The Research of Long-Chain Wireless Sensor Network Based on 6LoWPAN

Similar documents
Mobile Communications

An Energy Efficiency Routing Algorithm of Wireless Sensor Network Based on Round Model. Zhang Ying-Hui

Outline. Introduction. The Internet Architecture and Protocols Link Layer Technologies Introduction to 6LoWPAN The 6LoWPAN Format Bootstrapping

Network protocol for Internet of Things based on 6LoWPAN

IPv6 Stack. 6LoWPAN makes this possible. IPv6 over Low-Power wireless Area Networks (IEEE )

ETSI Plugtests Guide V1.0.0 ( ) 6LoWPAN Plugtests; Berlin, Germany; July 2013

Configuring IPv6 basics

Introduction to IPv6 - II

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

Politecnico di Milano Advanced Network Technologies Laboratory. 6LowPAN

Implementation and Evaluation of the Enhanced Header Compression (IPHC) for 6LoWPAN

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

Mobile IPv6 Overview

TCP/IP Protocol Suite

Operation Manual IPv6 H3C S3610&S5510 Series Ethernet Switches Table of Contents. Table of Contents

Table of Contents 1 IPv6 Configuration IPv6 Application Configuration 2-1

Internet Protocols (chapter 18)

Table of Contents 1 IPv6 Configuration IPv6 Application Configuration 2-1

IPv6 Neighbor Discovery

Reliable Mobile IP Multicast Based on Hierarchical Local Registration

Table of Contents 1 IPv6 Basics Configuration 1-1

IPv6 Neighbor Discovery

Networked Embedded Systems: 6LoWPAN

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP

Planning for Information Network

Computer Networks (Introduction to TCP/IP Protocols)

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen

Implementation of 6LoWPAN Border Router (6BR) in Internet of Things

Internet Protocol, Version 6

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

IPv6 Neighbor Discovery

Table of Contents Chapter 1 Tunneling Configuration

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

6LoWPAN (IPv6 based Low Power WPAN)

Politecnico di Milano Advanced Network Technologies Laboratory. 6LowPAN

IPv6 Protocol & Structure. npnog Dec, 2017 Chitwan, NEPAL

Network layer: Overview. Network Layer Functions

IPv6. Internet Technologies and Applications

Master Course Computer Networks IN2097

Guide to TCP/IP Fourth Edition. Chapter 6: Neighbor Discovery in IPv6

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

WSN Routing Protocols

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Open System Interconnect model

Chapter 09 Network Protocols

Networked Embedded Systems: 6LoWPAN

Extensions at Broadcast Growth Codes

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

Table of Contents 1 IPv6 Configuration IPv6 Application Configuration 2-1

IPv6 Neighbor Discovery

What is the difference between unicast and multicast? (P# 114)

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

CSF645 Mobile Computing 行動計算. IPv6. (Internetworking With TCP/IP vol Part 31) 吳俊興國立高雄大學資訊工程學系

FiberstoreOS IPv6 Service Configuration Guide

Introduction to IPv6. IPv6 addresses

A Study of Two Different Attacks to IPv6 Network

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Ad-hoc and Infrastructured Networks Interconnection

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Workshop on Scientific Applications for the Internet of Things (IoT) March

IPv6 Protocol Architecture

Research and Implementation of the Key Technology of UAV Aerial Image. Transmission

Routing over Low Power and Lossy Networks

The Netwok Layer IPv4 and IPv6 Part 2

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang

The Internet Protocol. IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly

Modification to Ipv6 Neighbor Discovery and Mobile Node Operation

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

IPv6 Traffic Hijack Test System and Defense Tools Using DNSSEC

Infrastructure for Autonomous Mobile Robots Communication and Coordination

AODV-PA: AODV with Path Accumulation

Integration of Wireless Sensor Network Services into other Home and Industrial networks

internet technologies and standards

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Internet of Things: An Introduction

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

Chapter 16 Networking

Low Power and Low Latency MAC Protocol: Dynamic Control of Radio Duty Cycle

Configuring IPv6. Information About IPv6. Send document comments to CHAPTER

Virtual Hierarchical Architecture Integrating Mobile IPv6 and MANETs for Internet Connectivity

ECSE 414 Fall 2014 Final Exam Solutions

Network Layer: Internet Protocol

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Lecture 8. Reminder: Homework 3, Programming Project 2 due on Thursday. Questions? Tuesday, September 20 CS 475 Networks - Lecture 8 1

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

Optimized Neighbor Discovery for 6LoWPANs: Implementation and Performance Evaluation

Design and Implementation of NEMO based ZigBee Mobile Router for Healthcare System

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

IPv6 Neighbor Discovery

Mohammad Hossein Manshaei 1393

Chapter 4 Network Layer

Comparison of Two Synchronization Protocol in Wireless Sensor Network

Lecture 8. Network Layer (cont d) Network Layer 1-1

IPv6 ND Configuration Example

OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS

Transcription:

2017 5th International Conference on Enterprise Systems The Research of Long-Chain Wireless Sensor Network Based on 6LoWPAN Weilan Lin linweilan@gz.sia.cn Shuangfei Zi zishuangfei@gz.sia.cn Zhiyi Fan Department of Automation Guangdong University of Technology fanzhiyi@gz.sia.cn Jinchao Xiao xiaojinchao@sia.cn Yingchun Zhong Department of Automation Guangdong University of Technology, gzzhw@126.com Abstract Long-chain wireless sensor network exhibits a special topology with the nodes distributed in one line just like a long chain. The wireless nodes in this special topology cannot directly access the Internet and the data in the transmission process prone to collision. The 6LoWPAN standard makes it possible for nodes within each wireless sensor network to connect the Internet. According to the characteristics of Long-chain wireless sensor networks and combining with the 6LoWPAN standard, an address allocation method is proposed, which allocates IP addresses for the node in Long-chain wireless sensor network. By compressing the network address of the data frame to improve the data transmission efficiency. In this paper, we also propose a dynamic routing protocol based on maximum routing radius (DMR) to avoid data collision in the transmission process and improve system responsiveness. The experimental results show that the nodes in the network can interact with the users via the Internet, the stability and responsiveness of the network are greatly improved. Keywords 6LoWPAN, Routing, Long-Chain Wireless Sensor Networks. I. INTRODUCTION Long-chain wireless sensor networks are used in special scenes such as mines, oil and gas pipelines, etc. In order to realize the Long-chain wireless sensor networks connect to the Internet needs to resolve two key issues. The first is to assign IP addresses to the node within the network. The second is to have a reasonable routing protocol to achieve stable data transmission. In [1], the author proposes a sensor network address allocation scheme that combines of geographic location information, but the scheme is based on IPv4 and does not suitable for IPv6 networks. Another independent research [2] which proposes a repeating address detection scheme based on IPv6 stateless address auto configuration, but it will lead to a large amount of network overhead and is not suitable for resource-constrained wireless networks. In [3-6] also proposed other address configuration strategy, but it is not suitable for Long-chain wireless sensor networks. At present, a number of routing protocols are proposed for the Long-chain wireless sensor network, mainly divided into two categories: Hierarchical routing protocol and locationbased routing protocol. In [7], an adaptive clustering algorithm LEACH is proposed. The node sends data to the cluster head, which integrates the node data in the cluster and sends it to the Sink node through multi-hop mode. The LEACH algorithm randomly selected cluster head may be concentrated in a particular area cannot cover the entire monitoring area maybe cause the network split and the node energy consumption increases. In [8], an improved minimum hop routing algorithm is proposed for Longchain wireless sensor networks in tunnel, but this algorithm is aimed to reduce the energy consumption of the nodes in the network has not improved the node data transmission delay and congestion. Based on the above research, this paper presents an address allocation method for Long-chain wireless sensor networks, which allocates IPv6 addresses for the node in the network. A dynamic routing with maximum routing radius (DMR) for Longchain wireless sensor networks is adopted to improve the responsiveness of data transmission and reduce packet loss rate. The node does not need to maintain more routing state information and realize seamless connection between Long-chain wireless sensor network and Internet. II. NETWORK ARCHITECTURE The structure of Long-chain wireless sensor network based on 6LoWPAN shown in Fig. 1.The sensor network is consists of IP router, edge router and wireless nodes, in which the wireless nodes and the edge routers distributed in one line. The edge router through the IP router to obtain the network address prefix and assigns it to the wireless nodes. The node uses the address prefix and the short address to generate the IP address. The communication between the node and the edge router in the network adopts a dynamic routing method based on the maximum route radius (DMR) to realize the stable transmission between 2572-6609/17 $31.00 2017 IEEE DOI 10.1109/ES.2017.30 143

the node and the edge router. The users can send the commands to the network to control the wireless nodes, while the status information of wireless nodes can also be transmitted to the remote users. The bidirectional transmission of the user to the wireless node is shown in the Fig. 2. III. NETWORK ADDRESS CONFIGURATION In the Long-chain wireless sensor network, the node has a unique two-byte short address. The encoding of the node is determined by the distance from the node to the edge router, where the address encoding of the edge router is 0x0000, and the address of the wireless node in the network starts with 0x0001 and so on. In the Long-chain wireless sensor network, the IPV6 address of the node is composed of the 64 bit address prefix and the 64 bit interface identifier (see Fig. 3a). The IPv6 address prefix can be applied to the IP router, and the local link address prefix can also be used. The interface identity is generated according to the RFC6282[9] by the 16-bit short address, where the short address of the 16 bits is made up of the node's short address, which is the unique identity of the node in the Long- chain wireless network, so the IP address of the node within the network is unique. When a node is added to the wireless network and the node is at the end of the link, the node uses the stateless address auto configuration to generate the temporary address (see Fig. 3b), where the interface identifier is converted by the IEEE EUI-64 address. Since the new added node is not adjacent to the edge router, the node needs the adjacent routing node to forward the request message to the edge router to join the network. The new added node can send a Router Solicitation (RS) [10] to the neighbor routing node. After the neighbor routing node receives the RS, the routing node sends a Router Advertisement (RA) [10] to the new added node and forwards the Node Registration (NR) [10] to the edge router. The new added node can obtains the address prefix through the option information in the RA and the edge router assigns a short address to the new added node after the NR is received. When the node obtains the short address, it reassembles the address prefix and interface identifier to generate the unique IPv6 address in the network. Fig. 1. The Structure of Long-chain wireless sensor network. Fig. 2. The data transfer process of the node to the user. This work was supported in part by The Natural Science Foundation of Guangdong Province: No. 2014A03031026. Fig. 3. The composition of the node IP address. The temporary IP address of the node. IV. NETWORK ADDRESS COMPRESSION In order to make the IPV6 datagram transmit within the Long-chain wireless sensor network, the IPv6 basic header needs to be compressed. In this paper, the IPV6 basic header is compressed by the method of stateless compression and uses the improved IPHC encoding to represent the compressed format of the IPv6 header (see Fig. 4). In this improved IPHC header, TF (Traffic class / Flow label), NH (Next Header), HLM (Hop Limit) and C (Context ID) are encoded in the same way as traditional IPHC[9]. The coding of the SAM, M, AT and DAM identify the source address and destination address compression format, the specific meaning of each field is as follows. SAM (Source Address Mode). The source addresses compression mode flag. The source address is not compressed and 128 bits in length (SAM = 00), the source address prefix is omitted and the address interface identity is preserved and 64 bits in length (SAM=01), the source address prefix is omitted, in the interface identity only the 16- bit short address is preserved (SAM=10). DAM (Destination Address Mode). The destination addresses compression mode flag. If the M bit in the improved IPHC header is set, the destination address is a multicast address, The DMA encoding mode is consistent with the traditional IPHC, if the M bit is not set, the DAM encoding is the same as SAM. AT (Address Type). The attribute identifiers of the node address. When the AT bit is set, the address is the global routing address and the address prefix is the global routing prefix, if that bit is not set, the address is the linklocal address, and the address prefix is the link-local prefix Fig. 4. The improved IPHC encoding format. V. ROUTING PROTOCOL The data of the nodes in the Long-chain wireless sensor network, which is transmitted along the same link. Not only enhance the probability of data collision, but also increases the time delay of data transmission, leading to the low working efficiency for data reception of Sink node In this paper, we propose a routing protocol based on the 144

maximum routing radius (DMR) to avoid data collision in the transmission process and improve system responsiveness. A. Definition of routing radius The routing radius is specified by the transport node, which indicates the range of the communication. The value of the routing radius should be adjusted dynamically to adapt to the changes of the external environment and to ensure the data transmission can be achieved with the minimum hops. In addition, because the node address is encoded in sequence, the transport node can determine the transmission direction of the data packet, according to the source address Addrsource and the destination address Addr. The routing radius R is modeled as dest R = Addr Addr (1) dest source The routing radius R delimits the communication range for this communication. When the node is in the monitoring phase and receives the broadcast information, we can draw the following inference from the local address of the node. 1) AddrLocal > Addrsource The node is outside the range of this communication, the node should discard the broadcast frame. 2) AddrLocal = Addrsource The node is on the edge of the communication range, not only need to reply to the broadcast, but also as a broadcast forwarding node. 3) AddrLocal < Addrsource The node is within the range of this communication and needs to reply to the broadcast information. B. Data conflict avoidance mechanism The node receiving the data needs to determine whether it is within the communication range. The node takes the moment at which the broadcast frame is received as the start time of the synchronization. As shown in Fig. 5, from the beginning of the broadcast sends out to the nodes to reply to the message, the process as a hierarchical transmission process. The process can be divided into three stages: First, data processing phase, the node receives the broadcast information waits for the control module to process the data frame. The waiting time is consistent for all nodes. Second, the node response phases (see Fig. 5a). The communication range of all nodes to reply to the broadcast, the response slot of all nodes is consistent with a fixed value. Third, the broadcast monitoring phase (see Fig. 5b), in order to avoid the node set the routing radius exceeds the actual communication range. Set a waiting period for all nodes in the communication range to ensure that the next hop broadcast is successfully received. Fig. 5. The hierarchical synchronization process diagram; The node response phase; (c) The broadcast monitoring phase. Assume that the broadcast frame is emitted by the node S 0 and set the routing radius is R. The node S n is at the edge of the broadcast communication range and its address is (c) AddrSn = AddrS 0 + R (2) According to the source address in the broadcast data frame and the short address of the node, use the following formula to calculate the response slot SLc for all nodes in the node response phase to avoid data conflicts ( ) SL = R Addr Addr + (3) c Sc S0 1 If the broadcast is eventually forwarded by node S m, it indicates that the routing radius is set unreasonable. The routing radius in the broadcast sent by node C will be corrected to ( ) R = R Addr Addr (4) The broadcast monitoring phase is also the next forwarding phase of the broadcast and this phase is ended when the broadcast is forwarded. The first slot in the broadcast monitoring phase is the node (including the original broadcast node) within the communication range monitor the node S n to send a broadcast. In the first broadcast monitoring slot, if the node within the communication range is not receiving the broadcast of the node S n, it indicates that the node S n is not within the transmission range of the broadcast or the node S n is invalid. In the second broadcast monitoring slot, the node S n-1 to forward the broadcast, while the communication range of nodes start monitor the broadcast send by the node S n-1. And so on, until has a node that sends the broadcast, and then this phase is over. C. Node response mechanism The node's response message is eventually transmitted to the edge router. If the node is far from the edge router, the data sent by the node may require multiple hops to reach the edge router. In order to reduce the probability of unsuccessful sending, the transmission node has 3 times to resend the response message: If the node sends a response message, the node does not receive the response from the destination node within the specified time. Indicates that the target node is not within the actual communication range or that the node has been invalidated, and the Sn Sm 145

transport node is adjusted to a shorter routing radius to resend. Fig. 7. The time period diagram Fig. 6. The node adjusts routing radius resend the message VI. DIAGNOSTIC TEST RESULTS A. Simulation test In this paper, the simulation is carried out by Matlab. The simulation scenario is that the node and edge router distributed in one line and the distance between each node is 20m, the scale of the network is 20 nodes, 100 nodes and 200 nodes respectively. The farthest transmission distance and monitoring distance of the signal is 100m in the current scenario. This simulation compares the average endto-end time-delay of the LEACH and DMR protocols (see in Fig. 8). The sending rate of the nodes under the two protocols is the same, which is 1 packet / slot. The communication slot is 200ms. When the communication distance is the initial value, the average time-delay of the LEACH and DMR protocols is not much different, and DMR is only a few slots less than LEACH. When the communication distance is shortened by 20%, because the DMR protocol dynamically adjusts the routing radius, the average time-delay is only slightly increased, and the LEACH protocol due to the transmission signal between the cluster head weakened, the data retransmission increased, result the average time-delay increased almost doubled. The results show that the time delay performance of DMR protocol is better than Leach. Fig. 9. The edge router and monitoring host computer; The wireless nodes within the network. Fig. 10. The 433MZ wireless module TABLE I. THE ADDRESS-MAPPING TABLE OF THE NODE IN THE EDGE ROUTER Address-Mapping Wireless Node MAC address Short address IP address 1 00:12:5b:93:ce:3d 0x0001 bbbb::ff:fe00:1 2 00:ff:54:88:dd:27 0x0002 bbbb::ff:fe00:2 Fig. 8. The average time-delay comparison of the two Protocols. B. Field test In order to verify the connectivity of the network, the test platform is constructed as shown in Fig. 9. The test platform consists of 80 wireless nodes, edge routers, and host computer. The edge router and wireless node using the wireless communication module is independently developed 433MZ wireless module (see Fig. 10). The address-mapping in the edge router is composed of the MAC address, short address and the node IP address as shown in Table I. When a node joins the network, the table will be updated. Fig. 11. Perform a ping test on the node within the network; The datagram was captured by Wireshark. 146

The ping test is performed on the wireless nodes and the test results are shown in the Fig. 11a. It can be seen from the figure that the connectivity of the nodes is normal. The data sent from the node to the host computer can be captured by the network protocol analyzer Wireshark. The sensor network datagram captured by the Wireshark show in the Fig. 11b, the address of the host computer is bbbb::82:48f:7e0d:7ae5 and the bbbb::ff:fe00:1 is the address of the node in the wireless network, The node and the edge router use the UDP protocol for data transfer. VII. CONCLUSION In order to realize the seamless connection between the Long-chain Wireless sensor network and the Internet, avoid the conflict during data in the transmission process and reduce transmission time-delay. This paper presents an address coding method for Long-chain wireless sensor networks, which assigns IP addresses to wireless nodes in the network. Through the DMR routing protocol to improve the stability and responsiveness of data transmission, making the wireless nodes within the network can interact with the Internet. The network system will be further improved in the future through specific application practices. REFERENCES [1] A. Dunkels, J. Alonso, and T. Voigt, Making tcp/ip viable for wireless sensor networks, 2003. [2] M. Günes and J. Reibel, An ip address configuration algorithm for zeroconf mobile multihop ad hoc networks, in Proceedings of the International Workshop on Broadband Wireless Ad-Hoc Networks and Services. Citeseer, 2002. [3] W. X. Nao and Q. H. Yan, Seamless mobility handover for 6lowpan wireless sensor network, Journal of University of Electronic Science and Technology of China, vol. 42, no. 3, pp. 415-419, 2013. [4] H. Ying and B. Jie, Ipv6 address configuration based on geographic position for wireless sensor network, Video Engineering, vol. 37, no. 5, pp. 118-120, 2013. [5] H. Lin, R. Gang, and L. Ying, General requi rement driven ipv6 address generation mechanisms management system, Journal of Huazhong University of Science and Technology (Nature Science Edition), no. S1, pp. 89-93, 2016. [6] M. Xin and C. Xi, Research on the coping strategy for the ipv6 address resources of the smart grid, AUTOMATION OF ELECTRIC POWER SYSTEMS, vol. 34, no. 16, pp. 8-12, 2010. [7] V. Mhatre and C. Rosenberg, Homogeneous vs heterogeneous clustered sensor networks: a comparative study, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577), 2004, pp. 3646-3651 Vol.6. [8] Z. Mailing and Z. Min, Research of improved algorithm of minimum hop count routing of underground wireless sensor networks, Industry and Mine Automation, vol. 41, no. 7, pp. 78-83, 2015. [9] P.Thubert J. Hui, Ed. RFC 6282 - Compression Format for IPv6 Datagrams over IEEE 802.15.4 based networks. https://tools.ietf.org/html/rfc6282, September 2011. (Accessed on 04/04/2016). [10] B. Luo, S. Tang, and Z. Sun, Research of neighbor discovery for ipv6 over low-power wireless personal area networks, in Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE), 2015 11th International Conference on. IEEE, 2015, pp. 233-238. 147