SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 8, No. 1, February 2018, pp. 87~93
ISSN: 2088-8708, DOI: 10.11591/ijece.v8i1.pp87-93  87
Journal homepage: http://iaescore.com/journals/index.php/IJECE
Evaluation of Energy Consumption using Receiver–Centric
MAC Protocol in Wireless Sensor Networks
Ananda Kumar K S1
, Balakrishna R2
1
Dept of ISE, RajaRajeswari College of Engineering, Bangalore-560074, India
2
RajaRajeswari College of Engineering, Bangalore-560074, India
Article Info ABSTRACT
Article history:
Received Apr 2, 2017
Revised Aug 20, 2017
Accepted Sep 4, 2017
At present day’s wireless sensor networks, obtain a lot consideration to
researchers. Maximum number of sensor nodes are scattered that can
communicate with all others. Reliable data communication and energy
consumption are the mainly significant parameters that are required in
wireless sensor networks. Many of MAC protocols have been planned to
improve the efficiency more by enhancing the throughput and energy
consumption. The majority of the presented medium access control protocols
to only make available, reliable data delivery or energy efficiency does not
offer together at the same time. In this research work the author proposes a
novel approach based on Receiver Centric-MAC is implemented using NS2
simulator. Here, the author focuses on the following parametric measures
like - energy consumption, reliability and bandwidth. RC-MAC provides
high bandwidth without decreasing energy efficiency. The results show that
0.12% of less energy consumption, reliability improved by 20.86% and
bandwidth increased by 27.32% of RC-MAC compared with MAC IEEE
802.11.
Keyword:
Bandwidth
Energy consumption
Medium access control
Receiver centric MAC
Wireless sensor networks
Copyright © 2018 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Ananda Kumar K S,
Dept of ISE,
RajaRajeswari College of Engineering,
Bangalore-560074, India.
Email: anandgdk@gmail.com
1. INTRODUCTION
The Wireless Sensor Network (WSN) is advanced technology and build up with that has been
incorporated into one of the best emerging areas in the communication industry [1]. A number of small
wireless sensor nodes are used to exchange information for a long time with a limited battery power capacity
in wireless sensor networks. The most important power factor consumption of a node is radio. MAC protocol
controls the radio of the sensor node [2].
Generally, wireless sensor networks constitute many numbers of nodes. In Figure 1 depicts that the
functionality for dissimilar types of nodes that appearance a wireless network to exist to control their spatial
mobility exclusive of lose functionality. Nodes should be capable to detect neighbor nodes in a network and
to vigorously correlate to coordinators based on their position [3].
Each node is connected to either one or many nodes. Consider a generic communication network,
that network combine nodes and communication links. Every node produces information designed for each
node and all other nodes in the network. Distinctive routing scheme considers to deal with various grouping
of the follow a) minimize the cost and complexity b) prevention of unreliable communication links,
c) maximize network throughput d) minimize end to end delay [4].
Sensor nodes operate with a tiny battery that consumes more power while propagation of a signal,
so that energy efficiency is considered as major criteria for designing several MAC protocols. Radio is the
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 87 – 93
88
central part of any sensor node and that consumes more power during communication. The competent MAC
protocol is capable of enhancing lifetime of several sensor networks. MAC layer protocols in wireless sensor
network are classified into four categories: a) synchronous awaking of nodes, b) asynchronous awaking of
nodes, c) slotting of frames and d) multi channel approach.
Duty cycle is one of the foremost attribute of asynchronous and synchronous protocols, at this
juncture any node can exchange among sleep and active states to save energy, while nodes are able to
communicate in active state. Asynchronous MAC protocols are based on the type of communication between
two nodes dissimilar in active/sleep mode. In synchronous MAC protocols, all nodes are synchronized at the
same time [5].
Medium Access Control is traditionally viewed as an element of the data link layer in the OSI
model. Here, coordinates the use of a common transmission medium in multiuser systems and ensure reliable
communication greater than interference free channels for each one user [6], [10]. The fundamental
prerequisite of a sensor network is reliable delivery of information with lowest amount latency and energy
consumption.
On the other hand, the majority MAC protocols were proposes of their concerned about the users are
self-governing of each other and challenge for the use of the general transmission channel.
Outstanding to the strict resource constraint of sensor networks, two properties of the system were
frequently exploited for designing sensor network MAC protocols: a) the application – needy objectives and
b) the helpful nature of the scattered sensors [7].
CSMA is one of the mainly accepted choices for random access networks due to its simplicity and
efficient design. Each user has a communication to transmit first senses the channel to see whether or not
there is an enduring transmission from further users before it transmit its own data for communication. Hence
an attempt was made to avoid collision with other users. When a collision occurs at the destination, each
transmitting user wait for a unsystematic back in time before it makes a challenge to transmit the message
again. Widely adopted protocol the multiple access with collision avoidance (MACA) protocol that
introduce a three way handshake between the transmitter and receiver to solve the familiar hidden terminal
problem present in usual CSMA [8].
Three-way handshake planned in MACA resolve this difficulty by having every user transmit a
Request-To-Send (RTS) message. At any time it has a packet to send, representing the destination and the
length of the deliberate data transmission. The destination user successfully receives the RTS message and
has not fulfilled a handshake previously with further nodes; it then decides to respond with a Clear-To-Send
(CTS) packet indicating that it is set for the reception. The source then sends an information packet to the
destination once the CTS are received [9]. The mechanism of CTS and RTS is shown in Figure 2.
Pei Huang et al, proposed a novel method in by improving the throughput under the heavy traffic
load on wireless sensor networks. They discussed the receiver centric development by utilizing the data
gathering tree structure in wireless sensor networks [1].
Yeah –time Yong et al, proposed in the method of different transmission range and sensing range
for managing dynamic traffic loads in wireless sensor networks. Here limitations are time offer of a
transmission, retransmission and high frequency of retransmission [2].
Umesh et al proposed RC-MAC protocol focused on end to end reliable communication and increase the
lifetime of the sensor network [4].
Figure 1. Wireless Sensor Network Figure 2. Mechanisms of CTS and RTS
2. RESEARCH METHOD
2.1. Algorithm for RC-MAC
Step 1: Each node sends a beacon message for checking the node status. A node status defines whether the
node is sleep node or wake up a node (nib). nib-neighbor id
Int J Elec & Comp Eng ISSN: 2088-8708 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in …. (Ananda Kumar K S)
89
Step 2: It sends the RTS/CTS message for getting the channel status. After it forms the frame in terms of
bandwidth and slot time TX
Step 3: Maximum allowed queue process to be utilized at every transmission slots at T-sec. T-sec –
Transmission seconds
Step 4: Tr->propagation variance of delay when transmitter receiver distance is rx. Tr-Transmission rate, rx –
reception rate
Step 5: Probability of delivered rate of new entity in (nb) access slots. nb- neighbor node
Step 6: It enters the channel scheduling for assign the channel to communicate. Channel scanning is
completed by number of slots per super-frame.
Step 7: Receiver node establish that average one hop delay is high it chooses a shortest path. Energy level is
beyond a specified threshold time schedule of helper is not affected
Step 8: First and second cycle includes a cooperative transmission and node updates its status information to
intermediate nodes.
Step 9: Receiver nodes have advanced than transmitter node then co-operative transmission will be applied.
Step 10: Analyze the estimated signal interference level. Adjusted of each frame is done as per number of
access slots. If it reaches limited threshold it processed a duration.
Step 11: Then it enters noise interference level and estimate the level. Packets are assigned into priority level.
Packet transmissions begin with congestion dance.
2.2. Flowchart for RC-MAC Algorithm
In flowchart to transmit data, it’s moved from top to bottom, followed by different levels like
channel scanning, send RTS, wait CTS, congestion avoidance and processing. In Figure 3, the author
proposed the new approach in the form of algorithm. It explains the details in the form of flowchart.
Figure 3. Flowchart for RC-MAC Algorithm
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 87 – 93
90
3. RESULTS AND ANALYSIS
NS 2 is chosen for the simulation as set-up consists of the massive network. Set-up contains 100
nodes; size of the packet is 780 bytes, routing protocol is AODV. MAC Protocols used are IEEE 802.11 and
RC-MAC. Topology used is MANET. Here table 1 gives the informations used in simulations of
experiments.
Table 1. Network Simulation Parameters
Parameter Name Parameter Value
No Of Nodes 100
Node Type Static
Area Of Simulation 1000x 1000
Traffic Cbr
Channel Type Wireless Channel
3.1. Analysis of Energy consumption, Reliability and Bandwidth in RC-MAC
Figure 4, shown the results of proposed work in terms of energy consumption versus simulation
time and in slots of simulation time in 10, 15 & 20 sec. Every time energy consumption will increase with
simulation time. The RC-MAC protocol used as MAC protocol in the wireless sensor networks. When node
resolute to send information packet, by communication media like wireless media. It will send the data, else
goes to wait. Each time information should be moved from the application layer to the physical layer.
The measurement made for performance characteristic of RC-MAC reliability and obtain values are
shown in Figure 5. In Figure 5 the author proposed in this work the slots of simulation time in 10, 15 & 20
sec. Every time reliability will increase with simulation time. The RC-MAC protocol used as MAC protocol
in the wireless sensor networks. Reliability in wireless sensor networks be able to examine from together the
packet level and event level.
Figure 4. RC-MAC: Energy Consumption Vs
Simulation time
Figure 5. RC-MAC Reliability Vs Simulation time
Figure 6. RC-MAC: Bandwidth Vs Simulation time
Int J Elec & Comp Eng ISSN: 2088-8708 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in …. (Ananda Kumar K S)
91
In Figure 6, the proposed work is the slots of simulation time/bandwidth in 10, 15 & 20 sec. Every
time bandwidth will increases with simulation time. Bandwidth increases from 365 to 787.
3.2. Performance Analysis of Energy consumption, Reliability and Bandwidth, Comparison of
RC-MAC with MAC IEEE 802.11
Energy consumption is inversely propositional to the energy expenditure. Energy consumption is
calculated by implementing MAC and implementing RC-MAC. Figure 7 compares the energy consumption
of MAC protocol and RC-MAC protocol. Energy consumption is high in MAC protocol; it’s less in RC-
MAC protocol. RC-MAC protocol that allows node to proficiently make use of multiple channel by dropping
needless channel switching. Receiver-Centric MAC protocol avoids the interference owed to get better
communication throughput of wireless sensor network. From the obtained results, the MAC will consume
energy more by 0.12% than RC-MAC.
Reliability consist capability to retransmit lost packets, locally or end to end, to guarantee successful
delivery. However, any sensor network that is deploying to supply to a significant application will need
mechanism to make sure that reliability of data delivery from the sink to the sensors. By using upstream and
downstream message is carried out in wireless sensor network. For upstream message, the sender is a sensor
node and receiver node is a sink node. For downstream message, the sender is a sink node and receiver node
is a sensor node. Figure 8 shows that comparison of reliability of MAC and RC-MAC. Here RC-MAC
protocol has more reliable compared to MAC protocol. The results show that reliability is improved by
20.86 % in RC-MAC, compared with MAC.
Figure 7. Comparison of Energy Consumption of
MAC and RC-MAC
Figure 8. Comparison of Reliability of MAC and
RC-MAC
Figure 9. Comparison of Bandwidth of MAC and RC-MAC
Bandwidth represents the quantity of data that can be transmitted over a network in a given quantity
of time, frequently spoken in bits per second or bps in wireless sensor network. Figure 9 shows that,
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 87 – 93
92
comparison of bandwidth of MAC and RC-MAC protocols, here compared to RC-MAC existing MAC have
less bandwidth. A result shows that bandwidth increased by 27.32% of bandwidth in RC-MAC compared
with MAC 802.11.
4. CONCLUSION
From the obtained results of the current proposed method, RC-MAC protocol mainly focus on
energy consumption, reliability and end to end delay. The factors of congestion control, reliability and energy
consumption would help in dropping packet failure rate which results an energy efficient process of the
network. In this paper systematically evaluated the current technique using NS2 simulator, the simulation
results and analysis of parametric measures like - energy consumption, reliability and bandwidth are exposed
and comparing this results with other protocols. Here, the RC-MAC protocol shown better performance and
efficiency. The proposed protocol will shows better performance in terms of energy consumption and
reliability. Here, the proposed method obtained an improvement in terms of 0.12% of less energy
consumption, reliability improved by 20.86% and bandwidth increased by 27.32% of RC-MAC compared
with MAC IEEE 802.11.
ACKNOWLEDGEMENTS
The author would like to express sincere thanks for encouragement and constant support provided
by the Management RRGI, and Principal RajaRajeswari College of Engineering, Bangalore-74, India during
this research work.
REFERENCES
[1] Huang, Pei, Chen Wang, and Li Xiao, "RC-MAC: A receiver-centric MAC protocol for event- driven wireless
sensor networks," IEEE Transactions on Computers 64.4 : 1149- 1161, 2015
[2] Yueh-Tiam Yong, C.E. Tan , Zen, K., “Long Transmission Range Performance Evaluation on RI- MAC protocol
in Wireless Sensor Networks,” International Journal of Advanced Research in Computer and Communication
Engineering, Vol. 3, Issue 11, November 2014.
[3] D. N. Wategaonkar and V. S. Deshpande, "Characterization of reliability in WSN," 2012 World congress on
Information and Communication Technologies,Trivandrum, pp.970-975, 2012
[4] UK Singh, KC Phuleriya, RJ Yadav, “Real Time Data Communication Medium access control (RCMAC)
Protocol for Wireless Sensor Networks (WSNs),” International Journal of Emerging Technology and Advanced
Engineering, ISSN 2250-2459, Volume 2, Issue 5, May 2012.
[5] Ananda Kumar K S; Balakrishna R; “Development of Energy-Efficient and Data Collection Protocol for
heterogeneous Wireless Sensor Networks,” ITSI Transactions on Electrical and Electronics Engineering (ITSI-
TEEE), ISSN (PRINT): 2320 – 8945, Volume -4, Issue -2, 2016.
[6] Ananda Kumar K, S, Balakrishna R; “Study on Energy Efficient Routing Protocols in Wireless sensor
Networks,” International Journal of Advanced Research in Computer Science and Software Engineering,
ISSN: 2277 128X,Vol 5, Issue 11, pages 702-705,2015.
[7] Ananthram Swami, Qing Zhao, Yao-Win Hong, Lang Tong, “Wireless Sensor Networks: Signal Processing and
Communications,” John Wiley & Sons, 2007.
[8] A. Kakria and T. C. Aseri, "Survey of synchronous MAC protocols for Wireless Sensor Networks," 2014 Recent
Advances in Engineering and Computational Sciences (RAECS), Chandigarh, pp. 1-4, 2014
[9] Ravi Kodavarti, "Overcoming QoS, Security Issues in VoWLAN Designs", Texas Instruments, April, 2003.
[10] Patil, A. V., and A. Y. Kazi, "Performance analysis of IEEE 802.15. 4 sensor networks," Computing,
Communications and Networking Technologies (ICCCNT), 2013 Fourth International Conference on. IEEE,
2013.
BIOGRAPHIES OF AUTHORS
Ananda Kumar K S. Obtained B.Tech Degree from Koneru Lakshmaiah College of Engineering,
Guntur, Acharya Nagarjuna University, Andhrapradesh. Obtained M.Tech Degree from
R.V.College of Engineering, Bangalore, Visvesvaraya Technological University, Belagavi,
Karnataka. Currently he is pursuing Ph.D from Visvesvaraya Technological University, Belagavi,
Karnataka. He is Working as Asst.Professor in Dept of Information Science and Engineering,
RajaRajeswari College of Engineering, Bangalore, India. His Research area interests are in the
field of Wireless Sensor Networks, Data Mining, Bioinformatics.
Int J Elec & Comp Eng ISSN: 2088-8708 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in …. (Ananda Kumar K S)
93
Balakrishna R is currently working as a Principal & Professor, in RajaRajeswari College of
Engineering. His research and professional career spans about 16 years of Teaching & research, 1
Year Industrial Experience at TCS. His expertise is primarily in the domains of Ad hoc Networks,
Mobile Computing, Networks, and Distributed OS. He obtained his M.Tech. from Maharshi
Dayanad University and subsequently Ph.D from Sri Krishnadevaraya University. He is a life
member of professional bodies ISTE, CSI, IAENG etc. He has published 42 papers in peered
International Journals, 23 papers in International and National Conferences. He has guided 9
M.Tech, 6 Masters and 30 B.E students projects. Currently he is guiding 5 PhD scholars, 2
M.Sc.Engg.ByResearchatVTU.

More Related Content

What's hot

Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...ijwmn
 
Qo s oriented distributed routing protocols : anna university 2nd review ppt
Qo s   oriented  distributed routing  protocols : anna university 2nd review pptQo s   oriented  distributed routing  protocols : anna university 2nd review ppt
Qo s oriented distributed routing protocols : anna university 2nd review pptAAKASH S
 
Interference Aware Multi-path Routing in Wireless Sensor Networks
Interference Aware Multi-path Routing in Wireless Sensor NetworksInterference Aware Multi-path Routing in Wireless Sensor Networks
Interference Aware Multi-path Routing in Wireless Sensor NetworksRakesh Behera
 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...ijwmn
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architectureijsrd.com
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
 
Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2Rushin Shah
 
A survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networksA survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networksijcses
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...IEEEGLOBALSOFTTECHNOLOGIES
 
ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...
ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...
ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...ijasuc
 
QOD routing protocols : phase 1 ppt
QOD routing  protocols : phase 1 pptQOD routing  protocols : phase 1 ppt
QOD routing protocols : phase 1 pptAAKASH S
 
Hybrid wireless network -0th review
Hybrid wireless network -0th review Hybrid wireless network -0th review
Hybrid wireless network -0th review AAKASH S
 
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax NetworkReduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Networkinventionjournals
 
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...
Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...Rakesh Behera
 

What's hot (20)

Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
 
Qo s oriented distributed routing protocols : anna university 2nd review ppt
Qo s   oriented  distributed routing  protocols : anna university 2nd review pptQo s   oriented  distributed routing  protocols : anna university 2nd review ppt
Qo s oriented distributed routing protocols : anna university 2nd review ppt
 
Interference Aware Multi-path Routing in Wireless Sensor Networks
Interference Aware Multi-path Routing in Wireless Sensor NetworksInterference Aware Multi-path Routing in Wireless Sensor Networks
Interference Aware Multi-path Routing in Wireless Sensor Networks
 
40520130101003
4052013010100340520130101003
40520130101003
 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architecture
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
 
Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2
 
ShortPaper
ShortPaperShortPaper
ShortPaper
 
A survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networksA survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networks
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
 
ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...
ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...
ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE M...
 
Advanced Networking on GloMoSim
Advanced Networking on GloMoSimAdvanced Networking on GloMoSim
Advanced Networking on GloMoSim
 
QOD routing protocols : phase 1 ppt
QOD routing  protocols : phase 1 pptQOD routing  protocols : phase 1 ppt
QOD routing protocols : phase 1 ppt
 
Hybrid wireless network -0th review
Hybrid wireless network -0th review Hybrid wireless network -0th review
Hybrid wireless network -0th review
 
B010340611
B010340611B010340611
B010340611
 
A2546035115
A2546035115A2546035115
A2546035115
 
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax NetworkReduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
 
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...
Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...
 

Similar to Energy Efficient Receiver-Centric MAC Protocol

Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...IOSR Journals
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Editor Jacotech
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetImproved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetIJERA Editor
 
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...iosrjce
 
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...TELKOMNIKA JOURNAL
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networkspijans
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkijcsa
 
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...IJECEIAES
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkIJNSA Journal
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop TransmissionIOSR Journals
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsIOSR Journals
 
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...IJEEE
 
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...INFOGAIN PUBLICATION
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ijac journal
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
 

Similar to Energy Efficient Receiver-Centric MAC Protocol (20)

Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...
 
PROGRESS 1& 2.ppt
PROGRESS 1& 2.pptPROGRESS 1& 2.ppt
PROGRESS 1& 2.ppt
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
B04020812
B04020812B04020812
B04020812
 
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetImproved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
 
B010611015
B010611015B010611015
B010611015
 
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
 
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor network
 
40120140503011
4012014050301140120140503011
40120140503011
 
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc Network
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
 
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
 
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
 

More from IJECEIAES

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionIJECEIAES
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningIJECEIAES
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...IJECEIAES
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...IJECEIAES
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...IJECEIAES
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...IJECEIAES
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyIJECEIAES
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationIJECEIAES
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceIJECEIAES
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...IJECEIAES
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...IJECEIAES
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...IJECEIAES
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...IJECEIAES
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...IJECEIAES
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
 

More from IJECEIAES (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regression
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimization
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performance
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
 

Recently uploaded

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 

Recently uploaded (20)

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 

Energy Efficient Receiver-Centric MAC Protocol

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 8, No. 1, February 2018, pp. 87~93 ISSN: 2088-8708, DOI: 10.11591/ijece.v8i1.pp87-93  87 Journal homepage: http://iaescore.com/journals/index.php/IJECE Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wireless Sensor Networks Ananda Kumar K S1 , Balakrishna R2 1 Dept of ISE, RajaRajeswari College of Engineering, Bangalore-560074, India 2 RajaRajeswari College of Engineering, Bangalore-560074, India Article Info ABSTRACT Article history: Received Apr 2, 2017 Revised Aug 20, 2017 Accepted Sep 4, 2017 At present day’s wireless sensor networks, obtain a lot consideration to researchers. Maximum number of sensor nodes are scattered that can communicate with all others. Reliable data communication and energy consumption are the mainly significant parameters that are required in wireless sensor networks. Many of MAC protocols have been planned to improve the efficiency more by enhancing the throughput and energy consumption. The majority of the presented medium access control protocols to only make available, reliable data delivery or energy efficiency does not offer together at the same time. In this research work the author proposes a novel approach based on Receiver Centric-MAC is implemented using NS2 simulator. Here, the author focuses on the following parametric measures like - energy consumption, reliability and bandwidth. RC-MAC provides high bandwidth without decreasing energy efficiency. The results show that 0.12% of less energy consumption, reliability improved by 20.86% and bandwidth increased by 27.32% of RC-MAC compared with MAC IEEE 802.11. Keyword: Bandwidth Energy consumption Medium access control Receiver centric MAC Wireless sensor networks Copyright © 2018 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Ananda Kumar K S, Dept of ISE, RajaRajeswari College of Engineering, Bangalore-560074, India. Email: anandgdk@gmail.com 1. INTRODUCTION The Wireless Sensor Network (WSN) is advanced technology and build up with that has been incorporated into one of the best emerging areas in the communication industry [1]. A number of small wireless sensor nodes are used to exchange information for a long time with a limited battery power capacity in wireless sensor networks. The most important power factor consumption of a node is radio. MAC protocol controls the radio of the sensor node [2]. Generally, wireless sensor networks constitute many numbers of nodes. In Figure 1 depicts that the functionality for dissimilar types of nodes that appearance a wireless network to exist to control their spatial mobility exclusive of lose functionality. Nodes should be capable to detect neighbor nodes in a network and to vigorously correlate to coordinators based on their position [3]. Each node is connected to either one or many nodes. Consider a generic communication network, that network combine nodes and communication links. Every node produces information designed for each node and all other nodes in the network. Distinctive routing scheme considers to deal with various grouping of the follow a) minimize the cost and complexity b) prevention of unreliable communication links, c) maximize network throughput d) minimize end to end delay [4]. Sensor nodes operate with a tiny battery that consumes more power while propagation of a signal, so that energy efficiency is considered as major criteria for designing several MAC protocols. Radio is the
  • 2.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 87 – 93 88 central part of any sensor node and that consumes more power during communication. The competent MAC protocol is capable of enhancing lifetime of several sensor networks. MAC layer protocols in wireless sensor network are classified into four categories: a) synchronous awaking of nodes, b) asynchronous awaking of nodes, c) slotting of frames and d) multi channel approach. Duty cycle is one of the foremost attribute of asynchronous and synchronous protocols, at this juncture any node can exchange among sleep and active states to save energy, while nodes are able to communicate in active state. Asynchronous MAC protocols are based on the type of communication between two nodes dissimilar in active/sleep mode. In synchronous MAC protocols, all nodes are synchronized at the same time [5]. Medium Access Control is traditionally viewed as an element of the data link layer in the OSI model. Here, coordinates the use of a common transmission medium in multiuser systems and ensure reliable communication greater than interference free channels for each one user [6], [10]. The fundamental prerequisite of a sensor network is reliable delivery of information with lowest amount latency and energy consumption. On the other hand, the majority MAC protocols were proposes of their concerned about the users are self-governing of each other and challenge for the use of the general transmission channel. Outstanding to the strict resource constraint of sensor networks, two properties of the system were frequently exploited for designing sensor network MAC protocols: a) the application – needy objectives and b) the helpful nature of the scattered sensors [7]. CSMA is one of the mainly accepted choices for random access networks due to its simplicity and efficient design. Each user has a communication to transmit first senses the channel to see whether or not there is an enduring transmission from further users before it transmit its own data for communication. Hence an attempt was made to avoid collision with other users. When a collision occurs at the destination, each transmitting user wait for a unsystematic back in time before it makes a challenge to transmit the message again. Widely adopted protocol the multiple access with collision avoidance (MACA) protocol that introduce a three way handshake between the transmitter and receiver to solve the familiar hidden terminal problem present in usual CSMA [8]. Three-way handshake planned in MACA resolve this difficulty by having every user transmit a Request-To-Send (RTS) message. At any time it has a packet to send, representing the destination and the length of the deliberate data transmission. The destination user successfully receives the RTS message and has not fulfilled a handshake previously with further nodes; it then decides to respond with a Clear-To-Send (CTS) packet indicating that it is set for the reception. The source then sends an information packet to the destination once the CTS are received [9]. The mechanism of CTS and RTS is shown in Figure 2. Pei Huang et al, proposed a novel method in by improving the throughput under the heavy traffic load on wireless sensor networks. They discussed the receiver centric development by utilizing the data gathering tree structure in wireless sensor networks [1]. Yeah –time Yong et al, proposed in the method of different transmission range and sensing range for managing dynamic traffic loads in wireless sensor networks. Here limitations are time offer of a transmission, retransmission and high frequency of retransmission [2]. Umesh et al proposed RC-MAC protocol focused on end to end reliable communication and increase the lifetime of the sensor network [4]. Figure 1. Wireless Sensor Network Figure 2. Mechanisms of CTS and RTS 2. RESEARCH METHOD 2.1. Algorithm for RC-MAC Step 1: Each node sends a beacon message for checking the node status. A node status defines whether the node is sleep node or wake up a node (nib). nib-neighbor id
  • 3. Int J Elec & Comp Eng ISSN: 2088-8708  Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in …. (Ananda Kumar K S) 89 Step 2: It sends the RTS/CTS message for getting the channel status. After it forms the frame in terms of bandwidth and slot time TX Step 3: Maximum allowed queue process to be utilized at every transmission slots at T-sec. T-sec – Transmission seconds Step 4: Tr->propagation variance of delay when transmitter receiver distance is rx. Tr-Transmission rate, rx – reception rate Step 5: Probability of delivered rate of new entity in (nb) access slots. nb- neighbor node Step 6: It enters the channel scheduling for assign the channel to communicate. Channel scanning is completed by number of slots per super-frame. Step 7: Receiver node establish that average one hop delay is high it chooses a shortest path. Energy level is beyond a specified threshold time schedule of helper is not affected Step 8: First and second cycle includes a cooperative transmission and node updates its status information to intermediate nodes. Step 9: Receiver nodes have advanced than transmitter node then co-operative transmission will be applied. Step 10: Analyze the estimated signal interference level. Adjusted of each frame is done as per number of access slots. If it reaches limited threshold it processed a duration. Step 11: Then it enters noise interference level and estimate the level. Packets are assigned into priority level. Packet transmissions begin with congestion dance. 2.2. Flowchart for RC-MAC Algorithm In flowchart to transmit data, it’s moved from top to bottom, followed by different levels like channel scanning, send RTS, wait CTS, congestion avoidance and processing. In Figure 3, the author proposed the new approach in the form of algorithm. It explains the details in the form of flowchart. Figure 3. Flowchart for RC-MAC Algorithm
  • 4.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 87 – 93 90 3. RESULTS AND ANALYSIS NS 2 is chosen for the simulation as set-up consists of the massive network. Set-up contains 100 nodes; size of the packet is 780 bytes, routing protocol is AODV. MAC Protocols used are IEEE 802.11 and RC-MAC. Topology used is MANET. Here table 1 gives the informations used in simulations of experiments. Table 1. Network Simulation Parameters Parameter Name Parameter Value No Of Nodes 100 Node Type Static Area Of Simulation 1000x 1000 Traffic Cbr Channel Type Wireless Channel 3.1. Analysis of Energy consumption, Reliability and Bandwidth in RC-MAC Figure 4, shown the results of proposed work in terms of energy consumption versus simulation time and in slots of simulation time in 10, 15 & 20 sec. Every time energy consumption will increase with simulation time. The RC-MAC protocol used as MAC protocol in the wireless sensor networks. When node resolute to send information packet, by communication media like wireless media. It will send the data, else goes to wait. Each time information should be moved from the application layer to the physical layer. The measurement made for performance characteristic of RC-MAC reliability and obtain values are shown in Figure 5. In Figure 5 the author proposed in this work the slots of simulation time in 10, 15 & 20 sec. Every time reliability will increase with simulation time. The RC-MAC protocol used as MAC protocol in the wireless sensor networks. Reliability in wireless sensor networks be able to examine from together the packet level and event level. Figure 4. RC-MAC: Energy Consumption Vs Simulation time Figure 5. RC-MAC Reliability Vs Simulation time Figure 6. RC-MAC: Bandwidth Vs Simulation time
  • 5. Int J Elec & Comp Eng ISSN: 2088-8708  Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in …. (Ananda Kumar K S) 91 In Figure 6, the proposed work is the slots of simulation time/bandwidth in 10, 15 & 20 sec. Every time bandwidth will increases with simulation time. Bandwidth increases from 365 to 787. 3.2. Performance Analysis of Energy consumption, Reliability and Bandwidth, Comparison of RC-MAC with MAC IEEE 802.11 Energy consumption is inversely propositional to the energy expenditure. Energy consumption is calculated by implementing MAC and implementing RC-MAC. Figure 7 compares the energy consumption of MAC protocol and RC-MAC protocol. Energy consumption is high in MAC protocol; it’s less in RC- MAC protocol. RC-MAC protocol that allows node to proficiently make use of multiple channel by dropping needless channel switching. Receiver-Centric MAC protocol avoids the interference owed to get better communication throughput of wireless sensor network. From the obtained results, the MAC will consume energy more by 0.12% than RC-MAC. Reliability consist capability to retransmit lost packets, locally or end to end, to guarantee successful delivery. However, any sensor network that is deploying to supply to a significant application will need mechanism to make sure that reliability of data delivery from the sink to the sensors. By using upstream and downstream message is carried out in wireless sensor network. For upstream message, the sender is a sensor node and receiver node is a sink node. For downstream message, the sender is a sink node and receiver node is a sensor node. Figure 8 shows that comparison of reliability of MAC and RC-MAC. Here RC-MAC protocol has more reliable compared to MAC protocol. The results show that reliability is improved by 20.86 % in RC-MAC, compared with MAC. Figure 7. Comparison of Energy Consumption of MAC and RC-MAC Figure 8. Comparison of Reliability of MAC and RC-MAC Figure 9. Comparison of Bandwidth of MAC and RC-MAC Bandwidth represents the quantity of data that can be transmitted over a network in a given quantity of time, frequently spoken in bits per second or bps in wireless sensor network. Figure 9 shows that,
  • 6.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 87 – 93 92 comparison of bandwidth of MAC and RC-MAC protocols, here compared to RC-MAC existing MAC have less bandwidth. A result shows that bandwidth increased by 27.32% of bandwidth in RC-MAC compared with MAC 802.11. 4. CONCLUSION From the obtained results of the current proposed method, RC-MAC protocol mainly focus on energy consumption, reliability and end to end delay. The factors of congestion control, reliability and energy consumption would help in dropping packet failure rate which results an energy efficient process of the network. In this paper systematically evaluated the current technique using NS2 simulator, the simulation results and analysis of parametric measures like - energy consumption, reliability and bandwidth are exposed and comparing this results with other protocols. Here, the RC-MAC protocol shown better performance and efficiency. The proposed protocol will shows better performance in terms of energy consumption and reliability. Here, the proposed method obtained an improvement in terms of 0.12% of less energy consumption, reliability improved by 20.86% and bandwidth increased by 27.32% of RC-MAC compared with MAC IEEE 802.11. ACKNOWLEDGEMENTS The author would like to express sincere thanks for encouragement and constant support provided by the Management RRGI, and Principal RajaRajeswari College of Engineering, Bangalore-74, India during this research work. REFERENCES [1] Huang, Pei, Chen Wang, and Li Xiao, "RC-MAC: A receiver-centric MAC protocol for event- driven wireless sensor networks," IEEE Transactions on Computers 64.4 : 1149- 1161, 2015 [2] Yueh-Tiam Yong, C.E. Tan , Zen, K., “Long Transmission Range Performance Evaluation on RI- MAC protocol in Wireless Sensor Networks,” International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 11, November 2014. [3] D. N. Wategaonkar and V. S. Deshpande, "Characterization of reliability in WSN," 2012 World congress on Information and Communication Technologies,Trivandrum, pp.970-975, 2012 [4] UK Singh, KC Phuleriya, RJ Yadav, “Real Time Data Communication Medium access control (RCMAC) Protocol for Wireless Sensor Networks (WSNs),” International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, Volume 2, Issue 5, May 2012. [5] Ananda Kumar K S; Balakrishna R; “Development of Energy-Efficient and Data Collection Protocol for heterogeneous Wireless Sensor Networks,” ITSI Transactions on Electrical and Electronics Engineering (ITSI- TEEE), ISSN (PRINT): 2320 – 8945, Volume -4, Issue -2, 2016. [6] Ananda Kumar K, S, Balakrishna R; “Study on Energy Efficient Routing Protocols in Wireless sensor Networks,” International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X,Vol 5, Issue 11, pages 702-705,2015. [7] Ananthram Swami, Qing Zhao, Yao-Win Hong, Lang Tong, “Wireless Sensor Networks: Signal Processing and Communications,” John Wiley & Sons, 2007. [8] A. Kakria and T. C. Aseri, "Survey of synchronous MAC protocols for Wireless Sensor Networks," 2014 Recent Advances in Engineering and Computational Sciences (RAECS), Chandigarh, pp. 1-4, 2014 [9] Ravi Kodavarti, "Overcoming QoS, Security Issues in VoWLAN Designs", Texas Instruments, April, 2003. [10] Patil, A. V., and A. Y. Kazi, "Performance analysis of IEEE 802.15. 4 sensor networks," Computing, Communications and Networking Technologies (ICCCNT), 2013 Fourth International Conference on. IEEE, 2013. BIOGRAPHIES OF AUTHORS Ananda Kumar K S. Obtained B.Tech Degree from Koneru Lakshmaiah College of Engineering, Guntur, Acharya Nagarjuna University, Andhrapradesh. Obtained M.Tech Degree from R.V.College of Engineering, Bangalore, Visvesvaraya Technological University, Belagavi, Karnataka. Currently he is pursuing Ph.D from Visvesvaraya Technological University, Belagavi, Karnataka. He is Working as Asst.Professor in Dept of Information Science and Engineering, RajaRajeswari College of Engineering, Bangalore, India. His Research area interests are in the field of Wireless Sensor Networks, Data Mining, Bioinformatics.
  • 7. Int J Elec & Comp Eng ISSN: 2088-8708  Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in …. (Ananda Kumar K S) 93 Balakrishna R is currently working as a Principal & Professor, in RajaRajeswari College of Engineering. His research and professional career spans about 16 years of Teaching & research, 1 Year Industrial Experience at TCS. His expertise is primarily in the domains of Ad hoc Networks, Mobile Computing, Networks, and Distributed OS. He obtained his M.Tech. from Maharshi Dayanad University and subsequently Ph.D from Sri Krishnadevaraya University. He is a life member of professional bodies ISTE, CSI, IAENG etc. He has published 42 papers in peered International Journals, 23 papers in International and National Conferences. He has guided 9 M.Tech, 6 Masters and 30 B.E students projects. Currently he is guiding 5 PhD scholars, 2 M.Sc.Engg.ByResearchatVTU.