable frame delivery between directly connected nodes. In WSN, links are often lossy due to interference, fading, and node mobility, making link-layer reliability critical.
7.1 Role of Link Layer in WSN
- Framing: Package data into frames with headers and trailers
- Error detection: Detect bit errors introduced by the channel
- Error correction: Recover from errors without retransmission (FEC)
- Retransmission: Request retransmission of lost/corrupted frames (ARQ)
- Link quality estimation: Measure channel quality for routing decisions
7.2 Error Detection: CRC
CRC (Cyclic Redundancy Check) is the standard error detection method in WSN.
How it works:
- Sender divides the message polynomial by a generator polynomial G(x)
- The remainder is appended to the frame as the CRC field
- Receiver divides the received frame by G(x)
- If remainder is 0 β no error; else β error detected
Sender:
Message M: 1101011011
Generator G: 10011 (CRC-4)
Append zeros: 11010110110000
Divide by G: compute remainder R
Transmitted: Message + R
Receiver:
Divide (Message + R) by G
Remainder = 0 β no error
Remainder β 0 β error detected β discard frame
Common CRC variants:
- CRC-8: 8-bit check (simple, lightweight for WSN)
- CRC-16: 16-bit check (used in many protocols)
- CRC-32: 32-bit check (stronger, used in Ethernet)
IEEE 802.15.4 uses CRC-16 (ITU-T polynomial: 0x1021)
β
Can detect all single-bit errors, burst errors
β Cannot correct errors β only detection
7.3 Error Correction: FEC
FEC (Forward Error Correction) allows the receiver to correct errors without requesting retransmission.
How it works:
- Sender adds redundant bits (parity/coding bits) to the data
- Receiver uses the redundancy to detect AND correct errors
Common FEC codes:
| Code | Type | Capability |
|---|---|---|
| Hamming Code | Block code | Correct 1-bit, detect 2-bit errors |
| Reed-Solomon | Block code | Correct burst errors |
| Convolutional Code | Stream code | Flexible error correction |
| Turbo Codes | Block + iterative | Near Shannon limit |
| LDPC | Block code | Very high performance |
In WSN: Simple FEC like Hamming code is preferred due to low computational overhead.
Trade-off:
- FEC adds overhead (larger frames β more energy to transmit)
- FEC saves retransmission energy in high-error environments
- FEC is preferred when link error rate is high and retransmission cost is high
7.4 ARQ β Automatic Repeat Request
ARQ relies on the receiver to detect errors (using CRC) and request retransmission.
Three main ARQ protocols:
Stop-and-Wait ARQ
Sender transmits one frame and waits for ACK before sending next.
Sender: [Frame 0] --------->
Receiver: <--------- [ACK 0]
Sender: [Frame 1] --------->
Receiver: <--------- [ACK 1]
...
If no ACK within timeout β retransmit same frame.
β
Simple to implement
β Low efficiency β channel idle while waiting for ACK
β High latency
Go-Back-N ARQ
Sender can transmit N frames (window size N) without waiting for ACK.
Window size N=4:
Sender: [0][1][2][3][4] ...
^-- Error at frame 2
Receiver: NACK-2
Sender: [2][3][4][5] ... (go back to frame 2, resend all)
If frame i is corrupted β receiver rejects all subsequent frames β sender retransmits from frame i.
β
Better channel utilization than stop-and-wait
β Retransmits correctly received frames β wasteful
Selective Repeat ARQ
Sender transmits up to N frames; receiver buffers out-of-order frames.
Window size N=4:
Sender: [0][1][2][3][4] ...
^-- Error at frame 2
Receiver: Accepts 0,1,3,4 (buffers out-of-order)
NACK-2
Sender: [2] only (selective retransmit)
β
Most efficient β only lost frames are retransmitted
β More complex β requires receiver buffering
ARQ in WSN Context
| Protocol | WSN Suitability |
|---|---|
| Stop-and-Wait | β Simple, low memory, used in simple WSN links |
| Go-Back-N | Moderate β moderate buffer needed |
| Selective Repeat | Best efficiency but needs buffer memory (limited in WSN) |
In WSN, Stop-and-Wait or simple link-layer retransmission is often used due to memory constraints. Higher-layer protocols may handle end-to-end reliability.
7.5 Link Quality Indicators
RSSI β Received Signal Strength Indicator
- Measures the power level of the received signal in dBm
- Higher RSSI β stronger signal β better link quality
- Affected by distance, obstacles, interference
RSSI Range (typical):
-40 dBm : Excellent
-70 dBm : Good
-85 dBm : Fair
-100 dBm: Very poor / packet loss likely
LQI β Link Quality Indicator
- A composite metric measuring the quality of the received signal at the PHY layer
- In IEEE 802.15.4: LQI is computed from the energy of received symbols and correlation with ideal symbols
- Range: 0β255 (higher = better)
- Used by routing protocols to select reliable paths
PRR β Packet Reception Rate
- Fraction of successfully received packets over a period
- More accurate than RSSI/LQI as it measures actual link performance
PRR = (Packets received) / (Packets sent)
7.6 Why Link-Layer Reliability Matters in WSN
WSN links are inherently lossy:
- Multipath fading β reflections cause constructive/destructive interference
- Interference β other devices using the same ISM band (WiFi, Bluetooth, microwaves)
- Node mobility β changing topology in mobile WSNs
- Environmental dynamics β moving objects, weather changes
Consequences of lossy links:
- Increased retransmissions β more energy consumption
- Reduced throughput
- Higher end-to-end latency
Link-layer mechanisms to address lossy links:
- CRC for error detection
- FEC for error correction without retransmission
- ARQ for reliable delivery
- Link quality estimation (RSSI, LQI) to select better routes
- Adaptive modulation β switch to lower-rate, more robust modulation on bad links
Quick Revision Points
WSN Fundamentals
- WSN = distributed network of sensor nodes sensing physical phenomena and reporting to a base station
- Key constraints: energy (dominant), memory, processing, communication range
- WSN differs from MANET in: data-centric, mostly static, many-to-one traffic, thousands of nodes
Applications
- Military, environmental monitoring, healthcare, industrial, smart home, agriculture, disaster management, transportation
- Motivating factor: sensing in inaccessible, hazardous, or large-scale environments
Classification
- Deployment: random vs deterministic
- Mobility: static vs mobile vs hybrid
- Communication: single-hop vs multi-hop
- Data: with/without aggregation
- Power: battery vs energy harvesting
- Sensing: scalar vs multimedia
Architecture
- Sensor node = Sensing unit + Processing unit + Communication unit + Power unit
- Network layers: Sensor nodes β Cluster Heads β Base Station β Internet β User
- Topologies: Flat, Hierarchical/Cluster-based, Tree-based
- LEACH is a classic cluster-based protocol with random CH rotation
Physical Layer
- ISM bands: 868 MHz (Europe), 915 MHz (Americas), 2.4 GHz (Global)
- Modulation: BPSK (868/915 MHz), O-QPSK (2.4 GHz) in IEEE 802.15.4
- IEEE 802.15.4: data rate 250 kbps at 2.4 GHz, uses DSSS
- Propagation: free space (dΒ²), two-ray (dβ΄)
- Energy: TX dominant; idle listening nearly as costly as RX
MAC Layer
- Energy waste: idle listening, overhearing, collision, control overhead
- TDMA: no collision, needs sync, energy-efficient
- CSMA/CA: no sync needed, flexible, collisions possible
- S-MAC: periodic sleep/listen, virtual clusters, RTS/CTS during listen
- IEEE 802.15.4 MAC: beacon-enabled (superframe, CAP+CFP) and non-beacon (unslotted CSMA-CA)
- Z-MAC: hybrid CSMA+TDMA
Link Layer
- CRC: error detection (IEEE 802.15.4 uses CRC-16)
- FEC: error correction (Hamming, Reed-Solomon) β no retransmission needed
- ARQ: Stop-and-Wait (simple, low memory), Go-Back-N, Selective Repeat (most efficient)
- RSSI: received power level; LQI: link quality (0β255); PRR: packet reception rate
- WSN links are lossy β link-layer reliability is critical
Expected Exam Questions
PYQs will be added after analysis β check back soon.
These notes were compiled by Deepak Modi
Last updated: May 2026