Open Access Open Access  Restricted Access Subscription Access

Wireless Sensor Network MAC Protocol SMAC and TMAC


Affiliations
1 Postgraduate College Dargai Malakand, Pakistan
2 AWKUM, Pakistan
 

Wireless sensor network technology is very important for everyday life. The sensor nodes are install in a (100) square meter geographical region. The each sensor node has own task which collecting or detecting the data at critical event .The problem arise when the Two are more node communicate on the same channel they have occur collision. The task of the MAC protocol is that they manages the transmission among the nodes and detect the collision. In WSN most of the protocol is design for the Static environment. The uses of MAC protocol as such as seismic detection, fire monitoring, inventory tracking, medical monitoring, smart space etc. Thus, there is node which is power full than the reaming senor field which controls the entire sensor field. And they allocate outside the sensor which is called base station. The main problem in the WSN is lifetime of a node. Usually they operate on small quartz cell or AAA battery.

Keywords

Delivery of Data, Energy, Compression of SMAC and TMAC Protocol.
User
Notifications
Font Size

  • Jan, M.A., Nanda, P., He, X. and Liu, R.P., 2014. PASCCC: Priority-based applicationspecific congestion control clustering protocol. Computer Networks, 74, pp.92-102.
  • Jan, M.A., Nanda, P., He, X. and Liu, R.P., 2015, August. A Sybil Attack Detection Scheme for a Centralized Clustering-based Hierarchical Network. In Trustcom/BigDataSE/ISPA, 2015 IEEE (Vol. 1, pp. 318-325). IEEE.
  • Fida, N., Khan, F., Jan, M.A. and Khan, Z., 2016, September. Performance Analysis of Vehicular Adhoc Network Using Different Highway Traffic Scenarios in Cloud Computing. In International Conference on Future Intelligent Vehicular Technologies (pp. 157-166). Springer, Cham.
  • Usman, M., He, X., Lam, K.K., Xu, M., Chen, J., Bokhari, S.M.M. and Jan, M.A., 2017. Error Concealment for Cloudbased and Scalable Video Coding of HD Videos. IEEE Transactions on Cloud
  • Computing.
  • Usman, M., Jan, M.A., He, X. and Nanda, P., 2016, August. Data Sharing in Secure Multimedia Wireless Sensor Networks. In Trustcom/BigDataSE/I SPA, 2016 IEEE (pp. 590-597). IEEE.
  • Usman, M., Jan, M.A. and He, X.S., 2017. Cryptographybased Secure Data Storage and Sharing Using HEVC and Public Clouds. Information Sciences.
  • Jan, M.A., Nanda, P., He, X. and Liu, R.P., 2016. A Sybil attack detection scheme for a forest wildfire monitoring application. Future Generation Computer Systems.
  • Jan, M., Nanda, P., Usman, M. and He, X., 2017. PAWN: a payload‐based mutual authentication scheme for wireless sensor networks. Concurrency and Computation: Practice and Experience, 29(17).
  • Jan, M.A., Nanda, P., He, X. and Liu, R.P., 2013, November. Enhancing lifetime and quality of data in cluster-based hierarchical routing protocol for wireless sensor network. In High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), 2013 IEEE 10th International Conference on (pp. 1400-1407). IEEE.
  • Jan, M.A., Nanda, P. and He, X., 2013, June. Energy evaluation model for an improved centralized clustering hierarchical algorithm in WSN. In International Conference on Wired/Wireless Internet Communication (pp. 154167). Springer, Berlin, Heidelberg.
  • M. Alam, J. Ferreira, S. Mumtaz, M. A. Jan, R. Rebelo and J. A. Fonseca, "Smart Cameras Are Making Our Beaches Safer: A 5G-Envisioned Distributed Architecture for Safe, Connected Coastal Areas," in IEEE Vehicular Technology Magazine, vol.
  • , no. 4, pp. 50-59, Dec. 2017.
  • Jan, M.A., Nanda, P., He, X. and Liu, R.P., 2014. PASCCC: Priority-based application-specific congestion control clustering protocol. Computer Networks, 74, pp.92-102.
  • M. Alam, J. Ferreira, S. Mumtaz, M. A. Jan, R. Rebelo and J. A. Fonseca, "Smart Cameras Are Making Our Beaches Safer: A 5G-Envisioned Distributed Architecture for Safe, Connected Coastal Areas," in IEEE Vehicular Technology Magazine, vol.12, no. 4, pp. 50-59, Dec. 2017.
  • Jan, M.A., Nanda, P., He, X. and Liu, R.P., 2015, August. A Sybil Attack Detection Scheme for a Centralized Clustering-based Hierarchical Network. In Trustcom/BigDataSE/ISPA, 2015 IEEE (Vol. 1, pp. 318-325). IEEE.
  • M. Alam, S. Mumtaz, M. Albano, A. Radwan, and J. Rodriguez, “Throughput fairness analysis of reservation protocols of WiMedia MAC,” 2012 International Conference on Innovations in Information Technology (IIT), Mar.2012.
  • Fida, N., Khan, F., Jan, M.A. and Khan, Z., 2016, September. Performance Analysis of Vehicular Adhoc Network Using Different Highway Traffic Scenarios in Cloud Computing. In International Conference on Future Intelligent Vehicular Technologies (pp. 157-166). Springer, Cham.
  • Usman, M., He, X., Lam, K.K., Xu, M., Chen, J., Bokhari, S.M.M. and Jan, M.A., 2017. Error Concealment for Cloud-based and Scalable Video Coding of HD Videos. IEEE Transactions on Cloud Computing.
  • Usman, M., Jan, M.A., He, X. and Nanda, P., 2016, August. Data Sharing in Secure Multimedia Wireless Sensor Networks. In Trustcom/BigDataSE/I SPA, 2016 IEEE (pp. 590-597). IEEE.
  • M. Alam, J. Ferreira, and J. Fonseca, Eds., “Intelligent Transportation Systems,” Studies in Systems, Decision and Control, 2016.
  • Usman, M., Jan, M.A. and He, X.S., 2017. Cryptography-based Secure Data Storage and
  • Sharing Using HEVC and Public Clouds. Information Sciences.
  • Jan, M.A., Nanda, P., He, X. and Liu, R.P., 2016. A Sybil attack detection scheme for a forest wildfire monitoring application. Future Generation Computer Systems.
  • M. Alam, M. Albano, A. Radwan, and J. Rodriguez, “Context Parameter Prediction to Prolong Mobile Terminal Battery Life,” Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp. 476–489, 2012.
  • Jan, M., Nanda, P., Usman, M. and He, X., 2017. PAWN: a payload‐based mutual authentication scheme for wireless sensor networks. Concurrency and Computation: Practice and Experience, 29(17).
  • Usman, M., Yang, N., Jan, M.A., He, X., Xu, M. and Lam, K.M., 2017. A joint framework for QoS and QoE for video transmission over wireless multimedia sensor networks. IEEE Transactions on Mobile Computing.
  • Jan, M.A., Nanda, P., He, X. and Liu, R.P., 2013, November. Enhancing lifetime and quality of data in cluster-based hierarchical routing protocol for wireless sensor network. In High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), 2013 IEEE 10th International Conference on (pp. 1400-1407). IEEE.
  • M. Alam and J. Rodriguez, “A Dual Head Clustering Mechanism for Energy Efficient WSNs,” Mobile Lightweight Wireless Systems, pp. 380–387, 2010.
  • Jan, M.A., Nanda, P. and He, X., 2013, June. Energy evaluation model for an improved centralized clustering hierarchical algorithm in WSN. In International Conference on Wired/Wireless Internet Communication (pp. 154167). Springer, Berlin, Heidelberg.
  • Yang, N., Usman, M., He, X., Jan, M.A. and Zhang, L., 2017. Time-Frequency Filter Bank: A Simple Approach for Audio and Music Separation. IEEE Access.
  • M. Alam, M. Albano, A. Radwan, and J. Rodriguez, “Context based node discovery mechanism for energy efficiency in wireless networks,” 2012 IEEE International Conference on Communications (ICC), Jun. 2012.
  • Jan, M.A., Khan, F., Alam, M. and Usman, M., 2017. A payloadbased mutual authentication scheme for Internet of Things. Future Generation Computer Systems.
  • Khan, F., Rehman, A, U., Usman, M., Tan, Z., & Puthal, D. (2017). Performance of Cognitive Radio Sensor Networks using Hybrid Automatic Repeat reQuest: StopandWait. Mobile and Network Application. Springer. In Press
  • Khan, F., & Nakagawa, K. (2013). Comparative study of spectrum sensing techniques in cognitive radio networks. In Computer and Information Technology (WCCIT), 2013 World Congress on (pp. 18). IEEE.
  • Khan, F., Bashir, F., & Nakagawa, K. (2012). Dual head clustering scheme in wireless sensor networks. In Emerging Technologies (ICET), 2012 International Conference on (pp.1-5). IEEE.
  • Khan, F., Kamal, S. A., & Arif, F. (2013). Fairness improvement in long chain multihop wireless ad hoc networks. In 2013 International Conference on Connected Vehicles and Expo (ICCVE) (pp. 556-561). IEEE.
  • Khan, F. (2014). Secure communication and routing architecture in wireless sensor networks. In 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE) (pp. 647650). IEEE.
  • Khan, F., Jan, S. R., Tahir, M., Khan, S., & Ullah, F. (2016). Survey: Dealing Non-Functional Requirements at Architecture Level. VFAST Transactions on Software Engineering, 9(2), 7-13.
  • Jabeen, Q., Khan, F., Khan, S., & Jan, M. A. (2016). Performance Improvement in Multihop
  • Wireless Mobile Adhoc Networks. the Journal Applied, Environmental, and Biological Sciences (JAEBS), 6(4S), 82-92.
  • Khan, F. (2014, May). Fairness and throughput improvement in multihop wireless ad hoc networks. In Electrical and Computer Engineering (CCECE), 2014 IEEE 27th Canadian Conference on (pp. 1-6). IEEE.
  • Khan, F., Jan, S. R., Tahir, M., & Khan, S. (2015, October). Applications, limitations, and improvements in visible light communication systems. In2015 International Conference on Connected Vehicles and Expo (ICCVE)(pp. 259-262). IEEE.
  • Khan, F., Khan, M., Iqbal, Z., ur Rahman, I., & Alam, M. (2016, September). Secure and Safe Surveillance System Using Sensors Networks-Internet of Things. In International Conference on Future Intelligent Vehicular Technologies (pp. 167174). Springer, Cham.
  • Khan, F., ur Rahman, I., Khan, M., Iqbal, N., & Alam, M. (2016, September). CoAP-Based Request-Response Interaction Model for the Internet of Things. In International Conference on Future Intelligent Vehicular Technologies (pp. 146-156). Springer, Cham.
  • Younas, N., Asghar, Z., Qayyum, M., & Khan, F. (2016, September). Education and Socio Economic Factors Impact on Earning for Pakistan-A Bigdata Analysis. In International Conference on Future Intelligent Vehicular Technologies (pp. 215223). Springer, Cham.
  • Jabeen, Q., Khan, F., Hayat, M. N., Khan, H., Jan, S. R., & Ullah, F. (2016). A Survey: Embedded Systems Supporting By Different Operating Systems. International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN, 2395-1990.
  • Tahir, M., Khan, F., Babar, M., Arif, F., Khan, F., (2016) Framework for Better Reusability in Component Based Software Engineering. In the Journal of Applied Environmental and Biological Sciences (JAEBS), 6(4S), 77-81.
  • Khan, S., Babar, M., Khan, F., Arif, F., Tahir, M. (2016). Collaboration Methodology for Integrating Non-Functional Requirements in Architecture. In the Journal of Applied Environmental and Biological Sciences (JAEBS), 6(4S), 63-67
  • Shabana, K., Fida, N., Khan, F., Jan, S. R., & Rehman, M. U. (2016). Security issues and attacks in Wireless Sensor Networks. International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE), 5(7), pp-81.
  • Zeeshan, M., Khan, F., & Jan, S. R. (2016). Congestion Detection and Mitigation Protocols for Wireless Sensor Networks. International Journal of Scientific Research in Computer Science, Engineering and Information Technology
  • Hayat, M. N., Khan, F., Khan, H., Khan, M. Y., & Shah, M. (2016). Review of Cluster-based Energy Routing Protocols for WSNs. International Journal of Interdisciplinary Research Centre
  • Zeeshan, M., Khan, F., & Jan, S. R. (2016). Review of various Congestion Detection and
  • Routing Protocols in Wireless Sensor Networks. International Journal of Interdisciplinary Research Centre
  • Khan, H., Hayat, F., Khan, M. N., Khan, M. Y., & Shah, M. (2016). A Systematic Overview of Routing Protocols in WSNs. International Journal of Advanced Research in Computer Engineering & Technology, 5(7), pp-2088.
  • Khan. W., Javeed. D., Khan. M.T., Jan. S.R., Khan, F. (2016). Applications of Wireless Sensor Networks in Food and Agriculture Sectors. International Journal of Advanced Research in Computer Engineering & Technology, 5(6), pp-2048.
  • Khan. M.Y, Shah. M, Khan. H, Hayat. M.N, Khan. F. (2016). Amplified Forms of LEACH based Clustering Protocols for WSNs- A Survey, International Journal of Advanced Research in Computer Engineering & Technology, 5(6), pp.2053.

Abstract Views: 236

PDF Views: 3




  • Wireless Sensor Network MAC Protocol SMAC and TMAC

Abstract Views: 236  |  PDF Views: 3

Authors

Fazli Rahim
Postgraduate College Dargai Malakand, Pakistan
Wajidan Haider
AWKUM, Pakistan
Luqman Khan
AWKUM, Pakistan

Abstract


Wireless sensor network technology is very important for everyday life. The sensor nodes are install in a (100) square meter geographical region. The each sensor node has own task which collecting or detecting the data at critical event .The problem arise when the Two are more node communicate on the same channel they have occur collision. The task of the MAC protocol is that they manages the transmission among the nodes and detect the collision. In WSN most of the protocol is design for the Static environment. The uses of MAC protocol as such as seismic detection, fire monitoring, inventory tracking, medical monitoring, smart space etc. Thus, there is node which is power full than the reaming senor field which controls the entire sensor field. And they allocate outside the sensor which is called base station. The main problem in the WSN is lifetime of a node. Usually they operate on small quartz cell or AAA battery.

Keywords


Delivery of Data, Energy, Compression of SMAC and TMAC Protocol.

References