CHAPTER 5 OPTIMIZATION OF CONTIKIRPL

Size: px
Start display at page:

Download "CHAPTER 5 OPTIMIZATION OF CONTIKIRPL"

Transcription

1 113 CHAPTER 5 OPTIMIZATION OF CONTIKIRPL 5.1 INTRODUCTION The WSN network-link reliability and best link selection depends upon the routing protocol objective function and routing protocol parameters. The Internet Engineering Task Force (IETF) has standardized the Routing Protocol for Low Power and Lossy Networks (RPL) to be used in WSN. The overall network metrics like packet delivery ratio, battery consumption depends upon the routing protocol network response and control packets overhead. The RPL parameters influence the performance of WSNs. The current work analyzes the contribution of RPL parameters to the routing link quality and to obtain the optimized values using regression based mathematical modelling concept. In order to deploy WSN for any particular application, the RPL parameters have to be analyzed and optimized. The optimal value must be used in deployment. The Contiki OS with RPL implementation is suitable for deployment in real-time practical scenario. In the current project RPL protocol operation is briefly studied, and simulated using COOJA Simulator, a Java based real-time simulator. The actual application layer code is used to analyze the network metrics using COOJA Simulator. These optimal values can be used in the deployment of Arduino board, a low cost efficient mote. The route selection and other parameters can be studied using passive probing mechanisms. The passive probing is a recent trend deployed in WSN analysis.

2 114 The current work will provide a good understanding and optimization for WSN before deployment and in reconfiguration of objective function. Optimization of network and battery efficiency is the primary concern for the deployment of WSN. The RPL parameters decide battery consumption, network efficiency, routing-tree convergence time, routing table correction and data collection rate. Battery consumption depends on the overhead due to the transmission of control packets. Optimization of network and battery efficiency is the primary concern for the deployment of wireless sensor network to any specific case. RPL parameter impacts on network efficiency and overhead are obtained by the simulation of WSN environment using COOJA simulator and MATLAB curve fitting tool is applied to find the optimum RPL parameter value for a particular implementation. Traditional Zigbee based mesh networking require royalty fee for commercial deployments and the code may lack compatibility with future versions of motes. The ultimate goal of the work is to provide a real-time royalty free Contiki OS based WSN for future implementation. Indigenous solution of wireless sensor motes is needed in the atomic radiation monitoring and military applications. The open source software console is available to monitor, control and tweak every parameter of the network. No malware or spyware can hide in the open source code. For any practical deployment, the complete stack can be thoroughly analyzed. The network monitoring console with Java based front end will be helpful in monitoring the node activities with its remaining battery power and RSSI among each parent. Multiple parent selection in each node to ensure the safe delivery of the packets can be accomplished in RPL with slight changes in MAC layer protocol. The current work is a base work for many upcoming valuable projects to the society satisfying the practical requirements.

3 CHOICE OF OPERATING SYSTEM The Operating System in case of WSN is a very challenging one, as it demands high memory and processing power constrained environment with a need for conservation of battery power also. The selection of a particular operating system depends on parameters listed in Table 5.1 below. Table 5.1 Comparison of various available WSN OS Parameters Scheduling Dynamic Reprogramming WSN Operating Systems (OS) Contiki Tiny OS MANTIS SOS Pre-emptive Non Preemptive Pre-Emptive Non Preemptive YES YES NO YES Thread Stack Memory Shared Stack Individual Individual Individual Programming Language C NesC C C Active Development Yes Partial No No The Contiki OS, with event driven mechanism, also with support for proto-thread based execution with active developers is the ideal candidate. Contiki 2.7 version was released in November 2013 with vast improvement in areas of IPv6 mesh networking and lot of bugs are fixed, with a neat code flow. Apart from TI, Atmel, AVR, ST, Arduino platforms, TI CC System-on-a-Chip, PIC32 platforms are also added to the supported platforms list. The advantage lies in the real time simulation of the above platforms in COOJA simulator, with a new regression framework. The competitor TINY OS with NesC framework (steep learning curve) and static only compilation modules makes it a slow runner in terms of

4 116 the competitive WSN market (Gay et al 2003). Almost most developers in this area switched to Contiki OS due to its structured framework written in C and availability of real time simulation, direct hardware support (Tsiftes et al 2010). The code written need not be altered for the deployment purposes. The code analyzed and debugged in simulator will work in the field hardware, most of the times, reducing development time, time to market and also facilitating cost-effective application development. The real hardware is not mandatory during application development phase. Thus analyzing all the above parameters Contiki OS is being opted for the long term use in precision agriculture, with no royalty fee. The custom application framework of zigbee framework is not reliable, due to the following reasons; new versions may not be compatible with older version like the case with Microsoft development framework and royalty fee for commercial agricultural deployment. 5.3 CONTIKI OS Contiki is an open source, multi-tasking operating system for memory-efficient network embedded systems and memory constrained wireless sensor networks which are highly portable. Contiki is especially designed to adapt the microcontrollers with small amount of memory. A Contiki configuration typically consumes 2 KB of RAM and 40 KB of ROM. Contiki supports IP communication with both IPv4 and IPv6. The uipv6 embedded IP stack, is used by a large number of companies (Dunkels 2004; 2012). Contiki introduced the idea of using IP communication in low-power sensor networks. This subsequently led to an IETF standard and the IPSO Alliance, an international industry alliance. Contiki is developed by a group of developers and experts from industry and academia. The Contiki

5 117 team currently consists of sixteen developers from various organizations such as SICS, SAP AG, Cisco, Atmel, NewAE and TU Munich. Contiki contains two communication stacks: uipv6 and Rime. uipv6 is a small RFC-compliant TCP/IP stack that creates the possibility of communication with internet. Contiki runs on a variety of platforms ranging from embedded microcontrollers such as the MSP430 and the AVR to low configuration computers. The footprints of the code occupy several kilobytes whereas the memory utilization is configured to be as low as few bytes. Contiki is written in the C programming language and is freely available as open source under a BSD-style license Contiki Folder Structure The folder structure of Contiki OS is shown in Figure 5.1 and the entire code for RPL routing protocol is present in /Contiki- 2.6/core/net/rpl/rpl-icmp6.c. RPL timer logic is present in rpl-timers file. The formation of DODAG tree is present in rpl-dag file. Figure 5.1 RPL and its related folders

6 118 The complete logic of the routing protocol RPL and its corresponding code is available in these folders. The macros in RPL configuration are declared in rpl.conf. The rpl.c file contains the routing logic and objective function calculation functions. The rpl-icmp6.c file contains coding for routing wrapper functions. The rpl-private file contains data structure specific to RPL layer. The UDP socket program is used to run the real time application with a Border router and several motes COOJA Simulator A COOJA simulation environment is used for the evaluation of the Optimized ConitkiRPL protocol using Contiki Operating System. COOJA is an extensible java based cross level real time simulator for the Contiki OS. It simulates actual working of the wireless sensor nodes and provides bit level accuracy timing between different nodes. COOJA is a user friendly simulator as it is implemented in JAVA. It allows the interfacing of JAVA native interface with the sensor node software which is written in C language. This makes the software extensible to the users. COOJA has high flexibility as well as allowing the simultaneous simulation of all levels of the system; sensor node platforms, operating system software, network level protocol, radio transmission model and radio transceiver. The performance of COOJA is evaluated in terms of efficiency, scalability, flexibility and extensibility. Many factors affect the efficiency of the simulator such as number of nodes, radio model allocation and number of concurrent observers. During simulation, COOJA has the flexibility in allowing the usage of a range of radio models and the evaluation of the performance of the Optimized ContikiRPL protocol is done using unit disk graph model with distance loss. The network size is varied as 30, 50,100 nodes of same type with the native code. This radio model creates a loss in packet transmission if the radio range of a particular mote is greater than it

7 119 communication range threshold. There are four interfaces namely position interface, ID interface, clock interface and LED interface for each simulated node. The LEDs of the nodes are toggled periodically 10times/sec. The serial logs generated from the nodes can be viewed in the mote output window, which is stored in the file for later analysis. The following are the steps to simulate the Wireless Sensor Network on COOJA simulator, Start the COOJA simulator by entering following commands in the path /Contiki-2.6/tools/COOJA $cd /Contiki-2.6/tools/COOJA $ant run The above command shows the COOJA simulator default window, from the file menu, create a new simulation. Save the simulation in file system with a file name. type of mote. Add motes from Motes menu->add Mote drop down->choose the Choose the program file that has to be compiled or create a new simulation. Choose the advanced settings parameters During compilation, choose the number of motes and its arrangement. Important Note: Increase the buffer size from tools->buffer size. The buffer size denotes the buffer memory allocated for the number of log output lines generated.

8 120 The flow chart of execution in the COOJA simulator environment is shown in Figure 5.2. Start Create new simulation Add WSN mote Compile program Correct Errors Compilation Errors? Run Simulation Analyze log files Stop Figure 5.2 Flow Chart of Simulation using COOJA The simulation is carried out using 2.4 MHz Pentium processor with 512MB RAM running on Ubundtu. The sample screen shot of COOJA simulator environment is shown in Figure 5.3 and its flowchart is shown in Figure 5.2. The screen shot illustrates the radio interaction among WSN motes. The log messages from the individual motes are shown in milliseconds in the mote output window. There exists a linear relationship between the simulation time and processing power. As the number of active interfaces and plug-ins increases the execution time and processing power has a gradual increase as well.

9 121 Figure 5.3 COOJA Simulator Screen Shot Network Performance Metrics Calculation Among the various network metrics, convergence time, control overhead and packet delivery ratio is computed using the following formulas. The necessary debug prints are included in the Contiki RPL layer code. The log messages generated during simulation of WSN motes are stored in a log file. The log file is analyzed using the PERL script. The PERL script is developed to act on a set of files and the result is collected in result.log file. The formulas for calculating network performance metrics is shown below Formulae: Convergence time = Last Dag Joined First Dio Sent Control Overhead = (Control Packets / Data Packets) *100; Packet Delivery Ratio = (Successfully Received/ Transmitted Packets) *100;

10 REGRESSION ANALYSIS In order to investigate the relationship between the input and output variables, Regression analysis is a suitable statistical tool (Brown 2001). This analysis ascertains the effect of one variable over the other variable. The unbiased nature of estimation about causal variables of interest over other variables is explored obviously. An estimator is said to be unbiased if the mean of the variable is equal to the true value of the parameter. If it is biased, then the consistency of the variable for accurate estimation is checked. An estimator is said to be consistent, if it utilizes the additional information of the variable such as variance and verifies for zero, as the sample size is enlarged to a large value. This means the estimate is equal to the true value with a limit of infinite sample space. An estimator is said to be efficient or best if the variance of that variable is very low Regression Analysis Mathematical Models used In any Industrial situation, to predict the output from several input parameters, prediction of appropriate mathematical model for the system under consideration is a foremost task. The mathematical modeling using linear and non linear equations can be predicted by using regression analysis (Orlov 1996). Traditional examples for regression analysis are Tar Output from Industry based on input fuel temperature Engine Mileage The concept of regression analysis deals with finding the best relationship between output and input parameters by quantifying the strength of relationship and finding the best mathematical model. Upon identifying the suitable model, prediction of future response is made possible.

11 123 The linear and non-linear models used in regression analysis and their application areas are shown in Table 5.2. Table 5.2 Mathematical models comparison table Name Model Equations Best Usage n+1 Polynomial Model y = p i x n+1 i Exponential Model Fourier Series i=1 y = ae bx y = ae bx + ce dx n y = a 0 + i=1 a i cos nwx + bisinnwx n Gaussian Model y = a i e x b 2 i c i i=1 *Simple Empirical Model *Interpolation *Extrapolation *Rate of change of quantity is proportional to the initial quantity *Periodic Signal analysis *Peak Fitting Process *Spectral peaks Modeling Best fit Analysis RPL Optimization Models The best model suited for mathematical prediction can be judged from fit parameters namely, Error Sum of Squares (SSE), Coefficient of Determination (R 2 ), Root-mean-square-error (RMSE). The Error Sum of Squares SSE value is variation due to error, or variation unexplained. If SSE= 0, all variations are explained. SSE = n i=1 yi yi 2 (5.1) equation, The total corrected Sum of Squares SST is given by the following SST = n i=1 yi yi 2 (5.2)

12 124 The SST represents the variation in response that ideally would be explained by the model. The quantity and the Coefficient of Determination R 2 is a factor to determine correctness of fit. If fit is correct and all the residuals are zero then R 2 will be = 1. If fit is not proper, worst case R 2 will be = 0. Maximum value of Coefficient of Determination states the correctness of fit. R 2 = 1 SSE SST (5.3) The lack of fitness can be predicted using S 2 fit parameter. Lesser the value of S 2, means better is the fitness of model. S 2 = k i=1 n i i si 2 n k = k i=1 n i j =1 n k y ij yi 2 (5.4) The next fitness parameter Root-mean-square-error (RMSE) is a measure of differences between the values predicted by a model and simulation results. The individual differences are called residuals. The RMSE is a good measure of accuracy but useful only to compare various mathematical models. The results obtained from real-time simulation can be used to predict an appropriate mathematical model to identify the impact of routing protocol parameters. The Routing protocol parameters are optimized based on the predicted mathematical model. The suitable mathematical model for routing parameters was found by goodness of fit. The goodness of fit was analyzed by statistical metrics such as R 2, RMSE values. Mathematical function for different parameter impact was found and applied in maxima and minima algorithm to get optimal values. The surface fit models will be helpful to analyze multi-variable optimization. The interpolated model with bi-harmonic function and

13 125 polynomial function is shown in Figure 5.4 & 5.5. Figure 5.4 shows, surface fitting of DIO Interval Minimum rate and DIO Doubling rate versus network convergence time using interpolate bi-harmonic function model. Figure 5.5 shows surface fitting of DIO Interval Minimum rate and DIO Doubling rate versus network convergence time using polynomial function. Figure 5.4 Surface Fitting Interpolated bi-harmonic function Figure 5.5 Surface Fitting Interpolated polynomial function

14 PROPOSED METHOD OF OPTIMIZATION OF RPL Impact of RPL Parameters The RPL protocol has trickle timer mechanism for routing table formation, stabilization and repairing. The three RPL parameters such as DODAG information Object (DIO) Interval minimum rate, DIO Doubling rate, DIO Redundancy rate decides network response in terms of convergence time and energy efficiency in-terms of control overhead ratio. Impact analysis of the above said parameters to network performance was carried out, and plotted in a graph. Using Regression analysis, the mathematical model is obtained for different experimental graphs. The Regression analysis provides co-efficient of mathematical models for RPL optimization. The Mathematical functions obtained were optimized using second-degree differentiation techniques such as maxima and minima functions, with constraint limits Steps to Optimize RPL Routing Protocol Step 1: Devise Experimental Setup and Research methods. i.e decide parameters selected for analysis and environmental parameters was also standardized. Step 2: Implant debug log messages in application and Contiki OS routing code. Step 3: Run Simulation for different experimental setup. Step 4: Collect the log files with specific name and simulation time. Step 5: Devise PERL script to analyze the log files.

15 127 Step 6: Obtain relation between RPL parameter and network performance metrics. Step 7: Apply regression analysis and obtain the mathematical mode. Step 8: Plot and validate goodness of mathematical model. Step 9: Apply Optimization algorithm upon obtained mathematical functions. Step 10: Tabulate the optimum values. Step 11: Use optimum values for hardware deployment. Proposed optimization method is carried out for RPL routing using COOJA network simulator and results are plotted in Simulation Results. The optimum values are discussed in Table IMPLEMENTATION DIO Interval Minimum Rate - Variation The DIO INTERVAL MINIMUM is an important RPL parameter that determines the frequency of control packets being sent from the parent nodes to children nodes in a DODAG Graph. If the DIO INTERVAL MINIMUM time is very short, then a large number of control packets will flood the network, this will lead to collision and packet loss. The short DIO INTERVAL MINIMUM RATE time value will lead to faster network convergence. The routing path will get stabilized in a short time-span. If any node is lost, then local repair and global repair will also take place in as faster rate. DIO INTERVAL MINIMUM will have impact on following network quality parameters,

16 128 Convergence time Control Overhead in turn leads to energy loss Packet delivery ratio Energy consumption due to control overhead data Hence DIO INTERVAL MINIMUM value has to be optimized. The default value specified in RPL draft is 3 seconds. This leads to large control overhead. The Contiki OS has set a default value of 12 seconds. The simulation results are shown in Table 5.3. Table 5.3 RPL simulation for DIO interval minimum variation RPL Simulation for DIO Interval Minimum RPL Parameter - Convergence Control Data Ctrl/Data DIO Interval Min Time (s) Packets Packets Packets Ratio Simulation Setup: 20 Nodes & 1 Border Router Simulation Time ms

17 129 Figure 5.6 Convergence time variation for DIO Interval Minimum The convergence time for the DIO Interval Minimum variation is shown in Figure 5.6. The lower convergence time is better for the network stabilization and network repair. The figure is drawn using Microsoft Excel. It is obvious that the convergence time increases with various values of DIO Interval Minimum. Figure 5.7 Control Overhead variation for DIO Interval Minimum

18 130 For the lower values of the DIO Interval Minimum, the control overhead is very high. To find the optimal value of DIO Interval Minimum rate, the mathematical model for experimental value should be obtained. The MATLAB curve fitting tool is used to determine the goodness of the fit. The fitness of mathematical model is shown in Table 5.4 and Table 5.5. Table 5.4 RPL DIO Interval Minimum Convergence Time Analysis RPL DIO Interval Min vs Convergence Time : Model Fitness Table S.No Model name R 2 RSME SSE 1 Polynomial Deg exp6 2 Polynomial Deg exp 5 3 Polynomial Deg Polynomial Deg Exponential - 1 term exp4 6 Exponential - 2 term exp4 7 Fourier Series - 1 term exp5 8 Fourier Series - 2 term Power Series - 1 term Power Series - 2 term Gaussian Model - 1 term Gaussian Model - 2 term Rational Polynomials 1 term Rational Polynomials 2 term Sum of Sines - 2 term exp4 16 Weibull Distribution 0 - -

19 131 Table 5.5 RPL DIO Interval Minimum Control Packet Analysis RPL DIO Interval Min vs Ctrl Packet Overhead : Model Fitness Table S.No Model name R 2 RSME SSE 1 Polynomial Deg exp4 2 Polynomial Deg Polynomial Deg Polynomial Deg Exponential - 1 term Exponential - 2 term Fourier Series - 1 term Fourier Series - 2 term Power Series - 1 term Power Series - 2 term Gaussian Model - 1 term Gaussian Model - 2 term Rational Polynomials 1 term exp04 14 Rational Polynomials 2 term exp04 15 Sum of Sines exp04 16 Weibull Distribution The default value of DIO Interval Minimum rate in Contiki OS is 12 seconds and optimized value using mathematical modeling is 11 seconds. The predicted model curve and the experimental data points are shown in Figure 5.8.

20 132 Figure 5.8 DIO Interval Minimum Curve fitting Results DIO Doubling Rate - Variation DIO Doubling rate time is used to decrease frequent firing of DIO messages in case of a stable network. If link metrics are same and no update occurrs in RPL DODAG Tree, then the DIO Doubling timer is increased. Next DIO message will be transmitted after the expiry of DIO Interval Minimum. New DIO Interval Minimum = Original DIO Interval Minimum + DIO Doubling Rate

21 133 Table 5.6 RPL Simulation for DIO Doubling Rate RPL Simulation for DIO Doubling Rate RPL Parameter - DIO Doubling Rate Convergence Time (s) Control Packets Data Packets Control/Data Packets Ratio Simulation Setup: 20 Nodes & 1 Border Router Simulation Time 10000ms Figure 5.9 Convergence Time variation for DIO Doubling Rate

22 134 Figure 5.10 Control Overhead variation for DIO Doubling Rate From the results of the graph shown in Figure 5.9 and 5.10, one can clearly see that the DIO Doubling rate has no impact on the convergence time but the control overhead decreased considerably with increase in DIO Doubling rate. The default value is 12 seconds and manual optimal value obtained from simulation is 18 seconds as evident from Table 5.6. Table 5.7 RPL Simulation - DIO Doubling Rate vs Convergence Time S.No Model name R 2 RSME SSE 1 Polynomial Deg exp exp-32 2 Polynomial Deg 2 Not fit 3 Polynomial Deg exp exp Exponential - 1 term Exponential - 2 term Fourier Series - 1 term Fourier Series - 2 term Power Series - 1 term Power Series - 2 term 1 0 0

23 135 The goodness of the mathematical model to fit the experimental results is shown in Table 5.7 and Table 5.8. From the tables, the best mathematical model for convergence time and control overhead is obtained. Table 5.8 RPL Simulation - DIO Doubling Rate vs Control Overhead S.No Model name R 2 RSME SSE 1 Polynomial Deg Polynomial Deg Polynomial Deg Polynomial Deg Exponential - 1 term Exponential - 2 term Fourier Series - 1 term Fourier Series - 2 term Power Series - 1 term Power Series - 2 term Gaussian Model - 1 term Gaussian Model - 2 term Rational Polynomials 1 term Rational Polynomials 2 term Sum of Sines

24 136 Figure 5.11 DIO Doubling Rate - Curve fitting Results The DIO Doubling Rate has a default value of 20 seconds and optimized value is 18 seconds. The optimization helps to reduce control overhead and improved battery efficiency. The predicted curve using regression analysis is shown in Figure DIO Redundancy Rate - Variation The RPL DIO Redundancy rate parameter does not affect the convergence time but it will affect the control overhead data. The simulation data is tabulated and shown in Table 5.9.

25 137 Table 5.9 DIO Redundancy Rate Convergence Analysis RPL Simulation for DIO Redundancy Rate RPL Parameter - Convergence Control Data Control/Data DIO Redundancy Time (s) Packets Packets Packets Ratio Simulation Setup: 20 Nodes and 1 Border Router, Simulation Time ms Figure 5.12 Convergence Time variation for DIO Redundancy Rate

26 138 Figure 5.13 Control Overhead variation - DIO Redundancy Rate The experimental data is plotted using the line chart as shown in Figure 5.12 and Figure The control overhead minimum occurs at DIO Redundancy Rate of 20 seconds as per manual calculation. The best fit analysis for experimental data is shown in Table 5.10 and Table Table 5.10 Model Fit Parameters for DIO Redundancy Rate Convergence Time S.No Model name R 2 RSME SSE 1 Polynomial Deg exp Polynomial Deg 2 Not fit 3 Polynomial Deg exp exp Polynomial Deg 4 Not fit 5 Exponential - 1 term 1 0 0

27 139 Table 5.11 Model Fit Parameters for DIO Redundancy Rate Control Overhead S.No Model name R 2 RSME SSE 1 Polynomial Deg Polynomial Deg Polynomial Deg Polynomial Deg Exponential - 1 term Exponential - 2 term Fourier Series - 1 term Fourier Series - 2 term Power Series - 1 term Power Series - 2 term Gaussian Model - 1 term Gaussian Model - 2 term Rational Polynomials 1 term Rational Polynomials 2 term Sum of Sines Weibull Distribution Not fit Figure 5.14 MATLAB Curve Fitting - DIO Redundancy Rate

28 140 The default value is 20 seconds and optimum value from the model fitted curve is 18 seconds. The MATLAB curve fitting graph is shown in Figure Node Count Based - Metrics Variation The number of nodes per border router is an important parameter to determine the required number of border routers for a particular deployment. If the number of nodes per border router is increased then large number of control packets will be required to settle the network and more number of hops is required to reach root node. The simulated values for node count variation are tabulated in Table Table 5.12 RPL Simulation for Node Count Variation RPL Simulation for DIO Redundancy Rate RPL Parameter - Convergence Control Data Ctrl/Data DIO Redundancy Time (s) Packets Packets Packets Ratio Simulation: 20 Nodes and 1 Border Router Simulation Time ms The experimental data is plotted in Microsoft Excel as shown in Figure 5.15 and Figure The control overhead has to be minimized for long battery life. In order to find the optimum value, mathematical modeling has to be done.

29 141 Figure 5.15 Convergence Time variation for Node Count Variation Figure 5.16 Control Overhead variation for Node Count Variation The convergence time variation with respect to the number of nodes deployment is shown. The optimal value of 20 nodes per border router will be taken up during the real time simulation. The packet delivery ratio of the different nodes is given in the graph. Some nodes are having very low packet deliver ratio as 30 %. The nodes closer to the end gateway router node

30 142 has 100% packet delivery ratio. The packet delivery ratio with respect to node ID is shown in Table 5.13 and also plotted in Figure Table 5.13 Packet delivery ratio for Different Nodes Node ID Packets Transmitted Packets Received Packets Delivery Ratio

31 143 Figure 5.17 Packet Delivery Ratio for Different Node IDs Table 5.14 RPL Optimized values S.No. Parameter 1 DIO Interval Minimum rate 2 DIO Doubling rate 3 DIO redundancy rate 4 No. of Nodes Optimum values of RPL Parameters Optimization Criteria Convergence Control data Overhead Convergence Control data Overhead Convergence Control data Overhead Convergence Control data Overhead Model used Gauss Model Degree 1 Polynomial Degree 4 Exponential Model 1 Term Fourier Series Model Degree 2 Exponential Model 1 Term Polynomial Degree 4 Polynomial Degree 4 Fourier Series Model Degree 1 Default value (Sec) Optimum Value (Sec) None 39 10

32 144 The simulation results were used to get the mathematical model using regression analysis. The optimal value for both energy efficiency and network response using different mathematical models are tabulated in Table Among several mathematical models, the best fit model for individual RPL parameter with respect to energy optimization was selected and tabulated. 5.7 SUMMARY The ultimate objective of the current project is to develop Wireless Sensor Network (WSN) motes with energy efficiency, royalty-free, open-source and cost-effective hardware and software for ready deployment. In order to get energy efficiency, the control packets transmitted per unit-time must be reduced. RPL is IETF designed routing protocol for WSN motes. In the current project RPL protocol performance in large deployments upto 60 motes per border router with multi-hop transmission is analyzed with respect to RPL parameters such as DIO Interval minimum rate, DIO Doubling rate and DIO Redundancy rate. The mathematical model was obtained using regression analysis and the optimum values were determined with respect to energy efficiency for long battery life. The hardware specification and feasibility analysis show that Contiki OS loaded into Arduino UNO board will be an optimal and cost-effective solution.

Routing over Low Power and Lossy Networks

Routing over Low Power and Lossy Networks outing over Low Power and Lossy Networks Analysis and possible enhancements of the IETF PL routing protocol Enzo Mingozzi Associate Professor @ University of Pisa e.mingozzi@iet.unipi.it outing over LLNs

More information

Implementation of Gradient Routing in WSNs

Implementation of Gradient Routing in WSNs Implementation of Gradient Routing in WSNs Thomas Watteyne, Kris Pister, Dominique Barthel, Mischa Dohler, Isabelle Auge-Blum BSAC, UC Berkeley, USA Orange Labs, Meylan, France CTTC, Castelldefels, Barcelona,

More information

Quantitative Analysis and Evaluation of RPL with Various Objective Functions for 6LoWPAN

Quantitative Analysis and Evaluation of RPL with Various Objective Functions for 6LoWPAN Indian Journal of Science and Technology, Vol 8(19), DOI: 10.17485/ijst/2015/v8i19/76696, August 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Quantitative Analysis and Evaluation of RPL with

More information

Mobile Communications

Mobile Communications Mobile Communications Wireless Personal Area Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 IEEE Standards 2 IEEE 802.15.4 Wireless PAN (Sensor Networks) 3 Information Current

More information

Contiki a Lightweight and Flexible Operating System for Tiny Networked Sensors

Contiki a Lightweight and Flexible Operating System for Tiny Networked Sensors Contiki a Lightweight and Flexible Operating System for Tiny Networked Sensors Adam Dunkels, Björn Grönvall, Thiemo Voigt Swedish Institute of Computer Science IEEE EmNetS-I, 16 November 2004 Sensor OS

More information

Optimizing Routing Protocol for Low power and Lossy Network (RPL) Objective Function for Mobile Low-Power Wireless Networks

Optimizing Routing Protocol for Low power and Lossy Network (RPL) Objective Function for Mobile Low-Power Wireless Networks Optimizing Routing Protocol for Low power and Lossy Network (RPL) Objective Function for Mobile Low-Power Wireless Networks Mälardalens Högskola Akademin för Innovation, Design och Teknik Författarnamn

More information

An Algorithm for Timely Transmission of Solicitation Messages in RPL for Energy-Efficient Node Mobility

An Algorithm for Timely Transmission of Solicitation Messages in RPL for Energy-Efficient Node Mobility sensors Article An Algorithm for Timely Transmission of Solicitation Messages in RPL for Energy-Efficient Node Mobility Jihong Park 1, Ki-Hyung Kim 2 and Kangseok Kim 2, * 1 Department of Computer Engineering,

More information

Wireless Sensor Networks, energy efficiency and path recovery

Wireless Sensor Networks, energy efficiency and path recovery Wireless Sensor Networks, energy efficiency and path recovery PhD dissertation Anne-Lena Kampen Trondheim 18 th of May 2017 Outline Introduction to Wireless Sensor Networks WSN Challenges investigated

More information

IPv6 Stack. 6LoWPAN makes this possible. IPv6 over Low-Power wireless Area Networks (IEEE )

IPv6 Stack. 6LoWPAN makes this possible. IPv6 over Low-Power wireless Area Networks (IEEE ) Reference: 6LoWPAN: The Wireless Embedded Internet, Shelby & Bormann What is 6LoWPAN? 6LoWPAN makes this possible - Low-power RF + IPv6 = The Wireless Embedded Internet IPv6 over Low-Power wireless Area

More information

AIM: To create a project for implement a wireless communication protocol on an embedded system- ZigBee.

AIM: To create a project for implement a wireless communication protocol on an embedded system- ZigBee. AIM: To create a project for implement a wireless communication protocol on an embedded system- ZigBee. Introduction ZigBee is one of the Advanced Wireless Technology and CC2430 is the first single-chip

More information

ContikiRPL and TinyRPL: Happy Together. JeongGil Ko Joakim Eriksson Nicolas Tsiftes Stephen Dawson-Haggerty Andreas Terzis Adam Dunkels David Culler

ContikiRPL and TinyRPL: Happy Together. JeongGil Ko Joakim Eriksson Nicolas Tsiftes Stephen Dawson-Haggerty Andreas Terzis Adam Dunkels David Culler ContikiRPL and TinyRPL: Happy Together JeongGil Ko Joakim Eriksson Nicolas Tsiftes Stephen Dawson-Haggerty Andreas Terzis Adam Dunkels David Culler IP+SN 2011 Overview WSN Interoperability Goal/Contributions

More information

A Performance Evaluation of RPL in Contiki

A Performance Evaluation of RPL in Contiki Master s Thesis Computer Science Thesis no: MCS-2012-10 A Performance Evaluation of RPL in Contiki A Cooja Simulation based study Hazrat Ali School of Computing Blekinge Institute of Technology SE 371

More information

Implementation of SNMP Protocol with ContikiOS [Kur10] for WSN430 targets

Implementation of SNMP Protocol with ContikiOS [Kur10] for WSN430 targets Implementation of Protocol with ContikiOS [Kur10] for WSN430 targets Équipe MADYNES, INRIA 31/03/2011 Mgmt of 6LowPAN Networks [JS10] Why 6LoWPAN Management? Do autonomiclow-poweredconstrained devices

More information

Study of RPL DODAG Version Attacks

Study of RPL DODAG Version Attacks Study of RPL DODAG Version Attacks Anthéa Mayzaud anthea.mayzaud@inria.fr Rémi Badonnel Isabelle Chrisment Anuj Sehgal s.anuj@jacobs-university.de Jürgen Schönwälder IFIP AIMS 2014 Brno, Czech Republik

More information

ENSC 427: COMMUNICATION NETWORKS

ENSC 427: COMMUNICATION NETWORKS ENSC 427: COMMUNICATION NETWORKS Simulation of ZigBee Wireless Sensor Networks Final Report Spring 2012 Mehran Ferdowsi Mfa6@sfu.ca Table of Contents 1. Introduction...2 2. Project Scope...2 3. ZigBee

More information

Performance Evaluation of RPL Objective Functions

Performance Evaluation of RPL Objective Functions See discussions, stats, and author profiles for this publication at: http://www.researchgate.net/publication/281377239 Performance Evaluation of RPL Objective Functions CONFERENCE PAPER OCTOBER 2015 READS

More information

Secure routing in IoT networks with SISLOF

Secure routing in IoT networks with SISLOF Secure routing in IoT networks with SISLOF Ayman El Hajjar 1,, George Roussos 1, Maura Paterson 2 1 Department of Computer science and Information systems 2 Department of Economics, Mathematics and Statistics

More information

CONCLUSIONS AND SCOPE FOR FUTURE WORK

CONCLUSIONS AND SCOPE FOR FUTURE WORK Introduction CONCLUSIONS AND SCOPE FOR FUTURE WORK 7.1 Conclusions... 154 7.2 Scope for Future Work... 157 7 1 Chapter 7 150 Department of Computer Science Conclusion and scope for future work In this

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS

TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS Mathias Becquaert, Bart Scheers, Ben Lauwens Royal Military Academy Department CISS Renaissancelaan 30 B1000 Brussels, Belgium E-mail: mathias.becquaert@mil.be,

More information

Lesson 4 RPL and 6LoWPAN Protocols. Chapter-4 L04: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education

Lesson 4 RPL and 6LoWPAN Protocols. Chapter-4 L04: Internet of Things , Raj Kamal, Publs.: McGraw-Hill Education Lesson 4 RPL and 6LoWPAN Protocols 1 RPL [Ipv6 Routing Protocol For Low Power Lossy Networks (LLNs)] 2 LLN A constrained nodes network Low data transfer rate Low packet delivery rate in comparison to IP

More information

SDCI Student Project 6 Sensing Capabilites Go Wireless. Mario Caruso Francesco Leotta Leonardo Montecchi Marcello Pietri

SDCI Student Project 6 Sensing Capabilites Go Wireless. Mario Caruso Francesco Leotta Leonardo Montecchi Marcello Pietri SDCI 2012 Student Project 6 Sensing Capabilites Go Wireless Mario Caruso Francesco Leotta Leonardo Montecchi Marcello Pietri Overview Wireless Sensor Network Is a collection of nodes organized into a cooperative

More information

Constrained Application Protocol (CoAP) Vilen Looga, M.Sc. Doctoral

Constrained Application Protocol (CoAP) Vilen Looga, M.Sc. Doctoral Constrained Application Protocol (CoAP) Vilen Looga, M.Sc. Doctoral Student @dcs.aalto Outline Introduction CoAP at a glance Messages Observe Hardware Demo MAMMOTH Conclusions References 50 billion connected

More information

Presented by Viraj Anagal Kaushik Mada. Presented to Dr. Mohamed Mahmoud. ECE 6900 Fall 2014 Date: 09/29/2014 1

Presented by Viraj Anagal Kaushik Mada. Presented to Dr. Mohamed Mahmoud. ECE 6900 Fall 2014 Date: 09/29/2014 1 Presented by Viraj Anagal Kaushik Mada Presented to Dr. Mohamed Mahmoud ECE 6900 Fall 2014 Date: 09/29/2014 1 Outline Motivation Overview Wireless Sensor Network Components Characteristics of Wireless

More information

Simulation Analysis of Tree and Mesh Topologies in Zigbee Network

Simulation Analysis of Tree and Mesh Topologies in Zigbee Network Vol.8, No.1 (2015), pp.81-92 http://dx.doi.org/10.14257/ijgdc.2015.8.1.08 Simulation Analysis of Tree and Mesh Topologies in Zigbee Network Manpreet, Jyoteesh Malhotra CSE Department Guru Nanak Dev University

More information

Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 6 Routing Carlo Fischione Associate Professor of Sensor Networks e-mail:carlofi@kth.se http://www.ee.kth.se/ carlofi/

More information

Design and Analysis of Routing Protocol for IPv6 Wireless Sensor Networks

Design and Analysis of Routing Protocol for IPv6 Wireless Sensor Networks Design and Analysis of Routing Protocol for IPv6 Wireless Sensor Networks Elias Wendm Atalay Supervisor Prof. Enzo Mingozzi Supervisor Prof. Giuseppe Anastasi Co- Supervisor Dott. Carlo Vallati A thesis

More information

INTERNATIONAL JOURNAL OF COMMUNICATIONS Volume 12, Performance comparative analysis of LOADing-CTP and RPL routing protocols for LLNs

INTERNATIONAL JOURNAL OF COMMUNICATIONS Volume 12, Performance comparative analysis of LOADing-CTP and RPL routing protocols for LLNs Performance comparative analysis of LOADing-CTP and routing protocols for LLNs Belghachi Mohammed, Feham Mohamed Abstract Low Power and Lossy Networks (LLNs) represent one of the interesting research areas

More information

Enhancing Routing Protocol for Low Power and Lossy Networks

Enhancing Routing Protocol for Low Power and Lossy Networks Enhancing Routing Protocol for Low Power and Lossy Networks John Abied Hatem, Haidar Safa, and Wassim El-Hajj Department of Computer Science American University of Beirut Beirut, Lebanon Email: jmh8@mail.aub.edu;

More information

Available online at ScienceDirect. Procedia Computer Science 87 (2016 )

Available online at   ScienceDirect. Procedia Computer Science 87 (2016 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 87 (2016 ) 270 274 4th International Conference on Recent Trends in Computer Science & Engineering Analysis of Routing

More information

Hands on Contiki OS and Cooja Simulator (Part I)

Hands on Contiki OS and Cooja Simulator (Part I) Hands on Contiki OS and Cooja Simulator (Part I) Ing. Pietro Gonizzi Wireless Ad-hoc Sensor Network Laboratory(WASNLab), University of Parma pietro.gonizzi@studenti.unipr.it Dr. Simon Duquennoy Swedish

More information

Design Considerations for Low Power Internet Protocols. Hudson Ayers Paul Crews, Hubert Teo, Conor McAvity, Amit Levy, Philip Levis

Design Considerations for Low Power Internet Protocols. Hudson Ayers Paul Crews, Hubert Teo, Conor McAvity, Amit Levy, Philip Levis Design Considerations for Low Power Internet Protocols Hudson Ayers Paul Crews, Hubert Teo, Conor McAvity, Amit Levy, Philip Levis Motivation Seamless interoperability foundational to the growth of IoT

More information

BASIC CHARACTERISTICS OF ZIGBEE AND SIMPLICITI MODULES TO USE IN MEASUREMENT SYSTEMS

BASIC CHARACTERISTICS OF ZIGBEE AND SIMPLICITI MODULES TO USE IN MEASUREMENT SYSTEMS XIX IMEKO World Congress Fundamental and Applied Metrology September 6!11, 2009, Lisbon, Portugal BASIC CHARACTERISTICS OF ZIGBEE AND SIMPLICITI MODULES TO USE IN MEASUREMENT SYSTEMS L. Skrzypczak 1),

More information

How to develop and validate a scalable mesh routing solution for IEEE sensor networks Altran Benelux

How to develop and validate a scalable mesh routing solution for IEEE sensor networks Altran Benelux How to develop and validate a scalable mesh routing solution for IEEE 802.15.4 sensor networks Altran Benelux Leuven, 29 October 2015 Daniele Lacamera picotcp The reference

More information

Routing in the Internet of Things (IoT) Rolland Vida Convergent Networks and Services

Routing in the Internet of Things (IoT) Rolland Vida Convergent Networks and Services Routing in the Internet of Things (IoT) Rolland Vida Convergent Networks and Services Spring 05. IoT challenges IoT nodes are heterogeneous Some have important resources Smart phones, cars, coke machines

More information

Energy-aware Reconfiguration of Sensor Nodes

Energy-aware Reconfiguration of Sensor Nodes Energy-aware Reconfiguration of Sensor Nodes Andreas Weissel Simon Kellner Department of Computer Sciences 4 Distributed Systems and Operating Systems Friedrich-Alexander University Erlangen-Nuremberg

More information

Design and implementation of an experimental platform for performance analysis in wireless sensor networks

Design and implementation of an experimental platform for performance analysis in wireless sensor networks Design and implementation of an experimental platform for performance analysis in wireless sensor networks ZHEJUN FENG Master of Science Thesis in Design and Implementation of ICT Products and Systems,

More information

Dynamic Routing and Network Monitoring for the Polywog Protocol

Dynamic Routing and Network Monitoring for the Polywog Protocol Dynamic Routing and Network Monitoring for the Polywog Protocol A Senior Project presented to the Faculty of the Computer Science Department California Polytechnic State University, San Luis Obispo In

More information

Using Cooja for WSN Simulations: Some New Uses and Limits

Using Cooja for WSN Simulations: Some New Uses and Limits Using Cooja for WSN Simulations: Some New Uses and Limits Kévin Roussel Ye-Qiong Song Olivier Zendra INRIA Nancy Grand-Est LORIA UMR 7503 Université de Lorraine EWSN 2016 NextMote workshop 15 February

More information

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION 5.1 INTRODUCTION Generally, deployment of Wireless Sensor Network (WSN) is based on a many

More information

TOSSIM simulation of wireless sensor network serving as hardware platform for Hopfield neural net configured for max independent set

TOSSIM simulation of wireless sensor network serving as hardware platform for Hopfield neural net configured for max independent set Available online at www.sciencedirect.com Procedia Computer Science 6 (2011) 408 412 Complex Adaptive Systems, Volume 1 Cihan H. Dagli, Editor in Chief Conference Organized by Missouri University of Science

More information

WIRELESS MESH NETWORKING: ZIGBEE VS. DIGIMESH WIRELESS MESH NETWORKING: ZIGBEE VS. DIGIMESH

WIRELESS MESH NETWORKING: ZIGBEE VS. DIGIMESH WIRELESS MESH NETWORKING: ZIGBEE VS. DIGIMESH WIRELESS MESH NETWORKING: ZIGBEE VS. DIGIMESH WIRELESS MESH NETWORKING: ZIGBEE VS. DIGIMESH WIRELESS MESH NETWORKING: ZIGBEE VS. DIGIMESH Mesh networking is a powerful way to route data. This methodology

More information

Performance Evaluation of Routing Protocols in Lossy Links for Smart Building Networks

Performance Evaluation of Routing Protocols in Lossy Links for Smart Building Networks Performance Evaluation of Routing Protocols in Lossy Links for Smart Building Networks Ion Emilian Radoi Master of Science Computer Science School of Informatics University of Edinburgh 2011 Abstract

More information

Radiocrafts Embedded Wireless Solutions

Radiocrafts Embedded Wireless Solutions Selecting an IEEE 802.15.4, 2.4 GHz wireless solution By Ø.Nottveit Abstract Companies searching for a low power 2.45 GHz wireless solution will find many different technical solutions. This white paper

More information

RF and network basics. Antonio Liñán Colina

RF and network basics. Antonio Liñán Colina RF and network basics Antonio Liñán Colina Architectures: 8-bit, 16-bit, 32-bit Open Source (source code openly available) IPv4/IPv6/Rime networking Devices with < 8KB RAM Typical applications < 50KB Flash

More information

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS M.SASIKUMAR 1 Assistant Professor, Dept. of Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore, Tamilnadu,

More information

TinyOS. Wireless Sensor Networks

TinyOS. Wireless Sensor Networks TinyOS Laboratorio di Sistemi Wireless Ing. Telematica Università Kore Enna Ing. A. Leonardi Wireless Sensor Networks The number of nodes can be very high Nodes are densely deployed Low cost, low power

More information

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online): JJEE Volume 1, Number 1, 2015 Pages 45-54 Jordan Journal of Electrical Engineering ISSN (Print): 2409-9600, ISSN (Online): 2409-9619 Performance Evaluation for Large Scale Star Topology IEEE 802.15.4 Based

More information

Politecnico di Milano Advanced Network Technologies Laboratory. 6LowPAN

Politecnico di Milano Advanced Network Technologies Laboratory. 6LowPAN Politecnico di Milano Advanced Network Technologies Laboratory 6LowPAN ACKs o Slide/Figures Sources n IPSO Alliance Webinar 6LowPAN for IP Smart Objects n 6LoWPAN: The Wireless Embedded Internet, Shelby

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

A RPL based Adaptive and Scalable Data-collection Protocol module for NS-3 simulation platform

A RPL based Adaptive and Scalable Data-collection Protocol module for NS-3 simulation platform Author manuscript, published in "NICST 2103 New Information Communication Science and Technology for Sustainable NICST'2103 New Information Communication Science Development: and Technology France-China

More information

Designing a ZigBee Network

Designing a ZigBee Network Wireless Control That Simply Works Designing a ZigBee Network ESS 2006, Birmingham David Egan Ember Corporation Copyright 2004 ZigBee TM Alliance. All Rights Reserved. Contents: Typical Network Design

More information

arxiv: v1 [cs.ni] 8 Jun 2016

arxiv: v1 [cs.ni] 8 Jun 2016 RESEARCH ARTICLE MHCL: IPv6 Multihop Host Configuration for Low-Power Wireless Networks Bruna S. Peres and Olga Goussevskaia arxiv:66.2674v [cs.ni] 8 Jun 26 Department of Computer Science, Universidade

More information

Cisco Systems, Inc. October Performance Evaluation of the Routing Protocol for Low-Power and Lossy Networks (RPL)

Cisco Systems, Inc. October Performance Evaluation of the Routing Protocol for Low-Power and Lossy Networks (RPL) Independent Submission Request for Comments: 6687 Category: Informational ISSN: 2070-1721 J. Tripathi, Ed. J. de Oliveira, Ed. Drexel University JP. Vasseur, Ed. Cisco Systems, Inc. October 2012 Abstract

More information

EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS SYSTEM

EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS SYSTEM MÄLARDALEN UNIVERSITY SCHOOL OF INNOVATION, DESIGN AND ENGINEERING VÄSTERÅS, SWEDEN THESIS FOR THE DEGREE OF BACHELOR OF SCIENCE IN ENGINEERING COMPUTER NETWORK ENGINEERING 15. CREDITS EVALUATING THE FUNCTIONALITY

More information

Analysis and Enhancement of RPL under Packet Drop Attacks

Analysis and Enhancement of RPL under Packet Drop Attacks Analysis and Enhancement of RPL under Packet Drop Attacks Binbin Chen, Yuan Li, Daisuke Mashima Advanced Digital Sciences Center COMSNETS 2018, Jan 3 7, Bangalore, India 1 RPL and AMI RFC6550: RPL: IPv6

More information

Low Power and Low Latency MAC Protocol: Dynamic Control of Radio Duty Cycle

Low Power and Low Latency MAC Protocol: Dynamic Control of Radio Duty Cycle 24 IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.12, December 212 Low Power and Low Latency MAC Protocol: Dynamic Control of Radio Duty Cycle Jeehoon Lee*, Jongsoo Jeong,

More information

Experimental Evaluation on the Performance of Zigbee Protocol

Experimental Evaluation on the Performance of Zigbee Protocol Experimental Evaluation on the Performance of Zigbee Protocol Mohd Izzuddin Jumali, Aizat Faiz Ramli, Muhyi Yaakob, Hafiz Basarudin, Mohamad Ismail Sulaiman Universiti Kuala Lumpur British Malaysian Institute

More information

CSC 774 Advanced Network Security

CSC 774 Advanced Network Security Computer Science CSC 774 Advanced Network Security Topic 4.3 Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks 1 Wireless Sensor Networks (WSN) A WSN consists of a potentially

More information

ns-3 RPL module: IPv6 Routing Protocol for Low power and Lossy Networks

ns-3 RPL module: IPv6 Routing Protocol for Low power and Lossy Networks ns-3 RPL module: IPv6 Routing Protocol for Low power and Lossy Networks Lorenzo Bartolozzi Tommaso Pecorella Romano Fantacci Università degli Studi di Firenze Wns3 2012, March 23, Desenzano, Italy. This

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Contiki and Cooja

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Contiki and Cooja Politecnico di Milano Advanced Network Technologies Laboratory Internet of Things Contiki and Cooja Politecnico di Milano Advanced Network Technologies Laboratory The Contiki Operating System Contiki Contiki

More information

Introduction to Contiki Kristof Van Laerhoven, Embedded Systems, Uni Freiburg

Introduction to Contiki Kristof Van Laerhoven, Embedded Systems, Uni Freiburg Kristof Van Laerhoven, Embedded Systems, Uni Freiburg kristof@ese.uni-freiburg.de Contiki Operating System ê memory-efficient: 2 kb RAM, 40 kb ROM typically* ê provides IP support (its uipv6 stack is IPv6

More information

Supporting Mobile Swarm Robotics in Low Power and Lossy Sensor Networks. Kevin Andrea Robert Simon

Supporting Mobile Swarm Robotics in Low Power and Lossy Sensor Networks. Kevin Andrea Robert Simon 1 Supporting Mobile Swarm Robotics in Low Power and Lossy Sensor Networks Kevin Andrea kandrea@masonlive.gmu.edu Robert Simon simon@gmu.edu Sean Luke sean@cs.gmu.edu Department of Computer Science George

More information

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering

More information

The Internet of Things. Thomas Watteyne Senior Networking Design Engineer Linear Technology, Dust Networks product group

The Internet of Things. Thomas Watteyne Senior Networking Design Engineer Linear Technology, Dust Networks product group 1 The Internet of Things Thomas Watteyne Senior Networking Design Engineer Linear Technology, Dust Networks product group Important! ٧ DREAM seminar 8 April 2014, UC Berkeley Low-Power Wireless Mesh Networks

More information

Opportunistic RPL for Reliable AMI Mesh Networks

Opportunistic RPL for Reliable AMI Mesh Networks Noname manuscript No. (will be inserted by the editor) Opportunistic RPL for Reliable AMI Mesh Networks Sedat Gormus Filippo Tosato Zhong Fan Zubeir Bocus Parag Kulkarni Received: date / Accepted: date

More information

System Architecture Challenges in the Home M2M Network

System Architecture Challenges in the Home M2M Network System Architecture Challenges in the Home M2M Network Michael Starsinic InterDigital Communications M2M Background M2M Communications Machine-to-Machine or Machine-to-Man The Machine usually includes

More information

Data Elevators Applying the Bundle Protocol in Delay Tolerant Wireless Sensor Networks

Data Elevators Applying the Bundle Protocol in Delay Tolerant Wireless Sensor Networks Data Elevators Applying the Bundle Protocol in Delay Tolerant Wireless Sensor Networks Wolf-Bastian Pöttner, Felix Büsching, Georg von Zengen, Lars Wolf IEEE MASS 2012, 2012-10-09 Motivation (a) (b) (d)

More information

Realising WACNet Through a Zigbee-based Architecture

Realising WACNet Through a Zigbee-based Architecture University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2007 Realising WACNet Through a Zigbee-based Architecture A. Desmet University

More information

Design and implementation of ZigBee/IEEE Nodes for

Design and implementation of ZigBee/IEEE Nodes for Design and implementation of ZigBee/IEEE 802.15.4 Nodes for Wireless Sensor Networks Jin-Shyan Lee and Yang-Chih Huang Information and Communications Research Laboratory, Industrial Technology Research

More information

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks Vol. 5, No. 5, 214 Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks MOSTAFA BAGHOURI SAAD CHAKKOR ABDERRAHMANE HAJRAOUI Abstract Ameliorating

More information

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

1.0 The System Architecture and Design Features

1.0 The System Architecture and Design Features 1.0 The System Architecture and Design Features Figure 1. System Architecture The overall guiding design philosophy behind the Data Capture and Logging System Architecture is to have a clean design that

More information

Regression Based Cluster Formation for Enhancement of Lifetime of WSN

Regression Based Cluster Formation for Enhancement of Lifetime of WSN Regression Based Cluster Formation for Enhancement of Lifetime of WSN K. Lakshmi Joshitha Assistant Professor Sri Sai Ram Engineering College Chennai, India lakshmijoshitha@yahoo.com A. Gangasri PG Scholar

More information

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Maurizio Bocca, M.Sc. Control Engineering Research Group Automation and Systems Technology Department maurizio.bocca@tkk.fi

More information

Sensor Networks. Part 3: TinyOS. CATT Short Course, March 11, 2005 Mark Coates Mike Rabbat. Operating Systems 101

Sensor Networks. Part 3: TinyOS. CATT Short Course, March 11, 2005 Mark Coates Mike Rabbat. Operating Systems 101 Sensor Networks Part 3: TinyOS CATT Short Course, March 11, 2005 Mark Coates Mike Rabbat 1 Operating Systems 101 operating system (äp ǝr āt ing sis tǝm) n. 1 software that controls the operation of a computer

More information

packet-switched networks. For example, multimedia applications which process

packet-switched networks. For example, multimedia applications which process Chapter 1 Introduction There are applications which require distributed clock synchronization over packet-switched networks. For example, multimedia applications which process time-sensitive information

More information

Design and Implementation of a Multi-hop Zigbee Network

Design and Implementation of a Multi-hop Zigbee Network Design and Implementation of a Multi-hop Zigbee Network Chi-Wen Deng, Li-chun Ko, Yung-chih Liu, Hua-wei Fang Networks and Multimedia Institute Institute for Information Industry, ROC {cwdeng, lcko, ulysses,

More information

Reliable Time Synchronization Protocol for Wireless Sensor Networks

Reliable Time Synchronization Protocol for Wireless Sensor Networks Reliable Time Synchronization Protocol for Wireless Sensor Networks Soyoung Hwang and Yunju Baek Department of Computer Science and Engineering Pusan National University, Busan 69-735, South Korea {youngox,yunju}@pnu.edu

More information

Lithe: Lightweight Secure CoAP for the Internet of Things

Lithe: Lightweight Secure CoAP for the Internet of Things Lithe: Lightweight Secure CoAP for the Internet of Things S. Raza, H. Shafagh, etc. IEEE Sensors 2013, Volume 13 Speaker: Renato Iida, Le Wang 2 Outline Introduction Background CoAP and DTLS 6LoWPAN DTLS

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

Constrained Application Protocol (CoAP) Vilen Looga, M.Sc. Doctoral

Constrained Application Protocol (CoAP) Vilen Looga, M.Sc. Doctoral Constrained Application Protocol (CoAP) Vilen Looga, M.Sc. Doctoral Student @dcs.aalto Outline Introduction CoAP at a glance Messages Observe Hardware Demo MAMMOTH Conclusions References 50 billion connected

More information

[1] CURVE FITTING WITH EXCEL

[1] CURVE FITTING WITH EXCEL 1 Lecture 04 February 9, 2010 Tuesday Today is our third Excel lecture. Our two central themes are: (1) curve-fitting, and (2) linear algebra (matrices). We will have a 4 th lecture on Excel to further

More information

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov    kurssit/elt-53306/ WPAN/WBANs: ZigBee Dmitri A. Moltchanov E-mail: dmitri.moltchanov@tut.fi http://www.cs.tut.fi/ kurssit/elt-53306/ IEEE 802.15 WG breakdown; ZigBee Comparison with other technologies; PHY and MAC; Network

More information

LXRS and LXRS+ Wireless Sensor Protocol

LXRS and LXRS+ Wireless Sensor Protocol LORD TECHNICAL NOTE LXRS and LXRS+ Wireless Sensor Protocol Using LXRS and LXRS+ For Long-Term Monitoring and High Bandwidth Test and Measurement Introduction LORD Sensing has developed and deployed two

More information

The Emergence of Networking Abstractions and Techniques in TinyOS

The Emergence of Networking Abstractions and Techniques in TinyOS The Emergence of Networking Abstractions and Techniques in TinyOS CS295-1 Paper Presentation Mert Akdere 10.12.2005 Outline Problem Statement & Motivation Background Information TinyOS HW Platforms Sample

More information

Distributed Computation in Wireless Ad Hoc Grid Formations with Bandwidth Control

Distributed Computation in Wireless Ad Hoc Grid Formations with Bandwidth Control Distributed Computation in Wireless Ad Hoc Grid Formations with Bandwidth Control Elisa Rondini and Stephen Hailes University College London MSN 2007, 13 th July 2007 Overview Scenario Assumptions Challenges

More information

Reference and Style Guide for Microsoft Excel

Reference and Style Guide for Microsoft Excel Reference and Style Guide for Microsoft Excel TABLE OF CONTENTS Getting Acquainted 2 Basic Excel Features 2 Writing Cell Equations Relative and Absolute Addresses 3 Selecting Cells Highlighting, Moving

More information

Resource Aware Routing Protocol in Heterogeneous Wireless Machine-to-Machine Networks

Resource Aware Routing Protocol in Heterogeneous Wireless Machine-to-Machine Networks MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Resource Aware Routing Protocol in Heterogeneous Wireless Machine-to-Machine Networks Guo, J.; Orlik, P.V.; Parsons, K.; Ishibashi, K.; Takita,

More information

Congestion Avoidance in Wireless Sensor Network with Adaptive Time-wise Data Interpolation

Congestion Avoidance in Wireless Sensor Network with Adaptive Time-wise Data Interpolation Graduation Thesis Academic Year 2011 Congestion Avoidance in Wireless Sensor Network with Adaptive Time-wise Data Interpolation Doan Hoai Nam Faculty of Environment and Information Studies Keio University

More information

CHAPTER 3: LITERATURE REVIEW 3.1 NEED FOR SIMULATION ENVIRONMENT IN WSN

CHAPTER 3: LITERATURE REVIEW 3.1 NEED FOR SIMULATION ENVIRONMENT IN WSN 26 CHAPTER 3: LITERATURE REVIEW 3.1 NEED FOR SIMULATION ENVIRONMENT IN WSN Due to the continuous research progress in the field of WSN, it is essential to verify the new hardware and software design and

More information

Conference Paper. Cyber-OF: An Adaptive Cyber-Physical Objective Function for Smart Cities Applications

Conference Paper. Cyber-OF: An Adaptive Cyber-Physical Objective Function for Smart Cities Applications Conference Paper Cyber-OF: An Adaptive Cyber-Physical Objective Function for Smart Cities Applications Mohamed Ghazi Amor Anis Koubâa Eduardo Tovar Mohamed Khalgui CISTER-TR-160603 2016/07/05 Conference

More information

Middleware for Sensor Networks

Middleware for Sensor Networks Middleware for Sensor Networks Krzysztof Piotrowski piotrowski@ihp-ffo.de Background Application Middleware Sensor Network Application Middleware Sensor Network Middleware for Sensor Networks 2 Middleware

More information

Deploying IBM Rational License Key Server effectively in your organization

Deploying IBM Rational License Key Server effectively in your organization Deploying IBM Rational License Key Server 8.1.1 effectively in your organization Indraneel Paul September 28, 2011 Page 1 of 28 INTRODUCTION...4 IBM RATIONAL LICENSE KEY SERVER 8.1.1...5 TECHNICAL CHANGE

More information

Sensor-to-cloud connectivity using Sub-1 GHz and

Sensor-to-cloud connectivity using Sub-1 GHz and Sensor-to-cloud connectivity using Sub-1 GHz and 802.15.4 Nick Lethaby, IoT, Ecosystem Manager, Texas Instruments Agenda Key design considerations for a connected IoT sensor Overview of the Sub-1 GHz band

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Loosely Coupled Actor Systems

Loosely Coupled Actor Systems Loosely Coupled Actor Systems for the Internet of Things Raphael Hiesgen Internet Technologies Group Hamburg University of Applied Sciences Agenda Introduction Where We Are Next Steps Risks and Conclusion

More information

Mote Design Supported with Remote Hardware Modifications Capability for Wireless Sensor Network applications

Mote Design Supported with Remote Hardware Modifications Capability for Wireless Sensor Network applications Mote Design Supported with Remote Hardware Modifications Capability for Wireless Sensor Network applications ABSTRACT Ali El Kateeb University of Michigan-Dearborn Email: elkateeb@umich.edu Many Wireless

More information

Modeling Wireless Sensor Network for forest temperature and relative humidity monitoring in Usambara mountain - A review

Modeling Wireless Sensor Network for forest temperature and relative humidity monitoring in Usambara mountain - A review Modeling Wireless Sensor Network for forest temperature and relative humidity monitoring in Usambara mountain - A review R. Sinde Nelson Mandela African Institution of Science and Technology School of

More information