Você está na página 1de 4

IJMTES | International Journal of Modern Trends in Engineering and Science ISSN: 2348-3121

PERFORMANCE ANALYSIS OF COGNITIVE MAC


PROTOCOL FOR WSNs
A.Anandhan1, P.Bindhu2, T.Hari Krishnan3, V.Hari Priya4
1
(anandhan.angusamy@gmail.com)
2
(bindhuposan@gmail.com)
3
(krishhari08@gmail.com)
4
(vijayharipriya1@gmail.com)
______________________________________________________________________________________________________

AbstractIn battery-constrained wireless sensor networks (WSNs), Energy efficiency has been the ramble force behind the design of
communication protocol. In case of low-powered WSNs, the performance and the energy efficiency of the protocol stacks degenerate when
they are subjected to interference from high-power wireless systems such as WLANs. In IEEE 802.15.4-compliant WSNs, a novel Cognitive
Medium access control scheme (MAC) has been proposed to minimize the energy cost for multi-hop communications. Based on the
experienced interference from IEEE 802.11 WLANs, a full range of energy efficiency packet length and single hop transmission distances
must be derived. By comparing with previous access control scheme, a detailed analytic model has been derived to evaluate COG-MAC
performance .Under WLAN interference, 66% of packet transmission and energy cost can be decreased by the numerical and simulation
results. COG-MAC is lightweight and it can cope up with errors against WLAN model estimation. An effective, implementable solution to
reduce the WSN performance impairment is when coexisting with WLANs.

Keywords WSN, Energy efciency, Cognitive networks, Coexistence, IEEE 802.11, IEEE 802.15.4.
_________________________________________________________________________________________________________________

1. INTRODUCTION 1) We give a characterization of the WLAN channel usage


patterns as seen by the sensor nodes, taking into
The increasing number of different wireless technologies
account the nodes limited channel estimation
sharing the open spectrum bands, such as the 2.4GHz ISM
capabilities, and propose techniques for distributed
band, demands for a rethinking of the protocols regulating
WLAN usage pattern estimation.
the spectrum access. As the medium access control (MAC)
2) Based on these resulting WLAN channel usage
schemes are carefully designed for one given technology,
characterization we design COG-MAC, that optimizes
they are not anymore able to achieve the objective of
the packet length and the transmission distance, and
efficient and "fair" sharing of the wireless resources when
performs WLAN activity-aware channel access to
operating under interference from heterogeneous
ensure that WSN nodes transmit in the long WLAN
technologies. We consider the specic case of the
white space periods.
coexistence of IEEE 802.11 wireless local area networks
3) We provide an accurate analytical model that describes
(WLANs) and IEEE 802.15.4-compliant wireless sensor
the probability of COG-MAC packet transmission
networks (WSNs). Both technologies apply carrier sensing-
success. We use the model to optimize the WSN packet
based medium access control with collision avoidance.
size and the single-hop WSN transmission distance to
In addition, WSNs try to locate the narrow frequency band
minimize the normalized energy cost metric, which we
with less harmful interference for their operations.
dene as the energy required to successfully transmit
Unfortunately, all these techniques do not avoid high
and receive a unit of information over a unit of
interference and frequent packet losses in the WSN, which
distance.
are mainly caused by the signicantly different transmission
4) We show that all the basic components of COG-MAC
bandwidths and powers of the two technologies competing
are essential for achieving the objective of energy
for the same resource.
efcient communication, and COG-MAC, compared to
In all this, the WLAN transmissions remain basically
previous access schemes, reduces the normalized
unaffected by the low WSN interference, while WSN
energy cost up to 66%, and can signicantly decrease
packets are lost. Fortunately, measurement results show that
the end-to-end energy cost in a multi-hop WSN without
the WLAN trafc is rather bursty with long white spaces,
increased delay.
when the channel is idle because all WLAN users are
inactive. Therefore, in order to maximize its performance, 2. LITERATURE SURVEY
the WSN should be able to transmit in these long
I.Glaropoulos proposed a new Cognitive MAC protocol for
interference-free times, thus, being Cognitive of the radio
efficient data transmission. Minimization of energy cost. In
environment as imposed by the WLAN activity. We propose
wireless sensor network, whenever interference occurs due to
and evaluate a new cognitive MAC (COG-MAC) protocol
WLAN, an efficient data transmission is done. The
for wireless sensor networks, which extends the carrier
limitations behind this paper, during transmission there may
sense-based MAC and aims at minimizing the energy loss
be some packet loss.[1]
due to unsuccessful transmissions over the interfered
D.Spenza proposed that the promising approach to prolong
channel. Our paper provides the following contributions.
the lifetime of wireless sensor networks. The main receiver is

Volume: 03 Issue: 08 2016 www.ijmtes.com 60


IJMTES | International Journal of Modern Trends in Engineering and Science ISSN: 2348-3121

activated only when the data transmission occurs. The of cognitive radio has gain power in wireless sensor network
limitations behind this paper, it can lose messages, which and hence it provides an efficient communication. To satisfy
requires special software to be able to recover. Security the requirements of both WSNs and CRs also to attain the
problem. [2] benefits of cognition in sensor network, a proper plan should
M. Rossi proposed that the IRIS enables tradeoff between be made. To enable the cognitive radio sensor network, a
key end-to-end performance metrics. It provides mechanism unusual energy efficient and spectrum aware multi- channel
for supporting efficient network behavior such as in network medium access control (MAC) is used.
data processing. IRIS is self adaptive, highly localized and [4] A Multi-channel cognitive MAC protocol with efficient
imposes limited control overhead. The limitations behind channel reservation and collision avoidance method
this paper, It offers minimal security against unwanted In a wireless technology, the Cognitive radio networks have
incoming connections. Low signal strength monitoring. [3] raised due to their flawless solution to spectrum scarcity. In
V.Fodor proposed that, it allows the competing networking distributed Cognitive radio network, the spectrum is
technologies. More efficient use of the shared spectrum. The efficiently managed when the channel degrade dramatically
limitations behind this paper, due to interference. The MAC protocol should allow
2.4 GHz spectrum is often crowded with other devices. accessing the idle spectrum holes without affecting the
Access points can be used to steal data. [4] necessary elite. The necessary detection is required before
L.Pescosolido proposed that, it optimizes the size of the and after starting the band to avoid collision. To overcome
transmitted data unit. The normalized transmission energy is this problem, a distributed Cognitive MAC protocol is used
minimized. The limitations behind this paper, Existing to increase the network performance. The protocol operates
Wireless networks are unable to fulfill the insatiable demand over a separate control channel and multiple data channels.
of radio spectrum by emerging wireless services. Non- Thus the information is easily exchanged through the control
cooperative spectrum sensing techniques. [5] channel. The protocol improves the network efficiency due
A.Bachir proposed a large amount of miniaturized battery to good transmission.
powered wireless networked sensor s. It is driven by the
statistical properties of the generated traffic. The limitations 4. PROPOSED METHOD
behind this paper, Once a battery is depleted it is often very Our paper proposes a new Cognitive approach for the
difficult. Individual monitoring applications has a wide optimization of link layer parameters in wireless networks.
requirements. [6] The proposed approach takes into consideration a large
number of link layer parameters and it is able to calculate
3. EXISTING METHOD optimal setup values without explicit knowledge of the
[1] A Cognitive MAC for VANET based on the WAVE causes of network performance degradation.
systems A WSN Cognitive Medium Access Control has been
IEEE 802.11 give the system availability to share a single proposed to employ WLAN usage prediction and channel
exist channel to multi users but this is not for wireless, it is sensing in order to minimize the energy cost for unicast
only for wired network. Due to this same channel cannot be WSN communication under WLAN interference. It aims at
used at same time. In order to increase the efficiency of minimizing the transmission energy spent by sensors for
protocol, a good protocol must be designed to access on a transmitting and receiving data packets. The idle listening
single channel. In order to improve the performance of energy costs has not been considered by the COG-MAC
wireless, mesh network is used. The mesh network is used to design because it is combined with some duty-cycling which
sense all the channels and avoid the user from using busy is responsible for minimizing the energy spent due to idle
channels. Hence, the interference will be low. Any user can listening.
communicate with other user directly. Since there is low In our proposed method is mainly considered that Random
interference there will be a good efficiency during linear network coding concept.
transmission.
[2] Cognitive vision communication based on LED array and
image sensor
The concept used in vision communication is based on LED
array and image sensor. In this system the LED array is used
as transmitter and image sensor as a receiver. The transmitter
side uses digital image processing where else receiver side
uses CCD and CMOS. By identifying the techniques used in
vision system, the cognitive communication scheme is
possible. LED is used to increase the data and image sensor Fig.1.Time diagram of COG-MAC operations
is used to eliminate the noises. Through LED array and Fig. 1 shows the COG-MAC operation within a duty-cycle
image sensor a proper data transmission is possible. for potential transmitters (TR) and receivers (RR). The duty-
[3] Cognitive Radio Oriented Wireless Networks and cycle of the TR nodes starts with a guard time (denoted as
Communications SYNC in the Figure) equal to tmax SYNC, ensuring that
Due to the inadequate cost by the increasing of wireless channel sensing and transmission do not overlap due to the
devices and services, a dynamic spectrum access in the form lack of perfect synchronization.

Volume: 03 Issue: 08 2016 www.ijmtes.com 61


IJMTES | International Journal of Modern Trends in Engineering and Science ISSN: 2348-3121

The new COG-MAC may not be able to use optimal packet


size and transmission distance due to imperfect WLAN.
COG-MAC has been evaluated in a multi-hop WSN due to
its effect in the protocol performance. For co-existing
networks NS simulation is used for the WLAN nodes. For
the WSN COG-MAC module model estimation, sensing,
access control and packet reception modes has been
implemented.
5. SIMULATION METHOD
Error rate
We are using NS2 Simulation tool. NS2 stands for network 0.2 0.4 0.6 0.8 1
Average energy
simulator version 2. It is an open-source event-driven consumed(Joules)

simulator design specifically for research in computer COGMAC 295 304 311 321 330

communication networks. It is used for obtaining the NCCOGMAC 254 260 266 272 280

transmission energy cost simulation. It is widely used tool to


simulate the behavior of wired and wireless networks.
There are two types of languages used in this tool: C++ and Fig.3.Average energy consumption vs error rate.
Tool command language. C++ defines the internal
mechanism of the simulation objects. Tool command
language sets up simulation by assembling and configuring
the objects as well as scheduling discrete events.
NS2 uses tool command language to create and configure a
network, and uses C++ to run simulation. All C++ codes
need to be compiled and linked to create an executable file.
The output can be obtained by integrating C++ and tool
command language.
There are three forms of output. They are,
Trace file (Text file), Animation(Visualization), Graph. Average
load
Trace file, in which node works for every second and records
5 10 15 20
it. Animation output shows the transmission between the End to end delay(sec)
nodes. Graph output is used to compare the efficiency in data COGMAC 2 8.6 15.6 20.4

transmission. Here, AWK programming language is used. NCCOGMAC 1.1 7.2 13.7 18.5

Because it is the simplest language which is used for


retrieving the delay. NS-2 Simulation tool easily adapts
various networks like WSN, WLAN and Cognitive MAC. Fig.4.End to end delay vs Average load.

6. RESULTS
In the depicted graphical representation, the outputs of COG-
MAC and NCCOG-MAC has been compared. It can be
clearly understood that NCCOG-MAC provides better
energy consumption which is considerably precise than that
of COG-MAC.
GRAPH OUTPUTS
Average
load

5 10 15 20
Average energy
consumed(Joules)

COGMAC 9.7 16 20.3 25.5

NCCOGMAC 8.6 14 18.3 24.5

Error rate
Fig.5.Average energy consumption vs Average load.
0.2 0.4 0.6 0.8 1

End to end delay(sec)

COGMAC 2.24 2.39 2.54 2.7 2.84

NCCOGMAC 1.19 1.2 1.21 1.23 1.25

Fig.2.End to end delay vs error rate.

Volume: 03 Issue: 08 2016 www.ijmtes.com 62


IJMTES | International Journal of Modern Trends in Engineering and Science ISSN: 2348-3121

Comparison of parameters: [5] I. Glaropoulos, V. Fodor, L. Pescosolido, and C.


Petrioli, Cognitive WSN transmission control for
COG-MAC NCCOG-MAC
energy efciency under WLAN coexistence, in
Send packets 959 971
Proceedings of the 6th International Conference on
Received packets 720 775
Cognitive Radio Oriented Wireless Networks and
Routing packets 2235 1652
Communications, Jun. 2011.
Packet delivery 75.08 79.81
ratio [6] A. Bachir, M. Dohler, T. Watteyne, and K. Leung,
Routing overhead 2.33 1.7 MAC essentials for Wireless Sensor Networks,
Average hop counts 1.17 1.44 IEEE Communications Surveys Tutorials, vol. 12, no.
Average delay(m 0.13 0.04 2, pp. 222248, 2010.
sec)
Dropped data 258 220
packets
Packet loss 26.90 22.66
Total energy 3.57245 1.82594
consumed

Fig.6.Comparision of parameters table.

7. CONCLUSION&FUTURE WORK
In our project we proposed a new Cognitive MAC protocol
for wireless sensor networks. This addresses the energy
efficiency problem of both the access and backbone areas of
WSNs, providing an effective solution for data transmission.
We implemented our proposed Cognitive MAC protocol that
reduced the energy consumption in data transmission, a
complete wireless sensor networks.
We analyzed it in several realistic networks scenarios,
comparing its performance with that of existing protocol.
Furthermore, we simulated the behavior of Cognitive MAC
using (NS-2) Network Simulator-2.
Numerical results show that Cognitive MAC offers secure
network services to both wireless sensor network and
wireless local area network with negligible impact on
network performance, since it achieves reduced energy
consumption and increases the life time of a node.
In future we planned to implement this work for AP hop
problems between the nodes and show the performance for
the network.

REFERENCES

[1] I. Glaropoulos, Energy efcient cognitive MAC for


sensor networks under WLAN co-existence-Revised
complementary technical report, tech. rep., KTH,
Royal Institute of Technology, January 2015.
[2] C. Petrioli, D. Spenza, P. Tommasino, and A. Triletti,
A novel wake-up receiver with addressing capability
for wireless sensor nodes, in Distributed Computing
in Sensor Systems (DCOSS), 2014 IEEE International
Conference on, pp. 1825, May 2014.
[3] A. Camillo, M. Nati, C. Petrioli, M. Rossi, and M.
Zorzi, Iris: Integrated data gathering and interest
dissemination system for wireless sensor networks,
Ad Hoc Networks, vol. 11, no. 2, pp. 654671, 2013.
[4] I. Glaropoulos and V. Fodor, Discrete stochastic
optimization based parameter estimation for modeling
partially observed WLAN spectrum activity, Info
communications Journal, vol. 4, no. 2, pp. 1117,
2012.

Volume: 03 Issue: 08 2016 www.ijmtes.com 63

Você também pode gostar