1. The document proposes EMAC, an energy-efficient multi-channel MAC protocol for ad hoc networks. EMAC uses specially designated nodes called "negotiators" that maintain schedules for nodes and facilitate channel negotiation to improve throughput and energy efficiency.
2. Simulation results showed that compared to other multi-channel MAC protocols, EMAC achieved significant energy savings at high network loads while providing higher throughput. It performs better than state-of-the-art protocols by allowing nodes to sleep more through the use of negotiators.
3. The key contributions of EMAC are the use of negotiators to synchronize nodes, applying the protocol to both ad hoc and sensor networks, and simulations showing it outperforms
In order enhance the network efficiency of Mobile ad hoc Networks (MANETs), an Power Unbiased Cooperative Media Access Control(PUC-MAC) protocol in MANETs was planned during this paper. It adopted the most effective partnership choice statement to select the cooperative node with higher channel condition, higher passing rate and additional balanced power consumption. Simulation results showed that PUC-MAC outperforms EC-MAC,Cooperative MAC (CoopMAC) and IEEE 802.11 Distributed Coordination perform (DCF) in terms of the packet release quantitative relation, network outturn and network lifespan beneath 2 distinct channel noise levels, particularly beneath the worst channel condition.
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...cscpconf
Network-wide broadcasting is a fundamental operation for mobile ad hoc networks. Inbroadcasting, a source node sends a message to all other nodes in the network. Under ordinary
flooding procedure, each node transmits the broadcast message to all of its 1-hop downlinkneighbours, i.e. all nodes residing within its radio-range. Receiving the broadcast message all those downlink neighbours reply with an acknowledgement. Since in an ad hoc network a node
may have multiple uplink neighbours, in ordinary flooding procedure, a node is supposed to receive the broadcast message from all those uplink neighbours and send acknowledgement to all of them, generating huge message contention and collision. This is popularly referred to as
the broadcast storm problem. The present article is focused to remove the broadcast redundancy within 2-hop neighbourhood and beyond, as much as possible by prioritizing the 1-
hop downlink neighbours of a node. Priority of a 1-hop downlink neighbour of a node ni increases if it is equipped with a large number of 1-hop downlink neighbours, large radiorange,
high remaining battery power and very small number of uplink neighbours closer to the broadcast source than ni
. ni waits a predefined amount of time to receive proactive
acknowledgements from the 1-hop downlink neighbours having less priority. If it does not receive acknowledgement from those downlink neighbours within the waiting time, it sends the
broadcast message to them. A fuzzy controller named Priority Assignor (PA) is embedded in every node that determines the priority of a 1-hop downlink neighbour. Simulation results firmly
establish that the proposed protocol FP2 B produces high broadcast delivery ratio at muchlesser message cost, compared to other state-of-the-art broadcast algorithms.
This document describes a method for maximizing the total throughput of a two-way relay network using orthogonal frequency-division multiplexing (OFDM). The method jointly optimizes subcarrier pairing and relay selection by formulating the problem as a maximum weighted bipartite matching problem, which can be solved in polynomial time. Simulation results show that the proposed method increases total throughput compared to benchmark methods, especially as the number of relays increases. The throughput is evaluated for different numbers of subcarriers and relays to analyze the system's performance under various conditions.
Performance of cluster-based cognitive multihop networks under joint impact o...TELKOMNIKA JOURNAL
In this paper, we evaluate outage probability (OP) of a cluster-based multi-hop protocol operating
on an underlay cognitive radio (CR) mode. The primary network consists of multiple independent
transmit/receive pairs, and the primary transmitters seriously cause co-channel interference (CCI) to the
secondary receivers. To improve the outage performance for the secondary network under the joint impact
of the CCI and hardware imperfection, we employ the best relay selection at each hop. Moreover, the
destination is equipped with multiple antennas and uses the selection combining (SC) technique to
enhance the reliability of the data transmission at the last hop. For performance evaluation, we first derive
an exact formula of OP for the primary network which is used to calculate the transmit power of the
secondary transmitters. Next, an exact closed-form expression of the end-to-end OP for the secondary
network is derived over Rayleigh fading channels. We then perform Monte-Carlo simulations to validate
the derivations. The results present that the CCI caused by the primary operations significantly impacts on
the outage performance of the secondary network.
With the increase of usage of wireless networks for purposes where the nodes are either stationary or minimally mobile, focus is also on increasing the network capacity of wireless networks. One such way is to use non-overlapping multiple channels provided by 802.11 by using multiple interfaces per node. Multiple non overlapped channels exist in the 2.4 GHz and 5 GHz spectrum. Under this scenario, several challenges need to be addressed before all the available channels can be fully utilized.
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...IJECEIAES
This document summarizes 13 different approaches that have been proposed to improve the selection of Multi Point Relays (MPRs) in the Optimized Link State Routing (OLSR) protocol for mobile ad hoc networks (MANETs). The standard OLSR MPR selection algorithm is limited as it only considers connectivity and does not account for other important node characteristics and metrics. The summarized approaches aim to select MPRs based on additional criteria like energy level, bandwidth, mobility, link quality, location, and trust to make the routing process more efficient and robust. Simulation results indicate that considering multiple metrics can reduce overhead, improve throughput, extend network lifetime, and secure the routing protocol from malicious nodes.
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...ambitlick
This document discusses enhancing the downlink performance of wireless networks through simultaneous multiple packet transmission (MPT). MPT allows an access point to simultaneously transmit two packets to two distinct users, effectively doubling throughput. The paper formalizes scheduling packets for transmission as a maximum matching problem in a graph. It also presents a fast approximation algorithm for finding a matching and analyzes how MPT can increase maximum arrival rates and reduce packet delays.
In this paper, we consider the joint optimal sensing
and distributed MAC protocol design for cognitive radio
networks. Specifically, we design a synchronized MAC protocol
for dynamic spectrum sharing among multiple secondary
users, which incorporates spectrum sensing for protecting active
primary users. We perform saturation throughput analysis for
the proposed MAC protocol that explicitly captures spectrum
sensing performance. Then, we find its optimal configuration
by formulating a throughput maximization problem subject to
detection probability constraints for primary users. In particular,
the optimal solution of this optimization problem returns the
required sensing time for primary users’ protection and optimal
contention window for maximizing total throughput of the
secondary network. Finally, numerical results are presented to
illustrate a significant performance gain of the optimal sensing
and protocol configuration.
In order enhance the network efficiency of Mobile ad hoc Networks (MANETs), an Power Unbiased Cooperative Media Access Control(PUC-MAC) protocol in MANETs was planned during this paper. It adopted the most effective partnership choice statement to select the cooperative node with higher channel condition, higher passing rate and additional balanced power consumption. Simulation results showed that PUC-MAC outperforms EC-MAC,Cooperative MAC (CoopMAC) and IEEE 802.11 Distributed Coordination perform (DCF) in terms of the packet release quantitative relation, network outturn and network lifespan beneath 2 distinct channel noise levels, particularly beneath the worst channel condition.
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...cscpconf
Network-wide broadcasting is a fundamental operation for mobile ad hoc networks. Inbroadcasting, a source node sends a message to all other nodes in the network. Under ordinary
flooding procedure, each node transmits the broadcast message to all of its 1-hop downlinkneighbours, i.e. all nodes residing within its radio-range. Receiving the broadcast message all those downlink neighbours reply with an acknowledgement. Since in an ad hoc network a node
may have multiple uplink neighbours, in ordinary flooding procedure, a node is supposed to receive the broadcast message from all those uplink neighbours and send acknowledgement to all of them, generating huge message contention and collision. This is popularly referred to as
the broadcast storm problem. The present article is focused to remove the broadcast redundancy within 2-hop neighbourhood and beyond, as much as possible by prioritizing the 1-
hop downlink neighbours of a node. Priority of a 1-hop downlink neighbour of a node ni increases if it is equipped with a large number of 1-hop downlink neighbours, large radiorange,
high remaining battery power and very small number of uplink neighbours closer to the broadcast source than ni
. ni waits a predefined amount of time to receive proactive
acknowledgements from the 1-hop downlink neighbours having less priority. If it does not receive acknowledgement from those downlink neighbours within the waiting time, it sends the
broadcast message to them. A fuzzy controller named Priority Assignor (PA) is embedded in every node that determines the priority of a 1-hop downlink neighbour. Simulation results firmly
establish that the proposed protocol FP2 B produces high broadcast delivery ratio at muchlesser message cost, compared to other state-of-the-art broadcast algorithms.
This document describes a method for maximizing the total throughput of a two-way relay network using orthogonal frequency-division multiplexing (OFDM). The method jointly optimizes subcarrier pairing and relay selection by formulating the problem as a maximum weighted bipartite matching problem, which can be solved in polynomial time. Simulation results show that the proposed method increases total throughput compared to benchmark methods, especially as the number of relays increases. The throughput is evaluated for different numbers of subcarriers and relays to analyze the system's performance under various conditions.
Performance of cluster-based cognitive multihop networks under joint impact o...TELKOMNIKA JOURNAL
In this paper, we evaluate outage probability (OP) of a cluster-based multi-hop protocol operating
on an underlay cognitive radio (CR) mode. The primary network consists of multiple independent
transmit/receive pairs, and the primary transmitters seriously cause co-channel interference (CCI) to the
secondary receivers. To improve the outage performance for the secondary network under the joint impact
of the CCI and hardware imperfection, we employ the best relay selection at each hop. Moreover, the
destination is equipped with multiple antennas and uses the selection combining (SC) technique to
enhance the reliability of the data transmission at the last hop. For performance evaluation, we first derive
an exact formula of OP for the primary network which is used to calculate the transmit power of the
secondary transmitters. Next, an exact closed-form expression of the end-to-end OP for the secondary
network is derived over Rayleigh fading channels. We then perform Monte-Carlo simulations to validate
the derivations. The results present that the CCI caused by the primary operations significantly impacts on
the outage performance of the secondary network.
With the increase of usage of wireless networks for purposes where the nodes are either stationary or minimally mobile, focus is also on increasing the network capacity of wireless networks. One such way is to use non-overlapping multiple channels provided by 802.11 by using multiple interfaces per node. Multiple non overlapped channels exist in the 2.4 GHz and 5 GHz spectrum. Under this scenario, several challenges need to be addressed before all the available channels can be fully utilized.
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...IJECEIAES
This document summarizes 13 different approaches that have been proposed to improve the selection of Multi Point Relays (MPRs) in the Optimized Link State Routing (OLSR) protocol for mobile ad hoc networks (MANETs). The standard OLSR MPR selection algorithm is limited as it only considers connectivity and does not account for other important node characteristics and metrics. The summarized approaches aim to select MPRs based on additional criteria like energy level, bandwidth, mobility, link quality, location, and trust to make the routing process more efficient and robust. Simulation results indicate that considering multiple metrics can reduce overhead, improve throughput, extend network lifetime, and secure the routing protocol from malicious nodes.
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...ambitlick
This document discusses enhancing the downlink performance of wireless networks through simultaneous multiple packet transmission (MPT). MPT allows an access point to simultaneously transmit two packets to two distinct users, effectively doubling throughput. The paper formalizes scheduling packets for transmission as a maximum matching problem in a graph. It also presents a fast approximation algorithm for finding a matching and analyzes how MPT can increase maximum arrival rates and reduce packet delays.
In this paper, we consider the joint optimal sensing
and distributed MAC protocol design for cognitive radio
networks. Specifically, we design a synchronized MAC protocol
for dynamic spectrum sharing among multiple secondary
users, which incorporates spectrum sensing for protecting active
primary users. We perform saturation throughput analysis for
the proposed MAC protocol that explicitly captures spectrum
sensing performance. Then, we find its optimal configuration
by formulating a throughput maximization problem subject to
detection probability constraints for primary users. In particular,
the optimal solution of this optimization problem returns the
required sensing time for primary users’ protection and optimal
contention window for maximizing total throughput of the
secondary network. Finally, numerical results are presented to
illustrate a significant performance gain of the optimal sensing
and protocol configuration.
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...IJERA Editor
Network Coding is most promising aspect of WSN. This Network Coding method is combined with multipath routing protocol to form NCMR protocol.(network coding based multipath routing protocol).This protocol is used to obtain energy efficient wireless sensor network.. These protocol leads to decrease the number of constrain routes & the total time of transmission. This protocol is applied on unicast and multicast network separately. And comparison is done with traditional multipath routing protocol for same unicast and multicast network. Simulation result shows energy consumption of NCMR multicast is lower than NCMR unicast and also than TMR unicast as well as multicast. This work is proved by the simulation analysis results. The used multipath model is based on braided multipath routing, and the network coding method is random linear network coding (practical network coding). In braided network multiple paths to the sink nodes are created for each source node, and the packets encoded at source nodes are transmitted through the braided multipath network model. Then, intermediate nodes re-encode these received packets and transfer these new packets to next cluster. Finally, the multiple sink nodes decode the packets received from different paths and recover the original data. Results of the analysis show that multicast NCMR provides more reliability. We compare multicast NCMR routing protocol with NCMR unicast & also with traditional multipath routing protocol for unicast and multicast networks, in terms of the packet loss, energy consumption, successful delivery ratio & end to end delay when a packet is transmitted Some special simulations are carried out specially for NCMR multicast i.e. effect of number of nodes on energy consumption, packet loss & end to end delay.
Clustering based Time Slot Assignment Protocol for Improving Performance in U...journal ijrtem
Recently, numerous approaches have been proposed for designing medium access control (MAC)
in underwater acoustic networks (UANs). Some of those works tried to adapt MAC protocols proposed for
terrestrial networks. However, unique environmental characteristics of UANs make the MAC protocols hard to be
used in the UANs and degrade network performance. In order to improve network performance, COD-TS MAC
protocol was proposed. COD-TS focuses on both single hop and multi-hop mode and utilizes CDMA for
exchanging schedule information between cluster heads. COD-TS has shortcomings such as collisions, additional
energy consumption by exchanging schedule information and near-far effect of CDMA. To overcome above
shortcomings, we propose a clustering-based time slot assignment protocol. In the proposed protocol, nodes are
clustered, and each cluster head performs two-hop neighbor cluster discovery operation. And then, a cluster head
obtains its own relative position information. Finally, the cluster head assigns its own time slot for data
transmission based on the information. Simulation results show that the proposed protocol has always better
performance compared to the COD-TS.
This document discusses a cooperative transmission protocol for wireless sensor networks. The protocol aims to improve energy efficiency and transmission reliability. It establishes cooperative clusters during data transmission where neighboring nodes help each other. The cluster head recruits nodes to assist in communication. The protocol is analyzed based on factors like capacity, end-to-end robustness to packet loss, and the tradeoff between energy consumption and error rate. Simulation results show the protocol increases transmission reliability and achieves a longer network lifetime compared to non-cooperative schemes.
1) LEACH is a hierarchical routing protocol for wireless sensor networks that aims to lower energy consumption by forming clusters of nodes and rotating cluster head roles among nodes.
2) The document discusses several enhancements made to the original LEACH protocol to improve network lifetime, throughput, and coverage area, including E-LEACH, EHE-LEACH, and multi-level LEACH.
3) Simulation results show that the enhanced protocols increase network lifetime by 40-49% compared to the original LEACH protocol.
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Eswar Publications
Ad hoc networks are collections of mobile nodes communicating with each other using wireless media without any fixed infrastructure. During both route discovery and traversal of route-reply packets from destination to source,
broadcast of packets is required which incurs huge message cost. The present article deals with the message cost
reduction during transmission of route-reply from destination to source. Also the redundancy that is visible within the 2-hop neighborhood of a node is minimized during broadcasting of route-reply. This improves the average lifetime of network nodes by decreasing the possibility of network partition. The scheme of 2NI can be used with any reactive routing protocol in MANETs.
An enhanced energy-efficient routing protocol for wireless sensor networkIJECEIAES
The document summarizes an enhanced energy-efficient routing protocol proposed for wireless sensor networks. The proposed protocol selects cluster heads based on current energy levels to avoid nodes with low energy from being selected. It also chooses a root cluster head with high residual energy and short distance to the sink to aggregate and transmit all cluster data. Simulations show the proposed protocol performs better than LEACH in increasing network lifetime by balancing energy consumption and extending stability periods.
New strategy to optimize the performance of spray and wait routing protocolijwmn
Delay Tolerant Networks have been (DTN) have been developed to support the irregular connectivity often
separate networks. The main routing problem in this type of network is embarrassed by time that is
extremely long, since connections are intermittent and opportunistic. Routing protocols must take into
account the maximum constraint encountered in this type of environment , use effective strategies
regarding the choice of relay nodes and buffer management nodes to improve the delivery of messages and
the time of their delivery . This article proposes a new strategy that optimizes the routing Spray and wait.
The proposed method uses the information contained in the messages delivered mostly paths traversed by
the messages before arriving at their destination and the time when nodes have receive these messages.
Simulation results show that the proposed strategy can increase the probability of delivery and minimizing
overhead unlike FIFO technology used with the default routing ' sprat and wait'
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
At present day’s wireless sensor networks, obtain a lot consideration to researchers. Maximum number of sensor nodes are scattered that can communicate with all others. Reliable data communication and energy consumption are the mainly significant parameters that are required in wireless sensor networks. Many of MAC protocols have been planned to improve the efficiency more by enhancing the throughput and energy consumption. The majority of the presented medium access control protocols to only make available, reliable data delivery or energy efficiency does not offer together at the same time. In this research work the author proposes a novel approach based on Receiver Centric-MAC is implemented using NS2 simulator. Here, the author focuses on the following parametric measures like - energy consumption, reliability and bandwidth. RC-MAC provides high bandwidth without decreasing energy efficiency. The results show that 0.12% of less energy consumption, reliability improved by 20.86% and bandwidth increased by 27.32% of RC-MAC compared with MAC IEEE 802.11.
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...INFOGAIN PUBLICATION
Energy potency could be a major demand in wireless sensing element networks. Media Access management is one in every of the key areas wherever energy potency is achieved by planning such MAC protocol that's tuned to the necessities of the sensing element networks. Applications have different necessities and one MAC protocol can't be best TDMA-based MAC (TDMAC) protocol that is specially designed for such applications that need periodic sensing of the sensing element field. TDMAC organizes nodes into clusters. Nodes send their knowledge to their cluster head (CH) and CHs forward it to the bottom station. CHs removed from the bottom station use multi-hop communication by forwarding their knowledge to CHs nearer than themselves to the bottom station each put down-cluster and intra-cluster communication is only TDMA-based that effectively eliminates each inter cluster further as intra-cluster interference.
In MANET, the mobiles nodes are connected dynamically with the help of wireless links without
having a fixed infrastructure or centralized administration. These nodes move freely and organize
themselves arbitrarily thus change the network topology rapidly and unpredictably. As a result, there exits
frequent link breakages which leads to path failures and route discoveries. The route discovery can lead to
overhead which cannot be neglected. Therefore, the fundamental challenge of MANET is to develop a
dynamic routing protocol that efficiently establish routes to deliver the packets with minimum overhead,
high throughput and low end to end delay. In order to handle overhead issues, the proposed system has
presented a novel scheme rebroadcast delay and a rebroadcast probability which will help to reduce the
number of retransmissions thereby improving routing performance. In addition, the proposed system is
compared with existing routing protocol AODV in terms of packet delivery ratio, packet loss and end to
end delay
Distributed Spatial Modulation based Cooperative Diversity Schemeijwmn
: In this paper, a distributed spatial modulation based cooperative diversity scheme for relay
wireless networks is proposed. Where, the space-time block code is exploited to integrate with distributed
spatial modulation. Therefore, the interested transmission scheme achieves high diversity gain. By using
Monte-Carlo simulation based on computer, we showed that our proposed transmission scheme outperforms
state-of-the-art cooperative relaying schemes in terms bit error rate (BER) performance.
A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. When designing mobile ad hoc networks, several interesting and difficult problems arise because of the shared nature of the wireless medium, limited transmission power (range) of wireless devices, node mobility, and battery limitations. This paper aims at providing a new schema to improve Dynamic Source Routing (DSR) Protocol. The aim
behind the proposed enhancement is to find the best route in acceptable time limit without having broadcast storm. Moreover, O-DSR enables network not only to overcome congestion but also maximize the lifetime of mobile nodes. Some simulations results show that the Route Request (RREQ) and the Control Packet Overhead decrease by 15% when O-DSR is used, consequently. Also the global energy consumption in O-DSR is lower until to 60 % , which leads to a long lifetime of the network.
PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...ijwmn
This paper analyzes the performance of cooperative amplify-and-forward (CAF) relay networks that employ both optimal power allocation among nodes based on relay position and adaptive M-QAM/M-PSK modulation in generalized fading environments. The paper develops a unified analytical framework using marginal moment generating functions to derive expressions for average bit error rate, mean achievable spectral efficiency, and outage probability over a range of fading distributions. It applies this framework to analyze CAF relay networks with adaptive modulation over Rice fading channels. The paper also employs an approximate moment generating function to further simplify computation complexity. Finally, it applies the framework to analyze the impact of optimal power allocation based on relay position.
Iaetsd game theory and auctions for cooperation inIaetsd Iaetsd
This document summarizes game theory and auction approaches for encouraging cooperation in wireless networks. It first discusses how cooperative communication can improve wireless capacity by exploiting antennas across devices. However, applying cooperation is challenging because nodes lack incentives to help. The document surveys existing game theoretic solutions for providing cooperation incentives. It outlines classification of games, concepts like Nash equilibrium, and how game theory has been applied in contexts like the relay dilemma game and Stackelberg game to model node interactions and identify stable cooperation strategies.
PRACTICAL PARTIAL DECODE AND FORWARD ENCODING SCHEME FOR RELAY CHANNELijwmn
In this paper, a source-destination pair, which is augmented by a half-duplex relay, is considered. Two
practical partial decode and forward encoding schemes are proposed. In these transmission schemes, the
relay may decode the source's signal either partially or completely. In each encoding technique, twophase transmission scheme is developed in which the relay can partially listen to the source in the first
phase until it can generate the source’s message and then, in the second phase, forward it to its destination.
By employing these transmission phases, the achievable rates are obtained . Rigorous numerical examples
are presented to i) show the value of power allocation between the source and the relay, and ii) optimize
the length of the listening phase.
Delay Constrained Energy Efficient Data Transmission over WSNpaperpublications3
Abstract: In wireless sensor network generally concentrate on minimization of energy Consumption, Also reducing energy saving and end to end delay. Reduced the end to end delay is one of the main challenges in the Wireless Sensor Networks. In TDMA providing reliable packet transmission and two transmission scheduling schemes are used to maximize the end-end reliability within a delay bound in packet transmission called dedicated scheduling and shared scheduling. In addition, they formulate solutions for implementing two algorithms into two basic routing algorithms, single-path routing and any-path routing algorithm. The proposed system presented energy efficient sleep scheduling algorithm for reducing the energy for delay constrained in WLAN. This algorithm to maximize the energy saving for packet delay constraints and it determines sleep period and wake up time to be minimized, the aim of this project is proposed to maximize the length of sleep time under packet deadline constraints using green call algorithm. Keywords: Delay-constrained applications, energy efficiency, Sleep scheduling, wireless sensor network.
Title: Delay Constrained Energy Efficient Data Transmission over WSN
Author: H. Hasina Begaum
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
This document analyzes the performance of various hypervisors (KVM, XEN, Hyper-V, ESXi) using RabbitMQ message broker server. The authors establish identical VM configurations on each hypervisor with 1 CPU and 1GB RAM. Using RabbitMQ, they stress test the hypervisors by sending a large number of messages between VMs. They measure performance metrics like message throughput, latency and queue length. The results show ESXi had the best performance for most tests, completing tasks significantly faster than other hypervisors. However, no single hypervisor outperformed the others on all tests, indicating workloads may be suited to different virtualization platforms.
This document summarizes a research paper that proposes a new technique called Morphology based technique for Extraction and Detection of blinking Region from gif Images. It begins by introducing the goal of detecting blinking parts in gif images and issues with existing techniques. It then describes the proposed methodology which uses edge detection, morphological operations like closing, and precision/recall metrics to evaluate the technique. The methodology is tested on sample gif images and results show high precision and recall rates, indicating the model is effective at extracting blinking regions.
This document discusses optimizing the gate-level area of digit-serial finite impulse response (FIR) filter designs using multiple constant multiplication (MCM) blocks. It introduces the problem of designing a digit-serial MCM operation with minimal area and presents algorithms to formalize the area optimization problem. Results show the proposed algorithms and digit-serial MCM architectures efficiently design digit-serial MCM operations and FIR filters with reduced area compared to existing approaches.
This document presents a study on the removal of chromium and cadmium from an aqueous solution using tea factory waste as an adsorbent. Batch adsorption experiments were conducted to determine the maximum adsorption capacity of tea factory waste for chromium and cadmium. The effects of agitation rate, adsorbent dose, and initial metal ion concentration on adsorption were evaluated. The maximum adsorption capacities observed were 24.88 mg/g for cadmium and 23.92 mg/g for chromium. The experimental data fitted well to the Langmuir and Freundlich isotherm models. Kinetic studies showed that the adsorption process followed pseudo-second order kinetics.
1. The document analyzes the failure of internal splines in the torsion shaft of a Garrett-5 engine due to continuous variable loading.
2. Two test pieces of the torsion shaft material were heat treated at different temperatures and liquid nitrided to increase hardness. One was treated at 540°C and the other at 580°C.
3. Analysis found that increasing the liquid nitriding duration from 1 hour to 1.5 hours and aging at 540°C, with liquid nitriding at 580°C, achieved the desired result of increasing the torsion shaft life to the required 3820 hours, avoiding premature failure.
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...IJERA Editor
Network Coding is most promising aspect of WSN. This Network Coding method is combined with multipath routing protocol to form NCMR protocol.(network coding based multipath routing protocol).This protocol is used to obtain energy efficient wireless sensor network.. These protocol leads to decrease the number of constrain routes & the total time of transmission. This protocol is applied on unicast and multicast network separately. And comparison is done with traditional multipath routing protocol for same unicast and multicast network. Simulation result shows energy consumption of NCMR multicast is lower than NCMR unicast and also than TMR unicast as well as multicast. This work is proved by the simulation analysis results. The used multipath model is based on braided multipath routing, and the network coding method is random linear network coding (practical network coding). In braided network multiple paths to the sink nodes are created for each source node, and the packets encoded at source nodes are transmitted through the braided multipath network model. Then, intermediate nodes re-encode these received packets and transfer these new packets to next cluster. Finally, the multiple sink nodes decode the packets received from different paths and recover the original data. Results of the analysis show that multicast NCMR provides more reliability. We compare multicast NCMR routing protocol with NCMR unicast & also with traditional multipath routing protocol for unicast and multicast networks, in terms of the packet loss, energy consumption, successful delivery ratio & end to end delay when a packet is transmitted Some special simulations are carried out specially for NCMR multicast i.e. effect of number of nodes on energy consumption, packet loss & end to end delay.
Clustering based Time Slot Assignment Protocol for Improving Performance in U...journal ijrtem
Recently, numerous approaches have been proposed for designing medium access control (MAC)
in underwater acoustic networks (UANs). Some of those works tried to adapt MAC protocols proposed for
terrestrial networks. However, unique environmental characteristics of UANs make the MAC protocols hard to be
used in the UANs and degrade network performance. In order to improve network performance, COD-TS MAC
protocol was proposed. COD-TS focuses on both single hop and multi-hop mode and utilizes CDMA for
exchanging schedule information between cluster heads. COD-TS has shortcomings such as collisions, additional
energy consumption by exchanging schedule information and near-far effect of CDMA. To overcome above
shortcomings, we propose a clustering-based time slot assignment protocol. In the proposed protocol, nodes are
clustered, and each cluster head performs two-hop neighbor cluster discovery operation. And then, a cluster head
obtains its own relative position information. Finally, the cluster head assigns its own time slot for data
transmission based on the information. Simulation results show that the proposed protocol has always better
performance compared to the COD-TS.
This document discusses a cooperative transmission protocol for wireless sensor networks. The protocol aims to improve energy efficiency and transmission reliability. It establishes cooperative clusters during data transmission where neighboring nodes help each other. The cluster head recruits nodes to assist in communication. The protocol is analyzed based on factors like capacity, end-to-end robustness to packet loss, and the tradeoff between energy consumption and error rate. Simulation results show the protocol increases transmission reliability and achieves a longer network lifetime compared to non-cooperative schemes.
1) LEACH is a hierarchical routing protocol for wireless sensor networks that aims to lower energy consumption by forming clusters of nodes and rotating cluster head roles among nodes.
2) The document discusses several enhancements made to the original LEACH protocol to improve network lifetime, throughput, and coverage area, including E-LEACH, EHE-LEACH, and multi-level LEACH.
3) Simulation results show that the enhanced protocols increase network lifetime by 40-49% compared to the original LEACH protocol.
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Eswar Publications
Ad hoc networks are collections of mobile nodes communicating with each other using wireless media without any fixed infrastructure. During both route discovery and traversal of route-reply packets from destination to source,
broadcast of packets is required which incurs huge message cost. The present article deals with the message cost
reduction during transmission of route-reply from destination to source. Also the redundancy that is visible within the 2-hop neighborhood of a node is minimized during broadcasting of route-reply. This improves the average lifetime of network nodes by decreasing the possibility of network partition. The scheme of 2NI can be used with any reactive routing protocol in MANETs.
An enhanced energy-efficient routing protocol for wireless sensor networkIJECEIAES
The document summarizes an enhanced energy-efficient routing protocol proposed for wireless sensor networks. The proposed protocol selects cluster heads based on current energy levels to avoid nodes with low energy from being selected. It also chooses a root cluster head with high residual energy and short distance to the sink to aggregate and transmit all cluster data. Simulations show the proposed protocol performs better than LEACH in increasing network lifetime by balancing energy consumption and extending stability periods.
New strategy to optimize the performance of spray and wait routing protocolijwmn
Delay Tolerant Networks have been (DTN) have been developed to support the irregular connectivity often
separate networks. The main routing problem in this type of network is embarrassed by time that is
extremely long, since connections are intermittent and opportunistic. Routing protocols must take into
account the maximum constraint encountered in this type of environment , use effective strategies
regarding the choice of relay nodes and buffer management nodes to improve the delivery of messages and
the time of their delivery . This article proposes a new strategy that optimizes the routing Spray and wait.
The proposed method uses the information contained in the messages delivered mostly paths traversed by
the messages before arriving at their destination and the time when nodes have receive these messages.
Simulation results show that the proposed strategy can increase the probability of delivery and minimizing
overhead unlike FIFO technology used with the default routing ' sprat and wait'
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
At present day’s wireless sensor networks, obtain a lot consideration to researchers. Maximum number of sensor nodes are scattered that can communicate with all others. Reliable data communication and energy consumption are the mainly significant parameters that are required in wireless sensor networks. Many of MAC protocols have been planned to improve the efficiency more by enhancing the throughput and energy consumption. The majority of the presented medium access control protocols to only make available, reliable data delivery or energy efficiency does not offer together at the same time. In this research work the author proposes a novel approach based on Receiver Centric-MAC is implemented using NS2 simulator. Here, the author focuses on the following parametric measures like - energy consumption, reliability and bandwidth. RC-MAC provides high bandwidth without decreasing energy efficiency. The results show that 0.12% of less energy consumption, reliability improved by 20.86% and bandwidth increased by 27.32% of RC-MAC compared with MAC IEEE 802.11.
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...INFOGAIN PUBLICATION
Energy potency could be a major demand in wireless sensing element networks. Media Access management is one in every of the key areas wherever energy potency is achieved by planning such MAC protocol that's tuned to the necessities of the sensing element networks. Applications have different necessities and one MAC protocol can't be best TDMA-based MAC (TDMAC) protocol that is specially designed for such applications that need periodic sensing of the sensing element field. TDMAC organizes nodes into clusters. Nodes send their knowledge to their cluster head (CH) and CHs forward it to the bottom station. CHs removed from the bottom station use multi-hop communication by forwarding their knowledge to CHs nearer than themselves to the bottom station each put down-cluster and intra-cluster communication is only TDMA-based that effectively eliminates each inter cluster further as intra-cluster interference.
In MANET, the mobiles nodes are connected dynamically with the help of wireless links without
having a fixed infrastructure or centralized administration. These nodes move freely and organize
themselves arbitrarily thus change the network topology rapidly and unpredictably. As a result, there exits
frequent link breakages which leads to path failures and route discoveries. The route discovery can lead to
overhead which cannot be neglected. Therefore, the fundamental challenge of MANET is to develop a
dynamic routing protocol that efficiently establish routes to deliver the packets with minimum overhead,
high throughput and low end to end delay. In order to handle overhead issues, the proposed system has
presented a novel scheme rebroadcast delay and a rebroadcast probability which will help to reduce the
number of retransmissions thereby improving routing performance. In addition, the proposed system is
compared with existing routing protocol AODV in terms of packet delivery ratio, packet loss and end to
end delay
Distributed Spatial Modulation based Cooperative Diversity Schemeijwmn
: In this paper, a distributed spatial modulation based cooperative diversity scheme for relay
wireless networks is proposed. Where, the space-time block code is exploited to integrate with distributed
spatial modulation. Therefore, the interested transmission scheme achieves high diversity gain. By using
Monte-Carlo simulation based on computer, we showed that our proposed transmission scheme outperforms
state-of-the-art cooperative relaying schemes in terms bit error rate (BER) performance.
A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. When designing mobile ad hoc networks, several interesting and difficult problems arise because of the shared nature of the wireless medium, limited transmission power (range) of wireless devices, node mobility, and battery limitations. This paper aims at providing a new schema to improve Dynamic Source Routing (DSR) Protocol. The aim
behind the proposed enhancement is to find the best route in acceptable time limit without having broadcast storm. Moreover, O-DSR enables network not only to overcome congestion but also maximize the lifetime of mobile nodes. Some simulations results show that the Route Request (RREQ) and the Control Packet Overhead decrease by 15% when O-DSR is used, consequently. Also the global energy consumption in O-DSR is lower until to 60 % , which leads to a long lifetime of the network.
PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...ijwmn
This paper analyzes the performance of cooperative amplify-and-forward (CAF) relay networks that employ both optimal power allocation among nodes based on relay position and adaptive M-QAM/M-PSK modulation in generalized fading environments. The paper develops a unified analytical framework using marginal moment generating functions to derive expressions for average bit error rate, mean achievable spectral efficiency, and outage probability over a range of fading distributions. It applies this framework to analyze CAF relay networks with adaptive modulation over Rice fading channels. The paper also employs an approximate moment generating function to further simplify computation complexity. Finally, it applies the framework to analyze the impact of optimal power allocation based on relay position.
Iaetsd game theory and auctions for cooperation inIaetsd Iaetsd
This document summarizes game theory and auction approaches for encouraging cooperation in wireless networks. It first discusses how cooperative communication can improve wireless capacity by exploiting antennas across devices. However, applying cooperation is challenging because nodes lack incentives to help. The document surveys existing game theoretic solutions for providing cooperation incentives. It outlines classification of games, concepts like Nash equilibrium, and how game theory has been applied in contexts like the relay dilemma game and Stackelberg game to model node interactions and identify stable cooperation strategies.
PRACTICAL PARTIAL DECODE AND FORWARD ENCODING SCHEME FOR RELAY CHANNELijwmn
In this paper, a source-destination pair, which is augmented by a half-duplex relay, is considered. Two
practical partial decode and forward encoding schemes are proposed. In these transmission schemes, the
relay may decode the source's signal either partially or completely. In each encoding technique, twophase transmission scheme is developed in which the relay can partially listen to the source in the first
phase until it can generate the source’s message and then, in the second phase, forward it to its destination.
By employing these transmission phases, the achievable rates are obtained . Rigorous numerical examples
are presented to i) show the value of power allocation between the source and the relay, and ii) optimize
the length of the listening phase.
Delay Constrained Energy Efficient Data Transmission over WSNpaperpublications3
Abstract: In wireless sensor network generally concentrate on minimization of energy Consumption, Also reducing energy saving and end to end delay. Reduced the end to end delay is one of the main challenges in the Wireless Sensor Networks. In TDMA providing reliable packet transmission and two transmission scheduling schemes are used to maximize the end-end reliability within a delay bound in packet transmission called dedicated scheduling and shared scheduling. In addition, they formulate solutions for implementing two algorithms into two basic routing algorithms, single-path routing and any-path routing algorithm. The proposed system presented energy efficient sleep scheduling algorithm for reducing the energy for delay constrained in WLAN. This algorithm to maximize the energy saving for packet delay constraints and it determines sleep period and wake up time to be minimized, the aim of this project is proposed to maximize the length of sleep time under packet deadline constraints using green call algorithm. Keywords: Delay-constrained applications, energy efficiency, Sleep scheduling, wireless sensor network.
Title: Delay Constrained Energy Efficient Data Transmission over WSN
Author: H. Hasina Begaum
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
This document analyzes the performance of various hypervisors (KVM, XEN, Hyper-V, ESXi) using RabbitMQ message broker server. The authors establish identical VM configurations on each hypervisor with 1 CPU and 1GB RAM. Using RabbitMQ, they stress test the hypervisors by sending a large number of messages between VMs. They measure performance metrics like message throughput, latency and queue length. The results show ESXi had the best performance for most tests, completing tasks significantly faster than other hypervisors. However, no single hypervisor outperformed the others on all tests, indicating workloads may be suited to different virtualization platforms.
This document summarizes a research paper that proposes a new technique called Morphology based technique for Extraction and Detection of blinking Region from gif Images. It begins by introducing the goal of detecting blinking parts in gif images and issues with existing techniques. It then describes the proposed methodology which uses edge detection, morphological operations like closing, and precision/recall metrics to evaluate the technique. The methodology is tested on sample gif images and results show high precision and recall rates, indicating the model is effective at extracting blinking regions.
This document discusses optimizing the gate-level area of digit-serial finite impulse response (FIR) filter designs using multiple constant multiplication (MCM) blocks. It introduces the problem of designing a digit-serial MCM operation with minimal area and presents algorithms to formalize the area optimization problem. Results show the proposed algorithms and digit-serial MCM architectures efficiently design digit-serial MCM operations and FIR filters with reduced area compared to existing approaches.
This document presents a study on the removal of chromium and cadmium from an aqueous solution using tea factory waste as an adsorbent. Batch adsorption experiments were conducted to determine the maximum adsorption capacity of tea factory waste for chromium and cadmium. The effects of agitation rate, adsorbent dose, and initial metal ion concentration on adsorption were evaluated. The maximum adsorption capacities observed were 24.88 mg/g for cadmium and 23.92 mg/g for chromium. The experimental data fitted well to the Langmuir and Freundlich isotherm models. Kinetic studies showed that the adsorption process followed pseudo-second order kinetics.
1. The document analyzes the failure of internal splines in the torsion shaft of a Garrett-5 engine due to continuous variable loading.
2. Two test pieces of the torsion shaft material were heat treated at different temperatures and liquid nitrided to increase hardness. One was treated at 540°C and the other at 580°C.
3. Analysis found that increasing the liquid nitriding duration from 1 hour to 1.5 hours and aging at 540°C, with liquid nitriding at 580°C, achieved the desired result of increasing the torsion shaft life to the required 3820 hours, avoiding premature failure.
The document defines several concepts related to domination in fuzzy graphs, including inverse split domination, non-split domination, and their bounds. It presents definitions for terms like dominating set, split dominating set, inverse dominating set, and establishes bounds on various domination numbers. Several theorems are provided with proofs, including that the inverse split domination number of a fuzzy tree is equal to its domination number, and that the inverse non-split domination number of a fuzzy graph is at most its minimum degree minus one. Coedge split and non-split domination in fuzzy graphs are also defined and properties presented.
This document summarizes an experimental investigation on the performance of a diesel engine using methyl esters of linseed oil (LSOME) and neem oil (NOME) as biofuels. Tests were conducted on a single cylinder, water cooled diesel engine at a constant speed of 1500 rpm using blends of LSOME and NOME with diesel (B10 and B20). Results show that the brake specific fuel consumption and indicated specific fuel consumption decreased for the biofuel blends compared to diesel. The brake thermal efficiency increased for the biofuel blends, with B20 showing equal efficiency to diesel. It was concluded that the biofuel blends derived from linseed and neem oils can be used as sustainable alternatives to
1) The document discusses the electromagnetic field analysis of different rotor slot configurations in a single-phase capacitor-run induction motor using a composite rotor conductor made of aluminum and copper sub-conductors.
2) Four models are simulated using the Finite Element Method Magnetics (FEMM) software: a base model and three models with different rotor slot geometries.
3) The simulation results show that Model III has the most sinusoidal flux distribution and the highest efficiency of 83.75%, indicating it is the optimal design configuration among those analyzed.
Study of Buckling Restrained Braces in Steel Frame BuildingIJERA Editor
Conventional braces have limited deformation ductility capacity, and exhibit unsymmetrical hysteretic cycles, with marked strength deterioration when loaded in compression. To overcome the above mentioned problems, a new type of brace was developed in Japan called as buckling restrained braces, designated as BRB’s. These braces are designed such that buckling is inhibited to occur, exhibiting adequate behavior and symmetrical hysteretic curves under the action of both tensile and compressive cycles, produced by the action of seismic and wind forces. This paper presents experimental results concerning the lateral load carrying capacity of steel frame model by use of buckling restrained brace. This paper also includes the comparative study of lateral load carrying capacity of frame model for bare frame, frame with Conventional brace and frame with buckling restrained brace.
This document summarizes a study that experimentally evaluated adopting a Local Packing Distributed Dynamic Channel Allocation (LP-DDCA) strategy for the Al-Madar Telephone Telecommunication Network in Libya. The study applied actual network data in a simulation to compare LP-DDCA to the currently used Fixed Channel Allocation (FCA) strategy. The results showed that LP-DDCA can substantially improve network performance by minimizing call blocking probability and increasing the number of subscribers compared to FCA. Adopting LP-DDCA was concluded to give significant improvements to Al-Madar's network capacity.
This document describes a study comparing the performance of two eddy current sensor coil designs - a rectangular cross-section coil and a tilted cross-section coil - for non-destructive testing of conductive materials. Finite element modeling was used to simulate the magnetic flux density, eddy currents, and impedance changes detected by the coils in the presence of cracks in a test specimen. The simulations showed that the tilted coil design produced stronger magnetic fields near cracks, higher eddy current densities, and larger impedance changes compared to the rectangular coil. This indicates the tilted coil design may provide better sensitivity for crack detection in non-destructive testing applications.
This document summarizes a research paper that analyzed social subgroups and community structure on social networking websites. The paper used the NodeXL tool to analyze Twitter data and identify the most influential group discussing "foreign affairs". It found that 232 users tweeted about foreign affairs, forming 30 groups. The largest group had 71 users and 93 unique connections. Network analysis metrics like in-degree, betweenness centrality, and eigenvector centrality identified the most influential users within the network discussing foreign affairs. This analysis can help organizations understand influential users and groups discussing certain topics on social media.
This document proposes a new algorithm called Local Tetra Pattern (LTrP) for content-based image retrieval. LTrP encodes images in four directions instead of two directions used in other local pattern algorithms like LBP, LDP, and LTP. LTrP extracts texture features in four directions and magnitude from images. It represents each center pixel with a 12-bit or 13-bit code based on the pixel values in the four directions. Histograms of these codes are then used as feature vectors to retrieve similar images from a database. The paper argues that encoding images in four directions provides more discriminative texture information than two directions, improving content-based image retrieval performance.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The document describes a new cooperative media access control (MAC) protocol called Power Unbiased Cooperative MAC (PUC-MAC) for mobile ad hoc networks (MANETs). PUC-MAC aims to improve network performance by selecting the best cooperative node based on channel condition, transmission rate, and balanced power consumption. It compares PUC-MAC to existing cooperative MAC protocols and describes PUC-MAC's cooperative node selection algorithm and protocol operation in more detail. Simulation results show PUC-MAC outperforms other protocols in terms of throughput, network performance, and lifetime under different channel noise levels, especially in poor channel conditions.
M-EPAR to Improve the Quality of the MANETsIJERA Editor
In MANET, power aware is important challenge issue to improve the communication energy efficiency at individual nodes. We propose modified efficient power aware routing (M-EPAR), a new power aware routing protocol that increases the network lifetime of MANET. Designing a power aware routing algorithm or technique is one of the most important point considered in Mobile Ad Hoc Networks. These nodes are driven by reactive protocols where broadcasting is mandatory to form a path between two nodes. So in case of death of the node resulting out of less battery calls for re-routing. Since many existing techniques focuses on energy aware routing this paper presents combination of energy aware routing merged with link quality determined by packet drop rate. The proposed scheme has outperformed the existing technique in terms of packet delivery ratio, throughput and energy consumption.
The document summarizes and compares several MAC layer synchronization protocols for wireless sensor networks, including IEEE 802.11, IEEE 802.15.4, S-MAC, T-MAC, and OB-MAC. It describes the operation and key features of each protocol, such as sleep schedules, synchronization techniques, and handling of channel contention. Simulation results using the NS2 simulator show that OB-MAC has the lowest energy consumption compared to the other protocols. The document concludes that all WSN MAC protocols are designed for energy efficiency and proposes further analyzing OB-MAC and collision handling through a hardware testbed implementation.
This document discusses an enhancement to the S-MAC protocol called Enhanced S-MAC. S-MAC is a MAC protocol for wireless sensor networks that aims to improve power efficiency. Enhanced S-MAC further improves power efficiency by allowing nodes to adaptively turn their receivers on and off based on traffic load. It also addresses issues with clock synchronization and overhearing in the original S-MAC protocol. The document outlines related work on MAC protocols, problems encountered with implementing S-MAC, and how Enhanced S-MAC addresses these issues through adaptive listening modes and an improved synchronization protocol. It proposes to simulate Enhanced S-MAC to demonstrate improved power efficiency over standard S-MAC.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
A Literature Survey on Energy Efficient MAC Protocols For WSNIRJET Journal
This document summarizes several energy efficient MAC protocols for wireless sensor networks. It begins with an introduction to the importance of energy efficiency in wireless sensor networks due to limited battery power. Several causes of energy wastage in wireless sensor networks are then described, including collided packets, overhearing, control packet overhead, idle listening, and over emitting. The document then reviews eight different energy efficient MAC protocols that have been proposed to address these issues, including SMAC, TMAC, TEEM, μ-MAC, DEE-MAC, MR-MAC, Z-MAC, and AMAC. It concludes that various MAC protocols have been developed to efficiently manage energy usage in wireless sensor networks.
Comparison of Csma Based MAC Protocols of Wireless Sensor Networkspijans
This document compares several CSMA-based MAC protocols for wireless sensor networks: S-MAC, T-MAC, B-MAC, B-MAC+, X-MAC, and D-MAC. It implements these protocols in TOSSIM simulator and evaluates their energy consumption and performance under different traffic loads. The key findings are that T-MAC consumes less energy than S-MAC due to its adaptive timeout, while B-MAC+ and X-MAC improve over B-MAC by reducing long preambles. D-MAC aims for low-latency data delivery using a staggered wakeup schedule but does not perform well under high traffic.
Improving the network lifetime of mane ts through cooperative mac protocol de...Pvrtechnologies Nellore
The document proposes a novel cooperative MAC (CMAC) protocol called DEL-CMAC for improving the network lifetime of mobile ad hoc networks (MANETs). DEL-CMAC incorporates a distributed utility-based best relay selection strategy based on location information and residual energy. It also includes a cross-layer optimal transmitting power allocation scheme to conserve energy while maintaining throughput. Additionally, it provides an innovative network allocation vector setting to deal with interference from varying transmitting powers during cooperation. Simulation results show DEL-CMAC significantly prolongs network lifetime under different scenarios compared to the IEEE 802.11 standard and other throughput-focused CMAC protocols.
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...IJCNCJournal
Medium Access control (MAC) is one of the fundamental problems in wireless sensor networks. The performance of wireless sensor network depends on it. The main objective of a medium access control method is to provide high throughput, minimize the delay, and conservers the energy consumption by avoiding the collisions. In this paper, a general model for MAC protocol to reduce the delay, maximize throughput and conserve the energy consumption in channel accessing in high density randomly distributed wireless sensor network is presented. The proposed model is simulated using MATLAB. The simulation results show that the average delay for sensors with sufficient memory is lower than sensors without
memory. Further, the throughput of the channel access method with memory is better than without memory.
Implementation of optimal solution for network lifetime and energy consumptio...TELKOMNIKA JOURNAL
This document summarizes a research paper that proposes an improved energy efficient LEACH (IEE-LEACH) routing protocol for mobile ad hoc networks (MANETs). The paper discusses how the LEACH protocol randomly selects cluster heads, which can lead to uneven energy distributions. The proposed IEE-LEACH protocol selects cluster heads based on remaining node energy and a cost function to balance energy usage and improve network lifetime. Simulation results show the IEE-LEACH protocol achieves higher packet delivery ratios, lower end-to-end delays, and prolongs network lifetime compared to the standard LEACH protocol.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes a research paper that proposes an enhanced cross-layer protocol (ECLP) for wireless sensor networks. ECLP integrates medium access control and routing to improve energy efficiency and reduce latency. It uses an adaptive duty cycling scheme with adaptive timeouts and reservation requests. It also designs a tree-based energy-aware routing algorithm to prolong the network lifetime while minimizing control overhead for data delivery. Simulation results show ECLP outperforms other existing algorithms in terms of energy efficiency and latency.
Distributed Utility-Based Energy Efficient Cooperative Medium Access Control...IJMER
Cooperative communication, that utilizes near terminals to relay the overhearing
information to grasp the variability gains, choices a nice potential to strengthen the transmission
potency in wireless networks. to the subsume the hard medium access interactions evoked by relaying
and leverage the advantages of such cooperation, associate economical Cooperative Medium Access
management (CMAC) protocol is required. throughout this paper, we've got an inclination to tend to
propose a completely unique cross-layer Wide unfold Energy-adaptive Location-based CMAC
protocol, notably WEAL-CMAC, for Mobile Ad-hoc Networks (MANETs). the design objective of
WEAL-CMAC is to strengthen the performance of the MANETs in terms of network amount and
energy potency. a wise energy consumption model is used throughout this paper, that takes the energy
consumption on each transceiver instrumentation and transmit instrumentation into thought. A
distributed utility-based best relay different strategy is incorporated, that selects the most effective
relay supported location information and residual energy. moreover, with the aim of enhancing the
spacial apply, associate innovative network allocation vector setting is provided to the subsume the
variable transmission power of the beginning and relay terminals. we've got an inclination to tend to
point that the planned WEAL-CMAC considerably prolongs the network amount below varied
circumstances even for prime instrumentation energy consumption cases by comprehensive simulation
study
IRJET- An Efficient Cross-Layer Cooperative Diversity Optimization Scheme Tog...IRJET Journal
The document summarizes a research paper that proposes an efficient cross-layer cooperative diversity optimization scheme called CCDRA+DEL-CMAC to maximize network lifetime and energy efficiency in mobile ad hoc networks (MANETs). The proposed scheme considers relay selection, routing, and power allocation strategies to meet reliability constraints in MANETs. Simulation results show the cross-layer cooperative strategies significantly prolong network lifetime and achieve energy savings compared to other approaches.
The document discusses Time Division Multiple Access (TDMA) in clustered wireless networks. It proposes a solution to optimize TDMA scheduling that can achieve high power efficiency, zero conflict, and reduced end-to-end delay. A cross-layer optimization model is developed to minimize energy consumption and derive optimal flows on each link. Then an algorithm is presented to obtain TDMA schedules with the minimum frame length based on the optimal flows, guaranteeing minimum delay. Numerical results show the proposed approach significantly reduces energy consumption and delay compared to existing solutions.
Energy-efficient MAC protocols for wireless sensor networks: a surveyTELKOMNIKA JOURNAL
MAC Protocols enables sensor nodes of the same WSN to access a common shared
communication channel. Many researchers have proposed different solutions explaining how to design and
implement these protocols. The main goal of most MACs protocols is how to prolong lifetime of the WSN
as long as possible by reducing energy consumption since it is often impossible to change or to recharge
sensors’ batteries. The majority of these protocols designed for WSN are based on “duty-cycle” technique.
Every node of the WSN operates on two periods: active period and sleep period to save energy. Until now
(to our knowledge) there is no ideal protocol for this purpose. The main reason relies on the lack of
standardization at lower layers (physical layer) and (physical) sensor hardware. Therefore, the MAC
protocol choice remains application-dependent. A useful MAC protocol should be able to adapt to network
changes (topology, nodes density and network size). This paper surveys MAC protocols for WSNs and
discusses the main characteristics, advantages and disadvantages of currently popular protocols.
This document provides a progress report on research being conducted on energy management in wireless sensor networks using a modified MAC protocol. The report details work done so far, including modeling MAC protocols in OMNeT++, simulation results comparing BMAC, LMAC, and XMAC, and ongoing work to avoid collisions during packet transmission to improve energy efficiency. Future work includes further optimizing the modified MAC protocol and publishing results in peer-reviewed journals.
Survey on energy efficiency in wireless sensor network using mac protocol wit...Editor Jacotech
Dynamic feature evaluation and concept evaluation is major challenging task in the field of data classification. The continuity of data induced a new feature during classification process, but the classification process is predefined task for assigning data into class. Data comes into multiple feature sub-set format into infinite length. The infinite length not decided the how many class are assigned. Support vector machine is well recognized method for data classification. For the process of support vector machine evaluation of new feature during classification is major problem. The problem of feature evaluation decreases the performance of Support Vector Machine (SVM). For the improvement of support vector machine, particle of swarm optimization technique is used. Particle of swarm optimization controls the dynamic feature evaluation process and decreases the possibility of confusion in selection of class and increase the classification ratio of support vector machine. Particle of swarm optimization work in two phases one used as dynamic population selection and another are used for optimization process of evolved new feature.
This document compares the TDMA and CSMA access techniques for a linear topology of sensor nodes. It first provides background on wireless sensor networks and discusses applications that use a fixed chain topology. It then explains that TDMA is generally more suitable than CSMA for a linear chain topology with a large number of nodes, periodic traffic, and relatively high traffic. The document reviews several existing MAC protocols designed for chain topologies and discusses their advantages and disadvantages. It focuses on comparing the throughput and delay of nodes in a linear topology using TDMA versus CSMA.
1. Darshan A. M et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 6( Version 5), June 2014, pp.45-49
www.ijera.com 45 | P a g e
Higher Throughput and Energy Efficiency Multi-Channel MAC Protocol For Ad Hoc Network. Ms. Suhasini E. R, Darshan A. M Assistant professor Department of ECE, the Oxford College of Engineering Bommanahalli M. tech 2nd year Department of ECE, the Oxford College of Engineering Bommanahalli ABSTRACT
Traditional single-channel MAC protocols for wireless adhoc and sensor networks favor energy efficiency over throughput. More recent multi-channel MAC protocols display higher throughput but less energy efficiency. In this paper we propose EMAC, a negotiator-based multi-channel MAC protocol in which specially designated nodes maintain the sleeping and communication schedules of nodes. Negotiators facilitate the assignation of channels and coordination of communications windows, thus allowing individual nodes to sleep and save energy. Simulation results show that EMAC, at high network loads consumes less energy while providing more throughput than comparable state- of-art multi-channel MAC protocols for ad hoc networks.
I. INTRODUCTION
Traditional MAC protocols for wireless ad hoc and sensor networks restrict themselves to a single frequency using variety of techniques to optimize throughput. Typically designed to work well under low network load, they also attempt to maximize energy efficiency focused attention on multi-channel MAC protocols designed to work efficiently under higher network loads. Although higher throughput has been achieved, this improvement has come at the cost of decreased energy performance, when compared with single channel MAC protocols. An important factor preventing multi-channel MAC protocols from achieving high energy savings is the synchronization required for communication over multiple channels. Dense wireless networks exacerbate the issue by complicating the schedule of channels on which a node can communicate with its neighbors. Existing research has proposed several ways to maintain schedule information. Some protocols assign predictable static schedules and channels and propagate this information to all nodes in the network. However, static assignments underutilize bandwidth and prevent the network from achieving high aggregate throughput. Other protocols use a common contention-based control period" where nodes communicate pairwise on a single channel to coordinate their schedules. This common negotiation period wastes energy when traffic is light, as all nodes must be awake during this period. To meet the dual, and often opposing, goals of improved throughput and reduced energy consumption, EMAC does not adopt direct pairwise negotiation. Instead, EMAC designates a set of negotiators who maintain the schedules of all nodes in the network and assist with channel negotiation. In EMAC, when a sender has packets for a receiver, it requests assistance from
a negotiator. Because the negotiator is aware of all communications schedules in its neighborhood, it can assign a time and a channel for the sender to communicate with the receiver. This minimizes the time a receiver stays awake waiting for potential transmissions, thus resulting in higher energy efficiency. It also reduces non-negotiator storage requirements because schedule information is only exchanged between nodes and their negotiators, and not among all neighbors. The main contributions of our work are: 1. A communications negotiator that is responsible for synchronizing senders and receivers on a channel and a time when they can communicate. 2. A multi-channel MAC protocol applicable to both wireless ad hoc and sensor networks with minor modifications. 3. Extensive simulations evaluating the proposed multichannel MAC protocol and showing that it output performs state-of-art multi-channel MAC protocols by achieving significant energy savings and improved throughput.
II. RELATED WORK
A significant number of multi-channel MAC protocols have been proposed for wireless ad hoc networks [5] [8] [10]. Some require special hardware [15], such as the use of multiple radio transceivers to listen to multiple frequencies at the same time. Others, e.g., TMMAC [19] and MMAC [11], are based on the IEEE 802.11 Distributed Coordination Function (DCF) and use control messages for channel negotiations. SSCH [2] uses pseudo random number generators to help with the allocations of frequencies and channel switching. TDMA-based MAC protocols in ad hoc networks have been primarily designed to provide collision-free access to a single channel [3].
RESEARCH ARTICLE OPEN ACCESS
2. Darshan A. M et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 6( Version 5), June 2014, pp.45-49
www.ijera.com 46 | P a g e
In wireless sensor networks, the energy efficiency of MAC protocols has received significant research focus. Single channel protocols [12] [11] [4] [6] use low power listening and sleep schedules to save energy. High traffic loads, due to either application semantics or the sink-oriented topology common in wireless sensor networks, poses additional challenges. To address this issue [12] [1] use a hybrid CSMA/TDMA approach. While single channel MAC protocols have better energy consumption, research has demonstrated that multi- channel protocols can achieve higher throughput. Several multi-channel MAC protocols for wireless sensor networks have been recently proposed. One proposed direction is to have static channel and slot assignments. In [12], a node is assigned a fixed frequency for reception, potentially limiting channel utilization, while [8] proposes that the entire schedule be static. A multi-channel MAC protocol specifically designed for dense sensor networks is proposed in [9]. Al-though implemented on real hardware, it is not evaluated in a highly dense network. EMAC is different from these two protocols because it does not require nodes with special capabilities and be-cause the sleep schedules of non-negotiator nodes allow for aggressive energy savings.
III. EMAC DESIGN
The main idea of our multi-channel MAC protocol is the use of special nodes, called negotiators,that schedule traffic for neighbor nodes. This is fueled by a desire to minimize the principle sources of energy consumption in a wireless network: overhearing, communication, idling and collisions. EMAC trades of increased energy consumption by the negotiator node for energy savings on all non- negotiators. The energy savings are derived from reduced overhearing and collisions, and reduced duty-cycles allowed by longer sleep NMAC Negotiator Algorithm:
1: Broadcast HELLO messages. Build Neighbor Table (Nbr Tbl) based on HELLO messages heard.
2: Set MyTimer according to Equation 1
3: while (MyTimer not expired) do
4: if (Received Nbr Tbl from New Negotiator) then
5: Adjust MyTimer according to Equation 1
6: Set my neighbors (in received Nbr Tbl) as covered
7: end if
8: end while
9: if (I have uncovered neighbors) then
10: Declare myself as negotiator
11: Broadcast my Nbr Tbl
12: end if
3.1 Negotiator Election
The negotiator election algorithm, presented in Algorithm , is executed by all nodes during network initializations and has two phases. In the first phase, represented by line 1 in Algorithm 1, each node builds a neighbor table. In the second phase, lines 2- 12, each node sets a timer, at the end of which, it will declare itself as a negotiator. The timer value is inverse to the number of neighbors uncovered by negotiators and to its residual energy. It is formally given by. T= ((Nmax - Nunc) *tc + rand(t)) * (1 – E / Emax)) (1) where Nmax is a global estimate for the maximum number of neighbors a node can have, Nunc is the number of neighbors for which the node does not have a negotiator, tc is a global time constant, rand(t) is a random number between 0 and tc, and E and Emax are the nodes's current and initial energy levels, respectively. When the timer expires, a node announces itself as a negotiator and broadcasts its neighbor table. The neighbors that receive this announcement, update their negotiator in-formation, recalculate the number of neighbors uncovered (i.e., nodes that are not neighbors of the negotiator) and adjust their timers accordingly. Because the negotiator needs to be available on the de-fault channel at all times, a design decision we made was that a negotiator does not route traffic (routing traffc would entail switching channels). Consequently, the network connectivity is affected. To better understand the impact of our design decision, in the remaining part of this section we provide the analysis for the effect negotiators have on the degree of network connectivity. Assuming that n nodes are uniformly distributed within one radio range and that N negotiators are being elected, the total number of connected links is given by: (n-N)(n-N-1)/2 the number of lost links Lt (from a total of n(n - 1)=2) due to the negotiator election is: ( )Lt = (2n-1-N)N/2 (2) If pn = N/n is the percentage of negotiators in the net- work, the total number of lost links becomes: Lt=npn(2n-1-npn) / 2 (3) Consequently, the percentage of lost links in the network is: PLt= pn(2n-1-npn) / (n-1) (4) =2pn - pn2 since n>>1 (5)
This result indicates that a small decrease in the percentage of negotiators (pn) has a significant impact on the number of links that can be used for
3. Darshan A. M et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 6( Version 5), June 2014, pp.45-49
www.ijera.com 47 | P a g e
routing traffic. Consequently, one goal of our
negotiator election algorithm is to produce as small a
set of negotiators, as possible. It is important to
mention that the negotiator election algorithm runs
periodically to enable negotiator rotation, and better
distribution of energy consumption.
This result indicates that a small decrease in the
percentage of negotiators (pn) has a significant
impact on the number of links that can be used for
routing traffic. Consequently, one goal of our
negotiator election algorithm is to produce as small a
set of negotiators as possible.
3.2 Frame Architecture
EMAC is a TDMA-based multi-channel MAC
protocol, thus we assume the presence of a time
synchronization scheme. The frame structure, as well
as the messages ex-changed, is depicted in Figure 2.
Time is divided into Bea-con Intervals which are
further divided into time slots. A set of three time
slots forms a Group. Intuitively, the grouping of three
slots is due to the distinct types of messages that need
to be exchanged: the request from a sender to the
negotiator, the request from the negotiator to the
receiver (done in the second slot of a group) and the
acknowledgement from the negotiator to the sender
(done in the third slot of a group). All of these
messages are sent over the default channel in a
contention-based manner. Each node keeps a
schedule of its projected activity for each time slot,
sleeping or communicating, and the channel to use. A
negotiator maintains a copy the schedules for every
node it covers.
EMAC supports both broadcast and unicast.
Broad-cast can only be sent in the rst slot of a Beacon
Interval, a time when all nodes are on the default
channel. For unicast, communication is only possible
after negotiation. An explanation of the negotiation
process in EMAC follows.
Figure1: Time slot and channel negotiation in
EMAC. Protocol signaling and data
communication are indicated by vertical arrows.
Horizontal blue line indicates when nodes are in
sleep
3.3 Negotiation for Unicast
When a sender has unicast packets, a three step
process is followed.
First, the sender sends a request (Request Made
in Figure 2) to the negotiator in charge of the link
between it and the receiver. This request can only be
made on the default channel during the rst slot of a
group. The request from the sender contains the
number of packets and the destination. The negotiator
examines the schedule of the receiver and replies to
the sender with an acknowledgement (Wait in Figure
1), containing the time slot when the sender should
expect a confirmation/decision (Notification to
Sender" in Figure 1). After the transmission of the
request packet, the sender starts a timer to wait for
the acknowledgement. If the timer expires before
receiving a reply, the sender reschedules the request
packet.
Second, the negotiator examines the schedules of
the sender, receiver, and nodes within one hop of
either and assigns time slots and channels for the
potential communication. The negotiator nodes
available slots of the receiver and chooses a random
channel from all available channels .This decision
(slots labeled as Recv" in Figure 2 and channel) is
sent to the receiver as a notification packet
(Notification to Receiver" in Figure 1). The Recv
request is sent by the negotiator during a time slot
when the receiver is awake using the receiver's
frequency. Upon receiving this notification, the
receiver checks its own schedule to see if there are
conflicts between the requested tuple (slots and
channel) and its own schedule. If there are no
conflicts, the receiver sends a confirmation packet to
the negotiator (Conf paired with Recv in Figure 1).
Other negotiators in the neighborhood overhear this
confirmation and use it to update their schedules for
the receiver.
Third, the negotiator notifies the sender of this
decision (in the slot already scheduled with the
sender in step 1) as depicted in Notification to Sender
in Figure 1. The sender updates its schedule
according to this decision and sends a confirmation to
the negotiator as well. All other negotiators in the
neighborhood overhear this confirmation and update
their schedules for the sender.
3.4 Sleeping Schedule
One key issue that EMAC addresses is energy
consumption. This is accomplished by having non-negotiator
nodes operate in a duty-cycle that varies
depending on the traffic in the network. Nodes are
only awake in four different cases: a) a node is awake
during the first time slot of a Beacon Interval. This
accommodates broadcast communication; b) a node
is awake during the first slot of a group (including the
first slot of a Beacon Interval) if it has a request to
send to a negotiator, or it has data to send/receive; c)
4. Darshan A. M et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 6( Version 5), June 2014, pp.45-49
www.ijera.com 48 | P a g e
a node is awake during the third slot of a group if it expects an acknowledgement from a negotiator for a previous request or if it sends/receives data; d) a node is awake during the second slot of a group if it has data to send/receive or, or if it expects notification from a negotiator. A receiver infers its potential traffic load based on recent historical data. If the load is heavy, it stays awake during every second slot of a group to wait for notification; if the load is light, it wakes up occasionally (based on the degree of the load) during the second slot of a group and the negotiator has the knowledge of its schedule. As an example, Figure 1 depicts with horizontal bars the time slots when different nodes are asleep. As shown, negotiators do not duty-cycle. In the example shown, the sender informs the negotiator during slot 1 of its desire to send three packets to the receiver. The negotiator tells the sender to be awake at slot 6 to possibly receive an acknowledgement. In this example, the sender does not expect packets from other nodes, so it can safely sleep for the duration between slots 2-5. Since the negotiation is successful (i.e., it is ACKed in slot 6), the sender is awake during slots 7-9 to send the data packets. As shown, the receiver is awake during slot 1 for a possible broadcast. The receiver does not have packets to send so it can sleep during slots 2-4. Based on the traffic during the previous beacon interval, it expects a Recv notification during slot 5 and awakes at that time. If there is no traffic in the network, ordinary nodes are only awake two slots per beacon interval (out of 48 slots) which means the minimum duty cycle of ordinary nodes is ~4%.
IV. PERFORMANCE EVALUATION
In this section, we compare the performance of our pro-posed MAC protocols, EMAC with existing state of art multi-channel protocols in wireless ad hoc and sensor networks: NAMAC [19], LNMAC [14] and MMSN [20], respectively. Our performance evaluation results are obtained through simulations in NS2.The radio range was fixed at 250m and we considered radio transceivers with 4 and 6 channels. We use Geographic Forwarding as the routing protocol and the two-ray radio propagation model. The traffic is CBR with a packet size of 512B. For the single-hop and multi-hop scenarios we generated 15 and 20 pair wise random data flows, respectively. The network load was varied through the packet arrival rate in each flow, which ranged from 1-1000 packets/second. 4.1Aggregate Throughput
Simulation results for the single-hop network are presented in Figure 2. For single-hop communication, the throughput of the three protocols at low network loads is similar as the traffic is still within each protocol's limit. When traffic is high (packet rates greater than 100packets/second), EMAC outperforms NAMAC and LNAMAC protocols because it can assign more packets per negotiation. Also, EMAC does not have a fixed negotiation window that takes a large portion of the total time. Once the negotiation is done, all time slots can be used for communication. We also see that as the number of channels increases, the throughput for the three protocols increases as well. In the simulation results for the multi-hop network (Figure 5), the throughput of the three protocols at low network loads is similar. In high network traffic, the throughput of EMAC is higher than NAMAC and higher than LNMAC. 4.2Energy Consumption Remarkably, in the single hop communication scenario, as shown in Figure 3, EMAC is the most energy efficient protocol at low and high network loads. EMAC works especially well at low network loads where it consumes less energy than NAMAC and. At high loads, when nodes are awake most of the time, the energy consumption of EMAC is 10% less than NAMAC and 40% less than LNMAC. In a multi-hop network scenario, EMAC still consumes the least energy. NAMAC consumes more energy because the nodes in the network that do not participate in routing still need to stay awake during the contention-based interval for potential channel/ slot negotiations. Figure2:Throughput v/s packet rate Figure3:Energy v/s packet rate
5. Darshan A. M et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 6( Version 5), June 2014, pp.45-49
www.ijera.com 49 | P a g e
V. CONCLUSIONS AND FUTURE WORK
In this paper, we presented EMAC – an energy efficiency multi-channel MAC protocol, in which specially designated nodes maintain sleeping and communication schedules of nodes. Simulation results show that EMAC, at high network loads, consumes less energy while providing 25% more throughput than state of art multi-channel MAC protocols for ad hoc networks.. We leave for future work the implementation of EMAC on real mote hardware. We plan to add redundancy through additional backup negotiators which can aid in case of negotiator failures. An optimization of our scheme can address the scenario of data streams present in the network. In this scenario, nodes do not need to negotiate frequently. REFERENCES
[1] G.-S. Ahn, E. Miluzzo, and A. T. Campbell. A funneling-mac for high performance data collection in sensor networks. In Proceedings of ACM Conference on Embedded Networked Sensor Systems (SenSys), 2006.
[2] P. Bahl, R. Chandra, and J. Dunagan. SSCH: slotted seeded channel hopping for capacity improvement. In Proceedings of Annual International Conference on Mobile Computing and Networking (MobiCom), 2004.
[3] L. Bao and J. J. Garcia-Luna-Aceves. A new approach to channel access scheduling for ad hoc networks. In Proceedings of Annual International Conference on Mobile Computing and Networking (MobiCom), 2001.
[4] M. Buettner, G. V. Yee, E. Anderson, and R. Han. X-MAC: A short preamble mac protocol for duty-cycled wireless sensor networks. In Proceedings of ACM Conference on Embedded Networked Sensor Systems (SenSys), 2006.
[5] X. Chen, P. Han, Q. He, S. Tu, and Z. Chen. A multi-channel mac protocol for wireless sensor networks. In Proceedings of CIT, 2006.
[6] A. El-Hoiydi and J.-D. Decotignie. WiseMAC: An ultra low power mac protocol for the downlink of infrastructure wireless sensor networks. In Proceedings of ISCC, 2004.
[7] M.-S. C. Ergen and F.-P. Varaiya. PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks. IEEE Transactions on Mobile Computing, 5(7), 2006.
[8] M. Jovanovic and G. Djordjevic. TFMAC: Multi-channel mac protocol for wireless sensor networks. In Proceedings of TELSIKS, 2007.
[9] Y. Kim, H. Shin, and H. Cha. Y-MAC: An energy-efficient multi-channel mac protocol for dense wireless sensor networks. In Proceedings of IPSN, 2008.
[10] P. Kyasanur and N. H. Vaidya. Capacity of multi-channel wireless networks: impact of number of channels and interfaces. In Proceedings of Annual International Conference on Mobile Computing and Networking (MobiCom), 2005.
[11] Towards Higher Throughput and Energy Efficiency in Dense Wireless Ad Hoc and Sensor Wei Zhou, Radu Stoleru. Department of Computer Science and Engineering Texas A&M University. SAC’10 March 22-26, 2010.
[12] J. So and N. H. Vaidya. Multi-channel mac for ad hoc networks: handling multi-channel hidden terminals using a single transceiver. In Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2004