28 research outputs found
Performance Comparison of the RPL and LOADng Routing Protocols in a Home Automation Scenario
RPL, the routing protocol proposed by IETF for IPv6/6LoWPAN Low Power and
Lossy Networks has significant complexity. Another protocol called LOADng, a
lightweight variant of AODV, emerges as an alternative solution. In this paper,
we compare the performance of the two protocols in a Home Automation scenario
with heterogenous traffic patterns including a mix of multipoint-to-point and
point-to-multipoint routes in realistic dense non-uniform network topologies.
We use Contiki OS and Cooja simulator to evaluate the behavior of the
ContikiRPL implementation and a basic non-optimized implementation of LOADng.
Unlike previous studies, our results show that RPL provides shorter delays,
less control overhead, and requires less memory than LOADng. Nevertheless,
enhancing LOADng with more efficient flooding and a better route storage
algorithm may improve its performance
Multiple Redundancy Constants with Trickle
International audienceWireless sensor network protocols very often use the Trickle algorithm to govern information dissemination. For example, the widely used IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) uses Trickle to emit control packets. We derive an analytical model of Trickle to take into account multiple redundancy constants and the common lack of synchronization among nodes. Moreover, we demonstrate message count unfairness when Trickle uses a unique global redundancy constant because nodes with less neighbors transmit more often. Consequently, we propose a heuristic algorithm that calculates a redundancy constant for each node as a function of its number of neighbors. Our calculated redundancy constants reduce unfairness among nodes by distributing more equally the number of transmitted messages in the network. Our analytical model is validated by emulations of constrained devices running the Contiki Operating System and its IPv6 networking stack. Furthermore, results very well corroborate the heuristic algorithm improvements
Multiple Redundancy Constants with Trickle
International audienceWireless sensor network protocols very often use the Trickle algorithm to govern information dissemination. For example, the widely used IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) uses Trickle to emit control packets. We derive an analytical model of Trickle to take into account multiple redundancy constants and the common lack of synchronization among nodes. Moreover, we demonstrate message count unfairness when Trickle uses a unique global redundancy constant because nodes with less neighbors transmit more often. Consequently, we propose a heuristic algorithm that calculates a redundancy constant for each node as a function of its number of neighbors. Our calculated redundancy constants reduce unfairness among nodes by distributing more equally the number of transmitted messages in the network. Our analytical model is validated by emulations of constrained devices running the Contiki Operating System and its IPv6 networking stack. Furthermore, results very well corroborate the heuristic algorithm improvements
DTLS Performance in Duty-Cycled Networks
The Datagram Transport Layer Security (DTLS) protocol is the IETF standard
for securing the Internet of Things. The Constrained Application Protocol,
ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for
securing application traffic. There has been much debate in both the
standardization and research communities on the applicability of DTLS to
constrained environments. The main concerns are the communication overhead and
latency of the DTLS handshake, and the memory footprint of a DTLS
implementation. This paper provides a thorough performance evaluation of DTLS
in different duty-cycled networks through real-world experimentation, emulation
and analysis. In particular, we measure the duration of the DTLS handshake when
using three duty cycling link-layer protocols: preamble-sampling, the IEEE
802.15.4 beacon-enabled mode and the IEEE 802.15.4e Time Slotted Channel
Hopping mode. The reported results demonstrate surprisingly poor performance of
DTLS in radio duty-cycled networks. Because a DTLS client and a server exchange
more than 10 signaling packets, the DTLS handshake takes between a handful of
seconds and several tens of seconds, with similar results for different duty
cycling protocols. Moreover, because of their limited memory, typical
constrained nodes can only maintain 3-5 simultaneous DTLS sessions, which
highlights the need for using DTLS parsimoniously.Comment: International Symposium on Personal, Indoor and Mobile Radio
Communications (PIMRC - 2015), IEEE, IEEE, 2015,
http://pimrc2015.eee.hku.hk/index.htm
Topology Construction in RPL Networks over Beacon-Enabled 802.15.4
In this paper, we propose a new scheme that allows coupling beacon-enabled
IEEE 802.15.4 with the RPL routing protocol while keeping full compliance with
both standards. We provide a means for RPL to pass the routing information to
Layer 2 before the 802.15.4 topology is created by encapsulating RPL DIO
messages in beacon frames. The scheme takes advantage of 802.15.4 command
frames to solicit RPL DIO messages. The effect of the command frames is to
reset the Trickle timer that governs sending DIO messages. We provide a
detailed analysis of the overhead incurred by the proposed scheme to understand
topology construction costs. We have evaluated the scheme using Contiki and the
instruction-level Cooja simulator and compared our results against the most
common scheme used for dissemination of the upper-layer information in
beacon-enabled PANs. The results show energy savings during the topology
construction phase and in the steady state
Broadcasting Strategies in 6TiSCH Networks
International audienceWe consider IPv6-enabled networks that run on top of the time-slotted channel hopping mode of IEEE802.15.4 (6TiSCH). The ongoing discussions in the standardization community concern the network formation process and the definition of a bootstrapping protocol by which a new mote is admitted into the network. Because the bootstrapping trac uses the same shared slots as the network broadcasts, the key to the optimal performance of the network formation process lays in the optimization of the network broadcasting strategy. The problem boils down to the issue of stabilizing slotted Aloha. To do so, we adapt a broadcast algorithm to the specifics of 6TiSCH networks. By simulation, we evaluate the optimal broadcast transmission probability in the network. We answer the open questions in the IETF 6TiSCH standardization community that concern the performance of the network formation process for the optimal values of transmission probability. As the main contribution of the letter, we provide network administrators with a set of values that allow the formation of dense networks
SODA: 6TiSCH Open Data Action
International audienceIndustrial-grade performance of wireless networks has become a reality of the open Internet of Things through a low-power wireless technology called 6TiSCH. A standardization group of the same name within the Internet Engineering Task Force (IETF) has been working on a zero-configuration, IPv6-enabled solution applicable to industrial monitoring and control, smart building, home, city and agriculture. The base standardization work is virtually done. Before different stakeholders invest significant resources in developing and deploying 6TiSCH-based solutions, they need to have a certain level of assurance about whether the technology indeed meets their requirements. An unbiased performance benchmark of a standards-compliant 6TiSCH solution is therefore required by the industry, the research community and the standardization group. 6TiSCH Open Data Action (SODA) is a research project that will provide a 6TiSCH benchmark and open datasets in different industry-relevant scenarios. SODA will automate the experimentation on these scenarios so benchmarking can remain up-to-date with changes to the standards, and facilitate comparison with future technological developments, resulting in continuous delivery benchmarking. This paper introduces the SODA project and seeks community involvement on the definition of scenarios and Key Performance Indicators, and on the usage of the tools that will be provided
DTLS Performance in Duty-Cycled Networks
International audienceThe Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic. There has been much debate in both the standardization and research communities on the applicability of DTLS to constrained environments. The main concerns are the communication overhead and latency of the DTLS handshake, and the memory footprint of a DTLS implementation. This paper provides a thorough performance evaluation of DTLS in different duty-cycled networks through real-world experimentation, emulation and analysis. In particular, we measure the duration of the DTLS handshake when using three duty cycling link-layer protocols: preamble-sampling, the IEEE 802.15.4 beacon-enabled mode and the IEEE 802.15.4e Time Slotted Channel Hopping mode. The reported results demonstrate surprisingly poor performance of DTLS in radio duty-cycled networks. Because a DTLS client and a server exchange more than 10 signaling packets, the DTLS handshake takes between a handful of seconds and several tens of seconds, with similar results for different duty cycling protocols. Moreover, because of their limited memory, typical constrained nodes can only maintain 3-5 simultaneous DTLS sessions, which highlights the need for using DTLS parsimoniously
Sniffing Multi-hop Multi-channel Wireless Sensor Networks
International audienceAs wireless sensor networks grow larger, more complex and their role more significant, it becomes necessary to have an insight into the network traffic. For this purpose, sniffers play an irreplaceable role. Since a sniffer is a device of limited range, to cover a multi-hop network it is necessary to consider the deployment of multiple sniffers. This motivates the research on the optimal number and position of sniffers in the network. We present a solution based on a minimal dominant set from graph theory. We evaluate the proposed solution and implement it as an extension of the 6TiSCH simulator. Our solution assumes a 50-nodes scenario, deployed in 2x2 km outdoor area, with 10% of packet drops over all channels, when 10 sniffers are used