Home

Time Synchronization Testing with Roving WLAN Network Samuel

image

Contents

1. 1 B Ia m 1 m91 r 8I local time node A T1 T4 local time FIGURE 3 2 Synchronization phase Sivrikaya Yener 2004 4 Fig 3 2 shows the synchronization phase in which node A starts the synchronization process by transferring a synchronization pulse packet at T1 that is according to its local clock The packet sent have A s level number and the current value of T1 The sent packet arrives in B according to its local clock at T2 T1 A d where A is the relative clock drift between the nodes and dis the propagation delay of the pulse When B receives the packet at time T3 it responds with an acknowledgement which includes the level number of B and the values of T1 T2 and T3 Ranganathan Nygard 2010 4 amp Sivrikaya Yener 2004 4 Node A computes the clock drift and the propagation delay as Clock drift m q 9 A 3 1 Propagation delay T2 T1 T4 T3 2 d 3 2 3 2 3 Lightweight Time Synchronization Protocol LTS The Lightweight Time Synchronization LTS protocol attempts to synchronize the clocks of a sensor network to the clocks held by certain reference nodes which may 21 have GPS receivers LTS has no limitation with respect to the local clock update discipline and it does not try to estimate actual drift rates Sivrikaya Yener 2004 5 LTS produces a low depth spanning tree comprised of the nodes in the network and utilizes a pair wise synchronization algorithm for each o
2. 15 2011 09 21 10 40 15 2011 09 21 10 41 17 2011 09 21 10 42 17 2011 09 21 10 43 17 2011 09 21 10 44 17 2011 09 21 14519 rInformation First entry 2011 09 21 10 32 12 Last Entry 2011 10 11 10 09 46 Minimum value 64 Maximum value 1024 Entries 622 Action Clear specific events Polling interval 10 32 12 08 56 26 08 34 54 10 53 30 09 58 39 52
3. In this work the transmission and processing of information in sensor networks were explained the various Time Synchronization protocols such as RBS LTS TPSN and NTP were fully examined The WiFly modules G1 and G2 were provided with time 05 41 41 and 05 41 39 respectively from a device Client that was synchronized to an external reference clock Server From careful observation the provided time was not accurate since there was a delay of 2 milliseconds which was due to propagation transmission and queuing delay The importance of keeping time accurate and precise on multiple devices is a critical challenge in a distributed network A slight deviation in time can cause much havoc in organizations since time is crucial for recording and updating events as they happen In light of this development all the devices on the network need to be synchronized to an external reference source known for its accuracy for time to be distributed wirelessly to all other devices directly connected Financial Institutions and cooperate organizations that rely heavily on the accuracy of time for daily operations should deploy NTP on their networks Sensor Networks are in their early stages of development necessitating for more research and development to design low cost energy efficient and high performing sensors Since NTP has some drawbacks modifying and improving the current synchronization protocols such as NTP in today s networked environments can
4. Memory 2 4GHz 2 4GHz es TXIRX Radio SZ SPI 802 11b g X D H z 0 X L MAC PHY S SPI GPIO 24 GHz UART U FL connector PA VDD IN s oivaa Pwr GPIO accelerator SDIO Boost Sensor Interface 3 3V Boost Enable Regulator FIGURE 5 2 Block Diagram Roving Network 2009 1 28 6 EXPERIMENT 6 1 Hardware Setup 6 1 1 Graphical Representation The graphical representation in Fig 6 1 shows the equipment and tools that were used It summaries the whole work and how the various devices were connected Ethernet cable i Access Point G1 G1 WiFly GSX 1 G2 WiFly GSX 2 FIGURE 6 1 Graphical representation 6 1 2 Evaluation Board Setup For the lab work to be implemented successfully certain environmental conditions and electrical characteristics should be in place Table 1 and Table 2 details the necessary conditions that were used 29 Table 1 Environmental conditions Parameter RN 131G Temperature Range Operating 30 C 85 C Temperature Range Storage 40 C 85 C Relative Humidity Operating lt 90 Relative Humidity Storage lt 90 Table 2 Environmental characteristics Supply Voltage Min Typ Maxi Unit Supply Voltage VDD 3 0 3 3 3 7 VDC Supply Voltage VBATT Option 2 0 3 0 3 3 VDC PIN 21 Switched 3 3V Output 150 ma Digital Output Input logic HIGH VIH 2 3 VDC I
5. critically when implementing Sensor Networks Without security vital information can be lost and stolen by a third party Security is challenge in WSN since they are deployed in many areas such institutions and other establishments which require monitoring Sensor Networks should conform to these basic security demands such as e Confidentiality ensures vital data and information is protected and not exposed to unauthorized third parties Confidentiality is needed to prevent information from being leaked when travelling from one to another Walters Liang Shi Chaudhary 2006 6 e Lack of integrity may result in inaccurate information Many sensor applications such as pollution and healthcare monitoring rely on the integrity of the information to function Gowrishankar Basavaraju Manjaiah amp Subir 2008 9 e Since confidentiality and data integrity are essential there is a need also to ensure the freshness of each message as they arrive Data freshness means that the data is recent and no old messages have been replayed It is crucial requirements when there is a shared key strategy employed in the architect Walters Liang Shi Chaudhary 2006 6 15 2 4 Characteristics of WSNs WSN have some distinctive characteristics and limitations that set it apart from all other networks and systems Presented below are some of the distinctions Sensor nodes are closely disposed and vary in association to the magnitude being high
6. help to improve efficiency 45 REFERENCES Chao Nong Xu Zhao Lei Yong Jun Xu amp Xiao Wei Li 2006 Simsync A Time Synchronization Simulator for Sensor Networks online pdf accessed 09 November 2011 Available from http www aas net cn gikan manage wenzhang 060620 pdf Deeths D 2001 Enterprise Engineering and Glenn Brunette SunPS Using NTP to control and Synchronize Systems Clocks online pdf Part I Introduction to NTP accessed 02 February 2012 Available from http anselmo homeunix net Sun BluePrints 0701 NTP pdf Deeths D 2001 Enterprise Engineering and Glenn Brunette SunPS Using NTP to control and Synchronize Systems Clocks online pdf Part II Basic NTP Administration and Architecture accessed 02 February 2012 Available from http lx ujf cas cz misc time sun blueprint ntp2 pdf Elson J Girod L amp Estrin D 2002 n Proceedings of the Fifth Symposium Operating Systems Design and Implementation OSDI 2002 online pdf Fine Grained Network Time Synchronization using Reference Broadcasts accessed 20 December 2011 Available from http lecs cs ucla edu Publications papers broadcast osdi pdf Eyadeh A A 2008 International Journal of Communications Issue 1 Volume 2 online journal Frame Synchronization for an OFDM System accessed 27 December 2011 Available from http www naun org journals communications c 43 pdf Gautam G C amp Sharma P T 2010 Internati
7. reliable synchronization frame Each frame includes a synchronization symbol followed by a data symbol Eyadeh 2008 1 11 The receiver samples the value of the incoming signal at the center of each bit when synchronized Caution must be taken to reduce skew in the sampling rate and timing Individual bits that are extracted from the radio must be regrouped into blocks that are the encoded version of real data messages Eventually the blocks are decoded back into the original data and assembled into a packet Communication systems should include error control systems to detect errors and to correct them 2 3 Challenges in Wireless Sensor Networks Recent improvements in the field of sensing computing and communications have resulted in research efforts and high investments from various sectors in the area of WSNs There are many issues that have influence in the design and performance of WSNs but only few have been presented 2 3 1 Hardware and operating system for WSN WSNs are composed of hundreds of thousands of tiny devices called nodes Sensor senses information processes the information and passes the information to a Mote A mote behooves of a processor memory battery A D converter for connecting to a sensor and a radio transmitter for forming an adhoc network Fig 2 2 shows the block diagram of a sensor node Gowrishankar Basavaraju Manjaiah amp Subir 2008 2 Transceiver Sensor m a FIGURE 2 2 Structure of a sen
8. synchronized to an external reference source which is accurate for time to be distributed to all other devices directly connected In recent times there have been lots of changes in how devices communicate with each other Communication has taken a different shift from the normal traditional mode of communication Wireless communication is rapidly gaining momentum in the industry with the ability to provide a high quality information data exchange with devices they are connected anywhere or in close proximity Due to the current ramification in the segment of wireless technologies it is viable to implement inexpensive tiny disposal and low power devices for measurement of physical environments like temperature pressure humidity etc The devices that are used to carry out this task are termed as sensor nodes and their deployment is called Wireless Sensor Network WSN In WSNs the nodes are to sense the environment for an event and communicate them to the base station To recognize and record the correct event time the nodes are synchronized among each other with a universal time from a reference clock for time to be distributed to others in the same spectrum Synchronization in a sensor network provides a common timescale for local clocks of nodes in the network In this thesis the various protocols of Time Synchronization and the challenges in WSNs will be explained with more emphasis placed on Network Time Protocol NTP The thesi
9. 20 December 2011 Available from http paper ijesns org 07 book 201102 20110235 pdf Meinberg NTP Software 2008 Solution for Time and Freguency Synchronization web publication NTP Download accessed 23 February 2012 Available from http www meinberg de english info ntp htm Marco P D 2008 Sweden KTH Electrical Engineering Master Degree Project online publication Protocol Design and Implementation for Wireless Sensor Networks accessed on 16 November 2011 Available from http www ee kth se pidm publications thesis pdf National Instruments 2010 Wireless Communications in WSN NI WSN Link Ouality Logger web publication NI Developer Zone accessed 23 February 2012 Available from http zone ni com devzone cda epd p id 6346 Rahamatkar S Agarwal A amp Kumar N 2010 International Journal on Computer Science and Engineering Vol 02 No 03 2010 online journal Analysis and 47 Comparative Study of Clock Synchronization Schemes in Wireless Sensor Networks accessed 15 November 2011 Available from http www enggjournals com ijcse doc lJCSE10 02 03 28 pdf Ranganathan P amp Nygard K 2010 nternational Journal of UbiCom IJU Vol 1 No 2 online journal Time Synchronization in Wireless Sensor Networks A Survey accessed 10 February 2012 Available from http airccse org journal iju papers 041 Oiju6 pdf Roving Networks 2011 WiFly Evaluation Kit online pdf User Manual a
10. 21 10 32 12 autsa 10 32 12 Last Entry 2011 10 11 10 09 46 2011 09 21 10 33 12 2011 09 21 10 34 12 2011 09 21 10 35 14 2011 09 21 10 36 15 2011 09 21 10 37 15 2011 09 21 10 38 15 2011 09 21 10 38 15 2011 09 21 10 40 15 2011 0921 10 41 17 2011 0921 10 42 17 10 43 17 144 17 Clear all events Minimum value 2 Maximum value 16 Entries Action Clear specific events o i i i i 10 32 12 07 58 19 10 59 57 10 19 06 12 29 56 I 03 OI GA G OO O OI OO O File Edit Help NTP Service NTP Status NTP Configuration File Statistic Advanced Statistic Configuration Notification Logfile NTP Debug Information Advanced statistic Selected Peer Stratum value Information First entry 2011 09 21 10 32 12 103212 Last Entry 2011 10 11 10 09 46 10 33 12 re S 10 35 14 Inimum value 10 36 15 Maximum value 16 615 10 37 15 Entries 622 10 38 15 10 39 15 ab 10 40 15 10 41 17 Clear specific events 10 42 17 10 43 17 i 10 44 17 10 32 12 08 57 26 08 36 56 10 57 33 10 02 42 11 45 19 Appendix 4 Graphical Display of Polling Interval Delay Advanced statistic Selected Peer Stratum value Delay Poling interval 2011 09 21 10 32 12 2011 09 21 10 33 12 2011 09 21 10 35 14 2011 09 21 10 36 15 2011 09 21 10 37 15 2011 09 21 10 38 15 2011 09 21 10 39
11. D The client and server were configured for authentication because the client server configurations were carried backwards to enable broadcast and non broadcast Configuring authentication both the server and the client require the following steps keys etc inet ntp keys server ns1 savonia fi prefer key 1 server ntp a lab fi key 1 trustedkey 1 enable auth broadcast 192 168 3 255 key 12 ttl 6 broadcast configuration broadcast 224 0 0 1 key 14 ttl 6 multicast configuration The trustedkey keyword was for configuring the broadcast and multicast servers so that the servers will be able to acknowledge clients during initiation processes This takes place in order for the clients to ascertain how fast the network is operating The peers were also configured for authentication since they are all likely candidates for initiation The necessary keys used were defined as trusted to aid in communication and synchronization keys etc inet ntp keys trustedkeys 2 1 peer 192 168 3 189 key 2 peer 192 168 3 100 key 1 40 6 3 4 Managing Effect of Network NTP architects should be able to comprehend the working mechanisms of NTP and the underlying networks that are associated Minimizing NTP s network operation and maximizes the accuracy and precision of the clocks are the prime objective of the NTP architects For high clock accuracy and precision to be obtained the network latency should be calibrated to a low degree NTP was able t
12. S acre teehee egene ee 25 5 1 Meinberg NTP SoftWare tes 25 5 2 NTP Time Server Monitor AEN 25 5 3 Roving WLAN Module Dn 1310 evalt n naan nana annan naaeen 26 e AAP ER MEN RE 28 GE Here E EE 28 6 1 1 Graphical Representation a 0 s0 matta NANA ER 28 6 1 2 Evaluation Board Setup EE 28 6 2 Configuring Hn 13210 eval ENNEN 31 6 2 1 Configuring Module Through UART kaa a netaan aaneeen 32 6 2 2 Associating with an Access Point nn n n aan a aan nneeen 33 6 2 3 Configuring Ad Hoc Mode te cite cose aus osata aa asos Tat kankea 34 6 2 4 Configuring Automatic CONNECTIONS nanna nannaa 35 6 2 5 Real Clock Configuration EE 36 6 3 Configuring NTP sssssssssssssssssssssesrnrnrnrnsserrrrrrnnrrnssstrrrnnnnrnssettrtnnnnnnnnseenrnnne nnne 37 6 3 1 Configuring NTP EE 37 6 3 2 Configuring C RE 38 6 3 3 Configuring Authentication D 39 6 3 4 Managing Effect of Network AAA 40 6 3 5 Configuring Access Control 40 Ee 42 Ee GENS ON RE 44 el We 45 APPENDICE S ee 49 Appendix 1 Configuration BU 49 Appendix 2 Graphical Display of Stratum Value eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeees 51 Appendix 3 Graphical Display of Delai 51 Appendix 4 Graphical Display of Polling Interval Delai 52 1 INTRODUCTION Keeping time accurate and precise on different devices has become a major challenge in today s network environment since a slight change in time can lead an organization into several problems and mishaps This calls for all the devices to be
13. able to localize failure loss of nodes and tolerant to errors in physical measurements when calculating the distances between nodes Gowrishankar Basavaraju Manjaiah amp Subir 2008 9 Bachrach amp Taylor 2 2 3 4 Quality of Service Quality of Service is the service provided by the sensor networks to its intended users QoS for sensor networks is the optimum number of sensors sending information towards information collecting sinks or a base station Nodes have the capacity to join leave and rejoin and links can be possibly broken thereby sustaining and reinstating the route dynamically is a constraint in WSNs The main parameters in QoS are delay latency Jitter and offset Gowrishankar Basavaraju Manjaiah amp Subir 2008 8 9 QoS issues in Wireless Sensor Networks are stipulated as follows 14 e Sensor networks should be supplied with the right amount of bandwidth to authorize it to accomplish the required QoS e QoS in WSN is complex to ascertain because the network topology may change continually and the available state information for routing inherently precise Gowrishankar Basavaraju Manjaiah amp Subir 2008 8 9 e Traffic unbalance in sensor network due to data aggregation from many nodes to a sink node QoS mechanism must be designed for an unbalanced QoS constrained traffic Gowrishankar Basavaraju Manjaiah amp Subir 2008 9 2 3 5 Security Security is an important element to be considered
14. against peer 192 168 3 189 peer 192 168 3 100 24 50 keys etc inet ntp keys trustedkeys 2 1 peer 192 168 3 189 key 2 peer 192 168 3 100 key 1 accept packets from restrict 192 168 3 100 mask 255 255 255 0 nomodify notrap restrict 192 168 3 101 mask 255 255 255 0 nomodify notrap restrict 192 168 3 189 mask 255 255 255 255 nomodify notrap noquery restrict 192 168 3 100 mask 255 255 255 255 nomodify notrap noquery one falseticker If you only rely on internet time it is highly recommended to add additional servers here The iburst keyword speeds up initial synchronization please check the documentation for more details server 0 fi pool ntp org iburst server 1 fi pool ntp org iburst server 2 fi pool ntp org iburst server 1 se pool ntp org iburst server 0 de pool ntp org iburst End of generated ntp conf Please edit this to suite your needs HUHHHHHHEHTHHHEEELH EELHHHEE HHHHELHHHHIH HHHEHHAHHHHAAN Section insert by NTP Time Server Monitor 30 8 2011 enable stats statsdir C Program Files NTP etc statistics loopstats 51 Appendix 2 Graphical Display of Stratum Value DI NTP Time Server Monitor by Meinberg 1 04 File Edit Help NTP Service NTP Status NTP Configuration File Statistic Advanced Statistic Configuration Notification Logfile NTP Debug Information Advanced statistic Selected Peer i Delay Polling interval Information First entry 2011 09
15. ccessed on 18 February 2012 Available from http www rovingnetworks comf files resources rn wifly eval um ver1 0r pdf Roving Networks 2011 User Manual and Command Reference online pdf 802 11 b g Wireless LAN Modules accessed 18 February 2012 Available from http www rovingnetworks com products RN 131G EVAL Sharma S 2009 National Institute of Technology Rourkela Department of Computer Science and Engineering Master of Technology Online pdf Energy efficient Secure Routing in Wireless Sensor Networks accessed 25 October 2011 Available from http ethesis nitrkl ac in 1515 1 IOCMLB thesis pdf Singh S K Singh M P amp Singh D K 2010 International Journal of Computer Science amp Engineering Survey IJCSES Vol 1 No 2 online journal Routing Protocols in Wireless Sensor Networks A Survey accessed 08 November 2011 Available from http airccse org journal ijeses papers 1110ijeses06 pdf Sivrikaya F amp Yener B 2004 Time Synchronization in Sensor Networks A Survey online pdf accessed 17 November 201 1 Available from http Awww cs rpi edu yener PAPERS WINET timesync04 pdf The NTP FAQ and HOWTO 2006 Understanding and Using the Network Time Protocol web publication NTP accessed 23 February 2012 Available from http Awww ntp org ntpfaq NTP s algo htm Q REFCLK 48 Viskstr m P 2006 Time Stamping and Time Synchronization in Wireless Sensor Networks online p
16. ceiving data to the host Roving Networks 2011 6 User Data FIGURE 6 3 Data mode and Command mode Roving Networks 2011 6 The WiFly module is in a data mode by default thereby typing the escape sequences enabled the module to enter the command mode for configuration to take place When it entered the command mode the configuration was deployed with ASCII Command Misappropriation of the ASCII command resulted in errors which resulted in debugging and troubleshooting to ascertain the source of the error 6 2 1 Configuring Module Through UART In order for communication to emerge with the module via a Terminal Emulator the COM port was allocated to the USB of the module The terminal emulator utility program was opened and the COM port was specified Since Tera Term was used during the work the Serial and chose COM port 2 and 22 were respectively selected from the port drop down listbox as shown in Fig 6 4 33 2 Tera Term disconnected VT File Edit Setup Control Window Help Tera Term New connection TCP IP 192 168 3 100 History Telnet SSH SSH2 Other UNSPEC amp Serial Port COMI Cancel Help FIGURE 6 4 COM port assigned 6 2 2 Associating with an Access Point The Tera Terminal window was opened but it was in the data mode The escape sequence put the module in the command mode By typing the show net the current network settings on the network w
17. df accessed 07 February 2012 Available from http users tkk fi virranko sensor networks vikstrom1 pdf 49 APPENDICES Appendix 1 Configuration file NTP Network Time Protocol H ATTENTION You have to restart the NTP service when you change this file to activate the changes PLEASE CHECK THIS FILE CAREFULLY AND MODIFY IT IF REQUIRED Configuration File created by Windows Binary Distribution Installer Rev 1 26 mbg please check http www ntp org for additional documentation and background information Use drift file your local system clock should be used as a backup this is only useful if you need to distribute time no matter how good or bad it is server 127 127 1 1 but it operates at a high stratum level to let the clients know and force them to use any other timesource they may have fudge 127 127 1 1 stratum 12 driftfile etc ntp drift driftfile C Program Files NTP etc ntp drift broadcastdelay 0 008 broadcastclient multicastmultcast broadcast 192 168 3 255 ttl 6 broacast 224 0 0 1 Use a NTP server from the ntp pool project see http www pool ntp org server ns1 savonia fi server ntp a lab fi iburst prefer keys etc inet ntp keys server ns1 savonia fi prefer key 1 server ntp a lab fi key 1 enable auth trustedkey 1 1 allow localhost restrict 127 0 0 1 restrict 192 168 3 189 Please note that you need at least four different servers to be at least protected
18. elaborate how the clocks were synchronized to an external source for time to be propagated to the clients and wireless ad hoc network was used to evaluate the working ability of the NTP services with Wireshark for the delay and error to be recorded Keywords Synchronization NTP wireless sensor network ad hoc Rn 131g eval SNTP Confidentiality Public SAVONIA AMMATTIKORKEAKOULU TEKNIIKKA KUOPIO Koulutusohjelma Tietotekniikan koulutusohjelma Tekija Samuel Nyarko Ty n nimi Time Synchronization Testing With Roving WLAN Network Date 310ctober 2011 Pages Appendices 50 Ty n valvoja Arto Toppinen Yritys Savonia Ammattikorkeakoulu Tiivistelm Ty n p tavoite oli synkronisoida paikallinen kellosysteemi levitt v st aikal hteest ja v litt aika muille NTP tai SNTP asiakkaille jotka k ytt v t kiert v Wlan moduulia Rn 131g eval yhdistettyn Meinberg NTP Softwareen Ajan synkronisointi WSN ss t ht verkoston paikallisen noodikellon aikaskaalan v litt miseen Wireless Sensor Networks WSNs on laajasti k yt ss t m n p iv n verkostoidussa ymp rist ss joka langattomasti yhdist pieni sensorinoodeja joilla on tietojenk sittelyn kommunikaation ja ymm rt misen kyky Sensorinoodit ty skentelev t yhdess auttaakseen v ltt m tt m n tiedon prosessoinnissa jota my hemmin tarvitaan toisiin tietojenk sittely ja verkostosovellu
19. er than that of other networks A sensor node does not depend on one another for configuration thus they configure themselves independently into a network They are subtle to physical damages or failures due to its implementation in a hostile environment Sensor nodes are dependent on battery making it difficult to change or recharge the batteries Network topology changes from time to time because of certain factors such as node failures damage addition energy depletion and channel fading Shio Kumar Singh D K Singh 2010 2 2 5 Algorithm for Wireless Sensor Networks Sensor applications reguire the communication of nodes to follow certain prescribe instruction to enable the clocks to be synchronized faster Certain algorithms should be in place for nodes to know the exact task they are to perform Examples of such algorithms are Centralized Algorithms They are executed in a node that posses the knowledge of the whole network These algorithms are guite rare because of the cost of transmitting the data to make the node know the status of the complete network Distributed Algorithms The communication is supported by message passing Since WSN has limited amount of energy distributed algorithm protocols help in transmission delay in sending data among nodes 16 necessitating the increase of energy in the network Kiyani Aghaee Tahmasebi 2011 1 Location based Algorithms The nodes use restricted data acquired fr
20. ere displayed 2 2d4 gt shon net Sid nyuf inaluork han G oc OK ate 12 24Hb ut h 0E oad2e OPEH HCP 0K oot 94304735 ine 0E inks 4d vr RR KR e When the module is in the command mode it has the capability of searching and finding all available networks within its circumference The scan command was used to perform the task of finding available networks The network myfinalwork is an open access point which is a suitable candidate for forming an access point 34 2 21 SCAN Found Hun SSIO Ch RSSI Sec HAC Address Suites 1 Savonia 01 4 HPR2PSK O0 4a 2f 91 3e a0 AESH AES 3104 0 2 Savonia web 01 48 HPA2PSK O0 4a 2f 91 3e a1 AESH AES 3104 0 3 LangeDeno 01 66 Open c0 c1 c0 3f ce 05 100 4 4 GainSpanDeno 06 44 Open 98 fc 11 47 40 c 104 4 5 nufinaluork 06 21 Open 00 23 69 c4 de 43 2100 0 6 Savonia ueb 11 69 IEN 00 4a 2f 91 48 21 AESH AES 3104 2 Savonia ueb 11 59 HPR2PSK 40 f4 ec 12 0f 64 AESH AES 3104 0 In order to associate with an access point join myfinalwork was typed The red LED goes off signifying the module was successfully configured to an access point and the green LED flashes slowly 2 21 join nyf inaluork efuth uto Assoc nyf inaluork chan 6 node 0PEN SCAN OK oining nyf inaluork non 2 21 Associated sing Static IP Since myfinalwork was successful associated to a network the access point SSID was stored for future purposes This enables the pass phrase to be solved to the config file for
21. et Identifier Location Based Algorithm Wireless Fidelity Protected Access Universal Asynchronous Receiver Transmitter Dynamic Host Configuration Protocol Real Time Clock Time Division Multiple Access Wireless Local Area Network Table of Contents THINTAODUG Et 8 2 WIRELESS SENSOR NETWORK ooooo a n aa a nana aa annan a aan Kaanaa aan aeen 9 2 1 Architecture o WSN E 9 2 2 Wireless Communication Requirements ccccecceeeeeeeeeeeeeeeeeeeeeeeeeneeeeeeees 9 2 3 Challenges in Wireless Sensor Networks cccccceeeeeeeeeeceeeeeeeeeeeeeeeeeeaaees 11 2 3 1 Hardware and operating system for WEN 11 2 3 2 Wireless Radio Communication Characteristics uouusnsnnnnnneen 12 2 3 3 Localization EE 13 234 Q a lty Ol EE 13 SEN ee eg ee ee ee ee eebe 14 2 4 Characteristics of WSNS EE 15 2 5 Algorithm for Wireless Sensor Networkz nananana nene naeeen 15 3 TIME SYNCHRONIZATION E 17 3 1 Relevance of Time Synchronization in WEN naakka e nnen aaeen 17 3 2 Time Synchronization Protocol cccceeeeeeeeeeceeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeenaaees 17 3 2 1 Reference Broadcasting Synchronization DD 18 3 2 2 Timing Synchronization Protocol for Sensor Networks TSPN 19 3 2 3 Lightweight Time Synchronization Protocol Ti 20 4 NETWORK TIME PROTOCOL ammsarssk k cats Sue ones suet outs ege ege 22 4 Components OT NUP EE 22 4 2 Operation of leede 23 4 2 1 Hierarchical leese tege Eege Eege 23 KOOL
22. fa UK EE 2040 82 aa 00 00 00 00 00 00 00 00 d2 3e 96 7d ca 69 ae gt i 0050 14 35 AERIETIO KEN are Hrs FIGURE 7 1 Captured packets displayed by Wireshark From the Meinberg NTP Time Server Monitor the current status of NTP service was displayed with ntpd p as shown in Fig 7 2 EN as d eg Checking current status of NIP service with ntpg p remote ref id st t when poll reach delay offset jitter LOCALC1 gt MCL 121 25 64 dakota savonia 194 100 2 194 Zu 152 1824 oxugen a lab fi 130 149 17 8 2u 242 1024 tntp2 tdc fi PPS iu 311 1824 storel bnswcs n 192 356 143 158 2 u 198 1024 6 328 Auto Refresh every 195 CTRL C to Cancel FIGURE 7 2 Current status of NTP 43 Dakota savonia fi ntp2 a lab fi and store1 onsvcs n are secondary candidates for synchronization NTP will compare the three and the choose the one with a high degree of accuracy when the oxygen a lab fi fails or when there is a change in network topology oxygen a lab fi was the candidate for synchronization since it provides better accuracy and precision The reference clock was synchronized to it and time was distributed to the clients as shown in Fig 7 3 and Fig 7 4 Time on COM port 2 File Edit Setup Control Window Help Ka T Is 11 os jj wo FIGURE 7 3 Time on port 2 Time on COM port 22 2 COM22 Tera Term V FIGURE 7 4 Time on port 22 A4 8 CONCLUSION
23. gning WSN should fulfill the following requirements e Low power consumption in sensor networks is imperative to enable batteries to last longer thereby fostering low duty cycle operation and local signal processing Gowrishankar Basavaraju Manjaiah amp Subir 2008 9 e Points to point communication in networks require high transmission power which causes data to be lost during transmission In light of this short range transmission should be considered to prevent loss of data 13 e Systems used for communication should have components and features to control the subsystems to detect and correct errors and to correct as they are made Gowrishankar Basavaraju Manjaiah amp Subir 2008 9 2 3 3 Localization Localization in WSN is imperative for the management of a network and operation In some instances sensors are carried out without adequate knowledge of their relative position In addition there are no secondary infrastructures available to locate and handle them once deployed Finding the physical location of a sensor after they have been implemented is known as the problem of localization The discovery of location of a sensor network should satisfy the following e The whereabouts of node location can be used to implement energy efficient message routing protocols e Principles exhibited in localization must be exact expandability and back mobility of nodes as they travel through the network e The algorithms must be
24. imple Network Time Protocol SNTP is a lightweight variation of NTP which is compatible with NTP and NTP can be standardized the throughout an enterprise network because many platforms and networking devices support either NTP or SNTP Deeths 2001 2 4 1 Components of NTP There are numerous protocols to synchronize computer clocks each of which has distinctive features Below are lists of NTP features e The NTP needs a reference clocks such as GPS DCF77 and WWVB that define the true time to operate All the clocks are set towards the true time It will not just make all systems agree on some time but will make them agree upon the true time as defined by some standard e NTP utilizes UTC as reference time which is an official standard for current time UTC evolved from the former GMT Greenwich Mean Time that once was used to set the clocks on ships before they left for a long journey 23 e NTP is a fault tolerant protocol that possibly selects the best candidate of time sources to synchronize to e NTP is highly scalable and expandable Individual node on the network trade time information either bidirectional or unidirectional The NTP FAQ and HOWTO 2006 4 2 Operation of NTP NTP employs a client server architecture in which a time server distributes reference time to clients which may in turn distribute the time to other hosts The protocol itself is simple and does not specify how precisely servers and clients must synchro
25. ksiin Ty suoritettiin Roving WLAN Network Rn 131g eval ja Meinberg NTP Time Serverin avulla joka on graafinen k ytt j liit nt joka n ytt NTP status ja NTP servicen t m nhetkisen statuksen Metodi joka k sittelee miten kellot synkronisoitiin ulkopuoliseen l hteeseen jotta aika levi isi asiakkaille esitettiin ja my s langattoman ad hoc verkoston toteutusta k ytettiin NTP services with Wiresharkin ty kyvyn arvioinnissa Avainsanat Luottamuksellisuus julkinen Acknowledgements My sincere gratitude goes to the Almighty God for the strength He endowed on me during the difficult moments when lost my beloved three months three days old son in February 2011 thank all my friends and the lecturers that were instrumental for my success in academics from the 2008 to 2012 My special thanks to Mr Arto Toppinen for his support and dedication when was working on this thesis February 26 2012 Kuopio Samuel Nyarko Abbreviations WSN RBS TPSN LTS NTP SNTP GPS UDP UTC WLAN SSID LBA WPA UART DHCP RTC TDMA WLAN Wireless Sensor Network Reference Broadcasting Synchronization Timing Synchronization Protocol for Sensor Networks Lightweight Time Synchronization Protocol Network Time Protocol Simple Network Time Protocol Global Positioning System User Datagram Protocol Coordinated Universal Time Wireless Local Area Network Service S
26. munication to take place over a wireless link it must be necessitated by a protocol which must be instituted from a raw electromagnetic primitive A transmitter which is responsible for modulating the RF signal is needed for propagating the signal while the receiver performs demodulation and signal processing Fig 2 1 show wireless communications in WSN 10 WSN Node WSN Node SY WSN Node S races IEEE 802 15 WS FIGURE 2 1 Wireless Communications in WSN National Instruments 2010 The process of communicating over the wireless link involves encoding the data for transmission The coding schemes are built to raise the efficacy of transmission by avoiding and making amendments to slightly made errors Transmission begins to take place when the byte is encoded While the bytes are being transmitted the remains are at the same time encoded to be transmitted Walters Liang Shi Chaudhary 2006 4 The propagated symbol is a synchronized symbol The synchronized symbol Eyadeh 2008 1 informs the receiver of the arrival of the packet which is used in calculating the time in which the data arrived As the transmission progress the transmitter controls the timing of each bit transmission in order for the receiver to maintain synchronization The transmission of data is dependent on the effectives of how appropriate synchronization is achieved Correct synchronization happens through the process of organizing data into
27. ndicating it is associated with an access point whereas the yellow LED automatically goes OFF while the green LED continuously blinks signifying the IP address is set 6 2 4 Configuring Automatic Connections In order not to be assigning IP address and netmask anytime the system is powered on the module was configured automatically so that it can connect to a remote server which is any computer providing information data to other computers send data and later disconnect from the host This was achieved with these parameters 36 set ip host 192 168 3 189 set ip remote 55555 set sys autoconn 1 set com idle 5 set sys sleep 2 set sys wake 60 save reboot 6 2 5 Real Clock Configuration When the module is powered on there is a real clock function which has the capability of knowing the number of seconds and the actual time when synchronized with SNTP time server The module keeps track of up time but it does not synchronize with the time server which requires being associated with a network that can access the SNTP server made sure the module was associated with a network myfinalwork for connections to be made with the SNTP time server Enable 1 command was configured to help the system acquire time from the server when powered on at anytime 2 21 set tine enable 1 Ok d dl get tine ineEna 1 IHERDR 192 168 3 1892123 one 3 37 By issuing the command show t t all the necessary time variables were displayed 2 21
28. ne of the two nodes on the same edge of the tree Sivrikaya Yener 2004 5 LTS is divided into two building blocks namely e A pair wise synchronization protocol synchronizes two neighboring nodes Karl Willig 2003 223 amp Sivrikaya Yener 2004 9 e To preserve the entire nodes synchronized to a common reference a spanning tree from the reference node to all the nodes is created Karl Willig 2003 223 amp Sivrikaya Yener 2004 9 ER 4 NETWORK TIME PROTOCOL NTP is a system for distributing Coordinated Universal Time UTC by a way of synchronizing the clocks of computer systems over a packet switched variable latency data networks The clients and servers used in the NTP have a capabilities and possibilities over a wide range of network delays and jitter characteristics Most users of the internet NTP synchronization subnet use a software package including the full suite of NTP options and algorithms which are relatively complex and real time applications NTP works on assumption of having all the system clocks get as close as possible to the correct time NTP corrects the current time and makes sure the time is consistent on the devices and automatically adjusts for time drift on the client When this is achieved it allows for small network traffic and stores client clocks more reliably even if the network is unreachable due to changes in topology or any mishaps Deeths 2001 2 NTP operates on different platforms S
29. nize or maintain time NTP uses the User Datagram Protocol UDP on port 123 to communicate between clients and servers Several attempts are made at designate intervals until the server responds with a time The time interval depends on certain factors and ranges UDP helps to avoid retries from using up network bandwidth if a time server with a large number of clients is no longer available Deeths 2001 7 4 2 1 Hierarchical Model NTP operates on a hierarchical model in which a small number of servers give time to a large number of clients The clients on each level are in turn a potential server to large number of clients of a higher numbered stratum 24 Stratum 0 ref clock Stratum 1 Stratum 2 Stratum 3 FIGURE 4 1 Hierarchical model of NTP Deeths 2001 7 Servers connected directly to a reference clock are termed stratum 1 servers A reference clock having a relationship with a stratum 1 server is a stratum O server Reference clock provide current time Clients cannot have an effective communication with a stratum O server unless they are connected to a stratum 1 server which is synchronized to a stratum O server Deeths 2001 8 Clients of stratum 1 servers are referred to as stratum 2 clients If they serve time to clients they are called stratum 2 servers and the clients they server are stratum 3 clients NTP can contain a stratum number of client up to 15 Reference clocks are situated on any NTP hiera
30. nput logic LOW VIL 1 0 VDC Digital Output Drive PIO 4 5 6 7 8 24 ma PIO 9 10 11 12 13 8 ma Power Consumption Sleep 4 uA Standby doze 15 mA Connected Idle RX 40 mA Connected TX 140 mA The degradation of radio signal is influenced by many factors such as diffraction refraction vehicle and building penetration These factors have more impact on the propagation of wireless signals with low power radios which are commonly found in WSNs Table 3 stipulates the radio characteristics 30 Table 3 Radio Characteristics Parameters Specifications Frequency 2402 2480 MHz Modulation 802 11b compatibility DSSS DBPSK OFDM Channel Intervals 5MHZ Channel 1 14 Transmission rater Over Air 1 11Mbps for 802 11b 6 54Mbps for 802 11g Receive sensitivity 85 dBm typ Maximum RF Input to UFL 10 dm connector The evaluation board in Fig 6 1 was connected to the computer through the WiFly GSX module The drivers were installed which enabled the programmer to appear as a USB Serial Port on a COM port The Evaluation board started with a green LED when inserted into the computer USB port as shown in Fig 6 2 The power that was used was provided to by soldering the 9 battery clip wire to J7 on the board and a 9V battery was attached to the clip 10 pin serial cable was connected to J3 on the board The battery triggered a blue and green LED to blink slowly The LED on the Evaluation b
31. o accomplish a high level of accuracy and a good network candidate since local NTP servers One of the ways accuracy was achieved was to minimize the latency between the various connections by inserting NTP servers on the same LAN as their clients Deeths 2001 16 6 3 5 Configuring Access Control Since the world is now populated with hackers trying to harness vital information data belonging to institutions and individuals it is imperative for monitoring to be turned off because it gives them the opportunity to gather sensitive information about hosts or networks Restricting access to NTP queries blocks intruders and hackers the privilege of exploring information with ntpd command Sensitive information to be retrieved by an intruder involves network delays which determine the network architecture hostnames IP addresses and Operating System version Deeths 2001 17 The function restrict keyword defined in the ntp config is used by NTP to restrict access to its services and functions allow localhost restrict 127 0 0 1 restrict 192 168 3 189 accept packets from restrict 192 168 3 100 mask 255 255 255 0 nomodify notrap restrict 192 168 3 101 mask 255 255 255 0 nomodify notrap restrict 192 168 3 189 mask 255 255 255 255 nomodify notrap noquery 41 restrict 192 168 3 100 mask 255 255 255 255 nomodify notrap noguery Access control mechanism and authentication provide a strong security establishment for NTP hence preven
32. oard has some indicators which ignite when the module is correctly configured Table 4 shows the various LED indicators on the board Jumper Block J2 LED Indicators WiFly 2 21 RN 131G PERATURE SEN E779 13FD31 Foc 1p U30 G2M5477 FE KO ex 00066613FD31 Teas PFY RS 232 Interface J1 w A5587 106 J ntenova 3 UART Interface J3 Sensors J4 Power J5 FIGURE 6 1 Evaluation board Roving Networks 2009 5 FIGURE 6 2 Evaluation board connected to USB Table 4 LED Indicators 31 Conditions Blue LED Red LED Yellow LED Green LED On Solid Not Used Connected over TCP Fast blink Not Used Not Associated Rx Tx data No IP Transfer address Slow blink Not Used Associated no internet IP address ok Off Not Used Associated internet ok 6 2 Configuring Rn 131g eval The Rn 131g eval modules function in two distinctive modes Data mode default and Command mode as shown in Fig 6 3 When the Rn 131g eval is operating in the data mode the WiFly module behaves as a data pipe The module accepts data processes 32 it over a Wi Fi and encapsulates the TCP IP header and trailers It later transfers the user data to the Universal Asynchronous Receiver Transmitter UART The module works on the TCP IP packet by processing the stored data and transfers it out over a Wi Fi The end processor is aware of the process of sending and re
33. om a close area Node localization assists in reporting sources of events group querying of sensors routing and locating network coverage Amitangshu 2010 1 17 3 TIME SYNCHRONIZATION Time plays an important role in the operation of any distributed systems and in wireless sensor networks in particular since they are supposed to observe and interact with physical phenomena Synchronization in a sensor network aims to provide a common timescale for local clocks of nodes in the network A global clock in a sensor system will help process and analyze the data correctly and predict future system behavior Some applications that require global clock synchronization are environment monitoring navigation guidance vehicle tracking etc A clock synchronization service for a sensor network has to meet challenges that are substantially different from those in infrastructure based networks 3 1 Relevance of Time Synchronization in WSN Most of the clocks in servers and other related networking devices keep track of inaccurate time The major reason for this deficiency is that designing a computer to store accurate time is not of importance to system manufactures because of cost and complexity Moreover even fairly accurate clocks are likely to vary due to manufacturing defects changes in temperature electric and magnetic interference Deeths 2001 4 The smallest errors in keeping time add up over a long period of time Most of the errors
34. onal Journal of Applied Engineering Research Dindigul Vol 1 No 4 2011 online pdf A Comparative Study of Time Synchronization Protocols in Wireless Sensor Networks accessed 15 November 2011 Available from http research ijcaonline org volume36 number11 pxc3976429 pdf Gowrishankar S Basavaraju T G Manjaiah D H amp Subir K S 2008 Proceedings of the World Congress on Engineering 2008 Vol I WCE 2008 online pdf Issues in Wireless Sensor Networks accessed 15 November 201 1 46 Available from http Awww iaeng org publication WCE2008 WCE2008 pp176 187 pdf Holger K amp Andreas W 2005 Protocols and Architectures for Wireless Sensor Networks Wiley Jangra Swati Richa amp Priyanka 2010 International Journal on Computer Science and Engineering IJCSE online pdf Wireless Sensor Network WSN Architectural Design Issues and Challenges accessed 15 November 2011 Available from http Awww enggiournals com ijcse doc IJCSE10 02 09 076 pdf Jeremy E amp Kay R 2002 A New Regime for Time Synchronization Princeton New Jersey online pdf Wireless Sensor Networks accessed 15 November 2011 Available from http www vs inf ethz ch publ papers wsn timesync pdf Kiyani F Aghaee_rad A amp Tahmasebi rad H 2011 nternational Journal of Computer Science and Network Security online pdf DATS A Distributed Algorithm for Time Synchronization in Wireless Sensor Network accessed
35. or node Processor Power Source ADC 12 The nodes commonly found in sensor networks are small and limited in the consumption energy thereby placing a large constraints on how the hardware is designed e Radio range of nodes is expected between 1 to 5 kilometers and paramount for making certain network connectivity and data collection e Energy consumption of the sensing device should be minimized and sensor nodes should be energy efficient since their limited energy resource determines their lifetime Gowrishankar Basavaraju Manjaiah amp Subir 2008 2 An operating system framework for a sensor node should be able to provide memory management and resource management in a restricted environment OS design issues in WSNs are presented as follows e A sensor node is mainly responsible for computation of the extracted data from the local environment It processes the extracted data and manipulates the data as required by the application e To minimize the consumption of battery energy certain components must be available Marco 2008 17 2 3 2 Wireless Radio Communication Characteristics The ability of sensor networks to communicate effectively and uniformly depends on the quality of the wireless communication systems available Certain factors impede wireless communication such as diffraction interference vehicle penetration and building penetration The basic block of communication in desi
36. rchy These are electronic clocks which are synchronized to a common time reference Reference clocks are to be accurate and precise The accuracy of other clocks is judged according to how close a clock is to a reference clock the network latency to the clock and the claimed accuracy of the clock Deeths 2001 6 8 NTP performs statistical values that compared the time to choose the one that is close to proximity These values are offset jitter frequency error and stability Thereby each NTP server maintains an approximation of the quality of its reference clock and itself The NTP FAQ and HOWTO 2006 25 5 TOOLS 5 1 Meinberg NTP Software Meinberg NTP Software is a software package that contains a background utility daemon or services which aids in synchronizing the computer system time to one or more external reference time sources which can either be devices on the network or a radio clock which is connected to a computer It provides accuracies within a millisecond on LANs and up to a few tens of milliseconds on WANS relative to Coordinated Universal Time UTC via a Global Positioning Service GPS receiver Typical NTP configurations utilize multiple redundant servers and diverse network paths in order to achieve high accuracy and reliability Meinberg NTP Software 2008 5 2 NTP Time Server Monitor The NTP Time Server Monitor allows the configuring and controlling the local NTP service with a user friendly graphical
37. s Meinberg NTP Software 2008 5 3 Roving WLAN Module Rn 131g eval The work was carried out with the help of Meinberg NTP Software and Roving WLAN module Rn 131g eval The Rn 131g eval module is a standalone embedded wireless 802 11 networking module which has a lot of networking capabilities and functionalities Rn 131g eval comes in a small form factor and consumes low power thereby enabling it to perform on many mobile wireless applications such as e Asset monitoring e GPS monitoring e Wireless audio e Industrial sensors and controls e Home automation and security ER e Home automation and security e Medical devices The WiFly GSX module combines 2 4 GHz radio processor TCP IP stack real time crypto accelerator power management and analog sensor interfaces It embodies networking applications such as DHCP DNS TCP ICMP and sockets When configuring the hardware reguires four connections PWR TX RX and GND to generate a wireless data connection Fig 5 2 shows the block diagram of WiFly GSX The sensor interface gives temperature audio motion acceleration and other analog data without additional infrastructure The WiFly GSX module is programmed and administered with a simple ASCII command language Once the WiFly is setup it can scan to locate an access point associate authenticate and connect over any WiFly network Roving Networks 2009 1 On board 128KB chip antenna RAM 32 bit 2MB Flash CPU ROM
38. s will be carried out with Meinberg NTP Software and Roving WLAN Network Rn 131g eval Wireshark will be installed to enable packets that travel from one node to another to be recorded with their designated timestamps The time obtained from the server connected to the external reference clock will be recorded and compared to ascertain the delays and errors 2 WIRELESS SENSOR NETWORK 2 1 Architecture of WSN The best way of divulging into the challenges of building a low power wireless communication platform is comprehending the intricacies of the system requirements for the communication mechanisms The main purpose of this chapter is to develop a general architecture that pinpoints the needs of the WSN It is designed to cooperate with the subsystem that permits for flexibility and application specific optimization of communication protocols while simultaneously obtaining high bandwidth and efficiency Sharma 2009 6 WSN systems are heterogeneous and complex Due to this nature it is imperative to carry out a due diligence on the design to ascertain the necessary parameters The latter can be solved by technological advancement which enables WSN to make good use of power optimization How far a WSN algorithm goes in the future depends on factors such as computation communication and storage cost which operate on different spectrum of the WSN Angora Swati Richa Priyanka 2010 2 2 2 Wireless Communication Requirements For com
39. shou t t ine 07 59 39 pline 294 Is 821662075419 ns estarts 1 ake 1 6 3 Configuring NTP NTP client performs their duties with the server through mutual understanding and engaging in communication The client initiates the process by sending a message in which the client responds with the sent message and an acknowledgement The NTP configuration file located at etc inet ntp config houses configuration data for the NTP daemon This section divulges into in configuring clients server access control and authentication 6 3 1 Configuring NTP Client NTP client on the hierarchical model consists of a number of servers broadcast and non broadcast servers that has the propensity to be used by the same client The main responsibility of the NTP client is to synchronize their allocated time in correspondence to the NTP server The NTP servers do not synchronize their time in consonance to the NTP client because NTP clients can also perform the duties of NTP servers to clients of their own accord Deeths 2001 4 Configuring NTP client behooves of the following server ns1 savonia fi server ntp a lab fi To avoid misunderstanding NTP clients are configured with the server keyword Two or more servers are used so that the one which the preferred time is chosen for synchronization When the preferred server fails which can be due to many factors the secondary server takes over the synchronization process 38 6 3 2 Configuring NTP Ser
40. that take place in computer clocks cannot be quantified easily Differences in clocks are caused by environmental electronic variations and miscalibrated clocks Deeths 2001 4 Time synchronization is insurmountable if clocks operate on the own their wavelength Time synchronization is needed for accuracy and precision Sensor nodes operating on a TDMA protocol need to agree on allocated time to prevent overlap and colliding of transmission which results in inaccuracies and error 3 2 Time Synchronization Protocol The majority of the applications of sensors networks depend on local clocks of sensor nodes for synchronization that rely on various degrees of precision Properties of sensor 18 networks such as limited amount of energy storage computation and bandwidth in addition to potentially high density of nodes poses a challenge for WSN Due to these developments in recent times there have been researches carried out by institutions specifically focused on designing synchronization algorithms for sensor networks This section presents in details the basic synchronization methods designed and proposed for sensor networks 3 2 1 Reference Broadcasting Synchronization RBS RBS proposed by Elson et al Elson Girod Estrin 2002 2 reduces the uncertainty of the sender by taking away the sender from the critical path By removing the sender the only ambiguity is the propagation and receives time Majority of the synchronization pro
41. the module to associate with the network whenever it is booted up The pass phrase for Wi Fi Protected Access WPA which provides authentication and encryption was configured as set wlan channel 6 set wlan join 1 Set wlan phrase wsnfinalwork Save Reboot 6 2 3 Configuring Ad Hoc Mode Adhoc is a point to point network in which each individual Wi Fi device is linked directly to every other Wi Fi device on the network There is no availability of access point In adhoc network the Wi Fi devices that are available cooperate in preserving the network 35 from malfunctioning The WiFly acted as an access point enabling other Wi Fi devices to be associated hence enhancing communication processes Configuring Adhoc mode can be done in two different ways either by Hardware or software During the course of the work the Adhoc mode was necessitated through software From the command mode the module was configured for adhoc mode with the join command set wlan join 1 set wlan ssid myfinalwork set wlan chan 6 DHCP was turned OFF to disable automatic IP assignment IP address and the netmask were manually assigned so that other devices know where to connect to the adhoc WiFly GSX set ip address 192 168 3 101 set ip netmask 255 255 255 0 set ip dhcp 1 After the IP address and netmask were configured the configurations were saved and reboot ushering the module into the adhoc mode Immediately the red LED began to blink fast i
42. ting intruders and hackers from gaining sensitive information 42 7 RESULTS Wireshark a network packet analyzer was installed on the host computer to assist in capturing network packets and displaying the packet data with its technical information When the host was connected to a network through a fast Ethernet the Wireshark captured and displayed the result shown in Fig 7 1 4 Frame 87 90 bytes on wire 720 bits 90 bytes captured 720 bits Ethernet II Src CameoCom cb 0f d2 00 40 f4 cb 0f d2 Dst RovingNe 13 ad 0c 00 06 66 13 ad 0c 4 Internet Protocol Version 4 Src 192 168 3 189 192 168 3 189 Dst 192 168 3 100 192 168 3 100 4 User Datagram Protocol Src Port ntp 123 Dst Port ssh 22 3 Network Time Protocol 7 Flags Oxic Peer Clock Stratum secondary reference 3 Peer Polling Interval invalid 0 Peer Clock Precision 0 000001 sec Root Delay 0 0506 sec Root Dispersion 0 3329 sec Reference ID 212 213 168 140 Reference Timestamp Oct 11 2011 09 54 42 757728000 UTC Origin Timestamp Jan 1 1970 00 00 00 000000000 UTC Receive Timestamp Oct 11 2011 10 18 37 790665000 UTC Transmit Timestamp Oct 11 2011 10 18 37 790696000 UTC 0000 00 06 66 13 ad Oc 00 40 f4 cb Of d2 08 00 45 00 f E 0010 00 4c 38 86 00 00 80 11 79 a9 c0 a8 03 bd c0 a8 LB Frasas 0020 03 64 00 7b 00 16 00 38 48 8a 1c 03 00 ec 00 00 d 8H 2030 Oc f6 00 00 55 3c d4 d5 a8 8c d2 3e 90 e2 cl
43. tocols deploy sender to receiver synchronization which involves the sender sending timestamp information to the receiver for synchronization Ranganathan Nygard 2010 2 RBS has clear distinction because it uses receiver to receiver synchronization RBS involves a third party broadcasting a beacon to all receivers A and B as shown in Fig 3 1 The beacon contains no timing information instead the receiver computes and compares their clocks ta and tb to find their relative phase offset The timing is based on when a node receive the reference beacon Ranganathan Nygard 2010 2 19 FIGURE 3 1 RBS Scheme Ranganathan Nygard 2010 2 3 2 2 Timing Synchronization Protocol for Sensor Networks TSPN TSPN is a sender and receiver based protocol which is needed to maintain accuracy when the number of node on a network increases It operates on two phases namely Level discovery phase and Synchronization phase At the discovery phase the phase generates a hierarchical topology in the network in which each node is designated a level A root node is given a level of 0 Vikstr m 2006 3 amp Ranganathan Nygard 2010 3 A node is designated level to a node of level 1 in the Synchronization phase When the synchronization phase draws to a close all the nodes are synchronized to the root node and the network wide synchronization is accomplished Vikstr m 2006 4 amp Ranganathan Nygard 2010 3 20 T2 T3 node B F 1
44. user interface which displays the current status of the local NTP service and external NTP services Fig 5 1 shows the service of the NTP Time Server Monitor when it is started 26 DI NTP Time Server Monitor by Meinberg 1 04 File Edit Help NTP Status NTP Configuration File Statistic Advanced Statistic Configuration Notification Logfile NTP Debug Information Service information Service configuration NTP version ntpd 4 2 4p8 lennon o Dec 09 10 46 55 UTC 01 00 2009 3 Control service Service name INTP Start Type Automatically v Display name Network Time Protocol Daemon Start NTP service Description Synchronizes the local system clock to a reference time source and eventually Restart NTP service provide this time to NTP and or SNTP clients Stop NTP service Path to EXE C Program Files NTP bin ntpd exe U 2 M g c C Program Files NTPhetc r Settings Log on as kt55333 Service information Service Status Started Application Log Service Stat Type Automatically MEINBERG ntpsvcio dll version 120 FIGURE 5 1 Service page The software is able to control and supervise the NTP service of windows over a manageable graphical user interface It reads the system parameters and displays them in a textbox for evaluation Additionally the current offset stratum value and the selected synchronization source is displayed in a status string The status refreshes automatically every 10
45. ver Configuring NTP server involves setting up a peer such as peer 192 168 3 189 peer 192 168 3 100 Drift file contains important information on the rate of the drift of a client clock Deeths 2001 4 When operational the NTP daemon xntpd acquires knowledge about the drift of the system clock in parallel to the reference clock The NTP FAQ and HOWTO 2006 For xntpd to commemorate the drift which is updated every hour this command was added to the configuration file driftfile etc ntp drift driftfile C Program Files NTP etc ntp drift One of the merits of using a drift file is that xntpd always make good use of the last written value as initial frequency correction after the system is restart In this situation the appropriate correction is configured faster because in absence of a drift file the initial frequency correction amounts to zero The NTP FAQ and HOWTO 2006 Broadcast and multicast servers were configured and were delineated with broadcast command in the ntp config file The broadcast address which sends data information to all devices connected to a network was configured and specified after the broadcast command broadcast 192 168 3 255 ttl 6 broadcast 224 0 0 1 multicast address 39 6 3 3 Configuring Authentication For authentication to emerge and progress in NTP both the client and the server must have a keys conf file stipulated in etc inet ntp config involving the key with the same key I
46. vg SAVONIA Time Synchronization Testing with Roving WLAN Network Samuel Nyarko Bachelor s Thesis Accepted SAVONIA UNIVERSITY OF APPLIED SCIENCES THESIS Abstract Field of Study Bachelor of Engineering Degree Programme Information Technology Author s Samuel Nyarko Title of Thesis Time Synchronization Testing With Roving WLAN Network Date 310ctober 2011 Pages Appendices 50 Supervisor s Mr Arto Toppinen Principal Lecturer Client Organization Partners Savonia University of Applied Sciences Abstract The main objective of this thesis was to synchronize the local clock system of a reference time source and provide the time to other NTP or SNTP clients using the roving Wlan module Rn 131g eval in conjunction with Meinberg NTP Software Time synchronization in WSN aims to provide a timescale for local clock of nodes in the network Wireless Sensor Networks WSNs are predominately used in today s networked environment which wirelessly connects small sensor nodes which have the ability of computation communication and sensing The sensor nodes collaborate to help in processing vital information data which are needed for computing and networking applications The thesis was carried out with the help of Roving WLAN Network Rn 131g eval and Meinberg NTP Time Server which is a graphical user interface which displays the current status of NTP status and NTP service The results

Download Pdf Manuals

image

Related Search

Related Contents

DeLOCK 46229  Istruzioni di installazione e manutenzione  Samsung RAC tipo  Samsung UD46E-C Käyttöopas  取扱説明書  Verbatim 1TB 3.5" SATA HDD  FHT-42107K-PM9  86464 DE ALDI N Cover RC1.indd  Science et Inexpliqué - Communication Intuitive  Oficina de Sistemas  

Copyright © All rights reserved.
Failed to retrieve file