SEP2.0通信协议研究

合集下载

常见的物联网通信方式

常见的物联网通信方式

常见的物联网通信方式展开全文一、前言早期的物联网是指两个或多个设备之间在近距离内的数据传输,解决物物相连,早期多采用有线方式,比如RS323、RS485,考虑设备的位置可随意移动的方便性(有根线太丑了),后期更多的使用无线方式;随着时代进步和发展,社会逐步进入互联网,各类传感器采集数据越来越丰富,大数据应用随之而来,人们考虑把各类设备直接纳入互联网以方便数据采集、管理以及分析计算。

简而言之,物联网智能化已经不再局限于小型设备、小网络阶段,而是进入到完整的智能工业化领域,智能物联网化在大数据、云计算、虚拟现实上步入成熟,并纳入互联网整个大生态环境。

二、物联网的发展最早的物联网只是简单把两个设备用信号线连接在一起:后来使用了无线,也出现了简单的组网:在互联网时代,越来越多的传感器、设备接入互联网,互联网也不单是通过网线传输,引入了空中网、卫星网等,应用的领域也越来越广泛:三、常见的物联网通信方式笔者对常用的物联网通信方式进行归纳总结分为四大种类,见下图:1.有线传输设备之间用物理线直接相连,不是很方便。

主要有电线载波或载频、同轴线、开关量信号线、RS232串口、RS485、USB,这里只对常用的RS232串口、RS485、USB做介绍。

RS232串口:串行通信接口,全名是“数据终端设备(DTE)和数据通讯设备(DCE)之间串行二进制数据交换接口技术标准”,是电脑与其它设备传送信息的一种标准接口;该标准规定采用一个25个脚的DB25连接器,对连接器的每个引脚的信号内容加以规定,还对各种信号的电平加以规定;RS-232属单端信号传送,存在共地噪声和不能抑制共模干扰等问题,因此一般用于20m以内的通信,常用的串口线一般只有1~2米。

见图:RS-485总线:在要求通信距离为几十米到上千米时或者有多设备联网需求时,RS232无法满足,因此诞生了RS-485 串行总线标准。

RS-485采用平衡发送和差分接收,具有抑制共模干扰的能力,加上总线收发器具有高灵敏度,能检测低至200mV的电压,使得传输信号能在千米以外得到恢复,RS-485采用半双工工作方式,可以联网构成分布式系统,用于多点互连时非常方便,可以省掉许多信号线,允许最多并联32台驱动器和32台接收器。

ZigBee技术-图文

ZigBee技术-图文

ZigBee技术-图文(6)安全:ZigBee提供了基于循环冗余校验(CRC)的数据包完整性检查功能,支持鉴权和认证,采用了AES-128的加密算法,各个应用可以灵活确定其安全属性。

3应用实例编辑功能。

该产品采用高性能的工业级ZigBee方案,提供SMT与DIP接口,可直接连接TTL接口设备,实现数据透明传输功能;低功耗设计,最低功耗小于1mA;提供6路I/O,可实现数字量输入输出、脉冲输出;其中有3路I/O还可实现模拟量采集、脉冲计数等功能。

该产品已广泛应用于物联网产业链中的M2M行业,如智能电网、智能交通、智能家居、金融、移动POS终端、供应链自动化、工业自动化、智能建筑、消防、公共安全、环境保护、气象、数字化医疗、遥感勘测、农业、林业、水务、煤矿、石化等领域。

zigbee组网模式应用设计1.采用高性能工业级ZigBee芯片2.低功耗设计,支持多级休眠和唤醒模式,最大限度降低功耗3.电源输入(DC2.0~3.6V)稳定可靠1.WDT看门狗设计,保证系统稳定2.提供TTL串行接口,SPI接口。

3.天线接口防雷保护(可选)标准易用1.采用2.0的SMA与DIP接口,特别适合于不同用户的应用需求。

2.提供TTL接口可直接连相同电压的TTL串口设备3.智能型数据模块,上电即可进入数据传输状态4.使用方便,灵活,多种工作模式选择5.方便的系统配置和维护接口6.支持串口软件升级和远程维护功能强大1.支持ZigBee无线短距离数据传输功能2.具备中继路由和终端设备功能3.支持点对点、点对多点、对等和Meh网络4.网络容量大:65000个节点5.节点类型灵活:中心节点、路由节点、终端节点可任意设置;6.发送模式灵活:广播发送或目标地址发送模式可选7.通信距离大ZigBee技术所采用的自组织网是怎么回事?举一个简单的例子就可以说明这个问题,当一队伞兵空降后,每人持有一个ZigBee网络模块终端,降落到地面后,只要他们彼此间在网络模块的通信范围内,通过彼此自动寻找,很快就可以形成一个互联互通的ZigBee网络。

Zigbee技术及其应用技术

Zigbee技术及其应用技术

Zig bee技术及其应用2013-09-21 21:37:38|分类:Zigbee技术|标签:ziqbee通信组网应川|字号订阅ZigBee是一种低速短距离传输的无线网络协议。

ZigBee协议从下到上分别为物理层(PHY)、媒体访问控制层(MAC)、传输层(TL)、网络层(NWK)、应用层(APL)等。

其中物理层和媒体访问控制层遵循IEEE 802.15.4标准的规定。

乙gBee网络主要特点是低功耗、低成本、低速率、支持大量节点、支持多种网络拓扑、低复朵度、快速、可靠、安全。

ZigBee网络中设备的可分为协调器(Coordinator)>汇聚节点(Router)、传感器节点(EndDevice)等三种角色。

⑴与此同时,中国物联网校企联盟认为:zigbee作为一种短距离无线通信技术,山于其网络可以便捷的为用户提供无线数抓传输功能,因此在迦阳领域具有非常强的可应用性。

起源ZigBee译为”紫蜂”,它与蓝牙相类似。

是一种新兴的短距离无线通信技术,用于传感控制应用(Sensor and Control)o由IEEE 802.15工作组中提出,并由其TG4工作组制定规范。

2001 年8 月,ZigBee Alliance 成立。

2004年,ZigBee V1.0诞生。

它是Zigbee规范的第一个版本。

由于推出仓促,存在一些错误。

2006年,推出ZigBee 2006,比较完善。

2007年底,ZigBee PRO推出。

2009年3月,Zigbee RF4CE推出,具备更强的灵活性和远程控制能力。

2009年开始,Zigbee釆用了IETF的IPv6 6Lowpan标准作为新一代智能电网Smart Energy(SEP 2.0)的标准,致力于形成全球统一的易于与互联网集成的网络,实现端到端的网络通信。

随着美国及全球智能电网的建设,Zigbee将逐渐被IPv6/6Lowpan标准所取代。

ZigBee的底层技术基于IEEE 802.15.4,即其眇理屋和媒体访问控制层直接使用了IEEE 802.15.4的定义。

sep路由协议点评

sep路由协议点评

sep路由协议点评摘要:1.引言2.SEP 路由协议简介3.SEP 路由协议的优势3.1 高效性3.2 灵活性3.3 安全性4.SEP 路由协议的不足4.1 兼容性问题4.2 复杂性5.总结正文:【引言】SEP 路由协议,全称“Scalable and Efficient Routing Protocol”,是一种可扩展且高效的路由协议。

近年来,随着互联网的快速发展,传统的路由协议已经无法满足日益增长的网络需求。

SEP 路由协议应运而生,以其高效性、灵活性和安全性受到业界的关注。

本文将对SEP 路由协议进行详细介绍和点评。

【SEP 路由协议简介】SEP 路由协议是一种基于路径向量路由协议的新型路由协议。

它采用了分布式哈希表(DHT)技术,以实现快速路由查找和数据包转发。

SEP 路由协议旨在解决传统路由协议在可扩展性、性能和安全性方面的问题,适用于大规模、复杂网络环境。

【SEP 路由协议的优势】【高效性】SEP 路由协议具有较高的路由查找效率。

它采用了DHT 技术,实现了基于内容的路由,避免了传统路由协议中的逐级查询,从而降低了路由计算的时间复杂度。

这对于大规模网络环境中的数据包转发具有显著优势。

【灵活性】SEP 路由协议支持灵活的路由策略。

管理员可以根据网络需求,自定义路由策略,如基于距离向量、链路状态等。

此外,SEP 路由协议还可以与多种网络协议(如TCP/IP、MPLS 等)兼容,满足不同场景下的应用需求。

【安全性】SEP 路由协议注重网络安全。

它采用了加密技术,保证了路由信息的机密性。

同时,SEP 路由协议支持动态路由,可以实时检测网络中的故障节点,并自动调整路由策略,提高了网络的容错能力。

【SEP 路由协议的不足】【兼容性问题】尽管SEP 路由协议兼容多种网络协议,但在实际应用中,仍然存在与其他协议的互通性问题。

这可能会限制SEP 路由协议在某些场景下的使用。

【复杂性】SEP 路由协议采用了较为复杂的技术,如DHT、加密等,使得协议的实现和部署相对复杂。

sep路由协议点评

sep路由协议点评

sep路由协议点评SEP(路径选择演化协议)是一种用于无线网络中的路由协议,它的主要目标是提高网络的稳定性、增加网络的容量和减少网络的延迟。

SEP可以在多跳网络中动态地选择最佳的路由路径,并通过协商等方式来处理网络中的冲突和错误。

本文将对SEP的原理、优缺点以及应用场景进行详细的分析和评价。

首先,SEP采用了基于包转发表的方式来建立和维护网络中的路由路径。

每个节点都会维护一张转发表,用于记录可以到达其他节点的最佳路径。

通过定期的路由更新,节点可以根据收到的新路由信息更新转发表,并从中选择最优路径进行数据传输。

这种方式可以高效地选择合适的路由路径,从而提高网络的稳定性和容量。

其次,SEP采用了一种自适应的冲突解决机制,可以有效地解决网络中的冲突问题。

当有多个节点同时请求传输数据时,可能会导致冲突和数据丢失。

SEP通过引入协商机制,让节点在传输数据之前先进行协商,决定谁将先传输数据,从而避免冲突和数据丢失。

这种机制可以减少网络中的冲突,提高数据的可靠性和传输效率。

此外,SEP还具有较低的延迟特点。

它通过在网络中建立多条备用路径,并动态地选择最佳路径进行数据传输,从而减少了数据传输的延迟。

同时,SEP还可以及时处理网络中的错误和异常,通过路由更新和转发表的更新等方式来纠正错误路径,并迅速找到新的最佳路径进行数据传输,从而提高了网络的可用性和稳定性。

然而,SEP也存在一些不足之处。

首先,SEP的实施和维护成本较高。

由于SEP需要在每个节点上维护转发表,并进行定期的路由更新和协商,这些操作都需要消耗节点的计算和网络资源。

其次,SEP的扩展性有限。

当网络规模较大时,由于节点数量的增加,路由的选择和转发会变得更加复杂,可能会导致网络性能的下降和延迟的增加。

最后,SEP对网络拓扑的要求较高。

由于SEP需要在网络中建立多条备用路径,并动态地选择最佳路径,因此网络的拓扑结构需要足够复杂和灵活,以适应不同的数据传输需求。

CANSpecificationV2.0版本协议规范

CANSpecificationV2.0版本协议规范

BOSCHCAN SpecificationVersion 2.01991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 StuttgartBOSCHROBERT BOSCH GmbH, Postfach 30 02 40, D-70442 Stuttgart Sep. 1991 page 1RecitalThe acceptance and introduction of serial communication to more and more applications has led to requirements that the assignment of message identifiers to communication functions be standardized for certain applications. These applications can be realized with CAN more comfortably, if the address range that originally has been defined by 11 identifier bits is enlargedTherefore a second message format (’extended format’) is introduced that provides a larger address range defined by 29 bits. This will relieve the system designer from compromises with respect to defining well-structured naming schemes. Users of CAN who do not need the identifier range offered by the extended format, can rely on the conventional 11 bit identifier range (’standard format’) further on. In this case they can make use of the CAN implementations that are already available on the market, or of new controllers that implement both formats.In order to distinguish standard and extended format the first reserved bit of the CAN message format, as it is defined in CAN Specification 1.2, is used. This is done in such a way that the message format in CAN Specification 1.2 is equivalent to the standard format and therefore is still valid. Furthermore, the extended format has been defined so that messages in standard format and extended format can coexist within the same network.This CAN Specification consists of two parts, with•Part A describing the CAN message format as it is defined in CAN Specification 1.2;•Part B describing both standard and extended message formats.In order to be compatible with this CAN Specification 2.0 it is required that a CAN implementation be compatible with either Part A or Part B.NoteCAN implementations that are designed according to part A of this or according to previous CAN Specifications, and CAN implementations that are designed according to part B of this specification can communicate with each other as long as it is not made use of the extended format.CAN Specification 2.0PART A2 BASIC CONCEPTSCAN has the following properties•prioritization of messages•guarantee of latency times•configuration flexibility•multicast reception with time synchronization•system wide data consistency•multimaster•error detection and signalling•automatic retransmission of corrupted messages as soon as the bus is idle again •distinction between temporary errors and permanent failures of nodes and autonomous switching off of defect nodesLayered Structure of a CAN NodeApplication LayerObject Layer- Message Filtering- Message and Status HandlingTransfer Layer- Fault Confinement- Error Detection and Signalling- Message Validation- Acknowledgment- Arbitration- Message Framing- Transfer Rate and TimingPhysical Layer- Signal Level and Bit Representation- Transmission MediumROBERT BOSCH GmbH, Postfach 30 02 40, D-70442 Stuttgart•The Physical Layer defines how signals are actually transmitted. Within this specification the physical layer is not defined so as to allow transmission medium and signal level implementations to be optimized for their application.•The Transfer Layer represents the kernel of the CAN protocol. It presents messages received to the object layer and accepts messages to be transmitted from the object layer. The transfer layer is responsible for bit timing andsynchronization, message framing, arbitration, acknowledgment, error detection and signalling, and fault confinement.•The Object Layer is concerned with message filtering as well as status and message handling.The scope of this specification is to define the transfer layer and the consequences of the CAN protocol on the surrounding layers.MessagesInformation on the bus is sent in fixed format messages of different but limited length (see section 3: Message Transfer). When the bus is free any connected unit may start to transmit a new message.Information RoutingIn CAN systems a CAN node does not make use of any information about the system configuration (e.g. station addresses). This has several important consequences.System Flexibility: Nodes can be added to the CAN network without requiring any change in the software or hardware of any node and application layer.Message Routing: The content of a message is named by an IDENTIFIER. The IDENTIFIER does not indicate the destination of the message, but describes the meaning of the data, so that all nodes in the network are able to decide by MESSAGE FILTERING whether the data is to be acted upon by them or not.Multicast: As a consequence of the concept of MESSAGE FILTERING any number of nodes can receive and simultaneously act upon the same message.Data Consistency: Within a CAN network it is guaranteed that a message is simultaneously accepted either by all nodes or by no node. Thus data consistency of a system is achieved by the concepts of multicast and by error handling.ROBERT BOSCH GmbH, Postfach 30 02 40, D-70442 StuttgartBit rateThe speed of CAN may be different in different systems. However, in a given system the bitrate is uniform and fixed.PrioritiesThe IDENTIFIER defines a static message priority during bus access.Remote Data RequestBy sending a REMOTE FRAME a node requiring data may request another node to send the corresponding DATA FRAME. The DATA FRAME and the corresponding REMOTE FRAME are named by the same IDENTIFIER.MultimasterWhen the bus is free any unit may start to transmit a message. The unit with the message of higher priority to be transmitted gains bus access.ArbitrationWhenever the bus is free, any unit may start to transmit a message. If 2 or more units start transmitting messages at the same time, the bus access conflict is resolved by bitwise arbitration using the IDENTIFIER. The mechanism of arbitration guarantees that neither information nor time is lost. If a DATA FRAME and a REMOTE FRAME with the same IDENTIFIER are initiated at the same time, the DATA FRAME prevails over the REMOTE FRAME. During arbitration every transmitter compares the level of the bit transmitted with the level that is monitored on the bus. If these levels are equal the unit may continue to send. When a ’recessive’ level is sent and a ’dominant’ level is monitored (see Bus Values), the unit has lost arbitration and must withdraw without sending one more bit.SafetyIn order to achieve the utmost safety of data transfer, powerful measures for error detection, signalling and self-checking are implemented in every CAN node.Error DetectionFor detecting errors the following measures have been taken:- Monitoring (transmitters compare the bit levels to be transmitted with the bit levels detected on the bus)- Cyclic Redundancy Check- Bit Stuffing- Message Frame CheckROBERT BOSCH GmbH, Postfach 30 02 40, D-70442 StuttgartPerformance of Error DetectionThe error detection mechanisms have the following properties:- all global errors are detected.- all local errors at transmitters are detected.- up to 5 randomly distributed errors in a message are detected.- burst errors of length less than 15 in a message are detected.- errors of any odd number in a message are detected.Total residual error probability for undetected corrupted messages: less thanmessage error rate * 4.7 * 10-11.Error Signalling and Recovery TimeCorrupted messages are flagged by any node detecting an error. Such messages are aborted and will be retransmitted automatically. The recovery time from detecting an error until the start of the next message is at most 29 bit times, if there is no further error.Fault ConfinementCAN nodes are able to distinguish short disturbances from permanent failures. Defective nodes are switched off.ConnectionsThe CAN serial communication link is a bus to which a number of units may be connected. This number has no theoretical limit. Practically the total number of units will be limited by delay times and/or electrical loads on the bus line.Single ChannelThe bus consists of a single channel that carries bits. From this data resynchronization information can be derived. The way in which this channel is implemented is not fixed in this specification. E.g. single wire (plus ground), two differential wires, optical fibres, etc.Bus valuesThe bus can have one of two complementary logical values: ’dominant’ or ’recessive’. During simultaneous transmission of ’dominant’ and ’recessive’ bits, the resulting bus value will be ’dominant’. For example, in case of a wired-AND implementation of the bus, the ’dominant’ level would be represented by a logical ’0’ and the ’recessive’ level by a logical ’1’. Physical states (e.g. electrical voltage, light) that represent the logical levels are not given in this specification.ROBERT BOSCH GmbH, Postfach 30 02 40, D-70442 StuttgartAcknowledgmentAll receivers check the consistency of the message being received and will acknowledge a consistent message and flag an inconsistent message.Sleep Mode / Wake-upTo reduce the system’s power consumption, a CAN-device may be set into sleep mode without any internal activity and with disconnected bus drivers. The sleep mode is finished with a wake-up by any bus activity or by internal conditions of the system. On wake-up, the internal activity is restarted, although the transfer layer will be waiting for the system’s oscillator to stabilize and it will then wait until it has synchronized itself to the bus activity (by checking for eleven consecutive ’recessive’ bits), before the bus drivers are set to "on-bus" again.In order to wake up other nodes of the system, which are in sleep-mode, a special wake-up message with the dedicated, lowest possible IDENTIFIER (rrr rrrd rrrr; r =’recessive’ d = ’dominant’) may be used.ROBERT BOSCH GmbH, Postfach 30 02 40, D-70442 Stuttgart3 MESSAGE TRANSFER3.1 Frame TypesMessage transfer is manifested and controlled by four different frame types:A DATA FRAME carries data from a transmitter to the receivers.A REMOTE FRAME is transmitted by a bus unit to request the transmission of the DATA FRAME with the same IDENTIFIER.An ERROR FRAME is transmitted by any unit on detecting a bus error.An OVERLOAD FRAME is used to provide for an extra delay between the preceding and the succeeding DATA or REMOTE FRAMEs.DATA FRAMEs and REMOTE FRAMEs are separated from preceding frames by an INTERFRAME SPACE.3.1.1 DATA FRAMEA DATA FRAME is composed of seven different bit fields:START OF FRAME, ARBITRATION FIELD, CONTROL FIELD, DATA FIELD, CRC FIELD, ACK FIELD, END OF FRAME. The DATA FIELD can be of length zero.Interframe Space InterframeSpaceStart of FrameArbitration FieldControl FieldData FieldCRC FieldACK FieldEnd of Frameor Overload FrameDATA FRAMEROBERT BOSCH GmbH, Postfach 30 02 40, D-70442 StuttgartROBERT BOSCH GmbH, Postfach 30 02 40, D-70442 StuttgartSTART OF FRAMEmarks the beginning of DATA FRAMES and REMOTE FRAMEs. It consists of a single ’dominant’ bit.A station is only allowed to start transmission when the bus is idle (see BUS IDLE). All stations have to synchronize to the leading edge caused by START OF FRAME (see ’HARD SYNCHRONIZATION’) of the station starting transmission first.ARBITRATION FIELDThe ARBITRATION FIELD consists of the IDENTIFIER and the RTR-BIT.IDENTIFIERThe IDENTIFIER’s length is 11 bits. These bits are transmitted in the order from ID-10to ID-0. The least significant bit is ID-0. The 7 most significant bits (ID-10 - ID-4) must not be all ’recessive’.RTR BITRemote Transmission Request BITIn DATA FRAMEs the RTR BIT has to be ’dominant’. Within a REMOTE FRAME the RTR BIT has to be ’recessive’.CONTROL FIELDThe CONTROL FIELD consists of six bits. It includes the DATA LENGTH CODE and two bits reserved for future expansion. The reserved bits have to be sent ’dominant’.Receivers accept ’dominant’ and ’recessive’ bits in all combinations.DATA LENGTH CODEThe number of bytes in the DATA FIELD is indicated by the DATA LENGTH CODE.This DATA LENGTH CODE is 4 bits wide and is transmitted within the CONTROL FIELD.Interframe Space Start of FrameIdentifierRTR BitControl FieldARBITRATION FIELDROBERT BOSCH GmbH, Postfach 30 02 40, D-70442 StuttgartCoding of the number of data bytes by the DATA LENGTH CODE abbreviations:d ’dominant’r ’recessive’DATA FRAME: admissible numbers of data bytes: {0,1,....,7,8}.Other values may not be used.r1r0DLC3DLC2DLC1DLC0or CRC FieldArbitration FieldData Field CONTROL FIELDData Length Codereserved bits012345678d d d d d d d d rd d d d r r r r dd d r r d d r r dd r d r d r d r dDLC3DLC2DLC1DLC0Number of DataBytesData Length CodeROBERT BOSCH GmbH, Postfach 30 02 40, D-70442 StuttgartDATA FIELDThe DATA FIELD consists of the data to be transferred within a DATA FRAME. It can contain from 0 to 8 bytes, which each contain 8 bits which are transferred MSB first.CRC FIELDcontains the CRC SEQUENCE followed by a CRC DELIMITER.CRC SEQUENCEThe frame check sequence is derived from a cyclic redundancy code best suited for frames with bit counts less than 127 bits (BCH Code).In order to carry out the CRC calculation the polynomial to be divided is defined as the polynomial, the coefficients of which are given by the destuffed bit stream consisting of START OF FRAME, ARBITRATION FIELD, CONTROL FIELD, DATA FIELD (if present) and, for the 15 lowest coefficients, by 0. This polynomial is divided (the coefficients are calculated modulo-2) by the generator-polynomial:X 15 + X 14 + X 10 + X 8 + X 7 + X 4 + X 3 + 1.The remainder of this polynomial division is the CRC SEQUENCE transmitted over the bus. In order to implement this function, a 15 bit shift register CRC_RG(14:0) can be used. If NXTBIT denotes the next bit of the bit stream, given by the destuffed bit sequence from START OF FRAME until the end of the DATA FIELD, the CRC SEQUENCE is calculated as follows:CRC_RG = 0;// initialize shift register REPEATCRCNXT = NXTBIT EXOR CRC_RG(14);CRC_RG(14:1) = CRC_RG(13:0);// shift left by CRC_RG(0) = 0;// 1 positionData or Control FieldCRC SequenceCRC DelimiterAck FieldCRC FIELDROBERT BOSCH GmbH, Postfach 30 02 40, D-70442 StuttgartIF CRCNXT THENCRC_RG(14:0) = CRC_RG(14:0) EXOR (4599hex);ENDIFUNTIL (CRC SEQUENCE starts or there is an ERROR condition)After the transmission / reception of the last bit of the DATA FIELD, CRC_RG contains the CRC sequence.CRC DELIMITERThe CRC SEQUENCE is followed by the CRC DELIMITER which consists of a single ’recessive’ bit.ACK FIELDThe ACK FIELD is two bits long and contains the ACK SLOT and the ACK DELIMITER.In the ACK FIELD the transmitting station sends two ’recessive’ bits.A RECEIVER which has received a valid message correctly, reports this to the TRANSMITTER by sending a ’dominant’ bit during the ACK SLOT (it sends ’ACK’).ACK SLOTAll stations having received the matching CRC SEQUENCE report this within the ACK SLOT by superscribing the ’recessive’ bit of the TRANSMITTER by a ’dominant’ bit.ACK DELIMITERThe ACK DELIMITER is the second bit of the ACK FIELD and has to be a ’recessive’bit. As a consequence, the ACK SLOT is surrounded by two ’recessive’ bits (CRC DELIMITER, ACK DELIMITER).END OF FRAMEEach DATA FRAME and REMOTE FRAME is delimited by a flag sequence consisting of seven ’recessive’ bits.CRC FieldACK SlotACK DelimiterEnd of FrameACK FIELDROBERT BOSCH GmbH, Postfach 30 02 40, D-70442 Stuttgart3.1.2 REMOTE FRAMEA station acting as a RECEIVER for certain data can initiate the transmission of the respective data by its source node by sending a REMOTE FRAME.A REMOTE FRAME is composed of six different bit fields:START OF FRAME, ARBITRATION FIELD, CONTROL FIELD, CRC FIELD, ACK FIELD, END OF FRAME.Contrary to DATA FRAMEs, the RTR bit of REMOTE FRAMEs is ’recessive’. There is no DATA FIELD, independent of the values of the DATA LENGTH CODE which may be signed any value within the admissible range 0...8. The value is the DATA LENGTH CODE of the corresponding DATA FRAME.The polarity of the RTR bit indicates whether a transmitted frame is a DATA FRAME (RTR bit ’dominant’) or a REMOTE FRAME (RTR bit ’recessive’).Inter SpaceInter Space Start of FrameArbitration FieldControl FieldCRC FieldACK FieldEnd of Frameor Overload FrameREMOTE FRAMEFrame FrameROBERT BOSCH GmbH, Postfach 30 02 40, D-70442 Stuttgart3.1.3 ERROR FRAMEThe ERROR FRAME consists of two different fields. The first field is given by the superposition of ERROR FLAGs contributed from different stations. The following second field is the ERROR DELIMITER.In order to terminate an ERROR FRAME correctly, an ’error passive’ node may need the bus to be ’bus idle’ for at least 3 bit times (if there is a local error at an ’error passive’ receiver). Therefore the bus should not be loaded to 100%.ERROR FLAGThere are 2 forms of an ERROR FLAG: an ACTIVE ERROR FLAG and a PASSIVE ERROR FLAG.1.The ACTIVE ERROR FLAG consists of six consecutive ’dominant’ bits.2.The PASSIVE ERROR FLAG consists of six consecutive ’recessive’ bits unless it is overwritten by ’dominant’ bits from other nodes.An ’error active’ station detecting an error condition signals this by transmission of an ACTIVE ERROR FLAG. The ERROR FLAG’s form violates the law of bit stuffing (see CODING) applied to all fields from START OF FRAME to CRC DELIMITER or destroys the fixed form ACK FIELD or END OF FRAME field. As a consequence, all other stations detect an error condition and on their part start transmission of an ERROR FLAG. So the sequence of ’dominant’ bits which actually can be monitored on the bus results from a superposition of different ERROR FLAGs transmitted by individual stations. The total length of this sequence varies between a minimum of six and a maximum of twelve bits.An ’error passive’ station detecting an error condition tries to signal this by transmission of a PASSIVE ERROR FLAG. The ’error passive’ station waits for six consecutive bitsData FrameError FlagError DelimiterInterframe Space or ERROR FRAMEOverload Framesuperposition of Error FlagsROBERT BOSCH GmbH, Postfach 30 02 40, D-70442 Stuttgartof equal polarity, beginning at the start of the PASSIVE ERROR FLAG. The PASSIVE ERROR FLAG is complete when these 6 equal bits have been detected.ERROR DELIMITERThe ERROR DELIMITER consists of eight ’recessive’ bits.After transmission of an ERROR FLAG each station sends ’recessive’ bits and monitors the bus until it detects a ’recessive’ bit. Afterwards it starts transmitting seven more ’recessive’ bits.3.1.4 OVERLOAD FRAMEThe OVERLOAD FRAME contains the two bit fields OVERLOAD FLAG and OVERLOAD DELIMITER.There are two kinds of OVERLOAD conditions, which both lead to the transmission of an OVERLOAD FLAG:1.The internal conditions of a receiver, which requires a delay of the next DATA FRAME or REMOTE FRAME.2.Detection of a ’dominant’ bit during INTERMISSION.The start of an OVERLOAD FRAME due to OVERLOAD condition 1 is only allowed to be started at the first bit time of an expected INTERMISSION, whereas OVERLOAD FRAMEs due to OVERLOAD condition 2 start one bit after detecting the ’dominant’ bit.At most two OVERLOAD FRAMEs may be generated to delay the next DATA or REMOTE FRAME.End of Frame or Overload Overload DelimiterInter Space or OVERLOAD FRAMEOverload Framesuperposition of Overload FlagsFlagFrame Error Delimiter or Overload DelimiterOVERLOAD FLAGconsists of six ’dominant’ bits. The overall form corresponds to that of the ACTIVE ERROR FLAG.The OVERLOAD FLAG’s form destroys the fixed form of the INTERMISSION field. As a consequence, all other stations also detect an OVERLOAD condition and on their part start transmission of an OVERLOAD FLAG. (In case that there is a ’dominant’ bit detected during the 3rd bit of INTERMISSION locally at some node, the other nodes will not interpret the OVERLOAD FLAG correctly, but interpret the first of these six ’dominant’ bits as START OF FRAME. The sixth ’dominant’ bit violates the rule of bit stuffing causing an error condition).OVERLOAD DELIMITERconsists of eight ’recessive’ bits.The OVERLOAD DELIMITER is of the same form as the ERROR DELIMITER. After transmission of an OVERLOAD FLAG the station monitors the bus until it detects a transition from a ’dominant’ to a ’recessive’ bit. At this point of time every bus station has finished sending its OVERLOAD FLAG and all stations start transmission of seven more ’recessive’ bits in coincidence.3.1.5 INTERFRAME SPACINGDATA FRAMEs and REMOTE FRAMEs are separated from preceding frames whatever type they are (DATA FRAME, REMOTE FRAME, ERROR FRAME, OVERLOAD FRAME) by a bit field called INTERFRAME SPACE. In contrast, OVERLOAD FRAMEs and ERROR FRAMEs are not preceded by an INTERFRAME SPACE and multiple OVERLOAD FRAMEs are not separated by an INTERFRAME SPACE.INTERFRAME SPACEcontains the bit fields INTERMISSION and BUS IDLE and, for ’error passive’ stations, which have been TRANSMITTER of the previous message, SUSPEND TRANSMISSION.ROBERT BOSCH GmbH, Postfach 30 02 40, D-70442 StuttgartBOSCHROBERT BOSCH GmbH, Postfach 30 02 40, D-70442 StuttgartSep. 1991Part A - page 19For stations which are not ’error passive’ or have been RECEIVER of the previous message:For ’error passive’ stations which have been TRANSMITTER of the previous message:INTERMISSIONconsists of three ’recessive’ bits.During INTERMISSION no station is allowed to start transmission of a DATA FRAME or REMOTE FRAME. The only action to be taken is signalling an OVERLOAD condition.BUS IDLEThe period of BUS IDLE may be of arbitrary length. The bus is recognized to be free and any station having something to transmit can access the bus. A message, which is pending for transmission during the transmission of another message, is started in the first bit following INTERMISSION.The detection of a ’dominant’ bit on the bus is interpreted as a START OF FRAME.SUSPEND TRANSMISSIONAfter an ’error passive’ station has transmitted a message, it sends eight ’recessive’bits following INTERMISSION, before starting to transmit a further message or recognizing the bus to be idle. If meanwhile a transmission (caused by another station)starts, the station will become receiver of this message.FrameBus IdleINTERFRAME SPACEIntermission FrameFrameBus IdleINTERFRAME SPACEIntermissionFrameSuspend TransmissionInterframe SpaceBOSCHROBERT BOSCH GmbH, Postfach 30 02 40, D-70442 Stuttgart Sep. 1991Part A - page 20 3.2 Definition of TRANSMITTER / RECEIVERTRANSMITTERA unit originating a message is called “TRANSMITTER” of that message. The unit stays TRANSMITTER until the bus is idle or the unit loses ARBITRATION.RECEIVERA unit is called “RECEIVER” of a message, if it is not TRANSMITTER of that message and the bus is not idle.Transmitter / ReceiverBOSCHROBERT BOSCH GmbH, Postfach 30 02 40, D-70442 Stuttgart Sep. 1991Part A - page 21 4 MESSAGE VALIDATIONThe point of time at which a message is taken to be valid, is different for the transmitter and the receivers of the message.Transmitter:The message is valid for the transmitter, if there is no error until the end of END OF FRAME. If a message is corrupted, retransmission will follow automatically and according to prioritization. In order to be able to compete for bus access with other messages, retransmission has to start as soon as the bus is idle.Receivers:The message is valid for the receivers, if there is no error until the last but one bit of END OF FRAME.Message Validation5 CODINGBIT STREAM CODINGThe frame segments START OF FRAME, ARBITRATION FIELD, CONTROL FIELD, DATA FIELD and CRC SEQUENCE are coded by the method of bit stuffing. Whenever a transmitter detects five consecutive bits of identical value in the bit stream to be transmitted it automatically inserts a complementary bit in the actual transmitted bit stream.The remaining bit fields of the DATA FRAME or REMOTE FRAME (CRC DELIMITER, ACK FIELD, and END OF FRAME) are of fixed form and not stuffed. The ERROR FRAME and the OVERLOAD FRAME are of fixed form as well and not coded by the method of bit stuffing.The bit stream in a message is coded according to the Non-Return-to-Zero (NRZ) method. This means that during the total bit time the generated bit level is either ’dominant’ or ’recessive’.ROBERT BOSCH GmbH, Postfach 30 02 40, D-70442 Stuttgart6 ERROR HANDLING6.1 Error DetectionThere are 5 different error types (which are not mutually exclusive):•BIT ERRORA unit that is sending a bit on the bus also monitors the bus. A BIT ERROR has tobe detected at that bit time, when the bit value that is monitored is different from the bit value that is sent. An exception is the sending of a ’recessive’ bit during thestuffed bit stream of the ARBITRATION FIELD or during the ACK SLOT. Then no BIT ERROR occurs when a ’dominant’ bit is monitored. A TRANSMITTER sendinga PASSIVE ERROR FLAG and detecting a ’dominant’ bit does not interpret this asa BIT ERROR.•STUFF ERRORA STUFF ERROR has to be detected at the bit time of the 6th consecutive equal bitlevel in a message field that should be coded by the method of bit stuffing.•CRC ERRORThe CRC sequence consists of the result of the CRC calculation by the transmitter.The receivers calculate the CRC in the same way as the transmitter. A CRCERROR has to be detected, if the calculated result is not the same as that received in the CRC sequence.•FORM ERRORA FORM ERROR has to be detected when a fixed-form bit field contains one ormore illegal bits.•ACKNOWLEDGMENT ERRORAn ACKNOWLEDGMENT ERROR has to be detected by a transmitter whenever it does not monitor a ’dominant’ bit during the ACK SLOT.6.2 Error SignallingA station detecting an error condition signals this by transmitting an ERROR FLAG. For an ’error active’ node it is an ACTIVE ERROR FLAG, for an ’error passive’ node it is a PASSIVE ERROR FLAG. Whenever a BIT ERROR, a STUFF ERROR, a FORM ERROR or an ACKNOWLEDGMENT ERROR is detected by any station, transmission of an ERROR FLAG is started at the respective station at the next bit.Whenever a CRC ERROR is detected, transmission of an ERROR FLAG starts at the bit following the ACK DELIMITER, unless an ERROR FLAG for another condition has already been started.ROBERT BOSCH GmbH, Postfach 30 02 40, D-70442 Stuttgart7 FAULT CONFINEMENTWith respect to fault confinement a unit may be in one of three states:•’error active’•’error passive’•’bus off’An ’error active’ unit can normally take part in bus communication and sends an ACTIVE ERROR FLAG when an error has been detected.An ’error passive’ unit must not send an ACTIVE ERROR FLAG. It takes part in bus communication but when an error has been detected only a PASSIVE ERROR FLAG is sent. Also after a transmission, an ’error passive’ unit will wait before initiating a further transmission. (See SUSPEND TRANSMISSION)A ’bus off’ unit is not allowed to have any influence on the bus. (E.g. output drivers switched off.)For fault confinement two counts are implemented in every bus unit:1) TRANSMIT ERROR COUNT2) RECEIVE ERROR COUNTThese counts are modified according to the following rules:(note that more than one rule may apply during a given message transfer)1.When a RECEIVER detects an error, the RECEIVE ERROR COUNT will beincreased by 1, except when the detected error was a BIT ERROR during the sending of an ACTIVE ERROR FLAG or an OVERLOAD FLAG.2.When a RECEIVER detects a ’dominant’ bit as the first bit after sending an ERRORFLAG the RECEIVE ERROR COUNT will be increased by 8.3.When a TRANSMITTER sends an ERROR FLAG the TRANSMIT ERROR COUNTis increased by 8.Exception 1:If the TRANSMITTER is ’error passive’ and detects an ACKNOWLEDGMENTROBERT BOSCH GmbH, Postfach 30 02 40, D-70442 Stuttgart。

6LoWPAN 的主要功能_无线传感网络_[共2页]

6LoWPAN 的主要功能_无线传感网络_[共2页]

第2章短距离无线通信技术与标准39 人员开发IP选择协议是为了利用以太网等“现代”技术。

6LoWPAN的出现使这些老协议把它们的IP选择扩展到新的链路(如802.15.4)。

因此,自然而然地可与专为802.15.4设计的新协议(如ZigBee、ISA100.11a等)互操作。

受益于此,各类低功率无线设备能够加入IP家庭中,与Wi-Fi、以太网以及其他类型的网络设备“称兄道弟”。

随着IPv4地址的耗尽,IPv6是大势所趋。

物联网技术的发展,将进一步推动IPv6的部署与应用。

IETF 6LoWPAN技术具有无线低功耗、自组织网络的特点,将是未来无线传感网络的重要技术之一。

在ZigBee新一代智能电网标准中,SEP2.0(Smart Energy Protocol 2.0)协议就已经采用6LoWPAN技术。

随着6LoWPAN的不断发展和完善,6LoWPAN将成为事实标准,全面替代ZigBee标准,未来ZigBee应用系统将无需网关而直接连入IP网,大大降低了ZigBee的部署难度,提高了ZigBee的易用性。

2.2.2 6LoWPAN的体系结构6LoWPAN技术是一种在IEEE 802.15.4标准基础上传输IPv6数据包的网络体系,可用于构建无线传感网络。

6LoWPAN规定其物理层和MAC层采用IEEE 802.15.4标准,上层采用TCP/IPv6协议栈,中间有个适配层完成IPv6与LoWPAN(Low Power Wireless Personal Area Networks)的网络衔接,适配层是IPv6网络和IEEE 802.15.4 MAC层间的一个中间层,其向上提供IPv6对IEEE 802.15.4媒介访问支持,向下则控制LoWPAN网络构建、拓扑及MAC层路由。

其与TCP/IP的协议栈参考模型对比如图2-6所示。

图2-6 6LoWPAN体系架构6LoWPAN协议栈参考模型与TCP/IP的参考模型大致相似,区别在于6LoWPAN底层使用的IEEE 802.15.4标准,而且因低速无线个域网的特性,在6LoWPAN的传输层没有使用TCP协议。

sep路由协议点评

sep路由协议点评

sep路由协议点评
(最新版)
目录
1.介绍 SEP 路由协议
2.SEP 路由协议的优点
3.SEP 路由协议的缺点
4.SEP 路由协议的应用场景
5.总结
正文
SEP(Scalable End-to-End Protocol)是一种用于互联网的路由协议,其设计初衷是为了解决现有路由协议的可扩展性和可靠性问题。

SEP 路由协议采用了一种全新的路由算法,可以有效地提高网络的性能和稳定性,因此在近年来受到了广泛关注。

首先,我们来看看 SEP 路由协议的优点。

SEP 路由协议的可扩展性非常好,可以支持大量的并发连接,而不会出现性能下降的情况。

这是因为 SEP 路由协议采用了一种基于事件驱动的建筑机制,使得路由器可以在接收到数据包后快速地进行处理。

此外,SEP 路由协议还具有很好的可靠性,可以有效地避免路由环的产生,从而提高了网络的稳定性。

然而,SEP 路由协议也存在一些缺点。

首先,SEP 路由协议的部署成本较高,需要对现有的网络设备进行升级,以支持 SEP 路由协议。

其次,SEP 路由协议的配置和管理比较复杂,需要网络管理员具备较高的技术水平。

总的来说,SEP 路由协议是一种具有很高可扩展性和可靠性的路由协议,适用于大型互联网企业和数据中心等场景。

第1页共1页。

ICT

ICT

ICT 新词2015.9/世界电信>>Short-range Wireless Communication 短距离无线通信随着“互联网+”概念的提出,短距离无线通信技术成为了当今的热点。

一般来讲,短距离无线通信的主要特点为通信距离短,覆盖距离一般在几厘米到几百米之间,此外,短距离无线通信的发射功率较低,一般小于100微瓦,使用普通电池即可,工作频率多为免付费、免申请的ISM 频段,主要在小范围区域内使用。

目前,使用较为广泛的短距无线通信技术包括Wi-Fi 、蓝牙、NFC 等,此外,还有ZigBee 、UWB 、NFC 、WiMedia 、DECT 、TG3c 和专用无线系统等,它们都有其立足的特点,或基于传输速度、距离、耗电量的特殊要求;或着眼于功能的扩充性;或符合某些单一应用的特别要求;或建立竞争技术的差异化等。

>>ZigBee 紫蜂协议在蓝牙技术的使用过程中,人们发现虽然它有许多优点,但对工业、家庭自动化控制和工业遥测遥控领域而言,蓝牙技术又太复杂、组网规模小,且易受工业现场的各种电磁干扰等。

经过人们的长期努力,紫蜂协议(ZigBee )协议应运而生。

ZigBee 是基于IEEE 802.15.4标准的低功耗的无线局域网协议,这一名称(又称紫蜂协议)来源于蜜蜂的八字舞。

与蓝牙技术相比,ZigBee 采用了扩频技术,抗干扰性强,且由于其传输速率较低,节点可以进入休眠状态,功耗更低。

此外,ZigBee 采用动态路由,可实现自组织网通信,且具有更大规模的组网能力。

因此,ZigBee 被广泛应用于传感和控制领域。

2012年4月,国际ZigBee 联盟还推出了ZigBee Light Link 协议,专门用于照明解决方案的设计与应用,得到了GE 、飞利浦等照明厂商的大力支持。

>>IPv6over low power WPAN 6LoWPAN如前所述,IEEE 802.15.4非常适合无线嵌入式网络内部区域的应用问题,人们希望建立一种可以连接每个电子设备的无线网,但IPv4越来越不能满足其应用的要求,于是,IETF 与2004年定义了6LoWPAN :6LoWPAN 标准通过一个适配层和一些优化的相关协议在简单的嵌入式设备商充分地使用基于低功耗、低传输率的无线网络的IPv6技术。

SEP协议

SEP协议

1 SEP:A Stable Election Protocol for clustered heterogeneous wireless sensor networksG EORGIOS S MARAGDAKIS I BRAHIM M ATTA A ZER B ESTAVROSComputer Science DepartmentBoston Universitygsmaragd,matta,best@Abstract—We study the impact of heterogeneity of nodes, in terms of their energy,in wireless sensor networks that are hierarchically clustered.In these networks some of the nodes become cluster heads,aggregate the data of their cluster members and transmit it to the sink.We assume that a percentage of the population of sensor nodes is equipped with additional energy resources—this is a source of heterogeneity which may result from the initial setting or as the operation of the network evolves. We also assume that the sensors are randomly(uniformly) distributed and are not mobile,the coordinates of the sink and the dimensions of the sensorfield are known.We show that the behavior of such sensor networks becomes very unstable once thefirst node dies,especially in the presence of node heterogeneity.Classical clustering protocols assume that all the nodes are equipped with the same amount of energy and as a result,they can not take full advantage of the presence of node heterogeneity.We propose SEP,a heterogeneous-aware protocol to prolong the time interval before the death of thefirst node(we refer to as stability period),which is crucial for many applications where the feedback from the sensor network must be reliable. SEP is based on weighted election probabilities of each node to become cluster head according to the remaining energy in each node.We show by simulation that SEP always prolongs the stability period compared to(and that the average throughput is greater than)the one obtained using current clustering protocols. We conclude by studying the sensitivity of our SEP protocol to heterogeneity parameters capturing energy imbalance in the network.We found that SEP yields longer stability region for higher values of extra energy brought by more powerful nodes.I.I NTRODUCTIONMotivation:Wireless Sensor Networks are networks of tiny, battery powered sensor nodes with limited on-board process-ing,storage and radio capabilities[1].Nodes sense and send their reports toward a processing center which is called“sink.”The design of protocols and applications for such networks has to be energy aware in order to prolong the lifetime of the network,because the replacement of the embedded batteries is a very difficult process once these nodes have been deployed.Classical approaches like Direct Transmission and Minimum Transmission Energy[2]do not guarantee well balanced distribution of the energy load among nodes of the sensor ing Direct Transmission(DT),sensor nodes transmit directly to the sink,as a result nodes that are far away from the sink would diefirst[3].On the other hand, using Minimum Transmission Energy(MTE),data is routed This work was supported in part by NSF grants ITR ANI-0205294,EIA-0202067,ANI-0095988,and ANI-9986397.over minimum-cost routes,where cost reflects the transmission power expended.Under MTE,nodes that are near the sink act as relays with higher probability than nodes that are far from the sink.Thus nodes near the sink tend to die fast.Under both DT and MTE,a part of thefield will not be monitored for a significant part of the lifetime of the network,and as a result the sensing process of thefield will be biased.A solution proposed in[4],called LEACH,guarantees that the energy load is well distributed by dynamically created clusters,using cluster heads dynamically elected according to a priori optimal probability.Cluster heads aggregate reports from their cluster members before forwarding them to the sink.By rotating the cluster-head role uniformly among all nodes,each node tends to expend the same energy over time.Most of the analytical results for LEACH-type schemes are obtained assuming that the nodes of the sensor network are equipped with the same amount of energy—this is the case of homogeneous sensor networks.In this paper we study the impact of heterogeneity in terms of node energy.We assume that a percentage of the node population is equipped with more energy than the rest of the nodes in the same network—this is the case of heterogeneous sensor networks.We are motivated by the fact that there are a lot of applications that would highly benefit from understanding the impact of such heterogeneity.One of these applications could be the re-energization of sensor networks.As the lifetime of sensor networks is limited there is a need to re-energize the sensor network by adding more nodes.These nodes will be equipped with more energy than the nodes that are already in use,which creates heterogeneity in terms of node energy.Note that due to practical/cost constraints it is not always possible to satisfy the constraints for optimal distribution between different types of nodes as proposed in[5].There are also applications where the spatial density of sen-sors is a constraint.Assuming that with the current technology the cost of a sensor is tens of times greater than the cost of embedded batteries,it will be valuable to examine whether the lifetime of the network could be increased by simply distribut-ing extra energy to some existing nodes without introducing new nodes.11We also study the case of uniformly distributing such extra energy over all nodes.In practice,however,it maybe difficult to achieve such uniform distribution because extra energy could be expressed only in terms of discrete battery units.Even if this is possible,we show in this paper that such fair distribution of extra energy is not always beneficial.2Perhaps the most important issue is that heterogeneity of nodes,in terms of their energy,is simply a result of the network operation as it evolves.For example,nodes could, over time,expend different amounts of energy due to the radio communication characteristics,random events such as short-term link failures or morphological characteristics of thefield (e.g.uneven terrain.)Our Contribution:In this paper we assume that the sink is not energy limited(at least in comparison with the energy of other sensor nodes)and that the coordinates of the sink and the dimensions of thefield are known.We also assume that the nodes are uniformly distributed over thefield and they are not mobile.Under this model,we propose a new protocol,we call SEP,for electing cluster heads in a distributed fashion in two-level hierarchical wireless sensor networks. Unlike prior work(reviewed throughout the paper and in Section VII),SEP is heterogeneous-aware,in the sense that election probabilities are weighted by the initial energy of a node relative to that of other nodes in the network.This prolongs the time interval before the death of thefirst node (we refer to as stability period),which is crucial for many applications where the feedback from the sensor network must be reliable.We show by simulation that SEP provides longer stability period and higher average throughput than current clustering heterogeneous-oblivious protocols.We also study the sensitivity of our SEP protocol to heterogeneity parameters capturing energy imbalance in the network.We show that SEP is more resilient than LEACH in judiciously consuming the extra energy of advanced(more powerful)nodes—SEP yields longer stability period for higher values of extra energy. Paper Organization:The rest of the paper is organized as follows.Section II provides the model of our setting. Section III defines our performance measures.In Section IV we address the problem of heterogeneity in clustered wireless sensor networks,and in Section V we provide our solution to the problem.Section VI presents simulation results.We review related work in Section VII.Section VIII concludes with directions for future work.II.H ETEROGENEOUS WSN M ODELIn this section we describe our model of a wireless sensor network with nodes heterogeneous in their initial amount of energy.We particularly present the setting,the energy model, and how the optimal number of clusters can be computed. Let us assume the case where a percentage of the population of sensor nodes is equipped with more energy resources than the rest of the nodes.Let be the fraction of the total number of nodes,which are equipped with times more energy than the others.We refer to these powerful nodes asnodes,and the rest as nodes.We assume that all nodes are distributed uniformly over the sensorfield.A.Clustering HierarchyWe consider a sensor network that is hierarchically clus-tered.The LEACH(Low Energy Adaptive Clustering Hier-archy)protocol[3]maintains such clustering hierarchy.In LEACH,the clusters are re-established in each“round.”New cluster heads are elected in each round and as a result theload is well distributed and balanced among the nodes of thenetwork.Moreover each node transmits to the closest clusterhead so as to split the communication cost to the sink(whichis tens of times greater than the processing and operation cost.)Only the cluster head has to report to the sink and may expenda large amount of energy,but this happens periodically foreach node.In LEACH there is an optimal percentage(determined a priori)of nodes that has to become cluster headsin each round assuming uniform distribution of nodes in space[3],[4],[6],[7].If the nodes are homogeneous,which means that all thenodes in thefield have the same initial energy,the LEACHprotocol guarantees that everyone of them will become acluster head exactly once every rounds.Throughout this paper we refer to this number of rounds,,as epoch of the clustered sensor network.Initially each node can become a cluster head with aprobability.On average,nodes must becomecluster heads per round per epoch.Nodes that are elected tobe cluster heads in the current round can no longer becomecluster heads in the same epoch.The non-elected nodes belongto the set and in order to maintain a steady number of clusterheads per round,the probability of nodes to become acluster head increases after each round in the same epoch.Thedecision is made at the beginning of each round by each node independently choosing a random number in[0,1].If the random number is less than a threshold then the nodebecomes a cluster head in the current round.The threshold isset as:ifotherwise(1)where is the current round number(starting from round 0.)The election probability of nodes to become cluster heads increases in each round in the same epoch and becomes equal to in the last round of the epoch.Note that by round we define a time interval where all cluster members have to transmit to their cluster head once.We show in this paper how the election process of cluster heads should be adapted appropriately to deal with heterogeneous nodes,which means that not all the nodes in thefield have the same initial energy.B.Optimal ClusteringPrevious work have studied either by simulation[3],[4]or analytically[6],[7]the optimal probability of a node being elected as a cluster head as a function of spatial density when nodes are uniformly distributed over the sensorfield.This clus-tering is optimal in the sense that energy consumption is well distributed over all sensors and the total energy consumption is minimum.Such optimal clustering highly depends on the energy model we use.For the purpose of this study we use similar energy model and analysis as proposed in[4]. According to the radio energy dissipation model illustrated in Figure1,in order to achieve an acceptable Signal-to-Noise Ratio(SNR)in transmitting an bit message over a distance3Fig.1.Radio Energy Dissipation Model.,the energy expended by the radio is given by:ififwhere is the energy dissipated per bit to run thetransmitter or the receiver circuit,and depend onthe transmitter amplifier model we use,and is the distancebetween the sender and the receiver.By equating the two expressions at,we have.To receive an bit message the radio expends. Assume an area square meters over which nodes are uniformly distributed.For simplicity,assume the sink is located in the center of thefield,and that the distanceof any node to the sink or its cluster head is.Thus,theenergy dissipated in the cluster head node during a round isgiven by the following formula:where is the number of clusters,is the processing(data aggregation)cost of a bit per report to the sink,andis the average distance between the cluster head andthe sink.The energy used in a non-cluster head node is equalto:where is the average distance between a clustermember and its cluster head.Assuming that the nodes areuniformly distributed,it can be shown that:where is the node distribution.The energy dissipated in a cluster per round is given by: The total energy dissipated in the network is equal to:By differentiating with respect to and equatingto zero,the optimal number of constructed clusters can befound:2(2)because the average distance from a cluster head to the sink is given by[7]:2It is interesting to notice that the optimal number of clusters is independent of the dimensions of thefield and only depends on the number of nodes.If the distance of a significant percentage of nodes to the sink is greater than then,following the same analysis[4] we obtain:(3) The optimal probability of a node to become a cluster head, ,can be computed as follows:(4) The optimal construction of clusters(which is equivalent to the setting of the optimal probability for a node to become a cluster head)is very important.In[3],the authors showed that if the clusters are not constructed in an optimal way, the total consumed energy of the sensor network per round is increased exponentially either when the number of clusters that are created is greater or especially when the number of the constructed clusters is less than the optimal number of clusters.Our simulation results confirm this observation in our case where the sink is located in the center of the sensorfield.III.P ERFORMANCE M EASURESWe define here the measures we use in this paper to evaluate the performance of clustering protocols.Stability Period:is the time interval from the start of network operation until the death of thefirst sensor node.We also refer to this period as“stable region.”Instability Period:is the time interval from the death of thefirst node until the death of the last sensor node.We also refer to this period as“unstable region.”Network lifetime:is the time interval from the start of operation(of the sensor network)until the death of the last alive node.Number of cluster heads per round:This instantaneous measure reflects the number of nodes which would send directly to the sink information aggregated from their cluster members.Number of alive(total,advanced and normal)nodes per round:This instantaneous measure reflects the total number of nodes and that of each type that have not yet expended all of their energy.Throughput:We measure the total rate of data sent over the network,the rate of data sent from cluster heads to the sink as well as the rate of data sent from the nodes to their cluster heads.Clearly,the larger the stable region and the smaller the unstable region are,the better the reliability of the clustering process of the sensor network is.On the other hand,there is a tradeoff between reliability and the lifetime of the system. Until the death of the last node we can still have some feedback about the sensorfield even though this feedback may not be reliable.The unreliability of the feedback stems from the fact that there is no guarantee that there is at least one cluster head per round during the last rounds of the operation. In our model,the absence of a cluster head in an area prevents any reporting about that area to the sink.The throughput measure captures the rate of such data reporting to the sink.4network when all the nodes are alive;(bottom)A snapshot of the network when some nodes are dead.IV.H ETEROGENEOUS-OBLIVIOUS P ROTOCOLSThe original version of LEACH does not take into con-sideration the heterogeneity of nodes in terms of their initial energy,and as a result the consumption of energy resources of the sensor network is not optimized in the presence of such heterogeneity.The reason is that LEACH depends only on the spatial density of the sensor network.Using LEACH in the presence of heterogeneity,and assum-ing both normal and advanced nodes are uniformly distributed in space,we expect that thefirst node dies on average in a round that is close to the round when thefirst node would die in the homogeneous case wherein each node isequipped with the same energy as that of a normal nodein the heterogeneous case.Furthermore,we expect thefirstdead node to be a normal node.We also expect that in thefollowing rounds the probability of a normal node to die isgreater than the probability of an advanced node to die.Duringthe last rounds only advanced nodes would be alive.Ourexpectations are confirmed by simulation results in SectionVI.We next demonstrate how such heterogeneous-obliviousclustering protocol fails to maintain the stability of the system,especially when nodes are heterogeneous.This motivates ourproposed SEP protocol presented in Section V.A.Instability of Heterogeneous-oblivious ProtocolsIn this section we discuss the instability of heterogeneous-oblivious protocols,such as LEACH,once some nodes die.Inthis case,the process of optimal construction of clusters failssince the spatial density deviates from the assumed uniformdistribution of nodes over the sensorfield.Let us assume a heterogeneous()sensornetwork in an sensorfield,as shown in Fig-ure2(top).For this setting we can compute from Equation(2)the optimal number of clusters per round,.We denote with a normal node,with an advanced node,with a dead node,with a cluster head,and with thesink.As long as all the nodes are alive,the nodes that areincluded in the same V oronoi cell will report to the clusterhead of this cell;see Figure2(middle).At some point in time thefirst node dies;see Fig-ure2(bottom).After that point the population of sensorsdecreases as nodes die randomly.The population reductionintroduces instability in the sensor network and the clusterhead election process becomes unreliable.This is becausethe value of is optimal only when the population ofthe network is constant and equal to the initial population().When the population of the nodes starts decreasing,thenumber of elected cluster heads per round becomes unstable(lower than intended)and as a result there is no guarantee thata constant number of cluster heads(equal to)will beelected per round per epoch.Moreover because there are lessalive nodes,the sampling(sensing)of thefield is over lessnodes than intended to be.The only guarantee is that there will be at least one clusterhead per epoch(cf.Equation1).As a result in the worst case,in only one round per epoch all alive nodes will report to thesink.3The impact(quality)of these reports highly dependson the application.For some applications even this minimalreporting is a valuable feedback,for others it is not.Clearlyminimal reporting translates to significant under-utilization ofthe resources and the bandwidth of the application.LEACH guarantees that in the homogeneous case the unsta-ble region will be short.After the death of thefirst node,all theremaining nodes are expected to die on average within a smallnumber of rounds as a consequence of the uniformly remainingenergy due to the well distributed energy consumption.Even 3This assumes every alive node is within communication range of a cluster head.5 when the system operates in the unstable region,if thedensity of the sensor network is large,the probability thatlarge number of nodes be elected as cluster heads isfor a significant part of the unstable region(as long aspopulation of the nodes has not decreased significantly.)this case,even though the system is unstable in thiswe still have a relatively reliable clustering(sensing)The same can be noticed even if the spatial density is lowthe is large.On the other hand,LEACH in the presencenode heterogeneity yields a large unstable region.Theis that although all advanced nodes are left equippedalmost the same energy,the cluster head election processunstable and as a result,most of the time no cluster headelected and these advanced nodes are idle.In the next section,we introduce our newaware SEP protocol whose goal is to increase the stableand as a result decrease the unstable region and improve quality of the feedback of wireless clustered sensor networks, in the presence of heterogeneous nodes.V.O UR SEP P ROTOCOLIn this section we describe SEP,which improves the stable region of the clustering hierarchy process using the charac-teristic parameters of heterogeneity,namely the fraction of advanced nodes()and the additional energy factor between advanced and normal nodes().In order to prolong the stable region,SEP attempts to maintain the constraint of well balanced energy consumption. Intuitively,advanced nodes have to become cluster heads more often than the normal nodes,which is equivalent to a fairness constraint on energy consumption.Note that the new heterogeneous setting(with advanced and normal nodes)has no effect on the spatial density of the network so the a priori setting of,from Equation(4),does not change.On the other hand,the total energy of the system changes.Suppose that is the initial energy of each normal sensor.The energy of each advanced node is then.The total(initial) energy of the new heterogeneous setting is equal to:So,the total energy of the system is increased by a factor of .Thefirst improvement to the existing LEACH is to increase the epoch of the sensor network in proportion to the energy increment.In order to optimize the stable region of the system,the new epoch must become equal tobecause the system has times more energy and virtually more nodes(with the same energy as the normal nodes.) We can now increase the stable region of the sensor network by times,if(i)each normal node becomes a cluster head once every rounds per epoch;(ii)each advanced node becomes a cluster head exactly times every rounds per epoch;and(iii)the average number of cluster heads per round per epoch is equal to (since the spatial density does not change.)Constraint(ii) is very strict—If at the end of each epoch the number of times that an advanced sensor has become a cluster head is not equal to then the energy is not well distributed and the average Fig.3.number of cluster heads per round per epoch will be less than.This problem can be reduced to a problem of optimalthreshold setting(cf.Equation1),with the constraint thateach node has to become a cluster head as many times as itsinitial energy divided by the energy of a normal node.A.The Problem of Maintaining Well Distributed EnergyConsumption Constraints in the Stable PeriodIf the same threshold is set for both normal and advancednodes with the difference that each normal node becomesa cluster head once every rounds per epoch, and each advanced node becomes a cluster headtimes every rounds per epoch,then there is no guarantee that the number of cluster heads per round per epoch will be.The reason is that there is a significant number of cases where this number can not be maintained per round per epoch with probability1.A worst-case scenario could be the following.Suppose that every normal node becomes a cluster head once within thefirst rounds of the epoch.In order to maintain the well distributed energy consumption constraint,all the remaining nodes,which are advanced nodes,have to become cluster heads with probability 1for the next rounds of the epoch.But the threshold is increasing with the number of rounds within each epoch and becomes equal to1only in the last round (when all the remaining nodes become cluster heads with probability1.)So the above constraint of cluster heads in each round is violated.Figure3shows that the performance of this na¨ıve solution is very close to that of LEACH.In the next subsection,we introduce SEP where the extra energy of advanced nodes is forced to be expended within subepochs of the original epoch.B.Guaranteed Well Distributed Energy Consumption Constraints in the Stable PeriodIn this section we propose a solution,we call SEP(Stable Election Protocol),which is based on the initial energy of the nodes.This solution is more applicable compared to any6solution which assumes that each node knows the total energy of the network and then adapts its election probability to become a cluster head according to its remaining energy[8]. Our approach is to assign a weight to the optimal probability .This weight must be equal to the initial energy of each node divided by the initial energy of the normal node.Let us define as the weighted election probability for normal nodes,and the weighted election probability for the advanced nodes.Virtually there are nodes with energy equal to the initial energy of a normal node.In order to maintain the minimum energy consumption in each round within an epoch, the average number of cluster heads per round per epoch must be constant and equal to.In the heterogeneous scenario the average number of cluster heads per round per epoch is equal to(because each virtual node has the initial energy of a normal node.)The weighed probabilities for normal and advanced nodes are,respectively:In Equation(1),we replace by the weighted probabil-ities to obtain the threshold that is used to elect the cluster head in each round.We define as the threshold for normal nodes,and the threshold for advanced nodes.Thus,for normal nodes,we have:ifotherwise(5)where is the current round,is the set of normal nodes that have not become cluster heads within the last rounds of the epoch,and is the threshold applied to a population of(normal)nodes.This guarantees that each normal node will become a cluster head exactly once every rounds per epoch,and that the average number of cluster heads that are normal nodes per round per epoch is equal to.Similarly,for advanced nodes,we have:ifotherwise(6)where is the set of advanced nodes that have not become cluster heads within the last rounds of the epoch,and is the threshold applied to a population of (advanced)nodes.This guarantees that each advanced node will become a cluster head exactly once everyrounds.Let us define this period as sub-epoch.It is clear that each epoch(let us refer to this epoch as“heterogeneous epoch”in our heterogeneous setting)has sub-epochs and as a result,each advanced node becomes a cluster head exactly times within a heterogeneous epoch.The average number of cluster heads that are advanced nodes per round per heterogeneous epoch(and sub-epoch)is equal to.x=0x=1x=2x=3x=4x=5x=7x=6x=9x=8x’=0x’=1sub-epochepochheterogeneous epochsub-epoch sub-epoch sub-epochx’=13x’=15x’=14x’=10x’=12x’=9x’=11x’=7x’=8x’=6x’=5x’=4x’=3x’=2Fig.4.A numerical example for a heterogeneous network with parameters and,and.We define,and,where is the current round.Thus the average total number of cluster heads per round per heterogeneous epoch is equal to:which is the desired number of cluster heads per round per epoch.We next discuss the implementation of our SEP protocol.C.SEP DeploymentAs mentioned in Section I,the heterogeneity in the energy of nodes could result from normal network operation.For example,nodes could,over time,expend different amounts of energy due to the radio communication characteristics,random events such as short-term link failures or morphological char-acteristics of thefield(e.g.uneven terrain.)To deal with such heterogeneity,our SEP protocol could be triggered whenever a certain energy threshold is exceeded at one or more nodes. Non-cluster heads could periodically attach their remaining energy to the messages they send during the handshaking process with their cluster heads,and the cluster heads could send this information to the sink.The sink can check the heterogeneity in thefield by examining whether one or a certain number of nodes reach this energy threshold.If so, then the sink could broadcast to cluster heads in that round the values for and,in turn cluster heads unicast these values to nodes in their clusters according to the energy each one has attached earlier during the handshaking process. If some of the nodes already in use have not been pro-grammed with this capability,a reliable transport protocol, such as the one proposed in[9],could be used to program such sensors.Evaluating the overhead of such SEP deployment is a subject of our on-going work.D.Numerical ExampleAssume that of the nodes are advanced nodes()and equipped with more energy that other(normal) nodes().Consider a population of a sensor network in anfield of nodes.The for this setting is approximately equal to(using Equation4).For simplicity let us set.This means that on average, nodes must become cluster heads per round.If we consider a homogeneous scenario where each node has initial energy equal to the energy of a normal node, then the epoch would be equal to rounds.In our heterogeneous case,the extended heterogeneous epoch is equal to rounds,and each sub-epoch is。

浅谈ZigBee技术

浅谈ZigBee技术

浅谈ZigBee技术姓名:***班级:21学号:********摘要:介绍了ZigBee技术的概况、发展历程及前景展望,还简要介绍了ZigBee联盟,最后重点分析了该技术的特点以及该技术在生活中的应用。

Abstract:This paper introduces the history and Prospect of ZigBee technology,also briefly introduces the ZigBee alliance, and finally focuses on the analysis of the characteristics of the technology and its application in life.关键词:ZigBee技术IEEE802.15.4 无线通信技术应用引文: Zigbee是基于IEEE802.15.4标准的低功耗个域网协议。

主要适合用于自动控制和远程控制领域,可以嵌入各种设备。

简而言之,ZigBee就是一种便宜的,低功耗的近距离无线组网通讯技术。

一、ZigBee技术概述Zigbee是基于IEEE802.15.4标准的低功耗个域网协议。

根据这个协议规定的技术是一种短距离、低功耗的无线通信技术。

这一名称来源于蜜蜂的八字舞,由于蜜蜂(bee)是靠飞翔和“嗡嗡”(zig)地抖动翅膀的“舞蹈”来与同伴传递花粉所在方位信息,也就是说蜜蜂依靠这样的方式构成了群体中的通信网络。

其特点是近距离、低复杂度、自组织、低功耗、高数据速率。

主要适合用于自动控制和远程控制领域,可以嵌入各种设备。

简而言之,ZigBee 就是一种便宜的,低功耗的近距离无线组网通讯技术。

ZigBee是一种低速短距离传输的无线网络协议。

ZigBee协议从下到上分别为物理层(PHY)、媒体访问控制层(MAC)、传输层(TL)、网络层(NWK)、应用层(APL)等。

其中物理层和媒体访问控制层遵循IEEE 802.15.4标准的规定。

sep路由协议点评

sep路由协议点评

sep路由协议点评摘要:一、SEP 路由协议简介1.SEP 路由协议的定义2.SEP 路由协议的发展历程二、SEP 路由协议的特点1.简单扩展性2.高效性3.灵活性4.安全性三、SEP 路由协议的应用场景1.大型网络环境2.数据中心网络3.云计算环境四、SEP 路由协议与其他路由协议的比较1.与OSPF 协议的比较2.与BGP 协议的比较五、SEP 路由协议的发展前景与挑战1.技术挑战2.标准化挑战3.市场推广挑战正文:SEP 路由协议点评随着互联网的飞速发展,路由协议技术在网络通信中扮演着越来越重要的角色。

简单扩展性协议(SEP,Simple Extensible Protocol)作为一种新兴的路由协议,已经引起了业界的广泛关注。

本文将对SEP 路由协议进行详细点评,包括其简介、特点、应用场景、与其他路由协议的比较以及发展前景与挑战。

一、SEP 路由协议简介SEP 路由协议,全称为简单扩展性协议,是一种基于距离向量算法的路由协议。

SEP 路由协议的设计目标是为了满足现代网络环境对路由协议的需求,例如大型网络环境、数据中心网络和云计算环境等。

SEP 路由协议具有良好的扩展性、高效性、灵活性和安全性等特点,为网络工程师提供了一种高效、灵活的路由解决方案。

二、SEP 路由协议的特点1.简单扩展性SEP 路由协议采用了简单的报文格式和算法,使得协议具有良好的扩展性。

这使得SEP 路由协议可以轻松地适应各种网络环境,并与其他网络协议进行集成。

2.高效性SEP 路由协议采用了基于距离向量算法的路由计算方法,使得路由计算过程更加高效。

同时,SEP 路由协议还采用了多路径计算和负载均衡等技术,进一步提高了网络通信的效率。

3.灵活性SEP 路由协议支持多种路由策略,如静态路由、动态路由和混合路由等,为网络工程师提供了灵活的路由配置选项。

此外,SEP 路由协议还支持路由过滤、路由聚合等功能,以满足不同网络环境的需求。

ZigBee简介

ZigBee简介

1.概述:ZigBee译为"紫蜂",它与蓝牙相类似,是一种新兴的短距离无线通信技术,用于传感控制应用(Sensor and Control)。

Zigbee是基于IEEE802.15.4标准的低功耗个域网协议,根据这个协议规定的技术是一种短距离、低功耗的无线通信技术。

ZigBee这一名称来源于蜜蜂的八字舞,由于蜜蜂(bee)是靠飞翔和“嗡嗡”(zig)地抖动翅膀的“舞蹈”来与同伴传递花粉所在方位信息,也就是说蜜蜂依靠这样的方式构成了群体中的通信网络。

2.ZigBee发展历程:在蓝牙技术的使用过程中,人们发现蓝牙技术尽管有许多优点,但仍存在许多缺陷。

对工业,家庭自动化控制和遥测遥控领域而言,蓝牙技术显得太复杂,功耗大,距离近,组网规模太小等,而工业自动化对无线通信的需求越来越强烈。

2000年12月,IEEE成立了802.15.4工作组,制定了Zigbee的物理层(PHY)和MAC协议层。

2001年8月,ZigBee Alliance成立。

2002年下半年,英国Invensys公司、日本三菱电气公司、美国摩托罗拉公司以及荷兰飞利浦半导体公司共同宣布加入ZigBee联盟,研发名为“ZigBee”的下一代无线通信标准,这一事件成为该技术发展过程中的里程碑。

2004年,ZigBee V1.0诞生。

它是Zigbee规范的第一个版本。

由于推出仓促,存在一些错误。

2006年,推出ZigBee 2006,比较完善。

2007年底,ZigBee PRO推出。

2009年3月,Zigbee RF4CE推出,具备更强的灵活性和远程控制能力。

2009年开始,Zigbee采用了IETF的IPv6 6Lowpan标准作为新一代智能电网Smart Energy(SEP 2.0)的标准,致力于形成全球统一的易于与互联网集成的网络,实现端到端的网络通信。

ZigBee联盟现有的理事公司包括BM Group,Ember公司,飞思卡尔半导体,Honeywell,三菱电机,摩托罗拉,飞利浦,三星电子,西门子,及德州仪器。

基于SEP的移动通信安全技术研究

基于SEP的移动通信安全技术研究

基于SEP的移动通信安全技术研究一、引言随着移动通信的普及,移动通信技术的安全性日益受到重视。

SEP(Secure Element Platform)作为一种安全芯片平台,具有强大的安全性能,因此受到了广泛关注。

本文将基于SEP的移动通信安全技术进行研究,并分析其优势和应用前景。

二、SEP技术概述SEP是一种用于提供安全芯片平台的技术,主要用于存储、管理、处理各种安全数据,包括证书、秘钥、PIN等。

它的核心部分是安全处理器和安全操作系统(Secure OS),并且具有独立的存储系统。

SEP可以在不同的设备上运行,并能够与主处理器(Application Processor)分离运行,从而提供更高的安全性。

SEP技术目前广泛应用于移动通信领域。

我们可以将SEP安装在SIM卡中,从而提高手机通信的安全性。

此外,SEP也被广泛应用于智能卡、电子钱包、银行卡等领域,以提供更强大的安全性能。

三、SEP技术在移动通信领域中的应用1.身份认证SEP技术可用于身份认证,增强系统的安全性。

移动设备中的SEP芯片带有私有密钥,这些密钥仅在基站身份认证(SIA)时才会被公开使用。

用户的身份信息会被发送给大型基站并处理,然后将响应数据返回到安全芯片中。

这些数据可以用于身份验证,以确保安全的通信链路。

2.支持Trusted Execution Environment(TEE)SEP与Trusted Execution Environment(TEE)相结合,可以更好地保护受信任代码。

移动设备上的SEP可用于存储和管理TEE 证书。

此外,SEP还能够预载TEE检测和授权代码,以确保操作系统的安全性能。

3.加密通信SEP技术可用于加密移动通信数据。

使用SEP芯片的移动设备可以生成和存储RSA私有密钥。

这些密钥可用于对通信数据进行加密和解密。

对于需要更高级别保障的通信,SEP可以支持对称密钥加密和解密。

4.支付安全SEP技术在支付安全方面也很有应用前景。

sep路由协议点评

sep路由协议点评

sep路由协议点评【最新版】目录1.引言2.SEP 路由协议的概述3.SEP 路由协议的优点4.SEP 路由协议的缺点5.总结正文【引言】随着互联网的快速发展,网络路由协议也在不断进步和完善。

SEP (Scalable End-to-End Protocol)路由协议是一种较为年轻的路由协议,以其可扩展性和高效性受到了业界的关注。

本文将对 SEP 路由协议进行点评,分析其优缺点。

【SEP 路由协议的概述】SEP 路由协议,全称 Scalable End-to-End Protocol,是一种用于互联网的路由协议。

它旨在提高网络的可扩展性和性能,通过使用一种称为“链路状态路由”的方法,使网络中的路由器能够快速、准确地找到最佳的数据传输路径。

【SEP 路由协议的优点】1.可扩展性:SEP 路由协议能够很好地适应互联网的快速扩张,通过自适应的路由选择算法,使得网络中的路由器能够快速适应新的网络拓扑结构。

2.高效性:SEP 路由协议通过使用链路状态路由算法,可以大大减少网络中的路由器之间的通信量,从而提高网络的传输效率。

3.灵活性:SEP 路由协议支持多种网络拓扑结构,如星型、总线型、环型等,这使得 SEP 路由协议可以适应各种不同的网络环境。

4.容错性:SEP 路由协议具有较强的容错性,当网络中的某个路由器出现故障时,SEP 路由协议可以快速地将故障的路由器从路由表中移除,保证数据的正常传输。

【SEP 路由协议的缺点】1.复杂性:SEP 路由协议相对于其他路由协议,如 OSPF、BGP 等,其路由算法较为复杂,需要网络中的路由器具备较高的处理能力。

2.部署成本:由于 SEP 路由协议需要对网络中的所有路由器进行升级,以支持该协议,因此其部署成本相对较高。

3.兼容性问题:目前,SEP 路由协议在互联网中的应用并不广泛,与其他主流路由协议(如 OSPF、BGP 等)相比,其兼容性较差。

【总结】总的来说,SEP 路由协议具有可扩展性、高效性、灵活性和容错性等优点,但同时也存在一定的缺点,如复杂性较高、部署成本较高以及兼容性较差。

SEP介绍

SEP介绍

SEP技术白皮书声明版权所有华为技术有限公司 2008。

保留一切权利。

非经本公司书面许可,任何单位和个人不得擅自摘抄、复制本文档内容的部分或全部,并不得以任何形式传播。

商标声明和其他华为商标均为华为技术有限公司的商标。

本文档提及的其他所有商标或注册商标,由各自的所有人拥有。

注意由于产品版本升级或其他原因,本文档内容会不定期进行更新。

除非另有约定,本文档仅作为使用指导,本文档中的所有陈述、信息和建议不构成任何明示或暗示的担保。

目录1 介绍 ................................................... 错误!未定义书签。

2 技术应用背景 ........................................... 错误!未定义书签。

3 技术特色 ............................................... 错误!未定义书签。

SEP基本概念 ............................................ 错误!未定义书签。

SEP的基本原理 ....................................... 错误!未定义书签。

控制VLAN ............................................ 错误!未定义书签。

节点 ................................................ 错误!未定义书签。

端口角色 ............................................ 错误!未定义书签。

边缘端口 ............................................ 错误!未定义书签。

普通端口 ............................................ 错误!未定义书签。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

SEP2.0通信协议研究
【摘要】由Wi-Fi、ZigBee、HomePlug与HomeGrid 等成员推动的Smart Energy Protocol 2.0(SEP2.0)标准能够通过智能设备中的应用程序,实现家庭内部的能源管理,提高能源利用效率,节能降耗,有效支撑智能电网,论文对SEP2.0的发展及主要内容进行了研究。

【关键词】智能用电信息模型SEP2.0
一、引言
近几十年来,能源短缺和能源消费引起的环境污染问题已经发展为世界性的难题,世界各国在寻求能量转型道路时都把提高能源利用效率,节能降耗列为能源可持续发展的关键环节[1]。

SEP2.0之前,Zigbee联盟推行了基于Zigbee协议的SE1.X协议,但因协议的封闭性与局限性并且得到广泛应用[2]。

SEP2.0能够提供用户与智能电网的连接外,SEP2.0还能通过网络市场上的应用程序,实现家庭内部的能源管理。

更重要的是,SEP2.0的程序开发不仅与电网有关,更是可以联合厂商与服务商,为用户提供更好的体验。

论文对SEP2.0的发展及主要内容进行了研究。

二、主要特征
如图1所示,SEP2.0的底层虽然建议采用802.15.4或802.11无线协议,但是事实上对于任何能够采用HTTP协议的接入方式都是支持的(包括有线的),SEP2.0着重定义最高层的CIM模型与EXI(Efficient XML Interchange)部分,对于其他支撑协议采用现有的、适用面广、普及度高的协议实现,如:HTTP、DNS-SD、TLS等[3]。

SEP2.0着重于其资源模型的定义,对于传输发现等网络通信内容采用主流成熟的协议/架构来实现,其总体框架采用RESTful HTTP实现、服务发现采用类DNS方式实现、安全传输采用TLS实现。

这些支撑内容处于模型之下、网络之上。

三、信息模型
SEP 2.0的资源表示与建立是通过UML语言实现的,是CIM的一种扩展,将模型分为三大类:Support Resources(辅助资源)、Common Resources(通用资源)、Smart Energy Resouces(SE资源)。

辅助资源用于支撑设备通用的信息处理与交换,能力较为简单,建议每个设备都具备的辅助资源提供的能力,包括:设备能力、设备接口、通信接口、资源预设、订阅通知算法、响应算法。

通用资源是与具体应用无关的,可以用于支撑智能用电资源的功能集,包括:时间、设备信息、电源状态、网络状态、日志、配置、文件下载。

SE资源用于实现智能用电的特定应用场景,包括:DRLC、计量、电价、文本通知、费用、预付费、预订能量、DER及智能用电的通用资源。

四、结论
SEP2.0通过UML语言建立了一组完善的信息模型,采用现有成熟的协议来实现信息交互,创建了一个标准的、可互操作的协议,用于智能电网与用户设备的连接。

通过TCP/IP协议承载业务,与物理层协议完全分离,提供用户与智能电网的连接,实现家庭内部的能源管理,能够为我国用户领域的节能减排通信协议提供一个良好的参考。

参考文献
[1] 黄飞. 能源消费与国民经济发展的灰色关联分析[J]. 热能动力工程,2001,16(1):89-90
[2] Zigbee Alliance. Zigbee Smart Energy Profile Specifications [S]
[3] Zigbee Alliance. SEP 2.0 Application Specification 0.9 Document [S]。

相关文档
最新文档