To see the other types of publications on this topic, follow the link: Wireless scheduling protocols.

Journal articles on the topic 'Wireless scheduling protocols'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Wireless scheduling protocols.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mathew K., Deepa, and Anita Jones. "Survey: energy efficient protocols using radio scheduling in wireless sensor network." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 2 (April 1, 2020): 1296. http://dx.doi.org/10.11591/ijece.v10i2.pp1296-1307.

Full text
Abstract:
An efficient energy management scheme is crucial factor for design and implementation of any sensor network. Almost all sensor networks are structured with numerous small sized, low cost sensor devices which are scattered over the large area. To improvise the network performance by high throughput with minimum energy consumption, an energy efficient radio scheduling MAC protocol is effective solution, since MAC layer has the capability to collaborate with distributed wireless networks. The present survey study provides relevant research work towards radio scheduling mechanism in the design of energy efficient wireless sensor networks (WSNs). The various radio scheduling protocols are exist in the literature, which has some limitations. Therefore, it is require developing a new energy efficient radio scheduling protocol to perform multi tasks with minimum energy consumption (e.g. data transmission). The most of research studies paying more attention towards to enhance the overall network lifetime with the aim of using energy efficient scheduling protocol. In that context, this survey study overviews the different categories of MAC based radio scheduling protocols and those protocols are measured by evaluating their data transmission capability, energy efficiency, and network performance. With the extensive analysis of existing works, many research challenges are stated. Also provides future directions for new WSN design at the end of this survey.
APA, Harvard, Vancouver, ISO, and other styles
2

Uppalapati, Srilakshmi. "Energy-Efficient Heterogeneous Optimization Routing Protocol for Wireless Sensor Network." Instrumentation Mesure Métrologie 19, no. 5 (November 15, 2020): 391–97. http://dx.doi.org/10.18280/i2m.190510.

Full text
Abstract:
A wide range of applications include in Wireless Sensor Networks (WSNs), and it is being used extensively in data collection specifically to process the mission-critical tasks. The implementation of routing protocols of energy-efficient (EE) is one of the significant challenging jobs of Sensor Networks (MC-SSN) and Mission Critical Sensors. In hierarchical routing protocols, higher EE can reach when compared to the flat routing protocols. The network’s scheduling process doesn’t support enhanced balanced Energy-efficient network-integrated super-heterogeneous (E-BEENISH), which discusses earlier. An Energy. Energy efficient Time scheduling based particle swarm optimization unequal fault tolerance clustering protocol (EE-TDMA-PSO-UFC) is proposed in this paper. Based on the distance parameter, an efficient cluster head (CH) is selected in this protocol. Owing to the unexpected failure of MCH (Master Cluster Head), an additional “CH” is chosen that is termed as Surrogate cluster head (SCH) for the restoration of network’s connectivity in the protocol of PSO-UFC. Based on TDMA (Time Division Multiple Access) protocols, the consumption of Energy. Energy is reduced with the allocation of timeslots during transmission of data. Using the technique of EE-TDMA-PSOUFC, the network’s lifespan improves than CEEC and E-BEENISH protocols according to the assessment of simulation results.
APA, Harvard, Vancouver, ISO, and other styles
3

Mao, Yuxin, Chenqian Zhou, Yun Ling, and Jaime Lloret. "An Optimized Probabilistic Delay Tolerant Network (DTN) Routing Protocol Based on Scheduling Mechanism for Internet of Things (IoT)." Sensors 19, no. 2 (January 10, 2019): 243. http://dx.doi.org/10.3390/s19020243.

Full text
Abstract:
Many applications of Internet of Things (IoT) have been implemented based on unreliable wireless or mobile networks like the delay tolerant network (DTN). Therefore, it is an important issue for IoT applications to achieve efficient data transmission in DTN. In order to improve delivery rate and optimize delivery delay with low overhead in DTN for IoT applications, we propose a new routing protocol, called Scheduling-Probabilistic Routing Protocol using History of Encounters and Transitivity (PROPHET). In this protocol, we calculate the delivery predictability according to the encountering frequency among nodes. Two scheduling mechanisms are proposed to extend the traditional PROPHET protocol and improve performance in both storage and transmission in DTN. In order to evaluate the proposed routing protocol, we perform simulations and compare it with other routing protocols in an Opportunistic Network Environment (ONE) simulator. The results demonstrate that the proposed Scheduling-PROPHET can achieve better performances in several key aspects compared with the existing protocols.
APA, Harvard, Vancouver, ISO, and other styles
4

Susila, S. G., and J. Arputhavijayaselvi. "Multipart Layer Node Deployment and Computational Technique with Finest Cluster Head Selection for Network Lifetime Enhancement." Journal of Computational and Theoretical Nanoscience 13, no. 10 (October 1, 2016): 6642–48. http://dx.doi.org/10.1166/jctn.2016.5609.

Full text
Abstract:
The continual research and development in wireless sensor networks, power is most vital resource because each sensor node has limited battery power. Numerous clustering concept routing protocols have been developed to balance and enhance lifetime of the sensor nodes in wireless sensor networks. Available clustering routing protocols are select cluster heads periodically and they considered only how can select cluster heads energy-efficiently and the most excellent selection of cluster heads, without considering energy-efficient period of the cluster heads replacement. Herein paper, it is employed different formulae in homogeneous merged layer node deployment system, which has a threshold-based cluster head selection mechanism for clustering routing protocols of wireless sensor networks. The proposed routing protocol is minimizes the number of cluster head selection difficulty by using threshold of residual energy comparison. Reducing the amount of difficulty for cluster head selection procedure yields better life span of the whole sensor networks and it is compared with the available clustering routing protocols. In the proposed system of work, node scheduling or activation techniques are also integrated and the obtained simulation results illustrate that the best to the obtainable clustering protocols in wireless sensor networks (WSNs).
APA, Harvard, Vancouver, ISO, and other styles
5

Martin, K. M., and B. Seetha Ramanjaneyulu. "Priority Based Centralized Scheduling for Time Slotted Channel Hopping Based Multihop IEEE 802.15.4 Networks." Journal of Computational and Theoretical Nanoscience 17, no. 1 (January 1, 2020): 363–72. http://dx.doi.org/10.1166/jctn.2020.8676.

Full text
Abstract:
To meet the growing demands of low power and determinism in Industrial Wireless applications, IEEE defined IEEE 802.15.4e amendment that includes many channel access methods. Time Slotted Channel Hopping protocol is one of the most popular MAC protocols under IEEE 802.15.4e. However, scheduling of time slots for time slotted channel hopping, was not part of the protocol and so different scheduling algorithms were proposed by researchers. A new time slotted channel hopping scheduling mechanism that considers priorities to meet the time critical industrial applications is proposed in this work. Latency improvements of about 40 percentage are obtained here, for slot allocations to higher priority devices, when compared with the conventional queuing methods.
APA, Harvard, Vancouver, ISO, and other styles
6

SHELTAMI, TAREK R. "AN EFFICIENT NEIGHBOR-AWARE PROTOCOL FOR SNET FORMATION." Journal of Interconnection Networks 09, no. 04 (December 2008): 439–54. http://dx.doi.org/10.1142/s0219265908002370.

Full text
Abstract:
A wireless mobile sensor network is a collection of wireless mobile hosts forming nodes that are communicating without the aid of any centralized administration or standard support services. Nodes are classified as sensor nodes and router. Some nodes act both as sensors and routers. While traditional MAC protocols must balance between throughput, delay, and fairness concerns, WSN MAC protocols place an emphasis on energy efficiency as well. Schedule-based MAC protocols have been proposed for WSN. A common theme through all these protocols is putting radios to a low-power "sleep mode" either periodically or whenever possible when a node is neither receiving nor transmitting. In this paper, we propose a novel cluster-based infrastructure creation protocol, namely: the Neighbor-Aware Clusterhead (NAC). We investigate the performance of the NAC protocol under different sleep scheduling protocols and compare it against another cluster-based protocol. In NAC protocol nodes are synchronized with their clusterheads and are allowed to go sleep mode in order to conserve their energy without degrading the performance of the network. The network is divided into clusters managed by a clusterhead. The simulation results show that NAC protocol has a good potential to be a good candidate protocol for SNET.
APA, Harvard, Vancouver, ISO, and other styles
7

Bollapragada Subrahmanya, Vikas, and Harlan B. Russell. "RMTS: A Novel Approach to Transmission Scheduling in Ad Hoc Networks by Salvaging Unused Slot Transmission Assignments." Wireless Communications and Mobile Computing 2018 (December 12, 2018): 1–13. http://dx.doi.org/10.1155/2018/2484897.

Full text
Abstract:
In mobile ad hoc networks (MANETs) there is no centralized supervision over the network operations. In such networks, it is imperative to have protocols that are implemented locally in a distributed manner. To achieve high network performance utilizing only the wireless channels a distributed transmission-scheduling medium-access control (MAC) protocol is desirable. This type of protocol can guarantee a certain level of quality of service (QOS) and works well in congested networks. However, the transmission schedules are often decided in advance and if a node does not have a packet to transmit in its assigned slot then the slot is unused. We propose a protocol called recovering minislots transmission scheduling (RMTS) that salvages these unused transmission slots that would have otherwise been wasted. We show that the proposed protocol produces significant improvements in network performance over traditional transmission-scheduling approaches.
APA, Harvard, Vancouver, ISO, and other styles
8

Alzahrani, Eman, Fatma Bouabdallah, and Hind Almisbahi. "State of the Art in Quorum-Based Sleep/Wakeup Scheduling MAC Protocols for Ad Hoc and Wireless Sensor Networks." Wireless Communications and Mobile Computing 2022 (February 8, 2022): 1–33. http://dx.doi.org/10.1155/2022/6625385.

Full text
Abstract:
In energy-constrained networks, designing an energy-efficient MAC protocol is crucial since the MAC protocol controls the access of the nodes to the shared wireless medium. Indeed, an efficient MAC protocol should reduce or even mitigate the consumption of the main sources of energy wastage, namely, overhearing, collision, and idle listening, and hence the network lifetime will be improved. One of the most efficient solutions is designing a MAC protocol that utilizes the quorum concept to increase energy efficiency by reducing idle listening and overhearing. Researchers have proposed several quorum-based MAC protocols to conserve energy. This paper presents a detailed overview and classification of several existing quorum-based sleep/wakeup scheduling MAC protocols. We classify these quorum-based MAC protocols into homogeneous and heterogeneous based on their quorum system characteristics. Moreover, we further classify these protocols according to the guaranteed intersection between any two quorums into fixed and limited. Furthermore, we compare these protocols in terms of their quorum system characteristics, limitations, and performance. Finally, a guide for future research directions is presented.
APA, Harvard, Vancouver, ISO, and other styles
9

Iqbal Khan, Muhammad Zafar, Kamarularifin Abd Jalil, and Mohd Faisal Ibrahim. "Efficient Energy Optimization Routing for WSN Based on Even-Odd Scheduling." Pertanika Journal of Science and Technology 30, no. 2 (March 28, 2022): 1343–61. http://dx.doi.org/10.47836/pjst.30.2.27.

Full text
Abstract:
Several routing protocols are being developed and used to develop energy-efficient wireless sensor networks. The necessity of saving energy is the need for technology as well as the scarcity of conventional energy. The wireless sensor nodes are run on battery power with energy limitations; therefore, this study needs to develop wireless sensor networks that can be kept alive for a longer period. From a computer science point of view, a routing mechanism can help in the improvement of the network. This research aims to design and develop a routing protocol that utilizes less energy and keeps sensor networks alive for longer period while using limited energy. An efficient and intelligent even-odd scheduling-based routing protocol influenced by LEACH has been proposed to achieve this goal. During transmission, this protocol alternatively considers evenly or oddly indexed nodes. The concept in this approach is to keep the node into consideration when it is ready to send data and when it is in the queue. Any node that is not in the queue or does not have data will not consume any significant energy, and thus the whole network conserves energy after each transmission round.
APA, Harvard, Vancouver, ISO, and other styles
10

Birur Viswanath, Shruti, Thippeswamy Muddenahalli Nagendrappa, and Krishna Rao Venkatesh. "JSMCRP: Cross-Layer Architecture based Joint-Synchronous MAC and Routing Protocol for Wireless Sensor Network." ECTI Transactions on Electrical Engineering, Electronics, and Communications 19, no. 1 (March 22, 2021): 94–113. http://dx.doi.org/10.37936/ecti-eec.2021191.240719.

Full text
Abstract:
The exponential rise in wireless technologies and allied applications has revitalized academia-industries to develop more efficient and economic routing solution to meet Quality-of-Service (QoS) provision. Amongst the major wireless communication systems, Wireless Sensor Network (WSN) is the most sought technology for defense surveillance, healthcare monitoring, industrial monitoring and control, civic and strategic infrastructure surveillance etc. Additionally, the up surge in Internet of Things (IoT) and Machine to Machine (M2M) communication systems too have broadened the horizon for WSNs based communication. However, the parallel increase in communication environment, complex network conditions etc confine efficacy of the classical WSN protocols. Dynamic network and node conditions often force classical protocols to undergo pre-mature link outage, delayed transmission, energy exhaustion and eventual QoS violation. To address such issues enhancing Median Access Control (MAC) and allied routing decision can have vital significance. However major existing efforts either focus on MAC enhancement or routing optimization, even under static WSN topology. Considering it as motive in this paper a highly robust “Cross-layer architecture based Joint-Synchronous MAC and Routing Protocol for WSN communication (JSMCRP)” has been developed. Being cross layer model JSMCRP protocol employs Application Layer, Network Layer, MAC Layer and PHY Layer to perform Network Adaptive MAC scheduling and Dynamic Routing Decision. JSMCRP employs Data Traffic Assessment, Prioritization and Scheduling (DTAPS), Proactive Network Monitoring and Knowledge (PNMK), Dynamic Congestion Index Estimation (DCIE), Adaptive Link Quality, Packet Injection Rate and Cumulative Rank Sensitive Routing Decision (CRSRD) to perform routing decision. Additionally, exploiting dynamic network/node conditions it performs Cognitive MAC scheduling to ensure QoS centric communication over IEEE 802.15.4 protocol stack. JSMCRP exhibited higher PDR, lower PLR and low delay under varying network conditions, suitable for real-time communication over constrained mobile WSN conditions.
APA, Harvard, Vancouver, ISO, and other styles
11

K, Srinivasa R., and Hemantha Kumar A.R2. "A research survey on scheduling techniques in lte-based network and its state of art." APTIKOM Journal on Computer Science and Information Technologies 3, no. 2 (January 22, 2020): 51–58. http://dx.doi.org/10.34306/csit.v3i2.78.

Full text
Abstract:
Scarce wireless resources, lead to development of cognitive radio network as a solution to unlicensed users communication in the licensed frequency band. In response to the behavior of licensed users communication, unlicensed users communication need to change from one frequency band to another band. In this communication paradigm, the performance of unlicensed users transmission control protocol gets degraded due to the features of cognitive radio network. To overcome this, several authors suggested quite a few modifications in the existing wireless transport protocol for cognitive radio network environment. This paper gives an overview of different transport protocols used for unlicensed users’ communication in cognitive radio networks.
APA, Harvard, Vancouver, ISO, and other styles
12

Phan, Linh-An, Taejoon Kim, Taehong Kim, JaeSeang Lee, and Jae-Hyun Ham. "Performance Analysis of Time Synchronization Protocols in Wireless Sensor Networks." Sensors 19, no. 13 (July 9, 2019): 3020. http://dx.doi.org/10.3390/s19133020.

Full text
Abstract:
The time synchronization protocol is indispensable in various applications of wireless sensor networks, such as scheduling, monitoring, and tracking. Numerous protocols and algorithms have been proposed in recent decades, and many of them provide micro-scale resolutions. However, designing and implementing a time synchronization protocol in a practical wireless network is very challenging compared to implementation in a wired network; this is because its performance can be deteriorated significantly by many factors, including hardware quality, message delay jitter, ambient environment, and network topology. In this study, we measure the performance of the Flooding Time Synchronization Protocol (FTSP) and Gradient Time Synchronization Protocol (GTSP) in terms of practical network conditions, such as message delay jitter, synchronization period, network topology, and packet loss. This study provides insights into the operation and optimization of time synchronization protocols. In addition, the performance evaluation identifies that FTSP is highly affected by message delay jitter due to error accumulation over multi-hops. We demonstrate that the proposed extended version of the FTSP (E-FTSP) alleviates the effect of message delay jitter and enhances the overall performance of FTSP in terms of error, time, and other factors.
APA, Harvard, Vancouver, ISO, and other styles
13

Tran, Khoa Thi Minh, and Seung Hyun Oh. "A Cooperative MAC Scheduling Scheme for Underwater Sensor Networks." Applied Mechanics and Materials 295-298 (February 2013): 903–8. http://dx.doi.org/10.4028/www.scientific.net/amm.295-298.903.

Full text
Abstract:
The long propagation delay in underwater acoustic sensor networks renders existing media access control (MAC) protocols for terrestrial wireless networks undesirable. In this paper, we propose a new cooperative MAC protocol for underwater sensor networks that is used to detect objects and monitoring the environment. Our proposed MAC protocol tries to prevent data collisions through short term scheduling among neighbor nodes with exchange of short data message. By adapting the all sensor nodes to the transmitting schedules in which time is optimized we can minimize the collision rate between nodes. Through simulations, we show our proposed protocol can minimize data collisions and not only offers a higher throughput, but also indicates a better end-to-end delay.
APA, Harvard, Vancouver, ISO, and other styles
14

AbhinashSingla, Shikha and Meenakshi Sharma. "To Design An Efficient Scheme For Mobility Of Nodes In Dynamic WSAN Based Upon Optimized Ad-ATMA." International Journal for Modern Trends in Science and Technology 7, no. 07 (February 20, 2022): 39–46. http://dx.doi.org/10.46501/ijmtst050330.

Full text
Abstract:
Worldwide Interoperability for Microwave Access (referred to as WiMAX) is a MAC and physical layer wireless communications technology for outdoor broadband wireless coverage. The WiMAX standard leaves key areas of the protocol, including packet scheduling, frame packing, and modulation/coding adaptation, unspecified. In order to accurately model and analyze WiMAX, realistic assumptions must be used. Because WiMAX systems have not been widely studied, there is a disconnect between theoretical WiMAX systems and real-world deployed systems. In this paper we are mixing up the WLAN and Wimax protocols to make it more useful for various applications.
APA, Harvard, Vancouver, ISO, and other styles
15

Dhabliya, Dharmesh, Rajasoundaran Soundararajan, Parthiban Selvarasu, Maruthi Shankar Balasubramaniam, Anand Singh Rajawat, S. B. Goyal, Maria Simona Raboaca, Traian Candin Mihaltan, Chaman Verma, and George Suciu. "Energy-Efficient Network Protocols and Resilient Data Transmission Schemes for Wireless Sensor Networks—An Experimental Survey." Energies 15, no. 23 (November 24, 2022): 8883. http://dx.doi.org/10.3390/en15238883.

Full text
Abstract:
Wireless sensor networks (WSNs) are considerably used for various environmental sensing applications. The architecture and internal specifications of WSNs have been chosen based on the requirements of particular applications. On this basis, WSNs consist of resource (energy and memory)-limited wireless sensor nodes. WSNs initiate data communication from source to destination via physical layer management principles, channel slot scheduling principles (time division multiple access), wireless medium access control (WMAC) protocols, wireless routing protocols and application protocols. In this environment, the development of WMAC principles, routing protocols and channel allotment schemes play crucial roles in network communication phases. Consequently, these layering functions consume more energy at each sensor node, which leads to minimal network lifetime. Even though the channel management schemes, medium control protocols and routing protocols are functionally suitable, the excessive energy consumption affects the overall network performance. In this situation, energy optimization algorithms are advised to minimize the resource wastage of WSNs during regular operations (medium control and routing process). Many research works struggle to identify the optimal energy-efficient load balancing strategies to improve WSN functions. With this in mind, the proposed article has conducted a detailed literature review and notable experimental comparisons on energy-efficient MAC protocols, channel scheduling policies and energy-efficient routing protocols. To an extent, the detailed analysis over these wireless network operations helps to understand the benefits and limitations of recent research works. In the experimental section of this article, eight existing techniques are evaluated under energy optimization strategies (WMAC, channel allocation, sleep/wake protocols, integrated routing and WMAC policies, balanced routing and cooperative routing). The proposed review and the classified technical observations collected from notable recent works have been recognized as crucial contributions. The results infer the suggestions for feasible WSN communication strategies with optimal channel management policies and routing policies. Notably, the simulation results show that cross-layer or multi-layer energy optimization policies perform better than homogeneous energy optimization models.
APA, Harvard, Vancouver, ISO, and other styles
16

Ammari, Habib M., and Sajal K. Das. "Scheduling protocols for homogeneous and heterogeneous -covered wireless sensor networks." Pervasive and Mobile Computing 7, no. 1 (February 2011): 79–97. http://dx.doi.org/10.1016/j.pmcj.2010.08.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Shukla, Sidharth, and Vimal Bhatia. "Priority Scheduling Algorithm for Traffic in a LTE-based Defence Mesh Network Incorporating Centralised Scheduling Architecture." Defence Science Journal 67, no. 5 (September 19, 2017): 581. http://dx.doi.org/10.14429/dsj.67.10593.

Full text
Abstract:
<p>Wireless mesh networks (WMN) are the networks of future and can operate on multiple protocols ranging from WiFi, WiMax to long term evolution (LTE). As a recent trend defence networks are incorporating off-the-shelf, state of the art commercial protocols to enhance the capability of their networks. LTE is one such commercially available protocol which is easy to deploy and provide high data rate which can be ideally implemented in WMN for defence networks. To enable these high data rate services LTE-based defence mesh networks (DMN) are the requirement of the day and future. However, LTE-based DMN are prone to congestion at times of active operations or full-fledged war. The congestion scenarios may lead to LTE packet loss. Hence, it is pertinent that these networks amalgamate information grooming algorithms to alleviate the throughput of the network in peak hour conditions. An efficient priority scheduling algorithm based on class of service prioritisation, data rate consumption and location of origin of traffic in the DMN is proposed. The simulations demonstrate that by incorporating the proposed priority scheduling algorithm, the overall packet loss of priority packets in the DMN reduces substantially.</p>
APA, Harvard, Vancouver, ISO, and other styles
18

Chauhan, Gargi, Usha Sharma, Seema Verma, and G. N. Purohit. "TDMA Scheduling Algorithm Using Independent Sets in Network Graph." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 10 (September 25, 2013): 2071–80. http://dx.doi.org/10.24297/ijct.v10i10.1195.

Full text
Abstract:
Wireless Sensor Networks (WSNs) is a distributed wireless network consists of large amount of sensor nodes which gather useful information from a variety of environment and these sensor nodes communicate with each other in a multi-hop radio networks, with the end goal of handing their processed data to the data collector or access point (AP) [1,2]. WSNs have many issues such as self-configuration, fault-tolerance, adaptation, flexibility, energy efficiency, security, scalability, interference, architectural issues, mobility and delay tolerance [3]. Amongthese issues the most critical issue is to save energy and interference. The aim of this study is to construct the network graph which is conflict free and has minimum interference and minimum energy consumption. We have MAC Access protocols but TDMA protocol is more efficient than other protocols because TDMA can eliminate collisions and remove the need for a back-off [4]. A TDMA scheduling algorithm is constructed for the wireless sensor network, which is based on the creation of separate independent sets of the representing network graph. Independent sets are employed to minimize the time slots needed for the complete transmission of data packets in the network. An algorithm has been developed to implement it and there are three different steps in the implementation of this algorithm. In first phase, the minimum independent sets of the network are constructed. In second phase, the conflict graph of given network graph has been created. In third phase, time slots are assigned to all the transmissions according to the independent sets which were created in first phase, so that all the data packets are transmitted to the access point (AP) or data collector. The simulation results indicate that the TDMA scheduling algorithm reduce the interference and energy consumption in the network graph.
APA, Harvard, Vancouver, ISO, and other styles
19

Samal, Chandra Kanta. "Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks." International journal of Computer Networks & Communications 15, no. 2 (March 30, 2023): 22–38. http://dx.doi.org/10.5121/ijcnc.2023.15202.

Full text
Abstract:
When packets are sending in multi-hop mobile unintended networks numerous problems occur like flooding, rebroadcast, broadcast latency, power conservation and collision. If multiple transmission of packets simultaneously in MANETs that using the slot assignments approach, when additional channels are transmitting at the same time as the first slot allocations, interference may occur at the nodes. Because of the multi-hops data transfer, the network performance is hampered by the constrained bandwidth and therefore the self-initiated topological alterations. Therefore, a broadcast algorithm is important within the mobile ad hoc network for collision control and reliable communication. This paper proposes two new broadcasting protocols: modify SRBS and DSB algorithms. The planned algorithms outperform context of efficiency, reliability, traffic overload and reachability in highly mobile networks is an enhanced performance within the different environments. Evaluation of simulation results with other well-known exiting protocols as DFCN and PEGSP algorithms shows that the proposed protocol performance is best within the wireless network and channel bandwidths are well utilized within the network.
APA, Harvard, Vancouver, ISO, and other styles
20

Lang, Jianjun, and Qigang Jiang. "An Energy-Efficient and Low-Latency MAC Protocol Based on Adaptive Coordination Contention Window for Wireless Sensor Networks." Open Electrical & Electronic Engineering Journal 8, no. 1 (December 31, 2014): 658–63. http://dx.doi.org/10.2174/1874129001408010658.

Full text
Abstract:
Wireless sensor network (WSN) consists of massive small sensor nodes which are located in monitoring region, the target of which is to cooperatively sense, collect and process the information of objects in the coverage area, then send the information to the observer through wireless communication. It can be widely used in military applications, medical treatment, traffic, environment monitoring and so on. Medium Access Control (MAC) Protocol, which decides how to share the wireless channel, allocates the limited communication resource among nodes and a good MAC protocol can save lots of energy and reduce collision. Firstly the thesis analyzed the research background and the current situation at home and abroad, and then discussed the structural characteristics of wireless sensor networks and other content, in which indicating the energy consumption of the wireless sensor network; Then, the thesis compared and analyzed the MAC protocols of the wireless sensor Network, focusing on competition-based MAC protocol S-MAC protocol in detail. From the shortcomings of the thesis proposed a new study of the improved protocol basing on the random work sleep scheduling mechanism; Finally, the thesis simulated the improving the MAC protocol, showing that the performances of the improved protocol are better than the original in improving energy efficiency, delay, throughput and so on from the analysis of simulation results.
APA, Harvard, Vancouver, ISO, and other styles
21

SUN, MIN-TE, SHAOYONG WANG, CHUNG-KUO CHANG, TEN-HWANG LAI, HIROYUKI SAWATARI, and HIROMI OKADA. "INTERFERENCE-MITIGATING MAC SCHEDULING AND SAR POLICIES FOR BLUETOOTH SCATTERNETS." Journal of Circuits, Systems and Computers 13, no. 02 (April 2004): 387–98. http://dx.doi.org/10.1142/s0218126604001374.

Full text
Abstract:
Bluetooth utilizes fast frequency hopping to mitigate interference from other wireless devices and other Bluetooth piconets that share the same frequency range. However, it still cannot avoid the interference between piconets entirely. In our simulation, we observed that the inter-piconet interference can significantly degrade the system throughput by more than 10%. The system throughput within a piconet can be improved by a proper arrangement of the segmentation/reassembling (SAR) policy and a good selection of MAC scheduling protocols. Many SAR policies and MAC scheduling protocols were proposed, but none of them takes the inter-piconet interference into consideration. In this paper, we study the impact of the interference on the performance of TCP traffic over a Bluetooth scatternet with multiple overlapping piconets. To alleviate the impact, we propose interference-aware SAR policies as well as the interference-aware MAC scheduling protocols. The simulation results show that our schemes help reduce the impact of the inter-piconet interference by more than 15%.
APA, Harvard, Vancouver, ISO, and other styles
22

Zhou, Yang, Yan Shi, and Shanzhi Chen. "Capacity and Delay Analysis for Large Social-Aware Mobile Ad Hoc Wireless Networks." Applied Sciences 10, no. 5 (March 3, 2020): 1719. http://dx.doi.org/10.3390/app10051719.

Full text
Abstract:
Most mobile ad hoc wireless networks have social features. It is a fundamental problem how to understand the performances of social-aware mobile ad hoc wireless networks. In this paper, we consider a wireless network area, with restricted mobility model and rank-based social model. On this basis, we investigate the upper bound of throughput capacity in such networks using the protocol interference model. By tessellating the network area into cells spatially and dividing time into slots temporally, we propose a multi-hop relay and slots allocation scheduling strategy. Then, we derive the achieved throughput capacity under this strategy. Results show per-node throughput is related to parameter of social model and range of node motion. In addition, we also study the delay varies by queueing theory in such network. Finally, we discuss capacity-delay tradeoffs in such networks. These results are beneficial to the design of network protocols in large social-aware mobile ad hoc wireless networks.
APA, Harvard, Vancouver, ISO, and other styles
23

Agussalim, Agussalim, Dhian Satria Yudha Kartika, and Ani Dijah Rahajoe. "Implementation of Ad-Hoc Protocol On Tandem Multihop Wireless Network." Jurnal Ecotipe (Electronic, Control, Telecommunication, Information, and Power Engineering) 9, no. 2 (October 16, 2022): 201–9. http://dx.doi.org/10.33019/jurnalecotipe.v9i2.3305.

Full text
Abstract:
The utilization of Internet of Things (IoT) technology, especially in remote areas, is still relatively low, even though the technology is required to implement smart farming or smart villages, which aims to improve the quality of life of people in rural areas. The high investment cost for IoT networks that still use cellular networks or Wi-Fi is one of the causes of the slow implementation of this technology. Our previous research has developed an alternative network for IoT devices in remote areas with the concept of a Tandem Multihop Wireless Network focusing on developing simple message scheduling. This research focuses on implementing ad-hoc routing protocols in tandem with multi-hop wireless to analyze the advantages and disadvantages of the protocol. Each sensor periodically sends data to the monitoring server via IoT devices on each tower. The scenario was implemented using MININET-WIFI. Evaluations were carried out to determine delivery probability, latency average, and jitter. In general, the two Ad-Hoc protocols tested, namely OLSR and BATMAN, had the same performance when the data sent was 1 MB, but when the data size was increased to 2 MB, the OLSR routing protocol on several nodes had better performance than BATMAN.
APA, Harvard, Vancouver, ISO, and other styles
24

Sharma, R., and D. K. Lobiyal. "Intelligent Water Drop Based Coverage-Connectivity and Lifespan Maximization Protocol for Wireless Sensor Networks." Recent Patents on Engineering 13, no. 3 (September 19, 2019): 261–73. http://dx.doi.org/10.2174/1872212112666180521082955.

Full text
Abstract:
Background: A significant issue of consideration in wireless sensor networks is to reduce the energy utilization while preserving the required coverage and connectivity of an area of interest. We have revised all patents relating to preserving of energy in sensor motes of the wireless sensor networks. Methods: We proposed a novel; Intelligent Water Drop based coverage-connectivity and lifespan protocol which minimizes energy consumption of the network. In this routing protocol, sensors are partitioned into the connected first layer and connected successive layer sets and a scheduling mechanism has been used to activate and deactivate sensors. Multi-hoping is used to transmit packets from sensors to the Base Station and sensor with maximum residual energy has been selected as the next hop. Power wastage has been avoided by removing duplicate information through a common relay node. Results: We have derived the expected number of sensors required to cover an area of interest and our protocol gives a long life to the network. A theorem has been provided to validate the results for different communication ranges of sensors. Conclusion: The protocol has been compared with other protocols and it proved better than other protocols in terms of the lifespan and the coverage ratio of the area. Results approve that our protocol reduces the problem of energy holes and maintains the connectivity of the network.
APA, Harvard, Vancouver, ISO, and other styles
25

Sarang, Sohail, Goran M. Stojanović, Stevan Stankovski, Željen Trpovski, and Micheal Drieberg. "Energy-Efficient Asynchronous QoS MAC Protocol for Wireless Sensor Networks." Wireless Communications and Mobile Computing 2020 (September 24, 2020): 1–13. http://dx.doi.org/10.1155/2020/8860371.

Full text
Abstract:
In recent years, wireless sensor networks (WSNs) have gained significant attention in both industry and academia. In WSNs, each sensor node is normally equipped with a small-size battery with finite capacity. Hence, energy-efficient communication is considered a key factor for the extension of network lifetime. Formerly, a large number of medium access control (MAC) protocols have been proposed to improve energy efficiency to prolong the network lifetime. There are applications that generate different types of data packets and require quality of service (QoS) without any disruption in network operation. Therefore, these applications need an energy-efficient QoS MAC protocol that can support QoS by considering energy efficiency as the primary goal to avoid any failure in the network. This article proposes an energy-efficient asynchronous QoS (AQSen) MAC protocol, called AQSen-MAC. The AQSen-MAC considers different types of data packets and uses two novel techniques: self-adaptation and scheduling to enhance energy efficiency, packet delivery ratio, and network throughput. Furthermore, in the protocol, the receiver adjusts its duty cycle according to the remaining energy to prolong the network operation. Finally, the performance of the AQSen-MAC protocol has been evaluated through detailed simulation using Castalia and compared with MPQ-MAC, PMME-MAC, and QAEE-MAC protocols. The simulation results indicate that the AQSen-MAC protocol significantly reduces the energy consumption at the receiver of up to 13.4%, consumption per bit of up to 3% and improves the packet delivery ratio and network throughput of up to 12% in the network.
APA, Harvard, Vancouver, ISO, and other styles
26

Jiao, Zhenzhen, Baoxian Zhang, Cheng Li, and Hussein T. Mouftah. "Backpressure-based routing and scheduling protocols for wireless multihop networks: A survey." IEEE Wireless Communications 23, no. 1 (February 2016): 102–10. http://dx.doi.org/10.1109/mwc.2016.7422412.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Ouni, Sofiane, Salsabil Gherairi, and Farouk Kamoun. "Data aggregation and pipelining scheduling protocols for real-time wireless sensor networks." International Journal of Ad Hoc and Ubiquitous Computing 12, no. 1 (2013): 56. http://dx.doi.org/10.1504/ijahuc.2013.051409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Elsharief, Mahmoud, Mohamed A. Abd El-Gawad, and HyungWon Kim. "Low-Power Scheduling for Time Synchronization Protocols in A Wireless Sensor Networks." IEEE Sensors Letters 3, no. 4 (April 2019): 1–4. http://dx.doi.org/10.1109/lsens.2019.2902389.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Louail, Lemia, and Violeta Felea. "Latency optimization through routing-aware time scheduling protocols for wireless sensor networks." Computers & Electrical Engineering 56 (November 2016): 418–40. http://dx.doi.org/10.1016/j.compeleceng.2016.06.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Lu, Jia-Liang, Wei Shu, and Min-You Wu. "A Survey on Multipacket Reception for Wireless Random Access Networks." Journal of Computer Networks and Communications 2012 (2012): 1–14. http://dx.doi.org/10.1155/2012/246359.

Full text
Abstract:
Multipacket reception (MPR) is the capability of simultaneous decoding of more than one packet from multiple concurrent transmissions. Continuous investigations on increasing the reception capability are giving new scientific contributions. In this paper, we provide an overview of MPR-related research work covering (1) the theoretically proved impacts and advantages of using MPR from a channel perspective to network capacity and throughput; (2) the various technologies that enable MPR from transmitter, transreceiver, and receiver perspectives; (3) previous work on protocol improvement to better exploit MPR. Indeed, MPR approaches have been applied in modern wireless mobile systems but the focus of this paper is to discuss MPR in random access wireless networks. Using MPR in such multihop environments calls for new adaptation on protocols, especially a cross-layer approach. To this end, we detail a scheduling method that targets full utilization of MPR capability.
APA, Harvard, Vancouver, ISO, and other styles
31

Lee, Sol-Bee, Jung-Hyok Kwon, and Eui-Jik Kim. "Residual Energy Estimation-Based MAC Protocol for Wireless Powered Sensor Networks." Sensors 21, no. 22 (November 16, 2021): 7617. http://dx.doi.org/10.3390/s21227617.

Full text
Abstract:
This paper presents a residual energy estimation-based medium access control (REE-MAC) protocol for wireless powered sensor networks (WPSNs) composed of a central coordinator and multiple sensor devices. REE-MAC aims to reduce overhead due to control messages for scheduling the energy harvesting operation of sensor devices and provide fairness for data transmission opportunities to sensor devices. REE-MAC uses two types of superframes that operate simultaneously in different frequency bands: the wireless energy transfer (WET) superframe and wireless information transfer (WIT) superframe. At the beginning of each superframe, the coordinator estimates the change in the residual energy of individual sensor devices caused by their energy consumption and energy harvesting during the previous superframe. It then determines the devices’ charging priorities, based on which it allocates dedicated power slots (DPSs) within the WET superframe. The simulation results demonstrated that REE-MAC exhibits superior performance for the harvested energy, average freezing time, and fairness to existing representative WPSN MAC protocols.
APA, Harvard, Vancouver, ISO, and other styles
32

Singh, Prakash Kumar, and Udai Shanker. "Transaction Scheduling Heuristics in Mobile Distributed Real Time Database System." Recent Advances in Computer Science and Communications 13, no. 4 (October 19, 2020): 758–70. http://dx.doi.org/10.2174/2213275912666190809120654.

Full text
Abstract:
Background: Today's widely used small and portable mobile database technologies have geared toward the mobile distributed real-time database systems (MDRTDBS).Various real time applications like mobile devices, missile systems, navigation control systems, satellites and many others are some examples of MDRTDBS. In the new era of technology, a large domain of applications are based on MDRTDBS, meanwhile different intrinsic limitation like disconnection and mobility typically effect on its correct execution. Mobile distributed real-time systems have different wireless constrained such like energy, processing capacity, memory storage facilities and variable network communication channels. In last few years, different applications run on different mobile nodes needed a suitable transaction mechanism to complete their service without failing its deadline. In recent years researchers focused on MDRTDBS, to develop a suitable concurrency control, commit control method. Replication, check pointing, security, caching and query processing are some other hot research topics in the field of MDRTDBS. Objective: it is needed to maintain data consistency and correct results in mobile distributed real time database system. In our review we have identified key issues which might be considered for development of various transaction executing protocols. We have Introduce a taxonomy of different CC, commit, replication and security issues, which could be advantageous for design, and development of transaction protocols. Method: In the review we have discussed various concurrency, commit, replication methods. Apart from these we have discussed various check pointing, caching and query techniques which is developed in database system. A comparison among various concurrency and commit protocols has been done in the review. The role of different key methods which can affect and help the transaction execution in wireless environment is discussed separately in the paper. Results: Analytical results are not mentioned in the review paper. However the role and affect on the transaction execution are mentioned clearly. Issues and their advantages of different concurrency and commit protocols are mentioned. Results: Analytical results are not mentioned in the review paper. However the role and affect on the transaction execution are mentioned clearly. Issues and their advantages of different concurrency and commit protocols are mentioned. Conclusion: It is found that transaction processing is still a challenging area of research. A number of issues has been discussed and reviewed various approaches to control concurrency control and atomicity methods. We have presented a detailed survey and classification of various issues based on commit, concurrency, and replication methods for MTDRTDBS. However, in the paper different security, caching and query processing and check pointing issues has been also discussed which should be considered for future work. Database researchers have needed to integrate these issues with their work and develop a suitable protocol.
APA, Harvard, Vancouver, ISO, and other styles
33

PHUA, VALANCE, and AMITAVA DATTA. "A LINK STATE DEPENDENT TDMA PROTOCOL FOR INDUSTRIAL WIRELESS SENSOR NETWORK APPLICATIONS IN PERIODICALLY CHANGING ENVIRONMENTS." Journal of Interconnection Networks 09, no. 03 (September 2008): 231–54. http://dx.doi.org/10.1142/s0219265908002254.

Full text
Abstract:
Existing TDMA-based MAC protocols for wireless sensor networks are not specifically built to consider communication channels that are prone to fading. We describe the impact of periodically changing environment on small-scale fading effects in industrial indoor wireless networks. Using a site-specific ray tracer, we show that the position of nodes and the periodic movements of objects with constant velocities in the environment have significant impact on signal fading. Finding that fading is approximately periodic, we propose a TDMA-based MAC protocol for wireless sensor networks built for industrial applications that uses link state dependent scheduling. In our approach, nodes gather samples of the channel quality and generate prediction sets from the sample sets in independent slots. Using the prediction sets, nodes only wake up to transmit/receive during scheduled slots that are predicted to be clear and sleep during scheduled slots that may potentially cause a transmitted signal to fade. We simulate our proposed protocol and compare its performance with the well published Z-MAC protocol. We found that our protocol significantly improves packet throughput and energy consumption as compared to Z-MAC. We also found that in conditions which are not perfect under our assumptions, the performance of our protocol degrades gracefully.
APA, Harvard, Vancouver, ISO, and other styles
34

Guyeux, Christophe, Abdallah Makhoul, Ibrahim Atoui, Samar Tawbi, and Jacques M. Bahi. "A Complete Security Framework for Wireless Sensor Networks." International Journal of Information Technology and Web Engineering 10, no. 1 (January 2015): 47–74. http://dx.doi.org/10.4018/ijitwe.2015010103.

Full text
Abstract:
Wireless sensor networks are often deployed in public or otherwise untrusted and even hostile environments, which prompt a number of security issues. Although security is a necessity in other types of networks, it is much more so in sensor networks due to the resource-constraint, susceptibility to physical capture, and wireless nature. Till now, most of the security approaches proposed for sensor networks present single solution for particular and single problem. Therefore, to address the special security needs of sensor networks as a whole we introduce a security framework. In their framework, the authors emphasize the following areas: (1) secure communication infrastructure, (2) secure scheduling, and (3) a secure data aggregation algorithm. Due to resource constraints, specific strategies are often necessary to preserve the network's lifetime and its quality of service. For instance, to reduce communication costs, data can be aggregated through the network, or nodes can go to sleep mode periodically (nodes scheduling). These strategies must be proven as secure, but protocols used to guarantee this security must be compatible with the resource preservation requirement. To achieve this goal, secure communications in such networks will be defined, together with the notions of secure scheduling and secure aggregation. The concepts of indistinguability, nonmalleability, and message detection resistance will thus be adapted to communications in wireless sensor networks. Finally, some of these security properties will be evaluated in concrete case studies.
APA, Harvard, Vancouver, ISO, and other styles
35

Catarinucci, Luca, Sergio Guglielmi, Luca Mainetti, Vincenzo Mighali, Luigi Patrono, Maria Laura Stefanizzi, and Luciano Tarricone. "An Energy-Efficient MAC Scheduler based on a Switched-Beam Antenna for Wireless Sensor Networks." Journal of Communications Software and Systems 9, no. 2 (June 21, 2013): 117. http://dx.doi.org/10.24138/jcomss.v9i2.149.

Full text
Abstract:
Wireless Sensor Networks (WSNs) are receiving an ever increasing attention because they are one of the most important technologies enabling the Internet of Things vision. Since nodes of these networks are battery-powered, energy efficiency represents one of the main design objectives. This goal can be primarily achieved through an optimization of the communication phase, which is the most power consuming operation for a WSN node. However, the limited computational and storage resources of physical devices make the design of complex communication protocols particularly hard, suggesting, on the contrary, to integrate more simple communication protocols with hardware solutions aimed at energy saving. In this work, a new MAC protocol, compatible with the IEEE 802.15.4 standard, and a reconfigurable beam-steering antenna are presented and validated. They significantly reduce the nodes’ power consumption by exploiting scheduling techniques and directional communications. Specifically, both during transmission and receiving phases, the node activates exclusively the antenna sector needed to communicate with the intended neighbour. The designed antenna and the proposed protocol have been thoroughly evaluated by means of simulations and test-beds, which have highlighted their good performance. In particular, the MAC protocol has been implemented on the Contiki Operating System and it was compared with the IEEE 802.15.4 standard solution.
APA, Harvard, Vancouver, ISO, and other styles
36

Talib, Mohammed Saad. "Minimizing the Energy Consumption in Wireless Sensor Networks." JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 26, no. 1 (December 19, 2017): 17–28. http://dx.doi.org/10.29196/jub.v26i1.349.

Full text
Abstract:
Energy in Wireless Sensor networks (WSNs) represents an essential factor in designing, controlling and operating the sensor networks. Minimizing the consumed energy in WSNs application is a crucial issue for the network effectiveness and efficiency in terms of lifetime, cost and operation. Number of algorithms and protocols were proposed and implemented to decrease the energy consumption. Principally, WSNs operate with battery-powered sensors. Since Sensor's batteries have not been easily recharge. Therefore, prediction of the WSN represents a significant concern. Basically, the network failure occurs due to the inefficient sensor's energy. MAC protocols in WSNs achieved low duty-cycle by employing periodic sleep and wakeup. Predictive Wakeup MAC (PW-MAC) protocol was made use of the asynchronous duty cycling. It reduces the consumption of the node energy by allowing the senders to predict the receiver′s wakeup time. The WSN must be applied in an efficient manner to utilize the sensor nodes and their energy to ensure effective network throughput. To ensure energy efficiency the sensors' duty cycles must be adjusted appropriately to meet the network traffic demands. The energy consumed in each node due to its switching between the active and idle states was also estimated. The sensors are assumed to be randomly deployed. This paper aims to improve the randomly deployed network lifetime by scheduling the effects of transmission, reception and sleep states on the energy consumption of the sensor nodes. Results for these states with much performance metrics were also studied and discussed.
APA, Harvard, Vancouver, ISO, and other styles
37

Park, Mingyu, and Jeongyeup Paek. "On-Demand Scheduling of Command and Responses for Low-Power Multihop Wireless Networks." Sensors 21, no. 3 (January 22, 2021): 738. http://dx.doi.org/10.3390/s21030738.

Full text
Abstract:
Many IoT applications require a mechanism to disseminate commands and collect responses over a wireless network in order to control and collect data from multiple embedded devices. However, severe collisions may occur if a large number of nodes attempt to respond simultaneously and promptly, not only among the responses, but also with the dissemination of commands. This is because low-power wireless network protocols for dissemination and collection have been designed separately. Tuning the parameters of one side of the protocol has clear trade-off between reliability and latency. To address this challenge, we propose SCoRe, an on-demand scheme for joint scheduling of command and responses on multihop low-power wireless networks to improve both reliability and latency simultaneously at runtime. SCoRe gathers the amount of time required by network nodes for dissemination and collection, and allocates relative timeslots to each node recursively over multihop on-demand when (and only when) disseminating a command. While doing so, information exchange occurs only between local neighbor nodes without a need for global routing table nor time synchronization. We implement SCoRe on a low-power embedded platform, and compare with well-known dissemination and collection schemes through both simulations and testbed experiments on 30 devices. Our evaluation results show that SCoRe can improve both latency and reliability without tuning the parameters for one metric, while the legacy schemes require careful parameter selection to match only one side of SCoRe, never both.
APA, Harvard, Vancouver, ISO, and other styles
38

Srie Vidhya Janani, E., and P. Ganesh Kumar. "Energy Efficient Cluster Based Scheduling Scheme for Wireless Sensor Networks." Scientific World Journal 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/185198.

Full text
Abstract:
The energy utilization of sensor nodes in large scale wireless sensor network points out the crucial need for scalable and energy efficient clustering protocols. Since sensor nodes usually operate on batteries, the maximum utility of network is greatly dependent on ideal usage of energy leftover in these sensor nodes. In this paper, we propose an Energy Efficient Cluster Based Scheduling Scheme for wireless sensor networks that balances the sensor network lifetime and energy efficiency. In the first phase of our proposed scheme, cluster topology is discovered and cluster head is chosen based on remaining energy level. The cluster head monitors the network energy threshold value to identify the energy drain rate of all its cluster members. In the second phase, scheduling algorithm is presented to allocate time slots to cluster member data packets. Here congestion occurrence is totally avoided. In the third phase, energy consumption model is proposed to maintain maximum residual energy level across the network. Moreover, we also propose a new packet format which is given to all cluster member nodes. The simulation results prove that the proposed scheme greatly contributes to maximum network lifetime, high energy, reduced overhead, and maximum delivery ratio.
APA, Harvard, Vancouver, ISO, and other styles
39

Rao, Dasari Srinivasa, and Victor Dhason Berlin Hency. "QoS-based Joint User Selection and Scheduling for MU-MIMO WLANs." Journal of Telecommunications and Information Technology 4 (December 20, 2017): 17–24. http://dx.doi.org/10.26636/jtit.2017.112217.

Full text
Abstract:
The shift in Multi-User Multiple Input Multiple Output (MU-MIMO) has gained attention due to its wide support in very high throughput Wireless Local Area Networks (WLANs) such as the 802.11ac. However, the full advantage of MU-MIMO can be utilized only with proper user selection and scheduling. Also, providing Quality of Service (QoS) support is a major challenge for these wireless networks. Generally, user scheduling is done with the acquisition of Channel State Information (CSI) from all the users. In MU-MIMO based WLANs, the number of CSI request increases with the number of users. This results in an increased CSI overhead and in degradation of the overall throughput. Most of the proposals in the literature have not addressed the contention in the CSI feedback clearly. Hence, in this paper a Joint User Selection and Scheduling (JUSS) scheme is discussed and its performance is evaluated in terms of throughput, delay, packet loss and fairness. In the performance comparison some wellknown Medium Access Control (MAC) protocols are considered. The proposed scheme not only enhances throughput, but also avoids contention during CSI feedback period.
APA, Harvard, Vancouver, ISO, and other styles
40

Marwat, Safdar Nawaz Khan, Yasir Mehmood, Farman Ullah, Ahmad Khan, Shahid Khan, Salman Ahmed, Daehan Kwak, and Afia Nazir. "Mobile Wi-Fi Based Scheduling of Cyber-Physical Systems in Healthcare." Electronics 9, no. 2 (February 2, 2020): 247. http://dx.doi.org/10.3390/electronics9020247.

Full text
Abstract:
Wireless Body Area Networks (WBANs) and Wireless Local Area Networks (WLANs) have been widely regarded as solution providers for future Cyber-Physical Systems (CPS)-based ehealthcare amenities. The IEEE 802.11 standard specifies media access protocols in wireless networks, along with channel access methods. WBANs are expected to improve the existing healthcare services significantly, but several research challenges also have to be tackled for apt utilization of the technology. Guarantee of Quality-of-Service (QoS) differentiation between various health parameters, such as temperature and blood pressure, during mobility is a major challenge for the provision of ehealthcare services. The scheme proposed in this paper for the Mobile Wi-Fi based connectivity of WBANs is designed to provide QoS-based priorities for ehealthcare subscribers by altering the Contention Window (CW) for different applications of patient health monitoring. The relationship between CW and QoS is utilized to achieve efficient resource assignment. Three different health parameters, i.e., ECG (Electrocardiogram), BP (blood pressure) and temperature. are monitored using medical CPS in this work. The performance evaluation results, such as end-to-end packet delay and throughput for various data traffic classes reveal that the proposed scheme improves QoS provision.
APA, Harvard, Vancouver, ISO, and other styles
41

Joshi, Upasna, and Rajiv Sharma. "An optimal data aggregation technique for physics-based applications." Modern Physics Letters B 32, no. 25 (September 5, 2018): 1850297. http://dx.doi.org/10.1142/s0217984918502974.

Full text
Abstract:
In wireless sensor network (WSN), most of the devices function on batteries. These nodes or devices have inadequate amount of initial energy which are consumed at diverse rates, based on the power level and intended receiver. In sleep scheduling algorithms, most of the sensor nodes are turned to sleep state to preserve energy and improve the network lifetime (NL). In this paper, an energy-efficient dynamic cluster-based protocol is proposed for WSN especially for physics-based applications. Initially, the network is divided into small clusters using adaptive clustering. The clusters are managed by the cluster heads. The cluster heads are elected based on the novel dynamic threshold. Afterwards, general variable neighborhood search is used to obtain the energy-efficient paths for inter-cluster data aggregation which is used to communicate with the sink. The performance of the proposed method is compared with competitive energy-efficient routing protocols in terms of various factors such as stable period, NL, packets sent to base station and packets sent to cluster head. Extensive experiments prove that the proposed protocol provides higher NL than the existing protocols.
APA, Harvard, Vancouver, ISO, and other styles
42

Almomani, Iman, Bassam Al-Kasasbeh, and Mousa AL-Akhras. "WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks." Journal of Sensors 2016 (2016): 1–16. http://dx.doi.org/10.1155/2016/4731953.

Full text
Abstract:
Wireless Sensor Networks (WSN) have become increasingly one of the hottest research areas in computer science due to their wide range of applications including critical military and civilian applications. Such applications have created various security threats, especially in unattended environments. To ensure the security and dependability of WSN services, an Intrusion Detection System (IDS) should be in place. This IDS has to be compatible with the characteristics of WSNs and capable of detecting the largest possible number of security threats. In this paper a specialized dataset for WSN is developed to help better detect and classify four types of Denial of Service (DoS) attacks: Blackhole, Grayhole, Flooding, and Scheduling attacks. This paper considers the use of LEACH protocol which is one of the most popular hierarchical routing protocols in WSNs. A scheme has been defined to collect data from Network Simulator 2 (NS-2) and then processed to produce 23 features. The collected dataset is called WSN-DS. Artificial Neural Network (ANN) has been trained on the dataset to detect and classify different DoS attacks. The results show that WSN-DS improved the ability of IDS to achieve higher classification accuracy rate. WEKA toolbox was used with holdout and 10-Fold Cross Validation methods. The best results were achieved with 10-Fold Cross Validation with one hidden layer. The classification accuracies of attacks were 92.8%, 99.4%, 92.2%, 75.6%, and 99.8% for Blackhole, Flooding, Scheduling, and Grayhole attacks, in addition to the normal case (without attacks), respectively.
APA, Harvard, Vancouver, ISO, and other styles
43

Kumar V., Shiva, Rajashree V. Biradar, and V. C. Patil. "Design and Performance Analysis of Hybrid Energy Harvesting and WSN Application for More Life Time and High Throughput." International Journal of Circuits, Systems and Signal Processing 16 (January 17, 2022): 686–98. http://dx.doi.org/10.46300/9106.2022.16.85.

Full text
Abstract:
the technology of wireless sensor-actuator networks (WSANs) is widely employed in the applications of IoT due to its wireless nature and it does not involve any wired structure. The wireless systems that are battery-driven can easily reconfigure the existing devices and sensors efficiently in the manufacturing units without employing any cable for power operation as well as for communication. The wireless sensor-actuator networks that are based on IEEE 802.15.4 consumes significantly less power. These networks are designed and built cost-effectively by considering the capacity of battery and expense so that they can be employed for many applications. The application of a typical wireless Autonomous Scheduling and Distributed Graph Routing (DDSR) has illustrated the reliability of employing its basic approaches for almost ten years and it consists of the accurate plot for routing and time-slotted channel hopping therefore ensuring accurate low-power wireless communication in the processing site. Officially declared by the controversial statements associated with the government of Greek experiences fourth industrialization. There is a huge requirement for sensor nodes link via WSAN in the industrial site. Also, reduced computational complexity is one of the drawbacks faced by the existing standards of WSAN which is caused because of their highly centralized traffic management systems and thereby significantly improves the consistency and accessibility of network operations at the expense of optimization. This research work enables the study of efficient Wireless DGR network management and also introduces an alternative for DDSR by enabling the sensor nodes to determine their data traffic routes for the transmission of data. When compared to the above two physical routing protocols, the proposed technique can drastically improve the performance of a network, throughput, and energy consumption under various aspects. Energy harvesting (EH) plays a significant role in the implementation of large IoT devices. The requirement for subsequent employment of power sources is eliminated by The efficient approach of Energy Harvesting and thereby providing a relatively close- perpetual working environment for the network. The structural concept of routing protocols that are designed for the IoT applications which are based on the wireless sensor has been transformed into "energy-harvesting-aware" from the concept of "energy-aware" because of the development in the Energy harvesting techniques. The main objective of the research work is to propose a routing protocol that is energy-harvesting-aware for the various network of IoT in case of acoustic sources of energy. A novel algorithm for routing called Autonomous Scheduling and Distributed Graph Routing (DDSR) has been developed and significantly improved by incorporating a new “energy back-off” factor. The proposed algorithm when integrated with various techniques of energy harvesting enhances the longevity of nodes, quality of service of a network under increased differential traffic, and factors influencing the accessibility of energy. The research work analyses the performance of the system for various constraints of energy harvesting. When compared to previous routing protocols the proposed algorithm achieves very good energy efficiency in the network of distributed IoT by fulfilling the requirements of QoS.
APA, Harvard, Vancouver, ISO, and other styles
44

Mahfoudh, Saoucene, Gerard Chalhoub, Pascale Minet, Michel Misson, and Ichrak Amdouni. "Node Coloring and Color Conflict Detection in Wireless Sensor Networks." Future Internet 2, no. 4 (October 13, 2010): 469–504. http://dx.doi.org/10.3390/fi2040469.

Full text
Abstract:
In wireless sensor networks, energy efficiency is mainly achieved by making nodes sleep. In this paper, we present the combination of SERENA, a new node activity scheduling algorithm based on node coloring, with TDMA/CA, a collision avoidance MAC protocol. We show that the combination of these two protocols enables substantial bandwidth and energy benefits for both general and data gathering applications. As a first contribution, we prove that the three-hop node coloring problem is NP-complete. As a second contribution, the overhead induced by SERENA during network coloring is reduced, making possible the use of these protocols even in dense networks with limited bandwidth. The third contribution of this paper is to show that applying any slot assignment algorithmwith spatial reuse based on node neighborhood without taking into account link quality can lead to poor performances because of collisions. The use of good quality links will prevent this phenomenon. The fourth contribution consists of optimizing end-to-end delays for data gathering applications, by means of cross-layering with the application. However, color conflicts resulting from topology changes, mobility and late node arrivals can give rise to collisions. As a fifth contribution, we show how the MAC layer can detect color conflicts, and cope with them at the cost of a slightly reduced throughput. Then, we discuss the tradeoffbetween requesting SERENA to solve the color conflicts and dealing with them at the MAC layer, our third contribution. The combination of SERENA and TDMA/CA is evaluated through simulations on realistic topologies.
APA, Harvard, Vancouver, ISO, and other styles
45

Jayaram, Asokan, and Sanjoy Deb. "EA-MAC: A QoS Aware Emergency Adaptive MAC Protocol for Intelligent Scheduling of Packets in Smart Emergency Monitoring Applications." Journal of Circuits, Systems and Computers 29, no. 13 (February 28, 2020): 2050205. http://dx.doi.org/10.1142/s0218126620502059.

Full text
Abstract:
The evolution of the wireless sensor network (WSN) in recent years has reached its greatest heights and applications are increasing day by day, one such application is Smart Emergency Monitoring Systems (SMESs) which is in vision of implementation in every urban and rural areas. The implementation of WSN architecture in the Smart Monitoring Systems needs an intelligent scheduling mechanism that efficiently handles the high traffic load as well as the emergency traffic load without sacrificing the energy efficiency of the network. However, the traditional scheduling algorithms such as First Come First Served (FCFS), Round Robin, and Shortest Job First (SJF) cannot meet the requirements of high traffic load in SMESs. To address these shortcomings, this paper presents Emergency Adaptive Medium Access Control protocol (EA-MAC), a fuzzy priority scheduling based Quality-of-service (QoS)-aware medium access control (MAC) protocol for hierarchical WSNs. EA-MAC protocol employs the most powerful fuzzy logics to schedule the sensor nodes with both normal and emergency traffic load without any data congestion, and packet loss and maintaining the better QoS which is considered to be more important in SMESs applications. Moreover, a novel rank-based clustering mechanism in EA-MAC protocol prolongs the network lifetime by minimizing the distance between the Cluster Head (CH) and the Base Station (BS). Both analytical and simulation models demonstrate the superiority of the EA-MAC protocol in terms of energy consumption, transmission delay and data throughput when compared with the existing Time Division Multiple Access (TDMA) based MAC protocols such as LEACH protocol and Cluster Head Election Mechanism-Based On Fuzzy Logic (CHEF) protocol.
APA, Harvard, Vancouver, ISO, and other styles
46

Al-Medhwahi, Mohammed, Fazirulhisyam Hashim, Borhanuddin Mohd Ali, A. Sali, and Abdulsalam Alkholidi. "Resource allocation in heterogeneous cognitive radio sensor networks." International Journal of Distributed Sensor Networks 15, no. 7 (July 2019): 155014771985194. http://dx.doi.org/10.1177/1550147719851944.

Full text
Abstract:
Cognitive radio sensor networks offer a promising means of meeting rapidly expanding demand for wireless sensor network applications in new monitoring and objects tracking fields. Several challenges, particularly in terms of quality of service provisioning, arise because of the inherited capability-limitation of end-sensor nodes. In this article, an efficient resource allocation scheme, improved Pliable Cognitive Medium Access Protocol, is proposed to tackle multilevel of heterogeneity in cognitive radio sensor networks. The first level is the network’s application heterogeneity, and the second level is the heterogeneity of the radio environment. The proposed scheme addresses scheduling and radio channel allocation issues. Allocation-decision making is centralized, whereas spectrum sensing is distributed, thereby increasing efficiency and limiting interference. Despite the limited capabilities of the sensor’s networks, the effectiveness of the proposed scheme also includes increasing the opportunity to utilize a wider range of the radio spectrum. improved Pliable Cognitive Medium Access protocol is quite appropriate for critical communications that gain attention in the next 5G of wireless networks. Simulation results and the comparison of the proposed protocol with other protocols indicate the robust performance of the proposed scheme. The results reveal the significant effectiveness, with only a slight trade-off in terms of complexity.
APA, Harvard, Vancouver, ISO, and other styles
47

Li, Suipeng, and Dan Shen. "Wireless Music Playing Buzzer Sensor-Assisted Music Tone Adaptive Control." Journal of Sensors 2022 (February 2, 2022): 1–11. http://dx.doi.org/10.1155/2022/9002533.

Full text
Abstract:
Aiming at the problem of adaptive change of auxiliary music tones, this paper proposes a MAC protocol with a common music tone listening/sleeping type based on a wireless music buzzer sensor. First of all, the new MAC protocol adopts network-wide synchronization, and all sensor nodes in the entire network use the same scheduling table, so that the entire network nodes enter the music tone listening period and the sleep period at the same time. Secondly, the node adaptively adjusts the duty cycle of the node according to the number of data packets in the sending queue, increases the node’s music tone listening time, reduces the end-to-end delay of data packets, and improves the throughput of the network. Then, the experiment adopts a new backoff strategy to adjust the contention window according to the backoff times and collision times of data packets sent by nodes in the last five working cycles, increase the backoff time of sending data packets under high network load, and reduce the appearance of data packets. We build four simulation experiments on the NS2 simulation platform: unassisted music tone adaptive network, single auxiliary music tone adaptive network, auxiliary music tone adaptive convergence network, and random deployment network, which will be based on the auxiliary music tone adaptive MAC protocol, and IEEE802.11 protocol and SMAC protocol are run in four simulation experiments, respectively, and the performance of the three protocols is analyzed according to the tracking files in the simulation experiment. The analysis results show that the simulation wireless sounding buzzer sensor network is adaptive to different auxiliary music tones and different topologies.
APA, Harvard, Vancouver, ISO, and other styles
48

Chaaf, Amir, Mohammed Saleh Ali Muthanna, Ammar Muthanna, Soha Alhelaly, Ibrahim A. Elgendy, Abdullah M. Iliyasu, and Ahmed A. Abd El-Latif. "Energy-Efficient Relay-Based Void Hole Prevention and Repair in Clustered Multi-AUV Underwater Wireless Sensor Network." Security and Communication Networks 2021 (June 30, 2021): 1–20. http://dx.doi.org/10.1155/2021/9969605.

Full text
Abstract:
Underwater wireless sensor networks (UWSNs) enable various oceanic applications which require effective packet transmission. In this case, sparse node distribution, imbalance in terms of overall energy consumption between the different sensor nodes, dynamic network topology, and inappropriate selection of relay nodes cause void holes. Addressing this problem, we present a relay-based void hole prevention and repair (ReVOHPR) protocol by multiple autonomous underwater vehicles (AUVs) for UWSN. ReVOHPR is a global solution that implements different phases of operations that act mutually in order to efficiently reduce and identify void holes and trap relay nodes to avoid it. ReVOHPR adopts the following operations as ocean depth (levels)-based equal cluster formation, dynamic sleep scheduling, virtual graph-based routing, and relay-assisted void hole repair. For energy-efficient cluster forming, entropy-based eligibility ranking (E2R) is presented, which elects stable cluster heads (CHs). Then, dynamic sleep scheduling is implemented by the dynamic kernel Kalman filter (DK2F) algorithm in which sleep and active modes are based on the node’s current status. Intercluster routing is performed by maximum matching nodes that are selected by dual criteria, and also the data are transmitted to AUV. Finally, void holes are detected and repaired by the bicriteria mayfly optimization (BiCMO) algorithm. The BiCMO focuses on reducing the number of holes and data packet loss and maximizes the quality of service (QoS) and energy efficiency of the network. This protocol is timely dealing with node failures in packet transmission via multihop routing. Simulation is implemented by the NS3 (AquaSim module) simulator that evaluates the performance in the network according to the following metrics: average energy consumption, delay, packet delivery rate, and throughput. The simulation results of the proposed REVOHPR protocol comparing to the previous protocols allowed to conclude that the REVOHPR has considerable advantages. Due to the development of a new protocol with a set of phases for data transmission, energy consumption minimization, and void hole avoidance and mitigation in UWSN, the number of active nodes rate increases with the improvement in overall QoS.
APA, Harvard, Vancouver, ISO, and other styles
49

Chiwariro, Ronald, and Dr P. Lokaiah. "Cross-Layer Based QoS Aware Load-balancing Multi-Path Routing Protocol over Wireless Multimedia Sensor Networks." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (August 31, 2023): 639–60. http://dx.doi.org/10.22214/ijraset.2023.55139.

Full text
Abstract:
Abstract: Currently, the utilization of WMSNs in different real-time and non-real-time applications requires an excessive amount of bandwidth for reliable data delivery. The unique features of WMSNs are significantly challenging in satisfying the QoS requirements in such application-specific environments and balancing the traffic load among the devices. The provision of reliable multipath routing is a cornerstone in fulfilling the QoS requirements of WMSNs. Selecting multiple optimal paths between a source and destination based on peculiar routing metrics enhances the performance of QoS routing. Generally, routing protocols exploit several routing metrics, such as delay, remaining energy of nodes, hop count, available bandwidth, and packet loss rate in path selection to attain high reliability in data delivery. Many existing routing protocols only consider the network layer parameters, whereas it lacks focus on the data link and physical layer parameters, which creates a severe impact on the degradation of QoS. In addition to that, varying bandwidth channels create interference in multimedia data delivery and degrade the network performance. Designing a multipath routing protocol by considering cross-layer parameters offer a promising solution to optimize the WMSN performance. In cross-layer design, diverse protocol layers support the routing decisions adaptively by perceiving the dynamic characteristics of the wireless medium, resulting in fair use of scarce resources with high QoS. A Cross-Layer Based QoS Aware Load-Balancing Multipath Routing Protocol over Wireless Multimedia Sensor Networks was the goal of the study's five design objectives. The study and analysis of QoS and cross-layer-based routing algorithms for WMSNs was the initial goal. Secondly, a Deep Learning prioritization-based packet classifier to divide traffic according to priority. To ensure fair resource consumption and distribution of multimedia traffic, the third goal was to design and create a cross-layer optimizer model for optimal multiple disjoint route selection using machine learning techniques. The development of a cutting-edge channel-scheduling algorithm was goal four. It was designed to efficiently assign low-interference channels to communication devices in order to lower the packet drop rate in real-time packet delivery. Last but not least, a security method for Wireless Multimedia Sensor Networks' Cross-Layer based multipath routing protocol.
APA, Harvard, Vancouver, ISO, and other styles
50

Elsharief, Mahmoud, Mohamed A. Abd El-Gawad, Haneul Ko, and Sangheon Pack. "EERS: Energy-Efficient Reference Node Selection Algorithm for Synchronization in Industrial Wireless Sensor Networks." Sensors 20, no. 15 (July 23, 2020): 4095. http://dx.doi.org/10.3390/s20154095.

Full text
Abstract:
Time synchronization is an essential issue in industrial wireless sensor networks (IWSNs). It assists perfect coordinated communications among the sensor nodes to preserve battery power. Generally, time synchronization in IWSNs has two major aspects of energy consumption and accuracy. In the literature, the energy consumption has not received much attention in contrast to the accuracy. In this paper, focusing on the energy consumption aspect, we introduce an energy-efficient reference node selection (EERS) algorithm for time synchronization in IWSNs. It selects and schedules a minimal sequence of connected reference nodes that are responsible for spreading timing messages. EERS achieves energy consumption synchronization by reducing the number of transmitted messages among the sensor nodes. To evaluate the performance of EERS, we conducted extensive experiments with Arduino Nano RF sensors and revealed that EERS achieves considerably fewer messages than previous techniques, robust time synchronization (R-Sync), fast scheduling and accurate drift compensation for time synchronization (FADS), and low power scheduling for time synchronization protocols (LPSS). In addition, simulation results for a large sensor network of 450 nodes demonstrate that EERS reduces the whole number of transmitted messages by 52%, 30%, and 13% compared to R-Sync, FADS, and LPSS, respectively.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography