Professional Documents
Culture Documents
Abstract̅ This paper proposes WTRP-S , a Medium Access [5], which has three main advantages: Collision Avoidance,
Control (MAC) protocol based on WTRP and for wireless Scalability and the uniformity of energy consumption
sensor networks. It guarantees QoS and controls the energy among nodes. But nodes must keep the wireless module in
consumption which is required in wireless sensor networks. receiving state in order to receive their token at any time,
The protocol let the node shut down the wireless or the token ring would consider nodes lost and rebuild the
communication module when no data is sent, which will not token, which increases the burden and stability of the
affect token passing. The experiment compares the network, and make it difficult to effectively guarantee
performance of WTRP-S , WTRP and IEEE802.15.4 MAC in energy consumption of nodes. This paper proposes a new
the same network, and shows that WTRP-S provides a better
wireless token ring protocolüWTRP-Sensor (WTRP-S),
QoS and is more suitable for energy-limited wireless sensor
based on WTRP, which can provide QoS and reduce
network.
energy consumption. The simu lation results show that the
Keywords-medium access control; wireless sensor network; protocol can guarantee QoS and let the node shut down the
quality of service; wireless token ring protocol wireless communication module in order to save more
energy in the network with heavy data traffic. The overall
energy consumption is reduced to achieve the requirement
I. INT RODUCT ION of wireless sensor network.
In wireless sensor network, because of problems such
as the hidden terminal and the partially connection of
II. WTRP-S PROT OCOL
network topology, the opportunity of the competition
between the nodes is not equal. When the channel load A. Algorithm Overview
becomes heavy, the throughput of some nodes will decline
sharply; at the time the node will wait for a long time in According to the clustering algorithms, the network
order to access channel, which make it difficult for the builds several token rings on which each node has its own
network to guarantee Quality of Service (QoS) [1, 2]. upstream node and subsequent node. When the node
However, for a wireless channel which is not a reliable receives the token sent by the upstream node, it starts to
transmission medium, it is not enough to guarantee QoS send data within a specified time, and then passes the
just by the queue and routing technology, and the data link token to its subsequent node. Every time the time spent by
layer must provide some QoS guarantee [3]. nodes in sending data exceeds the prescribed time, the
sending will be stopped and the token is passed to the
There main ly are two modes of the Medium Access subsequent node. And so on, all nodes on the same token
Control (MA C) protocol often used for wireless sensor ring take turn to enjoy the same wireless medium
network: Carrier Sense Multiple Access (CSMA) and according to the order of receiving the token. The wireless
Time Division Multiple Access (TDMA) [4]. TDMA can communication module would be opened only when nodes
effectively avoid the interference between nodes, on the token ring have data to send, and when nodes shut
guarantee QoS of the network, and effectively execute the down the wireless communication module token passing
sleep mode. But it requires time synchronization and high would not be interrupted and the token would be passed to
quality of the hardware, is sensitive to the network changes, the next node that has data to send and would not be rebuilt,
and only apply to the network in which the topology which is the greatest feature of the protocol.
structure is stable; MAC protocol based on CSMA is not
sensitive to the network changes, can apply to the network B. Key Issues
in which the topology structure changes constantly. But
under heavy network traffic, packets have a higher chance 1) The Structure of Token Frame
of collision, and there would be difficulty in guaranteeing This paper designs a wireless token frame format for
QoS of the network. WTRP-S according to the frame structure of WTRP-S
protocol, shown in Figure 1.
Mustafa Ergen and Duke Lee of the University of
Californ ia, Berkeley, put forward a MAC protocol on
wireless link: Wireless Token Ring Protocol (WTRP) [3]
X 0
Figure 3. T oken Ring Network
Figure 1. Frame Structure For examp le, as shown in Figure 3, A is the owner of
the token ring, B, C, D, E and F jo in token ring in turn, and
their corresponding Self-Seq is 1,2,3,4 and 5. If D leaves
In the figure, the control field (FC) of the frame is used token ring, NON of token ring will beco me 5, and SOAN
to indicate the type of packets, such as common token, the will be
one for inviting nodes to join and the one for joining
response, and so on; token ring address (RA) is the address N N-1 Ă 6 5 4 3 2 1 0
Alternate
4) Access Management
Other Ring 1 Other Ring 2 ĂĂ When a node needs to join a token ring, it will open
Token Ring
and monitor the wireless communication module. If it
Current receives a token frame of invitation, it will respond to the
Now-RA Self-Req Last Gen
Token Ring invitation. If the node is allowed to join, it will set data of
its node manager. Now-RA is RA in the token, Self-Seq is
Figure 2. Connection Manager the first bit that is not 1 in SOAN, and Last Gen is GenSeq.
The wireless communication module will be shut down if
In the figure, Now-RA is the address of the current no data is transmitted.
token ring, RA in the token; Self-Seq is the sequence
number of the node on token ring, and is allocated when 5) Recovery Mechanism
the node joins token ring, representing the sequence of the When a node needs to leave a token ring, it waits for
node in token ring; Last-Gen is GenSeq in the token the right to transmit at first. Once the right to transmit is
obtained by the node last time, and how many rounds the obtained, the bit of Self-Seq in SOAN of the token frame is
node sleeps for can be known by comparing Last-Gen to set to 0 and the token is passed, then data of its connection
the token obtained by the node this time; otherRing is other manager is set to 0. As shown in figure 2, the third bit in
token monitored by nodes. SOAN of the token frame is set to 0 when D leaves token
ring.
3) Token Passing
After that the token ring is built, the node that has no When a node on token ring fails (energy depletion or
data to transmit shuts down the wireless communication fault, etc), the owner of token ring will find that the node
module, and the node that has data to transmit waits for its doesn’t respond in the Nth round of token passing (N is
token. The upstream node, after its finishing sending the time a node fails for), and the bit in SOAN of the token
token, waits for receiving response of the node within a frame will be set to 0. So, other nodes can join the void
duration for waiting for the response window. The duration space to fill the vacancy of the time slot, and QoS will not
1173
1155
Authorized licensed use limited to: ULAKBIM UASL - Bahcesehir University. Downloaded on November 11,2023 at 13:12:31 UTC from IEEE Xplore. Restrictions apply.
be affected by the failure of the node. If the failure of the 5
x 10
4
(Bit)
3.5
Ӵ䕧᭄䞣˄bit˅
3
Throughput
C. Simulation Results and Analysis 2.5
1
Because WTRP require that nodes keep opening the
wireless communication module, it will consume huge
0.5
energy and have no comparability. The experiment
0 compare between WTRP-S and IEEE802.15.4 MAC
0 100 200 300 400 500 600 700 800 900 1000
time (ms) protocol, shown in Figure 8.
6
Figure 5. WT RP-S x 10
8
WTRP-S
The throughput of three nodes with WTRP is showed 7 802.15.4
in Figure 6.
Consumption (nJ)
6
4
Energy㛑䞣⍜㗫˄nj˅
x 10
5 5
NODE1
4.5 NODE2 4
NODE3
4
3
Throughput (Bit)
3.5
Ӵ䕧᭄䞣˄bit˅
3 2
2.5
1
2
0
1.5 0 100 200 300 400 500 600 700 800 900 1000
time(ms)
1
0.5
1174
1156
Authorized licensed use limited to: ULAKBIM UASL - Bahcesehir University. Downloaded on November 11,2023 at 13:12:31 UTC from IEEE Xplore. Restrictions apply.
simulation, WTRP-S guarantees QoS and achieves the [2] Xu,S.& Saadawi,T. “ Does the IEEE802.11MAC protocol work
sleep of nodes, thus the new protocol is more suitable for well in multihop wireless ad hoc networks? ” J. IEEE
Communications Magazine, 2001, 39(6),130-137.
the characteristic of WSN and can improve overall
[3] Lee,D.(2001). “Wireless Token Ring Protocol,” J. Graduate
performance of network. Division of the University of California, Berkeley, Spring 2001.
[4] Djukic,P.& Valaee,S. “ Delay aware link scheduling for multi-Hop
A CKNOWLEDGMENT TDMA wireless networks,” J. IEEE/ACM T rans onNetworking,
2009, 17(3),870-883.
We are grateful to the editor and the anonymous [5] Menouar,H., Filali,F.& Lenardi,M. “ A survey and qualitative
reviewers for their constructive and helpful comments and analysis of MAC protocols for vehicular ad hoc networks,” J. IEEE
suggestions. Wireless Communications, 2006, 13(5),30-35.
[6] “Wireless Medium Access Control (MAC) and Physical Layer
(PHY) Specifications for Low-Rate Wireless Personal Area
REFERENCES Networks (WPANs) ,” J. LAN/MAN Standards Committee of the
[1] Menouar,H., Filali,F.and Lenardi,M. “A survey and qualitative IEEE Computer Society, 2006,1-26.
analysis of MAC protocols for vehicular ad hoc networks,” J. IEEE
Wireless Communications, 2006, 13(5),30-35.
1175
1157
Authorized licensed use limited to: ULAKBIM UASL - Bahcesehir University. Downloaded on November 11,2023 at 13:12:31 UTC from IEEE Xplore. Restrictions apply.