Receiver Initiated Asynchronous Duty-Cycle MAC protocol For Burst Traffic
Journal Title: International Journal of Engineering and Techniques - Year 2015, Vol 1, Issue 3
Abstract
Many energy-efficient Receiver Initiated Asynchronous Duty-Cycle MAC protocol for wireless sensor networks (WSNs) have been proposed. Most nodes suffer from significant performance Degradation for burst traffic, due to randomly waking up to communicate with each other. The proposed protocol is new receiver initiated asynchronous duty-cycle MAC protocol for burst traffic . By adaptively adjusting beacon time of the receiver and it schedules the sender listening time based on scheduled period, by this high energy efficiency and low end-to-end packet delivery latency for burst traffic is achieved. We have evaluated the performance of MAC through detailed ns- 2 simulation. The simulation results show that this protocol reduce end-to-end packet delivery latency and energy consumption under various data rates in different topologies compared with RI-MAC
design & analysis of almond de-husking and de-selling machine
The problem that plague Indian agriculture at present are the capital and labour , especially in the rural areas. Problems related to irrigation, market and transport facility add significant cost to farmers' operations....
TOA and DOA Joint Estimation Using Successive MUSIC Algorithm in IR-UWB Positioning Systems
A Wireless Sensor Network (WSN) is an autonomous and self-organizing network without any pre-established infrastructure which offers many advantages in military applications and emergency areas. Source Localization is on...
Spyware Detection Using Data Mining
The systems connected to the network are vulnerable to many malicious programs which threatens the confidentiality, integrity and availability of a system. Many malicious programs such as viruses, worms, trojan horses, a...
Privacy Preserving using PAM in Cloud Computing
The cloud user can remotely access software, services, application whenever they require over the internet. The user can put their data remotely to the cloud storage. So, It is necessary that the cloud must have to ensur...
Survey on Moving Body Detection in Video Surveillance System
This paper represents a survey of various methods of video surveillance system which improves the security. The aim of this paper is to review of various moving object detection technics. This paper focuses on detection...