Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 15

Cs6003-Ad hoc and sensor networks

1.Define computer network and give its two components.


A computer network is an interconnected collection of independent computers which consists of
two components
o Distributed applications
o Networking infrastructure
2.Give some example of distributed applications.
o Internet
o E-mail
o Banking applications
o Reservation system
3.List the high and low frequency bands in the electromagnetic spectrum.
o High frequency bands X-rays and Gamma rays
o Low frequency bands-radio, Microwave, infrared and visible waves.
4.Different spectrum allocation methods
o Comparative bidding
o Lottery system
o Auctioning method
5. How multipath propagation affect the signal quality?
Multi path is the propagation phenomenon that results in radio signals reaching the receiving
antenna by two or more paths. The effects of multipath include constructive and destructive
interference, and phase shifting of the signal. Multi path propagation of signals causes fading of the
transmitted signal.
6. Give a mechanism that is used for overcoming problems arising due to inter symbol
interference.
Inter symbol interference is a type of interference, where distortion in the received signal is
caused by the temporal spreading and the consequently overlapping of individual pulses in the signal. It
can be avoided by introducing guard bands.
7.List the characteristics of the wireless Channel.

1.Path loss

2.Fading

3.Interference

4.Doppler shift

5.Transmission rate constraints.

8. Fading.

Fading is fluctuations in signal strength when received at the receiver.It has two types,

o Fast fading or small scale


fading o slow fading or large scale
fading.

9. Doppler shift.

It is defined as change in the frequency of the received signal when the transmitter and
receiver move with respect to each other.

The Doppler shift is given by fd=v/λ


10. State Shannon theorem.
The upper bound on the information rate of data which is sent with a given average signal
power S through an analog communication channel subject to additive white Gaussian noise of power
N,is given as,
C=Blog2(1+(S/N))
11. Compare cellular and ad hoc wireless network

Cellular networks Ad hoc networks


Fixed infrastructure- based Infrastructure less

Reuse of frequency spectrum through Dynamic frequency reuse based on carrier


geographical channel reuse sense mechanism
High cost and time of deployment Quick and cost effective deployment
Easier to employ bandwidth reservation Bandwidth reservation requires complex
medium access control protocols

12.List some of the applications of ad hoc wireless networks.


o Military application
o Collaborative and distributed computing
o Emergency operation
o Wireless mesh networks
o Wireless sensor networks
13. Objectives of transport layer protocol. Which protocols are used?
o Setting up and maintaining end-to-end connections
o Reliable end-to end delivery of data
packets o Flow control
o Congestion control
14. wireless sensor network
Wireless sensor network consists of individual sensor nodes that are able to interact with their
environment by sensing or controlling physical parameters,these nodes have to collaborate to fulfill
their tasks as usually, a single node is incapable of doing so and they use wireless communication to
enable this collaboration.In essence the nodes without such a network contain atleast some computation,
Wireless communication and sensing or control functionalities.

15. QoS
QoS is closely related to the type of network service is the quality of that service which is the
amount and quality of information that can be extracted at given sinks avout the observed objects or
area. Therefore adapted quality concepts like reliable detection of events or the approximation quality.
16.Fault tolerance?
Some sensor nodes may fail or be blocked due to lack of power or have physical damage or
environmental interference. The failure of sensor nodes should not affect the overall task of the sensor
network. This is the reliability or fault tolerance issue.
1. Describe the common method used in alleviating the hidden terminal problem at the MAC
layer.

Hidden terminals are nodes that are hidden from the sender of a data transmission but
are reachable to the receiver of the session. In such cases, the hidden terminal can cause
collision at the receiver node. The presence of hidden problem can significantly reduce the
throughput of a MAC protocol used in ad hoc wireless networks. Hence the MAC protocol
should be able to alleviate the effects of hidden terminals.

2. List the major issues in MAC protocol for ad hoc wireless


networks o Bandwidth efficiency
o QoS support
o Synchronization
o Hidden and exposed terminal problems
o Error prone shared broadcast channel
3. List the classification of MAC protocol?
o Contention based protocols
o Contention based protocol with reservation mechanisms
o Contention based protocols with scheduling mechanisms
4. Advantages of reservation based MAC protocols over contention based MAC protocols.
o MACA/PR is an efficient bandwidth reservation protocol that can support real time
traffic sessions
o MACA/PR is that it does not require global synchronization among
nodes o RTMAC is its bandwidth efficiency
o RTMAC is its asynchronous mode of operation where nodes do not require any global
time synchronization
5. Advantages of the BTMA protocol .How are they overcome in the DBTMA protocol?

The probability of collision is very low in BTMA, the bandwidth utilization is very
poor. DBTMA exhibits better network utilization. This is because the other schemes block both
the forward and reserve transmission on data channel when they reserve the channel through
their RTS and CTS packets

6. List out the five phase of the reservation


protocol. o Reservation request phase
o Collision report phase
o Reservation conformation phase
o Reservation acknowledgement phase
o Packing and eliminating

7. List the services provided by IEEE802.11


o Association
o Authentication
o De-Authentication
o Disassociation
o Integration o
Data delivery o
Privacy
o Reassociation
8. Pros and cons of using multichannel MAC protocol over a single channel protocol.

Although several single channel schemes came into design and tried to achieve a high
quality of services scheme, most of them were not successful due to hidden and exposed
terminal problems and the fairness issue. On the other hand, the multichannel schemes were
almost successful in solving these problems and providing a better and more reliable MAC
protocol for the users.

9. How is synchronization between nodes achived in HRMA protocol?


HRMA uses a dedicated frequency channel for synchronization where nodes exchange
synchronization information .When a node wants to sent data it listens to the HOP reservation
period. If there is a packet there, it tries again after a random amount of time, otherwise it sends
a RTS packet, and waits for the CTS acknowledgement packet in the CTS period of the
corresponding frequency channel.
10. Write the difference between HRMA and SRMA

HRMA uses a reservation and handshake mechanism to enable a pair of communicating


nodes to reserve a frequency hop which guarantees collision free data transmission even in the
presence of hidden terminal problem. Each time slot is assigned a separate frequency channel.

SRMA uses collision avoidance handshake mechanism and soft reservation mechanism
in order to contend for and effect reservation of time slots. Nodes are allocated different time
slots so that the transmission are collision free.

11. D-PRMA

D-PRMA was developed to provide voice support in ad hoc wireless networks.it is more
suited for voice traffic than for data traffic applications. Nodes are prioritized to transmit voice
traffic over normal data traffic.

12. Which protocol is more bandwidth efficient RTMAC or MACA/PR?


RTMAC uses bandwidth efficiently than MACA/PR. MACA/PR has the possibility of
having fragmented free slots not being used at all which reduces bandwidth efficiency whereas
in RTMAC, the free slots may occur in between the reservation slots.
13. Preferable channel List(PCL)

PCL is a data structure maintained by each node in multichannel MAC protocol. It


maintains the usage of channel within the transmission range of the node. The nodes that hear
ATIM-ACK and ATIM-RES packets update their PCLs accordingly.

14. Narrate the role of channels in ICSMA

The total available bandwidth is split into two equal channels in ICSMA. If the source
node transmits the RTS packet on one channel and if the receiver node is ready to accept
packets from the sender, it responds by transmitting the CTS packet on another channel.
15. Define priority index.

Priority index of a packet is defined as the ratio between packet delivery ratio to the
desire packet delivery ratio for the flow multiplied by the uniform laxity budget of the packet.

PI=(PDR/M) X ULB
16. Basic principles of CATA?

The receiver of a flow must inform the potential source nodes about the reserved slot on
which it is currently receiving packets.
Usage of negative acknowledgement for reservation request and control packet
transmission at the beginning of each slot, for distributing slot reservation information to sender
of broadcast sessions.

17. Differentiate MACA-BI and MARCH

MACA-BI eliminates the need for RTS packet and data transmission occurs through a
two way handshake mechanism and it uses a traffic prediction mechanism. The hidden terminal
problem is overcome in MACA-BI and collision among data packets is less.

In MARCH the RTS is used only for the first packet of the stream. It does not require
any traffic prediction mechanism and reduce the number of handshakes involved in data
transmission .The throughput and average end to end delay is very low in MARCH when
compared to MACA

1. Define Routing

Routing is the process of selecting best paths in a network. In the past, the term routing
was also used to mean forwarding network traffic among networks. Routing is performed for
many kinds of networks, including the telephone network , electronic data networks and
transportation networks.

2. How is the loop free property ensured in on demand routing protocol?

It is a fundamental requirement of any routing protocol to avoid unnecessary wastage of


network bandwidth. In ad hoc wireless networks, due to the random movement of nodes,
transient loops may form in the route thus established. A routing protocol should detect such
transient routing loops and take corrective actions.

3. Advantages of hierarchical routing protocol


o Reduction in the size of routing tables
o Better scalability
o Substantially lesser calculation and updates of routing tables
4. List some example of table driven routing protocols
o Destination sequential distance-vector routing
o Wireless routing protocol
o Cluster head gateway switch routing protocol
o Source tree adaptive routing protocol
5. List the advantages of DSVL routing protocols
o The routers are readily available to all destination at all times, the delay is less in the
route setup process.
o With the help of mechanism like incremental updates, an existing wired network
protocol can be applied to ad hoc wireless networks
6. Hybrid routing protocol

Hybrid routing protocol combines the best feature of proactive and reactive routing
protocols. Hybrid routing protocol use distance vector for more accurate metrics to determine
the best paths to designation network and report routing information only when there is a
change in the topology of the network.
7. How is the cluster head selected in the CGSR protocol?

CGSR organizes nodes into cluster with coordination among the members of each
cluster assigned to a unique node called cluster-head. The cluster head is selected dynamically
by using a least cluster change algorithm. In LCC algorithm, a node ceases to be a cluster head
only if it comes under the range of another cluster-head, where tie is broken either using the
lowest ID or highest connectivity algorithm.

8. Challenges in designing routing protocols


o Mobility
o Bandwidth constraint
o Error prone shared broadcast radio channel
o Hidden and exposed terminal problems
9. List some of the characteristics of a routing protocol for ad hoc wireless
networks. o It must be fully distributed
o It must be localized and adaptive to frequent topology changes
o It must provide Quality of service
o It must use the resources efficiently
10. Approach used to find link stability in ABR.
A link is classified as stable or unstable based on its temporal stability. The temporal
stability is determined by counting the periodic beacons that a node receives from its
neighbors. Each node maintains the count of its neighbors beacons and classifies each
link as stable or unstable based on the beacon count.
11. Classify the routing protocol for ad hoc wireless
network o Routing information update mechanism
o Use of temporal information for routing
o Topology information organization
o Utilization of specific resources
12. Based on routing information update mechanism how the routing protocols are
classified? o Proactive or table driven routing protocol
o Reactive or on demand routing protocol
o Hybrid routing protocol
13. Give the major objectives of the transport layer protocol.
o Setting up of an end-to-end connection
o End-to-end delivery of data packets
o Flow control
o Congestion control
14. Why does TCP not work well in Ad hoc network?
o Misinterpretation of packet loss
o Frequent path breaks
o Effect of path length
o Uni-directional path
o Multipath routing
o Network partitioning and remerging.
15. List the issues in designing a transport layer protocol for ad hoc wireless networks
o Induced traffic
o Induces throughput unfairness
o Separation of congestion control, reliability and flow control
o Power and bandwidth constraints
o Dynamic topology
16. Specify some of the goals to be achieved in transport layer protocol for ad hoc wireless
networks.
o The throughput for each connection should be increased
o Throughput fairness must be provided across contending flows
o The connection setup and connection maintenance overhead should be minimal
o The protocol should have congestion control and flow control mechanism in the
network.
o The protocol should be able to adjust to the dynamic topological changes in the network

17. What additional state information is to be maintained at the FP in TCP-F?


The state information that is maintained at the FP in TCP-F is
Snooze state
Connected state
18. What is the impact of the failure of proxy nodes in split –TCP?

The failure of proxy nodes in splits TCP leads to throughput degradation. During
frequent path breaks or during frequent node failure, the performance of split TCP may be
affected.
19. WSN?
Wireless sensor networks are a network that consists of sensor which are distributed in
an ad hoc manner.
2. Compare wireless sensor network with ad hoc network
o Wireless sensor network mainly use broadcast communication while ad hoc networks use
point-to-point communication.
o Unlike ad hoc networks wireless sensor networks are limited by sensors limited power ,
energy and computational capability,
o Sensor nodes may not have global ID because of the large amount of overhead and large
number of sensors.
3. List the advantages of clustering
o Prevent interferences using CDMA
o Flexible and adaptive
o Efficient transmission using TDMA

4. List the disadvantages of clustering


o Cluster head formation more overhead
o Long distance for CH to travel
o Possibility of CH dead
5. Disadvantages of flooding.
o Implosion
o Overlap
o Resource blindness
6. Sequential assignment routing.
The sequential assignment routing algorithm creates multiple trees, where the root of
each tree is a one hop neighbor of the sink.

7. Data aggregation.
Data aggregation is the process of collecting and aggregating the useful data. It is
considered as one of the fundamental processing procedures for saving the energy.

8. Challenges caused by sensor network MAC protocol


o No single controlling authority, so global synchronization is difficult
o Power efficiency issue
o Frequent changes in topology due to node mobility and failure.
9. Kinds of MAC protocols used in sensor network
o fixed -allocation
o demand- based
o contention –based
10. List the IEEE 802.15.4 features
o Data rates of 250kbps, 40kbps and 20kbps
o Two addressing modes; 16 bit short and 64 bit IEEE
addressing o CSMA-CA channel access
o Automatic network establishment by the coordinator.
11. How an implosion is caused?
When duplicate messages are send to the same node it occurs, when a node receives
copies of the same messages from many of its neighbors.
12. When an overlap will occur?

The same event may be sensed by more than one node due to overlapping regions of
coverage. This results in their neighbor receiving duplicate reports of the same event.

1. Different ways of deployment,.


The deployment can be either
o Deterministic
o Randomized
2. Compare deterministic and random deployment
o In deterministic deployment, the sensors are manually placed and data is routed through
pre-determined paths.
o In random node deployment, the sensor nodes ar4e scattered randomly creating an
infrastructure in an ad hoc manner
3. What are the categories of power saving techniques?
o Schedule the wireless nodes to alternates between active and sleep mode
o Power control by adjusting the transmission range of wireless
nodes o Energy efficient routing, data gathering
o Reduce the amount of data transmitted and avoid useless activity.
4. Define OLSR

OLSR is optimized link state routing protocol which is a proactive protocol that employs
an efficient link state packet forwarding mechanism called multipoint relaying.

5. List the advantages of OLSR


o Reduced control overhead.
o Low connection setup
6. Define localization

Localization is the task of determine the position of a sensor or the spatial relationship
among objects.
7. Why GPS is not feasible in
localization? o Not available indoor
o Constraints on the cost of sensor
o Constraints on the size of sensor
o Constraints on the energy consumption
8. Location discovery mechanism.
o Indoor localization
o Sensor localization
9. Purpose of RSSI?
`Receiver signal strength indicator was used to determine correlation to distance.
10. ML technique? classify it.
Multi-lateration technique is the technique of location estimation depending on the beacons
nodes locations. They are,
o Atomic ML
o Iterative ML
o Collaborative ML

11. Define relative localization.


The aim of relative localization was to obtain the relationship of distance or angle
between nodes. Its distance is relative not absolute and the same angle.
12. Coverage.
Coverage is a measure of how well the network can observe or cover an event.

Coverage depends up on:

o Range and sensitivity of sensing nodes


o Location and density of sensing nodes in given region
13. Define breach path
Breach path shows the region of maximum vulnerability in a sensor network where the
coverage provided by the sensors is the weakest.
14. Use of voronoi diagram.
Voronoi diagram is used to solve the problem of coverage by partitioning the plane into
a set of convex polygon such that all points inside a polygon are closest to the sensor enclosed
by the polygon
15. How voronoi diagram is drawn?
It is drawn by perpendicular bisector of every line segment joining two sites and using
their points of intersection as the vertices of the convex polygons.
16. Delaunary triangulation?
Delaunary triangulation is a mathematical technique to solve this which is obtained from
voronoi diagram by connecting the sites whose polygons share a common edge.
17. What are the three function of SFQ?
o Message relaying
o Error recovery
o Selective status reporting
18. Define AOA.
The angle between the propagation direction of an incident wave and some reference
direction
D Bb

1. What Is A Wireless Sensor Network?

A wireless sensor network consists of three main components:  gateways, nodes, and
software.  The NI WSN platform provides options in each of these categories so that you
can customize your WSN to meet the unique needs of your application.
Wireless measurement systems can overcome power and network infrastructure
limitations and meet new and previously difficult application challenges. They deliver
reduced costs and increased flexibility compared to traditional wired measurement
systems, and they offer the ability to achieve long-term deployments with reliable, battery-
powered devices. 
2. What Is The Difference Between Ni Wireless Compactdaq And Ni Wsn Devices?

NI Wireless CompactDAQ devices combine IEEE 802.11b/g wireless or Ethernet


communication, direct sensor connectivity, and the flexibility of NI-DAQmx software for a
breadth of remote measurement and control options. Externally powered, NI Wi-Fi DAQ
devices can stream continuous waveform data on each channel at more than 50 kS/s and
offer the highest commercially available network security (WPA2 Enterprise). These
devices are intended for shorter term, high throughput/streaming applications, in which you
have a single host connected to your wireless client devices.
NI WSNs deliver low-power measurement nodes that operate for up to three years on 4 AA
batteries and can be deployed for long-term, remote operation. The wireless measurement
nodes communicate with a central gateway using a protocol based on IEEE 802.15.4 to
offer mesh routing capabilities that extend network distance and reliability. NI WSN
systems support lower data rates to preserve power, are easily programmed using I/O
variables.  These devices are intended for longer term, slower speed applications in which
you might be interested in monitoring your assets or environment once per minute, hour, or
day.  NI WSN supports multiple data consumers per client, meaning multiple people can
access data from your WSN monitoring system any where, any time.
3. What Wsn Products Are Available From Ni?

Consult the NI WSN Product and Configuration Guide to get up to date information on the
different node, gateway, and software options available from NI.
4. What Are The Features Of These Products?

The measurement nodes each offer four analog input channels and two to four digital
channels that you can configure on a per-channel basis for input, sinking output, or
sourcing output. Four AA alkaline or lithium batteries can deliver up to a three-year node
lifetime. The measurement nodes deliver -40 to 70 °C temperature ranges and industrial
shock and vibration ratings, and they communicate via 2.4 GHz IEEE 802.15.4 radios that
provide up to 300 m outdoor range with line of sight. The 9 to 30 V externally-powered
gateways provides flexible connectivity to Windows or real-time OS controllers.

5. Will Ni Offer More Measurement Options In The Future?


Yes, NI plans to continue investment in WSN technology and provide a breadth of
measurement node I/O options that are compatible with the current product offering.
6. Which Network Protocol Does The Ni Wsn Devices Use?

The proprietary NI WSN protocol is based on IEEE 802.15.4 and ZigBee technology. The
IEEE 802.15.4 communication standard defines the Physical and Medium Access Control
layers in the networking model, providing communication in three frequency bands
including the 2.4 GHz ISM band. ZigBee builds on the 802.15.4 standard with the network
and application layers, offering features such as device coordination, reliability through
mesh networking topologies, and the functionality to create user-defined profiles that allow
for customization and flexibility within the protocol. NI-WSN sits on top of the ZigBee layer
and closes the protocol to third-party devices, ensuring network and data reliability.
7. How Is The Network Configured?

o With NI-WSN software, which is included with the NI WSN gateways (or downloaded
here), you can easily configure your network in the Measurement & Automation Explorer
(MAX) utility. MAX provides an intuitive user interface to add and remove measurement
nodes and configure wireless settings. To set up your NI WSN, add your gateway under
Remote Systems in MAX and assign measurement nodes to a gateway by entering the
node serial number. Upon power-up or reset, the nodes automatically reconnect to the
assigned gateway. 
o You can also use MAX to view all of the nodes in your WSN and their last
communication time, battery status, and link quality. In addition, MAX provides an
interface to set the ZigBee communication channel, configure the Gateway IP address,
wirelessly update firmware on the measurement nodes, and configure a node to act as an
end device or mesh router.
o If you are using the NI 9792 Programmable WSN Gateway, these operations can also
be performed from a web brow
8. How Do I Extract Measurement Data From The Wsn?

NI-WSN software provides seamless LabVIEW integration so that you can quickly and
easily extract measurement data from your WSN. After adding aNI WSN gateway to a
LabVIEW Project, the nodes configured with the gateway in MAX automatically populate in
the LabVIEW Project, giving you instant access to their I/O and properties. Simply drag and
drop I/O variables from the LabVIEW Project to a LabVIEW Block Diagram for data
extraction, analysis, and presentation.
9. What Are The Power Requirements For Ni Wsn Devices?

o The measurement nodes can operate on four 1.5 V, primary AA alkaline or


Lithium cells or an external supply. Some NI WSN nodes support battery back-up,
meaning the node will automatically switch over to battery power if external
power is lost.  
o When nodes are configured as routers, they must remain on to send and
receive data across the network, and should be powered with an external source. 
o You can use sources other than wall power, such as solar or vibration energy
harvesting, to provide external power.
o The WSN-9791 and NI 9792 gateways requires an external 9 to 30 V power
supply.
10. How Do I Know Which Products Are Certified For My Country?

View the Wireless Product Certifications document to determine which products are
certified for use in your geographical region.
11. How Long Does A Node Operate On Battery Power?
Measurement node power consumption depends on a variety of factors including sampling
interval, temperature, network topology, RF environment, and whether or not the node
behavior has been customized with the NI LabVIEW WSN Module.  National Instruments
has found that with a one-minute sample interval at 25 C, typical battery lifetime is greater
than 2 years. 
12. How Many Nodes Can Connect To A Single Gateway?

Creating a reliable network topology is a very important aspect in building your WSN
system.  You should carefully consider network topologies and data communication paths
when setting up a WSN system. 
To ensure maximum network reliability, National Instruments suggest that you adhere to
the following criteria:
o Without the use of router nodes, no more than 8 end nodes can connect
directly to a single gateway
o Using router nodes, each gateway can connect to a maximum of 36 total nodes
(routers + end nodes combined)
o No more than 8 end nodes can connect to a single router node
o Each end node should be no more than 3 hops away from the gateway
o To achieve the greatest amount of end nodes, NI suggests a topology
consisting of one gateway, four router nodes, and 32 end nodes (eight end nodes
for each router).   To achieve the greatest coverage distance, NI suggests a
topology consisting of one gateway, eight router nodes, and 28 end nodes (seven
end nodes for each second-tier router). 
o The NI WSN protocol is built on a self-healing network, meaning that the
network will automatically re-configure if necessary.  Because of this, it is
important to analyze all network possibilities and maintain the 8:1 child-to-parent
ratio for all network possibilities when designing your WSN topology.

13. What Is The Range Of The Wireless Communication?

The NI WSN Gateways and Measurement Nodes utilize a 2.4GHz IEEE 802.15.4 radio.  The
Americas versions of these devices can maintain reliable network communication at an
outdoor range of 300 m with line of sight.  Exact device-to-device range will vary based on
geographic model, network traffic, network topology, and RF environment.
14. How Fast Can I Acquire Using Ni Wsn Devices?

o Using default firmware/device personality, in which inputs are sampled and


immediately transmitted to the gateway, the measurement nodes can sample on
the order of 30-60 samples per minute.  This rate is user-defined and can be
programatically assigned in NI LabVIEW.
o Using the programmable nodes and the LabVIEW WSN Module, you can
sample faster locally and store or process the data for transmission at a later
time.  Because of this, you can sample faster than the default rates. View the
LabVIEW WSN Benchmarks document for information on sampling faster with NI
WSN measurement nodes.
15. Can I Use The Measurement Nodes Outdoors?

o Yes. NI offers an IP65 outdoor enclosure for the WSN measurement nodes.
The NI WSN-3291 outdoor enclosure has two I/O glands for routing power or
sensor cables, and is shipped with four I/O gland inserts so that you can custom-
tailor the glands for your application. The enclosure has an external antenna that
connects to the node through an internal SMB connector as well as an internal
mounting plate with locking mechanism to secure the node inside.
o NI also offers an IP65 outdoor enclosure for the NI WSN-9791 Ethernet
Gateway.  An outdoor enclosure for the NI 9792 Programmable WSN Gateway will
be offered soon.
16. What Are The Host Controller Options?

Each WSN gateway provides different connectivity and host controller options.  With the NI
9792 Programmable WSN Gateway, no additional host controller is necessary, as the
device is a LabVIEW Real-Time target and can run independent of a host.  A LabVIEW Real-
Time application can be deployed to the NI 9792 to aggregate data from measurement
nodes and perform processing and analysis.  Even though no host controller is necessary,
you can still connect the NI 9792 to other devices, such as a windows PC, database, or third
party WSN gateways.  The NI 9792 offers dual ethernet ports and an RS-232 serial port to
connect to these types of devices.  Furthermore, the NI 9792 has a built-in web server so
that you can remotely visualize WSN measurement data in a web browser.
The NI WSN-9791 Ethernet gateway, however, does require the use of a host controller. 
The flexibility of ethernet allows you to choose either a Windows or real-time host
controller. The Windows controller can be a PC, industrial controller, laptop, or embedded
device running a Windows OS, including embedded OSs such as XP Embedded, and
LabVIEW for Windows. The real-time controller can be an NI CompactRIO or other
programmable automation controller (PAC) running a real-time OS and LabVIEW Real-Time.
17. Can I Interface With Other Wsns?

NI offers LabVIEW drivers for third-party WSN nodes, such as those from Crossbow,
Accsense, and Microstrain, so you can integrate NI WSN measurements with third-party
WSN measurements in your LabVIEW code. To communicate with these devices you must
use their gateway.  You cannot use third-party WSN (or other ZigBee) devices to
communicate directly with NI WSN gateways due to the proprietary NI WSN
communication protocol.
18. Can I Program The Node Itself?

o With the LabVIEW Wireless Sensor Network Module you can use graphical
programming to customize node behavior by adding intelligence to extend battery
life, increase analog and digital input performance, and interface with custom
sensors. You can also use the module to embed local intelligence, respond to
digital value change events, and modify behavior based on measurement inputs.
o The default behavior of an NI measurement node is to transmit every sample
acquired to the gateway; however, this is not a requirement for many applications
and the LabVIEW WSN Module can be used to average samples over time and
provide threshold or dead-band logic, allowing you to extend battery life by
transmitting only meaningful data. Additionally, acquisition rates on the node can
be increased by not incurring the overhead of transmitting each sample after
acquisition. Using the LabVIEW WSN Module, you can then perform processing
and data reduction on the node. LabVIEW WSN applications are downloaded over
the air to NI WSN measurement nodes, allowing seamless updates to deployed
nodes.
o Only the programmable versions of the measurement nodes can be targeted by
the LabVIEW WSN Module Pioneer.
19. Which Ades Work With Wsn?

NI wireless sensor networks currently only work with NI LabVIEW version 8.6.1 and later.
20. How Do I Get Technical Support For Ni Wsn Devices?

You can take advantage of the NI WSN Setup and Services page to find tutorials, drivers,
discussion forums and more.
NI also offers extensive support options through ni.com/support. You can call, e-mail, or
troubleshoot problems online with NI engineers. In addition, ni.com provides a wealth of
resources for every customer – from users getting started with NI WSNs to experts looking
for tips from the designers.
Online resources include the following:
o Downloadable drivers and updates for NI-DAQmx and other measurement
products
o More than 3,000 KnowledgeBase entries
o Online product manuals (downloadable help files and PDFs)
o More than 3,000 example programs.
21. What Warranty Is Provided With Ni Wsn Devices?

All NI WSN devices have a one-year warranty that covers defects in workmanship and material from
the date of product shipment. Extended warranty options are available that can help you fix your
maintenance costs over two or more years

You might also like