28 research outputs found

    Performance Comparison of the RPL and LOADng Routing Protocols in a Home Automation Scenario

    Full text link
    RPL, the routing protocol proposed by IETF for IPv6/6LoWPAN Low Power and Lossy Networks has significant complexity. Another protocol called LOADng, a lightweight variant of AODV, emerges as an alternative solution. In this paper, we compare the performance of the two protocols in a Home Automation scenario with heterogenous traffic patterns including a mix of multipoint-to-point and point-to-multipoint routes in realistic dense non-uniform network topologies. We use Contiki OS and Cooja simulator to evaluate the behavior of the ContikiRPL implementation and a basic non-optimized implementation of LOADng. Unlike previous studies, our results show that RPL provides shorter delays, less control overhead, and requires less memory than LOADng. Nevertheless, enhancing LOADng with more efficient flooding and a better route storage algorithm may improve its performance

    Multiple Redundancy Constants with Trickle

    No full text
    International audienceWireless sensor network protocols very often use the Trickle algorithm to govern information dissemination. For example, the widely used IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) uses Trickle to emit control packets. We derive an analytical model of Trickle to take into account multiple redundancy constants and the common lack of synchronization among nodes. Moreover, we demonstrate message count unfairness when Trickle uses a unique global redundancy constant because nodes with less neighbors transmit more often. Consequently, we propose a heuristic algorithm that calculates a redundancy constant for each node as a function of its number of neighbors. Our calculated redundancy constants reduce unfairness among nodes by distributing more equally the number of transmitted messages in the network. Our analytical model is validated by emulations of constrained devices running the Contiki Operating System and its IPv6 networking stack. Furthermore, results very well corroborate the heuristic algorithm improvements

    Multiple Redundancy Constants with Trickle

    No full text
    International audienceWireless sensor network protocols very often use the Trickle algorithm to govern information dissemination. For example, the widely used IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) uses Trickle to emit control packets. We derive an analytical model of Trickle to take into account multiple redundancy constants and the common lack of synchronization among nodes. Moreover, we demonstrate message count unfairness when Trickle uses a unique global redundancy constant because nodes with less neighbors transmit more often. Consequently, we propose a heuristic algorithm that calculates a redundancy constant for each node as a function of its number of neighbors. Our calculated redundancy constants reduce unfairness among nodes by distributing more equally the number of transmitted messages in the network. Our analytical model is validated by emulations of constrained devices running the Contiki Operating System and its IPv6 networking stack. Furthermore, results very well corroborate the heuristic algorithm improvements

    DTLS Performance in Duty-Cycled Networks

    Get PDF
    The Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic. There has been much debate in both the standardization and research communities on the applicability of DTLS to constrained environments. The main concerns are the communication overhead and latency of the DTLS handshake, and the memory footprint of a DTLS implementation. This paper provides a thorough performance evaluation of DTLS in different duty-cycled networks through real-world experimentation, emulation and analysis. In particular, we measure the duration of the DTLS handshake when using three duty cycling link-layer protocols: preamble-sampling, the IEEE 802.15.4 beacon-enabled mode and the IEEE 802.15.4e Time Slotted Channel Hopping mode. The reported results demonstrate surprisingly poor performance of DTLS in radio duty-cycled networks. Because a DTLS client and a server exchange more than 10 signaling packets, the DTLS handshake takes between a handful of seconds and several tens of seconds, with similar results for different duty cycling protocols. Moreover, because of their limited memory, typical constrained nodes can only maintain 3-5 simultaneous DTLS sessions, which highlights the need for using DTLS parsimoniously.Comment: International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC - 2015), IEEE, IEEE, 2015, http://pimrc2015.eee.hku.hk/index.htm

    Topology Construction in RPL Networks over Beacon-Enabled 802.15.4

    Full text link
    In this paper, we propose a new scheme that allows coupling beacon-enabled IEEE 802.15.4 with the RPL routing protocol while keeping full compliance with both standards. We provide a means for RPL to pass the routing information to Layer 2 before the 802.15.4 topology is created by encapsulating RPL DIO messages in beacon frames. The scheme takes advantage of 802.15.4 command frames to solicit RPL DIO messages. The effect of the command frames is to reset the Trickle timer that governs sending DIO messages. We provide a detailed analysis of the overhead incurred by the proposed scheme to understand topology construction costs. We have evaluated the scheme using Contiki and the instruction-level Cooja simulator and compared our results against the most common scheme used for dissemination of the upper-layer information in beacon-enabled PANs. The results show energy savings during the topology construction phase and in the steady state

    Broadcasting Strategies in 6TiSCH Networks

    Get PDF
    International audienceWe consider IPv6-enabled networks that run on top of the time-slotted channel hopping mode of IEEE802.15.4 (6TiSCH). The ongoing discussions in the standardization community concern the network formation process and the definition of a bootstrapping protocol by which a new mote is admitted into the network. Because the bootstrapping trac uses the same shared slots as the network broadcasts, the key to the optimal performance of the network formation process lays in the optimization of the network broadcasting strategy. The problem boils down to the issue of stabilizing slotted Aloha. To do so, we adapt a broadcast algorithm to the specifics of 6TiSCH networks. By simulation, we evaluate the optimal broadcast transmission probability in the network. We answer the open questions in the IETF 6TiSCH standardization community that concern the performance of the network formation process for the optimal values of transmission probability. As the main contribution of the letter, we provide network administrators with a set of values that allow the formation of dense networks

    SODA: 6TiSCH Open Data Action

    Get PDF
    International audienceIndustrial-grade performance of wireless networks has become a reality of the open Internet of Things through a low-power wireless technology called 6TiSCH. A standardization group of the same name within the Internet Engineering Task Force (IETF) has been working on a zero-configuration, IPv6-enabled solution applicable to industrial monitoring and control, smart building, home, city and agriculture. The base standardization work is virtually done. Before different stakeholders invest significant resources in developing and deploying 6TiSCH-based solutions, they need to have a certain level of assurance about whether the technology indeed meets their requirements. An unbiased performance benchmark of a standards-compliant 6TiSCH solution is therefore required by the industry, the research community and the standardization group. 6TiSCH Open Data Action (SODA) is a research project that will provide a 6TiSCH benchmark and open datasets in different industry-relevant scenarios. SODA will automate the experimentation on these scenarios so benchmarking can remain up-to-date with changes to the standards, and facilitate comparison with future technological developments, resulting in continuous delivery benchmarking. This paper introduces the SODA project and seeks community involvement on the definition of scenarios and Key Performance Indicators, and on the usage of the tools that will be provided

    DTLS Performance in Duty-Cycled Networks

    No full text
    International audienceThe Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic. There has been much debate in both the standardization and research communities on the applicability of DTLS to constrained environments. The main concerns are the communication overhead and latency of the DTLS handshake, and the memory footprint of a DTLS implementation. This paper provides a thorough performance evaluation of DTLS in different duty-cycled networks through real-world experimentation, emulation and analysis. In particular, we measure the duration of the DTLS handshake when using three duty cycling link-layer protocols: preamble-sampling, the IEEE 802.15.4 beacon-enabled mode and the IEEE 802.15.4e Time Slotted Channel Hopping mode. The reported results demonstrate surprisingly poor performance of DTLS in radio duty-cycled networks. Because a DTLS client and a server exchange more than 10 signaling packets, the DTLS handshake takes between a handful of seconds and several tens of seconds, with similar results for different duty cycling protocols. Moreover, because of their limited memory, typical constrained nodes can only maintain 3-5 simultaneous DTLS sessions, which highlights the need for using DTLS parsimoniously

    Sniffing Multi-hop Multi-channel Wireless Sensor Networks

    Get PDF
    International audienceAs wireless sensor networks grow larger, more complex and their role more significant, it becomes necessary to have an insight into the network traffic. For this purpose, sniffers play an irreplaceable role. Since a sniffer is a device of limited range, to cover a multi-hop network it is necessary to consider the deployment of multiple sniffers. This motivates the research on the optimal number and position of sniffers in the network. We present a solution based on a minimal dominant set from graph theory. We evaluate the proposed solution and implement it as an extension of the 6TiSCH simulator. Our solution assumes a 50-nodes scenario, deployed in 2x2 km outdoor area, with 10% of packet drops over all channels, when 10 sniffers are used
    corecore