2010 Seventh International Conference on Networked Sensing Systems (INSS) 2010
DOI: 10.1109/inss.2010.5573142
|View full text |Cite
|
Sign up to set email alerts
|

BEAM: A Burst-aware Energy-efficient Adaptive MAC protocol for Wireless Sensor Networks

Abstract: Low latency for packet delivery, high throughput, good reactivity, and energy-efficient operation are key challenges that MAC protocols for Wireless Sensor Networks (WSNs) have to meet. Since traffic patterns as well as network load may change during network lifetime, adaptability of the protocol stack, e.g. in terms of duty cycling, and the integration of reliable transport mechanisms are mandatory. So far, given that optimizations for energy-efficiency and performance parameters are contradicting, most MAC p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(17 citation statements)
references
References 14 publications
0
14
0
Order By: Relevance
“…Further optimization is possible by an intelligent burst control mechanism that delays the start of the burst sequence if the sender already knows or estimates the wake-up interval of the receiving node. A similar mechanism is implemented in the Contiki protocol [59]. But measurements of energy consumption provided by the Virtenio company show that the Contiki protocol requires more energy for LPL.…”
Section: Energy Consumptionmentioning
confidence: 99%
“…Further optimization is possible by an intelligent burst control mechanism that delays the start of the burst sequence if the sender already knows or estimates the wake-up interval of the receiving node. A similar mechanism is implemented in the Contiki protocol [59]. But measurements of energy consumption provided by the Virtenio company show that the Contiki protocol requires more energy for LPL.…”
Section: Energy Consumptionmentioning
confidence: 99%
“…The tree relationship between the nodes in an active region is brought about through the execution of a tree construction algorithm that can degrade the performance of the system by increasing the network latency. In addition to EC-MAC, there are other MAC layer protocols that dynamically adapt the duty cycle of the radio based on synchronous [Van Dam and Langendoen 2003;Lin et al 2004;Nam et al 2006] and asynchronous [Hurni and Braun 2010;Anwander et al 2010;Jurdak et al 2007] schedules.…”
Section: Quality Of Service (Qos)mentioning
confidence: 99%
“…In consequence, it is advantageous to send as many packets as possible, generally in bursts, when it wakes up. This burst transmission achieves both high throughput and low power consumption [18][19][20]. Accordingly, the protector should know how many packets a ZigBee node will transmit in order to protect the ZigBee transmission for the appropriate amount of time.…”
Section: The Limitation Of the Protector Approachmentioning
confidence: 99%
“…The throughput and average renewal interval for m transmissions are given by: (19) 6 Performance evaluation…”
Section: Multiple Packet Transmissionsmentioning
confidence: 99%
See 1 more Smart Citation