Fig 1 - uploaded by Imen Bouazzi
Content may be subject to copyright.
Super frame structure [12] 

Super frame structure [12] 

Source publication
Conference Paper
Full-text available
Network life time is a critical aspect of application in wireless sensor networks (WSN). Furthermore energy consumption and security has arisen as a major aspect in network design. In this article, a study of the backoff exponent (BE) management in the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) method under the Medium Access C...

Contexts in source publication

Context 1
... structure of the beacon enabled mode is presented in Fig. 1. First, the super frame is limited by a beacons field which is a specific synchronization frames forwarded periodically by the coordinator. Each super frame is limited by tow beacon frame. The parameters who specify the length of the super frame are: the Beacon Interval (BI) is specified within the Beacon Order (BO) value as calculated ...
Context 2
... slot in the convenient period according to their traffic state. This strategy leads to avoids multiple small BE for a high number of nodes and then reduces the packet loss probability and retransmission probability. As it is seen earlier in the precedent figures, the efficiency of our QEBA algorithm is more remarkable for a high number of nodes. Fig. 11 shows the average delay versus time simulation. Our algorithm has improved its efficiency on the delay regarding to the basic program, this can be explained that nodes get the required backoff value. The dynamic management of the BE value well reduce the packet loss probability when the queue is full. The main idea of this work is to ...

Similar publications

Article
Full-text available
Nodes in wireless sensor networks (WSN) are resource and energy constrained because they are generally battery powered and therefore have limited computational capability. Due to the less security environment in WSN, some malicious nodes at one point can tunnel packets to another location to damage the network in terms of packets dropping and eaves...
Article
Full-text available
The application areas of Wireless Sensor Networks (WSNs) are expanding with time. Many of these applications demand a lower end-to-end delay, high throughput, and energy-efficient operations. The performance of these applications mostly relies on the performance of the MAC protocol. This paper presents a Dual-Channel Dual-Slot MAC (DCDS-MAC) protoc...
Conference Paper
Full-text available
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) is the most popular channel access mechanism for Wireless Sensor Networks (WSNs). The random backoff and CCAs in CSMA/CA mechanism avoid the collisions. However, inefficient CCAs increase energy consumption. In order to reduce the energy consumption and enhance the reliability, a new...
Article
Full-text available
As the reference communication standard of wireless sensor networks (WSNs), the IEEE 802.15.4 standard has been adopted in various WSN-based applications. In many of these applications, one of the most common traffic pattern types is a periodic traffic patterns, however, the majority of existing analytical models target either saturated or unsatura...
Article
Full-text available
This paper proposes an Efficient Distributed Clustering and Gradient based Routing Protocol (EDCGRP) to support the Wireless Sensor Networks (WSNs) in (i) prolonging the network lifetime (ii) utilizing the battery energy efficiently (iii) reducing the overhead of the network (iv) ensuring high Packet Delivery Ratio (PDR) with minimal delay. To achi...

Citations

... He et al. [16] studied the impact of the parameters of the slotted CSMA-CA mechanism on throughput by using two Markov chains. I. Bouazzi et al. [17] dynamically adjusted MAC parameters, based on the length of each sensor queue, and analyzed delay and throughput. G. Boudour et al. [18] proposed an algorithm that adjusts the competition parameters according to the observed busy channel and transmission failure rate. ...
Article
Full-text available
Numerous Internet of Things (IoT) devices adopt the IEEE 802.15.4 standard, which targets low data rate wireless networks. With the explosive growth in the use of IoT devices, it is essential to design effective and efficient channel access schemes for the 802.15.4 networks. In order to improve channel contention efficiency (CCE), which is defined as the number of times of successfully gaining the channel per unit of backoff time whereby throughput is improved, the scheme of enhancing channel contention efficiency (ECCE) has been proposed to jointly optimize the three key parameters of macMinBe, macMaxBe and macMaxCsmaBackoffs in the carrier sense multiple access with collision avoidance (CSMA-CA) mechanism in the 802.15.4 standard. A novel Markov chain was developed to model the CSMA-CA mechanism, which yielded the expected number of failures in gaining the channel, the expected number of backoff periods and the expected number of backoffs when a node intended to transmit a packet. These statistics resulted in CCE. An optimization problem that maximized the CCE with respect to the above-mentioned three key parameters was formulated. The solution to the optimization problem led to the optimal parameter values, which were applied in the ECCE scheme. The simulation results show that the proposed ECCE scheme outperformed the CSMA-CA mechanism in terms of CCE, delay and throughput.
... Bouazzi et. al. [10] proposed an enhanced backoff algorithm. In their algorithm the authors have introduced four new parameters namely Curq, Qlim−, Qlim+ and R. Curq defines the queue length of the communication nodes. ...
Conference Paper
Full-text available
In this paper, we propose an algorithm for Context-Aware REgulation of backoff delay (d-CARE) in delay-sensitive networks that follow IEEE 802.15.4 standard. The slotted Carrier Sense Multiple Access - Collision Avoidance (CSMA-CA) algorithm prescribed in the standard, to resolve the contention over channel access, does not select the initial Backoff Exponent (BE) value judiciously. In other words, it cannot differentiate between delay-sensitive and delay-tolerant applications. Thus, context-less selection of BE may lead towards a high delay for delay-sensitive applications, for example - real time health monitoring of patients. The proposed d-CARE algorithm uses a Fuzzy Inference System (FIS) to address this problem. As a case study, contexts or attributes that are relevant to healthcare applications are considered as the inputs to the FIS, which generates a BE value as the corresponding output. This judiciously selected BE value produces 12% less delay than the traditional approach.