T-TMAC is an energy-efficient MAC protocol proposed for healthcare monitoring applications using wireless sensor networks. The key elements of T-TMAC include:
1. A three-tier heterogeneous network architecture with medical, coordinator, video, and sink nodes organized into groups.
2. A dynamic scheduling approach where nodes wake up only when needed to transmit or receive data to save energy. Scheduling is organized separately for each network tier.
3. Mechanisms for initializing the network topology, collecting sensor data, and reconfiguring the topology to support node mobility and energy awareness. Data is transmitted in a many-to-one fashion from medical to coordinator to video to sink nodes.
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...Power System Operation
Distributed generation is expected to increase sharply
as more and more renewable are integrated to power system with
the realization of smart grid, consequently complex distribution
smart grid is given. The traditional protection devices cannot
be able to protect complex power system configuration due to
many fault current loops will feed the fault point. Relays based on
standalone decisions cannot provide reliable and correct action
when used on a complex distribution system. This paper proposes
new protection philosophy using wireless technology. Data
sharing among relays to obtain reliable and accurate decision are
introduced. Wireless Token Ring Protocol (WTRP) as a wireless
local area network (LAN) protocol inspired by the IEEE 802.4
Token Bus Protocol is used for data sharing. WTRP is selected
to improve efficiency by reducing the number of retransmissions
due to collisions. WTRP architecture and protocol are described
to verify operation. MATLAB simulation program is used to
simulate the data exchange protocol between relays in a ring for
a specified amount of time.
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...ijwmn
Wireless Sensor Networks (WSNs) is a strong candidate for smart grid applications, such as advanced metering infrastructure, demand response management, dynamic pricing, load control, electricity fraud detection, fault diagnostics, substation monitoring and control as well as automation of various elements of the power grid. The realization of these applications directly depends on efficiency of communication facilities among power grid elements. However, the harsh power grid environmental conditions with obstacles, noise,interference, and fading pose great challenges to reliability of these facilities to monitor and control the power grid. The purpose of this paper is to evaluate performance of WSNs in different power grid environments such as 500 kv substations, main power control room, and underground network transformer vaults. The power grid environments are modeled using a log-normal shadowing path loss model channel with realistic parameters. The network is simulated and performance is evaluated using packet delivery ratio, communication delay, and energy consumption. The simulation results have revealed that different environments have considerable impacts on performance of WSNs which make it suitable for most applications that need low data rate with low reliability requirements.
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...pijans
The bit error rate performance of a V-Blast encoded 8x8 MIMO MC-CDMA wireless communication system
for different signal detection (MMSE and ZF) and digital modulation (BPSK, QPSK, DPSK, and 4QAM)
schemes for grayscale image transmission has been investigated in this paper. The proposed wireless system
employ ½-rated Convolution and cyclic redundancy check (CRC) channel encoding over the AWGN channel
and Walsh Hadamard code as an orthogonal spread code. The present Matlab based simulation study
demonstrates that the V-Blast encoded 8×8 MIMO MC-CDMA wireless system with the employment of 1⁄2-
rated convolution and cyclic redundancy check (CRC) channel encoding strategies shows good performance
utilizing BPSK digital modulation and ZF signal detection scheme in grayscale image transmission
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...pijans
We discuss a new multichannel coordination and sche
duling challenge called the Multichannel Scheduling
Cost (MSC). It is caused by the inability of the co
ntrol channel to schedule simultaneous transmission
s
resulting in data channels lying idle and their ban
dwidth underutilized. As a result, wasted bandwidth
increases as the number of data channels increases.
To address this challenge, a cyclic scheduling
Algorithm (CSA) is proposed. It employs one dedicat
ed signaling channel and 4 data channels. It is
premised on a proactive channel reservation scheme
which reduces the idleness of channels. The scheme
ensures that data channels are reserved while they
are still busy. The data channels are reserved whil
e
their remaining transmission duration is equal to t
he virtual carrier sensing duration. This gives the
next
pair sufficient time to reserve the current data ch
annel before it becomes available, limiting the MSC
to the
first cycle. The simulation results show a performa
nce benefit of the CSA scheme in addressing the eff
ects
of the MSC
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS pijans
This paper presents the design of a compact circular microstrip patch antenna for WLAN applications which covers the band 5.15 to 5.825 GHz. The antenna is designed using 1.4mm thick FR-4 (lossy)substrate with relative permittivity 4.4 and a microstrip line feed is used. The radius of the circular patch is chosen as 7.62mm. To reduce the size and enhance the performance of the proposed antenna, a circular slot is loaded on circular patch and a square slot is etched on the ground plane of dimension 30mm×30mm. Design of the antenna is carried out using CST Microsoft Studio Sonimulation Software. The proposed antenna resonates at 5.5 GHz with a wider bandwidth of 702 MHz and it provides low return loss of -31.58 dB, good gain of 3.23 dB and directivity of 4.28 dBi and high efficiency of around 79% against the resonance frequency. The geometry of the proposed circular antenna with reduced size and its various performance parameters such as return loss, bandwidth, VSWR, gain, directivity, efficiency and radiation pattern plots are presented and discussed.
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...IJEEE
This paper reviews medium access control
(MAC) in wireless sensor network (WSN),and different
management methods to save energy.MAC protocol
controls how sensors access a shared radio channel to
communicate with neighbours.
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...Power System Operation
Distributed generation is expected to increase sharply
as more and more renewable are integrated to power system with
the realization of smart grid, consequently complex distribution
smart grid is given. The traditional protection devices cannot
be able to protect complex power system configuration due to
many fault current loops will feed the fault point. Relays based on
standalone decisions cannot provide reliable and correct action
when used on a complex distribution system. This paper proposes
new protection philosophy using wireless technology. Data
sharing among relays to obtain reliable and accurate decision are
introduced. Wireless Token Ring Protocol (WTRP) as a wireless
local area network (LAN) protocol inspired by the IEEE 802.4
Token Bus Protocol is used for data sharing. WTRP is selected
to improve efficiency by reducing the number of retransmissions
due to collisions. WTRP architecture and protocol are described
to verify operation. MATLAB simulation program is used to
simulate the data exchange protocol between relays in a ring for
a specified amount of time.
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...ijwmn
Wireless Sensor Networks (WSNs) is a strong candidate for smart grid applications, such as advanced metering infrastructure, demand response management, dynamic pricing, load control, electricity fraud detection, fault diagnostics, substation monitoring and control as well as automation of various elements of the power grid. The realization of these applications directly depends on efficiency of communication facilities among power grid elements. However, the harsh power grid environmental conditions with obstacles, noise,interference, and fading pose great challenges to reliability of these facilities to monitor and control the power grid. The purpose of this paper is to evaluate performance of WSNs in different power grid environments such as 500 kv substations, main power control room, and underground network transformer vaults. The power grid environments are modeled using a log-normal shadowing path loss model channel with realistic parameters. The network is simulated and performance is evaluated using packet delivery ratio, communication delay, and energy consumption. The simulation results have revealed that different environments have considerable impacts on performance of WSNs which make it suitable for most applications that need low data rate with low reliability requirements.
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...pijans
The bit error rate performance of a V-Blast encoded 8x8 MIMO MC-CDMA wireless communication system
for different signal detection (MMSE and ZF) and digital modulation (BPSK, QPSK, DPSK, and 4QAM)
schemes for grayscale image transmission has been investigated in this paper. The proposed wireless system
employ ½-rated Convolution and cyclic redundancy check (CRC) channel encoding over the AWGN channel
and Walsh Hadamard code as an orthogonal spread code. The present Matlab based simulation study
demonstrates that the V-Blast encoded 8×8 MIMO MC-CDMA wireless system with the employment of 1⁄2-
rated convolution and cyclic redundancy check (CRC) channel encoding strategies shows good performance
utilizing BPSK digital modulation and ZF signal detection scheme in grayscale image transmission
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...pijans
We discuss a new multichannel coordination and sche
duling challenge called the Multichannel Scheduling
Cost (MSC). It is caused by the inability of the co
ntrol channel to schedule simultaneous transmission
s
resulting in data channels lying idle and their ban
dwidth underutilized. As a result, wasted bandwidth
increases as the number of data channels increases.
To address this challenge, a cyclic scheduling
Algorithm (CSA) is proposed. It employs one dedicat
ed signaling channel and 4 data channels. It is
premised on a proactive channel reservation scheme
which reduces the idleness of channels. The scheme
ensures that data channels are reserved while they
are still busy. The data channels are reserved whil
e
their remaining transmission duration is equal to t
he virtual carrier sensing duration. This gives the
next
pair sufficient time to reserve the current data ch
annel before it becomes available, limiting the MSC
to the
first cycle. The simulation results show a performa
nce benefit of the CSA scheme in addressing the eff
ects
of the MSC
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS pijans
This paper presents the design of a compact circular microstrip patch antenna for WLAN applications which covers the band 5.15 to 5.825 GHz. The antenna is designed using 1.4mm thick FR-4 (lossy)substrate with relative permittivity 4.4 and a microstrip line feed is used. The radius of the circular patch is chosen as 7.62mm. To reduce the size and enhance the performance of the proposed antenna, a circular slot is loaded on circular patch and a square slot is etched on the ground plane of dimension 30mm×30mm. Design of the antenna is carried out using CST Microsoft Studio Sonimulation Software. The proposed antenna resonates at 5.5 GHz with a wider bandwidth of 702 MHz and it provides low return loss of -31.58 dB, good gain of 3.23 dB and directivity of 4.28 dBi and high efficiency of around 79% against the resonance frequency. The geometry of the proposed circular antenna with reduced size and its various performance parameters such as return loss, bandwidth, VSWR, gain, directivity, efficiency and radiation pattern plots are presented and discussed.
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...IJEEE
This paper reviews medium access control
(MAC) in wireless sensor network (WSN),and different
management methods to save energy.MAC protocol
controls how sensors access a shared radio channel to
communicate with neighbours.
Survey on energy efficiency in wireless sensor network using mac protocol wit...Editor Jacotech
Dynamic feature evaluation and concept evaluation is major challenging task in the field of data classification. The continuity of data induced a new feature during classification process, but the classification process is predefined task for assigning data into class. Data comes into multiple feature sub-set format into infinite length. The infinite length not decided the how many class are assigned. Support vector machine is well recognized method for data classification. For the process of support vector machine evaluation of new feature during classification is major problem. The problem of feature evaluation decreases the performance of Support Vector Machine (SVM). For the improvement of support vector machine, particle of swarm optimization technique is used. Particle of swarm optimization controls the dynamic feature evaluation process and decreases the possibility of confusion in selection of class and increase the classification ratio of support vector machine. Particle of swarm optimization work in two phases one used as dynamic population selection and another are used for optimization process of evolved new feature.
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...pijans
The bit error rate performance of a V-Blast encoded 8x8 MIMO MC-CDMA wireless communication system
for different signal detection (MMSE and ZF) and digital modulation (BPSK, QPSK, DPSK, and 4QAM)
schemes for grayscale image transmission has been investigated in this paper. The proposed wireless system
employ ½-rated Convolution and cyclic redundancy check (CRC) channel encoding over the AWGN
channel and Walsh Hadamard code as an orthogonal spread code. The present Matlab based simulation study
demonstrates that the V-Blast encoded 8×8 MIMO MC-CDMA wireless system with the employment of 1⁄2-
rated convolution and cyclic redundancy check (CRC) channel encoding strategies shows good performance
utilizing BPSK digital modulation and ZF signal detection scheme in grayscale image transmission
Energy efficient mac protocols for wireless sensor networkijcsa
Wireless sensor network are the collection of individual nodes which are able to interact with physical
environment statically or dynamically by sensing or controlling physical parameter. Wireless sensor network
become a leading solution in many important applications such as intrusion detection, target tracking,
industrial automation etc. A major problem with WSN is to determining a most efficient protocol for
conserving energy of power source. The design of an energy- efficient Medium Access efficient Control
(MAC) protocol is one of the major issues in wireless sensor networks (WSN). In this paper we study some
characteristics of WSN that are important for the design of MAC layer protocols and give a brief introduction
of some newly come MAC protocols with reference to energy efficiency for WSN. In accordance with channel
access policies, MAC protocols are classified into four types, which are cross layer protocols, TDMA-based,
contention-based and hybrid, these are discussed in this paper.
Advancements in Complementary Metal Oxide Semiconductor (CMOS) technology have enabled Wireless Sensor Networks (WSN) to gather, process and transport multimedia (MM) data as well and not just limited to handling ordinary scalar data anymore. This new generation of WSN type is called Wireless Multimedia Sensor Networks (WMSNs). Better and yet relatively cheaper sensors – sensors that are able to sense both scalar data and multimedia data with more advanced functionalities such as being able to handle rather intense computations easily - have sprung up. In this paper, the applications, architectures, challenges and issues faced in the design of WMSNs are explored. Security and privacy issues, over all requirements, proposed and implemented solutions so far, some of the successful achievements and other related works in the field are also highlighted. Open research areas are pointed out and a few solution suggestions to the still persistent problems are made, which, to the best of my knowledge, so far haven’t been explored yet.
A Novel Back Up Wide Area Protection Technique for Power Transmission Grids U...Power System Operation
Current differential protection relays are widely applied
to the protection of electrical plant due to their simplicity,
sensitivity and stability for internal and external faults. The proposed
idea has the feature of unit protection relays to protect large
power transmission grids based on phasor measurement units. The
principle of the protection scheme depends on comparing positive
sequence voltage magnitudes at each bus during fault conditions
inside a system protection center to detect the nearest bus to
the fault. Then the absolute differences of positive sequence current
angles are compared for all lines connecting to this bus to
detect the faulted line. The new technique depends on synchronized
phasor measuring technology with high speed communication
system and time transfer GPS system. The simulation of the interconnecting
system is applied on 500 kV Egyptian network using
Matlab Simulink. The new technique can successfully distinguish
between internal and external faults for interconnected lines. The
new protection scheme works as unit protection system for long
transmission lines. The time of fault detection is estimated by 5
msec for all fault conditions and the relay is evaluated as a back
up relay based on the communication speed for data transferring.
FRAMEWORK, IMPLEMENTATION AND ALGORITHM FOR ASYNCHRONOUS POWER SAVING OF UWBM...pijans
Asynchronous Power Saving (APS) technique is one of the unique standard used in Mobile Ad hoc
Networks to conserve more energy in the system. This technique when combined with other power saving
systems like Ultra WideBand System and the use of Directional antenna in MANETs provides astonishing
result. In designing Medium Access Control (MAC), developing a framework and giving a detailed
implementation procedure are among the factors that hinder the process; specifically in MANETs not to
mention the Algorithm. This paper aimed at exploring a standard framework, implementation procedure
and Algorithm for designing an Asynchronous Power Saving Ultra WideBandMeduim Access Control
(UWB-MAC) in MANETs using directional antenna. An implementation procedure that comprises of
transmission, channelization, and receiver pattern of the Physical layer is specified in this research work.
The paper concludes with an algorithm for an Asynchronous Power Saving UWB-MAC using a Steerable
Directional antenna in MANETs.
This paper discusses the time-frequency transform based fault detection and classification of STATCOM (Static synchronous compensator) integrated single circuit transmission line. Here, fast-discrete S-Transform (FDST) based time-frequency transformation is proposed for evaluation of fault detection and classification including STATCOM in transmission line. The STATCOM is placed at mid-point of transmission line. The system starts processing by extracting the current signals from both end of current transformer (CT) connected in transmission line. The current signals from CT’s are fed to FDST to compute the spectral energy (SE) of phase current at both end of the line. The differential spectral energy (DSE) is evaluated by subtracting the SE obtained from sending end and SE obtained from receiving end of the line. The DSE is the key indicator for deciding the fault pattern detection and classification of transmission line. This proposed scheme is simulated using MATLAB simulink R2010a version and successfully tested under various parameter condition such as fault resistance (Rf),source impedance (SI), fault inception angle (FIA) and reverse flow of current. The proposed approach is simple, reliable and efficient as the processing speed is very fast to detect the fault within a cycle period of FDT (fault detection time).
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
DiscoverBPS allows parents to identify their eligible schools, understand the factors impacting their odds of admission, and formulate a ranked list of their top five choices.
Survey on energy efficiency in wireless sensor network using mac protocol wit...Editor Jacotech
Dynamic feature evaluation and concept evaluation is major challenging task in the field of data classification. The continuity of data induced a new feature during classification process, but the classification process is predefined task for assigning data into class. Data comes into multiple feature sub-set format into infinite length. The infinite length not decided the how many class are assigned. Support vector machine is well recognized method for data classification. For the process of support vector machine evaluation of new feature during classification is major problem. The problem of feature evaluation decreases the performance of Support Vector Machine (SVM). For the improvement of support vector machine, particle of swarm optimization technique is used. Particle of swarm optimization controls the dynamic feature evaluation process and decreases the possibility of confusion in selection of class and increase the classification ratio of support vector machine. Particle of swarm optimization work in two phases one used as dynamic population selection and another are used for optimization process of evolved new feature.
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...pijans
The bit error rate performance of a V-Blast encoded 8x8 MIMO MC-CDMA wireless communication system
for different signal detection (MMSE and ZF) and digital modulation (BPSK, QPSK, DPSK, and 4QAM)
schemes for grayscale image transmission has been investigated in this paper. The proposed wireless system
employ ½-rated Convolution and cyclic redundancy check (CRC) channel encoding over the AWGN
channel and Walsh Hadamard code as an orthogonal spread code. The present Matlab based simulation study
demonstrates that the V-Blast encoded 8×8 MIMO MC-CDMA wireless system with the employment of 1⁄2-
rated convolution and cyclic redundancy check (CRC) channel encoding strategies shows good performance
utilizing BPSK digital modulation and ZF signal detection scheme in grayscale image transmission
Energy efficient mac protocols for wireless sensor networkijcsa
Wireless sensor network are the collection of individual nodes which are able to interact with physical
environment statically or dynamically by sensing or controlling physical parameter. Wireless sensor network
become a leading solution in many important applications such as intrusion detection, target tracking,
industrial automation etc. A major problem with WSN is to determining a most efficient protocol for
conserving energy of power source. The design of an energy- efficient Medium Access efficient Control
(MAC) protocol is one of the major issues in wireless sensor networks (WSN). In this paper we study some
characteristics of WSN that are important for the design of MAC layer protocols and give a brief introduction
of some newly come MAC protocols with reference to energy efficiency for WSN. In accordance with channel
access policies, MAC protocols are classified into four types, which are cross layer protocols, TDMA-based,
contention-based and hybrid, these are discussed in this paper.
Advancements in Complementary Metal Oxide Semiconductor (CMOS) technology have enabled Wireless Sensor Networks (WSN) to gather, process and transport multimedia (MM) data as well and not just limited to handling ordinary scalar data anymore. This new generation of WSN type is called Wireless Multimedia Sensor Networks (WMSNs). Better and yet relatively cheaper sensors – sensors that are able to sense both scalar data and multimedia data with more advanced functionalities such as being able to handle rather intense computations easily - have sprung up. In this paper, the applications, architectures, challenges and issues faced in the design of WMSNs are explored. Security and privacy issues, over all requirements, proposed and implemented solutions so far, some of the successful achievements and other related works in the field are also highlighted. Open research areas are pointed out and a few solution suggestions to the still persistent problems are made, which, to the best of my knowledge, so far haven’t been explored yet.
A Novel Back Up Wide Area Protection Technique for Power Transmission Grids U...Power System Operation
Current differential protection relays are widely applied
to the protection of electrical plant due to their simplicity,
sensitivity and stability for internal and external faults. The proposed
idea has the feature of unit protection relays to protect large
power transmission grids based on phasor measurement units. The
principle of the protection scheme depends on comparing positive
sequence voltage magnitudes at each bus during fault conditions
inside a system protection center to detect the nearest bus to
the fault. Then the absolute differences of positive sequence current
angles are compared for all lines connecting to this bus to
detect the faulted line. The new technique depends on synchronized
phasor measuring technology with high speed communication
system and time transfer GPS system. The simulation of the interconnecting
system is applied on 500 kV Egyptian network using
Matlab Simulink. The new technique can successfully distinguish
between internal and external faults for interconnected lines. The
new protection scheme works as unit protection system for long
transmission lines. The time of fault detection is estimated by 5
msec for all fault conditions and the relay is evaluated as a back
up relay based on the communication speed for data transferring.
FRAMEWORK, IMPLEMENTATION AND ALGORITHM FOR ASYNCHRONOUS POWER SAVING OF UWBM...pijans
Asynchronous Power Saving (APS) technique is one of the unique standard used in Mobile Ad hoc
Networks to conserve more energy in the system. This technique when combined with other power saving
systems like Ultra WideBand System and the use of Directional antenna in MANETs provides astonishing
result. In designing Medium Access Control (MAC), developing a framework and giving a detailed
implementation procedure are among the factors that hinder the process; specifically in MANETs not to
mention the Algorithm. This paper aimed at exploring a standard framework, implementation procedure
and Algorithm for designing an Asynchronous Power Saving Ultra WideBandMeduim Access Control
(UWB-MAC) in MANETs using directional antenna. An implementation procedure that comprises of
transmission, channelization, and receiver pattern of the Physical layer is specified in this research work.
The paper concludes with an algorithm for an Asynchronous Power Saving UWB-MAC using a Steerable
Directional antenna in MANETs.
This paper discusses the time-frequency transform based fault detection and classification of STATCOM (Static synchronous compensator) integrated single circuit transmission line. Here, fast-discrete S-Transform (FDST) based time-frequency transformation is proposed for evaluation of fault detection and classification including STATCOM in transmission line. The STATCOM is placed at mid-point of transmission line. The system starts processing by extracting the current signals from both end of current transformer (CT) connected in transmission line. The current signals from CT’s are fed to FDST to compute the spectral energy (SE) of phase current at both end of the line. The differential spectral energy (DSE) is evaluated by subtracting the SE obtained from sending end and SE obtained from receiving end of the line. The DSE is the key indicator for deciding the fault pattern detection and classification of transmission line. This proposed scheme is simulated using MATLAB simulink R2010a version and successfully tested under various parameter condition such as fault resistance (Rf),source impedance (SI), fault inception angle (FIA) and reverse flow of current. The proposed approach is simple, reliable and efficient as the processing speed is very fast to detect the fault within a cycle period of FDT (fault detection time).
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
DiscoverBPS allows parents to identify their eligible schools, understand the factors impacting their odds of admission, and formulate a ranked list of their top five choices.
This paper modifies the LAEEBA protocol to enhance the performance of the protocol. Eight sensor nodes are deployed on a human body; having equal power and computation capabilities. Sink node is placed at waist. Different nodes are used to measure various activities like Glucose level etc. In the LAEEBA protocol all the nodes are active at every time, but the total usage period of few nodes is very less depending upon the disease covered. This leads to the wastage of the energy. This work uses the Sleep state to save the energy. The sink node will remain active all the times and the other node are in the sleep state. The node which gets selected for the transmission will change its state to the active state; other nodes will remain in the sleep state. The simulation results show that the proposed technique is better than the existing technique. The comparison is done by using the PDR, E2E Delay and throughput. The delay gets decreased and the throughput gets increased. The PDR in the proposed algorithm is greater than the existing algorithm so the proposed algorithm is better than the existing algorithm.
Comparison of Csma Based MAC Protocols of Wireless Sensor Networkspijans
Energy conservation has been an important area of interest in Wireless Sensor networks (WSNs). Medium
Access Control (MAC) protocols play an important role in energy conservation. In this paper, we describe
CSMA based MAC protocols for WSN and analyze the simulation results of these protocols. We
implemented S-MAC, T-MAC, B-MAC, B-MAC+, X-MAC, DMAC and Wise-MAC in TOSSIM, a simulator
which unlike other simulators simulates the same code running on real hardware. Previous surveys mainly
focused on the classification of MAC protocols according to the techniques being used or problem dealt
with and presented a theoretical evaluation of protocols. This paper presents the comparative study of
CSMA based protocols for WSNs, showing which MAC protocol is suitable in a particular environment and
supports the arguments with the simulation results. The comparative study can be used to find the best
suited MAC protocol for wireless sensor networks in different environments.
Integrating device to device network with internet of health things: Towards ...journalBEEI
Among the crucial invention of the 5G is the device to device (D2D) system, whereby cellular gadgets correspond via immediate transfer or by multihop transfer excluding the ground-terminal. It is probable that D2D users are concurrent with human body network. Due to this, we suggested an internet of health things (IoHT) system which enables collaboration work among D2D users and human body indicators. We may regard the power as the most unique source in the wireless body area network (WBAN). The least needed transferring capacity may accomplish a particular degree of function, and minimum capacity for transfer holds a crucial responsibility in decreasing power usage. In this study, we discovered the needed transfer energy of four transferring modes: the straight transferring system, the double-hop transferring system, as well as double increasing coordinated transferring system with Rayleigh medium vanishing in its layout. Besides that, we suggested an energy-competent system named as efficient-power transmission mode selection-based (EPTMS) system. The suggested system chooses suitable transferring system whereby it offers the least needed transferring energy that assures a particular transfer duration. The statistical as well as simulation results shows that the two-master node cooperative protocols (TMNCP), EPTMS may enhance system conduction within the main criteria.
Published in the year 2014, this paper explains how interoperability and decentralized automation system can be achived in electrical distribution grid using IEC61850. Network information from neighboring nodes can help field controllers make decisions faster and more accurately thereby making the distribution network self- healing and reliable.
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksIOSR Journals
Recent advancement in wireless communication has enabled the development of low-cost sensor
networks. The sensor networks can be used for various application areas (such as health, military, home and
etc.,). In earlier research, an energy-efficient cluster-based adaptive time-division multiple access (TDMA)
medium-access-control (MAC) protocol, named EA-TDMA, has been developed. In this work, a new protocol,
named E-BMA, which achieves even better energy efficiency for low and medium traffic by minimizing the idle
time during the contention period has been proposed. Simulation results for the energy consumption of TDMA,
EA-TDMA, BMA, and E-BMA have been presented to demonstrate the superiority of the E-BMA protocols
Survey of Wireless Sensor Network Applicationijsrd.com
Sensor networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and, at the same time, offer numerous challenges due to their peculiarities, primarily the stringent energy constraints to which sensing nodes are typically subjected. The distinguishing traits of sensor networks have a direct impact on the hardware design of the nodes at least four levels: power source, processor, communication hardware, and sensors. Various hardware platforms have already been designed to test the many ideas spawned by the re-search community and to implement applications to virtually all fields of science and technology. We are convinced that CAS will be able to provide a substantial contribution to the development of this exciting field. A wireless sensor network (WSN) has important applications such as remote environmental monitoring and target tracking. This has been enabled by the availability, particularly in recent years, of sensors that are smaller, cheaper, and intelligent. These sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the application's design objectives, cost, hardware, and system constraints. The goal of our survey is to present a comprehensive review of the recent literature since the publication of [I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, 2002]. Following a top-down approach, we give an overview of several new applications and then review the literature on various aspects of WSNs. We classify the problems into three different categories: (1) Internal platform and underlying operating system, (2) Communication protocol stack, and (3) Network services, provisioning, and deployment. We review the major development in these three categories and outline new challenges.
Dear Students
Ingenious techno Solution offers an expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us:
enquiry@ingenioustech.in
044-42046028 or 8428302179.
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...ijaia
In a wireless body area network (WBAN), wireless biomedical sensors are placed around, on, or inside the human body. Given specific requirements, WBANs can significantly improve healthcare, diagnostic monitoring, and other medical services. However, the existing standards such as IEEE 802.11 and IEEE 802.15.4 have some limitations to meet all the requirements of WBANs. Many medium access control (MAC) protocols have been studied so far, most of which are derived from the IEEE 802.15.4 superframe structure with some improvements and adjustments. However, the MAC protocols do not provide the required quality of service (QoS) for various types of traffic in a WBAN. In this paper, a traffic-aware MAC (TA-MAC) protocol for WBANs is proposed, in which time slots are dynamically allocated on the basis of traffic priority, providing the required QoS. According to the performance evaluation results, the proposed TA-MAC is better than IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of transmission time, system throughput, energy efficiency, and collision ratio.
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...IJCNCJournal
In a wireless body area network (WBAN), wireless biomedical sensors are placed around, on, or inside the human body. Given specific requirements, WBANs can significantly improve healthcare, diagnostic monitoring, and other medical services. However, the existing standards such as IEEE 802.11 and IEEE 802.15.4 have some limitations to meet all the requirements of WBANs. Many medium access control (MAC) protocols have been studied so far, most of which are derived from the IEEE 802.15.4 superframe structure with some improvements and adjustments. However, the MAC protocols do not provide the required quality of service (QoS) for various types of traffic in a WBAN. In this paper, a traffic-aware MAC (TA-MAC) protocol for WBANs is proposed, in which time slots are dynamically allocated on the basis of traffic priority, providing the required QoS. According to the performance evaluation results, the proposed TA-MAC is better than IEEE 802.15.4 MAC and the conventional priority
Similar to T tmac energy aware sensor mac protocol for (20)
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
2. III. T-TMAC P ROTOCOL D ESIGN B. Structure of T-TMAC
A. Assumptions and Network Architecture To organize the data exchange between sensors in the
three tier network we propose simple mechanisms that fit the
We propose a heterogeneous and centralized WSN archi- application needs. The sensors of each level follow a dynamic
tecture described in Figure 1. The sensor nodes are organized scheduling (on / off). They wake up when needed and sleep
into groups: Medical (M ), Coordinator (C), Video (V ) and the rest of the time. The scheduling is organized level by level
Sink (S). The network architecture is composed of three as follows: in level 1 between Medical nodes (M ) and their
tiers (Each tier has its own characteristics and requirements): associated Coordinator (C), in level 2 between Coordinators
(M, C), (C, V ) and (V, S). A sensor node may interact with (C) and Video (V ), and finally in level 3 between Video nodes
other nodes in inter-tiers or intra-tiers to achieve the common (V ) and Sink (S).
goal (healthcare monitoring). This type of architecture offers 1) T-TMAC Superframe: We consider an access method
many advantages in terms of capacity, coverage, and reliability close to the IEEE-802.15.4 protocol with some modifications.
compared to single tier Ad hoc networks as described in [16]. Indeed, we adapt the parameters setting of the Superframe
Medical nodes collect and relay physiological medical data according to the requirement of each tier taking into account
(temperature, ECG, etc.), and Video nodes collect and relay the sleep / active scheduling. In the first tier, the commu-
ambient data (image, humidity, etc.). nications between (C) and (M ) nodes are organized into
M M Superframes managed by the coordinator. The Superframes
M M
are delimited by Beacons sent by the coordinator, within it
C
provides information about synchronization, GTS (Guaranteed
Wireless link
V
Time Slot) allocation, etc. The first Superframe (Superframe 0)
Mobility
V V may not contain CFP (Contention Free Period). In fact, there
M Medical node
S
will be only CAP (Contention Access Period) for initialization
C Coordinator node V V
V
(cf. section 2) where medical nodes compete to associate to the
V Video node
Coordinator and reserve some GTSs (cf. section 4). The other
S Sink node
Superframes (1 to n) contain only CFP period and remove the
WBAN 2
CAP. Figure 2 shows the parametrized Superframe.
WBAN 1
CFP CAP CFP CAP
Figure 1. Global network architecture for healthcare monitoring at home
B …. B
We summarize below the main characteristics retained for GTS Superframe 1 GTS Superframe n
this architecture: (i) Low density of sensors: the deployment Figure 2. T-TMAC Superframes
area of the global network is relatively small; we are con-
ducting this study in the case of a house. (ii) The Wireless The number of reserved GTS depends on the type and the
Body Area Network (WBAN) has a cluster / star topology length of data. In the CAP period (called later “Reporting”
that consists of (M) and (C) nodes. (iii) Video nodes are period), the coordinator sends the collected data to (V ) node
stationary, while the WBAN nodes are mobile. (vi) Video to which it is associated. This later, reports data to the Sink.
nodes act as relay nodes (forwarding data received by (C)). During this period, medical nodes can turn off their radios
(vii) The traffic pattern is periodic: "many-to-one" (from the (sleep mode).
bottom to the top (M ) → (C) → (V ) → (S), managed 2) Principle phases of the protocol:
by the Sink. The data flow is initiated by (M ) node. (v) Initialization: Its principle role is to synchronize the four
(C) node is associated with only one video node at a time groups of heterogeneous nodes between each other for mutual
following multi-hop transfer to reach the Sink. Thereafter, we recognition, and to organize data transmission that will be used
propose the appropriate mechanism for mobility management. in the data collection phase. During this phase, the network
To enhance the lifetime of sensors, three principle assumptions is created level by level according to a top-down messages
are considered. transfer from (S) to (M ). At the end of network creation,
• Data aggregation: (C) node aggregates medical data collection phase begins in bottom-up sense from (M ) to (S)
of its WBAN, (V ) node can aggregate data from multiple with periodic data transfer.
Coordinators within range. Data Collection and topology reconfiguration: This phase
• Power tuning: we propose to adjust the power transmission takes place immediately after the topology creation. It rep-
(TPL: Transmission Power Level) of each sensor node in resents the crucial phase of the protocol. In one hand it
the architecture while maintaining hop-by-hop connectivity allows relaying medical data hop by hop to reach the Sink,
between: (M ), (C), (V ) and (S), as shown in Figure 1. This according to the schedule defined in the creation phase. In
leads not only to limit the over-consumption of energy but can other hand, it includes mechanisms for topology maintenance
also leads to limit interferences between nodes [5]. and reconfiguration (cf. section C).
• Sleep / active schedule: nodes operate under activity / 3) Organization of Data Exchange: Both phases operate
inactivity mode. (M ) and (V ) nodes can turn off their radio in different ways. Figure 3 describes for each data flow,
during sensing data. the different messages exchanged between active nodes per
3. level. Initially, the Sink node initiates the topology creation by • Slots request by (M): the activity periods of (M ) nodes
sending "S_Beacon" message to Video (V ) node. This later may differ depending on the data size (temperature, fall
sends an association request message "ASC_RQ" to the Sink, detection, ECG, etc.). Indeed, if a medical node wants to
which accepts the request by sending "ASC_ACK" message. send more than one packet in an activity period, we propose
Thus, the node (V ) is associated with the Sink. Then, the that it sends a request to its associated Coordinator. In fact,
association between (V ) and (C) nodes begins. The node during initialization, (M ) nodes request a certain number of
(V ) sends "B_Beacon" message to node (C), followed by the slots (subsequently appointed GTS in Section 1) via ASC_RQ
exchange of "ASC_RQ" and "ASC_ACK" messages whose message. Then the response will be indicated in C_Beacon
finalize their association. Then the initialization of the WBAN message (with the number of allocated slots), for use in the
network starts between (M ) and (C) nodes with the exchange collection phase. However, in Data collection phase, the re-
of "C_Beacon", "ASC_RQ" and "ASC_ACK" messages. After quest could be integrated in DATA message, and the response
setting up the WBAN network, the data collection begins. will be in the C_Beacon message (in the next cycle). This
The node (M ) collects data, builds the first data message mechanism responds to the dynamic behavior of network.
"DATA" and sends it to its associated Coordinator (C). Then • Reliability: to reduce collisions / transmission errors that
(C) responds with acknowledgment message "ACK". "DATA" could occur during the two phases, it is necessary to retransmit
message will be then relayed by (C) to (V ), and finally all messages (the number of retransmissions is parametrized)
relayed by (V ) to the Sink (S), with the exchange of "DATA" including Beacon messages (except acknowledgments). This
and "ACK" messages. As shown in Figure 3, after receiving leads to increase the reliability of the data exchange.
the "ACK" message, nodes can turn to sleep mode to save • Traffic model: we assume that the traffic model made in
energy. the Data collection phase is periodic with the same period
throughout the network. Each node (M ) is the origin of one
or more data packets in each period (one data flow). (M )
Sink V C M
S_Beacon
ASC_RQ
nodes can also aggregate all medical data in one packet (the
ASC_ACK
B_Beacon
maximum size of PPDU in IEEE 802.15.4 is 127 bytes). To
Topology creation
phase
ASC_RQ
meet the energy needs of the sensors, the activity period should
ASC_ACK
C_Beacon
be optimized and reduced as much as possible.
ASC_RQ
ASC_ACK
C_Beacon
DATA
Start of data
collection of (M) C. Complementary Mechanisms for Topology Maintenance
ACK
B_Beacon
We have improved the topology maintenance with new mech-
Data collection and
reconfiguration phase
DATA
ACK
DATA Reporting anism. Sending Beacon messages periodically offers other ad-
S_Beacon
vantages that meet the application requirements. Particularly,
DATA
ACK
they can be used for mobility management, re-allocation of
Active mode
new slots for WBANs, and topology re-configuration: addition
Sleep mode
Level 3 Level 2 Level 1
of new sensor, and removal of a sensor (depleted battery,
sensor breakdown, etc.). Actually, each level has a manager
Figure 3. Principle mechanisms of the protocol
node that takes decisions while an event occurs: (C) node for
tier 1, (V ) node for tier 2 and (S) node for tier 3.
• Medium access: to minimize collisions in the three tier The mobility of a person has an impact on communications
architecture we manage the medium access as follows: we of tier 1 and tier 2: (i) In tier 1, when 2 WBANs are situated
use “Data reporting” period to manage “inter-tier” interactions in the same range, to reallocate new slots, the (C) node sends
between nodes belonging to different levels (nodes report data C_Beacon message containing the new allocated slots. (ii)
(by level) as shown in Figure 3. However, it is necessary, to In tier 2, the link between (C) and (V ) could be interrupted:
assign the appropriate access method to minimize collisions node (C) should re-associate with a new (V ) node (we can use
between nodes belonging to the same level. In fact, we propose the initialization mechanism via the exchange of B_Beacon,
a hybrid access: ASC_RQ and ASC_ACK messages). Then the new (V ) node
- Slotted access for M and C nodes (WBAN): it provides relays the received data to the Sink (via DATA and ACK
a guaranteed access and a reduced delay for medical data. messages).
- Contention access for (C, V ) and (V, S): this is appropri-
ate for mobility.
• Maintaining synchronization: during the data collection IV. D IMENSIONING AND P ERFORMANCE E VALUATION
phase, the network must operate under a regular schedule to
A. Analytical Model
ensure the transit of the data between levels 1, 2, and 3 in
order to reach correctly the Sink. To this end, we propose that The delay and energy consumption are the most important
Coordinator, Video and Sink nodes send periodically Beacon performance criteria for the application. Below we evaluate the
messages. These messages have a crucial role because they performance of the protocol in the two phases: initialization
permit to resynchronize nodes (to prevent the clock drift and data collection. We used three important parameters:
phenomenon) while keeping the data exchange hop by hop. network size, transmission interval and data size.
4. • Initialization phase analysis: The first association phase Where Tslots is the slot duration and N (i) is the total number
between all medical nodes and the Coordinator is represented of slots allocated to medical node (i). To calculate the energy
by the duration D : consumption in data collection we reuse the formula (7):
D = TC_Beacon +
nM
i=1 DASC (i) (1) EDC = erx · (TC_Beacon + TACK ) + etx · (TDAT A ) (9)
Where DASC (i) is the association duration of one node i and • Other Superframes analysis: In the same way, we can
nM the number of medical nodes. Then, let DASC (i) is the evaluate the upper tiers (C, V ) and (V, S). The principle
mean association time of node i with the (C) of its WBAN: parameter that changes is the number of nodes per level
(nC ,nV ). However, in data collection analysis, the Tcs duration
must be added because (C) and (V ) nodes compete for the
DASC (i) = Tcs + TASC_RQ + TASC_ACK (2) medium access.
Tcs is a random duration before each node i sends its
“ASC_RQ”. To reduce collisions, each node initially senses the B. Hardware Implementation
channel during a random duration Tcs uniformly distributed in • Platforms used: we have implemented T-TMAC in Imote2
the interval [0, Tf ], where Tf is the maximum of the duration. hardware platform. The Imote2 transceiver operates at ISM 2.4
For the sake of simplicity, we consider in a similar manner to
T
GHz frequency, 17.4 mA with (0 dBm) power output and it
[10] the mean value of Tcs : Tcs = 2f (3) allows data rates of up to 250 Kbps. The micro-controller runs
at 13−416MHz. This device requires a supply voltage between
• When the other medical nodes hear the first “ASC_RQ” 3.2−4.5 Volts, and is powered by three 1.5V (AAA) batteries
they must wait for a time equal to (TASC_RQ + in series. The sensing unit includes: temperature, acceleration
TASC_ACK ) before starting to draw again a random and humidity measurements. Two kinds of cards [14] may be
duration Tcs . embedded on Imote2 radio card: Sensing card and Video card.
• The number of reserved GTS (reserved by (M )) depends • Protocol implementation: Figure 4 shows the implemented
on the kind and the length of data. sensor network and Table 1 shows the measured real parameter
The association duration of the other nodes can be written as values of the Imote2. Four important tasks are realized to build
follows: the network architecture and to test the network operations:
power tuning, frames setting (S_Beacons, DATA, ACK, etc.),
Tf
DASC (i)i=1 = DASC (i − 1) + i+3 WBAN implementation (aggregation functions for (C), slots
(4)
+TASC_RQ + TASC_ACK management) and Data forwarding.
Energy consumption: To calculate the energy consumption
PARAMETER VALUE U NIT
of the first node we can reuse the formula (2) by adding
S_Beacon, B_Beacon 11, 7 ms
consumption corresponding to each mode (reception or trans-
CBeacon 12, 8 ms
mission), then we obtain:
TASC_RQ 12, 2 (M ), 11, 7 (C, V ) ms
EASC (i)i=1 = erx · (Tcs + TASC_ACK ) TASC_ACK 11, 9 (M ), 11, 7 (C, V ) ms
(5)
+etx · (TASC_RQ ) TDAT A(M ) , TDAT A(C) , TData(V ) 13, 7 (M ), 14, 9 (C, V ) ms
To calculate the total energy consumed we add the amount TACK 11, 9 (M ), 11, 7 (C, V ) ms
(erx ·TC_Beacon ) that corresponds to the receiving of the Coor- ST 1083 (M 1), 450 (M 2) ms
dinator Beacon (“C_Beacon”) and erx , etx are respectively the etx 74, 2 (92 bytes) mA
energy consumed when receiving and transmitting data. The erx 97, 2 (92 bytes) mA
energy consumption of the other nodes during the association el 56, 4 (listening) mA
phase can be written as follows: epx 37 mA
T epx(sleep) 500 µA
EASC (i)i=1 = erx · [DASC (i − 1) + i+3
f
(6) esgx 6, 4 (procOn : 43, 4) mA
+TASC_ACK ] + etx · (TASC_RQ )
LED 2 (procOn : 39) mA
As shown in Figure 3, in the reporting period, (C) sends N umber of retransmissions 3 /O
the collected data to (V ) to which it is associated. During this T x power (M1 , M2 , C1 , V1 , S) −25, −25, −10, −10, −10 dBm
period, medical nodes may turn off their radios (sleep mode) Table I
to save energy. M EASURED PARAMETER VALUES
• Data collection phase analysis: It corresponds to the data
sending and differs from the association, because during this
time, medical nodes don’t have to compete for the medium V. R ESULTS AND DISCUSSION
access, however they have to send “DATA” messages larger Figure 5 shows the prototyping results for initialization
than “ASC_RQ”. and data collection phases. The graph on the left side shows
the current consumption during initialization of each node
DDC = TC_Beacon + TDAT A + TACK (7)
(M 1), (M 2), (C), (V ) and (S). We see that it increases de-
nM
DT otal = Tslots . i=1 N (i) (8) pending on the nodes position in the architecture. (M ) and (C)
5. nodes are the larger consumers of energy. This is due to the of energy saving. Our on-going work is focused on detailed
waiting time that these nodes spent to receive their appropriate modeling analysis and scenarii evaluation and on the compari-
Beacon message (B_Beacon for (C) and C_Beacon for (M 1) son between T-TMAC and other MAC protocols such as IEEE
and (M 2) (as shown in Figure 3). The graph on right side 802.15.4. Other perspective of this work concerns extending
shows the current consumption of each node during data the protocol with scalable slot allocation mechanism. This
collection phase, during 1 hour of operation, with Deep Sleep mechanism could be appropriate for large applications with
period of 20 seconds. The results show clearly the advantage dense number of nodes such as in the case of hospitals.
of the Deep sleep mode implemented on Imote2 platforms, to Reel prototyping
Reel prototyping
save the energy of all nodes. Analytical model Analytical model
Current consumption during data
Current consumption during
Exchange of messages
initialization (mA)
between neighbor nodes
collection (mA)
0x09 1) "Radio"card
Terminal Serial Dump Sink
1) "Radio card"
1) "Radio" card
2) "Vidéo" card
0x07 0x08
Sniffer PC Xsniffer
V1 V2
Type of node Type of node
1) "Radio" card
0x05 0x06 Figure 6. Comparison of results obtained by the two methods: current
C1 C2
consumption by each node during initialization and data collection phases
1) "Radio" card R EFERENCES
2) "Sensor" card 0x01 0x02 0x03 0x04
[1] H. Alemdar and C. Ersoy,"Wireless Sensor Networks for Healthcare: A
M1 M2 M3 M4 Survey", Elsevier Computer Networks, Volume 54, Issue 15, pp. 2688-
2710, October 2010.
WBAN 1 WBAN 2
[2] G.Z.Yang,"Body Sensor Networks", Springer-Verlag London, 2006.
[3] A. Cerpa, J. Elson, D. Estrin, L. Girod, M. Hamilton and J. Zhao, "Habitat
Figure 4. Implementation of the sensor network
monitoring: Application driver for wireless communications technology",
In Proc. ACM SIGCOMM Workshop on Data Communications, Latin
America and the Caribbean, April 2001.
Consumption of each node in
Sleep mode [4] J.A. Paradiso and T. Starner, "Energy scavenging for mobile and wireless
the network Deep Sleep mode
electronics", Pervasive Computing, Volume 4, Issue 1, pp. 18- 27, 2005.
[5] G. Anastasi, M. Conti, M-D Francesco and A. Passarella, "Energy
Current consumption during data
conservation in wireless sensor networks : A survey", Ad Hoc Networks,
Current consumption during
2009.
initialization (mA)
collection (mA)
[6] I.F. Akyildiz, T. Melodia and K. Chowdhury, "A Survey on Wireless
Multimedia Sensor Networks", Elsevier Computer Networks Journal,
March 2007.
[7] S-K Chong, S. Krishnaswamy and S-W Loke, "A context-aware ap-
proach to conserving energy in wireless sensor networks", Third IEEE
International Conference on Pervasive Computing and Communications
Workshops, PerCom 2005 Workshops, pp. 401- 405, March 2005
Type of node Type of node [8] "Wireless Medium Access Control (MAC) and Physical Layer (PHY)
Specifications for Low-Rate Wireless Personal Area Networks (WPANs)",
IEEE Std. 802.15.4, 2006.
Figure 5. Prototyping results: initialization and data collection phases
[9] J. Polastre, J. Hill and D. Culler, "Versatile low power media access
for wireless sensor networks", In Proceedings of the 2nd international
We estimated analytically the average energy consumption conference on embedded networked Sensor Systems (SenSys’04), pp. 95-
(EASC ) in initialization and Data collection phases. Figure 6 107, New York, 2004.
[10] W. Ye, J. Heidemann and D. Estrin, "Medium access control with co-
shows the comparison between analytical and real prototyping ordinated adaptive sleeping for wireless sensor networks", In IEEE/ACM
results, for one hour of operation of the network, with Deep transactions on networking, vol. 12, no. 3, pp. 493-506, June 2004.
sleep of 20 seconds (180 cycles). We added in the analytical [11] A. El-Hoiydi, J.D. Decotignie, C.C. Enz and E. Leroux, "WiseMAC, an
ultra low power MAC protocol for the wiseNET wireless sensor network",
calculation the values assigned for data sensing ((M 1): tem- SenSys 03, pp. 302-303, 2003.
perature and (M 2): all Data). We show that analytical results [12] V. Rajendran, K. Obraczka and J. J. Garcia-Luna-Aceves, "Energy
fit with the prototyping results. efficient collision-free medium access control for wireless sensor net-
works", In Proceedings of the 1st international conference on embedded
networked Sensor Systems, SenSys ’03, pp. 181-192, 2003.
VI. C ONCLUSION [13] I. Rhee, A. Warrier, M. Aia, J. Min and M.L. Sichitiu, "Z-MAC: a
hybrid MAC for wireless sensor networks", IEEE/ACM Transactions on
In this paper a new MAC protocol for healthcare moni- Networking, pp. 511-524, 2008.
toring is presented. Simple mechanisms based on sleep/active [14] Y. Zatout, E. Campo and J. Llibre, "WSN-HM: Energy-Efficient Wire-
less Sensor Network for Home Monitoring", ISSNIP 09, Melbourne,
schedule are proposed for energy efficiency. We showed the Australia, 2009.
advantages of data aggregation and allocation of slots in a [15] Y. Zatout, R. Kacimi, J-F. Llibre and E. Campo, "Mobility-aware
multi-tiers architecture. The performance evaluation has been Protocol for Wireless Sensor Networks in Health-care Monitoring", Fifth
IEEE International Workshop on Personalized Networks, USA, 2011.
realized with an analytical model and with real prototyping on [16] S. Zhao and D. Raychaudhuri, "Multi tier Ad hoc Mesh Networks with
Imote2 platforms. The results fit very well. From all results, Radio Forwarding Nodes", IEEE Global Telecommunications Conference,
it seems that T-TMAC protocol provide a significant amount IEEE GLOBECOM 2007, Washington, USA, 2007.