2020
DOI: 10.1166/jctn.2020.9109
|View full text |Cite
|
Sign up to set email alerts
|

Architectural Analysis of Wireless Sensor Network and Underwater Wireless Sensor Network with Issues and Challenges

Abstract: Wireless Sensor Network (WSN) now days become a promising technology in which the set of sensor nodes are installed to form a network and these sensor nodes send data to a storage centre called sink or off shore base station. This data helps in revolutionizing many sensor network based application areas like military, sciences, automobile industry etc. Further, there exists another category of this broad field that is Underwater Wireless Sensor Network abbreviated as UWSN in which sensor nodes are deployed un… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 13 publications
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…Each of these components has a specific role and function in accordance to specified protocols andconstrainedpolicies.Thedominantfunctionoftherouteristobridgetheconnectionbetween computernetworksandensurepacketstransmissiontotheirdestination (Choudhary&Goyal,2021). Inaddition,therouterpreventsanyunauthorizedaccesstothenetworks(Derakhshanfard&Soltani, 2021).Therefore,forthedatatobespreadbetweenthecomputernetworks,ithastobestoredinthe routerbuffer,andprocessed.Then,itwillbeforwardedaschunkstoitsdestinationviatherouter usingFirst-InFirst-Out(FIFO)methodasshowninFigure1 (Abbasov&Korukoglu,2009;Goyal, 2020;Woodward,1994).…”
Section: Introductionmentioning
confidence: 99%
“…Each of these components has a specific role and function in accordance to specified protocols andconstrainedpolicies.Thedominantfunctionoftherouteristobridgetheconnectionbetween computernetworksandensurepacketstransmissiontotheirdestination (Choudhary&Goyal,2021). Inaddition,therouterpreventsanyunauthorizedaccesstothenetworks(Derakhshanfard&Soltani, 2021).Therefore,forthedatatobespreadbetweenthecomputernetworks,ithastobestoredinthe routerbuffer,andprocessed.Then,itwillbeforwardedaschunkstoitsdestinationviatherouter usingFirst-InFirst-Out(FIFO)methodasshowninFigure1 (Abbasov&Korukoglu,2009;Goyal, 2020;Woodward,1994).…”
Section: Introductionmentioning
confidence: 99%