The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present a new medium access control (MAC) protocol called Radio Triggered Sensor MAC (RTM) protocol that is expected for the next generation sensor network. The proposed RTM is a cross-layer MAC protocol which utilizes the passive radio sensor hardware for efficient medium access. The passive radio sensors harvest the energy from the wireless signal and energize itself. The passive...
Wireless Sensor Networks are by nature deployed over an undetermined geographical area with uncountable number of nodes, which makes them best studied through simulation. Due to special characteristics of these networks a number of simulation tools have been introduced by institutes and individuals each with different mechanisms and approaches. Hence, selecting a proper simulator based on the network...
This paper proposes a novel and promising MAC protocol applied for the new wireless sensor network based data collection applications that coordinate with an unmanned aerial vehicle (WSN-UAV). In this system, before communicating with the UAV by the CDMA-based transmission technique, the active sensors are divided into a number of sub groups with an appropriate priority each. We named the protocol...
PMCMTP is a Prioritized Multi-Channel Multi- Time slot MAC protocol that the authors have proposed for allowing to simultaneous use of several frequency channels. This protocol is designed for UWB of IEEE802.15.4a but it can also be used over IEEE802.15.4. In this paper, we design and implement a testbed of this protocol to demonstrate its practical implementability. Due to the unavailability of UWB...
In this paper, we apply a discrete-time Markov Chain model to analyse the performance of IEEE 802.15.4 MAC Protocol with acknowledgement (ACK) frame transmission under unsaturated traffic conditions. We evaluate the system performance in terms of aggregate throughput and average power consumption of a node. Analytical results are substantiated through ns2 simulations. The effects of frame arriving...
This paper proposes a new MAC protocol that is used for a wireless sensor network employing one Unmanned Aerial Vehicle (WSN-UAV). In this protocol, the active sensors are classified into different groups with different priorities that are controlled by the UAV. The level of priorities is closely dependent on the receiving power of the beacon signal at the sensors and the variation trend of this receiving...
Resource allocation in Wireless Sensor Networks (WSNs) is certainly a challenging issue. WSNs are characterized by special features, like energy constraints and limited computing resources. Latest trends define that sensors should be able to provide Quality of Service (QoS) demanding data transmission. A modern approach in bandwidth sharing considers both the packet queue load as well as the traffic...
Duty cycling is a common mechanism for achieving energy efficiency in WSNs. Over the past several years a number of researchers have proposed low-power duty-cycle MAC protocols, but the tradeoff between energy efficiency and latency has been remained a challenging issue. We propose the Express-MAC protocol (EX-MAC) which can guarantee the requirement of the end-to-end transmission latency while conserving...
In the wireless sensor networks (WSNs), Synchronous approaches share the schedule information that specifies the cycle of active and sleep period by the control packets. On the other hand, asynchronous approaches do not exchange the synchronization information to send or receive data. Instead, they employ preamble sampling to do that. In this paper, we compare and analyze synchronous and asynchronous...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.