SlideShare a Scribd company logo
IEEE 802.15.4 LR-WPAN
Wireless Sensor Networks(WSN)Wireless Sensor Networks(WSN)
NetSim v9.1NetSim v9.1
Network Simulation/Emulation
Platform
IntroductionIntroduction
• IEEE 802.15.4 LR-WPAN(Low data Rate -
Wireless Personal Area Networks) standard is
widely used because of its position
independent sensing capabilities even in toxic
and inaccessible regions to humans.
• Sensors are low cost and can be randomly
placed as long as they are in some sensors
coverage area.
ApplicationsApplications
• Area Monitoring
– WSN is deployed over a region where some
phenomenon is to be monitored like detecting
enemy intrusion etc.,
• Forest Fire Detection
– A network of Sensor Nodes can be installed in a
forest to detect when a fire has started.
• Battlefield surveillance
• Reference: Wikipedia
Devices in WSNDevices in WSN
• WSN has mainly two types for devices;FFD,RFD
• FFD or Full Functional Device
– Senses the agent
– Routes packets and
– Initialize the Network(act as PAN Coordinator)
– Can communicate with another RFD or FFD
• RFD or Reduced Functional Device
– Can only sense the agent
– Can communicate with FFD only
Sink nodeSink node
• Sink node is the principal controller in WPAN
and there is only one PAN Coordinator in a
WSN.
• If Sink node uses Beacon enabled mode then
nodes use Slotted CSMA/CA algorithm for
transmitting packets else nodes use Unslotted
CSMA/CA.
AgentAgent
• Sensors sense the Agent and generate a packet
containing its position if the agent is in its
sensitivity range.
• In NetSim, Agent mobility is modeled by
RandomWalk and RandomWayPoint which are
followed internationally to test WSN.
• For each of the models we can set its velocity and
pause time(only random way point) and also we
can capture the agents path for the whole
simulation.
SensorSensor
• WSN consists of spatially distributed sensors
to monitor physical or environmental
conditions, such as temperature, sound,
pressure, etc. and to cooperatively pass their
data through the network to a main
location(Sink node).
Scenarios in WSNScenarios in WSN
IEEE 802.15.4 operational modesIEEE 802.15.4 operational modes
Beacon FrameBeacon Frame
• Beacons occupy the first slot in SuperFrame.
• Beacons are used to synchronize the attached
devices, to identify the PAN, and to describe the
structure of the super frames.
• Beacon frames are transmitted periodically to
announce the presence of a network.
SuperFrame StructureSuperFrame Structure
The superframe is contained in a Beacon Interval bounded
by two beacon frames, and has an active period and an
inactive period
SuperFrame Contd..SuperFrame Contd..
Active PeriodActive Period
• Active period consists of two periods
– Contention Access Period (CAP)
– Contention Free Period (CFP)
• Length of active period is determined by the
SuperFrame Order
• Active Period Length =
aBaseSuperframeDuration * symbols
2
SO
Contention Access Period (CAP)Contention Access Period (CAP)
• In CAP all the nodes having a packet to transmit
compete for the channel and follows Slotted CSMA/CA
algorithm.
• A sufficient portion of the CAP remains for contention-
based access of other networked devices or new
devices wishing to join the network.
Contention Free Period (CFP)Contention Free Period (CFP)
• CFP is used to allocate slots for the nodes which require low latency
i.e., PAN coordinator allocates guaranteed time slots (GTS) for such
nodes.
• A node issues GTS allocation request to the PAN coordinator, which
can allocate available GTS to nodes.
• In the CFP, the node requested for GTS can transmit during its GTS
if it is allocated, without any contention with other devices.
• CFP can be disabled by disabling GTS.
Inactive periodInactive period
• In the inactive period, the coordinator may enter
a low-power mode and doesn’t interact with its
PAN which helps in reduced energy consumption
and so extends the network lifetime
• Inactive period can be remove by setting
SuperFrame Order same as Beacon Order
SOBO ≡
PacketPacket
• Packet is generated by the sensor whenever agent comes
with in its sensor range and for every sensing interval.
• Each packet is characterized by 3 variables NB,CW,BE
– NB, Number of backoffs the node has underwent while
attempting the current transmission, initialized to 0 before
every new transmission
– CW, Contention Window Length, which defines the number of
backoff periods that need to be clear of channel activity before
starting transmission. CW is only used with the slotted CSMA/CA
version. This value is initialized to 2 before each transmission
attempt and reset to 2 each time the channel is assessed to be
busy.
– BE, Backoff exponent is related to backoff periods (0 to 2BE
-1) a
device has to wait before attempting to assess the channel.
Clear Channel Assessment (CCA)Clear Channel Assessment (CCA)
• CCA is responsible for sensing channel as busy or idle.
• The CCA is performed in three operational modes:
– Energy Detection mode: If the Channel energy is less than ED
threshold then the channel is reported as Idle else channel is
reported as busy.
– Carrier Sense mode: CCA reports a busy medium only if it
detects a signal with the modulation and the spreading
characteristics of IEEE 802.15.4 and which may be higher or
lower than the ED threshold.
– Carrier Sense with Energy Detection mode: This is a
combination of the fore mentioned techniques. CCA reports the
medium is busy only if it detects a signal with the modulation
and the spreading characteristics of IEEE 802.15.4 and with
energy above the ED threshold.
CSMA/CA AlgorithmCSMA/CA Algorithm
DescriptionDescription
Unslotted CSMA/CA Slotted CSMA/CA
Step1 NB(=0),CW(=1),BE are initialized. NB(=0),CW(=2),BE are initialized.
Locate the backoff boundary and
attempt for transmission or channel
assess at the start of the slot.
Step2 MAC layer shall delay for a random number of
backoff periods in the range (0 to )
Same
Step3 MAC will request PHY to perform CCA.
If the frame transmission and acknowledgment
can be completed before the end of the current
CAP then MAC sub layer shall proceed else it shall
wait until the start of the CAP in the next
SuperFrame and repeat the evaluation.
Same
Step4
(Channel is
busy)
MAC sub layer shall increment both NB and BE by
one, ensuring that BE shall be no more than
aMaxBE and if NB is greater than
maxMaxCSMABackoffs then the packet is
discarded else return to step 2.
Same and CW is reset to 2.
Step5
(Channel is
Idle)
MAC sub layer starts transmission. If CW is zero then start transmission
else return to step 3
Data Link Layer ParametersData Link Layer Parameters
Parameter Standard Name Standard Value
Beacon Order BO [0 to 15]
SuperFrame Order SO [0 to 15]
Base SuperFrame Duration aBaseSuperframeDuration 15.36 milliseconds
Min Backoff Exponent macMinBE 3
Max Backoff Exponent aMaxBE 5
Max Frame Retries aMaxframeRetries 3
Max CSMA Backoffs macMaxCSMABackoffs 4
PHY ParametersPHY Parameters
Parameter Standard Value
Frequency Band 2.4 GHz
Chip Rate 2000 McPS
Symbol Rate 62.5 kSymbolsPS
Modulation Technique O-QPSK
Unit Backoff Time 20 Symbols
Turn Around Time 12 Symbols
Transmitter Power 100 mW
Sensor Range 100 m
Receiver Sensitivity -85 dbm
ED Threshold -95 dbm
ReferencesReferences
1. Specification-based Intrusion Detection for
Home Area Networks in Smart Grids
Paria Jokar, Hasen Nicanfar, Victor C.M. Leung Department of
Electrical and Computer Engineering The University of British
Columbia
1. ZigBee for Building Control Wireless Sensor
Networks
Fabio L. Zucatto1,2, Clecio A. Biscassi2 Ferdinando Monsignore2,
Francis Fidélix2, Samuel Coutinho2, and Mônica L. Rocha1
1. ZigBee Based Wireless Sensor Networks and Its
Applications in Industrial
Shizhuang Lin1, Jingyu Liu2 and Yanjun Fang3 Department of
Automation, Wuhan University

More Related Content

What's hot

Transport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksTransport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksRushin Shah
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
sashar86
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
Darwin Nesakumar
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issues
Menaga Selvaraj
 
An Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing ProtocolAn Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing Protocoljaimin_m_raval
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
ijujournal
 
Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...Mshari Alabdulkarim
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Sigma web solutions pvt. ltd.
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
Virendra Thakur
 
AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing)
ArunChokkalingam
 
MANET routing protocols Issues and Classifications
 MANET routing protocols Issues and Classifications MANET routing protocols Issues and Classifications
MANET routing protocols Issues and Classifications
ArunChokkalingam
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
Murtadha Alsabbagh
 
Swayambhoo Presentation (2)
Swayambhoo Presentation (2)Swayambhoo Presentation (2)
Swayambhoo Presentation (2)
swayambhoo
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
Kathirvel Ayyaswamy
 
Mac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshareMac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshare
Chih-Yu Lin
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
ArunChokkalingam
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
Pawan Kumar Tiwari
 

What's hot (20)

Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Transport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksTransport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networks
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issues
 
An Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing ProtocolAn Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing Protocol
 
Wsn 08
Wsn 08Wsn 08
Wsn 08
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 
Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing)
 
MANET routing protocols Issues and Classifications
 MANET routing protocols Issues and Classifications MANET routing protocols Issues and Classifications
MANET routing protocols Issues and Classifications
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Swayambhoo Presentation (2)
Swayambhoo Presentation (2)Swayambhoo Presentation (2)
Swayambhoo Presentation (2)
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Mac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshareMac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshare
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
 

Similar to Wireless Sensor Network

Thesis Presentation on Renewal theory based 802.15.6 latest.pptx
Thesis Presentation on Renewal theory based 802.15.6 latest.pptxThesis Presentation on Renewal theory based 802.15.6 latest.pptx
Thesis Presentation on Renewal theory based 802.15.6 latest.pptx
ssuserc02c1f
 
Zigbee 802-15-4
Zigbee 802-15-4Zigbee 802-15-4
Zigbee 802-15-4
SHUBHAM MORGAONKAR
 
4 g lte_drive_test_parameters
4 g lte_drive_test_parameters4 g lte_drive_test_parameters
4 g lte_drive_test_parameters
Aryan Chaturanan
 
4G_Drive_Test_Parameters
4G_Drive_Test_Parameters4G_Drive_Test_Parameters
4G_Drive_Test_Parameters
Amir Khan
 
4G_Drive_Test_Parameter (RSRP/RSRQ).pptx
4G_Drive_Test_Parameter (RSRP/RSRQ).pptx4G_Drive_Test_Parameter (RSRP/RSRQ).pptx
4G_Drive_Test_Parameter (RSRP/RSRQ).pptx
SuguKumar14
 
L2 MAC LTE PROCEDURES revC
L2 MAC LTE PROCEDURES revCL2 MAC LTE PROCEDURES revC
L2 MAC LTE PROCEDURES revCVincent Daumont
 
unit-iv-wireless-sensor-networks-wsns-and-mac-protocols
unit-iv-wireless-sensor-networks-wsns-and-mac-protocols unit-iv-wireless-sensor-networks-wsns-and-mac-protocols
unit-iv-wireless-sensor-networks-wsns-and-mac-protocols
Sitamarhi Institute of Technology
 
Satellite communications notes.thurd module
Satellite communications notes.thurd moduleSatellite communications notes.thurd module
Satellite communications notes.thurd module
simranbisti
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
Rahul Hada
 
wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.ppt
HODElex
 
8-ZigBee (2).pdf
8-ZigBee (2).pdf8-ZigBee (2).pdf
8-ZigBee (2).pdf
Jesus Cordero
 
UNIT-3 (2).pptx
UNIT-3 (2).pptxUNIT-3 (2).pptx
UNIT-3 (2).pptx
065JEEVASREEMCSE
 
LoRa online training for utility guys
LoRa online training for utility guysLoRa online training for utility guys
LoRa online training for utility guys
Nikolay Milovanov
 
Wireless Sensor network
Wireless Sensor network Wireless Sensor network
Wireless Sensor network
Dr Praveen Jain
 
UNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdfUNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdf
Mathavan N
 
Ca code and its properties
Ca code and its propertiesCa code and its properties
Ca code and its properties
KSINDHU6
 
WPAN According To ZIGBEE
WPAN According To ZIGBEEWPAN According To ZIGBEE
WPAN According To ZIGBEE
Afaq Siddiqui
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
nandhakumar421744
 
Ec 2401 wireless communication unit 5
Ec 2401 wireless communication   unit 5Ec 2401 wireless communication   unit 5
Ec 2401 wireless communication unit 5
JAIGANESH SEKAR
 

Similar to Wireless Sensor Network (20)

Thesis Presentation on Renewal theory based 802.15.6 latest.pptx
Thesis Presentation on Renewal theory based 802.15.6 latest.pptxThesis Presentation on Renewal theory based 802.15.6 latest.pptx
Thesis Presentation on Renewal theory based 802.15.6 latest.pptx
 
Zigbee 802-15-4
Zigbee 802-15-4Zigbee 802-15-4
Zigbee 802-15-4
 
4 g lte_drive_test_parameters
4 g lte_drive_test_parameters4 g lte_drive_test_parameters
4 g lte_drive_test_parameters
 
4G_Drive_Test_Parameters
4G_Drive_Test_Parameters4G_Drive_Test_Parameters
4G_Drive_Test_Parameters
 
4G_Drive_Test_Parameter (RSRP/RSRQ).pptx
4G_Drive_Test_Parameter (RSRP/RSRQ).pptx4G_Drive_Test_Parameter (RSRP/RSRQ).pptx
4G_Drive_Test_Parameter (RSRP/RSRQ).pptx
 
L2 MAC LTE PROCEDURES revC
L2 MAC LTE PROCEDURES revCL2 MAC LTE PROCEDURES revC
L2 MAC LTE PROCEDURES revC
 
unit-iv-wireless-sensor-networks-wsns-and-mac-protocols
unit-iv-wireless-sensor-networks-wsns-and-mac-protocols unit-iv-wireless-sensor-networks-wsns-and-mac-protocols
unit-iv-wireless-sensor-networks-wsns-and-mac-protocols
 
Satellite communications notes.thurd module
Satellite communications notes.thurd moduleSatellite communications notes.thurd module
Satellite communications notes.thurd module
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
 
wireless lan presentation.ppt
wireless lan presentation.pptwireless lan presentation.ppt
wireless lan presentation.ppt
 
8-ZigBee (2).pdf
8-ZigBee (2).pdf8-ZigBee (2).pdf
8-ZigBee (2).pdf
 
UNIT-3 (2).pptx
UNIT-3 (2).pptxUNIT-3 (2).pptx
UNIT-3 (2).pptx
 
LoRa online training for utility guys
LoRa online training for utility guysLoRa online training for utility guys
LoRa online training for utility guys
 
Wireless Sensor network
Wireless Sensor network Wireless Sensor network
Wireless Sensor network
 
UNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdfUNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdf
 
final
finalfinal
final
 
Ca code and its properties
Ca code and its propertiesCa code and its properties
Ca code and its properties
 
WPAN According To ZIGBEE
WPAN According To ZIGBEEWPAN According To ZIGBEE
WPAN According To ZIGBEE
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
 
Ec 2401 wireless communication unit 5
Ec 2401 wireless communication   unit 5Ec 2401 wireless communication   unit 5
Ec 2401 wireless communication unit 5
 

More from Dr Praveen Jain

NetSim User Manual
NetSim User ManualNetSim User Manual
NetSim User Manual
Dr Praveen Jain
 
NetSim Experiment Manual
NetSim Experiment ManualNetSim Experiment Manual
NetSim Experiment Manual
Dr Praveen Jain
 
Anna University Netsim Experiment Manual
Anna University  Netsim  Experiment Manual  Anna University  Netsim  Experiment Manual
Anna University Netsim Experiment Manual
Dr Praveen Jain
 
Maharastra CCN NetSim Experiment Manual
Maharastra CCN  NetSim Experiment  ManualMaharastra CCN  NetSim Experiment  Manual
Maharastra CCN NetSim Experiment Manual
Dr Praveen Jain
 
Maharastra EXTC NetSim Experiment Manual
Maharastra EXTC  NetSim Experiment  ManualMaharastra EXTC  NetSim Experiment  Manual
Maharastra EXTC NetSim Experiment Manual
Dr Praveen Jain
 
Dynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attackDynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attack
Dr Praveen Jain
 
Cognitive Radio Network
Cognitive Radio Network Cognitive Radio Network
Cognitive Radio Network
Dr Praveen Jain
 

More from Dr Praveen Jain (7)

NetSim User Manual
NetSim User ManualNetSim User Manual
NetSim User Manual
 
NetSim Experiment Manual
NetSim Experiment ManualNetSim Experiment Manual
NetSim Experiment Manual
 
Anna University Netsim Experiment Manual
Anna University  Netsim  Experiment Manual  Anna University  Netsim  Experiment Manual
Anna University Netsim Experiment Manual
 
Maharastra CCN NetSim Experiment Manual
Maharastra CCN  NetSim Experiment  ManualMaharastra CCN  NetSim Experiment  Manual
Maharastra CCN NetSim Experiment Manual
 
Maharastra EXTC NetSim Experiment Manual
Maharastra EXTC  NetSim Experiment  ManualMaharastra EXTC  NetSim Experiment  Manual
Maharastra EXTC NetSim Experiment Manual
 
Dynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attackDynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attack
 
Cognitive Radio Network
Cognitive Radio Network Cognitive Radio Network
Cognitive Radio Network
 

Recently uploaded

SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 

Recently uploaded (20)

SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 

Wireless Sensor Network

  • 1. IEEE 802.15.4 LR-WPAN Wireless Sensor Networks(WSN)Wireless Sensor Networks(WSN) NetSim v9.1NetSim v9.1 Network Simulation/Emulation Platform
  • 2. IntroductionIntroduction • IEEE 802.15.4 LR-WPAN(Low data Rate - Wireless Personal Area Networks) standard is widely used because of its position independent sensing capabilities even in toxic and inaccessible regions to humans. • Sensors are low cost and can be randomly placed as long as they are in some sensors coverage area.
  • 3. ApplicationsApplications • Area Monitoring – WSN is deployed over a region where some phenomenon is to be monitored like detecting enemy intrusion etc., • Forest Fire Detection – A network of Sensor Nodes can be installed in a forest to detect when a fire has started. • Battlefield surveillance • Reference: Wikipedia
  • 4. Devices in WSNDevices in WSN • WSN has mainly two types for devices;FFD,RFD • FFD or Full Functional Device – Senses the agent – Routes packets and – Initialize the Network(act as PAN Coordinator) – Can communicate with another RFD or FFD • RFD or Reduced Functional Device – Can only sense the agent – Can communicate with FFD only
  • 5. Sink nodeSink node • Sink node is the principal controller in WPAN and there is only one PAN Coordinator in a WSN. • If Sink node uses Beacon enabled mode then nodes use Slotted CSMA/CA algorithm for transmitting packets else nodes use Unslotted CSMA/CA.
  • 6. AgentAgent • Sensors sense the Agent and generate a packet containing its position if the agent is in its sensitivity range. • In NetSim, Agent mobility is modeled by RandomWalk and RandomWayPoint which are followed internationally to test WSN. • For each of the models we can set its velocity and pause time(only random way point) and also we can capture the agents path for the whole simulation.
  • 7. SensorSensor • WSN consists of spatially distributed sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location(Sink node).
  • 9. IEEE 802.15.4 operational modesIEEE 802.15.4 operational modes
  • 10. Beacon FrameBeacon Frame • Beacons occupy the first slot in SuperFrame. • Beacons are used to synchronize the attached devices, to identify the PAN, and to describe the structure of the super frames. • Beacon frames are transmitted periodically to announce the presence of a network.
  • 11. SuperFrame StructureSuperFrame Structure The superframe is contained in a Beacon Interval bounded by two beacon frames, and has an active period and an inactive period
  • 13. Active PeriodActive Period • Active period consists of two periods – Contention Access Period (CAP) – Contention Free Period (CFP) • Length of active period is determined by the SuperFrame Order • Active Period Length = aBaseSuperframeDuration * symbols 2 SO
  • 14. Contention Access Period (CAP)Contention Access Period (CAP) • In CAP all the nodes having a packet to transmit compete for the channel and follows Slotted CSMA/CA algorithm. • A sufficient portion of the CAP remains for contention- based access of other networked devices or new devices wishing to join the network.
  • 15. Contention Free Period (CFP)Contention Free Period (CFP) • CFP is used to allocate slots for the nodes which require low latency i.e., PAN coordinator allocates guaranteed time slots (GTS) for such nodes. • A node issues GTS allocation request to the PAN coordinator, which can allocate available GTS to nodes. • In the CFP, the node requested for GTS can transmit during its GTS if it is allocated, without any contention with other devices. • CFP can be disabled by disabling GTS.
  • 16. Inactive periodInactive period • In the inactive period, the coordinator may enter a low-power mode and doesn’t interact with its PAN which helps in reduced energy consumption and so extends the network lifetime • Inactive period can be remove by setting SuperFrame Order same as Beacon Order SOBO ≡
  • 17. PacketPacket • Packet is generated by the sensor whenever agent comes with in its sensor range and for every sensing interval. • Each packet is characterized by 3 variables NB,CW,BE – NB, Number of backoffs the node has underwent while attempting the current transmission, initialized to 0 before every new transmission – CW, Contention Window Length, which defines the number of backoff periods that need to be clear of channel activity before starting transmission. CW is only used with the slotted CSMA/CA version. This value is initialized to 2 before each transmission attempt and reset to 2 each time the channel is assessed to be busy. – BE, Backoff exponent is related to backoff periods (0 to 2BE -1) a device has to wait before attempting to assess the channel.
  • 18. Clear Channel Assessment (CCA)Clear Channel Assessment (CCA) • CCA is responsible for sensing channel as busy or idle. • The CCA is performed in three operational modes: – Energy Detection mode: If the Channel energy is less than ED threshold then the channel is reported as Idle else channel is reported as busy. – Carrier Sense mode: CCA reports a busy medium only if it detects a signal with the modulation and the spreading characteristics of IEEE 802.15.4 and which may be higher or lower than the ED threshold. – Carrier Sense with Energy Detection mode: This is a combination of the fore mentioned techniques. CCA reports the medium is busy only if it detects a signal with the modulation and the spreading characteristics of IEEE 802.15.4 and with energy above the ED threshold.
  • 20. DescriptionDescription Unslotted CSMA/CA Slotted CSMA/CA Step1 NB(=0),CW(=1),BE are initialized. NB(=0),CW(=2),BE are initialized. Locate the backoff boundary and attempt for transmission or channel assess at the start of the slot. Step2 MAC layer shall delay for a random number of backoff periods in the range (0 to ) Same Step3 MAC will request PHY to perform CCA. If the frame transmission and acknowledgment can be completed before the end of the current CAP then MAC sub layer shall proceed else it shall wait until the start of the CAP in the next SuperFrame and repeat the evaluation. Same Step4 (Channel is busy) MAC sub layer shall increment both NB and BE by one, ensuring that BE shall be no more than aMaxBE and if NB is greater than maxMaxCSMABackoffs then the packet is discarded else return to step 2. Same and CW is reset to 2. Step5 (Channel is Idle) MAC sub layer starts transmission. If CW is zero then start transmission else return to step 3
  • 21. Data Link Layer ParametersData Link Layer Parameters Parameter Standard Name Standard Value Beacon Order BO [0 to 15] SuperFrame Order SO [0 to 15] Base SuperFrame Duration aBaseSuperframeDuration 15.36 milliseconds Min Backoff Exponent macMinBE 3 Max Backoff Exponent aMaxBE 5 Max Frame Retries aMaxframeRetries 3 Max CSMA Backoffs macMaxCSMABackoffs 4
  • 22. PHY ParametersPHY Parameters Parameter Standard Value Frequency Band 2.4 GHz Chip Rate 2000 McPS Symbol Rate 62.5 kSymbolsPS Modulation Technique O-QPSK Unit Backoff Time 20 Symbols Turn Around Time 12 Symbols Transmitter Power 100 mW Sensor Range 100 m Receiver Sensitivity -85 dbm ED Threshold -95 dbm
  • 23. ReferencesReferences 1. Specification-based Intrusion Detection for Home Area Networks in Smart Grids Paria Jokar, Hasen Nicanfar, Victor C.M. Leung Department of Electrical and Computer Engineering The University of British Columbia 1. ZigBee for Building Control Wireless Sensor Networks Fabio L. Zucatto1,2, Clecio A. Biscassi2 Ferdinando Monsignore2, Francis Fidélix2, Samuel Coutinho2, and Mônica L. Rocha1 1. ZigBee Based Wireless Sensor Networks and Its Applications in Industrial Shizhuang Lin1, Jingyu Liu2 and Yanjun Fang3 Department of Automation, Wuhan University