1,287 research outputs found
Technical Report: Energy Evaluation of preamble Sampling MAC Protocols for Wireless Sensor Networks
The paper presents a simple probabilistic analysis of the energy consumption
in preamble sampling MAC protocols. We validate the analytical results with
simulations. We compare the classical MAC protocols (B-MAC and X-MAC) with
LAMAC, a method proposed in a companion paper. Our analysis highlights the
energy savings achievable with LA-MAC with respect to B-MAC and X-MAC. It also
shows that LA-MAC provides the best performance in the considered case of high
density networks under traffic congestion
Evaluation of WiseMAC and extensions onwireless sensornodes
In the past five years, many energy-efficient medium access protocols for all kinds of wireless networks (WSNs) have been proposed. Some recently developed protocols focus on sensor networks with low traffic requirements are based on so-called preamble sampling or low-power listening. The WiseMAC protocol is one of the first of this kind and still is one of the most energy-efficient MAC protocols for WSNs with low or varying traffic requirements. However, the high energy-efficiency of WiseMAC has shown to come at the cost of a very limited maximum throughput. In this paper, we evaluate the properties and characteristics of a WiseMAC implementation in simulation and on real sensor hardware. We investigate on the energy-consumption of the prototype using state-of-the-art evaluation methodologies. We further propose and examine an enhancement of the protocol designed to improve the traffic-adaptivity of WiseMAC. By conducting both simulation and real-world experiments, we show that the WiseMAC extension achieves a higher maximum throughput at a slightly increased energy cost both in simulation and real-world experiment
Comparison of CSMA based MAC protocols of wireless sensor networks
Energy conservation has been an important area of interest in Wireless Sensor
networks (WSNs). Medium Access Control (MAC) protocols play an important role
in energy conservation. In this paper, we describe CSMA based MAC protocols for
WSN and analyze the simulation results of these protocols. We implemented
S-MAC, T-MAC, B-MAC, B-MAC+, X-MAC, DMAC and Wise-MAC in TOSSIM, a simulator
which unlike other simulators simulates the same code running on real hardware.
Previous surveys mainly focused on the classification of MAC protocols
according to the techniques being used or problem dealt with and presented a
theoretical evaluation of protocols. This paper presents the comparative study
of CSMA based protocols for WSNs, showing which MAC protocol is suitable in a
particular environment and supports the arguments with the simulation results.
The comparative study can be used to find the best suited MAC protocol for
wireless sensor networks in different environments.Comment: International Journal of AdHoc Network Systems, Volume 2, Number 2,
April 201
Adaptive Duty Cycling MAC Protocols Using Closed-Loop Control for Wireless Sensor Networks
The fundamental design goal of wireless sensor MAC protocols is to minimize unnecessary power consumption of the sensor nodes, because of its stringent resource constraints and ultra-power limitation. In existing MAC protocols in wireless sensor networks (WSNs), duty cycling, in which each node periodically cycles between the active and sleep states, has been introduced to reduce unnecessary energy consumption. Existing MAC schemes, however, use a fixed duty cycling regardless of multi-hop communication and traffic fluctuations. On the other hand, there is a tradeoff between energy efficiency and delay caused by duty cycling mechanism in multi-hop communication and existing MAC approaches only tend to improve energy efficiency with sacrificing data delivery delay. In this paper, we propose two different MAC schemes (ADS-MAC and ELA-MAC) using closed-loop control in order to achieve both energy savings and minimal delay in wireless sensor networks. The two proposed MAC schemes, which are synchronous and asynchronous approaches, respectively, utilize an adaptive timer and a successive preload frame with closed-loop control for adaptive duty cycling. As a result, the analysis and the simulation results show that our schemes outperform existing schemes in terms of energy efficiency and delivery delay
Whisper: Fast Flooding for Low-Power Wireless Networks
This paper presents Whisper, a fast and reliable protocol to flood small
amounts of data into a multi-hop network. Whisper relies on three main
cornerstones. First, it embeds the message to be flooded into a signaling
packet that is composed of multiple packlets. A packlet is a portion of the
message payload that mimics the structure of an actual packet. A node must
intercept only one of the packlets to know that there is an ongoing
transmission. Second, Whisper exploits the structure of the signaling packet to
reduce idle listening and, thus, to reduce the radio-on time of the nodes.
Third, it relies on synchronous transmissions to quickly flood the signaling
packet through the network. Our evaluation on the Flocklab testbed shows that
Whisper achieves comparable reliability but significantly lower radio-on time
than Glossy -- a state-of-the-art flooding algorithm. Specifically, Whisper can
disseminate data in FlockLab twice as fast as Glossy with no loss in
reliability. Further, Whisper spends 30% less time in channel sampling compared
to Glossy when no data traffic must be disseminated
A Study of Medium Access Control Protocols for Wireless Body Area Networks
The seamless integration of low-power, miniaturised, invasive/non-invasive
lightweight sensor nodes have contributed to the development of a proactive and
unobtrusive Wireless Body Area Network (WBAN). A WBAN provides long-term health
monitoring of a patient without any constraint on his/her normal dailylife
activities. This monitoring requires low-power operation of
invasive/non-invasive sensor nodes. In other words, a power-efficient Medium
Access Control (MAC) protocol is required to satisfy the stringent WBAN
requirements including low-power consumption. In this paper, we first outline
the WBAN requirements that are important for the design of a low-power MAC
protocol. Then we study low-power MAC protocols proposed/investigated for WBAN
with emphasis on their strengths and weaknesses. We also review different
power-efficient mechanisms for WBAN. In addition, useful suggestions are given
to help the MAC designers to develop a low-power MAC protocol that will satisfy
the stringent WBAN requirements.Comment: 13 pages, 8 figures, 7 table
DTLS Performance in Duty-Cycled Networks
The Datagram Transport Layer Security (DTLS) protocol is the IETF standard
for securing the Internet of Things. The Constrained Application Protocol,
ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for
securing application traffic. There has been much debate in both the
standardization and research communities on the applicability of DTLS to
constrained environments. The main concerns are the communication overhead and
latency of the DTLS handshake, and the memory footprint of a DTLS
implementation. This paper provides a thorough performance evaluation of DTLS
in different duty-cycled networks through real-world experimentation, emulation
and analysis. In particular, we measure the duration of the DTLS handshake when
using three duty cycling link-layer protocols: preamble-sampling, the IEEE
802.15.4 beacon-enabled mode and the IEEE 802.15.4e Time Slotted Channel
Hopping mode. The reported results demonstrate surprisingly poor performance of
DTLS in radio duty-cycled networks. Because a DTLS client and a server exchange
more than 10 signaling packets, the DTLS handshake takes between a handful of
seconds and several tens of seconds, with similar results for different duty
cycling protocols. Moreover, because of their limited memory, typical
constrained nodes can only maintain 3-5 simultaneous DTLS sessions, which
highlights the need for using DTLS parsimoniously.Comment: International Symposium on Personal, Indoor and Mobile Radio
Communications (PIMRC - 2015), IEEE, IEEE, 2015,
http://pimrc2015.eee.hku.hk/index.htm
A low-power opportunistic communication protocol for wearable applications
© 2015 IEEE.Recent trends in wearable applications demand flexible architectures being able to monitor people while they move in free-living environments. Current solutions use either store-download-offline processing or simple communication schemes with real-time streaming of sensor data. This limits the applicability of wearable applications to controlled environments (e.g, clinics, homes, or laboratories), because they need to maintain connectivity with the base station throughout the monitoring process. In this paper, we present the design and implementation of an opportunistic communication framework that simplifies the general use of wearable devices in free-living environments. It relies on a low-power data collection protocol that allows the end user to opportunistically, yet seamlessly manage the transmission of sensor data. We validate the feasibility of the framework by demonstrating its use for swimming, where the normal wireless communication is constantly interfered by the environment
Katakan tidak pada rasuah
Isu atau masalah rasuah menjadi topik utama sama ada di peringkat antarabangsa mahupun di peringkat dalam negara. Pertubuhan Bangsa- bangsa Bersatu menegaskan komitmen komuniti antarabangsa bertegas untuk mencegah dan mengawal rasuah melalui buku bertajuk United Nations Convention against Corruption. Hal yang sama berlaku di Malaysia. Melalui pernyataan visi oleh mantan Perdana Menteri Malaysia, Tun Dr. Mahathir bin Mohamed memberikan indikasi bahawa kerajaan Malaysia komited untuk mencapai aspirasi agar Malaysia dikenali kerana integriti dan bukannya rasuah. Justeru, tujuan penulisan bab ini adalah untuk membincangkan rasuah dari beberapa sudut termasuk perbincangan dari sudut agama Islam, faktor-faktor berlakunya gejala rasuah, dan usaha-usaha yang dijalankan di Malaysia untuk membanteras gejala rasuah. Perkara ini penting bagi mengenalpasti penjawat awam menanamkan keyakinan dalam melaksanakan tanggungjawab dengan menghindari diri daripada rasuah agar mereka sentiasa peka mengutamakan kepentingan awam
RTXP : A Localized Real-Time Mac-Routing Protocol for Wireless Sensor Networks
Protocols developed during the last years for Wireless Sensor Networks (WSNs)
are mainly focused on energy efficiency and autonomous mechanisms (e.g.
self-organization, self-configuration, etc). Nevertheless, with new WSN
applications, appear new QoS requirements such as time constraints. Real-time
applications require the packets to be delivered before a known time bound
which depends on the application requirements. We particularly focus on
applications which consist in alarms sent to the sink node. We propose
Real-Time X-layer Protocol (RTXP), a real-time communication protocol. To the
best of our knowledge, RTXP is the first MAC and routing real-time
communication protocol that is not centralized, but instead relies only on
local information. The solution is cross-layer (X-layer) because it allows to
control the delays due to MAC and Routing layers interactions. RTXP uses a
suited hop-count-based Virtual Coordinate System which allows deterministic
medium access and forwarder selection. In this paper we describe the protocol
mechanisms. We give theoretical bound on the end-to-end delay and the capacity
of the protocol. Intensive simulation results confirm the theoretical
predictions and allow to compare with a real-time centralized solution. RTXP is
also simulated under harsh radio channel, in this case the radio link
introduces probabilistic behavior. Nevertheless, we show that RTXP it performs
better than a non-deterministic solution. It thus advocates for the usefulness
of designing real-time (deterministic) protocols even for highly unreliable
networks such as WSNs
- …