A wireless sensor MAC protocol for bursty data traffic

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

35 Citations (Scopus)

Abstract

This paper proposes MH-MAC, a new MAC protocol for wireless sensor networks capable of handling applications that generate infrequent huge peaks of traffic. Existing protocols are not adapted to this kind of applications. Asynchronous protocols are energy efficient for the long inactive periods, but fail to cope with the bandwidth and latency requirements of the traffic peaks when more than two nodes are sending data to a common sink. Synchronous protocols that support contention free slots provide good throughput for handling the load peaks, but consume unnecessary energy maintaining clocks synchronized for very long idle periods. MH-MAC is a multimode hybrid protocol that can be configured by the application to run in asynchronous mode or in synchronous mode, with or without contention, providing the best possible trade-off. MH-MAC is a single-hop MAC, which supports multi-hop applications through a cross-layering API. The paper includes simulation results with the energy consumption, latency and throughput for the operation modes of MH-MAC, showing the asynchronous-synchronous trade-offs and the state transition overhead.

Original languageEnglish
Title of host publication18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC'07
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
ISBN (Print)1424411440, 9781424411443
DOIs
Publication statusPublished - 1 Dec 2007
Event18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC'07 - Athens, Greece
Duration: 3 Sept 20077 Sept 2007

Conference

Conference18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC'07
Country/TerritoryGreece
CityAthens
Period3/09/077/09/07

Fingerprint

Dive into the research topics of 'A wireless sensor MAC protocol for bursty data traffic'. Together they form a unique fingerprint.

Cite this