Search results for " MAC protocol"
showing 4 items of 4 documents
MAC Design for WiFi Infrastructure Networks: A Game-Theoretic Approach
2011
In WiFi networks, mobile nodes compete for accessing a shared channel by means of a random access protocol called Distributed Coordination Function (DCF). Although this protocol is in principle fair, since all the stations have the same probability to transmit on the channel, it has been shown that unfair behaviors may emerge in actual networking scenarios because of non-standard configurations of the nodes. Due to the proliferation of open source drivers and programmable cards, enabling an easy customization of the channel access policies, we propose a game-theoretic analysis of random access schemes. Assuming that each node is rational and implements a best response strategy, we show that…
Design of energy efficient MAC protocols in wireless sensor networks
2014
Masteroppgave i Informasjons- og kommunikasjonsteknologi IKT590 Universitetet i Agder 2014 Wireless sensor networks (WSNs) have been used in variety of applications such as in military and defense, process control industry and health monitoring applications. In WSNs, sensors are in small size with limited battery capacity and idle listening is a crucial problem which consumes more energy. Duty cycling (DC) is a technique which is used in many medium access control (MAC) protocols to reduce idle listening. In this thesis, we propose an asynchronous DC protocol, namely energy balancing asynchronous cooperative transmission medium access control (EB-ACT-MAC), which balances the remaining energ…
Performance Analysis of Synchronous Duty-Cycled MAC Protocols
2015
In this letter, we propose an analytical model to evaluate the performance of the S-MAC protocol. The proposed model improves the accuracy of previous models in two aspects. First, it incorporates the dependence among the nodes within a cluster by defining a DTMC that models the number of active nodes, whereas the previous models considered that nodes were mutually independent. Second, it proposes new methods for calculating packet delay and energy consumption. The analytical model is validated through discrete-event based simulations. Numerical results demonstrate that the proposed analytical model and methods yield accurate results under realistic assumptions