SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 8, No. 1, February 2018, pp. 87~93
ISSN: 2088-8708, DOI: 10.11591/ijece.v8i1.pp87-93  87
Journal homepage: http://iaescore.com/journals/index.php/IJECE
Evaluation of Energy Consumption using Receiver–Centric
MAC Protocol in Wireless Sensor Networks
Ananda Kumar K S1
, Balakrishna R2
1
Dept of ISE, RajaRajeswari College of Engineering, Bangalore-560074, India
2
RajaRajeswari College of Engineering, Bangalore-560074, India
Article Info ABSTRACT
Article history:
Received Apr 2, 2017
Revised Aug 20, 2017
Accepted Sep 4, 2017
At present day’s wireless sensor networks, obtain a lot consideration to
researchers. Maximum number of sensor nodes are scattered that can
communicate with all others. Reliable data communication and energy
consumption are the mainly significant parameters that are required in
wireless sensor networks. Many of MAC protocols have been planned to
improve the efficiency more by enhancing the throughput and energy
consumption. The majority of the presented medium access control protocols
to only make available, reliable data delivery or energy efficiency does not
offer together at the same time. In this research work the author proposes a
novel approach based on Receiver Centric-MAC is implemented using NS2
simulator. Here, the author focuses on the following parametric measures
like - energy consumption, reliability and bandwidth. RC-MAC provides
high bandwidth without decreasing energy efficiency. The results show that
0.12% of less energy consumption, reliability improved by 20.86% and
bandwidth increased by 27.32% of RC-MAC compared with MAC IEEE
802.11.
Keyword:
Bandwidth
Energy consumption
Medium access control
Receiver centric MAC
Wireless sensor networks
Copyright © 2018 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Ananda Kumar K S,
Dept of ISE,
RajaRajeswari College of Engineering,
Bangalore-560074, India.
Email: anandgdk@gmail.com
1. INTRODUCTION
The Wireless Sensor Network (WSN) is advanced technology and build up with that has been
incorporated into one of the best emerging areas in the communication industry [1]. A number of small
wireless sensor nodes are used to exchange information for a long time with a limited battery power capacity
in wireless sensor networks. The most important power factor consumption of a node is radio. MAC protocol
controls the radio of the sensor node [2].
Generally, wireless sensor networks constitute many numbers of nodes. In Figure 1 depicts that the
functionality for dissimilar types of nodes that appearance a wireless network to exist to control their spatial
mobility exclusive of lose functionality. Nodes should be capable to detect neighbor nodes in a network and
to vigorously correlate to coordinators based on their position [3].
Each node is connected to either one or many nodes. Consider a generic communication network,
that network combine nodes and communication links. Every node produces information designed for each
node and all other nodes in the network. Distinctive routing scheme considers to deal with various grouping
of the follow a) minimize the cost and complexity b) prevention of unreliable communication links,
c) maximize network throughput d) minimize end to end delay [4].
Sensor nodes operate with a tiny battery that consumes more power while propagation of a signal,
so that energy efficiency is considered as major criteria for designing several MAC protocols. Radio is the
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 87 – 93
88
central part of any sensor node and that consumes more power during communication. The competent MAC
protocol is capable of enhancing lifetime of several sensor networks. MAC layer protocols in wireless sensor
network are classified into four categories: a) synchronous awaking of nodes, b) asynchronous awaking of
nodes, c) slotting of frames and d) multi channel approach.
Duty cycle is one of the foremost attribute of asynchronous and synchronous protocols, at this
juncture any node can exchange among sleep and active states to save energy, while nodes are able to
communicate in active state. Asynchronous MAC protocols are based on the type of communication between
two nodes dissimilar in active/sleep mode. In synchronous MAC protocols, all nodes are synchronized at the
same time [5].
Medium Access Control is traditionally viewed as an element of the data link layer in the OSI
model. Here, coordinates the use of a common transmission medium in multiuser systems and ensure reliable
communication greater than interference free channels for each one user [6], [10]. The fundamental
prerequisite of a sensor network is reliable delivery of information with lowest amount latency and energy
consumption.
On the other hand, the majority MAC protocols were proposes of their concerned about the users are
self-governing of each other and challenge for the use of the general transmission channel.
Outstanding to the strict resource constraint of sensor networks, two properties of the system were
frequently exploited for designing sensor network MAC protocols: a) the application – needy objectives and
b) the helpful nature of the scattered sensors [7].
CSMA is one of the mainly accepted choices for random access networks due to its simplicity and
efficient design. Each user has a communication to transmit first senses the channel to see whether or not
there is an enduring transmission from further users before it transmit its own data for communication. Hence
an attempt was made to avoid collision with other users. When a collision occurs at the destination, each
transmitting user wait for a unsystematic back in time before it makes a challenge to transmit the message
again. Widely adopted protocol the multiple access with collision avoidance (MACA) protocol that
introduce a three way handshake between the transmitter and receiver to solve the familiar hidden terminal
problem present in usual CSMA [8].
Three-way handshake planned in MACA resolve this difficulty by having every user transmit a
Request-To-Send (RTS) message. At any time it has a packet to send, representing the destination and the
length of the deliberate data transmission. The destination user successfully receives the RTS message and
has not fulfilled a handshake previously with further nodes; it then decides to respond with a Clear-To-Send
(CTS) packet indicating that it is set for the reception. The source then sends an information packet to the
destination once the CTS are received [9]. The mechanism of CTS and RTS is shown in Figure 2.
Pei Huang et al, proposed a novel method in by improving the throughput under the heavy traffic
load on wireless sensor networks. They discussed the receiver centric development by utilizing the data
gathering tree structure in wireless sensor networks [1].
Yeah –time Yong et al, proposed in the method of different transmission range and sensing range
for managing dynamic traffic loads in wireless sensor networks. Here limitations are time offer of a
transmission, retransmission and high frequency of retransmission [2].
Umesh et al proposed RC-MAC protocol focused on end to end reliable communication and increase the
lifetime of the sensor network [4].
Figure 1. Wireless Sensor Network Figure 2. Mechanisms of CTS and RTS
2. RESEARCH METHOD
2.1. Algorithm for RC-MAC
Step 1: Each node sends a beacon message for checking the node status. A node status defines whether the
node is sleep node or wake up a node (nib). nib-neighbor id
Int J Elec & Comp Eng ISSN: 2088-8708 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in …. (Ananda Kumar K S)
89
Step 2: It sends the RTS/CTS message for getting the channel status. After it forms the frame in terms of
bandwidth and slot time TX
Step 3: Maximum allowed queue process to be utilized at every transmission slots at T-sec. T-sec –
Transmission seconds
Step 4: Tr->propagation variance of delay when transmitter receiver distance is rx. Tr-Transmission rate, rx –
reception rate
Step 5: Probability of delivered rate of new entity in (nb) access slots. nb- neighbor node
Step 6: It enters the channel scheduling for assign the channel to communicate. Channel scanning is
completed by number of slots per super-frame.
Step 7: Receiver node establish that average one hop delay is high it chooses a shortest path. Energy level is
beyond a specified threshold time schedule of helper is not affected
Step 8: First and second cycle includes a cooperative transmission and node updates its status information to
intermediate nodes.
Step 9: Receiver nodes have advanced than transmitter node then co-operative transmission will be applied.
Step 10: Analyze the estimated signal interference level. Adjusted of each frame is done as per number of
access slots. If it reaches limited threshold it processed a duration.
Step 11: Then it enters noise interference level and estimate the level. Packets are assigned into priority level.
Packet transmissions begin with congestion dance.
2.2. Flowchart for RC-MAC Algorithm
In flowchart to transmit data, it’s moved from top to bottom, followed by different levels like
channel scanning, send RTS, wait CTS, congestion avoidance and processing. In Figure 3, the author
proposed the new approach in the form of algorithm. It explains the details in the form of flowchart.
Figure 3. Flowchart for RC-MAC Algorithm
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 87 – 93
90
3. RESULTS AND ANALYSIS
NS 2 is chosen for the simulation as set-up consists of the massive network. Set-up contains 100
nodes; size of the packet is 780 bytes, routing protocol is AODV. MAC Protocols used are IEEE 802.11 and
RC-MAC. Topology used is MANET. Here table 1 gives the informations used in simulations of
experiments.
Table 1. Network Simulation Parameters
Parameter Name Parameter Value
No Of Nodes 100
Node Type Static
Area Of Simulation 1000x 1000
Traffic Cbr
Channel Type Wireless Channel
3.1. Analysis of Energy consumption, Reliability and Bandwidth in RC-MAC
Figure 4, shown the results of proposed work in terms of energy consumption versus simulation
time and in slots of simulation time in 10, 15 & 20 sec. Every time energy consumption will increase with
simulation time. The RC-MAC protocol used as MAC protocol in the wireless sensor networks. When node
resolute to send information packet, by communication media like wireless media. It will send the data, else
goes to wait. Each time information should be moved from the application layer to the physical layer.
The measurement made for performance characteristic of RC-MAC reliability and obtain values are
shown in Figure 5. In Figure 5 the author proposed in this work the slots of simulation time in 10, 15 & 20
sec. Every time reliability will increase with simulation time. The RC-MAC protocol used as MAC protocol
in the wireless sensor networks. Reliability in wireless sensor networks be able to examine from together the
packet level and event level.
Figure 4. RC-MAC: Energy Consumption Vs
Simulation time
Figure 5. RC-MAC Reliability Vs Simulation time
Figure 6. RC-MAC: Bandwidth Vs Simulation time
Int J Elec & Comp Eng ISSN: 2088-8708 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in …. (Ananda Kumar K S)
91
In Figure 6, the proposed work is the slots of simulation time/bandwidth in 10, 15 & 20 sec. Every
time bandwidth will increases with simulation time. Bandwidth increases from 365 to 787.
3.2. Performance Analysis of Energy consumption, Reliability and Bandwidth, Comparison of
RC-MAC with MAC IEEE 802.11
Energy consumption is inversely propositional to the energy expenditure. Energy consumption is
calculated by implementing MAC and implementing RC-MAC. Figure 7 compares the energy consumption
of MAC protocol and RC-MAC protocol. Energy consumption is high in MAC protocol; it’s less in RC-
MAC protocol. RC-MAC protocol that allows node to proficiently make use of multiple channel by dropping
needless channel switching. Receiver-Centric MAC protocol avoids the interference owed to get better
communication throughput of wireless sensor network. From the obtained results, the MAC will consume
energy more by 0.12% than RC-MAC.
Reliability consist capability to retransmit lost packets, locally or end to end, to guarantee successful
delivery. However, any sensor network that is deploying to supply to a significant application will need
mechanism to make sure that reliability of data delivery from the sink to the sensors. By using upstream and
downstream message is carried out in wireless sensor network. For upstream message, the sender is a sensor
node and receiver node is a sink node. For downstream message, the sender is a sink node and receiver node
is a sensor node. Figure 8 shows that comparison of reliability of MAC and RC-MAC. Here RC-MAC
protocol has more reliable compared to MAC protocol. The results show that reliability is improved by
20.86 % in RC-MAC, compared with MAC.
Figure 7. Comparison of Energy Consumption of
MAC and RC-MAC
Figure 8. Comparison of Reliability of MAC and
RC-MAC
Figure 9. Comparison of Bandwidth of MAC and RC-MAC
Bandwidth represents the quantity of data that can be transmitted over a network in a given quantity
of time, frequently spoken in bits per second or bps in wireless sensor network. Figure 9 shows that,
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 87 – 93
92
comparison of bandwidth of MAC and RC-MAC protocols, here compared to RC-MAC existing MAC have
less bandwidth. A result shows that bandwidth increased by 27.32% of bandwidth in RC-MAC compared
with MAC 802.11.
4. CONCLUSION
From the obtained results of the current proposed method, RC-MAC protocol mainly focus on
energy consumption, reliability and end to end delay. The factors of congestion control, reliability and energy
consumption would help in dropping packet failure rate which results an energy efficient process of the
network. In this paper systematically evaluated the current technique using NS2 simulator, the simulation
results and analysis of parametric measures like - energy consumption, reliability and bandwidth are exposed
and comparing this results with other protocols. Here, the RC-MAC protocol shown better performance and
efficiency. The proposed protocol will shows better performance in terms of energy consumption and
reliability. Here, the proposed method obtained an improvement in terms of 0.12% of less energy
consumption, reliability improved by 20.86% and bandwidth increased by 27.32% of RC-MAC compared
with MAC IEEE 802.11.
ACKNOWLEDGEMENTS
The author would like to express sincere thanks for encouragement and constant support provided
by the Management RRGI, and Principal RajaRajeswari College of Engineering, Bangalore-74, India during
this research work.
REFERENCES
[1] Huang, Pei, Chen Wang, and Li Xiao, "RC-MAC: A receiver-centric MAC protocol for event- driven wireless
sensor networks," IEEE Transactions on Computers 64.4 : 1149- 1161, 2015
[2] Yueh-Tiam Yong, C.E. Tan , Zen, K., “Long Transmission Range Performance Evaluation on RI- MAC protocol
in Wireless Sensor Networks,” International Journal of Advanced Research in Computer and Communication
Engineering, Vol. 3, Issue 11, November 2014.
[3] D. N. Wategaonkar and V. S. Deshpande, "Characterization of reliability in WSN," 2012 World congress on
Information and Communication Technologies,Trivandrum, pp.970-975, 2012
[4] UK Singh, KC Phuleriya, RJ Yadav, “Real Time Data Communication Medium access control (RCMAC)
Protocol for Wireless Sensor Networks (WSNs),” International Journal of Emerging Technology and Advanced
Engineering, ISSN 2250-2459, Volume 2, Issue 5, May 2012.
[5] Ananda Kumar K S; Balakrishna R; “Development of Energy-Efficient and Data Collection Protocol for
heterogeneous Wireless Sensor Networks,” ITSI Transactions on Electrical and Electronics Engineering (ITSI-
TEEE), ISSN (PRINT): 2320 – 8945, Volume -4, Issue -2, 2016.
[6] Ananda Kumar K, S, Balakrishna R; “Study on Energy Efficient Routing Protocols in Wireless sensor
Networks,” International Journal of Advanced Research in Computer Science and Software Engineering,
ISSN: 2277 128X,Vol 5, Issue 11, pages 702-705,2015.
[7] Ananthram Swami, Qing Zhao, Yao-Win Hong, Lang Tong, “Wireless Sensor Networks: Signal Processing and
Communications,” John Wiley & Sons, 2007.
[8] A. Kakria and T. C. Aseri, "Survey of synchronous MAC protocols for Wireless Sensor Networks," 2014 Recent
Advances in Engineering and Computational Sciences (RAECS), Chandigarh, pp. 1-4, 2014
[9] Ravi Kodavarti, "Overcoming QoS, Security Issues in VoWLAN Designs", Texas Instruments, April, 2003.
[10] Patil, A. V., and A. Y. Kazi, "Performance analysis of IEEE 802.15. 4 sensor networks," Computing,
Communications and Networking Technologies (ICCCNT), 2013 Fourth International Conference on. IEEE,
2013.
BIOGRAPHIES OF AUTHORS
Ananda Kumar K S. Obtained B.Tech Degree from Koneru Lakshmaiah College of Engineering,
Guntur, Acharya Nagarjuna University, Andhrapradesh. Obtained M.Tech Degree from
R.V.College of Engineering, Bangalore, Visvesvaraya Technological University, Belagavi,
Karnataka. Currently he is pursuing Ph.D from Visvesvaraya Technological University, Belagavi,
Karnataka. He is Working as Asst.Professor in Dept of Information Science and Engineering,
RajaRajeswari College of Engineering, Bangalore, India. His Research area interests are in the
field of Wireless Sensor Networks, Data Mining, Bioinformatics.
Int J Elec & Comp Eng ISSN: 2088-8708 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in …. (Ananda Kumar K S)
93
Balakrishna R is currently working as a Principal & Professor, in RajaRajeswari College of
Engineering. His research and professional career spans about 16 years of Teaching & research, 1
Year Industrial Experience at TCS. His expertise is primarily in the domains of Ad hoc Networks,
Mobile Computing, Networks, and Distributed OS. He obtained his M.Tech. from Maharshi
Dayanad University and subsequently Ph.D from Sri Krishnadevaraya University. He is a life
member of professional bodies ISTE, CSI, IAENG etc. He has published 42 papers in peered
International Journals, 23 papers in International and National Conferences. He has guided 9
M.Tech, 6 Masters and 30 B.E students projects. Currently he is guiding 5 PhD scholars, 2
M.Sc.Engg.ByResearchatVTU.

More Related Content

What's hot

Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...
ijwmn
 
Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2
Rushin Shah
 
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax NetworkReduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
inventionjournals
 

What's hot (20)

Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
 
Qo s oriented distributed routing protocols : anna university 2nd review ppt
Qo s   oriented  distributed routing  protocols : anna university 2nd review pptQo s   oriented  distributed routing  protocols : anna university 2nd review ppt
Qo s oriented distributed routing protocols : anna university 2nd review ppt
 
Interference Aware Multi-path Routing in Wireless Sensor Networks
Interference Aware Multi-path Routing in Wireless Sensor NetworksInterference Aware Multi-path Routing in Wireless Sensor Networks
Interference Aware Multi-path Routing in Wireless Sensor Networks
 
40520130101003
4052013010100340520130101003
40520130101003
 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architecture
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
 
Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2
 
ShortPaper
ShortPaperShortPaper
ShortPaper
 
A survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networksA survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networks
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
 
ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...
ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...
ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...
 
Advanced Networking on GloMoSim
Advanced Networking on GloMoSimAdvanced Networking on GloMoSim
Advanced Networking on GloMoSim
 
QOD routing protocols : phase 1 ppt
QOD routing  protocols : phase 1 pptQOD routing  protocols : phase 1 ppt
QOD routing protocols : phase 1 ppt
 
Hybrid wireless network -0th review
Hybrid wireless network -0th review Hybrid wireless network -0th review
Hybrid wireless network -0th review
 
B010340611
B010340611B010340611
B010340611
 
A2546035115
A2546035115A2546035115
A2546035115
 
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax NetworkReduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
 
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...
Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...
 

Similar to Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wireless Sensor Networks

Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetImproved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
IJERA Editor
 
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
TELKOMNIKA JOURNAL
 

Similar to Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wireless Sensor Networks (20)

Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...
 
PROGRESS 1& 2.ppt
PROGRESS 1& 2.pptPROGRESS 1& 2.ppt
PROGRESS 1& 2.ppt
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
B04020812
B04020812B04020812
B04020812
 
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetImproved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
 
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
 
B010611015
B010611015B010611015
B010611015
 
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor network
 
40120140503011
4012014050301140120140503011
40120140503011
 
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc Network
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
 
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
 
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
 

More from IJECEIAES

Predicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningPredicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learning
IJECEIAES
 
Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...
IJECEIAES
 
Situational judgment test measures administrator computational thinking with ...
Situational judgment test measures administrator computational thinking with ...Situational judgment test measures administrator computational thinking with ...
Situational judgment test measures administrator computational thinking with ...
IJECEIAES
 
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
IJECEIAES
 
Application of deep learning methods for automated analysis of retinal struct...
Application of deep learning methods for automated analysis of retinal struct...Application of deep learning methods for automated analysis of retinal struct...
Application of deep learning methods for automated analysis of retinal struct...
IJECEIAES
 
Predictive modeling for breast cancer based on machine learning algorithms an...
Predictive modeling for breast cancer based on machine learning algorithms an...Predictive modeling for breast cancer based on machine learning algorithms an...
Predictive modeling for breast cancer based on machine learning algorithms an...
IJECEIAES
 

More from IJECEIAES (20)

Predicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningPredicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learning
 
Taxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca AirportTaxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca Airport
 
Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...
 
Ataxic person prediction using feature optimized based on machine learning model
Ataxic person prediction using feature optimized based on machine learning modelAtaxic person prediction using feature optimized based on machine learning model
Ataxic person prediction using feature optimized based on machine learning model
 
Situational judgment test measures administrator computational thinking with ...
Situational judgment test measures administrator computational thinking with ...Situational judgment test measures administrator computational thinking with ...
Situational judgment test measures administrator computational thinking with ...
 
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
Hand LightWeightNet: an optimized hand pose estimation for interactive mobile...
 
An overlapping conscious relief-based feature subset selection method
An overlapping conscious relief-based feature subset selection methodAn overlapping conscious relief-based feature subset selection method
An overlapping conscious relief-based feature subset selection method
 
Recognition of music symbol notation using convolutional neural network
Recognition of music symbol notation using convolutional neural networkRecognition of music symbol notation using convolutional neural network
Recognition of music symbol notation using convolutional neural network
 
A simplified classification computational model of opinion mining using deep ...
A simplified classification computational model of opinion mining using deep ...A simplified classification computational model of opinion mining using deep ...
A simplified classification computational model of opinion mining using deep ...
 
An efficient convolutional neural network-extreme gradient boosting hybrid de...
An efficient convolutional neural network-extreme gradient boosting hybrid de...An efficient convolutional neural network-extreme gradient boosting hybrid de...
An efficient convolutional neural network-extreme gradient boosting hybrid de...
 
Generating images using generative adversarial networks based on text descrip...
Generating images using generative adversarial networks based on text descrip...Generating images using generative adversarial networks based on text descrip...
Generating images using generative adversarial networks based on text descrip...
 
Collusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networksCollusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networks
 
Application of deep learning methods for automated analysis of retinal struct...
Application of deep learning methods for automated analysis of retinal struct...Application of deep learning methods for automated analysis of retinal struct...
Application of deep learning methods for automated analysis of retinal struct...
 
Proposal of a similarity measure for unified modeling language class diagram ...
Proposal of a similarity measure for unified modeling language class diagram ...Proposal of a similarity measure for unified modeling language class diagram ...
Proposal of a similarity measure for unified modeling language class diagram ...
 
Efficient criticality oriented service brokering policy in cloud datacenters
Efficient criticality oriented service brokering policy in cloud datacentersEfficient criticality oriented service brokering policy in cloud datacenters
Efficient criticality oriented service brokering policy in cloud datacenters
 
System call frequency analysis-based generative adversarial network model for...
System call frequency analysis-based generative adversarial network model for...System call frequency analysis-based generative adversarial network model for...
System call frequency analysis-based generative adversarial network model for...
 
Comparison of Iris dataset classification with Gaussian naïve Bayes and decis...
Comparison of Iris dataset classification with Gaussian naïve Bayes and decis...Comparison of Iris dataset classification with Gaussian naïve Bayes and decis...
Comparison of Iris dataset classification with Gaussian naïve Bayes and decis...
 
Efficient intelligent crawler for hamming distance based on prioritization of...
Efficient intelligent crawler for hamming distance based on prioritization of...Efficient intelligent crawler for hamming distance based on prioritization of...
Efficient intelligent crawler for hamming distance based on prioritization of...
 
Predictive modeling for breast cancer based on machine learning algorithms an...
Predictive modeling for breast cancer based on machine learning algorithms an...Predictive modeling for breast cancer based on machine learning algorithms an...
Predictive modeling for breast cancer based on machine learning algorithms an...
 
An algorithm for decomposing variations of 3D model
An algorithm for decomposing variations of 3D modelAn algorithm for decomposing variations of 3D model
An algorithm for decomposing variations of 3D model
 

Recently uploaded

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 

Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wireless Sensor Networks

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 8, No. 1, February 2018, pp. 87~93 ISSN: 2088-8708, DOI: 10.11591/ijece.v8i1.pp87-93  87 Journal homepage: http://iaescore.com/journals/index.php/IJECE Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wireless Sensor Networks Ananda Kumar K S1 , Balakrishna R2 1 Dept of ISE, RajaRajeswari College of Engineering, Bangalore-560074, India 2 RajaRajeswari College of Engineering, Bangalore-560074, India Article Info ABSTRACT Article history: Received Apr 2, 2017 Revised Aug 20, 2017 Accepted Sep 4, 2017 At present day’s wireless sensor networks, obtain a lot consideration to researchers. Maximum number of sensor nodes are scattered that can communicate with all others. Reliable data communication and energy consumption are the mainly significant parameters that are required in wireless sensor networks. Many of MAC protocols have been planned to improve the efficiency more by enhancing the throughput and energy consumption. The majority of the presented medium access control protocols to only make available, reliable data delivery or energy efficiency does not offer together at the same time. In this research work the author proposes a novel approach based on Receiver Centric-MAC is implemented using NS2 simulator. Here, the author focuses on the following parametric measures like - energy consumption, reliability and bandwidth. RC-MAC provides high bandwidth without decreasing energy efficiency. The results show that 0.12% of less energy consumption, reliability improved by 20.86% and bandwidth increased by 27.32% of RC-MAC compared with MAC IEEE 802.11. Keyword: Bandwidth Energy consumption Medium access control Receiver centric MAC Wireless sensor networks Copyright © 2018 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Ananda Kumar K S, Dept of ISE, RajaRajeswari College of Engineering, Bangalore-560074, India. Email: anandgdk@gmail.com 1. INTRODUCTION The Wireless Sensor Network (WSN) is advanced technology and build up with that has been incorporated into one of the best emerging areas in the communication industry [1]. A number of small wireless sensor nodes are used to exchange information for a long time with a limited battery power capacity in wireless sensor networks. The most important power factor consumption of a node is radio. MAC protocol controls the radio of the sensor node [2]. Generally, wireless sensor networks constitute many numbers of nodes. In Figure 1 depicts that the functionality for dissimilar types of nodes that appearance a wireless network to exist to control their spatial mobility exclusive of lose functionality. Nodes should be capable to detect neighbor nodes in a network and to vigorously correlate to coordinators based on their position [3]. Each node is connected to either one or many nodes. Consider a generic communication network, that network combine nodes and communication links. Every node produces information designed for each node and all other nodes in the network. Distinctive routing scheme considers to deal with various grouping of the follow a) minimize the cost and complexity b) prevention of unreliable communication links, c) maximize network throughput d) minimize end to end delay [4]. Sensor nodes operate with a tiny battery that consumes more power while propagation of a signal, so that energy efficiency is considered as major criteria for designing several MAC protocols. Radio is the
  • 2.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 87 – 93 88 central part of any sensor node and that consumes more power during communication. The competent MAC protocol is capable of enhancing lifetime of several sensor networks. MAC layer protocols in wireless sensor network are classified into four categories: a) synchronous awaking of nodes, b) asynchronous awaking of nodes, c) slotting of frames and d) multi channel approach. Duty cycle is one of the foremost attribute of asynchronous and synchronous protocols, at this juncture any node can exchange among sleep and active states to save energy, while nodes are able to communicate in active state. Asynchronous MAC protocols are based on the type of communication between two nodes dissimilar in active/sleep mode. In synchronous MAC protocols, all nodes are synchronized at the same time [5]. Medium Access Control is traditionally viewed as an element of the data link layer in the OSI model. Here, coordinates the use of a common transmission medium in multiuser systems and ensure reliable communication greater than interference free channels for each one user [6], [10]. The fundamental prerequisite of a sensor network is reliable delivery of information with lowest amount latency and energy consumption. On the other hand, the majority MAC protocols were proposes of their concerned about the users are self-governing of each other and challenge for the use of the general transmission channel. Outstanding to the strict resource constraint of sensor networks, two properties of the system were frequently exploited for designing sensor network MAC protocols: a) the application – needy objectives and b) the helpful nature of the scattered sensors [7]. CSMA is one of the mainly accepted choices for random access networks due to its simplicity and efficient design. Each user has a communication to transmit first senses the channel to see whether or not there is an enduring transmission from further users before it transmit its own data for communication. Hence an attempt was made to avoid collision with other users. When a collision occurs at the destination, each transmitting user wait for a unsystematic back in time before it makes a challenge to transmit the message again. Widely adopted protocol the multiple access with collision avoidance (MACA) protocol that introduce a three way handshake between the transmitter and receiver to solve the familiar hidden terminal problem present in usual CSMA [8]. Three-way handshake planned in MACA resolve this difficulty by having every user transmit a Request-To-Send (RTS) message. At any time it has a packet to send, representing the destination and the length of the deliberate data transmission. The destination user successfully receives the RTS message and has not fulfilled a handshake previously with further nodes; it then decides to respond with a Clear-To-Send (CTS) packet indicating that it is set for the reception. The source then sends an information packet to the destination once the CTS are received [9]. The mechanism of CTS and RTS is shown in Figure 2. Pei Huang et al, proposed a novel method in by improving the throughput under the heavy traffic load on wireless sensor networks. They discussed the receiver centric development by utilizing the data gathering tree structure in wireless sensor networks [1]. Yeah –time Yong et al, proposed in the method of different transmission range and sensing range for managing dynamic traffic loads in wireless sensor networks. Here limitations are time offer of a transmission, retransmission and high frequency of retransmission [2]. Umesh et al proposed RC-MAC protocol focused on end to end reliable communication and increase the lifetime of the sensor network [4]. Figure 1. Wireless Sensor Network Figure 2. Mechanisms of CTS and RTS 2. RESEARCH METHOD 2.1. Algorithm for RC-MAC Step 1: Each node sends a beacon message for checking the node status. A node status defines whether the node is sleep node or wake up a node (nib). nib-neighbor id
  • 3. Int J Elec & Comp Eng ISSN: 2088-8708  Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in …. (Ananda Kumar K S) 89 Step 2: It sends the RTS/CTS message for getting the channel status. After it forms the frame in terms of bandwidth and slot time TX Step 3: Maximum allowed queue process to be utilized at every transmission slots at T-sec. T-sec – Transmission seconds Step 4: Tr->propagation variance of delay when transmitter receiver distance is rx. Tr-Transmission rate, rx – reception rate Step 5: Probability of delivered rate of new entity in (nb) access slots. nb- neighbor node Step 6: It enters the channel scheduling for assign the channel to communicate. Channel scanning is completed by number of slots per super-frame. Step 7: Receiver node establish that average one hop delay is high it chooses a shortest path. Energy level is beyond a specified threshold time schedule of helper is not affected Step 8: First and second cycle includes a cooperative transmission and node updates its status information to intermediate nodes. Step 9: Receiver nodes have advanced than transmitter node then co-operative transmission will be applied. Step 10: Analyze the estimated signal interference level. Adjusted of each frame is done as per number of access slots. If it reaches limited threshold it processed a duration. Step 11: Then it enters noise interference level and estimate the level. Packets are assigned into priority level. Packet transmissions begin with congestion dance. 2.2. Flowchart for RC-MAC Algorithm In flowchart to transmit data, it’s moved from top to bottom, followed by different levels like channel scanning, send RTS, wait CTS, congestion avoidance and processing. In Figure 3, the author proposed the new approach in the form of algorithm. It explains the details in the form of flowchart. Figure 3. Flowchart for RC-MAC Algorithm
  • 4.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 87 – 93 90 3. RESULTS AND ANALYSIS NS 2 is chosen for the simulation as set-up consists of the massive network. Set-up contains 100 nodes; size of the packet is 780 bytes, routing protocol is AODV. MAC Protocols used are IEEE 802.11 and RC-MAC. Topology used is MANET. Here table 1 gives the informations used in simulations of experiments. Table 1. Network Simulation Parameters Parameter Name Parameter Value No Of Nodes 100 Node Type Static Area Of Simulation 1000x 1000 Traffic Cbr Channel Type Wireless Channel 3.1. Analysis of Energy consumption, Reliability and Bandwidth in RC-MAC Figure 4, shown the results of proposed work in terms of energy consumption versus simulation time and in slots of simulation time in 10, 15 & 20 sec. Every time energy consumption will increase with simulation time. The RC-MAC protocol used as MAC protocol in the wireless sensor networks. When node resolute to send information packet, by communication media like wireless media. It will send the data, else goes to wait. Each time information should be moved from the application layer to the physical layer. The measurement made for performance characteristic of RC-MAC reliability and obtain values are shown in Figure 5. In Figure 5 the author proposed in this work the slots of simulation time in 10, 15 & 20 sec. Every time reliability will increase with simulation time. The RC-MAC protocol used as MAC protocol in the wireless sensor networks. Reliability in wireless sensor networks be able to examine from together the packet level and event level. Figure 4. RC-MAC: Energy Consumption Vs Simulation time Figure 5. RC-MAC Reliability Vs Simulation time Figure 6. RC-MAC: Bandwidth Vs Simulation time
  • 5. Int J Elec & Comp Eng ISSN: 2088-8708  Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in …. (Ananda Kumar K S) 91 In Figure 6, the proposed work is the slots of simulation time/bandwidth in 10, 15 & 20 sec. Every time bandwidth will increases with simulation time. Bandwidth increases from 365 to 787. 3.2. Performance Analysis of Energy consumption, Reliability and Bandwidth, Comparison of RC-MAC with MAC IEEE 802.11 Energy consumption is inversely propositional to the energy expenditure. Energy consumption is calculated by implementing MAC and implementing RC-MAC. Figure 7 compares the energy consumption of MAC protocol and RC-MAC protocol. Energy consumption is high in MAC protocol; it’s less in RC- MAC protocol. RC-MAC protocol that allows node to proficiently make use of multiple channel by dropping needless channel switching. Receiver-Centric MAC protocol avoids the interference owed to get better communication throughput of wireless sensor network. From the obtained results, the MAC will consume energy more by 0.12% than RC-MAC. Reliability consist capability to retransmit lost packets, locally or end to end, to guarantee successful delivery. However, any sensor network that is deploying to supply to a significant application will need mechanism to make sure that reliability of data delivery from the sink to the sensors. By using upstream and downstream message is carried out in wireless sensor network. For upstream message, the sender is a sensor node and receiver node is a sink node. For downstream message, the sender is a sink node and receiver node is a sensor node. Figure 8 shows that comparison of reliability of MAC and RC-MAC. Here RC-MAC protocol has more reliable compared to MAC protocol. The results show that reliability is improved by 20.86 % in RC-MAC, compared with MAC. Figure 7. Comparison of Energy Consumption of MAC and RC-MAC Figure 8. Comparison of Reliability of MAC and RC-MAC Figure 9. Comparison of Bandwidth of MAC and RC-MAC Bandwidth represents the quantity of data that can be transmitted over a network in a given quantity of time, frequently spoken in bits per second or bps in wireless sensor network. Figure 9 shows that,
  • 6.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 87 – 93 92 comparison of bandwidth of MAC and RC-MAC protocols, here compared to RC-MAC existing MAC have less bandwidth. A result shows that bandwidth increased by 27.32% of bandwidth in RC-MAC compared with MAC 802.11. 4. CONCLUSION From the obtained results of the current proposed method, RC-MAC protocol mainly focus on energy consumption, reliability and end to end delay. The factors of congestion control, reliability and energy consumption would help in dropping packet failure rate which results an energy efficient process of the network. In this paper systematically evaluated the current technique using NS2 simulator, the simulation results and analysis of parametric measures like - energy consumption, reliability and bandwidth are exposed and comparing this results with other protocols. Here, the RC-MAC protocol shown better performance and efficiency. The proposed protocol will shows better performance in terms of energy consumption and reliability. Here, the proposed method obtained an improvement in terms of 0.12% of less energy consumption, reliability improved by 20.86% and bandwidth increased by 27.32% of RC-MAC compared with MAC IEEE 802.11. ACKNOWLEDGEMENTS The author would like to express sincere thanks for encouragement and constant support provided by the Management RRGI, and Principal RajaRajeswari College of Engineering, Bangalore-74, India during this research work. REFERENCES [1] Huang, Pei, Chen Wang, and Li Xiao, "RC-MAC: A receiver-centric MAC protocol for event- driven wireless sensor networks," IEEE Transactions on Computers 64.4 : 1149- 1161, 2015 [2] Yueh-Tiam Yong, C.E. Tan , Zen, K., “Long Transmission Range Performance Evaluation on RI- MAC protocol in Wireless Sensor Networks,” International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 11, November 2014. [3] D. N. Wategaonkar and V. S. Deshpande, "Characterization of reliability in WSN," 2012 World congress on Information and Communication Technologies,Trivandrum, pp.970-975, 2012 [4] UK Singh, KC Phuleriya, RJ Yadav, “Real Time Data Communication Medium access control (RCMAC) Protocol for Wireless Sensor Networks (WSNs),” International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, Volume 2, Issue 5, May 2012. [5] Ananda Kumar K S; Balakrishna R; “Development of Energy-Efficient and Data Collection Protocol for heterogeneous Wireless Sensor Networks,” ITSI Transactions on Electrical and Electronics Engineering (ITSI- TEEE), ISSN (PRINT): 2320 – 8945, Volume -4, Issue -2, 2016. [6] Ananda Kumar K, S, Balakrishna R; “Study on Energy Efficient Routing Protocols in Wireless sensor Networks,” International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X,Vol 5, Issue 11, pages 702-705,2015. [7] Ananthram Swami, Qing Zhao, Yao-Win Hong, Lang Tong, “Wireless Sensor Networks: Signal Processing and Communications,” John Wiley & Sons, 2007. [8] A. Kakria and T. C. Aseri, "Survey of synchronous MAC protocols for Wireless Sensor Networks," 2014 Recent Advances in Engineering and Computational Sciences (RAECS), Chandigarh, pp. 1-4, 2014 [9] Ravi Kodavarti, "Overcoming QoS, Security Issues in VoWLAN Designs", Texas Instruments, April, 2003. [10] Patil, A. V., and A. Y. Kazi, "Performance analysis of IEEE 802.15. 4 sensor networks," Computing, Communications and Networking Technologies (ICCCNT), 2013 Fourth International Conference on. IEEE, 2013. BIOGRAPHIES OF AUTHORS Ananda Kumar K S. Obtained B.Tech Degree from Koneru Lakshmaiah College of Engineering, Guntur, Acharya Nagarjuna University, Andhrapradesh. Obtained M.Tech Degree from R.V.College of Engineering, Bangalore, Visvesvaraya Technological University, Belagavi, Karnataka. Currently he is pursuing Ph.D from Visvesvaraya Technological University, Belagavi, Karnataka. He is Working as Asst.Professor in Dept of Information Science and Engineering, RajaRajeswari College of Engineering, Bangalore, India. His Research area interests are in the field of Wireless Sensor Networks, Data Mining, Bioinformatics.
  • 7. Int J Elec & Comp Eng ISSN: 2088-8708  Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in …. (Ananda Kumar K S) 93 Balakrishna R is currently working as a Principal & Professor, in RajaRajeswari College of Engineering. His research and professional career spans about 16 years of Teaching & research, 1 Year Industrial Experience at TCS. His expertise is primarily in the domains of Ad hoc Networks, Mobile Computing, Networks, and Distributed OS. He obtained his M.Tech. from Maharshi Dayanad University and subsequently Ph.D from Sri Krishnadevaraya University. He is a life member of professional bodies ISTE, CSI, IAENG etc. He has published 42 papers in peered International Journals, 23 papers in International and National Conferences. He has guided 9 M.Tech, 6 Masters and 30 B.E students projects. Currently he is guiding 5 PhD scholars, 2 M.Sc.Engg.ByResearchatVTU.