SlideShare a Scribd company logo
VISVESVARAYA TECHNOLOGICAL UNIVERSITY
JNANA SANGAMA, BELAGAVI, KARNATAKA -590 014
PROGRESS REPORT-I & 2
(JAN 2020- JULY 2020) (Aug 2020- Dec 2020)
On
“ENERGY MANAGEMENT IN WIRELESS SENSOR NETWORKS
USING MODIFIED MAC PROTOCOL”
Submitted by Under the Guidance of
HARISH JOSHI DR. RAVINDRA EKLARKER
(USN: 3GN17PEA06) PRINCIPAL
GNDEC, BIDAR
RESEARCH CENTRE
Department of Electronics and Communication Engineering
Guru Nanak Dev Engineering College, Bidar -585403
Karnataka.
CONTENT
• Introduction
• Modeling and Analysis of Energy Efficient MAC Protocols in INET
Framework Using OMNet++
• Showcases And Simulation Results
• Collision Avoidance Technique In Wireless Sensor Networks
• Collision Avoidance In X-MAC Protocol
• Work Carried Out So Far
• Further Work To Be Carried Out
• Details Of Papers/Publications Out Of The Research Work
• References
INTRODUCTION
• Wireless Sensor Network : Refers to a group of distributed and
dedicated sensors for monitoring and recording the physical conditions of the
environment and organizing the collected data at a central location.
• Applications of WSN are such as, intrusion detection, target tracking, industrial
automation, military applications, smart building, Internet of Things, and for
environmental applications like agricultural farm monitoring, forest fire monitoring
etc.
• Each such sensor network node has typically several parts: a radio transceiver with
an internal antenna or connection to an external antenna, a microcontroller, an
electronic circuit for interfacing with the sensors and an energy source, usually
a battery or an embedded form of energy harvesting.
• A wireless sensor node is designed for sensing, data acquisition, localized
processing, and wireless communication. The transceiver has been
identified as one of the units that consume the most power in the sensor
node. It dominates the power budget at 60% consumption of the total
available energy and determines the lifetime of the sensor network .
• In sensor networks, a MAC layer is primarily responsible for allocation and
distribution of shared medium and other resources of communication
among all the nodes in a network.
• Medium Access Control MAC sub-layer is part of Data Link layer in WSN's
protocol stack. The energy consumption of sensor nodes is greatly
affected by MAC protocol which controls the node radio functionalities
MAC Attribute and Tradeoff to
achieve Efficiency
• The following attributes reflect the characteristics of a good MAC protocol for
wireless sensor networks:
• Collision Avoidance: When and how a node can access the medium and send its
data.
• Energy Efficiency: It is very difficult to replace and recharge exhausted batteries;
hence prolonging lifetime of each node is critical issue.
• Scalability and Adaptability: A good MAC protocols should accommodate changes
in network size, node density and topology.
• Channel Utilization: How well the entire bandwidth of the channel is utilized in
communications.
• Latency: Delay in receiving packet by receiver, when a sender has a packet to sent.
• Throughput: Amount of data successfully transferred from sender to receiver in a
given time.
• Fairness: Ability of different nodes to share channel equality
Introduction to MAC protocols
• There are 2 types of protocols used to communicate the channels:
• TDMA based: In a TDMA based approach; time will be divided into time
slots, which will help the nodes to move their data without lavishing
energy of transmission. Only one time slot is assigned to every node [3].
• CSMA based: CSMA is a MAC convention wherein a node will check for
absence of an signal before transmitting.
OBJECTIVES OF THE WORK
• To Carry out Research work to improve energy efficiency at MAC layer without
degrading the packet delivery performance.
• To adapt the duty cycle of decent nodes independently in order to meet the time-
varying and/or spatially no uniform traffic loads. The proposed mechanism should
aim at improving energy efficiency while maximizing packet delivery performance
under variable traffic conditions.
• Finally, to evaluate network lifetime and understand the key factors that contribute
to energy imbalance in multi-hop wireless sensor networks.
• Furthermore, to propose an energy-aware routing protocol that is able to achieve
the right trade-off between energy efficiency and energy consumption balancing
and maximize network lifetime in heterogeneous WSNs.
Demonstrating the MAC protocols
BMac actually sends multiple shorter preambles instead of a long one, so that waking
nodes can receive the one that starts after they woke up. sensor3 starts sending
preambles, while the other nodes are asleep. All of them wake up before the end of
the preamble transmission. When the nodes are awake, they receive the preamble,
and receive the data packet as well, at the physical layer (the mac discards it if it is not
for them.) Then the gateway sends it to the server. Note that all nodes receive the
preambles and the data packet as well.
sensor3 starts sending preambles. sensor4 wakes up and receives one of the
preambles (hence the dotted arrow representing a successful physical layer
transmission), and goes back to sleep, as the transmission is addressed to the gateway.
Then the gateway wakes up and sends an acknowledgment after receiving one of the
preambles. sensor3 sends the data packet, and the gateway forwards it to the server.
Each node transmits in its own time slot; there are no collisions. Note that all nodes
receive the control message (indicated by the physical link visualizer arrows), but only
the destination node receives the data unit.
MAC Attribute and Tradeoff
• The following attributes reflect the characteristics of a good MAC protocol for wireless sensor
networks:
• Collision Avoidance: When and how a node can access the medium and send its data.
• Energy Efficiency: It is very difficult to replace and recharge exhausted batteries; hence
prolonging
• lifetime of each node is critical issue.
• Scalability and Adaptability: A good MAC protocols should accommodate changes in network
size,
• node density and topology.
• Channel Utilization: How well the entire bandwidth of the channel is utilized in
communications.
• Latency: Delay in receiving packet by receiver, when a sender has a packet to sent.
• Throughput: Amount of data successfully transferred from sender to receiver in a given time.
• Fairness: Ability of different nodes to share channel equality
Optimizing for packet loss for BMAC
The sensors send 100 packets each during the 100s, thus 400 packets total. It is
apparent from the results that the network cannot carry all traffic in this scenario. The
results also outline a smooth curve. We choose 0.19s as the best performing value
for slotDuration.
Optimizing LMAC
According to this, the optimal value for the gateway’s slotDuration is 0.14s (0.35s for
the sensors), so we choose that.
Optimizing LMAC
The best performing value for slotDuration is 50ms. Note that the
lowest slotDuration values up until 120ms yield approximately the same results (around
400 packets), with the 50ms value performing marginally better.
Network power consumption by BMAC,
LMAC and XMAC.
WORK CARRIED OUT SO FAR
• Study of Wireless sensor network (WSN) and it’s at different applications.
• Study and Analysis of Source/Cause of Energy Wastage in Wireless sensor network.
•
• A detailed Survey and Analysis Different Types of Media Access Control (MAC)
Protocols to increase the Energy Efficiency in Wireless Sensor Networks.
• A detailed Survey on comparison based analysis of various network simulators.
Simulators taken into consideration are Ns-2, Ns-3, OMNeT++, NetSim, REAL,
OPNET and QualNet. Information about simulators such as features, advantages,
disadvantages, backend environment, the supporting operating system, and
minimum hardware requirement.
• Learning/Working on Network Simulators OMNeT++ to carry out the Research
Activity Further.
• Presented/submitted Research Related Papers in Reputed Peer Reviewed Scopus
Indexed/ UGC approved Journals and Conferences.
• Modeling and Simulation is carried out on OMNET++ based on a scope of
improvement “Implementation of a Modified Wireless Sensor Network MAC
Protocol for Critical Environments”
• Simulation on INET framework using OMNet++ carried out to minimizing Idle
Listening to achieve maximum throughput, same work published as a book
chapter in Scopus indexed Conference.
• As per the second objective of the research work further work is under process i.e.
to achieve Enhancement in energy efficiency by avoiding the collision during
packet transmission in Wireless Sensor network is going on.
• Both the results and analysis of study carried out on proposed objectives of the
research work are framed/written as papers and submitted to peer reviewed
reputed Scopus indexed journals and these papers are under review status.
Multiple Access with Collision
Avoidance for Wireless (MACAW)
• Multiple Access with Collision Avoidance for Wireless (MACAW) is a
slotted medium access control (MAC) protocol widely used in ad hoc networks.
• Furthermore, it is the foundation of many other MAC protocols used in wireless
sensor networks (WSN).
• It uses RTS-CTS-DS-DATA-ACK frame sequence for transferring data, sometimes
preceded by an RTS-RRTS frame sequence, in view to provide solution to
the hidden node problem.
• Although protocols based on MACAW, such as S-MAC, use carrier sense in addition
to the RTS/CTS mechanism, MACAW does not make use of carrier sense.
COLLISION AVOIDANCE IN X-MAC
PROTOCOL
• Here we are introducing X-MAC/CA protocol combining X-MAC protocol with CA
(Collision Avoidance) algorithm with an aim to maximally randomize transmissions
in overcrowded networks. X-MAC protocol, one of typical asynchronous MAC
protocols for WSNs (Wireless Sensor Networks) allowing each node to
independently and periodically sleep, is characterized as sending a sequence of
short preambles until an early acknowledgement comes back.
• This feature is designed to save more energy by permitting the receiver to notify
the sender that it is awake. X-MAC/CA protocol is designed to reduce collisions,
especially when a large number of nodes in densely populated WSNs
simultaneously deliver data once they sense some events to report. For its
accurate measurement, this also extends a conventional mathematical model for
X-MAC protocol to include the effect of CA algorithm.
• The extended model predicts that X- MAC/CA protocol can improve the
throughput of X-MAC by up- to 30% in 40-node networks.
Flow Chart of X-MAC/CA Sender
RESULTS AND DISCUSSIONS
• The conclusion is that in scenario, with the selected parameter values, XMAC
turned out to be the most energy efficient MAC protocol, although LMAC carried a
bit more traffic.
• a conventional mathematical model for X-MAC protocol to include the effect of CA
algorithm. The extended model predicts that X- MAC/CA protocol can improve the
throughput of X-MAC by up- to 30% in networks.
FURTHER WORK TO BE CARRIED OUT
• Working on Protocol modeling and Simulation mechanism which should aim at
improving energy efficiency while maximizing packet delivery performance under
variable traffic conditions.
• Proposing an energy-aware routing protocol that is able to achieve the right trade-
off between energy efficiency and energy consumption balancing and maximize
network lifetime in heterogeneous WSNs.
Number of Papers/Publications out of the
Research Work (Presented/Submitted),
• International Conference:
• Presented a paper Titled “Modeling and Analysis of Energy Efficient MAC protocols
for Wireless Sensor Networks using OMNET++” Scopus Indexed International
Conference on Inventive Computation Technologies-ICICT 2019 Dated 30th August
2019.
• Proceedings published in SPRINGER https://link.springer.com/book/10.1007/978-
3-030-33846-6 DOI https://doi.org/10.1007/978-3-030-33846-6_61 .
• International journals:
• Published a paper “Analysis of MAC Protocols for Wireless Sensor Network” June
2020 | International Journal Of Innovative Research In Technology | Volume 7
Issue 1 | ISSN: 2349-6002.
• Published a paper Titled, “An Analysis of Energy Efficient MAC protocols for
Wireless Sensor Networks using OMNET++” UGC Approved, Open Access
International Open Access Journal of Technologies and Innovation Research On 6th
June 2019. ISSN No: 2349-5162 Vol_6, Issue _6.
• Published a paper Titled, “MAC Protocols for Application-Specific Wireless Sensor
Networks: A Study” UGC Approved International journal of research in
Engineering, Science and Management On 10th October 2018 ISSN No: 2581-5782, Vol_1,
Issue _10.
• Published a paper Titled, “Energy Issues and solutions using Renewable Energy
Resources for Wireless Sensor Networks: A survey” in International Journal for
Scientific Research & Development On 22nd & 23rd October 2016.
REFERENCES
• [1] V. Bharghavan, A. Demers, S. Shenker, and L. Zhang.MACAW:AMediaAccess
Protocol forWireless LAN’s.In ACMSIGCOMM1994, pages 212–225, ondon,
UK,August 31–September 2 1994.
• [2] A. Cerpa, N. Busek, and D. Estrin. SCALE: A tool for Simple Connectivity
Assessment in Lossy Environments. Technical report, CENS-TR-21, September2003.
• [3] L. Girod, J. Elson, A. Cerpa, T. Stathopoulos, N. Ra-manathan, and D. Estrin.
Emstar: a software environment for developing and deploying wireless sensor
networks. In Proceedings of the 2004 USENIX Technical Conference, Boston,MA,
2004. USENIX Association.
• [4] L. Girod, T. Stathopoulos, N. Ramanathan, J. Elson, D.Estrin,E.Osterweil, andT.
Schoellhammer. Tools for deployment and simulation of heterogeneous sensor
networks. In Proceedings of SenSys 2004, November 2004.
• [5] J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister. System architecture
directions for networked sensors. In Proceedings of the Ninth International
Conference on Arhitectural Support for Programming Languages andOperating
Systems (ASPLOS-IX), pages 93 104, Cambridge,MA, USA, November 2000. ACM.
• [6] C. T. Inc. Mica2 wireless measurement system datasheet,
http://www.xbow.com/products/product pdf files /datasheets /wireless/6020-
0042-03 a mica2.pdf.
• [7] V. Jacobson. Congestion avoidance and control. ACM Computer Communication
Review; Proceedings of the Sigcomm’88 Symposiumin tanford,CA,August, 1988,
18, 4:314–329, 1988.
• [8] D. Katabi, M. Handley, and C. Rohrs. Internet congestion control for future high
bandwidth-delay product environments, 2002.
• [9] A.Mainwaring,D. Culler, J. Polastre, R. Szewczyk, and J. Anderson. Wireless
sensor networks for habitatmon itoring. In Proceedings of the 1st ACM
international workshop onWireless sensor networks and applications, pages 88–
97. ACMPress, 2002.
• [10] T. Stathopoulos, J.Heidemann, andD.Estrin. Aremote code update mechanism
for wireless sensor networks. Technical Report CENS-TR-30, University of Califor
nia,LosAngeles,Center forEmbeddedNetworkedComputing, November 2003.
• [11] T. van Dam and K. Langendoen. An adaptive energy efficient mac protocol for
wireless sensor networks. In Proceedings of the first international conference on
Embedded networked sensor systems, pages 171–180. ACM Press, 2003.
• [12] A. Woo, T. Tong, and D. Culler. Taming the underlying challenges of reliable
multihop routing in sensor networks. In Proceedings of the first international
conference on Embedded networked sensor systems, pages 14–27. ACMPress,
2003.
•THANK YOU

More Related Content

Similar to PROGRESS 1& 2.ppt

PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
IJCNCJournal
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
IJECEIAES
 
W13-L1&2.pptx
W13-L1&2.pptxW13-L1&2.pptx
W13-L1&2.pptx
HirazNor
 
wsn
wsnwsn
An energy efficient cross layer network
An energy efficient cross layer networkAn energy efficient cross layer network
An energy efficient cross layer network
jpstudcorner
 
A Literature Survey on Energy Efficient MAC Protocols For WSN
A Literature Survey on Energy Efficient MAC Protocols For WSNA Literature Survey on Energy Efficient MAC Protocols For WSN
A Literature Survey on Energy Efficient MAC Protocols For WSN
IRJET Journal
 
Ba2641224127
Ba2641224127Ba2641224127
Ba2641224127IJMER
 
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksThe Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
IJMER
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
IRJET Journal
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Editor Jacotech
 
Energy-efficient MAC protocols for wireless sensor networks: a survey
Energy-efficient MAC protocols for wireless sensor networks: a surveyEnergy-efficient MAC protocols for wireless sensor networks: a survey
Energy-efficient MAC protocols for wireless sensor networks: a survey
TELKOMNIKA JOURNAL
 
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKSSLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
ijwmn
 
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKSSLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
ijwmn
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architecture
ijsrd.com
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
csandit
 
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
cscpconf
 

Similar to PROGRESS 1& 2.ppt (20)

mn paper
mn papermn paper
mn paper
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
ShortPaper
ShortPaperShortPaper
ShortPaper
 
W13-L1&2.pptx
W13-L1&2.pptxW13-L1&2.pptx
W13-L1&2.pptx
 
wsn
wsnwsn
wsn
 
An energy efficient cross layer network
An energy efficient cross layer networkAn energy efficient cross layer network
An energy efficient cross layer network
 
A Literature Survey on Energy Efficient MAC Protocols For WSN
A Literature Survey on Energy Efficient MAC Protocols For WSNA Literature Survey on Energy Efficient MAC Protocols For WSN
A Literature Survey on Energy Efficient MAC Protocols For WSN
 
Ba2641224127
Ba2641224127Ba2641224127
Ba2641224127
 
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksThe Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...
 
01306496
0130649601306496
01306496
 
Energy-efficient MAC protocols for wireless sensor networks: a survey
Energy-efficient MAC protocols for wireless sensor networks: a surveyEnergy-efficient MAC protocols for wireless sensor networks: a survey
Energy-efficient MAC protocols for wireless sensor networks: a survey
 
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKSSLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
 
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKSSLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
SLOTTED CSMA/CA BASED ENERGY EFFICIENT MAC PROTOCOL DESIGN IN NANONETWORKS
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architecture
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
 
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
 

Recently uploaded

Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 

Recently uploaded (20)

Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 

PROGRESS 1& 2.ppt

  • 1. VISVESVARAYA TECHNOLOGICAL UNIVERSITY JNANA SANGAMA, BELAGAVI, KARNATAKA -590 014 PROGRESS REPORT-I & 2 (JAN 2020- JULY 2020) (Aug 2020- Dec 2020) On “ENERGY MANAGEMENT IN WIRELESS SENSOR NETWORKS USING MODIFIED MAC PROTOCOL” Submitted by Under the Guidance of HARISH JOSHI DR. RAVINDRA EKLARKER (USN: 3GN17PEA06) PRINCIPAL GNDEC, BIDAR RESEARCH CENTRE Department of Electronics and Communication Engineering Guru Nanak Dev Engineering College, Bidar -585403 Karnataka.
  • 2. CONTENT • Introduction • Modeling and Analysis of Energy Efficient MAC Protocols in INET Framework Using OMNet++ • Showcases And Simulation Results • Collision Avoidance Technique In Wireless Sensor Networks • Collision Avoidance In X-MAC Protocol • Work Carried Out So Far • Further Work To Be Carried Out • Details Of Papers/Publications Out Of The Research Work • References
  • 3. INTRODUCTION • Wireless Sensor Network : Refers to a group of distributed and dedicated sensors for monitoring and recording the physical conditions of the environment and organizing the collected data at a central location. • Applications of WSN are such as, intrusion detection, target tracking, industrial automation, military applications, smart building, Internet of Things, and for environmental applications like agricultural farm monitoring, forest fire monitoring etc. • Each such sensor network node has typically several parts: a radio transceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting.
  • 4. • A wireless sensor node is designed for sensing, data acquisition, localized processing, and wireless communication. The transceiver has been identified as one of the units that consume the most power in the sensor node. It dominates the power budget at 60% consumption of the total available energy and determines the lifetime of the sensor network . • In sensor networks, a MAC layer is primarily responsible for allocation and distribution of shared medium and other resources of communication among all the nodes in a network. • Medium Access Control MAC sub-layer is part of Data Link layer in WSN's protocol stack. The energy consumption of sensor nodes is greatly affected by MAC protocol which controls the node radio functionalities
  • 5. MAC Attribute and Tradeoff to achieve Efficiency • The following attributes reflect the characteristics of a good MAC protocol for wireless sensor networks: • Collision Avoidance: When and how a node can access the medium and send its data. • Energy Efficiency: It is very difficult to replace and recharge exhausted batteries; hence prolonging lifetime of each node is critical issue. • Scalability and Adaptability: A good MAC protocols should accommodate changes in network size, node density and topology. • Channel Utilization: How well the entire bandwidth of the channel is utilized in communications. • Latency: Delay in receiving packet by receiver, when a sender has a packet to sent. • Throughput: Amount of data successfully transferred from sender to receiver in a given time. • Fairness: Ability of different nodes to share channel equality
  • 6. Introduction to MAC protocols • There are 2 types of protocols used to communicate the channels: • TDMA based: In a TDMA based approach; time will be divided into time slots, which will help the nodes to move their data without lavishing energy of transmission. Only one time slot is assigned to every node [3]. • CSMA based: CSMA is a MAC convention wherein a node will check for absence of an signal before transmitting.
  • 7. OBJECTIVES OF THE WORK • To Carry out Research work to improve energy efficiency at MAC layer without degrading the packet delivery performance. • To adapt the duty cycle of decent nodes independently in order to meet the time- varying and/or spatially no uniform traffic loads. The proposed mechanism should aim at improving energy efficiency while maximizing packet delivery performance under variable traffic conditions. • Finally, to evaluate network lifetime and understand the key factors that contribute to energy imbalance in multi-hop wireless sensor networks. • Furthermore, to propose an energy-aware routing protocol that is able to achieve the right trade-off between energy efficiency and energy consumption balancing and maximize network lifetime in heterogeneous WSNs.
  • 9. BMac actually sends multiple shorter preambles instead of a long one, so that waking nodes can receive the one that starts after they woke up. sensor3 starts sending preambles, while the other nodes are asleep. All of them wake up before the end of the preamble transmission. When the nodes are awake, they receive the preamble, and receive the data packet as well, at the physical layer (the mac discards it if it is not for them.) Then the gateway sends it to the server. Note that all nodes receive the preambles and the data packet as well.
  • 10. sensor3 starts sending preambles. sensor4 wakes up and receives one of the preambles (hence the dotted arrow representing a successful physical layer transmission), and goes back to sleep, as the transmission is addressed to the gateway. Then the gateway wakes up and sends an acknowledgment after receiving one of the preambles. sensor3 sends the data packet, and the gateway forwards it to the server.
  • 11. Each node transmits in its own time slot; there are no collisions. Note that all nodes receive the control message (indicated by the physical link visualizer arrows), but only the destination node receives the data unit.
  • 12. MAC Attribute and Tradeoff • The following attributes reflect the characteristics of a good MAC protocol for wireless sensor networks: • Collision Avoidance: When and how a node can access the medium and send its data. • Energy Efficiency: It is very difficult to replace and recharge exhausted batteries; hence prolonging • lifetime of each node is critical issue. • Scalability and Adaptability: A good MAC protocols should accommodate changes in network size, • node density and topology. • Channel Utilization: How well the entire bandwidth of the channel is utilized in communications. • Latency: Delay in receiving packet by receiver, when a sender has a packet to sent. • Throughput: Amount of data successfully transferred from sender to receiver in a given time. • Fairness: Ability of different nodes to share channel equality
  • 13. Optimizing for packet loss for BMAC The sensors send 100 packets each during the 100s, thus 400 packets total. It is apparent from the results that the network cannot carry all traffic in this scenario. The results also outline a smooth curve. We choose 0.19s as the best performing value for slotDuration.
  • 14. Optimizing LMAC According to this, the optimal value for the gateway’s slotDuration is 0.14s (0.35s for the sensors), so we choose that.
  • 15. Optimizing LMAC The best performing value for slotDuration is 50ms. Note that the lowest slotDuration values up until 120ms yield approximately the same results (around 400 packets), with the 50ms value performing marginally better.
  • 16. Network power consumption by BMAC, LMAC and XMAC.
  • 17. WORK CARRIED OUT SO FAR • Study of Wireless sensor network (WSN) and it’s at different applications. • Study and Analysis of Source/Cause of Energy Wastage in Wireless sensor network. • • A detailed Survey and Analysis Different Types of Media Access Control (MAC) Protocols to increase the Energy Efficiency in Wireless Sensor Networks. • A detailed Survey on comparison based analysis of various network simulators. Simulators taken into consideration are Ns-2, Ns-3, OMNeT++, NetSim, REAL, OPNET and QualNet. Information about simulators such as features, advantages, disadvantages, backend environment, the supporting operating system, and minimum hardware requirement. • Learning/Working on Network Simulators OMNeT++ to carry out the Research Activity Further.
  • 18. • Presented/submitted Research Related Papers in Reputed Peer Reviewed Scopus Indexed/ UGC approved Journals and Conferences. • Modeling and Simulation is carried out on OMNET++ based on a scope of improvement “Implementation of a Modified Wireless Sensor Network MAC Protocol for Critical Environments” • Simulation on INET framework using OMNet++ carried out to minimizing Idle Listening to achieve maximum throughput, same work published as a book chapter in Scopus indexed Conference. • As per the second objective of the research work further work is under process i.e. to achieve Enhancement in energy efficiency by avoiding the collision during packet transmission in Wireless Sensor network is going on. • Both the results and analysis of study carried out on proposed objectives of the research work are framed/written as papers and submitted to peer reviewed reputed Scopus indexed journals and these papers are under review status.
  • 19. Multiple Access with Collision Avoidance for Wireless (MACAW) • Multiple Access with Collision Avoidance for Wireless (MACAW) is a slotted medium access control (MAC) protocol widely used in ad hoc networks. • Furthermore, it is the foundation of many other MAC protocols used in wireless sensor networks (WSN). • It uses RTS-CTS-DS-DATA-ACK frame sequence for transferring data, sometimes preceded by an RTS-RRTS frame sequence, in view to provide solution to the hidden node problem. • Although protocols based on MACAW, such as S-MAC, use carrier sense in addition to the RTS/CTS mechanism, MACAW does not make use of carrier sense.
  • 20. COLLISION AVOIDANCE IN X-MAC PROTOCOL • Here we are introducing X-MAC/CA protocol combining X-MAC protocol with CA (Collision Avoidance) algorithm with an aim to maximally randomize transmissions in overcrowded networks. X-MAC protocol, one of typical asynchronous MAC protocols for WSNs (Wireless Sensor Networks) allowing each node to independently and periodically sleep, is characterized as sending a sequence of short preambles until an early acknowledgement comes back. • This feature is designed to save more energy by permitting the receiver to notify the sender that it is awake. X-MAC/CA protocol is designed to reduce collisions, especially when a large number of nodes in densely populated WSNs simultaneously deliver data once they sense some events to report. For its accurate measurement, this also extends a conventional mathematical model for X-MAC protocol to include the effect of CA algorithm. • The extended model predicts that X- MAC/CA protocol can improve the throughput of X-MAC by up- to 30% in 40-node networks.
  • 21. Flow Chart of X-MAC/CA Sender
  • 22. RESULTS AND DISCUSSIONS • The conclusion is that in scenario, with the selected parameter values, XMAC turned out to be the most energy efficient MAC protocol, although LMAC carried a bit more traffic. • a conventional mathematical model for X-MAC protocol to include the effect of CA algorithm. The extended model predicts that X- MAC/CA protocol can improve the throughput of X-MAC by up- to 30% in networks.
  • 23. FURTHER WORK TO BE CARRIED OUT • Working on Protocol modeling and Simulation mechanism which should aim at improving energy efficiency while maximizing packet delivery performance under variable traffic conditions. • Proposing an energy-aware routing protocol that is able to achieve the right trade- off between energy efficiency and energy consumption balancing and maximize network lifetime in heterogeneous WSNs.
  • 24. Number of Papers/Publications out of the Research Work (Presented/Submitted), • International Conference: • Presented a paper Titled “Modeling and Analysis of Energy Efficient MAC protocols for Wireless Sensor Networks using OMNET++” Scopus Indexed International Conference on Inventive Computation Technologies-ICICT 2019 Dated 30th August 2019. • Proceedings published in SPRINGER https://link.springer.com/book/10.1007/978- 3-030-33846-6 DOI https://doi.org/10.1007/978-3-030-33846-6_61 .
  • 25. • International journals: • Published a paper “Analysis of MAC Protocols for Wireless Sensor Network” June 2020 | International Journal Of Innovative Research In Technology | Volume 7 Issue 1 | ISSN: 2349-6002. • Published a paper Titled, “An Analysis of Energy Efficient MAC protocols for Wireless Sensor Networks using OMNET++” UGC Approved, Open Access International Open Access Journal of Technologies and Innovation Research On 6th June 2019. ISSN No: 2349-5162 Vol_6, Issue _6. • Published a paper Titled, “MAC Protocols for Application-Specific Wireless Sensor Networks: A Study” UGC Approved International journal of research in Engineering, Science and Management On 10th October 2018 ISSN No: 2581-5782, Vol_1, Issue _10. • Published a paper Titled, “Energy Issues and solutions using Renewable Energy Resources for Wireless Sensor Networks: A survey” in International Journal for Scientific Research & Development On 22nd & 23rd October 2016.
  • 26. REFERENCES • [1] V. Bharghavan, A. Demers, S. Shenker, and L. Zhang.MACAW:AMediaAccess Protocol forWireless LAN’s.In ACMSIGCOMM1994, pages 212–225, ondon, UK,August 31–September 2 1994. • [2] A. Cerpa, N. Busek, and D. Estrin. SCALE: A tool for Simple Connectivity Assessment in Lossy Environments. Technical report, CENS-TR-21, September2003. • [3] L. Girod, J. Elson, A. Cerpa, T. Stathopoulos, N. Ra-manathan, and D. Estrin. Emstar: a software environment for developing and deploying wireless sensor networks. In Proceedings of the 2004 USENIX Technical Conference, Boston,MA, 2004. USENIX Association. • [4] L. Girod, T. Stathopoulos, N. Ramanathan, J. Elson, D.Estrin,E.Osterweil, andT. Schoellhammer. Tools for deployment and simulation of heterogeneous sensor networks. In Proceedings of SenSys 2004, November 2004. • [5] J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister. System architecture directions for networked sensors. In Proceedings of the Ninth International Conference on Arhitectural Support for Programming Languages andOperating Systems (ASPLOS-IX), pages 93 104, Cambridge,MA, USA, November 2000. ACM.
  • 27. • [6] C. T. Inc. Mica2 wireless measurement system datasheet, http://www.xbow.com/products/product pdf files /datasheets /wireless/6020- 0042-03 a mica2.pdf. • [7] V. Jacobson. Congestion avoidance and control. ACM Computer Communication Review; Proceedings of the Sigcomm’88 Symposiumin tanford,CA,August, 1988, 18, 4:314–329, 1988. • [8] D. Katabi, M. Handley, and C. Rohrs. Internet congestion control for future high bandwidth-delay product environments, 2002. • [9] A.Mainwaring,D. Culler, J. Polastre, R. Szewczyk, and J. Anderson. Wireless sensor networks for habitatmon itoring. In Proceedings of the 1st ACM international workshop onWireless sensor networks and applications, pages 88– 97. ACMPress, 2002. • [10] T. Stathopoulos, J.Heidemann, andD.Estrin. Aremote code update mechanism for wireless sensor networks. Technical Report CENS-TR-30, University of Califor nia,LosAngeles,Center forEmbeddedNetworkedComputing, November 2003. • [11] T. van Dam and K. Langendoen. An adaptive energy efficient mac protocol for wireless sensor networks. In Proceedings of the first international conference on Embedded networked sensor systems, pages 171–180. ACM Press, 2003. • [12] A. Woo, T. Tong, and D. Culler. Taming the underlying challenges of reliable multihop routing in sensor networks. In Proceedings of the first international conference on Embedded networked sensor systems, pages 14–27. ACMPress, 2003.
  • 28.