1. 6LoWPAN
6LoWPAN integrates IP-based infrastructures and WSNs by specifying how IPv6 packets are to be routed in limited networks consisting of IEEE 802.15.4 networks. Because of the constrained payload size of the link layer in 6LoWPAN networks, the 6LoWPAN standard also defines fragmentation and reassembly of datagram. The IEEE 802.15.4 frame size may additionally exceed the Maximum Transmission Unit (MTU) size of 127 bytes for massive application data, in that case additional fragments are needed. 6LoWPAN networks are connects to the Internet through the 6BR (6LoWPAN Border Router) that is analogous to a sink in a WSN. It plays compression or decompression and fragmentation or assembly of IPv6 datagram’s.
2. RPL
RPL stands for
…show more content…
The root initially broadcasts a DIO message (DODAG Information Object) as depicted in Figure 1. This message contains the information required by RPL nodes to discover a RPL instance, get its configuration parameters, select a parent set, and maintain the DODAG graph. Upon receiving a DIO message, a node adds the sender of the message to its parents list and determines its own rank value by taking into account the objective function referred in the DIO message. The rank value of a node corresponds to its position in the graph with respect to the root and must always be greater than its parents rank in order to guarantee the acyclic nature of the graph. It then forwards updated DIO messages to its neighbors. Based on its parents list, the node selects a preferred parent which becomes the default gateway to be used when data has to be sent toward the DODAG root. At the end of this process, all the nodes participating in the DODAG graph have an upward default route to the DODAG root. This route is composed of all the preferred parents. The DIO messages are periodically sent according to a timer set with the trickle algorithm [16] which optimizes the transmission frequency of control messages depending on the network state. A new node may join an existing network by broadcasting a DIS message (DODAG Information Solicitation) in order to solicit DIO messages from its neighbors. The DAO messages (Destination Advertisement Object)
The IPv4 came before the IPv6 and these datagrams are similar in many ways but also differ in more ways than one. IPv6 came out in the year 2004 and still uses many of the features that made IPv4 so successful. IPv6 is supposed to become the new standard over the older version of IPv6, but it is tough for v6 to take its spot when v6 cannot support everything v4 does, basically v6 cannot connect to a v4 system. Some differences are that it is stated that the IPv6 is more secure than the IPv4, the address size went from 32 bits in the IPv4 to 128 bits in the IPv6, extensible protocols are more flexible in the IPv6, IPv4 and IPv6 are not compatible, the IPv4 will not be able to support additional nodes or support for applications, and the
AODV are utilized, instead of broadcasting data packets, S start off a route discovery protocol that requires broadcasting smaller Route Request
Unlike MQTT, the publish-subscribe model of CoAP uses Universal Resource Identi er (URI) instead of topics. This means that subscribers will subscribe to a particular resource indicated by the URI U. When a node publishes data D to the URI U, then all subscribers are noti ed about the new value as indicated in D. Since CoAP runs on top of the inherently not reliable UDP, it provides its own reliability mechanism through the use of con rmable and non-con rmable messages [55]. The observers register by using the GET request with a special observe option activated. The subject puts the observer, if it is allowed, in the list of the interested entities and responds to the observer with an immediate state of the resource. After the initial response, each subsequent noti cation is an additional CoAP response sent by the server in reply to the GET request and includes a complete representation of the new resource state [56]. CoAP also enables high scalability and e ciency through a complex architecture, which supports the use of caches and intermediaries (proxy) nodes that multiplex the interest of multiple subscribers in the same event into a single association [57] (see Figure
The Two-Tier Data Dissemination (TTDD) assumes that the sensor nodes are stationary and location aware and sinks are allowed to change their location dynamically [9]. When any change is sensed by sensors the source node will generate the reports. Then the source node chooses itself as a start crossing point and sends data to its adjacent crossing points. This is also used in which nodes are stationery for multiple mobile sinks.
In this example, here node A wants to send data packets to node D and starts to find the shortest path for its destination, so if node D is a malicious node then it will show that it has active route to the specified destination. It will then send the response In the example, data packets transfer in a hierarchic data center network. The link capacity is 1000 kb/s. The number on each is the traffic load. The distribution of traffic is based on equal cost multi-path (ECMP). In figure 8, we can see that the 3). Congestions
This protocol use Dijkstra algorithm. It maintains a complex data base, also called as link state database, which contains full information about the remote routers and the exact network topology. The goal from this protocol is to provide similar information about network connection to each router, so each router can calculate the best route to each network this is happen when each router generates information about itself and pass these information to other routers in the network so each router make a copy of this information without changing it.
Being proactive, AODV doesn’t need all its nodes in a network to maintain the routes to destinations rather request a route only when needed i.e., only the nodes which are communicating would require to maintain the route. Also AODV uses sequence numbers to avoid routing loops like in DSDV. Whenever a node needs to communicate with another node, a route has to be found and for that purpose Route Request (RREQ) message is broadcasted to all its neighbors till it reaches the destination node or route to destination. A temporary route table entry in initiated by the RREQ messages throughout the network. Once the destination or a route is found, Route Reply (RREP) message is sent back to source by unicasting along the temporary reverse path of the received RREQ message. RREP message initiates in creating a routing table entries for the destination in intermediate nodes on its way back to source. After certain amount of time these routing table entries expire. Neighbors are detected by periodic HELLO messages (a special RREP message). If a node A does not receive HELLO messages from a neighbor B through which it sends traffic, it assumes that a link is broken and the failure indication is forwarded to its active neighbors. When this message reaches the sources, then either they request a new route by sending new RREQ messages or stop sending data. HELLO messages and the
In simulated network the source node designated as1 initiates the routing procedure by sending RREQ or Route Request message to its surrounding nodes. The RREQ message sent by the source node is denoted in the color green. The other RREQ messages are shown in cyan, yellow, black etc. The source node 1 is sending the RREQ message to its neighbour nodes 5, 6, 9, 11 and 13 and the links are formed shown by the green line. Every time node 5,6,9,11,13 is sending the RREQ message to its neighbour and the links are formed.
In order to avoid this problem, a technique called probability distribution algorithm is introduced. In probability distribution algorithm, the random traffic between the primary network users are analyzed. The nearby nodes behaviors are learnt by the secondary node. The probability of the traffic in the neighboring nodes are studied by the node that tries to transmit data. When the traffic is free then the secondary node establishes the connection. If there is traffic then the secondary node searches for other nodes. Thus the data transmission occurs in this CR
A group of wireless sensor nodes (devices) dynamically constructs a temporary network without the exercise of any pre-existing network infrastructure or centralized administration. The main goal of ad-hoc networking is multihop broadcasting in which packets are transferred from source node to destination node through the intermediate nodes (hops). The main function of multi hop WSN is to enable communication between two terminal devices through a bit of middle nodes, which are transferring information from one level to another level. On the foundation of network connectivity, it dynamically gets to determine that which nodes should get included in routing, each node involved in routing transmit the data to further
routing. In this chapter, we introduce some popular routing protocols in each of the three
The Internet Protocol (IP) has some vulnerability that can be exploited to transfer information along the network by being anonymous. Some attempts have been made using IPv4 but now since IPv6 is the new mode of network the challenge is to design it to fit the new trend.
IPv6 uses NDP (Neighbor Discovery Protocol) to find the MAC address. NDP manages interaction between nodes via message exchanges. These messages provide the data necessary for the processes of host auto configuration and packet transmission on a local link. Host auto configuration involves separate tasks of Parameter discovery, address auto configuration and duplicate address detection. Packet discovery is facilitated through router discovery process. It obtains the necessary parameters required for host configuration. Duplicate address detection is used to detect the presence of duplicate addresses on the same link. Packet transmission process requires data which can be obtained by router discovery, prefix discovery, address resolution, neighbor
Network improvement has become follower in today’s modern life. The more we work the more we are affected to network and thus normally having always new requirements. To implement more efficient methods is needed first to predicate them. This predication needs to be developed before the requirements are very high. Users always expect more from networking while they compare old and current methods they’re working on. If network improvement performs poorly it would damage many businesses, consumer satisfaction etc, thus forthcoming of network should always be improved and not go down. One of the greatest improvements made on network field was
security point of view. It is reliable and simple to set up, with automatic configuration.