ETD system

Electronic theses and dissertations repository

 

Tesi etd-11142018-173331


Thesis type
Tesi di laurea magistrale
Author
VILLA, DAVIDE
URN
etd-11142018-173331
Title
Service-Guarantee Cross-Layered: A robust and reliable protocol for Wireless Sensor Networks
Struttura
INGEGNERIA DELL'INFORMAZIONE
Corso di studi
EMBEDDED COMPUTING SYSTEMS
Commissione
relatore Prof. Di Natale, Marco
Parole chiave
  • wireless
  • sensor
  • network
  • cross-layer
  • routing
  • data-link
  • protocol
  • communication
  • Device
  • Bluetooth
  • WSN
  • BLE
Data inizio appello
11/12/2018;
Consultabilità
secretata d'ufficio
Data di rilascio
11/12/2021
Riassunto analitico
Nowadays the Wireless Sensor Networks (WSN) find a wide applicability in the most varied of fields, from industry to home, from automotive to aeroplane, and their use has been on the increase. A WSN is a collection of stand-alone devices which have one or more sensors, limited processing capability and a wireless interface to communicate. As they are usually battery powered, the biggest challenge is to achieve the necessary monitoring whilst using the least amount of energy to extend their lifetimes. This is one of the main reason for the choice of Bluetooth Low Energy (BLE) as communication standard starting point. BLE is an emerging low-power wireless technology created for short-range control and monitoring applications which is becoming increasingly widespread. SGCL fits in this scenario. It belongs to the family of cross-layer protocols whose core idea is to maintain the traditional layered architecture but allowing more coordination, interaction and joint optimization between different layers. SGCL focuses on network and data-link layers by creating a low-power and reliable communication system for wireless devices. The route creation follows the cost metric of the shortest path in terms of hop distance through a subscribe/publish method by ensuring a minimum End-to-End (E2E) delay without overlooking the successful rate. Moreover, the data-link layer exploits an advertising/scan technique to establish the communication between devices. Recovery mechanisms are triggered when a node failure occurs to notify the base station and to generate alternative routes. The correctness and performance of the protocol are evaluated via discrete event simulations with different configurations and scenarios.
File