SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 
E-ISSN: 2321-9637 
Reliable Mac Sensing Protocol for Underwater Sensor 
48 
Networks 
Ms.Manjupriya, R1, Mr.Christhuraj, M.R2 
Computer Science and Engineering1, 2 , P.G Scholar1, Assistant Professor 2 
Email: manjupriya.me@gmail.com1, mrchristhuraj@gmail.com2 
Abstract- The proposed CDMA based Medium Access Control (MAC) Protocol multihop wireless 
network that uses multiple channel and dynamic channel selection method. The comparisons is conceded out by 
means of analytical models, which are used to confine the activities of a node that acts according to either 
considered specifically for the underwater acoustic environment ,APCAP,DACAP and T-Lohi.the focus is on 
throughput delay and energy performance (traffic load ,node density ,single and multihop topologies).The 
results mainly highlights relevant design tradeoffs that can be exploited in order to properly tune protocol 
performance .These results allow understanding which protocol is more suited to given network setting ,and are 
expected to be of help in designing novel protocol that possibly outperform currently available solutions. 
Index Terms- Medium Access Control, Underwater acoustic sensor networks, sonobuoys 
1. INTRODUCTION 
Underwater mobile communications is an 
important area of research in the field of underwater 
technology. With the brisk advance of submarine and 
underwater acoustic sensor networks (UWA) data 
communication, the present development trend is the 
construction, the present development trend is the 
construction of net comprising mobile and fixed 
nodes [1]. The environment of mobile UWA 
communication is Made more complicated is made 
more complicated by the existence of Doppler effects 
and multi-path phenomena. There is an urgent need 
for research on high-performance mobile UWA 
communication techniques. Underwater mobile 
communications are used in the field of ocean 
monitoring to detect tectonic movements, incoming 
tsunamis and water pollution [2]. 
The main focus of the work is about 
monitoring underwater safe co2 storage and remote 
control of submarine oil Extraction using medium 
access control (MAC) protocol. Geologic storage of 
carbon dioxide (co2) is the underwater disposal of co2 
from large industrial sources such as power plants 
.carbon capture and storage (CCS) also known as 
carbon capture and restoration, includes geologic 
cargo space as one of its components [1].CCS is a 
powerful tool along with energy competence, fuel 
switching as well as renewable power sources 
essential to reducing atmospheric co2 levels. Many 
surveys show that the most effective and least costly 
way to reduce co2 levels to avoid climate change is to 
use all co2 reduction tools; including ccs. However the 
burning fossils fuels is increasing co2 levels in the 
atmosphere above naturally occurring levels, 
contributing to global climate change. 
The geological carbon capture and storage (CCS) 
techniques consist of capturing co2 from power and 
industries activities and storing it in subterranean 
geological. Consumption of underwater nodes that 
testimony data during the monitoring mission, and 
then recover the instruments to retrieve the data. 
Wiring of the underwater nodes to a surface station in 
order to draw together the data on-line and in real 
time [2]. 
Underwater co2. Storage infrastructures decreasing 
the costs of underwater monitoring while at the same 
time providing higher flexibility than existing 
systems. Nodes in the network are connected via 
Acoustic links in an underwater sensor network which 
provides robust, real life communications of the 
monitoring data both in single hop and multi hop 
deployments [1][2].The solutions allow collecting 
data and sending instruction to the devices deploy in 
the set of connections different devices in the 
network. The paper is structured as follows. Section II 
describe the literature survey to facilitate we have 
investigated. The associated work in Section III. The 
concert evaluation and methodology is investigated 
within Section IV. As a final point, Section V 
concludes the paper. 
2. LITERATURE SURVEY 
Pressure Routing for Underwater Sensor 
Networks a SEA Swarm (Sensor Equipped Aquatic 
Swarm) is a sensor cloud that drifts with water 
currents and enables monitoring of local underwater 
events such as contaminants, marine living and
International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 
E-ISSN: 2321-9637 
49 
intruder [3]. The goal is to design an efficient any cast 
routing algorithm for reliable underwater sensor event 
reporting to any one of the float up sonobuoys. Main 
challenges are the ocean current as well as the 
Limited possessions (bandwidth and energy [3]). 
Addressing these challenges and proposes Hydro 
Cast, a hydraulic pressure based any cast routing 
protocol that exploits the measured pressure levels to 
route data to surface buoys. 
An Energy-Efficient MAC Protocol for Wireless 
Sensor Networks. S-MAC, a medium-access control 
(MAC) protocol designed for wireless sensor 
networks. Wireless sensor networks use [4] Battery-operated 
computing as well as sensing procedure. A 
expect sensor networks to be deployed in an adhoc 
fashion, with individual nodes remaining largely 
inactive for elongated periods of time but 
subsequently flattering ,gradually active when 
something is detected. Wireless MACs energy 
conservation and self-configuration are most 
important goals, despite the fact that per-node fairness 
and latency are not as much of important [4].In 
conclusion, S-MAC applies message passing to 
reduce contention latency for sensor-network 
applications that require store-and forward processing 
as data move through the network. 
Propagation-delay-tolerant MAC Protocol 
for Underwater Acoustic Sensor network. Underwater 
acoustic sensor networks (UASN) can be employed in 
a vast variety of applications, retrieving exact and up-to- 
date information commencing underneath the 
oceans Surface. While broadly used by terrestrial 
sensor networks, radio frequencies (RF) do not 
propagate well underwater [5]. Acoustic channels are 
therefore employed as an alternative to support long-distance 
and low-power communication in underwater 
sensor Networks even though acoustic signals suffer 
from long propagation delay and have very limited 
bandwidth. 
An adaptive propagation-delay-tolerant 
collision-avoidance protocol (APCAP) for the MAC 
sub layer of UASN. The protocol includes an 
improved handshaking mechanism [5] that improves 
efficiency and throughput in UASN where there is a 
large propagation delay. In addition, it also allows a 
node to utilize its idle time whilst waiting for 
messages to propagate, which is otherwise washed out 
by most existing MAC protocols, exhibits good 
performance and outperforms the other MAC 
protocols. 
Distance Aware Collision Avoidance 
Protocol for Ad-Hoc Underwater Acoustic Sensor 
Networks. A channel access protocol for ad-hoc 
underwater acoustic networks which are characterized 
by long propagation delays and unequal 
transmit/receive power requirements. The protocols 
save broadcast energy by avoiding collisions while 
maximizing throughput [6]. It is based on minimizing 
the duration of a hand-shake by taking the advantage 
of receiver tolerance to interference when the two 
nodes are closer than the maximum transmission 
range [6]. 
This protocol achieves a throughput several 
times higher than that of the Slotted FAMA, while 
contribution comparable savings in energy. Even 
though carrier sensing ALOHA offers an elevated 
throughput, it wastes much more power on collisions 
DOTS: A Propagation Delay-aware 
Opportunistic MAC Protocol for Underwater Sensor 
Networks Underwater Acoustic Sensor Networks 
(UW-ASNs) use acoustic links as a means of 
communications,[7] low bandwidth, and high 
transmission power consumption. A proposed the 
Delay-aware Opportunistic Transmission Scheduling 
to increase the chances of concurrent transmissions 
while reducing the likelihood of collisions. DOTS 
achieves better channel utilization by harnessing both 
temporal, and spatial reuse when allows out of- order 
packet delivery and packet trains at the sender side [7] 
Second, consideration is to capture effect as in 
Interference Aware (IA) MAC [7] where a 
receiver can correctly decode a packet even in the 
presence of other concurrent transmissions. Third, 
when a data frame is correctly received but the 
corresponding ACK gets lost due to lossy channel or 
collision, Windowed ACK [7] can help contain the 
number of spurious retransmissions and increase the 
throughput. Fourth, the impact of mobility and 
random topologies on the throughput and fairness will 
be carefully investigated. The table1 below indicates 
the comparison table for MAC related protocols.
International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 
E-ISSN: 2321-9637 
50 
TABLE1: COMPARSION TABLE FOR MAC RELATED PROTOCOL 
, 
3. RELATED WORKS 
There has been intensive research on MAC 
protocols for terrestrial ad hoc [15] and wireless 
sensor networks [13. For example, channel access 
control in underwater acoustic sensor networks poses 
challenges such as the limited bandwidth, very high 
and variable propagation delay, channel asymmetry, 
in addition to the serious multipath and vanishing 
phenomena. The design of a MAC protocol is 
challenging for the operation of energy-limited sensor 
nodes in UWASNs due to energy limitations, long 
propagation delays, and low data rates and so on. The 
propagation speed of sound in underwater is on the 
subject of 1500m/s. Therefore, propagation delay in 
underwater channels is five orders of magnitude 
higher than that in radio frequency (RF) terrestrial 
channels, and extremely variety that depends on 
temperature, salinity, and depth, while propagation 
delay is negligible for short-range RF. Long 
propagation delay is the main character of UWASNs 
[18], two scenarios will be considered here. In the 
First scenario, the transmitted packet from a 
transmitting node has to be received by all the other 
sensor nodes within the communication range 
broadcasting locally gathered information, which we 
call B-MAC. In the second scenario, it has to be 
received by all the sensor nodes in the communication 
range of the transmitter excluding the nodes which 
have packets to send, (e.g., broadcasting Localization 
packets from anchors), which we call L-MAC 
[13].The design of a MAC protocol is challenging for 
the operation of energy-limited sensor nodes in 
UWASNs due to energy limitations, long propagation 
delays, and low data rates and so on. All these factors 
play an important role on control algorithms of MAC 
protocols the goal of the network is to minimize the 
time duration of the broadcasting (or localization) task 
which is defined as the time of collision-free 
transmission of all packets from the transmitting 
nodes. If we assign a waiting time to each transmitting 
node which can be interpreted as the time that a node 
PURPOSE AND 
METHODOLOGY 
MERITES DEMERITES APPLICATIONS 
Pressure Routing for 
Underwater Sensor Networks In 
geographic routing, a packet is 
greedily forwarded to the closest 
node to the destination in order 
to minimize the average hop 
count. 
Hop count is decreased 
Packet losses increased, reliability 
reduced 
WI-FI satellite 
An Energy-Efficient MAC 
Protocol for Wireless Sensor 
Networks. To achieve the 
primary goal of energy 
efficiency to identify what are 
the main sources that cause 
inefficient use of energy trade-offs 
to reduce energy 
consumption 
reducing energy 
consumption 
Transmission delay low-power radios, 
A Propagation Delay-aware 
Opportunistic MAC 
Protocol for Underwater Sensor 
Networks. To boost the chances 
of concurrent transmissions 
while reducing the likelihood of 
collisions. 
minimize data packet, 
Energy consumption 
long propagation latency 
and the severely limited bandwidth 
of acoustic communications. 
wireless satellite links, oil 
and chemical spill monitor, 
submarine detection, and 
Surveillance. 
Design of a Propagation-delay- 
tolerant MAC Protocol for 
Underwater Acoustic Sensor. 
The protocol includes an 
enhanced handshaking method 
that Improves effectiveness and 
throughput in UASN where 
there is a large propagation 
delay. 
Compulsory maximum 
latency 
RF signals deliver very poor 
performance underwater 
onshore applications
International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 
E-ISSN: 2321-9637 
51 
has to wait to transmit its packet, the problem can be 
formulated as 
S.t. and collision –free transmission. 
Where wk is the waiting time of node k, and Rk 
is the data rate at which node k transmits its 
packet[16].The propagation speed of acoustic signal 
in underwater environment is about 1500m/s. Offered 
load and Throughput are employed to measure the 
performance of various protocols in this paper, which 
are define by and respectively [14]. 
(OL is Offered Load) 
In addition, showed that the performance of a MACA-like 
protocol that employs RTS/CTS handshaking is 
also severely constrained by a long propagation delay. 
The ratio of the propagation delay to the frame length 
as 
Where P is the propagation delay, and K is the size of 
a frame in bytes throughput delivered by CSMA 
decreases as increases (that is, as the data rate 
increases in the normalized simulations). This means 
that for a certain propagation delay, CSMA delivers a 
higher throughput if nodes. Transmit at a lower data 
rate. In the meantime, handshaking delivers [18] even 
lower throughput than CSMA at the same data rate, 
though almost negligibly so. This is because 
handshaking incurs extra RTS and CTS frames prior 
to sending a data frame; and worse, when 
handshaking fails, the time spent on propagating the 
control frames (i.e., RTS and CTS frames) is wasted. 
4. PROPOSED APPROACH 
To support the retrieval of accurate and up-to- 
date information from beneath the world's oceans, 
it is desirable to organize underwater sensor networks 
The Propagation Delay Aware Protocol (PDAP) uses 
the RTS/CTS mechanism for channel reservation and 
transmission. All nodes are synchronized. Similarly to 
APCAP, when a node has a data packet to transmit, it 
checks its own schedule to find free times for the 
whole communication exchange; namely, for sending 
the RTS, receiving the CTS, and sending the data 
packet[14]. The time for receiving the CTS must start 
after the time needed for the RTS to reach the 
destination plus the time for the CTS to get back.[10]. 
This waiting time is randomly and uniformly chosen 
in [0, T], where T = 2 ^txRetry (2*maxDelay + 
rtsTime). When it is time to send the RTS a node 
checks the channel. If it is idle, the node sends the 
RTS and waits for the CTS. Otherwise, the sender 
clears its schedule (RTS, CTS and data packet times), 
increases its retry counter and selects new times for 
sending the RTS, receiving the CTS and for sending 
data. Both RTS and CTS control packets contain 
information about [11] the distance between the 
source and destination. This distance is computed 
based on the channel propagation delay and the time 
stamps on the control packets. Therefore, this 
information is updated every time nodes 
communicate. The RTS is 15Bytes long and the CTS 
are 9Bytes. When a potential interferer receives a 
control packet from a neighboring node, in case it has 
scheduled a transmission that could collide with 
ongoing communication it updates its own schedule 
and delays its transmission [16] Reception of RTS and 
CTS by a possible interferer is dealt with as follows. 
When the interferer receives an RTS packet, it sets its 
NAV so that it will not be transmitting control 
information that would arrive at the sender at the 
scheduled CTS reception time. It also will not 
transmit a control packet that would arrive at the 
destination while the destination is sending the CTS 
similarly; the interferer will not transmit control 
information that would arrive at the sender during the 
transmission of the data packet and at the destination 
while it is receiving the data [19]. When the 
interfering node receives the CTS, it updates its NAV 
according to the reception time carried on the CTS. 
As a consequence, the interferer will not transmit 
control information that would arrive at the 
destination during the reception of the data packet, 
and at the source during the data transmission. 
Although trying to schedule the highest possible 
number of parallel transmissions [7], nodes always 
attempt to avoid collisions and that senders are 
synchronized when transmitting packets. 
. 
5. EXPERIMENTAL SETUP 
The hardware setup includes Pentium IV 
processor of 1GB RAM with 2.7GHZ of processor 
speed The test beds use VMware Workstation that 
performs testing and development environment NS-2 
is n event driven packet level network simulator 
developed as a part of the VINT project (Virtual 
Internet Test bed). The Ns-2 with C++/OTCL 
integration feature, Object oriented Tcl (OTcl) called
International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 
E-ISSN: 2321-9637 
52 
as a scripting language. It is an open source software 
package available for both Windows 32 and Linux 
platforms. NS2 uses two languages because simulator 
has two different kinds of things it needs to do. On 
one offer, exhaustive simulations of protocols require 
a systems programming language which can 
efficiently operate bytes, packet headers, and execute 
algorithms to facilitate to run over large data sets. 
4.1. Single hop networks: 
Table 2: Received data packets (low traffic) 
NUMBER 
OF PACKETS 
DACAP T-LOHI PDAP 
0.02 - 5 90 
0.04 - - 92 
0.06 - - 94 
0.1 - - - 
0.12 8 - - 
0.14 - - - 
0.16 - - - 
0.18 7 - 95 
Table3: Received data packets (high traffic) 
NUMBER 
OF 
PACKETS 
DACAP T-LOHI PDAP 
0.4 85 - - 
0.6 60 91 - 
0.8 40 95 60 
1 30 80 50 
1.2 20 - - 
4.2. Multi hop networks: 
Table 4: Latency with low traffic 
NUMBER 
OF 
PACKETS 
DACAP PDAP T-LOHI 
0.14 66 81 - 
0.16 50 82 - 
0.18 30 0 - 
0.2 - - 91 
0.22 - 83 - 
0.24 - - 93 
0.26 19 - - 
Table 5 Latency with high traffic 
5.1 Result analysis 
Single-hop: All nodes can communicate to each 
other directly. Multi-hop: Communications from a 
source to the sink may go through a multi-hop path. 
The path is determined by a shortest path routing 
protocol. In the multi-hop setting, the total size of the 
data packet is situate by the payload plus the headers 
of the different layers (physical through network 
APCAP and PDAP fall in the middle in terms of 
latency, with APCAP commanding lower latencies 
because of its hostile behavior. PDAP does not have 
an aggressive policy of channel access. Even though 
trying to schedule the maximum possible number of 
parallel transmissions, nodes always attempt to avoid 
collisions and that senders are matched after 
transmitting packets 
Figure.1. single hop networks with low traffic 
. 
NUMBER OF 
PACKETS 
DACAP T-LOHI 
PDAP 
0.03 5 - - 
0.05 2 - - 
0.06 - - 7 
0.07 10 - - 
0.08 - - - 
0.09 - - - 
0.1 10 - 12 
0.11 12 - - 
0.12 15 8 - 
0.13 20 - 20
International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 
E-ISSN: 2321-9637 
53 
Figure.2. single hop with high traffic 
Figure.3. multi hop network with high traffic 
6. CONCLUSION 
A MAC protocol for UWA networks using 
transmission range has been chosen so as to maximize 
the network performance in terms of throughput and 
delay Future work should concentrate on the 
development of algorithms for network maintenance 
and for updating the routing tables of the mobile 
nodes. Another point that the future work should 
address is the backoff algorithm. This first version of 
Slotted FAMA uses a simple backoff procedure. The 
use of adaptive backoff times (as used in MACAW) 
should be studied to provide a better performance of 
the protocol and to favor fairness, mainly in high 
traffic situations. In long slot situations, the use of 
simultaneous bidirectional communications should be 
studied. This means that in situations where the 
propagation delay is high, transmitter and receiver 
could send a packet to each other simultaneously 
without leading to a collision. This could be worn to 
admit trains of packets, because they have to be 
acknowledged one by one. Future guidelines of this 
effort consist of, within fact, the addition of this study 
through the application of the same analysis 
methodology to additional MAC protocols, the 
assessment of analytical results with simulations, and 
the design of a novel protocol based on the insight 
provided by analysis 
7. REFERENCES 
[1] Annunziatellis, Aldo, Stefano Graziani, Salvatore 
Lombardi, Chiara Petrioli, and Roberto Petroccia. 
"CO2Net: A marine monitoring system for CO 2 
leakage detection." In OCEANS, 2012-Yeosu, 
pp. 1-7 IEEE, 2012. 
[2] Ahn, Joon, and Bhaskar Krishnamachari 
"Performance of a propagation delay tolerant 
ALOHA protocol for underwater wireless 
networks." In Distributed Computing in Sensor 
Systems, pp. 1-16. Springer Berlin Heidelberg, 
2008. 
[3] Chu, Y., P. D. Mitchell, and D. Grace. 
"Reinforcement learning based ALOHA for 
multi-hop wireless sensor networks with 
informed receiving." In Wireless Sensor Systems 
(WSS 2012), IET Conference on, pp. 1-6. IET, 
2012. 
[4] G, T., J. Gale , C. Hendriks, S. Holloway, R. 
Brandsma, E. Kreft and A. Lokhorst, 2005b: Cost 
curves for CO2 storage: European sector. 
Proceedings of the 7th International Conference 
on Greenhouse Gas Control Technologies 
(GHGT-7), September 5–9, 2004, Vancouver, 
Canada, v.I, 603-610. 
[5] Guo , Xiaoxing, Michael R. Frater, and Michael 
J. Ryan. "Design of a propagation-delay-tolerant 
MAC protocol for underwater acoustic sensor 
networks. " Oceanic Engineering, IEEE Journal 
of 34, no. 2 (2009): 170-180. 
[6] Hu, Qian, and Zhenzhou Tang. "An improved 
adaptive MAC protocol for wireless sensor 
networks based on cross-layer architecture." 
In Wireless Communications & Signal 
Processing, 2009. WCSP 2009. International 
Conference on, on, pp. 1-5. IEEE, 2009. 
[7] Liu, Yunhuai, and Lionel M. Ni. "A new MAC 
protocol design for long-term applications in 
wireless sensor networks." In Parallel and 
Distributed Systems, 2007 International 
Conference on, vol. 2, pp. 1-8. IEEE, 2007 
[8] Lee, Uichin, Paul Wang, Youngtae Noh, F. L. M. 
Vieira, Mario Gerla, and Jun-Hong Cui. "Pressure 
routing for underwater sensor networks." 
In INFOCOM, 2010 Proceedings IEEE, pp. 1-9 
IEEE, 2010. 
[9] Lin, Wen, En Cheng, and Fei Yuan. "A MACA-based 
MAC protocol for Underwater Acoustic 
Sensor Networks." Journal of Communications 6, 
no. 2 (2011). 
[10] Noh, Youngtae, Paul Wang, Uichin Lee, 
Dustin Torres, and Mario Gerla. "DOTS: A 
propagation Delay- aware Opportunistic MAC 
protocol for underwater sensor networks." 
In Network Protocols (ICNP), 201018th IEEE 
International Conference on pp. 183-192.IEEE 
2010. 
[11] Peleato, Borja, and Milica Stojanovic. 
"Distance aware collision avoidance protocol for 
ad-hoc underwater acoustic sensor networks."
International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 
E-ISSN: 2321-9637 
54 
Communications Letters, IEEE 11, no. 12 (2007): 
1025-1027 
[12] Ramezani, Hamid, and Geert Leus. "DMC-MAC: 
dynamic multi-channel Mac in underwater 
acoustic networks." 
[13] Sayadi, Afef, Saoucene Mahfoudh, and Anis 
Laouiti. "Sensor-OSTR: Novel energy-efficient 
dynamic TDMA frame size-based MAC Protocol 
for Wireless Multi-hop Sensor Networks." 
In Wireless Days (WD),), 2012 IFIP, pp. 1-3. 
IEEE, 2012. 
[14] Shen, Jian, Faliu Yi, Sangman Moh, and 
Ilyong Chung. "Energy Efficiency of MAC 
Protocols in Wireless Sensor Networks." 
In Information Science and Applications 
(ICISA), 2011 International Conference on, 
pp1-10. IEEE, 2011. 
[15] Tang, Zhenzhou, and Qian Hu. "ALLEE-MAC: 
An Adaptive Low Latency and Energy 
Efficient MAC Protocol for Wireless Sensor 
Networks." In Telecommunications (AICT), 2010 
Sixth Advanced International Conference on, pp. 
269-274.IEEE,2010. 
[16] Van Hoesel, Lodewijk FW, and Paul JM 
Havinga. " A lightweight medium access protocol 
(LMAC) for wireless sensor networks: Reducing 
preamble transmissions and transceiver state 
switches." (2004). 
[17] Xiao, Yang, Miao Peng, John Gibson, 
Geoffrey G. Xie, Ding-Zhu Du, and Athanasios 
V. Vasilakos. "Tight performance bounds of 
multihop fair access for MAC protocols in 
wireless sensor networks and underwater sensor 
networks."Mobile 
[18] Yessad, Samira, Farid Nai't-Abdesselam, 
Tarik Taleb, and Brahim Bensaou. "R-MAC: 
Reservation medium access control protocol for 
wireless sensor networks." In Local Computer 
Networks, 2007. LCN 2007. 32nd IEEE 
Conference on, pp. 719-724. IEEE,2007. 
[19] Ye, Wei, John Heidemann, and Deborah 
Estrin. "An energy-efficient MAC protocol for 
wireless sensor networks." In INFOCOM 2002. 
Twenty-First Annual Joint Conferences of the 
IEEE Computer and Communications Societies. 
Proceedings. IEEE, vol. 3, pp. 1567-1576. IEEE, 
2002. 
[20] Yessad, Samira, Farid Nai't-Abdesselam, 
Tarik Taleb, and Brahim Bensaou. "R-MAC: 
Reservation medium access control protocol for 
wireless sensor networks." In Local Computer 
Networks, 2007. LCN 2007. 32nd IEEE 
Conference on, pp. 719-724. IEEE, 2007.

More Related Content

What's hot

RMEER: Reliable Multi-path Energy Efficient Routing Protocol for Underwater W...
RMEER: Reliable Multi-path Energy Efficient Routing Protocol for Underwater W...RMEER: Reliable Multi-path Energy Efficient Routing Protocol for Underwater W...
RMEER: Reliable Multi-path Energy Efficient Routing Protocol for Underwater W...IJECEIAES
 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...ijwmn
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
 
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...ijasuc
 
A secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networksA secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networksAAKASH S
 
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...AAKASH S
 
Qo s oriented distributed routing protocols : anna university 2nd review ppt
Qo s   oriented  distributed routing  protocols : anna university 2nd review pptQo s   oriented  distributed routing  protocols : anna university 2nd review ppt
Qo s oriented distributed routing protocols : anna university 2nd review pptAAKASH S
 
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...IJSRED
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architectureijsrd.com
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ijcsit
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsmmjalbiaty
 
An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...IJECEIAES
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routingIJCNCJournal
 
29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishor29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishorijaprr_editor
 
Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2Rushin Shah
 
Review on Localization based Routing Protocols for Underwater Wireless Sensor...
Review on Localization based Routing Protocols for Underwater Wireless Sensor...Review on Localization based Routing Protocols for Underwater Wireless Sensor...
Review on Localization based Routing Protocols for Underwater Wireless Sensor...IJECEIAES
 
QOD routing protocols : phase 1 ppt
QOD routing  protocols : phase 1 pptQOD routing  protocols : phase 1 ppt
QOD routing protocols : phase 1 pptAAKASH S
 

What's hot (18)

RMEER: Reliable Multi-path Energy Efficient Routing Protocol for Underwater W...
RMEER: Reliable Multi-path Energy Efficient Routing Protocol for Underwater W...RMEER: Reliable Multi-path Energy Efficient Routing Protocol for Underwater W...
RMEER: Reliable Multi-path Energy Efficient Routing Protocol for Underwater W...
 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
 
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
 
A secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networksA secure qos distributed routing protocol for hybrid wireless networks
A secure qos distributed routing protocol for hybrid wireless networks
 
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
 
Qo s oriented distributed routing protocols : anna university 2nd review ppt
Qo s   oriented  distributed routing  protocols : anna university 2nd review pptQo s   oriented  distributed routing  protocols : anna university 2nd review ppt
Qo s oriented distributed routing protocols : anna university 2nd review ppt
 
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architecture
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraints
 
An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routing
 
Ttacca
TtaccaTtacca
Ttacca
 
29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishor29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishor
 
Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2
 
Review on Localization based Routing Protocols for Underwater Wireless Sensor...
Review on Localization based Routing Protocols for Underwater Wireless Sensor...Review on Localization based Routing Protocols for Underwater Wireless Sensor...
Review on Localization based Routing Protocols for Underwater Wireless Sensor...
 
QOD routing protocols : phase 1 ppt
QOD routing  protocols : phase 1 pptQOD routing  protocols : phase 1 ppt
QOD routing protocols : phase 1 ppt
 

Viewers also liked

Paper id 28201446
Paper id 28201446Paper id 28201446
Paper id 28201446IJRAT
 
Paper id 21201434
Paper id 21201434Paper id 21201434
Paper id 21201434IJRAT
 
Paper id 252014130
Paper id 252014130Paper id 252014130
Paper id 252014130IJRAT
 
Paper id 2320144
Paper id 2320144Paper id 2320144
Paper id 2320144IJRAT
 
Paper id 21201477
Paper id 21201477Paper id 21201477
Paper id 21201477IJRAT
 
Paper id 28201413
Paper id 28201413Paper id 28201413
Paper id 28201413IJRAT
 
Lənkəran şəhər A.Məhərrəmov adına 7 № li tam orta məktəb
Lənkəran şəhər A.Məhərrəmov adına 7 № li tam orta məktəb Lənkəran şəhər A.Məhərrəmov adına 7 № li tam orta məktəb
Lənkəran şəhər A.Məhərrəmov adına 7 № li tam orta məktəb Seadet76
 
Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106IJRAT
 
Paper id 21201423
Paper id 21201423Paper id 21201423
Paper id 21201423IJRAT
 
Instituto tecnologico de cerro azul
Instituto tecnologico de cerro azulInstituto tecnologico de cerro azul
Instituto tecnologico de cerro azulEdiel Domingo Santos
 
Paper id 21201422
Paper id 21201422Paper id 21201422
Paper id 21201422IJRAT
 
Paper id 23201426
Paper id 23201426Paper id 23201426
Paper id 23201426IJRAT
 
Paper id 21201485
Paper id 21201485Paper id 21201485
Paper id 21201485IJRAT
 
Paper id 24201424
Paper id 24201424Paper id 24201424
Paper id 24201424IJRAT
 
3d work slide show
3d work slide show3d work slide show
3d work slide showLibby Lynch
 
Paper id 2920141
Paper id 2920141Paper id 2920141
Paper id 2920141IJRAT
 
2015北投區參與式預算宣傳投影片
2015北投區參與式預算宣傳投影片2015北投區參與式預算宣傳投影片
2015北投區參與式預算宣傳投影片平台 青
 
Paper id 252014107
Paper id 252014107Paper id 252014107
Paper id 252014107IJRAT
 

Viewers also liked (20)

Paper id 28201446
Paper id 28201446Paper id 28201446
Paper id 28201446
 
Paper id 21201434
Paper id 21201434Paper id 21201434
Paper id 21201434
 
Paper id 252014130
Paper id 252014130Paper id 252014130
Paper id 252014130
 
Paper id 2320144
Paper id 2320144Paper id 2320144
Paper id 2320144
 
Presentación1
Presentación1Presentación1
Presentación1
 
Paper id 21201477
Paper id 21201477Paper id 21201477
Paper id 21201477
 
Paper id 28201413
Paper id 28201413Paper id 28201413
Paper id 28201413
 
Lənkəran şəhər A.Məhərrəmov adına 7 № li tam orta məktəb
Lənkəran şəhər A.Məhərrəmov adına 7 № li tam orta məktəb Lənkəran şəhər A.Məhərrəmov adına 7 № li tam orta məktəb
Lənkəran şəhər A.Məhərrəmov adına 7 № li tam orta məktəb
 
Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106
 
Paper id 21201423
Paper id 21201423Paper id 21201423
Paper id 21201423
 
Instituto tecnologico de cerro azul
Instituto tecnologico de cerro azulInstituto tecnologico de cerro azul
Instituto tecnologico de cerro azul
 
Paper id 21201422
Paper id 21201422Paper id 21201422
Paper id 21201422
 
Paper id 23201426
Paper id 23201426Paper id 23201426
Paper id 23201426
 
Paper id 21201485
Paper id 21201485Paper id 21201485
Paper id 21201485
 
Paper id 24201424
Paper id 24201424Paper id 24201424
Paper id 24201424
 
3rd quarter-lesson-1-part-1
3rd quarter-lesson-1-part-13rd quarter-lesson-1-part-1
3rd quarter-lesson-1-part-1
 
3d work slide show
3d work slide show3d work slide show
3d work slide show
 
Paper id 2920141
Paper id 2920141Paper id 2920141
Paper id 2920141
 
2015北投區參與式預算宣傳投影片
2015北投區參與式預算宣傳投影片2015北投區參與式預算宣傳投影片
2015北投區參與式預算宣傳投影片
 
Paper id 252014107
Paper id 252014107Paper id 252014107
Paper id 252014107
 

Similar to Paper id 25201440

Energy Efficient Routing Protocols for UWSN: A Review
Energy Efficient Routing Protocols for UWSN: A ReviewEnergy Efficient Routing Protocols for UWSN: A Review
Energy Efficient Routing Protocols for UWSN: A ReviewTELKOMNIKA JOURNAL
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...ijfcstjournal
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...ijfcstjournal
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...IJCNCJournal
 
Review on MAC Protocols for underwater acoustic networks
Review on MAC Protocols for underwater acoustic networksReview on MAC Protocols for underwater acoustic networks
Review on MAC Protocols for underwater acoustic networksIRJET Journal
 
1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-mainRahul Singh
 
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEYENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEYijwmn
 
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...cscpconf
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...IOSR Journals
 
Grid Based Priority Routing Protocol for UWSNs
Grid Based Priority Routing Protocol for UWSNsGrid Based Priority Routing Protocol for UWSNs
Grid Based Priority Routing Protocol for UWSNsIJCNCJournal
 
GRID-BASED PRIORITY ROUTING PROTOCOL FOR UWSNS
GRID-BASED PRIORITY ROUTING PROTOCOL FOR UWSNSGRID-BASED PRIORITY ROUTING PROTOCOL FOR UWSNS
GRID-BASED PRIORITY ROUTING PROTOCOL FOR UWSNSIJCNCJournal
 
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...CSCJournals
 
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkVHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkIJCNCJournal
 
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKVHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKIJCNCJournal
 
Dynamic Spectrum Allocation in Wireless sensor Networks
Dynamic Spectrum Allocation in Wireless sensor NetworksDynamic Spectrum Allocation in Wireless sensor Networks
Dynamic Spectrum Allocation in Wireless sensor NetworksIJMER
 

Similar to Paper id 25201440 (20)

Energy Efficient Routing Protocols for UWSN: A Review
Energy Efficient Routing Protocols for UWSN: A ReviewEnergy Efficient Routing Protocols for UWSN: A Review
Energy Efficient Routing Protocols for UWSN: A Review
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
 
A017210110
A017210110A017210110
A017210110
 
Review on MAC Protocols for underwater acoustic networks
Review on MAC Protocols for underwater acoustic networksReview on MAC Protocols for underwater acoustic networks
Review on MAC Protocols for underwater acoustic networks
 
1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main
 
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEYENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
 
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
 
Bf33335340
Bf33335340Bf33335340
Bf33335340
 
Bf33335340
Bf33335340Bf33335340
Bf33335340
 
journal_doublecol
journal_doublecoljournal_doublecol
journal_doublecol
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
 
Grid Based Priority Routing Protocol for UWSNs
Grid Based Priority Routing Protocol for UWSNsGrid Based Priority Routing Protocol for UWSNs
Grid Based Priority Routing Protocol for UWSNs
 
GRID-BASED PRIORITY ROUTING PROTOCOL FOR UWSNS
GRID-BASED PRIORITY ROUTING PROTOCOL FOR UWSNSGRID-BASED PRIORITY ROUTING PROTOCOL FOR UWSNS
GRID-BASED PRIORITY ROUTING PROTOCOL FOR UWSNS
 
40120140503011
4012014050301140120140503011
40120140503011
 
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...
 
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkVHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
 
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKVHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
 
Dynamic Spectrum Allocation in Wireless sensor Networks
Dynamic Spectrum Allocation in Wireless sensor NetworksDynamic Spectrum Allocation in Wireless sensor Networks
Dynamic Spectrum Allocation in Wireless sensor Networks
 

More from IJRAT

96202108
9620210896202108
96202108IJRAT
 
97202107
9720210797202107
97202107IJRAT
 
93202101
9320210193202101
93202101IJRAT
 
92202102
9220210292202102
92202102IJRAT
 
91202104
9120210491202104
91202104IJRAT
 
87202003
8720200387202003
87202003IJRAT
 
87202001
8720200187202001
87202001IJRAT
 
86202013
8620201386202013
86202013IJRAT
 
86202008
8620200886202008
86202008IJRAT
 
86202005
8620200586202005
86202005IJRAT
 
86202004
8620200486202004
86202004IJRAT
 
85202026
8520202685202026
85202026IJRAT
 
711201940
711201940711201940
711201940IJRAT
 
711201939
711201939711201939
711201939IJRAT
 
711201935
711201935711201935
711201935IJRAT
 
711201927
711201927711201927
711201927IJRAT
 
711201905
711201905711201905
711201905IJRAT
 
710201947
710201947710201947
710201947IJRAT
 
712201907
712201907712201907
712201907IJRAT
 
712201903
712201903712201903
712201903IJRAT
 

More from IJRAT (20)

96202108
9620210896202108
96202108
 
97202107
9720210797202107
97202107
 
93202101
9320210193202101
93202101
 
92202102
9220210292202102
92202102
 
91202104
9120210491202104
91202104
 
87202003
8720200387202003
87202003
 
87202001
8720200187202001
87202001
 
86202013
8620201386202013
86202013
 
86202008
8620200886202008
86202008
 
86202005
8620200586202005
86202005
 
86202004
8620200486202004
86202004
 
85202026
8520202685202026
85202026
 
711201940
711201940711201940
711201940
 
711201939
711201939711201939
711201939
 
711201935
711201935711201935
711201935
 
711201927
711201927711201927
711201927
 
711201905
711201905711201905
711201905
 
710201947
710201947710201947
710201947
 
712201907
712201907712201907
712201907
 
712201903
712201903712201903
712201903
 

Paper id 25201440

  • 1. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 E-ISSN: 2321-9637 Reliable Mac Sensing Protocol for Underwater Sensor 48 Networks Ms.Manjupriya, R1, Mr.Christhuraj, M.R2 Computer Science and Engineering1, 2 , P.G Scholar1, Assistant Professor 2 Email: manjupriya.me@gmail.com1, mrchristhuraj@gmail.com2 Abstract- The proposed CDMA based Medium Access Control (MAC) Protocol multihop wireless network that uses multiple channel and dynamic channel selection method. The comparisons is conceded out by means of analytical models, which are used to confine the activities of a node that acts according to either considered specifically for the underwater acoustic environment ,APCAP,DACAP and T-Lohi.the focus is on throughput delay and energy performance (traffic load ,node density ,single and multihop topologies).The results mainly highlights relevant design tradeoffs that can be exploited in order to properly tune protocol performance .These results allow understanding which protocol is more suited to given network setting ,and are expected to be of help in designing novel protocol that possibly outperform currently available solutions. Index Terms- Medium Access Control, Underwater acoustic sensor networks, sonobuoys 1. INTRODUCTION Underwater mobile communications is an important area of research in the field of underwater technology. With the brisk advance of submarine and underwater acoustic sensor networks (UWA) data communication, the present development trend is the construction, the present development trend is the construction of net comprising mobile and fixed nodes [1]. The environment of mobile UWA communication is Made more complicated is made more complicated by the existence of Doppler effects and multi-path phenomena. There is an urgent need for research on high-performance mobile UWA communication techniques. Underwater mobile communications are used in the field of ocean monitoring to detect tectonic movements, incoming tsunamis and water pollution [2]. The main focus of the work is about monitoring underwater safe co2 storage and remote control of submarine oil Extraction using medium access control (MAC) protocol. Geologic storage of carbon dioxide (co2) is the underwater disposal of co2 from large industrial sources such as power plants .carbon capture and storage (CCS) also known as carbon capture and restoration, includes geologic cargo space as one of its components [1].CCS is a powerful tool along with energy competence, fuel switching as well as renewable power sources essential to reducing atmospheric co2 levels. Many surveys show that the most effective and least costly way to reduce co2 levels to avoid climate change is to use all co2 reduction tools; including ccs. However the burning fossils fuels is increasing co2 levels in the atmosphere above naturally occurring levels, contributing to global climate change. The geological carbon capture and storage (CCS) techniques consist of capturing co2 from power and industries activities and storing it in subterranean geological. Consumption of underwater nodes that testimony data during the monitoring mission, and then recover the instruments to retrieve the data. Wiring of the underwater nodes to a surface station in order to draw together the data on-line and in real time [2]. Underwater co2. Storage infrastructures decreasing the costs of underwater monitoring while at the same time providing higher flexibility than existing systems. Nodes in the network are connected via Acoustic links in an underwater sensor network which provides robust, real life communications of the monitoring data both in single hop and multi hop deployments [1][2].The solutions allow collecting data and sending instruction to the devices deploy in the set of connections different devices in the network. The paper is structured as follows. Section II describe the literature survey to facilitate we have investigated. The associated work in Section III. The concert evaluation and methodology is investigated within Section IV. As a final point, Section V concludes the paper. 2. LITERATURE SURVEY Pressure Routing for Underwater Sensor Networks a SEA Swarm (Sensor Equipped Aquatic Swarm) is a sensor cloud that drifts with water currents and enables monitoring of local underwater events such as contaminants, marine living and
  • 2. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 E-ISSN: 2321-9637 49 intruder [3]. The goal is to design an efficient any cast routing algorithm for reliable underwater sensor event reporting to any one of the float up sonobuoys. Main challenges are the ocean current as well as the Limited possessions (bandwidth and energy [3]). Addressing these challenges and proposes Hydro Cast, a hydraulic pressure based any cast routing protocol that exploits the measured pressure levels to route data to surface buoys. An Energy-Efficient MAC Protocol for Wireless Sensor Networks. S-MAC, a medium-access control (MAC) protocol designed for wireless sensor networks. Wireless sensor networks use [4] Battery-operated computing as well as sensing procedure. A expect sensor networks to be deployed in an adhoc fashion, with individual nodes remaining largely inactive for elongated periods of time but subsequently flattering ,gradually active when something is detected. Wireless MACs energy conservation and self-configuration are most important goals, despite the fact that per-node fairness and latency are not as much of important [4].In conclusion, S-MAC applies message passing to reduce contention latency for sensor-network applications that require store-and forward processing as data move through the network. Propagation-delay-tolerant MAC Protocol for Underwater Acoustic Sensor network. Underwater acoustic sensor networks (UASN) can be employed in a vast variety of applications, retrieving exact and up-to- date information commencing underneath the oceans Surface. While broadly used by terrestrial sensor networks, radio frequencies (RF) do not propagate well underwater [5]. Acoustic channels are therefore employed as an alternative to support long-distance and low-power communication in underwater sensor Networks even though acoustic signals suffer from long propagation delay and have very limited bandwidth. An adaptive propagation-delay-tolerant collision-avoidance protocol (APCAP) for the MAC sub layer of UASN. The protocol includes an improved handshaking mechanism [5] that improves efficiency and throughput in UASN where there is a large propagation delay. In addition, it also allows a node to utilize its idle time whilst waiting for messages to propagate, which is otherwise washed out by most existing MAC protocols, exhibits good performance and outperforms the other MAC protocols. Distance Aware Collision Avoidance Protocol for Ad-Hoc Underwater Acoustic Sensor Networks. A channel access protocol for ad-hoc underwater acoustic networks which are characterized by long propagation delays and unequal transmit/receive power requirements. The protocols save broadcast energy by avoiding collisions while maximizing throughput [6]. It is based on minimizing the duration of a hand-shake by taking the advantage of receiver tolerance to interference when the two nodes are closer than the maximum transmission range [6]. This protocol achieves a throughput several times higher than that of the Slotted FAMA, while contribution comparable savings in energy. Even though carrier sensing ALOHA offers an elevated throughput, it wastes much more power on collisions DOTS: A Propagation Delay-aware Opportunistic MAC Protocol for Underwater Sensor Networks Underwater Acoustic Sensor Networks (UW-ASNs) use acoustic links as a means of communications,[7] low bandwidth, and high transmission power consumption. A proposed the Delay-aware Opportunistic Transmission Scheduling to increase the chances of concurrent transmissions while reducing the likelihood of collisions. DOTS achieves better channel utilization by harnessing both temporal, and spatial reuse when allows out of- order packet delivery and packet trains at the sender side [7] Second, consideration is to capture effect as in Interference Aware (IA) MAC [7] where a receiver can correctly decode a packet even in the presence of other concurrent transmissions. Third, when a data frame is correctly received but the corresponding ACK gets lost due to lossy channel or collision, Windowed ACK [7] can help contain the number of spurious retransmissions and increase the throughput. Fourth, the impact of mobility and random topologies on the throughput and fairness will be carefully investigated. The table1 below indicates the comparison table for MAC related protocols.
  • 3. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 E-ISSN: 2321-9637 50 TABLE1: COMPARSION TABLE FOR MAC RELATED PROTOCOL , 3. RELATED WORKS There has been intensive research on MAC protocols for terrestrial ad hoc [15] and wireless sensor networks [13. For example, channel access control in underwater acoustic sensor networks poses challenges such as the limited bandwidth, very high and variable propagation delay, channel asymmetry, in addition to the serious multipath and vanishing phenomena. The design of a MAC protocol is challenging for the operation of energy-limited sensor nodes in UWASNs due to energy limitations, long propagation delays, and low data rates and so on. The propagation speed of sound in underwater is on the subject of 1500m/s. Therefore, propagation delay in underwater channels is five orders of magnitude higher than that in radio frequency (RF) terrestrial channels, and extremely variety that depends on temperature, salinity, and depth, while propagation delay is negligible for short-range RF. Long propagation delay is the main character of UWASNs [18], two scenarios will be considered here. In the First scenario, the transmitted packet from a transmitting node has to be received by all the other sensor nodes within the communication range broadcasting locally gathered information, which we call B-MAC. In the second scenario, it has to be received by all the sensor nodes in the communication range of the transmitter excluding the nodes which have packets to send, (e.g., broadcasting Localization packets from anchors), which we call L-MAC [13].The design of a MAC protocol is challenging for the operation of energy-limited sensor nodes in UWASNs due to energy limitations, long propagation delays, and low data rates and so on. All these factors play an important role on control algorithms of MAC protocols the goal of the network is to minimize the time duration of the broadcasting (or localization) task which is defined as the time of collision-free transmission of all packets from the transmitting nodes. If we assign a waiting time to each transmitting node which can be interpreted as the time that a node PURPOSE AND METHODOLOGY MERITES DEMERITES APPLICATIONS Pressure Routing for Underwater Sensor Networks In geographic routing, a packet is greedily forwarded to the closest node to the destination in order to minimize the average hop count. Hop count is decreased Packet losses increased, reliability reduced WI-FI satellite An Energy-Efficient MAC Protocol for Wireless Sensor Networks. To achieve the primary goal of energy efficiency to identify what are the main sources that cause inefficient use of energy trade-offs to reduce energy consumption reducing energy consumption Transmission delay low-power radios, A Propagation Delay-aware Opportunistic MAC Protocol for Underwater Sensor Networks. To boost the chances of concurrent transmissions while reducing the likelihood of collisions. minimize data packet, Energy consumption long propagation latency and the severely limited bandwidth of acoustic communications. wireless satellite links, oil and chemical spill monitor, submarine detection, and Surveillance. Design of a Propagation-delay- tolerant MAC Protocol for Underwater Acoustic Sensor. The protocol includes an enhanced handshaking method that Improves effectiveness and throughput in UASN where there is a large propagation delay. Compulsory maximum latency RF signals deliver very poor performance underwater onshore applications
  • 4. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 E-ISSN: 2321-9637 51 has to wait to transmit its packet, the problem can be formulated as S.t. and collision –free transmission. Where wk is the waiting time of node k, and Rk is the data rate at which node k transmits its packet[16].The propagation speed of acoustic signal in underwater environment is about 1500m/s. Offered load and Throughput are employed to measure the performance of various protocols in this paper, which are define by and respectively [14]. (OL is Offered Load) In addition, showed that the performance of a MACA-like protocol that employs RTS/CTS handshaking is also severely constrained by a long propagation delay. The ratio of the propagation delay to the frame length as Where P is the propagation delay, and K is the size of a frame in bytes throughput delivered by CSMA decreases as increases (that is, as the data rate increases in the normalized simulations). This means that for a certain propagation delay, CSMA delivers a higher throughput if nodes. Transmit at a lower data rate. In the meantime, handshaking delivers [18] even lower throughput than CSMA at the same data rate, though almost negligibly so. This is because handshaking incurs extra RTS and CTS frames prior to sending a data frame; and worse, when handshaking fails, the time spent on propagating the control frames (i.e., RTS and CTS frames) is wasted. 4. PROPOSED APPROACH To support the retrieval of accurate and up-to- date information from beneath the world's oceans, it is desirable to organize underwater sensor networks The Propagation Delay Aware Protocol (PDAP) uses the RTS/CTS mechanism for channel reservation and transmission. All nodes are synchronized. Similarly to APCAP, when a node has a data packet to transmit, it checks its own schedule to find free times for the whole communication exchange; namely, for sending the RTS, receiving the CTS, and sending the data packet[14]. The time for receiving the CTS must start after the time needed for the RTS to reach the destination plus the time for the CTS to get back.[10]. This waiting time is randomly and uniformly chosen in [0, T], where T = 2 ^txRetry (2*maxDelay + rtsTime). When it is time to send the RTS a node checks the channel. If it is idle, the node sends the RTS and waits for the CTS. Otherwise, the sender clears its schedule (RTS, CTS and data packet times), increases its retry counter and selects new times for sending the RTS, receiving the CTS and for sending data. Both RTS and CTS control packets contain information about [11] the distance between the source and destination. This distance is computed based on the channel propagation delay and the time stamps on the control packets. Therefore, this information is updated every time nodes communicate. The RTS is 15Bytes long and the CTS are 9Bytes. When a potential interferer receives a control packet from a neighboring node, in case it has scheduled a transmission that could collide with ongoing communication it updates its own schedule and delays its transmission [16] Reception of RTS and CTS by a possible interferer is dealt with as follows. When the interferer receives an RTS packet, it sets its NAV so that it will not be transmitting control information that would arrive at the sender at the scheduled CTS reception time. It also will not transmit a control packet that would arrive at the destination while the destination is sending the CTS similarly; the interferer will not transmit control information that would arrive at the sender during the transmission of the data packet and at the destination while it is receiving the data [19]. When the interfering node receives the CTS, it updates its NAV according to the reception time carried on the CTS. As a consequence, the interferer will not transmit control information that would arrive at the destination during the reception of the data packet, and at the source during the data transmission. Although trying to schedule the highest possible number of parallel transmissions [7], nodes always attempt to avoid collisions and that senders are synchronized when transmitting packets. . 5. EXPERIMENTAL SETUP The hardware setup includes Pentium IV processor of 1GB RAM with 2.7GHZ of processor speed The test beds use VMware Workstation that performs testing and development environment NS-2 is n event driven packet level network simulator developed as a part of the VINT project (Virtual Internet Test bed). The Ns-2 with C++/OTCL integration feature, Object oriented Tcl (OTcl) called
  • 5. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 E-ISSN: 2321-9637 52 as a scripting language. It is an open source software package available for both Windows 32 and Linux platforms. NS2 uses two languages because simulator has two different kinds of things it needs to do. On one offer, exhaustive simulations of protocols require a systems programming language which can efficiently operate bytes, packet headers, and execute algorithms to facilitate to run over large data sets. 4.1. Single hop networks: Table 2: Received data packets (low traffic) NUMBER OF PACKETS DACAP T-LOHI PDAP 0.02 - 5 90 0.04 - - 92 0.06 - - 94 0.1 - - - 0.12 8 - - 0.14 - - - 0.16 - - - 0.18 7 - 95 Table3: Received data packets (high traffic) NUMBER OF PACKETS DACAP T-LOHI PDAP 0.4 85 - - 0.6 60 91 - 0.8 40 95 60 1 30 80 50 1.2 20 - - 4.2. Multi hop networks: Table 4: Latency with low traffic NUMBER OF PACKETS DACAP PDAP T-LOHI 0.14 66 81 - 0.16 50 82 - 0.18 30 0 - 0.2 - - 91 0.22 - 83 - 0.24 - - 93 0.26 19 - - Table 5 Latency with high traffic 5.1 Result analysis Single-hop: All nodes can communicate to each other directly. Multi-hop: Communications from a source to the sink may go through a multi-hop path. The path is determined by a shortest path routing protocol. In the multi-hop setting, the total size of the data packet is situate by the payload plus the headers of the different layers (physical through network APCAP and PDAP fall in the middle in terms of latency, with APCAP commanding lower latencies because of its hostile behavior. PDAP does not have an aggressive policy of channel access. Even though trying to schedule the maximum possible number of parallel transmissions, nodes always attempt to avoid collisions and that senders are matched after transmitting packets Figure.1. single hop networks with low traffic . NUMBER OF PACKETS DACAP T-LOHI PDAP 0.03 5 - - 0.05 2 - - 0.06 - - 7 0.07 10 - - 0.08 - - - 0.09 - - - 0.1 10 - 12 0.11 12 - - 0.12 15 8 - 0.13 20 - 20
  • 6. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 E-ISSN: 2321-9637 53 Figure.2. single hop with high traffic Figure.3. multi hop network with high traffic 6. CONCLUSION A MAC protocol for UWA networks using transmission range has been chosen so as to maximize the network performance in terms of throughput and delay Future work should concentrate on the development of algorithms for network maintenance and for updating the routing tables of the mobile nodes. Another point that the future work should address is the backoff algorithm. This first version of Slotted FAMA uses a simple backoff procedure. The use of adaptive backoff times (as used in MACAW) should be studied to provide a better performance of the protocol and to favor fairness, mainly in high traffic situations. In long slot situations, the use of simultaneous bidirectional communications should be studied. This means that in situations where the propagation delay is high, transmitter and receiver could send a packet to each other simultaneously without leading to a collision. This could be worn to admit trains of packets, because they have to be acknowledged one by one. Future guidelines of this effort consist of, within fact, the addition of this study through the application of the same analysis methodology to additional MAC protocols, the assessment of analytical results with simulations, and the design of a novel protocol based on the insight provided by analysis 7. REFERENCES [1] Annunziatellis, Aldo, Stefano Graziani, Salvatore Lombardi, Chiara Petrioli, and Roberto Petroccia. "CO2Net: A marine monitoring system for CO 2 leakage detection." In OCEANS, 2012-Yeosu, pp. 1-7 IEEE, 2012. [2] Ahn, Joon, and Bhaskar Krishnamachari "Performance of a propagation delay tolerant ALOHA protocol for underwater wireless networks." In Distributed Computing in Sensor Systems, pp. 1-16. Springer Berlin Heidelberg, 2008. [3] Chu, Y., P. D. Mitchell, and D. Grace. "Reinforcement learning based ALOHA for multi-hop wireless sensor networks with informed receiving." In Wireless Sensor Systems (WSS 2012), IET Conference on, pp. 1-6. IET, 2012. [4] G, T., J. Gale , C. Hendriks, S. Holloway, R. Brandsma, E. Kreft and A. Lokhorst, 2005b: Cost curves for CO2 storage: European sector. Proceedings of the 7th International Conference on Greenhouse Gas Control Technologies (GHGT-7), September 5–9, 2004, Vancouver, Canada, v.I, 603-610. [5] Guo , Xiaoxing, Michael R. Frater, and Michael J. Ryan. "Design of a propagation-delay-tolerant MAC protocol for underwater acoustic sensor networks. " Oceanic Engineering, IEEE Journal of 34, no. 2 (2009): 170-180. [6] Hu, Qian, and Zhenzhou Tang. "An improved adaptive MAC protocol for wireless sensor networks based on cross-layer architecture." In Wireless Communications & Signal Processing, 2009. WCSP 2009. International Conference on, on, pp. 1-5. IEEE, 2009. [7] Liu, Yunhuai, and Lionel M. Ni. "A new MAC protocol design for long-term applications in wireless sensor networks." In Parallel and Distributed Systems, 2007 International Conference on, vol. 2, pp. 1-8. IEEE, 2007 [8] Lee, Uichin, Paul Wang, Youngtae Noh, F. L. M. Vieira, Mario Gerla, and Jun-Hong Cui. "Pressure routing for underwater sensor networks." In INFOCOM, 2010 Proceedings IEEE, pp. 1-9 IEEE, 2010. [9] Lin, Wen, En Cheng, and Fei Yuan. "A MACA-based MAC protocol for Underwater Acoustic Sensor Networks." Journal of Communications 6, no. 2 (2011). [10] Noh, Youngtae, Paul Wang, Uichin Lee, Dustin Torres, and Mario Gerla. "DOTS: A propagation Delay- aware Opportunistic MAC protocol for underwater sensor networks." In Network Protocols (ICNP), 201018th IEEE International Conference on pp. 183-192.IEEE 2010. [11] Peleato, Borja, and Milica Stojanovic. "Distance aware collision avoidance protocol for ad-hoc underwater acoustic sensor networks."
  • 7. International Journal of Research in Advent Technology, Vol.2, No.5, May 2014 E-ISSN: 2321-9637 54 Communications Letters, IEEE 11, no. 12 (2007): 1025-1027 [12] Ramezani, Hamid, and Geert Leus. "DMC-MAC: dynamic multi-channel Mac in underwater acoustic networks." [13] Sayadi, Afef, Saoucene Mahfoudh, and Anis Laouiti. "Sensor-OSTR: Novel energy-efficient dynamic TDMA frame size-based MAC Protocol for Wireless Multi-hop Sensor Networks." In Wireless Days (WD),), 2012 IFIP, pp. 1-3. IEEE, 2012. [14] Shen, Jian, Faliu Yi, Sangman Moh, and Ilyong Chung. "Energy Efficiency of MAC Protocols in Wireless Sensor Networks." In Information Science and Applications (ICISA), 2011 International Conference on, pp1-10. IEEE, 2011. [15] Tang, Zhenzhou, and Qian Hu. "ALLEE-MAC: An Adaptive Low Latency and Energy Efficient MAC Protocol for Wireless Sensor Networks." In Telecommunications (AICT), 2010 Sixth Advanced International Conference on, pp. 269-274.IEEE,2010. [16] Van Hoesel, Lodewijk FW, and Paul JM Havinga. " A lightweight medium access protocol (LMAC) for wireless sensor networks: Reducing preamble transmissions and transceiver state switches." (2004). [17] Xiao, Yang, Miao Peng, John Gibson, Geoffrey G. Xie, Ding-Zhu Du, and Athanasios V. Vasilakos. "Tight performance bounds of multihop fair access for MAC protocols in wireless sensor networks and underwater sensor networks."Mobile [18] Yessad, Samira, Farid Nai't-Abdesselam, Tarik Taleb, and Brahim Bensaou. "R-MAC: Reservation medium access control protocol for wireless sensor networks." In Local Computer Networks, 2007. LCN 2007. 32nd IEEE Conference on, pp. 719-724. IEEE,2007. [19] Ye, Wei, John Heidemann, and Deborah Estrin. "An energy-efficient MAC protocol for wireless sensor networks." In INFOCOM 2002. Twenty-First Annual Joint Conferences of the IEEE Computer and Communications Societies. Proceedings. IEEE, vol. 3, pp. 1567-1576. IEEE, 2002. [20] Yessad, Samira, Farid Nai't-Abdesselam, Tarik Taleb, and Brahim Bensaou. "R-MAC: Reservation medium access control protocol for wireless sensor networks." In Local Computer Networks, 2007. LCN 2007. 32nd IEEE Conference on, pp. 719-724. IEEE, 2007.