SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
DOI : 10.5121/ijwmn.2014.6202 13
OSC-MAC: DUTY CYCLE WITH MULTI
HELPERS CT MODE WI-LEM TECHNOLOGY
IN WIRELESS SENSOR NETWORKS
Mbida Mohamed and Ezzati Abdellah
Emerging Technologies Laboratory (VETE), Faculty of Sciences and Technology Hassan
1st University, Settat, MOROCCO
ABSTRACT
Recently, Wireless Sensor Networks (WSNs) grow to be one of the dominant technology trends; new needs
are continuously emerging and demanding more complex constraints in a duty cycle, such as extend the life
time communication . The MAC layer plays a crucial role in these networks; it controls the communication
module and manages the medium sharing. In this work we use OSC-MAC tackles combining with the
performance of cooperative transmission (CT) in multi-hop WSN and the Wi-Lem technology
KEYWORDS
WSN, MAC, Wi-Lem, CT, schedule, Duty Cycle.
1. INTRODUCTION
The Protocol OSC-MAC (On-demand Scheduling Cooperative Mac) is a protocol with a planning
and request in order to solve the problems of energy of nodes transmitter, and gives as solution
the integration of the technique of cooperation with the nearby nodes. In our work we integrate
the Wi-Lem technology in order to delegate the nodes which have the higher energy and can be
into the cooperation with the source, this solution brings an optimality of energy because the
cooperative selection of nodes is applied in the Base station Wi-Lem, so we opted for 2 or more
nodes which can be into the CT (cooperative transmission) according to the number of packets
sending.
.
2. THE OSC-MAC PROTOCOL
As we know the life time of batteries is limited , what causes during the sending an imbalance
energy in nearby nodes , and results an exhaustion power of the TRN (Transmitter root node) , to
solve this problem we opt to initialize the technique by a phase of wakeup and decentralize the
responsibility of sending’s on the nearby nodes . Then according to the conception of nearby
nodes which want to cooperate with these neighbour’s and the others which refuse, during this
work we are going to explain the state of art the request list of the cooperative nodes for a
transmitter and the algorithm which engenders sending of packages by basing itself on the CT
(cooperative transmission) RDV . The cooperating nodes are neither on the same duty cycle nor
are they in the same collision domain. We use orthogonal and pipelined duty-cycle scheduling, in
part to reduce traffic contention, and devise a reservation-based wake-up scheme to bring
cooperating nodes into temporary synchrony to support CT range extension.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
14
The major sources of energy consumption inherent to MAC’s include idle listening, overhearing
and collision, besides data transmission and reception. Idle listening means that nodes keep
listening to the channel while there are no incoming packets at all - a case that has not been taken
care of in many MAC protocols such as IEEE 802.11 where in WIFI stations must listen for
possible traffic. Notably, idle listening is disastrous in WSNs based on the fact that nodes in this
mode consume the same magnitude of power as in receiving. Overhearing means that nodes
decode packets that are destined to others. Collisions result in corrupted packets and the following
MAC layer retransmissions consume extra energy. From the network perspective, albeit these
factors taper off individual node’s lifetime, the network lifetime is more critically limited by the
energy holes formed around the sink leaving unused energy outside of the holes. Many authors
have considered duty-cycle MAC protocols, which allow nodes to alternate between active and
sleep modes. These protocols dramatically reduce the periods of idle listening and overhearing.
3. SELECTION OF NODES IN ENERGY FACTOR BY USING THE WI-LEM
TECHNOLOGY
Instead of making a selection of nearby nodes in the transmitter which results an additional loss of
energy, for that reason we migrate this operation in a Wi-Lem station with large domain of
communication radio.
3.1. WI-Lem technology
LEM has just create the family of Wi-LEM (Wireless Local Energy Meter, wireless local meters
of energy) to allow the measure and the remote surveillance of the energy consumption as the
power of batteries nodes or the water as well as the temperature and the humidity. With these
meters, the industrial and tertiary companies can reduce their consumption of energy and water as
well as identify the points of improvement. On the whole range Wi-LEM, allowing a large
domain of communication radio between the nodes of the network, compared to the previous
generation.
3.2 The advantages of WI –Lem
Wi-LEM presents additional benefits compared to the traditional divisional meters in wsn:
• At the level of the electric cupboard
• At the level of the installation of the network and its exploitation.
The following figure (1) presents the operating Wi-Lem CT technology in wsn:
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
15
4. SELECTION OF THE NODES COOPERATION BY THE WI-LEM STATION
When a transmitter node wants to send its packets, first it transmit a packet request list of CTs
nodes to the station Wi-Lem by using an algorithm of selection nearby nodes possible to operate
in CTs periods , the algorithm (1) and the figure (2) illustrates this function :
Algorithm 1 : allocation of the CTs in the nearby nodes
Input : List of the nearby knots organized has the order decreasing by
percentage of energy : L
The number of (octets) sent per packet : S
Distance between transmitter and the next hop : D
Output : List of nearby nodes elected to transmit in CT phase :
LCT
For each li Є L do
If Eli >= ( Elect * S) + ( Empl * S * D ²) ;
LCT li ;
Else Li li+1 ;
End
Send LCt () ;
End
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
16
Figure 2: Diagram of the request /replay List CTs nearby
5. ELECTION OF THE NEARBY NODES WHICH WILL GO INTO THE CT MODE
Before the transmitter synchronizes its wakeup with the receiver as well as the nodes which want
to run in CT Mode, the sending of packets is made according to report energy of nodes CT : {
E ni ct (wi-lem) / i Є {1…n} , n : number of nearby node’s in wsn } obtained by the measurement
of energy nodes in station Wi-Lem, and also get the necessary energy to send N packets by
node transmitter : { E niT / i Є { 1…t} , t : t ith node transmitter } , for this reason we develop
The following algorithm (2) which explains the calculation of the necessary energy to transmit
one packets of L bits :
Algorithm 2 : Calculation of energy transmission packets for L bits E ni T
Input : Emp-data : amplifying energy
Efs : free space energy
Output : Energy of sending one packet with L bits
if d is distance and do=sqrt (efs/emp);
then sending L bit data over d distance
if d>=do ;
Energy=energy-(l*Etx+l*emp*(d^4));
else
Energy=energy-(l*Etx+l*efs*(d^2));
End
As a reference of the ratio energy of nodes and the energy of transmission packet of L bits
determine the number of helpers which are going to operate into the CT mode: the algorithm (3)
describes the process of delegation nearby nodes CT.
TRN
Demanding
Schedule CT
nearby
Replay Schedule Cts
nearby nodes
Station
Wi-Lem
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
17
Algorithm 3 : Selection of Elected nearby node CT
Input : Lists of the energy nodes which can enter in the CTs RDV : E L (ct )
Number of packets transmission : N
Output : List of elected nearby nodes : L ct-elu
For each ni Є E L (ct ) do
If E ni Ct / (N*E ni T) >= 1
L Ct-elu ni ;
ni ni +1 ;
Else ni ni +1 ;
Send L ct-elu() ;
End
6. ALLOCATION OF THE LISTS TRANSMISSIONS / RECEPTIONS PACKETS
In order to save the energy of every node sender we use a technique of Cooperative transmission
which shows itself by the use of the nearby nodes according to its energy levels which run in
routing mode of packets to the next hop, until the final Receiver. The transmission of packets are
initialized by a phase of wake up and allocation of the interval of sending’s which divides in no
CT and CT intervals , in order to have the transmitter node and the cooperative nodes ( helpers
) are synchronized with the FR (final receiver) , the figure 3 illustrate a description of this
technique :
Free period schedule
CT RDV period schedule
No-CT RDV period schedule
Hi (the helper’s) {the cooperative list nearby nodes / i Є {1 ... N}}
Figure 3: Diagram of allocation slot’s time wake up for the CT and No-CT packets
Non-CT
RDV
Non-CT
RDV
TRN
Hi
FR
CT RDV
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
18
The transmitter send a Super frame which defines the periods CT helpers and receiver in order to
maintain the period of wake up, and to forward packets in the next hop, the leader Helper with the
energy raised will send back a acknowledgement (ack) to inform the root transmitter node that the
CT’s meeting is reserved, the figure 4 describes this operative function. In no-Ct mode the sender
node send directly a request in the next hop, up to the final receiver by indicating that it is going
to transmit in a specific interval of time and the receiver will answer by a replay ack to inform it
that the reservation of interval time is accepted or rejected.
Transmission in CT Mode
Transmission in Non-CT Mode
Replay of helper leader
Figure 4: Diagram of transmission OSC-Mac by using CT Wi-Lem technology for 2 helpers
7. CONCLUSION
This paper propose the OSC-Mac Wi-Lem under exploitation of the cooperative transmission in
goal as a technology to extend the life time of nodes by migrating the operations of
classification energy’s nearby nodes from the sender node to the base station Wi-Lem , and to
list the nodes which are going probably to send into CTs periods .Indeed, it’s used to choose the
elected nearby nodes with higher power of the CTs period according to the number of packets
sending, and simultaneously putting the other nearby nodes in a sleeping mode .
TRN
Helper
leader
FR
Simple
Helper
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
19
REFERENCES
[1] [1] IEEE Std 802.11b-1999 (R2003),” LAN/MAN Standards Committee of the IEEE Computer
Society, IEEE-SA Standards Board, 2003.
[2] Jian Lin and Mary Ann Ingram School of Electrical and Computer Engineering Georgia Institute of
Technology, Atlanta, Georgia 30332–0250.
[3] J. Li and P. Mohapatra, “An analytical model for the energy whole problem in many-to-one sensor
networks,” in Proc. IEEE VTC 2005I.
[4] J. W. Jung and M. A. Ingram, “Residual-Energy-Activated Cooperative
[5] Transmission (REACT) to Avoid the Energy Hole,” in Proc. IEEE Int Communications Workshops
(ICC) Conf, 2010, pp. 1–5.
[6] Y. Sun, S. Du, O. Gurewitz, and D. B. Johnson, “DW-MAC: a low latency, energy efficient demand-
wakeup MAC protocol for wireless sensor networks,” in Proc. MobiHoc 2008. New York, NY, USA:
ACM.
[7] Synetica . Hilton House. High Street, Stone. Staffs. ST15 8AU U.K 2011.
[8] Salehdine Kabou sensor network energy, Bechar University, Algérie - Licence informatics 2010.
Authors
Mbida Mohamed received the B.Sc. degree in networks and Information Systems, from
Hassan 1 St University, Faculty of Sciences and Technology of Settat, Morocco,
in2009 and M.Sc. degree in Network and Computer engineering from the Hassan 1
St University, Faculty of Sciences and Techniques (FSTS), Settat, Morocco, in
2012.Currently pursuing his PhD in Networks and Security Engineering at the
Laboratory of Emerging Technologie (VETE) , from Hassan 1 st University, Faculty of
Sciences and Technology of Settat, Morocco. His main research areas are how to use
wireless sensor networks to secure and monitor mobile laboratories networks.
EZZATI Abdellah research Scientist in Faculty of Science and Technology in
Morocco.He obtained his PHD in 1997 in Faculty of science in Rabat and
member of the Computer commission in the same Faculty. Now is an associate
professor in Hassan First University in Morocco and he is the Head of Bachelor of
Computer Science .He participate to several project as the project Palmes which
elaborate a Moroccan Education Certification.

Weitere ähnliche Inhalte

Was ist angesagt?

IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid ApplicationsIEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
Spiros Louvros
 
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA AlgorithmsAn Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
Vignesh DJ Viki
 
Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...
Aayush Gupta
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
rajivagarwal23dei
 

Was ist angesagt? (18)

Network coding
Network codingNetwork coding
Network coding
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
 
Hybrid networking and distribution
Hybrid networking and distribution Hybrid networking and distribution
Hybrid networking and distribution
 
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid ApplicationsIEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
 
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA AlgorithmsAn Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
 
Traffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access ProtocolTraffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access Protocol
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
 
Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Float-based Pipeline Monitoring Network
Float-based Pipeline Monitoring NetworkFloat-based Pipeline Monitoring Network
Float-based Pipeline Monitoring Network
 
Distributed Spatial Modulation based Cooperative Diversity Scheme
Distributed Spatial Modulation based Cooperative Diversity SchemeDistributed Spatial Modulation based Cooperative Diversity Scheme
Distributed Spatial Modulation based Cooperative Diversity Scheme
 
Kanchan ppt
Kanchan pptKanchan ppt
Kanchan ppt
 
Protocol Enhancements in LEACH
Protocol Enhancements in LEACHProtocol Enhancements in LEACH
Protocol Enhancements in LEACH
 
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
 
93755181 lte-hoping
93755181 lte-hoping93755181 lte-hoping
93755181 lte-hoping
 
69 122-128
69 122-12869 122-128
69 122-128
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 

Andere mochten auch

Andere mochten auch (7)

Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 
The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...
 
Open Source Creativity
Open Source CreativityOpen Source Creativity
Open Source Creativity
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 

Ähnlich wie Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless sensor networks

Physical layer network coding
Physical layer network codingPhysical layer network coding
Physical layer network coding
Nguyen Tan
 
Iaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd Iaetsd
 

Ähnlich wie Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless sensor networks (20)

Ijcnc050207
Ijcnc050207Ijcnc050207
Ijcnc050207
 
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
 
Physical layer network coding
Physical layer network codingPhysical layer network coding
Physical layer network coding
 
Performance evaluation of energy
Performance evaluation of energyPerformance evaluation of energy
Performance evaluation of energy
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
 
IEEE CAMAD 2014
IEEE CAMAD 2014IEEE CAMAD 2014
IEEE CAMAD 2014
 
Iisrt seedha devi (networks)
Iisrt seedha devi (networks)Iisrt seedha devi (networks)
Iisrt seedha devi (networks)
 
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
 
A new method for controlling and maintaining
A new method for controlling and maintainingA new method for controlling and maintaining
A new method for controlling and maintaining
 
Iaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networks
 
Fo2510211029
Fo2510211029Fo2510211029
Fo2510211029
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
D031202018023
D031202018023D031202018023
D031202018023
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
 
A Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc NetworksA Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc Networks
 

Kürzlich hochgeladen

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 

Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless sensor networks

  • 1. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 DOI : 10.5121/ijwmn.2014.6202 13 OSC-MAC: DUTY CYCLE WITH MULTI HELPERS CT MODE WI-LEM TECHNOLOGY IN WIRELESS SENSOR NETWORKS Mbida Mohamed and Ezzati Abdellah Emerging Technologies Laboratory (VETE), Faculty of Sciences and Technology Hassan 1st University, Settat, MOROCCO ABSTRACT Recently, Wireless Sensor Networks (WSNs) grow to be one of the dominant technology trends; new needs are continuously emerging and demanding more complex constraints in a duty cycle, such as extend the life time communication . The MAC layer plays a crucial role in these networks; it controls the communication module and manages the medium sharing. In this work we use OSC-MAC tackles combining with the performance of cooperative transmission (CT) in multi-hop WSN and the Wi-Lem technology KEYWORDS WSN, MAC, Wi-Lem, CT, schedule, Duty Cycle. 1. INTRODUCTION The Protocol OSC-MAC (On-demand Scheduling Cooperative Mac) is a protocol with a planning and request in order to solve the problems of energy of nodes transmitter, and gives as solution the integration of the technique of cooperation with the nearby nodes. In our work we integrate the Wi-Lem technology in order to delegate the nodes which have the higher energy and can be into the cooperation with the source, this solution brings an optimality of energy because the cooperative selection of nodes is applied in the Base station Wi-Lem, so we opted for 2 or more nodes which can be into the CT (cooperative transmission) according to the number of packets sending. . 2. THE OSC-MAC PROTOCOL As we know the life time of batteries is limited , what causes during the sending an imbalance energy in nearby nodes , and results an exhaustion power of the TRN (Transmitter root node) , to solve this problem we opt to initialize the technique by a phase of wakeup and decentralize the responsibility of sending’s on the nearby nodes . Then according to the conception of nearby nodes which want to cooperate with these neighbour’s and the others which refuse, during this work we are going to explain the state of art the request list of the cooperative nodes for a transmitter and the algorithm which engenders sending of packages by basing itself on the CT (cooperative transmission) RDV . The cooperating nodes are neither on the same duty cycle nor are they in the same collision domain. We use orthogonal and pipelined duty-cycle scheduling, in part to reduce traffic contention, and devise a reservation-based wake-up scheme to bring cooperating nodes into temporary synchrony to support CT range extension.
  • 2. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 14 The major sources of energy consumption inherent to MAC’s include idle listening, overhearing and collision, besides data transmission and reception. Idle listening means that nodes keep listening to the channel while there are no incoming packets at all - a case that has not been taken care of in many MAC protocols such as IEEE 802.11 where in WIFI stations must listen for possible traffic. Notably, idle listening is disastrous in WSNs based on the fact that nodes in this mode consume the same magnitude of power as in receiving. Overhearing means that nodes decode packets that are destined to others. Collisions result in corrupted packets and the following MAC layer retransmissions consume extra energy. From the network perspective, albeit these factors taper off individual node’s lifetime, the network lifetime is more critically limited by the energy holes formed around the sink leaving unused energy outside of the holes. Many authors have considered duty-cycle MAC protocols, which allow nodes to alternate between active and sleep modes. These protocols dramatically reduce the periods of idle listening and overhearing. 3. SELECTION OF NODES IN ENERGY FACTOR BY USING THE WI-LEM TECHNOLOGY Instead of making a selection of nearby nodes in the transmitter which results an additional loss of energy, for that reason we migrate this operation in a Wi-Lem station with large domain of communication radio. 3.1. WI-Lem technology LEM has just create the family of Wi-LEM (Wireless Local Energy Meter, wireless local meters of energy) to allow the measure and the remote surveillance of the energy consumption as the power of batteries nodes or the water as well as the temperature and the humidity. With these meters, the industrial and tertiary companies can reduce their consumption of energy and water as well as identify the points of improvement. On the whole range Wi-LEM, allowing a large domain of communication radio between the nodes of the network, compared to the previous generation. 3.2 The advantages of WI –Lem Wi-LEM presents additional benefits compared to the traditional divisional meters in wsn: • At the level of the electric cupboard • At the level of the installation of the network and its exploitation. The following figure (1) presents the operating Wi-Lem CT technology in wsn:
  • 3. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 15 4. SELECTION OF THE NODES COOPERATION BY THE WI-LEM STATION When a transmitter node wants to send its packets, first it transmit a packet request list of CTs nodes to the station Wi-Lem by using an algorithm of selection nearby nodes possible to operate in CTs periods , the algorithm (1) and the figure (2) illustrates this function : Algorithm 1 : allocation of the CTs in the nearby nodes Input : List of the nearby knots organized has the order decreasing by percentage of energy : L The number of (octets) sent per packet : S Distance between transmitter and the next hop : D Output : List of nearby nodes elected to transmit in CT phase : LCT For each li Є L do If Eli >= ( Elect * S) + ( Empl * S * D ²) ; LCT li ; Else Li li+1 ; End Send LCt () ; End
  • 4. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 16 Figure 2: Diagram of the request /replay List CTs nearby 5. ELECTION OF THE NEARBY NODES WHICH WILL GO INTO THE CT MODE Before the transmitter synchronizes its wakeup with the receiver as well as the nodes which want to run in CT Mode, the sending of packets is made according to report energy of nodes CT : { E ni ct (wi-lem) / i Є {1…n} , n : number of nearby node’s in wsn } obtained by the measurement of energy nodes in station Wi-Lem, and also get the necessary energy to send N packets by node transmitter : { E niT / i Є { 1…t} , t : t ith node transmitter } , for this reason we develop The following algorithm (2) which explains the calculation of the necessary energy to transmit one packets of L bits : Algorithm 2 : Calculation of energy transmission packets for L bits E ni T Input : Emp-data : amplifying energy Efs : free space energy Output : Energy of sending one packet with L bits if d is distance and do=sqrt (efs/emp); then sending L bit data over d distance if d>=do ; Energy=energy-(l*Etx+l*emp*(d^4)); else Energy=energy-(l*Etx+l*efs*(d^2)); End As a reference of the ratio energy of nodes and the energy of transmission packet of L bits determine the number of helpers which are going to operate into the CT mode: the algorithm (3) describes the process of delegation nearby nodes CT. TRN Demanding Schedule CT nearby Replay Schedule Cts nearby nodes Station Wi-Lem
  • 5. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 17 Algorithm 3 : Selection of Elected nearby node CT Input : Lists of the energy nodes which can enter in the CTs RDV : E L (ct ) Number of packets transmission : N Output : List of elected nearby nodes : L ct-elu For each ni Є E L (ct ) do If E ni Ct / (N*E ni T) >= 1 L Ct-elu ni ; ni ni +1 ; Else ni ni +1 ; Send L ct-elu() ; End 6. ALLOCATION OF THE LISTS TRANSMISSIONS / RECEPTIONS PACKETS In order to save the energy of every node sender we use a technique of Cooperative transmission which shows itself by the use of the nearby nodes according to its energy levels which run in routing mode of packets to the next hop, until the final Receiver. The transmission of packets are initialized by a phase of wake up and allocation of the interval of sending’s which divides in no CT and CT intervals , in order to have the transmitter node and the cooperative nodes ( helpers ) are synchronized with the FR (final receiver) , the figure 3 illustrate a description of this technique : Free period schedule CT RDV period schedule No-CT RDV period schedule Hi (the helper’s) {the cooperative list nearby nodes / i Є {1 ... N}} Figure 3: Diagram of allocation slot’s time wake up for the CT and No-CT packets Non-CT RDV Non-CT RDV TRN Hi FR CT RDV
  • 6. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 18 The transmitter send a Super frame which defines the periods CT helpers and receiver in order to maintain the period of wake up, and to forward packets in the next hop, the leader Helper with the energy raised will send back a acknowledgement (ack) to inform the root transmitter node that the CT’s meeting is reserved, the figure 4 describes this operative function. In no-Ct mode the sender node send directly a request in the next hop, up to the final receiver by indicating that it is going to transmit in a specific interval of time and the receiver will answer by a replay ack to inform it that the reservation of interval time is accepted or rejected. Transmission in CT Mode Transmission in Non-CT Mode Replay of helper leader Figure 4: Diagram of transmission OSC-Mac by using CT Wi-Lem technology for 2 helpers 7. CONCLUSION This paper propose the OSC-Mac Wi-Lem under exploitation of the cooperative transmission in goal as a technology to extend the life time of nodes by migrating the operations of classification energy’s nearby nodes from the sender node to the base station Wi-Lem , and to list the nodes which are going probably to send into CTs periods .Indeed, it’s used to choose the elected nearby nodes with higher power of the CTs period according to the number of packets sending, and simultaneously putting the other nearby nodes in a sleeping mode . TRN Helper leader FR Simple Helper
  • 7. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 19 REFERENCES [1] [1] IEEE Std 802.11b-1999 (R2003),” LAN/MAN Standards Committee of the IEEE Computer Society, IEEE-SA Standards Board, 2003. [2] Jian Lin and Mary Ann Ingram School of Electrical and Computer Engineering Georgia Institute of Technology, Atlanta, Georgia 30332–0250. [3] J. Li and P. Mohapatra, “An analytical model for the energy whole problem in many-to-one sensor networks,” in Proc. IEEE VTC 2005I. [4] J. W. Jung and M. A. Ingram, “Residual-Energy-Activated Cooperative [5] Transmission (REACT) to Avoid the Energy Hole,” in Proc. IEEE Int Communications Workshops (ICC) Conf, 2010, pp. 1–5. [6] Y. Sun, S. Du, O. Gurewitz, and D. B. Johnson, “DW-MAC: a low latency, energy efficient demand- wakeup MAC protocol for wireless sensor networks,” in Proc. MobiHoc 2008. New York, NY, USA: ACM. [7] Synetica . Hilton House. High Street, Stone. Staffs. ST15 8AU U.K 2011. [8] Salehdine Kabou sensor network energy, Bechar University, Algérie - Licence informatics 2010. Authors Mbida Mohamed received the B.Sc. degree in networks and Information Systems, from Hassan 1 St University, Faculty of Sciences and Technology of Settat, Morocco, in2009 and M.Sc. degree in Network and Computer engineering from the Hassan 1 St University, Faculty of Sciences and Techniques (FSTS), Settat, Morocco, in 2012.Currently pursuing his PhD in Networks and Security Engineering at the Laboratory of Emerging Technologie (VETE) , from Hassan 1 st University, Faculty of Sciences and Technology of Settat, Morocco. His main research areas are how to use wireless sensor networks to secure and monitor mobile laboratories networks. EZZATI Abdellah research Scientist in Faculty of Science and Technology in Morocco.He obtained his PHD in 1997 in Faculty of science in Rabat and member of the Computer commission in the same Faculty. Now is an associate professor in Hassan First University in Morocco and he is the Head of Bachelor of Computer Science .He participate to several project as the project Palmes which elaborate a Moroccan Education Certification.