Paper Menu >>
Journal Menu >>
![]() Wireless Sensor Network, 2009, 1, 1-60 Published Online April 2009 in SciRes (http://www.SciRP.org/journal/wsn/). Copyright © 2009 SciRes. Wireless Sensor Network, 2009, 1, 1-60 Extending the Network Lifetime Using Optimized Energy Efficient Cross Layer Module (OEEXLM) in Wireless Sensor Networks T. V. Padmavathy Department of Electronics and Communication Engineering, SSN College of Engineering, Chennai, India Email: Padmavathytv@ssn.edu.in Received February 11, 2009; revised March 10, 2009; accepted March 13, 2009 Abstract In wireless sensor network, the primary design is to save the energy consumption as much as possible while achieving the given task. Most of recent researches works have only focused on the individual layer issues and ignore the importance of inter working between different layers in a sensor network. In this paper, we use a cross-layer approach to propose an energy-efficient and extending the life time of the sensor network. This protocol which uses routing in the network layer, and the data scheduling in MAC layer. The main ob- jective of this paper is to provide a possible and flexible approach to solve the conflicts between the require- ments of large scale, long life-time, and multi-purpose wireless sensor networks. This OEEXLM module gives better performance compared to all other existing protocols. The performance of OEEXLM module compared with S-MAC and directed diffusion protocol. Keywords: Routing, Medium Access Control, Life Time of the Network, Energy Efficiency, OEEXLM Module, Wireless Sensor Networks 1. Introduction Wireless sensor network consists of large number of sensor nodes are randomly distributed in a region. Each node has a limited energy supply and generates informa- tion when ever event occurs that needs to be communi- cated to a sink node. The focus of this paper is on the computation of optimal energy usage for data transfer and link schedule that maximize the network lifetime. However most wireless sensor network energy consump- tion operations involve sensing, computing, and communi- cating [1]. Generally, communication between nodes con- sumes more energy than local processing or collecting data operation. The geographical nature of the deployment space of nodes makes quasi impossible the replacement or the recharging operations of batteries. The challenge is to economize energy inside every node in order to maintain as long as possible the network functionality. 2. Related Works Many research works are developed for energy effi- ciency at each layer of protocol stack by proposing new algorithms and protocols. In particular, MAC layer was of great interest for many researchers because it is con- sidered as an important source of energy wastage such as overhearing, collision, control packet overheads and idle listening [2]. In order to decrease or if possible to eliminate these various sources of energy wastage, several protocols has been proposed during last years and which are divided into two main classes: Schedule based protocol TDMA and Contention based protocol. In TDMA protocols [3] are employed to avoid colli- sions by associating a slot time for each sensor node in a given cluster. This protocols more complex in the WSN where the nodes in general have a same priority and very limited resources. The Contention-based protocols are known as CSMA-based are usually used in the multi- hop wireless networking. But this protocol generates collisions due to these useless retransmissions which cause energy consumption wastage and time consuming in data transmission. Some of the power control problems are discussed in [4,5]. Approaches at MAC layer are Dermikol et al. [4] infers that some pros and cons of the some of the exist- ing protocol. One of the first attempts at MAC protocol for WSN is PAMAS, which reserves battery power in- ![]() 28 T. V. PADMAVATHY ET AL. Copyright © 2009 SciRes. Wireless Sensor Network, 2009, 1, 1-60 telligently powering off users that are not actively transmitting or receiving packets. This protocol de- creased the energy consumption of the network but maximum latency occurs. Raghavendra et al. [5] the Power Aware Medium Access protocol and Signaling (PAMAS) is a CSMA based protocol in which the nodes that are not actively transmitting or receiving should power themselves off. The protocol requires the nodes to have two separate channels (control and data), which will require two radios at each node increasing the cost, size and complexity of the sensor design. Existing MAC protocol [6,7] turn off the transceiver when there is no communication between the nodes also the power savings in these papers results reducing the idle listening power but also decreasing the collisions. In these papers they proposed adaptive listening incurs overhearing. Sleep and listen periods are predefined and constant, which decreases the efficiency of the algorithm under variable traffic load. A new generation of MAC protocols that is Cross- layer MAC protocols using several layers in order to optimize energy consumption has been emerged. These layers can be divided into interaction mode or unification mode. In the interaction mode, the MAC protocol is built by exploiting the data generated by other adjacent layers. Approaches at network layer in WSNs are mostly used to implement the routing of the incoming data, as quoted in [8]. It is known that generally in multihop networks the source nodes cannot reach the sink directly. Therefore, intermediate sensor nodes have to relay their packets. Generally, the implementation of routing tables offers the solution. These routing tables contain lists of node options for any given packet destination Definition of the routing tables is the task of the routing algorithm along with the help of the routing protocol for their con- struction and maintenance. MAC-CROSS Protocol [9] is an example of Cross- layer approach which allows the interaction between MAC and information of the network layers by making only the communicating nodes in listening mode and by putting other nodes into sleep mode. In order to avoid collisions, MAC-CROSS uses the control messages RTS/CTS/ACK. On the other hand, a Cross-layer design mode by unification requires the development of only one layer including at the same time functionalities of considered layers. In this paper, a unified cross layer module XLM [10] is developed which achieves efficient and reliable event communication between the nodes with minimum en- ergy expenditure. But in this protocol the end-to-end delay increases for low value duty cycle. When the duty cycle is low =0.1, 14% of the transmitted packets are dropped due to retransmission timeout. Because sender nodes cannot find any neighbors that satisfy the constraints. Weiyan Ge et al. [11] addressed the rate optimization for multicast communications at the media access con- trol (MAC) layer, and explore transport layer erasure coding to enhance multicast reliability in wireless sensor networks. In this approach they are not addressed the energy consumption and end-to-end delay. 3. Proposed OEEXLM Module The proposed cross layer approach replaces the entire traditional layer protocol architecture that has been so far used in WSNs. In this protocol we integrate the me- dium access control and routing to improve the perform- ance of the network. The communication in OEEXLM module is based on initiative concept. This module al- lows the each node to decide whether it can participate in communication or not. Consequently, this protocol uses adaptive receiving, stagger scheduling algorithm and logical link decision algorithm. A node starts a transmission by transmitting to its neighborhood an RTS packet to indicate that it has a packet to send. Upon receiving an RTS packet, each neighborhood node i decide to participate to communi- cation or not, that decision can be determined by an ini- tiative “I” defined as follows: I= 1 0 th thd rev rev TAR T if EE otherwise ⎧>+ ⎛⎞ ⎪⎜⎟ β= γ=γ ⎪⎜⎟ ⎨⎜⎟ = ⎝⎠ ⎪ ⎪= ⎩ (1) The initiative is set to 1 if all four conditions are true or satisfied. Out of four conditions, the first two condi- tions related to MAC layer and next two conditions re- lated to network layer. The first condition checks event β occurs or not. If β = 1 then the remaining three condi- tions checked by the node, otherwise the nodes are go to sleep mode. Because of this, idle listening and overhearing are avoided. The second condition is adaptive receiving scheme, the receiver node wait for TA seconds if the node does not receive any packets from upper layer it goes to sleep state. The third condition is the node will check the buffer size γth if the size is less than threshold it will choose the alternate path to reach the destination. Fourth condition is that source node from upper layer checks the lower layer receiver node energy if it is greater than threshold Ethd rev then it will transmit packet otherwise it will choose the alternate path. Using this initiative concept, OEEXLM module over- comes collision, overhearing, idle listening and improve the throughput, link reliability and extend the life time of the network. 3.1. Basic Terms Used in OEEXLM The following assumption can be considered for OE- EXLM protocol to study the performance. The network topology used in this protocol is grid architecture. Data flows from n layer to n-1 layer until the data packet reached the destination. For simulation MICA2 mote specification is considered. In this protocol the value of duty cycle is denoted by δ and is defined as ratio of the time a node is active. The duty cycle is varied with re- ![]() T. V. PADMAVATHY ET AL. 29 Copyright © 2009 SciRes. Wireless Sensor Network, 2009, 1, 1-60 spect to data transmission. The sleep time for each node is s leep T sec. The listen period of each node is less than or equal to transmission period of upper layer. Transmis- sion period each layer is 50ms. With in 50ms if lower layer node does not receive any data from upper layer it will wait for TA sec and go to sleep. 3.2. Initiation of Transmission When the event occurs that is β =1 layer n node has a data packet to transmit, it sends RTS signal to the lower layer, the lower layer sends the CTS signal to the upper layer with response the CTS signal the layer n sends the data to the layer (n-1) for 50ms.During the receiving period, if a node senses that the channel is idle and its neighbours are not communicating for a time TA, it will go to sleep until its subsequent sending periods. After receiving the packet from n layer, the n- 1 layer route the packets to the destination, each source node determines a path to the destination by selecting a lower layer node under its coverage randomly. Thus messages flow in the correct direction, but do not use the same path every time. Thus this data exchange scheme provides both collision avoidance and reliable retransmission. 4. Mechanism of OEEXLM Figure 1 explains the mechanism of OEEXLM module. In this module we integrate the MAC and network layer. In MAC layer we proposed Power Efficient MAC protocol which is used to overcome idle listening, collisions, Hid- den terminal problem, and also to provide a low latency compared to other existing MAC protocols. The PE-MAC uses the three algorithms to achieve the energy efficiency. 4.1. Clock Synchronization Algorithm In clock synchronization algorithm layer n comprises the source nodes. Initially the nodes in layer n are in sending mode for 50ms while those in the layer (n-1) are in re- ceiving mode. The remaining nodes are in sleep state. Assume that the source nodes generate packets (layer-n). As the next layer nodes are in the receiving mode, the source nodes can transmit the packets directly without checking the status of the lower layer nodes. The pack- ets are stored in the buffer space of the lower layer nodes. Once the receiving period of layer (n-1) nodes ends, the sending period for layer (n-1) starts. The layer (n-2) nodes shift from sleep mode to receive mode. The remaining nodes enter the sleep mode. 4.2. Logical Link Decision Algorithm The LLD algorithm is implemented in this protocol to ensure that two source nodes do not transmit the packets to the same receiver at the same time. This algorithm is implemented initially when each source node determines a link to the sink. When all the source nodes determine their links, the links are compared to ensure that there is no overlap in the existing links. If there is an overlap, the LLD algorithm uses a logical link decision to get the new link to the sink. 4.3. Adaptive Receiving In Adaptive Receiving algorithm, layer n sends RTS packet to the lower layer n-1, the lower layer sends the CTS signal to the upper layer n. With response the CTS signal from layer n-1, the layer n sends the data to the layer n-1 for 50ms.Adaptive receiving scheme employs a time interval TA to handle traffic varies. During the receiving period, if a node in the n-1 layer senses that the channel is idle and data from n layer are not communicating for a time TA, it will go to sleep. Suppose with in 50ms if the layer n-1 senses any data from the upper layer n it wakes up and receive the data. This adaptive receiving scheme reduces the packet drop and improves the throughput of the network. In network layer we proposed two algorithms: a con- gestion control and alternate path algorithm. These two algorithms are used to improve the lifetime of multihop sensor network by avoiding the collision. 4.4. Alternate Path Algorithm In alternate path algorithm, each has routing table. Be- fore route the data packet each source finds a multiple path to the sink. In this each source node initiate HELLO message to all lower layer nodes. The HELLO message contains source ID, type of node whether it is sink or intermediate node and energy level which is shown in Figure 2. Each node in the lower layer updates it table once it receives the HELLO message. If any node in lower layer gets more than one HELLO message it sends the nega- tive acknowledgement NACK signal to the correspond- ing source node. Then that particular source node chooses the alternate path to reach the sink. After setting an alternate route the nodes in the rout- ing path check its energy level of receiving node. If the energy level less than the threshold Ethd rev again the node choose the alternate path by sending HELLO message and the routing table is updated. 4.5. Congestion Control Mechanism and Algorithm The congestion in the network is due to two traffic. One is due to generated packet that is whenever node detect the events it will generate the data packets and that is to be transmitted to the destination through intermediate nodes. The rate of generated packets at the node i is de- noted by λ i. ![]() 30 T. V. PADMAVATHY ET AL. Copyright © 2009 SciRes. Wireless Sensor Network, 2009, 1, 1-60 Is Event occurs Packet arrives at Layer n No Yes Finding several paths for each Source to Destination Selection of Non-overlap shortest path for each source Transmit data Finished Tran smittin g Deployment of Sensors in the Application area Sensors Activated If (TA > R+T) Set Transmission Time = 50m s Send RTS packet to the Routing node in Layer-n-1 If Data Oc curs Data transmission starts after receiving the CTS packet Set Receiving Time = 50ms Receive Data Is Buffer size Source node sends "HELO" Packet to n-1 layer Is Overlap occu rs No Ye s Select the Alternate path Yes No No Yes No No Goes to Sle ep Yes No Energy Level Yes Ye s No Figure 1. Mechanism of OEEXLM. Since the network is a multi hop each nodes plays dual role that is it act as source as well as router. During the transmission each node in lower layer receives the data packet from the upper layer until the data packet reached at the destination. These packets are referred as relay packets. If the n-1 layer node receive the data packets from layer n the rate of relay packet of node i of n-1 layer is ,1 n in− λ. The input rate of the buffer for the node i is depends on the rate of relay packets ,1 n in − λ and the rate of generated packets λ i. In OEEXLM module the rate of input packet at node i’s buffer αi, can be represented as .,1 n iiin− α=λ+λ (2) The node is active for a fraction of duty cycle δ = 50ms. Hence the average time taken a time to transmit and receive data packet can be given by ( ) 1 txii pkt Tet = +α⋅ (3) ,1 n rxi npkt Tt − =λ (4) where pkt t is the average time taken to successfully transmit a packet to another node and i e is the error packet rate. The proposed OEEXLM module avoids packet drops due to congestion by not allowing upper layer nodes to transmit data packet if there is not available buffer size γ this is can be controlled by congestion control algo- rithm. A lower layer node changes the path of transmis- sion based on its buffer status. During transmission, the lower layer node i allow Pi packets to be transmitted by the upper layer nodes. Figure 3 shows the buffer queue model of the node. Given the condition that the lower layer node has pro- portionally higher probability to access the medium, ![]() T. V. PADMAVATHY ET AL. 31 Copyright © 2009 SciRes. Wireless Sensor Network, 2009, 1, 1-60 Source ID Type of Node Energy level 2 Byte 1 Byte 4 Byte Figure 2. HELLO message packet format. Figure 3. Buffer queue model. even then the lower layer node may not be able to for- ward all i P packets. So, in the next transmission, the lower layer node will have some packets from the previ- ous transmission, which might cause Congestion within few successive transmissions. Therefore, for each transmission upper layer nodes check the routing table if the buffer size γ less than the buffer threshold thd γ up- per layer node takes the alternate path. Maximum num- ber of packet hold by the buffer is buff N. The transmis- sion only occur when γ >thd γ thd γ =byff N≥0 in ii p = = ∑ (5) where buff l N= γ − γ . As a result of congestion control algorithm, the OE- EXLM module avoid the layer to layer congestion occur in the networks. Because of this energy consumed by the node is reduced there by improving the life time of the network. The medium control access scheme uses three algo- rithms to improve the energy efficiency and in network layer we use two algorithms to improve the life time of the networks. These two layers are integrated by using initiative conditions as per Equation (1). 5. Network Topology Figure 4 shows the data flow for the OEEXLM module. The nodes in the network operate in three different modes-sleeping, receiving and sending. Each node goes to sleep periodically to save energy and then wakes up and listens to see if any other node wants to talk to it. During sleep, the node turns off its radio; therefore the energy waste due to idle listening can be reduced. The nodes with same layer-count are given the same schedule, and the sending and receiving periods are staggered layer by layer such that when one node is in sending mode, its lower-layer node is in receiving mode. After receiving a message from an upper-layer node, each node can transmit it to the lower-layer node in the subsequent sending period. So a packet can be transmit- ted to sink nodes through multi-layers fleetly and the end-to-end latency is reduced. 5.1. Performance Evaluation The Table 1 shows the simulation setup used for simula- tion. 5.1.1. Latency Vs Network Area (MAC) Figure 5 infers that in S-MAC a node has to wait till its neighbouring node as to awake to transmit the message to it. This results there will be some amount of delay in S-MAC protocol, which is absent in OEEXLM module. In OEEXLM module whenever a node is in send state, the lower layer node is in receiving state. So the source node can transmit the message to the lower layer without checking whether the lower layer node is listening or sleeping mode. Hence the source node can transmit its message fleetly to the sink through multi layers. 5.1.2. Energy Consumption Vs Network Area (MAC) The Figure 6 infers that depicts the energy consumption of S-MAC and OEEXLM module. The comparison is made for a simulation setup with ten layers, ten nodes in each layer and a four sink. The graph shows that OE- EXLM module protocol uses less energy than S-MAC. This is because the idle listening dominates the energy consumption in S-MAC protocol but TA can make OE- EXLM module go to sleeping mode earlier, and the en- ergy consumption is reduced. The energy consumption of OEEXLM module is 35% -83% les than existing S- MAC protocol. 5.1.3. Latency Vs Number of Hop (MAC) The Figure 7 shows that the latency encountered in OE- EXLM module compared with that in S-MAC with respect to number of hops. Obviously the latency of OEEXLM Table 1. Simulation setup. Parameters Value Transmission Range 250 m Network Area 100 x 100 Number of Sensors 100- 1500 Packet rate 5 pkt/sec Packet size 512 bytes Radio Bandwidth 76kbps Transmitting Power 75mW (270J) Receiving Power 36mW (129.6J) Power Consumption in Sleep mode 100μ W (0.36 J) Sending and Receiving Slot 50msec Type of mote Mica2 Inital energy of sensor node 2KJ Energy Threshold Ethd 0.001mJ buff N l γ γ ![]() 32 T. V. PADMAVATHY ET AL. Copyright © 2009 SciRes. Wireless Sensor Network, 2009, 1, 1-60 Figure 4. Data flow diagram for OEEXLM module. Figure 5. Latency vs network area. module is lesser than that in the S-MAC because of staggered scheduling algorithm. In S-MAC a node has to wait till its neighbour is awake to transmit the message to it. This problem is not occurring in OEEXLM module. In OEEXLM module whenever a node is in send state, the lower layer node is in receiving state. So the source node can transmit the message to the lower layer without checking whether the lower layer node is listening. Hence the source node can transmit its message fleetly to the sink through multi layers. 5.1.4. Latency Vs Number of Hops (Routing) Figure 8 infers the delay as a function of the number of nodes in the WSN. The delay increases with the number of hops increasing. Our simulation shows the average delay of the proposed protocol is better than that of the directed diffusion. This is because in OEEXLM module, for each transmission each node in the routing checks the buffer condition, so that no queue of data occurs in the buffer. Due to alternate path algorithm the shortest delay oc- cur compared to other schemes. As we expected, data packets are routed through different node-with the help of proper design of algorithm in routing. Hence, the net- work congestion can be avoided. 5.1.5. Energy consumption Vs Number of Nodes (Routing) Figure 9 infers that energy consumption per node ver- sus number of nodes. The value of node energy con- sumption gives the average energy dissipated by the node in order to transmit the packet from source to drain. The same metric is used in [6] to determine the energy efficiency level of WSNs. It is calculated as follows: () 1 1 ,, N ii i S j j e initiale resi NodeEnergy Consumption NdataP = = − =∑ ∑ (6) where N is the total number of nodes, initialei, initial energy of nodes, resiei, is the residual energy of the nodes, S is the number of sinks and j P is the number of data packets received by the sink j. Figure 6. Energy consumption vs network area. Figure 7. Latency vs number of hops. Layer n Layer n-1 Layer 1 Sink ![]() T. V. PADMAVATHY ET AL. 33 Copyright © 2009 SciRes. Wireless Sensor Network, 2009, 1, 1-60 Figure 8. Comparison of latency vs number of hops with DD. Figure 9. Energy consumption vs number of nodes. The simulation result infers that there is lower node energy consumption in CRLS protocol over the other schemes., The energy consumption of nodes in OE- EXLM module is 34% to 84% lesser than when com- pared with directed diffusion. This results shows that the energy efficiency of OEEXLM module is stable and has little impact by the increase of the network size, while the performance of other schemes degrades with larger network size. 5.1.6. Network Life Time The system lifetime is defined as the number of rounds for which 75% of the nodes are still alive. CRSL The transmitted and received energy costs for the transmis- sion of a k-bit data message between two nodes sepa- rated by a distance of r meters are given by Equations (6) and (7), respectively. () () ttxamp Ek,rEk Erk=+ (7) () rrx Ek Ek= (8) In Equation (7) )( r,kEt denotes the total energy dis- sipated in the transmitter of the source node, while () r Ek in Equation (8) represents the energy cost in- curred in the receiver of the destination node. Parame- ters tx E and rx E are per bit energy dissipation for transmission and reception, respectively, and )( rEamp denotes the energy required by the transmitted amplifier to maintain an acceptable radio for transferring data re- liably. The free-space propagation model is applied, and the transmit amplifier )(rEamp is given by Equation (9) 2 amp FS Er=ε (9) where e F S is the transmitted amplifier parameter. The set of parameter given in [7,8]. F S e =10 pJ/b/m2. From Figure 8, we infer that the network lifetime is increased by using the alternate path and congestion control algorithm. The network lifetime is given in terms of rounds till which 75% of nodes are alive. A network is assumed to be useless when one of the sensor’s en- ergy is below the threshold. 5.1.7. Data Packet Delivery Ratio Data packet delivery ratio can be calculated as the ratio between the number of data packets that are sent by the source and the number of data packets that are received by the sink. It can be denoted as R Successfully delivereddata Data Delivery RatioRequired data = (10) This parameter R indicates both efficient of the rout- ing protocol and the effort required to receive data. In the ideal scenario the ratio should be equal to 1. If the ratio falls significantly below the ideal ratio, then it could be an indication of some of the packet dropped because of faults in the protocol design. However, if the ratio is higher than the ideal ratio, then it is an indication that the sink receives a data packet more than once. It is not desirable because reception of duplicate packets consumes the more energy. The relative number of du- plicates received by the sink is also important because based on that number the sink, can possibly take an ap- propriate action to reduce the redundancy. Figure 11 shows the data packet delivery ratio of DD and OEEXLM modules. To eliminate packet loss we use a rate of 5 packets/second. It is found that the delivery ratio of the two protocols increase as the node density increases. When node density is high, there are more nodes available for data forwarding, and this increases the delivery ratio. Directed diffusion protocol offers less packet delivery rates, compared to OEEXLM module because it does not adapt well its behavior to network size increase. The OEEXLM module has maintained constant delivery rates throughout the simulated scenar- ios because the paths are selected based on the energy availability and buffer size. ![]() 34 T. V. PADMAVATHY ET AL. Copyright © 2009 SciRes. Wireless Sensor Network, 2009, 1, 1-60 Figure 10. Network lifetime. Figure 11. Packet delivery ratio vs number of nodes. Figure 12. Performance variations with respect to buffer size. 5.2. Performance Variations with Respect to Buffer Size Figure 12 shows the performance variations when the buffer size varies from 50 bytes to 300 bytes. When the buffer size is 50 bytes number of packets reached at the destination is minimum because of congestion but packet delay is minimum. When the buffer size 300 bytes the number of packets dropped is minimum due to large buffer and the average delay per packet increases due to the increased queuing delay. 5.2.1. Packet Loss with Respect Buffer Size Figure 13 infers that packet loss get reduced due to in- creasing buffer size. The number of packets dropped due to buffer overflow in the case of the OEEXLM module almost zero. This is because each time after receiving the packets from upper layer the buffer size is calculated and updated in the routing table. Depending on updated value the routing path algorithm send the HELLO mes- sage to the other nodes in the routing. 5.2.2. Packet Delay with Buffer Size Figure 14 shows Packet delay Vs buffer size. The graph infers that as the buffer size increases the average delay per packet increases due to the increased queuing delay. Figure 13. Packet loss vs buffer size. Figure 14. Packet delay vs buffer size. ![]() T. V. PADMAVATHY ET AL. 35 Copyright © 2009 SciRes. Wireless Sensor Network, 2009, 1, 1-60 When the buffer size is 120 bytes, packet delay is only 4 second from source to destination. When the buffer size is 300 bytes length the delay is 12 seconds because of queuing delay. From this graph, we find that as the buffer size increases the packet delay also increases. But throughput is maximum because the packet drop is minimum by compromising the delay. 6. Conclusions and Future Work In this paper we presented the Cross-Layer Design to improve the performance of the wireless sensor net- works. This protocol design is used to give the direct interactions between the Network layer and the MAC layer. The traditional Network layer and MAC layer have been removed, thus simplifying the protocol stack. Simulation results that our proposed scheme has higher node energy efficiency, lower average delay and control overhead than the directed diffusion protocol and S- MAC protocol. The energy consumption of nodes in OEEXLM module is 34% to 84% lesser than when compared with directed diffusion. Further the network life time is 78% improved compared to DD protocol. In future we are going to extend the OEEXML design to Physical layer. 7. References [1] F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Commu- nications Magazine, 40(8), pp. 102–114, August 2002. [2] O. Zhi-Wen, B. K. Shruthi, and S. K. Sang, “Medium access control for wireless sensor networks,” CS258- Advanced Communication Networks, San Jose State University, 2005. [3] C. Sungrae, K. Kanuri, C. Jin-Woong, L. Jang-Yeon, and S. D. June, “Dynamic energy efficient TDMA-based MAC protocol for wireless sensor networks,” Autonomic and Autonomous Systems and International Conference on Networking and Services, ICAS-ICNS, pp. 48, October 23-28, 2005. [4] I. Demirkol, C. Ersoy, and F. Alagöz, “MAC protocols for wireless sensor networks: A Survey,” IEEE Commu- nications Magazine, pp. 115-121, 2006. [5] S. Singh and C. S. Raghavendra, “PAMAS: Power aware multi-access protocol with signaling for ad hoc net- works,” ACM Computer Communications Review, 28(3), pp. 5-26, 1998. [6] W. R. Heinzelman, Chandrakasan and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” Proceedings of 33rd IEEE An- nual Hawaii International Conference on Systems Sci- ences, Hawaii, 2000. [7] W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrish- nan, “An application-specific protocol architecture for wireless microsensor networks,” IEEE Transactions on Wireless Communications, Vol. 1, 2002. [8] C. Intanagonwiwat, R. Govindan, and D. Estrin, “Di- rected diffusion: Ascalable and robust communication paradigm for sensor networks,” in Proceedings of ACM MobiCom’00, Boston, MA, USA, pp. 56-67, August 2000. [9] C. Suh, K. Young-Bae, and S. Dong-Min, “An energy efficient cross-layer MAC protocol for wireless sensor networks,” Graduate School of Information and Com- munication, Ajou University, Republic of Korea, APWeb 2006, LNCS 3842, pp. 410-419, 2006. [10] Bouabdellah, Kechar1ahmed, and Louazani, “Energy efficient cross-layer MAC protocol for wireless sensor networks,” Department of Computer Science, Faculty of Science, University of Oran Es-Senia, BP. 1524 Oran, Algeria, 2002. [11] W. Y. Ge, J. S. Zhang, and S. M. Shen “A cross-layer design approach to multicast in wireless networks,” IEEE Transactions on Wireless Communications, Vol. 6, pp. 1063-1071, March 2007. |