Energy Control In Non Beacon Enabled Mode Of Ieee 802.15.4
Journal Title: American journal of Engineering Research - Year 2018, Vol 7, Issue 5
Abstract
There are many problems in the wireless sensor network but energy trouble lasts always the most critical problem in this domain. Many approaches were proposed to reduce the energy consumed such as the IEEE 802.15.4 which is included in the Low Rate Wireless Personal Area Networks (LRWPANs). The IEEE 802.15.4 includes two modes which are the beaconenabled mode and the non beacon-enabled mode. The present paper is interested in the non beacon-enabled mode which is based on unslotted mode of the Collision Avoidance Carrier Sense Multiple Access CSMA/CA. Our work consists mainly on computing the energy consumed by the node using unslotted algorithm of CSMA/CA. Then the coordinator detects the node which suffers from energy faults after comparing its residual energy to a set threshold which leads to a quick intervention by reducing its duty cycle in order postpone its death..
Authors and Affiliations
Hayfa Ayadi, Ahmed Zouinkhi, Boumedyen Boussaid, M Naceur Abdelkrim, Thierry Val
Optical Characterization of a Silicon Wafer Semiconductor
Semiconductor materials have technological and strategical importance, because they enable to obtain efficient and relevant devices in the globalized world. Silicon wafers are, therefore, largely used by different types...
Strength Properties of Fly Ash Based Geopolymer Concrete with Sea Sand
The production of every ton of cement contributes to production of one ton of CO2. With the development of infra activities, the power sector activities are also increasing. The coal based power plant produces huge quant...
Impact Education According Platonic Books II, III, IV of the Republic
Life polishes Greek in Fifth in the seventh century, experiencedsocio political crises. Many thinkers have posed questions to find out what to do to remedy the imperfections of these institutions. For Plato the recommend...
Design and Simulation DES Algorithm of Encryption for Information Security
The demand for protection increases, if the confidentiality of the information is of very high value. Security is very essential to avoid the unauthorized disclosure or alteration of the information. Due to the great cha...
Web Based Genetic Algorithm Using Data Mining
This paper presents an approach for classifying students in order to predict their final grade based on features extracted from logged data in an education web-based system. A combination of multiple classifiers leads to...