Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 13, Issue 4
Abstract
Wireless sensor networks are appealing to researchers due to their wide range of application in several fields such as military settings, critical infrastructure protection, target detection and tracking, environmental monitoring, industrial process monitoring etc. Communication among wireless sensor nodes is usually achieved by means of a unique channel. It is the characteristic of this channel that only a single node can transmit a message at any given time. Therefore, shared access of the channel requires the establishment of a MAC protocol among the sensor nodes. The objective of the MAC protocol is to regulate access to the shared wireless medium. For sensor nodes that are battery powered, it is sometimes difficulty or impractical to charge or replace exhausted battery. So the medium access protocol (MAC) for wireless sensor network must be energy efficient. In this paper, we outline the sensor network properties that are crucial for the design of MAC layer protocols. Then, describe four MAC protocols proposed for sensor networks emphasizing their strengths and weaknesses and compared those protocols. Analysis of power consumption and latency performance for these four MAC protocol is also shown in this report
Authors and Affiliations
Ms. Suchita S. Jogi
Multicast and Unicast Communication in Vehicular Network Using IPv6.
Now a days the research is going on in Vehicular ad-hoc network to make a city as Smart city for the driver and passengers to navigate and to obtain relevant information and avoid the traffic accident. In the proposed sy...
Improved Identity Based Encryption with Secured Revocation Mechanism in Cloud Computing
Cloud data storing and retrieval is mostly important process in the cloud computing environment because of which cloud service providers are increase. When users attempts to store their contents in the third party servic...
A Generalized Study on Encryption Techniques for Location Based Services
Abstract: Location-based service (LBS) is the concept that denotes applications integrating geographic location (i.e., spatial coordinates) with the general notion of services. Examples of such applications include...
Dynamic AI-Geo Health Application based on BIGIS-DSS Approach
Public health organizations use GIS on a daily basis for input, storage, manipulation, and output of geographic information which provides a powerful tool for public health assessment and monitoring in remote &n...
Novel Approach For Isolated Left Endobronchial Intubation With Single Lumen Tube In Paediatric Patients
Background: Right thoracoscopy requires selective left endobronchial intubation which is technically difficult and demanding. We are presenting our experience of selective left bronchus intubation without any guidance,us...