6,346 research outputs found
Wireless Sensor Networks:A case study for Energy Efficient Environmental Monitoring
Energy efficiency is a key issue for wireless sensor networks, since sensors nodes can often be powered by non-renewable batteries. In this paper, we examine four MAC protocols in terms of energy consumption, throughput and energy efficiency. A forest fire detection application has been simulated using the well-known ns-2 in order to fully evaluate these protocols
A Study of Medium Access Control Protocols for Wireless Body Area Networks
The seamless integration of low-power, miniaturised, invasive/non-invasive
lightweight sensor nodes have contributed to the development of a proactive and
unobtrusive Wireless Body Area Network (WBAN). A WBAN provides long-term health
monitoring of a patient without any constraint on his/her normal dailylife
activities. This monitoring requires low-power operation of
invasive/non-invasive sensor nodes. In other words, a power-efficient Medium
Access Control (MAC) protocol is required to satisfy the stringent WBAN
requirements including low-power consumption. In this paper, we first outline
the WBAN requirements that are important for the design of a low-power MAC
protocol. Then we study low-power MAC protocols proposed/investigated for WBAN
with emphasis on their strengths and weaknesses. We also review different
power-efficient mechanisms for WBAN. In addition, useful suggestions are given
to help the MAC designers to develop a low-power MAC protocol that will satisfy
the stringent WBAN requirements.Comment: 13 pages, 8 figures, 7 table
Multi-Channel Scheduling for Fast Convergecast in Wireless Sensor Networks
We explore the following fundamental question -
how fast can information be collected from a wireless sensor
network? We consider a number of design parameters such
as, power control, time and frequency scheduling, and routing.
There are essentially two factors that hinder efficient data
collection - interference and the half-duplex single-transceiver
radios. We show that while power control helps in reducing the
number of transmission slots to complete a convergecast under a
single frequency channel, scheduling transmissions on different
frequency channels is more efficient in mitigating the effects of
interference (empirically, 6 channels suffice for most 100-node
networks). With these observations, we define a receiver-based
channel assignment problem, and prove it to be NP-complete on
general graphs. We then introduce a greedy channel assignment
algorithm that efficiently eliminates interference, and compare
its performance with other existing schemes via simulations.
Once the interference is completely eliminated, we show that
with half-duplex single-transceiver radios the achievable schedule
length is lower-bounded by max(2nk − 1,N), where nk is the
maximum number of nodes on any subtree and N is the number
of nodes in the network. We modify an existing distributed time
slot assignment algorithm to achieve this bound when a suitable
balanced routing scheme is employed. Through extensive simulations,
we demonstrate that convergecast can be completed within
up to 50% less time slots, in 100-node networks, using multiple
channels as compared to that with single-channel communication.
Finally, we also demonstrate further improvements that are
possible when the sink is equipped with multiple transceivers
or when there are multiple sinks to collect data
Scheduling Sensors for Guaranteed Sparse Coverage
Sensor networks are particularly applicable to the tracking of objects in
motion. For such applications, it may not necessary that the whole region be
covered by sensors as long as the uncovered region is not too large. This
notion has been formalized by Balasubramanian et.al. as the problem of
-weak coverage. This model of coverage provides guarantees about the
regions in which the objects may move undetected. In this paper, we analyse the
theoretical aspects of the problem and provide guarantees about the lifetime
achievable. We introduce a number of practical algorithms and analyse their
significance. The main contribution is a novel linear programming based
algorithm which provides near-optimal lifetime. Through extensive
experimentation, we analyse the performance of these algorithms based on
several parameters defined
Recommended from our members
Routing protocols and quality of services for security based applications using wireless video sensor networks
Wireless video sensor networks have been a hot topic in recent years; the monitoring capability is the central feature of the services offered by a wireless video sensor network can be classified into three major categories: monitoring, alerting, and information on-demand. These features have been applied to a large number of applications related to the environment
(agriculture, water, forest and fire detection), military, buildings, health (elderly people and home monitoring), disaster relief, area and industrial monitoring. Security applications oriented toward critical infrastructures and disaster relief are very important applications that many countries have identified as critical in the near future. This paper aims to design a cross layer based protocol to provide the required quality of services for security related applications using wireless video sensor networks. Energy saving, delay and reliability for the delivered data are crucial in the proposed application. Simulation results show that the proposed cross layer based protocol offers a good performance in term of providing the required quality of services for the proposed application
- …