Preview

Multichannel Mac Protocols for Wireless Networks

Powerful Essays
Open Document
Open Document
4637 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Multichannel Mac Protocols for Wireless Networks
MMAC: A Mobility-Adaptive, Collision-Free MAC Protocol for Wireless Sensor Networks
Muneeb Ali, Tashfeen Suleman, and Zartash Afzal Uzmi Computer Science Department, LUMS {muneeb,tashfeens,zartash}@lums.edu.pk
Abstract
Mobility in wireless sensor networks poses unique challenges to the medium access control (MAC) protocol design. Previous MAC protocols for sensor networks assume static sensor nodes and focus on energyefficiency. In this paper, we present a mobilityadaptive, collision-free medium access control protocol (MMAC) for mobile sensor networks. MMAC caters for both weak mobility (e.g., topology changes, node joins, and node failures) and strong mobility (e.g., concurrent node joins and failures, and physical mobility of nodes). MMAC is a scheduling-based protocol and thus it guarantees collision avoidance. MMAC allows nodes the transmission rights at particular timeslots based on the traffic information and mobility pattern of the nodes. Simulation results indicate that the performance of MMAC is equivalent to that of TRAMA [1] in static sensor network environments. In sensor networks with mobile nodes or high network dynamics, MMAC outperforms existing MAC protocols, like TRAMA and S-MAC [2], in terms of energyefficiency, delay, and packet delivery. sensor nodes are static. Researchers have, however, envisioned sensor networks with mobile sensor nodes [5]. In this paper, we show that the current MAC protocols for wireless sensor networks are not suited for mobile sensor network environments, and present a mobility-adaptive, collision-free medium access control (MMAC) protocol for sensor networks. MMAC follows the design principles of TRAMA [1] a scheduling-based MAC protocol for static multi-hop wireless sensor networks. In mobile environments the fixed frame time of current MAC protocols causes performance degradation in a number of ways: a) the mobile nodes, upon joining a new neighborhood, need to wait for a long time before they can send data, b) in

You May Also Find These Documents Helpful

  • Good Essays

    of nodes with channels assigned. In this paper, our goal is to design highly-efficient and localized protocols for CA. In addition, we want to maximize node connectivity after CA, which is important for packet…

    • 8009 Words
    • 33 Pages
    Good Essays
  • Good Essays

    The advent of wireless technology is due in part to the ever increasing demands for mobility and flexibility in our daily lives. A wireless LAN (WLAN) is based on cellular architecture where the system is subdivided into cells,…

    • 929 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    LYT2 Task2

    • 4061 Words
    • 12 Pages

    This book provides generic approach architecture for the implementation of the wireless sensor networks. It proposes for a move into the routing protocols and improvement of networks through routing optimization, medium access and control of power while at the same time fulfilling the daily goals. It emphasizes on the importance to node information in the many wireless sensor network applications as well as the communication protocol. This solution can be applicable in the case of NHS since the use of wireless sensor networks can greatly help in transferring large data files, including the imaging files to…

    • 4061 Words
    • 12 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Wireless networks have become very popular in many households this is in part because it makes things convenient for the user. They physically do not have to sit in front of a computer to get access to it. I have a wireless network in my home and it is at times very useful. I have the freedom to move around and access the internet from anywhere in my home. I do not have to sit in front of my computer and use the computer which would be wired. With that one advantage will also come a disadvantage one that comes to mind is video streaming which would be a little stronger coming from a wired network. New security has been configured also and would make it hard to access as it would have to be in a certain operating distance. In doing my research I came across a variety of hotspots. These hotspots are businesses that will offer wireless internet access to its customers. Some of these businesses will offer this access free while you are in their establishment others will offer a paid service fee for the privilege to access the internet. In my research I found that one establishment The FedEx Office requires a fee of $29.99 a month to use it wireless networks. Two others that I researched the local train station and a Dunkin Donuts offers its customers free wireless access. All three also provide a user agreement and in that agreement it states that the establishment is not responsible for the user content and is not liable for what downloads that the user will…

    • 281 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Wireless Networks

    • 1176 Words
    • 5 Pages

    your response to the following: Imagine you are the network administrator of aWLAN. Give an example of how knowing the 10’s and 3’s Rules of RF Math can helpyou on the job. Include your answers to Case Project 3-5 in your response. Show your work…

    • 1176 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    (c) Data throughput in sensor networks is a bigger concern than that in mobile ad hoc networks.…

    • 1413 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    LitePoint. (2013) IEEE 802.11ac:What Does it Mean for Test?. [Online] Available from: www.litepoint.com/whitepaper/80211ac_Whitepaper.pdf.[Accessed: 6th October 2014].…

    • 2329 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Riordan Enterprises has requested to look into the possibility of adding wireless capabilities to their existing network. The need for wireless is understandable. It enables employees to be productive from anywhere. If they need to travel to a potential customer in Montana, or are at a plastics conference in Hawaii the ability to connect to the Riordan’s intranet is vital. Not only does it allow the employee to continue to stay connected with work, it also allows them to share the intranet and all it has to offer to potential clients, as well as offering those potential clients use of the system for easier ordering and up to date financial and tracking information regarding their purchases. This is why a Virtual Private Network would be a good tool to add to the Riordan tool bag. It will allow the current network to stay intact as well as adding the ability to access the network from anywhere. This adds in the efficiency and productivity of Riordan and its many employees and global locations.…

    • 2267 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Network Simulator

    • 1018 Words
    • 5 Pages

    IEEE 802.11 is the de facto standard for WLANs. It specifies both the medium access control (MAC) and the physical (PHY) layers for WLANs. The MAC layer operates on top of one of several physical layers. Medium access is performed using Carrier Sense Multiple Access with Collision Avoidance. However, simple CSMA is susceptible to the hidden node problem, especially in so called ad hoc networks where a node may communicate directly with every other node in range or using intermediate nodes as relays otherwise. Hidden nodes cause costly packet collisions and thus significantly affect network performance. In order to combat the hidden node problem, a mechanism known as Request to Send/Clear to Send (RTS/CTS) handshake is often used. RTS/CTS mechanism is supported in the IEEE 802.11 family of standards. The RTS/CTS mechanism was initially proposed in a protocol called Multiple- Access with Collision Avoidance (MACA). From a network point of view, one of the primary reasons for using the RTS/CTS mechanism is to avoid network congestion resulting from frequent packet collisions. Figure 1 depicts a conceptual “throughput versus Packet Size” curve for a network. In the presence of congestion, the throughput goes to zero as the Packet Size is increased beyond a certain value. A properly designed network, on the other hand, maintains the maximum throughput as the Packet Size goes to infinity.…

    • 1018 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Satellite Packet Communication-Multiple Access Protocols and Performance.- Simon S.Lam, member, IEEE (IEEE transactions on communications, vol. com-27, no.10, october 1979).…

    • 3639 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Abstract—In this paper, we present AEROMAN (Architecture to Evaluate Routing PrOtocols for Multi-hop Ad-hoc Networks) which is designed and implemented for evaluation of routing protocols for multi-hop wireless networks. AEROMAN uses QOMET, a wireless link emulation tool, to compute parameters of wireless links, such as bandwidth, delay, packet loss rate, in contention-free conditions. In order to take into account the properties of contention-based media access for wireless channel, AEROMAN uses an Adaptive Traffic (AT) model to emulate the sharing feature of CSMA/CA mechanism in IEEE 802.11. The evaluations show that the AEROMAN with AT model effectively captures the characteristics of wireless communications. Several experiments using OLSR as routing protocol with different routing metrics are performed in order to illustrate the main features and usability of AEROMAN. Index Terms—emulation, modeling, real-time, testbed, routing, wireless networks.…

    • 5810 Words
    • 24 Pages
    Powerful Essays
  • Powerful Essays

    and the well-known standard routing protocols including Adhoc On-demand Distance Vector (AODV) and DSR based on…

    • 4518 Words
    • 27 Pages
    Powerful Essays
  • Good Essays

    Abstract—ZigBee, a unique communication standard designed for low-rate wireless personal area networks, has extremely low complexity, cost, and power consumption for wireless connectivity of inexpensive, portable, and moving devices. ZigBee uses the IEEE 802.15.4 standard as its communication protocol for medium access control (MAC) layer and physical (PHY) layer. The IEEE 802.15.4 MAC layer achieves duty-cycle operations by setting two system parameters, ���������������������������� (����) and ������������������ ������������������ (����), to achieve low power consumption for ZigBee devices. This study comprehensively analyzes IEEE 802.15.4 duty-cycle operation. Specifically, a novel analytical model that accommodates a general traffic distribution is developed. An NS-2 based simulation model, which is validated by the developed analytical model is also proposed. Through the experiments conducted by the analytical and simulation models, some important performance-evaluation insights are gained that can be used as guidelines for future low-power ZigBee network deployment. Index Terms—IEEE 802.15.4, ZigBee, low-power operation, performance analysis.…

    • 9099 Words
    • 37 Pages
    Good Essays
  • Powerful Essays

    A Mobile Ad hoc Networks (MANETs) stand for a structure of wireless mobile hosts that can dynamically and liberally self organize in to temporary and uninformed network topologies, allocating devices and people to faultlessly communicate without any kinds of pre-existing design of communication structure. The appliances of these networks are extremely necessary in areas like lecture theatres, conference halls, battlefields emergency rescue services, battlefields and other places whenever it’s become very difficult to employment the network infrastructures. In a Mobile Ad Hoc Network the network may experience unpredictable and rapid topology changes because of arbitrarily node movement. Routing paths in Mobile Ad hoc Network possibly have multiple hops, and each node in Mobile Ad hoc Network has the responsibility to perform like a router [1]. So each node in the Ad hoc networking is responsible for forwarding data packets to other nodes [2]. Routing in Mobile Ad hoc Network has been a tough job ever while the wireless mobile networks came into reality because of frequently change in network. Development of dynamic routing protocols is a huge challenge in the design of Ad hoc networks which can proficiently find routes among. These protocols are classified into hybrid, pro-active and reactive routing protocols [3] and the identification of the most appropriate routing protocol to be used depends on various facts which are scalability, traffic and mobility models and quality of service.…

    • 8219 Words
    • 33 Pages
    Powerful Essays
  • Powerful Essays

    This paper will discuss the Wireless Ethernet product produced by Cisco, the Aironet 3500 wireless access point. The Aironet 3500 access points are designed for installation into areas of wireless frequency saturation. They are an ideal solution for businesses, hospitals and universities plagued by interference devices such as microwave ovens, rogue devices such as phones and digital tablets. Universities can take advantage of the technology by deploying the APs on dorm floors knowing they have the capability to classify the myriad of devices students bring to campus which would normally congest the wireless network.…

    • 1599 Words
    • 7 Pages
    Powerful Essays