scholarly journals A Talk-Listen-Ack Beaconing Strategy for Neighbor Discovery Protocols in Wireless Sensor Networks

Sensors ◽  
2022 ◽  
Vol 22 (1) ◽  
pp. 377
Author(s):  
Zhong Shen ◽  
Yongkun Yao ◽  
Kun Zhu ◽  
Xin Xiang

Neighbor discovery is a fundamental function for sensor networking. Sensor nodes discover each other by sending and receiving beacons. Although many time-slotted neighbor discovery protocols (NDPs) have been proposed, the theoretical discovery latency is measured by the number of time slots rather than the unit of time. Generally, the actual discovery latency of a NDP is proportional to its theoretical discovery latency and slot length, and inversely proportional to the discovery probability. Therefore, it is desired to increase discovery probability while reducing slot length. This task, however, is challenging because the slot length and the discovery probability are two conflicting factors, and they mainly depend on the beaconing strategy used. In this paper, we propose a new beaconing strategy, called talk-listen-ack beaconing (TLA). We analyze the discovery probability of TLA by using a fine-grained slot model. Further, we also analyze the discovery probability of TLA that uses random backoff mechanism to avoid persistent collisions. Simulation and experimental results show that, compared with the 2-Beacon approach that has been widely used in time-slotted NDPs, TLA can achieve a high discovery probability even in a short time slot. TLA is a generic beaconing strategy that can be applied to different slotted NDPs to reduce their discovery latency.

2014 ◽  
Vol 23 (07) ◽  
pp. 1450100 ◽  
Author(s):  
RIDHA OUNI ◽  
ABDULLAH AL-DHELAAN ◽  
RAFIK LOUATI

The wireless sensor networks (WSNs) are formed by a large number of sensor nodes working together to provide a specific duty. However, the low energy capacity assigned to each node prompts users to look at an important design challenge which is lifetime maximization. Especially the availability of nodes, the sensor coverage, and the connectivity have been included in discussions on network lifetime. Therefore, designing effective techniques that conserve scarce energy resources is a critical issue in WSNs. In this regard, we are interested in developing various mechanisms to save energy based on the constraints involved for energy consumption in WSNs. Three mechanisms are proposed to reduce the number of control packets responsible for path discovery, optimize diffusion area, and balance the load distribution in the network.


1998 ◽  
Vol 13 (5) ◽  
pp. 1255-1259 ◽  
Author(s):  
Sung Kang Hur ◽  
Sang H. Yoo ◽  
Joanna R. Groza ◽  
Jung Man Doh ◽  
Kazuo Yamazaki ◽  
...  

Functionally gradient materials (FGM) were prepared using layers of ZrO2 –3 mol% Y2O3 ceramic and NiCrAlY powders. A fine-grained zirconia powder was chosen to lower the ceramic sintering temperature and achieve simultaneous metal and ceramic densification. Consolidation of FGM's was achieved by a short time field-assisted sintering technique. Sintering was performed either at a constant temperature or in a temperature gradient by using punches made of different materials (i.e., one graphite and one tungsten). A temperature gradient of at least 100 °C was required with a low value of 1200 °C at the metal end and exceeding 1300 °C at the ceramic end. Increasing the number of intermediate layers alleviates some of the cracks formed during sintering due to different coefficients of thermal expansion.


Author(s):  
Yogesh Kumar Meena ◽  
Aditya Trivedi

In the last few decades, the Wireless Sensor Network (WSN) paradigm has received huge interest from the industry and academia. Wireless sensor networking is used in various fields like weather monitoring, wildfire detection/monitoring, battlefield surveillance, security systems, military applications, etc. Moreover, various networking and technical issues still need to be addressed for successful deployment of WSN, especially power management. In this chapter, the various methods of saving energy in sensor nodes and a method by which energy can be saved are discussed with emphasis on various energy saving protocols and techniques, and the improvement in the Performance of Clustered WSN by using Multi-tier Clustering. By using a two-tier architecture in the clustering and operation of sensor nodes, an increase in the network lifetime of the WSN is gained. Since this clustering approach has better results in term of energy savings and organizing the network, the main objective of this chapter is to describe power management techniques, two-tier architecture, clustering approaches, and network models to save the energy of a sensor network.


2019 ◽  
pp. 69-94
Author(s):  
Jeffrey A. Friedman

This chapter analyzes a database containing nearly one million geopolitical forecasts. These data show that foreign policy analysts are surprisingly effective at estimating subjective probabilities. Fine-grained distinctions in probability estimates convey meaningful information about world politics, not arbitrary detail. By extension, the chapter shows that common qualitative expressions of uncertainty (including expressions currently recommended for use in intelligence analysis and military planning) systematically degrade the value of foreign policy discourse. The ability of foreign policy analysts to achieve “returns to precision” in probability assessment does not appear to depend on easy questions, short time horizons, or special cognitive attributes. Instead, the value of precision in probability assessment appears to be a generalizable skill that foreign policy analysts can cultivate through training, effort, and experience.


2019 ◽  
Vol 15 (1) ◽  
pp. 155014771982624 ◽  
Author(s):  
Woosik Lee ◽  
Jong-Hoon Youn ◽  
Teukseob Song

During the initial deployment time, wireless sensors continually search their neighbors. The neighbor discovery is not an one-time event because the network topology can be changed anytime due to node mobility and failure. The neighbor discovery protocol helps sensor nodes to find neighboring sensors within their communication range. This study proposes a novel neighbor discovery protocol called the prime-number-assisted block-based neighbor discovery protocol, which intelligently changes the sensor schedules based on the greater common divisor of two sensors’ discovery cycle lengths. For example, for two sensors whose duty cycles are different, if the lengths of their discovery schedules are relatively prime, the prime-number-assisted block-based neighbor discovery protocol simply uses the balanced incomplete block design–based neighbor discovery protocol without adding any additional active slots; otherwise, it changes the original balanced incomplete block design–based schedule using a prime number. In this study, we compare the performances of prime-number-assisted block-based neighbor discovery protocol and other recently proposed neighbor discovery protocols (U-Connect, Disco, SearchLight, and Hedis) using a TOSSIM simulator. The experimental results confirm the superiority of prime-number-assisted block-based neighbor discovery protocol over other neighbor discovery protocols in terms of discovery latency and energy consumptions.


2017 ◽  
Vol 31 (2) ◽  
pp. 347-351 ◽  
Author(s):  
G. Vázquez-Victorio ◽  
N. Flores-Martínez ◽  
G. Franceschin ◽  
S. Nowak ◽  
S. Ammar ◽  
...  

Author(s):  
Khyati Chourasia ◽  
Anubhuti Khare ◽  
Manish Saxena

This tutorial paper examines architectural and circuit design techniques for a micro sensor node operating at power levels low enough to enable the use of an energy harvesting source. These requirements place demands on all levels of the design. We propose architecture for achieving the required ultra-low energy operation and discuss the circuit techniques necessary to implement the system. Dedicated hardware implementations improve the efficiency for specific functionality, and modular partitioning permits fine-grained optimization and power-gating. We describe modeling and operating at the minimum energy point in the transmitter and the ADC. A micro sensor node using the techniques we describe can function in an energy-harvesting scenario


Sign in / Sign up

Export Citation Format

Share Document