SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
ISSN: 2277 – 9043
                                  International Journal of Advanced Research in Computer Science and Electronics Engineering
                                                                                              Volume 1, Issue 6, August 2012



  A Proposed Adaptive Mobility of MAC Protocol
  Using Sleep and Wake Cycling in Wireless Sensor
                    Network
                                                        Jagdish Y. kapadnis
                                                           Pawan Patidar
                                            Department of Computer science and Engineering
                                                            LNCT, Indore.

Abstract: - In wireless sensor networks have imposed                   extremely parsimonious in their use of energy. In order to
significant challenges for the medium access control (MAC)             conserve energy, the nodes operate in sleep-wake cycles. In
protocol design to provide reliable communication with good            such WSNs, typically the nodes rely on batteries, or energy
data rates and low energy consumption using Sleep wake                 harvested from their surroundings, and, hence, need to be
cycle nodes. Most of the MAC protocols proposed for                    extremely parsimonious in their use of energy. In order to
wireless sensor networks assume static sensor nodes but                conserve energy, the nodes operate in sleep-wake cycles;
nodes know their locations, and they sleep-wake cycle,                 when a node wakes up it performs sensing, and also can
waking up periodically but not synchronously, which usually            assist in forwarding any alarm packets towards the sink.
causes up gradation in network performance in scenarios                There are numerous advantages of MMAC-SW using sleep
involving mobile sensors. when a node has a packet to                  and wake up cycle over the static WSNs. In particular, it
forward to the sink, there is a trade-off between how long this        offers:
node waits for a suitable neighbor to wake up and the                  i) dynamic network coverage [11], by reaching areas that
progress the packet makes towards the sink once it is                  have not been adequately sampled.
forwarded to this neighbor In this paper, we introduce a               ii) data routing repair, by replacing failed routing nodes with
mobility aware and energy efficient medium access protocol             their adequate node in the network.
with sleep and wake up cycle (shortly abbreviated as                   iii) data mulling, by collecting and disseminating
MMAC-SW) for mobile wireless sensor             networks. Our          data/reading from stationary nodes out of range.
MMAC-SW is based on a hybrid scheme of TDMA and                        iv) staged data stream processing, by conducting in-network
CSMA that informs sensor nodes when to wakeup or when to               processing of continuous and ad hoc queries.
go to sleep to save energy. Through computer simulations,              v) user access points, by enabling connection to handheld and
we evaluate the performance of the MMAC-SW and compare                 other mobile devices that are out of range from the
it against the MMAC protocol. Simulation results will show             communication infrastructure.
that MMAC-SW outperforms MMAC in terms of energy                                 Energy consumption has been considered as the
consumption, packet delivery ratio and average packet delay.           single and important design key in sensor networks, hence,
Keywords: energy efficient, MAC protocol, mobility                     the most recent work on medium access control (MAC)
handling, sleep and wake cycling.                                      protocol for sensor networks focused on energy efficiency,
.                                                                      where MAC protocols play a crucial role in controlling the
                     I.INTRODUCTION                                    usage of the radio unit. The radio transceiver unit is the major
                                                                       power consumer unit in the sensor node. For most MAC
         A wireless sensor network (WSN) is a network of               protocols designed for WSNs [12], it is assumed that the
self organizing Low powered devices having sensing and                 sensor nodes are stationary, which causes performance
communication capabilities. These small and inexpensive                degradation when these protocols are applied in mobile
devices are battery powered, thus sensor nodes must be                 environments. In this paper, we present an adaptive mobility
energy efficient [4]. As developments of these micro-electro-          aware, and energy efficient MAC (MMAC-SW) protocol
mechanical systems, digital electronics, and wireless                  using sleep and wake up cycles for wireless sensor networks.
communications technologies have led to create low cost,               MMAC-SW is a hybrid based MAC protocols that combines
low power, and multifunctional sensor devices [3], In such             the advantages of the protocols presented in [11][12][13]
WSNs, typically the nodes rely on batteries, or energy                 while offsetting their shortcomings. MEMAC utilizes a
harvested from their surroundings, and, hence, need to be              hybrid approach of both scheduled (TDMA) and contention




                                                                                                                                    36
                                                 All Rights Reserved © 2012 IJARCSEE
ISSN: 2277 – 9043
                                 International Journal of Advanced Research in Computer Science and Electronics Engineering
                                                                                             Volume 1, Issue 6, August 2012

based (CSMA) medium access schemes. MMAC-SW                         • The mobility of nodes causes synchronization and frame
differentiates between data and control messages; long data         errors in the network. A mobility aware MAC protocol needs
messages are assigned scheduled TDMA slots (only those              to cope with these errors by adjusting the frame time to
nodes, which have data to send are assigned slots), whilst          reduce errors and allow nodes to make faster connections on
short control messages are assigned random access slots. This       joining or leaving the network.
technique limits message collisions and reduces the total
energy consumed by the radio transceiver [12]. Furthermore,         • In contention based MAC protocols, as mobility increase
MMAC-SW uses a dynamic frame size to enable the protocol            the probability of collision increases accordingly, and hence
to effectively adapt itself to changes in mobility conditions       retransmissions are required which leads to high energy
.Mobility prediction through the use of the first order auto        consumption. A mobility aware MAC protocol should use the
aggressive moving average model [14] is used to                     mobility information to wake-up and switch-off nodes
dynamically adjust the frame size and control the channel           accordingly in order to avoid collisions and decrease energy
access in an efficient way according to the mobility                consumption.
conditions. We have designed and implemented the MMAC-
SW protocol in event network simulator, where many                  • In scheduled based MAC protocols, a neighborhood
simulation experiments are carried out to evaluate the              inconsistency of two-hop neighbor information can occur,
performance of MMAC-SW and compared it with MMAC                    when mobile nodes join or leave the neighborhood. This
[14]. The rest of the paper is organized as follows. We             leads to schedule inconsistencies. The MAC protocol should
present and discuss some related works in section II.               adapt the schedule according to mobility conditions in the
Describes the MMAC-SW protocol, In section III describe             network and determine which and when nodes are allowed to
what will be the system model of the protocol. In section IV        join or leave the neighborhood to eliminate these
Describes the Data transfer phase performance is studied            inconsistencies.
through intensive simulation experiments. Finally, we
conclude the paper in section V.                                    • Generally, mobility information needed by the MAC
                                                                    protocols includes node positions and the mobility
               II. MMAC-SW PROTOCOL                                 information of their neighbors for better mobility detection
                                                                    and handling. Therefore, the mobility information has to be
     In sensor networks, nodes may fail (e.g., power drained)       periodically disseminated to neighboring nodes which
or new nodes may be added (e.g., additional sensors                 increases the overhead in the form of control messages in the
deployed), or sensor nodes may physically move from their           MAC protocol. Instated of adding the mobility information
locations, either because of the motion of the medium (e.g.         into control packets of each layer, the mobility information
water, air) or by means of a special motion hardware in the         may be made common to different layers through a common
mobile sensor nodes. To accommodate these topology                  control message.
dynamics, our MMAC-SW protocol uses a hybrid approach
of contention-based and scheduled-based schemes as in our           • An important limitation in designing mobility adaptive
previous MAC protocol (SEHM protocol) presented in [11].            MAC protocols for sensor network is the choice of the
MMAC-SW differs from SEHM protocol in terms of                      mobility models considered in the design. It is important to
mobility handling of sensor nodes. MMAC-SW adapts the               choose a mobility model that applies to real life settings.
frame length according to mobility conditions by
incorporating a mobility prediction model. In the following                            III. SYSTEM MODEL
section we discuss some mobility issues.
                                                                    A. Node Deployment
    A. Mobility Handling                                            N identical sensor nodes are uniformly deployed in the region
                                                                    R. We take N to be a Poisson random variable of rate β
Mobility in sensor networks brings some challenges in               where is the node density. Let xi, i = 1, 2, ..., N, be the
designing MAC protocols, which are mainly responsible for           locations of the nodes. Additional source and sink nodes are
packet scheduling, transmission, collision avoidance, and           placed at fixed locations X0 = (0, 0) and XN+1 = (L, L)
resolution. Handling mobility at MAC layer involves careful         respectively. Thus including the source and sink nodes, there
trade-off in energy efficiency, throughput, and robustness          are a total of N + 2 nodes in the disk. rc is the communication
under mobility. In this section, we discuss some mobility           range of each node. Two nodes i and j are called neighbors if
issues relevant to the MAC protocol design [19].                    and only if |xi − xj | < rc. The distance between node i and
                                                                    sink (N + 1) is Li |XN+1 − Xi|.




                                                                                                                                37
                                               All Rights Reserved © 2012 IJARCSEE
ISSN: 2277 – 9043
                                   International Journal of Advanced Research in Computer Science and Electronics Engineering
                                                                                               Volume 1, Issue 6, August 2012

B. The Sleep-Wake Process                                              desirable to develop forwarding algorithms that do not
          To conserve energy, each node performs periodic              require even this knowledge.
sleep-wake cycling. The sleep-wake times of the nodes are
not synchronized. Since we are interested in studying the               Data Transfer Phase
delay incurred in routing due to sleep-wake cycling alone, we                   After the compilation of the clustering phase and the
neglect the transmission delay, propagation delay and other            CHs are advertised, the data transfer phase begins. Data
overhead delays. This means that if node i has a packet to             transfer in MMAC-SW is based on frames and the CHs
transmit to its neighboring node j, then i can transmit                control the frames. The CH is responsible for controlling the
immediately at the instant j wakes up. We model this by                channel access between sensor nodes within the cluster and
taking the time for which a node stays awake to be zero.               collects data from them. The frames are handled during
More formally, let Ti, i = 1, 2, ...N + 1 be i.id. Random              multiple phases using a hybrid scheme of CSMA and
variables which are uniform on [0, T], where T is the period           TDMA. Each frame is composed of two slots (see Fig. 1):
of the sleep wake cycle. Then node i wakes up at the periodic          mini slot and a dynamic normal slot. The Mini-slot is used to
instants KT + Ti, K >0. We define the waiting time for i to            transmit and receive control signals, and consists of three
wake up at time t as,                                                  parts; Frame Synchronization (SYNC), Random Access, and
             Wi(t) = inf {KT + Ti > t : k >0} – t.                     Receive Scheduling. The Normal slot is used by sensor nodes
                                                                       to report their data to the CH. The frame length is made
C. Forwarding Rules and Assumptions                                    dynamic to make the protocol sensitive to mobility and traffic
Forwarding rules dictate the actions a node can take when it           conditions (i.e. the number of time slots is increased or
has to transmit. We are interested in decentralized policies           decreased according to the number of nodes that have data to
where a node can take decisions only by observing the                  send).
activities in its neighborhood (i.e., the disk of radius rc)
centered around the node of interest). In this regard we
impose some restrictions on the network.

Traffic Model: There is a single packet in the network which
is to be routed from the source to sink. At time 0, the packet
is given to the source and the routing process begins. The
nodes which get the packet for forwarding are called relay
nodes. The packet traverses a sequence of relay nodes to
eventually reach the sink, at which time the routing ends.
Thus there is a single flow and further the flow consists of           MMAC-SW protocol handles the channel access through the
only one packet. This set up is reasonable, because in sensor          following four phases:
networks we can assume that the events are sufficiently
separated in time and/or location so that the flows due to two         Schedule Calculation and Distribution, and Data Transfer.
events do not intersect. To avoid multiple packet                      Nodes that have data to send should content for the channel
transmission by different nodes detecting the same event, the          during the Request/Update/Join phase and send their requests
nodes can resolve among themselves to select one node (say             to the CH. As well those nodes which want to join or leave
the one closest to the sink), which can then transmit. Further,        to/from the cluster should send requests during this phase.
the information about an event comprises its location, and             Then, sensor nodes use the TDMA slots calculated and
possibly target classification data, which along with some             distributed by the CH to send their data during the data
control bits can be easily incorporated in a single packet. This       transfer phase to CHs. Sensor nodes that have no data to
justifies the idea to study the performance of a single packet         transmit go to sleep directly after the end of the mini-slot.
alone.                                                                 More details are given below about the operation of the
                                                                       MEMAC protocol in different phases:
Forwarding Set: Each node knows its location and the
location of the sink. The forwarding set of a node is the set of       Synchronization phase: At the beginning of each frame, the
its neighbors that are closer to the sink then itself. A relay         head node broadcasts a SYNC message to all sensor nodes all
node considers forwarding the packet only to a node in its             sensor nodes should be in receive mode during this phase to
forwarding set. Each node knows the number of neighbors in             be able to capture the SYNC message. The SYNC message
its forwarding set, but is not aware of their locations and            contains synchronization information for the packet
wake times. While in this paper we assume that each node               Transmission.
knows the number of nodes in its forwarding set, it would be




                                                                                                                                  38
                                                  All Rights Reserved © 2012 IJARCSEE
ISSN: 2277 – 9043
                                   International Journal of Advanced Research in Computer Science and Electronics Engineering
                                                                                               Volume 1, Issue 6, August 2012

Request/Leave/Join phase: During this phase, sensor nodes
that have data to transmit content for the channel in order to
acquire the access to send its request to the CH. The
contention period should be long enough to enable all nodes
that have data to send to pass their requests to the CH. As
well, those nodes which are expected to leave or join the
cluster should inform the CH by sending a leave or join
message.

Schedule Calculation and Distribution phase: In this phase
the CH calculates the schedule and broadcasts it to the other
nodes within the cluster. The schedule contains those nodes
which have data to send only. Nodes that want to leave or
join the cluster are not considered in the current schedule.           IV. PERFORMANCE ANALYSIS
Thus, the frame length is adjusted according to the number of
request, leave, and join messages. If the number of request                      To study and evaluate the performance of the
messages are greater than the number of join/leave messages,           MMAC-SW protocol and compare it with MMAC protocol,
then the frame length is increased otherwise the frame length          we will used Sensor Simulator framework [24].. The
is reduced. The frame adjustment algorithm of the MEMAC                simulator contains a model of the EYES wireless sensor node
protocol is an improved version of the mobility adaptive               [26]. Furthermore, the simulator has the same limits as the
algorithm presented in [13], the algorithm is as follow:               EYES nodes have. Additionally, the simulator has modules
1. For all nodes within the cluster, calculate the predicted           for all layers of the WSN protocol stack. The Energy
states using the AR-l model.                                           consumption in the EYES model is based on the amount of
2. For all nodes in the cluster, calculate the average estimated       energy the radio consumes. The consumed energy by the
location.                                                              CPU as a result of the protocol execution is not taken into
3. Using the above information construct the set of joining 'J'        account. The motivation behind using Sensor Simulator is
and leaving 'L' nodes.                                                 that it enables users to easily modify the sensor network and
4. Count the request messages and construct a set of nodes             to implement large scale networks. Furthermore, it executes
which have a data to send ' R'.                                        at least an order of magnitude faster than NS-2 and makes
5. If a node n is a member of the set of joining or leaving            more efficient use of the available memory [24]. In this
nodes, do not consider n in the schedule.                              section we investigate the performance of the proposed
6. If the number of members in set 'R' are greater than the            protocol MMAC-SW in a clustered network topology, and
number of members in both sets of 'J' and 'L', then increase           compare it against MMAC protocol. The performance
the frame length, otherwise reduce the frame length.                   metrics used in the evaluation of MMAC-SW will be the
7. Adjust the frame normal slot and the random access period           average energy consumption, average packet delivery ratio
in the frame structure according to the new frame time.                and average delay.
Finally, the CH broadcasts the schedule packet to all sensor
nodes that contains the TDMA slots for the subsequent phase            V. CONCLUSION and FUTURE WORK
"data transfer phase". In this phase all sensor nodes should
be in receive mode.                                                             The evolution of stationary WSNs in conjunction
                                                                       with the advances made by the distributed robotics and low
Data Transfer phase: In this phase, sensor nodes use the               power embedded systems communities have led to a new
TDMA slots to transmit their data to the CH or to                      class of Mobile Wireless Sensor Networks (MSNs). In
communicate with their neighbors. All sensor nodes that have           addition to the energy constraints and processing power
no traffic to transmit or receive should turn their radios             limitations, mobility in MSN adds a new design dimension.
transceivers off and enter sleep mode. Once data are reported          Most of the proposed MAC protocols for WSN networks are
to CHs, the BS collects data from CHs. A dynamic TDMA                  designed assuming that sensor nodes are stationary. This
scheme is used to allow CHs to access the channel and report           assumption no longer valid for MSNs. Therefore designing a
their data to the BS. The BS is responsible of calculating and         mobility aware MAC protocols becomes more and more
distributing time slots to CHs. We assume that all CHs have            important. In this paper, we presented MMAC-SW protocol -
data to report to the BS. As a result, the random access period        an adaptive mobility aware and energy efficient MAC
is removed, and the frame becomes as shown in Fig. 2.                  protocol for MSNs using sleep and wake up cycles. MMAC-
                                                                       SW combines the benefits of contention based and scheduled
                                                                       based protocols to achieve a significant amount of energy




                                                                                                                                 39
                                                  All Rights Reserved © 2012 IJARCSEE
ISSN: 2277 – 9043
                                  International Journal of Advanced Research in Computer Science and Electronics Engineering
                                                                                              Volume 1, Issue 6, August 2012

savings. MMAC-SW adjusts the frame length according to               [10] Lingxuan Hu and David Evans, "Localization for Mobile
mobility information of the sensor nodes and the number of           Sensor Networks", Tenth Annual International Conference on
nodes that have data to send, this avoids wasting slots by           Mobile Computing and Networking (ACM Mobi Com 2004).
excluding the nodes which are expected to leave or join the          26 September – 1 October 2004.
cluster and those nodes which have no data to transmit from          [11] M. Zhang, X. Du, and K. Nygard, "Improving Coverage
the TDMA schedule, and to switch nodes to sleep mode                 Performance in Sensor Networks by Using Mobile Sensors,"
when they are not included in the communication process.             Proc. IEEE Military Comm. Conf. (MILCOM '05), pp. 3335-
Through extensive simulation experiments, we are proposed            3341,2005.
our protocol and compared it against MMAC protocol.                  [12] Bashir Yahya, Jalel Ben-Othman, "Energy Efficient
Simulation results will demonstrate that our MMAC-SW                 MAC Protocols in Wireless Sensor Networks", will appeared
protocol performs the energy efficient in terms of average           in Wiley series on Wireless Communications and Mobile
energy consumption, average delivery ratio, and average              Computing, 2009.
packet delay.                                                        [13] Bashir Yahya, Jalel Ben-Othman,"A scalable and
                                                                     energy-efficient hybrid-based MAC protocol for wireless
REFERENCES                                                           sensor networks", in the Proceedings of the 3rd ACM
                                                                     workshop on Performance monitoring and measurement of
[1] Bashir Yahya, Jalel Ben-Othman, ”An Adaptive Mobility            heterogeneous wireless an wired networks (PM2HW2N
Aware and Energy Efficient Mac Protocol for wireless                 2008), 67-71
Sensor Networks”, 978-1-4244-4671-1/09/$25.00 ©2009                  [14]H. Takagi and L. Kleinrock, “Optimal Transmission
IEEE                                                                 Ranges for Randomly Distributed Packet Radio Terminals,”
[2] J. Kim, X. Lin, and N. Shroff, “Optimal Anycast                  Communications, IEEE Transactions on. [legacy, pre -
Technique      for    Delay-Sensitive     Energy-Constrained         1988], vol. 32, no. 3, pp. 246–257, 1984.
Asynchronous Sensor Networks,” in INFOCOM 2009. The                  [15] T.C. Hou and V. Li, “Transmission Range Control in
28th Conference on Computer Communications. IEEE, April              Multihop Packet Radio Networks,” Communications, IEEE
2009, pp. 612–620.                                                   Transactions, vol. 34, no. 1, pp. 38–44,1986.
[3]Bergbreiter, S. and Pister, K.SJ, "CotsBots: An Off-the-          [16] B. Karp and H. T. Kung, “GPSR: Greedy Perimeter
Shelf Platform for Distributed Robotics," In the Proceeding          Stateless Routing for Wireless Networks,” in MobiCom ’00:
of the IEEE International Conference on Intelligent Robots           Proceedings of the 6th annual international conference on
and Systems, Las Vegas, NV,2003.                                     Mobile computing and networking. New York, NY, USA:
[4] Dantu K., Rahimi M.H., Shah 1-1., Babel S., Dhariwal             ACM Press, 2000, pp. 243–254.
A., and Sukhatme G.S., "Robornote: Enabling mobility in              [17]F. Kuhn, R. Wattenhofer, and A. Zollinger, “An
sensor networks", In ACM Int. Conf. on Information                   Algorithmic Approach to Geographic Routing in Ad Hoc and
Processing in Sensor Networks - SPOTS, 2005.                         Sensor Networks,” IEEE/ACM Trans. Netw., vol. 16, no. 1,
[5] Allred 1, Hasan A.B., Panichsakul S., Pisano B., Gray 1'.,       pp. 51–62, 2008.
Huang J-I-I., I-Ian R., Lawrence D., and Mohseni K.,                 [18] S. Dulman, M. Rossi, P. Havinga, and M. Zorzi, “On the
"SensorFlock An Airborne Wireless Sensor Network of                  Hop Count Statistics for Randomly Deployed Wireless
Micro-Air Vehicles", In ACM Int. Conf. on Embedded                   Sensor Networks,” Int. J. Sen. Netw.,vol. 1, no. 1/2, pp. 89–
Networked Sensor Systems, 2007.                                      102, 2006.
[6]NittelS, TrigoniN, Ferentinos K., Neville F., Nural A., and
Pettigrew N., "A drift-tolerant model for data management in
ocean sensor networks", In ACM Workshop on Data
Engineering for Wireless and Mobile Access, 2007.
[7] Hull B., Bychkovsky V., Chen K., Goraczko M., Miu A.,
Shih E., Zhang Y., Balakrishnan H., and Madden S., "CarTel:
A Distributed Mobile Sensor Computing System", In ACM
Int. Conf. on Embedded Networked Sensor Systems, 2006.
[8] Eriksson, Girod, L., Hull, B., Newton, R., Madden, S. and
Balakrishnan H., "The Pothole Patrol: Using a Mobile Sensor
Network for Road Surface Monitoring", In ACM Int. Conf.
on Mobile Systems, Applications And Services 2008.
[9] D. Zeinalipour-Yazti, H. Papadakis, C. Georgiou, M.D.
Dikaiakos, "Mobile Sensor Network Data Management",
Parallel Processing Letters Journal (PPL), September 2008.




                                                                                                                               40
                                                All Rights Reserved © 2012 IJARCSEE

Weitere ähnliche Inhalte

Was ist angesagt?

Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop TransmissionIOSR Journals
 
Power Management in Wireless Sensor Network
Power Management in Wireless Sensor NetworkPower Management in Wireless Sensor Network
Power Management in Wireless Sensor NetworkBhavik Panchal
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET Journal
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
 
Energy efficient node deployment for target coverage in wireless sensor network
Energy efficient node deployment for target coverage in wireless sensor networkEnergy efficient node deployment for target coverage in wireless sensor network
Energy efficient node deployment for target coverage in wireless sensor networkGaurang Rathod
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsmmjalbiaty
 
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...Protection Technique for Complex Distribution Smart Grid Using Wireless Token...
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...Power System Operation
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET Journal
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...IRJET Journal
 
Sensors 19-03789-v2
Sensors 19-03789-v2Sensors 19-03789-v2
Sensors 19-03789-v2Nitin k
 
Low power MAC for wireless sensor network
Low power MAC for wireless sensor networkLow power MAC for wireless sensor network
Low power MAC for wireless sensor networkAttia Chaudhry
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...IOSR Journals
 
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEYROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEYijscai
 

Was ist angesagt? (18)

file4.pdf
file4.pdffile4.pdf
file4.pdf
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
9345.pdf
9345.pdf9345.pdf
9345.pdf
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
Power Management in Wireless Sensor Network
Power Management in Wireless Sensor NetworkPower Management in Wireless Sensor Network
Power Management in Wireless Sensor Network
 
mn paper
mn papermn paper
mn paper
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
 
Energy efficient node deployment for target coverage in wireless sensor network
Energy efficient node deployment for target coverage in wireless sensor networkEnergy efficient node deployment for target coverage in wireless sensor network
Energy efficient node deployment for target coverage in wireless sensor network
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraints
 
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...Protection Technique for Complex Distribution Smart Grid Using Wireless Token...
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
 
Sensors 19-03789-v2
Sensors 19-03789-v2Sensors 19-03789-v2
Sensors 19-03789-v2
 
Low power MAC for wireless sensor network
Low power MAC for wireless sensor networkLow power MAC for wireless sensor network
Low power MAC for wireless sensor network
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
 
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEYROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
 

Andere mochten auch (10)

24 27
24 2724 27
24 27
 
7 13
7 137 13
7 13
 
31 34
31 3431 34
31 34
 
130 133
130 133130 133
130 133
 
46 51
46 5146 51
46 51
 
122 129
122 129122 129
122 129
 
12 15
12 1512 15
12 15
 
114 120
114 120114 120
114 120
 
ภารกิจระดับครูผู้ช่วย
ภารกิจระดับครูผู้ช่วยภารกิจระดับครูผู้ช่วย
ภารกิจระดับครูผู้ช่วย
 
99 103
99 10399 103
99 103
 

Ähnlich wie Adaptive MAC Protocol for Mobile WSNs

PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...IJCNCJournal
 
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKSSLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKSijwmn
 
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKSSLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKSijwmn
 
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEYENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEYijwmn
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksIDES Editor
 
Protocol_stack_in_sensor_network (1).pdf
Protocol_stack_in_sensor_network (1).pdfProtocol_stack_in_sensor_network (1).pdf
Protocol_stack_in_sensor_network (1).pdfAnil Sagar
 
Ba2641224127
Ba2641224127Ba2641224127
Ba2641224127IJMER
 
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksThe Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksIJMER
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksSRAVANIP22
 
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...cscpconf
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSnanocdac
 
A Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor NetworksA Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor NetworksBria Davis
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 

Ähnlich wie Adaptive MAC Protocol for Mobile WSNs (20)

PROGRESS 1& 2.ppt
PROGRESS 1& 2.pptPROGRESS 1& 2.ppt
PROGRESS 1& 2.ppt
 
Bf33335340
Bf33335340Bf33335340
Bf33335340
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
 
40120140503011
4012014050301140120140503011
40120140503011
 
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKSSLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
 
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKSSLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
 
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEYENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
 
270 273
270 273270 273
270 273
 
Protocol_stack_in_sensor_network (1).pdf
Protocol_stack_in_sensor_network (1).pdfProtocol_stack_in_sensor_network (1).pdf
Protocol_stack_in_sensor_network (1).pdf
 
Ba2641224127
Ba2641224127Ba2641224127
Ba2641224127
 
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksThe Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKS
 
A Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor NetworksA Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor Networks
 
Tmac
TmacTmac
Tmac
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 

Mehr von Ijarcsee Journal (20)

116 121
116 121116 121
116 121
 
109 115
109 115109 115
109 115
 
104 108
104 108104 108
104 108
 
93 98
93 9893 98
93 98
 
88 92
88 9288 92
88 92
 
82 87
82 8782 87
82 87
 
78 81
78 8178 81
78 81
 
73 77
73 7773 77
73 77
 
65 72
65 7265 72
65 72
 
58 64
58 6458 64
58 64
 
52 57
52 5752 57
52 57
 
41 45
41 4541 45
41 45
 
28 35
28 3528 35
28 35
 
19 23
19 2319 23
19 23
 
16 18
16 1816 18
16 18
 
6 11
6 116 11
6 11
 
1 5
1 51 5
1 5
 
134 138
134 138134 138
134 138
 
125 131
125 131125 131
125 131
 
121 124
121 124121 124
121 124
 

Kürzlich hochgeladen

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Kürzlich hochgeladen (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Adaptive MAC Protocol for Mobile WSNs

  • 1. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 6, August 2012 A Proposed Adaptive Mobility of MAC Protocol Using Sleep and Wake Cycling in Wireless Sensor Network Jagdish Y. kapadnis Pawan Patidar Department of Computer science and Engineering LNCT, Indore. Abstract: - In wireless sensor networks have imposed extremely parsimonious in their use of energy. In order to significant challenges for the medium access control (MAC) conserve energy, the nodes operate in sleep-wake cycles. In protocol design to provide reliable communication with good such WSNs, typically the nodes rely on batteries, or energy data rates and low energy consumption using Sleep wake harvested from their surroundings, and, hence, need to be cycle nodes. Most of the MAC protocols proposed for extremely parsimonious in their use of energy. In order to wireless sensor networks assume static sensor nodes but conserve energy, the nodes operate in sleep-wake cycles; nodes know their locations, and they sleep-wake cycle, when a node wakes up it performs sensing, and also can waking up periodically but not synchronously, which usually assist in forwarding any alarm packets towards the sink. causes up gradation in network performance in scenarios There are numerous advantages of MMAC-SW using sleep involving mobile sensors. when a node has a packet to and wake up cycle over the static WSNs. In particular, it forward to the sink, there is a trade-off between how long this offers: node waits for a suitable neighbor to wake up and the i) dynamic network coverage [11], by reaching areas that progress the packet makes towards the sink once it is have not been adequately sampled. forwarded to this neighbor In this paper, we introduce a ii) data routing repair, by replacing failed routing nodes with mobility aware and energy efficient medium access protocol their adequate node in the network. with sleep and wake up cycle (shortly abbreviated as iii) data mulling, by collecting and disseminating MMAC-SW) for mobile wireless sensor networks. Our data/reading from stationary nodes out of range. MMAC-SW is based on a hybrid scheme of TDMA and iv) staged data stream processing, by conducting in-network CSMA that informs sensor nodes when to wakeup or when to processing of continuous and ad hoc queries. go to sleep to save energy. Through computer simulations, v) user access points, by enabling connection to handheld and we evaluate the performance of the MMAC-SW and compare other mobile devices that are out of range from the it against the MMAC protocol. Simulation results will show communication infrastructure. that MMAC-SW outperforms MMAC in terms of energy Energy consumption has been considered as the consumption, packet delivery ratio and average packet delay. single and important design key in sensor networks, hence, Keywords: energy efficient, MAC protocol, mobility the most recent work on medium access control (MAC) handling, sleep and wake cycling. protocol for sensor networks focused on energy efficiency, . where MAC protocols play a crucial role in controlling the I.INTRODUCTION usage of the radio unit. The radio transceiver unit is the major power consumer unit in the sensor node. For most MAC A wireless sensor network (WSN) is a network of protocols designed for WSNs [12], it is assumed that the self organizing Low powered devices having sensing and sensor nodes are stationary, which causes performance communication capabilities. These small and inexpensive degradation when these protocols are applied in mobile devices are battery powered, thus sensor nodes must be environments. In this paper, we present an adaptive mobility energy efficient [4]. As developments of these micro-electro- aware, and energy efficient MAC (MMAC-SW) protocol mechanical systems, digital electronics, and wireless using sleep and wake up cycles for wireless sensor networks. communications technologies have led to create low cost, MMAC-SW is a hybrid based MAC protocols that combines low power, and multifunctional sensor devices [3], In such the advantages of the protocols presented in [11][12][13] WSNs, typically the nodes rely on batteries, or energy while offsetting their shortcomings. MEMAC utilizes a harvested from their surroundings, and, hence, need to be hybrid approach of both scheduled (TDMA) and contention 36 All Rights Reserved © 2012 IJARCSEE
  • 2. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 6, August 2012 based (CSMA) medium access schemes. MMAC-SW • The mobility of nodes causes synchronization and frame differentiates between data and control messages; long data errors in the network. A mobility aware MAC protocol needs messages are assigned scheduled TDMA slots (only those to cope with these errors by adjusting the frame time to nodes, which have data to send are assigned slots), whilst reduce errors and allow nodes to make faster connections on short control messages are assigned random access slots. This joining or leaving the network. technique limits message collisions and reduces the total energy consumed by the radio transceiver [12]. Furthermore, • In contention based MAC protocols, as mobility increase MMAC-SW uses a dynamic frame size to enable the protocol the probability of collision increases accordingly, and hence to effectively adapt itself to changes in mobility conditions retransmissions are required which leads to high energy .Mobility prediction through the use of the first order auto consumption. A mobility aware MAC protocol should use the aggressive moving average model [14] is used to mobility information to wake-up and switch-off nodes dynamically adjust the frame size and control the channel accordingly in order to avoid collisions and decrease energy access in an efficient way according to the mobility consumption. conditions. We have designed and implemented the MMAC- SW protocol in event network simulator, where many • In scheduled based MAC protocols, a neighborhood simulation experiments are carried out to evaluate the inconsistency of two-hop neighbor information can occur, performance of MMAC-SW and compared it with MMAC when mobile nodes join or leave the neighborhood. This [14]. The rest of the paper is organized as follows. We leads to schedule inconsistencies. The MAC protocol should present and discuss some related works in section II. adapt the schedule according to mobility conditions in the Describes the MMAC-SW protocol, In section III describe network and determine which and when nodes are allowed to what will be the system model of the protocol. In section IV join or leave the neighborhood to eliminate these Describes the Data transfer phase performance is studied inconsistencies. through intensive simulation experiments. Finally, we conclude the paper in section V. • Generally, mobility information needed by the MAC protocols includes node positions and the mobility II. MMAC-SW PROTOCOL information of their neighbors for better mobility detection and handling. Therefore, the mobility information has to be In sensor networks, nodes may fail (e.g., power drained) periodically disseminated to neighboring nodes which or new nodes may be added (e.g., additional sensors increases the overhead in the form of control messages in the deployed), or sensor nodes may physically move from their MAC protocol. Instated of adding the mobility information locations, either because of the motion of the medium (e.g. into control packets of each layer, the mobility information water, air) or by means of a special motion hardware in the may be made common to different layers through a common mobile sensor nodes. To accommodate these topology control message. dynamics, our MMAC-SW protocol uses a hybrid approach of contention-based and scheduled-based schemes as in our • An important limitation in designing mobility adaptive previous MAC protocol (SEHM protocol) presented in [11]. MAC protocols for sensor network is the choice of the MMAC-SW differs from SEHM protocol in terms of mobility models considered in the design. It is important to mobility handling of sensor nodes. MMAC-SW adapts the choose a mobility model that applies to real life settings. frame length according to mobility conditions by incorporating a mobility prediction model. In the following III. SYSTEM MODEL section we discuss some mobility issues. A. Node Deployment A. Mobility Handling N identical sensor nodes are uniformly deployed in the region R. We take N to be a Poisson random variable of rate β Mobility in sensor networks brings some challenges in where is the node density. Let xi, i = 1, 2, ..., N, be the designing MAC protocols, which are mainly responsible for locations of the nodes. Additional source and sink nodes are packet scheduling, transmission, collision avoidance, and placed at fixed locations X0 = (0, 0) and XN+1 = (L, L) resolution. Handling mobility at MAC layer involves careful respectively. Thus including the source and sink nodes, there trade-off in energy efficiency, throughput, and robustness are a total of N + 2 nodes in the disk. rc is the communication under mobility. In this section, we discuss some mobility range of each node. Two nodes i and j are called neighbors if issues relevant to the MAC protocol design [19]. and only if |xi − xj | < rc. The distance between node i and sink (N + 1) is Li |XN+1 − Xi|. 37 All Rights Reserved © 2012 IJARCSEE
  • 3. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 6, August 2012 B. The Sleep-Wake Process desirable to develop forwarding algorithms that do not To conserve energy, each node performs periodic require even this knowledge. sleep-wake cycling. The sleep-wake times of the nodes are not synchronized. Since we are interested in studying the Data Transfer Phase delay incurred in routing due to sleep-wake cycling alone, we After the compilation of the clustering phase and the neglect the transmission delay, propagation delay and other CHs are advertised, the data transfer phase begins. Data overhead delays. This means that if node i has a packet to transfer in MMAC-SW is based on frames and the CHs transmit to its neighboring node j, then i can transmit control the frames. The CH is responsible for controlling the immediately at the instant j wakes up. We model this by channel access between sensor nodes within the cluster and taking the time for which a node stays awake to be zero. collects data from them. The frames are handled during More formally, let Ti, i = 1, 2, ...N + 1 be i.id. Random multiple phases using a hybrid scheme of CSMA and variables which are uniform on [0, T], where T is the period TDMA. Each frame is composed of two slots (see Fig. 1): of the sleep wake cycle. Then node i wakes up at the periodic mini slot and a dynamic normal slot. The Mini-slot is used to instants KT + Ti, K >0. We define the waiting time for i to transmit and receive control signals, and consists of three wake up at time t as, parts; Frame Synchronization (SYNC), Random Access, and Wi(t) = inf {KT + Ti > t : k >0} – t. Receive Scheduling. The Normal slot is used by sensor nodes to report their data to the CH. The frame length is made C. Forwarding Rules and Assumptions dynamic to make the protocol sensitive to mobility and traffic Forwarding rules dictate the actions a node can take when it conditions (i.e. the number of time slots is increased or has to transmit. We are interested in decentralized policies decreased according to the number of nodes that have data to where a node can take decisions only by observing the send). activities in its neighborhood (i.e., the disk of radius rc) centered around the node of interest). In this regard we impose some restrictions on the network. Traffic Model: There is a single packet in the network which is to be routed from the source to sink. At time 0, the packet is given to the source and the routing process begins. The nodes which get the packet for forwarding are called relay nodes. The packet traverses a sequence of relay nodes to eventually reach the sink, at which time the routing ends. Thus there is a single flow and further the flow consists of MMAC-SW protocol handles the channel access through the only one packet. This set up is reasonable, because in sensor following four phases: networks we can assume that the events are sufficiently separated in time and/or location so that the flows due to two Schedule Calculation and Distribution, and Data Transfer. events do not intersect. To avoid multiple packet Nodes that have data to send should content for the channel transmission by different nodes detecting the same event, the during the Request/Update/Join phase and send their requests nodes can resolve among themselves to select one node (say to the CH. As well those nodes which want to join or leave the one closest to the sink), which can then transmit. Further, to/from the cluster should send requests during this phase. the information about an event comprises its location, and Then, sensor nodes use the TDMA slots calculated and possibly target classification data, which along with some distributed by the CH to send their data during the data control bits can be easily incorporated in a single packet. This transfer phase to CHs. Sensor nodes that have no data to justifies the idea to study the performance of a single packet transmit go to sleep directly after the end of the mini-slot. alone. More details are given below about the operation of the MEMAC protocol in different phases: Forwarding Set: Each node knows its location and the location of the sink. The forwarding set of a node is the set of Synchronization phase: At the beginning of each frame, the its neighbors that are closer to the sink then itself. A relay head node broadcasts a SYNC message to all sensor nodes all node considers forwarding the packet only to a node in its sensor nodes should be in receive mode during this phase to forwarding set. Each node knows the number of neighbors in be able to capture the SYNC message. The SYNC message its forwarding set, but is not aware of their locations and contains synchronization information for the packet wake times. While in this paper we assume that each node Transmission. knows the number of nodes in its forwarding set, it would be 38 All Rights Reserved © 2012 IJARCSEE
  • 4. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 6, August 2012 Request/Leave/Join phase: During this phase, sensor nodes that have data to transmit content for the channel in order to acquire the access to send its request to the CH. The contention period should be long enough to enable all nodes that have data to send to pass their requests to the CH. As well, those nodes which are expected to leave or join the cluster should inform the CH by sending a leave or join message. Schedule Calculation and Distribution phase: In this phase the CH calculates the schedule and broadcasts it to the other nodes within the cluster. The schedule contains those nodes which have data to send only. Nodes that want to leave or join the cluster are not considered in the current schedule. IV. PERFORMANCE ANALYSIS Thus, the frame length is adjusted according to the number of request, leave, and join messages. If the number of request To study and evaluate the performance of the messages are greater than the number of join/leave messages, MMAC-SW protocol and compare it with MMAC protocol, then the frame length is increased otherwise the frame length we will used Sensor Simulator framework [24].. The is reduced. The frame adjustment algorithm of the MEMAC simulator contains a model of the EYES wireless sensor node protocol is an improved version of the mobility adaptive [26]. Furthermore, the simulator has the same limits as the algorithm presented in [13], the algorithm is as follow: EYES nodes have. Additionally, the simulator has modules 1. For all nodes within the cluster, calculate the predicted for all layers of the WSN protocol stack. The Energy states using the AR-l model. consumption in the EYES model is based on the amount of 2. For all nodes in the cluster, calculate the average estimated energy the radio consumes. The consumed energy by the location. CPU as a result of the protocol execution is not taken into 3. Using the above information construct the set of joining 'J' account. The motivation behind using Sensor Simulator is and leaving 'L' nodes. that it enables users to easily modify the sensor network and 4. Count the request messages and construct a set of nodes to implement large scale networks. Furthermore, it executes which have a data to send ' R'. at least an order of magnitude faster than NS-2 and makes 5. If a node n is a member of the set of joining or leaving more efficient use of the available memory [24]. In this nodes, do not consider n in the schedule. section we investigate the performance of the proposed 6. If the number of members in set 'R' are greater than the protocol MMAC-SW in a clustered network topology, and number of members in both sets of 'J' and 'L', then increase compare it against MMAC protocol. The performance the frame length, otherwise reduce the frame length. metrics used in the evaluation of MMAC-SW will be the 7. Adjust the frame normal slot and the random access period average energy consumption, average packet delivery ratio in the frame structure according to the new frame time. and average delay. Finally, the CH broadcasts the schedule packet to all sensor nodes that contains the TDMA slots for the subsequent phase V. CONCLUSION and FUTURE WORK "data transfer phase". In this phase all sensor nodes should be in receive mode. The evolution of stationary WSNs in conjunction with the advances made by the distributed robotics and low Data Transfer phase: In this phase, sensor nodes use the power embedded systems communities have led to a new TDMA slots to transmit their data to the CH or to class of Mobile Wireless Sensor Networks (MSNs). In communicate with their neighbors. All sensor nodes that have addition to the energy constraints and processing power no traffic to transmit or receive should turn their radios limitations, mobility in MSN adds a new design dimension. transceivers off and enter sleep mode. Once data are reported Most of the proposed MAC protocols for WSN networks are to CHs, the BS collects data from CHs. A dynamic TDMA designed assuming that sensor nodes are stationary. This scheme is used to allow CHs to access the channel and report assumption no longer valid for MSNs. Therefore designing a their data to the BS. The BS is responsible of calculating and mobility aware MAC protocols becomes more and more distributing time slots to CHs. We assume that all CHs have important. In this paper, we presented MMAC-SW protocol - data to report to the BS. As a result, the random access period an adaptive mobility aware and energy efficient MAC is removed, and the frame becomes as shown in Fig. 2. protocol for MSNs using sleep and wake up cycles. MMAC- SW combines the benefits of contention based and scheduled based protocols to achieve a significant amount of energy 39 All Rights Reserved © 2012 IJARCSEE
  • 5. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 6, August 2012 savings. MMAC-SW adjusts the frame length according to [10] Lingxuan Hu and David Evans, "Localization for Mobile mobility information of the sensor nodes and the number of Sensor Networks", Tenth Annual International Conference on nodes that have data to send, this avoids wasting slots by Mobile Computing and Networking (ACM Mobi Com 2004). excluding the nodes which are expected to leave or join the 26 September – 1 October 2004. cluster and those nodes which have no data to transmit from [11] M. Zhang, X. Du, and K. Nygard, "Improving Coverage the TDMA schedule, and to switch nodes to sleep mode Performance in Sensor Networks by Using Mobile Sensors," when they are not included in the communication process. Proc. IEEE Military Comm. Conf. (MILCOM '05), pp. 3335- Through extensive simulation experiments, we are proposed 3341,2005. our protocol and compared it against MMAC protocol. [12] Bashir Yahya, Jalel Ben-Othman, "Energy Efficient Simulation results will demonstrate that our MMAC-SW MAC Protocols in Wireless Sensor Networks", will appeared protocol performs the energy efficient in terms of average in Wiley series on Wireless Communications and Mobile energy consumption, average delivery ratio, and average Computing, 2009. packet delay. [13] Bashir Yahya, Jalel Ben-Othman,"A scalable and energy-efficient hybrid-based MAC protocol for wireless REFERENCES sensor networks", in the Proceedings of the 3rd ACM workshop on Performance monitoring and measurement of [1] Bashir Yahya, Jalel Ben-Othman, ”An Adaptive Mobility heterogeneous wireless an wired networks (PM2HW2N Aware and Energy Efficient Mac Protocol for wireless 2008), 67-71 Sensor Networks”, 978-1-4244-4671-1/09/$25.00 ©2009 [14]H. Takagi and L. Kleinrock, “Optimal Transmission IEEE Ranges for Randomly Distributed Packet Radio Terminals,” [2] J. Kim, X. Lin, and N. Shroff, “Optimal Anycast Communications, IEEE Transactions on. [legacy, pre - Technique for Delay-Sensitive Energy-Constrained 1988], vol. 32, no. 3, pp. 246–257, 1984. Asynchronous Sensor Networks,” in INFOCOM 2009. The [15] T.C. Hou and V. Li, “Transmission Range Control in 28th Conference on Computer Communications. IEEE, April Multihop Packet Radio Networks,” Communications, IEEE 2009, pp. 612–620. Transactions, vol. 34, no. 1, pp. 38–44,1986. [3]Bergbreiter, S. and Pister, K.SJ, "CotsBots: An Off-the- [16] B. Karp and H. T. Kung, “GPSR: Greedy Perimeter Shelf Platform for Distributed Robotics," In the Proceeding Stateless Routing for Wireless Networks,” in MobiCom ’00: of the IEEE International Conference on Intelligent Robots Proceedings of the 6th annual international conference on and Systems, Las Vegas, NV,2003. Mobile computing and networking. New York, NY, USA: [4] Dantu K., Rahimi M.H., Shah 1-1., Babel S., Dhariwal ACM Press, 2000, pp. 243–254. A., and Sukhatme G.S., "Robornote: Enabling mobility in [17]F. Kuhn, R. Wattenhofer, and A. Zollinger, “An sensor networks", In ACM Int. Conf. on Information Algorithmic Approach to Geographic Routing in Ad Hoc and Processing in Sensor Networks - SPOTS, 2005. Sensor Networks,” IEEE/ACM Trans. Netw., vol. 16, no. 1, [5] Allred 1, Hasan A.B., Panichsakul S., Pisano B., Gray 1'., pp. 51–62, 2008. Huang J-I-I., I-Ian R., Lawrence D., and Mohseni K., [18] S. Dulman, M. Rossi, P. Havinga, and M. Zorzi, “On the "SensorFlock An Airborne Wireless Sensor Network of Hop Count Statistics for Randomly Deployed Wireless Micro-Air Vehicles", In ACM Int. Conf. on Embedded Sensor Networks,” Int. J. Sen. Netw.,vol. 1, no. 1/2, pp. 89– Networked Sensor Systems, 2007. 102, 2006. [6]NittelS, TrigoniN, Ferentinos K., Neville F., Nural A., and Pettigrew N., "A drift-tolerant model for data management in ocean sensor networks", In ACM Workshop on Data Engineering for Wireless and Mobile Access, 2007. [7] Hull B., Bychkovsky V., Chen K., Goraczko M., Miu A., Shih E., Zhang Y., Balakrishnan H., and Madden S., "CarTel: A Distributed Mobile Sensor Computing System", In ACM Int. Conf. on Embedded Networked Sensor Systems, 2006. [8] Eriksson, Girod, L., Hull, B., Newton, R., Madden, S. and Balakrishnan H., "The Pothole Patrol: Using a Mobile Sensor Network for Road Surface Monitoring", In ACM Int. Conf. on Mobile Systems, Applications And Services 2008. [9] D. Zeinalipour-Yazti, H. Papadakis, C. Georgiou, M.D. Dikaiakos, "Mobile Sensor Network Data Management", Parallel Processing Letters Journal (PPL), September 2008. 40 All Rights Reserved © 2012 IJARCSEE