Sie sind auf Seite 1von 78

PERFORMANCE COMPARISON OF ROUTING

PROTOCOL BY DEPLOYING ZIGBEE AS


WIRELESS SENSOR NETWORK.

REHAN BABAR
2014-MS-EE-T-04

SUPERVISOR
DR.MUHAMMAD ABRAR

DEPARTMENT OF ELECTRICAL ENGINEERING


UNIVERISTY COLLEGE OF ENGINEERING & TECHNOLOGY,
BAHAUDDIN ZAKARIYA UNIVERSITY, MULTAN

i
PERFORMANCE COMPARISON OF ROUTING
PROTOCOL BY DEPLOYING ZIGBEE AS
WIRELESS SENSOR NETWORK.

A thesis presented in partial fulfillment of the requirements for the degree of

Master of Science

In

Electrical Engineering

at

Department of Electrical Engineering


University College of Engineering & Technology
Bahauddin Zakariya University, Multan

_________________________ ______________________
Internal Examiner External Examiner

_______________________________
Chairman/HoD/Senior Most Teacher

ii
DECLARATION BY SUPERVISOR

“I hereby declare that I have read this thesis and in my opinion this thesis is sufficient in terms of
scope and quality for the award of the Master Degree in Electrical Engineering”

Signature: ……………………………….

Name: DR.MUHAMMAD ABRAR

Date: ……………………………….

iii
DECLARATION BY STUDENT

I declare that this thesis entitled “PERFORMANCECOMPARISION OF ROUTING


PROTOCOL BY DEPLOYING ZIGBEE AS WIRELESS SENSOR NETWORK” is the
result of my own research except as cited in the reference. This thesis has not been accepted for
any degree and is not concurrently submitted in candidature any other degree.

Signature: ……………………………….

Name: REHAN BABAR

Date: ……………………………….

iv
Abstract

Wireless Sensor Network (WSN) has widely been deployed in different fields.WSN comprises
of a number of nodes, which are meant to assemble and allocate information. The information
processed by WSN can include a certain physical or ecological change. The use of WSN is
associated with many challenges such as error free information, rapid transference of information
and precision of information. In the present research work, evaluation of mobile ad-hoc network
is conducted through utilization of different routing protocols.Moreover, a topology regarding
the used protocols will be illustrated. The primary focus will be on Ad hoc On-demand Distance
Vector(AODV) and Dynamic Source Routing (DSR). The end to end delay, through-put and
network load will be analyzed to depict the performance of AODV andDSR.In case to enhance
the life span of network, ZIGBEE will be used. ZIGBEE is power and cost effective
device,which have use in personal area network. Consequently, network performance will be
discussed in terms of ZIGBEE implementation. At the end, a comparison of simple sensor node
will be made with ZIGBEE.

v
Dedication

I would like to dedicate this research


work to my family my younger
brother who support me always
morally & spiritually especially my
respected parents for their
continuous support, guidance and
being there for myself throughout
my life.

vi
ACKNOWLEDGMENT

I am thankful to ALLAH ALMIGHTY who showered me with his blessings, friends colleages
and everyone who has helped me through out this thesis period by both morally and spiritually.
special thanks to my supervisor Sir Dr.Muhammad Abrar for his guidelines , hard work &
tolerance during thesis research period.Sir, without your help the completion of this thesis was
not possible so bundle of thanks to you for your help. I further want to thanks to my parents and
all my respected teachers for their continous support and help to me for completion my
thesis.Once again speacial thanks to Sir Dr.Muhammad Abrar for his constant support.I would
like to thanks the “University College of Engineering & Technology BZU, Multan” for
providing me such an environment that helps me in my professional & academic grooming.

Rehan Babar

vii
TABLE OF CONTENTS
Abstract ...................................................................................................................................... v

Dedications ................................................................................................................................ vi

Acknowledgement .................................................................................................................... vii

List of Acronyms ....................................................................................................................... xi

List of Figures .......................................................................................................................... xii

List of Tables ........................................................................................................................... xiv

Chapter 1 ..................................................................................................................................... 1

1.1 Introduction ...................................................................................................................... 1


1.2 Background ...................................................................................................................... 2
1.3. Applications ......................................................................................................................... 2
1.4 Problem Definition ................................................................................................................ 2
1.5 Literature Review .................................................................................................................. 3
1.6 Thesis layout ......................................................................................................................... 4
2.1 Types Of MANET .............................................................................................................. 6
2.2. Features of MANET ............................................................................................................ 7
2.3. Sensor Node Architecture ................................................................................................... 7
2.3.1 Communication Devices .............................................................................................................. 7
2.3.2 Memory ....................................................................................................................................... 7
2.3.3 Controller ................................................................................................................................... 7
2.3.4 Power ......................................................................................................................................... 8
2.4. Architecture Of MANET ..................................................................................................... 8
2.5. WSN Vs MANET .............................................................................................................. 8
2.6.Challenges In Mobile Ad-Hoc Network(MANET) .............................................................. 9
2.7.Applications Of Mobile Ad-Hoc Network ............................................................................ 9
3.1. Introduction ....................................................................................................................... 11
3.2 Specifications ..................................................................................................................... 11
3.3 Zigbee Vs Bluetooth.......................................................................................................... 11
3.4 Zigbee Vs Wifi .................................................................................................................. 13
3.5 Interoperability .................................................................................................................... 14

viii
3.6 Zigbee Device Types .......................................................................................................... 14
Following are the types of ZIGBEE devices :........................................................................... 14
3.6.1 Zigbee Planner .......................................................................................................................... 14
3.6.2 Zigbee Router............................................................................................................................. 14
3.6.3 Zigbee Conclusion Devices ....................................................................................................... 15
3.7 Zigbee Networking Protocol & Layers ............................................................................... 16
3.7.1 Physical Layer ............................................................................................................................ 17
3.7.2 Mac Layer ............................................................................................................................... 18
3.7.3 Network Layer ........................................................................................................................ 19
3.7.4 Application Layer .................................................................................................................... 20
3.8. Network Topologies For Zigbee ...................................................................................... 21
3.8.1 Star Topology............................................................................................................................ 21
3.8.2 Zigbee Tree Topology ................................................................................................................ 21
3.8.3 Zigbee Mesh Topology ............................................................................................................. 22
3.9 Applications ........................................................................................................................ 22
4.1.Classification of Routing Protocols..................................................................................... 24
4.1.1 Based On Path Establishments ................................................................................................. 25
4.1.2 Based On Network Structure ..................................................................................................... 26
4.1.3 Based on operation ................................................................................................................... 27
4.1.4 Based On Initiator ...................................................................................................................... 28
4.2 Sensor Protocol For Information Via Negotiation (SPIN) .................................................. 28
4.3 Rumor Routing .................................................................................................................... 29
4.4 Directed Diffusion .............................................................................................................. 30
4.5 Low Energy Adaptive Clustering Hierarchy (LEACH) ...................................................... 30
4.6 Ad-Hoc on Demand Distance Vector(AODV) .............................................................. 31
4.7. Dynamic Source Routing(DSR) ......................................................................................... 35
Simulations and Results .............................................................................................................................. 41
5.1. OPNETTool ....................................................................................................................... 41
5.1.1 OPNET Network Editor ........................................................................................................... 42
5.1.2 Process Editor ......................................................................................................................... 42
5.1.3 Node Editor .............................................................................................................................. 43
5.2. End To End Delay .............................................................................................................. 44
5.3. Network Through Put ......................................................................................................... 45

ix
5.4. Using OPNETAodv Deploy On 10 Nodes ......................................................................... 45
5.5. Using OPNET AODV Deploy On 15 Nodes ..................................................................... 47
5.6. Using OPNET AODV Deploy On 20 Nodes .................................................................... 48
5.7. Using OPNET DSR Deploy on 10 Nodes .......................................................................... 49
5.8. Using OPNET DSR Deploy On 15 Nodes ........................................................................ 51
5.9. Using OPNET DSR Deploy on 20 Nodes .......................................................................... 52
5.10. ZIGBEE ............................................................................................................................ 53
The current chapter discusses Routing protocols and their performance& conclusion. ........... 56
6.1 Routing Protocols and their Performance ...................................................................... 57
6.2 ZIGBEE Nodes-applicability .............................................................................................. 59
6.3 Observations and Future work ............................................................................................ 60
References…………………………………………………………………………………………………………………………………………….61

x
LIST OF ACRONYMS

AODV Ad hoc On Demand Distance Vector


DD Directed Diffusion

DSR Dynamic Source Routing

LEACH Low Energy Adaptive Clustering Hierarchy

MANET Mobile Ad Hoc Network

OLSR OptimizWed Link State Routing

OPNETW Optimized Netfwork Engineering Tool

QOS Quality Of Service

RREQ Route Request

RREP Route Reply

RR Rumor Routing

SPIN Sensor Protocol for Information Via Negotiation

SANET Static Ad Hoc Network

WSN Wireless Sensor Network

WLAN Wireless Local Area Network

xi
List Of Figures
Figure 1.1: Components of Wireless Sensor Network .................................................................................. 1
Figure 2.1: MANET ...................................................................................................................................... 6
Figure 2.2: MANET Node Interfaces ........................................................................................................... 8
Figure 3.2: ZIGBEE Vs WIFI ..................................................................................................................... 13
Figure 3.3: Network of ZIGBEE................................................................................................................. 15
Figure-3.4: ZIGBEE Devices...................................................................................................................... 16
Figure-3.5: ZIGBEE Layers........................................................................................................................ 17
Figure-3.6: Physical Layer Header ............................................................................................................. 17
Figure-3.7: Mac Layer Header .................................................................................................................... 18
Figure-3.10: Star Topology Zigbee ............................................................................................................. 21
Figure-3.11: ZIGBEE Tree Topology ......................................................................................................... 22
Figure-4.1: Categorization of Routing Protocols ....................................................................................... 25
Figure-4.2: Spin Routing Protocol .............................................................................................................. 29
Figure-4.3: Rumor Routing ....................................................................................................................... 30
Figure-4.5: AODV Step- 1 .......................................................................................................................... 32
Figure-4.6: AODV Step- 2 .......................................................................................................................... 33
Figure-4.7: AODV Step- 3 .......................................................................................................................... 33
Figure-4.8: AODV Step- 4 .......................................................................................................................... 34
Figure-4.9: AODV Step- 5 .......................................................................................................................... 34
Figure-4.10: AODV Step-6 ......................................................................................................................... 34
Figure-4.11: DSR Step- 1 ........................................................................................................................... 35
Figure-4.12: DSR Step- 2 ........................................................................................................................... 36
Figure-4.13: DSR Step- 3 ........................................................................................................................... 36
Figure-4.14: DSR Step- 4 ........................................................................................................................... 37
Figure-4.15: DSR Step- 5 ........................................................................................................................... 37
Figure-4.16: DSR Step- 6 ........................................................................................................................... 38
Figure-4.17: DSR Step- 7 ........................................................................................................................... 38
Figure-4.18: DSR Step- 8 ........................................................................................................................... 39
Figure-5.1: Working model of OPNET ...................................................................................................... 41
Figure-5.2:Network Editor ....................................................................................................................... 42
Figure-5.3: Process Editor .......................................................................................................................... 43

i
Figure-5.4: Node Editor .............................................................................................................................. 44
Figure-5.5: Deploying AODV on 10 Nodes. .............................................................................................. 45
Figure-5.6: Features of AODV Deploying with 10 Nodes. ........................................................................ 46
Figure-5.7:Deploying AODV on 15 Nodes............................................................................................ 47
Figure-5.8: AODV Shows with 15 Nodes. ................................................................................................. 47
Figure-5.10: AODV Shows with 20 Nodes. ............................................................................................... 48
Figure-5.11: Deploying DSR on 10 Nodes. ................................................................................................ 49
Figure-5.12:DSR Response 10 Nodes. ................................................................................................... 50
Figure-5.13: Deploying DSR on 15 Nodes. ............................................................................................... 51
Figure-5.14: DSR Response 15 Nodes. ..................................................................................................... 51
Figure-5.17: ZIGBEE Network................................................................................................................... 53
Figure-5.18:Response Show Network Through-Put Of ZIGBEE ...................................................... 54
Figure-5.19:ZIGBEE Network End To End Delay Curve. ......................................................................... 55

ii
List of Tables
Table 4.1: Difference between Proactive and Reactive Routing Protocol…………………..…………………………26
Table 6.1: Composite Performance Analysis of Routing Protocols………………………………………………………..58

iii
CHAPTER 1

INTRODUCTION

This Chapter contains the literature related to Wireless Sensor Network (WSN). WSN comprises
regarding hundreds of nodes that are connected to sensors.The purpose of these nodes is to
collect information, which can be physical or environmental, and deliver it to the source.

iv
1.1 Introduction

This Chapter contains the literature related to Wireless Sensor Network (WSN). WSN comprises
regarding hundreds of nodes that are connected to sensors. The purpose of these nodes is to
collect information, which can be physical or environmental, and deliver it to the source [1].
There are five constituents of a sensor node, including memory, controller, sensors/actuators,
communication device and power supply as depicted in Figure 1.1.

Memory

Communication Sensors/
Device
Controller
Actuators

Power Supply

Figure 1.1: Components of Wireless Sensor Network

The component of memory is meant to store information, whereas, the purpose of controller is to
manipulate the transmission of information. The communication devices help in the
transmittance of information from nodes to the source. The sensors or actuators act as sensing
devices in complete set up, whereas, the power supply has function to give power to the nodes.

A sensory network comprises of sensor nodes, gate ways and software. The information
is collected by sensor node and transferred to the gate ways. From the gateways, information is
transmitted to source system, which further analyzes and manipulates the information with the
help of software.

1
1.2 Background

A Mobile Ad-Hoc Network (MANET) entails interconnected wireless nodes that can move in all
directions. They are able to follow any satellite or WIFI connection. The two types of MANET
includes infrastructural and infrastructural-less. In the infrastructural category, data is transmitted
and received with the help of infrastructure, whereas, in the infrastructural-less category, there
are limitations imparted on power, bandwidth and quality. However, the network belonging to
second category is more cost effective.

1.3. Applications

WSN has many applications including disaster relief operations, acoustic detection, biodiversity
mapping, habitat monitoring,development of improved buildings and bridges, machine
surveillance, agricultural precision, military surveillance, medicinal and health care
applications,water quality monitoring [2], process monitoring, industrial monitoring, inventory
tracking, ground and underwater coverage, indoor and outdoor coverage [3].

1.4 Problem Definition

Owing to wide applicability of the WSN, remains expected towards be utilized in various fields
and industries.The present study aims to develop different setups of wireless sensor nodes. These
setups will perceive, manipulate information over network and transmit it to the source. The
performance of the WSN will be analyzed with the help of through put, sent and received
packets,end to end delay. The network will be scaled and its impact on the network performance
will be checked.

Although there are various applications of wireless sensor networks, it has some limitations in
relations regarding bandwidth, remembrance, Central Processing Unit (CPU), and power. Power
consumption stands crucial feature at some places of WSN application. In such cases, a sensor
network is recommendable due to long durability. At some places, less data rate and simple setup
is required. In such cases, ZIGBEE can be used as it is more cost effective with a physical range
of 10-20 m and a data rate of 250 Kbit/s.

2
A WSN may have its own routing protocols because less power and small sizes of WSN confines
the applicability of traditional routing protocols for them. In the present study the performance of
WSN is analyzed with the help of Ad-hoc On Demand Distance Vector (AODV) also Dynamic
Source Routing (DSR) [4]. Comparative study regarding AODV and DSR protocols will be
conducted on the basis of varying scenarios and scalability factors. This approach will help to
determine better routing protocol based on the variation in applications.

1.5 Literature Review

The WSN comprises of interconnected and distributed nodes, which receive and transmit
information to the source. This information may vary in accordance with the application. It may
be a physical or environmental change. Due to its high applicability, the interest in studying
WSN and enhancing its benefits has tremendously increased in the previous few years. In a
conventional setup, each node consists of memory, control unit and power. As WSN are small
sizes and have power limitations, traditional routing protocols cannot be used for them. On the
basis of various factors such as communication initiators and network structure, WSN has its
own specific routing protocols [5].

In the present study, OPNET modular is used. OPNET refers to computer software which is used
to simulate networks of communication. The main advantages of OPNET are its user friendliness
and easy to use. It has many applications including aid in configuration of network and defining
the protocols. The OPNET allows the use to create any network scenario with the use of just drag
drop devices.

Previous research has focused on routing protocols of WSN. Some researchers have used
OPNET simulator along with the WSN. AODV and DSR have also been studied for their
applicability with WSN [6]. According to previous researches, AODV has greater through put,
whereas, DSR has lower end to end delay. On the other hand, ZIBGEE has been claimed to be
useful for low data rates and short ranges. It has long durability due to less power usage. It is
highly used as a communication protocol.

3
1.6 Thesis layout

This research work is comprised of followingchapters.

The first chapter includes an introduction of WSN, problem definition, and brief literature
review.

The second chapter consists of explanatory notes on WIFI and MANET, node architecture,
network architecture.

The third chapter consists of details about ZIGBEE technology.

The fourth chapter is comprised of details about different routing protocols of WSN.

The fifth chapter is comprised of simulation results with the implementation of routing protocols
AODV and DSR, followed by conclusions and recommendations.

4
CHAPTER 2

MOBILE AD-HOC NETWOK (MANET)

This Chapter contains the literature related to MANET comprises of interconnected wireless
nodes, which acts on the basis of point to point communication. Each node acts as a router which
can forward information to the adjacent nodes. Any physical change in the environment is sensed
by the nodes and after processing of the information, it is transferred to the source.

5
A Mobile Ad-Hoc Network (MANET) comprises of interconnected wireless nodes, which acts
on the basis of point to point communication [7]. Each node acts as a router which can forward
information to the adjacent nodes. Any physical change in the environment is sensed by the
nodes and after processing of the information, it is transferred to the source. Figure 2.1 shows a
typical setup of MANET.

Figure 2.1: MANET

2.1 Types Of MANET

Following remain the various Types regarding MANET:

Vehicular ad hoc network:

In Vehicular Ad-Hoc Network cars are used by means regarding nodes. Each of these
nodes performs the duty of a router by communicating with the other nodes.

Internet Based Mobile Ad hoc Networks :

In Internet Based Mobile Ad-Hoc network are used to interlink fixed and mobile nodes.

Brainy vehicular ad hoc networks:

Trendy Brainy Vehicular Ad-Hoc Network, artificial intellect remains cast-off towards overawed
astonishing happenings.

Smart Phone Ad hoc Network:

6
In Smart Phone Ad Hoc Network, smart phones are used as nodes.

2.2. Features of MANET

 All nodes have an autonomous behavior.


 Absence of centralized firewall.
 The operation is of distributed nature.
 Symmetric behviour of nodes.
 Intermittent nodal activity.
 User density is high.
 High level of user mobility.

2.3. Sensor Node Architecture

2.3.1 Communication Devices

The qualities of transmittance and reception are required for an effective communication to
take place. Such a device which has ability to transmit as well as receive is called a transceiver. It
has three states including the state of receiving and transmitting, sleep and idle state. In sleep
state the transceiver cannot receive anything, whereas, in an idle state it can receive but is not
receiving at the moment. An example of transceiver device is RFM TR1000 family.

2.3.2 Memory

There are three kinds of memories including Random Access Memory (RAM), Read-Only
Memory (ROM) and Electrically Erasable Programmable Read Only Memory (EEPROM).
Although the RAM has ability to store the data, the memory is lost when power is switched off.
In such cases sensing data is stored in ROM &EEPROM.

2.3.3 Controller

Constituentregarding controller remains meant towards manipulate the keptstatistics. There are
different types of controllers utilized in the MANET including DSPs, ASICs, and FPGAs. The
DSP mainly has utilization in signal processing, ASIC has high performance applicability and
FPGA is usually used for testing purposes.

7
2.3.4 Power

The power is provided in the network of nodes through batteries. Batteries can be environment
dependent or rechargeable.

2.4. Architecture Of MANET

The Figure-2.2 shows the architecture of MANET. The hosts are linked to IP links which are
further connected to a router called MANET node. The MANET nodes may consist of MANET
interfaces. These interfaces have distinctive prefixes, which are achieved through IPv4 or IPv6.

Figure 2.2: MANET Node Interfaces

2.5. WSN Vs MANET

Both WSN and MANET use battery power and do not consist of any infrastructure. Moreover,
both of them execute in free frequency spectrum and utilizes multi hop routing.

 WSN utilizes base station, whereas, MANET do not.


 WSN and MANET have different compatibility for the network densities.
 MANET allows instant communication of users.
 MANET has mobility whereas WSN do not have any mobility.
 WSN is used for detection of environmental changes, whereas MANET is used for
information interchange.
 MANET has ability of configuration.

8
2.6.Challenges In Mobile Ad-Hoc Network(MANET)

There are many challenges in the use of MANET. For instance, it does not has centralized
identity. There are routing issues, channel access problems, quality matters, collision
complications Other problems include limitation of bandwidth, battery and security issues [8].

2.7.Applications Of Mobile Ad-Hoc Network

 Easy to use and develop at emergency times.


 Highly applicable in personal area network (PAN).
 Efficient communication
 Applicability in military scenarios.
 Useful in wireless communications.
 Useful in data exchange.
 Infrastructure less architecture.
 Can be used from different locations.

9
CHAPTER 3

ZIGBEE

The chapter consists of ZIGBEE specifications which are based on introduction, design,
network topologies and applications.ZIGBEE has multiple qualities such as lower rates for data,
shorter range of wireless networking and capability to remain operational for greater lengths of
time as the device remains mostly in sleep mode, which is a power saving mode. ZIGBEE is also
known as a communication protocol of advanced level that is used in Personal Area Network
(PAN).

10
3.1. Introduction

The chapter consists of ZIGBEE specifications which are based on introduction, design, network
topologies and applications. The word “ZIGBEE” is a derivative of honey bee that follows a
zigzag pattern to connect and converse with fellow honey bees in a multi hop manner. ZIGBEE
has multiple qualities such as lower rates for data, shorter range of wireless networking and
capability to remain operational for greater lengths of time as the device remains mostly in sleep
mode, which is a power saving mode. ZIGBEE is also known as a communication protocol of
advanced level that is used in Personal Area Network (PAN). ZIGBEE uses a mesh topology that
makes it possible to route the data over much larger distances. ZIGBEE has a lower average
current because it uses lower latency rates. ZIGBEE has been the latest addition to the
technologies introduced by the ZIGBEE alliance which is based on a group of companies
working on the lines of defining low data rate wireless. The alliance seems to counter wider
challenges while making the device interoperable, which can increase its compatibility with
devices of other manufacturers [9].

3.2 Specifications

 Low expenses.

 Elevated Network reliability.

 Lower Power intakes.

 250Kb/sec data rate.

 Can be used for non-commercial purposes.

 Low potential.

3.3 Zigbee Vs Bluetooth


 ZIGBEE caters the communication in Personal Area Network (PAN). While Bluetooth
serves as a communication tool in the wide personal area network (WPAN).
 Bluetooth was offered to markets in year 1994 and ZIGBEE came after in 1998.

11
 Bluetooth utilizes 1MHZ bandwidth. On the other hand ZIGBEE applies 0.6 to 2 MHz
bandwidth based on the network frequency.

Figure-3.1: ZIGBEE Vs Bluetooth [10]

 In ZIGBEEserves more connectivity space with 65000 cell nodes whereas Bluetooth
has lower connectivity with 8 cell nodes.
 ZIGBEE is famous for its quality of self healing whereas Bluetooth doesn’t have self
healing network.
 Blue Tooth possesses up to 1Mbps of data rate and ZIGBEE possesses a data rate up
to 250Kbps.

12
3.4 Zigbee Vs Wifi
 ZIGBEE belongs to IEEE 802.15 standard where as WIFI belongs toIEEE 802.11 x
standard.
 ZIGBEE can provide a network range up to 10 to 30 meters based on the application type
on the hand WIFI deals with a network range up to 30-100 meters.
 ZIGBEE has higher bitrates of 4 micro seconds than WIFI which has only 0.00185 micro
seconds bitrates.

Figure 3.2: ZIGBEE Vs WIFI [11]

 ZIGBEE has higher number of nodes almost 65000 whereas Single WIFI network has
nodes not more than 2007.
 ZIGBEE utilizes one-fourth of the power utilized by Wi-Fi [12].

13
3.5 Interoperability
ZIGBEE has the ability to communicate with other devices despite of different manufacturing
backgrounds and due to wide usability of ZIGBEE in several applications in the modern times
which makes ZIGBEE an interoperable device.

3.6 Zigbee Device Types

Following are the types of ZIGBEE devices :


 ZIGBEE Router.
 ZIGBEE Coordinator.
 ZIBGEE End Devices.

3.6.1 Zigbee Planner


 Zibgee Coordinator has multi usability because it works as root of one network and
bridge for other network.
 It has a single coordinator in the network.
 It works in form of a router after it forms a Mesh topology type of network.
 It saves all sorts of network related information and also works as a Trust Centre.

3.6.2 Zigbee Router


 Routing services are provided by it where data is being sent and received among the
routers.
 Routers stay active while the networks remain established.

14
Figure3.3: Network of ZIGBEE [13]

3.6.3 Zigbee Conclusion Devices


 Purpose regardingconclusion devices remains communication thru the paternal devices.
 It doesnot transmit messages the way routers do.
 End devices turn to off or sleep mode while not being used.
 The battery life is longer for end devices.
 End device are cheap in terms of cost as compared to coordinators and routers.
 Memory requirement is also not high for end devices.

Routers alsoconclusion devices remain organized by way of:

15
Figure-3.4: ZIGBEE Devices

3.7 Zigbee Networking Protocol & Layers


ZIGBEE has its foundation thoroughly on open system interconnection (OSI). The last two
levels are described by IEEE 802.15.4. IEEE explained the data link and physical, but
specifications aimed at networking in addition towards the application layer are not mentioned.
ZIGBEE describes the networking, application besides security layer protocol then uses the
physical also the data link layer distinctvia IEEE by way of the afore mentioned particular layer
[14].

16
Figure-3.5: ZIGBEE Layers [15]

3.7.1 Physical Layer


The previous layer in exposedstructure interconnection is the physical layer which remains next
towards the hardware also helps in the harmonization regarding bits. The illustration describes
usual packing.

Figure-3.6: Physical Layer Header [16]

According to the above illustration the physical layer header is segregated in to 3 portions which
are payload, physical header (PHR) and synchronization header (SHR). The basic purpose of

17
SHR is the bit synchronization between transmitter and the synchronization header. It is
segregated more into preamble as well as start of frame delimiter. The bit synchronization is
done by the preamble where as the start of frame delimiter is used for indication of end of SFD
and the beginning of PHR through the indicator bit. The number of ocets is defined by the frame
length. The foremostaccountabilities of the physical layer are:

 Bit Synchronization.
 Oscillator frequency selection.
 Problemsassociatedwiththe physical transmission of bits.

3.7.2 Mac Layer


Mac layer produces connectivity among the physical and networking layer and it stands as the
second layer in OSI model. The common format of the MAC layer is:

Figure-3.7: Mac Layer Header [17]

The diagram above shows three parts of MAC layer that are MAC payload, MAC header and the
MAC footer. The MAC header is subdivided into frame control and sequence number where as
the frame control helps in defining the frame type the sequence number guides in the
arrangement quantity definition regarding statistics. Further more the Starting pointalso the
source PAN identifier remain involved in identifying the PAN of destination and source. The
Destination and source PAN resolveremain similar in case the source and destination operates in
the same personal area network. Source and destination are the addresses of source and host
respectively. MAC payload consists of the above layer data and the subfield frame check
sequence stands last in the MAC footer. In Data Packets for error detection Frame check
sequence (FCS) remains utilized. Functions of MAC layer are given below:

18
 Error detector.
 Physical addresser.
 MAC layers communication by peer to peer method.
 Channel access.

3.7.3 Network Layer


Network layer remains on the third level over OSI model which directs, routes or transmits data.
ZIGBEE coordinator allots each ZIGBEE planner device a 16 bit network address.
Communication system over PAN remains segregated over different orts including unicast,
broadcast ad multicast. The multicasting message is transmitted to a number of devices in a
network, on the other hand a broadcasting message is transmitted to all devices in a pan network
but when a message is needed to be transferred to a specific device or user multicasting is used.
ZIGBEE coordinator is liable for message transmission is a network which involves maintaining
and identifying the route. ZIGBEE coordinator forms a routing table in order to transfer a
message. Below is the basic structure of the networking layer:

Figure-3.8: Network Layer Header

Network header and network payload are two subdivisions of the network layer. Frame control is
the first field in the network header, which is involved in the frame type definition. Addressing is
done with the help of source and the destination addresses and the delivery of packets in order is
done with the help of the sequence number. Destination and source IEEE addresses are utilized
in the physical addressing. Radius field is utilized for the amount of hopes permissible to the
frame to have multicast. The Source or sender identifies the route of the packet in the source
routing method. Major duties of network layer are as follows:

 Frame routing and relaying.


 Address assignment towards devices.

19
3.7.4 Application Layer
The top most layer over OSI model remains the application layer which stands a user interface.
The major components of this layer are:
 Application Support Sub layer (APL).
 ZIGBEE Device Objects (ZDO).
 Application Framework.

APL classifies an interface that lies between application and network layer, assists in data
transmission and allows group address administration. ZIGBEE consists of different device types
including controller, router and end devices. ZDO elaborates the functionality regarding
coordinator routers as well as termination instruments over tasks connected to network also
perform security. Figure-3.9 shows data transfer hierarchy:

Figure-3.9: Data Sequence

20
3.8. Network Topologies For Zigbee
ZIGBEE employed the physical as well grip MAC layer nominated by means concerning IEEE
802.15.4 that obliges quite a lot of topologies such as the star, mesh, tree and cluster tree but
cluster tree topology is not supported by ZIGBEE but star mesh and tree are the topologies
supported by ZIGBEE [18].

3.8.1 Star Topology


Star topology is termed as the easiest and simplest among all topologies because it is based on
end devices and coordinator. End devices can correspond to the coordinator only. The data is
transmitted to the end device through the coordinator. The drawback of star topology is data can
only be transmitted through coordinator and there are no additional paths for transmission.

Figure-3.10: Star Topology Zigbee

3.8.2 Zigbee Tree Topology


Tree topology based on tree hierarchy arrangement for the coordinator, routers and end devices
The End devices are also termed as Children [19]. Coordinators share a connection with routers
and end devices whereas routers share connection with end devices and routers shown in figure
3.11:

21
Figure-3.11: ZIGBEE Tree Topology
The drawback is same as star topology like there is no alternate route.

3.8.3 Zigbee Mesh Topology


Mesh topology comprises of interconnected nodes where every node is mutually connected to
two or more nodes. Data transfer doesn’t face problems at any stage dissimilar to the star
topology where network failure occurs when any node fails in network. It is because alternative
paths are present in mesh topology.

Figure-3.12: ZIGBEE Mesh Topology

3.9 Applications

 Home patient intensive care.

 Monitoring regardingbulkygaugestructures.

 Costly also inexpensive.

 Longer lifespan.

 A smaller amountof complication.

22
CHAPTER 4

ROUTING PROTOCOLS
WSN entails sensor node sequences which remain mutually linked through wires also wirelessly
as well. The nodes are dual in nature i.e. they can have mobility all directions like mobile nodes
or they can also be fixed. The current chapter discusses several protocols consumed for the
routing purpose in WSN.

23
WSN entails sensor node sequences which remain mutually linkedthrough wires also wirelessly
as well. The nodes are dual in nature i.e. they can have mobility all directions like mobile nodes
or they can also be fixed. Certain law and regulations are necessary for data transfer between
nodes. The current chapter discusses several protocols consumed for the routing purpose in
WSN. Routing is name of data transmission between source and destination when required. The
routing protocol effectiveness and competence is reliant on Network,Network scalability, too
node measurements [20].

4.1.Classification of Routing Protocols


Classification of Routing Protocols given below:

1. ORIGINATOR as regards COMMUNICATION


 Source
 Destination
2. Protocol Operations
 Multi path based
 Quality of service based
 Query based
 Coherent and non-coherent based.
3. DependOVER network erection
 Hierarchical
 Flat
 Location Based
4. DependOVER Path initialization.
On Path Initialization
 Proactive
 Hybrid
 Reactive

24
Figure 4.1 depicts the arrangement concerning WSN.

Figure-4.1: Categorization of Routing Protocols [21]

4.1.1 Based On Path Establishments


The three possible ways to establish a path is reactive, proactive and hybrid. In the proactive
routing protocols the routes are decided in advance and before routing. Every node consists of a
routing table of its own depending upon the topology of network. These routes are saved at each
node in form of a routing table. The routing tables keep updating regularly. The path is already
known in advance of transferring the data in proactive routing protocol path.

Another protocol that is discussed is the reactive routing protocols where paths are calculated
and decided on demand. The routes are calculated and decided from source to destination only
dissimilar to proactive routing in which paths are calculated almost to each node present in the
network .Table 4.1 depicts comparative picture flanked by up beat also responsive procedure:

25
Table 4.1: Difference between Proactive and Reactive Routing Protocol
Proactive Reactive
Route from each node to every other node in Route from Source to Destination only
the network
Large routing tables Small or No Routing Tables
Routes are ready to use instaneously Routes constructed when needed, higher
connection setup delay
Periodic route-update packets Route update when necessary

An amalgamation of proactive and reactive protocols is present in the hybrid routing. It utilizes
distance vector along with the link state routing for the evaluations of the path. Hybrid routing
protocol seem to be more efficient and has lower consumption of power and memory.

4.1.2 Based On Network Structure


There are three major classifications of a network structure routing protocols which are Flat,
Hierarchical and Location Based. Flat routing protocols have no requirement regarding proper
hierarchy also architecture in place regarding frequently distribute then portion the data thru the
consistent routers. As the data distribution has a diverting nature it becomes impossible to allot a
global identifier mean while all nodes in a flat based routing protocol perform similar role even
in the absence of any hierarchy. The flat based routing has two examples such as Interior and
exterior gate way routing protocol. Meanwhile in a hierarchical based routing protocol the router
shares connectivity in a complete hierarchy.Hierarchical based routing protocol starts with the
route computation and later on develops the routing path in the manner of a hierarchy.
Hierarchical routing protocols are made of networks lower in complexity due to the presence of a
complete hierarchy with lower congestion and possess higher efficiencywhen compared to flat
base routing protocol.
Location based routing protocols are necessary when location information is important and
cannot be ignored. Distance helps in the calculation of energy estimation. Following methods are
used for location calculation:
 GPS Based.
 Finding coordinates.

26
4.1.3 Based on operation
Grounded over the routing paths, the protocols remain separated further towards multipath
routing, interrogation built routing, negotiation built routing, quality regarding services built,
clearalso non-coherent grounded.

 Multipath Routing Protocol

Data transmission takes place in multipath routing protocol by more than


one path. Path substitutes are available in case a path fails between source and destination
but as these multi paths were present there is an increment in the energy usage of the
network. The routing by Multipath robust and has lower obstructions with high
efficiency. The network reliability increases due to various paths.

 Query Based Routing

The query based routing protocol has data reception node, which means the
destination node will transfer out of the network path. The nodes that have query data
respond only. The examples of query based routing are directed diffusion routing, and
rumor routing.

 Negotiation Based Routing

The data redundancy is reduced by negotiation based routing. The redundant data creates
overlap and energy consumption rises. Negotiation based routing protocols evade statistics
redundancy between nodes also toward the base station. SPIN routing staysamid the most known
examples of negotiation based routing protocol.

 QOS Based Routing

The basic thought overdue QOS routing protocol remains insurance regarding quality
service i.e. postponement limitations, energy restrictions also bandwidth. The Qos based routing
protocol is known to execute equilibrium amid energy ingestingin addition quality regarding the
data. Energy competent also quality regarding service (EQSR) remain instances regarding
quality regarding service founded routing protocol.

27
 Coherent & Non-Coherent

Data dispensation extremely significant in WSN. Popular coherent based data dispensation the
facts transferred towards further nodes thru low dispensation, whereas over non-coherent
founded routing protocol facts stands managed formerly devolution towards the further nodes.

4.1.4 Based On Initiator


Routing protocols couldget segregated in to communication initiator i.e. who instigates the
connection it is source else destination.

4.2 Sensor Protocol For Information Via Negotiation (SPIN)


SPIN remains an example of flat routing protocol. SPIN transmits the facts in addition info
towards entirely nodes over the network besides decreases the data overlap also disintegration
thru the help regarding negotiations i.e. which ignores the data redundancy in the network. Spin
remains technique that increases energy efficiency and transfers the sensor data in place of all
data [22]. Spin uses following messages

 ADV.s
 REQ.
 DATA.

Adv is the sign for advertisement such as when any nodepossesses data which should be shared
this will give an ADV message to the neighboring nodes and if the neighboring nodes seem
concerned about the data responds back an ADV memo with REQ memoalsoas soon as the
sending node receives the REQ message it retorts with the data

28
Figure-4.2: Spin Routing Protocol

4.3 Rumor Routing


The agent based technique is used in rumor routing. Agents are more or less like packets which
travel through network for path recognition. The original aim of the packets is to discover easiest
path and replace the lengthiest path with more of undeviatingones [23].

29
Figure-4.3: Rumor Routing

4.4 Directed Diffusion


Directed diffusion vestiges methodology that is data centric in nature and reason for such data
centric technique usage is for the sake of information congregation and circulating. The directed
diffusion routing protocol has higher energy efficiency and energy accumulation protocol which
eventually amplify life time of the network [24]. In directed diffusion routing protocol the
communication takes place betweennodes; therefore, there is actually no protocol addressing.

4.5 Low Energy Adaptive Clustering Hierarchy (LEACH)


LEACH is a routing protocol based on the cluster with nodes assembled in to clusters where each
cluster is connected to its own base station, local base station received data from the cluster and
then local base station passes on data to the global base station. The nodes plan about their
respective clustersas every cluster must havea cluster head which is liable to transmit and spread
data to other nodes [25]. The two basic stepsof data transmission are

 Step up phase.
 Steady phase.

In the step up phase the nodes select their gathering craniumal so code division multiple access
remains utilized by all nodes towards stake their data by cluster head as well as cluster head

30
prepare plan for TDMA slots used for cluster nodes. Data transmission from phase nodes
towards cluster heads happens over second phase. The receiver of cluster heads remain on so that
it has the ability to attain data from cluster nodes and after data reception the cluster head
compresses data over towards a single signal. Below is the diagram illustrating the functionality
of this protocol as well;

Figure-4.4: Zigbee Leach Routing Protocol [26]

4.6 Ad-Hoc on Demand Distance Vector(AODV)


A consistent packet size is used In AODV that has a demand routing protocol. Whenever source
node and destination node seem to exchange the data, routes are built according to them and the
routes are available depending on the requirement. Routing overhead doesn’t take place in this
protocol due to traffic absence [27]. The source and destination shares a singular passage in
anAODV. AODV use following messages:

 Route Request (RREQ).


 Route Reply (RREP)

RREQ message: The message generated as soon as source node ‘S’ is in position to transmit data
to destination node ‘D’ . Such messages transfer the source and destination ip addresses, source
sequence number and destination’s recent sequence number as well as the broadcast id of source.
Right after the generation of RREQ message the neighbors of source node receives this message
from source node itself and if we assume a neighbor node which is represented by ‘P’,

31
subsequent to the REQ message reception as of source node ‘S’ it responds back by means of
RREP as well as builds a path repeal in nature back to the source node ‘S’:

AODV related path identification and packet delivery is how in the figure below. Suppose

consists of a node that has taken an RREQ message back from the source node ‘S’.

Figure-4.5: AODV Step- 1


Node ‘S’ will send the RREQ message to its neighbors as shown in figure-4.6.

32
Figure-4.6: AODVStep- 2

RREQ message when received at the node ‘S’, the other respective nodes ‘B’ ,’C’, ‘E’ responds
to the node ’S’ with RREP message also that the nodes distribute the RREQ message along with
the neighbors as shown in figure-4.7:

Figure-4.7: AODV Step- 3


A similar pathway is followed G’ ,’F’ in which they advance the message to the nodes that are in
neighboring spaces and responds back to the nodes that are source as shown in figure-4.8:

33
Figure-4.8: AODV Step- 4
‘J’ and ‘K’ nodes will follow the same line of action.

Figure-4.9: AODV Step- 5


Node ‘D’ doesn’t advance the message as the node ‘D’ itself is the destination that is the
requirement and a path ahead arranges for transmission of the data as shown in figure-4.10:

Figure-4.10: AODV Step-6

34
4.7. Dynamic Source Routing(DSR)
In 1996 the dynamic source routing was developed at CMU which was used in wireless sensor
networks. Dynamic source routing can either be on demand or reactive [28]. The name suggests
that it applies source routing as an alternative to routing tables. The DSR Routing has two
phrases:

 Route Discovery.
 Route Maintenance.

Route discovery phase is initiated by source node and the phase deals with route request and
route reply messages. Destination node responds back to the source node with route reply RREP
message dissimilar to AODV where all the intermediary nodes would respond thru route reply
message RREP also the basic aim regarding ensuingsegment route preservation remains towards
retain away from flooding regarding RREP messages as well as cast-offaimed at cutting short
regarding no desfashionable amongst source also destination. The subsequent below describes
the route discovery in dynamic source routing protocol:Let’s assume Node ‘S’ stays a node that
acknowledged a request for route discovery for node ‘D’.

Figure-4.11: DSR Step- 1

35
Nodes ‘B’, ‘C’ and ‘E’ will be receiving request from Node ‘S’ as shown in figure-4.12:

Figure-4.12: DSR Step- 2

Nodes ‘B’ and ‘C’ will transmit and Node ‘H’ will obtain a request RREQs whereas these
transmissions may collide with each other.

Figure-4.13: DSR Step-3

36
Nodes ‘F’ and ‘G’ will send further RREQ to the neighboring nodes and as soon as node ‘C’
obtains a request once more the node seems to stop and not send again since it has by now sent
once as shown in figure-4.14:

Figure-4.14: DSR Step- 4

The RREQ is sent by Nodes ‘J’ and ‘K’ to neighboring nodes whereas ‘D’ might get an RREQ
from nodes ‘J’ and ‘K’ so collision is possible.

Figure-4.15: DSR Step- 5

37
RREQ message is not sent further by node ‘D’ as it is the destination itself and the node that is
been targeted as shown in figure-4.16:

Figure-4.16: DSR Step- 6

Node ‘D’ responds back with RREP and route is further similar to as shown in figure-4.17 given:

Figure-4.17: DSR Step- 7

38
When RREP message is sent by node ‘D’ and received at node ‘S’ the flow of packet flow will
be like that as shown in figure-4.18 given:

Figure-4.18: DSR Step- 8

39
CHAPTER 5

SIMULATIONS & RESULTS

The mobile ad-hoc network can be analyzed with the help of different simulators, which depict
the performance of the respective networks. In order to evaluate the network performance, some
physical environment needs to be created. In the present study, OPNET tool is used for
simulation. In an OPNET tool, various scenarios can be created through drag and drop method.

40
Simulations and Results
The mobile ad-hoc network can be analyzed with the help of different simulators, which
depict the performance of the respective networks. In order to evaluate the network performance,
some physical environment needs to be created. In the present study, OPNET tool is used for
simulation. In an OPNET tool, various scenarios can be created through drag and drop method.
The performance of WSN can be checked with the help of following simulation tools:
 NS-2
 AVRORA
 J-Sim
 OPNET
 TOSSIM
 OMNET++
 EmStar
 ATEMU

5.1. OPNETTool
OPNET is a widely used software, which is used for computation and simulation of
networks. Its feature of graphical editing helps in constructing personalized protocols, and
configurations. Different devices such as IBGEE, mobile or static nodes can be used in
connection with the OPNET through drag and drop method, linked with the object palette.
Consequently, when nodes are placed on work window, any scenario or network can be
constructed. Moreover, OPNET has a wide range of parameters of simulation. These parameters
help in constructing any practical environment. Figure-5.1 shows the working model of OPNET

Figure-5.1: Working model of OPNET

41
Following Editors available in OPNET:
1. Network Editor.
2. Process Editor.
3. Node Editor.
4. Link Editor.

5.1.1 OPNET Network Editor


Corporal topology regarding a system stays identified via a Network Editor. This
topology delineates the interconnectivity also position of the nodes and links.

Figure-5.2: Network Editor

5.1.2 Process Editor


The Process Editor is meant toward carry out progressions such as protocols etc. The
models produced by this editor helps in understanding course and performance of processors and
modules.

42
Figure-5.3: Process Editor

5.1.3 Node Editor


The node editor is meant to create various devices on the basis of their varying capacities and
structures. The constituents of nodes function to process the information. The communication
devices present in a network needs to be labelled with the help of node editor.

43
Figure-5.4: Node Editor
5.1.4 Link Editor
A link editor helps in creating and defining a link model. A link model exists in the form of a
connection between nodes. The features such as data rate, propagation delay, error model etc can
be defined by link editor.

5.2. End To End Delay


The end to end delay would remain regarded by way regarding the time a packet takes
toward reaching end points in the mentioned source. End to End Delay Sum of following factors
of Delay:
 Processing Delay
 Propagation Delay
 Transmission Delay
 Query Delay.

44
5.3. Network Through Put
The Network through put can be demarcated by way regarding the number of packets a
receiver receives. When demarcated in terms of a network, it is the rate regarding effective
messages in a communication channel.

5.4. Using OPNETAodv Deploy On 10 Nodes

Figure-5.5: Deploying AODV on 10 Nodes.

The above mention state will be utilized for about 3700 seconds.

45
The various features of AODV in a network of 10 nodes are shown in the Figure-5.6.

Figure-5.6: Features of AODV Deploying with 10 Nodes.

46
5.5. Using OPNET AODV Deploy On 15 Nodes

Figure-5.7: Deploying AODV on 15 Nodes.

In Following Picture various features of created scenario:

Figure-5.8: AODV Shows with 15 Nodes.

47
5.6. Using OPNET AODV Deploy On 20 Nodes

Figure-5.9: Deploying AODV on 20 Nodes.

In OPNET simulator the above display scenario is created. Following features are observed:

Figure-5.10: AODV Shows with 20 Nodes.

48
5.7. Using OPNET DSR Deploy on 10 Nodes

Figure-5.11: Deploying DSR on 10 Nodes.


The above mention state will be administered for about 3700 seconds.

49
Following features were observed for the network of DSR Shows with 10 Nodes

Figure-5.12:DSR Response 10 Nodes.

50
5.8. Using OPNET DSR Deploy On 15 Nodes

Figure-5.13: Deploying DSR on 15 Nodes.


In OPNET simulator the above display scenario is created. Following features are observed:

Figure-5.14: DSR Response 15 Nodes.

51
5.9. Using OPNET DSR Deploy on 20 Nodes

Figure-5.15: Deploying DSR on 20 Nodes.

In OPNET simulator the above display scenario is created. Following features are observed:

Figure-5.16: DSR Response 20 Nodes.

52
5.10. ZIGBEE
In the present study, a scenario was created consisting of 4 ZIGBEE nodes. The OPNET was
utilized for simulating ZIGBEE network.

Figure-5.17: ZIGBEE Network

The above scenario was simulated at 1300 sec.

53
The through-put and end to end delay were selected and recorded after simulations.

Figure-5.18: Response Show Network Through-Put Of ZIGBEE

54
Figure-5.19:ZIGBEE Network End To End Delay Curve.

55
CHAPTER 6

CONCLUSIONS

The current chapter discusses Routing protocols and their performance& conclusion.

56
6.1 Routing Protocols and their Performance
Complete information is not carried in the AODV. Consequently, the source and intermediate
nodes also carry the mere information related to flow of the data packet. When the network
consists of 10 nodes, the delay initiates at ~0.0050sec. Following this, it starts to decay for
~0.0002sec and remains at the same for the complete simulation period. When the network
consists of 15 nodes the delay initiates at ~0.0040sec. Following this, it starts to decay for
~0.001sec and remains at the same for the complete simulation period. When the network
consists of 20 nodes the delay initiates at ~0.0044sec. Following this, it starts to decay for
~0.0001sec and remains at the same for the complete simulation period.

On the other hand, in DSR complete path information is carried out in the packet. There is more
consistency in the DSR path as compared to AODV. When the network consists of 10 nodes, the
delay initiates at ~0.0020sec. Following this, it starts to decay for ~0.0035sec and remains at the
same for the complete simulation period. When the network consists of 15 nodes the delay
initiates at ~0.0030sec. Following this, it starts to decay for ~0.0050sec and remains at the same
for the complete simulation period. When the network consists of 20 nodes the delay initiates at
~0.0050sec. Following this, it starts to decay for ~0.015sec and remains at the same for the
complete simulation period.

57
Table 6.1: Composite Performance Analysis of Routing Protocols
NODES PARAMETERS AODV DSR
10 DELAY(in Seconds) 0.005 0.01
THROUGH- 200 50
PUT(KB/Sec)
15 DELAY(in Seconds) 0.0025 .005
THROUGH- 225 225
PUT(KB/Sec)
20 DELAY(in Seconds) 0.004 0.015
THROUGH- 500 225
PUT(KB/Sec)

From the Table 6.1, it is quite evident that through-put is greater in AODV. When the network
consists of 10 nodes, the through-put is ~300K bits/sec. When the network consists of 15 nodes
the through-put is ~320K bits/sec. When the network consists of 20 nodes the through-put is
~350K bits/sec. On the other hand, in a DSR network of 10 nodes, through-put is ~60K bits/sec.
When the network consists of 15 nodes the through-put is ~250K bits/sec. When the network
consists of 20 nodes the through-put is ~450K bits/sec.

58
6.2 ZIGBEE Nodes-applicability
The ZIGBEE nodes are mostly utilized when lower data rates are required. Consequently,
when longer battery life is needed, ZIBGEE nodes are highly used. Although the wireless system
helps in the provision of higher data rates, the requirement of high power limits their use.
Consequently, at such places again ZIBGEE is highly applicable as it boosts up the quality and
life of the network.

In a network consisting of ZIBGEE nodes, the end delay is greater a shown in figures 33
and 34. In ZIBGEE, the delay initiates from 0.070 Sec and at 0.080 Sec it is saturated. On the
other hand, in WSN nodes, the delay is not even seen starting from 0.020 Sec. Moreover, it is
also evident that the throughput value of a ZIBGEE network is lower than the WSN network. It
depicts a linear increase at the beginning and gets stable at 7400 bits/Sec. Therefore, ZIBGEE
nodes are highly recommendable at the place where network life span and economical issues are
concerned.

59
6.3 Observations and Future work
In the present study, a network of mobile nodes on OPNET was constructed. This network is also
known as wireless sensor network (WSN), which have wide applicability in health care
monitoring, area monitoring and relief operations [29]. The routing protocols utilized and
compared includes AODV and DSR. The comparison was made on the basis of the respective
performances. The performance of each routing protocol was depicted through end to end delay
and throughput values. These values were calculated through variation in the network scale.
When the size of the network is increased in AODV, it is observed that end to end delay is
decreased and throughput value is increased. Resultantly, the performance of the network is
enhanced. It is observed that throughput value has more consistency in AODV, whereas, end to
end delay has more consistency in DSR. The future researches should focus on the performance
evaluation of wireless sensor network. The protocols such as TORA and OLSR should be
evaluated to understand their applicability [30].

ZIBGEE has applicability at places where less power and data rate is required. In the
present study, a network with eight ZIGBEE nodes, four routers and one coordinator was
created. It is observed that data rate is lesser and throughput values are greater in a ZIBGEE
device. IT is recommended that future works should focus on creating different scenarios in
order to have a better evaluation of ZIBGEE.

60
References

[1] J. Grover and Anjali, “Wireless sensor network in railway signalling system,” Proc. -
2015 5th Int. Conf. Commun. Syst. Netw. Technol. CSNT 2015, pp. 308–313, 2015.

[2] Y. Xu and F. Liu, “Application of Wireless Sensor Network in Water Quality


Monitoring,” 22017 IEEE Int. Conf. Comput. Sci. Eng. IEEE Int. Conf. Embed.
Ubiquitous Comput., pp. 368–371, 2017.

[3] T. Cao-hoang and C. N. Duy, “Environment monitoring system for agricultural


application based on wireless sensor network,” 2017 Seventh Int. Conf. Inf. Sci. Technol.,
pp. 99–102, 2017.

[4] M. Urbina, T. Acosta, V. Christian, and G. Chafla, “Analysis and comparison of routing
protocols in Wireless Sensor Networks under 802.15.4,” 2015 IEEE Thirty Fifth Cent.
Am. Panama Conv. (CONCAPAN XXXV), no. Concapan Xxxv, pp. 1–6, 2015.

[5] A. A. Kadam and P. N. Chatur, “Literature review of congestion avoidance system in


wireless sensor network,” 2016 Second Int. Conf. Sci. Technol. Eng. Manag., pp. 120–
124, 2016.

[6] M. Er-Rouidi, H. Moudni, H. Mouncif, and A. Merbouha, “An Energy Consumption


Evaluation of Reactive and Proactive Routing Protocols in Mobile Ad-Hoc Network,”
2016 13th Int. Conf. Comput. Graph. Imaging Vis., pp. 437–441, 2016.

[7] D. Jinil Persis and T. Paul Robert, “Review of ad-hoc on-demand distance vector protocol
and its swarm intelligent variants for Mobile Ad-hoc NETwork,” IET Networks, vol. 6, no.
5, pp. 87–93, 2017.

[8] S. Sankaranarayanan and G. Murugaboopathi, “Secure Intrusion Detection System in


Mobile Ad Hoc Networks Using RSA Algorithm,” 2017 Second Int. Conf. Recent Trends
Challenges Comput. Model., pp. 354–357, 2017.

[9] F. Chen, L. Qin, X. Li, G. Wu, and C. Shi, “Design and Implementation of ZigBee
Wireless Sensor and Control Network System in Greenhouse,” Proc. 36th Chinese
Control Conf., pp. 8982–8986, 2017.

61
[10] https://www.engineersgarage.com/contribution/zigbee-vs-bluetooth

[11] https://www.engineersgarage.com/contribution/zigbee-vs-wi-fi.

[12] Z. Zhao, X. Wu, X. Zhang, J. Zhao, and X. Y. Li, “ZigBee vs WiFi: Understanding issues
and measuring performances of their coexistence,” 2014 IEEE 33rd Int. Perform. Comput.
Commun. Conf. IPCCC 2014, no. 61172063, pp. 2–9, 2015.

[13] http://www.eetimes.com/document.asp?doc_id=1276404.

[14] J. Jaslin, “ZigBee Wireless Sensor Network Simulation with Various Topologies,” 2016.

[15] http://www.researchgate.net/figure/226297449_fig2_Fig-22-IEEE820154ZigBee-
protocol-stack-architecture.

[16] http://www.libelium.com/security-802-15-4-zigbee.

[17] http://www.rfwireless-world.com/Tutorials/802-11ac-MAC-layer.

[18] U. K. Roy, “Enhancing ZigBee Tree Routing to Support Large Pseudo-Linear Network
Topologies,” 2016 2nd Int. Conf. Control. Instrumentation, Energy Commun., pp. 501–
505, 2016.

[19] R. Kumari and P. Nand, “Performance comparison of various routing protocols in WSN
and WBAN,” Proceeding - IEEE Int. Conf. Comput. Commun. Autom. ICCCA 2016, pp.
427–431, 2017.

[20] I. Applications, “Comparison of Proactive and Reactive Routing Protocol in Mobile


Adhoc Network Based on ‘ Ant- Algorithm ,’” pp. 153–158, 2013.

[21] http://www.researchgate.net/publication/311577034_

[22] T. H. Pham, X. J. Li, and P. H. J. Chong, “Design and Implementation of a Centralized


Sensor Protocol for Information via Negotiation,” pp. 88–92, 2010.

[23] H. Shokrzadeh, N. Bazyar, S. M. Y. Limanjoobi, and S. Khorsandi, “Distributed


expectation maximization in Appointment Rumor Routing in WSN,” Proc. 2014 Int.
Conf. Information, Commun. Technol. Syst. ICTS 2014, pp. 263–268, 2014.

62
[24] V. Jain and N. A. Khan, “Simulation analysis of directed diffusion and SPIN routing
protocol in wireless sensor network,” 2014 Conf. IT Business, Ind. Gov., pp. 1–6, 2014.

[25] A. Azim and M. M. Islam, “Hybrid LEACH: A relay node based low energy adaptive
clustering hierarchy for wireless sensor networks,” Proc. - MICC 2009 2009 IEEE 9th
Malaysia Int. Conf. Commun. with a Spec. Work. Digit. TV Contents, no. December, pp.
911–916, 2009.

[26] http://www.researchgate.net/publication/236107701

[27] M. Devi, “A SURVEY ON ATTACKS IN ADHOC ON,” no. 978, pp. 485–488, 2017.

[28] I. Minakov, R. Passerone, A. Rizzardi, and S. Sicari, “Routing behavior across WSN
simulators: The AODV case study,” IEEE Int. Work. Fact. Commun. Syst. - Proceedings,
WFCS, vol. 2016–June, 2016.

[29] H. Yang, C. Tian, B. Cheng, L. Ci, Z. Wang, and M. Yang, “CDS - A Collaborative
Dynamic Source Routing Protocol for Wireless Sensor Network,” 2015 IEEE 12th Intl
Conf Ubiquitous Intell. Comput. 2015 IEEE 12th Intl Conf Auton. Trust. Comput. 2015
IEEE 15th Intl Conf Scalable Comput. Commun. Its Assoc. Work., pp. 617–621, 2015.

[30] M. Kassim, R. A. Rahman, and R. Mustapha, “Mobile ad hoc network (MANET) routing
protocols comparison for wireless sensor network,” 2011 IEEE Int. Conf. Syst. Eng.
Technol., pp. 148–152, 2011.

63

Das könnte Ihnen auch gefallen