Beruflich Dokumente
Kultur Dokumente
REHAN BABAR
2014-MS-EE-T-04
SUPERVISOR
DR.MUHAMMAD ABRAR
i
PERFORMANCE COMPARISON OF ROUTING
PROTOCOL BY DEPLOYING ZIGBEE AS
WIRELESS SENSOR NETWORK.
Master of Science
In
Electrical Engineering
at
_________________________ ______________________
Internal Examiner External Examiner
_______________________________
Chairman/HoD/Senior Most Teacher
ii
DECLARATION BY SUPERVISOR
“I hereby declare that I have read this thesis and in my opinion this thesis is sufficient in terms of
scope and quality for the award of the Master Degree in Electrical Engineering”
Signature: ……………………………….
Date: ……………………………….
iii
DECLARATION BY STUDENT
Signature: ……………………………….
Date: ……………………………….
iv
Abstract
Wireless Sensor Network (WSN) has widely been deployed in different fields.WSN comprises
of a number of nodes, which are meant to assemble and allocate information. The information
processed by WSN can include a certain physical or ecological change. The use of WSN is
associated with many challenges such as error free information, rapid transference of information
and precision of information. In the present research work, evaluation of mobile ad-hoc network
is conducted through utilization of different routing protocols.Moreover, a topology regarding
the used protocols will be illustrated. The primary focus will be on Ad hoc On-demand Distance
Vector(AODV) and Dynamic Source Routing (DSR). The end to end delay, through-put and
network load will be analyzed to depict the performance of AODV andDSR.In case to enhance
the life span of network, ZIGBEE will be used. ZIGBEE is power and cost effective
device,which have use in personal area network. Consequently, network performance will be
discussed in terms of ZIGBEE implementation. At the end, a comparison of simple sensor node
will be made with ZIGBEE.
v
Dedication
vi
ACKNOWLEDGMENT
I am thankful to ALLAH ALMIGHTY who showered me with his blessings, friends colleages
and everyone who has helped me through out this thesis period by both morally and spiritually.
special thanks to my supervisor Sir Dr.Muhammad Abrar for his guidelines , hard work &
tolerance during thesis research period.Sir, without your help the completion of this thesis was
not possible so bundle of thanks to you for your help. I further want to thanks to my parents and
all my respected teachers for their continous support and help to me for completion my
thesis.Once again speacial thanks to Sir Dr.Muhammad Abrar for his constant support.I would
like to thanks the “University College of Engineering & Technology BZU, Multan” for
providing me such an environment that helps me in my professional & academic grooming.
Rehan Babar
vii
TABLE OF CONTENTS
Abstract ...................................................................................................................................... v
Dedications ................................................................................................................................ vi
Chapter 1 ..................................................................................................................................... 1
viii
3.6 Zigbee Device Types .......................................................................................................... 14
Following are the types of ZIGBEE devices :........................................................................... 14
3.6.1 Zigbee Planner .......................................................................................................................... 14
3.6.2 Zigbee Router............................................................................................................................. 14
3.6.3 Zigbee Conclusion Devices ....................................................................................................... 15
3.7 Zigbee Networking Protocol & Layers ............................................................................... 16
3.7.1 Physical Layer ............................................................................................................................ 17
3.7.2 Mac Layer ............................................................................................................................... 18
3.7.3 Network Layer ........................................................................................................................ 19
3.7.4 Application Layer .................................................................................................................... 20
3.8. Network Topologies For Zigbee ...................................................................................... 21
3.8.1 Star Topology............................................................................................................................ 21
3.8.2 Zigbee Tree Topology ................................................................................................................ 21
3.8.3 Zigbee Mesh Topology ............................................................................................................. 22
3.9 Applications ........................................................................................................................ 22
4.1.Classification of Routing Protocols..................................................................................... 24
4.1.1 Based On Path Establishments ................................................................................................. 25
4.1.2 Based On Network Structure ..................................................................................................... 26
4.1.3 Based on operation ................................................................................................................... 27
4.1.4 Based On Initiator ...................................................................................................................... 28
4.2 Sensor Protocol For Information Via Negotiation (SPIN) .................................................. 28
4.3 Rumor Routing .................................................................................................................... 29
4.4 Directed Diffusion .............................................................................................................. 30
4.5 Low Energy Adaptive Clustering Hierarchy (LEACH) ...................................................... 30
4.6 Ad-Hoc on Demand Distance Vector(AODV) .............................................................. 31
4.7. Dynamic Source Routing(DSR) ......................................................................................... 35
Simulations and Results .............................................................................................................................. 41
5.1. OPNETTool ....................................................................................................................... 41
5.1.1 OPNET Network Editor ........................................................................................................... 42
5.1.2 Process Editor ......................................................................................................................... 42
5.1.3 Node Editor .............................................................................................................................. 43
5.2. End To End Delay .............................................................................................................. 44
5.3. Network Through Put ......................................................................................................... 45
ix
5.4. Using OPNETAodv Deploy On 10 Nodes ......................................................................... 45
5.5. Using OPNET AODV Deploy On 15 Nodes ..................................................................... 47
5.6. Using OPNET AODV Deploy On 20 Nodes .................................................................... 48
5.7. Using OPNET DSR Deploy on 10 Nodes .......................................................................... 49
5.8. Using OPNET DSR Deploy On 15 Nodes ........................................................................ 51
5.9. Using OPNET DSR Deploy on 20 Nodes .......................................................................... 52
5.10. ZIGBEE ............................................................................................................................ 53
The current chapter discusses Routing protocols and their performance& conclusion. ........... 56
6.1 Routing Protocols and their Performance ...................................................................... 57
6.2 ZIGBEE Nodes-applicability .............................................................................................. 59
6.3 Observations and Future work ............................................................................................ 60
References…………………………………………………………………………………………………………………………………………….61
x
LIST OF ACRONYMS
RR Rumor Routing
xi
List Of Figures
Figure 1.1: Components of Wireless Sensor Network .................................................................................. 1
Figure 2.1: MANET ...................................................................................................................................... 6
Figure 2.2: MANET Node Interfaces ........................................................................................................... 8
Figure 3.2: ZIGBEE Vs WIFI ..................................................................................................................... 13
Figure 3.3: Network of ZIGBEE................................................................................................................. 15
Figure-3.4: ZIGBEE Devices...................................................................................................................... 16
Figure-3.5: ZIGBEE Layers........................................................................................................................ 17
Figure-3.6: Physical Layer Header ............................................................................................................. 17
Figure-3.7: Mac Layer Header .................................................................................................................... 18
Figure-3.10: Star Topology Zigbee ............................................................................................................. 21
Figure-3.11: ZIGBEE Tree Topology ......................................................................................................... 22
Figure-4.1: Categorization of Routing Protocols ....................................................................................... 25
Figure-4.2: Spin Routing Protocol .............................................................................................................. 29
Figure-4.3: Rumor Routing ....................................................................................................................... 30
Figure-4.5: AODV Step- 1 .......................................................................................................................... 32
Figure-4.6: AODV Step- 2 .......................................................................................................................... 33
Figure-4.7: AODV Step- 3 .......................................................................................................................... 33
Figure-4.8: AODV Step- 4 .......................................................................................................................... 34
Figure-4.9: AODV Step- 5 .......................................................................................................................... 34
Figure-4.10: AODV Step-6 ......................................................................................................................... 34
Figure-4.11: DSR Step- 1 ........................................................................................................................... 35
Figure-4.12: DSR Step- 2 ........................................................................................................................... 36
Figure-4.13: DSR Step- 3 ........................................................................................................................... 36
Figure-4.14: DSR Step- 4 ........................................................................................................................... 37
Figure-4.15: DSR Step- 5 ........................................................................................................................... 37
Figure-4.16: DSR Step- 6 ........................................................................................................................... 38
Figure-4.17: DSR Step- 7 ........................................................................................................................... 38
Figure-4.18: DSR Step- 8 ........................................................................................................................... 39
Figure-5.1: Working model of OPNET ...................................................................................................... 41
Figure-5.2:Network Editor ....................................................................................................................... 42
Figure-5.3: Process Editor .......................................................................................................................... 43
i
Figure-5.4: Node Editor .............................................................................................................................. 44
Figure-5.5: Deploying AODV on 10 Nodes. .............................................................................................. 45
Figure-5.6: Features of AODV Deploying with 10 Nodes. ........................................................................ 46
Figure-5.7:Deploying AODV on 15 Nodes............................................................................................ 47
Figure-5.8: AODV Shows with 15 Nodes. ................................................................................................. 47
Figure-5.10: AODV Shows with 20 Nodes. ............................................................................................... 48
Figure-5.11: Deploying DSR on 10 Nodes. ................................................................................................ 49
Figure-5.12:DSR Response 10 Nodes. ................................................................................................... 50
Figure-5.13: Deploying DSR on 15 Nodes. ............................................................................................... 51
Figure-5.14: DSR Response 15 Nodes. ..................................................................................................... 51
Figure-5.17: ZIGBEE Network................................................................................................................... 53
Figure-5.18:Response Show Network Through-Put Of ZIGBEE ...................................................... 54
Figure-5.19:ZIGBEE Network End To End Delay Curve. ......................................................................... 55
ii
List of Tables
Table 4.1: Difference between Proactive and Reactive Routing Protocol…………………..…………………………26
Table 6.1: Composite Performance Analysis of Routing Protocols………………………………………………………..58
iii
CHAPTER 1
INTRODUCTION
This Chapter contains the literature related to Wireless Sensor Network (WSN). WSN comprises
regarding hundreds of nodes that are connected to sensors.The purpose of these nodes is to
collect information, which can be physical or environmental, and deliver it to the source.
iv
1.1 Introduction
This Chapter contains the literature related to Wireless Sensor Network (WSN). WSN comprises
regarding hundreds of nodes that are connected to sensors. The purpose of these nodes is to
collect information, which can be physical or environmental, and deliver it to the source [1].
There are five constituents of a sensor node, including memory, controller, sensors/actuators,
communication device and power supply as depicted in Figure 1.1.
Memory
Communication Sensors/
Device
Controller
Actuators
Power Supply
The component of memory is meant to store information, whereas, the purpose of controller is to
manipulate the transmission of information. The communication devices help in the
transmittance of information from nodes to the source. The sensors or actuators act as sensing
devices in complete set up, whereas, the power supply has function to give power to the nodes.
A sensory network comprises of sensor nodes, gate ways and software. The information
is collected by sensor node and transferred to the gate ways. From the gateways, information is
transmitted to source system, which further analyzes and manipulates the information with the
help of software.
1
1.2 Background
A Mobile Ad-Hoc Network (MANET) entails interconnected wireless nodes that can move in all
directions. They are able to follow any satellite or WIFI connection. The two types of MANET
includes infrastructural and infrastructural-less. In the infrastructural category, data is transmitted
and received with the help of infrastructure, whereas, in the infrastructural-less category, there
are limitations imparted on power, bandwidth and quality. However, the network belonging to
second category is more cost effective.
1.3. Applications
WSN has many applications including disaster relief operations, acoustic detection, biodiversity
mapping, habitat monitoring,development of improved buildings and bridges, machine
surveillance, agricultural precision, military surveillance, medicinal and health care
applications,water quality monitoring [2], process monitoring, industrial monitoring, inventory
tracking, ground and underwater coverage, indoor and outdoor coverage [3].
Owing to wide applicability of the WSN, remains expected towards be utilized in various fields
and industries.The present study aims to develop different setups of wireless sensor nodes. These
setups will perceive, manipulate information over network and transmit it to the source. The
performance of the WSN will be analyzed with the help of through put, sent and received
packets,end to end delay. The network will be scaled and its impact on the network performance
will be checked.
Although there are various applications of wireless sensor networks, it has some limitations in
relations regarding bandwidth, remembrance, Central Processing Unit (CPU), and power. Power
consumption stands crucial feature at some places of WSN application. In such cases, a sensor
network is recommendable due to long durability. At some places, less data rate and simple setup
is required. In such cases, ZIGBEE can be used as it is more cost effective with a physical range
of 10-20 m and a data rate of 250 Kbit/s.
2
A WSN may have its own routing protocols because less power and small sizes of WSN confines
the applicability of traditional routing protocols for them. In the present study the performance of
WSN is analyzed with the help of Ad-hoc On Demand Distance Vector (AODV) also Dynamic
Source Routing (DSR) [4]. Comparative study regarding AODV and DSR protocols will be
conducted on the basis of varying scenarios and scalability factors. This approach will help to
determine better routing protocol based on the variation in applications.
The WSN comprises of interconnected and distributed nodes, which receive and transmit
information to the source. This information may vary in accordance with the application. It may
be a physical or environmental change. Due to its high applicability, the interest in studying
WSN and enhancing its benefits has tremendously increased in the previous few years. In a
conventional setup, each node consists of memory, control unit and power. As WSN are small
sizes and have power limitations, traditional routing protocols cannot be used for them. On the
basis of various factors such as communication initiators and network structure, WSN has its
own specific routing protocols [5].
In the present study, OPNET modular is used. OPNET refers to computer software which is used
to simulate networks of communication. The main advantages of OPNET are its user friendliness
and easy to use. It has many applications including aid in configuration of network and defining
the protocols. The OPNET allows the use to create any network scenario with the use of just drag
drop devices.
Previous research has focused on routing protocols of WSN. Some researchers have used
OPNET simulator along with the WSN. AODV and DSR have also been studied for their
applicability with WSN [6]. According to previous researches, AODV has greater through put,
whereas, DSR has lower end to end delay. On the other hand, ZIBGEE has been claimed to be
useful for low data rates and short ranges. It has long durability due to less power usage. It is
highly used as a communication protocol.
3
1.6 Thesis layout
The first chapter includes an introduction of WSN, problem definition, and brief literature
review.
The second chapter consists of explanatory notes on WIFI and MANET, node architecture,
network architecture.
The fourth chapter is comprised of details about different routing protocols of WSN.
The fifth chapter is comprised of simulation results with the implementation of routing protocols
AODV and DSR, followed by conclusions and recommendations.
4
CHAPTER 2
This Chapter contains the literature related to MANET comprises of interconnected wireless
nodes, which acts on the basis of point to point communication. Each node acts as a router which
can forward information to the adjacent nodes. Any physical change in the environment is sensed
by the nodes and after processing of the information, it is transferred to the source.
5
A Mobile Ad-Hoc Network (MANET) comprises of interconnected wireless nodes, which acts
on the basis of point to point communication [7]. Each node acts as a router which can forward
information to the adjacent nodes. Any physical change in the environment is sensed by the
nodes and after processing of the information, it is transferred to the source. Figure 2.1 shows a
typical setup of MANET.
In Vehicular Ad-Hoc Network cars are used by means regarding nodes. Each of these
nodes performs the duty of a router by communicating with the other nodes.
In Internet Based Mobile Ad-Hoc network are used to interlink fixed and mobile nodes.
Trendy Brainy Vehicular Ad-Hoc Network, artificial intellect remains cast-off towards overawed
astonishing happenings.
6
In Smart Phone Ad Hoc Network, smart phones are used as nodes.
The qualities of transmittance and reception are required for an effective communication to
take place. Such a device which has ability to transmit as well as receive is called a transceiver. It
has three states including the state of receiving and transmitting, sleep and idle state. In sleep
state the transceiver cannot receive anything, whereas, in an idle state it can receive but is not
receiving at the moment. An example of transceiver device is RFM TR1000 family.
2.3.2 Memory
There are three kinds of memories including Random Access Memory (RAM), Read-Only
Memory (ROM) and Electrically Erasable Programmable Read Only Memory (EEPROM).
Although the RAM has ability to store the data, the memory is lost when power is switched off.
In such cases sensing data is stored in ROM &EEPROM.
2.3.3 Controller
Constituentregarding controller remains meant towards manipulate the keptstatistics. There are
different types of controllers utilized in the MANET including DSPs, ASICs, and FPGAs. The
DSP mainly has utilization in signal processing, ASIC has high performance applicability and
FPGA is usually used for testing purposes.
7
2.3.4 Power
The power is provided in the network of nodes through batteries. Batteries can be environment
dependent or rechargeable.
The Figure-2.2 shows the architecture of MANET. The hosts are linked to IP links which are
further connected to a router called MANET node. The MANET nodes may consist of MANET
interfaces. These interfaces have distinctive prefixes, which are achieved through IPv4 or IPv6.
Both WSN and MANET use battery power and do not consist of any infrastructure. Moreover,
both of them execute in free frequency spectrum and utilizes multi hop routing.
8
2.6.Challenges In Mobile Ad-Hoc Network(MANET)
There are many challenges in the use of MANET. For instance, it does not has centralized
identity. There are routing issues, channel access problems, quality matters, collision
complications Other problems include limitation of bandwidth, battery and security issues [8].
9
CHAPTER 3
ZIGBEE
The chapter consists of ZIGBEE specifications which are based on introduction, design,
network topologies and applications.ZIGBEE has multiple qualities such as lower rates for data,
shorter range of wireless networking and capability to remain operational for greater lengths of
time as the device remains mostly in sleep mode, which is a power saving mode. ZIGBEE is also
known as a communication protocol of advanced level that is used in Personal Area Network
(PAN).
10
3.1. Introduction
The chapter consists of ZIGBEE specifications which are based on introduction, design, network
topologies and applications. The word “ZIGBEE” is a derivative of honey bee that follows a
zigzag pattern to connect and converse with fellow honey bees in a multi hop manner. ZIGBEE
has multiple qualities such as lower rates for data, shorter range of wireless networking and
capability to remain operational for greater lengths of time as the device remains mostly in sleep
mode, which is a power saving mode. ZIGBEE is also known as a communication protocol of
advanced level that is used in Personal Area Network (PAN). ZIGBEE uses a mesh topology that
makes it possible to route the data over much larger distances. ZIGBEE has a lower average
current because it uses lower latency rates. ZIGBEE has been the latest addition to the
technologies introduced by the ZIGBEE alliance which is based on a group of companies
working on the lines of defining low data rate wireless. The alliance seems to counter wider
challenges while making the device interoperable, which can increase its compatibility with
devices of other manufacturers [9].
3.2 Specifications
Low expenses.
Low potential.
11
Bluetooth utilizes 1MHZ bandwidth. On the other hand ZIGBEE applies 0.6 to 2 MHz
bandwidth based on the network frequency.
In ZIGBEEserves more connectivity space with 65000 cell nodes whereas Bluetooth
has lower connectivity with 8 cell nodes.
ZIGBEE is famous for its quality of self healing whereas Bluetooth doesn’t have self
healing network.
Blue Tooth possesses up to 1Mbps of data rate and ZIGBEE possesses a data rate up
to 250Kbps.
12
3.4 Zigbee Vs Wifi
ZIGBEE belongs to IEEE 802.15 standard where as WIFI belongs toIEEE 802.11 x
standard.
ZIGBEE can provide a network range up to 10 to 30 meters based on the application type
on the hand WIFI deals with a network range up to 30-100 meters.
ZIGBEE has higher bitrates of 4 micro seconds than WIFI which has only 0.00185 micro
seconds bitrates.
ZIGBEE has higher number of nodes almost 65000 whereas Single WIFI network has
nodes not more than 2007.
ZIGBEE utilizes one-fourth of the power utilized by Wi-Fi [12].
13
3.5 Interoperability
ZIGBEE has the ability to communicate with other devices despite of different manufacturing
backgrounds and due to wide usability of ZIGBEE in several applications in the modern times
which makes ZIGBEE an interoperable device.
14
Figure3.3: Network of ZIGBEE [13]
15
Figure-3.4: ZIGBEE Devices
16
Figure-3.5: ZIGBEE Layers [15]
According to the above illustration the physical layer header is segregated in to 3 portions which
are payload, physical header (PHR) and synchronization header (SHR). The basic purpose of
17
SHR is the bit synchronization between transmitter and the synchronization header. It is
segregated more into preamble as well as start of frame delimiter. The bit synchronization is
done by the preamble where as the start of frame delimiter is used for indication of end of SFD
and the beginning of PHR through the indicator bit. The number of ocets is defined by the frame
length. The foremostaccountabilities of the physical layer are:
Bit Synchronization.
Oscillator frequency selection.
Problemsassociatedwiththe physical transmission of bits.
The diagram above shows three parts of MAC layer that are MAC payload, MAC header and the
MAC footer. The MAC header is subdivided into frame control and sequence number where as
the frame control helps in defining the frame type the sequence number guides in the
arrangement quantity definition regarding statistics. Further more the Starting pointalso the
source PAN identifier remain involved in identifying the PAN of destination and source. The
Destination and source PAN resolveremain similar in case the source and destination operates in
the same personal area network. Source and destination are the addresses of source and host
respectively. MAC payload consists of the above layer data and the subfield frame check
sequence stands last in the MAC footer. In Data Packets for error detection Frame check
sequence (FCS) remains utilized. Functions of MAC layer are given below:
18
Error detector.
Physical addresser.
MAC layers communication by peer to peer method.
Channel access.
Network header and network payload are two subdivisions of the network layer. Frame control is
the first field in the network header, which is involved in the frame type definition. Addressing is
done with the help of source and the destination addresses and the delivery of packets in order is
done with the help of the sequence number. Destination and source IEEE addresses are utilized
in the physical addressing. Radius field is utilized for the amount of hopes permissible to the
frame to have multicast. The Source or sender identifies the route of the packet in the source
routing method. Major duties of network layer are as follows:
19
3.7.4 Application Layer
The top most layer over OSI model remains the application layer which stands a user interface.
The major components of this layer are:
Application Support Sub layer (APL).
ZIGBEE Device Objects (ZDO).
Application Framework.
APL classifies an interface that lies between application and network layer, assists in data
transmission and allows group address administration. ZIGBEE consists of different device types
including controller, router and end devices. ZDO elaborates the functionality regarding
coordinator routers as well as termination instruments over tasks connected to network also
perform security. Figure-3.9 shows data transfer hierarchy:
20
3.8. Network Topologies For Zigbee
ZIGBEE employed the physical as well grip MAC layer nominated by means concerning IEEE
802.15.4 that obliges quite a lot of topologies such as the star, mesh, tree and cluster tree but
cluster tree topology is not supported by ZIGBEE but star mesh and tree are the topologies
supported by ZIGBEE [18].
21
Figure-3.11: ZIGBEE Tree Topology
The drawback is same as star topology like there is no alternate route.
3.9 Applications
Monitoring regardingbulkygaugestructures.
Longer lifespan.
22
CHAPTER 4
ROUTING PROTOCOLS
WSN entails sensor node sequences which remain mutually linked through wires also wirelessly
as well. The nodes are dual in nature i.e. they can have mobility all directions like mobile nodes
or they can also be fixed. The current chapter discusses several protocols consumed for the
routing purpose in WSN.
23
WSN entails sensor node sequences which remain mutually linkedthrough wires also wirelessly
as well. The nodes are dual in nature i.e. they can have mobility all directions like mobile nodes
or they can also be fixed. Certain law and regulations are necessary for data transfer between
nodes. The current chapter discusses several protocols consumed for the routing purpose in
WSN. Routing is name of data transmission between source and destination when required. The
routing protocol effectiveness and competence is reliant on Network,Network scalability, too
node measurements [20].
24
Figure 4.1 depicts the arrangement concerning WSN.
Another protocol that is discussed is the reactive routing protocols where paths are calculated
and decided on demand. The routes are calculated and decided from source to destination only
dissimilar to proactive routing in which paths are calculated almost to each node present in the
network .Table 4.1 depicts comparative picture flanked by up beat also responsive procedure:
25
Table 4.1: Difference between Proactive and Reactive Routing Protocol
Proactive Reactive
Route from each node to every other node in Route from Source to Destination only
the network
Large routing tables Small or No Routing Tables
Routes are ready to use instaneously Routes constructed when needed, higher
connection setup delay
Periodic route-update packets Route update when necessary
An amalgamation of proactive and reactive protocols is present in the hybrid routing. It utilizes
distance vector along with the link state routing for the evaluations of the path. Hybrid routing
protocol seem to be more efficient and has lower consumption of power and memory.
26
4.1.3 Based on operation
Grounded over the routing paths, the protocols remain separated further towards multipath
routing, interrogation built routing, negotiation built routing, quality regarding services built,
clearalso non-coherent grounded.
The query based routing protocol has data reception node, which means the
destination node will transfer out of the network path. The nodes that have query data
respond only. The examples of query based routing are directed diffusion routing, and
rumor routing.
The data redundancy is reduced by negotiation based routing. The redundant data creates
overlap and energy consumption rises. Negotiation based routing protocols evade statistics
redundancy between nodes also toward the base station. SPIN routing staysamid the most known
examples of negotiation based routing protocol.
The basic thought overdue QOS routing protocol remains insurance regarding quality
service i.e. postponement limitations, energy restrictions also bandwidth. The Qos based routing
protocol is known to execute equilibrium amid energy ingestingin addition quality regarding the
data. Energy competent also quality regarding service (EQSR) remain instances regarding
quality regarding service founded routing protocol.
27
Coherent & Non-Coherent
Data dispensation extremely significant in WSN. Popular coherent based data dispensation the
facts transferred towards further nodes thru low dispensation, whereas over non-coherent
founded routing protocol facts stands managed formerly devolution towards the further nodes.
ADV.s
REQ.
DATA.
Adv is the sign for advertisement such as when any nodepossesses data which should be shared
this will give an ADV message to the neighboring nodes and if the neighboring nodes seem
concerned about the data responds back an ADV memo with REQ memoalsoas soon as the
sending node receives the REQ message it retorts with the data
28
Figure-4.2: Spin Routing Protocol
29
Figure-4.3: Rumor Routing
Step up phase.
Steady phase.
In the step up phase the nodes select their gathering craniumal so code division multiple access
remains utilized by all nodes towards stake their data by cluster head as well as cluster head
30
prepare plan for TDMA slots used for cluster nodes. Data transmission from phase nodes
towards cluster heads happens over second phase. The receiver of cluster heads remain on so that
it has the ability to attain data from cluster nodes and after data reception the cluster head
compresses data over towards a single signal. Below is the diagram illustrating the functionality
of this protocol as well;
RREQ message: The message generated as soon as source node ‘S’ is in position to transmit data
to destination node ‘D’ . Such messages transfer the source and destination ip addresses, source
sequence number and destination’s recent sequence number as well as the broadcast id of source.
Right after the generation of RREQ message the neighbors of source node receives this message
from source node itself and if we assume a neighbor node which is represented by ‘P’,
31
subsequent to the REQ message reception as of source node ‘S’ it responds back by means of
RREP as well as builds a path repeal in nature back to the source node ‘S’:
AODV related path identification and packet delivery is how in the figure below. Suppose
consists of a node that has taken an RREQ message back from the source node ‘S’.
32
Figure-4.6: AODVStep- 2
RREQ message when received at the node ‘S’, the other respective nodes ‘B’ ,’C’, ‘E’ responds
to the node ’S’ with RREP message also that the nodes distribute the RREQ message along with
the neighbors as shown in figure-4.7:
33
Figure-4.8: AODV Step- 4
‘J’ and ‘K’ nodes will follow the same line of action.
34
4.7. Dynamic Source Routing(DSR)
In 1996 the dynamic source routing was developed at CMU which was used in wireless sensor
networks. Dynamic source routing can either be on demand or reactive [28]. The name suggests
that it applies source routing as an alternative to routing tables. The DSR Routing has two
phrases:
Route Discovery.
Route Maintenance.
Route discovery phase is initiated by source node and the phase deals with route request and
route reply messages. Destination node responds back to the source node with route reply RREP
message dissimilar to AODV where all the intermediary nodes would respond thru route reply
message RREP also the basic aim regarding ensuingsegment route preservation remains towards
retain away from flooding regarding RREP messages as well as cast-offaimed at cutting short
regarding no desfashionable amongst source also destination. The subsequent below describes
the route discovery in dynamic source routing protocol:Let’s assume Node ‘S’ stays a node that
acknowledged a request for route discovery for node ‘D’.
35
Nodes ‘B’, ‘C’ and ‘E’ will be receiving request from Node ‘S’ as shown in figure-4.12:
Nodes ‘B’ and ‘C’ will transmit and Node ‘H’ will obtain a request RREQs whereas these
transmissions may collide with each other.
36
Nodes ‘F’ and ‘G’ will send further RREQ to the neighboring nodes and as soon as node ‘C’
obtains a request once more the node seems to stop and not send again since it has by now sent
once as shown in figure-4.14:
The RREQ is sent by Nodes ‘J’ and ‘K’ to neighboring nodes whereas ‘D’ might get an RREQ
from nodes ‘J’ and ‘K’ so collision is possible.
37
RREQ message is not sent further by node ‘D’ as it is the destination itself and the node that is
been targeted as shown in figure-4.16:
Node ‘D’ responds back with RREP and route is further similar to as shown in figure-4.17 given:
38
When RREP message is sent by node ‘D’ and received at node ‘S’ the flow of packet flow will
be like that as shown in figure-4.18 given:
39
CHAPTER 5
The mobile ad-hoc network can be analyzed with the help of different simulators, which depict
the performance of the respective networks. In order to evaluate the network performance, some
physical environment needs to be created. In the present study, OPNET tool is used for
simulation. In an OPNET tool, various scenarios can be created through drag and drop method.
40
Simulations and Results
The mobile ad-hoc network can be analyzed with the help of different simulators, which
depict the performance of the respective networks. In order to evaluate the network performance,
some physical environment needs to be created. In the present study, OPNET tool is used for
simulation. In an OPNET tool, various scenarios can be created through drag and drop method.
The performance of WSN can be checked with the help of following simulation tools:
NS-2
AVRORA
J-Sim
OPNET
TOSSIM
OMNET++
EmStar
ATEMU
5.1. OPNETTool
OPNET is a widely used software, which is used for computation and simulation of
networks. Its feature of graphical editing helps in constructing personalized protocols, and
configurations. Different devices such as IBGEE, mobile or static nodes can be used in
connection with the OPNET through drag and drop method, linked with the object palette.
Consequently, when nodes are placed on work window, any scenario or network can be
constructed. Moreover, OPNET has a wide range of parameters of simulation. These parameters
help in constructing any practical environment. Figure-5.1 shows the working model of OPNET
41
Following Editors available in OPNET:
1. Network Editor.
2. Process Editor.
3. Node Editor.
4. Link Editor.
42
Figure-5.3: Process Editor
43
Figure-5.4: Node Editor
5.1.4 Link Editor
A link editor helps in creating and defining a link model. A link model exists in the form of a
connection between nodes. The features such as data rate, propagation delay, error model etc can
be defined by link editor.
44
5.3. Network Through Put
The Network through put can be demarcated by way regarding the number of packets a
receiver receives. When demarcated in terms of a network, it is the rate regarding effective
messages in a communication channel.
The above mention state will be utilized for about 3700 seconds.
45
The various features of AODV in a network of 10 nodes are shown in the Figure-5.6.
46
5.5. Using OPNET AODV Deploy On 15 Nodes
47
5.6. Using OPNET AODV Deploy On 20 Nodes
In OPNET simulator the above display scenario is created. Following features are observed:
48
5.7. Using OPNET DSR Deploy on 10 Nodes
49
Following features were observed for the network of DSR Shows with 10 Nodes
50
5.8. Using OPNET DSR Deploy On 15 Nodes
51
5.9. Using OPNET DSR Deploy on 20 Nodes
In OPNET simulator the above display scenario is created. Following features are observed:
52
5.10. ZIGBEE
In the present study, a scenario was created consisting of 4 ZIGBEE nodes. The OPNET was
utilized for simulating ZIGBEE network.
53
The through-put and end to end delay were selected and recorded after simulations.
54
Figure-5.19:ZIGBEE Network End To End Delay Curve.
55
CHAPTER 6
CONCLUSIONS
The current chapter discusses Routing protocols and their performance& conclusion.
56
6.1 Routing Protocols and their Performance
Complete information is not carried in the AODV. Consequently, the source and intermediate
nodes also carry the mere information related to flow of the data packet. When the network
consists of 10 nodes, the delay initiates at ~0.0050sec. Following this, it starts to decay for
~0.0002sec and remains at the same for the complete simulation period. When the network
consists of 15 nodes the delay initiates at ~0.0040sec. Following this, it starts to decay for
~0.001sec and remains at the same for the complete simulation period. When the network
consists of 20 nodes the delay initiates at ~0.0044sec. Following this, it starts to decay for
~0.0001sec and remains at the same for the complete simulation period.
On the other hand, in DSR complete path information is carried out in the packet. There is more
consistency in the DSR path as compared to AODV. When the network consists of 10 nodes, the
delay initiates at ~0.0020sec. Following this, it starts to decay for ~0.0035sec and remains at the
same for the complete simulation period. When the network consists of 15 nodes the delay
initiates at ~0.0030sec. Following this, it starts to decay for ~0.0050sec and remains at the same
for the complete simulation period. When the network consists of 20 nodes the delay initiates at
~0.0050sec. Following this, it starts to decay for ~0.015sec and remains at the same for the
complete simulation period.
57
Table 6.1: Composite Performance Analysis of Routing Protocols
NODES PARAMETERS AODV DSR
10 DELAY(in Seconds) 0.005 0.01
THROUGH- 200 50
PUT(KB/Sec)
15 DELAY(in Seconds) 0.0025 .005
THROUGH- 225 225
PUT(KB/Sec)
20 DELAY(in Seconds) 0.004 0.015
THROUGH- 500 225
PUT(KB/Sec)
From the Table 6.1, it is quite evident that through-put is greater in AODV. When the network
consists of 10 nodes, the through-put is ~300K bits/sec. When the network consists of 15 nodes
the through-put is ~320K bits/sec. When the network consists of 20 nodes the through-put is
~350K bits/sec. On the other hand, in a DSR network of 10 nodes, through-put is ~60K bits/sec.
When the network consists of 15 nodes the through-put is ~250K bits/sec. When the network
consists of 20 nodes the through-put is ~450K bits/sec.
58
6.2 ZIGBEE Nodes-applicability
The ZIGBEE nodes are mostly utilized when lower data rates are required. Consequently,
when longer battery life is needed, ZIBGEE nodes are highly used. Although the wireless system
helps in the provision of higher data rates, the requirement of high power limits their use.
Consequently, at such places again ZIBGEE is highly applicable as it boosts up the quality and
life of the network.
In a network consisting of ZIBGEE nodes, the end delay is greater a shown in figures 33
and 34. In ZIBGEE, the delay initiates from 0.070 Sec and at 0.080 Sec it is saturated. On the
other hand, in WSN nodes, the delay is not even seen starting from 0.020 Sec. Moreover, it is
also evident that the throughput value of a ZIBGEE network is lower than the WSN network. It
depicts a linear increase at the beginning and gets stable at 7400 bits/Sec. Therefore, ZIBGEE
nodes are highly recommendable at the place where network life span and economical issues are
concerned.
59
6.3 Observations and Future work
In the present study, a network of mobile nodes on OPNET was constructed. This network is also
known as wireless sensor network (WSN), which have wide applicability in health care
monitoring, area monitoring and relief operations [29]. The routing protocols utilized and
compared includes AODV and DSR. The comparison was made on the basis of the respective
performances. The performance of each routing protocol was depicted through end to end delay
and throughput values. These values were calculated through variation in the network scale.
When the size of the network is increased in AODV, it is observed that end to end delay is
decreased and throughput value is increased. Resultantly, the performance of the network is
enhanced. It is observed that throughput value has more consistency in AODV, whereas, end to
end delay has more consistency in DSR. The future researches should focus on the performance
evaluation of wireless sensor network. The protocols such as TORA and OLSR should be
evaluated to understand their applicability [30].
ZIBGEE has applicability at places where less power and data rate is required. In the
present study, a network with eight ZIGBEE nodes, four routers and one coordinator was
created. It is observed that data rate is lesser and throughput values are greater in a ZIBGEE
device. IT is recommended that future works should focus on creating different scenarios in
order to have a better evaluation of ZIBGEE.
60
References
[1] J. Grover and Anjali, “Wireless sensor network in railway signalling system,” Proc. -
2015 5th Int. Conf. Commun. Syst. Netw. Technol. CSNT 2015, pp. 308–313, 2015.
[4] M. Urbina, T. Acosta, V. Christian, and G. Chafla, “Analysis and comparison of routing
protocols in Wireless Sensor Networks under 802.15.4,” 2015 IEEE Thirty Fifth Cent.
Am. Panama Conv. (CONCAPAN XXXV), no. Concapan Xxxv, pp. 1–6, 2015.
[7] D. Jinil Persis and T. Paul Robert, “Review of ad-hoc on-demand distance vector protocol
and its swarm intelligent variants for Mobile Ad-hoc NETwork,” IET Networks, vol. 6, no.
5, pp. 87–93, 2017.
[9] F. Chen, L. Qin, X. Li, G. Wu, and C. Shi, “Design and Implementation of ZigBee
Wireless Sensor and Control Network System in Greenhouse,” Proc. 36th Chinese
Control Conf., pp. 8982–8986, 2017.
61
[10] https://www.engineersgarage.com/contribution/zigbee-vs-bluetooth
[11] https://www.engineersgarage.com/contribution/zigbee-vs-wi-fi.
[12] Z. Zhao, X. Wu, X. Zhang, J. Zhao, and X. Y. Li, “ZigBee vs WiFi: Understanding issues
and measuring performances of their coexistence,” 2014 IEEE 33rd Int. Perform. Comput.
Commun. Conf. IPCCC 2014, no. 61172063, pp. 2–9, 2015.
[13] http://www.eetimes.com/document.asp?doc_id=1276404.
[14] J. Jaslin, “ZigBee Wireless Sensor Network Simulation with Various Topologies,” 2016.
[15] http://www.researchgate.net/figure/226297449_fig2_Fig-22-IEEE820154ZigBee-
protocol-stack-architecture.
[16] http://www.libelium.com/security-802-15-4-zigbee.
[17] http://www.rfwireless-world.com/Tutorials/802-11ac-MAC-layer.
[18] U. K. Roy, “Enhancing ZigBee Tree Routing to Support Large Pseudo-Linear Network
Topologies,” 2016 2nd Int. Conf. Control. Instrumentation, Energy Commun., pp. 501–
505, 2016.
[19] R. Kumari and P. Nand, “Performance comparison of various routing protocols in WSN
and WBAN,” Proceeding - IEEE Int. Conf. Comput. Commun. Autom. ICCCA 2016, pp.
427–431, 2017.
[21] http://www.researchgate.net/publication/311577034_
62
[24] V. Jain and N. A. Khan, “Simulation analysis of directed diffusion and SPIN routing
protocol in wireless sensor network,” 2014 Conf. IT Business, Ind. Gov., pp. 1–6, 2014.
[25] A. Azim and M. M. Islam, “Hybrid LEACH: A relay node based low energy adaptive
clustering hierarchy for wireless sensor networks,” Proc. - MICC 2009 2009 IEEE 9th
Malaysia Int. Conf. Commun. with a Spec. Work. Digit. TV Contents, no. December, pp.
911–916, 2009.
[26] http://www.researchgate.net/publication/236107701
[27] M. Devi, “A SURVEY ON ATTACKS IN ADHOC ON,” no. 978, pp. 485–488, 2017.
[28] I. Minakov, R. Passerone, A. Rizzardi, and S. Sicari, “Routing behavior across WSN
simulators: The AODV case study,” IEEE Int. Work. Fact. Commun. Syst. - Proceedings,
WFCS, vol. 2016–June, 2016.
[29] H. Yang, C. Tian, B. Cheng, L. Ci, Z. Wang, and M. Yang, “CDS - A Collaborative
Dynamic Source Routing Protocol for Wireless Sensor Network,” 2015 IEEE 12th Intl
Conf Ubiquitous Intell. Comput. 2015 IEEE 12th Intl Conf Auton. Trust. Comput. 2015
IEEE 15th Intl Conf Scalable Comput. Commun. Its Assoc. Work., pp. 617–621, 2015.
[30] M. Kassim, R. A. Rahman, and R. Mustapha, “Mobile ad hoc network (MANET) routing
protocols comparison for wireless sensor network,” 2011 IEEE Int. Conf. Syst. Eng.
Technol., pp. 148–152, 2011.
63