Mtech Thesis
Mtech Thesis
Mtech Thesis
802.15.4 Networks
Sanatan Mohanty
Roll No: 60609005
Department of Electronics & Communication Engineering National Institute of Technology, Rourkela Orissa, India 769 008
CERTIFICATE
This is to certify that the thesis titled Energy Efficient Routing Algorithms for Wireless Sensor Networks and Performance Evaluation of Quality of Service for IEEE 802.15.4 Networks, submitted to the National Institute of Technology, Rourkela by Sanatan Mohanty, Roll No. 60609005 for the award of the degree of Master of Technology (Research) in Electronics & Communication Engineering, is a bona fide record of research work carried out by him under my supervision and guidance.
The candidate has fulfilled all the prescribed requirements. The thesis, which is based on candidates own work, has not been submitted elsewhere for a degree/diploma.
In my opinion, the thesis is of standard required for the award of a Master of Technology (Research) degree in Electronics & Communication Engineering.
To the best of my knowledge, he bears a good moral character and decent behaviour.
ACKNOWLEDGEMENT
I would like to express my deepest gratitude to my supervisor, Prof. (Dr.) S.K. Patra. He introduced me to the field of Wireless Sensor Networks with keen interest and encouragement. I am greatly indebted to him for his valuable advice and moral support during research period. I am grateful to Prof. G.S.Rath (Chairman), Prof. K.K. Mahapatra, Prof. A.K. Turuk members of MSC for their help and guidance. I am especially grateful to Prof. A.K. Turuk and Prof. B.D Sahoo for proof reading the thesis. I would like to thanks all faculty members for their help and guidance. I am also thankful to all the non-teaching staffs of ECE Department for their kind cooperation during the research period. I would also like to thanks my friends Prasanta, Badri, Bijaya, Charac, Samarjit, Ayaskanta, Sudendra, Susanta, Jitendra sir and Hiremath for their help during the research period. Last but not the least, I would like to thank my parents, my brothers and sisters for their support and patience to carry out research at NIT, Rourkela.
Sanatan Mohanty
ii
Abstract
The popularity of Wireless Sensor Networks (WSN) have increased tremendously in recent time due to growth in Micro-Electro-Mechanical Systems (MEMS) technology. WSN has the potentiality to connect the physical world with the virtual world by forming a network of sensor nodes. Here, sensor nodes are usually battery-operated devices, and hence energy saving of sensor nodes is a major design issue. To prolong the networks lifetime, minimization of energy consumption should be implemented at all layers of the network protocol stack starting from the physical to the application layer including cross-layer optimization. In this thesis, clustering based routing protocols for WSNs have been discussed. In cluster-based routing, special nodes called cluster heads form a wireless backbone to the sink. Each cluster heads collects data from the sensors belonging to its cluster and forwards it to the sink. In heterogeneous networks, cluster heads have powerful energy devices in contrast to homogeneous networks where all nodes have uniform and limited resource energy. So, it is essential to avoid quick depletion of cluster heads. Hence, the cluster head role rotates, i.e., each node works as a cluster head for a limited period of time. Energy saving in these approaches can be obtained by cluster formation, cluster-head election, data aggregation at the cluster-head nodes to reduce data redundancy and thus save energy. The first part of this thesis discusses methods for clustering to improve energy efficiency of homogeneous WSN. It also proposes Bacterial Foraging Optimization (BFO) as an algorithm for cluster head selection for WSN. The simulation results show improved performance of BFO based optimization in terms of total energy dissipation and no of alive nodes of the network system over LEACH, K-Means and direct methods. IEEE 802.15.4 is the emerging next generation standard designed for low-rate wireless personal area networks (LR-WPAN). The second part of the work reported here in provides performance evaluation of quality of service parameters for WSN based on IEEE 802.15.4 star and mesh topology. The performance studies have been evaluated for varying traffic loads using MANET routing protocol in QualNet 4.5. The data packet delivery ratio, average end-to-end delay, total energy consumption, network lifetime and percentage of time in sleep mode have been used as performance metrics. Simulation results show that DSR (Dynamic Source Routing) performs better than DYMO (Dynamic MANET On-demand) and AODV (Adhoc On demand Distance Vector) routing protocol for varying traffic loads rates.
iii
Contents
Certificate...i Acknowledgement.ii Abstract.iii Contents.iv List of Figures.......................................................................................................................... vii List of Tables ............................................................................................................................. x Acronyms and abbreviations .................................................................................................... xi Nomenclature ......................................................................................................................... xiii Chapter 1 Introduction ......................................................................................................... 1 1.1 Introduction ......................................................................................................................... 1 1.2 Wireless sensor node architecture: ...................................................................................... 2 1.3 Applications of Wireless Sensor Networks ......................................................................... 4 1.4 Background Literature Survey ............................................................................................ 8 1.4 Thesis Contributions.......................................................................................................... 10 1.5 Thesis Outline .................................................................................................................... 10 Chapter 2 Literature Survey of routing algorithms for WSN ......................................... 12 2.1 Introduction ....................................................................................................................... 12 2.2 Routing Challenges and Design Issues in WSNs .............................................................. 13 2.3 Classification of Routing Protocols in WSNs ................................................................... 16 2.3.1 The routing protocols for protocol operation ............................................................. 17 2.3.2 The routing protocols for network structure ............................................................... 19 2.4 Summary and Open research issues: ................................................................................. 26 Chapter 3 IEEE 802.15.4 Networks- An Overview ............................................................ 28 3.1 Introduction ....................................................................................................................... 28 3.2 IEEE 802.15.4 PHY Layer ................................................................................................ 28 3.2.1 Modulations Schemes and Operational Frequencies .................................................. 29 3.2.2 IEEE 802.15.4 Physical layer Packet structure .......................................................... 30 3.2.3 The IEEE PHY layer functions: ................................................................................. 30 3.3 IEEE 802.15.4 MAC Sublayer .......................................................................................... 32 3.3.1 Network Devices and Topology of IEEE 802.15.4 MAC .......................................... 33 3.3.2 IEEE 802.15.4 MAC layer functions: ........................................................................ 35 3.3.3 IEEE 802.1.5.4 MAC data format .............................................................................. 38 3.3.4 IEEE 802.15.4 MAC sublayer operational modes ................................................... 39
iv
3.3.5 CSMA-CA Mechanism .............................................................................................. 42 3.3.6 Data Transfer Models ................................................................................................. 46 3.4 SSCS Layer ....................................................................................................................... 47 3.5 ZigBee ............................................................................................................................... 48 3.5.1 ZigBee Protocol Stack ................................................................................................ 48 3.5.2 Application of ZigBee ................................................................................................ 51 3.6 Summary............................................................................................................................ 52 Chapter 4 Cluster Head Selection for Energy efficiency in WSN using BFO .............. 53 4.1 Introduction ....................................................................................................................... 53 4.2 Principle of Evolutionary Algorithms ............................................................................... 53 4.2.1 Some examples of EA ................................................................................................ 55 4.2.2 Related techniques ...................................................................................................... 55 4.3 Bacterial Foraging Optimization for cluster head selection .............................................. 56 4.3.1 Bacteria Foraging Optimization ................................................................................. 56 4.3.2 Bacterial Foraging Optimization Algorithm .............................................................. 58 4.3.3 BFO parameters for WSN cluster head optimization ................................................. 61 4.4 Simulation setup ................................................................................................................ 62 4.5 Results and discussion ....................................................................................................... 68 4.6 Conclusion ......................................................................................................................... 69 Chapter 5 Quality of Service Evaluation in IEEE 802.15.4 Networks ........................... 70 5.1 Introduction ....................................................................................................................... 70 5.2 Quality of Service Requirements in WSNs ....................................................................... 70 5.3 Challenges for QoS Support in WSNs .............................................................................. 71 5.4 Parameters Defining WSN QoS ........................................................................................ 73 5.5 Quality of Service support in protocol layers .................................................................... 74 5.5.1 Application Layer ....................................................................................................... 74 5.5.2 Transport Layer .......................................................................................................... 74 5.5.3 Network Layer ............................................................................................................ 75 5.5.4 Data Link Layer .......................................................................................................... 75 5.5.5 Physical Layer ............................................................................................................ 76 5.6 MANET REACTIVE ROUTING PROTOCOLS ........................................................... 77 5.6.1 Ad-hoc On-demand Distance Vector Routing (AODV) .......................................... 77 5.6.2 Dynamic Source Routing (DSR) .............................................................................. 78 5.6.3 The Dynamic MANET On-demand (DYMO) routing protocol ................................ 80 5.7 Related Work ................................................................................................................... 80 5.8 QoS analysis in IEEE 8021.5.4 Star topology ................................................................... 81 5.8.1 Simulations set up..................................................................................................... 81
v
5.8.2 Performance Metrics .................................................................................................. 84 5.8.3 Simulation results discussion ..................................................................................... 84 5.9 Performance analysis of QoS for peer to peer Topology .............................................. 91 5.9.1 Simulations Set up ...................................................................................................... 91 5.9.2 Simulation results and discussion ............................................................................. 94 5.10 Conclusion: ...................................................................................................................... 99 Chapter 6 Conclusion ........................................................................................................ 101 6.1 Introduction ..................................................................................................................... 101 6.2 Contribution of Thesis ..................................................................................................... 101 6.3 Limitation of work ........................................................................................................... 102 6.4 Future directions .............................................................................................................. 103 Bibliography .......................................................................................................................... 104 Publication ............................................................................................................................. 112
vi
List of Figures
Figure 1. 1:Architecture of a Sensor Node ................................................................................ 2 Figure 1. 2: MICAZ Mote ......................................................................................................... 2 Figure 1. 3: Overview of Wireless Sensor Network applications ............................................. 5 Figure 2.1:Taxonomy of routing protocols for WSN .............................................................. 16 Figure 3.1: IEEE 802.15.4 PHY packet structure. .................................................................. 30 Figure 3.2:IEEE 802.15.4 LR-WPAN device architecture ..................................................... 33 Figure 3.3:Topology supported by IEEE 802.15.4 and ZigBee ............................................. 34 Figure 3.4:Data frame format of IEEE 802.15.4 MAC............................................................34 Figure 3.5:IEEE 802.15.4 Operational modes......................................................................... 40 Figure 3.6:IEEE Superframe structure .................................................................................... 40 Figure 3.7:CSMA-CA Algorithm ............................................................................................ 44 Figure 3.8:Data transfer to a Coordinator in IEEE 802.15.4 :(a) Beacon Enabled and (b) Nonbeacon Enabled ................................................................................................................. 46 Figure 3.9:Data Transfer from a Coordinator to a device:(a) Beacon Enabled and (b) Nonbeacon Enabled ................................................................................................................. 47 Figure 3.10:ZigBee functional layer architecture and protocol stack ..................................... 49 Figure 3.11:In-Home Patient monitoring using ZigBee Wireless Networking ....................... 51 Figure 4.1: Structure of a single population evolutionary algorithm.......................................50 Figure 4.2:Flowchart of BFO...................................................................................................54 Figure 4.3:Initial positions of sensor nodes during simulation ............................................... 64 Figure 4.4: Sensors that are alive (dotted circles) and dead sensors (dots) after 1200 simulation rounds .................................................................................................................... 64 Figure 4.5:Initial positions of sensor nodes during K-Means Clustering ................................ 65 Figure 4.6:Clustering formation of sensor nodes using K-Means Clustering ......................... 65 Figure 4.7:Cluster head formation while executing K-Means Clustering ............................... 66 Figure 4.8:Random placement of sensor nodes in BFO ......................................................... 66
vii
Figure 4.9:Clustering of sensor nodes in BFO ........................................................................ 67 Figure 4.10:Comparison of number of alive nodes of the network system among different algorithms ................................................................................................................................ 67 Figure 4.11:Comparison of Total system energy dissipation in the network system among different algorithms ................................................................................................................. 68 Figure 5.1: AODV Communication signaling from node 1 to node 8 .................................... 77 Figure 5.2: DSR Communication signaling from node 1 to node 8 ........................................ 79 Figure 5.3: Simulation set up for Star Topology ..................................................................... 83 Figure 5.4: QualNet animator during simulation execution .................................................... 83 Figure 5.5: Packet delivery ratio vs. loads (packets/second).................................................. 85 Figure 5.6: Average end to end delay vs. loads (packets/second) .......................................... 85 Figure 5.7: Throughput vs. loads(packets/second) .................................................................. 86 Figure 5.8:Total energy consumption vs. loads(packets/second) ............................................ 87 Figure 5.9:Routing overhead vs. loads(packets/second) ......................................................... 87 Figure 5.10:Energy per goodput bit vs. loads(packets/second) ............................................... 88 Figure 5.11:Percentage of time in sleep mode vs. loads(packets/second) ............................. 89 Figure 5.12:Percentage of duty cycle vs. loads(packets/second) ........................................... 89 Figure 5.13:Network lifetime vs. loads(packets/second) ....................................................... 90 Figure 5.14:Residual battery capacity vs. loads(packets/second) ........................................... 90 Figure 5.15:Simulation setup for Mesh topology .................................................................... 93 Figure 5.16:QualNet animator during Mesh topology simulation execution .......................... 93 Figure 5.17:Packet delivery ratio vs. loads(packets/second)................................................... 94 Figure 5.18:Average end to end delay vs. loads(packets/second) ........................................... 95 Figure 5.19:Throughput vs. loads(packets/second) ................................................................. 96 Figure 5.20:Total energy consumption vs. loads(packets/second) .......................................... 96 Figure 5.21:Routing overhead vs. loads(packets/second) ...................................................... 97
viii
Figure 5.22:Energy per goodput bit vs. loads(packets/second) .............................................. 98 Figure 5.23:Network lifetime vs. loads(packets/second) ........................................................ 98 Figure 5.24: Residual battery capacity vs. loads(packets/second) .......................................... 99
ix
List of Tables
Table 3. 1: Frequency bands of IEEE 802.15.4 Physical Layer Table 4.1: Network parameters for simulations Table 5.1: IEEE 802.15.4 Star topology simulation parameters Table 5.2: IEEE 802.15.4 Mesh topology simulation parameters 29 62 82 92
LLC LR-WPAN MAC MANET MEMS NB PAN PDR PEGASIS PHR PPDU PPS PSDU QoS RFD RREQ RREP RF RFD RFID RTS SAPs SD SHIMMER
logical link control low-rate wireless personal area networks medium access control mobile ad hoc networks micro-electro-mechanical systems number of back-off periods personal area networks packet delivery ratio Power-Efficient Gathering in Sensor Information Systems phy header protocol packet data unit packets per second protocol service data unit quality of service reduced functional device route request route reply radio frequency reduced functional device radio frequency identification request-to-send service access points superframe duration Sensing Health with Intelligence, Modularity, Mobility, and Experimental Reusability
synchronization header superframe order service specific convergence sublayer time division multiple access Threshold sensitive energy efficient sensor network protocol wireless sensor networks
xii
Nomenclature
b c(i) Cprob Eresidual Emax G ETx (k,d) ETx-elec(k) bacteria number step size taken in the random direction constant that limits initial cluster-head candidatures the residual energy of the node maximum (initial) energy set of nodes that have not been cluster head in the last 1/P rounds energy dissipated to transmit a k-bit message over distance d energy dissipated by transmitter electronics
ETx- amp (k,d) energy dissipated by amplifier electronics E elec ERx- elec constant energy expended to run the amp and transmitter circuitry energy dissipated by receiver electronics
minimized
i J cc
cell- to-cell attractant functions chemotactic steps swim steps reproductive steps elimination and dispersal steps desired percentage of cluster heads dimension of the search space probability of elimination number of parameters to be optimized current round of advertisement phase total number of bacteria threshold number below which node becomes cluster head mth component of the ith bacterium at position i unit length in the random direction ith bacterium at j th chemotactic, k th reproductive and l elimination and dispersal step
xiii
th
Nc
Ns
N re
N ed
P p
Ped
P
r S T(n)
i m
( j)
i
( j 1, k , l )
Introduction
Chapter 1
Introduction
1.1 Introduction
Wireless Sensor Networks(WSN) have gained world-wide attention in recent years due to the advances made in wireless communication, information technologies and electronics field [1,2,3,4,5].The concept of wireless sensor networks is based on a simple equation: Sensing + CPU + Radio = Thousands of potential applications [6] . It is an In situ sensing technology where tiny, autonomous and compact devices called sensor nodes or motes deployed in a
remote area to detect phenomena, collect and process data and transmit sensed information to users. The development of low-cost, low-power, a multifunctional sensor has received increasing attention from various industries. Sensor nodes or motes in WSNs are small sized and are capable of sensing, gathering and processing data while communicating with other connected nodes in the network, via radio frequency (RF) channel.
WSN term can be broadly sensed as devices range from laptops, PDAs or mobile phones to very tiny and simple sensing devices. At present, most available wireless sensor devices are considerably constrained in terms of computational power, memory, efficiency and communication capabilities due to economic and technology reasons. Thats why most of the research on WSNs has concentrated on the design of energy and computationally efficient algorithms and protocols, and the application domain has been confined to simple dataoriented monitoring and reporting applications. WSNs nodes are battery powered which are deployed to perform a specific task for a long period of time, even years. If WSNs nodes are more powerful or mains-powered devices in the vicinity, it is beneficial to utilize their computation and communication resources for complex algorithms and as gateways to other networks. New network architectures with heterogeneous devices and expected advances in technology are eliminating current limitations and expanding the spectrum of possible applications for WSNs considerably.
Introduction
Introduction
Sensing Unit:
Sensing units are usually composed of two subunits: sensors and analog to
digital converters (ADCs). Sensor is a device which is used to translate physical phenomena to electrical signals. Sensors can be classified as either analog or digital devices. There exists a variety of sensors that measure environmental parameters such as temperature, light intensity, sound, magnetic fields, image, etc. The analog signals produced by the sensors based on the observed phenomenon are converted to digital signals by the ADC and then fed into the processing unit. Processing Unit: The processing unit mainly provides intelligence to the sensor node. The processing unit consists of a microprocessor, which is responsible for control of the sensors, execution of communication protocols and signal processing algorithms on the gathered sensor data. Commonly used microprocessors are Intel's Strong ARM microprocessor, Atmels AVR microcontroller and Texas Instruments' MP430 microprocessor. For example, the processing unit of a smart dust mote prototype is a 4 MHz Atmel AVR8535 microcontroller with 8 KB instruction flash memory, 512 bytes RAM and 512 bytes EEPROM. TinyOS operating system is used on this processor, which has 3500 bytes OS code space and 4500 bytes available code space. The processing unit of AMPS wireless sensor node prototype has a 59206 MHz SA-1110 micro-processor. In general, four main processor states can be identified in a microprocessor: off, sleep, idle and active. In sleep mode, the CPU and most internal peripherals are turned on, and can only be activated by an external event (interrupt). In idle mode, the CPU is still inactive, but other peripherals are active. Transceiver Unit: The radio enables wireless communication with neighbouring nodes and the outside world. It consists of a short range radio which usually has single channel at low data rate and operates at unlicensed bands of 868-870 MHz (Europe), 902-928 MHz (USA) or near 2.4 GHz (global ISM band). For example, the TR1000 family from RF Monolithics works in the 800900 MHz range can dynamically change its transmission power up to 1.4 mW and transmit up to 115.2 Kbps. The Chipcons CC2420 is included in the MICAZ mote that was built to comply with the IEEE 802.15.4 standard [8] for low data rate and low cost wireless personal area networks. There are several factors that affect the power consumption characteristics of a radio, which includes the type of modulation scheme used, data rate, transmit power and the operational duty cycle. At transmitted power levels of -10dBm and below, a majority of the transmit mode power is dissipated in the circuitry and not radiated from the antenna. However, at high
3
Introduction transmit levels (over 0dBm) the active current drown by the transmitter is high. The transmit power levels for sensor node applications are roughly in the range of -10 to +3 dBm [9]. Similar to microcontrollers, transceivers can operate in Transmit, Receive, Idle and Sleep modes. An important observation in the case of most radios is that, operating in Idle mode results in significantly high power consumption, almost equal to the power consumed in the Receive mode. Thus, it is important to completely shut down the radio rather than set it in the idle mode when it is not transmitting or receiving due to the high power consumed. Another influencing factor is that, as the radio's operating mode changes, the transient activity in the radio electronics causes a significant amount of power dissipation. The sleep mode is a very important energy saving feature in WSNs. Battery - The battery supplies power to the complete sensor node. It plays a vital role in determining sensor node lifetime. The amount of power drawn from a battery should be carefully monitored. Sensor nodes are generally small, light and cheap, the size of the battery is limited. AA batteries normally store 2.2 to 2.5 Ah at 1.5 V. However, these numbers vary depending on the technology utilized. For example, Zincair-based batteries have higher capacity in Joules/cm3 than lithium batteries. Alkaline batteries have the smallest capacity, normally around 1200 J/cm3. Furthermore, sensors must have a lifetime of months to years, since battery replacement is not an option for networks with thousands of physically embedded nodes. This causes energy consumption to be the most important factor in determining sensor node lifetime.
Wireless Sensor Networks may consist of many different types of sensors such as seismic, low sampling rate magnetic, thermal, visual, infrared, acoustic and radar. They are able to monitor a wide variety of ambient conditions that include temperature, humidity, vehicular movement, lightning condition, pressure, soil makeup, noise levels, the presence or absence
4
Introduction of certain kinds of objects, mechanical stress levels on attached objects, and the current characteristics such as speed, direction and size of an object. WSN applications can be classified into two categories [3] as shown in Figure 1.3: Monitoring Tracking
Figure 1. 3: Overview of Wireless Sensor Network applications [3] Monitoring applications include indoor/outdoor environmental monitoring, health and wellness monitoring, power monitoring, inventory location monitoring, factory and process automation, and seismic and structural monitoring. Tracking applications include tracking objects, animals, humans, and vehicles and categorize the applications into military, environment, health, home and other commercial areas. It is possible to expand this classification with more categories such as space exploration, chemical processing and disaster relief.
Introduction Military applications: The rapid deployment, self-organization and fault tolerance characteristics of sensor networks make them a very promising sensing technique for military command, control, communications, computing, intelligence, surveillance, reconnaissance and targeting (C4ISRT) systems. Military sensor networks could be used to detect and gain as much information as possible about enemy movements, explosions, and other phenomena of interest, such as battlefield surveillance, nuclear, biological and chemical attack detection and reconnaissance. As an example, PinPtr [10] is an experimental counter-sniper system developed to detect and locate shooters. The system utilizes a dense deployment of sensors to detect and measure the time of arrival of muzzle blasts and shock waves from a shot. Sensors route their measurements to a base station (e.g., a laptop or PDA) to compute the shooters location. Sensors in the PinPtr system are second-generation Mica2 motes connected to a multi-purpose acoustic sensor board. Each multi-purpose acoustic sensor board is designed with three acoustic channels and a Xilinx Spartan II FPGA. Mica2 motes run on a TinyOS [11] operating system platform that handles task scheduling, radio communication, time, I/O processing, etc. Middleware services developed on TinyOS that are exploited in this application include time synchronization, message routing with data aggregation, and localization.
Environmental applications: Wireless Sensor Networks have been deployed for environmental monitoring, which involves tracking the movements of small animals and monitoring environmental conditions that affect crops and livestock. In these applications, WSNs collect readings over time across a space large enough to exhibit significant internal variation. Other applications of WSNs are chemical and biological detection, precision agriculture, biological, forest fire detection, volcanic monitoring, meteorological or geophysical research, flood detection and pollution study.
Macroscope of redwood [12] is a case study of a WSN that monitors and records the redwood trees in Sonoma, California. Each sensor node measures air temperature, relative humidity, and photo-synthetically-active solar radiation. Sensor nodes are placed at different heights of the tree. Plant biologists track changes of spatial gradients in the microclimate around a redwood tree and validate their biological theories.
Introduction Underwater monitoring study in [13] developed a platform for underwater sensor networks to be used for long term monitoring of coral reefs and fisheries. The sensor network consists of static and mobile underwater sensor nodes. The nodes communicate via point-to-point links using high speed optical communications. Nodes broadcast using an acoustic protocol integrated in the TinyOS protocol stack. They have a variety of sensing devices, including temperature and pressure sensing devices and cameras. Mobile nodes can locate and move above the static nodes to collect data and perform network maintenance functions for deployment, re-location, and recovery. Similarly, ZebraNet [14] system is a mobile wireless sensor network used to track animal migrations.
Healthcare applications: WSN based technologies such as Ambient Assisted Living and Body Sensor Networks provide dozens of solutions to healthcare's biggest challenges such as an aging population and rising healthcare costs. Body sensor networks can be used to monitor physiological data of patients The Body sensor networks can provide interfaces for disabled, integrated patient monitoring. It can monitor and detect elderly people's behaviour, e.g., when a patient has fallen. These small sensor nodes allow patients a greater freedom of movement and allow doctors to identify pre-defined symptoms earlier on. The small installed sensor can also enable tracking and monitoring of doctors and patients inside a hospital. Each patient has small and lightweight sensor nodes attached to them, which may be detecting the heart rate and blood pressure. Doctors may also carry a sensor node, which allows other doctors to locate them within the hospital.
AT&T recently introduced a telehealth monitoring service that uses ZigBee and WiFi. Mote Track [15] is the patient tracking system developed by Harvard University, which tracks the location of individual patients devices indoors and outdoors, using radio signal information from the sensor attached to the patients. Heart@Home is a wireless blood pressure monitor and tracking system. Heart@Home uses a SHIMMER mote located inside a wrist cuff which is connected to a pressure sensor. A users blood pressure and heart rate is computed using the oscillometric method. The SHIMMER mote records the reading and sends it to the Tmote connected to the users computer. A software application processes the data and provides a graph of the users blood pressure and heart rate over time.
Home applications: With the advance of technology, the tiny sensor nodes can be embedded into furniture and appliances, such as vacuum cleaners, microwave ovens and refrigerators.
7
Introduction They are able to communicate with each other and the room server to learn about the services they offer, e.g., printing, scanning and faxing. These room servers and sensor nodes can be integrated with existing embedded devices to become self-organizing, self-regulated and adaptive systems to form a smart environment. Automated homes with Personal Area
Networks such as ZigBee [16] can provide the ability to monitor and control mechanisms like light switches and lights, HVAC (heating, ventilating, air conditioning) controls and thermostats; computers, TVs and other electronic devices, smoke detectors and other safety equipment; alarm panels, motion sensors, and other security devices; and electricity, water and gas meters.
Traffic control: Traffic conditions can be easily monitored and controlled at peak times by WSNs. Temporary situations such as roadworks and accidents can be monitored in situ. Further, the integration of monitoring and management operations, such as signpost control, is facilitated by a common WSN infrastructure.
Introduction like WSN and mobile ad hoc networks. Biological synchronization phenomena have great potential to enable distributed and scalable synchronization algorithms for WSN [24]. The first MANET routing algorithm in the literature to take inspiration from ants are Ant-Colony Based Routing Algorithm (ARA) [25], AntNet [26], AntHocNet [27] etc. In [28], an energy efficient and delay-aware routing algorithm is proposed based on ant-colony-based algorithms. In [29], a bio-inspired scalable network synchronization protocol for large scale sensor networks is proposed, which is inspired by the simple synchronization strategies in biological phenomena such as flashing fireflies and spiking of neurons. A biologically inspired distributed synchronization algorithm introduced in [30] is based on a mathematical model. It explains how neurons and fireflies spontaneously synchronize. In [31], the principles of genetics and evolution are adopted to enable service-oriented, autonomous, and self-adaptive communication systems for pervasive environments such as WSN and mobile ad hoc networks. In [32], efficient bio-inspired communication paradigm for WSN is proposed based on the feedback loop mechanism developed by inspiration from the principles of cell biology. In [33], a clustering algorithm based on biological quorum sensing mechanism is mentioned. It helps the sensor nodes to form clusters according to spatial characteristics of the observed event signal. QoS is the ability of a network element (e.g. an application, host or router) to have some level of assurance that its traffic and service requirements can be satisfied. QoS manages bandwidth according to application demands and network management settings. QoS has been extensively studied in wireless LANs and wired computer networks. IP and Asynchronous Transfer Mode (ATM) provide extensive QoS support ranging from besteffort service to guaranteed service. A comprehensive overview of the state of the field of QoS in networking was provided by Chen in his thesis in 1999 [34]. Chakrabarti and Mishra [35] summarized the important QoSrelated issues in MANETs and the future work that required further attention is provided in [36]. In 2004, Al-Karaki and Kamal [37] presented a detailed overview about the state of and the development trends in the field of QoS. It categorized routing into the following types of approaches: flat (all nodes play an equal role), hierarchical (some nodes are local cluster heads for example), position based (utilize location information), and power-aware (take battery usage and residual charge into consideration) QoS routing. Finally, a detailed
Introduction overview of the more widely accepted MAC and routing solutions for providing better QoS was presented in [38,39].
Introduction reception, idle, sleep etc. have been presented. Performance of star and peer to peer topology based IEEE 802.15.4 networks have also been evaluated for varying traffic loads.
Chapter-6 presents the contributions of thesis. The chapter also provides the limitations of the work reported here in and lists the future research scopes from the studies undertaken.
11
Literature Survey
Chapter 2
Literature Survey of routing algorithms for WSN
2.1 Introduction
Wireless sensor networks have their own unique characteristics which create new challenges for the design of routing protocols for these networks. First, sensors are very limited in transmission power, computational capacities, storage capacity and most of all, in energy. Thus, the operating and networking protocol must be kept much simpler as compared to other ad hoc networks. Second, due to the large number of application scenarios for WSN, it is unlikely that there will be a one-thing-fits-all solution for these potentially very different possibilities. The design of a sensor network routing protocol changes with application requirements. For example, the challenging problem of low-latency precision tactical surveillance is different from that required for a periodic weather-monitoring task. Thirdly, data traffic in WSN has significant redundancy since data is probably collected by many sensors based on a common phenomenon. Such redundancy needs to be exploited by the routing protocols to improve energy and bandwidth utilization. Fourth, in many of the initial application scenarios, most nodes in WSN were generally stationary after deployment. However, in recent development, sensor nodes are increasingly allowed to move and change their location to monitor mobile events, which results in unpredictable and frequent topological changes [40,41]. Due to such different characteristics, many new protocols have been proposed to solve the routing problems in WSN. These routing mechanisms have taken into consideration the inherent features of WSN, along with the application and architecture requirements. To minimize energy consumption, routing techniques proposed in the literature for WSN employ some well-known ad hoc routing tactics, as well as, tactics special to WSN, such as data aggregation and in-network processing, clustering, different node role assignment and datacentric methods. In the following sections, introduce to current research on routing protocols have been presented.
12
Literature Survey
require actively adjusting transmit powers and signaling rates on the existing links to reduce energy consumption, or rerouting packets through regions of the network where more energy is available. Therefore, multiple levels of redundancy may be needed in a fault-tolerant sensor network. Scalability: The number of sensor nodes deployed in the sensing area may be in the order of hundreds or thousands, or more. Any routing scheme must be able to work with this huge number of sensor nodes. In addition, sensor network routing protocols should be scalable enough to respond to events in the environment. Until an event occurs, most of the sensors can remain in the sleep state, with data from the few remaining sensors providing a coarse quality. Network Dynamics: Most of the network architectures assume that sensor nodes are stationary. How-ever, mobility of both BSs and sensor nodes is sometimes necessary in many applications. Routing messages from or to moving nodes is more challenging since route stability becomes an important issue, besides energy, bandwidth etc. Moreover, the sensed phenomenon can be either dynamic or static depending on the application, e.g., it is dynamic in a target detection/tracking application, while it is static in forest monitoring for early fire prevention. Monitoring static events allows the network to work in a reactive mode, simply generating traffic when reporting. Dynamic events in most applications require periodic reporting and consequently generate significant traffic to be routed to the BS. Transmission Media: In a multi-hop sensor network, communicating nodes are linked by a wireless medium. The traditional problems associated with a wireless channel (e.g., fading, high error rate) may also affect the operation of the sensor network. As the transmission energy varies directly with the square of distance therefore a multi-hop network is suitable for conserving energy. But a multi-hop network raises several issues regarding topology management and media access control. One approach of MAC design for sensor networks is to use CSMA-CA based protocols of IEEE 802.15.4 that conserve more energy compared to contention based protocols like CSMA (e.g. IEEE 802.11). So, Zigbee which is based upon IEEE 802.15.4 LWPAN technology is introduced to meet the challenges. Connectivity: The connectivity of WSN depends on the radio coverage. If there continuously exists a multi-hop connection between any two nodes, the network is connected. The
14
Literature Survey
connectivity is intermittent if WSN is partitioned occasionally, and sporadic if the nodes are only occasionally in the communication range of other nodes. Coverage: The coverage of a WSN node means either sensing coverage or communication coverage. Typically with radio communications, the communication coverage is significantly larger than sensing coverage. For applications, the sensing coverage defines how to reliably guarantee that an event can be detected. The coverage of a network is either sparse, if only parts of the area of interest are covered or dense when the area is almost completely covered. In case of a redundant coverage, multiple sensor nodes are in the same area. Data Aggregation: Sensor nodes usually generate significant redundant data. So, to reduce the number of transmission, similar packets from multiple nodes can be aggregated. Data aggregation is the combination of data from different sources according to a certain aggregation function, e.g., duplicate suppression, minima, maxima and average. It is incorporated in routing protocols to reduce the amount of data coming from various sources and thus to achieve energy efficiency. But it adds to the complexity and makes the incorporation of security techniques in the protocol nearly impossible. Data Reporting Model: Data sensing and reporting in WSNs is dependent on the application and the time criticality of the data reporting. In wireless sensor networks data reporting can be continuous, query-driven or event-driven. The data-delivery model affects the design of network layer, e.g., continuous data reporting generates a huge amount of data therefore, the routing protocol should be aware of data-aggregation Quality of Service: In some applications, data should be delivered within a certain period of time from the moment it is sensed; otherwise the data will be useless. Therefore bounded latency for data delivery is another condition for time-constrained applications. However, in many applications, conservation of energy, which is directly related to network lifetime, is considered relatively more important than the quality of data sent. As the energy gets depleted, the network may be required to reduce the quality of the results in order to reduce the energy dissipation in the nodes and hence lengthen the total network lifetime. Hence, energy-aware routing protocols are required to capture this requirement.
15
Protocol Operation
Network Structure
Literature Survey
2.3.1 The routing protocols for protocol operation
Negotiation based routing: These protocols use high-level data descriptors called metadata in order to eliminate redundant data transmission through negotiations. The necessary decisions are based on available resources and local interactions.
Sensor Protocols for Information via Negotiation (SPIN) [42] is one of well known Negotiation based routing protocol for WSN. The SPIN protocols are designed to disseminate the data of one sensor to all other sensors assuming these sensors are potential base-stations. Hence, the main idea of negotiation based routing in WSN is to suppress duplicate information and prevent redundant data from being sent to the next sensor or the base-station by conducting a series of negotiation messages before the real data transmission begins. Multipath based routing: These protocols offer fault tolerance by having at least one alternate path (from source to sink) and thus, increasing energy consumption and traffic generation. These paths are kept alive by sending periodic messages.
Maximum Lifetime Routing in Wireless Sensor Networks [43] is a protocol that routes data through a path whose nodes have the largest residual energy. The path is switched whenever a better path is discovered. The primary path will be used until its energy is below the energy of the backup path. By means of this approach, the nodes in the primary path will not deplete their energy resources through continual use of the same route, thus achieving longer lifetime. A disadvantage for applications that require mobility on the nodes, is that the protocol is oriented to solve routing problem in static wireless networks.
Hierarchical Power-aware Routing in Sensor Networks [44] protocol enhances the reliability of WSN by using multipath routing. It is useful for delivering data in unreliable environments. The idea is to define many paths from source to sink and send through them the same subpackets. This implies that the traffic will increase significantly (not energy aware), but increasing the reliability of the network. The idea is to split the original data packet into subpackets through each path. This can offer at the end, even with the loss of subpackets, the reconstruction of the original message.
17
Literature Survey
Query based routing: In these protocols, the destination nodes propagate a query for data (sensing task or interest) from the node through the network. The nodes containing this data send it back to the node that has initiated the query. Rumor routing protocol [45] is one of the routing protocol used in the context of event notification. The approach does not flood the network with information about an event occurrence but only installs few paths in the network by sending out one or several agents. The agents propagate through the network installing routing information about the event in each node that is visited. When the agents come across shorter paths or more efficient paths, they optimize the paths in the routing tables accordingly. Each node can also generate an agent in a probabilistic fashion.
Location based routing: In the protocols, the nodes are addressed by their location. Distances to next neighbouring nodes can be estimated by signal strengths or by GPS receivers. Location based routing protocols are: .Small Minimum Energy Communication Network (SMECN) [46] protocol sets up and maintains a minimum energy network for wireless networks by utilizing low power GPS. Although, the protocol assumes a mobile network, it is best applicable to sensor networks, which are not mobile.
Geographic Adaptive Fidelity (GAF) [47] protocol is energy-aware location-based routing designed primarily for mobile ad hoc networks and can be applicable to sensor networks as well. GAF keeps energy by turning off unnecessary nodes in the network without affecting the level of routing fidelity. It forms a virtual grid for the covered area. Each node uses its GPS-indicated location to associate itself with a point in the virtual grid. Nodes associated with the same point on the grid are considered equivalent in terms of the cost of packet routing. Such equivalence is exploited in keeping some nodes located in a particular grid area in sleeping state in order to save energy. Thus, GAF can substantially increase the network lifetime as the number of nodes increase. GAF protocol has both for non-mobility (GAFbasic) and for mobility (GAF-mobility adaptation) of nodes.
Geographic and Energy Aware Routing (GEAR) [48] is the protocol which uses geographic information while disseminating the queries to the areas of interest since data queries often includes geographic attributes. The protocol uses energy aware and geographically informed neighbour selection to route a packet towards the target area. GEAR can complement directed
18
Literature Survey
diffusion by restricting the number of interests sent, and only considering a certain area rather than sending the interests to the whole network. In GEAR, each node keeps an estimated cost and a learning cost of reaching the destination through its neighbours.
A virtual relative position based routing protocol for sensor networks that provides methods for data management is Virtual Cord Protocol (VCP) [49]. VCP is a Distributed Hash Table like protocol that offers an efficient routing mechanism, besides standard DHT functions. The key characteristics of VCP are the geographical vicinity of virtual neighbors, which reduces the communication load, VCP only needs information about direct neighbors for routing, and it cannot be stuck with dead ends. The protocol is easy to be implemented on the top of a typical MAC layer. All data items are associated with numbers in a pre-defined range is captured by the available nodes.
Sequential Assignment Routing [50] proposed was one of the first protocols for WSN that considered QoS issues for routing decisions. The objective of SAR algorithm is to minimize the average weighted QoS metric throughout the lifetime of the network .SAR makes a routing decision based on three factors: energy resources, QoS planned for each path, and the packets traffic type, which is implemented by a priority mechanism. To resolve reliability problems, SAR uses two systems consisting of a multipath approach and localized path restoration done by communicating with neighboring nodes. The multipath tree is defined by avoiding nodes with low-energy or QoS guarantees while taking into account that the root tree is located in the source node and its ends in the sink nodes set. In other words, SAR creates a multipath table whose main objective is to obtain energy efficiency and fault tolerance. Although this ensures fault tolerance and easy recovery, the protocol suffers certain overhead when tables and node states must be maintained or refreshed. This problem increases especially when there are a large number of nodes.
19
Literature Survey
Directed diffusion (DD) [51] is a data-centric and application aware paradigm since all data generated by sensor nodes are named by attribute value pairs. The objective of the directed diffusion paradigm is to aggregate the data coming from different sources by deleting redundancy, which drastically reduces the number of transmissions. This has two main consequences: First, the network saves energy and extends its life. Secondly, it counts on a higher bandwidth in the links near the sink node. The latter factor could be quite persuasive in deciding to provide QoS in real-time applications.
The directed diffusion paradigm is based on a query-driven model, which means that the sink node requests data by broadcasting interests. Requests can originate from humans or systems and are defined as pair values, which describe a task to be done by the network. The interests are then disseminated through the network. This dissemination sets up gradients to create data that will satisfy queries to the requesting node. When the events begin to appear, they start to flow toward the originators of interest along multiple paths. This behavior provides reliability for data transmissions in the network. Another feature of directed diffusion is that it caches network data, generally the attribute-value pairs interests. Caching can increase efficiency, robustness, and the scalability of coordination between sensor nodes, which is the essence of the directed diffusion paradigm. A new energy-aware WSN routing protocol, reliable and energy efficient protocol (REEP) is proposed in [52]. REEP is also a fault tolerant. REEP has been motivated by the existing network layer data-centric routing protocol directed diffusion. REEP makes sensor nodes establish more reliable and energy-efficient paths for data transmission. In addition, the energy conservation heuristic of SPIN-2 has been used to maintain an energy threshold value in each REEP node in order to make the sensor nodes energy-aware. REEP consists of five important elements. These are: sense event, information event, request event, energy threshold value and request priority queue (RPQ). A sense event is a kind of query, which is generated at the sink node and is supported by the sensor network for acquiring information. The response of this query is the information event, which is generated at the source node. It specifies the detected object type and the location information of the source node. After receiving this information, request events are generated at the sink node and are used for path setup to retrieve the real data. The real data in any sensor network are the collected or processed information regarding any physical phenomenon. Each node in REEP uses an energy threshold value by checking which node agrees or denies for
20
Literature Survey
participating in path setup with adequate energy for data transmission. It gives more reliable transmission of any event information or real data. RPQ is a kind of first-in-first-out (FIFO) queue, which is used in each node to track over the sequence of information event reception from different neighbours. It is used to select a neighbour with highest priority in order to request for path setup in case of failed path, without invoking periodic flooding. The authors used four performance metrics like average packet transmission, average data loss ratio, average delay and average energy consumption to analyse and compare the performance of both protocols DD and REEP. The performance of REEP has been found to be superior to directed-diffusion routing protocol. Energy Aware Routing [53] is a reactive protocol to increase the lifetime of the network. This protocol maintains a set of paths instead of maintaining or reinforcing one optimal path. The maintenance and selection depends on a certain probability, which relays on how low the energy consumption of each path can be achieved. The protocol creates routing tables about the paths according to the costs. Localized flooding is performed by the destination node to maintain the paths alive. Hierarchical based routing: It is also known as cluster-based routing. In these protocols, the nodes can play different roles in the network and normally the protocol includes the creation of clusters. Additionally, designations of tasks for the sensor nodes with different characteristics are also performed. Low Energy Adaptive Clustering Hierarchy (LEACH) is one of the most popular clustering algorithms with distributed cluster formation for WSNs [54,55]. The algorithm randomly selects cluster heads and rotates the role to distribute the consumption of energy. LEACH uses TDMA/CDMA MAC to reduce inter-cluster and intra-cluster collisions and data collection is centralized with defined periods. It forms clusters based on the received signal strength and uses the CH nodes as routers to the base-station. All the data processing such as data fusion and aggregation are local to the cluster. LEACH forms clusters by using a distributed algorithm, where nodes make autonomous decisions without any centralized control. Initially a node decides to be a CH with a probability P and broadcasts its decision. Each non-CH node determines its cluster by choosing the CH that can be reached using the least communication energy. The role of being a CH is rotated periodically among the nodes of the cluster in order to balance the load.
21
Literature Survey
The rotation is performed by getting each node to choose a random number T between 0 and 1. A node becomes a CH for the current rotation round if the number is less than the following threshold:
Where P is the desired percentage of CH nodes in the sensor population r is the current round number G is the set of nodes that have not been CHs in the last 1/P rounds. Since the decision to change the CH is probabilistic, there is a good chance that a node with very low energy gets selected as a CH. When this node dies, the whole cell becomes dysfunctional. Also, the CH is assumed to have a long communication range so that the data can reach the base-station from the CH directly. This is not always a realistic assumption since the CHs are regular sensors and the base-station is often not directly reachable to all nodes due to signal propagation problems, e.g., due to the presence of obstacles. LEACH also forms one-hop intra- and inter cluster topology where each node can transmit directly to the CH and thereafter to the base-station. Consequently, it is not applicable to networks deployed in large regions.
The HEED protocol [56,57] is an energy-efficient clustering protocol designed for WSNs. The aim of the algorithm is to prolong the lifetime of a WSN. In HEED cluster-head selection is based on two different parameters. The primary parameter is the residual energy of each node, while the second parameter measures the intracluster communication cost, i.e., the number of neighbours. The idea is to use the primary parameter to perform a probabilistic choice of an initial set of cluster heads, and the second parameter to break ties between them, e.g., when a node is within the range of multiple cluster heads. This is an iterative algorithm in which nodes change their probability of becoming cluster-head CHprob at each iteration. This value is initially set to
22
Literature Survey
is a constant that limits initial cluster-head candidatures is the residual energy of the node is its maximum (initial) energy When nodes elect themselves to become cluster heads, they send an announcement message and then go into tentative_CH status if their CHprob is less than or otherwise into final_CH status. Nodes that receive an announcement consider themselves covered. At each iteration, each uncovered node elects itself as a cluster head with a probability CHprob, then every node doubles its CHprob value. Each node selects the least-cost candidate as its cluster head. Nodes that complete the HEED execution without selecting a cluster head in final_CH status consider themselves uncovered and elect themselves cluster heads with final_CH status. A tentative_CH can also become a non-cluster-head node if it finds a lower-cost cluster head. This algorithm is proved to guarantee a bounded number of iterations before converging. The selection of cluster heads is energy-aware (so it selects better cluster heads than LEACH) and the clusters obtained are balanced. However, HEED requires multiple iterations, so the overhead and power consumption due to network management is greater than in LEACH. Nevertheless, simulation results show that the higher overhead is compensated for by the better cluster-head selection mechanism and the final result is an increased network lifetime. Power-Efficient Gathering in Sensor Information Systems (PEGASIS) [58] protocol is a LEACH-inspired protocol. PEGASIS is not exactly a cluster-based protocol, as nodes are not explicitly grouped into clusters. PEGASIS is instead a chain based approach, in which each node only communicates with a close neighbour and takes turns to transmit to the BS, thus reducing the amount of energy spent per round. This approach distributes the energy load evenly among the sensor nodes in the network. The PEGASIS protocol is designed for a WSN containing homogeneous and energyconstrained nodes, with no mobility. The BS (sink) is fixed and far away from nodes. The radio model adopted is the first-order radio model, same as the LEACH protocol. Using this model, energy efficiency can be improved by minimizing the amount of direct transmissions to the sink node. This idea is common to the LEACH protocol, in which clustering is used to reduce both the duty cycle of the nodes and direct transmissions to the BS. A way in which energy efficiency can be further improved is to decrease the number of nodes that perform long-range direct transmissions. So the basic idea of PEGASIS is to have only one designated node that directly transmits to the BS in each round. This can be achieved with a linear chain23
Literature Survey
based approach, where sensor nodes form a chain, in which gathered data moves from node to node, gets fused, and eventually a designated node will transmit it to the BS. As nodes take turns to transmit to the BS and transmissions are between close neighbours, the average energy spent by each node per round is reduced. Threshold sensitive energy efficient sensor network protocol (TEEN) [59] is a hierarchical protocol. It is useful for time-critical applications in which the network operates in a reactive way. Closer nodes form clusters and elect a cluster head. Each cluster head is responsible for directly sending the data to the sink. After the clusters are formed, the cluster head broadcasts two thresholds to the nodes. These are hard and soft thresholds for sensed attributes. Hard threshold is the minimum possible value of an attribute to trigger a sensor node to switch on its transmitter and transmit to the cluster head. Thus, the hard threshold allows the nodes to transmit only when the sensed attribute is in the range of interest. Hence, the number of transmissions significantly reduced. Once a node senses a value at or beyond the hard threshold, it transmits data only when the value of that attributes changes by an amount equal to or greater than the soft threshold. As a result, soft threshold will further reduce the number of transmissions if there is little or no change in the value of sensed attribute. However, TEEN is not good for applications where periodic reports are needed since the user may not get any data at all if the thresholds are not reached Adaptive Periodic Threshold-sensitive Energy Efficient sensor Network protocol (APTEEN) is an extension to TEEN presented in [60]. The main features of these protocols are that it combines proactive and reactive policies and modification of parameters that allow better control in the cluster heads. Virtual Grid Architecture (VGA) [61] is based on the concept of data aggregation and innetwork processing. This routing paradigm considers an extremely low mobility of sensor nodes. Therefore, this protocol arranges the nodes in a fixed topology forming clusters that are fixed, equal, adjacent and non-overlapping with symmetric shapes. One node per zone is considered as cluster head which is in charge of aggregating and transmitting data. It is possible to implement specific strategies for aggregation of data. Adaptive based routing: In these protocols, the system parameters are controlled to be adapted to the actual network conditions by means of acquired information of the network and negotiation between nodes (e.g. the available energy on the node or QoS of the path).
24
Literature Survey
Adaptive based routing is based on the family of protocols called Sensor Protocols for Information via Negotiation (SPIN) which is described in Negotiation based routing. The SPIN protocols are designed based on two basic ideas: 1. Sensor nodes operate more efficiently and conserve energy by sending metadata instead of sending all the data. 2. Flooding technique wastes energy and bandwidth when sending extra and unnecessary copies of data by sensors covering overlapping areas. The protocols disseminate all the information at each node to every node in the network assuming that all nodes in network are potential base-stations. With this, the user can query any node and get the needed information immediately. The protocols use data negotiation and resource-adaptive algorithms. The nodes assign a high-level name to describe completely their collected data; this is called meta-data. Then are preformed negotiations before any data is transmitted to avoid redundant data to be transmitted. These protocols distribute the information all over the network, even when the user does not request any data. Bio-inspired routing: In recent years insect sensory systems have been inspirational to new communications and computing paradigms, which have lead to significant advances like bio inspired routing [62]. The most popular ACO (Ant Colony Optimization) is a colony of artificial ants is used to construct solutions guided by the pheromone trails and heuristic information they are not strong or very intelligent; but they successfully make the colony a highly organized society. Swarms are useful in many optimization problems. A swarm of agents is used in a stochastic algorithm to obtain near optimum solutions to complex, nonlinear optimization problems [63]. Minimum Ant-based Data Fusion Tree (MADFT) [64] is a sink selection heuristic routing algorithm .It is based on ACO for gathering correlated data in WSN. It first assigns ants to source nodes. Then, the route is constructed by one of the ants in which other ants search the nearest point of previous discovered route. The chosen formula is Probability function composed of pheromones and costs in order to find the minimum total cost path. MADFT not only optimizes over both the transmission and fusion costs, but also adopts ant colony system to achieve the optimal solution.
The Many-to-One-Improved Adaptive Routing protocol [65] is an ant colony-based routing protocol. It is specifically designed to route many-to-one sensory data in a multi-hop WSNs.
25
Literature Survey
Actually, in a many-to-one routing paradigm generates lots of traffic in a multihop WSN
that results in greater energy wastage, higher end-to-end delay and packet loss. So, to mitigate the collision, it comes with a lightweight congestion control algorithm. It has the capability of handling both event- based and periodic upstream sensory data flow to the base station. The protocol works in two-phases. During the first phase, the protocol uses ant
colony optimization and swarm intelligence to find the shortest and the optimal route within a multi-hop WSN. Here, each node is aware of its location and location of its destination. The ant-routing algorithm is used by each forward ant to find the best next-hop neighbour node, closer to itself and closest to the sink using probabilistic theory. The following nodes use the binary exponential back off algorithm to calculate their channel access time. In the second phase, when the actual many to-one sensory data transmission takes place, the protocol combines the knowledge gained during the first phase with the congestion control mechanism to avoid packet loss and traffic while routing the sensory data. The algorithm outperforms in terms of finding shortest path within least amount of time. The algorithm can be extended considering shortest path by not only distance but also residual energy of nodes. Swarm Intelligence Optimization Based Routing Algorithm [66] works with the objective to balance global energy consumption and avoiding some nodes premature energy exhausting. The algorithm chooses the nodes with less pheromone as next hop, taking less hop numbers into consideration. The algorithm is different from traditional ant colony algorithms. It is better than the directed diffusion routing protocol both in end-to-end delay and global energy balance. It can effectively balance the global energy consumption and prolong the network lifetime.
Literature Survey
The main research issue regarding such protocols is how to form the clusters so that the energy consumption and contemporary communication metrics such as latency is optimized. The factors affecting cluster formation and cluster-head communication are open issues for future research. Moreover, the process of data aggregation and fusion among clusters is also an interesting problem to explore. The problem of intelligent utilization of the location information in order to help energy efficient routing is the main research issue. Spatial queries and databases using distributed sensor nodes and interacting with the location-based routing protocol are open issues for further research. Future research issues should focus on security, QoS and node mobility. Routing techniques for WSNs should address application-dependent security issues such as reliability, authentication, confidentiality etc. should be examined. Currently, there is very little research that looks at handling QoS requirements in a very energy constrained environment like sensor networks. QoS routing in sensor networks have been applied to several applications including multimedia applications like video and imaging sensors. It also applied in real-time applications like target tracking in battle environments, emergent event triggering in monitoring applications etc. In applications where sensor nodes are mobile, new routing protocols are needed to handle frequent topology changes and reliable delivery. In the literature, most of the protocols assume that the sensor nodes and the sink are stationary. However, there might be situations such as battle environments where the sink and possibly the sensors need to be mobile. In such cases, the frequent update of the position of the command node and the sensor nodes and the propagation of that information through the network may excessively drain the energy of nodes. New routing algorithms are needed in order to handle the overhead of mobility and topology changes in such energy constrained environment. In the past, many researchers in the WSN field denounced the use of IP as inadequate and in contradiction to the needs of WSNs. Since then the WSN field has matured, standard links have emerged, and IP has evolved. The introduction of 6LoWPANs [67], the concept has changed about WSN. The authors present the design of complete IPv6-based network architecture for WSNs in [68,69]. In future, research for routing protocols includes the integration of WSNs with wired networks (i.e. Internet). It will help applications like security and environmental monitoring, which require the data collected from the sensor nodes to be transmitted to a server so that further analysis can be done and vice versa.
27
Chapter 3
IEEE 802.15.4 Networks- An Overview
3.1 Introduction
The introduction of IEEE 802.15.4 [8] low rate wireless personal area network (LR-WPAN) standard has been implemented for three reasons: the need for low-cost, low-power and shortrange communication. Thus it suits for Wireless Sensor Network applications where a large no of tiny sensors having low power, low range and low bandwidth are deployed in an ad hoc manner for the purpose of Automation, Tracking and Surveillance in terrain regions. The standard defines the channel access mechanism, acknowledged frame delivery, network association and disassociation. The standard supports two Direct Sequence Spread Spectrum (DSSS) PHY layers operating in Industrial, Scientific, Medicine (ISM) frequency bands. A low-band PHY operates in the 868 MHz (megahertz) or 915 MHz frequency band and has a raw data rate of 20 kbps or 40 kbps, respectively. A high-band PHY operating in the 2.4 GHz band specifies a data rate of 250 kbps and has nearly worldwide availability. The 2.4 GHz frequency band has the most potential for large-scale WSN applications, since the high radio data rate reduces frame transmission time and usually also the energy per transmitted and received bit of data. This standard now enjoys extensive silicon support, primarily in the 2.4GHz band [70] . On top of this PHY and MAC layer standard, several proprietary and standards-based sensor network systems emerged. The one with the most vendor and endproduct support is the ZigBee standard.
28
The 868/915 MHz PHY uses a simple DSSS approach in which each transmitted bit is represented by a 15-chip maximum length sequence. Binary data is encoded by multiplying each m-sequence by +1 or -1 and the resulting chip sequence is modulated onto the carrier using binary phase shift keying (BPSK). Differential data encoding is used prior to modulation to allow low-complexity differential coherent reception.
The 2.4 GHz PHY uses a 16-ary quasi-orthogonal modulation technique based on DSSS methods. Binary data is grouped into 4-bit symbols, and each symbol specifies one of sixteen nearly orthogonal 32-chip, pseudo-random noise (PN) sequences for transmission. PN sequences for successive data symbols are concatenated, and the aggregate chip sequence is modulated onto the carrier using, offset-quadrature phase shift keying (OQPSK).The standard specifies the following mandatory multiple PHYs:
PHY (MHz)
868/915
868-868.6 902-928
20 40 250
20 40 62.5
2450
24002483.5
29
Figure 3.1: IEEE 802.15.4 PHY packet structure [71] service data unit (PSDU). The 32-bit preamble is designed for the acquisition of symbol and chip timing, and in some cases may be used for coarse frequency adjustment. Channel equalization is not required for either PHY due to the combination of small coverage area and relatively low chip rates.
Within the PHY header, 7 bits are used to specify the length of the payload (in bytes). This supports packets of length 0127 bytes, although, due to MAC layer overhead, zero-length packets will not occur in practice. Typical packet sizes for home applications such as monitoring and control security, lighting, air conditioning, and other appliances are expected to be of the order of 3060 bytes, while more demanding applications such as interactive games and computer peripherals, or multihop applications with more address overhead, may require larger packet sizes. Adjusting transmission rates in each frequency band, the maximum packet durations are 4.25 ms for the 2.4 GHz band, 26.6 ms for the 915 MHz band, and 53.2 ms for the 868 MHz band.
Turn the radio transceiver into one of the three states, i.e. transmitting, receiving or off (sleeping) according to the request from MAC sublayer. The turnaround time from transmitting to receiving, or vice versa, is less than 12 symbol periods.
30
It is an estimate of the received signal power within the bandwidth of an IEEE 802.15.4 channel. No attempt is made to identify or decode signals on the channel in this procedure. The energy detection time is equal to 8 symbol periods. The result from energy detection can be used by a network layer as part of a channel selection algorithm, or for the purpose of clear channel assessment (CCA).
Link Quality Indication (LQI) for received packets
Link quality indication measurement is performed for each received packet. The Physical layer uses receiver energy detection (ED), a signal-to-noise ratio, or a combination of these to measure the strength and/or quality of a link from which a packet is received. However, the use of LQI result by the network or application layers is not specified in the standard.
Clear Channel Assessment (CCA) for CSMA-CA
The PHY layer is required to perform CCA using energy detection, carrier sense, or a combination of these two. In energy detection mode, the medium is considered busy if any energy above a predefined energy threshold is detected. In carrier sense mode, the medium is considered busy if a signal with the modulation and spreading characteristics of IEEE 802.15.4 is detected. In the combined mode, both conditions aforementioned need to be met in order to conclude that the medium is busy. Channel frequency selection Wireless links under 802.15.4 can operate in 27 different channels (but a specific network can choose to support part of the channels). Hence the PHY layer should be able to tune its transceiver into a certain channel upon receiving the request from MAC sublayer.
Data transmission and reception
This is the essential task of the PHY layer. Modulation and spreading techniques are used in this part. The 2.4 GHz PHY employs a 16-ary quasi-orthogonal modulation technique, in which each four information bits are mapped into a 32-chip pseudo-random noise (PN) sequence. The PN sequences for successive data symbols are then concatenated and modulated onto the carrier using offset quadrature phase shift keying (O-QPSK). The 868/915 MHz PHY employs direct sequence spread spectrum (DSSS) with binary phase shift keying (BPSK) used for chip modulation and differential encoding used for data symbol encoding. Each data symbol is mapped into a 15-chip PN sequence and the
31
implementation cost of the IEEE 802.15.4 standard compliant devices must be low to minimize energy consumption and enable the deployment of these devices on a large scale. To address the needs of its intended applications while enabling the deployment over a large number of monitoring and control devices at reduced implementation cost, the IEEE 802.15.4 MAC-layer specification embeds in its design several unique features for flexible network configurations and low-power operations. These features include [73]: Support for various network topologies and network devices The availability of an optional superframe structure to control the network devices duty cycle Support for direct and indirect data transmissions Contention- and schedule-based media access control methods Beaconed and non beaconed modes of operation Efficient energy management schemes for an extended battery life adaptive sleep for extended period of time over multiple beacons
32
802.2 LLC
SSCS
MAC
PHY
Physical Medium LLC: Logical link Control MAC:Medium access control SSCS:Service Specific convergence sublayer
33
Figure 3.3: Topology supported by IEEE 802.15.4 and ZigBee [74] The first thing this PAN coordinator does is select a unique PAN identifier that is not used by any other network in its radio sphere of influence the region around the device in which its radio can successfully communicate with other radios. In other words, it ensures that the PAN identifier is not used by any other nearby networks.
34
A peer-to-peer network can take different shapes by defining restrictions on the devices that can communicate with each other. If there is no restriction, the peer-to-peer network is known as a mesh topology. Another form of peer-to-peer network is a Clustered-tree topology as shown in Figure 3.3(c). In this case, a PAN coordinator establishes the initial network. Coordinators form the branches and relay the messages. End devices act as leaves of the tree and do not participate in message routing. Coordinator can grow the network beyond the initial network established by the PAN Coordinator.
An IEEE 802.15.4 network, regardless of its topology, is always created by a PAN coordinator. There is only one PAN coordinator in the entire network. A PAN coordinator may need to have long active periods. Therefore, it is usually connected to a main supply. rather than a battery. All other devices are normally battery powered. The smallest possible network includes two devices: a PAN coordinator and a device.
A coordinator can determine whether to work in a beacon enabled mode, in which a superframe structure is used. The superframe is bounded by network beacons and divided into slots of equal size. By default, the number of slots is 16. A coordinator sends out beacons periodically to synchronize the attached devices and for other purposes. A Full Function Device (FFD) that is not the PAN coordinator shall begin transmitting beacon frames only when it has successfully associated with a PAN.
35
A device attached to a coordinator operating in a beacon enabled mode can track the beacons to synchronize with the coordinator. This synchronization is important for data polling, energy saving and detection of orphans. Upper layer may either direct MAC to keep a track of beacons, in which case the device will have to listen to every beacon sent by the coordinator to maintain synchronization.
Supporting Personal Area Network (PAN) association and disassociation
To support self configuration, 802.15.4 embeds association and disassociation functions in its MAC layer. This not only enables a star to be setup automatically, but also allows for the creation of a self-configuring, peer-to-peer network. A coordinator may indicate presence of a PAN by sending periodic beacons. The devices wishing to attach to the PAN listen to these beacons to extract necessary information to connect to the PAN. The device can associate to a PAN after performing a scan which gives the list of available PAN ids to upper layer (SSCS). An unassociated device sends an association request to the selected PAN's coordinator. The PAN coordinator sends back a response depending on availability of resources, using indirect transmission. Disassociation can be initiated either by the PAN coordinator or the device itself. Disassociation is always considered successful.
Employing CSMA-CA mechanism for channel access
Like most other protocols designed for wireless networks, 802.15.4 uses CSMA-CA mechanism for channel access. However, the new standard does not include the Request-ToSend (RTS) and Clear-To-Send (CTS) mechanism, in consideration of the low data rate used in LR-WPANs. Devices will use slotted or unslotted CSMA-CA depending whether the PAN is beacon-enabled or not, respectively. In slotted CSMA-CA channel access
36
When working in a beacon enabled mode, a coordinator can allocate portions of the active superframe to a device. These portions are called GTSs, and comprise the contention free period (CFP) of the superframe. A GTS shall be allocated only by the PAN coordinator and it shall be used only for communications between the PAN coordinator and a device. A single GTS can extend over one or more superframe slots. The PAN coordinator may allocate up to seven GTSs at the same time. The GTS direction is specified as either transmit or receive. A GTS descriptor is specified in the beacon on successful allocation of a GTS.
Direct data transmission
This applies to data transfers from a device to a coordinator, unslotted CSMA-CA or slotted CSMA-CA is used for data transmission, depending whether non-beacon enabled mode or beacon enabled mode is used.
Indirect data transmission
This only applies to data transfer from a coordinator to its devices. In this mode, a data frame is kept in a transaction list by the coordinator, waiting for extraction by the corresponding device. A device can find out if it has a packet pending in the transaction list by checking the beacon frames received from its coordinator. Occasionally, indirect data transmission can also happen in non-beacon enabled mode.
37
Figure 3.4: Data frame format of IEEE 802.15.4 The MAC frame, i.e. the MPDU, is composed of an MAC header (MHR), MAC service data unit (MSDU), and MAC footer (MFR). The first field of the MAC header is the frame control field. It indicates the type of MAC frame being transmitted, specifies the format of the address field, and controls the acknowledgment. In short, the frame control field specifies how the rest of the frame looks and what it contains. A data frame may contain both source and destination information with the size of the address field between 4 and 20 bytes. The payload field is variable in length. However, the maximum MAC data payload (that is the maximum size of the MSDU), aMaxMACFrameSize, is equal to aMaxPHYPacketSize (127 bytes) aMaxFrameOverhead (25 bytes) = 102 bytes . The IEEE 802.15.4 MAC has four
38
Nonbeacon enabled mode: A network in which the PAN coordinator does not transmit beacons is known as a nonbeacon network . A nonbeacon network cannot have GTSs and therefore contentionfree periods because the devices cannot be synchronized with one another. The battery life in a nonbeacon network can be noticeably better than in a beaconenabled network because in a nonbeacon network, the devices wake up less often.
The superframe is defined between two beacon frames and has an active period and an inactive period. The active portion of the superframe structure is composed of three parts.
39
Figure 3.6: IEEE 802.15.4 Superframe structure [72] Beacon: The beacon frame is transmitted at the start of slot 0. It contains the information on the addressing fields, the superframe specification, the GTS fields, the pending address fields and other PAN related. Contention Access Period (CAP): The CAP starts immediately after the beacon frame and ends before the beginning of the CFP, if it exists. Otherwise, the CAP ends at the end of the
40
In contention-based channel access, all the devices that want to transmit in the same frequency channel are made using the Slotted CSMA/CA mechanism and the first one that finds the channel clear starts transmitting. However, the acknowledgement frames and any data that immediately follows the acknowledgement of a data request command are transmitted without contention. If a transmission cannot be completed before the end of the CAP, it must be deferred until the next superframe. Contention Free Period (CFP): In the contention-free method, the PAN coordinator dedicates a specific time slot to a particular device. This is called a guaranteed time slot (GTS). Therefore, a device with an allocated GTS will start transmitting during that GTS without using the CSMA-CA mechanism. To provide a GTS, the PAN coordinator needs to ensure that all the devices in the network are synchronized. The CFP starts immediately after the end of the CAP and must complete before the start of the next beacon frame (if BO equals SO) or the end of the superframe. Transmissions are contention-free since they use reserved time slots (GTS) that must be previously allocated by the ZC or ZR of each cluster. All the GTSs that may be allocated by the Coordinator are located in the CFP and must occupy contiguous slots. The CFP may therefore grow or shrink depending on the total length of all GTSs. In beacon-enabled mode, each Coordinator defines a superframe structure as shown in Figure 3.6 is constructed based on: The Beacon Interval (BI): It defines the time between two consecutive beacon frames. The Superframe Duration (SD): It defines the active portion in the BI, and is divided into 16 equally-sized time slots, during which frame transmissions are allowed. Optionally, an inactive period is defined if BI > SD. During the inactive period (if it exists), all nodes may enter in a sleep mode (to save energy). BI and SD are determined by two parameters, the Beacon Order (BO) and the Superframe Order (SO), respectively,
41
Where, aBaseSuperframeDuration = 960 symbols BO = beacon order SO = superframe order For 250kbps, 2.4 GHz frequency band, aBaseSuperframeDuration = 15.36 ms denotes the minimum duration of the superframe, corresponding to SO=0. Hence, BI and SD may be between 15.36 ms (milliseconds) and 251.7 s (seconds) Low duty cycles can be configured by setting small values of the SO as compared to BO, resulting in greater sleep (inactive) periods..This feature is particularly interesting for WSN applications, where energy consumption and network lifetime are main concerns. Additionally, the Guaranteed Time Slot (GTS) mechanism is quite attractive for timesensitive WSNs, since it is possible to guarantee end-to-end message delay bounds both in Star and Cluster-Tree topologies.
There are two types of CSMA-CA: slotted and unslotted. Slotted CSMA-CA is referred to as performing CSMA-CA while there is a superframe structure in place. The unslotted CSMACA algorithm is used when there is no superframe structure; consequently, no back-off slot alignment is necessary. A nonbeacon-enabled network always uses the unslotted CSMA-CA algorithm for channel access. If the CCA indicates a busy channel, the device will back off for a random period of time and then try again. This random back-off period in both slotted and unslotted CSMA-CA is an integer multiple of the unit back-off period. The unit back-off period is equal to aUnitBackoffPeriod (a MAC constant) symbols. Figure 3.7 provides the flowchart of the CSMA-CA algorithm. In the first step of the algorithm, a decision is made to use either slotted or unslotted CSMA-CA.
For accessing a channel, each node maintains three variables: NB, BE, and CW. NB is the number of times the CSMA-CA algorithm was required to backoff while attempting the current transmission. It is initialized to 0 before every new transmission. BE is the backoff exponent, which defines the number of backoff periods a node should wait before attempting Clear Channel Assessment (CCA). CW is the contention window length, which defines the number of consecutive backoff periods that the channel must be available before starting to transmit [78].
The backoff period length (BOP) is defined as 0.32 ms in the 2.4 GHz band. Default values are BE = 3 and CW = 2. Before transmission, a node locates a backoff period boundary by the received beacon, waits for a random number of backoff periods (0 to 2BE 1) and senses the channel by CCA for CW times. Every time the algorithm faces a busy channel, it backs off for a random period of time.
43
Figure 3.7: Slotted/Un-slotted CSMA-CA Algorithm [77] The slotted CSMA/CA can be summarised in five steps as follows. Step 1 -Initialisation of NB, CW and BE: The number of backoffs and the contention window are initialised (NB = 0 and CW = 2). The backoff exponent is also initialised to BE = 2 or BE = min (2, macMinBE) depending on the value of the Battery Life Extension MAC
44
Network device
Co-ordinator
Network device
Data
Acknowledgement
Acknowledgement
Figure 3.8: Data transfer to a Coordinator in IEEE 802.15.4 :( a) Beacon Enabled and (b) Non beacon Enabled
The data transfer sequence in a nonbeacon-enabled network is shown in Figure 3.8(b). In this scenario, the device transmits the data as soon as the channel is clear. The transmission of an acknowledgment by the PAN coordinator is optional.
46
Coordinator to Device
Co-ordinator Network device
Coordinator to Device
Co-ordinator Network device
Beacon Data request Acknowledgement Data Acknowledgement Data request Acknowledgement Data Acknowledgement
Figure 3.9: Data Transfer from a Coordinator to a device :( a) Beacon Enabled and (b) Nonbeacon Enabled In a nonbeacon-enabled network as shown in Figure 3.9(b), the coordinator needs to wait for the device to request the data. If the device requests the data but there is no data pending for that device, the coordinator sends an acknowledgment message with a specific format that Indicates there is no data pending for that device. Alternatively, the coordinator may send a data message with a zero-length payload.
present. Configurable options will be passed to MAC layer before starting the coordinator.
Starting Device: A device can be started as either a RFD or an FFD. An FFD by default
becomes a coordinator. A coordinator, like PAN coordinator, might be beacon enabled or non-beacon enabled.
Stopping Device: This feature allows a device to be stopped at a given point of time. Starting and Stopping Beacon: A coordinator can change itself from non-beacon mode
to beacon mode or otherwise. It can also change beacon parameters, if originally in beacon mode.
3.5 ZigBee
ZigBee wireless network is based on IEEE 802.15.4 standards, which is aimed for Low Rate Wireless Personal Area networks (LR-WPAN). IEEE 802.15.4 standard focuses on the lower two layers of the protocol stack for defining the basic communication methods for instrument networks but requires much more additional work to produce marketable product. On top of IEEE 802.15.4 radio communication standards, the ZigBee Alliance (an industry consortium of semiconductor manufacturers), other providers, and manufacturing companies provide this additional work. The ZigBee specification is designed to utilize the features supported by IEEE 802.15.4, particularly the low data transmission rate and energy consumption features. It targets control and monitoring applications, where low-power consumption is a key requirement. The candidate applications are wireless sensors, lighting controls, and surveillance. It also targets market areas like residential home control, commercial building control, and industrial plant management.
48
Figure 3.10: ZigBee functional layer architecture and protocol stack and 2.4GHz. The Medium Access Control (MAC) layer is also known as the Data Link Layer. This layer is concerned with the addressing. It determines where the data is going for outgoing data and where the data is coming from for incoming for data. It is also responsible for assembling data packets or frames to be transmitted and decomposing received frames.
The Network (NWK) layer which is right above MAC specified by IEEE 802.15.4 .It is defined by the ZigBee Alliance. It allows devices to communicate with each other. It is involved in the initialization of the device, network self-organization and routing of data and network discovery within the network. ZigBee denotes the network device types differently from IEEE 802.15.4. A PAN coordinator is called a ZigBee coordinator, while coordinators and devices are called ZigBee routers and ZigBee end-devices respectively. The NWK layer supports three network topologies: star, peer-to-peer (mesh), and cluster-tree. In the star topology, communication is controlled by a ZigBee coordinator that operates as a network master, while ZigBee enddevices operate as slaves and communicate only with the ZigBee coordinator. This network is most suitable for delay critical applications, where a large network coverage area is not required.
49
The Application (APS) layer at the top of the stack contains application profiles, defined by ZigBee Alliance contains the applications that run on the network node. This layer determines device relationships and supervises network initiation and association functions. The profiles define which messages are sent over the air, application environment, and the types of utilized devices and clusters. Each ZigBee device should have one or more application profiles, which may consists of ZigBee-specified public profiles and manufacturer-specific private profile. Only the devices equipped with the same application profiles interoperate end-to-end. The manufacturers may still add more features on public profiles and implement additional profiles at the application layer, which live on different endpoints within the device. This allows the creation of manufacturer-specific extensions on the ZigBee. A single node can run up to 240 applications on endpoints.
Security Service Provider (SSP) performs security functions. Security is a major stepping
50
One application of ZigBee is in-home patient monitoring. Consider a patient who is staying at his home but for whom it is important that his physician monitor his heart rate and blood pressure continuously. A patients blood pressure and heart rate can be measured by IEEE 802.15.4 based wearable devices. The patient wears a ZigBee device that interfaces with a sensor that gathers health-related information such as blood pressure on a periodic basis. Then the data is wirelessly transmitted to a local server, such as a personal computer inside the patients home, where initial analysis is performed. Finally, the vital information is sent to the patients nurse or physician via the Internet for further analysis [79]. The 802.15.4 standard uses 128-bit Advanced Encryption Standard (AES) technology to securely transfer data between ZigBee devices and other networks.
Figure 3.11 is a simplified diagram of a remote monitoring system. A patient wears a ZigBee device that interfaces with a sensor, such as a blood pressure sensor, that gathers the information on a periodic basis. Then this information is transmitted to a ZigBee gateway.
Figure 3.11:In-Home Patient monitoring using ZigBee Wireless Networking [77] A ZigBee gateway provides the interface between a ZigBee network and other networks, such as an Internet Protocol (IP) network. The patient information is then transmitted over the Internet to a personal computer that the physician or nurse uses to monitor the patient.
51
Another example of a ZigBee application is monitoring the structural health of large scale buildings. In this application, several ZigBee-enabled wireless sensors (e.g. accelerometers) can be installed in a building and all these sensors can form a single wireless network to gather the information that will be used to evaluate the buildings structural health and detect signs of possible damage. After an earthquake, for example, a building could require inspection before it reopens to the public. The data gathered by the sensors could help expedite and reduce the cost of the inspection.
3.6 Summary: This section described about the IEEE 802.15.4 Physical, MAC and SSCS
layer standard. It also discussed ZigBee protocol stack and its application. Featuring its simplicity, low power consumption, low cost connectivity, and device-level networking will make IEEE 802.15.4 suitable for WSN applications in the practical industry.
52
Chapter 4
Cluster Head Selection for Energy efficiency in WSN using BFO
4.1 Introduction
Evolutionary algorithms are stochastic search methods that mimic the metaphor of natural biological evolution. Evolutionary algorithms operate on a population of potential solutions applying the principle of survival of the fittest to produce better and better approximations to a solution. At each generation, a new set of approximations is created by the process of selecting individuals according to their level of fitness in the problem domain and breeding them together using operators borrowed from natural genetics. This process leads to the evolution of populations of individuals that are better suited to their environment than the individuals that they were created from, just as in natural adaptation [80].
No
Best individuals
Result
Selection
Recombination
Mutation
Figure 4.1: Structure of a single population evolutionary algorithm From the above discussion, it can be seen that evolutionary algorithms differ substantially from more traditional search and optimization methods. The most significant differences are: Evolutionary algorithms search a population of points in parallel, not just a single point. These algorithms do not require derivative information or other auxiliary knowledge; only the objective function and corresponding fitness levels influence the directions of search. Evolutionary algorithms use probabilistic transition rules, not deterministic ones.
54
55
Bacterial Foraging Optimization 4.3 Bacterial Foraging Optimization for cluster head selection
Bacterial Foraging Optimization (BFO) [81] is a population-based numerical optimization algorithm. In recent years, bacterial foraging behaviour has provided rich source of solution in many engineering applications and computational model. It has been applied for solving practical engineering problems like optimal control [81], harmonic estimation [82], channel equalization [83] etc. In this thesis, BFO has been used for cluster head selection to provide improved energy efficiency in routing. This section discusses process of cluster head selection using BFO algorithm. The process of cluster head selection involves application of a clustering algorithm. This has been classically done with LEACH, K-Means and direct method.
Chemotaxis: This process in the control system is achieved through swimming and tumbling via Flagella. Each flagellum is a left-handed helix configured so that as the base of the flagellum (i.e., where it is connected to the cell) rotates counterclockwise, as viewed from the free end of the flagellum looking toward the cell, it produces a force against the bacterium so it pushes the cell. On the other hand, if they rotate clockwise, each flagellum pulls on the cell, and the net effect is that each flagellum operates relatively independently of others, and so the bacterium tumbles about. Therefore, an E. coli bacterium can move in two different ways; it can run (swim for a period of time) or it can tumble, and alternate between these two modes of operation in the entire lifetime. To represent a tumble, a unit length random direction, say ( j ) , is generated; this will be used to define the direction of movement after a tumble. In particular
56
( j 1, k , l )
( j , k , l ) c(i ) ( j )
(4.1)
where
th
elimination and dispersal step. c(i) is the size of the step taken in the random direction
specified by the tumble (run length unit). Swarming: When a group of E. coli cells is placed in the center of a semisolid agar with a single nutrient chemo-effecter (sensor), they move out from the center in a traveling ring of cells by moving up the nutrient gradient created by consumption of the nutrient by the group. Moreover, if high levels of succinate are used as the nutrient, then the cells release the attractant aspartate so that they congregate into groups and, hence, move as concentric patterns of groups with high bacterial density. The spatial order results from outward movement of the ring and the local releases of the attractant; the cells provide an attraction signal to each other so they swarm together. The mathematical representation for swarming can be represented by
S
J cc ( , P( j , k , l )) =
i 1
i J cc ( , i ( j , k , l ))
=
S
( m
m 1
i 2 m ) )]
( m
m 1
i 2 m ) )]
(4.2)
where J cc ( , P ( j , k , l )) is the cost function value to be added to the actual cost function to be minimized to present a time varying cost function, S is the total number of bacteria, P is the number of parameters to be optimized which are present in each bacterium, and
d attarct , wattract , hrepellent , wrepellent are different coefficients that are to be chosen properly.
Reproduction: The least healthy bacteria die and the other healthier bacteria each split into two bacteria, which are placed in the same location. This makes the population of bacteria constant. Elimination and Dispersal: It is possible that in the local environment, the lives of a population of bacteria changes either gradually (e.g., via consumption of nutrients) or
57
58
Start
Y Get sample value of sensor nodes Compute cost function value with swarming for each bacterium as J(b, j ) where b is bacterium number
Yes
No o
l >Ned
Yes
k> Nre
No o
Tumble
oo
59
(i ) (i )
This results in a step of size c(i) in the direction of the tumble for bacterium i.
( j 1, k , l ) = i ( j, k , l ) + c(i) (i )
(i ) (i )
Else, let m= N s this is the end of the while statement. h) Go to next bacterium (i 1) if i
6) If j < N c , go to step 3. In this case, continue chemotaxis, since the life of the bacteria is not over.
i 7) Reproduction: a) For the given k and l, and for each i =1, 2.. S . Let J health =
Nc 1
J (i, j , k , l ) be the health of bacterium i (a measure of how many nutrients it got over its
j 1
lifetime and how successful it was at avoiding noxious substances). Sort bacteria and chemotactic parameters c(i) in order of ascending cost J health (higher cost means lower health).
60
61
prematurely, while large values of N re increase computational complexity. Here, Nre has been taken as 4. It means during simulation E.coli evolve four generations. Elimination and dispersal number N ed : A low value for N ed dictates that the algorithm will not rely on random elimination-dispersal events to try to find favourable regions. A high value increases computational complexity but allows the bacteria to look in more regions to find good nutrient concentrations. Clearly, if probability of elimination and dispersal Ped is large, the algorithm can degrade to random exhaustive search. However, it is chosen appropriately, it can help the algorithm jump out of local optima and into a global optimum. Here, N ed =2 and Ped = 0.1.
i Cell-to-cell attractant functions J cc :
If the attractant width is high and very deep, the cells will have a strong tendency to swarm (they may even avoid going after nutrients and favour swarming). On the other hand, if the attractant width is small and the depth shallow, there will be little tendency to swarm and each cell will search on its own. This parameter has not been used for simulation.
(4.3)
Where ETx (k,d) is the energy dissipated to transmit a k-bit message over distance d ETx- elec (k) is the energy dissipated by transmitter electronics ETx- amp (k,d) is the energy dissipated by amplifier electronics is the constant energy of 50 nJ expended to run the amp and transmitter circuitry For reception, radio expends
elec
(4.5) (4.6)
where ERx- elec is the energy dissipated by receiver electronics Table 4.1 Network parameters for simulations Parameter No of nodes Area 50m50m Desired CH Energy of battery No of bits transmitted in one round From one node Location of base station Eelec Eamp 5% 0.5J 2000 bits [25,-100] 50nJ/bit 100 pJ/bit/ value 100
Figure 4.3 shows the initial nodes distribution in LEACH method. Figure 4.4 shows sensors that are alive (dotted circles) and dead sensors (dots) after 1200 rounds in LEACH algorithm. Position of sensor nodes and formation of cluster head have been shown in Figure 4.5 and Figure 4.6 respectively. Figure 4.7 shows the change of cluster head while executing KMeans algorithm. Figure 4.8 shows the initial position of sensor nodes while Figure 4.9 shows clustering of sensor nodes using BFO.
63
Figure 4.4: Sensors that are alive (dotted circles) and dead sensors (dots) after 1200 simulation rounds
64
65
66
Figure 4.10: Comparison of number of alive nodes of the network system among different algorithms
67
Figure 4.11: Comparison of Total system energy dissipation in the network system among different algorithms
68
4.6 Conclusion
Bacteria based optimization (BFO) based cluster head selection has been presented in this chapter. It is seen that BFO provides better performance than other popular techniques. However, the computational complexity of BFO for applicability to WSNs still remains a challenge.
69
Chapter 5
Quality of Service Evaluation in IEEE 802.15.4 Networks
5.1 Introduction
The term QoS is used in different meanings, ranging from the users perception of the service to a set of connection parameters necessary to achieve particular service quality. ITUT (Recommendation E.800 [ITU-TE.800]) and ETSI [ETSI-ETR003] basically defines Quality of Service (QoS) [84] as the collective effect of service performance which determines the degree of satisfaction of a user of the service. The goal of QoS provisioning is to achieve a more deterministic network behaviour so that information carried by the network can be better delivered and network resources can be better utilized. It is becoming an important service of any communications system. Providing QoS in WSN is a challenging task due to its severe resource constraints in terms of energy, network bandwidth, memory, and CPU cycles. WSNs have also unstable radio ranges, transient connectivity and unidirectional links. So, a new set of QoS parameters, mechanisms and protocols are needed. Energy-efficiency is crucial in WSNs, which require a long network lifetime, data accuracy and the avoidance of maintenance. Moreover, certain service properties such as the delay, reliability, network lifetime, and quality of data may conflict by nature. For example, multipath routing can improve the reliability. However, it can increase the energy consumption and delay due to duplicate transmissions. The high resolution sensor readings may also incur more energy consumptions and delays. Modeling such relationships, measuring the provided quality and providing means to control the balance is essential for QoS support in WSN [85].
71
72
using acknowledgments and error correction. Also, adding redundancy increases reliability as the network is able to recover from the loss of a single packet, but this method increases energy usage. Latency: Latency is the time taken for the network to transfer a packet from a source node to the destination node. For critical messages, networks may need to provide delivery
73
Figure 5.1: AODV Communication signaling from node 1 to node 8 [88] Figure 5.1 shows the process of signals with AODV from node 1 to node 8. To establish a connection, source node 1 searches in its table for a valid route to destination node 8. RREQ reaches the destination for the first time through path 1-2-4-6-8. The destination then issues
77
Figure 5.2 shows an ad-hoc wireless network with eight nodes and a broken link (3-7). Node 1 wants to send a message to the destination, node 8. Node 1 looks at its routing table, finds an expired route to node 8, and then propagates route-request packets to nodes 3 and 2. Node 3 finds no route to the destination and so appends the route record 1-3 to the routerequest packet and forwards it to node 4. On receiving this packet, node 7 finds a route to the destination and so stops propagating any route-request packet and instead sends a route-reply packet to the source. The same happens when a route-request packet reaches the destination node 8 with a route record 1-2-4-6. When the source, node 1, compares all the route-reply packets, it concludes that the best route is 1-2-4-6-8 and establishes this path. Route maintenance in this protocol is fast and simple. In case of a fatal error in the data-link layer, a route-error packet is generated from a failing node. When the route-error packet is received, the failing node is removed from its route cache, and all routes containing that node are truncated. Another route-maintenance signal is the acknowledgment packets sent to verify the correct operation of the route links.
79
82
loads in packets/second
1.5
1 0.5 0 AODV DSR DYMO 0.1 3.278 0.0678 0.011804 0.2 2.42 0.092419 0.012 1 0.0202 0.307 0.02694 5 0.176 1.54 0.238 10 0.699 4.084 1.032 AODV DSR DYMO
loads in packets/second
Figure 5.6: Average end to end delay vs. loads (packets/second) From the figure, it is observed that DYMO, AODV and DSR is lower for a load of one packet per second. Lesser delay is attributed to its source routing mechanism.
85
0.3
0.73 0.72
0.592
1.498 1.482
7.48
7.68 7.41
18.35
19.19 18.31
90.94
65.32 115.38
loads in packets/second
Figure 5.7: Throughput vs. loads (packets/second) Throughput: Figure 5.7 shows performance of throughput (in kbps) vs. loads in packets per second. From the graph, it is observed that maximum throughput is achieved when the load is at 10 packets per second. For DYMO, maximum throughput is 115.63kbps, it shows maximum throughput 115 kps is achieved at high traffic loads i.e. at 10 packets per second by DYMO. DYMO shows better throughput in comparison to AODV and DSR. Better throughput is due to lower average end to end delay as shown in Figure 5.6. In practice, a collision probability is high due to shorter backoff time. In addition, throughput is limited because of to a very short CAP. Thus, this option is suitable only for small and very low data rate networks. While a smaller duty cycle requires less energy, it also decreases available throughput, as there are less transmission opportunities per access cycle. Total energy consumption: The plot for total energy consumption vs. load of three routing protocols is shown in Figure 5.8. The total energy consumption includes energy consumption in transmission, reception, idle and sleep modes of operation. It is noticed that the maximum energy dissipation occurred during idle mode while reception consumes greater energy than transmission for transferring data packets while calculating total energy consumption in our simulation. During sleep time, there is no energy consumption. The total energy consumption of three routing protocols decreases exponentially when it transferred packets from low traffic loads to high traffic loads. Routing protocols have an indirect effect on battery and energy models.
86
loads in packets/second
AODV
DSR DYMO
loads in packets/second
Figure 5.9: Routing overhead vs. loads (packets/second) A routing protocol with more routing overhead would consume more energy than the routing protocol with less routing overhead. Hence, the statistics of energy and battery model could
87
0.5
0.4 0.3 0.2 0.1 0 0.1 0.898 0.34 0.36 0.2 0.5 0.16 0.186 1 0.051 0.047 0.046 5 0.057 0.054 0.056 10 0.089 0.082 0.089 AODV DSR DYMO
loads in packets/second
Figure 5.10: Energy per goodput bit verses loads (packets/second) be different for different routing protocols. The DSR routing protocols performs better than AODV and DYMO at all specified traffic loads due to its low routing overhead which is clear from Figure 5.9. AODV consume more power because routing overhead in AODV is more than DSR and DYMO. Energy per goodput bit: The Figure 5.10 shows performance of energy per goodput bit verses traffic loads. The energy per goodput bit tells how much energy that one node has to consume per one bit of payload data. The result has been obtained by the taking the ratio of total energy consumed in transmission of data to the total bits delivered to the receiver. DSR routing protocol shows least energy per goodput bit in comparison to AODV and DYMO routing protocol. It is due to lower energy consumption and higher packet delivery ratio. The best value of energy per goodput bit is obtained when the load is 1 packet per second for all three routing protocols. Percentage of time in sleep mode: The performance of the percentage of time in sleep
mode vs. loads is shown in Figure 5.11. From the figure, it can be noticed that less than 1 mAhr is required to send data at different traffic loads. The IEEE 802.15.4 supports a
Battery Life Extension (BLE) mode, in which the back-off exponent is limited to the range 02. This greatly reduces the receiver duty cycle in low traffic rate applications.
88
AODV DSR DYMO 0.1 6.31 6.11 6.33 0.2 6.86 5.53 6.59 1 7.4 6.92 6.54 5 11.705 10.99 11.02 10 15.75 14.47 14.94
loads in packets/second
Figure 5.12: Percentage of duty cycle verses loads (packets/second) However, in dense networks, this mode results into excessive collision rates. It is due to energy efficient IEEE 802.15.4 MAC which minimizes low duty cycle on RFD to send data packets.
89
DSR
DYMO 0.1 163.96 0.2 154.65 1 136.45 5 74.4 10 51.26
20
0 AODV DSR DYMO
185.66
179.5
197.85
170.27
144.23
151.5
78.7
78.47
55.8
54.8
loads in packets/second
1199.4
1199.2 1199 1198.8 1198.6 AODV DSR DYMO 0.1 1199.136 1199.237 1199.211 0.2 1199.542 1199.642 1199.584 1 1199.89 1199.896 1199.901 5 1199.944 1199.947 1199.946 10 1199.951 1199.955 1199.954 AODV DSR DYMO
91
92
3.37
1.52
1.678
loads in packets/second
4.04
2.27
Figure 5.18: Average end to end delay vs. loads (packets/second) Average end-to- end delay: Figure 5.18 shows performance of the average end-to- end delay vs. varying traffic loads. The average end- to- end delay of a packet depends on route discovery latency, besides delays at each hop (comprising of queuing, channel access and transmission delays), and the number of hops. At low loads, queuing and channel access delays does not contribute much to the overall delay. The overall average end-to-end delay performance of the DSR is lower than DYMO and AODV. The average end to end delay is lower at traffic of 1 packet per second for all three routing protocols considered. DSR has a significantly low delay due to its source routing, which helps to know the complete path to the destination node for data transferring rather than AODV approach.
Throughput: Figure 5.19 shows performance of the throughput in kbps vs. traffic loads in packets per second. From the graph, it is observed that maximum throughput of 2.3kbps is achieved at a rate of 10 packets per second. DSR shows higher throughput in comparison to AODV and DYMO. Throughput to be maximum, when the average end to end delay is low which can be seen in Figure 5.18.
95
1500
1000 AODV 500 0 AODV DSR DYMO 0.1 10 39 14.5 0.2 24.37 79.33 51.75 1 56.46 374.33 330 loads in packets/second 5 416 1600 758.75 10 590 2372 770 DSR DYMO
Figure 5.20: Total energy consumption vs. loads (packets/second) Total energy consumption: The total energy consumption vs. load for three routing is shown in Figure 5.20. The total energy consumption is the energy consumption in transmission, reception, idle and sleep. The total energy consumption of three routing protocols decreases gradually from lower traffic loads to higher traffic loads.
96
AODV
DSR DYMO
9.2
1.63
0.0289
0.044
0.0622
loads in packets/second
Figure 5.21: Routing overhead vs. loads (packets/second) The total energy consumption in three routing protocols is almost same. However, DSR and DYMO perform better than AODV at all specified traffic loads due to its low routing overhead as shown in Figure 5.21. This is due to the fact that a routing protocol with more routing overhead would consume more energy than the routing protocol with less routing overhead. Energy per goodput bit: Figure 5.22 shows performance of energy per goodput bit vs. traffic loads. The energy per goodput bit is the metric to measure the amount of energy consumed per one bit of payload data. The result has been obtained by the taking the ratio of total energy consumed in transmission of data to the total bits delivered to the receiver. DSR routing protocol shows least energy per goodput bit in comparison to AODV and DYMO routing protocol. It is due to the protocol low energy consumptions and high number of packets received at the destination in DSR. The energy per goodput bit value decreases
when traffic loads is low to high .The best value of energy per goodput bit is obtained when the load is 5 packets per second for all the three routing protocols.
97
150
AODV 100 50 0 AODV DSR DYMO 0.1 320 82 218.7 0.2 138 40.5 62.6 1 68 9.3 10.9 loads in packets per second 5 12.2 3.1 5.95 10 14.6 2.62 6.08 DSR DYMO
2
0 10 13 13.17 12.78 5 12.4 13.14 12.92 1 12 13 12.5 loads in packets/second 0.2 11.32 12.47 11.93 0.1 10.68 12.75 11.3
DSR
DYMO
AODV
DSR DYMO
Figure 5.23: Network lifetime vs. loads (packets/second) Network Lifetime: The Figure 5.23 shows performance of network lifetime vs. traffic loads. Network lifetime calculation in our simulation based on residual battery capacity as shown
98
loads in packets/second
Figure 5.24: Residual battery capacity vs. loads (packets/second) in Figure 5.24 after running it full battery capacity 1200mAHr to the respective simulation time for varying traffic loads. For the mesh topology considered, all nodes are FFD so as to relay data to the nearest radio range devices. They are always on active router device and never goes to sleep mode. Therefore, the network lifetime is lesser in comparison to RFD in star topology. The network lifetime can be increased if end users are assigned as RFD. The DSR routing protocol has maximum lifetime in comparison to ADOV and DYMO. This is due to fact of lower control overhead of DSR. DSR does not use periodic routing messages and conserve the battery power by not sending or receiving any advertisement.
This section evaluated the performance analysis of Quality of Service parameters of WSN based on IEEE 802.15.4 star (beacon enabled) mode and mesh topology (non-beacon enabled mode) topology respectively. Simulations have been performed using reactive MANET routing like AODV, DSR and DYMO in QualNet 4.5 for varying loads. From the simulation results, it can be concluded that on an average DSR performs better than DYMO and AODV for different rates of traffic loads. The simulations are performed for 200 nodes and 20
application per sessions. For mesh topology, maximum of 10 hops were considered because DSR and AODV performance is not better in comparison to DYMO when it encounters a large number of hops. If the payload size goes beyond standard IEEE 802.15.4 MaxMACFrameSize which is equal to 102 bytes, then it simply drop the packet. So, the overall performance of the three protocols on IEEE 802.15.4 for standardizing for WSNs is not promising. The major reason behind the performance degradation is all these protocols are designed mainly for mobile ad-hoc network where topology changes frequently. To meet these challenges of performance degradations, new routing protocols should be designed for IEEE 802.15.4 networks keeping in view of above routing protocols key features.
100
Conclusion
Chapter 6
Conclusion
6.1 Introduction
The research carried out for this thesis, investigates energy efficient clustering algorithms
related to WSNs. A bio-inspired clustering algorithm based on BFO has been proposed. This increases Network life of WSNs. Secondly, quality of service for IEEE 802.15.4 networks has been investigated for star and mesh topology using MANET routing. These chapter summaries the work reported in this thesis, specifying the limitations of the study and provides some suggestions to future work. Following this introduction, section 6.2 lists the achievements of the research work. Section 6.3 provides the limitations in the study and section 6.4 presents some of the future research area that can be extended to this thesis.
Conclusion
simulations had been carried out using MATLAB. Simulation results showed better performance of BFO as compared to other clustering protocols like LEACH, K-Means and direct method in terms of performance metrics like number of alive nodes and total energy dissipation in the system. BFO provides better lifetime for nodes compared to other three methods. It is also seen that BFO is able to provide 100% live nodes for maximum duration. LEACH provides a
considerably higher lifetime compared to K-Means clustering. In addition to reducing energy dissipation, LEACH successfully distributes energy-usage among the nodes in the network such that the nodes die randomly and at essentially the same rate. The second contribution related to Quality of Service (QoS) performance analysis for
IEEE 802.15.4 networks based on star and mesh topology. The performance has been evaluated using simulations for MANET reactive routing protocols like AODV, DSR and DYMO in QualNet 4.5 software. Performance evaluations metrics like packet delivery ratio (PDR), throughput, average end to end delay, energy per goodput bit, network lifetime of battery model and total energy consumption which includes transmission, reception, idle, sleep mode etc. were considered. From the simulation studies and analysis, it can be seen that on an average DSR and DYMO performs better than AODV for different traffic load rates. Hence, it suits most of application of WSNs which require constant monitoring and sending sensed data packets to a sink at regular intervals of time.
The second limitation is that the performances have been compared with standard LEACH algorithm. Performance of other sensor network head selection like PEGASIS, HEED, TEEN etc. have not been considered. The clustering algorithms were simulated in MATLAB [97]; but to get a realistic network performance, it can be simulated in QualNet, NS2 [98], OPNET [99], EXata [100] as well as TinyOS [11] through MICA motes [7].
102
Conclusion
Thirdly, MANET has been designed for highly mobile ad hoc network. Wireless sensor networks nodes can be mix of mobile and stationary nodes depending upon applications. Hence, it is suitable for fixed wireless network can also be analyzed. For QoS study, QualNet simulation has been used. The limitations associated with the software are inherent to the study like hardware resources RAM and CPU to get a realistic simulation of higher number of nodes. The protocols that have analyzed to the investigation were AODV, DSR and DYMO. This has been done due to absence of any standard for 802.15.4.
Secondly, security as a QoS parameter has not been evaluated in this thesis. So, new security based routing protocols for IEEE 802.1 5.4 networks and its validation can be a field of study. Recently, 6LoWPAN standard turns IEEE 802.15.4 networks into the next IP-enabled networks. Low power device can communicate directly with IP devices using IPv6 based protocols. So, future work can be done by developing a 6LoWPAN standard in QualNet and its performance study for next generation networks like body sensor networks (BSN),battle field surveillance system etc.
103
Bibliography
[1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," Communications Magazine,IEEE, vol. 40, pp. 102-114, 2002. [2] I.F.Akyildiz, W.Su, Y. Sankarasubramaniam and E. Cayirci, "Wireless sensor networks: a survey," Computer Networks,Elsevier, vol. 38, pp. 393-422, 2002. [3] Jennifer Yick, Biswanath Mukherjee, Dipak Ghosal, "Wireless sensor network survey," Computer Networks,Elsevier, vol. 52, pp. 2292-2330, 2008. [4] K. Martinez,J.K. Hart, and R. Ong, "Environmental Sensor Networks," Computer Magazine,IEEE, vol. 37, no. 8, pp. 50-56, 2004. [5] D. Culler, D. Estrin, M.Srivastava, "Overview of Sensor Networks," Computer Magazine,IEEE, vol. 37, no. 8, pp. 41-49, August 2004. [6] J. L.Hill, "System architecture for wireless sensor networks," University of California, Berkeley, Ph.D. dissertation 2003. [7] [8] http://www.xbow.com. IEEE Standard 802.15.4, "Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LRWPANs)," 2006. [9] Brian Otis, Jan Rabaey, Ultra-Low Power Wireless Technologies for Sensor Networks.: Springer, 2007. [10] G. Simon, M. Maroti, "Sensor network-based counter sniper system," in Proceedings of the 2nd international conference on Embedded networked sensor systems, Baltimore, MD, 2004, pp. 1-12. [11] http://www.tinyos.net/TinyOS. [12] G. Tolle, D. Culler, W. Hong, et al., "A macroscope in the redwoods," in Proceedings of the 3rd international conference on Embedded networked sensor systems, San Diego, CA, 2005, pp. 51-63. [13] I. Vasilescu, K. Kotay, D. Rus, M. Dunbabin, P. Corke, "Data collection, storage, retrieval with an underwater sensor network," in Proceedings of the Third International Conference on Embedded Networked Sensor Systems (Sensys), San Diego, CA, 2005.
104
[14] P. Zhang, C.M. Sadler, S.A. Lyon, M. Martonosi, "Hardware design experiences in ZebraNet," in Proceedings of the SenSys04, Baltimore, MD, 2004. [15] Welsh, K. Lorincz and M., "Motetrack: A robust, decentralized approach to RF-based location tracking," Personal and Ubiquitous Computing,Springer, vol. 11, pp. 489-503, 2007. [16] http://www.zigbee.org. [17] D.J. Baker, A. Ephremides, "The architectural organization of a mobile radio network via a distributed algorithm," Transactions on Communications,IEEE, vol. 29, no. 11, pp. 1694-1701, 1981. [18] C.R. Lin, M. Gerla, "Adaptive clustering for mobile wireless networks," Journal on Selected Areas Communications,IEEE, vol. 15, no. 7, pp. 1265-1275, 1997. [19] K. Xu, M. Gerla, "A heterogeneous routing protocol based on a new stable clustering scheme," in Proceeding of IEEE Military Communications Conference, vol. 2, Anaheim,CA, 2002, pp. 838-843. [20] C. C. Chiang and M.Gerla, "Routing and Multicast in Multihop Mobile Wireless Networks," in Proceedings of 6th International Conference on Universal Personal Communications, vol. 2, 1997, pp. 546-551. [21] L. Jiang, J. Y. Li, and Y. C. Tay, Cluster Based Routing Protocol, 2004, draft-ietfmanet-dsr-10.txt,work-in-progress. [22] M. Chatterjee, S. K. Das and D. Turgut, "WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks," Cluster computing,Springer Netherlands, vol. 5, pp. 193204, April 2002. [23] J. Y. Yu and P. H. J. Chong, "A survey of clustering schemes for mobile ad hoc networks," Communication Surveys and Tutorials,IEEE, vol. 7, no. 1, pp. 32-48, 2005. [24] B. Atakan, O.B. Akan, and Tuna Tugcu, "Bio-inspired Communications in Wireless," in Guide to Wireless Sensor Networks.: Springer-Verlag London Limited, 2009, ch. 26, pp. 659-687. [25] M. Gunes, U. Sorges, I. Bouazizi, "ARA the ant-colony based routing algorithm for MANETs," in Proceedings of IEEE ICPPW,IEEE Computer Society, Los Alamitos, CA,USA, 2002, pp. 79-85. [26] G.A. Di Caro, M. Dorigo, "AntNet: distributed stigmergetic control for
105
communications networks," Artificial Intelligence, vol. 9, pp. 317-365, 1998. [27] G. Di Caro, F. Ducatelle, L.M. Gambardella, "AntHocNet: an ant-based hybrid routing algorithm for mobile ad hoc networks," Parallel Problem Solving from Nature - PPSN VIII,Springer, pp. 461-470, 2004. [28] R. Muraleedharan, L.A Osadciw, "Balancing the performance of a sensor network using an ant system," in Annual Conference on Information Sciences and Systems, Baltimore, MD, USA, 2003. [29] Y.W Hong, A. Scaglione, "A scalable synchronization protocol for large scale sensor networks and its applications," Selected Areas in Communications,IEEE, vol. 23, pp. 1085-1099, 2005. [30] G.W Allen, G.Tewari, A. Patel, M. Welsh, R. Nagpal, "FireflyInspired Sensor Network Synchronicity with Realistic Radio Effects," Proceedings of the 3rd international conference on Embedded networked sensor systems,SenSys05, pp. 142-153, 2005. [31] I. Carreras, I. Chlamtac, H. Woesner, C. Kiraly, "BIONETS: Bio-inspired next generation networks," Lecture Notes in Computer Science,Springer, vol. 3457, pp. 245252, 2005. [32] F. Dressler, B. Kruger, G. Fuchs, and R. German, "Self-Organization in Sensor Networks using Bio-Inspired Mechanisms," in 18th International Conference on Architecture of Computing Systems,Springer, Innsbruck, Austria, March 2005, pp. 139144. [33] I. Wokoma, L.L. Shum, et al., "A biologically inspired clustering algorithm dependent on spatial data in sensor networks," in Proceedings of the Second European Workshop on Wireless Sensor Networks, 2005, pp. 386-390. [34] S. Chen, "Routing Support for Providing Guaranteed End-to-End Quality-of-Service," University of Illionois , Urbana-Champaign, Ph.D. thesis 1999. [35] S. Chakrabarti and A. Mishra, "QoS Issues in Ad Hoc Wireless Networks," Communication Magazine, vol. 39, pp. 142-148, February 2001. [36] S. Chakrabarti and A. Mishra, "Quality of Service Challenges for Wireless Mobile Ad Hoc Networks," Wireless Communication and Mobile Computing, vol. 4, pp. 129-153, March 2004. [37] J. N. Al-Karaki and A. E.Kamal, "Quality of Service Routing in Mobile Ad Hoc
106
Networks: Current and Future Trends," in Mobile Computing Handbook,CRC., 2004. [38] T.B Reddy, I. Karthigeyan , B.S Manoj,C.S.R Murthy, "Quality of service provisioning in ad hoc wireless networks: a survey of issues and solutions. Ad Hoc Networks," Ad Hoc Networks,Elsevier, vol. 4, pp. 83-124, 2006. [39] R.Tafazolli l. Hanzo, "A survey of QoS routing solutions for mobile ad hoc networks," Communications Surveys & Tutorials, vol. 9, pp. 50-70, 2007. [40] M. Younis K.Akkaya, "A survey on routing protocols for wireless sensor networks," Ad Hoc Networks, vol. 3, no. 3, pp. 325-349, 2005. [41] A.A Mohamed, Y. Abbasi, "A survey on clustering algorithms for wireless sensor networks," Computer communications,Elsevier, vol. 30, pp. 2826- 2841, october 2007. [42] W. Heinzelman, J. Kulik, H. Balakrishnan, "Adaptive protocols for information dissemination in wireless sensor networks," in Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking , Seattle, WA, 1999. [43] J.H. Chang, L. Tassiulas, "Maximum lifetime routing in wireless sensor networks," in Proceedings of the Advanced Telecommunications and Information Distribution Research, College Park, MD, 2000. [44] Q. Li and J. Aslam and D. Rus, "Hierarchical Power-aware Routing in Sensor Networks," in Proceedings of the DIMACS Workshop on Pervasive Networking, 2001. [45] D. Braginsky, D. Estrin, "Rumor routing algorithm for sensor networks," in Proceedings of the First Workshop on Sensor Networks and Applications (WSNA), Atlanta, 2002. [46] L. Li, J. Y Halpern, "Minimum energy mobile wireless networks revisited," in Proceedings of IEEE International Conference on Communications, vol. 1, Helsinki,Finland, June 2001, pp. 278-283. [47] J. Heidemann, D. Estrin Y. Xu, "Geography-informed Energy Conservation for Ad-hoc Routing," in Proceedings of the Seventh Annual ACM/IEEE International Conference on Mobile Computing and Networking, Rome, Italy, July,2001, pp. 70-84. [48] Y. Yu, D. Estrin, and R. Govindan, "Geographical and Energy-Aware Routing: a recursive data dissemination protocol for Wireless Sensor Networks," UCLA Computer Science Department, Technical Report UCLA-CSD TR-01-0023, May 2001.
107
[49] Abdalkarim Awad, Christoph Sommer, Reinhard German and Falko Dressler, "Virtual Cord Protocol (VCP): A flexible DHT-like routing service for sensor networks," in 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2008, pp. 133142. [50] K. Sohrabi, J. Pottie, "Protocols for self-organization of a wireless sensor network," Personal Communications, IEEE, vol. 7, pp. 16-27, 2000. [51] C. Intanagonwiwat, R. Govindan, and D. Estrin, "Directed diffusion: a scalable and robust communication paradigm for sensor networks," in Proceedings of the 6th annual international conference on Mobile computing and networking, 2000, pp. 56-67. [52] F. Zabin, S.Misra,I. Woungang, H.F. Rashvand, N.W. Ma,M. Ahsan Ali, "REEP: datacentric, energy-efficient and reliable routing protocol for wireless sensor networks," IET Communications, vol. 2, no. 8, pp. 995-1008, September 2008. [53] C. Rahul, J. Rabaey, "Energy Aware Routing for Low Energy Ad Hoc Sensor Networks," in Wireless Communications and Networking Conference,IEEE, vol. 1, 2002, pp. 350-355. [54] W.Heinzelman, A.Chandrakasanand and H. Balakrishnan, "Energy-efficient
communication protocol for wireless microsensor networks," in Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, 2000, pp. 3005-3014. [55] W.B. Heinzelman, A.P. Chandrakasan, H. Balakrishnan, "Application specific protocol architecture for wireless microsensor networks," Wireless Communications,IEEE, vol. 1, pp. 660-670, october 2002. [56] O.Younis and S. Fahmy, "Distributed Clustering for Scalable, Long-Lived Sensor Networks," Mobile Computing,IEEE, vol. 3, no. 4, pp. 366-379, 2004. [57] Richard Zurawski, NETWORKED EMBEDDED SYSTEMS.: CRC Press, 2009. [58] S. Lindesy and C. Raghavendra, "PEGASIS: Power-Efficient Gathering in Sensor Information System," in Proceedings of the Aerospace Conference,IEEE, vol. 3, Big Sky, Montana, 2002, pp. 9-16. [59] A. Manjeshwar and D. Agrawal, "TEEN: a Routing Protocol for Enhanced Efficient in Wireless Sensor Networks," in Proceedings of the 15th International Parallel and Distributed Processing Symposium, San Francisco, April 2001, pp. 2009-2015.
108
[60] A. Manjeshwar, D.P. Agrawal, "APTEEN: a hybrid protocol for efficient routing and comprehensive information retrieval in wireless sensor networks," in Proceedings of the 2nd International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile computing, Ft. Lauderdale, FL, April 2002. [61] J. N. Al-Karaki, Raza Ul-Mustafa, Ahmed E. Kamal, "Data Aggregation in Wireless Sensor Networks - Exact and Approximate Algorithms," in Proceedings of IEEE Workshop on High Performance Switching and Routing (HPSR), Phoenix, Arizona, USA, 2004, pp. 241-245. [62] A.W. Krings Z. (Sam) Ma, "Bio-Inspired Computing and Communication in Wireless Ad Hoc and Sensor Networks," Ad Hoc Networks,Elsevier, vol. 7, no. 4, pp. 742-755 , June 2009. [63] S. Selvakennedy, S. Sinnappan, Yi Shang, "A biologically-inspired clustering protocol for wireless sensor networks," Computer Communications,Elsevier, vol. 30, pp. 27862801, 2007. [64] Luo Juan and Song Chen and Zhou Chao, "Ant System Based Anycast Routing in Wireless Sensor Networks," in International Conference on Wireless Communications, Networking and Mobile Computing, 2007, pp. 2420-2423. [65] Reza GhasemAghaei, ASM Mahfujur Rahman, Md. Abdur Rahman, "Ant ColonyBased Many-to-One Sensory Data Routing in Wireless Sensor Networks," in proceedings of International Conference on Computer Systems,AICCSA 2008. IEEE/ACS, April 2008, pp. 1005-1010. [66] Chao Wang and Qiang Lin, "Swarm intelligence optimization based routing algorithm for Wireless Sensor Networks," in proceedings of International Conference on Neural Networks and Signal Processing, 2008, pp. 136-141. [67] G. Montenegro, N. Kushalnagar, J. Hui, and D.Culler, "IPv6 over low-power wireless personal area networks (6LoWPANs):Overview, assumptions, problem statement, and goals," RFC 4919, 2007. [68] J. W. Hui and D. E. Culler, "IP is dead, long live IP for wireless sensor networks," in Proceedings of the 6th ACM conference on Embedded network sensor systems,ACM, 2008, pp. 15-28. [69] J.W Hui , D.E Culler, "Extending IP to Low-Power, Wireless Personal Area Networks," Internet computing, IEEE, vol. 12, pp. 37-45, 2008.
109
[70] Andrew Wheeler, "Commercial Applications of Wireless Sensor Networks Using Zigbee," Communication Magazine, IEEE, vol. 45, pp. 70-77, April 2007. [71] K. Sohraby, D. Minoli, T. Znati, WIRELESS SENSOR NETWORKS-Technology, Protocols, and Applications.: Wiley-interscience, 2007. [72] J. Zheng and M.J. Lee, "A Comprehensive Performance Study of 802.15.4," in Sensor Network Operations.: IEEE Press, 2006, ch. 4, pp. 218-237. [73] H. Karl, A. Willig, Protocols and Architectures for Wireless Sensor Networks. New York: John-Wiley, 2007. [74] Mauri Kuorilehto, Mikko Kohvakka, Ultra-Low Energy Wireless Sensor Networks in Practice Theory, Realization and Deployment. England: John-Wiley, 2007. [75] www.scalablenetworks.com/QualNet/documentation. [76] Vijay K. Garg, Wireless Communications and Networking. USA: Elsevier, 2008. [77] Shahin Farahani, ZigBee Wireless Networks and Transceivers.: Elsevier, 2008. [78] Nitaigour P. Mahalik, Sensor Networks and Configuration Fundamentals, Standards, Platforms, and Applications.: Springer, 2007. [79] S. Dagtas, "Multi-stage Real Time Health Monitoring via ZigBee in Smart Homes," in proceedings of IEEE International Conference on Advanced Information Networking and Applications Workshops (AINAW), 2007, pp. 82-86. [80] http://www.geatbx.com/docu/algindex-01.html. [81] K. M. Passino, "Biomimicry of bacterial foraging for distributed optimization and control," Control System Magazine,IEEE, vol. 22, pp. 52-67, June 2002. [82] S. Mishra, "A Hybrid Least Square-Fuzzy Bacterial Foraging Strategy for Harmonic Estimation," IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, vol. 9, no. 1, pp. 61-73, February 2005. [83] Babita Majhi and G. Panda and A. Choubey, "On the Development of a New Adaptive Channel Equalizer using Bacterial Foraging Optimization Technique," in Annual IEEE india conference, 2006, pp. 1-6. [84] Mario Marchese, QoS over heterogeneous networks.: John &Wiley sons Limited, 2007. [85] S. Misra, S. C. Misra, I. Woungang, Guide to Wireless Sensor Networks.: Springer, 2009. [86] Dazhi Chen, Pramod K. Varshney, "QoS Support in Wireless Sensor Networks: A
110
Survey," in Proceedings of the International Conference on Wireless Networks, vol. 1, Las Vegas, Nevada, USA, 2004, pp. 227-233. [87] C.Perkins, E.Belding-Royer and S.Das, "Ad Hoc On-demand Distance Vector Routing (AODV)," IETF RFC 3561, July 2008. [88] Nader F. Mir, Computer and Communication Networks.: Prentice Hall, November 02, 2006. [89] D.B.Johnson, D.A. Maltz, Y. Hu, and J. G. Jetcheva, "The Dynamic Source routing protocol for Mobile Ad Hoc Networks (DSR)," IETF RFC 4728, February 2007. [90] I.Chakeres, C.Perkins, "Dynamic MANET On-demand (DYMO) Routing protocols for Mobile Ad Hoc Networks(DYMO)," draft- ietf-manet-dymo-09 November 2007. [91] G. Lu, B. Krishnamachari, and C. S. Raghavendra, "Performance evaluation of the IEEE 802.15.4 MAC for low-rate low power wireless networks," in Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, Phoenix, Ariz, USA, April 2004, pp. 701-706. [92] J.S. Lee, "Performance evaluation of IEEE 802.15.4 for low-rate wireless personal area networks," IEEE Transactions on Consumer Electronics, vol. 52, no. 3, pp. 742- 749, August 2006. [93] W.T.H Woon, T.C. Wan, "Performance Evaluation of IEEE 802.15.4 Ad Hoc Wireless Sensor Networks: Simulation Approach," in IEEE International Conference on Systems, Man and Cybernetics, vol. 2, october 2006, pp. 1443-1448. [94] C. Buratti and R.Verdone, "A Mathematical Model for Performance Analysis of IEEE 802.15. 4 Non-Beacon Enabled mode," in European Wireless Conference , June 2009, pp. 1- 7. [95] Jose Javier Garcia, Thomas Falck, "Quality of Service for IEEE 802.15.4-based Wireless Body Sensor Networks," in Proceedings of 3rd International Conference on Pervasive Computing Technologies for Healthcare, UK,London, April 2009, pp. 1-6. [96] www.scalable-networls.com/QualNet. [97] http://www.mathworks.com/. [98] http://www.isi.edu/nsnam/ns/. [99] http://www.opnet.com/. [100] http://www.scalable-networks.com/EXata.
111
Publication [1] S.Mohanty and S.K.Patra, Performance analysis of Quality of Service Parameters for
IEEE 802.15.4 Star Topology using MANET routing, in Proceedings of the 1st ACM International Conference on Wireless and Workshop on Emerging trends in Technology, Mumbai, India, 2010, Pages-115-120. [2] S.Mohanty and S.K. Patra, Quality of Service analysis in IEEE 802.15.4 Mesh Topology using MANET routing, in Proceeding of 2nd IEEE International Conference on Computing, Communication and Networking Technologies, Karur, India (ICCCNT10). [3] S.Mohanty and S.K.Patra, A novel Bio-inspired Clustering algorithm for Wireless Sensor Networks, accepted in 3rd International Conference on Intelligent and Advanced Systems, Kuala Lumpur, Malaysia (ICIAS 2010). [4] S.Mohanty and S.K. Patra, Quality of Service analysis in IEEE 802.15.4 Mesh Topology using MANET routing, accepted in International Journal of Technology and Engineering System (IJTES), vol.1, no.2, Jan June 2010.
112