DMCA
RI-MAC: a receiver-initiated asynchronous duty cycle MAC protocol for dynamic traffic loads in wireless sensor networks (2008)
Cached
Download Links
- [nslab.kaist.ac.kr]
- [www.cs.rice.edu]
- [www.csee.umbc.edu]
- [www.cs.rice.edu]
- [www.csee.umbc.edu]
- DBLP
Other Repositories/Bibliography
Venue: | in Proc. ACM SenSys |
Citations: | 103 - 0 self |
Citations
1513 | An energy-efficient MAC protocol for wireless sensor networks
- Ye, Heidemann, et al.
- 2002
(Show Context)
Citation Context ...io turned on, listening for a possible packet to be received even though none has been sent. Many solutions to the problem of idle listening have been proposed utilizing the technique of duty cycling =-=[19, 23]-=-. In this technique, each sensor node turns its radio on only periodically, alternating between active and sleeping states. For example, with a 10% duty cycle, a node has its radio on only 10% of the ... |
1115 | S.: Next century challenges: scalable coordination in sensor networks
- Estrin, Govindan, et al.
- 1999
(Show Context)
Citation Context ...e to convergecast [25] and correlated-event workload traffic [13], where multiple sensors that have detected the same event send their reports to the sink node or to a node that does data aggregation =-=[11]-=-. As traffic in a WSN can be quite dynamic, depending on the events being sensed and the sensing application and protocols being used, an ideal WSN MAC protocol should perform well under a wide range ... |
1093 | Versatile low power media access for wireless sensor networks
- Polastre, Hill, et al.
- 2004
(Show Context)
Citation Context ...io turned on, listening for a possible packet to be received even though none has been sent. Many solutions to the problem of idle listening have been proposed utilizing the technique of duty cycling =-=[19, 23]-=-. In this technique, each sensor node turns its radio on only periodically, alternating between active and sleeping states. For example, with a 10% duty cycle, a node has its radio on only 10% of the ... |
531 | K.: An adaptive energy-efficient MAC protocol for wireless sensor networks
- Dam, Langendoen
(Show Context)
Citation Context ...save energy. Contention-based duty cycle MAC protocols in the literature can be roughly categorized into two categories: synchronous and asynchronous. Synchronous approaches such as S-MAC [23], T-MAC =-=[7]-=-, RMAC [8], and DW-MAC [20] synchronize neighboring nodes in order to align their active or sleeping periods. Neighbor nodes start exchanging packets only within the common active time, enabling a nod... |
358 | X-MAC: a short preamble MAC protocol for duty-cycled wireless sensor networks
- Buettner, Yee, et al.
- 2006
(Show Context)
Citation Context ...ization introduces extra overhead and complexity, and a node may need to wake up multiple times if its neighbors are on different schedules. Existing asynchronous approaches such as B-MAC [19], X-MAC =-=[3]-=-, and WiseMAC [9], on the other hand, allow nodes to operate independently, with each node on its own duty cycle schedule. Such protocols typically employing low power listening (LPL), in which, prior... |
191 | Ultra-low duty cycle mac with scheduled channel polling
- Ye, Silva, et al.
- 2006
(Show Context)
Citation Context ...er and over again. Synchronized duty cycle MAC protocols, such as S-MAC [23], T-MAC [7], RMAC [8], and DW-MAC [20], also achieve great energy efficiency in WSNs; so too, hybrid approaches such as SCP =-=[24]-=-. The major difference between RI-MAC and these MAC protocols is that RI-MAC does not require any synchronization, thus saving the overhead and complexity of clock synchronization. Even though no node... |
188 | Mitigating congestion in wireless sensor networks
- Hull, Jamieson, et al.
- 2004
(Show Context)
Citation Context ...edium is not occupied, some of them could experience significant delay. This is often the case under bursty or high traffic load such as due to convergecast [25] and correlated-event workload traffic =-=[13]-=-, where multiple sensors that have detected the same event send their reports to the sink node or to a node that does data aggregation [11]. As traffic in a WSN can be quite dynamic, depending on the ... |
90 | Sift: a MAC Protocol for Event-Driven Wireless Sensor Networks
- Jamieson, Balakrishnan, et al.
- 2006
(Show Context)
Citation Context ... detecting a collision, a receiver calculates the new BW value that will be used in the next beacon, by employing some backoff strategy such as binary exponential backoff (BEB) in IEEE 802.11 or Sift =-=[14,21]-=-, depending on the density of a network. BEB is used in our implementation in TinyOS, as we found it adapts to networks of different densities and resolves collisions efficiently in RI-MAC in our eval... |
76 | Collision-minimizing CSMA and its applications to wireless sensor networks.
- Tay, Jamieson, et al.
- 2004
(Show Context)
Citation Context ... detecting a collision, a receiver calculates the new BW value that will be used in the next beacon, by employing some backoff strategy such as binary exponential backoff (BEB) in IEEE 802.11 or Sift =-=[14,21]-=-, depending on the density of a network. BEB is used in our implementation in TinyOS, as we found it adapts to networks of different densities and resolves collisions efficiently in RI-MAC in our eval... |
76 | Reliable bursty convergecast in wireless sensor networks
- Zhang, Arora, et al.
- 2005
(Show Context)
Citation Context ...ta. As these nodes have to wait until the medium is not occupied, some of them could experience significant delay. This is often the case under bursty or high traffic load such as due to convergecast =-=[25]-=- and correlated-event workload traffic [13], where multiple sensors that have detected the same event send their reports to the sink node or to a node that does data aggregation [11]. As traffic in a ... |
75 | Performance measurements of motes sensor networks,”
- Anastasi, Falchi, et al.
- 2004
(Show Context)
Citation Context ...or5 5 Special Frame Short Preamble — Beacon Special Frame Size 6B — 6–9B Dwell Time 10.5 ms 100 ms Variable sensing range to the transmission range are also observed in some state-of-art sensor nodes =-=[2]-=-. Table 2 summarizes the MAC protocol parameters we used in our simulations. Backoff strategy and retransmission have not been explicitly discussed in prior work [3, 15], as X-MAC is optimized for lig... |
56 |
Koala: Ultra-low power data retrieval in wireless sensor networks
- MUSALOIU-E, LIANG, et al.
- 2008
(Show Context)
Citation Context ...ism was designed only for packets being sent from an access point to a sensor node. Another receiver-initiated mechanism, known as Low Power Probing (LPP), was recently introduced in the Koala system =-=[18]-=-. Koala is designed for reliably downloading bulk data from all sensor nodes, for applications with no real-time requirements. All downloads in Koala are initiated by the gateway or gateways, allowing... |
48 | DW-MAC: A Low Latency, Energy Efficient Demand-Wakeup
- Sun, Du, et al.
(Show Context)
Citation Context ...sed duty cycle MAC protocols in the literature can be roughly categorized into two categories: synchronous and asynchronous. Synchronous approaches such as S-MAC [23], T-MAC [7], RMAC [8], and DW-MAC =-=[20]-=- synchronize neighboring nodes in order to align their active or sleeping periods. Neighbor nodes start exchanging packets only within the common active time, enabling a node to sleep for most of the ... |
41 | A Components-Based Architecture for Power-Efficient Media Access Control in Wireless Sensor Networks. In SenSys,
- Klues, Hackmann, et al.
- 2007
(Show Context)
Citation Context ...ued packets to be transmitted immediately. We refer to this duration as the dwell time in the rest of this paper. The UPMA (Unified Power Management Architecture for Wireless Sensor Networks) package =-=[15]-=- implemented a variation of X-MAC in TinyOS, in which the DATA frame itself is used as the short preamble, as illustrated in Figure 2. This strategy simplifies implementation and helps a sender to det... |
40 | An experimental study on the capture effect in 802.11a networks
- Lee, KimW, et al.
- 2007
(Show Context)
Citation Context ...sfully transmit a packet to the receiver even if the transmission overlaps with others, especially when senders have different distances to the receiver (and thus different received signal strengths) =-=[16, 17]-=-. 3.5. Collision Detection and Retransmissions By coordinating DATA frame transmissions at receivers, RI-MAC greatly reduces the cost for detecting collisions and recovering lost DATA frames compared ... |
37 | RMAC: A routingenhanced duty-cycle mac protocol for wireless sensor networks,”
- Du, Saha, et al.
- 2007
(Show Context)
Citation Context ...y. Contention-based duty cycle MAC protocols in the literature can be roughly categorized into two categories: synchronous and asynchronous. Synchronous approaches such as S-MAC [23], T-MAC [7], RMAC =-=[8]-=-, and DW-MAC [20] synchronize neighboring nodes in order to align their active or sleeping periods. Neighbor nodes start exchanging packets only within the common active time, enabling a node to sleep... |
4 | Udaya Shankar, and Ashok Agrawala. Sniffing out the correct physical layer capture model in 802.11b - Kochut, Vasan, et al. - 2004 |
2 |
Umar Saif, Adam Dunkels, Thiemo Voigt, Kay Römer, Koen Langendoen, Joseph Polastre, and Zartash Afzal Uzmi. Medium access control issues in sensor networks
- Ali
- 2006
(Show Context)
Citation Context ...es which are hard to deploy and experiment with. As a protocol may not perform in the real world exactly as it does in simulation, for example due to the simplified physical layer models used in ns-2 =-=[1]-=-, we also evaluated RI-MAC in a small testbed network of MICAz motes running TinyOS; our experimental results match our results obtained in simulation and further verify RI-MAC’s performance advantage... |
2 |
Chip Very Low Power RF Transceiver (CC1000 Datasheet
- Single
- 2002
(Show Context)
Citation Context ... Figure 8. We implemented RI-MAC for the CC2420 radio, which is a packetizing radio used in popular MICAz and TelosB motes, although the code can be ported to motes with streamingradiossuchastheCC1000=-=[5]-=-aswell. The BeaconManager module in Figure 8 performs most of the functionality of RI-MAC, including beacon generation, radio power control, wakeup/sleep scheduling, and retransmission control. We als... |
1 |
Garcia-Luna-Aceves and Asimakis Tzamaloukas. Reversing the Collision-Avoidance Handshake in Wireless Networks
- J
- 1999
(Show Context)
Citation Context ...cling in the context of MAC protocols for ad hoc wireless sensor networks, where power efficiency is a major concern. Garcia-Luna-Aceves et al. proposed a receiver-initiated collisionavoidance scheme =-=[12]-=- for general wireless networks, where collision is a major concern but power efficiency is of lesser importance. Receiver-initiation has previously been applied to sensor networks in the PTIP (Periodi... |