Essay: Data Dissemination Protocols

Essay: Data Dissemination Protocols
11/04/2011 Comments Off on Essay: Data Dissemination Protocols Academic Papers on Information Technology,Sample Academic Papers admin

Sample Essay

Question 5: Summarize the main advantages and disadvantages of three data dissemination protocols: flooding protocol, directed diffusion, and trickle.  Consider properties such as energy efficiency, robustness in noisy WSN environments, and simplicity of implementation.

The advantages of Flooding protocol include its simplistic design and hence implementation. However, when flooding protocol is used in a network, it results in duplicate messages being sent to all the nodes (imploding) as well as network congestion due to redundant transmissions. Hence in a noisy environment, this can severely restrict the flow of data in the network as well as result in poor energy efficiency (Ni, Tseng, Chen, & Shau, 1999). Directed diffusion, on the other hand, is very energy efficient and this effect is magnified by the presence of a large number of source and sinks in the network. Hence it is able to operate efficiently in noisy environments where a large number of sensors are needed to extract information. However, its disadvantages include its complexity in implementation (the directed diffusion protocol requires a careful design of MAC layer protocols) and its usefulness in only scenarios where nodes request the data themselves (Intanagonwiwat, Govidan, Heidemann, Estrin, & Sliva, 2003). Trickle Protocol offers advantages such as scalability which makes it very useful for environments where a large amount of noise is present, making it difficult to collect precise data without the presence of a large number of sensors. However, Trickle protocol assumes that sensor motes are always on. This is rarely possible in sensor networks with long-term deployment; hence, Trickle offers inefficient use of energy on these networks. Another advantage is that, though Trickle was designed to propagate code through a sensor network, however, it is flexible enough to be implemented easily for the propagation of any kind of data (Levis, Patel, Culler, & Shenker, 2004).

Question 6: For a wireless sensor network application of your choice, describe two situations of interest.  Describe each of these situations using the situation representation language presented in the paper Cardell-Oliver and Liu, Representation and Recognition of Situations in Sensor Networks.

Situation 1


The Main Door is open but nobody is present in the lower portion of the house.

situation dooropen =


trigger-event doorajar

temporal-scope [30 min]

spacial-scope [Entrance Area]


(a:dooropen;{(b:dooropen + [30 *min])} ! personongroundfloor)

where ( x==y)

Situation 2


The keys are left in the ignition while engine is off and door is open.

situation  keysinignition


trigger-event key_alarm

spacial-scope [car]

detect (x:keyalarm; y:engineoff;z:dooropen)


(($y=$x) && ($z=$x))

(Cardell-Oliver & Liu, 2009).

Please go to the order form to order essays, research papers, term papers, thesis, dissertation, case study, assignments on this essay topic.

Related Essays, Research Papers, Term Papers, Thesis, Dissertation, Case Study, Assignments entries.


About The Academic Paper