Data Traffic Modeling of ML-MAC for Wireless Sensor Networks

  • Aarti Kochhar
  • Pardeep Kaur
  • Preeti
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 624)


Wireless sensors collect the data and transmit it to the base station through a network of nodes. The flow of data through the network can also be termed as traffic flow. The nature of traffic flow in a network depends upon application for which network is designed. Modeling traffic flow for a wireless sensor network (WSN) is as important as designing the MAC or routing protocol. In fact, estimating the flow of expected traffic is a prerequisite of designing a protocol. Efficient estimation of traffic flow helps in determining resource requirements. Overestimation and underestimation of the traffic pattern and flow can lead to wastage or exhaustion of resources. Medium access control (MAC) protocol is responsible for shared access of media among nodes. Poisson distribution is used for shaping of traffic for multilayer MAC (ML-MAC). This paper proposes another traffic profiles such as Pareto and generalized Pareto distribution (GPD) for ML-MAC which are more realistic than Poisson. Further, it simulates ML-MAC for the proposed traffic models. Finally, this paper compares the results in terms of energy consumption and average delay. The results are further justified and concluded by providing supporting applications.


Wireless sensor networks (WSN) Protocols ML-MAC Traffic modeling Poisson Pareto 


  1. 1.
    Didioui A (2015) Energy-Aware Transceiver for Energy Harvesting Wireless Sensor Networks. Signal and Image Processing.Google Scholar
  2. 2.
    Abozahhad M, Farrag M, and Ali A (2015) A Comparative Study of Energy Consumption Sources for Wireless Sensor Networks. International Journal of Grid Distribution Computing. vol. 8, no. 3, pp. 65–76.Google Scholar
  3. 3.
    Demirkol I, Alagoz F, Delic H and Ersoy C (2006) Wireless Sensor Networks for Intrusion Detection : Packet Traffic Modeling. IEEE Communications Letters. vol. 10, no. 1, pp. 22–24.Google Scholar
  4. 4.
    Messier GG and Finvers IG (2007) Traffic Models for Medical Wireless Sensor Networks. IEEE Communications Letters. vol. 11, no. 1, pp. 13–15.Google Scholar
  5. 5.
    Ye W, Heidemann J, and Estrin D (2002) An energy-efficient MAC protocol for wireless sensor networks. Proceedings of IEEE Infocom 2002. pp. 1567–1576.Google Scholar
  6. 6.
    Kumar M, Kumar A, Pal D, and Mohan A (2011) An energy-efficient multi-layer MAC (ML-MAC) protocol for wireless sensor networks. International Journal of Electronics and Communications (AEÜ). vol. 65, no. 3, pp. 209–216.Google Scholar
  7. 7.
    Ngoc D, Dang M, Nguyen V, and Tra H, Hong C, Choe J (2016) An efficient multi-channel MAC protocol for wireless ad hoc networks. Ad Hoc Networks. vol. 44, pp. 46–57.Google Scholar
  8. 8.
    Khurana M, Thalore R, Raina V and Jha MK (2015) Improved time synchronization in ML-MAC for WSN using relay nodes. International Journal of Electronics and Communications (AEÜ). vol. 69, no. 11, pp. 1622–1626.Google Scholar
  9. 9.
    Q. Wang (2010) Traffic Analysis & Modeling in Wireless Sensor Networks and Their Applications on Network. Network Protocols and Algorithms. vol. 2, no. 1, pp. 74–92.Google Scholar
  10. 10.
    Romaniello G, Alphand O, Guizzetti R and Duda A (2015) Sustainable Traffic Aware Duty-Cycle Adaptation in Harvested Multi-Hop Wireless Sensor Networks. IEEE 81st Vehicular Technology Conference (VTC Spring).Google Scholar
  11. 11.
    Wang Q and Zhang T (2008) Source traffic modeling in wireless sensor networks for target tracking. In: Proceedings of the 5th ACM International Symposium on Performance Evaluation of Wireless Ad-Hoc, Sensor, and Ubiquitous Networks (PE-WASUN’08). pages 96–100.Google Scholar
  12. 12.
    Ma Y and Aylor JH (2004) System Lifetime Optimization for Heterogeneous Sensor Networks with a Hub-Spoke Topology. IEEE Transactions on Mobile Computing. vol. 3, no. 3, pp. 286–294.Google Scholar
  13. 13.
    Paxson V and Floyd S (1995) Wide-Area Traffic : The Failure of Poisson Modeling. IEEE/ACM Transactions on Networking.Google Scholar
  14. 14.
    Jong RD, Buuren SV and Spiess M (2016) Computation Multiple Imputation of Predictor Variables Using Generalized Additive Models. Communication in Statistics-Simulation and Computation 45:3, 968–985.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.University Institute of Engineering and TechnologyPanjab UniversityChandigarhIndia

Personalised recommendations