SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
DOI : 10.5121/ijwmn.2014.6202 13
OSC-MAC: DUTY CYCLE WITH MULTI
HELPERS CT MODE WI-LEM TECHNOLOGY
IN WIRELESS SENSOR NETWORKS
Mbida Mohamed and Ezzati Abdellah
Emerging Technologies Laboratory (VETE), Faculty of Sciences and Technology Hassan
1st University, Settat, MOROCCO
ABSTRACT
Recently, Wireless Sensor Networks (WSNs) grow to be one of the dominant technology trends; new needs
are continuously emerging and demanding more complex constraints in a duty cycle, such as extend the life
time communication . The MAC layer plays a crucial role in these networks; it controls the communication
module and manages the medium sharing. In this work we use OSC-MAC tackles combining with the
performance of cooperative transmission (CT) in multi-hop WSN and the Wi-Lem technology
KEYWORDS
WSN, MAC, Wi-Lem, CT, schedule, Duty Cycle.
1. INTRODUCTION
The Protocol OSC-MAC (On-demand Scheduling Cooperative Mac) is a protocol with a planning
and request in order to solve the problems of energy of nodes transmitter, and gives as solution
the integration of the technique of cooperation with the nearby nodes. In our work we integrate
the Wi-Lem technology in order to delegate the nodes which have the higher energy and can be
into the cooperation with the source, this solution brings an optimality of energy because the
cooperative selection of nodes is applied in the Base station Wi-Lem, so we opted for 2 or more
nodes which can be into the CT (cooperative transmission) according to the number of packets
sending.
.
2. THE OSC-MAC PROTOCOL
As we know the life time of batteries is limited , what causes during the sending an imbalance
energy in nearby nodes , and results an exhaustion power of the TRN (Transmitter root node) , to
solve this problem we opt to initialize the technique by a phase of wakeup and decentralize the
responsibility of sending’s on the nearby nodes . Then according to the conception of nearby
nodes which want to cooperate with these neighbour’s and the others which refuse, during this
work we are going to explain the state of art the request list of the cooperative nodes for a
transmitter and the algorithm which engenders sending of packages by basing itself on the CT
(cooperative transmission) RDV . The cooperating nodes are neither on the same duty cycle nor
are they in the same collision domain. We use orthogonal and pipelined duty-cycle scheduling, in
part to reduce traffic contention, and devise a reservation-based wake-up scheme to bring
cooperating nodes into temporary synchrony to support CT range extension.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
14
The major sources of energy consumption inherent to MAC’s include idle listening, overhearing
and collision, besides data transmission and reception. Idle listening means that nodes keep
listening to the channel while there are no incoming packets at all - a case that has not been taken
care of in many MAC protocols such as IEEE 802.11 where in WIFI stations must listen for
possible traffic. Notably, idle listening is disastrous in WSNs based on the fact that nodes in this
mode consume the same magnitude of power as in receiving. Overhearing means that nodes
decode packets that are destined to others. Collisions result in corrupted packets and the following
MAC layer retransmissions consume extra energy. From the network perspective, albeit these
factors taper off individual node’s lifetime, the network lifetime is more critically limited by the
energy holes formed around the sink leaving unused energy outside of the holes. Many authors
have considered duty-cycle MAC protocols, which allow nodes to alternate between active and
sleep modes. These protocols dramatically reduce the periods of idle listening and overhearing.
3. SELECTION OF NODES IN ENERGY FACTOR BY USING THE WI-LEM
TECHNOLOGY
Instead of making a selection of nearby nodes in the transmitter which results an additional loss of
energy, for that reason we migrate this operation in a Wi-Lem station with large domain of
communication radio.
3.1. WI-Lem technology
LEM has just create the family of Wi-LEM (Wireless Local Energy Meter, wireless local meters
of energy) to allow the measure and the remote surveillance of the energy consumption as the
power of batteries nodes or the water as well as the temperature and the humidity. With these
meters, the industrial and tertiary companies can reduce their consumption of energy and water as
well as identify the points of improvement. On the whole range Wi-LEM, allowing a large
domain of communication radio between the nodes of the network, compared to the previous
generation.
3.2 The advantages of WI –Lem
Wi-LEM presents additional benefits compared to the traditional divisional meters in wsn:
• At the level of the electric cupboard
• At the level of the installation of the network and its exploitation.
The following figure (1) presents the operating Wi-Lem CT technology in wsn:
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
15
4. SELECTION OF THE NODES COOPERATION BY THE WI-LEM STATION
When a transmitter node wants to send its packets, first it transmit a packet request list of CTs
nodes to the station Wi-Lem by using an algorithm of selection nearby nodes possible to operate
in CTs periods , the algorithm (1) and the figure (2) illustrates this function :
Algorithm 1 : allocation of the CTs in the nearby nodes
Input : List of the nearby knots organized has the order decreasing by
percentage of energy : L
The number of (octets) sent per packet : S
Distance between transmitter and the next hop : D
Output : List of nearby nodes elected to transmit in CT phase :
LCT
For each li Є L do
If Eli >= ( Elect * S) + ( Empl * S * D ²) ;
LCT li ;
Else Li li+1 ;
End
Send LCt () ;
End
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
16
Figure 2: Diagram of the request /replay List CTs nearby
5. ELECTION OF THE NEARBY NODES WHICH WILL GO INTO THE CT MODE
Before the transmitter synchronizes its wakeup with the receiver as well as the nodes which want
to run in CT Mode, the sending of packets is made according to report energy of nodes CT : {
E ni ct (wi-lem) / i Є {1…n} , n : number of nearby node’s in wsn } obtained by the measurement
of energy nodes in station Wi-Lem, and also get the necessary energy to send N packets by
node transmitter : { E niT / i Є { 1…t} , t : t ith node transmitter } , for this reason we develop
The following algorithm (2) which explains the calculation of the necessary energy to transmit
one packets of L bits :
Algorithm 2 : Calculation of energy transmission packets for L bits E ni T
Input : Emp-data : amplifying energy
Efs : free space energy
Output : Energy of sending one packet with L bits
if d is distance and do=sqrt (efs/emp);
then sending L bit data over d distance
if d>=do ;
Energy=energy-(l*Etx+l*emp*(d^4));
else
Energy=energy-(l*Etx+l*efs*(d^2));
End
As a reference of the ratio energy of nodes and the energy of transmission packet of L bits
determine the number of helpers which are going to operate into the CT mode: the algorithm (3)
describes the process of delegation nearby nodes CT.
TRN
Demanding
Schedule CT
nearby
Replay Schedule Cts
nearby nodes
Station
Wi-Lem
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
17
Algorithm 3 : Selection of Elected nearby node CT
Input : Lists of the energy nodes which can enter in the CTs RDV : E L (ct )
Number of packets transmission : N
Output : List of elected nearby nodes : L ct-elu
For each ni Є E L (ct ) do
If E ni Ct / (N*E ni T) >= 1
L Ct-elu ni ;
ni ni +1 ;
Else ni ni +1 ;
Send L ct-elu() ;
End
6. ALLOCATION OF THE LISTS TRANSMISSIONS / RECEPTIONS PACKETS
In order to save the energy of every node sender we use a technique of Cooperative transmission
which shows itself by the use of the nearby nodes according to its energy levels which run in
routing mode of packets to the next hop, until the final Receiver. The transmission of packets are
initialized by a phase of wake up and allocation of the interval of sending’s which divides in no
CT and CT intervals , in order to have the transmitter node and the cooperative nodes ( helpers
) are synchronized with the FR (final receiver) , the figure 3 illustrate a description of this
technique :
Free period schedule
CT RDV period schedule
No-CT RDV period schedule
Hi (the helper’s) {the cooperative list nearby nodes / i Є {1 ... N}}
Figure 3: Diagram of allocation slot’s time wake up for the CT and No-CT packets
Non-CT
RDV
Non-CT
RDV
TRN
Hi
FR
CT RDV
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
18
The transmitter send a Super frame which defines the periods CT helpers and receiver in order to
maintain the period of wake up, and to forward packets in the next hop, the leader Helper with the
energy raised will send back a acknowledgement (ack) to inform the root transmitter node that the
CT’s meeting is reserved, the figure 4 describes this operative function. In no-Ct mode the sender
node send directly a request in the next hop, up to the final receiver by indicating that it is going
to transmit in a specific interval of time and the receiver will answer by a replay ack to inform it
that the reservation of interval time is accepted or rejected.
Transmission in CT Mode
Transmission in Non-CT Mode
Replay of helper leader
Figure 4: Diagram of transmission OSC-Mac by using CT Wi-Lem technology for 2 helpers
7. CONCLUSION
This paper propose the OSC-Mac Wi-Lem under exploitation of the cooperative transmission in
goal as a technology to extend the life time of nodes by migrating the operations of
classification energy’s nearby nodes from the sender node to the base station Wi-Lem , and to
list the nodes which are going probably to send into CTs periods .Indeed, it’s used to choose the
elected nearby nodes with higher power of the CTs period according to the number of packets
sending, and simultaneously putting the other nearby nodes in a sleeping mode .
TRN
Helper
leader
FR
Simple
Helper
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014
19
REFERENCES
[1] [1] IEEE Std 802.11b-1999 (R2003),” LAN/MAN Standards Committee of the IEEE Computer
Society, IEEE-SA Standards Board, 2003.
[2] Jian Lin and Mary Ann Ingram School of Electrical and Computer Engineering Georgia Institute of
Technology, Atlanta, Georgia 30332–0250.
[3] J. Li and P. Mohapatra, “An analytical model for the energy whole problem in many-to-one sensor
networks,” in Proc. IEEE VTC 2005I.
[4] J. W. Jung and M. A. Ingram, “Residual-Energy-Activated Cooperative
[5] Transmission (REACT) to Avoid the Energy Hole,” in Proc. IEEE Int Communications Workshops
(ICC) Conf, 2010, pp. 1–5.
[6] Y. Sun, S. Du, O. Gurewitz, and D. B. Johnson, “DW-MAC: a low latency, energy efficient demand-
wakeup MAC protocol for wireless sensor networks,” in Proc. MobiHoc 2008. New York, NY, USA:
ACM.
[7] Synetica . Hilton House. High Street, Stone. Staffs. ST15 8AU U.K 2011.
[8] Salehdine Kabou sensor network energy, Bechar University, Algérie - Licence informatics 2010.
Authors
Mbida Mohamed received the B.Sc. degree in networks and Information Systems, from
Hassan 1 St University, Faculty of Sciences and Technology of Settat, Morocco,
in2009 and M.Sc. degree in Network and Computer engineering from the Hassan 1
St University, Faculty of Sciences and Techniques (FSTS), Settat, Morocco, in
2012.Currently pursuing his PhD in Networks and Security Engineering at the
Laboratory of Emerging Technologie (VETE) , from Hassan 1 st University, Faculty of
Sciences and Technology of Settat, Morocco. His main research areas are how to use
wireless sensor networks to secure and monitor mobile laboratories networks.
EZZATI Abdellah research Scientist in Faculty of Science and Technology in
Morocco.He obtained his PHD in 1997 in Faculty of science in Rabat and
member of the Computer commission in the same Faculty. Now is an associate
professor in Hassan First University in Morocco and he is the Head of Bachelor of
Computer Science .He participate to several project as the project Palmes which
elaborate a Moroccan Education Certification.

More Related Content

What's hot

Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Alexander Decker
 
Hybrid networking and distribution
Hybrid networking and distribution Hybrid networking and distribution
Hybrid networking and distribution vivek pratap singh
 
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid ApplicationsIEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid ApplicationsSpiros Louvros
 
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA AlgorithmsAn Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA AlgorithmsVignesh DJ Viki
 
Traffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access ProtocolTraffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access ProtocolGaurav Chauhan
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...IOSR Journals
 
Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Aayush Gupta
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...acijjournal
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 
Float-based Pipeline Monitoring Network
Float-based Pipeline Monitoring NetworkFloat-based Pipeline Monitoring Network
Float-based Pipeline Monitoring NetworkEditor IJCATR
 
Distributed Spatial Modulation based Cooperative Diversity Scheme
Distributed Spatial Modulation based Cooperative Diversity SchemeDistributed Spatial Modulation based Cooperative Diversity Scheme
Distributed Spatial Modulation based Cooperative Diversity Schemeijwmn
 
Protocol Enhancements in LEACH
Protocol Enhancements in LEACHProtocol Enhancements in LEACH
Protocol Enhancements in LEACHEditor IJCATR
 
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...IRJET Journal
 
93755181 lte-hoping
93755181 lte-hoping93755181 lte-hoping
93755181 lte-hopingSadef Karish
 

What's hot (18)

Network coding
Network codingNetwork coding
Network coding
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
 
Hybrid networking and distribution
Hybrid networking and distribution Hybrid networking and distribution
Hybrid networking and distribution
 
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid ApplicationsIEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
 
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA AlgorithmsAn Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
 
Traffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access ProtocolTraffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access Protocol
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
 
Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Float-based Pipeline Monitoring Network
Float-based Pipeline Monitoring NetworkFloat-based Pipeline Monitoring Network
Float-based Pipeline Monitoring Network
 
Distributed Spatial Modulation based Cooperative Diversity Scheme
Distributed Spatial Modulation based Cooperative Diversity SchemeDistributed Spatial Modulation based Cooperative Diversity Scheme
Distributed Spatial Modulation based Cooperative Diversity Scheme
 
Kanchan ppt
Kanchan pptKanchan ppt
Kanchan ppt
 
Protocol Enhancements in LEACH
Protocol Enhancements in LEACHProtocol Enhancements in LEACH
Protocol Enhancements in LEACH
 
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
 
93755181 lte-hoping
93755181 lte-hoping93755181 lte-hoping
93755181 lte-hoping
 
69 122-128
69 122-12869 122-128
69 122-128
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 

Viewers also liked

Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 
The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...Brian Solis
 
Open Source Creativity
Open Source CreativityOpen Source Creativity
Open Source CreativitySara Cannon
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)maditabalnco
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsBarry Feldman
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome EconomyHelge Tennø
 

Viewers also liked (7)

Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 
The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...
 
Open Source Creativity
Open Source CreativityOpen Source Creativity
Open Source Creativity
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 

Similar to Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless sensor networks

COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...ijaceeejournal
 
Physical layer network coding
Physical layer network codingPhysical layer network coding
Physical layer network codingNguyen Tan
 
Performance evaluation of energy
Performance evaluation of energyPerformance evaluation of energy
Performance evaluation of energyijp2p
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networkspijans
 
Iisrt seedha devi (networks)
Iisrt seedha devi (networks)Iisrt seedha devi (networks)
Iisrt seedha devi (networks)IISRT
 
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...pijans
 
A new method for controlling and maintaining
A new method for controlling and maintainingA new method for controlling and maintaining
A new method for controlling and maintainingIJCNCJournal
 
Iaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd Iaetsd
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidancegraphhoc
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...journal ijrtem
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...IJRTEMJOURNAL
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...IJCNCJournal
 
A Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc NetworksA Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc Networkspijans
 

Similar to Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless sensor networks (20)

Ijcnc050207
Ijcnc050207Ijcnc050207
Ijcnc050207
 
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
 
Physical layer network coding
Physical layer network codingPhysical layer network coding
Physical layer network coding
 
Performance evaluation of energy
Performance evaluation of energyPerformance evaluation of energy
Performance evaluation of energy
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
 
IEEE CAMAD 2014
IEEE CAMAD 2014IEEE CAMAD 2014
IEEE CAMAD 2014
 
Iisrt seedha devi (networks)
Iisrt seedha devi (networks)Iisrt seedha devi (networks)
Iisrt seedha devi (networks)
 
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
 
A new method for controlling and maintaining
A new method for controlling and maintainingA new method for controlling and maintaining
A new method for controlling and maintaining
 
Iaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networks
 
Fo2510211029
Fo2510211029Fo2510211029
Fo2510211029
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
D031202018023
D031202018023D031202018023
D031202018023
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
 
A Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc NetworksA Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc Networks
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless sensor networks

  • 1. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 DOI : 10.5121/ijwmn.2014.6202 13 OSC-MAC: DUTY CYCLE WITH MULTI HELPERS CT MODE WI-LEM TECHNOLOGY IN WIRELESS SENSOR NETWORKS Mbida Mohamed and Ezzati Abdellah Emerging Technologies Laboratory (VETE), Faculty of Sciences and Technology Hassan 1st University, Settat, MOROCCO ABSTRACT Recently, Wireless Sensor Networks (WSNs) grow to be one of the dominant technology trends; new needs are continuously emerging and demanding more complex constraints in a duty cycle, such as extend the life time communication . The MAC layer plays a crucial role in these networks; it controls the communication module and manages the medium sharing. In this work we use OSC-MAC tackles combining with the performance of cooperative transmission (CT) in multi-hop WSN and the Wi-Lem technology KEYWORDS WSN, MAC, Wi-Lem, CT, schedule, Duty Cycle. 1. INTRODUCTION The Protocol OSC-MAC (On-demand Scheduling Cooperative Mac) is a protocol with a planning and request in order to solve the problems of energy of nodes transmitter, and gives as solution the integration of the technique of cooperation with the nearby nodes. In our work we integrate the Wi-Lem technology in order to delegate the nodes which have the higher energy and can be into the cooperation with the source, this solution brings an optimality of energy because the cooperative selection of nodes is applied in the Base station Wi-Lem, so we opted for 2 or more nodes which can be into the CT (cooperative transmission) according to the number of packets sending. . 2. THE OSC-MAC PROTOCOL As we know the life time of batteries is limited , what causes during the sending an imbalance energy in nearby nodes , and results an exhaustion power of the TRN (Transmitter root node) , to solve this problem we opt to initialize the technique by a phase of wakeup and decentralize the responsibility of sending’s on the nearby nodes . Then according to the conception of nearby nodes which want to cooperate with these neighbour’s and the others which refuse, during this work we are going to explain the state of art the request list of the cooperative nodes for a transmitter and the algorithm which engenders sending of packages by basing itself on the CT (cooperative transmission) RDV . The cooperating nodes are neither on the same duty cycle nor are they in the same collision domain. We use orthogonal and pipelined duty-cycle scheduling, in part to reduce traffic contention, and devise a reservation-based wake-up scheme to bring cooperating nodes into temporary synchrony to support CT range extension.
  • 2. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 14 The major sources of energy consumption inherent to MAC’s include idle listening, overhearing and collision, besides data transmission and reception. Idle listening means that nodes keep listening to the channel while there are no incoming packets at all - a case that has not been taken care of in many MAC protocols such as IEEE 802.11 where in WIFI stations must listen for possible traffic. Notably, idle listening is disastrous in WSNs based on the fact that nodes in this mode consume the same magnitude of power as in receiving. Overhearing means that nodes decode packets that are destined to others. Collisions result in corrupted packets and the following MAC layer retransmissions consume extra energy. From the network perspective, albeit these factors taper off individual node’s lifetime, the network lifetime is more critically limited by the energy holes formed around the sink leaving unused energy outside of the holes. Many authors have considered duty-cycle MAC protocols, which allow nodes to alternate between active and sleep modes. These protocols dramatically reduce the periods of idle listening and overhearing. 3. SELECTION OF NODES IN ENERGY FACTOR BY USING THE WI-LEM TECHNOLOGY Instead of making a selection of nearby nodes in the transmitter which results an additional loss of energy, for that reason we migrate this operation in a Wi-Lem station with large domain of communication radio. 3.1. WI-Lem technology LEM has just create the family of Wi-LEM (Wireless Local Energy Meter, wireless local meters of energy) to allow the measure and the remote surveillance of the energy consumption as the power of batteries nodes or the water as well as the temperature and the humidity. With these meters, the industrial and tertiary companies can reduce their consumption of energy and water as well as identify the points of improvement. On the whole range Wi-LEM, allowing a large domain of communication radio between the nodes of the network, compared to the previous generation. 3.2 The advantages of WI –Lem Wi-LEM presents additional benefits compared to the traditional divisional meters in wsn: • At the level of the electric cupboard • At the level of the installation of the network and its exploitation. The following figure (1) presents the operating Wi-Lem CT technology in wsn:
  • 3. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 15 4. SELECTION OF THE NODES COOPERATION BY THE WI-LEM STATION When a transmitter node wants to send its packets, first it transmit a packet request list of CTs nodes to the station Wi-Lem by using an algorithm of selection nearby nodes possible to operate in CTs periods , the algorithm (1) and the figure (2) illustrates this function : Algorithm 1 : allocation of the CTs in the nearby nodes Input : List of the nearby knots organized has the order decreasing by percentage of energy : L The number of (octets) sent per packet : S Distance between transmitter and the next hop : D Output : List of nearby nodes elected to transmit in CT phase : LCT For each li Є L do If Eli >= ( Elect * S) + ( Empl * S * D ²) ; LCT li ; Else Li li+1 ; End Send LCt () ; End
  • 4. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 16 Figure 2: Diagram of the request /replay List CTs nearby 5. ELECTION OF THE NEARBY NODES WHICH WILL GO INTO THE CT MODE Before the transmitter synchronizes its wakeup with the receiver as well as the nodes which want to run in CT Mode, the sending of packets is made according to report energy of nodes CT : { E ni ct (wi-lem) / i Є {1…n} , n : number of nearby node’s in wsn } obtained by the measurement of energy nodes in station Wi-Lem, and also get the necessary energy to send N packets by node transmitter : { E niT / i Є { 1…t} , t : t ith node transmitter } , for this reason we develop The following algorithm (2) which explains the calculation of the necessary energy to transmit one packets of L bits : Algorithm 2 : Calculation of energy transmission packets for L bits E ni T Input : Emp-data : amplifying energy Efs : free space energy Output : Energy of sending one packet with L bits if d is distance and do=sqrt (efs/emp); then sending L bit data over d distance if d>=do ; Energy=energy-(l*Etx+l*emp*(d^4)); else Energy=energy-(l*Etx+l*efs*(d^2)); End As a reference of the ratio energy of nodes and the energy of transmission packet of L bits determine the number of helpers which are going to operate into the CT mode: the algorithm (3) describes the process of delegation nearby nodes CT. TRN Demanding Schedule CT nearby Replay Schedule Cts nearby nodes Station Wi-Lem
  • 5. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 17 Algorithm 3 : Selection of Elected nearby node CT Input : Lists of the energy nodes which can enter in the CTs RDV : E L (ct ) Number of packets transmission : N Output : List of elected nearby nodes : L ct-elu For each ni Є E L (ct ) do If E ni Ct / (N*E ni T) >= 1 L Ct-elu ni ; ni ni +1 ; Else ni ni +1 ; Send L ct-elu() ; End 6. ALLOCATION OF THE LISTS TRANSMISSIONS / RECEPTIONS PACKETS In order to save the energy of every node sender we use a technique of Cooperative transmission which shows itself by the use of the nearby nodes according to its energy levels which run in routing mode of packets to the next hop, until the final Receiver. The transmission of packets are initialized by a phase of wake up and allocation of the interval of sending’s which divides in no CT and CT intervals , in order to have the transmitter node and the cooperative nodes ( helpers ) are synchronized with the FR (final receiver) , the figure 3 illustrate a description of this technique : Free period schedule CT RDV period schedule No-CT RDV period schedule Hi (the helper’s) {the cooperative list nearby nodes / i Є {1 ... N}} Figure 3: Diagram of allocation slot’s time wake up for the CT and No-CT packets Non-CT RDV Non-CT RDV TRN Hi FR CT RDV
  • 6. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 18 The transmitter send a Super frame which defines the periods CT helpers and receiver in order to maintain the period of wake up, and to forward packets in the next hop, the leader Helper with the energy raised will send back a acknowledgement (ack) to inform the root transmitter node that the CT’s meeting is reserved, the figure 4 describes this operative function. In no-Ct mode the sender node send directly a request in the next hop, up to the final receiver by indicating that it is going to transmit in a specific interval of time and the receiver will answer by a replay ack to inform it that the reservation of interval time is accepted or rejected. Transmission in CT Mode Transmission in Non-CT Mode Replay of helper leader Figure 4: Diagram of transmission OSC-Mac by using CT Wi-Lem technology for 2 helpers 7. CONCLUSION This paper propose the OSC-Mac Wi-Lem under exploitation of the cooperative transmission in goal as a technology to extend the life time of nodes by migrating the operations of classification energy’s nearby nodes from the sender node to the base station Wi-Lem , and to list the nodes which are going probably to send into CTs periods .Indeed, it’s used to choose the elected nearby nodes with higher power of the CTs period according to the number of packets sending, and simultaneously putting the other nearby nodes in a sleeping mode . TRN Helper leader FR Simple Helper
  • 7. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 2, April 2014 19 REFERENCES [1] [1] IEEE Std 802.11b-1999 (R2003),” LAN/MAN Standards Committee of the IEEE Computer Society, IEEE-SA Standards Board, 2003. [2] Jian Lin and Mary Ann Ingram School of Electrical and Computer Engineering Georgia Institute of Technology, Atlanta, Georgia 30332–0250. [3] J. Li and P. Mohapatra, “An analytical model for the energy whole problem in many-to-one sensor networks,” in Proc. IEEE VTC 2005I. [4] J. W. Jung and M. A. Ingram, “Residual-Energy-Activated Cooperative [5] Transmission (REACT) to Avoid the Energy Hole,” in Proc. IEEE Int Communications Workshops (ICC) Conf, 2010, pp. 1–5. [6] Y. Sun, S. Du, O. Gurewitz, and D. B. Johnson, “DW-MAC: a low latency, energy efficient demand- wakeup MAC protocol for wireless sensor networks,” in Proc. MobiHoc 2008. New York, NY, USA: ACM. [7] Synetica . Hilton House. High Street, Stone. Staffs. ST15 8AU U.K 2011. [8] Salehdine Kabou sensor network energy, Bechar University, Algérie - Licence informatics 2010. Authors Mbida Mohamed received the B.Sc. degree in networks and Information Systems, from Hassan 1 St University, Faculty of Sciences and Technology of Settat, Morocco, in2009 and M.Sc. degree in Network and Computer engineering from the Hassan 1 St University, Faculty of Sciences and Techniques (FSTS), Settat, Morocco, in 2012.Currently pursuing his PhD in Networks and Security Engineering at the Laboratory of Emerging Technologie (VETE) , from Hassan 1 st University, Faculty of Sciences and Technology of Settat, Morocco. His main research areas are how to use wireless sensor networks to secure and monitor mobile laboratories networks. EZZATI Abdellah research Scientist in Faculty of Science and Technology in Morocco.He obtained his PHD in 1997 in Faculty of science in Rabat and member of the Computer commission in the same Faculty. Now is an associate professor in Hassan First University in Morocco and he is the Head of Bachelor of Computer Science .He participate to several project as the project Palmes which elaborate a Moroccan Education Certification.