• 제목/요약/키워드: Analysis of MAC

검색결과 562건 처리시간 0.03초

Adaptive Duty Cycling MAC Protocols Using Closed-Loop Control for Wireless Sensor Networks

  • Kim, Jae-Hyun;Kim, Seog-Gyu;Lee, Jai-Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권1호
    • /
    • pp.105-122
    • /
    • 2011
  • The fundamental design goal of wireless sensor MAC protocols is to minimize unnecessary power consumption of the sensor nodes, because of its stringent resource constraints and ultra-power limitation. In existing MAC protocols in wireless sensor networks (WSNs), duty cycling, in which each node periodically cycles between the active and sleep states, has been introduced to reduce unnecessary energy consumption. Existing MAC schemes, however, use a fixed duty cycling regardless of multi-hop communication and traffic fluctuations. On the other hand, there is a tradeoff between energy efficiency and delay caused by duty cycling mechanism in multi-hop communication and existing MAC approaches only tend to improve energy efficiency with sacrificing data delivery delay. In this paper, we propose two different MAC schemes (ADS-MAC and ELA-MAC) using closed-loop control in order to achieve both energy savings and minimal delay in wireless sensor networks. The two proposed MAC schemes, which are synchronous and asynchronous approaches, respectively, utilize an adaptive timer and a successive preload frame with closed-loop control for adaptive duty cycling. As a result, the analysis and the simulation results show that our schemes outperform existing schemes in terms of energy efficiency and delivery delay.

The comparative analysis of the MAC Protocol in wireless sensor networks (무선 센서 네트워크에서의 MAC 프로토콜 비교 분석)

  • Lee, Sang-Hun;Lee, Jong-Yong;Park, Jae-Sung;Kim, Jin-Su
    • Proceedings of the KAIS Fall Conference
    • /
    • 한국산학기술학회 2009년도 춘계학술발표논문집
    • /
    • pp.195-200
    • /
    • 2009
  • 무선 센서 네트워크에서의 통신은 여러 계층으로 나뉘어 각 계층별 역할을 수행하므로 무선통신이 가능할 수 있다. 센서 네트워크에서의 통신계층 중 하나인 MAC(Medium Access Control)계층은 데이터의 에러, 흐름을 제어하고 자원을 관리하기 위해서 사용되며 MAC Protocol을 사용하여 센서 노드간의 통신을 보장한다. 전통적인 MAC Protocol은 패킷 처리율의 최대화, 지연의 최소화 및 공평성 제공이 주된 목적으로 설계된 된다. 무선 센서 네트워크에서 MAC 프로토콜은 응용에 따라 차이는 있으나 대부분 많은 센서 노드들로 구성된다. 또한 멀티 홉 통신을 하기 때문에 센서 장치의 제한된 배터리 수명으로 인해 소모되는 에너지를 최소화 하여 네트워크 에너지의 효율성을 높이는 것이 가장 큰 목적이다. 본 논문에서는 에너지 효율성 측면을 강조하기 위해서 MAC프로토콜의 문제점을 알아보고 그 중에서 최우선적으로 요구되는 에너지 효율성에 대해서 S-MAC, T-MAC의 비교와 T-MAC의 확률값을 변경에 따른 어느 경우가 가장 효율적인지 active time을 통하여 알아보았다.

  • PDF

A State Management MAC Protocol for Vehicle to Vehicle Communication Using Directional Antenna (차량 간 통신 환경에 적합한 방향성 안테나를 이용한 상태관리 MAC Protocol)

  • Park, Sang-Wook;Jung, Sung-Dae;Jung, Jong-In;Lee, Sang-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제33권5A호
    • /
    • pp.526-535
    • /
    • 2008
  • Recently, several MAC protocols using the directional antennas have been proposed for wireless mobile ad hoc networks. In the theory, it can improve spatial reuse and communication throughput in the Mobile Ad-hoc networks. But, or However even though direction transmissions using the Directional MAC protocol(D-MAC) are expected to provide significant improvements, they causes other problems such as deafness problem and fairness problem. In this paper, we analyze the D-MAC protocol in Mobile Ad-hoc network for Vehicle to vehicle(V2V) communication. Through the results of the analysis, We the fundamental problem of D-MAC protocol and finally we suggest new D-MAC protocol for V2V networks.

Analysis of Power Efficiency in according to S-MAC attack in the Sensor Network (센서네트워크에서 S-MAC 공격에 따른 전력 효율성 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • 제10권2호
    • /
    • pp.345-350
    • /
    • 2009
  • In this paper, it is reviewed vulnerability of security in S-MAC communication protocol of sensor network, and analyzed in the respect of power efficiency, which is consumed at each stage of communication procedure in according to vulnerability of denial of service. Therefore, from research results, it can be induced the need of authentication scheme, which is considered reliability, efficiency and security of normal S-MAC communication.

Approaches to the Design and Modularization for Implementing Multimedia-based Underwater Communication to Use Integrated MAC (통합 MAC을 이용하는 다중 매체 기반 수중 통신 구현을 위한 설계 및 모듈화 접근방법)

  • You, Dongsun;Kim, Changhwa
    • Journal of Korea Multimedia Society
    • /
    • 제22권11호
    • /
    • pp.1259-1268
    • /
    • 2019
  • Recently, Communication media have been developed for the underwater communication in underwater environments where the underwater communication failures occur frequently. Although the underwater communication by one medium is not stable due to the influence of the underwater environment, the use of various communication media can complement each other and so this makes the underwater communication more stable. For this reason, this paper proposes approaches to the design and implementation of integrated MAC for complementing individual unstable underwater communications. In addition this paper presents the comparison and analysis on each of the proposed approaches so to be able to provide guidelines to designers and implementers of integrated MAC.

WBAN MAC Protocols- Non-Saturation Modeling and Performance Analysis

  • Khan, Pervez;Ullah, Niamat;Kim, Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권3호
    • /
    • pp.1462-1476
    • /
    • 2017
  • The current literature on discrete-time Markov chain (DTMC) based analysis of IEEE 802.15.6 MAC protocols for wireless body area networks (WBANs), do not consider the ACK timeout state, wherein the colliding nodes check the ill fate of their transmissions, while other contending nodes perform backoff check that slot as usual. In this paper, our DTMC model accurately captures the carrier sense multiple access with collision avoidance (CSMA/CA) mechanism of IEEE 802.15.6 medium access control (MAC) and allows the contending nodes performing backoff to utilize the ACK timeout slot during collisions. The compared rigorous results are obtained by considering a non-ideal channel in non-saturation conditions, and CSMA/CA parameters pertaining to UWB PHY of IEEE 802.15.6 MAC protocols.

MAC Throughput Analysis of MAC Aggregation and Block ACK in IEEE 802.11n (MAC 프레임 집합 전송과 블록 ACK 사용에 따른 IEEE 802.11n 수율 분석)

  • Moon, Kuk-Hyun;Chung, Min-Young;Cho, Kang-Yun
    • Proceedings of the KIEE Conference
    • /
    • 대한전기학회 2006년 학술대회 논문집 정보 및 제어부문
    • /
    • pp.467-469
    • /
    • 2006
  • In wireless network environments, as users' demands on high-speed data communications due to increase of multi-media services, the necessity of new high-speed WLAN technologies has appeared. Nowaday, IEEE is standardizing a new WLAN protocol caned as IEEE 802.11n. To effectively use wireless resources, IEEE 802.11n introduces MAC aggregation function which is similar to that in IEEE 802.11e. In case of transmitting several frames without MAC aggregation, the frames include individual frame header and trailer, and their corresponding acknowledgement frames can appear on wireless link. However, if they are aggregated into single MAC frame, we can reduce the number of used bits due to frame headers/trailers and also remove redundant acknowledgement frames. In this paper, we explain two different MAC frame aggregation methods for IEEE 802.11e and IEEE 802.11n and evaluate their throughput by simulations.

  • PDF

An Iterative Analysis of Single-Hop B-MAC Networks Under Poisson Traffic

  • Jung, Sung-Hwan;Choi, Nak-Jung;Kwon, Tae-Kyoung
    • Journal of Communications and Networks
    • /
    • 제14권1호
    • /
    • pp.40-50
    • /
    • 2012
  • The Berkeley-medium access control (B-MAC) is a lightweight, configurable and asynchronous duty cycle medium access control (MAC) protocol in wireless sensor networks. This article presents an analytic modelling of single-hop B-MAC protocol under a Poisson traffic assumption.Our model considers important B-MAC parameters such as the sleep cycle, the two stage backoff mechanism, and the extended preamble. The service delay of an arriving packet and the energy consumption are calculated by an iterative method. The simulation results verify that the proposed analytic model can accurately estimate the performance of single-hop B-MAC with different operating environments.

EEPB-MAC: Energy Efficient & Priority-Based MAC Protocol for Energy Harvesting Wireless Sensor Networks (에너지 수확 무선 센서 네트워크에서 에너지 효율 및 우선순위 기반의 MAC 프로토콜)

  • Kim, Seong-Cheol;Jeon, Jun-Heon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제17권3호
    • /
    • pp.755-761
    • /
    • 2013
  • Medium access control (MAC) protocols for wireless sensor networks make sensor nodes on state for energy-efficiency only when necessary. In this paper we present an energy efficient priority-based MAC protocol for energy-harvesting Wireless Sensor Networks (WSNs). For support priority-based packet transmission the proposed EEPB-MAC protocol uses the modified IEEE 802.15.4 beacon frames including priority bit, sender node address, and NAV value fields. A receiver node periodically wakes up, receives sender beacon frames, selects data sending sender, and broadcasts a beacon frame containing the selected sender's address. A receiver node selects sender node according to sender's data priority. A receiver nodes also adjust wake up period based on their energy states. Hence, the energy consumption of receiver node can be minimized. Through simulations and analytical analysis, we evaluate the performance of our proposed the EEPB-MAC protocol and compare it against the previous MACs. Results have shown that our protocol outperforms other MAC in terms of energy consumption, higher priority packet delivery delay.

A Bursty Traffics Friendly MAC Protocol in Wireless Sensor Networks (무선센서 네트워크에서 버스티 트래픽에 적합한 MAC 프로토콜)

  • Lee, Jin-young;Kim, Seong-cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제22권5호
    • /
    • pp.772-778
    • /
    • 2018
  • Due to the recent advances in computing, communication and micro-electromechanical technology, Wireless Sensor Networks (WSNs) applications have been extended from military to many commercial areas such as object tracking, wire detection, and vehicular sensor networks. In some applications bursty data from many sensor nodes may be generated and the generated data from the monitoring area may be sent in a limited time to the final destination, sink node. In this paper, we present a BTF-MAC protocol adequate for WSNs applications in which bursty data packets are required to be transmitted in a limited time. The BTF-MAC is a synchronous duty-cycle MAC protocol and uses a slot-reserved and operational period extension mechanism adapted to the traffics. Our numerical analysis and simulation results show that BTF-MAC outperforms other related protocols such as DW-MAC and SR-MAC in terms of energy consumption and transmission delay.