scholarly journals Energy Efficiency TDMA/CSMA Hybrid Protocol with Power Control for WSN

2018 ◽  
Vol 2018 ◽  
pp. 1-7 ◽  
Author(s):  
Xin Yang ◽  
Ling Wang ◽  
Jian Xie ◽  
Zhaolin Zhang

Wireless sensors network (WSN) is widely used in the Internet of Things at present. However, limited energy source is a critical problem in the improvement and practical applications of WSN, so it is necessary to improve the energy efficiency. As another important evaluation criterion of transmission performance, throughput should be improved too. To mitigate both of the problems at the same time, by taking the advantages of Time Division Multiple Access (TDMA) and Carrier Sense Multiple Access (CSMA) at the medium access control (MAC) layer of WSN, we propose a hybrid TDMA/CSMA MAC layer protocol. Meanwhile, we design a novel power control scheme to further reduce the energy consumption and optimize the transmission slots. The simulation results demonstrate that the proposed protocol significantly improves the throughput and energy efficiency.

Author(s):  
Nor-Syahidatul N. Ismail ◽  
Sharifah H. S. Ariffin ◽  
N. M. Abdul Latiff ◽  
Farizah Yunus ◽  
Norshiela Fisal

Wireless Sensor Networks (WSNs) have been attracting increasing interest lately from the research community and industry. The main reason for such interest is the fact that WSNs are considered a promising means of low power and low cost communication that can be easily deployed. Nowadays, the advanced protocol design in WSNs has enhanced their capability to transfer video in the wireless medium. In this chapter, a comprehensive study of Medium Access Control (MAC) and MPEG-4 video transmission is presented. Various classifications of MAC protocols are explained such as random access, schedule access, and hybrid access. In addition, a hybrid MAC layer protocol design is proposed, which combines Carrier Sense Multiple Access (CSMA) and unsynchronized Time Division Multiple Access (TDMA) protocols using a token approach protocol. The main objective of this chapters is to present the design of a MAC layer that can support video transfer between nodes at low power consumption and achieve the level of quality of service (QoS) required by video applications.


Electronics ◽  
2019 ◽  
Vol 8 (12) ◽  
pp. 1435 ◽  
Author(s):  
Lorenzo Germani ◽  
Vanni Mecarelli ◽  
Giuseppe Baruffa ◽  
Luca Rugini ◽  
Fabrizio Frescura

The Internet of Things (IoT) architecture is quickly becoming popular even outside of its originating scenario of home automation. This paper reports the design, implementation, and performance of an IoT hardware and software architecture conceived for the continuous monitoring of livestock located in barns and during grazing. We have adopted the LoRa low power wide area network (LPWAN) technology to cover the diverse environments, and a suitable configuration of web services to perform data storage, analysis, and visualization. Since the LoRa LPWAN (LoRaWAN) medium access control (MAC) layer does not provide a listen-before-talk (LBT) mechanism, we propose a custom MAC layer with LBT-based carrier-sense multiple access with collision avoidance (CSMA/CA). The devised system has been implemented using off-the-shelf hardware, and its performance has also been estimated with the help of a C++ event-based simulator. The preliminary results of our HW implementation on the field confirm the stability of the conceived system and its reliability.


Author(s):  
. Geetanjli

The power control in CDMA systems, grant numerous users to share resources of the system uniformly between each other, leading to expand capacity. With convenient power control, capacity of CDMA system is immense in contrast of frequency division multiple access (FDMA) and time division multiple access (TDMA). If power control is not achieved numerous problems such as the near-far effect will start to monopolize and consequently will reduce the capacity of the CDMA system. However, when the power control in CDMA systems is implemented, it allows numerous users to share resources of the system uniformly between themselves, leading to increased capacity For power control in CDMA system optimization algorithms i.e. genetic algorithm & particle swarm algorithm can be used which regulate a convenient power vector. These power vector or power levels are dogged at the base station and announce to mobile units to alter their transmitting power in accordance to these levels. The performances of the algorithms are inspected through both analysis and computer simulations, and compared with well-known algorithms from the literature.


2019 ◽  
Vol 70 (4) ◽  
pp. 595-616 ◽  
Author(s):  
Abubakar Bello Tambawal ◽  
Rafidah Md. Noor ◽  
Rosli Salleh ◽  
Christopher Chembe ◽  
Mohammad Hossein Anisi ◽  
...  

Author(s):  
N. Nasreena Hameeda

Many methodologies has been discovered to lower the power consumption in the devices, which is connected to the network in recent years. Many medium access control protocols have been used for low power lossy networks (LLNs).The major goal of introducing this methods is to improve the energy efficiency and to increase the fastness of the communication in the network or the data transmission. The Low power lossy networks is used in many real time scenarios nowadays. These methods use battery-powered devices, which makes transmission easier over lossy links. A particular node generally switches off radio interfaces when no traffic is sent. These devices are made to keep the radio interfaces in ON thus it makes exhausting of batteries causing Denial of sleep attacks. Here, we are going to use time division and channel hoping techniques to get a impact on jamming attacks. We will look on the impacts of such attacks by the ideas got through attacker and to which level the protection allows jamming attacks at upper layers.


2018 ◽  
Vol 10 (4) ◽  
pp. 195
Author(s):  
Norma Amalia ◽  
Eka Setia Nugraha ◽  
Muntaqo Alfin Amanaf

LTE downlink is using Orthogonal Frequency Division Multiple Access (OFDMA) multiple access system which have high invulnerability from multipath problem. One of the weakness of OFDM system is the high level from Peak to Average Power Ratio (PAPR) that was required higher level transmit power for maintaining the Bit Error Rate (BER) requirement. Using uplink scheme with Single Carrier FDMA (SC-FDMA) which is OFDMA modification, will be offered better level of PAPR than its conventional OFDM. The main problem of using OFDMA is the high level of PAPR, while using SC-FDMA the problem is intra-cell interference. Intra-cell or inter-cell interference is the common problem that can reduce the LTE performance. Minimizing received power for each users (UE) which is still at acceptable tolerance parameter, can be used for reducing the interference problem to another UE. Power control is the appropriate solution for minimizing the interference level. In this paper will be analyzed the power control using open loop and closed loop scheme at LTE network. The simulation result show that without power control schemes, the transmit power of UE is 23 dBm. While, after applying power control scheme, the transmit power is 18.8 dBm at ?=0.4 of open loop condition and 9.05 dBm at closed loop condition. Using this transmit power value as the UE power can improve the SINR performance. The SINR average value without power control scheme is only 20.38 dB which is lower than using open loop scheme is achieved 22.44 dB and 24.02 dB at closed loop scheme.


Symmetry ◽  
2019 ◽  
Vol 11 (5) ◽  
pp. 632 ◽  
Author(s):  
Yiting Wang ◽  
Liang Liu ◽  
Wenzhao Gao

With the aim of addressing the problem of high overhead and unstable performance of the existing Source Location Privacy (SLP) protection algorithms, this paper proposes an efficient algorithm based on Circular Trap (CT) which integrates the routing layer and MAC layer protocol to provide SLP protection for WSNs. This algorithm allocates time slots for each node in the network by using Time Division Multiple Access (TDMA) technology, so that data loss caused by channel collisions can be avoided. At the same time, a circular trap route is formed to induce an attacker to first detect the packets from the nodes on the circular route, thereby moving away from the real route and protecting the SLP. The experimental results demonstrate that the CT algorithm can prevent the attacker from tracking the source location by 20% to 50% compared to the existing cross-layer SLP-aware algorithm.


Sign in / Sign up

Export Citation Format

Share Document