• Title/Summary/Keyword: Energy-Efficient MAC

Search Result 145, Processing Time 0.03 seconds

Selective Unacknowledged Transmission in IEEE 802.15.4 Considering Energy Efficiency (IEEE 802.15.4에서 에너지 효율성을 고려한 선택적 Unacknowledged 전송)

  • Yang, Hyun;Park, Tan-Se;Park, Chang-Yun;Jung, Chung-Il
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.6
    • /
    • pp.717-721
    • /
    • 2010
  • In general, wireless MAC uses the ACK for reliability. Meanwhile, in wireless sensor network, data is delivered periodically and redundantly. In these situations, every ACK transmission causes the reliability flexible applications to waste some energy. IEEE 802.15.4 developed for energy efficiency has the option of using ACK or not, but there are no researches exploiting this peculiarity. In this paper, we proposed the selective unacknowledged transmission satisfying some requirements (e.g., end-to-end delivery) by removing the ACK when frames are delivered well and using the ACK when frames are delivered poorly. Also, we performed several evaluations exploiting the NS2 simulator.

Performance Modeling and Evaluation of IEEE 802.15.4 Collision Free Period for Batch Traffic (배치 트래픽 특성을 고려한 IEEE 802.15.4 비경합구간 성능 모델링 및 평가)

  • Kim, Tae-Suk;Choi, Duke Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.11
    • /
    • pp.83-90
    • /
    • 2016
  • In this paper, we performed the analysis of transmission performance for Collision Free Period(CFP) supported by the low-power communication technology, IEEE 802.15.4 MAC (Media Access Control). For the analysis, periodic traffic, original service target of CFP, is considered and, according to the Quality of Service required, packet arrival pattern to MAC layer is categorized as batch and non-batch, and analysis on throughput, delay, and energy is performed for those patterns. On the basis of the obtained analysis, performance comparison with Collision Avoidance Period(CAP) is carried out for the health care applications that generate periodic traffic such as Pedometer, ECG, EMG. The evaluation confirms that CFP is more energy efficient for healthcare applications that generate periodic and time-critical traffic and moreover for the application with high bandwidth requirement CFP achieves up to 46% energy savings compared to CAP.

Hierarchical Real-Time MAC Protocol for (m,k)-firm Stream in Wireless Sensor Networks

  • Teng, Zhang;Kim, Ki-Il
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.2
    • /
    • pp.212-218
    • /
    • 2010
  • In wireless sensor networks (WSNs), both efficient energy management and Quality of Service (QoS) are important issues for some applications. For creating robust networks, real-time services are usually employed to satisfy the QoS requirements. In this paper, we proposed a hierarchical real-time MAC (medium access control) protocol for (m,k)-firm constraint in wireless sensor networks shortly called HRTS-MAC. The proposed HRTS-MAC protocol is based on a dynamic priority assignment by (m,k)-firm constraint. In a tree structure topology, the scheduling algorithm assigns uniform transmitting opportunities to each node. The paper also provides experimental results and comparison of the proposed protocol with E_DBP scheduling algorithm.

An Energy-Efficient Hybrid MAC Protocol for Wireless Sensor Networks (무선 센서 네트워크를 위한 에너지 효율적인 하이브리드 MAC 프로토콜)

  • Lee, Han-Sun;Lee, Hyung-Su;Chung, Kwang-Sue
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06d
    • /
    • pp.245-250
    • /
    • 2008
  • 본 논문에서는 무선 센서 네트워크 환경에서 센서 노드의 에너지 소모를 줄이고 네트워크의 수명을 최대화하기 위해 Tiered-MAC을 제안한다. Tiered-MAC은 싱크노드와 센서노드 로 구성되는 계층적 센서 네트워크 구조에서 싱크노드의 최대 전송 영역은 스케줄 기반의 TDMA를 사용하고, 이외의 영역은 경쟁 기반의 CSMA를 사용함으로써 많은 데이터 트래픽이 집중하여 혼잡상황이 잦은 싱크노드 주변의 송수산을 관리하여 불필요한 에너지 소비를 줄이도록 설계되었다. 스케줄 기반으로 동작할 때 공간사용을 최대 화 하여 전송률을 높이고 전송지연을 줄이는 슬롯할당 기법을 제안하였다. 또한 ns-2 시뮬레이터를 이용 한 실험을 통하여 제안한 기법의 성능을 CSMA와 TDMA를 비교하였고, 실험 결과를 통해 제안하는 기법이 에너지 효율적으로 동작하는 것을 확인하였다.

  • PDF

An Energy-Efficient Mobility-Supporting MAC Protocol in Wireless Sensor Networks

  • Peng, Fei;Cui, Meng
    • Journal of Communications and Networks
    • /
    • v.17 no.2
    • /
    • pp.203-209
    • /
    • 2015
  • Although mobile applications are an essential characteristic of wireless sensor networks, most existing media access control (MAC) protocols focus primarily on static networks. In these protocols, fixed periodic neighbor discovery and schedule updating are used to connect and synchronize neighbors to provide successful data transmission; however, they cannot adapt to mobile speed variation and degrade the network performance dramatically. In this paper, we propose a mobile-supporting mechanism for MAC protocols, in which the decision to update the neighbors of a mobile node is made adaptively according to the mobile speed. Analysis and simulation results demonstrate that the mechanism efficiently avoids the disconnection of amobile node from its neighbors and achieves a better performance as compared with fixed periodic neighbor discovery.

A Time Slot Assignment Scheme for Sensor Data Compression (센서 데이터의 압축을 위한 시간 슬롯 할당 기법)

  • Yeo, Myung-Ho;Kim, Hak-Sin;Park, Hyoung-Soon;Yoo, Jae-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.11
    • /
    • pp.846-850
    • /
    • 2009
  • Recently, wireless sensor networks have found their way into a wide variety of applications and systems with vastly varying requirements and characteristics such as environmental monitoring, smart spaces, medical applications, and precision agriculture. The sensor nodes are battery powered. Therefore, the energy is the most precious resource of a wireless sensor network since periodically replacing the battery of the nodes in large scale deployments is infeasible. Energy efficient mechanisms for gathering sensor readings are indispensable to prolong the lifetime of a sensor network as long as possible. There are two energy-efficient approaches to prolong the network lifetime in sensor networks. One is the compression scheme to reduce the size of sensor readings. When the communication conflict is occurred between two sensor nodes, the sender must try to retransmit its reading. The other is the MAC protocol to prevent the communication conflict. In this paper, we propose a novel approaches to reduce the size of the sensor readings in the MAC layer. The proposed scheme compresses sensor readings by allocating the time slots of the TDMA schedule to them dynamically. We also present a mathematical model to predict latency from collecting the sensor readings as the compression ratio is changed. In the simulation result, our proposed scheme reduces the communication cost by about 52% over the existing scheme.

An Enhanced Cross-layer Geographic Forwarding Scheme for Wireless Sensor Networks (무선 센서 네트워크에서 향상된 교차 계층 방식의 위치기반 데이터 전달 기법)

  • Kim, Jae-Hyun;Kim, Seog-Gyu;Lee, Jai-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8B
    • /
    • pp.712-721
    • /
    • 2012
  • In this paper, we propose an Enhanced cross-layer Geographic Forwarding (EGF) protocol for wireless sensor networks (WSNs). EGF uses an optimal back-off time to make the packet forwarding decisions using only source and destination's location information and energy cost without information about neighbor nodes' location or the number of one hop neighbor nodes. EGF is also a cross-layer protocol by combining efficient asynchronous MAC and geographic routing protocol. The proposed protocol can find optimal next hop location quickly without broadcasting node's location update and with minimizing overhead. In our performance evaluation, EGF has better performance in terms of packet success ratio, energy efficiency and end-to-end delay in wireless sensor networks.

PM-MAC : An Efficient MAC Protocol for Periodic Traffic Monitoring In Wireless Sensor Networks (무선 센서 네트워크에서 주기적인 트래픽의 효율적인 모니터링을 위한 MAC 프로토콜)

  • Kim, Dong-Min;Kim, Seong-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.157-164
    • /
    • 2008
  • In this paper we suggest a scheduling algorithm that transmits periodic traffics efficiently in tree-structured wireless sensor networks (WSNs). The related research[l] showed the problems such as increasing the energy consumption and decreasing the data throughput as the depth of tree increases. To solve these problems. we use idle time slots and avoid the redundancy at data transmission. Also we suggest the algorithm that transmits the control packet when it is similar to a previously measured data. And if emergency data is occurred, our proposed algorithm transits that data in EDP(Emergency Data Period) for reducing the wait time. The proposed algorithm shows more data throughput and less energy consumption than that of the related research.

  • PDF

Security Model for Tree-based Routing in Wireless Sensor Networks: Structure and Evaluation

  • Almomani, Iman;Saadeh, Maha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.4
    • /
    • pp.1223-1247
    • /
    • 2012
  • The need for securing Wireless Sensor Networks (WSNs) is essential especially in mission critical fields such as military and medical applications. Security techniques that are used to secure any network depend on the security requirements that should be achieved to protect the network from different types of attacks. Furthermore, the characteristics of wireless networks should be taken into consideration when applying security techniques to these networks. In this paper, energy efficient Security Model for Tree-based Routing protocols (SMTR) is proposed. In SMTR, different attacks that could face any tree-based routing protocol in WSNs are studied to design a security reference model that achieves authentication and data integrity using either Message Authentication Code (MAC) or Digital Signature (DS) techniques. The SMTR communication and processing costs are mathematically analyzed. Moreover, SMTR evaluation is performed by firstly, evaluating several MAC and DS techniques by applying them to tree-based routing protocol and assess their efficiency in terms of their power requirements. Secondly, the results of this assessment are utilized to evaluate SMTR phases in terms of energy saving, packet delivery success ratio and network life time.