The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A large number of WSN applications with bursty traffic have emerged in the recent past such as rare event detection and forest fire monitoring. Bursty traffic in Wireless Sensor Networks (WSNs) offers various challenges in terms of reliability and latency. Unlike periodic monitoring, energy consumption is far more challenging to deal with in WSN applications with bursty traffic due to long periods...
Developing sustainable wireless sensor networks (WSNs) poses a unique challenge in terms of estimating the trade off between autonomous sensor network operations and accessibility to constrained power resources. WSNs are expected to be operational for prolonged periods with minimal intervention. However, this imposes substantial cost in terms of power (battery) requirements in WSNs. Under several...
Vehicular Ad-hoc Networks (VANETs) have a significant potential to enable new applications among multiple types of vehicles. In these networks, the Medium Access Control (MAC) plays an important role in providing an efficient communication channel. Currently, existing standards use the PHY and MAC of IEEE 802.11p, which is fully distributed and based on Carrier Sense Multiple Access with collision...
Several communication protocols based on channel hopping have been proposed for wireless sensor networks. One prominent example is IEEE 802.15.4e, which relies on the concept of time-slotted channel hopping (TSCH). TSCH effectively mitigates poor channel conditions (caused, e.g., by fading) by means of channel changes according to a pre-defined hopping sequence. In order for nodes to participate in...
We propose a new sensor MAC protocol, called Bird- MAC, which is highly energy efficient in the applications where sensors periodically report monitoring status with a very low rate, as in structural health monitoring and static environmental monitoring. Two key design ideas of Bird-MAC are: (a) no need of early-wake-up of transmitters and (b) taking the right balance between synchronization and coordination...
When different technologies use the same frequency bands in close proximity, the resulting interference typically results in performance degradation. Coexistence methods exist, but these are often technology specific and require technology specific interference detection methods. To remove the root cause of the performance degradation, devices should be able to negotiate medium access even when using...
When different technologies use the same frequency bands in close proximity, the resulting interference typically results in performance degradation. Coexistence methods exist, but these are often technology specific and requiring technology specific interference detection methods. To remove the root cause of the performance degradation, devices should be able to negotiate medium access even when...
Cooperative transmission (CT) enables balanced energy consumption among sensor nodes and mitigates the energy hole problem in wireless sensor networks (WSNs). In typical CT enabled medium access control (MAC) protocols, a source node decides to trigger CT or not based on a residual energy comparison between itself and its relay node. In this paper, we propose a receiver initiated CT MAC protocol,...
One of the prevalent methods to achieve clock synchronization in star topology based wireless network, is by periodic transmission of a "Beacon" message from the controller. Using this message other nodes locate the start of the time frame established by the controller. This technique has not been energy efficient in case of low duty cycle applications, where the nodes have to receive the...
Utilising multiple channels can increase the wireless ad hoc network capacity. Receiver Directed Transmission protocol (RDT) is designed to provide multichannel access using a single radio interface. RDT introduces a clever approach to support channel assignment and negotiation without relying on a control channel or time synchronisation. Protocols based on the RDT scheme normally use an extra radio...
Addition of network monitoring process usually leads to higher power consumption since more diagnosis information needs to be exchanged throughout the network. Low Power Listening (LPL) provides a mechanism to prolong the network's lifetime. In this work, we evaluate the impact of LPL on the performance of the network monitoring schemes in WSNs. ContikiMAC is used as the LPL mechanism. Centralized...
In CR networks, to share the conditions whether the channel is occupied or not, many existing researches generally adopt common control channel(CCC) and multiple radio transceivers due to easy design and implementation for multi-hop communications. However, they are resource wasteful because one channel should be always occupied for CCC and the radio transceiver is additionally required. In this paper,...
Newest achievements in underwater acoustic communications (UAC) open fresh possibilities for designing of more and more complex and larger scale underwater acoustics networks (UAN), which consist of bottom, moored and surface stations; autonomous underwater and surface vehicles (AUV and ASV); remotely controlled and manned vehicles. The process of UAN designing goes through stages of i) UAC physical...
Delay-tolerant sensor networks (DTSNs) require efficient MAC transmission strategies that include energy constraint, relaxed latency, mobility support and diverse traffic load. Reservation-based and contention-based MAC schemes are used to improve throughput and energy consumption. In this paper, we propose a traffic adaptive, energy-efficient MAC protocol to achieve better data transmissions and...
Traffic safety and efficiency are the most important motivations for the rapid development of vehicular ad hoc network (VANET) technology. VANET is considered to provide the unified platform and solutions for the intelligent transportation system (ITS). In this paper, a novel method named spectrum penetration is proposed to improve the throughput of multi-channel MAC for VANET. Meanwhile, it can overcome...
In this paper, we propose a novel joint routing and medium access control (MAC) protocol with traffic differentiation, based on quality of service (QoS) for wireless sensor networks (WSNs). This is referred to as joint routing and MAC (JRM) protocol. By leveraging the classical layered approach and combining routing and MAC layer functions, the proposed JRM protocol achieves a solution for energy...
Overhearing and idle listening are two primary sources for unnecessary energy consumption in wireless sensor networks. Although introducing duty cycling in medium access control (MAC) reduces idle listening, it cannot avoid overhearing in a network with multiple contending nodes. In this paper, we propose an event-triggered sleeping (ETS) mechanism for synchronous duty-cycled (DC) MAC protocols in...
Energy efficiency is one of the important critical metrics during protocol design in Wireless Sensor Networks (WSNs). Existing Medium Access Control (MAC) protocols do not take the initial node power into consideration, which may result in unfair power consumption, especially for low-power nodes. This paper presents an energy-efficient dual-layer MAC protocol with adaptive layer duration for WSNs...
In wireless sensor networks (WSNs), conserving the nodes' energy is one the main motivations in designing the medium access control (MAC) layer protocols. A common approach is to allow the nodes to turn their radio modules off periodically according to certain schedules. The nodes that operate on a common schedule and located in a common physical area form a virtual cluster. The nodes in the cluster...
Industrial Internet of Things (IIoT) requires superior reliability from underlying communication technology that consumer wireless technologies often fail to meet. New physical layer techniques have been proposed to enhance the performance of wireless monitoring and control networks to address this challenge. Utilizing polarization diversity techniques through Rotating Polarization Waves (RPW) have...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.