ETEEM- Extended Traffic Aware Energy Efficient MAC Scheme for WSNs
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 11
Abstract
Idle listening issue arises when a sensor node listens to medium despite the absence of data which results in consumption of energy. ETEEM is a variant of Traffic Aware Energy Efficient MAC protocol (TEEM) which focuses on energy optimization due to reduced idle listening time and much lesser overhead on energy sources. It uses a novel scheme for using idle listening time of sensor nodes. The nodes are only active for small amount of time and most of the time, will be in sleep mode when no data is available. ETEEM reduces energy at byte level and uses a smaller byte packet called FLAG replacing longer byte SYNC packets of S-MAC and SYNCrts of TEEM respectively. It also uses a single acknowledgement packet per data set hence reducing energy while reducing frequency of the acknowledgment frames sent. The performance of ETEEM is 70% better comparative to other under-consideration MAC protocols.
Authors and Affiliations
Younas Khan, Sheeraz Ahmed, Fakhri Alam Khan, Imran Ahmad, Saqib Shahid Rahim, M. Irfan Khattak
Proposal and Implementation of MPLS Fuzzy Traffic Monitor
Multiprotocol Label Switched Networks need highly intelligent controls to manage high volume traffic due to issues of traffic congestion and best path selection. The work demonstrated in this paper shows results from sim...
Efficient Load Balancing Routing Technique for Mobile Ad Hoc Networks
The mobile ad hoc network (MANET) is nothing but the wireless connection of mobile nodes which provides the communication and mobility among wireless nodes without the need of any physical infrastructure or centralized d...
Real-Time Talking Avatar on the Internet Using Kinect and Voice Conversion
We have more chances to communicate via the in-ternet. We often use text/video chat, but there are some problems, such as a lack of communication and anonymity. In this paper, we propose and implement a real-time talking...
Implementation and Comparison of Text-Based Image Retrieval Schemes
Search engines, i.e., Google, Yahoo pro-vide various libraries and API’s to assist programmers and researchers in easier and efficient access to their collected data. When a user generates a search query, the dedicated A...
A Novel Cloud Computing Security Model to Detect and Prevent DoS and DDoS Attack
Cloud computing has been considered as one of the crucial and emerging networking technology, which has been changed the architecture of computing in last few years. Despite the security concerns of protecting data or pr...