scholarly journals Collision Prevention for Duty-Cycle Receiver-Initiation MAC Protocol via Multiple Access Reservation (MAR-RiMAC)

Sensors ◽  
2020 ◽  
Vol 21 (1) ◽  
pp. 127
Author(s):  
Omer Gurewitz ◽  
Oren Zaharia

The prevalence of the Internet of Things (IoT) paradigm in more and more applications associated with our daily lives has induced a dense network in which numerous wireless devices, many of which have limited capabilities (e.g., power, memory, computation), need to communicate with the internet. One of the main bottlenecks of this setup is the wireless channel. Numerous medium access control (MAC) protocols have been devised to coordinate between devices that share the wireless channel. One prominent approach that is highly suitable for IoT and wireless sensor networks (WSNs), which rely on duty cycling, is the receiver-initiated approach, in which, rather than the transmitter, the receiver initiates the transaction. The problem with this approach is that when many devices are trying to respond to the receiver’s transmission invitation and transmit simultaneously, a collision occurs. When the network is highly loaded, resolving such collisions is quite tedious. In this paper, we devise an enhancement to the receiver-initiated approach that aims at preventing this inherent collision scenario. Our modification relies on multiple devices sending a short predefined signal, informing their intended receiver of their intention to transmit simultaneously. The data transaction is done via a four-way handshake in which, after all backlogged devices have informed their designated receiver of their desire to transmit simultaneously, the receiver identifies them and polls them one by one, avoiding the collision. We compare the performance of Receiver-Initiated-MAC protocol (RI-MAC), which is one of the prevalent receiver-initiated protocols, with and without the suggested enhancement, and show superior air-time utilization under high traffic loads, especially in the presence of hidden terminals.

Author(s):  
Amna Jamal ◽  
Chen-Khong Tham ◽  
Wai-Choong Wong

Cognitive Radio (CR) technology has gained popularity in Wireless Sensor Networks (WSN) because of scarcity caused by the increase in number of wireless devices and service, and it provides spectrum-efficient communication for the resource constrained WSNs. However, appropriate protocols have to be devised to satisfy the requirements of both WSNs and CRs and to enjoy the benefits of cognition in sensor networks. In this chapter, the authors review the existing schemes for wired, wireless, and cognitive radio networks. In addition, they propose a novel energy-efficient and spectrum-aware Medium Access Control (MAC) protocol for the cognitive radio sensor network. The authors design a spectrum-aware asynchronous duty cycle approach that caters to the requirements of both the domains. The performance of the proposed MAC is evaluated via simulations. Performance evaluations are also compared with MCMAC, a multi-channel MAC for WSNs. The comparative results show that the proposed scheme outperforms the multi-channel scheme for WSN.


2009 ◽  
Vol 5 (1) ◽  
pp. 5-20 ◽  
Author(s):  
Mostafa Mjidi ◽  
Debasish Chakraborty ◽  
Naoki Nakamura ◽  
Norio Shiratori

In recent years, wireless technologies and application received great attention. The Medium Access Control (MAC) protocol is the main element that determines the efficiency in sharing the limited communication bandwidth of the wireless channel in wireless local area networks (WLANs). IEEE 802.11 introduced the optional RTS/CTS handshaking mechanism to address the hidden terminal problem as well as to reduces the chance of collision in case of higher node density and traffic. RTS Threshold (RT) determines when RTS/CTS mechanism should be used and proved to be an important parameter for performance characteristics in data transmission. We first investigate to find a meaningful threshold value according to the network situation and determine the impact of using or disengaging the RTS/CTS optional mechanism and dynamically adjust the RTS Threshold to maximize data transmission. The results show a significant improvement over existing CSMA/CA and RTS/CTS schemes. Our adaptive scheme performed even better when data rate increases. We verify our proposed scheme both analytically and with extensive network simulation using ns-2.


Author(s):  
Amna Jamal ◽  
Chen-Khong Tham ◽  
Wai-Choong Wong

Cognitive Radio (CR) technology has gained popularity in Wireless Sensor Networks (WSN) because of scarcity caused by the increase in number of wireless devices and service, and it provides spectrum-efficient communication for the resource constrained WSNs. However, appropriate protocols have to be devised to satisfy the requirements of both WSNs and CRs and to enjoy the benefits of cognition in sensor networks. In this chapter, the authors review the existing schemes for wired, wireless, and cognitive radio networks. In addition, they propose a novel energy-efficient and spectrum-aware Medium Access Control (MAC) protocol for the cognitive radio sensor network. The authors design a spectrum-aware asynchronous duty cycle approach that caters to the requirements of both the domains. The performance of the proposed MAC is evaluated via simulations. Performance evaluations are also compared with MCMAC, a multi-channel MAC for WSNs. The comparative results show that the proposed scheme outperforms the multi-channel scheme for WSN.


2021 ◽  
Author(s):  
Roberto Valentini ◽  
Piergiuseppe Di Marco ◽  
Roberto Alesii ◽  
Fortunato Santucci

In this paper, we propose a framework for cross-layer analysis of multi-static passive RFID systems. The model takes into account details of the shared wireless channel, including fading and capture effect, whereas, at the medium access control (MAC) layer, the anti-collision mechanism proposed in the EPC Generation 2 standard is taken as a reference.<br>To address the complexity of the system model, we rely on a semi-analytical approach, that combines a moment matching approximation method to abstract the physical layer and Monte-Carlo simulations to describe the MAC dynamics.<br>Furthermore, based on the space diversity feature offered by the multi-static settings, we introduce the concept of capture deiversity and propose a modification to the standard to fully support this form of diversity.<br>Numerical results show the impact of deployment conditions and the relative positions of interrogator, tags, and detection points on the performance of tags' identification. We show how the number of detection points impacts the system performance under various channel conditions and MAC parameters' settings. Finally, we validate the proposed update of the MAC protocol, showing substantial performance improvement with respect to the standard collision resolution policy.


2021 ◽  
Author(s):  
Roberto Valentini ◽  
Piergiuseppe Di Marco ◽  
Roberto Alesii ◽  
Fortunato Santucci

In this paper, we propose a framework for cross-layer analysis of multi-static passive RFID systems. The model takes into account details of the shared wireless channel, including fading and capture effect, whereas, at the medium access control (MAC) layer, the anti-collision mechanism proposed in the EPC Generation 2 standard is taken as a reference.<br>To address the complexity of the system model, we rely on a semi-analytical approach, that combines a moment matching approximation method to abstract the physical layer and Monte-Carlo simulations to describe the MAC dynamics.<br>Furthermore, based on the space diversity feature offered by the multi-static settings, we introduce the concept of capture deiversity and propose a modification to the standard to fully support this form of diversity.<br>Numerical results show the impact of deployment conditions and the relative positions of interrogator, tags, and detection points on the performance of tags' identification. We show how the number of detection points impacts the system performance under various channel conditions and MAC parameters' settings. Finally, we validate the proposed update of the MAC protocol, showing substantial performance improvement with respect to the standard collision resolution policy.


Author(s):  
Abhijit Biswas, Et. al.

Recently, in Internet era the most common technology ubiquitous to develop smart environment is Internet of things (IoT) and Wireless Sensor Networks (WSNs).These technologies deployed enormously to formulate wide applications in area of Smart homes, Industrial automation, and security destined applications and information trailing. The huge development in wireless technology is due to great exploration in MEMS concept and Embedded Systems. Huge evolution in this technique leads to access different Medium Access Control (MAC) protocol and this protocol used to access multiple nodes peculiarly in wireless channel. The projected MAC protocol designed to enhance network lifetime. Essentially, the network leads to lot of congestion due to non-availability of IoT equipment and less available resources for various environmental applications. The simulated performance ensures that the conventional algorithm limits their dynamic service quality for IoT based applications. The above setbacks motivate the researches to develop the survey in existing scheduling based MAC protocol by highlighting their parameters.


Author(s):  
Mirza Waseem Hussain ◽  
Sanjay Jamwal ◽  
Tabasum Mirza ◽  
Malik Mubasher Hassan

The communication platform in the computing field is increasing at a rapid pace. Technology is constantly budding with the materialization of new technological devices, specifically in the communication industry. The internet is expanding exponentially. Internet-enabled devices are becoming part and parcel of our daily lives. It has turned out to be almost impossible to think about the world without the internet. The internet structures might be reinforced to meet coming prerequisites in mobile communication. Congestion plays a vital role in regulating the flow of data to accelerate the exchange of data in between the wired and wireless devices. In this chapter, the authors try to highlight various network congestion techniques with their limitations proposed from time to time by various researchers. This chapter plays a vital role in highlighting the history of networking congestion detection/avoidance techniques starting from the early days of networking.


Electronics ◽  
2020 ◽  
Vol 9 (1) ◽  
pp. 143 ◽  
Author(s):  
Taegyeom Lee ◽  
Ohyun Jo ◽  
Kyungseop Shin

Devices used in Internet of Things (IoT) networks continue to perform sensing, gathering, modifying, and forwarding data. Since IoT networks have a lot of participants, mitigating and reducing collisions among the participants becomes an essential requirement for the Medium Access Control (MAC) protocols to increase system performance. A collision occurs in wireless channel when two or more nodes try to access the channel at the same time. In this paper, a reinforcement learning-based MAC protocol was proposed to provide high throughput and alleviate the collision problem. A collaboratively predicted Q-value was proposed for nodes to update their value functions by using communications trial information of other nodes. Our proposed protocol was confirmed by intensive system level simulations that it can reduce convergence time in 34.1% compared to the conventional Q-learning-based MAC protocol.


Author(s):  
Tamara Vázquez-Barrio ◽  
Teresa Torrecillas-Lacave ◽  
Rebeca Suárez-Álvarez

Traditional television coexists with formats that originated on the internet, as well as on-demand consumption, paid television, and other audio-visual content distribution platforms. Audience data reveal a steady decline in television viewership, and digital technologies now allow any citizen to produce audio-visual content and distribute it for mass consumption through the internet. Given this new audio-visual ecosystem, the aim of this research is to ascertain whether there are any signs of a crisis regarding the dominance of television as a means of disseminating the products of the culture industry. Disinterest or indifference toward conventional programming by users would reveal a danger to the broadcast industry. In contrast, the consumption of television products through other channels would imply the retention of television audiences through the internet. This study analyzes perceptions regarding television through five online discussion groups. Three conclusions can be drawn: Firstly, television holds a prominent place in the daily lives of those who use it, including the youngest participants, despite the fact that audiences have declined in recent years. The second conclusion states that the perception of television is positive and associated with disengagement, relaxation, and family gatherings, which can be combined with individual consumption at other times of the day. As a third conclusion, this study reveals the high degree of compatibility between the internet and television screens, as new forms of consumption are emerging, yet there is still a predominant interest in content on television and from the mass culture industry. Resumen La televisión tradicional convive con formatos originados en internet, con el consumo bajo demanda, con la televisión de pago y con otras plataformas de distribución de contenido audiovisual. Los datos de audiencias muestran un descenso continuado de telespectadores y las tecnologías digitales permiten a cualquier ciudadano producir contenidos audiovisuales y distribuirlos para el consumo masivo a través de la Red. Ante este nuevo ecosistema audiovisual, el objetivo de esta investigación es comprobar si se pueden advertir signos de una crisis de la supremacía del televisor como medio de difusión de industria cultural. El desapego o indiferencia de los usuarios hacia la programación convencional evidenciaría un peligro para la televisión. Al contrario, el consumo de productos televisivos a través de otras pantallas implicaría el mantenimiento de las audiencias televisivas a través de internet. La investigación analiza las percepciones sobre la televisión mediante cinco grupos de discusión online. Se extraen tres conclusiones. La primera, que la televisión ocupa una posición relevante en la cotidianeidad de los participantes, incluidos los más jóvenes, a pesar de que las audiencias han descendido en los últimos años. La segunda, que la percepción sobre la televisión es positiva y se asocia a la desconexión, el relax y a un momento de reunión familiar compaginable con consumos individualizados en otros momentos del día. Tercera, el estudio demuestra el alto grado de compatibilidad entre internet y la pantalla del televisor porque surgen nuevas formas de consumo, pero se mantiene un interés predominante por los contenidos televisivos y de la gran industria cultural.


Author(s):  
Rinkuben N. Patel ◽  
Nirav V. Bhatt

Background: WSN is a network of smart tiny electromechanical devices named as sensors. Sensors perform various tasks like sensing the environment as per its range, transmit the data using transmission units, store the data in the storage unit and perform an action based on captured data. As they are installed in an unfriendly environment, to recharge the sensors are not possible every time which leads to a limited lifetime of a network. To enhance the life of a sensor network, the network required energy-efficient protocols. Various energy-efficient MAC protocols are developed by Research community, but very few of them are integrated with the priority-based environment which performs the priority-based data transmission. Another challenge of WSN is, most of the WSN areas are delay-sensitive because it is implemented in critical fields like military, disaster management, and health monitoring. Energy, Delay, and throughput are major quality factors that affect the sensor network. Objective: In this paper, the aim is to design and develop a MAC Protocol for a field like the military where the system requires energy efficiency and priority-based data transmission. Method: In the proposed model, the cluster-based network with priority queues are formed that can achieve higher power efficiency and less delay for sensitive data. Results: In this research simulation of Proposed MAC, TMAC and SMAC are done with different numbers of nodes, same inter-packet intervals, and variant inter-packet intervals. Based on the script simulation, result graphs are generated. Conclusion: The proposed work achieves greater lifetime compared to TMAC and SMAC using priority-based data transmission.


Sign in / Sign up

Export Citation Format

Share Document