A Comparative Performance Study of the Routing Protocols RPL, LOADng and LOADng-CTP with Bidirectional Traffic for AMI Scenario

Similar documents
INTERNATIONAL JOURNAL OF COMMUNICATIONS Volume 12, Performance comparative analysis of LOADing-CTP and RPL routing protocols for LLNs

Expanding Ring Search for Route Discovery in LOADng Routing Protocol

Routing over Low Power and Lossy Networks

A Depth First Forwarding (DFF) Extension for the LOADng Routing Protocol

Quantitative Analysis and Evaluation of RPL with Various Objective Functions for 6LoWPAN

Study of RPL DODAG Version Attacks

The P2P-RPL Routing Protocol for IPv6 Sensor Networks: Testbed Experiments

Lesson 4 RPL and 6LoWPAN Protocols. Chapter-4 L04: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

RPL: Routing for IoT. Bardh Prenkaj Dept. of Computer Science. Internet of Things A.A

Study and Analysis of Routing Protocols RIP and DSR Using Qualnet V5

Routing Protocols in MANETs

Enhancing Routing Protocol for Low Power and Lossy Networks

3. Evaluation of Selected Tree and Mesh based Routing Protocols

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Principles of Wireless Sensor Networks

Performance Comparison of the RPL and LOADng Routing Protocols in a Home Automation Scenario

Mobile Communications. Ad-hoc and Mesh Networks

Mobile Communications

Performance Evaluation of Various Routing Protocols in MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Cisco Systems, Inc. October Performance Evaluation of the Routing Protocol for Low-Power and Lossy Networks (RPL)

Wireless Sensor Networks Module 2: Routing

Secure routing in IoT networks with SISLOF

Mobile Ad hoc Networking (MANET) LIX, Ecole Polytechnique, France. Intended status: Standards Track

Performance Analysis of Aodv Protocol under Black Hole Attack

Redes Inalámbricas Tema 4. Mobile Ad Hoc Networks

2013, IJARCSSE All Rights Reserved Page 85

Analysis and Enhancement of RPL under Packet Drop Attacks

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

Performance Analysis of MANET Routing Protocols OLSR and AODV

A Performance Evaluation of RPL in Contiki

Simulation and Performance Analysis of Throughput and Delay on Varying Time and Number of Nodes in MANET

Politecnico di Milano Advanced Network Technologies Laboratory. 6LowPAN

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

LECTURE 9. Ad hoc Networks and Routing

RPL- Routing over Low Power and Lossy Networks

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Evaluation of Routing Protocols for Mobile Ad hoc Networks

AODV-PA: AODV with Path Accumulation

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks

QUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

Available online at ScienceDirect. Procedia Computer Science 87 (2016 )

Figure 1: Ad-Hoc routing protocols.

Optimizing Routing Protocol for Low power and Lossy Network (RPL) Objective Function for Mobile Low-Power Wireless Networks

Computation of Multiple Node Disjoint Paths

Performance Analysis and Enhancement of Routing Protocol in Manet

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Routing in the Internet of Things (IoT) Rolland Vida Convergent Networks and Services

Impact of Hello Interval on Performance of AODV Protocol

Performance Evaluation of Routing Protocols in Lossy Links for Smart Building Networks

Chapter 7 CONCLUSION

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET

Design and Analysis of Routing Protocol for IPv6 Wireless Sensor Networks

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

An Algorithm for Timely Transmission of Solicitation Messages in RPL for Energy-Efficient Node Mobility

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Evaluation of RPL Objective Functions

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

A RPL based Adaptive and Scalable Data-collection Protocol module for NS-3 simulation platform

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Wireless Sensor Networks, energy efficiency and path recovery

Keywords: AODV, MANET, WRP

Evaluating the Performance of Modified DSR in Presence of Noisy Links using QUALNET Network Simulator in MANET

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

Resource Aware Routing Protocol in Heterogeneous Wireless Machine-to-Machine Networks

A Survey on Wireless Routing Protocols (AODV, DSR, DSDV)

Recent Researches in Communications, Information Science and Education

Mobile Ad-Hoc Networks & Routing Algorithms

Ad Hoc Networks: Issues and Routing

Internet Engineering Task Force (IETF) Request for Comments: ISSN: March 2012

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks

DualMOP-RPL: Supporting Multiple Modes of Downward Routing in a Single RPL Network

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

IoT Roadmap in the IETF. Ines Robles

Routing Protocols in MANET: Comparative Study

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

Low Power and Low Latency MAC Protocol: Dynamic Control of Radio Duty Cycle

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

The Performance of MANET Routing Protocols for Scalable Video Communication

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

EFFICIENT ROUTING AND CHANNEL ASSIGNMENT IN MULTICHANNEL MOBILE ADHOC NETWORKS

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Intended Status: Standard Track. March 12, Optimization of Parent-node Selection in RPL-based Networks draft-hou-roll-rpl-parent-selection-00

To enhance Routing in ZigBee Wireless Networks

Power aware Multi-path Routing Protocol for MANETS

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks

Transcription:

A Comparative Performance Study of the Routing Protocols, and with Bidirectional Traffic for AMI Scenario Saida Elyengui, Riadh Bouhouchi, and Tahar Ezzedine Abstract With the introduction of the smart grid, Advanced Metering Infrastructure (AMI) has become a main component in the present power system. The effective implementation of AMI depends widely on its communication infrastructure and protocols providing trustworthy two-way communications. In this paper we study two routing protocols philosophies for low power and lossy networks (LLNs) and their application for a smart metering scenario. This study purposes a detailed evaluation of two routing protocols proposed by IETF, the proactive candidate namely (IPv6 Routing Protocol for Low-Power and Lossy Networks) and the reactive candidate named (LLN On-demand Ad-hoc Distance vector routing protocol next generation) recently proposed as an internet Draf, still in its design phase and is part of the ITU-T G.9903 recommendation. In the course of this study, we also implemented an extension version of, named specified by an IETF draft extended with a collection tree for efficient data acquisition in LLNs. We performed checks on control overhead; End to End Delay and Packet delivery ratio for the two protocols related to multipoint-to-point (MP2P), and point-to-multi point (P2MP) traffic flow in a realistic smart metering architecture. Index Terms Smart Metering; ; ; - CTP; Performance; Simulation; Contiki OS; Cooja. I I. INTRODUCTION N the recent last year s we were witnessing rapid transformation in worldwide electric grid to meet new requirements such as efficiency, reliability, increasing power demand and sustainability [, 2]. However, in order to address the different challenges for these new requirements, a novel distributed bidirectional model is mandatory for electricity generation, production distribution and control. Indeed, utility companies need to deploy a robust two-way flow communication infrastructure between electricity consumers and providers and in order to meet the new requirements for different Smart grid applications like Advanced Metering Infrastructure (AMI) and smart homes and buildings [3]. Networks connecting smart devices in Low Power and Lossy Networks (LLNs), such as sensors and actuators, operate Manuscript received May 25, 205, revised June 25, 205. Authors are with Communication System Laboratory Sys'Com, National Engineering School Of Tunis, Tunis El Manar University, Tunisia (e-mail: saida.yengui@gmail.com;riadh.bouhouchi@yahoo.com;tahar.ezzedine@eni t.rnu.tn). frequently in extremely capricious link quality conditions and very restricted internal (memory and CPU) and limited communications capacity and constrained energy resources. So far, routing protocols are required for creating and sustaining multi-hop connectivity in LLNs with respect to QoS requirements for such applications. In this manuscript we make the following contributions: We evaluate our implementations of and in Contiki OS and compare it to protocol for bidirectional scenarios in AMI mesh network architecture. We provide simulation results for the network End-to-End delay, PDR, overhead and show how our implemented solution can provide bidirectional data flow scalability for AMI scenario. The paper is structured as follows: Section II depicts related work performed by the community. Section III provides a detailed overview of protocol. Respectively in sections IV and V we describe and LOADN-CTP protocols specifications. Section VI presents detailed performance evaluation and simulations results, in section VII we conclude. II. RELATED WORK The authors in [4] proposed an extension to routing protocol named Collection Tree and performed a detailed comparison of, and -Collection Tree in terms of overhead, Packet delivery ratio and End to End Delay. In [5] the authors performed a detailed study of proactive versus reactive routing in low power and lossy Networks and depicted performance analysis and scalability improvements for and protocols. In their study of the two protocols philosophies several metrics of interest were investigated with varied size deployments scenarios and traffic flow, as well as random topologies. They concentrated on metrics related to scalability such as End to End delay, Hop Distance and Control overhead. In [6] the authors proposed the protocol the Collection Tree Extension of Reactive Routing Protocol for Low-Power and Lossy Networks. The protocol complexity, interoperability and security were deeply examined. The comparative study was performed with respect to metrics such as packet delivery ratio, Number of MAC layer collisions, Average End-to-End delay, Number of overhead packets transmitted by each router and Overhead bytes per second in the whole network. The authors proved that extension can efficiently increase the proficiency of data acquisition in LLNs networks.

2 III. SPECIFICATION The Routing protocol for Low power and Lossy networks was developed and published as (RFC6550) [7] by the ROLL Working Group of the IETF. In essence, is a proactive distance-vector routing protocol for IPv6-based LLNs. constructs its routes in periodic intervals and forms a tree-like routing structure in the network called Destination Oriented Directed Acyclic Graph (DODAG) defined according to a specific objective function and a set of metrics and constraints. A network can be established by multiple DODAG. A Directed Acyclic Graph (DAG) is formed over a mesh network with sink nodes that serve as roots of the graph. divides the DAG into one or more DODAGs and attributes only one sink per DODAG. The protocol operation mode can be divided into two main phases; Routing upward or DODAG construction, and Routing downward/destination Advertisement. In the first step, provisions routes Up towards DODAG roots; each node chooses its preferred parent in the tree to convey DODAG information, it uses DODAG Information Object (DIO) and DODAG Information Solicitation (DIS) messages [2]. Then, uses Destination Advertisement Option (DAO) messages to establish downward routes. In the DODAG construction process, topology building is managed by several rules such as Loop avoidance, a chosen Operating function OF, path metrics etc. First of all, upon the trickle timer expiration a DIO packet is sent by the node in local multicast, in order to advertise a DODAG end its characteristics like DODAGID and DODAG Rank of the node. When a node receives a DIO packet, it must verify the message. If the packet is considered for processing, the node determines whether it is send from a candidate neighbor or not. Then, it checks whether the packet is related to a DODAG that the current node is already member of. After checking the rank of the current link, the packet is considered processed. Then, in terms of Destination Advertisement there are two modes for downward traffic: Storing when the packets have to travel all the way to a DODAG root before traveling down, or Non-Storing, in this case, the packet may be directed down towards the destination by a common ancestor of the source. supports three basic traffic flows Multipoint-to-Point Traffic (M2P), Point-to-Multipoint Traffic (P2M), Point-to-Point Traffic (P2P). All of them are definitely required in several applications like smart grid applications, building and home automation [8], and smart metering. As upwards roots are stored in routing tables, it is well optimized for M2P. Yet, it gives -by non-storing mode - reasonably support for P2MP, besides, it provides only basic features for P2P [9]. IV. LOADNG SPECIFICATION LLNs Ad hoc On-Demand Distance Vector Routing Next Generation is a reactive distance-vector routing protocol for WSNs [0]. It is a simplified version of ad-hoc on-demand routing protocol AODV originally developed for use in IEEE 802.5.4 based devices in 6LoWPANs and LLNs. This protocol may be used at layer 3 as a route-over routing protocol or at layer 2 as a mesh-under protocol. Therefore, algorithm is characterized by its simplicity and its low memory storage needs. Thus, it would be ideal and suitable solution for AMI mesh networks. As it was originally developed to WSNs and Low Power and Lossy Networks (LLNs), it should be adapted to their requirements and constraints. describes four types of packets: Route Request (RREQ): The RREQ is generated by a router the <originator>, when a data packet in available to a destination, RREQ packet is with no valid route and with a specific destination address. Route Reply (RREP): The RREP is generated by a router, upon a RREQ reception and processing with destination address in its routing set. Route Reply Acknowledgement (RREP-ACK): The RREP-ACK is generated by a router after a reception of RREP, as an indication to the neighbor source of the RREP that the RREP was successfully received. Route Error (RERR): the RERR is generated by a router when the router detects a broken route to the destination. inherited basic operations of AODV, including generation and forwarding of Route Request RREQs as described in Fig. to discover a route to a specific destination. Fig.. RREQ forwarding in Fig. 2. RREP unicast forwarding in. Upon receiving this message, only the terminator can reply by a RREP as specified in Fig. 2 and forward it on unicast, hop-by-hop to the source. When intermediate nodes receive the RREP, they will unicast a proper RREP ACK to the neighbor from which they received the RREP, in order to notify that the link is bidirectional. If a route is detected broken, an error

3 message can be returned to the source of that data packet. Compared to AODV, intermediate nodes are not allowed to generate RREPs. As a result, reduces the size of control messages which is demanded in LLNs. In there is no more need to the sequence Number included in in AODV messages sent to requesting routers. Also, there is no more Gratuitous RREP; in fact, when an intermediate node has a valid route to the destination the node responds with an RREP on unicast to the source and notify the destination with this Gratuitous message. Thus, message size would be reduced which is definitely suitable to LLNs low-power and memory constraints. In the other hand, nodes with protocol do not maintain a precursor list containing the IP address for neighbors likely being a next hop towards each destination as it is done with AODV protocol, but they only care about the next hop to forward current packet to its destination. Also, compared to AODV, Control messages can include TLV (Type-Length-Value) elements, permitting protocol extensions to be developed. V. THE LOADNG-CTP SPECIFICATION Collection Tree Protocol () specified by the authors in [6] is a recent extension to protocol using a collection tree combined with specification detailed in [4]. The extension aims for building bidirectional routes for MP2P and P2MP traffic flow in a sensors network, with low overhead easy maintenance and better performance. A. Protocols Messages maintains the same packet format of with some modification on the protocol operations; it introduces two flags to RREQ messages: RREQ COLLECTION TREE TRIGGER: This trigger enable routers to discover bidirectional routes in its vicinity. RREQ COLLECTION TREE BUILD: When set, permitting the receiving router to build the route to the root. HELLO messages: The HELLO messages specified in [] used for collection tree build in protocol are broadcasted by root router and never forwarded by the -hop neighbors. These messages are used to identify bidirectional routes. Parameters NET TRAVERSAL TIME RREQ MAX JITTER HELLO MIN JITTER HELLOMAXJITTER RREPREQUIRED TABLE I. LOADNG-CTP PARAMETERS Description It is the maximum time allowed for a packet when traversing the whole network from end to end. It is the maximum jitter for RREQ transmission. It is the minimum jitter for HELLO message transmission. With the following condition HELLO MIN JITTER> 2 RREQ MAX JITTER It is the maximum jitter for HELLO message transmission. It is a flag to define if a RREP message is required in order to build routes from the root to sensors while receiving RREQ BUILD message. B. Router Parameters uses the router parameters detailed in Table for protocol functioning. C. Protocol Operations In this section we describe the basic protocol operation with four algorithms. In the procedure summarized in algorithm all flags are initiated and set by the root router. The collection tree is created by the node requiring to be the root of the collection tree. The root of the collection tree generates RREQ TRIGER set to. The originator and destination of the RREQ TRIGGER are set to the address of the root. When a RREQ TRIGGER is generated, a RREQ with RREQ BUILD flag is planned to be sent in 2 NET TRAVERSAL TIME. Algorithm : Collection Tree Triggering : If Generate_RREQ (loadngctp_packet) == true and Set (RREQTRIGGER,)> then 2: <originator> Route_address 3: Destination_address Route_address 4: End if 5: while (true) 6: if (Timer == 2 NET TRAVERSAL TIME) then 7: Generate(RREQBUILD) 8: Timer 0 9: End if 0: End while : Return true 2: End procedure In the neighbor discovery procedure summarized in Algorithm 2, each router will acquire the list of neighbors with bidirectional (SYM) or unidirectional (HEARD) link and update the routing tables Algorithm 2: Bidirectional Neighbour Discovery : If (RREQTRIGGER>0)then 2: Update(Routing Set, routing tuple<originator>) 3: Status HEARD 4: TriggerReceived 5: End if 6: If ((RREQTRIGGER>0) and (TriggerReceived>0) then 7: Jitter RREQMAXJITTER 8: Consider_Transmiting_RREQ( loadngctp_packet ) 9: End if 0: if ishellomessage ( loadngctp_packet )= true then : if (Routing Tuple==Route_address) then 2: Update(Routing Set, routing tuple<originator>) 3: Status SYM 4: Discard HelloMessage 5: End if 6: End if 7: return true 8: End procedure The algorithm 3 describes the collection tree building process. When receiving the RREQ BUILD the router validate if the RREQ BUILD was received from a neighbor with a bidirectional link in this case the collection tree is built the routing table and the protocol parameters are updated otherwise the message is discarded.

4 Algorithm 3: Collection Tree Building : If((RREQ BUILD>0)and (status== SYM)) then 2: Build 3: else if (status== HEARD) 4: discard RREQ BUILD 5: End if 6: End if 7: If ((RREQ BUILD>0 and (Build>0)) or short path to the root then 8: Insert Routing tuple into Routing Set 9: R_next_addr previous-hop 0: R_dest_addr <originator> : Jitter RREQMAXJITTER 2: Consider_Transmiting_RREQ( loadngctp_packet ) 3: End if 4: return true 5: End procedure The Root-to-Sensor Path Building procedure is detailed in algorithm 4. With the exchange of RREQ TRIGGER and RREQ BUILD messages all the nodes in the collection tree obtained a bidirectional path to the root. In fact, root to sensors path are built by the use of RREP REQUIRED flag set to true and transmitted in unicast to the root and routing tables are updates according to the bidirectional path established. Algorithm 4: Root-to-Sensor_Path_Building : If ((RREQ BUILD) >0 and(rreprequired>0), then 2: RREP_originator Sensor_addr 3: RREP_destination R_addr 4: End if 5: If (RREPJITTER>0) then 6: R_dest_addr previous-hop 7: R_next_addr previous-hop 8: R_next_addr RREP_destination 9: End if 0: return true : End procedure The implementation of the extension was successfully integrated into the network layer of Contiki OS with the implementation of the four algorithms described above. The messages exchange functioning is detailed in Fig. 3 with a CTP building between routers A and B resuming the four procedures described in algorithms, 2, 3 and 4. VI. PERFORMANCE EVALUATION A. Simulation Settings In order to understand the performance of the two protocols and extension we evaluated routing protocols in terms of packet Delivery ratio (PDR), latency in order to predict how it behave in larger networks, and overhead to describe its power consumption and memory management. The detailed settings of the scenarios studied are detailed in table 2 the values have been averaged over 0 runs; TABLE II. COOJA SIMULATOR PARAMETER SETUP Settings Transport layer UDP Value Wireless channel model UDGM Model with Distance Loss Communication range 250m Distance to the Concentrator Variable [50-500] Meters Grid Size 000*000 m2 Number of routers Variable [20/300] Mote type Tmote Sky Network layer μipv6 6LoWPAN MAC layer CSMA ContikiMAC Radio interface CC2420 2.4 GHz IEEE 802.5.4 Simulation time 8h Simulations were completed in a field of 000 000 meters, with variable amounts of routers positioned randomly, were realistic conditions were approached and different nodes are suggested to interferences. The network scenarios are as described in Table 3 are substance of two different traffic patterns: multipoint-to-point (MP2P), where all routers generate CBR traffic flow by periodic reporting of 52-byte data packet with 60 seconds interval and acknowledgment of each received frame in upward direction of 6 bytes payload, for which the destination always is the sink. And point-to- multipoint (P2MP) traffic with two messages types, acknowledgment of data frames in downward direction every data arrival of 2 bytes payloads and configuration data packet with CBR traffic flow by periodic message of 6-byte payload with 300 seconds interval in downward direction. TABLE III. NODES TRAFFIC PATTERN Fig. 3. Messages Exchange. Node Type Client Concentrator Traffic Pattern MP2P traffic flow by periodic reporting with 60s interval and acknowledgment of each received frame in upward direction. P2MP traffic with two messages types : Acknowledgment of data frames in downward direction every data arrival. Configuration data sent with CBR flow every 300 seconds in downward direction. Both and were implemented with C in contiki OS with respect to their authors specification respectively in [0] and [4, 6]. The settings for are listed in Table 4, and for and in Table 5.

P2MP PDR P2MP PDR P2MP End-To-End Delay (ms) P2MP End-to-End Delay(ms) 5 TABLE IV. PARAMETERS Parameter Value Mode of operation non-storing Rank metric hop count DIOIntervalMin 2 s DIOIntervalDoublings 20 DIORedundancyConstant DAOInterval 5s TABLE V. LOADNG AND LOADNG-CTP PARAMETERS Parameter RREQ jitter RREQMAXJITTER NETTRAVERSALTIME HELLO MIN JITTER HELLO MAX JITTER Route lifetime Routing Value 0-0.5 s s 0 s 3 s 5 s 5 s Mesh routing B. Simulation Results To sum up, findings from the performance evaluation of the three protocols are described in this section both for P2MP and MP2P traffic flows. Point-to-multipoint (P2MP) Fig.4 shows the average packet delivery ratios function of variable distance to the concentrator and Fig.5 shows PDR function of variable nodes number, incurring from respectively, and. As shown by Fig.4 and Fig.5, packet delivery drops with growing node number to reach 0.98 % for 300 nodes, and 0.96 for 500 meters while PDR remain 00% for and. For downward traffic, Fig. 6 and Fig. 7 shows that is very efficient in terms of average latency which is equal to 85 ms compared to 94 ms and 243 ms when the network is subject to variable distance to the concentrator. While when the network is with increasing number of nodes is variable latency is equal to 8 ms, 95 ms 390 ms for, and respectively. 260 240 220 80 60 40 20 00 P2MP End-to-End Delay vs Distance to the Concentrator.02 0.98 0.96 0.94 P2MP PDR vs Distance to the Concentrator 80 50 00 50 250 300 350 400 450 500 Fig. 6. P2MP End-to-End Delay function of Distance 400 350 P2MP End-To-End Delay vs Nodes Number 0.92 300 0.9 250 0.88 0.86 0.84 50 00 50 250 300 350 400 450 500 Fig. 4. P2MP PDR function of Distance.005 0.995 0.99 0.985 0.98 0.975 0.97 P2MP PDR vs Nodes Number 0.965 0.96 0 50 00 50 250 300 Fig. 5. P2MP PDR function of Nodes Number 50 00 50 0 50 00 50 250 300 Fig. 7. P2MP End-to-End Delay function of Node Number Multi-to-multipoint (MP2P) Fig.8 shows that a packet delivery ratio is 00% for and while PDR for protocol reaches 73% with increasing distance of routers from concentrators. Whereas, according to Fig.9 we observe significant degradation for the Protocol delivered packets which reaches 60% when the networks is subject of increasing node number. For upward traffic, Fig. 0 and Fig. shows that is better than in terms of average latency which is equal to 96 ms compared to 96 ms and 425 ms when the network is subject to variable

Overhead(Bytes/Sec) MP2P PDR MP2P End-To-End Delay MP2P PDR End-to-End Delay MP2P(ms) 6 distance to the concentrator. Whereas when the network is with increasing number of nodes is variable latency is up to 86 ms, 96 ms and 690 ms for, and respectively. 450 400 MP2P End-to-End Delay vs Distance to the Concentrator 0.95 MP2P PDR vs Distance to the Concentrator 350 300 250 0.9 0.85 50 0.8 0.75 0.7 50 00 50 250 300 350 400 450 500 Fig. 8. M2MP PDR function of Distance 0.95 0.9 0.85 0.8 MP2P PDR vs 00 50 50 00 50 250 300 350 400 450 500 Fig. 0. M2MP End-to-End Delay function of Distance 700 600 500 400 300 MP2P End-To-End Delay vs Nodes Number 0.75 00 0.7 0.65 0.6 0 50 00 50 250 300 Fig. 9. M2MP PDR function of Nodes Number General Observations Fig.2 depicts the Overhead bytes per second in the whole network. The results shows that the overhead for has clearly declined compared to due to collection tree mechanism. Results analysis Our results expose the performance of our implementation of protocols in Contiki OS. One of its most significant aspects is the considerable reduction of routing overhead due to the smart RREQ used, RREQ flags and the unicast of RREP and its effects in the substantial drop of the messages number and size to maintain routing tables. Packet delivery ratio for both and are 00% with increasing number of nodes whereas PDR drops for because of MAC layer collision due to protocol initiation of route discovery for each router. 0 0 50 00 50 250 300 Fig.. M2MP End-to-End Delay function of Node Number 9000 8000 7000 6000 5000 4000 3000 0 000 Overhead 0 50 00 50 250 300 Fig. 2. Overhead bytes per second

7 protocols also have bigger End to End delay because route discovery is performed in reactive way in each router while for and CTP routes are available created and maintained previously. VII. CONCLUSION This paper has offered a detailed protocols comparison of, to routing protocol and on behalf of smart metering scenario for MP2P and P2MP traffic types. and denote two different concepts for routing protocols in LLNs. In spite of its complexity is optimized for specific topologies and traffic patterns. While represents a part of the ITU-T G.9903 recommendation for smart metering applications. Its strength came from its entirely distributed mode of operation, where paths are discovered on demand and are bidirectional. The implemented extension permit on demand collection trees construction supporting upward traffic from sensors to root in bidirectional traffic scenarios. Our study reveals that the extension harvests better performance than : higher data delivery ratios, lower delays and lower overhead and is comparable to : same data delivery ratios, same delays and lower overhead for bidirectional data traffic in smart metering which make it a better solution than and for AMI networks. In our future works we will concentrate on optimizing upward and downward End-to-End Delay for protocol to enhance its performance. REFERENCES Computing (WiCOM), 202 8th International Conference on, vol., no., pp.,4, 2-23 Sept. 202. [5] Tripathi, J.; de Oliveira, J.C., "Proactive versus reactive revisited: IPv6 routing for Low Power Lossy Networks," Information Sciences and Systems (CISS), 203 47th Annual Conference on, vol., no., pp.,6, 20-22 March 203. [6] Jiazi Yi and Thomas Clausen, Collection Tree Extension of Reactive Routing Protocol for Low-Power and Lossy Networks, International Journal of Distributed Sensor Networks, vol. 204, Article ID 35242, 2 pages, 204. [7] IETF. Web site. http://www.ietf.org [8] T. Winter, P. Thubert, A. Brandt et al., : IPv6 Routing Protocol for Low power and Lossy Networks, IETF RFC6550, March 20. [9] J. Martocci, Ed., P. De Mil, N. Riou,W. Vermeylen, Building Automation Routing Requirements in Low-Power and Lossy Networks, IETF RFC 5867, June. [0] T. Clausen, A Colin, J Yi, A. Niktash, Y Igarashi, H Satoh, and U Herberg. The LLN On-demand Ad hoc Distance-vector Routing Protocol - Next Generation (), July, 204. Web site. http://tools.ietf.org/html/draft-clausen-lln-loadng- [] T. Clausen, C. Dearlove, and J. Dean, Mobile AdHocNetwork (MANET) Neighborhood Discovery Protocol (NHDP), RFC, 630, IETF, April. S. Elyengui: is a Ph.D. student in the department of communication systems at Tunisian National School of Engineering, University of Tunis El Manar Tunisia. She is a researcher in the area of smart grid communication and networking, SG networks security, AMI applications and M2M communications. She received her Computer Networks Engineer Diploma and a Master degree in new Technologies of Communication and Networking in 7 and 20 respectively. [] A Ipakchi, A.; Albuyeh, F., "Grid of the future," Power and Energy Magazine, IEEE, vol.7, no.2, pp.52,62, March-April 9. [2] Farhangi, H., "The path of the smart grid," Power and Energy Magazine, IEEE, vol.8, no., pp.8,28, January-February. [3] Ancillotti, E.; Bruno, R.; Conti, M., "The role of the routing protocol for smart grid communications," Communications Magazine, IEEE, vol.5, no., pp.75,83, January 203. [4] Jiazi Yi; Clausen, T.; de Verdiere, A.C., "Efficient Data Acquisition in Sensor Networks: Introducing (the) Collection Tree Protocol," Wireless Communications, Networking and Mobile R. Bouhouchi received the Master degrees in communication systems from ENIT, the MBA degree s from Mediterranean School of Business, T.E graduated in 0 from ESPTT, and holds an engineering degree in computer sciences since 6, as he holds more than eight international certificates in advanced programming and management as ITIL (Information Technologies Infrastructure Library).