Wireless Protocols for Iot Part III: Zigbee

Total Page:16

File Type:pdf, Size:1020Kb

Wireless Protocols for Iot Part III: Zigbee Wireless Protocols for IoT Part III: ZigBee . Overview 1. ZigBee Features, Versions, Device Types, Topologies 2. ZigBee Protocol Architecture 3. ZigBee Application, ZigBee Application Support Layer 4. Network Layer, Routing: AODV, DSR Raj Jain 5. ZigBee Smart Energy V2 Washington University in Saint Louis Saint Louis, MO 63130 rd [email protected] Note: This is the 3 lecture in series of class lectures on IoT. Bluetooth, Bluetooth Smart, IEEE 802.15.4 were covered in These slides and audio/video recordings of this class lecture are at: http://www.cse.wustl.edu/~jain/cse574-16/ the previous lectures.. Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse574-16/ ©2016 Raj Jain Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse574-16/ ©2016 Raj Jain 13-1 13-2 ZigBee Overview ZigBee Overview (Cont) Industrial monitoring and control applications requiring small IEEE 802.15.4 MAC and PHY. amounts of data, turned off most of the time (<1% duty cycle), Higher layer and interoperability by ZigBee Alliance e.g., wireless light switches, meter reading, patient monitoring Up to 254 devices or 64516 simpler nodes Ultra-low power, low-data rate, multi-year battery life Named after zigzag dance of the honeybees Power management to ensure low power consumption. Direction of the dance indicates the location of food Less Complex. 32kB protocol stack vs 250kB for Bluetooth Multi-hop ad-hoc mesh network Range: 1 to 100 m, up to 65000 nodes. Multi-Hop Routing: message to non-adjacent nodes Tri-Band: Ad-hoc Topology: No fixed topology. Nodes discover each other ¾ 16 Channels at 250 kbps in 2.4GHz ISM Mesh Routing: End-nodes help route messages for others ¾ 10 Channels at 40 kb/s in 915 MHz ISM band Mesh Topology: Loops possible ¾ One Channel at 20 kb/s in European 868 MHz band Ref: ZigBee Alliance, http://www.ZigBee.org Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse574-16/ ©2016 Raj Jain Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse574-16/ ©2016 Raj Jain 13-3 13-4 PRO Features Pro Features (Cont) Stochastic addressing: A device is assigned a random address Power Management: Routers and Coordinators use main and announced. Mechanism for address conflict resolution. power. End Devices use batteries. Parents don’t need to maintain assigned address table. Link Management: Each node maintains quality of links to Security: Standard and High neighbors. Link quality is used as link cost in routing. End-Devices get new security key when they wake up. Frequency Agility: Nodes experience interference report to channel manager (e.g., trust center), which then selects another channel Multicast Many-to-One Routing: To concentrator Asymmetric Link: Each node has different transmit power and sensitivity. Paths may be asymmetric. Fragmentation and Reassembly Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse574-16/ ©2016 Raj Jain Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse574-16/ ©2016 Raj Jain 13-5 13-6 ZigBee Device Types ZigBee Topologies Coordinator: Selects channel, starts the network, assigns short addresses to other nodes, transfers packets to/from other nodes Star Tree Cluster Tree Mesh Router: Transfers packets to/from other nodes C C C Full-Function Device: Capable of being coordinator or router E E E E Reduced-Function Device: Not capable of being a coordinator C E R R E E E R or a router Þ Leaf node R E E E E ZigBee Trust Center (ZTC): Provides security keys and E E E E authentication E R ZigBee Gateway: Connects to other networks, e.g., WiFi C Coordinator R E E R R Router Self-Healing E E E E End-Device E E Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse574-16/ ©2016 Raj Jain Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse574-16/ ©2016 Raj Jain 13-7 13-8 ZigBee Protocol Architecture ZigBee Protocol Architecture (Cont) Application Objects: e.g., Remote control application. Also referred to as End-Point (EP). ZigBee Switch EP1 EP6 Light Application Framework Device End-Node: End device. Each node can have up to 250 application objects. App App App Object Interface (ZDO) ZigBee Device Object (ZDO): Control and management of Object Object Object ZDO Public application objects. Initializes coordinator, security service, Application Support Sublayer (APS) device and service discovery Application Support Layer (APS): Serves application ZDO Service Security Network Layer objects. Management Network Layer: Route Discovery, neighbor discovery Media Access Control (MAC) ZDO Management Physical Layer Security Service Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse574-16/ ©2016 Raj Jain Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse574-16/ ©2016 Raj Jain 13-9 13-10 ZigBee Application Layer ZigBee Application Layer (Cont) Application layer consists of application objects (aka end Clusters: A collection of attributes and commands on them. points) and ZigBee device objects (ZDOs) Each cluster is represented by a 16-bit ID. Commands could be 256 End Point Addresses: read/write requests or read/write responses ¾ 240 application objects: Address EP1 through EP240 Cluster Library: A collection of clusters. ZigBee forum has defined a number of cluster libraries, e.g., General cluster ¾ ZDO is EP0 library contains on/off, level control, alarms, etc. ¾ End Points 241-254 are reserved Binding: Process of establishing a logical relationship (parent, ¾ EP255 is broadcast child, ..) Each End Point has one application profile, e.g., light on/off ZDO: profile ¾ Uses device and service discovery commands to discover ZigBee forum has defined a number of profiles. details about other devices. Users can develop other profiles ¾ Uses binding commands to bind and unbind end points. Attributes: Each profile requires a number of data items. Each ¾ Uses network management commands for network data item is called an “attribute” and is assigned an 16-bit discover, route discovery, link quality indication, join/leave “attribute ID” by ZigBee forum requests Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse574-16/ ©2016 Raj Jain Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse574-16/ ©2016 Raj Jain 13-11 13-12 ZigBee Application Profiles ZigBee Address Assignment Smart Energy: Electrical, Gas, Water Meter reading Each node gets a unique 16-bit address Commercial Building Automation: Smoke Detectors, lights, Two Schemes: Distributed and Stochastic … Home Automation: Remote control lighting, heating, doors, … Distributed Scheme: Good for tree structure Personal, Home, and Hospital Care (PHHC): Monitor blood ¾ Each child is allocated a sub-range of addresses. pressure, heart rate, … ¾ Need to limit maximum depth L, Telecom Applications: Mobile phones Maximum number of children per parent C, and Maximum Remote Control for Consumer Electronics: In collaboration number of routers R with Radio Frequency for Consumer Electronics (RF4CE) alliance ¾ Address of the nth child is parent+(n-1)S(d) Industrial Process Monitoring and Control: temperature, pressure, position (RFID), … Many others Ref: A. Elahi and A. Gschwender, “ZigBee Wireless Sensor and Control Network,” Prentice Hall, 2009, 288 pp., ISBN:0137134851, Safari Book Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse574-16/ ©2016 Raj Jain Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse574-16/ ©2016 Raj Jain 13-13 13-14 Distributed Scheme Example Distributed Scheme Example (Cont) C d=0 Assume the address of coordinator is 10 (decimal) S(0)=4 10 Address of R1 = 10+1 = 11 Address of R2 = 10+1+S(0) = 11+4=15 R1 R2 R3 R4 d=1 Address of R3 = 10+1+2*S(0) = 11+8 = 19 11 15 19 23 S(1)=1 Address of R3 = 10+1+3*S(0) = 11+12 =23 Routers R1-R4 compute S(1): L L L L L L L L d=2 12 13 16 17 20 21 25 26 Children of R1 are assigned 12 and 13 Max depth L=2, Routers R=4, Children C=3 Children of R2 are assigned 16 and 17 C Coordinator: d=0. Skip 10 R4 R4 R4 R4 11 15 19 23 L L L L L L L L L L L L 12 13 14 16 17 18 20 21 22 24 25 26 Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse574-16/ ©2016 Raj Jain Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse574-16/ ©2016 Raj Jain 13-15 13-16 Stochastic Address Assignment ZigBee Routing Parent draws a 16 bit random number between 0 and 1. Ad-Hoc On-Demand Distance Vector (AODV) 16 2 -1 and assigns it to a new child. A new number is 2. Dynamic Source Routing (DSR) drawn if the result is all-zero (null) or all-one 3. Tree Hierarchical Routing (broadcast). So the assigned address is between 1 and 216-2. 4. Many-to-one routing Parent then advertises the number to the network If another node has that address an address conflict message is returned and the parent draws another number and repeats There is no need to pre-limit # of children or depth Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse574-16/ ©2016 Raj Jain Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse574-16/ ©2016 Raj Jain 13-17 13-18 AODV AODV (Cont) Ad-hoc On-demand Distance Vector Routing Intermediate nodes can reply to RREQ only if they have a route On-demand Reactive Construct a route when needed to destination with higher destination sequence # Routing Table: Path is not stored.
Recommended publications
  • Secure Routing in Multi-Hop Wireless Networks
    Budapest University of Technology and Economics Faculty of Electrical Engineering and Informatics Department of Telecommunications Laboratory of Cryptography and Systems Security (CrySyS) Secure Routing in Multi-hop Wireless Networks Ph.D. Dissertation of Gergely Ács Research Supervisor: Levente Buttyán, Ph.D. 2009 Alulírott Ács Gergely kijelentem, hogy ezt a doktori értekezést magam készítettem, és abban csak a megadott forrásokat használtam fel. Minden olyan részt, amelyet szó szerint, vagy azonos tartalomban, de átfogalmazva más forrásból átvettem, egyértelműen, a forrás megadásával megjelöltem. I, the undersigned Gergely Ács hereby declare that this Ph.D. dissertation was made by myself, and I only used the sources given at the end. Every part that was quoted word-for- word, or was taken over with the same content, I noted explicitly by giving the reference of the source. Budapest, 2009. április 8. ................................ Ács Gergely iii Abstract Routing is a fundamental networking function in every communication system, and multi- hop wireless networks are no exceptions. Attacking the routing service, an adversary can easily paralyse the operation of an entire network. Compared to traditional wired networks, such attacks can be performed relatively easily in wireless networks due to the unsupervised access to the wireless medium. The malicious manipulation of some routing messages results in the dissemination of incorrect routing information which can eventually lead to network malfunction. Even more, intermediate nodes can be corrupted, and thus, exhibit arbitrary behaviour. Considering these facts, securing routing protocols is a primary task, however, designing such secure routing protocols is not a straightforward procedure. A widely used method has been so far to identify different types of possible attacks against routing, and to define routing security implicitly as resistance to these attacks.
    [Show full text]
  • Routing Protocols for Low Power and Lossy Networks in Internet of Things Applications
    sensors Review Routing Protocols for Low Power and Lossy Networks in Internet of Things Applications José V. V. Sobral 1,2 , Joel J. P. C. Rodrigues 1,3,4,5,6,*,† , Ricardo A. L. Rabêlo 4 , Jalal Al-Muhtadi 5 and Valery Korotaev 6 1 Instituto de Telecomunicações, Universidade da Beira Interior, 6201-001 Covilhã, Portugal; [email protected] 2 Federal Institute of Maranhão (IFMA), São Luís-MA 65010-030, Brazil 3 National Institute of Telecommunications (Inatel), Santa Rita do Sapucaí-MG 37540-000, Brazil 4 Federal University of Piauí, Teresina-PI 64049-550, Brazil; [email protected] 5 College of Computer and Information Sciences (CCIS), King Saud University, Riyadh 12372, Saudi Arabia; [email protected] 6 ITMO University, St. Petersburg 197101, Russia; [email protected] * Correspondence: [email protected]; Tel.: +55-35-3471-9200 † Current address: Av. João de Camargo, 510-Centro, Santa Rita do Sapucaí-MG 37540-000, Brazil. Received: 23 March 2019; Accepted: 5 May 2019; Published: 9 May 2019 Abstract: The emergence of the Internet of Things (IoT) and its applications has taken the attention of several researchers. In an effort to provide interoperability and IPv6 support for the IoT devices, the Internet Engineering Task Force (IETF) proposed the 6LoWPAN stack. However, the particularities and hardware limitations of networks associated with IoT devices lead to several challenges, mainly for routing protocols. On its stack proposal, IETF standardizes the RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) as the routing protocol for Low-power and Lossy Networks (LLNs). RPL is a tree-based proactive routing protocol that creates acyclic graphs among the nodes to allow data exchange.
    [Show full text]
  • A Secure Routing Algorithm
    TinyTermite: A Secure Routing Algorithm A Thesis Presented for the Master of Science Degree The University of Tennessee at Chattanooga Joshua L. Patterson December 2008 To the Graduate Council: I am submitting a thesis written by Joshua L. Patterson entitled “TinyTermite: A Secure Routing Algorithm”. I have examined the final copy of this thesis and recommend that it be accepted in partial fulfillment of the requirements for the degree of Master of Science with a major in Computer Science. ___________________________________ Dr. Mina Sartipi, Chairperson We have read this thesis and recommend its acceptance: _________________________________ Dr. Billy Harris _________________________________ Dr. Li Yang Accepted for the Graduate Council: ___________________________________ Interim Dean of the Graduate School Dedication I would like to dedicate this master’s thesis and my master’s degree to my parents. Without their support neither would be possible. i Abstract In this thesis, we introduce TinyTermite. TinyTermite is a novel probabilistic routing algorithm that is secure against selective forwarding and replay attacks. We use suspicion pheromone to build a flexible map of possible compromised neighbors. As suspicion builds up and decays for each neighbor, TinyTermite is able to deal with uncertain stimulus and react properly. TinyTermite is fully implemented on TinyOS based Intel Mote 2 platform and the experiments were done to compare its performance with that of the traditional Termite algorithm. The experimental results show that TinyTermite is significantly more secure against replay and sinkhole attacks by lowering the packet loss from 88.5% to 32.9% with 12.7% normal packet loss. The experimental results also demonstrate that the TinyTermite provides high throughput and low latency.
    [Show full text]
  • Network Protocols/Mobile IP
    Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 8: Network Protocols/Mobile IP Motivation Data transfer , Encapsulation Security, IPv6, Problems Micro mobility support DHCP, Locator/ID split, HIP/LISP Ad-hoc networks, Routing protocols, WSNs Prof. Dr.-Ing. Jochen H. Schiller www.jochenschiller.de MC - 2016 Motivation for Mobile IP Routing - based on IP destination address, network prefix (e.g. 129.13.42) determines physical subnet - change of physical subnet implies change of IP address to have a topological correct address (standard IP) or needs special entries in the routing tables Specific routes to end-systems? - change of all routing table entries to forward packets to the right destination - does not scale with the number of mobile hosts and frequent changes in the location, security problems Changing the IP-address? - adjust the host IP address depending on the current location - almost impossible to find a mobile system, DNS updates take to long time - TCP connections break, security problems Prof. Dr.-Ing. Jochen H. Schiller www.jochenschiller.de MC - 2016 8.2 Requirements for Mobile IPv4 (RFC 5944 was: 3344, was: 3220, was: …, updated by: …) Transparency - mobile end-systems keep their IP address - continuation of communication after interruption of link possible - point of connection to the fixed network can be changed Compatibility - support of the same layer 2 protocols as IP - no changes to current end-systems and routers required - mobile end-systems can communicate with fixed systems Security - authentication of all registration messages Efficiency and scalability - only little additional messages to the mobile system required (connection typically via a low bandwidth radio link) - world-wide support of a large number of mobile systems in the whole Internet Prof.
    [Show full text]
  • Based Mobile Ad-Hoc Networks Implementation with Embedded Systems
    IJCSNS International Journal of Computer Science and Network Security, VOL.15 No.2, February 2015 103 An Efficient Location and Detection (ELD) based Mobile ad-hoc networks implementation with Embedded Systems RAJARAM.M, V.SUMATHY Department of Electronics and Communication Engineering Park college of Engineering and Technology, Coimbatore, India Abstract route on demand, such as Ad hoc On-Demand Distance A Mobile Ad-hoc Network (MANET) is a temporary wireless Vector (AODV) [6], Dynamic Source Routing (DSR) [4], network composed of mobile nodes, in which an infrastructure is Temporally Ordered Routing Algorithm (TORA) [4], and absent. If two mobile nodes are within each other’s transmission Associatively - Based Routing (ABR) [27]. The Third range, they can communicate with each other directly; otherwise, type is hybrid routing protocols are combination of the nodes in between have to forward the packets for them. proactive and reactive example is ZRP.Position based Several routing protocols have already been proposed for ad hoc networks. This paper suggests an approach to utilize location routing protocols exploit positional information to direct information obtained by using DLRDPF (Dynamic located flooding towards the destination in order .to reduce Routing and Detection Protocol Far), if the destination is Remote network overhead and power consumption, Location and DLRPL (Dynamic located Routing and detection Protocol Aided Routing Protocol (LAR), GRID[1] and Greedy Local), if the destination is local. in this routing scheme affected Perimeter Stateless Routing (GPSR) [6] are all examples various attacks. In MANETs, it is difficult to identify malicious of position based routing protocols. This may result in attacks as the topology of the network dynamically changes.
    [Show full text]
  • Implementation and Testing of Loadng: a Routing Protocol for WSN
    Bachelor of Science Thesis Telecommunication Engineering Implementation and Testing of LOADng: a Routing Protocol for WSN by Alberto Camacho Martínez Directed by: Thomas H. Clausen Paris, 2012 To my family Abstract The Wireless Sensor Networks is an emerging technology with strong poten- tial in a wide range of fields. Data acquisition, connectivity, and monitoring are real demand services in constant growth in which sensor networks can take an important role. Routing protocols for wireless sensor networks must be developed to sat- isfy the needs of the applications and to adapt to the limited sensor nodes resources. The current standardized routing protocol for Wireless Sensor Networks, RPL, has been proved to be inefficient in some scenarios and for certain traffic patterns. There is a need to develop routing protocols adapted to the traffic patterns in which RPL is not optimized. The work collected in this manuscript contributes in the developing process of a routing protocol for wireless sensor networks, LOADng [32], which was submitted as an IETF internet-draft during the elaboration of this thesis. The description of LOADng draft is presented in chapter 3. A LOADng implementation has been written and integrated into Contiki OS, an operating system for sensor nodes and other embedded systems. This implementation is documented in chapter 5. During the development of this work, some interoperability tests were made in cooperation with HIPERCOM, Hitachi YRL, and EDF. The results were satisfactory and are published in [10]. The results of the simulations testing LOADng implementation – and per- formance – for Contiki OS are presented in chapter 6 of this manuscript.
    [Show full text]
  • Impact of Mobility and Deployment in Confined Spaces on Low Power and Lossy Network Jinpeng Wang
    Impact of mobility and deployment in confined spaces on low power and lossy network Jinpeng Wang To cite this version: Jinpeng Wang. Impact of mobility and deployment in confined spaces on low power and lossy network. Networking and Internet Architecture [cs.NI]. Université Clermont Auvergne, 2019. English. NNT : 2019CLFAC024. tel-02355260 HAL Id: tel-02355260 https://tel.archives-ouvertes.fr/tel-02355260 Submitted on 8 Nov 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. UNIVERSITÉ CLERMONT AUVERGNE ÉCOLE DOCTORALE SCIENCES POUR L’INGÉNIEUR DE CLERMONT-FERRAND Thése Présentée par Jinpeng WANG Pour obtenir le grade de DOCTEUR D’UNIVERSITÉ Spécialité : Informatique Titre Impact of mobility and deployment in confined spaces on low power and lossy network Soutenue publiquement le 02 Juillet 2019, devant le jury : Rapporteurs: Mme. Marion BERBINEAU Directeur de recherche à IFSTTAR M. Adrien VAN DEN BOSSCHE MCF-HDR à l’Université Toulouse-Jean Jaurés Examinateurs: Mme. Pascale MINET Chargée de recherche HDR à Inria Paris M. Alexandre GUITTON Professeur à l’Université Clermont Auvergne Directeur de thèse: M. Michel Misson Professeur à l’Université Clermont Auvergne Co-encadrant: M. Gérard Chalhoub MCF-HDR à l’Université Clermont Auvergne UNIVERSITÉ CLERMONT AUVERGNE DOCTORAL THESIS Impact of mobility and deployment in confined spaces on low power and lossy network Author: Supervisor: Jinpeng WANG Pr.
    [Show full text]
  • Routing Protocols in Ad Hoc Networks: a Survey
    Routing protocols in ad hoc networks: a survey Azzedine Boukerche, Begumhan Turgut, Nevin Aydin, Mohammad Z. Ahmad, Ladislau B¨ol¨oni,and Damla Turgut1 Abstract Ad hoc wireless networks perform the difficult task of multi-hop communication in an environment without a dedicated infrastructure, with mobile nodes and changing network topology. Different deploy- ments exhibit various constraints, such as energy limitations, opportunities, such as the knowledge of the physical location of the nodes in certain scenarios, and requirements, such as real-time or multi-cast communication. In the last 15 years, the wireless networking community designed hundreds of new routing protocols targeting the various scenarios of this design space. The objective of this paper is to create a taxonomy of the ad hoc routing protocols, and to survey and compare representative examples for each class of protocols. We strive to uncover the requirements considered by the different protocols, the resource limitations under which they operate, and the design decisions made by the authors. Key words: ad hoc networks, sensor networks, routing protocols 1. Introduction Wireless local area networks based on the 802.11a,b,g and n standards became one of the most ubiquitous ways of networking with mobile nodes. Most of these networks, however, are deployed in the configuration which can be called \wired everywhere, except the first hop". If the goal of the user of the mobile computer is to connect to a website located halfway around the world, the best strategy is to escape as quickly as possible from the challenges of wireless domain and enter the reliability of fiber optic networks and time-tested networking protocols.
    [Show full text]
  • Performance of Dynamic Source Routing Protocol
    International Journal of Advanced Technology in Engineering and Science www.ijates.com Volume No.03, Issue No. 03, March 2015 ISSN (online): 2348 – 7550 PERFORMANCE OF DYNAMIC SOURCE ROUTING PROTOCOL FOR FIXED AND VARIABLE POWER TRANSMISSIONS IN WIRELESS SENSOR NETWORK N.Divya1, U.Hari2 1PG Scholar, Embedded System Technology, Department of ECE, SRM University (India) 2Asst. Prof, Department of ECE, SRM University (India) ABSTRACT A wireless sensor network consists of collection of sensor nodes deployed over a geographical area for monitoring different parameters. The power source of sensor node consists of a battery with a limited energy and it is impossible to recharge the battery, because nodes may be deployed in an unmanned or remote area. Most of the power is consumed by the radio communication involved in the sensor network. So an energy efficient communication scheme has to be designed to improve the network lifetime. DSR protocol is a reactive protocol that makes it possible for all the nodes to find a route to a destination in a multiple network hops dynamically. The network lifetime reduces by forwarding data with more transmission power. The intermediate nodes spend more energy to transmit its own data and forward other nodes data. Therefore the intermediate node drains out of energy soon. To solve this problem the transmission power has to adjusted for different transmissions in the network according to distance towards the destination. The simulation is done using TOSSIM simulator tool. Keywords: DSR (Dynamic Source Routing) Protocol, Intermediate Nodes, Network Lifetime, Transmission power level, WSN (Wireless Sensor Network I. INTRODUCTION Wireless sensor network (WSN) is the collection of sensor nodes that performs a given task with coordination and in-network processing.
    [Show full text]
  • An Analysis of the RPL Routing Standard for Low Power and Lossy Networks
    An Analysis of the RPL Routing Standard for Low Power and Lossy Networks Aishwarya Parasuram David Culler, Ed. Randy Katz, Ed. Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2016-106 http://www.eecs.berkeley.edu/Pubs/TechRpts/2016/EECS-2016-106.html May 14, 2016 Copyright © 2016, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. An Analysis of the RPL Routing Standard for Low Power and Lossy Networks by Aishwarya Parasuram Adissertationsubmittedinpartialsatisfactionofthe requirements for the degree of Master of Science in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Dr. David Culler, Research Advisor Dr. Randy Katz, Chair (EECS, UC Berkeley) Spring 2016 An Analysis of the RPL Routing Standard for Low Power and Lossy Networks Copyright 2016 by Aishwarya Parasuram 1 Abstract An Analysis of the RPL Routing Standard for Low Power and Lossy Networks by Aishwarya Parasuram Master of Science in Computer Science University of California, Berkeley Dr. David Culler, Research Advisor RPL is a distance-vector routing protocol designed by the ROLL Working Group in order to cater to the specific needs of low-power and lossy networks (LLNs).
    [Show full text]
  • Shortcut Tree Routing Using Neighbor Table in Zigbee Wireless Networks
    Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Salmu K.P1, Chinchu James2 1,2Department of Computer Science, IIET, Nellikuzhi Abstract- ZigBee is a worldwide standard for wireless personal area network targeted to low power and cost effective data communications with business and consumer devices. The ZigBee Tree Routing is used in many resource-limited devices and applications. It is not able to require any routing table and route discovery overhead to send a packet to reach the destination. The ZigBee tree routing follows the tree topology. It cannot provide the optimal routing path. The Shortcut Tree Routing (STR) protocol has been provided the near optimal routing path as well as maintains the advantages of ZigBee tree routing that is no route discovery overhead and low memory consumption. The main idea is to provide shortcut tree routing to calculate remaining hops from a source to the destination using the hierarchical addressing scheme. Each source forwards a packet to the neighbour node with the smallest remaining hops in its neighbour table. The shortcut tree routing is fully distributed with ZigBee standard and it utilizes hierarchical addressing scheme. The aim is to find the near optimal routing path with low Route discovery overhead and Low memory consumption. Keywords- ZigBee; tree routing; shortcut tree routing (STR); neighbor table; MANET I. INTRODUCTION ZigBee is the global standards of communication protocol formulated by the relevant task force under the IEEE 802.15 working group. The ZigBee network layer [1] provides dynamic network formation, addressing, routing, and network management functions. Different from the other wireless personal area network standards such as Bluetooth, infrared, and Wireless USB, ZigBee provides the low power wireless mesh and tree networking and supports up to thousands of devices in a network.
    [Show full text]
  • Wireless Mesh Networking: an Iot-Oriented Perspective Survey on Relevant Technologies
    future internet Review Wireless Mesh Networking: An IoT-Oriented Perspective Survey on Relevant Technologies Antonio Cilfone * , Luca Davoli , Laura Belli and Gianluigi Ferrari Internet of Things (IoT) Lab, Department of Engineering and Architecture, University of Parma, Parco Area delle Scienze 181/A, 43124 Parma, Italy; [email protected] (L.D.); [email protected] (L.B.); [email protected] (G.F.) * Correspondence: [email protected]; Tel.: +39-0521-905741 Received: 7 February 2019; Accepted: 10 April 2019; Published: 17 April 2019 Abstract: The Internet of Things (IoT), being a “network of networks”, promises to allow billions of humans and machines to interact with each other. Owing to this rapid growth, the deployment of IoT-oriented networks based on mesh topologies is very attractive, thanks to their scalability and reliability (in the presence of failures). In this paper, we provide a comprehensive survey of the following relevant wireless technologies: IEEE 802.11, Bluetooth, IEEE 802.15.4-oriented, and Sub-GHz-based LoRa. Our goal is to highlight how various communication technologies may be suitable for mesh networking, either providing a native support or being adapted subsequently. Hence, we discuss how these wireless technologies, being either standard or proprietary, can adapt to IoT scenarios (e.g., smart cities and smart agriculture) in which the heterogeneity of the involved devices is a key feature. Finally, we provide reference use cases involving all the analyzed mesh-oriented technologies. Keywords: mesh networks; routing algorithms; IEEE 802.11; bluetooth; IEEE 802.15.4; ZigBee; LoRa; smart agriculture; smart city; Internet of Things 1.
    [Show full text]