ANALYSIS OF THE MULTI-CHANNEL THREEDIMENSIONAL PROBABILITY CSMA PROTOCOL WITH MONITORING FUNCTION FOR WSN

Publications

Share / Export Citation / Email / Print / Text size:

International Journal on Smart Sensing and Intelligent Systems

Professor Subhas Chandra Mukhopadhyay

Exeley Inc. (New York)

Subject: Computational Science & Engineering, Engineering, Electrical & Electronic

GET ALERTS

eISSN: 1178-5608

DESCRIPTION

5
Reader(s)
14
Visit(s)
0
Comment(s)
0
Share(s)

VOLUME 9 , ISSUE 1 (March 2016) > List of articles

ANALYSIS OF THE MULTI-CHANNEL THREEDIMENSIONAL PROBABILITY CSMA PROTOCOL WITH MONITORING FUNCTION FOR WSN

Yifan Zhao

Keywords : Throughput, priority, multi-channel, three-dimensional probability CSMA, energy efficiency.

Citation Information : International Journal on Smart Sensing and Intelligent Systems. Volume 9, Issue 1, Pages 334-352, DOI: https://doi.org/10.21307/ijssis-2017-873

License : (CC BY-NC-ND 4.0)

Received Date : 02-December-2015 / Accepted: 21-January-2016 / Published Online: 01-March-2016

ARTICLE

ABSTRACT

For the wireless sensor networks (WSNs), MAC layer protocol, relating to system throughput, involving functions of system, concerning the consumption of system energy efficiency, etc. other system indicators, is very important. With the development of WSN, involving vary businesses, the amount and style of data which the sensor nodes detecting is large and divertive. Based on three-dimensional probability CSMA protocol, the proposed protocol, multi-channel three-dimensional probability CSMA protocol with monitoring function (MATP-CSMA), is providing the sensor nodes owning different task with diversified throughput, meeting the quality of services (QoS) of diversiform business. The paper analyses the protocol from three aspects: the system throughput, system delay and energy efficiency. Through rigorous mathematical derivation, get the exact expression of relevant indicators; with the use of simulation tools, verify the accuracy of the model and expressions.

Content not available PDF Share

FIGURES & TABLES

REFERENCES

[1] Chandra Khatua, Ipsita Chinya, Debdulal Saha, Shyamal Das, Ranjan Sen and Anirban Dhara. Modified clad optical fibre coated with pva/tio2 nano composite for humidity sensing application [J]. International Journal on Smart Sensing and Intelligent Systems. 2015, 8(3): 1424 -1442.
[2] Shengjie Zhou, Hongwei Ding, Yifan Zhao, Zhijun Yang and Qianlin Liu. Research on the discrete time three-dimensional probability csma protocol in ad-hoc network [J]. International Journal of Recent Scientific Research, 2015, 6(5): 4257-4262.
[3] Yifan Zhao, Shengjie Zhou, Hongwei Ding, Qianlin Liu, Zhijun Yang, Chunfen Li. The p-persistent csma with the function of monitoring based on time division mechanism [J]. International Journal of Innovative Research in Technology & Science, 2015,3 (6): 38-42.
[4] Conti M, Giordano S. Mobile ad hoc networking: milestones, challenges, and new research directions [J]. Communications Magazine, IEEE, 2014, 52(1): 85-96.
[5] Gandhi C, Arya V. A Survey of Energy-Aware Routing Protocols and Mechanisms for Mobile Ad Hoc Networks [J]. Intelligent Computing, Networking, and Informatics. Springer India, 2014: 111-117.
[6] Payman Moallem, Mohammad Ali Abdollahi, and S. Mehdi Hashemi. Compensation of capacitive differential pressure sensor using multi layer perceptron neural network [J]. International Journal on Smart Sensing and Intelligent Systems. 2015, 8(3): 1443 -1463.
[7] Xiaoping Wu. Research on the hidden and exposed terminal problem in the Ad Hoc network [J]. Microcomputer Information, 2006 (10X): 35-37.
[8] H.X. Tian, W.F. Wu, P. Wang and H.Z. Li. Modelling of equipment failure rate accounting for the uncertainty [J]. International Journal on Smart Sensing and Intelligent Systems. 2015, 8(3): 1484 -1504.
[9] Wang L, Wu K, Hamdi M. Attached-RTS: Eliminating an Exposed Terminal Problem in Wireless Networks [J]. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(7): 1289-1299.
[10]Yifan Zhao, Shengjie Zhou, Hongwei Ding, Qianlin Liu, Zhijun Yang and Chunfen Li. Analysis of double clocks multi-channel two-dimensional probability csma based on binary tree conflict resolution mechanism [J]. International Journal of Information Research and Review, 2015, 2(11): 1419-1428.
[11]Yingying Guo, Jing Nan, Hongwei Ding, Yifan Zhao and Shengjie Zhou. Research on the multi-channel p-persistent csma protocol with monitoring function [J]. International Journal of Future Generation Communication and Networking, 2015, 8(5): 115-124.
[12]Cheng B, Ci L, Tian C, et al. A Multi-channel MAC Protocol with High Throughput for Wireless Sensor Networks [J]. Advanced Technologies in Ad Hoc and Sensor Networks. Springer Berlin Heidelberg, 2014: 145-154.
[13]Jia He. Research on the access protocol of Ad Hoc network based on the multi-channel [J]. Modern Computer: half Edition, 2008 (10): 113-115.
[14]Hongwei Ding, Yingying Guo, Qianlin Liu and Shengjie Zhou. The multichannel pd-csma with 3-way handshake based on conflict resolution algorithm in wsn [J]. International Journal of Recent Scientific Research, 2015, 6(4): 3714-3718.
[15]S.J. Zhou, H.W. Ding, Y.F. Zhao, P. Li. The discrete time non-persistent csma protocol with functions of monitoring and multichannel mechanism based on binary tree conflict resolution in wsn [C]. International Conference on Computer Information Systems and Industrial Applications, 2015: 118-121.
[16]Hongwei Ding, Yingying Guo, Yifan Zhao, Shengjie Zhou, and Qianlin Liu. Research on the Multi-channel Probability Detection CSMA Protocol with Monitoring Function [J]. Sensor Lett, 2015, 13: 143-146.
[17]Chunfen Li, Shengjie Zhou, Hongwei Ding, Qianlin Liu, Zhijun Yang and Yifan Zhao. Study on double clocks two-dimensional probability csma with the functions of monitoring [J]. International Journal of Current Advanced Research, 2015, 4(11):488-490.
[18]Chunfen Li, Shengjie Zhou, Hongwei Ding, Zhijun Yang, Qianlin Liu. The double clocks two-dimensional probability csma with three-way handshake mechanism [J]. International Journal of Recent Scientific Research, 2015, 6(11): 7464-7468.
[19]Ha, J.Y.; Kim, T.H.; Park, H.S.; Choi, S.; Kwon, W.H. An enhanced CSMA-CA algorithm for IEEE 802.15.4 LR-WPANs [J]. IEEE Commun. Lett. 2007, 11, 461–463.
[20]Mahmood, D.; Khan, Z.A.; Qasim, U.; Naru, M.U.; Mukhtar, S.; Akram, M.I.; Javaid, N. Analyzing and Evaluating Contention Access Period of Slotted CSMA/CA for IEEE802.15.4 [J]. Proc. Comput. Sci. 2014, 34, 204–211.
[21]Khanafer, M.; Guennoun, M.; Mouftah, H. A Survey of Beacon-Enabled IEEE 802.15.4 MAC Protocols in Wireless Sensor Networks [J]. IEEE Commun. Surv. Tutor. 2014, 16, 856–876.
[22]IEEE 802.15.4 Standard: Wireless Medium Access Control and Physical Layer Specifications for Low-Rate Wireless Personal Area Networks, IEEE, 2006. Available online: http://www.ieee802.org/15/pub/TG4.html (accessed on 25 March 2015).
[23]Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions [J]. Grid Comput. Escience 2013, 29, 1645–1660.
[24]Gaynor, M.; Moulton, S.L.; Welsh, M.; LaCombe, E.; Rowan, A.; Wynne, J. Integrating wireless sensor networks with the grid [J]. IEEE Internet Comput. 2004, 8, 32–39.
[25]Moritz, G.; Golatowski, F.; Lerche, C.; Timmermann, D. Beyond 6LoWPAN: Web Services in Wireless Sensor Networks [J]. IEEE Trans. Ind. Inf. 2013, 9, 1795–1805.
[26]Kyusakov, R.; Eliasson, J.; Delsing, J.; van Deventer, J.; Gustafsson, J. Integration of Wireless Sensor and Actuator Nodes with IT Infrastructure Using Service-Oriented Architecture [J]. IEEE Trans. Ind. Inf. 2013, 9, 43–51.
[27]Tong, E.D.; Niu, W.J.; Li, G.; Tang, D.; Chang, L.; Shi, Z.Z.; Ci, S. Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks [J]. Comput. Appl. 2014, 39, 38–51.
[28]Martinez, J.F.; Familiar, M.S.; Corredor, I.; Garcia, A.B.; Bravo, S.; Lopez, L. Composition and deployment of e-Health services over Wireless Sensor Networks [J]. Math. Comput. Model. 2011, 53, 485–503.
[29]Kifayat, K.; Merabti, M.; Shi, Q.; Abbas, S. Component-based security system (COMSEC) with QoS for wireless sensor networks [J]. Secur. Commun. Netw. 2013, 6, 461–472.
[30]Zhou, Y.; Zhang, Y.; Liu, H.; Xiong, N.; Vasilakos, A.V. A Bare-Metal and Asymmetric Partitioning Approach to Client Virtualization [J]. IEEE Trans. Services Comput 2014, 7, 40–53.
[31]Cheng, H.; Guo, R.; Su, Z.; Xiong, N.; Guo, W. Service-Oriented Node Scheduling Schemes with Energy Efficiency in Wireless Sensor Networks [J]. Sens. Network. 2014, 247173:1–247173:12.
[32]ZHANG Yi, YANG Xiu-xia, ZHOU Wei-wei and ZHAO He-wei. Study of three-dimensional on-line path planning for uav based on pythagorean hodograph curve [J]. International Journal on Smart Sensing and Intelligent Systems. 2015, 8(3): 1641 -1666.

EXTRA FILES

COMMENTS