Wireless Communication : Wi-Fi, Bluetooth, IEEE 802.15.4, DASH7

Total Page:16

File Type:pdf, Size:1020Kb

Wireless Communication : Wi-Fi, Bluetooth, IEEE 802.15.4, DASH7 Wireless Communication : Wi-Fi, Bluetooth, IEEE 802.15.4, DASH7 Helen Fornazier, Aurélien Martin, Scott Messner 16 march 2012 Abstract This article has for objective to introduce the basic concepts of and to compare dierent wireless technologies applied to embedded systems. It focuses on Wi-Fi, Bluetooth, IEEE 802.15.4 and Dash7. For each technology, this article covers multiplexing, topology, range, energy consumption, data rate, application, security and peculiarities. At the end of the article, the developer should be able to choose the best wireless technology for their own embedded application and have a basic notion as to how to integrate the technology into their system. Contents 1 Introduction 3 2 Wi-Fi 3 2.1 Origins . 3 2.2 Frequency Channels . 4 2.3 Multiplexing . 4 2.4 Network Topology . 4 2.4.1 Infrastructure Topology (Point-to-Point or Point- to-Multipoint) . 4 2.4.2 Ad-Hoc Topology . 5 2.5 Layers Denitions . 5 2.6 Range, Power Consumption, Data Rate . 8 2.7 Security . 8 2.8 Particularities and Embedded Applications . 8 2.8.1 Wi-Fi Conguration Interface . 10 2.8.2 Embedded Software integration . 10 2.8.3 Other Considerations . 10 2.8.4 Applications of Ad Hoc: Wi-Fi Direct . 12 3 Bluetooth 12 3.1 Origins . 12 3.2 Frequency Channels . 12 3.3 Multiplexing . 13 1 3.4 Network Topology . 13 3.4.1 Piconet Topology . 13 3.4.2 Scatternet Topology . 13 3.5 Layers Denitions . 13 3.5.1 The Bluetooth Controller . 15 3.5.2 The Bluetooth Host . 15 3.5.3 Host Controller Interface (HCI) . 15 3.5.4 Generic Access Prole (GAP) . 15 3.6 Range, Power Consumption, Data Rate . 15 3.6.1 Bluetooth versions . 16 3.7 Security . 16 3.8 Particularities and Embedded Applications . 16 3.8.1 Sni, Hold and Park mode . 17 4 IEEE 805.15.4 17 4.1 Origins . 17 4.2 Frequency Channels . 17 4.3 Multiplexing . 18 4.4 Network Topology . 18 4.4.1 Star Topology . 18 4.4.2 Mesh Topology . 18 4.4.3 Beacon Enabled Mode . 18 4.4.4 Non-beacon Enabled Mode . 19 4.5 ZigBee . 19 4.5.1 Origins . 19 4.5.2 Network Organisation . 19 4.6 Layers Denitions . 19 4.6.1 Network Layer . 19 4.6.2 Aplication Layer . 20 4.7 Range, Power Consumption, Data Rate . 20 4.8 Security . 20 4.9 Particularities and Embedded Applications . 20 5 Dash7 20 5.1 Origins . 21 5.2 Frequency Channels . 21 5.3 Multiplexing . 21 5.4 Network Topology . 22 5.5 Layers Denitions . 22 5.6 Range, Power Consumption, Data Rate . 22 5.7 Security . 22 6 CSMA/CA 23 7 Comparison table 23 8 Conclusion 23 2 9 References 23 9.1 Wi-Fi . 23 9.2 Bluetooth . 24 9.3 IEEE 802.15.4 . 25 9.4 Dash7 . 25 1 Introduction Wireless communication in embedded systems is a growing eld. It can be used in a wide range of situations where mobility is essential and wires are not practical. The key complications to choosing a wireless technology revolve around the following requirements [ADA10]: Range Reliability Compliancy (Standards) Security Cost Power Consumption Transmission rate Network Architecture Envisioned This article aims at helping in selecting the best available embedded wireless technology for your devices amongst some of the most popular choices used in the market today. The choices evaluated are Wi-Fi (802.11 a/b/g/n), Blue- Tooth, ZigBee (and 802.15.4), and Dash7. 2 Wi-Fi Wi-Fi is the common name used for the dierent versions of the IEEE 802.11 standard (a/b/g/n/i, etc.), which describes the technologies and protocols for achieving a Wireless Local Area Network (WLAN), a wireless bridge, or an adhoc network [WFD12][80207]. 2.1 Origins The standard IEEE 802.11 for WLAN networks was created in 1985. Wi-Fi suggests Wireless Fidelity, the term is used commercially since 1999 with the creation of Wi-Fi Alliance. Wi-Fi Alliance is responsible for the logo Wi-Fi which gives interoperability certications between the devices sporting the logo. 3 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Channel 2.412 2.417 2.422 2.427 2.432 2.437 2.442 2.447 2.452 2.457 2.462 2.467 2.472 2.484 Center Frequency (GHz) 22 MHz Figure 1: Wi-Fi channels in the 2.4 GHz band. Source : http://en.wikipedia.org/wiki/IEEE_802.11 2.2 Frequency Channels In embedded systems, there are four main versions of the 802.11 standard that are often used [GAI12]. 802.11a is one that operates in the 5GHz frequency ISM band. In terms of Compliancy and Reliability, this is useful when it is important to avoid interference with other RF devices which commonly operate in the 2.4 GHz ISM band (unlicensed RF band for industrial, scientic, and medical devices). 802.11b/g operate in the 2.4 GHz band, but have faster data transmission rates (11 Mbps and 54 Mbps respectively). 802.11n is the newest and most popular version, and can be congured to operate in either the 2.4 GHz or 5 GHz frequency bands. The 2.4 GHz band used by 802.11b/g is divided into channels separated from 5 MHz each. Of the 13 (14) channels, there is an only set of 3 channels (4 in certain countries) which do not overlap. 2.3 Multiplexing Wi-Fi uses OFDM (Orthogonal Frequency-Division Multiplexing) to perform a full-duplex communication in a single channel. CSMA/CA (see section 6) is used as a mechanism to avoid collision between the overlapping channels and other technologies that use the same ISM band frequency such as ZigBee and BlueTooth. 2.4 Network Topology Depending on the desired application, Wi-Fi is commonly used in two dierent network architecture congurations (Note: dierent network topologies can be implemented at the application layer level) [80207]. 2.4.1 Infrastructure Topology (Point-to-Point or Point-to-Multipoint) A standard network architecture in Wi-Fi uses an access point (AP) and multiple clients which communicate on network through the latter. 4 Figure 2: The Infrastructure topologies Basic Service Set (BSS) declares one dedicated AP and multiple clients in any particular WLAN. Source : http://en.kioskea.net/contents/wi/wimodes.php3 2.4.2 Ad-Hoc Topology The 802.11 standard allows also ad-hoc mode with Indepedant Basic Service Sets (IBSS). This conguration permits a node to operate as both an AP and a client. Ad-hoc infrastructures are widely used in embedded wireless implementa- tions because they permit communication between two devices without a ded- icated access point. Implementing ad-hoc requires careful considerations de- pending on the power consumption requirements of the system. 2.5 Layers Denitions IEEE 802.11 denes Physical (PHY) and Data Link (LLC + MAC) layers for generic wireless connexions using electromagnetic waves. There are 3 distinct physical layers, respectively based on DSSS, FHSS and infrared light. The LLC is based on IEE 802.2, which allows a Wi-Fi network to join any network implementing an IEEE standard. The MAC layer, though specic, is deliberately close to 802.3's one (terrestrial Ethernet). It uses CSMA/CA (see section 6). There are two access methods : DCS (Distributed Coordina- tion Functions), based on best eort, egalitarian (equal access of each actor to the medium) for asynchronous data transport, and PCF (Point Coordination Function), based on polling, used for sensitive data and real time applications. 5 Figure 3: An Extended Service Set denes the ability of two BSSs to be con- nected via their APs. Source : http://en.kioskea.net/contents/wi/wimodes.php3 6 Figure 4: IBSS provides the capability for devices to interconnect by functioning dually as an AP and a client. Source : http://en.kioskea.net/contents/wi/wimodes.php3 7 Protocol Release Frequency Modulation Max data rate Inner range 802.11a 1999 5 GHz OFDM 54 Mbps 35 m 802.11b 1999 2.4 GHz DSSS 11 Mbps 35 m 802.11g 2003 2.4 GHz OFDM/DSSS 54 Mbps 38 m 802.11n 2009 2.4/5 GHz OFDM 150 Mbps 70 m Table 1: Wi-Fi protocols overview. Source : http://en.wikipedia.org/wiki/IEEE_802.11 Wi-Fi is widely used under IP protocol. 2.6 Range, Power Consumption, Data Rate Some important considerations - If data-transfer reliability and speed are impor- tant, 802.11n supports Spaced-time block coding (STBC) and Maximal Ratio Combining (MRC). STBC provides redundancy by using multiple receivers to receive messages on multiple channels. This reduces error-rate but consumes more power. MRC similarly transmits messages on multiple channels. source: http://en.wikipedia.org/wiki/IEEE_802.11 2.7 Security Many commercially available embedded Wi-Fi modules come with the added option for conguration in dierent forms of security at the physical and trans- port levels. TKIP (or WPA) is considered to be sucient protection for most low-security applications. WPA2 is considered to be the most secure. Other se- curity protocols for encryption of data can be added in the dierent OSI layers, but WPA and WPA2 are available for basic encryption. WPS - Wi-Fi protected setup is a Wi-Fi conguration and authentication technique using push buttons for input entry. This has been proven susceptible to brute-force attacks. 2.8 Particularities and Embedded Applications Because embedded systems often have very specic constraints to meet, there are some particularities which are generally followed.
Recommended publications
  • Analysis of Server-Smartphone Application Communication Patterns
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Aaltodoc Publication Archive Aalto University School of Science Degree Programme in Computer Science and Engineering Péter Somogyi Analysis of server-smartphone application communication patterns Master’s Thesis Budapest, June 15, 2014 Supervisors: Professor Jukka Nurminen, Aalto University Professor Tamás Kozsik, Eötvös Loránd University Instructor: Máté Szalay-Bekő, M.Sc. Ph.D. Aalto University School of Science ABSTRACT OF THE Degree programme in Computer Science and MASTER’S THESIS Engineering Author: Péter Somogyi Title: Analysis of server-smartphone application communication patterns Number of pages: 83 Date: June 15, 2014 Language: English Professorship: Data Communication Code: T-110 Software Supervisor: Professor Jukka Nurminen, Aalto University Professor Tamás Kozsik, Eötvös Loránd University Instructor: Máté Szalay-Bekő, M.Sc. Ph.D. Abstract: The spread of smartphone devices, Internet of Things technologies and the popularity of web-services require real-time and always on applications. The aim of this thesis is to identify a suitable communication technology for server and smartphone communication which fulfills the main requirements for transferring real- time data to the handheld devices. For the analysis I selected 3 popular communication technologies that can be used on mobile devices as well as from commonly used browsers. These are client polling, long polling and HTML5 WebSocket. For the assessment I developed an Android application that receives real-time sensor data from a WildFly application server using the aforementioned technologies. Industry specific requirements were selected in order to verify the usability of this communication forms. The first one covers the message size which is relevant because most smartphone users have limited data plan.
    [Show full text]
  • Performance of VBR Packet Video Communications on an Ethernet LAN: a Trace-Driven Simulation Study
    9.3.1 Performance of VBR Packet Video Communications on an Ethernet LAN: A Trace-Driven Simulation Study Francis Edwards Mark Schulz edwardsF@sl .elec.uq.oz.au marksas1 .elec. uq.oz.au Department of Electrical and Computer Engineering The University of Queensland St. Lucia Q 4072 Australia Abstract medium term, we can expect that current LAN technolo- Provision of multimedia communication services on today’s gies will be utilized in the near term for packet transport of packet-switched network infrastructure is becoming increas- video applications [4,5, 61. Characterizing the performance ingly feasible. However, there remains a lack of information of current networks carrying video communications traffic is regarding the performance of multimedia sources operating therefore an important issue. This paper investigates packet in bursty data traffic conditions. In this study, a videotele- transport of real time video communications traffic, charac- phony system deployed on the Ethernet LAN is simulated, teristic of videotelephony applications, on the popular 10 employing high time-resolution LAN traces as the data traf- Mbit/s Ethernet LAN. fic load. In comparison with Poisson traffic models, the Previous work has established that Ethernet is capable of trace-driven cases produce highly variable packet delays, and supporting video communication traffic in the presence of higher packet loss, thereby degrading video traffic perfor- Poisson data traffic [6, 71. However, recent studies of high mance. In order to compensate for these effects, a delay time-resolution LAN traffic have observed highly bursty control scheme based on a timed packet dropping algorithm traffic patterns which sustain high variability over timescales is examined.
    [Show full text]
  • Communication Protocol for Schools
    Communication Protocol for Schools Communication plays a key role in creating and fostering strong, positive relationships between the school and the home. Communication is a two-way street; our schools share information with our families and community, and our families share information with our schools. The purpose of this document is to guide, manage and improve school-home communication by offering a standard format, structure and sequence for regular, ongoing communication. Communication Channels Communication can take place in a variety of formats. The message and the purpose of the communication can help determine which format is most appropriate. Generally, the more issues-driven and/or detailed the information is, the more direct the communication channel chosen should be. Communication channels include: Face-to-face communication – one-on-one meetings, School Council meetings, Parent-Student- Teacher interviews Telephone conversations Hard copy, written communication – letters sent home from the school, paper school newsletters Electronic communication – email, electronic newsletters, websites, social media When the communication requires a dialogue, such as bringing forward a question or concern or when a discussion is required on a particular topic, the preferred channels of communication are ones that allow for an immediate and ongoing interaction between the people involved. The best formats for this kind of communication are face-to-face conversations or telephone conversations. Schools and families are encouraged to use these direct channels of communication when a topic is complex or requires a dialogue. These more direct forms of communication also help us establish a personal connection, which helps build relationships that we don’t get in other forms of communication.
    [Show full text]
  • Voice Over Internet Protocol (Voip): a Brief Review
    © APR 2018 | IRE Journals | Volume 1 Issue 10 | ISSN: 2456-8880 Voice over Internet Protocol (VoIP): A Brief Review ANURAG K MADHESHIYA1, KIRAN S KALE2, SHIV K YADAV3, JIGNESHKUMAR R. VALVI4 1,2,3,4 Department of Electronics and Communication, SVNIT Surat, India Abstract -- VoIP stands for Voice over Inter Protocol. It is setting up calls, registering the calls, authenticating a communication protocol mainly used for voice and terminating the call. Protocol belonging to H.323 communication, data transfer and video calling. It is based family of protocol uses TCP and UDP connection for on packet transmission over internet network. Paul Baran transportation. For call registering and call signaling and other researchers developed the packet network in the H.225 protocol is used. For media session mid twentieth century. In 1973 Dany Cohen first demonstrated packet voice in flight simulator application. establishment and controlling H.245 is used. For Due to its digital nature it is easy to operate on this protocol. conferencing T.120 protocol is used [3]-[4]. Index Terms: MGCP, Packet, QoS, SIP I. INTRODUCTION Voice over Internet Protocol also known as Voice over IP and VoIP is a communication standard for transmission of voice signal, data transmission and video conferencing. Actually this technology follow packet switching. In packet switching first the input signal (voice, data, video) converted into digital form so other operation becomes simple after this we do encoding, compressing of digital data to make more secure transmission through channel. Then after this we transmit the signal over the channel. At receiver side we do reverse of it but it also require an addition block before receiver to store packets and reorder these packets because in packet switching different Figure 1: Call flow of H.323 packets follow different path so reaches in random manner.
    [Show full text]
  • An Evaluation Protocol for Picture Archiving and Communication System: a Systematic Review
    ORIGINAL PAPER An Evaluation Protocol for Picture Archiving and Communication System: a Systematic Review Mohsen S. Tabatabaei1, ABSTRACT Mostafa Langarizadeh1, Introduction: Picture archiving and communication system (PACS) serves to store, transmit, communi- Kamran Tavakol2 cate and manage medical images. A logical evaluation protocol assists to determine whether the system is technically, structurally and operationally fit. The purpose of this systematic review was to propose a 1Department of Health Information logical evaluation protocol for PACS, particularly useful for new hospitals and other healthcare institutions Management, School of Health Management and Information Sciences, Iran University of in developing countries. Methods and Materials: We systematically reviewed 25 out of 267 full-length Medical Sciences. Tehran, Iran articles, published between 2000 and 2017, retrieved from four sources: Science Direct, Scopus, PubMed 2School of Medicine, University of Maryland and Google Scholar. The extracted data were tabulated and reviewed successively by three independent Baltimore. Baltimore, MD, USA panels of experts that oversaw the design of this study and the process by which the PACS evaluation protocol was systematically developed. Results: The outcome data were ranked by expert panels and Corresponding author: Mohsen S. Tabatabaei, Tel: +98-990-188-0720. E-mail: [email protected] analyzed statistically, with the reliability established at 0.82 based on the Pearson’s correlation coefficient. The essential components and the best options to establish an optimal PACS were organized under nine main sections: system configuration; system network; data storage; data compression; image input; image doi: 10.5455/aim.2017.25.250-253 characteristics; image presentation; communication link; and system security, with a total of 20 compo- ACTA INFORM MED.
    [Show full text]
  • Internet of Things (Iot): Protocols White Paper
    INTERNET OF THINGS (IOT): PROTOCOLS WHITE PAPER 11 December 2020 Version 1 1 Hospitality Technology Next Generation Internet of Things (IoT) Security White Paper 11 December 2020 Version 1 About HTNG Hospitality Technology Next Generation (HTNG) is a non-profit association with a mission to foster, through collaboration and partnership, the development of next-generation systems and solutions that will enable hoteliers and their technology vendors to do business globally in the 21st century. HTNG is recognized as the leading voice of the global hotel community, articulating the technology requirements of hotel companies of all sizes to the vendor community. HTNG facilitate the development of technology models for hospitality that will foster innovation, improve the guest experience, increase the effectiveness and efficiency of hotels, and create a healthy ecosystem of technology suppliers. Copyright 2020, Hospitality Technology Next Generation All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission of the copyright owner. For any software code contained within this specification, permission is hereby granted, free-of-charge, to any person obtaining a copy of this specification (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the above copyright notice and this permission notice being included in all copies or substantial portions of the Software.
    [Show full text]
  • A Holistic Framework for Open Low-Power Internet of Things
    A Holistic Framework for Open Low-Power Internet of Things Technology Ecosystems Peng Hu1, Member, IEEE Abstract The low-power Internet of Things (IoT) has been thriving because of the recent technological advancement and ecosystems meeting the vertical application requirements and market needs. An open IoT technology ecosystem of the low-power IoT has become increasingly important to all the players and stakeholders and to the research community. However, there are several mainstream low-power IoT ecosystems available out of industry consortia or research projects and there are different models implied in them. We need to identify the working framework behind the scene and find out the principle of driving the future trends in the industry and research community. With a close look at these IoT technology ecosystems, four major business models are identified that can lead to the proposed ecosystem framework. The framework considers the technical building blocks, market needs, and business vertical segments, where these parts are making the IoT evolve as a whole for the years to come. I. Introduction Internet advances with the openness in mind, so does the Internet of Things (IoT). An IoT system benefit from various kinds of technologies and developmental efforts driven by open IoT technology ecosystems involving open standards, open source tools, and open platforms with key stakeholders. Over the past decade, the innovative sensors, embedded systems, cloud computing, wireless networking technologies have been enriching the openness of IoT systems and fulfilling the needs of IoT system development. As a result, on the one hand, these technologies enable the extremely less power consumption on IoT devices than before, which enables a broad spectrum of zero-battery and battery-powered applications.
    [Show full text]
  • Lora-Based Device-To-Device Smartphone Communication for Crisis Scenarios
    Jonas Höchst et al. LoRa-based Device-to-Device Smartphone Communication for Crisis Scenarios LoRa-based Device-to-Device Smartphone Communication for Crisis Scenarios Jonas Höchst Lars Baumgärtner University of Marburg, Germany Technical University of Darmstadt, Germany Technical University of Darmstadt, Germany [email protected] [email protected] Franz Kuntke Alvar Penning Technical University of Darmstadt, Germany University of Marburg, Germany [email protected] [email protected] Artur Sterz Bernd Freisleben University of Marburg, Germany University of Marburg, Germany Technical University of Darmstadt, Germany Technical University of Darmstadt, Germany [email protected] [email protected] ABSTRACT In this paper, we present an approach to facilitate long-range device-to-device communication via smartphones in crisis scenarios. Through a custom firmware for low-cost LoRa capable micro-controller boards, called rf95modem, common devices for end users can be enabled to use LoRa through a Bluetooth, Wi-Fi, or serial connection. We present two applications utilizing the flexibility provided by the proposed firmware. First, we introduce a novel device-to-device LoRa chat application that works a) on the two major mobile platforms Android and iOS and b) on traditional computers like notebooks using a console-based interface. Second, we demonstrate how other infrastructure-less technology can benefit from our approach by integrating it into the DTN7 delay-tolerant networking software. The firmware, the device-to-device chat application, the integration into DTN7, as well as the experimental evaluation code fragments are available under permissive open-source licenses. Keywords LoRa, Disaster Communication, Device-To-Device Communication, INTRODUCTION The communication technologies developed and deployed in the last decades are integral parts of our daily life and are used by mobile phones, computers, or smart applications in homes and cities.
    [Show full text]
  • A Communication Protocol for Different Communication Technologies in Cyber-Physical Systems
    Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 60 ( 2015 ) 1697 – 1706 19th International Conference on Knowledge Based and Intelligent Information and Engineering Systems A Communication Protocol for different communication technologies in Cyber-Physical Systems Mathias Persson, Anne Håkansson KTH Royal Institute of Technology, Electrum 229, Kista 16440, Sweden Abstract The world is moving towards a time where more and more objects, like Internet of Things, will be connected in cyber-physical systems. These objects need excellent tools to collect information from sources in the surrounding environment. By using the wireless communication technologies of modern smartphones, such as Bluetooth, Near Field Communication, and Wi-Fi, a solid ground to transmit and receive information to and from various sources can be established. However, an obstacle communication protocols are needed to make the different devices transmit information. This paper presents a communication protocol for cyber- physical systems using wireless technologies and cloud computing to facilitate information exchange between objects. By constructing a communication protocol and implementing a system on top of the protocol, users can exchange useful information with the help of a smartphone or other devices with similar functionalities in cyber-physical systems. The protocol should enable using services with ease, hiding the complex underlying structure and make interactions as natural as possible. © 2015 The The Authors. Authors. Published Published by byElsevier Elsevier B.V. B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). PeerPeer-review-review under under responsibility responsibility of KESof KES International International.
    [Show full text]
  • Sfamss: Asecure Framework for Atm Machines Via Secret Sharing
    SFAMSS: A SECURE FRAMEWORK FOR ATM MACHINES VIA SECRET SHARING 1 2 3 ZEINAB GHAFARI ,TAHA ARIAN AND MORTEZA ANALOUI 1 School of Computer Engineering Iran University of Science and Technology, Tehran,Iran [email protected] 2 School of Computer Engineering Iran University of Science and Technology, Tehran,Iran [email protected] 3 Associate Professor of Computer Engineering Iran University of Science and Technology,Tehran,Iran [email protected] ABSTRACT As ATM applications deploy for a banking system, the need to secure communications will become critical. However, multicast protocols do not fit the point-to-point model of most network security protocols which were designed with unicast communications in mind. In recent years, we have seen the emergence and the growing of ATMs (Automatic Teller Machines) in banking systems. Many banks are extending their activity and increasing transactions by using ATMs. ATM will allow them to reach more customers in a cost effective way and to make their transactions fast and efficient. However, communicating in the network must satisfy integrity, privacy, confidentiality, authentication and non-repudiation. Many frameworks have been implemented to provide security in communication and transactions. In this paper, we analyze ATM communication protocol and propose a novel framework for ATM systems that allows entities communicate in a secure way without using a lot of storage. We describe the architecture and operation of SFAMSS in detail. Our framework is implemented with Java and the software architecture, and its components are studied in detailed. KEYWORDS ATM Security, Framework, Secret Sharing, Authentication, Protocol Design, Software Architecture.
    [Show full text]
  • Wireless Sensor Networks Technology and Simulation Software’S
    ISSN (Online) 2278-1021 IJARCCE ISSN (Print) 2319 5940 International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 5, May 2016 An Overview on Wireless Sensor Networks Technology and Simulation Software’s Vijay S. Kale1, Rohit D. Kulkarni2 Associate Professor, Department of Electronic Science, KTHM College, Nashik, Maharashtra, India1 M. Phil. Student, Department of Electronic Science, KTHM College, Nashik, Maharashtra, India2 Abstract: Advances in wireless networking, micro-fabrication and integration of sensors and actuators manufactured using micro-electromechanical system (MEMS) technology and embedded microprocessors have enabled a new generation of massive-scale sensor networks suitable for a range of commercial and military applications. Sensor networks promise to couple end users directly to sensor measurements and provide information that is precisely localized in time and/or space, according to the user’s needs or demands. Node-level design simulators simulate the behaviour of a sensor network on a per-node basis. Using simulation, designers can quickly study the performance in terms of timing, power, bandwidth, and scalability without implementing them on actual hardware and dealing with the actual physical phenomena. The present communication gives the brief survey of wireless sensor network (WSN), WSN components, details of operating systems (TinyOS, RIOT, Nano-RK, MANTIS etc.) and WSN simulation software’s (NS2, OMNET++, J-Sim, JiST, GloMoSim, SSFNet etc.). The aim is to provide a better understanding of the current research issues in this field and outline the use of certain tools to meet the design objectives which will be useful to learner/researcher to develop WSNs applications. Keywords: Sensor nodes, Architecture, Operating system, Simulation software, Wireless technology.
    [Show full text]
  • Bluetooth and Wi-Fi Wireless Protocols: a Survey and a Comparison Erina Ferro and Francesco Potorti`, Institute of the National Research Council (Isti—Cnr)
    ACCEPTED FROM OPEN CALL BLUETOOTH AND WI-FI WIRELESS PROTOCOLS: A SURVEY AND A COMPARISON ERINA FERRO AND FRANCESCO POTORTI`, INSTITUTE OF THE NATIONAL RESEARCH COUNCIL (ISTI—CNR) ABSTRACT ging. Another advantage lies in the way new wireless users can dynamically join or leave the Bluetooth and IEEE 802.11 (Wi-Fi) are two network, move among different environments, communication protocol standards that define a create ad hoc networks for a limited time, and physical layer and a MAC layer for wireless then leave. Wireless networks are simple to communications within a short range (from a deploy, and in some cases cost less than wired few meters up to 100 m) with low power con- LANs. Nevertheless, the technological chal- sumption (from less than 1 mW up to 100 mW). lenges involved in wireless networks are not triv- Bluetooth is oriented to connecting close devices, ial, leading to disadvantages with respect to serving as a substitute for cables, while Wi-Fi is cabled networks, such as lower reliability due to oriented toward computer-to-computer connec- interference, higher power consumption, data tions, as an extension of or substitution for security threats due to the inherent broadcast cabled LANs. In this article we offer an overview properties of the radio medium, worries about of these popular wireless communication stan- user safety due to continued exposition to radio Bluetooth and IEEE dards, comparing their main features and behav- frequency, and lower data rates. iors in terms of various metrics, including Currently the wireless scene is held by two 802.11 (Wi-Fi) are capacity, network topology, security, quality of standards: the Bluetooth and IEEE 802.11 pro- service support, and power consumption.
    [Show full text]