ISSN ONLINE(2320-9801) PRINT (2320-9798)

Yakışıklı erkek tatil için bir beldeye gidiyor burada kendisine türk Porno güzel bir seksi kadın ayarlıyor Onunla beraber otel odasına gidiyorlar Otel odasına rokettube giren kadın ilk önce erkekle sohbet ederek işi yavaş halletmeye çalışıyor sex hikayeleri Kocası fabrikatör olan sarışın Rus hatun şehirden biraz uzak olan bir türk porno kasabaya son derece lüks bir villa yaptırıp yerleşiyor Kocasını işe gönderip mobil porno istediği erkeği eve atan Rus hatun son olarak fotoğraf çekimi yapmak üzere türk porno evine gelen genç adamı bahçede azdırıyor Güzel hatun zengin bir iş adamının porno indir dostu olmayı kabul ediyor Adamın kendisine aldığı yazlık evde sikiş kalmaya başlayan hatun bir süre sonra kendi erkek arkadaşlarını bir bir çağırarak onlarla porno izle yapıyor Son olarak çağırdığı arkadaşını kapıda üzerinde beyaz gömleğin açık sikiş düğmelerinden fışkıran dik memeleri ile karşılayıp içeri girer girmez sikiş dudaklarına yapışarak sevişiyor Evin her köşesine yayılan inleme seslerinin eşliğinde yorgun düşerek orgazm oluyor

I-MAC with Minimum Delay and Cross Layer Optimization for Wireless Sensor Networks

M.Amsanandhini 1, A. Jayamathi 2
  1. PG Student, Department of Electronics and Communication Engineering, K. S. R. College of Engineering, Tiruchengode, India
  2. Associate Professor, Department of Electronics and Communication Engineering, K. S. R. College of Engineering, Tiruchengode
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Innovative Research in Computer and Communication Engineering

Abstract

Reducing the end to end delay is one of the main challenges in the Wireless Sensor Networks. Scheduling of the medium access control plays an important role in enhancing the performance of wireless sensor networks. In Sleep/wake up scheduling technique, nodes are operating in a low duty cycle and reduce end to end delay thus save energy and extend the network lifetime. I-MAC that involves the assignment of slots for each packet, wake up-sleep scheduling when combined with cross layer optimization would effectively reduce the end to end delay and thereby ensures energy efficient operation. Based on optimum energy flow at the cross layer the frame length could be revised and by this slots could be reused by TDMA Scheduling.

Keywords

Wireless sensor network; End to End delay; Sleep/wake up scheduling; cross layer optimization.

INTRODUCTION

Wireless sensor networks consist of a number of sensors which are deployed densely and randomly. Sensor nodes are less weight and low cost with the capability of sensing, processing and transmission. Sensor nodes are limited by the battery power impractical to charge or replace the exhausted battery, which leads to limited lifetime of a sensor network. Maximizing the network lifetime is the common objective of sensor network research. Design of a MAC layer protocol for wireless sensor network is a challenging task due to limited battery power and limited bandwidth [1].
TDMA protocols reduce data retransmissions because collision does not occur in TDMA protocol [3]. In addition to energy efficiency, quality of service (QoS) metrics such as end-to-end delay needs to be taken into account in some applications or under certain scenarios, for instance, delivering real-time data [2]. Main objective of our paper is minimizing network wide energy consumption and also reduce end-to-end delay for increasing the lifetime of the network. Cross layer optimization and minimum delay scheduling using Intelligence hybrid MAC (I-MAC) to achieve link reliability, high data rate and reduce end to end delay in WSN.

II. RELATED WORK

In wireless sensor network, the authors of [7] obtain one of the new works in contention based MAC protocol. S-MAC nodes operate in low duty cycle and energy efficiency is achieved by periodic sleeping. The author of [8] improves the energy efficiency of S-MAC by adaptive duty cycle. T-MAC reduces the idle listening by transmitting all messages in burst of variable length and sleeping between bursts and maintains an optimal active time under variable load by enthusiastically determining its length. The authors of [9] consider MAC for Mica2. B-MAC allow an application to execute its own MAC through a well-defined interface also adopt Low power listening and engineer the clear channel sensing technique to improve channel utilization. The authors of [3] consider the number of packets being sent at every node and provide an algorithm to obtain the shortest schedules by eliminating the nodes without packets to send at each loop, these algorithms require global topology information, which may be difficult for large size networks. Interference-free TDMA schedules are calculated in [10] for a small-scale network by joint optimization of the physical, MAC, and network layers. The authors use convex optimization to solve the cross-layer-based network lifetime optimization problem, employing the interior point method.

III. PROPOSED METHOD

The concept of link scheduling and broadcast scheduling is combined, which is introduced by I-MAC protocol [1]. Crosslayer design is minimizing the network-wide energy consumption. A Time slot is defined as the periodic interval, it consists of an active period and a sleep period. A duty cycle is the ratio of active period to the entire cycle time. A rendezvous slot is defined as a time slot clearly dedicated to a pair of nodes to communicate with each other. In rendezvous, a node forms a channel for transmission and reception with one of its neighbors. The source node knows the degree of importance of the sensed data and accordingly the application layer sets the priority. TDMA schedules with optimized power consumption and minimum latency in clustered WSNs.
image

IV. CROSS LAYER OPTIMIZATION

In this part, the physical, MAC and network layer models that serve as input to the cross layer optimization. In resource constrained WSN’s, the lifetime of the network can be increased by optimization which can be achieved by exchanging the information across all the layers. The nodes in the network are divided into clusters, each consisting of a cluster head (CH) and a gateway (GW). The members of the cluster communicate with the cluster head via one hop. The transmission range of the cluster heads and gateways is not restricted to one hop. The clustering scheme presented in [3] can be used to form clusters.
The analysis is simplified by using the virtual link to represent the traffic from a cluster member to the corresponding cluster. Thus the TDMA schedule is derived considering only the backbone network consisting of cluster heads and gateways.
A graph G (V, L) is used to denote the backbone network consisting of CH’s and GW’s including sink, V represents the set of nodes and L represents the set of links. The total number of nodes in the network is n = |V|. The sink is considered as node 1. The links are considered to be unidirectional so that the link (i, j) is different from the link (j, i). We assume that the sensor nodes are stationary in the network. Physical layer links various parameters such as power, Signal to Noise ratio (SNR) and bit error rate together by considering the propagation model, modulation and demodulation, encoding and decoding techniques. The path loss model is:
Pl(d) = Pl (d0) 10 γlog 10(d/d0) (1)
Where d is the distance between the transmitter and receiver, d0 is the reference distance and γ is the path loss component. The bit error rate expressed as a function of SNR for the non-coherent FSK MODEM scheme used in Mica2 motes is given by,
image
Where R is the data rate in bits per second (bps), and BN is the noise bandwidth. The SNR at the receiver is located at a distance d from the transmitter is given by:
SNR (d) dB = Ptr dBm – Pl (d) dB – Pn dBm (3)
Where the parameters on the right side are the transmission power, the average path loss at the distance d, and the noise floor. Considering the length of the packet as L bytes and the encoding data rate is r, then the packet loss rate p on each link is defined as the probability that at least one transmitted bit in a packet is corrupted is given by [2],
image
The energy consumed for sensing is assumed to be small and is ignored. The average transmission energy consumption by node a, to transmit a data bit to node b with transmit power Ptx,ab = Pcir,tx + Ptx(dab), is given by [2],
image
Where Pcir, tx power consumed by the transmitter circuits (excluding the power consumed by the power amplifier circuit), which is a constant. Ptx(dab): Power consumed by the power amplifier circuit to transmit a distance dab, Ptx,ab is variable depending on the transmission distance dxy and the packet loss rate. The average receiving energy consumption per bit at receive power Prx is fixed and is calculated by: E (Prx) = Prx / R, where Prx is the power consumed by the receiver circuits. The MAC layer protocol employed in the data relay phase is TDMA. TDMA frame consists of a number of slots, each with fixed length ��t. Increasing the transmission power can reduce the bit error rate. This shows that an optimal transmission power exists for each and every link[3].
Multihop, multipath routing is performed on the network layer. The sink provides the information to the next hop and the proportion of data traffic to the next hop to every CH or GW after deriving the optimal schedules at the end of the initialization phase of every round. The combination of all the three layers gives the cross layer design. A cross-layer optimization can be formulated as in [2].
image
Each slot starts with a SYNC period. The purpose of the SYNC packet is to maintain the synchronization between the nodes within the same virtual cluster. The next part of the active period of the frame is a reservation slot which is used for the data slot reservation. Then the last part is used for data and ACK transmission by sensor nodes. The SYNC packet contains the time until the next frame starts. If the node during start up hears a SYNC packet from one to another node, it follows the schedule in that SYNC packet and transmits its own SYNC accordingly [1].

V.STATE DIAGRAM

The state diagram of the I-MAC protocol is shown in the fig 3: during the sleep state the nodes turns off its radio and start a timer whose duration is predefined according to the duty cycle of the protocol with consideration of the prolongation of rendezvous communication between any pair of nodes. When the timer expires, the node goes to wake-up state. It turns on its radio and switches to listen to the data channel and its goes to idle listening state. If the node has any data to send or receive it goes in the CSMA/CA state otherwise after them out it goes to sleep state. If the sender node wins the contention both the sender and the intended receiver go to the T x/Rx state and go to sleep state after successful communication. Nodes that fail contention go to sleep state. The node will first broadcast the declaration of its making rendezvous slot. The declaration message contains how many slots will be used as rendezvous slot, and between whom the rendezvous will be done. So, remaining neighboring nodes can calculate locally about the slot so that they need not to wake up during those slots. For each rendezvous slot since all the neighbors of both sender and receiver will be in sleep mode, there will be no hidden or exposed terminal problem.
image
The node will first broadcast the declaration of its making rendezvous slot. The declaration message contains how many slots will be used as rendezvous slot, and between whom the rendezvous will be done. So, remaining neighboring nodes can calculate locally about the slot so that they need not to wake up during those slots. For each rendezvous slot since all the neighbors of both sender and receiver will be in sleep mode, there will be no hidden or exposed terminal problem.

VI. TDMA DELAY SCHEDULING ALGORITHM

Based on scheduling the optimal values of transmission power and the flow distribution on every link for the energy efficient data relay can be obtained as in [2]. Here, we adopt a simple method to calculate the TDMA schedule that has the shortest length. The algorithm starts from any of the backbone nodes (CH or GW). Slots are first assigned to the virtual link if the node is a CH and then to all the outgoing links on the node. The algorithm checks all the links that are previously assigned before assigning the slots to any succeeding nodes to ensure that there is no conflict. The three conditions that must be satisfied before assigning slots to any link of the node i [3].
Condition I: The current node should neither be the sender or receiver of a previously scheduled link using slot s, and the receiver of this link must not be any link scheduled with slot s.
Condition II: There should be no interference to the slot scheduled by node i with the links already scheduled to use slot s.
Condition III: The sender of the scheduled link using slot s should cause negligible interference to the current receiver if it is using slot s on one of the node i links.
The TDMA delay scheduling algorithm can be described as:
Step: 1 For each node i (i ≠sink) of V.
Step: 2 For each required slot m in Mi, Start from slot s = 1.
Step: 3 verify for the satisfaction of the three conditions.
Step: 4 If all the three conditions are satisfied, verify the distance between the current node and all the nodes to which the slot was previously assigned.
Step: 5 If the distance between nodes > 42m, s=1 can be reused and assigned to current node.
Step: 6 Else s = s + 1 and repeat steps 3 to 5.
Step: 7 Store the id of the last slot s assigned to node i, Last slot idi = s.
Step: 8 Calculate the frame length M = max (Last slot idi), for all i [2, N].
Step: 9 Check M Δt ≤ 1. If M Δt > 1, decrease the value of Δt and repeat the algorithm for the new value of Δt until M Δt ≤ 1.

VII . SIMULATION RESULTS

We validate our analysis and performance of the proposed method using the NS2 simulator. The most important metric of our performance evaluation is end to end delay. We measure all source nodes successfully send data packets to sink. We consider the area of dimension is 1200x1500 and packet size is 512 bytes. Fig.4 shows that I-MAC with MDCL consumes the less energy than S-MAC and I-MAC.S-MAC protocol node has a fixed listen/sleep cycle, so a node must be waked up when its sleep period expires, even if the node hasn’t any activity, resulting in unnecessary energy consumption. I-MAC with MDCL Energy consumption, which is low due to use TDMA. Cross layer optimization effectively minimizes the usage of energy level.
image
image
image
In Fig 5. The end-to-end delay time, proposed method I-MAC with MDCL yields better performance than S-MAC and IMAC, due sensor nodes adjustment in higher duty cycles, when network traffic is high. S-MAC and I-MAC yield higher delay, since node starts to send/receive data until its sleep period expires.

VIII. CONCLUSION

Intelligence hybrid MAC (I-MAC) with Minimum Delay and Cross Layer Optimization, which reduces the per bit energy consumption, that has been used to schedule a TDMA frame of minimum length. The result makes the effectiveness of scheduling algorithm in the reduction of the TDMA frame length and percentage of delay reduction. Here, considering the distance between the nodes where the slots are reused, low energy consumption scheduling algorithm is intended and results are indicating that the delay is reduced significantly.

References

1. Arifuzzaman.M., and Matsumoto.M., “An Intelligent hybrid MAC with Traffic-Differentiation-Based QoS for wireless sensor network,” in. IEEE Sensors Journal, vol. 13, no 6, June. 2013.

2. Liqi Shi, and Abraham.O., Fapojuwo, “TDMA Scheduling with Optimized Energy Efficiency and Minimum Delay in Clustered Wireless Sensor Networks”, IEEE Transaction on Mobile Computing, pp. 927-939, July 2010.

3. Jayanthi K. Murthy, Suthikshn Kumar and Srinivas A. “Energy Efficient scheduling in cross layer Optimized Clustered Wireless Sensor Networks” International Journal of Computer Science and Communication vol.3, no. 1, pp. 149-153, June 2012.

4. Arifuzzaman.M., and Matsumoto., “An Efficient Medium Access Control Protocol with Parallel Transmission in Wireless Sensor Networks,” Journal of Sensor Actuator Networks, vol.1, no.2, pp. 111–122, 2012.

5. Rhee. I., Warrier. A., Aia.M., and Min.J., “Z-MAC: A hybrid MAC for wireless sensor networks,” Third International Conference Embedded Network Sensor System, 2005.

6. Li. J., and Lazarou.G.Y., “A bit-map-assisted energy efficient MAC scheme for wireless sensor networks,” in Proc. 3rd Int. Symp. Inf. Process. Sensor Netw., New York, USA, pp. 55–60, 2004.

7. Ye.W., Heidemann.J., and Estrin. D., “Medium access control with coordinated adaptive sleeping for wireless sensor networks,” in Proc. IEEE/ACM Trans. Netw., vol. 12, no. 3, pp. 493–506, Jun. 2004.

8. Van Dam.T., and Langendoen.K., “An adaptive energy-efficient MAC protocol for wireless sensor networks,” in Proc. 1st Int. Conf. Embedded Netw. Sensor Syst., pp.171–180, 2003.

9. Polstre.J., Hill. J., and Culler.D., “Versatile low power media access for wireless sensor networks,” in Proc. 2nd Int. Conf. Embedded Netw. Sensor Syst., New York, USA, pp. 95–107, 2004.

10. Cui.S., Madan.R., Goldsmith.A.J., and Lallm.S., “Cross-Layer Energy and Delay Optimization in Small-Scale Sensor Networks,” IEEE Trans. Wireless Comm., vol. 6, no. 10, pp. 3688-3699, Oct. 2007.