scholarly journals Perancangan dan Analisis Antena Dipole Pada Frekuensi 2,4 GHz Untuk Modul Xbee S2 Pro Menggunakan HFFS 14.0

AVITEC ◽  
2020 ◽  
Vol 2 (1) ◽  
Author(s):  
Shinta Romadhona ◽  
Diana Alia ◽  
Maya Zulfida

Xbee s2 pro module works at 2,4 Ghz using IEEE 802.15.4 standard and polarization are linear. There are many types of antennas that can be used, which one is the dipole antenna. The simulation model implemented in this study uses Ansoft HFSS 14.0 software. HFSS stands for high frequency structure simulator is a pioneer in the use of finite element method for electromagnetic wave simulators that implement tangential vector finite elements, adaptive meshing and Adaptive Lanczos-Pade Sweep (ALPS) technology. By using HFSS 14.0 simulation, the axial ratio value of 35.0359 dB that means linier polarization. For the value of s-parameter -21,1851 db and VSWR value approaches 1, that is 1.5195 db. The gain value obtained is 0.7469 dB, the gain value needs to be optimized by using a metamaterial to get a good gain.

2018 ◽  
Vol 11 (1) ◽  
pp. 78 ◽  
Author(s):  
Yasmin M. Amin ◽  
Amr T. Abdel-Hamid

The IEEE 802.15.4 standard defines the PHY and MAC layer specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs). With the proliferation of many time-critical applications with real-time delivery, low latency, and/or specific bandwidth requirements, Guaranteed Time Slots (GTS) are increasingly being used for reliable contention-free data transmission by nodes within beacon-enabled WPANs. To evaluate the performance of the 802.15.4 GTS management scheme, this paper introduces a new GTS simulation model for OMNeT++ / MiXiM. Our GTS model considers star-topology WPANs within the 2.4 GHz frequency band, and is in full conformance with the IEEE 802.15.4 – 2006 standard. To enable thorough investigation of the behaviors and impacts of different attacks against the 802.15.4 GTS mechanism, a new GTS attacks simulation model for OMNeT++ is also introduced in this paper. Our GTS attacks model is developed for OMNeT++ / NETA, and is integrated with our GTS model to provide a single inclusive OMNeT++ simulation model for both the GTS mechanism and all known-to-date attacks against it.


Author(s):  
Dao Xuan Uoc

Zigbee wireless network built on IEEE 802.15.4 standard is becoming one of the most popular wireless networks in modern IoT devices. One of the disadvantages of Zigbee networks is the short transmission distance between devices. This paper focuses on researching and comparing routing algorithms in Zigbee networks, thereby building the optimal routing algorithm in the existing system. The paper’s objective is to form the basis for making Zigbee tree and mesh networks, which improves the transmission distance for Zigbee networks better than the star network.


2020 ◽  
Vol 16 (3) ◽  
pp. 254-259
Author(s):  
Yehia R. Hamdy ◽  
Ahmed I Alghannam

ZigBee is widely used in wireless network in Internet of Things (IoT) applications to remotely sensing and automation due to its unique characteristics compared to other wireless networks. According to ZigBee classification of IEEE 802.15.4 standard, the network consists of four layers. The ZigBee topology is represented in second layer. Furthermore, the ZigBee topology consists of three topologies, star, tree and mesh. Also there are many transmission bands allowed in physical layer, such as 2.4 GHz, 915 MHz, 868 MHz. The aim of this paper is to evaluate the effect of ZigBee topologies on End to End delay and throughput for different transmission bands. Riverbed Modeler is used to simulate multiple ZigBee proposed scenarios and collect the results. The results of the study recommend which topology should be used at each transmission band to provide lowest End to End delay or obtain maximum throughput, which is case sensitive in some IoT applications that required for example minimum delay time or sending high amount of data.


Author(s):  
Carlos Lino ◽  
Carlos Tavares Calafate ◽  
Pietro Manzoni ◽  
Juan-Carlos Cano ◽  
Arnoldo Díaz

The performance of wireless sensor networks (WSNs) at monitoring time-critical events is an important research topic, mainly due to the need to ensure that the actions to be taken upon these events are timely. To determine the effectiveness of the IEEE 802.15.4 standard at monitoring time-critical events in WSNs, we introduce a routing scheme based on drain announcements that seeks minimum routing overhead. We carried out a novel performance evaluation of the IEEE 802.15.4 technology under different conditions, to determine whether or not near-real-time event monitoring is feasible. By analyzing different simulation metrics such as packet loss rate, average end-to-end delay, and routing overhead, we determine the degree of effectiveness of the IEEE 802.15.4 standard at supporting time-critical tasks in multi-hop WSNs, evidencing its limitations upon the size and the amount of traffic flowing through the network.


Author(s):  
Aftab Ahmad

In this chapter, a novel performance model for assessing security of a layered network has been proposed. The work is motivated by the fact that there is a need for a reference framework to account for all threats to a networked system. There are few such models available, and one of them is recommended by the International Telecommunications Union (ITU). The proposed assessment model is based on the ITU security framework, recommended in the ITU-T Recommendation X.805. We employ this model to quantify network security against five threat categories mentioned in the recommendations. The quantification has been done based on the recommended measures against all threats. A threat vector has been proposed that defines required measures for a particular threat category. Other vectors, such as the security implementation vector define how effectively these measures are implemented in a given device, system, or network. As a simple application of the proposed model, the security provided by the IEEE 802.15.4 standard is analyzed, viewing it as an ‘end-to-end’ system (e.g., for ad hoc sensor network applications). The proposed security assessment model can be applied to any type of network (wireless, wired, optical, service oriented, transport, etc.). The model can be employed to obtain security assessment in the form of five security metrics, one for each threat category (destruction, corruption, removal, disclosure, and interruption). An expression for the overall security against all threats has also been derived.


Author(s):  
Cedric Chauvenet ◽  
Bernard Tourancheau ◽  
Denis Genon-Catalot ◽  
Pierre-Emmanuel Goudet ◽  
Mathieu Pouillot

The evolution of technology has made the connection of all types of devices to IP networks possible. In this paper, the authors investigate the possible usage of IPv6 in sensor networks connected through the Power Line Communication (PLC) non-wireless medium and demonstrate possible interoperability. This work is based on the adaptation of the IEEE 802.15.4 standard protocol constrained by the low-power, lossy and low data-rate context of PLC transceiver that uses pulse modulation. The aim is to provide interoperability features with other media using a robust and reliable communication stack. The target application of such results ranges from smart metering and environment monitoring to home control and urban area energy efficiency applications. This paper proposes the first adaptation of the IEEE 802.15.4 standard commons for the PLC medium. Following this standard interface, the authors demonstrate data communication on PLC with low power energy requirement using the pulse PLC physical layer. This paper also presents an initial implementation of the Routing Protocol for Low power and lossy networks (RPL) setup proposed by the IETF working group. In this context, the authors demonstrate interoperability in a testbed between PLC and Wireless Sensor Networks (WSN).


Sign in / Sign up

Export Citation Format

Share Document