Hybrid MAC Layer Design for MPEG-4 Video Transmission in WSN

Author(s):  
Nor-Syahidatul N. Ismail ◽  
Sharifah H. S. Ariffin ◽  
N. M. Abdul Latiff ◽  
Farizah Yunus ◽  
Norshiela Fisal

Wireless Sensor Networks (WSNs) have been attracting increasing interest lately from the research community and industry. The main reason for such interest is the fact that WSNs are considered a promising means of low power and low cost communication that can be easily deployed. Nowadays, the advanced protocol design in WSNs has enhanced their capability to transfer video in the wireless medium. In this chapter, a comprehensive study of Medium Access Control (MAC) and MPEG-4 video transmission is presented. Various classifications of MAC protocols are explained such as random access, schedule access, and hybrid access. In addition, a hybrid MAC layer protocol design is proposed, which combines Carrier Sense Multiple Access (CSMA) and unsynchronized Time Division Multiple Access (TDMA) protocols using a token approach protocol. The main objective of this chapters is to present the design of a MAC layer that can support video transfer between nodes at low power consumption and achieve the level of quality of service (QoS) required by video applications.

2018 ◽  
Vol 2018 ◽  
pp. 1-7 ◽  
Author(s):  
Xin Yang ◽  
Ling Wang ◽  
Jian Xie ◽  
Zhaolin Zhang

Wireless sensors network (WSN) is widely used in the Internet of Things at present. However, limited energy source is a critical problem in the improvement and practical applications of WSN, so it is necessary to improve the energy efficiency. As another important evaluation criterion of transmission performance, throughput should be improved too. To mitigate both of the problems at the same time, by taking the advantages of Time Division Multiple Access (TDMA) and Carrier Sense Multiple Access (CSMA) at the medium access control (MAC) layer of WSN, we propose a hybrid TDMA/CSMA MAC layer protocol. Meanwhile, we design a novel power control scheme to further reduce the energy consumption and optimize the transmission slots. The simulation results demonstrate that the proposed protocol significantly improves the throughput and energy efficiency.


2019 ◽  
Vol 70 (4) ◽  
pp. 595-616 ◽  
Author(s):  
Abubakar Bello Tambawal ◽  
Rafidah Md. Noor ◽  
Rosli Salleh ◽  
Christopher Chembe ◽  
Mohammad Hossein Anisi ◽  
...  

Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4206
Author(s):  
Sun ◽  
Liu ◽  
Paolini

In this paper, a dynamic access probability adjustment strategy for coded random accessschemes based on successive interference cancellation (SIC) is proposed. The developed protocolconsists of judiciously tuning the access probability, therefore controlling the number of transmittingusers, in order to resolve medium access control (MAC) layer congestion states in high load conditions.The protocol is comprised of two steps: Estimation of the number of transmitting users during thecurrent MAC frame and adjustment of the access probability to the subsequent MAC frame, based onthe performed estimation. The estimation algorithm exploits a posteriori information, i.e., availableinformation at the end of the SIC process, in particular it relies on both the frame configuration(residual number of collision slots) and the recovered users configuration (vector of recovered users)to effectively reduce mean-square error (MSE). During the access probability adjustment phase, atarget load threshold is employed, tailored to the packet loss rate in the finite frame length case.Simulation results revealed that the developed estimator was able to achieve remarkable performanceowing to the information gathered from the SIC procedure. It also illustrated how the proposeddynamic access probability strategy can resolve congestion states efficiently.


Author(s):  
Zaid Hashim Jaber ◽  
Dheyaa Jasim Kadhim ◽  
Ahmed Sabah Al-Araji

<p><span>Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive number of antenna elements to improve both spectral efficiency and energy efficiency. On the other hand, the second research method (PD-NOMA) allows multiple non-orthogonal signals to share the same orthogonal resources by allocating different power level for each station. PD-NOMA has a better spectral efficiency over the orthogonal multiple access methods. A review of previous works regarding the MAC design for different wireless networks is classified based on different categories. The main contribution of this research work is to show the importance of the MAC design with added optimal functionalities to improve the spectral and energy efficiencies of the wireless networks.</span></p>


Author(s):  
N. Nasreena Hameeda

Many methodologies has been discovered to lower the power consumption in the devices, which is connected to the network in recent years. Many medium access control protocols have been used for low power lossy networks (LLNs).The major goal of introducing this methods is to improve the energy efficiency and to increase the fastness of the communication in the network or the data transmission. The Low power lossy networks is used in many real time scenarios nowadays. These methods use battery-powered devices, which makes transmission easier over lossy links. A particular node generally switches off radio interfaces when no traffic is sent. These devices are made to keep the radio interfaces in ON thus it makes exhausting of batteries causing Denial of sleep attacks. Here, we are going to use time division and channel hoping techniques to get a impact on jamming attacks. We will look on the impacts of such attacks by the ideas got through attacker and to which level the protection allows jamming attacks at upper layers.


Author(s):  
Eric E. Petrosky ◽  
Alan J. Michaels ◽  
Joseph M. Ernst

Low power, low cost, and security-conscious wireless sensor networks are becoming increasingly pervasive in the internet of things (IoT). In these networks, receiver-assigned code division multiple access (RA-CDMA) offers benefits over existing multiple access techniques. RA-CDMA networks are asynchronous, robust against multipath interference, and offer resilience against collision. A lightweight medium access control (MAC) protocol is needed to facilitate communication in RA-CDMA networks between low power sensor nodes and access points. This article provides an overview of RA-CDMA and proposes elements of a new MAC protocol that could improve performance of certain wireless sensor networks. Key features of the proposed MAC design are introduced and compared to those of existing protocols, highlighting its simple and lightweight design. Through its compatibility with RA-CDMA, the MAC design eliminates significant overhead and complexity while meeting requirements for low power networks, which enables the implementation of dense IoT sensor networks.


Symmetry ◽  
2019 ◽  
Vol 11 (5) ◽  
pp. 632 ◽  
Author(s):  
Yiting Wang ◽  
Liang Liu ◽  
Wenzhao Gao

With the aim of addressing the problem of high overhead and unstable performance of the existing Source Location Privacy (SLP) protection algorithms, this paper proposes an efficient algorithm based on Circular Trap (CT) which integrates the routing layer and MAC layer protocol to provide SLP protection for WSNs. This algorithm allocates time slots for each node in the network by using Time Division Multiple Access (TDMA) technology, so that data loss caused by channel collisions can be avoided. At the same time, a circular trap route is formed to induce an attacker to first detect the packets from the nodes on the circular route, thereby moving away from the real route and protecting the SLP. The experimental results demonstrate that the CT algorithm can prevent the attacker from tracking the source location by 20% to 50% compared to the existing cross-layer SLP-aware algorithm.


Author(s):  
Chih-Yu Wang ◽  
Yin-Cheng Huang ◽  
Cheng-Han Mai ◽  
Fu-Wang Chang ◽  
Hung-Yu Wei

As IEEE 802.11 wireless devices have become increasingly widespread, providing Quality of Service in the context of H.264/AVC, the video coding standard for future multimedia networking, has become an important issue in the fields of communication and networking. Cross-Layer Adaptive Video Prioritization (CAVP) is a cross-layer framework that prioritizes video frame transmission according to the application-layer information and the MAC layer transmission condition. In this chapter, a Peak Signal-to-Noise Ratio (PSNR) estimation method is proposed to sort out different priorities of H.264/AVC (Advanced Video Coding) video frames at the application layer to provide user-centric media quality estimation. Compared to previous heuristic algorithms, the authors also investigate a theoretic access delay estimator to monitor the wireless medium access delay at the MAC layer. In addition, an admission control is employed to serve the delay-sensitive video application and to give higher priority to those critical video frames. Video packets are dynamically classified into different 802.11e access categories according to the level of wireless medium access delay and the priority of the video frames. The myths of naïvely prioritizing video packets based on I/P/B types as well as naïvely assign packets to high priority access categories in 802.11e are resolved. Rather than creating complex scheme that is unable to be implemented in practical scenarios, the authors design the proposed scheme with practical implementability in mind. The proposed scheme is implemented with Click kernel module and the MadWifi WLAN driver. The performance of proposed CAVP design is evaluated by both NS-2 simulations and real testbed experiments, and results show that it enhances receiving video quality in error-prone wireless networking environments.


Author(s):  
Tien Huu Vu ◽  
Supavadee Aramvith

Recent researches in video transmission over heterogeneous networks move toward cross-layer design to realize the optimal video quality. In this work, we investigate the cross layer approach between H.264 video coding layer and IEEE 802.11e Medium Access Control (MAC) layer on the issues of how to improve error resiliency of H.264 video using Flexible Macroblock Ordering (FMO), and how to reduce packet dropping rate at MAC layer. We propose an adaptive FMO map generation to separate high and low important macroblocks to different priority queues based on the overflow state of MAC layer queues. The arrival rate of packets to queues is thus changed to reduce the queue overflow and to decrease of the packet droppingrates at queues. Experimental results show that using the proposed scheme can reduce the packet drop rate at the queues resulting in the reduction of packet loss rate and the improvement of the average PSNR.


Sign in / Sign up

Export Citation Format

Share Document