• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Networks (2004)

Cached

  • Download as a PDF

Download Links

  • [www.isi.edu]
  • [wwwpub.zih.tu-dresden.de]
  • [www.cs.berkeley.edu]
  • [www.isi.edu]
  • [www.engr.uconn.edu]
  • [impact.asu.edu]
  • [impact.asu.edu]
  • [www.cs.berkeley.edu]
  • [perso.ens-lyon.fr]
  • [www.cs.berkeley.edu]
  • [ftp.isi.edu]
  • [ftp.isi.edu]
  • [www.isi.edu]
  • [www.cs.pitt.edu]
  • [people.cs.pitt.edu]
  • [www.isi.edu]
  • [ftp.isi.edu]
  • [galaxy.cs.lamar.edu]
  • [www.isi.edu]
  • [www.isi.edu]
  • [ftp.isi.edu]
  • [www.cs.ucf.edu]
  • [www.cs.ucf.edu]
  • [www.cs.ucf.edu]
  • [www.isi.edu]
  • [www.gta.ufrj.br]
  • [ftp.isi.edu]
  • [ftp.isi.edu]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Wei Ye , John Heidemann , Deborah Estrin
Venue:IEEE/ACM Transactions on Networking
Citations:698 - 15 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@ARTICLE{Ye04mediumaccess,
    author = {Wei Ye and John Heidemann and Deborah Estrin},
    title = {Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Networks},
    journal = {IEEE/ACM Transactions on Networking},
    year = {2004},
    volume = {12},
    pages = {493--506}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

This paper proposes S-MAC, a medium access control (MAC) protocol designed for wireless sensor networks. Wireless sensor networks use battery-operated computing and sensing devices. A network of these devices will collaborate for a common application such as environmental monitoring. We expect sensor networks to be deployed in an ad hoc fashion, with nodes remaining largely inactive for long time, but becoming suddenly active when something is detected. These characteristics of sensor networks and applications motivate a MAC that is different from traditional wireless MACs such as IEEE 802.11 in several ways: energy conservation and self-configuration are primary goals, while per-node fairness and latency are less important. S-MAC uses a few novel techniques to reduce energy consumption and support self-configuration. It enables low-duty-cycle operation in a multihop network. Nodes form virtual clusters based on common sleep schedules to reduce control overhead and enable traffic-adaptive wake-up. S-MAC uses in-channel signaling to avoid overhearing unnecessary traffic. Finally, S-MAC applies message passing to reduce contention latency for applications that require in-network data processing. The paper presents measurement results of S-MAC performance on a sample sensor node, the UC Berkeley Mote, and reveals fundamental tradeoffs on energy, latency and throughput. Results show that S-MAC obtains significant energy savings compared with an 802.11-like MAC without sleeping.

Keyphrases

wireless sensor network    medium access control    coordinated adaptive sleeping    sensor network    energy conservation    uc berkeley mote    s-mac performance    in-network data processing    several way    common sleep schedule    control overhead    virtual cluster    traditional wireless mac    environmental monitoring    significant energy saving    support self-configuration    enable traffic-adaptive wake-up    ad hoc fashion    contention latency    unnecessary traffic    11-like mac    multihop network    primary goal    low-duty-cycle operation    battery-operated computing    per-node fairness    novel technique    energy consumption    reveals fundamental tradeoff    common application    long time    s-mac us    measurement result    sample sensor node   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University