International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 3 - May 2014 An Efficient Backbone Aware Shortest Path Selection Protocol in Zigbee Wireless Networks Ms. S.Shoba#1, Mrs. S. Raja Rajeswari*2 # Student,*Assistant Professor Department of Computer Science and Engineering Regional Centre of Anna University Tirunelveli (T.N) India Abstract— The zigbee tree routing is wide used in several resource restricted devices and applications. Since it doesn’t need any routing table and route discovery overhead to send a packet to the destination. But the ZigBee tree routing has the elemental limitation that a packet follows the tree topology. Therefore, it cannot provide the optimum routing path. The shortcut tree routing protocol that provides the close to best routing path also as maintains the advantages of the ZigBee tree routing like no route discovery overhead and low memory consumption. in a very tree-structured ZigBee wireless network, nodes near the basis of the tree (i.e., hot-spot nodes) could exhaust their power sooner than those distant from the basis attributable to serious hundreds on packet forwarding. This hot spot downside is inherent in tree-structured networks and should demand additional energy to live through failures of hot-spot nodes. The backbone-aware topology formation (BATF) theme is planned to alleviate the hot-spot downside. BATF utilizes power-rich nodes to create a backbone tree that doesn't suffer from the new spot downside. To prolong the period of time of a ZigBee network and improve its knowledge assortment capability introduced a backbone-aware topology formation (BATF) theme. The reactive routing protocol in ZigBee is derived from AODVjr which is one of the representative routing protocols in MANET (Mobile Ad-hoc Networks).Similar with other MANET routing protocols ZigBee reactive routing protocol provides the optimal routing path for the arbitrary source and destination pair through the on-demand route discovery. It requires the route discovery process for each communication pair, so the route discovery overhead and the memory consumption proportionally increases with the number of traffic sessions. Moreover, route discovery packets are flooded to the overall network, which interfere with transmission of other packets even in the spatially uncorrelated area with the route discovery. The tree routing protocol uses only parent and child relationship for routing, ignoring neighbor nodes. As a result,packets may be routed through several hops towards the destination even if this is within sender’s 1-hop transmission In many cases, the routing overhead of tree routing algorithm cannot be avoided if only parent-child relationships are considered in the routing. Keywords— ZigBee, Tree routing, Shortcut tree routing, STR, Neighbor table, MANET, WSN, IEEE 802.15.4,BATF,PN In order to overcome such problem, each node should consider its neighbor nodes as next hop nodes. On the other hand, ZigBee tree routing (ZTR) prevents the route discovery overhead in both memory and bandwidth using the distributed block addressing scheme. In ZTR, since each node is assigned a hierarchical address, a source or an intermediate node only decides whether to forward a packet to the parent or one of the children by comparing its address with the destination address. The most benefit of ZTR is that any source node can transmit a packet to an arbitrary destination in a network without any route discovery overheads. Due to this efficiency, ZTR is considered as a promising protocol for resource constrained devices in diverse applications such as smart grid project and Internet of Things. However, in ZTR, packets are forwarded along the tree topology to the destination even if the destination is located nearby. Thus, ZTR cannot provide the optimal routing path, while it does not require any route discovery overhead. Introduction ZigBee is used in applications that require a low data rate, long battery life, and secure networking. ZigBee has a defined rate of 250 kbit/s, best suited for periodic or intermittent data or a single signal transmission from a sensor or input device. ZigBee is a specification for a suite of high level communication protocols used to create personal area networks built from small, low-power digital radios.Applications include wireless light switches, electrical meters with in-home-displays, traffic management systems, and other consumer and industrial equipment that requires short-range wireless transfer of data at relatively low rates. The technology defined by the ZigBee specification is intended to be simpler and less expensive than other WPANs, such as Bluetooth or Wi-Fi. ZigBee networks are secured by 128 bit symmetric encryption keys. In home automation applications, transmission distances range from 10 to 100 meters line of sight, depending on power output and environmental characteristics. ISSN: 2231-5381 In this paper propose the BATF algorithm The hotspot problem is inherent in tree-structured networks and may demand extra energy to recover from failures of hot-spot nodes. The backbone-aware topology formation (BATF) scheme is proposed to alleviate the hot-spot problem. BATF http://www.ijettjournal.org Page 127 International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 3 - May 2014 utilizes power-rich nodes to form a backbone tree that does not suffer from the hot-spot problem II RELATED WORK A Distributed and Efficient Flooding Scheme using 1-hop Information in MobileAdHocNetworks [1] by H.Lu,et al(2007) is implemented in 1-hop neighbor information. The objective of this work is the sufficient and necessary condition of 100 percent deliverability for flooding scheme. Flooding is one of the most fundamental operations in mobile ad hoc networks (MANETs). Flooding is a very frequently invoked utility function in MANETs. Therefore, an efficient implementation of flooding scheme is crucial in reducing the overhead of routing protocols and improving the throughput of networks. Pure flooding, or blind flooding, where every node in the network retransmits the flooding message when it is its first time to receive it. This simple scheme guarantees that a flooding message can reach all nodes if there is no collision and the network is connected. However, it generates an excessive amount of redundant network traffic because all nodes in the network transmit the flooding message. This will consume a lot of the energy resources of mobile nodes and cause congestion of the network. Dynamic Source Routing in Ad Hoc Wireless Networks [2] by D.B. Johnson and D.A. Maltz is implemented in Mobile Computing. An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. In such an environment, it may be necessary for one mobile host to enlist the aid of other hosts in forwarding a packet to its destination, due to the limited range of each mobile host’s wireless transmissions. This paper presents a protocol for routing in ad hoc networks that uses dynamic source routing. The protocol adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently. Based on results from a packet-level simulation of mobile hosts operating in an ad hoc network, the protocol performs well over a variety of environmental conditions such as host density and movement rates. For all but the highest rates of host movement simulated, the overhead of the protocol is quite low, falling to just 1% of total data packets transmitted for moderate movement rates in a network of 24 mobile hosts. In all cases, the difference in length between the routes used and the optimal route lengths is negligible, and in most cases, route lengths are on average within a factor of 1.01 of optimal. Distributed Throughput Optimization for ZigBee Cluster Tree Networks [3] by Y. Huang, et al is implemented in zigbee networks. ZigBee, a unique communication standard designed for low-rate wireless personal area networks, has extremely low complexity, cost, and power consumption for wireless connectivity in inexpensive, portable, and mobile devices. Among the well-known ZigBee topologies, ZigBee clustertree is especially suitable for low- power and low-cost ISSN: 2231-5381 wireless sensor networks because it supports power saving operations and light-weight routing. In a constructed wireless sensor network, the information about some area of interest may require further investigation such that more traffic will be generated. However, the restricted routing of a ZigBee clustertree network may not be able to provide sufficient bandwidth for the increased traffic load, so the additional information may not be delivered successfully. In this paper, we present an adoptive-parent- based framework for a ZigBee cluster-tree network to increase band- width utilization without generating any extra message exchange. T.Kim,D.Kim,N.Park,S.Yoo,andT.S.Lopez [4]. The objective of this work is to find the optimal next hop node that has the smallest remaining hop count to the destination. ZigBee is the emerging industrial standard for ad hoc networks based on IEEE 802.15.4. Due to characteristics such as low data rate, low price, and low power consumption, ZigBee is expected to be used in wireless sensor networks for remote monitoring, home control, and industrial automation. Since one of the most important goals is to reduce the installation and running cost, ZigBee stack is embedded in small and cheap microcontroller units. Since tree routing does not require any routing tables to send the packet to the destination, it can be used in ZigBee end devices that have limited resources. However, tree routing has the problem that the packets follow the tree topology to the destination even if the destination is located nearby.The shortcut tree routing protocol to reduce the routing cost of ZigBee tree routing by using the neighbor table that is originally defined in the ZigBee standard Chengfa Li, Mao Ye, Guihai Chen and Jie Wu [5].Clustering provides an effective way for prolonging the lifetime of a wireless sensor network. Current clustering algorithms usually utilize two techniques, selecting cluster heads with more residual energy and rotating cluster heads periodically, to distribute the energy consumption among nodes in each cluster and extend the network lifetime. However, they rarely consider the hot spots problem in multihop wireless sensor networks. When cluster heads cooperate with each other to forward their data to the base station, the cluster heads closer to the base station are burdened with heavy relay traffic and tend to die early, leaving areas of the network uncovered and causing network partition. To address the problem, here propose an Energy Efficient Unequal Clustering (EEUC) mechanism for periodical data gathering in wireless sensor networks. It partitions the nodes into clusters of unequal size, and clusters closer to the base station have smaller sizes than those farther away from the base station. Thus cluster heads closer to the base station can preserve some energy for the inter cluster data forwarding. Here also propose an energy aware multihop routing protocol for the inter cluster communication. Simulation results show that unequal clustering mechanism balances the energy consumption well among all sensor nodes and achieves an obvious improvement on the network lifetime. http://www.ijettjournal.org Page 128 International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 3 - May 2014 III PROPOSED SYSTEM System design or system architecture is the conceptual design that defines the structure and/or behavior of a system. . Topology creation creation device in a network, whereas a network conforming to a tree topology uses a distributed scheme (Cskip) to assign a 16-bit address to each device. Every node is assigned a unique 16 bit short address dynamically using either distributed addressing or stochastic addressing scheme. The routing protocols of ZigBee are diverse so that a system or users can choose the optimal routing strategy according to the applications. Address scheme Routing tree calculation Back bone tree D.Neighbor Table First, each node needs to determine what other ports it is connected to, over fully working links; it does this using a reach ability protocol which it runs periodically and separately with each of its directly connected neighbors. Each node independently runs an algorithm over the map to determine the shortest path from itself to every other node in the network; generally some variant of Dijkstra's algorithm is used. This is based around a link cost across each path which includes available bandwidth among other things. Power rich node Packet transmission Neighborhood table E.Position Identifier Position of the node is identified to increase the performance of the system and to collect better node for Communication Destination address Path selection Verification level information Transmission Fig 1.Architecture diagram A.Topology Creation Once the node of the given type has been configured as shown in the previous subsection sec:node comfit, the next step is to create the nodes. The node-creation API basically looks very similar to the old node creation API. In case of hierarchical addressing the node address has to be passed as an argument as shown below: set node [$ns_ node] ## or set node [$ns_ node $node address] ;# incase of hierarchical ;# addressing. B.Routing Tree Calculation Tree based collection protocol. Some number of nodes in a network advertises themselves as tree roots. Nodes form a set of routing trees to these roots. TP is address in that a node does not send a packet to a particular root; instead, it implicitly chooses a root by choosing a next hop. Nodes generate routes to roots using a routing gradient. C.Address Scheme 16 bit The function of the network layer is to assign a 16-bit address to each device joining the network and to route packets to their destination. ZigBee PRO uses a stochastic (nondeterministic) scheme to assign the address of each ISSN: 2231-5381 F.Power Node Selection To Identify an efficient back bone network and to collect the best path node energy levels is identified so that based on the power node information the Back bone Network can be easily identified . Power Node are identified using the energy information of the Node and based on the energy information color transition are performed for the system. G.Packet transmission For a variety of reasons data in networks is transmitted in packets, which are sequences of octets (i.e. bytes). Usually packets are transmitted asynchronously, so we need to know when the packet starts and when it ends [in the case of RS232 characters we had a start and an end bit. In general the problem of recognizing start and end of a packet is called the framing problem. H.Path Selection via tree routing Routing is the process of selecting best paths in a network along which to send network traffic. Routing is performed for many kinds of networks, including the telephone network (circuit switching).A local network administrator, in special cases, can set up host-specific routes to a particular device which provides more control over network usage, permits testing and better overall security. This can come in handy when debugging network connections or routing tables. I.Path verification Two major types of routing protocols exist, internal protocols that route information within an organization and external protocols that route information between networks.IGP is the Interior Gateway Protocol used to exchange routing information within an autonomous system. RIP and IGRP are http://www.ijettjournal.org Page 129 International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 3 - May 2014 examples of IGPs.EGP are the Exterior Gateway Protocol used to exchange routing information between autonomous systems. Border Gateway Protocol version 4 (BGP4) is an example of an EGP. path is verified whether it is shortest or not. If the path is shortest means take that path for consideration. Other takes the alternative path for path verification. In this module the calculation of ancestor at each node. Using programming, the ZTR Protocol is modified for the detection of the tree and the tree based addressing scheme is used at each node deployment and front/back ancestor are calculated at individual node section. Some number of nodes in a network advertises themselves as tree roots. Nodes form a set of routing trees to these roots. TP is address in that a node does not send a packet to a particular root. Instead, it implicitly chooses a root by choosing a next hop. IV SIMULATION AND RESULTS Once the node of the given type has been configured the next step is to create the nodes. The node creation API basically looks very similar to the old node creation API.The Communication Node with all specification parameters like protocol,range, buffer,wireless IEEE802.11 like definitions are carried and created for the basic communication. In this module ZTR based protocol creation will defined and the protocol deployment is carried. Fig. 4 Ancestor at each node This figure shows the Individual node neighborhood log creation and the log include the information regarding its two hop neighbor description and the neighborhood list is created with detailed information description about the node capability is displayed. First, each node needs to determine what other ports it is connected to, over fully working links. It does this using a reach ability protocol which it runs periodically and separately with each of its directly connected neighbors. Fig. 2 Node creation In this module ZTR based protocol is designed and the addressing mechanism are deployed . An efficient 16 bit address mode is deployed.Tree structure is created and the addressing schemes are deployed for the individual system..Every node is assigned a unique 16 bit short address dynamically using either distributed addressing or stochastic addressing scheme. Fig. 5 Neighborhood node collection Fig.3 Block Address Scheme ISSN: 2231-5381 This figure shows the power node selection. To Identify an efficient Back bone network and to collect the best path Node Energy levels is identified so that based on the power node information the Back bone Network can be easily identified . Power Node are identified using the energy information of the Node and based on the energy information color transition are performed for the system. http://www.ijettjournal.org Page 130 International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 3 - May 2014 Routing is the process of selecting best paths in a network along which to send network traffic. Routing is performed for many kinds of networks, including the telephone network (circuit switching).A local network administrator, in special cases, can set up host-specific routes to a particular device which provides more control over network usage, permits testing and better overall security. This can come in handy when debugging network connections or routing tables Comparison table for performance evaluation A.Comparison table for end to end delay and packet delivery and routing send control packet Fig. 6 N Power node selection In this module shows the Backbone network awareness. To prolong the lifetime of a ZigBee network and improve its data collection capability, we propose a backbone-aware topology formation (BATF) scheme, where one ZigBee tree network can be rooted at each PN. All PNs form a backbone that connects all independently-developing ZigBee trees to one network. In BATF, all PNs and ZNs are required to share the same 16-bit address space to uniquely identify every PN and ZN in the network. Furthermore, tree-based routing used by ZigBee, which is tightly-coupled with addressing, is required to work in each PN-rooted ZigBee tree. Fig. 7 Backbone network awareness In this module shows the packet transmission.Usually packets are transmitted asynchronously, so we need to know when the packet starts and when it ends. In general the problem of recognizing start and end of a packet is called the framing problem. One possible way to represent a packet is by starting it with a special character, say SOH = 0x01, and ending it with a special character, say EOT=0x04. Then one can recognize a packet by looking for these characters. Of course, we need to make sure that SOH and EOT appear only two major types of Routing protocols exist, internal protocols that route information within an organization and external protocols that route information between networks. Table 1: End to end delay, packet delivery and send control packet Routing End to End delay(msec) Routing Packet Delivery(msec) Routing Send Control Packets(msec) No. of nodes No. of nodes No. of nodes BATF STR BATF STR BATF STR 0 0 0 0 0 0 0.013 0.013 943 823 10003 10003 0.0136 0.0156 93.56 83.56 20006 18006 0.0189 0.0199 959 85.39 25009 20009 0.00812 0.02012 96.512 86.512 350012 250012 0.02015 0.02315 9715 9015 400015 350015 0.02218 0.02518 9818 9418 500018 400018 0.01921 0.02921 10021 9435 550021 450021 0.01825 0.02825 10525 10125 570525 510525 0.0203 0.0313 10830 10330 580830 540830 0.02235 0.03235 11035 11035 620035 590035 0.0234 0.0334 11440 10740 680440 640440 0.025 0.035 11900 11200 740000 690000 This table shows the comparison for end to end delay, packet delivery and send control packet. The end-to-end latency is mainly affected by the hop distance between a source and a destination. Whereas STR shows long end-to-end latency about 32~47msec, BATF show short end-to end latency about 18msec per session. The packet delivery ratio is mainly affected by the number of hops the packet delivery ratio decreases for the increasing network traffic. It results from that the network congestion causes the collision and drops of the packets Fig. 8 Packet Transmission ISSN: 2231-5381 http://www.ijettjournal.org Page 131 International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 3 - May 2014 B.Comparison table for received control packet and throughput Table 2 Received control packet and throughput Routing Received Control Routing Packets(msec) Throughput(msec) No. of nodes No. of nodes BATF STR BATF STR 0 0 0 0 10003 10003 16003 12003 20006 22006 17006 13006 25009 27009 17509 15509 270012 290012 180012 159012 260015 300015 187015 163015 300018 320018 190018 170018 350021 330021 230021 190021 370525 390525 270525 230525 380830 400830 320830 270830 420035 420035 350035 300035 480440 490440 410440 350440 600000 700000 450000 400000 This table shows the comparison of the received control packet and throughput. Throughput of BATF is high when compared to STR routing overhead of link state maintenance in STR and the route discovery in STR. The routing overhead of STR is exponentially increased as the network density increases, because the RREQ (Route Request) packets are flooded into the whole network. [5] Bandyopadhyay, S., & Coyle, E. (2003). An energy-efficient hierarchical clustering algorithm for wireless sensor networks. In Proceedings of IEEE INFOCOM (Vol. 3, pp. 1713–1723). [6] Agbaria, et al, “Efficient and Reliable Dissemination in Mobile Ad Hoc Networks by Location Extrapolation,” Journal of Computer Networks and Communications, vol. 2011. [7] W. Kiess , M. Mauve, “A survey on real-world implementations of mobile ad-hoc networks,” Ad Hoc Networks, v.5 no.3, p.324-339, April, 2007 [8] B.-R. Chen, K.-K. Muniswamy-Reddy, and M. Welsh, “Ad-hoc multicast routing on resource-limited sensor nodes,” The 2nd International Workshop on Multi-hop Ad Hoc Networks from theory to reality, Florence, It- aly, 2006. [9] A. Wheeler, “Commercial Applications of Wireless Sensor Networks Using ZigBee,” IEEE Communications Magazine, vol. 45, Issue. 4, pp. 70-77, April, 2007. [10] O. Gnawali, R. Fonseca, K. Jamieson, D. Moss, and P. Levis, “Collection tree protocol,” The 7th ACM Conference on Embedded Networked Sensor Systems (SenSys), Berkeley, CA, 2009. [11] J. Ko, et al., “Connecting low-power and lossy networks to the internet,” IEEE Communications Magazine, pp. 96-101. [12] P. Levis, et al., “TinyOS: An operating system for wireless sensor networks,” Ambient Intelligence, Springer-verlag, 2005. [13] A.V. Aho, J.E. Hopcroft, and J.D. Ullman, “On finding lowest common ancestors in trees,” SIAM Journal of Computing, vol. 5, no. 1, pp. 115-132, 1976. [14] H. Lu, et al, “A Distributed and Efficient Flooding Scheme using 1-hop Information in Mobile Ad Hoc Networks ,” IEEE Transactions on Par- allel and Distributed Systems, vol. 18, no. 5, pp. 658-671, 2007. V CONCLUSION Here presented BATF, a network infrastructure for treestructured ZigBee networks that utilizes PNs as virtual coordinators for regular ZigBee devices. BATF distributes the traffic load of hot-spot nodes by organizing all PNs into a backbone tree. Yet it is ZigBee-compatible from the perspective of ZNs. In other words, BATF demands no modification from regular ZigBee devices. REFERENCES [1] H. Lu, et al, “A Distributed and Efficient Flooding Scheme using 1-hop Information in Mobile Ad Hoc Networks ,” IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 5, pp. 658-671, 2007. .[2] D.B. Johnson and D.A. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks,” Mobile Computing, vol. 353, 1996, p. 153–181. [3] Y. Huang, et al, “Distributed Throughput Optimization for ZigBee Cluster-Tree Networks,” IEEE Transaction on Parallel and Distributed Systems, vol. 23, no. 3, pp. 513-520, 2012. [4] Li, C. F., Ye, M., Chen, G., & Wu, J. (2005). An energy efficient unequal clustering mechanism for wireless sensor networks. In IEEE international conference on mobile ad-hoc and sensor systems (pp. 535–540). ISSN: 2231-5381 http://www.ijettjournal.org Page 132