MAC chastised Dynamism Efficient in Wireless Device Lattice Spending Mistralapproach
In Wireless sensor Network, several researchers have provided different routing protocol for sensor networks, particularly routing protocols depending on clusters protocols. Reliability of nodes is necessary parameter in effective sensor networks. We use MAC protocol for controlling the network packets. This is because the usage of cluster based routing has several merits like minimized control messages, re-usability of bandwidth and enhanced power control. Different cluster based routing protocol is proposed by many researchers for the purpose of reducing the consumption energy in wireless sensor networks. Those techniques reduces the energy consumption but with several disadvantages like lack of QoS, inefficient transmission, etc., To overcome those problems, modified QoS enhanced base station controlled in Mistrial Approach (flooding Technique) for wireless sensor networks is proposed in this work. Here we reduce the number of retransmission and detect the overlay packets in networks using proposed approach. Simulation results show the better energy consumption, Maximum Life time & Efficient Bandwidth is achieved by flooding management when compared to the conventional techniques
Q. Shi, “Power Management in Networked Sensor Radios - A Network Energy Model,” Proc. IEEE Sensors Applications Symp. (SAS ’07), pp 1-5, 2007.
T. Elbatt, C. Saraydar, M. Ames, and T. Talty, “Potential for Intra-Vehicle Wireless Automotive Sensor Networks,” Proc. IEEE Sarnoff Symp., 2006.
A.M. Orndorff, “Transceiver Design for Ultra-Wideband Com-munications,” Master’s thesis, Electrical Eng., Virginia Polytechnic Inst. of and State Univ., May 2004.
M. Chen, S. Gonzalez, A. Vasilakos, H. Cao, and V.C.M. Leung, “Body Area Networks: A Survey,” Mobile Networks and Applica-tions, vol. 16, pp. 171-193, 2011.
“Personal Area Networking Profile,” http://www.ieee802.org/ 15/pub/TG4.html, 2012.
S.S. Intille et al., “Using a Live-In Laboratory for Ubiquitous Computing Research,” Proc. Fourth Int’l Conf. Pervasive Computing, pp. 349-365, 2006.
J. Krumm, “Ubiquitous Advertising: The Killer Application for the 21st Century,” IEEE Pervasive Computing, vol. 10, no. 1, pp. 66-73, Jan.-Mar. 2011.
J.-S. Lin and C.-Z. Liu, “A Monitoring System Based on Wireless Sensor Network and an SoC Platform in Precision Agriculture,”
Proc. IEEE 11th Int’l Conf. Comm. Technology (ICCT), pp 101-104, Nov. 2008.
T. Culter, “Deploying ZigBee in Existing Industrial Automation Networks,” CIRRONET, Inc., http://www.industrial-embedded. com/, 2012.
“IEEE 802.11 wg, Part 11: Wireless Lan Medium Access Control (MAC) and Physical Layer (PHY) Specification,” IEEE Standard, Aug. 1999.
J. Polastre, J. Hill, and D. Culler, “Versatile Low Power Media Access for Wireless Sensor Networks,” Proc. Second Int’l Conf. Embedded Networked Sensor Systems (SenSys ’04), pp. 95-107, 2004.
W. Ye, J. Heidemann, and D. Estrin, “An Energy-Efficient MAC Protocol for Wireless Sensor Networks,” Proc. IEEE INFOCOM, 2002.
Copyright (c) 2021 International Journal of Engineering and Computer Science

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.