Review Article Volume 3 Issue 4
Applied Mathematics Department, University of the Basque Country, Spain
Correspondence: Javier Bilbao, Applied Mathematics Department, University of the Basque Country, UPV/EHU, Engineering School, Alda Urkijo, s/n, 48013-Bilbao, Spain
Received: September 30, 2017 | Published: November 15, 2017
Citation: Bilbao J, Bravo E, Varela C, et al. Developing the IoT through wireless communication networks: analysis of topologies. Int J Biosen Bioelectron. 2017;3(4):327–331. DOI: 10.15406/ijbsbe.2017.03.00075
Standard structure of Wi-Fi networks is usually a communication manager and a number of clients. In this basic system, clients will always listen for the presence of one or more managers who tell them, among other information, the name of the network that they manage, the channel to use, the security and available authentication algorithms, etc. Nowadays, wireless networks can be classified into two general categories: infrastructure-based wireless networks and infrastructure-less wireless networks, or more commonly, ad hoc wireless networks. Different topologies can be used with any purpose of communication among a network of nodes and in this paper several of them are analyzed.
Keywords: zigbee, wireless network, network topology, protocol, communication
Sensor networks consist of a set of sensor nodes which are spread over a geographical area. These nodes are able to perform processing as well as sensing and are additionally capable of communicating with each other 1. Topology control is one primary challenge in these scenarios. Unlike the wired networks that typically have fixed network topologies, each sensor node in a sensor network can potentially change the network topology by adjusting its transmission range and/or selecting specific nodes to forward its messages, thus, controlling its set of neighbors.1 This is very important because future Internet aims to integrate heterogeneous communication technologies, both wired and wireless, in order to contribute substantially to assert the concept of Internet of Things (IoT).2 At the same time, prices of sensors, microprocessors, open-hardware and other electronic devices that support the IoT are low, and, in consequence, there is a proliferation of Wireless Sensor Networks (WSN) in many applicative scenarios.
Some examples include monitoring and control of industrial processes, monitoring medical applications, monitoring of environmental variables, home automation, traffic control, etc.3,4 WSN or systems based on them are proposed during the last years as projects and some of them become reality, such as Rampe system that describes a system for the mobility and autonomy of blind people in public transports.5 It could be also employed for elder, disabled or wheelchair passengers.6 Lavanya et al.7 presented in 2013 another project where Wireless Sensor Networks were used with the aim of helping blind people for independent navigation in urban transport is presented in.7 In this case, the system was based on ZigBee technology. WSN are made up by autonomous distributed nodes. The nodes include sensors to monitor physical or environmental parameters and a radio transceiver for transmitting and receiving information. These networks are based on packet switching, so that each block of information is fragmented into transmission small units called packets.8-10 The nodes must be very simple in hardware and user interface components. In addition to be equipped with one or more sensors, each node features:
The nodes of this kind of networks must be robust to allow its implementation in adverse environments, they must have low power consumption and manufacturing must be economical. Regarding to the communications module (radio transceiver), IEEE 802.15.4 - 2006 standard defines the medium-access control layer (MAC) and the physical layer (PHY). This is the standard used by ZigBee. It is a specification for low-power mesh networks, promoted by a broad consortium of industry promoters (ZigBee Alliance). ZigBee includes IEEE 802.15.4 standard for the lower layers of the protocol stack.11
Topology control has drawn significant research interest,12-19 in last few years. Different topologies have different properties; however, none of them can achieve all three preferred properties for unicast applications on wireless ad hoc networks: power spanner, planar, degree-bounded. Mobile ad-hoc networks, known as MANETs, represent a great potential for communication, interaction, and collaboration in a world with a rapidly increasing number of electronic devices everywhere, from computers to smartphones or any device with a microprocessor and wireless connection. Until first years of this century, Wang & Li20 proposed a localized algorithm to build a degree-bounded planar spanner both in centralized and distributed way, which is based on the combination of localized Delaunay triangulations (LDel)21 and Yao22 structure. It is the first localized algorithm that can achieve all the three desirable features. However, the node degree of their structure can reach 25 in the worst case; and the communication cost of their method can be large, although it is shown that the total number of messages is O(n), the hidden constant could be as high as several hundreds since the method needs to collect the 2-hop information for every node.23
IEEE 802.15.4 standard defines the specifications of the physical layer (PHY) and of the medium-access control (MAC) layer for wireless connections with low data rate, in single low-power nodes operating in a usually range coverage of 10 meters. Therefore, it is a standard designed specifically for low power wireless personal area networks (LR-WPAN). ZigBee is one of the newest technologies enabling Wireless Personal Area Networks (WPAN). ZigBee is the name of a specification for a suite of high level communication protocols using small, low-power digital radios based on the IEEE 802.15.4 standard. The technology is intended to be simpler and cheaper than other WPANs, such as Bluetooth. ZigBee protocols are intended for use in embedded applications requiring low data rates and low power consumption. Though WPAN implies a reach of only a few meters, normally 10 meters, the network will have several layers, so designed as to enable intrapersonal communication within the network, connection to a network of higher level and ultimately an uplink to internet. The typical ZigBee transmission range is roughly 50 meters. The ZigBee Alliance is providing a standardized base set of solutions for sensor and control systems. To allow vendors to supply the lowest possible cost devices the IEEE standard defines two types of devices: full function devices (FFD) and reduced function devices (RFD).24 An IEEE 802.15.4/ZigBee network requires at least one full function device as a network coordinator, but endpoint devices may be reduced functionality devices to reduce system cost. The ZigBee Standard has evolved standardized sets of solutions, called ‘layers'.24 These layers facilitate the features that make ZigBee very attractive: low cost, easy implementation, reliable data transfer, short-range operations, very low power consumption and adequate security features. ZigBee is very similar to Bluetooth but with some differences and advantages for home automation:
For example, while Bluetooth is used for applications such as mobile phones and home computers, the speed of the ZigBee becomes insufficient for these tasks, diverting it to applications such as home automation, dependent battery products, medical sensors, articles and toys, in which data transfer is lower. Three main characteristics of ZigBee that have to be taken into account are the following:
One of the great advantages of the IEEE 802.15.4 standard is the ability to create multiple alternative paths that will give robustness to any adversity through a mesh network. Although this type of topology is the most commonly used, there are others that are discussed below and can be seen in Figure 1.
Star
Communications always go through the hub (central node), which acts as PAN (Personal Area Network) coordinator. Such networks are quite vulnerable because they depend on the proper functioning of the central node. Before the fall of the coordinator, it is essential to have in place a system for the network to be reconfigured again.
Mesh
As mentioned before, it is the preferred topology for the ZigBee technology. Multiple paths are created within the network that give robustness to the fall of one or more nodes. The grid structure can be complemented with small branches, hanging nodes with other or reduced functionality.
Cluster-tree
This topology encompassing the previous two topologies. A series of clusters (group of RFD –Reduced Function Device- nodes) are created where a FFD node (Full Function Device) adopts the role of coordinator of the cluster. Each cluster coordinator is responsible for communicating with all those nodes that has directly connected, creating a star arrangement. As a complement, if the vertices of the star are FFD, these can be linked with RFD, as it happens in the mesh topology.
The main function of the MAC layer is to manage access to the medium. The aim is that all nodes of the network share in an efficient and fair manner the transmission medium, in this case the radio channel.25 The basis of the MAC protocol defined in the IEEE 802.15.4 is the CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) algorithm, that is, listen before talk (LBT). In the standard, two types of CSMA/CA are defined whose application depends on whether you opt for access control based on beacons or not:
Nonbeacon-enabled unslotted CSMA/CA network
In a network without beacons unslotted CSMA/CA is used. Each time a node wants to perform transmission of a packet, it must wait a random time, called backoff time, and during this time it does not hear the channel status. When this time has passed, the channel is heard. If the channel is free (there is no transmission in this moment), the node can transmit data. If the channel is busy, the node must wait another random period before trying to access the channel again.2 shows the flowchart of the medium access protocol. In this process, some variables are involved:
Beacon-enabled slotted CSMA/CA network
For networks with beacon mode activated, the channel access slotted CSMA/CA is used. In this case, the backoff periods are synchronized with the start of the transmission of a beacon. The use of beacons adds a new level of functionality to the MAC layer of the network. Nodes can be in off mode and wake up only when they receive a beacon signal, listen to its direction and return to the sleep mode, thereby saving energy. The beacon frames are important to keep all nodes synchronized without requiring nodes consume energy listening for long periods of time. In the3 the structure of a beacon frame is shown. The most important fields are in the MAC payload, which contains: super frame specification, GTS fields, pending address fields, and the beacon payload. The beacon-enabled mode is often used in networks of star topology, where a coordinator can create a super frame structure, defined by the regular transmission of beacons.
When standardization was created, following the creation of the "Wi-Fi Alliance" in 1996, an organization that was born with the intention to verify, certify and promote systems to 802.11, Wireless Communication Networks began to be used by the general public. In Wi-Fi networks, it always exists, as a basic structure, a communication manager and a number of customers. Customers always listen for the presence of one or more managers who tell them, among other information, the name of the network to manage the channel to use, security and authentication algorithms available, etc. Based on this information and settings of the device of the network, the customer will be able to join the appropriate network. Depending on who implements the function of network management, we will face an “ad-hoc” network, in which the manager is a member of the same network computer/device, or a network of type “infrastructure”, where the manager is an access point, router or similar. Most wireless nodes that operate with the IEEE 802.15.4 standard implements the unslotted CSMA/CA method as medium access (MAC) protocol. This MAC protocol offers high performance in environments with low traffic load and few nodes, providing good response in terms of transmission rate (throughput) and in terms of medium access delay (delay). However, its performance is seriously harmed when the number of nodes competing for the channel is high, or when the traffic load is high. In addition, number of wireless nodes in the market is growing up continuously and the appearance of new multimedia services and applications has resulted in wireless networks become saturated with nodes that require higher transmission speeds. On the other hand, CSMA-based protocols are not commonly energy efficient, and Machine to Machine (M2M) applications, with a boom at present, require the operational and autonomous life of WSN is as long as possible in order to avoid the battery replacement cost. Therefore, it should be ideal to design new MAC protocols that provide good performance for any number of nodes and for high traffic loads, always offering energy efficiencies that ensure long lifetime in such networks. There are currently numerous proposals for MAC protocols for ad hoc networks that improve the performance of CSMA/CA. DPCF MAC (Distributed Point Coordination Function) protocol is one of these proposals. It is a MAC protocol designed to work on wireless ad hoc environments. The main design goal of this protocol is to increase the performance of these networks in terms of throughput and transmission delay.
None.
The author declares no conflict of interest.
©2017 Bilbao, et al. This is an open access article distributed under the terms of the, which permits unrestricted use, distribution, and build upon your work non-commercially.