unt 2
unt 2
NETWORK DESIGN
UNIT I
INTRODUCTION
27/01/2025 1
Contents
Books Referred:
HolgerKarl , Andreas willig, “Protocol and Architecture for Wireless
Networks”, John Wiley Publication, 2006. Sensor
27/01/2025 2
Cellular and Ad Hoc Wireless Networks
• The path setup for a call between two nodes, say, node C to node E, is completed through
8/7 / 20 24
27/01/20 3
3
t h e base station, which is shown in the
Cellular
wireless
networks
27/01/20 4
• Ad hoc wireless networks are defined as the category of wireless networks that utilize
multi-hop radio relaying and are capable of operating without the support of any fixed
infrastructure (hence they are also called infrastructure less networks).
• The absence of any central coordinator or base station makes the routing a complex one
compared to cellular networks.
• The path setup for a call between two nodes, say, node C to node E, is completed through
the intermediate mobile node F as shown in Fig.3
• Wireless mesh networks and wireless sensor networks are specific examples of ad hoc
wireless networks.
27/01/20 6
27/01/20 7
27/01/2025 8
• The presence of base stations simplifies routing and resource management in a
cellular network as the routing decisions are made in a centralized manner with more
information about the destination node.
• But in an ad hoc wireless network, the routing and resource management are done in a
distributed manner in which all nodes coordinate to enable communication among
themselves.
• This requires each node to be more intelligent so that it can function both as a network
host for transmitting and receiving data and as a network router for routing packets from
other nodes.
• Hence the mobile nodes in ad hoc wireless networks are more complex than their
counterparts in cellular networks.
27/01/2025 9
1. Wireless Sensor Networks
27/01/20 10
• Sensor networks are a special category of ad hoc wireless networks that are used to provide
a wireless communication infrastructure among the sensors deployed in a
specific application domain.
• Sensor nodes are tiny devices that have the capability of sensing physical parameters,
processing the data gathered, and communicating over the network to the monitoring station.
• Sensor network is a collection of a large number of sensor nodes that are deployed in a
particular region. The activity of sensing can be periodic or sporadic.
• Periodic type: Sensing of environmental factors such as temperature, humidity, and nuclear
radiation.
• Sporadic type: Detecting border intrusion, sensing the temperature of a furnace to prevent it
rising beyond a threshold, and measuring the stress on critical structures or machinery.
• Some of the domains of application for sensor networks are military, health care, home
8 /7 / 20 2 4 11
se27/01/20
c u r it y , and environmental 1
WSN application examples
Characteristic requirements
❖ Quality of Service: In some cases, only occasional delivery of a packet can be more than
enough, in other cases, very high reliability requirements exist, In yet other cases, delay is
important when actuators are to be controlled in a real-time fashion by the sensor network.
❖ Fault tolerance: Since nodes may run out of energy or might be damaged, or since the
wireless communication between two nodes can be permanently interrupted, it is important
that the WSN as a whole is able to tolerate such faults. To tolerate node failure, redundant
deployment is necessary.
27/01/20 13
❖ Lifetime: In many scenarios, nodes will have to rely on a limited supply of energy (using
batteries). A WSN must operate at least for a given mission time or as long as possible.
lifetime of a WSN becomes a very important figure of merit.
❖ Wide range of densities: In a WSN, the number of nodes per unit area – the density of the
network – can vary considerably. Different applications will have very different node
densities.
❖ Programmability: The nodes will have to react flexibly on changes in their tasks. These
nodes should be programmable, and their programming must be changeable during
operation when new tasks become important.
27/01/20 14
Required mechanisms
❖ Locality: Nodes, which are very limited in resources like memory, should attempt to limit
the state that they accumulate during protocol processing to only information about their
direct neighbors. The hope is that this will allow the network to scale to large numbers of
nodes without having to rely on powerful processing at each single node.
❖ Exploit trade-offs: Node density: depending on application, deployment, and node failures
at runtime, the density of the network can change considerably – the protocols will have to
handle very different
27/01/20
situations. 16
3. Comparison with ad hoc
Network
The issues that make sensor networks a distinct category of ad hoc wireless networks are the
following:
• Size of the network: The number of nodes in the sensor network can be much larger
than that in a typical ad hoc wireless network.
• Density of deployment: The density of nodes in a sensor network varies with the domain
of application. For example, military applications require high availability of the network,
m27/01/20
a k i n g redundancy a high
8 /7 / 2 0 24
17
1
• Power constraints: The power constraints in sensor networks are much more stringent than
those in ad hoc wireless networks. The power sources used in sensor networks can be
classified into the following three categories:
• Traffic distribution: The communication traffic pattern varies with the domain of
application in sensor networks. Environmental sensing application has a traffic with low
bandwidth. Detecting border intrusions in a military application has a traffic with high
bandwidth
27/01/20 19
4. Single Node
Architecture
• Building a wireless sensor network first of all requires the constituting nodes to be developed
and available.
• These nodes have to meet the requirements that come from the specific requirements of a
given application: they might have to be small, cheap, or energy efficient, they have to be
equipped with the right sensors, the necessary computation and memory resources, and
they need adequate communication facilities.
1. Hardware components
a. Sensor node hardware
A basic sensor node comprises five main components:
(i) Controller: A controller to process all the relevant data, capable of executing arbitrary
code.
27/01/20 20
(ii) Memory: Some memory to store programs and intermediate data; usually, different types
of memory are used for programs and data.
(iii) Sensors and actuators: The actual interface to the physical world: devices
that can observe or control physical parameters of the environment.
(v) Power supply: As usually no tethered power supply is available, some form of batteries
are necessary to provide energy. Sometimes, some form of recharging by obtaining energy
8/7 / 20 2 4
27/01/20 21
2
from t h e e nvironment is available
(b) Controller
• It collects data from the sensors, processes this data, decides when and where to send it,
receives data from other sensor nodes, and decides on the actuator’s behavior.
• It has to execute various programs, ranging from time-critical signal processing and
communication protocols to application programs; it is the Central Processing Unit
(CPU) of the node.
• The flexibility, performance, energy efficiency, and costs is very important factor for
designing a processors.
• Microcontrollers having high flexibility in connecting with other devices (like sensors), their
instruction set amenable to time-critical signal processing, and their typically low power
consumption and they often have memory built in.
27/01/20 22
8/7/2024 2
• A specialized case of programmable processors are Digital Signal Processors (DSPs). They
process large amounts of vectorial data and in broadband wireless communication, DSPs
are an appropriate and successfully used platform.
• But in wireless sensor networks, the requirements on wireless communication are usually
much more modest and the signal processing tasks related to the actual sensing of data is
also not overly complicated. Hence DSP are typically not required in a WSN node.
• Another option for the controller to use Field-Programmable Gate Arrays (FPGAs) or
Application- Specific Integrated Circuits (ASICs) instead.
• An ASIC is a specialized processor, have high-speed routers and switches. The typical
trade-off here is loss of flexibility in return for a considerably better energy efficiency and
8/ 7 / 2 0 2 4 23
p27/01/20
e r f o r m ance. It has more costly hardware 2
• At the current stage of WSN technology, bigger flexibility and simpler usage of
microcontrollers makes them the generally preferred solution.
• In addition, splitting processing tasks between some low-level, fixed functionality put into a
very energy-efficient ASIC and high-level, flexible, relatively rarely invoked
processing on a microcontroller is an attractive design and research option.
• Some examples for microcontrollers include Intel StrongARM, Texas Instruments MSP
430, Atmel ATmega.
(c) Memory
• There is a need for Random Access Memory (RAM) to store intermediate sensor readings,
packets from other nodes, and so on.
• While RAM is fast, its main disadvantage is that it loses its content if power supply
is interrupted.
27/01/20 24
• Program code can be stored in Read-Only Memory (ROM) or, more typically, in Electrically
Erasable Programmable Read-Only Memory (EEPROM) or flash memory (the later being similar
to EEPROM but allowing data to be erased or written in blocks instead of only a byte at a time).
• Flash memory can also serve as intermediate storage of data in case RAM is insufficient or when the
power supply of RAM should be shut down for some time.
• Correctly dimensioning memory sizes, especially RAM, can be crucial with respect to manufacturing
costs and power consumption.
27/01/20 25
(d) Communication device
• The communication device is used to exchange data between individual nodes.
• In some cases, wired communication can actually be the method of choice and is frequently
applied in many sensor networklike settings.
• The case of wireless communication is considerably more interesting. The first choice to
make is that of the transmission medium – the usual choices include radio frequencies,
optical communication, and ultrasound; other media like magnetic inductance are only used
in very specific cases.
• It provides relatively long range and high data rates, acceptable error rates at reasonable
energy expenditure, and does not require line of sight between sender and receiver.
• For a practical wireless, RF-based system, the carrier frequency has to be carefully chosen.
27/01/20 26
Transceivers
For actual communication, both a transmitter and a receiver are required in a sensor node. For
practical purposes, it is usually convenient to use a device that combines these two tasks in a
single entity. Such combined devices are called transceivers.
❖ Service to upper layer: A receiver has to offer certain services to the upper layers, most
notably to the Medium Access Control (MAC) layer. Sometimes, this service is packet
oriented; sometimes, a transceiver only provides a byte interface or even only a bit interface
to the microcontroller.
❖ State change times and energy: A transceiver can operate in different modes: sending or
receiving, use different channels, or be in different power-safe states. In any case, the time
and the energy required to change between two such states are important figures of merit.
❖ Data rates: Carrier frequency and used bandwidth together with modulation and coding
determine the gross data rate.
❖ Modulations: The transceivers typically support one or several of on/off-keying, ASK, FSK,
or similar modulations.
❖ Gain: The gain is the ratio of the output signal power to the input signal power and is
typically given in dB. Amplifiers with high gain are desirable to achieve good energy
efficiency.
❖ Power efficiency: The efficiency of the radio front end is given as the ratio of the radiated
power to the overall power consumed by the front end.
❖ Receiver sensitivity: The receiver sensitivity (given in dBm) specifies the minimum signal
power at the receiver needed to achieve a prescribed Eb/N0 or a prescribed bit/packet error
rate.
27/01/20 29
❖ Range: The range is considered in absence of interference; it evidently depends on the
maximum transmission power, on the antenna characteristics, on the attenuation caused by
the environment, which in turn depends on the used carrier frequency, on the
modulation/coding scheme that is used, and on the bit error rate that one is willing to accept
at the receiver.
❖ Out of band emission: The inverse to adjacent channel suppression is the out of band
emission of a transmitter.
❖ Carrier sense and RSSI: In many medium access control protocols, sensing whether the
wireless channel, the carrier, is busy (another node is transmitting) is a critical
information. The following Requirements are,
27/01/20 30
The received energy is above threshold; however, the underlying signal does not need
to comply with the modulation and spectral characteristics.
•A carrier has been detected, that is, some signal which complies with the modulation.
•Carrier detected and energy is present.
Also, the signal strength at which an incoming data packet has been received can provide
useful information. A receiver has to provide this information in the Received Signal Strength
Indicator (RSSI)
❖ Frequency stability: The frequency stability denotes the degree of variation from nominal
center frequencies when environmental conditions of oscillators like temperature or pressure
change.
❖ Voltage range: Transceivers should operate reliably over a range of supply voltages.
Otherwise, inefficient voltage stabilization circuitry is required.
27/01/20 31
Transceiver
structure
•The radio frequency front end performs analog signal processing in the actual
radio
frequency band, whereas
•The baseband processor performs all signal processing in the digital domainand
communicates with a sensor node’s processor or other digital circuitry.
Between these two parts, a frequency conversion takes place, either directly or
via oneor several Intermediate Frequencys (IFs).
27/01/20 32
The Power Amplifier (PA) accepts upconverted signals from the IF or baseband part and
amplifies them for transmission over the antenna.
27/01/20 33
• The Low Noise Amplifier (LNA) amplifies incoming signals up to levels suitable for
further processing without significantly reducing the SNR.
• Elements like local oscillators or voltage-controlled oscillators and mixers are used for
frequency conversion from the RF spectrum to intermediate frequencies or to the baseband.
The incoming signal at RF frequencies fRF is multiplied in a mixer with a fixed-frequency
signal from the local oscillator (frequency fLO). The resulting intermediate-frequency
signal has frequency fLO − fRF.
❖ Transmit: In the transmit state, the transmit part of the transceiver is active
andthe
antenna radiates energy.
27/01/20 34
❖ Receive: In the receive state the receive part is active.
❖ Idle: A transceiver that is ready to receive but is not currently receiving anything is said to
be in an idle state. In this idle state, many parts of the receive circuitry are active, and
others can be switched off. A major source of power dissipation is leakage.
❖ Sleep: In the sleep state, significant parts of the transceiver are switched off. These sleep
states differ in the amount of circuitry switched off and in the associated recovery times
and startup energy.
27/01/20 35
Advanced radio concepts
(i) Wakeup radio: To keep this specialized receiver simple, it suffices for it to raise an event
to notify other components of an incoming packet; upon such an event, the main receiver
can be turned on and perform the actual reception of the packet. Such receiver concepts
are called wakeup receivers. Their only purpose is to wake up the main receiver without
needing power.
(ii) Spread-spectrum transceivers: To overcome this limitation of ASK and FSK, the use of
spread-spectrum transceivers has been proposed. These transceivers, however, suffer
mostly from complex hardware and consequently higher prices.
(iii) Ultrawideband communication: Ultrawideband(UWB) communication is a
ra/2d0i2c4al change from conventional wireless
27/01/20 fairly 3
8/7
(e) Sensors and actuators
Without the actual sensors and actuators, a wireless sensor network would be beside the point
entirely.
❖ Passive omnidirectional sensors: These sensors can measure a physical quantity at the
point of the sensor node without actually manipulating the environment by active probing –
in this sense, they are passive. Typical examples for such sensors include thermometer, light
sensors, vibration, microphones, humidity.
❖ Passive, narrow-beam sensors: These sensors are passive as well, but have a well-defined
notion of direction of measurement. A typical example is a camera, which can “take
measurements” in a given direction, but has to be rotated if need be.
❖ Active sensors: This last group of sensors actively probes the environment, for example, a
sonar or radar sensor or some types of seismic sensors, which generate shock waves by small
37
27/01/20
8 /7 /2 0 3
e x p lo
Actuators
Actuators are just about as diverse as sensors, yet for the purposes of designing a WSN, they
are a bit simpler to take account of: In principle, all that a sensor node can do is to open or
close a switch or a relay or to set a value in some way. Whether this controls a motor, a light
bulb, or some other physical object is not really of concern to the way communication
protocols are designed.
The power supply is a crucial system component. There are essentially two aspects: First,
storing energy and providing power in the required form; second, attempting to replenish
consumed energy by “scavenging” it from some node-external power source over time.
27/01/20 38
(i) Storing energy: Batteries
Traditional batteries
The power source of a sensor node is a battery, either nonrechargeable (“primary batteries”) or,
if an energy scavenging device is present on the node, also rechargeable (“secondary
batteries”).Upon these batteries, very tough requirements are imposed:
❖ Capacity: They should have high capacity at a small weight, small volume, and low price.
The main metric is energy per volume, J/cm3.
❖ Capacity under load: They should withstand various usage patterns as a sensor node can
consume quite different levels of power over time and actually draw high current in certain
operation modes.
❖ Self-discharge: Their self-discharge should be low; they might also have to last for a long
time. Zinc-air batteries, for example, have only a very short life.
27/01/20 39
❖ Efficient recharging: Recharging should be efficient even at low and intermittently
available recharge power; consequently, the battery should also not exhibit any “memory
effect”.
Apart from traditional batteries, there are also other forms of energy reservoirs that can be
contemplated. In a wider sense, fuel cells also qualify as an electro-chemical storage of energy,
directly producing electrical energy by oxidizing hydrogen or hydrocarbon fuels.
27/01/20 40
DC–DC Conversion
• Unfortunately, batteries alone are not sufficient as a direct power source for a sensor node. A
node on a weak battery will have a smaller transmission range than one with a full battery. A
DC – DC converter can be used to overcome this problem by regulating the voltage
delivered to the node’s circuitry.
• To ensure a constant voltage even though the battery’s supply voltage drops, the DC – DC
converter has to draw increasingly higher current from the battery when the battery is
already becoming weak, speeding up battery death.
• Some of the unconventional energy stores described above – fuel cells, micro heat engines,
radioactivity – convert energy from some stored, secondary form into electricity in a
less direct and easy to use way than a normal battery would do. The entire energy supply
is stored on the node itself – once the fuel supply is exhausted, the node fails.
27/01/20 41
• To ensure truly long-lasting nodes and wireless sensor networks, such a limited energy
store is unacceptable. Rather, energy from a node’s environment must be tapped into and
made available to the node – energy scavenging should take place.
❖ Photovoltaics: The well-known solar cells can be used to power sensor nodes. The
available power depends on whether nodes are used outdoors or indoors, and on time of
day and whether for outdoor usage.
27/01/20 42
❖ Pressure variations: Somewhat akin to vibrations, a variation of pressure can also be used
as a power source. Such piezoelectric generators are in fact used already.
❖ Flow of air/liquid: Another often-used power source is the flow of air or liquid in wind
mills or turbines.
27/01/20 43
5. Network Architecture
Gateway concepts
27/01/20 44
1. Sensor network scenarios
• A source is any entity in the network that can provide information, that is, typically a
sensor node; it could also be an actuator node that provides feedback about an
operation.
2. It could belong to the sensor network as such and be just another sensor/actuator node.
3. The sink could be an actual device, for example, a handheld or PDA used to interact with
the sensor network.
27/01/20 45
These main types of sinks
27/01/20 46
1. Single-hop versus multihop networks
Singlehop networks:
• The simple, direct communication between source and sink is not always possible,
specifically in WSNs, which are intended to cover a lot of ground (e.g. in environmental or
agriculture applications) or that operate in difficult radio environments with strong
attenuation (e.g. in buildings).
• To overcome such limited distances, an obvious way out is to use relay stations, with the
data packets taking multi hops from the source to the sink.
Multihop networks:
• Multihopping is an evident and working solution to overcome problems with large distances
or obstacles, it has also been claimed to improve the energy efficiency of communication.
27/01/20 47
• Multihop networks operating in a store and forward fashion are considered here. In
such a network, a node has to correctly receive a packet before it can forward it
somewhere.
27/01/20 48
5.1.2 Multiple sinks and sources
• In the most challenging case, multiple sources should send information to multiple sinks,
where either all or some of the information has to reach all or some of the sinks.
27/01/20 49
5.1.3 Three types of mobility
Node mobility
The wireless sensor nodes themselves can be mobile. The meaning of such mobility is
highly
application dependent.
Sink mobility
The information sinks can be mobile. for example, a human user requested information via a
PDA while walking in an intelligent building.
27/01/20 50
27/01/20 51
Event mobility
In applications like event detection and in particular in tracking applications, the cause of the
events or the objects to be tracked can be mobile.
As the event source moves through the network, it is accompanied by an area of activity
within the network – this has been called the frisbee model.
27/01/20 52
27/01/20 53
2. Optimization goals and figures of merit
1. Quality of service
❑ What is the probability that an event that actually occurred is not detected or, more
precisely, not reported to an information sink.
27/01/20 54
Event classification error
❑ If events are not only to be detected but also to be classified, the error in classification
must be small.
❑ What is the delay between detecting an event and reporting it to any/all interested sinks?
Missing reports
27/01/20 55
Approximation accuracy
Tracking accuracy
❑ Tracking applications must not miss an object to be tracked, the reported position should
be as close to the real position as possible, and the error should be small.
27/01/20 56
5.2.2 Energy efficiency
• How much energy, counting all sources of energy consumption at all possible intermediate
hops, is spent on average to transport one bit of information (payload) from the source to
the destination?
Delay/energy trade-offs
• Some applications have a notion of “urgent” events, which can justify an increased energy
investment for a speedy reporting of such events.
27/01/20 57
Network lifetime
• The time for which the network is operational or, put another way, the time during which
it
is able to fulfil its tasks (starting from a given amount of stored energy).
27/01/20 58
5.2.3 Scalability
• The ability to maintain performance characteristics irrespective of the size of the network is
referred to as scalability.
5.2.4 Robustness
• They should not fail just because a limited number of nodes run out of energy, or because
their environment changes and severs existing radio links between two nodes – if
t/h7e/2s0e24failures have to be
8possible,
27/01/20 59
5
3. Design principles for WSNs
1. Distributed organization
• Both the scalability and the robustness,make it imperativeto organize the network in
a
distributed fashion.
• Rather, the WSNs nodes should cooperatively organize the network, using
distributed
algorithms and protocols.
27/01/20 60
• Self-organization is a commonly used term for this principle.
5.3.2 In-network processing
• When organizing a network in a distributed fashion, the nodes in the network are not only
passing on packets or executing application programs, they are also actively involved in
taking decisions about how to operate the network.
Aggregation
• The name aggregation stems from the fact that in nodes intermediate between sources
and sinks, information is aggregated into a condensed form out of information
provided by nodes further away from the sink.
27/01/20 61
27/01/20 62
Distributed source coding and distributed compression
❑ Aggregation condenses and sacrifices information about the measured values in order not
to
have to transmit all bits of data from all sources to the sink.
❑ With the possibility of executing programs in the network, other programming paradigms
or computational models are feasible. One such model is the idea of mobile code or
27/01/20
agent- based networking. 63
5.3.3 Adaptive fidelity and accuracy
❖ The application should be able to adapt its requirements to the current status of the
network – how many nodes have already failed, how much energy could be scavenged from
the environment, what are the operational conditions (have critical events happened
recently), and so forth.
❖ Therefore, the application needs feedback from the network about its status to make such
decisions.
27/01/20 64
Implementation options for data-centric
networking
Overlay networks and distributed hash tables
Publish/Subscribe
Databases
❖ It is just another component that can directly interact with other components using whatever
interface specification exists between them.
27/01/20 66
❖ The application could even consist of several components, integrated at various places into
the protocol stack.
27/01/20 67
2. Expressibility requirements for WSN service interfaces
Support for simple request/response interactions.
For both types of interactions, the addressees should be definable in several ways.
(Sync
and Async).
27/01/20
The need to access location, timing, or network status information. 68
To support the seamless connection of various nodes or entire networks as well as the simple
access to services in an “unknown” network, there is a need for an explicit description of the
set of available capabilities of the node/the network
While not a direct part of an actual service interface, additional management functionality.
5. Gateway concepts
1. The need for gateways
❖ For practical deployment, a sensor network only concerned with itself is insufficient.
❖ The network rather has to be able to interact with other information devices, for example, a
user equipped with a PDA moving in the coverage area of the network or with a remote
user, trying to interact with the sensor network via the Internet.
27/01/20 69
5.5.2 WSN to Internet communication
❖ For example, a sensor node wants to deliver an alarm message to some Internet
host.
27/01/20 70
❖ The first problem to solve is akin to ad hoc networks, namely, how to find the gateway from
within the network.
27/01/20 71
5.5.3 Internet to WSN communication
❖ For example, a mobile requester equipped with a WSN transceiver, and also has all the
necessary protocol components at its disposal. In this case, the requesting terminal can be a
direct part of the WSN and no particular treatment is necessary.
27/01/20 72
5.5.4 WSN tunneling
❖ In addition to these scenarios describing actual interactions between a WSN and Internet
terminals, the gateways can also act as simple extensions of one WSN to another WSN.
❖ The idea is to build a larger, “virtual” WSN out of separate parts, transparently “tunneling”
all protocol messages between these two networks and simply using the Internet as a
transport network.
27/01/20 73
6. Short range radio communication standards
❖ The standard covers the physical layernd the MAC layer of a low-rate Wireless Personal Area
Network (WPAN).
❖ Sometimes, people confuse IEEE 802.15.4 with ZigBee5, an emerging standard from the
ZigBee alliance.
❖ ZigBee uses the services offered by IEEE 802.15.4 and adds network construction (star
networks, peer-to-peer/ mesh networks, cluster-tree networks), security, application services,
and more.
27/01/20 74
❖ The targeted applications for IEEE 802.15.4 are in the area of wireless sensor networks, home
automation, home networking, connecting devices to a PC, home security, and so on.
❖ The physical layer offers bitrates of 20 kbps (a single channel in the frequency range 868–
868.6 MHz), 40 kbps (ten channels in the range between 905 and 928 MHz) and 250 kbps (16
channels in the 2.4 GHz ISM band between 2.4 and 2.485 GHz with 5-MHz spacing
between the center frequencies).
❖ There are a total of 27 channels available, but the MAC protocol uses only one of these
channels at a time.
❖ The PAN is identified by a 16-bit PAN Identifier and one of its coordinators is designated as
a
PAN coordinator
❖ The active period is subdivided into 16 time slots. The first time slot is occupied by the
beacon frame and the remaining time slots are partitioned into a Contention Access Period
(CAP) followed by a number (maximal seven) of contiguous Guaranteed Time Slots (GTSs).
27/01/20 77
6.1.3 GTS
management
❖ The coordinator allocates GTS to devices only when the latter send appropriate request packets
during the CAP.
❖ One flag in the request indicates whether the requested time slot is a transmit slot or a receive
slot.
❖ In a transmit slot, the device transmits packets to the coordinator and in a receive slot the
data flows in the reverse direction.
❖ If the device has allocated a receive GTS and when the packet/acknowledgment/IFS cycle fits
into these, the coordinator simply
❖ Transmits the packet in the allocated time slot without further coordination. The device has to
ac27/01/20
k n o w ledge the data
8 /7 / 20 24
78
7
27/01/20 79
6.1.5 Slotted CSMA-CA protocol
❖ When nodes have to send data or management/control packets during the CAP, they use a
slotted CSMA protocol.
❖ The IEEE 802.15.4 protocol offers a nonbeaconed mode besides the beaconed mode.
❖ The lack of beacon packetstakes away a good opportunity for devicesto acquire
time synchronization with the coordinator.
❖ All packets from devices are transmitted using an unslotted CSMA-CA protocol.
❖ Coordinators must be switched on constantly but devices can follow their own sleep schedule.
27/01/20 80
6.2 Zigbee
27/01/20 81
Types of ZigBee
Devices
1. ZigbeeCoordinator Device: It communicates with routers. This device is
used for connecting the devices.
27/01/20 82
Zigbee Based Network Topologies
27/01/20 83
Topologies
ZigBee-based WSNs have three network topologies:
1) Star topology - The star topology consists of a coordinator and several end devices
(nodes). In this topology, the end device communicates only with the coordinator. Any
packet exchange between end devices must go through the coordinator.
3) Cluster tree topology - A cluster tree topology is a special case of tree topology in
which a parent with its children is called a cluster. Each cluster is identified by a cluster
ID. ZigBee does not support cluster tree topology, but IEEE 802.15.4 does support it.
27/01/20 84
IEEE802.15.4/ZigBee protocol stack
architecture
27/01/20 85
Protocol stack
architecture
Physical Layer (PHY)
❖ This layer does modulation and demodulation operations upon transmitting and receiving
signals respectively.
❖ Operating Frequency Bands
•Channel 0: 868 MHz (Europe)
•Channel 1-10: 915 MHz (the US and Australia)
•Channel 11-26: 2.4 GHz (Across the World)
CHANNEL ACCESS:
❖ Contention-Based Method - Carrier-Sense Multiple Access With Collision
Mechanism (CSMA-CA) Avoidance
❖ Contention Free Method (Coordinator dedicates a specific time slotto each
(27/01/20
G u a r a nteed Time
device 8
8 /7 /2 0 2 4
Network Layer
❖ It is responsible for topology construction and maintenance as well as naming and binding
services, which include the tasks of addressing, routing, and security.
APPLICATION LAYER
❖ The application layer in the Zigbee stack is the highest protocol layer, and it consists of the
application support sub-layer and Zigbee device object.
27/01/20 88
Zigbee
Applications
Home Automation
Medical Data Collection
Industrial Control Systems
meter reading system
light control system
Commercial
Government Markets
Worldwide
Home Networking
27/01/20 89
COMPARISON BETWEEN BLUETOOTH &
S. No. ZIGBEE Bluetooth Zigbee
The Bluetooth SIG (Special Interest Group) is the The Zigbee Alliance manages Zigbee and tests and
1. organization responsible for managing Bluetooth approves Zigbee-based devices. IEEE standardizes all
standards and devices. Zigbee-based protocols.
2. Bluetooth was developed under IEEE 802.15.1. It was developed under IEEE 802.15.4.
4. There are seventy nine RF channels in Bluetooth. There are sixteen RF channels in zigbee.
8 .
/ 2 4Bluetooth’s protocol stack is 250K bytes in size.
27/01/20
8/7 Zigbee’s protocol stack is 28K bytes in size. 90