• No results found

ZigBee Wireless Sensor Network Model for Supporting Mobile Nodes

N/A
N/A
Protected

Academic year: 2020

Share "ZigBee Wireless Sensor Network Model for Supporting Mobile Nodes"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

(1)

2017 2nd International Conference on Information Technology and Industrial Automation (ICITIA 2017) ISBN: 978-1-60595-469-1

ZigBee Wireless Sensor Network Model for

Supporting Mobile Nodes

Haoli Ren, Lei Shi and Meiping Peng

ABSTRACT

This paper analyzes the support of mobile end devices and logical events and states in network processes through the network node model, the application layer process model and the network layer process model. A simulation system model of ZigBee wireless sensor network (WSN) was proposed to support mobile nodes. An improved AODV routing algorithm was embedded in the model to optimize the network accessing function and routing path selection of mobile nodes, and to support the movement of ZigBee end devices. When the ZigBee sensor has a failure in a node, the other nodes can quickly re-establish the network topology to keep network unimpeded.

INTRODUCTION

ZigBee model of OPNET is used to analyze network performance of nodes under different network topology [1,2]. A new structure of ZigBee protocol is designed which increase the energy consumption of mobile nodes by 42% [3], and an energy consumption module is added for comprehensive analysis of suppressing route discovery, energy consumption, and motion trajectory of nodes[4].

However, it cannot avoid the movement of devices in practical application, the ZigBee model of OPNET is mainly used in current research. The network simulator based on ZigBee technology lacks support for mobile router in research, evaluation and development, which restricts the further analysis of mobile sensor networks. ________________________

(2)

Therefore, a ZigBee WSN simulation model based on OPNET is proposed to support mobile nodes, which optimizes the network function of nodes and keeps the network open when nodes move.

ZIGBEE SIMULATION MODELFOR SIPPORTING MOBILE NODES

ZigBee technology divides network nodes into three classes, coordinator, router and end device. Coordinator and router use the AODV routing algorithm[5] to forward the data, which can support the mobile network, and do not need to change the network address dynamically. End device is a kind of streamlined function device that does not participate in the process of selecting a routing path. When an end device moves out of the communication range of a parent node, it cannot communicate with other nodes. Therefore, a network layer protocol model and a neighbor table maintenance mechanism based on improved AODV routing algorithm are proposed by the use of maintaining a neighbor table for ZigBee nodes and broadcasting the HELLO information periodically by the router that use the AODV algorithm. So that, ZigBee end device could select routing paths by itself, and do not need to refactor the network to access network again, when it lost the connection with parent node. Algorithm steps of the model are shown as follow steps.

Step 1: Router or coordinator node periodically broadcasts “HELLO” frame which contains address of source node, the capability of receiving node, 1-hop neighbor information.

Step 2: End device node receives “HELLO” frame of neighbor nodes and determines whether the source address is the parent node.

Step 3: If it is, then information of the node’s neighbor table is updated.

Step 4: If it is not, it is estimated whether the node is divorced from that parent node. The disconnected node selects the optimal router from the neighbor table according to the related algorithm (such as the minimum hop count, the minimum link loss, etc.) as potential parent node. The connected node updates the information of neighbor table.

Application Layer Process Model of Network Node

The packets generated by the application layer are transmitted to the network layer through the packet stream line. The packets received by the network layer are delivered to the application layer through the packet stream line. The application layer starts a network by remote interrupts. The application layer model of network node is implemented in the following steps. All the logical events and interrupt types appearing in the application layer process model (see Table I).

Step 1: Coordinators establish the network, and devices join the network.

(3)

Step 3: To process the packet which destination address is the local node.

Step 4: When the node generates a fail interrupt, it stop generating packets. When the node generates recovery interrupt, it generates packets again.

TABLE I. LOGICAL EVENTS AND INTERRUPT TYPES OF APPLICATION LAYER PROCESS MODEL.

Events Description of Events Interrupt types

Packets generation To periodically generate data packets. Self-interrupt Packets arrive Packets of network layer arrive. Flow interrupt

To initiate network To notify network layer to start channels scanning.

Event interrupt and remote interrupt To Establish network,

to join network.

Network layer notify application layer that the network has been established or has been joined.

Event interrupt and remote interrupt Enablement To enable the process Start interrupt

Network Layer Process Model of Network Node

The improved AODV routing algorithm is embedded in the process model [6]. The MAC layer is called to scan channels after receiving the interrupt request of scanning channel from application layer. When it is complete, network layer selects the appropriate channel and network identifier to establish the network, and the node waits for the request frame of processing beacon and accessing network, routing control packet and data packets. After network establishment, other devices also receive the interrupt request of scanning channel and then access the network.

The function of mobile devices accessing network is achieved by the following process.

Step 1: The devices call the MAC layer to scan channels, broadcast beacon request frame, set the timer, and wait for receiving beacon frame.

Step 2: When coordinators and routers receive the beacon request frame, routers or coordinators broadcast beacon frame。

Step 3: After the devices receive the beacon frame, the beacon frame is recorded and stored in the neighbor table. The MAC layer generates a remote interrupt to notify network layer that the scan has been completed.

Step 4: The devices receive the beacon frame, and select the router or coordinator which has the smallest hop count and has the capability of receiving the child nodes as its parent node from the neighbor table based on the parent node selection algorithm, then send the network request frame and start the timer to wait for access reply frame.

Step 5: The router or coordinator determine whether it has the ability to receive the child nodes. If no ability, then no action. If it has the ability, then reply the access reply frame.

(4)

Step 7: Otherwise, the timer times out, and then the devices re-select new parent node to send the access request frame. If there is no potential parent node in the current neighbor table, the MAC layer is recalled to scan channels.

The Tree address allocation mechanism of ZigBee can provide simple and reliable tree routing for the whole network. Because the transmission path of the Tree address allocation mechanism is not the shortest path, the ideal routing function cannot be realized in the large mobile ZigBee sensor network. Therefore, based on the AODV routing algorithm, mobile device routing function for network layer process model of network nodes is achieved according to the following algorithm steps.

Step 1: The mobile device (i.e., the sensor network node) sends frames directly to the potential parent node in the neighbor table. The node does not participate in the route discovery.

Step 2: It is estimated whether the destination address of frames is this parent node (i.e., routers or coordinators), when it receives the frames. If it is, frames are sent to application layer for statistics.

Step 3: If it is not, then routing table of this node is researched. If there is a valid routing path in the routing table, frames are sent to the next hop router.

Step 4: If there is no valid routing path in the routing table, route discovery is initiated based on the AODV routing algorithm. When the valid routing path is established, the frames are sent to the next hop router.

SIMULATION VERIFICATION AND RESULT ANALYSIS

Network Topology and Parameter Settings

The maximum number of child nodes is 7, the maximum number of routers is 5, the maximum depth of network is 5, and other simulation parameters are shown in Table II. The node starts the data frame transmission after successfully accessing the network. The scene is repeated 10 times.

Simulation Results Analysis

(5)
[image:5.612.119.472.141.422.2]

nodes are deployed, the network can quickly respond. It is more convenient that mobile WSN nodes participate in network tasks.

TABLE II. SIMULATION PARAMETERS.

Simulation Parameters Parameter Value

Network size() 10000

Communication radius(m) 30 Transmission power(W) 0.005 Information length(bit) 1024 Time interval of frames (s) 1 Mobile velocity of nodes (m/s) 2 The running time (min) 10

Figure 1. Simulation results of 80 nodes accessing network.

Figure 2. Adaptive routing path selection of mobile ZigBee wireless sensors.

0 0.2 0.4 0.6 0.8 1 1.2

0 100 200 300 400 500 600 700

forward

data

simulation of time

[image:5.612.104.496.469.639.2]
(6)

The simulation model of ZigBee WSN could support mobile nodes, because end devices select the active router nodes from the neighbor table to forward data packets, when end devices lose communication with the parent nodes. The end devices can immediately select the potential parent node route_2 as the temporary parent node of forwarding data after losing communication with the parent node route_1 at the emulation time 370 (see Figure 2). It can be seen that this model is feasible for supporting mobile nodes. The end devices, such as wireless sensors, can quickly reestablish the network topology and ensure the smooth flow of the network, after a parent node fails and other potential parent nodes are selected as temporary parent nodes for forwarding packets.

CONCLUSION

The movement of devices is an inevitable problem in WSNs. It is also an important problem in ZigBee technology. The simulation model of ZigBee WSN for supporting mobile nodes is studied. The improved AODV routing algorithm is embedded in network layer process model and application layer process model. A mobile devices access method and the routing path selection method of potential parent nodes adaptive selection are provided by using AODV HELLO information. Based on OPNET network simulation tools, simulation results of mobile nodes are provided. When a node is disconnect, it is not needed to refactor the network to ensure the smooth flow of the entire network.

REFERENCES

1. Zhou Chan, Li Xin. 2010. “Research on Comprehensive Evaluation of Industrial Wireless Sensor Network Performance,” J. Computer Engineering,36(16):82-84. (In Chinese)

2. Leung S, Gomez W, Kim J J. 2009. “ZigBee mesh network simulation using OPNET and study of routing selection,” ENSC427: Communication network.

3. Er. Anantdeep, Er. Sandeep Kaur, Er. Balpreet Kaur. 2010. “Mobile ZigBee sensor network,” J. Journal of computing,2(4):95-99.

4. Vlajic N, Stevanovic D, Spanogiannopoulos G. 2011. “Strategies for improving performance of IEEE802.15.4/ZigBee WSNs with path-constrained mobile sink”, J. Computer Communications, 34(6):743-757.

5. Perkins C E, Royer E, M.Ad.2002. “Hoc demand distance vector (AODV) routing,” Information onhttp://www.ietf.org/internet-drafts/draft-ietf-manet-aodv-10.txt.

Figure

Figure 2. Adaptive routing path selection of mobile ZigBee wireless sensors.

References

Related documents

It would close the current funding gap solely by cutting benefits received by and net wages paid to current federal employees It would constitute a 50 percent cut in the net

• Before using Moodle both teachers and students must be registered at the Moodle platform and be able to access CU Moodle web address... Email,

The situation calls for other potential factors like safety climate and safety training practices which may affect the role of transformational leadership on safety performance.. 1.3

To enable fast searches of files and folders in Novell Filr, the Search Index Appliance scans and indexes on a scheduled basis all the designated folders (includ- ing

The encryption operation for PBES2 consists of the following steps, which encrypt a message M under a password P to produce a ciphertext C, applying a

Minors who do not have a valid driver’s license which allows them to operate a motorized vehicle in the state in which they reside will not be permitted to operate a motorized

National Conference on Technical Vocational Education, Training and Skills Development: A Roadmap for Empowerment (Dec. 2008): Ministry of Human Resource Development, Department

In this section, we conduct empirical study to show some interesting properties of the proposed Opt-KG policy and compare its performance to other methods. For each