Professional Documents
Culture Documents
Research Paper Upon Eigrp, Ospf and Ripv2
Research Paper Upon Eigrp, Ospf and Ripv2
Abstract—The medium access control (MAC) protocol attention, driven by an increased number of wireless
provided by the IEEE 802.15.4 standard (contention-based autonomous devices, the expansibility of the internet and a
CSMA/CA scheme) is not tailored to supply the QoS support drive to reduce errors and increase efficiency [6]. However,
demanded by real-time applications because of collisions, the IoT paradigm has spread out since to accommodate any
especially under high loads. The Internet of Things (IoT) object which has the capability to interact directly with its
exemplifies a networking paradigm which requires the regional neighbors. In this context, the Internet can be
incorporation and interoperability of diversified wireless regarded as a backbone network that connects a large
standards. Data delivery across such integrated frameworks number of smaller peripheral networks, each of which would
encounters challenges in terms of scalability and latency
group physical objects according to their physical properties
among other aspects. As a comprehensive analysis addressing
such constraints is not available, we have developed a new
and neighborhood relationships. In a standard WSN topology,
technique for data gathering and have performed experiments if every end node communicates directly with the access
to explore its effect on scalable network efficiency. The point, ignoring the neighbor nodes in the network and data
experimental network consisted of Waspmotes, programmed delivery mode, then the communication load would cause
in C++ in a scalable star topology, emulating a typical home performance degradation in throughput and latency and
IoT network. Performance parameters of the MAC layer were exhaust the system’s power resources. Therefore, the aim of
measured while varying the network size and sending this study was to investigate through experiment, what was
technique in non-beacon transmission mode. Results show that the best delivery technique in a scaled star topology network
network performance varies greatly with different delivery that could be later on applied in an IoT environment such as
modes, providing a theoretical basis for improving network a smart home environment.
structure in smart home applications.
I. INTRODUCTION
A wireless sensor network (WSN) is a collection of
nodes deployed to measure and report certain parameters in
applications such as environmental, biomedical, surveillance
and security. Each sensor node consists of sensing,
processing, power and radio units [1], [2], [3]. Sensor nodes
report to specific sink-nodes which then convey information
to the internet. Fig. 1 depicts this WSN model [4].
Different data collection methods are used in a WSN, Figure 1. Multi-hop wireless sensor network model.
depending on the application. In an event-driven network,
the reporting process is triggered by one or more sensor II. RELATED WORK
nodes which observe an event and relay it to the monitoring
The MAC layer provides two different modes of channel
station. By contrast, in a demand-driven network the
access operation: the beacon and non-beacon mode. In the
reporting process, is initiated by the monitoring station and
non-beacon mode, the unslotted CSMA/CA mechanism is
sensor nodes report their data in response to a specified used to postpone for a random period of time and sense the
request. In a time-driven network, each sensor node sends channel before the packet transmission. The sensor node can
data in a periodic manner. A wildlife-monitoring WSN in a send the packet only when the channel is sensed to be idle.
forest is likely to be event-driven, whereas an inventory Otherwise, it delays for another random time period and
control system will probably be demand-driven. A hybrid checks the channel again. However, beacon mode (i.e with
system is one that can manage both classes, event and slotted CSMA/CA), comprises a Superframe structure with
demand-driven. an optional reservation-based mechanism called guaranteed
The Internet of Things (IoT) was first conceived by the time slot (GTS) [7] which is out of the paper scope. Diverse
MIT Auto-ID Center [5] and has acquired considerable research studies and analytical models for performance
625
while nodes are neither transmitting nor receiving data. Idle of the received data. It represents a sink and a cluster head
listening is a considerable cause of energy waste in WSNs. among cluster members. Fig. 3 explains the testbed
depleting 50% to 100% of the energy required for receiving architecture. The nodes were configured as shown in table 1:
[18, 19].
The preferred scheduling technique in WSNs is TDMA, TABLE I. CONFIGURE INFORMATION
since it is more reliable, does not require a complex Characteristic Value Characteristic Value
hardware design and allows inactive nodes to enter the sleep Transmission 18 dB (60.6 Beacon enabled disenabled
state. Hence it provides excellent energy savings, but is not power level mW)
scalable, nor adaptive to the dynamic changes of the number Transmission 2.4GHz BE min 0
of nodes in the network. Consequently, we developed an bands
improved MAC mechanism who is more reliable and take Data rate 250kbps NB max 4
Receiver -96 dBm Acknowledgement enabled
into account the aforementioned issues. Scalability. A MAC sensitivity mode
protocol should adapt and run properly in a dynamic and
scalable topology.
B. Parameter Setting
IV. IMPLEMENTATION OF THE ANALYSIS
The main performance parameters measured in this
In this study, the scalability and data delivery technique analysis were delay and packet delivery ratio (PDR). Delay
of a single-hop star topology is considered, with a PAN in the MAC layer represents the end to end delay of each
coordinator at the center of the network, using, 2, 10 or 30 packet received by the 802.15.4 MACs of all WPAN nodes
end nodes which only communicate with the coordinator in a in the network and forwarded to the higher layers. MAC
periodic transmission (one packet every 2 seconds) using layer notifies the upper layers about successful transmission
unslotted CSMA/CA. Each node with pending packets starts or deletion of MAC packet. Hence, the MAC layer delay is
the CSMA/CA algorithm in the active period of its duty defined as the time interval from the instant packet received
cycle to detect the channel and send the packets. by MAC layer to the instant notification about the final status
A. Physical Testbed Scenario of the packet sent. In applications sensitive to time, a long
delay would seriously affect the quality of communication.
The experimental network was based on the Libelium PDR, P is defined as the ratio of total number of the received
Waspmote as hardware platform [20], due to its energy Acknowledgements ACKs from destination and the total
efficiency and ease of programming it in C++. This is an number of generated packets by the source node (GPacks).
open source microcontroller board based on the Mathematically, this is computed as in equation (1):
ATmega1281 chip. The XBee module is deployed as a radio
communication for MAC and PHY layers of the IEEE ்௧௦
802.15.4 standard, while a temperature sensor is used as a ܲ ൌ ்௧ீ௦ (1)
sensing part for the sensor node. Backoff exponent (BE) is a
random number determines the random backoff interval
before sensing the channel. Maximum number of CSMA 1) Node scale effect on the network performance in
backoff (NB) or sometimes called (macMaxCSMABackoffs) terms of packet delivery ratio and delay: Packets are
is the number of times that the node stays in the backoff generated at each end node at a rate of 0.5 per second. The
stage after unsuccessful channel sensing before the packet round time is one minute which refers to the total duration
being dropped. of transmission setup and continuous data processing phase.
Each end node will send one packet at a time to the sink.
The comparison between the three network sizes in terms of
packet delivery ratio and average delay is illustrated in Figs
4 and 5 respectively.
The PDR is 100% for a small network and decreased
gradually to about 80% for the network with N=30. The
delay increased, slowly between N=2 and N=10, but almost
doubled as the size was increased to 30.
2) The effect of sending technique on performance of a
Figure 3. Analysis testbed architecture.
scalable network: This experiment has been implemented
Two sensor node prototypes have been applied in this for two periodic sending techniques. The first is to send one
analysis, the simple and the advanced cluster head. The packet a time every 2 seconds and the second technique is
simple node performs sensing and communication only, transmitting one block of 30 packets at a time every 1
without any processing capabilities. This node is composed minute (1 round time). These techniques applied CSMA/CA
of a temperature sensor (MCP9700A) plugged to method. As a result, each physical node will send 30 packets
ANALOG6 pin of Waspmote board. It sends data packets to per round for both cases. The average values of MAC layer
the cluster head in hierarchical topology. The advanced delay and PDR of the different sending modes with varied
cluster head node performs communication and processing
626
node size were shown in Figures 6,7, and 8. It seems clear
from Figures 6 that in case of small network (2 nodes) the
PDR is the same (100%). Nevertheless, the periodic sending
technique with one block at a time for small network suffers
from collisions that produce more delay when sending one
block a time than one packet at a time for the same network
size as shown in Fig. 8. Fig. 7 demonstrates the strong
influence of data delivery mode on the average delay in
medium network. Therefore, sending one block of data at a
time produces higher delay than applying the other data
delivery technique for a scalable network especially in case
of large node size.
Figure 7. Impact of delivery mode on average delay in three network
sizes.
627
Fig. 9 demonstrates total delay for Dynamic CSMA in first application requirements) so that the channel allocated for
round equal to 39597 ms, hence the saved time is 10,403 each end node will vary in each round. At the end of each
(50000 – 39597). round the coordinator will send periodic request to every end
The BE value set up to zero to disable collision node. The analysis evaluation has been done within 4 rounds.
avoidance since first iteration, and thus the waiting delay is End node will initiate data transmission upon receiving data
null because of free medium contention. An experimental requested packet. Before sending the last data packet to the
work has been achieved to implement the dynamic CSMA sink, the end node includes an indicator at the end of payload
which means that the amount of data captured in each end to declare data transmission termination. In return, the
node will be variable according to a specific rules coordinator continues to issue a new data request to the other
(temperature higher/less than a certain value depend on the end nodes.
Static time division technique total slot time for 10 nodes = 50,000 ms
(5000(ms)/node)
Dynamic CSMA technique total slot time for 10 nodes (first round) =
39597 ms (less than 5000/node)
Figure 9. Total transmission time for static TDMA and dynamic CSMA during first round.
628
[6] G. Santucci, “The Internet of Things,” in :Between the Revolution of [13] G. Campobello, A. Segreto, and S. Serrano, “Data gathering
the Internet and the Metamorphosis of Objects, H. Sundmaeker, P. techniques for wireless sensor networks: A comparison,”
Guillemin, P. Friess, & S. Woelffle, (Eds.) Forum American Bar International Journal of Distributed Sensor Networks, vol. 2016, 2016.
Association, pp. 11-24, Feb. 2010. [14] S. Moulik, S. Misra, C. Chakraborty, Performance Evaluation and
[7] Z. Xiao, J. Zhou , J. Yan , C. He , L. Jiang , and N. Trigoni, Delay-Power Trade-off Analysis of ZigBee Protocol”, IEEE, ISSN
“ Performance evaluation of IEEE 802.15.4 with real time queueing”, 1536-1233, pp. 1-14, 15 May 2018.
ScienceDirect press, Vol. 73, pp. 80-94, 27 February 2018. [15] C. Zhang and W. Luo, "Topology Performance Analysis of
[8] S. Persia and D. Cassioli, “Energy/latency trade-offs in geographic Zigbee Network in the Smart Home Environment," College of
routing for ultrawideband wireless sensor networks,” in Electrical and Information Engineering Guangxi University
SENSORNETS’12,pp. 115–118, 2012. of Science and technology, Guangxi Zhuang, 2013.
[9] C. Buratti, R. Verdone, “Performance Analysis of IEEE 802.15.4 Non [16] J. Wright, “Detecting Wireless LAN MAC Adddress Spoofing”,
Beacon-Enabled Mode”, IEEE Transactions on Vehicular home.jwu.edu/jwright.
Technology, Vol. 58, No.7, pp. 3480-3493, 2009. [17] J. Hall, M. Barbeau, and E. Kranakis, “Detection of Transient in
[10] F. Martelli, C. Buratti, and R. Verdone, “Modeling Query-Based Radio Frequency Fingerprinting using Signal Phase”, Internet and
Wireless CSMA Networks Through Stochastic Geometry”, IEEE Information Technology (CIIT), 2004.
Transactions on Vehicular Technology, Vol. 63, No. 6, July 2014. [18] T. Kohno, A. Briodo, and K. Claffy, “ Remote physical device
[11] D. D. Guglielmo F. Restuccia G. Anastasi M. Conti S. K. Das fingerprinting”, IEEE Transactions on Dependable and Secure
"Accurate and efficient modeling of 802.15.4 unslotted CSMA/CA Computing, vol.2, pp.93-108, 2005.
through event chains computation" IEEE Trans. Mobile Comput. vol. [19] C. Park, Q. Xie, P. H. Chou, and D. Node, “Wi-Fi-based Sensor Node
15 no. 12 pp. 2954-2968 Dec. 2016. for Real-Time Structural Safety Monitoring, the Fourth International
[12] X. Cao, J. Chen, Y. Cheng, S. Shen, and Y. Sun, “An Analytical Conference on Information Processing in Sensor Networks (IPSN),
MAC Model for IEEE 802.15.4 Enabled Wireless Networks with 2005.
Periodic Traffic”, IEEE Transactions on Wireless Communications, [20] Datasheet, W. (2018). Waspmote, Libelium Comunicaciones
to appear. DOI: 10.1109/TWC.2015.2435006 Distribuidas S.L, 1-27.
629