Survey of Asynchronous Medium Access Protocols for Wireless Sensor Networks

Similar documents
IRI-MAC: An Improved Receiver Initiated MAC Protocol for Wireless Sensor Network

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks

FTA-MAC: Fast Traffic Adaptive energy efficient MAC protocol for Wireless Sensor Networks

Reservation Packet Medium Access Control for Wireless Sensor Networks

Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network

COMPARISON OF CSMA BASED MAC PROTOCOLS OF WIRELESS SENSOR NETWORKS

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2

An Energy-Efficient MAC using Dynamic Phase Shift for Wireless Sensor Networks

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

Keywords T MAC protocol, reduction function, wsn, contention based mac protocols, energy efficiency; Fig 1. Listen and sleep cycle in S MAC protocol

Optimal Beacon Interval for TDMA-based MAC in Wireless Sensor Networks

Low Power and Low Latency MAC Protocol: Dynamic Control of Radio Duty Cycle

MAC LAYER. Murat Demirbas SUNY Buffalo

SA-MAC: Self-stabilizing Adaptive MAC Protocol for Wireless Sensor Networks

Exploiting Routing Redundancy using MAC layer Anycast to Improve Delay in WSN

Embedded Internet and the Internet of Things WS 12/13

sensors ISSN

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network

A Survey on Medium Access Control Protocols based on Synchronous Duty Cycle Approach in Wireless Sensor Networks

MAC in /20/06

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

AMAC: Traffic-Adaptive Sensor Network MAC Protocol through Variable Duty-Cycle Operations

Presented by: Murad Kaplan

MAC protocol for volcano monitoring using a wireless sensor network

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks

Analysis of S-MAC/T-MAC Protocols for Wireless Sensor Networks

Priority-MAC: A Priority based Medium Access Control solution with QoS for WSN

PW-MAC: An Energy-Efficient Predictive-Wakeup MAC Protocol for Wireless Sensor Networks

Ferry Route Design with MAC Protocol in Delay Tolerant Networks

Advanced Networking Technologies

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

CSC8223 Wireless Sensor Networks. Chapter 5 Medium Access Control Protocols

SENSOR-MAC CASE STUDY

Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

Improving IEEE Power Saving Mechanism

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

An Enhanced Cross-Layer Protocol for Energy Efficiency in Wireless Sensor Networks

Wireless Sensor Networks 8th Lecture

AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS

An Adaptive MAC Protocol for Efficient Group Communications in Sensor Networks

Smart Hybrid Frame Scheduling to Improve Energy Efficiency in Wireless Sensor Network

EX-SMAC: An Adaptive Low Latency Energy Efficient MAC Protocol

Analysis and Comparison of SMAC and TMAC Protocol for Energy Efficient Dynamic Topology in Sensor Network

An Energy-Efficient MAC Design for IEEE Based Wireless Sensor Networks

An Energy-Efficient MAC Protocol for Delay-Sensitive Wireless Sensor Networks

A MAC Protocol with Little Idle Listening for Wireless Sensor Networks

Collision Free and Energy Efficient MAC protocol for Wireless Networks

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

CRYPTOGRAPHY TECHNIQUES USED IN SECRET KEY MANAGEMENT SYSTEM IN WIRELESS SENSOR NETWORK

Energy Consumption and Fault Tolerance in the MAC Protocols for WSN

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS

A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN

Random Asynchronous Wakeup Protocol for Sensor Networks

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

ADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks

Reliable and Energy Efficient Protocol for Wireless Sensor Network

A Framework to Minimize Energy Consumption for Wireless Sensor Networks

COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K.

International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at:

Medium Access Control in Wireless Networks

Adaptive Home Power Management for Real Time Home Management Systems. Kwang-il Hwangand Hyo-seong Kim

Embedded Internet and the Internet of Things WS 12/13

Micro-Frame Preamble MAC for Multihop Wireless Sensor Networks

Delay Sensitive and Longevity of Wireless Sensor Network Using S-MAC Protocol

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks

Analysis of Contention Based Medium Access Control Protocols for Wireless Sensor Networks

[Kaplieswar*, 5(4): April, 2016] ISSN: (I2OR), Publication Impact Factor: 3.785

Latency-Energy Optimized MAC Protocol For Body Sensor Networks

S-MAC Protocol for Wireless Sensor Network and Study of related work

International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May ISSN

ABSTRACT. Physical Implementation of Synchronous Duty-Cycling MAC Protocols: Experiences and Evaluation. Wei-Cheng Xiao

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Performance Evaluation of Intermittent Receiver-driven Data Transmission on Wireless Sensor Networks

Impact of Divided Static Random Access Memory Considering Data Aggregation for Wireless Sensor Networks

PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED WIRELESS SENSOR NETWORKS

Computer Communication III

Review of Wireless Sensor Networks and Energy Efficient MAC Protocols

UNIT IV. Data link layer protocols. Prof.Prasad S.Halgaonkar

Know Your Neighborhood: A Strategy for Energy-efficient Communication

CMAC: An Energy Efficient MAC Layer Protocol Using Convergent Packet Forwarding for Wireless Sensor Networks

MAC Essentials for Wireless Sensor Networks

Energy and Rate based MAC Protocol for Wireless Sensor Networks

Balanced Load Sharing Protocol for Wireless Sensor Networks

Towards a classification of energy aware MAC protocols for wireless sensor networks

A Qos Based Mac Protocol for Wireless Multimedia Sensor Network

A Low-Energy Adaptive and Distributed MAC Protocol for Wireless Sensor-Actuator Networks

An adaptive energy-efficient and low-latency MAC for tree-based data gathering in sensor networks

A Configurable Medium Access Control Protocol for IEEE Networks

Energy Efficient MAC Protocols Design for Wireless Sensor Networks

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

A REVIEW ON MAC PROTOCOLS IN WIRELESS BODY AREA NETWORKS

A Review on Improving Packet Analysis in Wireless Sensor Network using Bit Rate Classifier

CS 410/510 Sensor Networks Portland State University

Research Article An Energy and Latency Aware WSN MAC Protocol for Bidirectional Traffic in Data Collection

Cross-Layer Interference Avoidance MAC Protocol for Dense Wireless Sensor Networks

New Active Caching Method to Guarantee Desired Communication Reliability in Wireless Sensor Networks

TOSSIM simulation of wireless sensor network serving as hardware platform for Hopfield neural net configured for max independent set

Exercises of lecture Wireless Sensor Networks Winter 2006/2007 Sheet 4

Transcription:

Survey of Asynchronous Medium Access Protocols for Wireless Sensor Networks 1 Dishee Agarwal, 2 Arvind Kakria, 3 Dr. Trilok C. Aseri 1,2,3 PEC University of Technology, Chandigarh, India Abstract Wireless Sensor Network (WSN) has become an emerging technique providing solution in scenarios such as seismic monitoring, industrial process monitoring, perimeter security, surveillance etc. It consists of large number of inexpensive miniature nodes capable of sensing, computation and communication. WSN MAC protocols are required for energy efficient working of the network. In this paper we discuss and compare various Asynchronous MAC protocols for WSN. Keywords Wireless Sensor Networks, MAC protocols, Asynchronous Protocols I. Introduction The recent developments in wireless communication and microelectro-mechanical system (MEMS) technology [1] have led to the development of low-cost tiny sensor nodes that have the capability of sensing, processing and communicating. A wireless sensor network is a collection of multiple such sensor nodes. Each of these nodes has components such as transceiver, microprocessor, transducer and battery. The most important issue in WSN is energy consumption. This is because nodes in a WSN are dependent on battery power and battery replacement is not feasible in most of the situations where these sensor nodes are deployed. Maximum power consumption in the sensor node is due to its radio which is directly controlled by the MAC protocol [2]. Therefore, a good MAC protocol will ensure that the radio is turned off whenever a node is not involved in communication thereby increasing network lifetime. Also, the MAC protocol controls the access to the wireless medium. An efficient MAC protocol will ensure minimum collisions and increase the throughput. WSN MAC protocols can be divided into four branches: Asynchronous, Synchronous, Frame based, and Multichannel. Both synchronous and asynchronous protocols are based on the concept of duty cycling. In duty cycling, each node alternates between active and sleep state. Fig. 1 shows the concept of duty cycling where node N is alternatively in active and sleep mode. Two nodes can communicate only when they both are in active state. Sleep state enables lower power consumption as the radio is turned off during sleep. Synchronized MAC protocols, such as S-MAC [3] and T-MAC [4] follow a strict schedule that specifies when nodes have to wake up during the cycle. Specifying the time when nodes have to be awake for communication, reduces the time and energy wasted in idle listening [5]. In asynchronous MAC protocols, each node can have its own active and sleep schedule. With no need for synchronization, asynchronous MAC protocols can achieve ultra low duty cycle but they have to find ways to effectively establish communication between nodes. Frame slotted protocols further increase the throughput by assigning time slots to nodes such that no two nodes are assigned the same slot. Finally to boost channel capacity multichannel protocols were introduced. In this paper we discuss in detail the various Asynchronous MAC protocols, where each node autonomously selects its active and sleep schedule. Fig. 1: Duty Cycling in WSN II. Asynchronous MAC Protocols A. Preamble Sampling Preamble sampling [6] was introduced to minimize the active duration of the receivers. For reception, a node samples the channel periodically. If the node senses any kind of activity on the channel, it waits to receive a data packet until a timeout occurs. If no data packet arrives within the timeout limit, the node goes back to sleep. This method requires the sender to send the data packet preceded by a short random delay, the preamble and then a start symbol. Preamble is at least as long as the channel sampling interval to ensure that the receiver can detect the preamble and remain awake to receive the following data frame. B. B-MAC (Berkeley MAC) B-MAC [7] was designed for low power wireless sensor networks. B-MAC uses the concept of Clear Channel Assessment (CCA) and back offs for deciding access to channel. It also provides reliability by the use of acknowledgements and low power communication by low power listening. It improves the quality of CCA by introducing an outlier detection method. With more accurate Clear Channel Assessment (CCA), B-MAC names its preamble sampling as Low Power Listening (LPL). A MAC protocol should be capable of determining if the channel is clear or not. This is known as Clear Channel Assessment (CCA). The noise on the channel may change according to the surrounding environment; B-MAC uses automatic software to determine the noise floor. With effective CCA, B-MAC has fewer false positives leading to lower duty cycle. It uses preamble sampling for exchange of data. Figure 2 shows how communication takes place in this protocol. The preamble does not contain the destination address so both the target and the non target nodes have to remain wake up until the actual data packet arrives. Data is received by the target node and all other nodes ignore this packet and go to sleep. Unnecessary waiting and overhearing leads to extra overhead for non target nodes. Fig. 2: Communication in BMAC Protocol 326 International Journal of Computer Science And Technology

ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) C. B-MAC+ (Berkeley MAC+) B-MAC+ [8] is an extension of B-MAC protocol. In B-MAC+, the wake up preamble is divided into small blocks containing some information. A new field is added to the wake up preamble that contains information regarding the number of blocks of preamble remaining to be transmitted. This information prevents the receiver from unnecessary waiting while the preamble is being transmitted, so that they can wake up when actual data transmission takes place. Also the destination address is added to each of the preamble blocks which reduce overhearing as a non target node can go to sleep just as it reads the preamble. Fig. 3 shows how overhearing problem for non target nodes is solved in BMAC+. Also the active duration for target node is reduced. Even though the receiver turns off its radio on receiving the preamble, the sender continue to send the remaining part of preamble which leads to waste of energy and also introduces excess latency. Fig. 3: BMAC+ Protocol Communication Scenario D. X-MAC X-MAC [5] protocol is a further extension to B-MAC+ protocol. It introduces a shortened preamble approach where a small gap is introduced between the blocks of preamble while they are being transmitted, during which the transmitting node listens to the medium. Receiver can use these gaps to send an early acknowledgement to the sender indicating it ready to receive the data. This reduces the length of the preamble and also latency per hop to great extent as the sender can directly send the data without having to send rest of the preamble. Also the energy consumption at both sender and receiver is reduced. This is illustrated in fig. 4 where it can be seen clearly that the waiting duration has been minimized to a great extent. Although strobed preamble approach reduces the preamble length, the preamble transmission still occupies the channel until the target receiver wakes up [1]. Fig. 4: Data Exchange Using Strobed Preamble in XMAC Protocol IJCST Vo l. 6, Is s u e 2, Ap r i l - Ju n e 2015 E. X-MAC/Collision Avoidance X-MAC/CA protocol combines X-MAC protocol with CA (Collision Avoidance) algorithm with an aim to maximally randomize transmissions in overcrowded networks [9]. Although X-MAC improved the performance of previous protocols by using strobed preamble approach, still it faced issues in case of overcrowded networks. When two or more nodes started preamble transmission at the same time, they would never know of collision until the whole cycle completes. Randomized transmission used in X-MAC/CA solved this problem by waiting for small random time duration before sending the data packet on sensing the channel free. Whenever any node has data to send and it senses channel to be busy, it checks the destination address of the polled preamble. If the address is the same as which the node wants to deliver data at, it waits for that transmission to complete and then sends the data frame after waiting for some random amount of time. In case of destination address being different the node goes back to sleep until the current transmission completes. F. Wise-MAC Wise-MAC [10] is based on preamble sampling. In this technique, the access points learn the sampling schedule of all the nodes in the network. Each access point has under its control, a number of sensor nodes and also it is not power constrained. To know the channel sampling schedule of the nodes, the access point sends a long preamble on the network. On listening to this preamble, the nodes reply with an acknowledgement (ACK) along with its channel sampling schedule. This sampling schedule is used for all further communications; where the access- point sends the wakeup preamble just at the right time, when the target node is about to wake up thereby reducing preamble length. This communication between access points and sensor nodes is illustrated in Figure 5. This approach solves the overhearing problem and also increases the channel capacity. Fig. 5: Wise MAC G. RI-MAC As the name suggests, in RI-MAC [11] (Receiver Initiated MAC) Protocol communication is initiated by the receiving node. Each node in the network wakes up periodically to check if there is any incoming data packet for it. To do so, that node broadcasts a Beacon Frame (B) on the channel indicating that the node is awake and ready to receive data as shown in Figure 6. Any node which has data to send remains active until it receives beacon from the receiver. On receiving the Beacon, the node immediately sends the data which is acknowledged by another beacon. This beacon acts as acknowledgement for previous data exchange as well as an indication that the node is now free to receive more data. International Journal of Computer Science And Technology 327

Fig. 6: Use of Beacon Frame (B) in RI MAC H. RC-MAC RC-MAC [12] Protocol is based on the concept that most of the real life data collection applications form a collection tree. In such a tree structure, there is sink node at the root and all other nodes have to send data to the next node in hierarchy on the path towards sink. Fig 7 shows the tree structure in RC-MAC. The receiver (A1) schedules the transfer of data packets by piggybacking the id of next node to send with the acknowledgement of the current data packet received. As all the child nodes can overhear the ACK, they will know who is to send data next. Thus only one child node transfers packet at one time reducing the chances of collisions. Fig. 7: Data Collection Tree and Message Exchange in RC MAC I. STEM STEM [13] protocol involves the use of two different radios; one for data transmission and the other one for wake up channel, both operating at different frequencies f1 and f2 as shown in fig 8. There are two preamble variants of STEM protocol, STEM B and STEM T. STEM-B (STEM Beacon) uses beacon packets as preambles. The node which has data to send, sends a series of beacon packets on one frequency. MAC address of both sender and receiver is included in this beacon. On listening to this beacon, the target node turns on its radio intended for data transmission and sends an acknowledgement via another. The data exchange can 328 International Journal of Computer Science And Technology take place then. In case of collision between beacon packets, all the nodes wake up on hearing the collision. If for some time, no activity is detected on data channel, the return to their monitoring state and only intended node remain awake to receive data. STEM-T (STEM-Tone) uses a wake up ton instead of beacon. The sending node sends a wake up tone on the wakeup channel for a long enough duration such that the intended receiver wakes up, eliminating the need of acknowledgement. Then the data transmission occurs via data channel. STEM-B is highly efficient in case no Beacon collision occurs while communication as preamble length is very less. Whereas, in cases when data transmission is less frequent, STEM-T outperforms STEM-B as Wake up tone detection is much faster than sampling process in STEM-B. Fig. 8: Use of Two Frequencies in STEM Protocol J. CSMA-MPS CSMA-MPS [14] was developed to increase the efficiency of wakeup mechanism of STEM and WiseMAC. In this protocol, all the nodes sample the channel for a small amount of time to check if the channel is free. For communicating with its neighboring nodes, a node needs to know their wake up schedules. If the schedule is known, the node backs off and wakes up just before the receiving node s wake up time. It then sends the wakeup message and waits for a certain amount of time to see if acknowledgement comes so that actual data transmission may occur. This way this protocol combines pre-learning of schedules of nodes as in WiseMAC and alternate transmissions as in STEM. K. C-MAC C-MAC [15] protocol replaces Preamble and its associated acknowledgements with RTS/CTS mechanism. The sending node selects a few nodes on the path to destination as potential forwarders based on some routing metric. Then it sends the RTS frame to all such nodes. Nodes can detect RTS by waking up periodically and sampling the channel for any activity. All the receiving nodes prioritize their CTS transmission on the basis of routing metric to the destination and the highest priority node sends the CTS. This process continues until a route is established with an acceptable routing metric. L. A-MAC A-MAC [16] requires a node to send a probe frame (P) whenever it is ready to receive data. The sender on listening to the frame from its intended receiver responds with an auto-acknowledgement. Then after waiting for a random amount of time, it sends the data frame. A-MAC introduces the concept of auto-acknowledgement to remove the problem of false positive and false negative. III. Comparison Table The following table compares the asynchronous protocols on the basis of parameters like initiator node, communication technique used and the knowledge of scheduling information.

ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) IJCST Vo l. 6, Is s u e 2, Ap r i l - Ju n e 2015 Table 1: Protocol Initiating node Mechanism Used for Scheduling Type of preamble communication Information B-MAC Sender Preamble Sampling Continuous single Preamble B-MAC+ Sender Preamble Sampling Continuous blocks of preamble X-MAC Sender Preamble Sampling Strobed Preamble WiseMAC Sender Preamble Sampling Single shortened Preamble Known RI-MAC Receiver Beacon frame No Preamble used STEM-B Sender Beacon frame No Preamble used STEM-T Sender Preamble Sampling Wake up tone used as preamble RC-MAC Receiver Acknowledgements with Piggybacking No Preamble used CSMA-MPS Sender Preamble Sampling Strobed Preamble Known C-MAC Sender RTS/CTS Frames No Preamble used X-MAC/CA Sender Preamble Sampling Strobed Preamble A-MAC Receiver Probe Frame No Preamble used II. Conclusion This paper surveyed evolution in asynchronous MAC protocols. Most of the sender initiated protocols make use of preamble sampling for establishing communication between nodes. B-MAC used single continuous block of preamble which led to high energy wastage due to overhearing. This problem was solved in B-MAC+ by breaking the preamble into blocks and including destination address in it. Still energy consumption for sender was high as it had to keep transmitting preamble even though receiver had heard it. Strobed preamble approach used in X-MAC, X-MAC/ CA and CSMA-MPS solved this problem. WiseMAC and CSMA- MPS reduce the preamble length by learning the scheduling information and sending preamble just in time when receiver is about to wake up. C-MAC uses RTS/CTS mechanism to find most appropriate path between sender and receiver. RI-MAC, RC-MAC and A-MAC are the three receiver initiated protocols. In these protocols, communication is initiated by the receiver by sending a beacon/probe frame and then receiving data from the intended sender. References [1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, "Wireless sensor networks: A survey, Elsevier, Vol. 38, Issue 4, pp. 393-422, March 2002. [2] Pei Huang, Li Xiano, Soltani S, M.W Mutka, Ning Xi, The Evolution of MAC Protocols in Wireless Sensor Networks : A Survey, IEEE Communication Survey and Tutorials, Vol. 15, Issue. 1, pp. 101-120, 2013. [3] W. Ye, J. Heidemann, D. Estrin, An energy-efficient MAC protocol for wireless sensor networks, In Proc. INFOCOM, 2002, pp. 1567 1576. [4] T. van Dam, K. Langendoen, An adaptive energy-efficient MAC protocol for wireless sensor networks, In Proc. SenSys, 2003, pp. 171 180. [5] M. Buettner, G. V. Yee, E. Anderson, R. Han, X-MAC: a short preamble MAC protocol for duty-cycled wireless sensor networks, In Proc. SenSys, 2006, pp. 307 320. [6] S. Lim, Y. Ji, J. Cho, S. An, An ultra low power medium access control protocol with the divided preamble sampling, In Ubiquitous Computing Systems, ser. Lecture Notes in Computer Science, H. Youn, M. Kim, H. Morikawa, Eds. Springer Berlin / Heidelberg, 2006, Vol. 4239, pp. 210 224. [7] J. Polastre, J. Hill, D. Culler, Versatile low power media access for wireless sensor networks, In Proc. SenSys, 2004. [8] M. Awenuti, P. Corsini, P. Masci, A. Vecchio, Increasing the efficiency of preamble sampling protocols for wireless sensor networks, In Proc. First Mobile Computing and Wireless Communication International Conference (MCWC), September 2006, pp. 117 122. [9] X-MAC Protocol with Collision Avoidance Algorithm Ayaz Ullah, Jong-Suk Ahn, and Gayoung Kim, 2013, IEEE. [10] A. El-Hoiydi, J.-D. Decotignie, WiseMAC: An ultra low power MAC protocol for multi-hop wireless sensor networks, in Proc. 9th International Symposium on Computers and Communications (ISCC), Vol. 1, June-July 2004, pp. 244 251. [11] Y. Sun, O. Gurewitz, D. B. Johnson, RI-MAC: A receiverinitiated asynchronous duty cycle MAC protocol for dynamic traffic loads in wireless sensor networks, In Proc. SenSys, 2008, pp. 1 14. [12] P. Huang, C. Wang, L. Xiao, H. Chen, RC-MAC: A receivercentric medium access control protocol for wireless sensor networks, In Proc. IWQoS, 2010, pp. 1 9. [13] C. Schurgers, V. Tsiatsis, S. Ganeriwal, M. Srivastava, Optimizing sensor networks in the energy-latency-density design space, IEEE Trans. Mobile Computing, Vol. 1, No. 1, pp. 70 80, January-March 2002. [14] S. Mahlknecht, M. Bock, CSMA-MPS: A minimum preamble sampling MAC protocol for low power wireless sensor networks, In Proc. IEEE International Workshop on Factory Communication Systems, September 2004, pp. 73 80. [15] S. Liu, K.-W. Fan, P. Sinha, CMAC: An energy efficient MAC layer protocol using convergent packet forwarding for wireless sensor networks, In Proc. 4th IEEE Communications Society Conference on Sensor, Mesh and Ad-Hoc Communications and Networks (SECON), June 2007, pp. 11 20. International Journal of Computer Science And Technology 329

[16] P. Dutta, S. Dawson-Haggerty, Y. Chen, C.-J. M. Liang, A. Terzis, Design and evaluation of a versatile and efficient receiver-initiated link layer for low-power wireless, In Proc. SenSys, 2010, pp. 1 14. Dishee Agarwal received her B.Tech. degree in Computer Science and Engineering from Gautam Buddh Technical University, U.P. India. She is currently pursuing M.E (Computer Science and Engineering) from PEC University of Technology, Chandigarh, India. Her areas of interest include computer networks, wireless sensor networks and distributed systems. Arvind Kakria is a research scholar in PEC University of Technology, Chandigarh, India and is doing full time PhD in wireless sensor networks. He worked as a lecturer in PEC University of Technology from 2008-2013 in Computer Science department. His research interests include wireless communication and wireless sensor networks. He has published several papers in international and national journals/conferences. Dr. Trilok C. Aseri received his Ph.D. degree in Engg & Technology from PEC Chandigarh (India), M.Tech. & B.Tech. (Computer Engineering) Degrees from NIT Kurukshetra (India). He is working as Associate Professor in Computer Science & Engineering Department in PEC University of Technology, Chandigarh. His research interest includes computer networks, wireless and mobile networks, wireless sensor networks, vehicular adhoc networks etc. He has published 76 research papers in Journals and Conferences. He has guided one Ph.D. and more than 30 ME thesis and BE projects. 330 International Journal of Computer Science And Technology