Available online at ScienceDirect. IERI Procedia 7 (2014 ) Engineering. networks, in which the nodes are Area

Similar documents
Available online at ScienceDirect. Procedia Engineering 154 (2016 )

Implementation of Gradient Routing in WSNs

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Experimental Evaluation on the Performance of Zigbee Protocol

Performance Analysis of IEEE based Sensor Networks for Large Scale Tree Topology

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):

Investigating the Impact of Topologies on the Performance of ZIGBEE Wireless Sensor Networks

Algorithm Development and Deployment for Indoor Localization of Resources

Available online at ScienceDirect. Procedia Computer Science 87 (2016 )

Wireless Sensor Networks CS742

ENSC 427: COMMUNICATION NETWORKS

Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea

MOBILITY REACTIVE FRAMEWORK AND ADAPTING TRANSMISSION RATE FOR COMMUNICATION IN ZIGBEE WIRELESS NETWORKS

EFFECT OF NODES MOBILITY BY MOVING NODES AT DIFFERENT TRAJECTORIES ON ZIGBEE MESH TOPOLOGY

A cluster based interference mitigation scheme for performance enhancement in IEEE

An Efficient Broadcast Algorithm To Transmit Data In Multi-hop Relay MANETs Fathima Sana 1, Dr. M. Sudheep Elayidom 2

Throughput Improvement by Adjusting RTS Transmission Range for W-LAN Ad Hoc Network

A Zigbee Based Wireless Datalogging System

Available online at ScienceDirect. Procedia Computer Science 92 (2016 )

Research Directions in Low-Power Wireless Networks

A deployment procedure for wireless sensor networks

Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks. Wang Wei Vikram Srinivasan Chua Kee-Chaing

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

ScienceDirect. Analogy between immune system and sensor replacement using mobile robots on wireless sensor networks

COEXISTENCE MODEL OF ZIGBEE& IEEE b (WLAN) IN UBIQUITOUS NETWORK ENVIRONMENT

The Impact of the Number of Nodes, Speed of Nodes, Speed of Network and the Network Space to the Number of Nodes keeps Alive

CHAPTER 5 THROUGHPUT, END-TO-END DELAY AND UTILIZATION ANALYSIS OF BEACON ENABLED AND NON-BEACON ENABLED WSN

INTEGRATION OF AD HOC WIRELESS SENSOR NETWORKS IN A VIRTUAL INSTRUMENTATION CONFIGURATION

International Journal of Electronics and Communication Engineering & Technology (IJECET), INTERNATIONAL JOURNAL OF ELECTRONICS AND

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

Review on an Underwater Acoustic Networks

A Survey - Energy Efficient Routing Protocols in MANET

Performance Analysis of Adaptive Beamforming Algorithms for Smart Antennas

ZIGBEE& IEEE b (WLAN) COEXISTENCE IN UBIQUITOUS NETWORK ENVIRONMENT

A Real-Time BLE enabled ECG System for Remote Monitoring

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

ScienceDirect. Sensor Based Communication Network for WACS with DNP3

ZigBee----free as a bee!

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks

New Channel Access Approach for the IEEE Devices in 2.4 GHz ISM Band

A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN

Interference avoidance in wireless multi-hop networks 1

Available online at ScienceDirect. Procedia Computer Science 46 (2015 )

Selection of Optimum Routing Protocol for 2D and 3D WSN

IEEE 802 Standard Network s Comparison under Grid and Random Node Arrangement in 2.4 GHz ISM Band for Single and Multiple CBR Traffic

FPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs

Simulation Analysis of Tree and Mesh Topologies in Zigbee Network

Available online at ScienceDirect. Procedia Computer Science 57 (2015 )

CONCLUSIONS AND SCOPE FOR FUTURE WORK

ScienceDirect. Evaluating the Energy Overhead Generated by Interferences within the 2.4 GHz Band for a Hybrid RFID Network

ZigBee based WSN Topology Simulation Investigation and Performance Analysis using OPNET

Mobile Agent Driven Time Synchronized Energy Efficient WSN

ScienceDirect. Advanced Object Monitoring Using Wireless Sensors Network

ZIGBEE AND PROTOCOL IEEE : THEORETICAL STUDY

Experimental Testing of Wireless Sensors Network Functionality

Presented by Viraj Anagal Kaushik Mada. Presented to Dr. Mohamed Mahmoud. ECE 6900 Fall 2014 Date: 09/29/2014 1

A ROUTING OPTIMIZATION AND DATA AGGREGATION SCHEME BASED ON RF TARANG MODULE IN WSN

An Active RFID Tag for Outdoor Billboard Management

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

Intra-car Wireless Sensors Data Collection: A Multi-hop Approach

Embedded Smart Home System Based on ZigBee Song Chi

Intra-car Wireless Sensors Data Collection: A Multi-hop Approach

AIM: To create a project for implement a wireless communication protocol on an embedded system- ZigBee.

BASIC CHARACTERISTICS OF ZIGBEE AND SIMPLICITI MODULES TO USE IN MEASUREMENT SYSTEMS

MultiHop Routing for Delay Minimization in WSN

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

Fig. 2: Architecture of sensor node

Media Access Delay and Throughput Analysis of Voice Codec with Silence Suppression on Wireless Ad hoc Network

Reservation Packet Medium Access Control for Wireless Sensor Networks

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

Distributed Interference-aware Medium Access Control for IEEE Visible Light Communications

Implementing a Cooperative MAC Protocol for Wireless LANs

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

An efficient traffic management framework for multi-channel wireless backbone networks

Interference Mitigation Technique for Performance Enhancement in Coexisting Bluetooth and WLAN

Optimization of Campus Wide WLAN

Wireless Sensor Networks

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2

MULTICHANNEL CLUSTERING ALGORITHM FOR WLAN AND WPAN DEVICES

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

Mitigating Hot Spot Problems in Wireless Sensor Networks Using Tier-Based Quantification Algorithm

A Review on Improving Packet Analysis in Wireless Sensor Network using Bit Rate Classifier

Available online at ScienceDirect. Procedia Computer Science 57 (2015 )

Coordinator Location Effects in AODV Routing Protocol in ZigBee Mesh Network

CSMA based Medium Access Control for Wireless Sensor Network

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

EEEM: An Energy-Efficient Emulsion Mechanism for Wireless Sensor Networks

Simulative Investigation of Zigbee Network Coordinator Failure with Different QoS

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

Maximum Coverage Range based Sensor Node Selection Approach to Optimize in WSN

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

An Efficient Low Power Transmission Over Long Range in Wireless Sensor Networks for environmental studies

Available online at ScienceDirect. Procedia Computer Science 89 (2016 )

Transmission Control Protocol over Wireless LAN

Impact of Frequencies on IEEE WPANs for Wireless Sensor Networks

Coexistence of WBAN and WLAN in Medical Environments

Transcription:

Available online at www.sciencedirect.com ScienceDirect IERI Procedia 7 (2014 ) 42 48 2013 International Conference on Applied Computing, Computer Science, and Computer Engineering Throughput Improvement of Randomly Deployed Wireless Personal Area networks Rambabu A.Vatti a, A.N.Gaikwad b * a Ph.D Student,SCOE,Vadagaon,Pune,, Asst.Professor, Vishwakarma Institute of Technology, Pune, India. b Principal,Zeal Education Society s DCOER, Pune, India. Abstract Throughput is the key parameter used to estimatee the quality of service of the Wireless Personal Area Networks (WPAN). Throughput of the network is degraded mainly due to the packet loss. The Packet loss problem is more in the networks, in which the nodes are deployed randomly. There are three significant factors responsible for packet loss in wireless Personal Area networks. They are, interference of co-existed networks working in the same frequency band, collisions due to co- propose a located networks, and failure of intermediate nodes near the sink due to their over usage. In this paper, authors solution to solve the problem of packet loss due to over usage of the intermediate nodes. The authors propose a routing algorithm, based on the remaining energy at the intermediate nodes, to prevent the over usage of intermediate nodes. Remaining-energy based Adaptive Multi-hop Algorithm (RAMA), which takes the routing decision based on the remaining energy at each of the neighbouring nodes and adopts short distance multi hop communication to relay the data from source node to sink node. The algorithm is implemented on TI wireless sensor nodes, and the performance is compared with SimpliciTI protocol. The experimental results show that a 27% improvement in the throughput is achieved with the proposed algorithm RAMA. 2014 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license 2013 Published by Elsevier B.V. (http://creativecommons.org/licenses/by-nc-nd/3.0/). Selection and peer review under responsibility of Information Engineering Research Institute Selection and peer review under responsibility of Information Engineering Research Institute Keywords: Wireless Personal Area Networks; Throughput; random node deployment; packet loss; interference; Collisions. * Rambabu A.Vatti. Tel.: +919767962928. E-mail address: rambabu.vatti@vit.edu. 2212-6678 2014 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/3.0/). Selection and peer review under responsibility of Information Engineering Research Institute doi:10.1016/j.ieri.2014.08.008

Rambabu A.Vatti and A.N.Gaikwad / IERI Procedia 7 ( 2014 ) 42 48 43 1. Introduction 1.1. WPAN Standard The IEEE 802.15.4 is an emerging standard for Low Rate Wireless Personal Area Networks (WPANs). The main goal of this standard is to provide low power, cost effective, flexible and scalable Wireless Networks [1]. The networks transfer the data at 250kbps and support 65,536 nodes, the number of nodes will be increased in near future. The rapid progress in wireless technologies with low cost and great mobility ensuring that these technologies are used in many contexts[2]. Now- a-days, IEEE 802.15.4 WPANs are widely used in a large number of applications, such as healthcare monitoring, Industrial automation, smart home, remote metering applications, and the number of applications utilizing IEEE 802.15.4 is exponentially increasing [3],[4]. 1.2. The Packet Loss Problem In many applications, including battle field, surveillance, the nodes are randomly deployed. In such networks, the packet loss is due to coverage problem [5],[6]. However, because of low cost and low power consumption, many applications like home automation, many nodes deployed in the small area and forming the high density networks. The coverage problem does not exist in high density networks. The probability of packet loss in such a high density networks is due to collisions and congestion and node mortality due to over usage. Reducing packet loss is a complex task and the cross layer approach is required to be adopted. The control is required to be implemented at physical layer, Data link and higher layers also. The randomly deployed nodes forms into cluster tree topologies, in which the nodes near to the sink are over used due to convergent nature of the multi hop ad-hoc networks and will die much before the other nodes [7]. This causes the packet loss in the network. The packet loss problem can be solved to certain extent by using the efficient Routing protocol. However designing a good routing protocol for the wireless networks in which the nodes are deployed randomly is a very complex task[8]. Absence of central control and time varying nature of the topology are further increasing the complexity in designing a good routing protocol. This problem can be reduced by distributing the load among the nodes and routing the packets from source to sink via different intermediate nodes based on the energy available at respective nodes. It avoids over usage of any of the intermediate nodes. 1.3. The Cluster-Tree Network In Wireless Personal Area Networks, when the nodes are deployed randomly, the nodes are organized into a network topology called Cluster-tree topology. Fig. 1. The Cluster Tree Topology

44 Rambabu A.Vatti and A.N.Gaikwad / IERI Procedia 7 ( 2014 ) 42 48 In the example wireless network shown in the fig.1, the node n0 is the sink node. It has two neighbor nodes n1 and n2. The nodes n3, n4 are neighbor to the node n1. The node n5 is the neighbor to node n2. Similarly nodes n6 and n7 are neighbor nodes to node n4. In the above network, the nodes n1, n2 and n4, are intermediate nodes. They perform two functions: they transmit the data they have collected to the sink and they relay the data of the end nodes to the sink node. The end nodes n3, n5, n6 and n7 transmit the data they gathered to the sink, via the intermediate nodes. The rest of the paper is organized as follows: Section 2 describes the algorithm design, basic assumptions made in developing the algorithm, the proposed algorithm RAMA and its operation in brief. Section 3 describes the experimental setup and the hardware used. Section 4, the results, in which the screen shots and the observations recorded are presented. The result analysis is presented in Section 5. The paper is concluded in Section 6 with conclusion and scope for further research. 2. The Proposed Algorithm-RAMA 2.1. The algorithm design The basic assumptions used in the algorithm development are: 1. The randomly deployed nodes forms into a cluster tree topology 2.The network is converge cast network. 3. None of the nodes have any prior knowledge of any other node in the network. The concept of depth is used in this algorithm. The algorithm assigns a scalar value to each node, which is called as the depth of the node. The depths are assigned in such a way that they increase with their distance to sink node. The depth of the sink node is 0. All the nodes in the network transmit their data towards the nodes having relatively lesser depths, so that the packets are transmitted in the direction of the Sink node. 2.2. The algorithm-rama 1. Node n = nj, depth d = x, is gets ready to transmit data, makes the packet with sequence number = sq. 2. hop count h=0. 3. Transmit the data, if the node with d=0, is the neighbour (in the radio range). Else Go to step4. 4. Find the node nk having higher E (Battery Voltage) among all the neighbour nodes having d < x. Go to step 6. 5. If the intermediate node nk has used to relay the previous packet having sq= sq-1, delete the nk from the neighbour node list. Go to step 4. 6. Increment the hop count, h= h+1, 7. Transmit the data to nk. 8. Go to step3 2.3. The Algorithm operation The node with depth = x, gets ready with the data to transmit. It then checks whether the sink node ( the node having depth = 0), is in its radio range, and transmits the data to the sink node. If the sink node is not there in its radio range, it checks all its neighbour nodes having depth less than its own value (d<x). Then it identifies the node having more remaining energy among those nodes having depth d<x. Further check is done to see, whether the node selected has been used for relaying the immediate previous packet. If it is used, the node is discarded from the neighbour list and another node is selected from the remaining neighbour nodes using the same criteria. The node then relay the data to the selected intermediate node. The procedure is repeated at each intermediate node. The routes are established only when the nodes wish to transmit data. No attempt is

Rambabu A.Vatti and A.N.Gaikwad / IERI Procedia 7 ( 2014 ) 42 48 45 made to maintain the state of the network. All the transmitting nodes keep monitoring its neighbour nodes and keep the information of their depths and their current battery voltage. 3. The Experimental Setup Experiments are carried out on TI motes with MSP 430 microcontroller and CC2530 radio, which uses IEEE 802.15.4 compliant PHY in 2.4GHz ISM Band [9]. The motes are programmed using IAR Work Bench IDE[10]. One mote is programmed as the Sink node to receive the data and rest of the motes are programmed as nodes. The IEEE 802.15.4 standard offers unique network address to each node [11]. Figure.2. shows the block diagram of MSP ez430 RF 2530 motes used in this work. Antenna Antenna MSP430 Microcontroller CC2530 Radio CC2530 Radio MSP430 Microcontroller Fig.2a. The Transmitter Section Fig.2b. The Receiver Section The motes are then deployed randomly in basic Electronics laboratory at Vishwakarma Institute of Technology, Pune, India. The nodes are programmed to transmit the temperature data to the sink node. The care has been taken to operate the devices in no WiFi interfering channel. The WiFi interference is monitored using the InSSIDer WiFi tracking tool [12] and noted that the WiFi interference is present at that time and place is in WiFi channel 6 with RSSI( Received Signal Strength Indication) of -30 dbm. The -30bdm is very strong enough to suppress the WPAN signals as the Receiver sensitivity of the hardware devices used in this work is -92dbm[13]. So the motes are configured to work in channel 11 of the IEEE 802.15.4 PHY. The experiments are conducted using RAMA and the SimpliciTI protocol with different transmission powers ranging from -12 dbm to 0 dbm. The transmission of packets are recorded using PuTTY [14]. 4. Results 4.1. Observations Table 1. Observations with RAMA and SimpliciTI protocol Number of packets transmitted: 100 Transmission Power RAMA Number of Packets Received SimpliciTI -12dBm 75 45-8dBm 80 60-4dBm 90 60 0dBm 90 75 4.2. Screen shot

46 Rambabu A.Vatti and A.N.Gaikwad / IERI Procedia 7 ( 2014 ) 42 48 COM3-PuTTY 222 200 051 025.2 3.0 002 200 156 222 222 200 060 024.8 3.0 002 200 156 222 222 200 061 024.8 3.0 002 200 210 222 Fig. 3. The Screen shot Sink node _Id Source node_id Packet Seq-no Temperature in degrees Centigrade Node Battery voltage Hop Count Source node_id Intermediate node_id Sink node _Id Fig.4. The packet structure 5. Result analysis Packets Received Transmission power Vs number of packets recieved 100 50 0 12dBm 8dBm 4dBm 0dBm Npr SimpliciTI 45 60 65 75 Npr RAMA 75 80 90 90 Fig. 5. Relation between node transmission power and Number of packets received The observations in Table.1. are represented in graphical form in figure.5. From the graph, it is clear that for all the transmission powers, the number of packets received (Npr) of the proposed algorithm-rama is higher than the SimpliciTI. The figure.3 is the cropped screen shot, here the node n4 (node Id 200) is transmitting data packet to the sink node (sink node-id-222). The packet with seq.no.51 has been routed via the intermediate node n1 bearing node- Id 156. The packet reached to sink node in two hops. The packet with seq-no 60 is also routed through n1. But the packet with seq-no.61 is routed through another intermediate node n2 (node-id 210). It shows that the two consecutive packets are not using the same intermediate node. It avoids the over usage of intermediate nodes. The throughput of the network can be calculated using the formula Throughput of the network = (1)

Rambabu A.Vatti and A.N.Gaikwad / IERI Procedia 7 ( 2014 ) 42 48 47 Npr = number of Packets received successfully, TB = average back-off time, Rsd = data rate, L = Data packet length, LACK = ACK packet length, SIFS is Short Inter frame Spacing, DIFS = Data Inter frame Spacing. In the experiments conducted, packet length, data rate are fixed. The packets are transmitted without performing CCA(Clear Channel Assessment). So, all the variables in the denominator are same for both the experiments. Therefore, the only parameter on which the throughput depends on is the Npr, the number of packets received. Therefore, we can consider, Throughput (2) The throughput improvement = (1-6. Conclusion and Scope for further Research ) X 100 = (1-0.73) X 100 = 27%. Remaining energy based Adaptive Multi-hop Algorithm is developed to reduce the packet loss due to over usage of the intermediate nodes. The algorithm is implemented on TI motes with MSP 430 controller with CC2530 radio. Experiments are conducted for different random deployment scenarios by varying the transmission power of the nodes. The performance of the proposed algorithm RAMA and SimpliciTI protocol are compared. It is observed that the 27% more throughput is achieved with RAMA. The work can be further extended to extend the life time of the network as the nodes are not over used, the nodes can live for longer time. References [1] IEEE. 802.15.4., Standard 2006, Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal area Networks (LR WPANs), IEEE SA Standards Board 2006. [2] Giovanni Betta, Luigi Ferrigno, Experimental Investigation of the Electromagnetic Interference of ZigBee Transmitters on Measurement Instruments, IEEE Transactions on Instrumentation and Measurement,2008,pp.1-10. [3] Ashraf Darwish and Aboul Ella Hassanien, Wearable and Implantable Wireless sensor Network Solutions for Healthcare Monitoring, Sensors 2011, 11, pp.5561-5595. [4] Rambabu.V, Dr.A.N.Gaikwad, Bhooshan Humane, Throughput Improvement in Medical Ad-Hoc Sensor Networks: A Review, Challenges, Future scope for Research. International Journal of Electronics and communication Engineering & Technology (IJECET), volume.3,issue1.january-june(2012), pp. 23-28. [5] Bang Wang, Kee Chaing Chua, Vikram Srinivasan and Wei Wang, Information Coverage in Randomly Deployed Wireless Sensor Networks, IEEE Transactions on Wireless Communications, Vol. 6, No. 8, August 2007, pp.2994-3004. [6] C-F Huang and Y.C. Tseng, A survey of solutions to coverage problems in Wireless Sensor Networks, J. Internet Technol., Vol. 6, no.1, pp.1-8, 2005. [7] Faiza Nawaz and Shafaat ahmed Bazaz, Designing a Cost aware gradient based protocol for wireless sensor networks, employing data aggregation and clustering, International Journal of Advanced Computer science, Vol. 2, No. 10, pp. 369-375, October 2012. [8] Thomas Watteyne, Kris Pister, Dominique Barthel, Mischa Dohler, Isabelle Auge-Blum, Implementation of Gradient Routing in Wireless sensor Networks, IEEE GLOBECOM-2009. [9] www.ti.com. [10] www.iar.com

48 Rambabu A.Vatti and A.N.Gaikwad / IERI Procedia 7 ( 2014 ) 42 48 [11] Uros Pesovic, Joze Mohorko, Karl Benkic, Zarko Cucej, Effect of hidden Nodes in IEEE 802.15.4/ZigBee Wireless Sensor Networks, 17 th Telecommunications forum, TELFOR 2009, Serbia, Belgrade, Nov 24-26, 2009, pp.161-164. [12] www.inssider.en.softonoc.com. [13] Michal Varchola, Milos Drutarovsky, Zigbee based Home Automation, Acta Electrotechnica et Informatica, No.4, Vol. 7, 2007. [14] www.putty.org.