SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
An Approach to Sensor Network Throughput Enhancement by PHY-
Aided MAC
Abstract:
Low power sensor networks with communication enabled by WiFi are
expected to be widely deployed. A major challenge is collecting event-
driven uplink data from a large number of low-power sensors with low
latency. In WiFi, the access point (AP) typically polls nodes individually to
schedule uplink transmission times, resulting in a large latency. In this
paper, we present a physical (PHY) layer-aided medium access control
(MAC) framework to enhance the uplink throughput of sensor data traffic.
In the approach, the acknowledgements from the sensor nodes to the poll
message are parallelized. By detecting the parallel acknowledgement, the
AP knows which nodes have data to send and allocates channel resources
by sending a pull message. This approach is referred to as the probe and
pull MAC (PPMAC) mechanism. Our scheme is based on maximizing the
achievable throughput of PPMAC by optimizing the PHY layer
components. More precisely, we investigate the parallel acknowledgement
detector design problem and develop a non-convex optimization
framework that maximizes the PPMAC throughput by optimizing the
parallel acknowledgement detection statistics. Numerical examples
illustrate that PPMAC outperforms the point coordination function (PCF)
and distributed coordination function (DCF) mechanisms, standardized in
IEEE 802.11, in terms of the achievable throughput and the overhead.
Existing System:
One common requirement in sensor network applications is the need to
support uplink sensor traffic with low latency. The key to attaining this
goal is to maximize the achievable uplink throughput.
However, sensor networks typically rely on battery-powered sensor nodes
and can not support many of the power-hungry, but throughput boosting,
operations commonly found in most wireless broadband systems.
In the absence of side information, the parallel acknowledgement detection
faces two major challenges: i) The design of a non-coherent, but robust,
parallel acknowledgement detector and ii) Adaptation to throughput
performance. The performance of the parallel acknowledgement detection
needs to be optimized so as to maximize the achievable throughput.
Proposed System:
The cross-layer optimized PPMAC is shown to outperform PCF and DCF.
Furthermore, PPMAC exhibits an excellent ability to adapt the channel
allocation to a wide spectrum of traffic conditions, making it suitable for
bursty sensor applications. We are not aware of similar work that treats
specific wireless access problems such as scheduling, medium assignment,
and throughput maximization as part of the parallel acknowledgement
optimization problem using discrete monotonic optimization tools.
Though we propose the framework to optimize the channel utilization for
wireless sensor networks, by being able to solve the optimization problem
formulated in the paper, we hope that our approach will inspire the use of
monotonic optimization techniques in other relatedwireless
communication problems.
Hardware Requirements:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• RAM : 256 Mb.
Software Requirements:
• Operating system : - Centos.
• Tool : - VM Ware Workstation
• Script : - NS2

Contenu connexe

Tendances

PERFORMANCE ANALYSIS OF MULTI-PATH TCP NETWORK
PERFORMANCE ANALYSIS OF MULTI-PATH TCP NETWORKPERFORMANCE ANALYSIS OF MULTI-PATH TCP NETWORK
PERFORMANCE ANALYSIS OF MULTI-PATH TCP NETWORKIJCNCJournal
 
Me 2015 project_full_list_cs,is,ece,communication and se
Me 2015 project_full_list_cs,is,ece,communication and seMe 2015 project_full_list_cs,is,ece,communication and se
Me 2015 project_full_list_cs,is,ece,communication and seigeeks1234
 
30 ijaprr vol1-4-24-28syed
30 ijaprr vol1-4-24-28syed30 ijaprr vol1-4-24-28syed
30 ijaprr vol1-4-24-28syedijaprr_editor
 
IRJET-A Survey on congestion control with TCP network
IRJET-A Survey on congestion control with TCP networkIRJET-A Survey on congestion control with TCP network
IRJET-A Survey on congestion control with TCP networkIRJET Journal
 
Cooperative pseudo bayesian backoff
Cooperative pseudo bayesian backoffCooperative pseudo bayesian backoff
Cooperative pseudo bayesian backoffieeeprojectschennai
 
Atm networks and intelligent packet filtering(synopsis)
Atm networks and intelligent packet filtering(synopsis)Atm networks and intelligent packet filtering(synopsis)
Atm networks and intelligent packet filtering(synopsis)Mumbai Academisc
 
An automated dynamic offset for network selection in heterogeneous networks
An automated dynamic offset for network selection in heterogeneous networksAn automated dynamic offset for network selection in heterogeneous networks
An automated dynamic offset for network selection in heterogeneous networksmuhammed jassim k
 
Congestionin Data Networks
Congestionin Data NetworksCongestionin Data Networks
Congestionin Data Networkslily888
 
Probability Estimation for the Fault Detection and Isolation of PMU-Based Tra...
Probability Estimation for the Fault Detection and Isolation of PMU-Based Tra...Probability Estimation for the Fault Detection and Isolation of PMU-Based Tra...
Probability Estimation for the Fault Detection and Isolation of PMU-Based Tra...Syed Atif Naseem
 
Dotnet channel assignment for throughput optimization in multichannel multir...
Dotnet  channel assignment for throughput optimization in multichannel multir...Dotnet  channel assignment for throughput optimization in multichannel multir...
Dotnet channel assignment for throughput optimization in multichannel multir...Ecway Technologies
 

Tendances (13)

PERFORMANCE ANALYSIS OF MULTI-PATH TCP NETWORK
PERFORMANCE ANALYSIS OF MULTI-PATH TCP NETWORKPERFORMANCE ANALYSIS OF MULTI-PATH TCP NETWORK
PERFORMANCE ANALYSIS OF MULTI-PATH TCP NETWORK
 
Me 2015 project_full_list_cs,is,ece,communication and se
Me 2015 project_full_list_cs,is,ece,communication and seMe 2015 project_full_list_cs,is,ece,communication and se
Me 2015 project_full_list_cs,is,ece,communication and se
 
30 ijaprr vol1-4-24-28syed
30 ijaprr vol1-4-24-28syed30 ijaprr vol1-4-24-28syed
30 ijaprr vol1-4-24-28syed
 
IRJET-A Survey on congestion control with TCP network
IRJET-A Survey on congestion control with TCP networkIRJET-A Survey on congestion control with TCP network
IRJET-A Survey on congestion control with TCP network
 
Cooperative pseudo bayesian backoff
Cooperative pseudo bayesian backoffCooperative pseudo bayesian backoff
Cooperative pseudo bayesian backoff
 
Atm networks and intelligent packet filtering(synopsis)
Atm networks and intelligent packet filtering(synopsis)Atm networks and intelligent packet filtering(synopsis)
Atm networks and intelligent packet filtering(synopsis)
 
An automated dynamic offset for network selection in heterogeneous networks
An automated dynamic offset for network selection in heterogeneous networksAn automated dynamic offset for network selection in heterogeneous networks
An automated dynamic offset for network selection in heterogeneous networks
 
Congestionin Data Networks
Congestionin Data NetworksCongestionin Data Networks
Congestionin Data Networks
 
3 gpp wlan qos ppt
3 gpp wlan qos ppt3 gpp wlan qos ppt
3 gpp wlan qos ppt
 
Probability Estimation for the Fault Detection and Isolation of PMU-Based Tra...
Probability Estimation for the Fault Detection and Isolation of PMU-Based Tra...Probability Estimation for the Fault Detection and Isolation of PMU-Based Tra...
Probability Estimation for the Fault Detection and Isolation of PMU-Based Tra...
 
Vrajesh parikh handoff_presentation1
Vrajesh parikh handoff_presentation1Vrajesh parikh handoff_presentation1
Vrajesh parikh handoff_presentation1
 
Wsn
WsnWsn
Wsn
 
Dotnet channel assignment for throughput optimization in multichannel multir...
Dotnet  channel assignment for throughput optimization in multichannel multir...Dotnet  channel assignment for throughput optimization in multichannel multir...
Dotnet channel assignment for throughput optimization in multichannel multir...
 

Similaire à An approach to sensor network throughput enhancement by phy aided mac

IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsVijay Karan
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsVijay Karan
 
Stochastic bandwidth estimation in networks with random service
Stochastic bandwidth estimation in networks with random serviceStochastic bandwidth estimation in networks with random service
Stochastic bandwidth estimation in networks with random servicePapitha Velumani
 
Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)IISRT
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesIOSR Journals
 
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
A neighbor coverage based probabilistic rebroadcast for reducing routing over...A neighbor coverage based probabilistic rebroadcast for reducing routing over...
A neighbor coverage based probabilistic rebroadcast for reducing routing over...JPINFOTECH JAYAPRAKASH
 
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkModified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkIRJET Journal
 
M.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsM.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsVijay Karan
 
M phil-computer-science-networking-projects
M phil-computer-science-networking-projectsM phil-computer-science-networking-projects
M phil-computer-science-networking-projectsVijay Karan
 
Effective Streaming of Clustered Sensor Data in Harsh Environment
Effective Streaming of Clustered Sensor Data in Harsh EnvironmentEffective Streaming of Clustered Sensor Data in Harsh Environment
Effective Streaming of Clustered Sensor Data in Harsh EnvironmentCSCJournals
 
Cooperation without synchronization practical cooperative relaying for wirele...
Cooperation without synchronization practical cooperative relaying for wirele...Cooperation without synchronization practical cooperative relaying for wirele...
Cooperation without synchronization practical cooperative relaying for wirele...ieeeprojectschennai
 
rupali published paper
rupali published paperrupali published paper
rupali published paperRoopali Singh
 
Maximum Throughput First Access Point Selection Scheme for Multi-Rate Softwar...
Maximum Throughput First Access Point Selection Scheme for Multi-Rate Softwar...Maximum Throughput First Access Point Selection Scheme for Multi-Rate Softwar...
Maximum Throughput First Access Point Selection Scheme for Multi-Rate Softwar...IJCNCJournal
 
Maximum Throughput First Access Point Selection Scheme for Multi-Rate Softwar...
Maximum Throughput First Access Point Selection Scheme for Multi-Rate Softwar...Maximum Throughput First Access Point Selection Scheme for Multi-Rate Softwar...
Maximum Throughput First Access Point Selection Scheme for Multi-Rate Softwar...IJCNCJournal
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...ijgca
 
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ijgca
 
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...IJORCS
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...tsysglobalsolutions
 

Similaire à An approach to sensor network throughput enhancement by phy aided mac (20)

IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
Stochastic bandwidth estimation in networks with random service
Stochastic bandwidth estimation in networks with random serviceStochastic bandwidth estimation in networks with random service
Stochastic bandwidth estimation in networks with random service
 
Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
 
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
A neighbor coverage based probabilistic rebroadcast for reducing routing over...A neighbor coverage based probabilistic rebroadcast for reducing routing over...
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
 
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkModified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
 
M.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsM.Phil Computer Science Networking Projects
M.Phil Computer Science Networking Projects
 
M phil-computer-science-networking-projects
M phil-computer-science-networking-projectsM phil-computer-science-networking-projects
M phil-computer-science-networking-projects
 
Effective Streaming of Clustered Sensor Data in Harsh Environment
Effective Streaming of Clustered Sensor Data in Harsh EnvironmentEffective Streaming of Clustered Sensor Data in Harsh Environment
Effective Streaming of Clustered Sensor Data in Harsh Environment
 
Cooperation without synchronization practical cooperative relaying for wirele...
Cooperation without synchronization practical cooperative relaying for wirele...Cooperation without synchronization practical cooperative relaying for wirele...
Cooperation without synchronization practical cooperative relaying for wirele...
 
rupali published paper
rupali published paperrupali published paper
rupali published paper
 
D1102031727
D1102031727D1102031727
D1102031727
 
Maximum Throughput First Access Point Selection Scheme for Multi-Rate Softwar...
Maximum Throughput First Access Point Selection Scheme for Multi-Rate Softwar...Maximum Throughput First Access Point Selection Scheme for Multi-Rate Softwar...
Maximum Throughput First Access Point Selection Scheme for Multi-Rate Softwar...
 
Maximum Throughput First Access Point Selection Scheme for Multi-Rate Softwar...
Maximum Throughput First Access Point Selection Scheme for Multi-Rate Softwar...Maximum Throughput First Access Point Selection Scheme for Multi-Rate Softwar...
Maximum Throughput First Access Point Selection Scheme for Multi-Rate Softwar...
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
 
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
 
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...
 

Plus de ieeepondy

Demand aware network function placement
Demand aware network function placementDemand aware network function placement
Demand aware network function placementieeepondy
 
Service description in the nfv revolution trends, challenges and a way forward
Service description in the nfv revolution trends, challenges and a way forwardService description in the nfv revolution trends, challenges and a way forward
Service description in the nfv revolution trends, challenges and a way forwardieeepondy
 
Secure optimization computation outsourcing in cloud computing a case study o...
Secure optimization computation outsourcing in cloud computing a case study o...Secure optimization computation outsourcing in cloud computing a case study o...
Secure optimization computation outsourcing in cloud computing a case study o...ieeepondy
 
Spatial related traffic sign inspection for inventory purposes using mobile l...
Spatial related traffic sign inspection for inventory purposes using mobile l...Spatial related traffic sign inspection for inventory purposes using mobile l...
Spatial related traffic sign inspection for inventory purposes using mobile l...ieeepondy
 
Standards for hybrid clouds
Standards for hybrid cloudsStandards for hybrid clouds
Standards for hybrid cloudsieeepondy
 
Rfhoc a random forest approach to auto-tuning hadoop's configuration
Rfhoc a random forest approach to auto-tuning hadoop's configurationRfhoc a random forest approach to auto-tuning hadoop's configuration
Rfhoc a random forest approach to auto-tuning hadoop's configurationieeepondy
 
Resource and instance hour minimization for deadline constrained dag applicat...
Resource and instance hour minimization for deadline constrained dag applicat...Resource and instance hour minimization for deadline constrained dag applicat...
Resource and instance hour minimization for deadline constrained dag applicat...ieeepondy
 
Reliable and confidential cloud storage with efficient data forwarding functi...
Reliable and confidential cloud storage with efficient data forwarding functi...Reliable and confidential cloud storage with efficient data forwarding functi...
Reliable and confidential cloud storage with efficient data forwarding functi...ieeepondy
 
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...ieeepondy
 
Scalable cloud–sensor architecture for the internet of things
Scalable cloud–sensor architecture for the internet of thingsScalable cloud–sensor architecture for the internet of things
Scalable cloud–sensor architecture for the internet of thingsieeepondy
 
Scalable algorithms for nearest neighbor joins on big trajectory data
Scalable algorithms for nearest neighbor joins on big trajectory dataScalable algorithms for nearest neighbor joins on big trajectory data
Scalable algorithms for nearest neighbor joins on big trajectory dataieeepondy
 
Robust workload and energy management for sustainable data centers
Robust workload and energy management for sustainable data centersRobust workload and energy management for sustainable data centers
Robust workload and energy management for sustainable data centersieeepondy
 
Privacy preserving deep computation model on cloud for big data feature learning
Privacy preserving deep computation model on cloud for big data feature learningPrivacy preserving deep computation model on cloud for big data feature learning
Privacy preserving deep computation model on cloud for big data feature learningieeepondy
 
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...ieeepondy
 
Protection of big data privacy
Protection of big data privacyProtection of big data privacy
Protection of big data privacyieeepondy
 
Power optimization with bler constraint for wireless fronthauls in c ran
Power optimization with bler constraint for wireless fronthauls in c ranPower optimization with bler constraint for wireless fronthauls in c ran
Power optimization with bler constraint for wireless fronthauls in c ranieeepondy
 
Performance aware cloud resource allocation via fitness-enabled auction
Performance aware cloud resource allocation via fitness-enabled auctionPerformance aware cloud resource allocation via fitness-enabled auction
Performance aware cloud resource allocation via fitness-enabled auctionieeepondy
 
Performance limitations of a text search application running in cloud instances
Performance limitations of a text search application running in cloud instancesPerformance limitations of a text search application running in cloud instances
Performance limitations of a text search application running in cloud instancesieeepondy
 
Performance analysis and optimal cooperative cluster size for randomly distri...
Performance analysis and optimal cooperative cluster size for randomly distri...Performance analysis and optimal cooperative cluster size for randomly distri...
Performance analysis and optimal cooperative cluster size for randomly distri...ieeepondy
 
Predictive control for energy aware consolidation in cloud datacenters
Predictive control for energy aware consolidation in cloud datacentersPredictive control for energy aware consolidation in cloud datacenters
Predictive control for energy aware consolidation in cloud datacentersieeepondy
 

Plus de ieeepondy (20)

Demand aware network function placement
Demand aware network function placementDemand aware network function placement
Demand aware network function placement
 
Service description in the nfv revolution trends, challenges and a way forward
Service description in the nfv revolution trends, challenges and a way forwardService description in the nfv revolution trends, challenges and a way forward
Service description in the nfv revolution trends, challenges and a way forward
 
Secure optimization computation outsourcing in cloud computing a case study o...
Secure optimization computation outsourcing in cloud computing a case study o...Secure optimization computation outsourcing in cloud computing a case study o...
Secure optimization computation outsourcing in cloud computing a case study o...
 
Spatial related traffic sign inspection for inventory purposes using mobile l...
Spatial related traffic sign inspection for inventory purposes using mobile l...Spatial related traffic sign inspection for inventory purposes using mobile l...
Spatial related traffic sign inspection for inventory purposes using mobile l...
 
Standards for hybrid clouds
Standards for hybrid cloudsStandards for hybrid clouds
Standards for hybrid clouds
 
Rfhoc a random forest approach to auto-tuning hadoop's configuration
Rfhoc a random forest approach to auto-tuning hadoop's configurationRfhoc a random forest approach to auto-tuning hadoop's configuration
Rfhoc a random forest approach to auto-tuning hadoop's configuration
 
Resource and instance hour minimization for deadline constrained dag applicat...
Resource and instance hour minimization for deadline constrained dag applicat...Resource and instance hour minimization for deadline constrained dag applicat...
Resource and instance hour minimization for deadline constrained dag applicat...
 
Reliable and confidential cloud storage with efficient data forwarding functi...
Reliable and confidential cloud storage with efficient data forwarding functi...Reliable and confidential cloud storage with efficient data forwarding functi...
Reliable and confidential cloud storage with efficient data forwarding functi...
 
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...
 
Scalable cloud–sensor architecture for the internet of things
Scalable cloud–sensor architecture for the internet of thingsScalable cloud–sensor architecture for the internet of things
Scalable cloud–sensor architecture for the internet of things
 
Scalable algorithms for nearest neighbor joins on big trajectory data
Scalable algorithms for nearest neighbor joins on big trajectory dataScalable algorithms for nearest neighbor joins on big trajectory data
Scalable algorithms for nearest neighbor joins on big trajectory data
 
Robust workload and energy management for sustainable data centers
Robust workload and energy management for sustainable data centersRobust workload and energy management for sustainable data centers
Robust workload and energy management for sustainable data centers
 
Privacy preserving deep computation model on cloud for big data feature learning
Privacy preserving deep computation model on cloud for big data feature learningPrivacy preserving deep computation model on cloud for big data feature learning
Privacy preserving deep computation model on cloud for big data feature learning
 
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...
 
Protection of big data privacy
Protection of big data privacyProtection of big data privacy
Protection of big data privacy
 
Power optimization with bler constraint for wireless fronthauls in c ran
Power optimization with bler constraint for wireless fronthauls in c ranPower optimization with bler constraint for wireless fronthauls in c ran
Power optimization with bler constraint for wireless fronthauls in c ran
 
Performance aware cloud resource allocation via fitness-enabled auction
Performance aware cloud resource allocation via fitness-enabled auctionPerformance aware cloud resource allocation via fitness-enabled auction
Performance aware cloud resource allocation via fitness-enabled auction
 
Performance limitations of a text search application running in cloud instances
Performance limitations of a text search application running in cloud instancesPerformance limitations of a text search application running in cloud instances
Performance limitations of a text search application running in cloud instances
 
Performance analysis and optimal cooperative cluster size for randomly distri...
Performance analysis and optimal cooperative cluster size for randomly distri...Performance analysis and optimal cooperative cluster size for randomly distri...
Performance analysis and optimal cooperative cluster size for randomly distri...
 
Predictive control for energy aware consolidation in cloud datacenters
Predictive control for energy aware consolidation in cloud datacentersPredictive control for energy aware consolidation in cloud datacenters
Predictive control for energy aware consolidation in cloud datacenters
 

Dernier

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 

Dernier (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 

An approach to sensor network throughput enhancement by phy aided mac

  • 1. An Approach to Sensor Network Throughput Enhancement by PHY- Aided MAC Abstract: Low power sensor networks with communication enabled by WiFi are expected to be widely deployed. A major challenge is collecting event- driven uplink data from a large number of low-power sensors with low latency. In WiFi, the access point (AP) typically polls nodes individually to schedule uplink transmission times, resulting in a large latency. In this paper, we present a physical (PHY) layer-aided medium access control (MAC) framework to enhance the uplink throughput of sensor data traffic. In the approach, the acknowledgements from the sensor nodes to the poll message are parallelized. By detecting the parallel acknowledgement, the AP knows which nodes have data to send and allocates channel resources by sending a pull message. This approach is referred to as the probe and pull MAC (PPMAC) mechanism. Our scheme is based on maximizing the achievable throughput of PPMAC by optimizing the PHY layer components. More precisely, we investigate the parallel acknowledgement detector design problem and develop a non-convex optimization framework that maximizes the PPMAC throughput by optimizing the parallel acknowledgement detection statistics. Numerical examples illustrate that PPMAC outperforms the point coordination function (PCF)
  • 2. and distributed coordination function (DCF) mechanisms, standardized in IEEE 802.11, in terms of the achievable throughput and the overhead. Existing System: One common requirement in sensor network applications is the need to support uplink sensor traffic with low latency. The key to attaining this goal is to maximize the achievable uplink throughput. However, sensor networks typically rely on battery-powered sensor nodes and can not support many of the power-hungry, but throughput boosting, operations commonly found in most wireless broadband systems. In the absence of side information, the parallel acknowledgement detection faces two major challenges: i) The design of a non-coherent, but robust, parallel acknowledgement detector and ii) Adaptation to throughput performance. The performance of the parallel acknowledgement detection needs to be optimized so as to maximize the achievable throughput. Proposed System: The cross-layer optimized PPMAC is shown to outperform PCF and DCF. Furthermore, PPMAC exhibits an excellent ability to adapt the channel allocation to a wide spectrum of traffic conditions, making it suitable for bursty sensor applications. We are not aware of similar work that treats specific wireless access problems such as scheduling, medium assignment, and throughput maximization as part of the parallel acknowledgement optimization problem using discrete monotonic optimization tools.
  • 3. Though we propose the framework to optimize the channel utilization for wireless sensor networks, by being able to solve the optimization problem formulated in the paper, we hope that our approach will inspire the use of monotonic optimization techniques in other relatedwireless communication problems. Hardware Requirements: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • RAM : 256 Mb. Software Requirements: • Operating system : - Centos. • Tool : - VM Ware Workstation • Script : - NS2