CHAPTER 1 INTRODUCTION

Size: px
Start display at page:

Download "CHAPTER 1 INTRODUCTION"

Transcription

1 1 CHAPTER 1 INTRODUCTION 1.1 OVERVIEW For accessing computer networks and its services without cables, wireless communications is a fast-growing technology which gives certain advantages over wired network like the dynamic network formation, easy deployment and cost reduction etc. The capabilities needed to deliver such services are characterized by an increasing need of high throughput. However, other applications in fields such as industrial, vehicular, and residential sensors have more relaxed throughput requirements. With the emergence of new Wireless Sensor Network (WSN) applications under timing constraints, the provision of deterministic guarantees may be more crucial than saving energy during critical situations. The IEEE is a new Personal Wireless Area Network (PWAN) (Jin-Shyan Lee et al 2006) standard designed for applications like wireless monitoring and control of lights, security alarms, motion sensors, thermostats and smoke detectors. The IEEE Task Group (TG4), together with the ZigBee Alliance, has developed an entire communication protocol stack for Low-Rate Wireless Personal Area Networks (LR-WPAN). The IEEE ZigBee protocol is one potential protocol to achieve predictable real-time performance for LR-WPAN. The physical layer of the IEEE protocol seems suitable for WSN applications, namely in terms of data-rate, energy-efficiency and robustness. The IEEE MAC protocol supports two operational modes: the Beaconless mode, in

2 2 which nodes stay active all the time and the Beacon mode, in which Beacon frames are periodically sent by coordinators to synchronize sensor nodes. The advantage of this synchronization scheme is that all nodes can wake up and sleep at the same time allowing very low duty cycles and hence save energy. In addition, when the beacon mode is used, nodes can use Guaranteed Time Slots (GTS) specifically designed to fulfill application s QoS requirements. The advantage of the non-beacon enabled mode, with regards to WSN application requirements, is that it easily allows scalability and self-organization. However, the non-beacon enabled mode does not provide any guarantee to deliver data frames, within a certain deadline. For timecritical applications, timeliness guarantees may be achieved with this beaconenabled mode. This mode offers the possibility of allocating/reallocating time slots in a superframe, called GTSs and provides predictable minimum service guarantees. Using minimum service guarantee, it is possible to predict a worst-case timing performance of the network. Recently, several analytical and simulation models of the IEEE protocol have been proposed. OPNET Modeler, Network Simulator 2 (NS-2) and OMNeT++ are widely used and popular network simulators, which include a simulation model of the IEEE protocol. The /ZigBee simulation model in OPNET model library supports only non-beacon-enabled mode, therefore, the star topology and GTS mechanism cannot be simulated. In addition, the source codes of the network and application layers are not available. The National Institute of Standards and Technology (NIST) has developed its OPNET simulation model for the IEEE protocol. However, while that model implements the slotted and the unslotted CSMA/CA MAC protocols it does not support the GTS mechanism as well. It also uses its own radio channel model rather than the accurate OPNET wireless library. The NS-2 is an object-oriented discrete event

3 3 simulator including a simulation model of the IEEE protocol. The accuracy of its simulation results are questionable since the Medium Access Control (MAC) protocols, packet formats and energy models are different from those used in real WSNs. Comparing the other network simulators (Gilberto Flores Lucio et al 2003) OPNET Modeler provides real time accuracy and has huge library. The ZigBee OPNET Modeler is the most powerful simulator for analysis (Hammoodi et al 2009). Potential improvements have been proposed to further develop OPNET Modeler to compete with other well-known WSNs simulators. These improvements will enhance OPNET Modeler to cover all aspects of WSNs simulations and investigations for both researchers and network operators. 1.2 WIRELESS TECHNOLOGIES Various wireless Technologies are compared based on different parameters. Comparison is shown in Figure 1.1 and 1.2 and Table 1.1. Figure 1.1 Complexity, Power, Cost Vs Data Rate

4 4 Figure 1.2 Data Rate Vs Distance Table 1.1 Wireless Technology Comparison Name Wi-Fi Bluetooth ZigBee UWB Bandwidth Upto 54 Mbps 1 Mbps 250Kbps 480Mbps Power Consumption 400 +ma TX, 40 +ma TX, 30 ma TX, 200mw Standby Standby 0.2mA Standby 20Ma 356µA Protocol Stack size KB ~ KB 34 KB /14 KB - Typical Range 100 m < 10 m m m Modulation DSSS Adaptive FHSS DSSS OFDM or DS-UWB

5 5 Table 1.1 (Continued) Freq. Range 2.4 GHz 2.4 GHz 868/915 MHz 2.4 GHz GHz Stronghold High Data Interoperability, Long High data rate Rate Cable Battery Life, for short Replacement Low Cost range Battery Life (Days) days Applications Internet Wireless USB, Remote Sync, browsing, Handset, Control, Transmission PC Headset battery of video/audio networking, operated Data File Transfer products, sensors 1.3 WIRELESS SENSOR NETWORKS WSN is a network which is used to gather relevant data from the environment and subsequently to route the gathered data to Central Processing Node. WSN consists of a large number of Sensor Nodes (SNs) wirelessly connected to each other and Base Station (BS), which connects the SNs with another network (Figure 1.3). WSNs are new field of research, which is currently growing rapidly.

6 6 Figure 1.3 Wireless Sensor Network 1.4 ZIGBEE ZigBee takes its name from the zigzag flying of bees that forms a mesh network among flowers. It is an individually simple organism that works together to tackle complex tasks. ZigBee has built on the IEEE low-rate, WPAN standard. The IEEE defines the physical layer (PHY) and Media Access Control (MAC) layer. The physical layer supports three radio bands, those are individually defined 2.4 GHz ISM band (Worldwide) with 16 channels, 915 MHz ISM band (Americas) with 10 channels, and 868MHz band (Europe) with single channel, the data rates are individually defined as 250 Kbps at 2.4 GHz, 40Kbps at 915 MHz, and 20 Kbps at 868 MHz. The MAC layer controls access to the radio channel using the Carrier Sense Multiple Access with Collision Avoidance (CSMA-CA) mechanism. The transmission range is meters. The ZigBee defines two types of devices; those are Full Function Device (FFD) and Reduced Function Device (RFD).

7 7 The FFD can serve as a network coordinator or a regular device. It can communicate with any other device. The RFD is intended for applications that are extremely simple, such as a light switch or a passive sensor device. It can communicate only with the FFD. Theoretically, ZigBee can support up to 65,536 nodes. For security, ZigBee uses 128-bit Advanced Encryption Standard (AES) cryptography and trust-center based authentication ZIGBEE Applications There are numerous applications (Figure 1.4) that are ideal for the redundant, self-configuring and self-healing capabilities of ZigBee wireless mesh networks. Key ones include: Energy Management and Efficiency: To provide greater information and control of energy usage. Also to provide customers with better service and more choice, better management of resources, and help to reduce environmental impact. Home Automation: To provide more flexible management of lighting, heating and cooling, security, and home entertainment systems from anywhere in the home. Building Automation: To integrate and centralize management of lighting, heating, cooling and security.

8 8 Figure 1.4 ZigBee Applications Industrial Automation: To extend existing manufacturing and process control systems reliability. The interoperable nature of ZigBee means that these applications can work together, providing even greater benefits ZIGBEE Specifications The specifications of ZigBee is shown in Table 1.2. Table 1.2 ZigBee Specifications Parameters ZigBee Transmission range (meters) Battery life (days) Network size (# of nodes) >64000 Throughput (Kbps)

9 ZIGBEE Architecture Figure 1.5 ZigBee Architecture ZigBee Architecture is shown in Figure 1.5. Physical Layer The physical layer is provided by the IEEE standard. This standard manages the physical transmission of radio waves in different unlicensed frequency bands around the world to provide communication between devices within a WPAN. The frequency bands are specified in the Table 1.2. Physical layer provides, Activation and deactivation of the radio transceiver, Channel Frequency Selection, Packet generation,

10 10 Packet reception, Data transparency and Power Management. Table 1.3 Frequency Bands used in Spreading Parameters Data parameters PHY (MHz) Frequency Band (MHz) Chip rate (Kchip/s) Modulation Bit Rate (Kb/s) Symbol rate (Ksymbol/s) Symbols 868/ BPSK Binary BPSK Binary O-QPSK ary Orthogonal Figure 1.6 Operating Frequency Bands The standard offers two PHY options based on the frequency band. Both are based on Direct Sequence Spread Spectrum (DSSS). The data rate is 250 Kbps at 2.4 GHz, 40 Kbps at 915 MHz and 20 Kbps at 868 MHz (Table 1.3).The higher data rate at 2.4 GHz is attributed to a higher-order modulation scheme. Lower frequency provides longer range due to lower propagation

11 11 losses. Low rate can be translated into better sensitivity and larger coverage area. Higher rate means higher throughput, lower latency or lower duty cycle. There is a single channel between 868 and MHz, 10 channels between and MHz and 16 channels between 2.4 and GHz as shown in Figure 1.6. Several channels in different frequency bands enable the ability to relocate within spectrum. The physical layer of the IEEE is in charge of the following tasks: Activation and deactivation of the radio transceiver : The radio transceiver may operate in one of three states: transmitting, receiving or sleeping. Upon the request of the MAC sub-layer, the radio is turned ON or OFF. The turnaround time from transmitting to receiving and vice versa should be no more than 12 symbol periods according to the standard (each symbol corresponds to 4 bits). Energy Detection (ED) within the current channel: It is an estimation of the received signal power within the bandwidth of an IEEE channel. This task does not make any signal identification or decoding on the channel. The energy detection time should be equal to 8 symbol periods. This measurement is typically used by the network layer as a part of Channel Selection algorithm or for the purpose of Clear Channel Assessment to determine if the channel is busy or idle. Link Quality Indication (LQI) : The LQI measurement characterizes the Strength/Quality of a received packet. It measures the quality of a received signal on a link. This measurement may be implemented using receiver ED, a signal to noise estimation or a combination of both techniques. The LQI result may be used

12 12 by the higher layers (Network and Application layers), but this procedure is not specified in the standard. Clear Channel Assessment (CCA) : This operation is responsible for reporting the medium activity state: busy or idle. The CCA is performed in three operational modes: Energy Detection mode: the CCA reports a busy medium if the detected energy is above the ED threshold. Carrier Sense mode: the CCA reports a busy medium only is it detects a signal with the modulation and the spreading characteristics of IEEE and which may be higher or lower than the ED threshold. Carrier Sense with Energy Detection mode: this is a combination of the above mentioned techniques. The CCA reports that the medium is busy only if it detects a signal with the modulation and the spreading characteristics of IEEE and with energy above the ED threshold. Channel Frequency Selection: The IEEE defines 27 different wireless channels. A network can support only part of the channel set. Hence, the physical layer should be able to tune its transceiver into a specific channel request by a higher layer. There are already commercially available sensor motes that are compliant with the IEEE The MICAz mote from Crossbow Tech. provides a partial implementation of IEEE , operating at 2.4 GHz and

13 Kbps. This mote uses 5 MHz for channel spacing conforming to the standard. Medium Access Control Layer This layer extracted from the IEEE standard provides services to the network layer above, which is part of the ZigBee stack level. The MAC layer is responsible for the addressing of data to determine the frames source and destination and also provides multiple access control such as CSMA/CA allowing for reliable transfer of data. It provides two modes of operation, namely Beacon enabled and non-beacon enabled (Figure 1.7). The features of MAC sub layers are beacon management, channel access, GTS management, frame validation, acknowledged frame delivery, association and disassociation. Figure 1.7 MAC Protocol - Two Modes of Operation

14 14 CSMA/CA Mechanism mechanism: The IEEE defines two versions of the CSMA/CA The slotted CSMA/CA version used in the beacon-enabled mode. The unslotted CSMA/CA version used in the non-beaconenabled mode. In both cases, the CSMA/CA algorithm is based on backoff periods, where one backoff period is equal to aunitbackoffperiod= 20 Symbols. This is the basic time unit of the MAC protocol and the access to the channel can only occur at the boundary of the backoff periods. In slotted CSMA/CA the backoff period boundaries must be aligned with the superframe slot boundaries where in unslotted CSMA/CA the backoff periods of one device are completely independent of the backoff periods of any other device in a PAN. The CSMA/CA mechanism uses three variables to schedule the access to the medium: NB is the number of times the CSMA/CA algorithm was required to backoff while attempting the access to the current channel. This value is initialized to zero before each new transmission attempt. CW is the contention windows length, which defines the number of backoff periods that need to be clear of channel

15 15 activity before starting transmission. CW is only used with the slotted CSMA/CA version. This value is initialized to 2 before each transmission attempt and reset to 2 each time the channel is assessed to be busy. BE is the backoff exponent, which is related to how many backoff period a device must wait before attempting to assess the channel activity. The Slotted CSMA/CA Mechanism The slotted CSMA/CA (Koubaa et al 2006, Hui Jing Aida et al 2011) can be summarized in five steps: Step 1 - initialization of NB, CW and BE: NB is initialized to 0 and the contention window CW is initialized to 2. Then the MAC protocol checks if the macbattlifextattribute is set to true. In this case, the Backoff exponent BE is set to set to the minimum value of 2 or macminbe attribute, otherwise BE is set to macminbe. MacMinBEattribute specifies the minimum of the backoff exponent, which is set to 3 by default. Note that when macminbeis set to zero, collision avoidance is disabled during the first iteration of the algorithm, as it could be understood from step 2 in Figure 1.8. After the initialization, the algorithm locates the boundary of the next backoff period.

16 16 The Slotted CSMA/CA Mechanism Slotted CSMA Delay for random (2 BE -1) unit backoff period (2) NB=0, CW=0 (1) Battery lifeext?e ns idle? Y BE=lesser of (2, macminbe) Perform CCA on backoff period boundary (3) N Channel idle? Y BE =macminbe (4) N (5) CW=2, NB=NB+1, BE=min(BE+1, amax BE) CW=CW-1 Locate Backoff Period Boundary N NB>mac MaxCS MABack off CW=0? N Y Y Failure Success Figure 1.8 Slotted CSMA/CA Mechanism

17 17 Step 2- random waiting delay for collision avoidance: the algorithm attempts to avoid collision by waiting during a given delay randomly generated in the range of [0, 2 BE 1] backoff periods. To disable the collision avoidance procedure at the first iteration, BE must be set to 0 and thus the waiting delay is null and the algorithm directly goes to step 3. Step 3- Clear Channel Assessment (CCA): the CCA must be started at a boundary of a backoff period just after the expiration of the waiting delay timer and repeatedly performs CW times a clear channel assessment before the access to the channel. If the channel is detected in a busy state, the algorithm goes to step 4, otherwise, i.e. the channel is idle, the algorithm goes to step 5. Step 4 - busy channel: if the channel is assessed to be busy, CW value is reset to 2 and the values of NB and BE are increased by one. However, BE cannot exceed amaxbe, which is a constant defined in the standard, and with a default value equal to 5. If the number of retries exceeds macmaxcsmabackoffs, whose the default value is 5, the algorithm terminates with a channel access failure status, otherwise, i.e. the number of retries is below or equal to macmaxcsmabackoffs, the algorithm returns to step 2. Step 5 - idle channel: if the channel is assessed to be idle, the value of the contention window CW is decreased by one. If the contention window has expired (CW = 0), the MAC protocol may start successfully its transmission, otherwise, i.e. CW 0, the algorithm returns to step 3. It is important to note that the transmission of the current frame is started only if the remaining number of backoff periods in the current superframe is sufficient to handle both the frame and the subsequent acknowledgement

18 18 transmissions. Otherwise, the transmission of the frame is deferred until the next superframe. The Unslotted CSMA/CA Mechanism UnSlotted CSMA NB=0, BE=macMinBE (1) Delay for random (2 BE -1) unit backoff periods (2) Perform CCA (3) Channel Idle? N Y (5) (4) NB=NB+1, BE=min(BE+1,aMaxBE) N NB>macMax CSMABackof Y Failure Success Figure 1.9 Unslotted CSMA/CA Mechanism

19 19 The unslotted CSMA/CA Mechanism(Figure 1.9) is similar to the slotted version with some few exceptions. Step 1- A first exception, the CW variable is not used in the unslotted CSMA/CA. This is because the unslotted CSMA/CA has no need to iterate the CCA procedure after detecting an idle channel. Hence, in step 3, if the channel is assessed to be idle, the MAC protocol immediately starts the transmission of the current frame. Second, the unslotted CSMA/CA does not support macbattlifeextmode and hence, BE is always initialized to the macminbevalue. Step 2 and Step 3 are exactly the same as those in the slotted CSMA/CA version. The only difference is that the CCA starts immediately after the expiration of the random backoff delay generated in step 2. Step 4 is the same than that in the slotted CSMA/CA with the exception that the algorithm does not increase the value of CW. If ever NB exceeds the value of macmaxcsmabackoffs, the algorithm terminates in a failure state, otherwise, it returns to step 3. In Step 5, the MAC sub-layer starts immediately transmitting its current frame just after a channel is assessed to be idle by the CCA procedure. Network Layer A feature of ZigBee such as the self-healing mechanism is acquired through this layer. As Figure 1.5 shows, this layer provides network management, network message broker, routing management and network security management. This layer is defined by the ZigBee Alliance, which is an association of companies united to work for a better ZigBee standard.

20 20 Application Layer Applications running on the ZigBee network are contained here. For example, applications to monitor temperature, humidity, or any other desirable atmospheric parameters can be placed on this layer for agricultural use. This is the layer that makes the device useful to the user. ZigBee Device Object (ZDO) A special application is on every ZigBee device, and this is the ZigBee Device Object (ZDO). This application provides key functions such as defining the type of ZigBee device (end device, router, and coordinator) a particular node is, initializing the network and to also participate in forming a network. Security Plane The security plane spans across both the network layer and the application layer. It is here; that security measures such as Advanced Standard Encryption (AES) based encryption is implemented Network Topologies ZigBee networks can contain a mixture of three potential components (Figure 1.10). These Components are a ZigBee coordinator, a ZigBee router, and a ZigBee end device. Different types of nodes will have different roles within the network layer, but all various types can have the same applications. ZigBee Coordinator For every ZigBee network, there can be only one coordinator. This node is responsible for initializing the network,

21 21 selecting the appropriate channel, and permitting other devices to connect to its network. It is also responsible for routing traffic in a ZigBee network. ZigBee Router A router is able to pass on messages in a network and is also able to have child nodes connected to it, whether it to be another router, or an end device. Router functions are only used in a tree or mesh topology, because in a star topology, all traffic is routed through the center node, which is the coordinator. ZigBee End Device The power saving features of a ZigBee network can be mainly credited to the end devices. Because these nodes are not used for routing traffic, they can be sleeping for the majority of the time, expanding battery life of such devices. In the following sections, we go into detail about the three different types of topology possible for a ZigBee network. The legend to all topology figures are shown below and each type of device is given a color code for easy viewing. Figure 1.10 ZigBee Device Type

22 22 Star Topology In the star topology (Figure 1.11), the communication paradigm is centralized, i.e. each device (Full Function Device (FFD) or Reduced Function Device (RFD)) joining the network and willing to communicate with other devices must send the data to the ZC, which dispatches it to the adequate destination node. The star topology is not adequate for most WSN due to the lack of scalability. This lack of scalability does not result from the allowable number of nodes (maximum addressing space of 65535) but from the limitation in terms of covered region, since all nodes in the cluster must be within the radio coverage of the ZC. Star network can operate both in beaconenabled and non-beacon-enabled modes). This type of topology is attractive because of its simplicity, but at the same time presents some key disadvantages. The IEEE standard recommends the star topology for applications such as home automation, personal computer peripherals, toys and games. Figure 1.11 Star Topology

23 23 Tree Topology In a Tree network (Figure 1.12), a coordinator initializes the network, and is the top (root) of the tree. The coordinator can now have either routers or end devices connected to it. For every router connected, there is a possibility for connection of more child nodes to each router. Child nodes cannot connect to end devices because it does not have the ability to relay messages. Figure 1.12 Tree Topology This topology allows different levels of nodes, with the coordinator being at the highest level. In order the messages to be passed to other nodes in the same network, the source node must pass the messages to its parent, which is the node higher up by one level of the source node and the message is continually relayed higher up in the tree until it is passed back down to the destination node. Because the number of potential paths a message can take is only one, this type of topology is not the most reliable topology. Mesh Topology In the mesh topology (Figure 1.13) the communication paradigm is decentralized; each node can directly communicate with any other node within its radio range. The mesh topology enables enhanced networking

24 24 flexibility, but it induces an additional complexity for providing end-to-end connectivity between all nodes in the network. Basically, the mesh topology operates in an ad-hoc fashion and allows multi-hop routing from any node to any other node. The mesh topology may be more energy efficient than the star topology since communications do not rely on one particular node, but does not allow efficient duty-cycle management due to the lack of synchronization (only operates in non-beacon enabled mode), thus leading to limited network lifetime. A mesh topology is the most flexible topology of the three. Flexibility is present because a message can take multiple paths from source to destination. If a particular router fails, then ZigBee s self-healing mechanism (aka route discovery) will allow the network to search for an alternate path for the message to take. Figure 1.13 Mesh Topology 1.5 OPNET Modeler 14.5 OPNET referred as Optimizing Network Engineering Tool, The OPNET Modeler 14.5 environment includes tools for all phases of a study, including model design, simulation, data collection, and data analysis,

25 25 OPNET Modeler 14.5 (OPNET Technologies, Inc., 2009) provides a comprehensive development environment supporting the modeling of communication networks and distributed systems, Both behavior and performance of a model can be analyzed by performing discrete event simulations, A Graphical User Interface (GUI) supports the configuration of the scenarios and the development of network models. Figure 1.14 OPNET Hierarchy

26 26 OPNET Hierarchy is shown in Figure Three hierarchical levels for configuration are differentiated: i) The network level creating the topology of the network under investigation. ii) iii) The node level defining the behavior of the node and controlling the flow of data between different functional elements inside the node. The process level, describing the underlying protocols, represented by Finite State Machines (FSMs) and is created with states and transitions between states. The source code is based on C/C Network Domain Network domain (Figure 1.15) specifies the overall scope of the system to be simulated, It is a high level description of the objects contained in the system. Network model specifies the objects in the system as well as their physical locations, interconnections and configurations. Network models consist of nodes, links and subnet. Nodes represent network devices and groups of devices, Servers, workstations, routers, etc., LAN nodes, IP clouds, etc.,

27 27 Figure 1.15 Network Domain Links represent point-to-point and bus links, Icons assist the user in quickly locating the correct nodes and links, Vendor models are distinguished by a specific color and logo for each company Node Domain Figure 1.16 Network Devices The Node domain defines the behavior of each network object. Behavior is defined using different modules, each of which models some

28 28 internal aspect of node behavior such as data creation, data storage, etc. Modules are connected through packet streams or statistic wires. Node model editor is shown in Figure transceivers, Basic building blocks (modules) include processors, queues, and Processors are fully programmable via their process model, Queues also buffer and manage data packets, Transceivers are node interfaces. Interfaces between modules, Packet streams, Statistic wires. Figure 1.17 Node Domain

29 Process Domain Process model specifies object in node domain (Figure 1.18). The Process Editor creates process models, which control the underlying functionality of the node models created in the Node Editor. Process models are represented by FSMs and are created with icons that represent states and lines that represent transitions between states. Operations performed in each state or for a transition are described in embedded C or C++ code blocks. Process model components: State transition diagrams, Blocks of C code, OPNET Kernel Procedures (KPs), State variables, Temporary variables. A process is an instance of a process model, Processes can dynamically create child processes, Processes can respond to interrupts.

30 30 Figure 1.18 Process Domain Recently, several analytical and simulation models of the IEEE protocol have been proposed. Nevertheless, currently available simulation models for this protocol are both inaccurate and incomplete, and in particular they do not support the GTS mechanism, which is required for time-sensitive WSN applications. OPNET Modeler, NS-2 and OMNeT++ are widely used and popular network simulators, which include a simulation model of the IEEE protocol. The /ZigBee simulation model in OPNET model library supports only non beacon-enabled mode, therefore, the cluster-tree topology and GTS mechanism cannot be simulated. In addition, the source codes of the network and application layers are not available. The National Institute of Standards and Technology (NIST) has developed own OPNET simulation model for the IEEE protocol. However, while that model implements the slotted and the unslotted CSMA/CA MAC protocols it does not support the GTS mechanism as well. It also uses its own radio channel model rather than the accurate OPNET

31 31 wireless library. The Network Simulator 2 (NS-2) is an object-oriented discrete event simulator including a simulation model of the IEEE protocol. The accuracy of its simulation results are questionable since the MAC protocols, packet formats and energy models are very different from those used in real WSNs. This basically results from the facts that NS-2 was originally developed for IP-based networks and further extended for wireless networks. Moreover, the GTS mechanism was not implemented in the NS-2 model. OMNeT++ (Objective Modular Network Test bed in C++) is another discrete event network simulator supporting unslotted IEEE CSMA/CA MAC protocol only. Finally, note that while NS-2 and OMNeT++ are open-source projects, the OPNET Modeler is commercial project providing a free of charge university program for academic research projects. 1.6 NEED FOR PERFORMANCE ANALYSIS Performance of the networks mainly depends on the various parameters like Throughput, End-to-End delay, Signal to Noise Ratio, Bit Error Rate and the Utilization of the channel. Throughput is the data quantity transmitted correctly starting from the source to the destination within a specified time (seconds). The importance of analyzing this QoS parameter is because the increased number of users of the wireless medium leads to increased possibility of interference. Throughput usually depends on many aspects of networks such as power control, scheduling strategies, routing schemes, packet collision, acknowledgment, obstructions between nodes and network topology. End-to-End delay is a measurement of the network delay on a packet and is measured by the time interval between when a message is queued for transmission at the physical layer until the last bit is received at the receiving node. As the number of nodes in the WPANs increases the delay

32 32 obviously will increase. Minimum end-to-end delay is required for applications like the smoke detector, accident detector and carbon monoxide detector. 1.7 OVERVIEW OF IEEE The IEEE protocol has recently been adopted as a communication standard for low data rate, low power consumption and low cost WSNs. The IEEE MAC protocol supports two operational modes that may be selected by a central node called PAN coordinator: The non-beacon enabled mode, (Chiara Buratti et al 2009) in which the MAC is ruled by non-slotted CSMA/CA. The beacon enabled mode, (Chiara Buratti et al 2010) in which beacons are periodically sent by the PAN coordinator to identify it s PAN and synchronize nodes that are associated with it. In beacon-enabled mode, the Beacon Interval (BI) defines the time between two consecutive beacons, and includes an active period and optionally an inactive period. The active period called superframe. The superframe structure is an optional part of a WPAN. It is the time duration between two consecutive beacons. The structure of the superframe is determined by the coordinator. The coordinator can also switch off the use of a superframe by not transmitting the beacons. The superframe duration is divided into 16 concurrent slots. The beacon is transmitted in the first slot. The remaining part of the superframe duration can be described by the terms,

33 33 Contention Access Period (CAP) (Ashrafuzzaman et al 2011), Contention Free Period (CFP) and Inactive portion. The superframe is used to provide vital statistics like synchronization, identifying the PAN and the superframe structure, to the devices connected in a Wireless PAN. This information is critical for the operation of the PAN in a Beacon enabled network. Figure1.19 Superframe Structure The lengths of the Beacon Interval and the Superframe Duration (SD) are determined by two parameters, the Beacon Order (BO) and the Superframe Order (SO), respectively. The Beacon Interval is defined as follows: BI=aBaseSuperframeDuration*2 BO, for 0 BO 14 (1.1) The Superframe Duration, which determines the length of the active period, is defined as follows: SD=aBaseSuperframeDuration*2 SO, for0 SO BO 14 (1.2)

34 34 where abasesuperframeduration = abaseslotduration anumsuperframeslots abaseslotduration = 60symbols anumsuperframeslots = 16 abasesuperframeduration = 60 16symbols = 960symbols InactivePortion = BeaconInterval SuperframeDuration In Equation (1.1) and Equation (1.2) (Koubaa et al 2006), abasesuperframedurationdenotes the minimum length of the superframe, corresponding to SO = 0. The IEEE standard fixes this duration to 960 symbols (a symbol corresponds to 4 bits). This value corresponds to 15.36ms, assuming a 250 Kbps in the 2.4 GHz frequency band. By default, the nodes compete for medium access using slotted CSMA/CA (Koubaa et al 2006) within the CAP during SD. In case of a busy channel, a node computes its backoff period based on a random number of time slots. The IEEE protocol also offers the possibility of having a CFP within the superframe (Figure 1.19). The CFP, being optional, is activated upon request from a node to the PAN coordinator for allocating time slots depending on the node's requirements. Upon receiving this request, the PAN coordinator checks whether there are sufficient resources and if possible, allocates the requested time slots. These time slots are called GTSs (Jurcik et al 2007) and constitute the CFP. If the available resources are not sufficient, the GTS request fails. The corresponding node then sends its data frames during the CAP. In a Non-Beacon mode, MAC uses un-slotted CSMA/CA mechanism in which device could start transmission procedure at any time. It does not provide any GTS mechanism, but it has the advantage of lower

35 35 complexity, high routing redundancy and scalability when compared to the beacon-enabled mode, since the former doesn t require any synchronization. 1.8 MOTIVATION The Literature survey shows that research has been carried out in the area of IEEE ZigBee WSN. The research work is started based on the mobility concept in WSN and Load Density is analyzed for the Hexagonal Configuration with ACK Enabled and Disabled Scenario for different network size which results in better reliability. Beacon Enabled Mode doesn t have mobility model. Hence extensive work has not been carried out on the analysis of mobility model in Beacon Enabled Mode. Acknowledgment plays a critical role in analyzing the network parameter. Performance of the non-beacon enabled network is simulated and analyzed for ACK Enabled Scenario and ACK Disabled Scenario. In this research Beacon Enabled mode is analyzed to support in OPNET Modeler and then performance of the beacon enabled network is simulated and analyzed for ACK Enabled Scenario and ACK Disabled Scenario. Finally network performance is compared with Beacon Enabled and Non Beacon Enabled Mode. 1.9 OBJECTIVE The objective of the thesis is to introduce the beacon enabled mode in OPNET Modeler and analyze the performance of the network by increasing the nodes in beacon enabled and non-beacon enabled mode with acknowledgement enabled and disabled. The following are the set objectives to realize the goal.

36 36 To compare 5 different number of nodes i.e., 10, 20, 30, 40 and 50 and analyzed their load density in hexagonal configuration by enabling and disabling acknowledgment. To study the performance of the ZigBee based WSNs in beacon enabled and non-beacon enabled mode. To compare the performance by increasing the nodes from 10 to 50 in both the modes. To analyze which mode is suitable for the reliable communication. To compare the performance of the beacon enabled and nonbeacon enabled mode by enabling and disabling the acknowledgment. To study the parameters of Throughput, End-to-End delay, Load and Utilization THESIS ORGANIZATION Chapter 1 presents an introduction to the different wireless Technologies and overview of IEEE and WSNs. The main objective of the research work is presented. Chapter 2 presents the literature survey on wireless networks, Non Beacon Enabled Mode of IEEE , Beacon Enabled Mode of IEEE , Mobility and OPNET Modeler. Chapter 3 deals with the load density analysis in hexagonal configuration by enabling and disabling the acknowledgment in mobile coordinator.

37 37 Chapter 4 presents the reliability of the IEEE network i.e., Load is analyzed in Beacon enabled and Non Beacon enabled mode by enabling and disabling acknowledgment. Chapter 5 deals with the performance analysis of the IEEE network parameters like Throughput, End-to-End delay and Utilization of both beacon enabled and non-beacon enabled modes by enabling and disabling acknowledgment and also compared the Load, Throughput, End-to- End delay and Utilization of IEEE network in all scenarios. Chapter 6 concludes the research work with scope for future work.

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider Chapter 5 IEEE 802.15.4 5.1 Introduction Wireless Sensor Network(WSN) is resource constrained network developed specially targeting applications having unattended network for long time. Such a network

More information

ZigBee/ David Sanchez Sanchez.

ZigBee/ David Sanchez Sanchez. ZigBee/802.15.4 David Sanchez Sanchez david.sanchezs@upf.edu Lecture Overview 1. Introduction and motivation to ZigBee 2. ZigBee/802.15.4 specification 1. Definitions 2. MAC communication modes 3. Network

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks 1 Ch. Steup / J. Kaiser, IVS-EOS Ubiquitous Sensing 2 Ch. Steup / J. Kaiser, IVS-EOS IEEE 802.x Wireless Communication 3 Ch. Steup / J. Kaiser, IVS-EOS Wireless Technology Comparision

More information

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov    kurssit/elt-53306/ WPAN/WBANs: ZigBee Dmitri A. Moltchanov E-mail: dmitri.moltchanov@tut.fi http://www.cs.tut.fi/ kurssit/elt-53306/ IEEE 802.15 WG breakdown; ZigBee Comparison with other technologies; PHY and MAC; Network

More information

Topic 02: IEEE

Topic 02: IEEE Topic 02: IEEE 802.15.4 Tuesday 20 Feb 2007 ICTP-ITU School on Wireless Networking for Scientific Applications in Developing Countries Bhaskaran Raman Department of CSE, IIT Kanpur http://www.cse.iitk.ac.in/users/braman/

More information

CHAPTER 4 CROSS LAYER INTERACTION

CHAPTER 4 CROSS LAYER INTERACTION 38 CHAPTER 4 CROSS LAYER INTERACTION The cross layer interaction techniques used in the lower layers of the protocol stack, solve the hidden and exposed terminal problems of wireless and ad hoc networks.

More information

Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 5 January 31, 2013 Carlo Fischione Associate Professor of Sensor Networks e-mail: carlofi@kth.se http://www.ee.kth.se/~carlofi/

More information

IEEE : a Federating Communication Protocol for Time-Sensitive Wireless Sensor Networks Anis Koubaa Mário Alves Eduardo Tovar

IEEE : a Federating Communication Protocol for Time-Sensitive Wireless Sensor Networks Anis Koubaa Mário Alves Eduardo Tovar Technical Report IEEE 802.15.4: a Federating Communication Protocol for Time-Sensitive Wireless Sensor Networks Anis Koubaa Mário Alves Eduardo Tovar CISTER-TR-131110 Version: Date: 11/18/2013 Technical

More information

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

Principles of Wireless Sensor Networks. Medium Access Control and IEEE http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 7 Stockholm, November 8, 2011 Medium Access Control and IEEE 802.15.4 Royal Institute of Technology - KTH Stockholm, Sweden e-mail:

More information

EL2745 Principles of Wireless Sensor Networks

EL2745 Principles of Wireless Sensor Networks EL2745 Principles of Wireless Sensor Networks www.kth.se/student/program-kurser/kurshemsidor/kurshemsidor/control/el2745 Lecture 5 Stockholm, February 2, 2012 Carlo Fischione Royal Institute of Technology

More information

Message acknowledgement and an optional beacon. Channel Access is via Carrier Sense Multiple Access with

Message acknowledgement and an optional beacon. Channel Access is via Carrier Sense Multiple Access with ZigBee IEEE 802.15.4 Emerging standard for low-power wireless monitoring and control Scale to many devices Long lifetime is important (contrast to Bluetooth) 10-75m range typical Designed for industrial

More information

Wireless communication standards: What makes them unattractive for WSN:

Wireless communication standards: What makes them unattractive for WSN: Wireless communication standards: IEEE 802.11 a/b/g Bluetooth GSM What makes them unattractive for WSN: Power hungry (need big batteries) Complexity (need lots of clock cycles and memory) New protocol

More information

CHAPTER 5 THROUGHPUT, END-TO-END DELAY AND UTILIZATION ANALYSIS OF BEACON ENABLED AND NON-BEACON ENABLED WSN

CHAPTER 5 THROUGHPUT, END-TO-END DELAY AND UTILIZATION ANALYSIS OF BEACON ENABLED AND NON-BEACON ENABLED WSN 137 CHAPTER 5 THROUGHPUT, END-TO-END DELAY AND UTILIZATION ANALYSIS OF BEACON ENABLED AND NON-BEACON ENABLED WSN 5.1 INTRODUCTION The simulation study in this chapter analyses the impact of the number

More information

Fuzzy Duty Cycle Adaption Algorithm for IEEE Star Topology Networks

Fuzzy Duty Cycle Adaption Algorithm for IEEE Star Topology Networks Computer Systems Department, Technical Institute / Qurna, Basra, Iraq email: hayderaam@gmail.com Received: 4/1 /212 Accepted: 22/7 /213 Abstract IEEE 82.15.4 is a standard designed for low data rate, low

More information

ENSC 427: COMMUNICATION NETWORKS

ENSC 427: COMMUNICATION NETWORKS ENSC 427: COMMUNICATION NETWORKS Simulation of ZigBee Wireless Sensor Networks Final Report Spring 2012 Mehran Ferdowsi Mfa6@sfu.ca Table of Contents 1. Introduction...2 2. Project Scope...2 3. ZigBee

More information

ZIGBEE. Erkan Ünal CSE 401 SPECIAL TOPICS IN COMPUTER NETWORKS

ZIGBEE. Erkan Ünal CSE 401 SPECIAL TOPICS IN COMPUTER NETWORKS ZIGBEE Erkan Ünal CSE 401 SPECIAL TOPICS IN COMPUTER NETWORKS OUTLINE ZIGBEE AND APPLICATIONS IEEE 802.15.4 PROTOCOL ZIGBEE PROTOCOL ZIGBEE ALLIANCE ZIGBEE APPLICATIONS PHYSICAL LAYER MAC LAYER ZIGBEE

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks c.buratti@unibo.it +39 051 20 93147 Office Hours: Tuesday 3 5 pm @ Main Building, second floor Credits: 6 The IEEE 802.15.4 Protocol Stack Time Synchronization Energy Management

More information

Simulation Analysis of Tree and Mesh Topologies in Zigbee Network

Simulation Analysis of Tree and Mesh Topologies in Zigbee Network Vol.8, No.1 (2015), pp.81-92 http://dx.doi.org/10.14257/ijgdc.2015.8.1.08 Simulation Analysis of Tree and Mesh Topologies in Zigbee Network Manpreet, Jyoteesh Malhotra CSE Department Guru Nanak Dev University

More information

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online): JJEE Volume 1, Number 1, 2015 Pages 45-54 Jordan Journal of Electrical Engineering ISSN (Print): 2409-9600, ISSN (Online): 2409-9619 Performance Evaluation for Large Scale Star Topology IEEE 802.15.4 Based

More information

Guide to Wireless Communications, 3 rd Edition. Objectives

Guide to Wireless Communications, 3 rd Edition. Objectives Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications

More information

Technical Report. On the use of the ZigBee protocol for Wireless Sensor Networks. Anneleen Van Nieuwenhuyse Mário Alves Anis Koubâa

Technical Report. On the use of the ZigBee protocol for Wireless Sensor Networks. Anneleen Van Nieuwenhuyse Mário Alves Anis Koubâa www.hurray.isep.ipp.pt Technical Report On the use of the ZigBee protocol for Wireless Sensor Networks Anneleen Van Nieuwenhuyse Mário Alves Anis Koubâa HURRAY-TR-060603 Version: final Date: 26/JUN/2006

More information

Performance Investigation and Optimization of IEEE for Industrial Wireless Sensor Networks. Presented By: Aniket Shah

Performance Investigation and Optimization of IEEE for Industrial Wireless Sensor Networks. Presented By: Aniket Shah Performance Investigation and Optimization of IEEE802.15.4 for Industrial Wireless Sensor Networks MOHSIN HAMEED, HENNING TRSEK, OLAF GRAESER AND JUERGEN JASPERNEITE Presented By: Aniket Shah 1 Outline

More information

Mobile Communications

Mobile Communications Mobile Communications Wireless Personal Area Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 IEEE Standards 2 IEEE 802.15.4 Wireless PAN (Sensor Networks) 3 Information Current

More information

Medium Access Control in Wireless Networks

Medium Access Control in Wireless Networks Medium Access Control in Wireless Networks Prof. Congduc Pham http://www.univ-pau.fr/~cpham Université de Pau, France MAC layer Routing protocols Medium Acces Control IEEE 802.X MAC GSM (2G) Channels Downlink

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

A Comprehensive Simulation Study of Slotted CSMA/CA for IEEE Wireless Sensor Networks

A Comprehensive Simulation Study of Slotted CSMA/CA for IEEE Wireless Sensor Networks A Comprehensive Simulation Study of Slotted CSMA/CA for IEEE 802.15.4 Wireless Sensor Networks Anis KOUBAA, Mário ALVES, Eduardo TOVAR IPP-HURRAY! Research Group, Polytechnic Institute of Porto Rua Dr.

More information

WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS

WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS 3 WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS Dr. H. K. Verma Distinguished Professor (EEE) Sharda University, Greater Noida (Formerly: Deputy Director and Professor of Instrumentation Indian Institute of

More information

Improving the IEEE Slotted CSMA/CA MAC for Time-Critical Events in Wireless Sensor Networks

Improving the IEEE Slotted CSMA/CA MAC for Time-Critical Events in Wireless Sensor Networks Improving the IEEE 802.15.4 Slotted CSMA/CA MAC for Time-Critical Events in Wireless Sensor Networks Anis KOUBAA 1, Mário ALVES 1, Bilel NEFZI 2, Ye-Qiong SONG 2 1 IPP-HURRAY! Research Group, Polytechnic

More information

Impact of IEEE n Operation on IEEE Operation

Impact of IEEE n Operation on IEEE Operation 2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini

More information

Technical Report. On the Performance Limits of Slotted CSMA/CA in IEEE for Broadcast Transmissions in Wireless Sensor Networks

Technical Report. On the Performance Limits of Slotted CSMA/CA in IEEE for Broadcast Transmissions in Wireless Sensor Networks www.hurray.isep.ipp.pt Technical Report On the Performance Limits of Slotted CSMA/CA in IEEE 802.15.4 for Broadcast Transmissions in Wireless Sensor Networks Anis Koubaa Mário Alves Eduardo Tovar Ye-Qiong

More information

Introduction to IEEE

Introduction to IEEE Introduction to IEEE 802.15.4 Marcos Rubinstein IEEE 802.15.4 Short range, low bit rate, low power consumption Home Automotive Industrial applications Games Metering 1 PHY speeds 250 kbps 40 kbps 20 kbps.

More information

WIRELESS SENSOR NETWORK

WIRELESS SENSOR NETWORK 1 WIRELESS SENSOR NETWORK Dr. H. K. Verma Distinguished Professor (EEE) Sharda University, Greater Noida (Formerly: Deputy Director and Professor of Instrumentation Indian Institute of Technology Roorkee)

More information

Performance Analysis of Beacon Enabled IEEE Using GTS in Zigbee

Performance Analysis of Beacon Enabled IEEE Using GTS in Zigbee Performance Analysis of Beacon Enabled IEEE 802.15.4 Using GTS in Zigbee Rajashri Wavage PG Student Computer Science and Engineering Baddi University of Emerging Science and Technology Aman Kaushik. Asst.

More information

Topics. Introduction Architecture Node Types Network Topologies Traffic Modes Frame Format Applications Conclusion

Topics. Introduction Architecture Node Types Network Topologies Traffic Modes Frame Format Applications Conclusion ZigBee Topics Introduction Architecture Node Types Network Topologies Traffic Modes Frame Format Applications Conclusion Introduction The Wireless technologies (WiFi,GSM,and Bluetooth) All have one thing

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area

More information

Clustered Coordinator SABTS (CC-SABTS) for Beacon Transmission in IEEE LR-WPAN

Clustered Coordinator SABTS (CC-SABTS) for Beacon Transmission in IEEE LR-WPAN Clustered Coordinator SABTS (CC-SABTS) for Beacon Transmission in IEEE802.15.4 LR-WPAN Dyg Khayrunsalihaty Bariyyah bt Abang Othman 1, Hushairi bin Zen 2, Al Khalid Hj. Othman 2, Khairuddin Ab Hamid 2

More information

Investigating the Impact of Topologies on the Performance of ZIGBEE Wireless Sensor Networks

Investigating the Impact of Topologies on the Performance of ZIGBEE Wireless Sensor Networks Investigating the Impact of Topologies on the Performance of 802.15.4 ZIGBEE Wireless Sensor Networks D. Deepika 1 and Prof. S. Pallam Setty 2 1 M.tech, Department of Computer Science and Systems Engineering,

More information

Simulation Analysis of IEEE Non-beacon Mode at Varying Data Rates

Simulation Analysis of IEEE Non-beacon Mode at Varying Data Rates Simulation Analysis of IEEE 802.15.4 Non-beacon Mode at Varying Data Rates Z. Abbas, N. Javaid, M. A. Khan, S. Ahmed, U. Qasim, Z. A. Khan COMSATS Institute of IT, Islamabad, Pakistan. Mirpur University

More information

Overview of the IEEE /4a standards for low data rate Wireless Personal Data Networks

Overview of the IEEE /4a standards for low data rate Wireless Personal Data Networks Overview of the IEEE 802.15.4/4a standards for low data rate Wireless Personal Data Networks Luca De Nardis and Maria-Gabriella Di Benedetto Infocom Department School of Engineering University of Rome

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

Communication In Smart Grid -Part3

Communication In Smart Grid -Part3 Communication In Smart Grid -Part3 Dr.-Ing. Abdalkarim Awad 09.12.2015 Informatik 7 Rechnernetze und Kommunikationssysteme Zigbee General characteristics Data rates of 250 kbps, 20 kbps and 40kpbs. Star

More information

Energy and delay trade-off of the GTS allocation mechanism in IEEE for wireless sensor networks

Energy and delay trade-off of the GTS allocation mechanism in IEEE for wireless sensor networks Energy and delay trade-off of the GTS allocation mechanism in IEEE 802.15.4 for wireless sensor networks Anis Koubaa, Mário Alves and Eduardo Tovar SUMMARY The IEEE 802.15.4 protocol proposes a flexible

More information

Outline. TWR Module. Different Wireless Protocols. Section 7. Wireless Communication. Wireless Communication with

Outline. TWR Module. Different Wireless Protocols. Section 7. Wireless Communication. Wireless Communication with Section 7. Wireless Communication Outline Wireless Communication with 802.15.4/Zigbee Protocol Introduction to Freescale MC12311 802.15.4/Zigbee Protocol TWR-12311 Module TWR-MC12311 Smart Radio Features

More information

Communications Options for Wireless Sensor Networks. Marco Zennaro and Antoine Bagula ICTP and UWC Italy and South Africa

Communications Options for Wireless Sensor Networks. Marco Zennaro and Antoine Bagula ICTP and UWC Italy and South Africa Communications Options for Wireless Sensor Networks Marco Zennaro and Antoine Bagula ICTP and UWC Italy and South Africa WSN communications options When considering communications options, parameters to

More information

University of Alberta. Mansoureh Takaffoli. Master of Science. Department of Computing Science

University of Alberta. Mansoureh Takaffoli. Master of Science. Department of Computing Science University of Alberta CLASS-BASED RATE DIFFERENTIATION IN WIRELESS SENSOR NETWORKS by Mansoureh Takaffoli A thesis submitted to the Faculty of Graduate Studies and Research in partial fulfillment of the

More information

Load Density Analysis of Mobile Zigbee Coordinator in Hexagonal Configuration

Load Density Analysis of Mobile Zigbee Coordinator in Hexagonal Configuration Wireless Sensor Network, 2012, 4, 59-64 http://dx.doi.org/10.4236/wsn.2012.43009 Published Online March 2012 (http://www.scirp.org/journal/wsn) Load Density Analysis of Mobile Zigbee Coordinator in Hexagonal

More information

By Ambuj Varshney & Akshat Logar

By Ambuj Varshney & Akshat Logar By Ambuj Varshney & Akshat Logar Wireless operations permits services, such as long range communications, that are impossible or impractical to implement with the use of wires. The term is commonly used

More information

Real-time Communication over Cluster-tree Wireless Sensor Networks

Real-time Communication over Cluster-tree Wireless Sensor Networks Department of Control Engineering Faculty of Electrical Engineering Czech Technical University in Prague, Czech Republic Real-time Communication over Cluster-tree Wireless Sensor Networks a doctoral thesis

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Sensor Networks A wireless sensor network (WSN) is a wireless network consisting

More information

Modulation. Propagation. Typical frequency bands

Modulation. Propagation. Typical frequency bands References Wireless Technology 2 AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE UNDERLYING WIRELESS TECHNOLOGIES. The physical layer provides mechanical, electrical, l functional,

More information

AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE

AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE Wireless Technology AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE UNDERLYING WIRELESS TECHNOLOGIES. References 2 The physical layer provides mechanical, electrical, l functional,

More information

ZIGBEE AND PROTOCOL IEEE : THEORETICAL STUDY

ZIGBEE AND PROTOCOL IEEE : THEORETICAL STUDY ZIGBEE AND PROTOCOL IEEE 802.15.4: THEORETICAL STUDY 1 NAYAN DUBAY, 2 VISHANK PATEL 1 Learner and Researcher, Indore ²Fourth Semester M.Tech, Oriental university, Indore Email: 1 nayandubey18@gmail.com,

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks c.buratti@unibo.it +39 051 20 93147 Office Hours: Tuesday 3 5 pm @ Main Building, third floor Credits: 6 Standard Solutions Data-rate RFID 20 cm, 10-200 kbps 100m, 11-100 Mbps

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 6 High Rate Wireless Personal Area Networks Objectives Define a high rate wireless personal area network (HR WPAN) List the different HR WPAN standards

More information

Research Article 2017

Research Article 2017 International Journal of Emerging Research in Management &Technology Research Article May 2017 Special Issue of International Conference on Emerging Trends in Science & Engineering (ICETSE 2017) Conference

More information

A Comprehensive Analysis of the MAC Unreliability Problem in IEEE Wireless Sensor Networks

A Comprehensive Analysis of the MAC Unreliability Problem in IEEE Wireless Sensor Networks A Comprehensive Analysis of the MAC Unreliability Problem in IEEE 802.15.4 Wireless Sensor Networks Giuseppe Anastasi Dept. of Information Engineering University of Pisa, Italy E-mail: giuseppe.anastasi@iet.unipi.it

More information

Guide to Wireless Communications, Third Edition. Objectives

Guide to Wireless Communications, Third Edition. Objectives Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

Wireless and Mobile Networks 7-2

Wireless and Mobile Networks 7-2 Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected

More information

Design and Implementation of a Multi-hop Zigbee Network

Design and Implementation of a Multi-hop Zigbee Network Design and Implementation of a Multi-hop Zigbee Network Chi-Wen Deng, Li-chun Ko, Yung-chih Liu, Hua-wei Fang Networks and Multimedia Institute Institute for Information Industry, ROC {cwdeng, lcko, ulysses,

More information

WIRELESS TECHNOLOGIES

WIRELESS TECHNOLOGIES WIRELESS TECHNOLOGIES Bluetooth, ZigBee and ANT Thomas Aasebø OVERVIEW What are wireless sensor networks? What are personal area networks? What are these networks typically used for? Bluetooth, ZigBee

More information

MeshMAC: Enabling Mesh Networking over IEEE through distributed beacon scheduling

MeshMAC: Enabling Mesh Networking over IEEE through distributed beacon scheduling MeshMAC: Enabling Mesh Networking over IEEE 802.15.4 through distributed beacon scheduling Panneer Muthukumaran, Rodolfo de Paz, Rostislav Spinar, Dirk Pesch Center for Adaptive Wireless Systems Cork institute

More information

Wireless Personal Area Networks (WPANs) Wireless PAN

Wireless Personal Area Networks (WPANs) Wireless PAN Wireless Personal Area Networks (WPANs) IEEE P802.15 Working Group Wireless PAN Applications Home Networking Automotive Networks Industrial Networks Interactive Toys Remote Metering Overview Data rates

More information

Zigbee protocol stack overview

Zigbee protocol stack overview Zigbee protocol stack overview 2018 ASSUMPTIONS FOR USING THIS TEACHING MATERIAL DSR and OTSL takes no responsibility about the problem which occurs as a result of applying the technical information written

More information

VISHVESHWARAIAH TECHNOLOGICAL UNIVERSITY BELGAUM-10 S.D.M COLLEGE OF ENGINEERING AND TECHNOLOGY DHARWAD-02

VISHVESHWARAIAH TECHNOLOGICAL UNIVERSITY BELGAUM-10 S.D.M COLLEGE OF ENGINEERING AND TECHNOLOGY DHARWAD-02 VISHVESHWARAIAH TECHNOLOGICAL UNIVERSITY BELGAUM-10 S.D.M COLLEGE OF ENGINEERING AND TECHNOLOGY DHARWAD-02 A seminar report on ZIGBEE WIRELESS SYSTEM Submitted by MAHANTESH.B.BIKKANNAVAR 2SD05CS033 8 th

More information

A Beacon Cluster-Tree Construction Approach For ZigBee/IEEE Networks

A Beacon Cluster-Tree Construction Approach For ZigBee/IEEE Networks A Beacon Cluster-Tree Construction Approach For ZigBee/IEEE802.15.4 Networks Mohammed.I. Benakila, Laurent George LACSC Laboratory ECE Paris, school of engineering Paris, France e-mail: Benakila@ece.fr,

More information

Performance evaluation of IEEE sensor networks in industrial applications

Performance evaluation of IEEE sensor networks in industrial applications INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. (2014) Published online in Wiley Online Library (wileyonlinelibrary.com)..2756 Performance evaluation of IEEE 802.15.4 sensor networks

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

KW41Z IEEE and BLE Coexistence Performance

KW41Z IEEE and BLE Coexistence Performance NXP Semiconductors Document Number: AN12231 Application Note Rev. 0, 08/2018 KW41Z IEEE 802.15.4 and BLE Coexistence Performance MWS module 1. About this manual This document aims to evaluate the performance

More information

CHAPTER 3 BLUETOOTH AND IEEE

CHAPTER 3 BLUETOOTH AND IEEE CHAPTER 3 BLUETOOTH AND IEEE 802.15 These slides are made available to faculty in PowerPoint form. Slides can be freely added, modified, and deleted to suit student needs. They represent substantial work

More information

A Novel Priority-based Channel Access Algorithm for Contention-based MAC Protocol in WBANs

A Novel Priority-based Channel Access Algorithm for Contention-based MAC Protocol in WBANs A Novel Priority-based Channel Access Algorithm for Contention-based MAC Protocol in WBANs BeomSeok Kim Dept. of Computer Engineering Kyung Hee University Yongin 446-701, Korea passion0822@khu.ac.kr Jinsung

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Technical Report. Energy/Delay Trade-off of the GTS Allocation Mechanism in IEEE for Wireless Sensor Networks

Technical Report. Energy/Delay Trade-off of the GTS Allocation Mechanism in IEEE for Wireless Sensor Networks www.hurray.isep.ipp.pt Technical Report Energy/Delay Trade-off of the GTS Allocation Mechanism in IEEE 802.15.4 for Wireless Sensor Networks Anis Koubaa Mário Alves Eduardo Tovar TR-061002 Version: 1.0

More information

Reliability and Energy Efficiency in Multi-hop IEEE /ZigBee Wireless Sensor Networks

Reliability and Energy Efficiency in Multi-hop IEEE /ZigBee Wireless Sensor Networks Reliability and Energy Efficiency in Multi-hop IEEE 82.15.4/ZigBee Wireless Sensor Networks Giuseppe Anastasi, Marco Conti, Mario Di Francesco and Vincenzo Neri Dept. of Information Engineering Institute

More information

ZigBee: Simulation and Investigation of Star and Mesh Topology by using different Transmission Bands

ZigBee: Simulation and Investigation of Star and Mesh Topology by using different Transmission Bands The AIUB Journal of Science and Engineering (AJSE), Vol. 14, No. 1, August 2015 ZigBee: Simulation and Investigation of Star and Mesh Topology by using different Transmission Bands Md. Mamunur Rashid and

More information

Performance Analysis of Guaranteed Time Slots Allocation in IEEE Protocol over Radio

Performance Analysis of Guaranteed Time Slots Allocation in IEEE Protocol over Radio Middle-East Journal of Scientific Research 13 (9): 1137-1143, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.13.9.739 Performance Analysis of Guaranteed Time Slots Allocation

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works

More information

IEEE ah. sub 1GHz WLAN for IoT. What lies beneath Wi-Fi HaLow. Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering

IEEE ah. sub 1GHz WLAN for IoT. What lies beneath Wi-Fi HaLow. Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering by wilgengebroed IEEE 802.11ah sub 1GHz WLAN for IoT What lies beneath Wi-Fi HaLow Eduard Garcia-Villegas, Elena López-Aguilera Dept. of Network Engineering eduardg@entel.upc.edu elopez@entel.upc.edu Contents

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Victor Kwong Marketing Manager

Victor Kwong Marketing Manager Nov, 2008 Introduction to Freescale's Synkro Platform: Wireless Control and Automation for Next-Generation Home Entertainment Products PC106 Victor Kwong Marketing Manager of Freescale Semiconductor, Inc.

More information

Matteo Petracca Scuola Superiore Sant Anna, Pisa

Matteo Petracca Scuola Superiore Sant Anna, Pisa Wireless stack and protection techniques Matteo Petracca Scuola Superiore Sant Anna, Pisa Basic Computing Theory and Practice in WSNs Scuola Superiore Sant Anna, Pisa June 21th 2010 Outline Introduction

More information

Book Title: ZigBee Network Protocols and Applications. Editors: Chonggang Wang, Tao Jiang and Qian Zhang

Book Title: ZigBee Network Protocols and Applications. Editors: Chonggang Wang, Tao Jiang and Qian Zhang Book Title: ZigBee Network Protocols and Applications Editors: Chonggang Wang, Tao Jiang and Qian Zhang September 9, 2009 ii Contents 1 Performance Analysis of the IEEE 802.15.4 MAC Layer 1 1.1 Introduction....................................

More information

Simulation Based Performance Analysis of DSDV, OLSR and DSR Routing Algorithm in Wireless Personal Area Network Using NS-2

Simulation Based Performance Analysis of DSDV, OLSR and DSR Routing Algorithm in Wireless Personal Area Network Using NS-2 Research Journal of Computer and Information Technology Sciences ISSN 232 6527 Simulation Based Performance Analysis of, and Routing Algorithm in Wireless Personal Area Network Using NS-2 Shivlal Mewada

More information

Seminar: Mobile Systems. Krzysztof Dabkowski Supervisor: Fabio Hecht

Seminar: Mobile Systems. Krzysztof Dabkowski Supervisor: Fabio Hecht Personal Area Networks Seminar: Mobile Systems November 19th 2009 Krzysztof Dabkowski Supervisor: Fabio Hecht Agenda Motivation Application areas Historical and technical overview Security issues Discussion

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

Chapter 7. ZigBee (IEEE ) Liang Zhao, Andreas Timm-Giel

Chapter 7. ZigBee (IEEE ) Liang Zhao, Andreas Timm-Giel Chapter 7 ZigBee (IEEE 802.15.4) Liang Zhao, Andreas Timm-Giel Outline 7.1 Introduction and Overview of IEEE 802.15.4 / ZigBee 7.2 IEEE 802.15.4: Physical Layer Protocols 7.3 IEEE 802.15.4: MAC Layer Protocols

More information

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Mobile & Wireless Networking. Lecture 7: Wireless LAN 192620010 Mobile & Wireless Networking Lecture 7: Wireless LAN [Schiller, Section 7.3] [Reader, Part 6] [Optional: "IEEE 802.11n Development: History, Process, and Technology", Perahia, IEEE Communications

More information

Computer Networks. Wireless LANs

Computer Networks. Wireless LANs Computer Networks Wireless LANs Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN 802.11 Personal wireless nw WPAN 802.15 WiFi 802.11a 802.11b 802.11h 802.11i/e/

More information

Energy Efficient Clear Channel Assessment for LR-WPAN

Energy Efficient Clear Channel Assessment for LR-WPAN www.ijcsi.org 387 Energy Efficient Clear Channel Assessment for LR-WPAN Praveen Kaushik 1, Nilesh kumar R. Patel 2, Jyoti Singhai 3 1 Department of CSE, MANIT Bhopal, M.P., India 2 Department of CSE, MANIT

More information

Simulative Investigation of Zigbee Network Coordinator Failure with Different QoS

Simulative Investigation of Zigbee Network Coordinator Failure with Different QoS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni

More information

IEEE modifications and their impact

IEEE modifications and their impact Mobile Information Systems 7 (2011) 69 92 69 DOI 10.3233/MIS-2011-0111 IOS Press IEEE 802.15.4 modifications and their impact M. Goyal, W. Xie and H. Hosseini Department of Computer Science, University

More information

Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea

Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea http://usn.konkuk.ac.kr/~jskim 1 IEEE 802.x Standards 802.11 for Wireless Local Area Network 802.11 legacy clarified 802.11 legacy

More information

Performance Evaluation of Different Backoff Algorithms in IEEE Using Double Sensing

Performance Evaluation of Different Backoff Algorithms in IEEE Using Double Sensing Indonesian Journal of Electrical Engineering and Computer Science Vol. 5, No. 2, February 2017, pp. 376 ~ 382 DOI: 10.11591/ijeecs.v5.i2.pp376-382 376 Performance Evaluation of Different Backoff Algorithms

More information

IEEE : a wireless communication technology for large-scale ubiquitous computing applications

IEEE : a wireless communication technology for large-scale ubiquitous computing applications IEEE 802.15.4: a wireless communication technology for large-scale ubiquitous computing applications Anis Koubâa, Mario Alves, Eduardo Tovar PP-HURRAY! Research Group, Polytechnic Institute of Porto Rua

More information

Fig. 1. Superframe structure in IEEE

Fig. 1. Superframe structure in IEEE Analyzing the Performance of GTS Allocation Using Markov Model in IEEE 802.15.4 Alladi Ramesh 1,Dr.P.Sumithabhashini 2 1 Dept.of CSE, PETW, Hyderabad 2 Dept.of ECE, PETW, Hyderabad Abstract-In this paper,

More information

ZigBee & Wireless Sensor Networks Case Study: ZigBee & IEEE S.rou.2. ZigBee Solution. What is ZigBee?

ZigBee & Wireless Sensor Networks Case Study: ZigBee & IEEE S.rou.2. ZigBee Solution. What is ZigBee? S.rou.2-2 Wireless Sensor Networks Case Study: ZigBee & IEEE802.15.4 S.rou.2 ZigBee & 802.15.4 ZigBee overview IEEE 802.15.4 overview ZigBee & bluetooth End Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai,

More information