Threshold sensitive Energy Efficient sensor Network

adaptive threshold sensitive energy efficient sensor network protocol and.threshold sensitive energy efficient sensor network protocol ppt
gunjan Profile Pic
Published Date:09-03-2017
Your Website URL(Optional)
Threshold sensitive Energy Efficient sensor Network (TEEN)CONTENTS 1. Introduction 2. Features 3. Operational flow of TEEN 4. Functioning 5. APTEEN 6. Timeline for APTEEN 7. Applications of TEEN 8. Advantages of TEEN 9. TEEN Drawback 10. ConclusionINTRODUCTION  A Routing Protocol for Enhanced Efficiency in Wireless Sensor Networks  It is targeted at reactive networks and is the first protocol developed for reactive networks  It’s a hierarchical protocol designed to respond to sudden changes in the sensed attributes  It uses data centric mechanism.FEATURES “  Time critical data reaches the user almost instantaneously.  The soft threshold can be varied, depending on the criticality of the sensed attribute and the target application. A smaller value of the soft threshold gives a more accurate picture of the network, at the expense of increased energy consumption.  At every cluster change time, the attributes are broadcast afresh and so, the user can change them as required6 OPERATIONAL FLOW OF TEEN In TEEN protocol cluster head formation process is based on LEACH (Low Energy Adaptive clustering in Hierarchy).  First, the clusters are formed, and then CH broadcasts two thresholds to all the member nodes: a) hard threshold (HT) b) soft threshold (ST).  At every cluster change time, these two attributes are also broadcast by CH.FUNCTIONING Hard Threshold (HT): It is the absolute value of the attribute beyond which, the node sensing this value must switch on its transmitter and report to its cluster head. Soft Threshold (ST): This is a small change in the value of the sensed attribute which triggers the node to switch on its transmitter and transmit.APTEEN 1. The TEEN protocol is succeeded by the APTEEN (Adaptive Periodic Threshold-sensitive Energy Efficient Sensor Network) protocol which aims at capturing periodic data aggregations and respond to time-critical events. 2. In APTEEN once the CHs are decided, in each cluster period, the cluster head first broadcasts the following parameters: a) Attributes (A) c) Threshold b) Schedule d) Count TimeTIMELINE FOR APTEENAPPLICATIONS OF TEEN This protocol is best suited for time critical applications such as: a) intrusion detection, b) explosion detection etc.ADVANTAGES OF TEEN  Reliable data delivery  suitable for application where the data requirement by the end user is totally event driven.TEEN DRAWBACK  If the thresholds are not reached, the nodes will never communicate, the user will not get any data from the network at all and will not come to know even if all the nodes die.  not well suited for applications where the user needs to get data on a regular basis. There are no collisions in the cluster.  TDMA scheduling of the nodes can be used to avoid this problem.CONCLUSION 1. We introduce a new network protocol, TEEN for reactive networks. 2. well suited for time critical applications 3. quite efficient in terms of energy consumption and response time. 4. It allows the user to control the energy consumption and accuracy to suit the application16 YOU CAN WRITE US AT :