Adaptive MAC Protocol for Emergency Data Transmission in Wireless Body Sensor Networks

Size: px
Start display at page:

Download "Adaptive MAC Protocol for Emergency Data Transmission in Wireless Body Sensor Networks"

Transcription

1 , pp Adaptive MAC Protocol for Emergency Data Transmission in Wireless Body Sensor Networks Rae Hyun Kim and Jeong Gon Kim 1 Department of Electronic Engineering, Korea Polytechnic University (KPU) Si Heung City, Kyunggi Do, , KOREA hjkl525@naver.com, jgkim@kpu.ac.kr Abstract Recently, due to the increase in social intertest for advanced wireless telecommunication techniques, activated ubiquitous environments and healthcare, the application range of WBSN has been consistently expanding. WBSN environment has objective of collecting various bio-signals created directly or indirectly from in and out of the body, connecting with external networks and monitoring the display tool. Various biosignals created in WBSN environment have unpredictable rate of emergency data occurrence by its nature. Such emergency data should be transmitted with priority compared to other periodic signals for prompt handling according to the condition of the patient. MAC protocol proposed in this thesis is in form of TDMA based on competitive reserved allocation by time-slot in CSMA/CA environment. This MAC protocol classifies the types of bio-signals with each different characteristic and settles the priority by type and the minimum transmission delay time of data accordingly. Especially for transmission of emergency data, MAC protocol reduces the transmission delay of emergency data and packet loss by setting priority. Keywords: WBSN, WBAN, DTD-MAC, MED-MAC(1), MED-MAC(2), CSMA/CA, TDMA, GTS, PET 1. Introduction WBSN (Wireless Body Sensor Network) refers to a network that allows data transmission in and out of the body based on WSN, (Wireless Sensor Network) [1] and it could be considered as an applied network composed based on WBAN (Wireless Body Area Network) [2] that is the standard of IEEE regarding telecommunication method and transmission quality. Figure 1 shows the arrangement diagram of WSBN. With the purpose of monitoring the condition of patients at real-time and transmitting to external network, WBSN collects various bio-signal data from the devices or nodes located on the surface or inside of human body. It is forecasted that the WBSN will replace the current wired method of medical observation and monitoring environment [3]. When numbers of nodes transmit data at the same time in the environment of sensor network, CSMA/CA (Carrier Sensed Multiple Access/Collision Avoidance) [4], known widely as MAC protocol, performs operational degradation at serious level and triggers extremely high consumption of energy from repeated attempts of transmission, due to high frequency of idle listening and packet collision. Therefore, there had already been many research results and generalizations that TDMA (Time Division Multiple Access) method is advantageous in many ways regarding electricity consumption and reduction in delay of devices or nodes [5, 6]. Meanwhile, there may be general and urgent types of data among the data that the nodes transmit to coordinators. Particularly, the emergency 1 : Corresponding Author ISSN: IJSEIA Copyright c 2015 SERSC

2 data should have the condition to be transmitted immediately after the occurrence by its nature. Figure 1. WBSN Network Environment IEEE MAC Protocol [7] that has been applied for transmission of bio-signals until recently a hybrid method that applies both competition-oriented, which is universally used for data processing in WBSN environment, and schedule-oriented method. However, the allocation method of GTS (Guaranteed Time Slot) of IEEE MAC Protocol applies FIFS (First In First Service) queuing method where the channels are allocated by the order or arrival, resulting inevitable delay in transmission, and is inadequate for transmitting and handling of emergency data that should be transmitted without any delay at the time of occurrence [8]. The purpose of this thesis is to reduce and minimize the rate of inevitable transmission delay and packet loss in the process of handling emergency data occurring at random rate with the same method of handling the general data. In addition, two forms of MAC protocol that guarantees fast processing of emergency data as well as enhanced processing of general data through process of packet data by varying structures of Super-Frame according to the occurrence rate of urgent and general data. The structure of this thesis is as follows In Chapter 2, the existing methods of DTD (Decrease of Transmission Delay)-MAC Protocol [9] that reduces the delay in transmission and packet loss in IEEE MAC Protocol and WBSN environment will be discussed. In Chapter 3, the two types of MAC protocols, MED-MAC (1) Protocol and MED-MAC(2) Protocol [10], will be proposed and discussed in order to reduce the delay in transmission of emergency data and the packet loss. In Chapter 4, the functions of MAC protocol proposed will be analyzed through simulation and comparison with the existing methods. Finally in Chapter 5, the conclusion and the future research topics and directions will be suggested. 2. Related Research 2.1. IEEE MAC Protocol Figure 2. IEEE MAC Protocol 206 Copyright c 2015 SERSC

3 IEEE MAC Protocol forms Super-Frame structure where synchronization is executed through Beacon Frame as shown in Figure 2. It is composed of the active period where communication of data is carried out between the nodes and the coordinators and the inactive period where there is no communication of data. The active period is composed of 16 even slots and is formed based on sections of CAP (Contention Access Period), a competition-oriented method, and GTS (Guaranteed Time Slot) of CFP (Contention Free Period), a non-competition-oriented method that IEEE MAC Protocol may be referred as hybrid MAC Protocol. The device may be allocated with 1 coordinator or more than 1 GTS. In addition, since there are 16 even slots in active period, as the more devices are allocated with GTS, the length of CAP section is relatively reduced as well. IEEE MAC Protocol may allocate GTS to maximum 7 devices within the active period, and when all 7 are allocated, the rest of the devices requesting GTS may not receive the GTS. WBSN environment is the assembly composed of each different node with limited numbers. In addition, since the main data is bio-signals, there are restrictions regarding energy. With different bio-signals of each patient, the data should guarantee reliability and fairness while being made easy for observation of biosignals of patients at real time through display tools DTD (Decrease of Transmission Delay) - MAC Protocol Figure 3. DTD-MAC Protocol Super-Frame Figure 3 shows the Super-Frame structure of DTD-MAC protocol in the existing research method. In the Super-Frame of DTD-MAC protocol, the action performed in the frame of PSAP section is allocating and scheduling the information related to GTS Time- Slot allocation of next period in current period. GTS Time-Slot is assembled in order based on the Time-Slot reservation information received from PSAP frame of previous period. Beacon frame synchronizes the GTS Time-Slot information received from PSAP frame of previous period in current period and settles the order of GTS Time-Slot. The priority of each bio-signal node proposed in this thesis referred the functional requirements of WBAN as shown in Table 1 below. Table 1. Requirements of WBAN Application [11] Copyright c 2015 SERSC 207

4 When each bio-signal nodes, corresponding to ECG, EEG and EMG, attempts to transmit the data from the coordinator for channel allocation and reaches the maximum transmission delay of 250ms, the original priority or each node is neglected and is given with the most prior for channel allocation compared to other nodes. In addition, in the section where not all of the nodes transmit the data for channel allocation, the original priority is referred for each node in the buffer. However, when the maximum transmission delay reaches 250ms after the delay of the buffer data of each node, there is change in priority temporarily and the corresponding node is guaranteed with the most prior transmission. On the other hand, the packets of nodes that failed to transmit the data at the same time are counted as transmission delay or loss. DTD-MAC protocol has principle of transmitting data within 250ms, the maximum transmission delay from its occurrence. However, DTD-MAC protocol only considered the environment where there is no emergency data that there may be possible disadvantages due to lack of flexible response in processing of emergency data. For emergency data that may occur at irregular rates, data should be transmitted in real time to be effective. However, since DTD-MAC protocol uses the same method for handling and transmitting the emergency data that requires real-time transmission, and the general data, continued delay in transmission of emergency data and accordingly, high energy consumption and packet loss occur. 3. Proposed MAC Protocol Figure 4. MED-MAC Protocol Super-Frame Figure 4 shows the Super-Frame of MED-MAC protocol that secured the flexibility in processing of emergency data by adding UP (Urgent Period) frame section to the original DTD-MAC Super-Frame. The proposed MAC protocol adopts the variable Super-Frame structure where the structure changes according to the premeasured relative occurrence rate of urgent and general data. Therefore, the length of UP frame will be varied according to the data amount of Emergency Data Node measured from PET frame for each period. If there is no emergency data of each node measured from PET frame in above Super-Frame, UP frame will disappear and there will be conversion to GTS Time-Slot section for processing and transmission of general data. The Inactive Period frame refers to the section where the schedule information of GTS Time-Slot reservation allocation and UP frame of next period and the data are not transmitted within PET frame. Figure 5 below shows the competition process of channel allocation for general or emergency data of each different node during equal transmission period. 208 Copyright c 2015 SERSC

5 Figure 5. An Example of PET Frame for Channel Competition As shown in Figure 5, the emergency data may be classified with special tag added, unlike general data. It indicates when bio-signals with different features are transmitted at the same time through 1 slot. Especially in this thesis, transmission of emergency data will be prioritized than the general data by principle while guaranteeing the equal functionality in transmission and processing of general data. Through the two proposed methods, handling of emergency data according to its occurrence rate will be controlled for an optimized solution of processing general and emergency data will be sought as the most important consideration of this thesis Prioritized Allocation and Transmission Method for Emergency Data (MED-MAC(1)) In an environment with high occurrence rate or emergency data, all types of emergency data are guaranteed with priority for channel allocation and transmission before the nodes of all other general data under situations where emergency and general data of each node or emergency or general data themselves compete for channel allocation. Therefore, smooth transmission of data is guaranteed for emergency data flowing in real-time through fast processing of vast amount of emergency data, improving the credibility of emergency data transmission and the QOS of system. On the other hand, the standard of transmission within 250ms is applied for the general data, but with priority to emergency data in all cases. In addition, when the emergency data compete with each other for channel allocation, the priority is given as the priority arranged in advance. However, it is expected to have disadvantage of relative delay in transmission of general data and increase in packet loss will occur compared to the environment where the occurrence rate or emergency data is between 10~20%, compared to MED-MAC(2) Protocol Transmission Method to Reduce Delay in Emergency Data (MED-MAC(2)) In a situation where urgent and general data of each node or the emergency and general data compete for channel allocation, each emergency data is classified according to the priority standards (ECG > EEG > EMG) and the emergency data should be transmitted within the maximum transmission delay of 100ms by principle. If the emergency data is not transmitted within the suggested minimum transmission delay time, it results transmission delay and packet loss. In contrast, all general data that occurred in the same period or competed for channel allocation should be transmitted within the maximum transmission delay of 250ms by principle. If it fails, data flows into the buffer and are kept in sustained standby condition and the transmission delay here is added up to the total transmission delay time as well. The general data that gave way to the emergency data in competition for channel allocation should be transmitted within 250ms by principle. If the general data had reached the maximum transmission delay of 250ms while the emergency data had not, and when the two attempts for channel allocation, the general data that reached the maximum transmission delay is allocated with the channel. When emergency data competes with another emergency data for channel allocation, the existing priority rank is applied for classification and allocation. If one of he emergency data of node that reached Copyright c 2015 SERSC 209

6 the maximum transmission delay period while the other emergency data with higher priority had not, the priority is temporarily exchanged for allocation to the urgent data that arrived first. If 2 or more different nodes attempt to compete for channel allocation, the existing priority ranking should be reflected for allocation under the condition where all nodes reach the maximum transmission delay in current period. However, the emergency data of the node that exceeded the maximum transmission delay, while not being allocated with channel, are added up to the packet loss and the transmission delay. Therefore, in the environment where emergency data intermittently occurs, the fast processing of emergency data and adequate level of processing of general data will likely be guaranteed. 4. Performance Comparison In this thesis, WBSN network environment is composed of Star-Topology and simulated with Visual Studio C++, and the length of 1 Time-Slot was defined as 50ms. Each period is composed of 100 Time-Slots and the average collected from the 100 periods were calculated. The priority of general data was ECG > EEG > EMG, and the occurrence rate of general data of EEG was defined as twice of ECG, EEG as 18 times of EMG, based on WBAN requirements. The maximum transmission delay of each node was arranged to be 250ms from the moment of occurrence by principle. If the data is not transmitted within the maximum transmission delay of 250ms, it was added to the total transmission delay and packet loss. The occurrence rate of emergency data was defined as he 10%, 20% and 30%, and an environment for competition with general data was arranged. The priority was defined as ECG > EEG > EMG in order same as the general data. The functional assessment was executed under assumption that the general and emergency data will occupy 60% and 120% of the whole Time-Slot. Also, the maximum transmission delay was defined as 100ms for the emergency data for the method of transmitting the emergency data always prior to the general data (MED-MAC (1)) and the competitive condition with general data (MED-MAC (2)) was applied for the functional assessment, together with the comparison evaluation of the original DTD-MAC protocol with the average packet loss. In the simulation of this research, it was assumed that 60% of transmittable Time-Slot will be the targeted bio-signals for transmission and that 120% of data traffic will occur. In addition, the condition under 10% of emergency data and 90% of general data and under 30% of emergency data and 70% of general data was carried out respectively. Figure 6 and 7 presents the simulation of the average transmission delay of general data and the simulation of average transmission delay of emergency data under environment of 60% occurrence of whole Time-Slot and under 10% of emergency data and 90% of general data. Here, MED-MAC (1) is the transmission method of prioritized allocation, suggested in 3.1, and MED-MAC (2) shows the result of transmission method of reducing delay, suggested in 3.2. From the two images, the transmission delay of MED-MAC (1) is smaller in both, and for the general data, the average transmission delay of DTD-MAC Protocol or MED-MAC (1), MED-MAC (2) and the three MAC-protocol show the value that are almost equal. 210 Copyright c 2015 SERSC

7 Figure 6. Average Time Delay of General Data in case of 60 % of Data Traffic in Available Time Slot (E.D : 10%, G.D : 90%) Figure 7. Average Time Delay of Emergency Data in case of 60 % of Data Traffic in Available Time Slot (E.D : 10%, G.D : 90%) Figure 8 and 9 below presents the simulation results of average transmission delay of each general and emergency data under condition of 60% of occurrence rate of data traffic out of the total Time-slot, with 30% of emergency data and 70% of general data. As the occurrence rate of emergency data increases, it is found that the suggested method of general data faces slightly lower time delay. In addition, as the two suggested method, MED-MAC (1) and MED-MAC (2), face smaller gap of functional differences as the traffic of emergency data increases. Figure 8. Average Time Delay of General Data in case of 60 % of Data Traffic in Available Time Slot (E.D : 30%, G.D : 70%) Copyright c 2015 SERSC 211

8 Figure 9. Average Time Delay of Emergency Data in case of 60 % of Data Traffic in Available Time Slot (E.D : 30%, G.D : 70%) Figure 10 and 11 below presents the results of average transmission delay simulation of each general and emergency data under condition of 120% of occurrence rate of data traffic out of the total possible Time-Slot with 10% of emergency data and 90% of general data. As the data traffic increases, there is less and less time delay for general data, and the lowest transmission delay of suggested method occurs only for emergency data. Also, the rate of emergency data occurs intermittently that the delay of MED-MAC (1) is maintaining a very low value compared to that of MED-MAC (2). Figure 10. Average Time Delay of General Data in case of 120 % of Data Traffic in Available Time Slot (E.D : 10%, G.D : 90%) Figure 11. Average Time Delay of Emergency Data in case of 120 % of Data Traffic in Available Time Slot (E.D : 10%, G.D : 90%) 212 Copyright c 2015 SERSC

9 Figure 12 and 13 presents the results of average transmission delay simulation for each general and emergency data under condition of 120% occurrence rate of data traffic out of the total Time-Slot with 30% of emergency data and 70% of general data. As the data traffic and the occurrence rate of emergency data increases, all methods show the delay time of almost the same level for the general data. Also, the difference of delay in emergency data of the two suggested methods, MED-MAC (1) and MED-MAC (2), is shown to be very similar as the traffic of emergency data increases. Figure 12. Average Time Delay of General Data in case of 120 % of Data Traffic in Available Time Slot (E.D : 30%, G.D : 70%) This shows the possibilities for more effectiveness of MED-MAC (2) than MED-MAC (1) as the data traffic increases and the rate of emergency data increases. Figure 13. Average Time Delay in Case of 120 % of Data Traffic in Available Time Slot (E.D : 30%, G.D : 70%) 5. Conclusion In this thesis, MAC protocol with the objective of quick processing of emergency data and reduction in the transmission delay of emergency data under WBSN environment was suggested and assessed. DTD-MAC protocol that was taken for precedent research under WBSN environment does not have the standards related to processing of emergency data that the emergency data were processed with the same standards of transmission delay for general data, resulting inevitable increase in transmission delay and inadequate environment for emergency data, requiring real-time processing. The two MAC protocol proposed in this thesis provide methods where the emergency data are given with the absolute priority depending on the amount of emergency and general data and another method that guarantees the consistent transmissible function of general data by restricting the maximum transmission delay of emergency data to 100ms. As a result of functional assessment the prioritized transmission method was very effective when the rate of Copyright c 2015 SERSC 213

10 emergency data was low, through the experiment. In addition, in an environment where data traffic rapidly increases, the method of applying maximum delay of emergency data, had guaranteed an adequate level of function in transmission and processing of general data, showing the possibility of realizing optimized processing of emergency data, and this led to the need of research for solution of appropriate combination. References [1] J. Su Kim, J. Hyun Lee and K. Wook Rim, Energy Efficient Key Management Protocol in Wireless Sensor Networks, IJSIA, vol. 4, no. 2, (2010) April [2] J. Sung Choi and J. Gon Kim, An Improved MAC Protocol for WBAN through modified frame structure, International Journal of Smart Home (IJSH), vol.8, no. 2, (2014). [3] O. G. Morchon, H. Baldus and D. S. Sanchez, Resource Efficient Security for Medical Body Sensor Networks, Wearable and Implantable Body Sensor Networks, BSN International Workshop, 4pp, (2006) April. [4] LAN-MAN Standards Committee of the IEEE Computer Society. Wireless LAN Medium Access Control(MAC) and Physical Layer(PHY) Specification. IEEE, New York, NY, (1997). [5] S. A. Gopalan and J. Park, Energy Efficient MAC Protocols for Wireless Body Area Network: Survey, International Congress on Ultra Modern-Telecommunications and Control Systems and Workshops, (2010) October, pp [6] H. Kwon and S. Lee, Energy-efficient multi-hop transmission in Body Area Networks, IEEE PIMRC, Tokyo, (2009), pp [7] IEEE Standard-2003, Part 15.4: Wireless Medium Access Control(MAC) and Physical Layer(PHY) Specifications for Low-Rate Wireless Personal Area Network(LR-WPANs), (2003). [8] H. Geon Lee, K. Lee and Y. Shin, A Priority Based MAC Protocol for Emergency Data Transmission in Wireless Body Area Networks, Telecommunication Journal of the institute of electronics engineers of korea, vol. 49, no. 4, (2012). [9] R. Hyeon Kim and J. Gon Kim, Delay Reduced MAC Protocol for Bio Signal Monitoring in the WBSN Environment, th International Workshop Series, Advanced Science and Technology Letters, (Networking and Communication 2015), vol. 94, pp [10] R. Hyeon Kim, P. Soo Kim and J. Gon Kim, A Study on MAC Protocol for emergency data transmission in Wireless Bio Signal Monitoring Environment, th International Interdisciplinary Workshop Series, Advanced Science and Technology Letters, (Mechanical Engineering 2015), vol. 108, pp [11] R. Cavallarari, F. Martelli, R. Rosini, C. Buratti and R. Verdone, A Survey on Wireless Body Area Networks: Technologies and Design Challenges, IEEE Communications Surveys & Tutorials, Third Quarter, vol. 16, no. 3, (2014). Authors Rae Hyeon Kim, was born in Daegu, Korea on May 24, He Graduated Medical Engineering Department at ANDONG Science College in February He Graduated Electronics Engineering Department at Korea Polytechnic University in February He Enrolled in Masters in Electronics Engineering at Korea Polytechnic University since February 2014 until present. Interests: WBAN, WBSN realization and applied techniques, Cooperative transmission, MIMO Jeong Gon Kim, was born in Seoul, Korea on May 24, He received the B.S., M.S. and Ph.D, degrees all in electrical engineering from Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Korea in 1991, 1993 and 1998, respectively. From 1998 to 1999, he was the 214 Copyright c 2015 SERSC

11 Post Doctoral Research Fellow at the University of Hawaii at Manoa, USA, From , he joined R&D center of LG Telecom, Korea and is involved in IMT-2000 radio access technology development. From , he was also involved in 3GPP physical layer standardization, concentrating on the TDD mode in the Telecommunication Research center of Samsung Electronics. Since 2003, he is now a Professor at the Department of Electronics Engineering of Korea Polytechnic University. His research Interests now include the design and performance analysis of wireless communication system, specially 5G mobile communication, MIMO, cooperative communication, and WBAN application. Copyright c 2015 SERSC 215

12 216 Copyright c 2015 SERSC

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Journal of Information Processing Systems, Vol.6, No.4, December 2010 DOI : 10.3745/JIPS.2010.6.4.501 Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Dae-Suk Yoo* and Seung

More information

Implementation of IR-UWB MAC Development Tools Based on IEEE 802.15.4a

Implementation of IR-UWB MAC Development Tools Based on IEEE 802.15.4a Vol. 8, No. 4 (2015), pp. 275-286 http://dx.doi.org/10.14257/ijca.2015.8.4.27 Implementation of IR-UWB MAC Development Tools Based on IEEE 802.15.4a Sol Lim, Kye Joo Lee, So Yeon Kim, Chang Seok Chae,

More information

WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks

WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 755-760 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4686 WBAN Beaconing for Efficient Resource Sharing in Wireless Wearable

More information

BodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks

BodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks BodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks Gengfa Fang and Eryk Dutkiewicz Department of Physics and Engineering Macquarie University, Sydney, NSW, Australia Tel:

More information

A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System

A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System , pp.91-96 http://dx.doi.org/10.14257/ijbsbt.2014.6.3.11 A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System Ronnie D. Caytiles and Sungwon Park 1* 1 Hannam University 133

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

Wearable Computer Network Design using Dual-Role WUSB Clustering

Wearable Computer Network Design using Dual-Role WUSB Clustering , pp.127-134 http://dx.doi.org/10.14257/ijca.2015.8.3.15 Wearable Computer Network Design using Dual-Role WUSB Clustering Kyeong Hur and Won-Sung Sohn* Dept. of Computer Education, Gyeongin National University

More information

Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs).

Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs). 2008 Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs). Giorgio Corbellini 1 Challenges of the Ph.D. Study of urgency in sensed data Study of mobility in WSNs

More information

PERFORMANCE ANALYSIS OF THE IEEE 802.15.4 BASED ECG MONITORING NETWORK

PERFORMANCE ANALYSIS OF THE IEEE 802.15.4 BASED ECG MONITORING NETWORK PERFORMANCE ANALYSIS OF THE IEEE 802.15.4 BASED ECG MONITORING NETWORK Xuedong Liang 1,2 1 Department of Informatics University of Oslo Oslo, Norway email: xuedonl@ifi.uio.no Ilangko Balasingham 2 2 The

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

Fast Device Discovery for Remote Device Management in Lighting Control Networks

Fast Device Discovery for Remote Device Management in Lighting Control Networks J Inf Process Syst, Vol.11, No.1, pp.125~133, March 2015 http://dx.doi.org/10.3745/jips.03.0011 ISSN 1976-913X (Print) ISSN 2092-805X (Electronic) Fast Device Discovery for Remote Device Management in

More information

On the Synchronization of Co-Located IEEE 802.15.4 Networks for IoT Applications

On the Synchronization of Co-Located IEEE 802.15.4 Networks for IoT Applications On the Synchronization of Co-Located IEEE 802.15.4 Networks for IoT Applications Falko Dressler and Noorsalwati Nordin Dept. of Computer Science, University of Paderborn, Germany Institute of Computer

More information

Cloud Computing based Livestock Monitoring and Disease Forecasting System

Cloud Computing based Livestock Monitoring and Disease Forecasting System , pp.313-320 http://dx.doi.org/10.14257/ijsh.2013.7.6.30 Cloud Computing based Livestock Monitoring and Disease Forecasting System Seokkyun Jeong 1, Hoseok Jeong 2, Haengkon Kim 3 and Hyun Yoe 4 1,2,4

More information

Performance Monitoring and Control in Contention- Based Wireless Sensor Networks

Performance Monitoring and Control in Contention- Based Wireless Sensor Networks Performance Monitoring and Control in Contention- Based Wireless Sensor Networks Thomas Lindh #1, Ibrahim Orhan #2 # School of Technology and Health, KTH Royal Institute of Technology Marinens vag 30,

More information

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical

More information

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. benveniste@ieee.org Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access

More information

Remote Monitoring and Controlling System Based on ZigBee Networks

Remote Monitoring and Controlling System Based on ZigBee Networks Remote Monitoring and Controlling System Based on ZigBee Networks Soyoung Hwang and Donghui Yu* Department of Multimedia Engineering, Catholic University of Pusan, South Korea {soyoung, dhyu}@cup.ac.kr

More information

The X-DBaaS-Based Stock Trading System to Overcome Low Latency in Cloud Environment

The X-DBaaS-Based Stock Trading System to Overcome Low Latency in Cloud Environment , pp.127-136 http://dx.doi.org/10.14257/ijmue.2015.10.10.14 The X-DBaaS-Based Stock Trading System to Overcome Low Latency in Cloud Environment Hyoyoung Shin 1 and Hyungjin Kim 2* 1 Department of IT Security,

More information

Design and Implementation of Automatic Attendance Check System Using BLE Beacon

Design and Implementation of Automatic Attendance Check System Using BLE Beacon , pp.177-186 http://dx.doi.org/10.14257/ijmue.2015.10.10.19 Design and Implementation of Automatic Attendance Check System Using BLE Beacon Mi-Young Bae and Dae-Jea Cho * Dept. Of Multimedia Engineering,

More information

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Controlled Random Access Methods

Controlled Random Access Methods Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 09.03.2004 Content of Presentation

More information

A Study on HL7 Standard Message for Healthcare System Based on ISO/IEEE 11073

A Study on HL7 Standard Message for Healthcare System Based on ISO/IEEE 11073 , pp. 113-118 http://dx.doi.org/10.14257/ijsh.2015.9.6.13 A Study on HL7 Standard Message for Healthcare System Based on ISO/IEEE 11073 Am-Suk Oh Dept. of Media Engineering, Tongmyong University, Busan,

More information

A Resilient Device Monitoring System in Collaboration Environments

A Resilient Device Monitoring System in Collaboration Environments , pp.103-114 http://dx.doi.org/10.14257/ijsh.2014.8.5.10 A Resilient Device Monitoring System in Collaboration Environments KeeHyun Park 1 and JongHwi Lee 1 Department of Computer Engineering, Keimyung

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea

More information

A Multiple Access Protocol for Multimedia Transmission over Wireless Networks

A Multiple Access Protocol for Multimedia Transmission over Wireless Networks A Multiple Access Protocol for Multimedia Transmission over Wireless Networks Hong Yu and Mohammed Arozullah Department of Electrical Engineering and Computer Science Capitol College, Maryland, USA yhong@capitol-college.edu

More information

A Study on Design of Health Device for U-Health System

A Study on Design of Health Device for U-Health System , pp.79-86 http://dx.doi.org/10.14257/ijbsbt.2015.7.2.08 A Study on Design of Health Device for U-Health System Am-Suk Oh Dept. of Media Engineering, Tongmyong University, Busan, Korea asoh@tu.ac.kr Abstract

More information

A New MAC Protocol for Moving Target in Distributed Wireless Sensor Networks

A New MAC Protocol for Moving Target in Distributed Wireless Sensor Networks Wireless Sensor Network, 2011, 3, 61-72 doi:10.4236/wsn.2011.32007 Published Online February 2011 (http://www.scirp.org/journal/wsn) A New MAC Protocol for Moving Target in Distributed Wireless Sensor

More information

Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012

Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012 Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS. N. Golmie, D. Cypher, O. Rebala

PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS. N. Golmie, D. Cypher, O. Rebala PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS N. Golmie, D. Cypher, O. Rebala National Institute of Standards and Technology, 100 Bureau Drive, Gaithersburg, Maryland

More information

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.

More information

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems Workshop on Quality of Service in Geographically Distributed Systems A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

A Non-beaconing ZigBee Network Implementation and Performance Study

A Non-beaconing ZigBee Network Implementation and Performance Study A Non-beaconing ZigBee Network Implementation and Performance Study Magnus Armholt Email: magnus.armholt@tut.fi Sakari Junnila Email: sakari.junnila@tut.fi Irek Defee Email: irek.defee@tut.fi Abstract

More information

CS698T Wireless Networks: Principles and Practice

CS698T Wireless Networks: Principles and Practice CS698T Wireless Networks: Principles and Practice Topic 10 IEEE 802.15.4 Bhaskaran Raman, Department of CSE, IIT Kanpur http://www.cse.iitk.ac.in/users/braman/courses/wless-spring2007/ Personal Area Networks

More information

A Mobile Open Infrastructure Network Protocol (MOIN) for Localization and Data Communication in UWB Based Wireless Sensor Networks

A Mobile Open Infrastructure Network Protocol (MOIN) for Localization and Data Communication in UWB Based Wireless Sensor Networks A Mobile Open Infrastructure Network Protocol (MOIN) for Localization and Data Communication in UWB Based Wireless Sensor Networks 014 IEEE International Conference on Ultra-Wideband (ICUWB) Paris, France

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

CSMA/CA. Information Networks p. 1

CSMA/CA. Information Networks p. 1 Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

More information

Chapter 2 Principle of Wireless Sensor Networks

Chapter 2 Principle of Wireless Sensor Networks Chapter 2 Principle of Wireless Sensor Networks Keywords IEEE 802.15.4 ZigBee 6LowPAN Wireless sensor networks 2.1 Introduction Wireless sensor networks are a subset of wireless networking applications,

More information

Performance Evaluation of Wired and Wireless Local Area Networks

Performance Evaluation of Wired and Wireless Local Area Networks International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, aymanw@ppu.edu Duaa sweity

More information

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction

More information

How To Make A Multi-User Communication Efficient

How To Make A Multi-User Communication Efficient Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

More information

How To Solve A Network Problem In An Ipa 2.2.1 (Ipa 2) (Ipam) (Networking) (For Acedo) (Ipta) (Powerline) (Network) (Nem

How To Solve A Network Problem In An Ipa 2.2.1 (Ipa 2) (Ipam) (Networking) (For Acedo) (Ipta) (Powerline) (Network) (Nem Lund University ETSN01 Advanced Telecommunication Tutorial 7 : Link layer part I Author: Antonio Franco Course Teacher: Emma Fitzgerald February 12, 2015 Contents I Before you start 3 II Exercises 3 1

More information

A Study of Key management Protocol for Secure Communication in Personal Cloud Environment

A Study of Key management Protocol for Secure Communication in Personal Cloud Environment , pp.51-58 http://dx.doi.org/10.14257/ijsia.2014.8.4.05 A Study of Key management Protocol for Secure Communication in Personal Cloud Environment ByungWook Jin 1 and Keun-Wang Lee 2,* 1 Dept. of Computer

More information

Real-Time (Paradigms) (51)

Real-Time (Paradigms) (51) Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major

More information

Modeling and Simulation of Quality of Service in VoIP Wireless LAN

Modeling and Simulation of Quality of Service in VoIP Wireless LAN Journal of Computing and Information Technology - CIT 16, 2008, 2, 131 142 doi:10.2498/cit.1001022 131 Modeling and Simulation of Quality of Service in VoIP Wireless LAN A. Al-Naamany, H. Bourdoucen and

More information

Random Access Protocols

Random Access Protocols Lecture Today slotted vs unslotted ALOHA Carrier sensing multiple access Ethernet DataLink Layer 1 Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori

More information

Wireless Sensor Network apply for the Blind U-bus System

Wireless Sensor Network apply for the Blind U-bus System Wireless Sensor Network apply for the Blind U-bus System Trung Pham Quoc 1, Min Chul Kim 1, Hyn Kwan Lee 2, Ki Hwan Eom 1 Electronic Engineering 1Dongguk University: 26, Pil-dong 3-ga jung-gu Seol, Korea

More information

How To Improve Quality Of Service For A Smart Grid Distribution Monitoring System

How To Improve Quality Of Service For A Smart Grid Distribution Monitoring System Quality of Service Networking for Smart Grid Distribution Monitoring Wei Sun, Xiaojing Yuan, Jianping Wang, Dong Han and Chongwei Zhang School of Electrical Engineering and Automation, Hefei University

More information

II. IEEE802.11e EDCA OVERVIEW

II. IEEE802.11e EDCA OVERVIEW The 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'7) CACITY IMPROVEMENT OF WIRELESS LAN VOIP USING DISTRIBUTED TRANSMISSION SCHEDULING Kei Igarashi,

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

A survey on Spectrum Management in Cognitive Radio Networks

A survey on Spectrum Management in Cognitive Radio Networks A survey on Spectrum Management in Cognitive Radio Networks Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty Georgia Institute of Technology Communications Magazine, vol 46, April 2008,

More information

A Study on Intelligent Video Security Surveillance System with Active Tracking Technology in Multiple Objects Environment

A Study on Intelligent Video Security Surveillance System with Active Tracking Technology in Multiple Objects Environment Vol. 6, No., April, 01 A Stud on Intelligent Video Securit Surveillance Sstem with Active Tracking Technolog in Multiple Objects Environment Juhun Park 1, Jeonghun Choi 1, 1, Moungheum Park, Sukwon Hong

More information

802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak 802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture

More information

Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System

Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System , pp.97-108 http://dx.doi.org/10.14257/ijseia.2014.8.6.08 Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System Suk Hwan Moon and Cheol sick Lee Department

More information

Design of Remote data acquisition system based on Internet of Things

Design of Remote data acquisition system based on Internet of Things , pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; Niuling@zknu.edu.cn

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Halmstad University Post-Print

Halmstad University Post-Print Halmstad University Post-Print Wireless Sensor Networks for Surveillance Applications - A Comparative Survey of MAC Protocols Mahmood Ali, Annette Böhm and Magnus Jonsson N.B.: When citing this work, cite

More information

Dynamic Channel Allocation And Load Balancing With Sleep Scheduling In Manet

Dynamic Channel Allocation And Load Balancing With Sleep Scheduling In Manet International Journal of Science and Engineering Research (IJ0SER), Vol 3 Issue 9 September -2015 3221 5687, (P) 3221 568X Dynamic Channel Allocation And Load Balancing With Sleep Scheduling In Manet 1

More information

VoIP-Kapazität im Relay erweiterten IEEE 802.16 System

VoIP-Kapazität im Relay erweiterten IEEE 802.16 System VoIP-Kapazität im Relay erweiterten IEEE 802.16 System 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Karsten Klagges ComNets Research Group RWTH Aachen University 16. März 2012 Karsten Klagges

More information

ZIGBEE 802.15.4. ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna

ZIGBEE 802.15.4. ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna ECGR-6185 Advanced Embedded Systems ZIGBEE 802.15.4 University of North Carolina-Charlotte Charlotte Chaitanya Misal Vamsee Krishna WPAN A personal area network (PAN) is a computer network used for communication

More information

Internet of Things. Exam June 24

Internet of Things. Exam June 24 Internet of Things Exam June 24 Exercise 1 A personal area network (PAN) is composed of 100 motes and a PAN Coordinator. The PAN works in beacon- enabled mode. 50 motes of Type 1 are equipped with light

More information

Design of hybrid wireless sensor network to monitor bioelectric signals focused on the study of epilepsy

Design of hybrid wireless sensor network to monitor bioelectric signals focused on the study of epilepsy Design of hybrid wireless sensor network to monitor bioelectric signals focused on the study of epilepsy Sergio Martínez 1, Mario Rivero 2, and Laura Garay 3 1 SEPI-ESCOM IPN, Av. Juan de Dios Bátiz Col.

More information

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers , pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang

More information

AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS

AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,

More information

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India

More information

A Study on the Collection Site Profiling and Issue-detection Methodology for Analysis of Customer Feedback on Social Big Data

A Study on the Collection Site Profiling and Issue-detection Methodology for Analysis of Customer Feedback on Social Big Data , pp. 169-178 http://dx.doi.org/10.14257/ijsh.2014.8.6.16 A Study on the Collection Site Profiling and Issue-detection Methodology for Analysis of Customer Feedback on Social Big Data Eun-Jee Song 1 and

More information

Philippe Klein. avb-phkl-802-11-qos-overview-0811-1

Philippe Klein. avb-phkl-802-11-qos-overview-0811-1 802.11 QoS Overview Philippe Klein IEEE Plenary Meeting Nov 08 Dallas, TX avb-phkl-802-11-qos-overview-0811-1 Disclaimer This presentation is not a highly detailed technical presentation but a crash course

More information

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student

More information

Preface. Book Origin and Overview

Preface. Book Origin and Overview Preface The field of wireless sensor networks continues to evolve and grow in both practical and research domains. More and more wireless sensor networks are being used to gather information in real life

More information

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless

More information

Mac Protocols for Wireless Sensor Networks

Mac Protocols for Wireless Sensor Networks Mac Protocols for Wireless Sensor Networks Hans-Christian Halfbrodt Advisor: Pardeep Kumar Institute of Computer Science Freie Universität Berlin, Germany halfbrodt@inf.fu-berlin.de January 2010 Contents

More information

Radio Resource Allocation in GSM/GPRS Networks

Radio Resource Allocation in GSM/GPRS Networks Radio Resource Allocation in GSM/GPRS Networks Jean-Lien C. Wu 1, Wei-Yeh Chen 2, and Hung-Huan Liu 1 1 Department of Electronic Engineering, National Taiwan University of Science and Technology, 43, Keelung

More information

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

TCP in Wireless Networks

TCP in Wireless Networks Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

Development of a Service Robot System for a Remote Child Monitoring Platform

Development of a Service Robot System for a Remote Child Monitoring Platform , pp.153-162 http://dx.doi.org/10.14257/ijsh.2014.8.5.14 Development of a Service Robot System for a Remote Child Monitoring Platform Taewoo Han 1 and Yong-Ho Seo 2, * 1 Department of Game and Multimedia,

More information

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii 1.1 1.2 1.3 1.4 1.5 1.6 1.7. xvii

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii 1.1 1.2 1.3 1.4 1.5 1.6 1.7. xvii TABLE OF CONTENTS Dedication Table of Contents Preface v vii xvii Chapter 1 Overview of Wireless Networks 1.1 1.2 1.3 1.4 1.5 1.6 1.7 Signal Coverage Propagation Mechanisms 1.2.1 Multipath 1.2.2 Delay

More information

An Architecture for Home-Oriented IPTV Service Platform on Residential Gateway

An Architecture for Home-Oriented IPTV Service Platform on Residential Gateway J Inf Process Syst, Vol.9, No.3, September 2013 pissn 1976-913X eissn 2092-805X http://dx.doi.org/10.3745/jips.2013.9.3.425 An Architecture for Home-Oriented IPTV Service Platform on Residential Gateway

More information

Study on the Vulnerability Level of Physical Security And Application of the IP-Based Devices

Study on the Vulnerability Level of Physical Security And Application of the IP-Based Devices , pp. 63-68 http://dx.doi.org/10.14257/ijsh.2015.9.10.07 Study on the Vulnerability Level of Physical Security And Application of the IP-Based Devices Kwang-Hyuk Park 1, Il-Kyeun Ra 2 and Chang-Soo Kim

More information

Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks

Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks International Journal of Computer Applications (975 7) Volume 5 No.1, June 11 Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks Soni Sweta Arun Nahar Sanjeev Sharma ABSTRACT

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless

More information

Fast Retransmission Mechanism for VoIP in IEEE 802.11e wireless LANs

Fast Retransmission Mechanism for VoIP in IEEE 802.11e wireless LANs Fast Mechanism for VoIP in IEEE 802.11e wireless LANs Gyung-Ho Hwang and Dong-Ho Cho Division of Electrical Engineering, Department of Electrical Engineering and Computer Science, KAIST, 373-1 Guseong-dong

More information

NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS

NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS D. Todinca, P. Perry and J. Murphy Dublin City University, Ireland ABSTRACT The goal of this paper

More information

ECE 333: Introduction to Communication Networks Fall 2002

ECE 333: Introduction to Communication Networks Fall 2002 ECE 333: Introduction to Communication Networks Fall 2002 Lecture 14: Medium Access Control II Dynamic Channel Allocation Pure Aloha In the last lecture we began discussing medium access control protocols

More information

A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval

A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval , pp.175-186 http://dx.doi.org/10.14257/ijsh.2014.8.1.19 A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval Kil-sung Park and Sun-Hyung Kim Department of Information & Communication

More information

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

RT-QoS for Wireless ad-hoc Networks of Embedded Systems RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results

More information

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au

More information

Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks

Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks Saher S Manaseer Mohamed Ould-Khaoua Lewis M Mackenzie Department of Computing Science University of Glasgow, Glasgow G 8RZ, UK {saher, mohamed, lewis}@dcs.gla.ac.uk

More information

Priority-Coupling A Semi-Persistent MAC Scheduling Scheme for VoIP Traffic on 3G LTE

Priority-Coupling A Semi-Persistent MAC Scheduling Scheme for VoIP Traffic on 3G LTE Priority-Coupling A Semi-Persistent MAC Scheduling Scheme for VoIP Traffic on 3G LTE S. Saha * and R. Quazi ** * Helsinki University of Technology, Helsinki, Finland ** University of Dhaka, Dhaka, Bangladesh

More information

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Preventing Resource Exhaustion Attacks in Ad Hoc Networks Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585

More information

Robust protocols for the Industrial Internet of Things

Robust protocols for the Industrial Internet of Things Robust protocols for the Industrial Internet of Things Elvis Vogli Politecnico di Bari,Telematics Lab - Dipartimento di Ingegneria Elettrica e dell Informazione Via Edoardo Orabona 4, 70125 Bari, Italy

More information

Smart Integrated Multiple Tracking System Development for IOT based Target-oriented Logistics Location and Resource Service

Smart Integrated Multiple Tracking System Development for IOT based Target-oriented Logistics Location and Resource Service , pp. 195-204 http://dx.doi.org/10.14257/ijsh.2015.9.5.19 Smart Integrated Multiple Tracking System Development for IOT based Target-oriented Logistics Location and Resource Service Ju-Su Kim, Hak-Jun

More information

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,

More information

VoIP Session Capacity Expansion with Packet Transmission Suppression Control in Wireless LAN

VoIP Session Capacity Expansion with Packet Transmission Suppression Control in Wireless LAN 1144 PAPER Special Section on Internet Technology and its Architecture for Ambient Information Systems VoIP Session Capacity Expansion with Packet Transmission Suppression Control in Wireless LAN Yasufumi

More information