You are on page 1of 9

IPASJ International Journal of Computer Science (IIJCS)

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

A Publisher for Research Motivation ........

Volume 2, Issue 12, December 2014

Performance Analysis of Energy Efficient


Protocols for Mobile Ad-Hoc Networks
Umesh Kumar Singh1, Lokesh Laddhani2 and Rakhi Sunhare*3
1, 2, 3

Institute of Computer Science, Vikram University Ujjain (M.P.) INDIA

ABSTRACT
Mobile Ad Hoc Networking is an idea in wireless communications, which means that users willing to communicate form a
temporary network, without any kind of centralized administration. Each node participating in the network acts both as host
and a router and must therefore is willing to forward packets to other nodes. In MANET, all nodes are energy constrained. In
this purpose an energy efficient routing protocol is required. In this paper we study the different energy efficient management
schemes for MANET, Compare the performances of these schemes and finally we conclude a batter scheme for future
research.

Keywords:- Mobile Ad Hoc Network, Energy Efficiency, Routing Protocols, Energy Efficiency.

1. INTRODUCTION
Mobile Ad Hoc Networks (MANETs) is a collection of multi-hop wireless mobile nodes that communicate with each
other without centralized control or established infrastructure. The energy efficient routing may be the most important
design criteria for MANETs, since mobile nodes will be powered by batteries with limited capacity and the nodes in
MANET are mobile is fully best on battery. For example, node S can communicate with node D by using the shortest
path S-A-B-D as shown in Figure 1 (the dashed lines show the direct links between the nodes). If node A moves out of
node S range, he has to find an alternative route to node D (S-C-E-B-D).

Figure.1: Communication between Nodes on MANETs [1].


Energy usage is an important issue in the design of s which MANETs typically depends on portable energy sources like
batteries for power MANETs has discovered a wide range of applications in the recent. Energy efficient routing
protocol for MANETs is one of the most challenging tasks for researcher. Power failure of a mobile node not only
affects the node itself but also its ability to forward packets on behalf of others and thus the overall network lifetime. A
mobile node consumes its battery energy not only when it actively sends or receives packets, but also when it stays idle
listening to the wireless medium for any possible communication requests from other nodes. Thus, energy-efficient
routing protocols minimize either the active communication energy required to transmit and receive data packets or the
energy during inactive periods. The major issues of such studies are protocol design, particularly in this regard energy
efficiency. Many researchers have developed different routing protocols at network layer but they have considered
transmission power, residual battery capacity, and self organization while routing data packets to the destination [2-3].
The network lifetime depends on management of the energy resources. The desire to use less power in routing process
has more benefits beyond conserving battery power of the node [4]. The paper is organized as follows. In section I the
Introduction and general discussion on energy efficiency. Section II presents related works. Section III we define the
main Source of Energy Wasted. Routing Protocol functionalities is discussed in section IV. Section V defines the
Attributes of Energy Efficient Routing Protocol. Section VI classifies the energy efficient routing schemes. Finally
conclusion and future work is discussed in section VII.

Volume 2 Issue 12 December 2014

Page 44

IPASJ International Journal of Computer Science (IIJCS)


A Publisher for Research Motivation ........

Volume 2, Issue 12, December 2014

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

2.RELATED WORKS
The recent years have seen a tremendous increase in the number of Wi-Fi enabled mobile devices sold to consumers.
Devices such as high-end cell phones, PDAs, portable gaming devices, tablet PCs etc. all have wireless networking
capabilities. By participating in mobile ad-hoc networks (MANETs) these devices may extend their capabilities, e.g., to
reach the Internet when no Wi-Fi base stations are within range, or to communicate with each other over multiple hops
when no other networking infrastructure is available. One problem with continuous participation in a MANET is
energy consumption. In the recent year several authors proposed a many energy efficient routing protocols for mobile
ad hoc network. The energy efficient routing may be the most important design criteria for MANETs. The Power
Aware Ad hoc routing protocol enables dynamic, multi hop routing between participating nodes wishing to establish
and maintain an ad hoc network. The issues of energy saving over wireless networks have received much attention
during the last years. However, not many authors addressed both problems simultaneously. In [5] Author, proposed a
model based on Quality of Service (QOS) routing scheme for IEEE 802.11 ad hoc networks. It provides stochastic end
to end delay guarantees, instead of average delay guarantees, in the delay sensitive bursty traffic sources. Mylene
Pischella et al., [6] proposed resource allocation for downlink orthogonal frequency division multiple accesses
(OFDMA). The scheme uses a subcarrier and power-allocation method that differentiates users per service type to
fulfill the QOS requirements of each user. Some routing algorithms given by [7] can optimize the energy use with a
global perspective. But these algorithms cause expensive overheads for gathering, exchanging and storing the state
information of a node. These algorithms can be improvised in order to make them scalable. An energy efficient
wireless MAC protocol is a protocol that minimizes idle listening and overhearing [8]. A large effort has been devoted
by the research community to the development of medium access control protocols for wireless computer networks [910]. Such protocols have been primarily designed to minimize the transmission delay and to maximize the throughput.
The power consumption has only later become an issue of large interest. In [11] the authors propose a centralized
algorithm that calculates the minimum power level for each node that is required to maintain network connectivity
based on the global information from all the nodes. [12] Discusses the protocols at the TCP layer that take into account
the energy reserve while allowing retransmissions. Singh et al. [13] proposed the PAMAS protocol that uses two
different channels to separate data and signaling. Singh et al. [14] presented several power-aware metrics that do result
in energy-efficient routes. The Minimum Total Transmission Power Routing (MTPR) was initially developed to
minimize the total transmission power consumption of nodes participating in the acquired route. This leads to
considerable energy savings, especially when the network environment is characterized with low duty cycle of
communication activities. However, it requires a well designed routing protocol to guarantee data delivery even if most
of the nodes sleep and do not forward packets for other nodes. Another important approach to optimizing active
communication energy is load distribution approach.

3.MAIN SOURCE OF ENERGY WASTE ENERGY IN ROUTING PROTOCOLS


The main source of waste energy in routing protocols for MANET as following:
Collision: - If a packet is corrupted it has to be resent, therefore both the sender and the receiver have to consume
additional energy to exchange the packet.
Control Packet Overhead: - Energy is also required for Sending and receiving control packets due to these less
useful data packets can be transmitted.
Idle Listening: - Extra energy is the energy wasted by a node while listening to receive possible traffic that is not
sent.
Overhearing:-This is the energy wasted by a node when listening to packets directed to other nodes.
Over emitting: this is often caused by the transmission of a message once the destination node isn't prepared.

4.ROUTING PROTOCOL FUNCTIONALITIES


Framing: Define the frame format and perform data encapsulation and de encapsulation for communication
between devices.
Medium access: It controls the devices to participate in communication at any time. Medium access becomes a
main function of wireless MAC protocols since it broadcasts easily which cause data corruption through collisions.
Reliability: It ensures successful transmission between devices. Mostly through acknowledgement (ACK)
messages and retransmissions when necessary.
Flow control: From beginning to end prevent frame loss, overloaded recipient buffers.
Error control: In frames delivered to upper layers, to have power over the amount of errors present it uses error
detection or error correction codes.

Volume 2 Issue 12 December 2014

Page 45

IPASJ International Journal of Computer Science (IIJCS)


A Publisher for Research Motivation ........

Volume 2, Issue 12, December 2014

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

5.ATTRIBUTES OF ENERGY EFFICIENT ROUTING PROTOCOL


In the wireless sensor networks, for designing high-quality MAC protocol, these attributes are to be measured [15].
Energy Efficiency: Energy efficiency are the first attribute. Battery powered consist in The sensor nodes and it is
often extremely complicated to change or recharge batteries for these sensor nodes. Sometimes it is helpful to
replace the sensor node rather than recharging them.
Latency: The second is latency. Latency requirement basically depends on the application. the detected events
must be reported to the sink node in real time In the sensor network applications, so that the suitable action could
be taken immediately.
Throughput: With different applications the throughput requirement also varies. A few sensor network
applications require sampling the information with fine temporal resolution. In such sensor applications it is better
that sink node receives more data.
Fairness: In several sensor network applications when bandwidth is limited, it is compulsory to confirm that the
sink node receives information from all sensor nodes fairly. However along with all of the above aspects the energy
efficiency and throughput are the key aspects. By minimizing the energy wastage energy efficiency can be
increased.

6.ENERGY EFFICIENT ROUTING PROTOCOLS


Routing is the process of finding a path from a source to destination among randomly distributed routers. It is also used
for route discovery protocols in ad-hoc networks. The energy efficient routing may be the most important design criteria
for MANETs, since mobile nodes will be powered by batteries with limited capacity. An energy efficient wireless MAC
protocol must minimize the four sources of energy waste [17-18]: idle listening, overhearing, collisions and protocol
overhead. Idle listening refers to the active listening to an idle channel, waiting for a potential packet to arrive.
Overhearing refers to the reception of a packet, or of part of a packet, which is destined to another node. Collisions
should of course be avoided as retransmissions cost energy. Finally, protocol overhead refers to the packet headers and
the signalling required by the protocol in addition to the transmission of data payloads. According singh et al, the
routing protocols mechanisms can be classified in four categories; Proactive (Table-Driven), Reactive & Hybrid
Routing, Topology and Destination based Routing, Single and Multi channel Routing, Uniform and Non-uniform
Routing[16]. On the basis of these classifications we can select some energy efficient routing protocols for these studies.
These protocols are;
A. Wise-MAC
WiseMAC is a medium access control protocol. According author WiseMAC is a protocol based on synchronized
preamble sampling, for the downlink of infrastructure sensor networks. The power consumption-delay trade-off was
analyzed in low traffic conditions. A comparison was made with the power save protocol used in the IEEE 802.15.4
ZigBee standard. It was shown that WiseMAC can provide significantly lower power consumption for the same delay
[19-20]. Wise-MAC presents many appealing characteristics. It is scalable as only local synchronization information is
used. It is adaptive to the traffic load, providing ultra low power consumption in low traffic conditions and high energy
efficiency in high traffic conditions. This protocol is simple, in the sense that no complex signalling protocol is
required. This simplicity can become crucial when implementing Wise-MAC on devices with very limited
computational resources.
B. PAMAS:
Power Aware Multi-Access Protocol with Signaling (PAMAS) exploits the power saving features of the MAC layer. In
this protocol, each node powers itself off if it picks up a transmission that is not for the node, or, if it has data to
transmit, but at least one neighbor is transmitting and at least one neighbor is receiving. The node stays off for the
length of the current transmission. In order to determine the duration of the current transmission, the node transmits a
sequence of probe messages and awaits a response on the control channel. If the node wishes to transmit, but another
neighbor is now receiving, the nodes RTS (Ready To Send) will evoke a busy tone response indicating the duration of
the ongoing transmission. [21-22].
C. EMRP:
EMRP is a multipath source routing protocol derived from Dynamic Source Routing (DSR). It inherits the basic
framework of DSR but makes some important changes in the phases of Route Reply, Route Selection, and Route
Maintenance according to energy and queuing information obtained from the underlying layers. EMRP is designed to
run over an enhanced version of the IEEE 802.11 MAC protocol, providing efficient information for route selection and
a power control scheme [23-24].

Volume 2 Issue 12 December 2014

Page 46

IPASJ International Journal of Computer Science (IIJCS)


A Publisher for Research Motivation ........

Volume 2, Issue 12, December 2014

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

D. P-MANET:
Power conservation is very important to prolong the battery life of important devices. Author proposed a novel efficient
power-saving MAC protocol for multi-hop MANETs, called P-MANET. The basic system model and components of pMANET, including the hibernation mechanism, the beacon inhibition mechanism, and the low-latency next-hop
selection mechanism, are described in detail. The main goal of the design of p-MANET is to minimize power
consumption, message overhead, and transmission latency in multi-hop MANETs. The hibernation mechanism to
prevent the consumption of power for unnecessary tasks, the beacon inhibition mechanism solves beacon storm
problem, and the low-latency next hop selection mechanism offers heuristic strategies to select efficiently the next-hop
node for packet forwarding. Several issues related to p-MANET require further investigation. In p-MANET, time is
divided into several periods, called beacon intervals. The lifetime of the p-MANET is almost independent of the
number of nodes, because the sleep time of each node in p-MANET is also almost independent of the number of nodes.
According author, the results revealed a power saving of over 70%, a low neighbor discovery time, and a low
transmission latency with p-MANET [25].
E. D-MAC:
In [26], DMAC is a energy efficient routing protocol. It adopts a staggered wake-up pattern to forward the data packets
to the base-station as shown in Figure 2. Nodes are considered to be present at different levels of data-gathering tree.

Figure 2: Active and Sleep Period of DMAC


All the nodes at one level would wakeup simultaneously to receive the data. This receiving period, , is followed by the
transmitting period () in which they forward data to higher level. The nodes at next level wake-up just after the
receiving period of the lower level. So, active period is a staggered wake-up pattern, where active period of one level
partially overlaps with that of lower level as shown in Figure 3. D-MAC adopts data prediction method when multiple
children need to send data to one parent in one cycle only. D-MAC does not use RTS-CTS handshaking, because at a
given time only few nodes of the network will remain active, thus reducing the chances of collision. Also, data
aggregation is possible at each node because the parent can receive packets from all children before forwarding them.
D-MAC requires local and efficient synchronization. Due to staggered wake-up schedule, each node should know its
depth-level. We implemented D-MAC where the synchronization packet sinks down from root to leaf nodes informing
each node about their depth level. Another disadvantage is that D-MAC cannot be used to local-gossip type of
communication due to its hierarchical data forwarding design.
F. BMAC:
Berkley Media Access Control) [27] is a MAC level protocol which uses adaptive preamble sampling scheme. This
technique consists of sampling the medium at fixed time intervals. Figure 4 describes the working of BMAC. Sampling
the medium means to listen to the channel for some activity. In this scheme, every node samples the medium at fixed
intervals to check whether any node is willing to communicate. If any node has a packet to send, node (sender) sense
the medium if it is free, takes a small back-off and then sends a long wake up preamble followed by data packet.
Preamble is not a packet but a physical layer RF pulse just greater than sampling period in length so that node
sampling the medium notices this activity. However, for simplicity, we have considered the preamble as a long packet n
our simulation. When receiver wakes up, it senses the medium and if it detects any noise (preamble), it turns on its
radio and waits for the preamble to end. On completion of preamble, if data packet is destined to the node itself, it
receives full data packet otherwise ignores the packet and goes to sleep. The goals of BMAC protocol are low power
operation, effective collision avoidance and efficient channel utilization at low as well as high data rate. BMAC can be
scaled to a large network. It is re-configurable by networks and its implementation is simple and requires small RAM
size. BMAC protocol uses concepts of media access functionality. It uses clear channel assessment (CCA) and back offs
for channel arbitration, acknowledgments for reliability, and low power listening (LPL) for low power communication.
B-MAC is only a link protocol, with network services like organization, synchronization, and routing built above its

Volume 2 Issue 12 December 2014

Page 47

IPASJ International Journal of Computer Science (IIJCS)


A Publisher for Research Motivation ........

Volume 2, Issue 12, December 2014

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

implementation but BMAC is unable to provide multi-packet mechanisms like hidden terminal support, message
fragmentation and particular low power policy.
G. TMAC:
The TMAC protocol is an extension of the SMAC protocol for the time-division based approach. Weakness of the
SMAC protocol can be solved by introducing an adaptive active period. All communication during the active period is
done in one burst. When all communications are over, nodes still listen to the medium ta seconds for any
communication demand left. After that they go into an early sleeping-mode (Fig. 3). When traffic is heavy, the active
period finishes after all the nodes have sent their packets.

Figure 3: TMAC protocol.


A major advantage of the TMAC over the SMAC protocol is in the adaptive frame time. In the SMAC protocol, as the
traffic load changes the duty cycle need to be changed in order to operate efficiently. The TMAC protocol adapts to
changes in network traffic by itself. TMAC also supports overhearing avoidance, full-buffer priority and Future Ready
to Send (FRTS) packets [28].
H. TRAMA:
TRAMA is algorithm based on a TDMA it proposed to increase the utilization of classical TDMA in an energy
efficient manner. It is like Node Activation Multiple Access (NAMA) [29-30], where a distributed election algorithm is
used to select one transmitter within two-hop neighborhood for each time slot Random-access and Scheduled access
(transmission) periods are two part of time. For establish two-hop topology information Random-access period is used.
It is assumed that Mac layer can calculate the transmission duration needed by the information passed by the
application layer. This transmission duration is denoted as SCHEDULE_INTERVAL. Then at time t, the node
calculates the number of slots for which it will have the highest priority among two-hop neighbors within the Period
[tt+ SCHEDULE_INTERVAL]. The node announces the slots which will use as well as the intended receivers for these
slots with a schedule packet. A bitmap whose length is equal to the number of its neighbors is used to indicate the
intended receivers by the scheduled packets. Bits correspond to one-hop neighbors ordered by their identities. Identities
of the potential senders receiver, one hop neighbors are evaluated for re-use of those slots [31].
I. AEMAC:
AEMAC is energy efficient channel adaptive MAC scheme. Energy efficiency is the main factor that is dealt with along
with improving the performance of network. AE-MAC introduces a data transfer scheme initiated by the sinker in
order to implement the effective transmission, reduce the transmission fail rate, thus improve the performance of
energy saving, throughput and latency. Also, an adaptive strategy to achieve energy efficiency is introduced in AEMAC. In AEMAC, a traffic aware dynamic power management scheme has been proposed to increase the energy
efficiency. This is performed by turning OFF the interface of the unnecessary nodes that are not included in the routing
path.

7. PERFORMANCE ANALYSIS
In performance analysis we used Network Simulator NS-2 version 2.28 for simulating the energy consumption of WiseMAC, PAMAS, EMRP, P-MANET, PAMAS, DMAC, BMAC, TRAMA, and AEMAC protocols. NS2 is a discrete
event, object oriented, simulator developed by the VINT project research group. The simulation parameters for analyzing the
performance of routing protocols various metrics are as given in Table 1

Volume 2 Issue 12 December 2014

Page 48

IPASJ International Journal of Computer Science (IIJCS)


A Publisher for Research Motivation ........

Volume 2, Issue 12, December 2014

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

TABLE 1: Simulation Parameters

The simulation is conducted with 10 to 60 nodes for comparing performance of Wise-MAC, PAMAS, EMRP, PMANET, PAMAS, DMAC, BMAC, TRAMA, and AEMAC protocols separately. First we evaluated the protocols
energy saving effect by comparing the nodes lifetime. Figure 1 has shown 10-60 nodes simulation result separately
under the 1 m/s speed. Every node has random initial energy. Table II shows that the survival time of AEMAC protocol
is higher than compared to other protocols. We also can conclude that the performance of network lifetime is better by
increasing number of nodes because destination node able to receive higher energy routes thus energy saving routing
protocol has prolonged the nodes lifetime
Table 2: Performance results of Network Lifetime vs number of nodes

Figure 4: Network Lifetime vs number of nodes.

Volume 2 Issue 12 December 2014

Page 49

IPASJ International Journal of Computer Science (IIJCS)


A Publisher for Research Motivation ........

Volume 2, Issue 12, December 2014

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

Table 3: Performance results of Data delivery ratio vs number of nodes

Figure 5: Data delivery ratio vs number of nodes

8. CONCLUSION
This paper presents a description of several MANET routing protocols. As the demand for ad hoc networks grows,
network theorists will continue to develop smarter protocols targeted to make MANETs more useful and practical in
common applications. We presented the results of comparing the energy consumption behavior of nine routing
protocols respectively. The results obtained from the simulation allow us to conclude that network lifetime and data
delivery ratio are better in EAMAC than compare to Wise-MAC, PAMAS, EMRP, P-MANET, PAMAS, DMAC,
BMAC, TRAMA protocols but not fully acceptable. So in future we have developed a new Energy Efficient Routing
Protocols for MANETs.

REFERENCES
[1] Umesh Kumar Singh, Kailash Phuleria, Shailja Sharma & D.N. Goswami, An analysis of Security Attacks found
in Mobile Ad-hoc Network, International Journal of Scientific & Engineering Research, Volume 5, Issue 5, pp.1586-1592, May-2014.
[2] Umesh Kumar Singh, Kailash Chandra Phuleriya and RamJi Yadav, Real Time Data Communication Medium
access control (RCMAC) Protocol for Wireless Sensor Networks (WSNs) International Journal of Emerging
Technology and Advanced Engineering (IJETAE), Volume 2, Issue 5, pp. 123-127, year 2012.
[3] C.-M. Chao, J.-P. Sheu, and I.-C. Chou, An adaptive quorum based energy conserving protocol for IEEE 802.11
ad hoc networks, IEEE Transactions on Mobile Computing, vol. 5, no. 5, pp. 560570, year 2006.
[4] M. Chi and Y. Yang, A prioritized battery-aware routing protocol for wireless ad hoc networks, in Proceedings
of the 8th ACM Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems, pp. 4552,
year 2005.
[5] Atef Abdrabou and Weihua Zhuang, Statistical QoS Routing for IEEE 802.11 Multi hop Ad Hoc Networks,
IEEE Transactions on Wireless communications, vol. 8, no.3, pp.1542-1552, year 2009.
[6] Mylene Pischella and Jean-Claude Belfiore, Resource Allocation for QoS-Aware OFDMA Using Distributed
Network Coordination, IEEE Transactions on vehicular Technology, vol. 58, no. 4, pp.1766-1775, year 2009.
[7] Chang J. H. and Tassiulas L. Energy Conserving Routing in Wireless Ad hoc Networks, Proceedings of IEEE
INFOCOM00, pp. 22-31., year 2000.
[8] W. Ye, J. Heidemann, and D. Estrin, An Energy-Efficient MAC Protocol for Wireless Sensor Networks, in Proc.
IEEE INFOCOM Conf., year 2002.

Volume 2 Issue 12 December 2014

Page 50

IPASJ International Journal of Computer Science (IIJCS)


A Publisher for Research Motivation ........

Volume 2, Issue 12, December 2014

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

[9] L. Kleinrock and F. A. Tobagi, Packet Switching in Radio Channels: Part 1-Carrier Sense Multiple-Access Modes
and Their Throughput-Delay Characteristics, IEEE Transactions on Communications, vol. 23, no. 12, pp. 1400
1416, year 1975.
[10] V. Bharghavan et al., MACAW: A Media Access Protocol forWireless LANs, in Proc. ACM SIGCOMM
Conf., year 1994.
[11] M. Sanchez, P.Manzoni and Z.J.Haas, Determination of Critical Transmission Range in Ad Hoc Networks,
Proceedings of MMT, year 1999.
[12] K. Lahiri, A. Raghunathan, S. Dey and D. Panigrahi, Battery-Driven System design: A New frontier in LowPower Design, Proceedings of ASPDAC/VLSInDesign 2002, pp.261-267,year 2002.
[13] S. Singh and C. S. Raghavendra, PAMASpower awaremultiaccess protocol with signalling for Ad Hoc
networks, in Proceedings of the ACM SIGCOMM Computer Communication Review, year 1998.
[14] S. Singh, M. Woo, and C. S. Raghavendra, Power-aware routing in mobile ad hoc networks, in Proceedings of
the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 98), pp.
181190, Dallas, Tex, USA, October 1998.
[15] K. Scott and N. Bambos, Routing and channel assignment for low power transmission in PCS, in Proceedings
of the 5th IEEE International Conference on Universal Personal Communications (ICUPC 96), pp. 498502,
October 1996.
[16] Umesh Kumar Singh, Lokesh Laddhani, Kailash Chandra Phuleriya, An Analysis of MANET Routing Protocols
with Effective Resource Management, International Journal of Emerging Technology and Advanced Engineering,
ISSN 2250-2459, , Volume 4, Issue 6, pp. 724-729,June 2014.
[17] Wei Ye, John Heidemann, and Deborah Estrin. An Energy-Efficient MAC Protocol for Wireless Sensor Networks.
In Proc. IEEE INFOCOM Conf., 2002.
[18] Kyle Jamieson1, Hari Balakrishnan, and Y. C. Tay, Sift: A MAC Protocol for Event-Driven Wireless Sensor
Networks, Springer-Verlag Berlin Heidelberg, LNCS 3868, pp. 260275, 2006.
[19] Amre El-Hoiydi and Jean-Dominique Decotignie, WiseMAC: An Ultra Low Power MAC Protocol for Multi-hop
Wireless Sensor Networks, Springer-Verlag Berlin Heidelberg, LNCS 3121, pp. 1831, 2004.
[20] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, Wireless sensor networks: A survey, IEEE
Communications Magazine, vol. 40, no. 8, pp. 102114, August 2002.
[21] L. M. Feeney. Energy Efficient Communication in Ad Hoc Wireless Networks. Available:
http://www.sics.se/~lmfeeney/wip.html.
[22] S. Singh, C.S. Raghavendra. PAMAS Power Aware Multi-Access Protocol with Signaling for Ad Hoc
Networks, Computer Communications Review Vol. 28, No. 3, July 1998.
[23] D. B. Johnson and D. A. Maltz, "Dynamic Source Routing in Ad hoc Wireless Networks," Mobile Computing,
Kulwer Academic Publishers, vol.353, pp. 153-181, year-1996.
[24] M. Li, L. Zhang, and X. Shan, "Power Controlled MAC Protocol with Dynamic Neighbor Prediction for Ad Hoc
Networks," Journal of China University of Posts and Telecommunications, vol.11, no.1, pp. 29-37.
[25] Ren-Hung Hwang, Chiung-Ying Wang, Chi-Jen Wu, and Guan-Nan Chen, A novel efficient power-saving MAC
protocol for multi-hop MANETs, INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, DOI:
10.1002/dac.1328, Received 12 September 2009; Revised 8 April 2011; Accepted 15 June 2011.
[26] Gang Lu, Bhaskar Krishnamachari, C. S. R. An adaptive energy-efficient and low-latency Mac for data gathering
in wireless sensor networks, 18th International Parallel and Distributed Processing Symposium (IPDPS04) vol.18,
pp.224, year-2004.
[27] Joseph Polastre, Jason Hill, D. C., Versatile low power media access for wireless sensor networks. Second ACM
Conference on Embedded Networked Sensor Systems (SenSys). Baltimore, MD, USA: ACM Press vol. 2, pp.95
107, year-2004.
[28] T. van Dam, K. Langendoen: An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks
SenSys03, Los Angeles, California, USA, year 2003.
[29] V. Rajendran, K. Obraczka, J.J. Garcia-Luna-Aceves, Energy- Efficient, Collision-Free Medium Access Control
for Wireless Sensor Networks, Proc. ACM SenSys 03, pp.181 - 192, year 2013.
[30] L. Bao and J.J. Garcia-Luna-Aceves, A New Approach To Channel Access Scheduling For Ad Hoc
Networks(2001), Seventh Annual International Conference on Mobile Computing and Networking, pp. 210221.
[31] Isha Batra, Dr. Trilok C. Aseri Comparison of Efficient MAC Protocols for Wireless Sensor Networks,
Proceedings of the Int. Conf. on Information Science and Applications ICISA, Chennai, year-2010.

Volume 2 Issue 12 December 2014

Page 51

IPASJ International Journal of Computer Science (IIJCS)


A Publisher for Research Motivation ........

Volume 2, Issue 12, December 2014

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


Email: editoriijcs@ipasj.org
ISSN 2321-5992

AUTHOR
Dr. Umesh Kumar Singh received his Ph. D. in Computer Science from Devi Ahilya University,
Indore-INDIA. Presently he is Director in School of Engineering & Technology (SOET), Vikram
University, Ujjain-INDIA. He served as professor in Computer Science and Principal in Mahakal
Institute of Computer Sciences (MICS-MIT), Ujjain. He has served as Engineer (E&T) in education
and training division of CMC Ltd., New Delhi in initial years of his career. He has authored several
books and his various research papers are published in National and International Journals of repute.
He is reviewer of International Journal of Network Security (IJNS), IJCSIS, reviewer and member of conference
committee of European Conference of Knowledge Management (ECKM) since 2007. He is also reviewer many IEEE
International Conferences on Computer. His research interest includes Computer Networks, Network Security, Internet
& Web Technology, Client-Server Computing and IT based education.
Lokesh Laddhani received M.C.A. and M. Phil. degrees in Computer Science from Institute of
Computer Science, Vikram University, Ujjain-INDIA. Presently he is pursuing Ph. D. in Computer
Science from Institute of Computer Science, Vikram University, Ujjain-INDIA. His various research
papers are published in International Journals of repute. His research interest includes Computer
Networks, Network Security and Communication.
Rakhi Sunhare received M.Sc. and M. Phil. (CS) degrees in Computer Science from Institute of
Computer Science, Vikram University, Ujjain-INDIA. She is currently Research Associate in
Computer Science. Her various research papers are published in International Journal of repute. Her
research interest includes Network Security and Communication, Artificial Intelligence and Cloud
Computing.

Volume 2 Issue 12 December 2014

Page 52

You might also like