Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
An adaptive energy-efficient MAC protocol for wireless sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Medium access control with coordinated adaptive sleeping for wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
Versatile low power media access for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
X-MAC: a short preamble MAC protocol for duty-cycled wireless sensor networks
Proceedings of the 4th international conference on Embedded networked sensor systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Traffic-Aware MAC Protocol Using Adaptive Duty Cycle for Wireless Sensor Networks
Information Networking. Towards Ubiquitous Networking and Services
Hi-index | 0.00 |
Recently, Wireless Sensor Networks (WSN) have come to require an energy efficiency and a guaranteed delivery delay time, on the contrary to traditional Medium Access Control (MAC) protocols that have mostly aimed for a high throughput. In order to satisfy these new significant requirements, many of the newer WSN MAC protocols employ duty cycled mechanism, in order to improve energy efficient techniques in the MAC layer. This duty cycled mechanism is oriented to the toggling of the transceiver's conditions composed of the wakeup and sleep states. However, regrettably, the channel conditions of a wireless network can be changed anytime according to the traffic congestion. If a high congestion is present, an insufficient wakeup period can cause the successful communication ratio to worsen. This can be a weakness in previous duty cycled mechanisms due to their lack of consideration for the network conditions. Therefore, we have devised and designed an efficient new scheme, the adaptable wakeup period, which can resolve this issue. We present analyses and the simulated results of our work, together with a comparison between the synchronous and asynchronous MAC protocols, using two types of analysis models that we suggest.