2011 18th International Conference on Telecommunications 2011
DOI: 10.1109/cts.2011.5898916
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing the performance of RPL using a Receiver-Based MAC protocol in lossy WSNs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 12 publications
(24 citation statements)
references
References 3 publications
0
24
0
Order By: Relevance
“…2) TSTP Medium Access Control and Routing: TSTP MAC [12] is the component within TSTP responsible for interfacing the protocol with the physical network in an energyaware manner. Its design follows the general principles of RB-MAC [13]: a long preamble composed of microframes (see figure 4) is sent before each message, such that just one sender occupies the channel at every full period S; sensor nodes sleep for most of the time and, when they receive a message, nodes closer to the destination become relay candidates, using their distances to the destination to derive the time offset δ(m) for Clear Channel Assessment (CCA) and retransmission. The relay candidate closest to the destination accesses the channel earlier and wins the contention, resulting in a greedy, fullyreactive, geographic routing.…”
Section: B Trustful Space-time Protocol (Tstp)mentioning
confidence: 99%
“…2) TSTP Medium Access Control and Routing: TSTP MAC [12] is the component within TSTP responsible for interfacing the protocol with the physical network in an energyaware manner. Its design follows the general principles of RB-MAC [13]: a long preamble composed of microframes (see figure 4) is sent before each message, such that just one sender occupies the channel at every full period S; sensor nodes sleep for most of the time and, when they receive a message, nodes closer to the destination become relay candidates, using their distances to the destination to derive the time offset δ(m) for Clear Channel Assessment (CCA) and retransmission. The relay candidate closest to the destination accesses the channel earlier and wins the contention, resulting in a greedy, fullyreactive, geographic routing.…”
Section: B Trustful Space-time Protocol (Tstp)mentioning
confidence: 99%
“…By tuning CI and CCA, average duty-cycles of below 1% can be achieved without any need for scheduling or synchronization. Some MAC protocols that utilized this idea are: B-MAC [6], wiseMAC [7], X-MAC [8], MFP [9], CSMA-MPS [10], STEM [11], 1-hopMAC [12], and RB-MAC [4]. In B-MAC receiver nodes wake up every CI period to check for channel activity.…”
Section: Preamble Sampling Mac Protocol (Ps-mac)mentioning
confidence: 99%
“…However, retransmissions are not energy-efficient and cause delay in transmissions. In [4], Akhavan et al proposed receiver-based MAC (RB-MAC), in which a receiver node is dynamically elected among potential neighbour nodes, based on current channel conditions and other predefined objective function (e.g. distance to the sink, residual energy, or any combinations of these parameters).…”
Section: Introductionmentioning
confidence: 99%
“…However, load balancing and the effects of contention-based access are not considered. A study on the interaction of RPL with the MAC layer is presented in [14]. The authors investigate the use of a receiver-initiated MAC protocol in enhancing the performance of RPL.…”
Section: B Routing Protocol For Low Power and Lossy Networkmentioning
confidence: 99%
“…The authors investigate the use of a receiver-initiated MAC protocol in enhancing the performance of RPL. However, the work in [14] does not include the specifications of the IEEE 802.15.4 MAC. We provide details of the MAC-routing interaction in the next section.…”
Section: B Routing Protocol For Low Power and Lossy Networkmentioning
confidence: 99%