BPS-MAC: Backoff Preamble Based MAC Protocol with Sequential Contention Resolution
Contention resolution represents a performance critical task in dense wireless networks since many Medium Access Control (MAC) protocols solely rely on the carrier-sense capabilities of the transceivers. Typical transceivers require a large amount of time to detect a busy radio channel. Especially, in the case that the transceiver has been switched off or has to be switched from receive to transmit mode. It is thus not able to sense the media during the switching phase, which leads to a large number of collisions in dense networks with correlated event-driven traffic load. In this paper the Backoff Preamble Sequential (BPS) MAC protocol is introduced which uses a sequential contention resolution to reduce the number of competing nodes step by step.
KeywordsRandom access wireless reliable networks
Unable to display preview. Download preview PDF.
- 1.Kiryushin, A., Sadkov, A., Mainwaring, A.: Real World Performance of Clear Channel Assessment in 802.15.4 Wireless Sensor Networks. In: Proc. Second International Conference on Sensor Technologies and Applications SENSORCOMM 2008, pp. 625–630 ( August 2008)Google Scholar
- 2.Vinel, A., Zhang, Y., Lott, M., Turlikov, A.: Performance Analysis of the Random Access in IEEE 802.16. In: Proc. of the 16th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, IEEE PIMRC 2005, pp. 1596–1600 (2005)Google Scholar
- 3.Silberstein, A., Braynard, R., Yang, J.: Constraint Chaining: On Energy-efficient continuous Monitoring in Sensor Networks. In: Proc. of the ACM SIGMOD 2006, pp. 157–168 (2006)Google Scholar
- 4.Meng, X., Li, L., Nandagopal, T., Lu, S.: An Effivient and Robust Mechanism for Tasks in Sensor Networks, Technical Report TR-040018, UCLA (2004)Google Scholar
- 6.Klein, A., Klaue, J., Schalk, J.: BP-MAC: A high Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks. Electronic Journal of Structural Engineering(EJSE): Special Issue of Sensor Networks for Building Monitoring: From Theory to Real Application, 35–45 (December 2009)Google Scholar
- 7.Kotz, D., Newport, C., Gray, R.S., Liu, J., Yuan, Y., Elliott, C.: Experimental Evaluation of Wireless Simulation Assumptions. In: Proc. of the 7th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems, pp. 78–82 (2004)Google Scholar
- 9.Bertocco, M., Gamba, G., Sona, A.: Experimental Optimization of CCA Thresholds in Wireles Sensor Networks in Presence of Interference. In: Proc. of IEEE EMC Europe 2007 Workshop on Electromagnetic Compatibility (June 2007)Google Scholar
- 11.El-Hoiydi, A.: Aloha with Preamble Sampling for Sporadic Traffic in Ad Hoc Wireless Sensor Networks. In: Proc. IEEE International Conference on Communications (ICC), pp. 3418–3423 (May 2002)Google Scholar
- 12.Firoze, A.M., Ju, L.Y., Kwong, L.M.: PR-MAC A Priority Reservation MAC Protocol For Wireless Sensor Networks. In: Proc. Int. Conf. Electrical Engineering ICEE 2007, pp. 1–6 (2007)Google Scholar
- 14.El-Hoiydi, A., Decotignie, J.D.: WiseMAC: An Ultra Low Power MAC Protocol for the Downlink of Infrastructure Wireless Sensor Networks. In: Proc. of Ninth International Symposium on Computers and Communications (ISCC), pp. 244–251 (June 2004)Google Scholar