• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xing Yulong, Chen Yongrui, Yi Weidong, Duan Chenghua. The Optimal Beacon Interval for Synchronous MAC in Low Duty-Cycle Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2016, 53(9): 2009-2015. DOI: 10.7544/issn1000-1239.2016.20150463
Citation: Xing Yulong, Chen Yongrui, Yi Weidong, Duan Chenghua. The Optimal Beacon Interval for Synchronous MAC in Low Duty-Cycle Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2016, 53(9): 2009-2015. DOI: 10.7544/issn1000-1239.2016.20150463

The Optimal Beacon Interval for Synchronous MAC in Low Duty-Cycle Wireless Sensor Networks

More Information
  • Published Date: August 31, 2016
  • Energy efficiency is a fundamental theme in the design of wireless sensor networks protocols, especially for medium access control (MAC) protocols. An energy-efficient MAC protocol can significantly elongate the lifetime of wireless sensor networks by reducing the duty-cycle of sensor nodes to an ultra-low level. Synchronous MAC can be even more efficient in data transfer at the cost of requiring tight time synchronization through periodical beacon dissemination. The length of the beacon interval may greatly affect the energy efficiency of a synchronous MAC. A shorter beacon interval leads to higher synchronization cost due to frequent beacon sending and receiving, while a longer beacon interval will lead to a larger guard time and longer idle listening due to clock drift. Therefore, there is a tradeoff between these two parts of energy consumption. In this paper, we investigate the optimal beacon interval for synchronous MAC in low duty-cycle sensor networks, and then present a strategy that adaptively utilizes the optimal beacon interval in a TDMA-based MAC protocol (called Opt-TDMA). By configuring the beacon interval to its optimal value according to the data packets rate and network size, Opt-TDMA can reduce the overall power consumption of both sending/receiving beacons and data packets. Experimental results demonstrate that Opt-TDMA is more energy-efficient than pure TDMA protocol and SCP-MAC by using optimal beacon interval and contention-free transmission.
  • Related Articles

    [1]Dai Chenglong, Li Guanghui, Li Dong, Shen Jiahua, Pi Dechang. Electroencephalogram Clustering with Multiple Regularization Constrained Pseudo Label Propagation Optimization[J]. Journal of Computer Research and Development, 2024, 61(1): 156-171. DOI: 10.7544/issn1000-1239.202220295
    [2]Wang Hang, Tian Shengzhao, Tang Qing, Chen Duanbing. Few-Shot Image Classification Based on Multi-Scale Label Propagation[J]. Journal of Computer Research and Development, 2022, 59(7): 1486-1495. DOI: 10.7544/issn1000-1239.20210376
    [3]Cao Jiuxin, Gao Qingqing, Xia Rongqing, Liu Weijia, Zhu Xuelin, Liu Bo. Information Propagation Prediction and Specific Information Suppression in Social Networks[J]. Journal of Computer Research and Development, 2021, 58(7): 1490-1503. DOI: 10.7544/issn1000-1239.2021.20200809
    [4]Hu Dou, Wei Lingwei, Zhou Wei, Huai Xiaoyong, Han Jizhong, Hu Songlin. A Rumor Detection Approach Based on Multi-Relational Propagation Tree[J]. Journal of Computer Research and Development, 2021, 58(7): 1395-1411. DOI: 10.7544/issn1000-1239.2021.20200810
    [5]Du Ming, Yang Yun, Zhou Junfeng, Chen Ziyang, Yang Anping. Efficient Methods for Label-Constraint Reachability Query[J]. Journal of Computer Research and Development, 2020, 57(9): 1949-1960. DOI: 10.7544/issn1000-1239.2020.20190569
    [6]Zheng Wenping, Che Chenhao, Qian Yuhua, Wang Jie. A Two-Stage Community Detection Algorithm Based on Label Propagation[J]. Journal of Computer Research and Development, 2018, 55(9): 1959-1971. DOI: 10.7544/issn1000-1239.2018.20180277
    [7]Song Pan, Jing Liping. Exploiting Label Relationships in Multi-Label Classification with Neural Networks[J]. Journal of Computer Research and Development, 2018, 55(8): 1751-1759. DOI: 10.7544/issn1000-1239.2018.20180362
    [8]Ma Gang, Du Yuge, An Bo, Zhang Bo, Wang Wei, Shi Zhongzhi. Risk Evaluation of Complex Information System Based on Threat Propagation Sampling[J]. Journal of Computer Research and Development, 2015, 52(7): 1642-1659. DOI: 10.7544/issn1000-1239.2015.20140184
    [9]Zhu Xiang, Jia Yan, Nie Yuanping, Qu Ming. Event Propagation Analysis on Microblog[J]. Journal of Computer Research and Development, 2015, 52(2): 437-444. DOI: 10.7544/issn1000-1239.2015.20140187
    [10]She Qiaoqiao, Yu Yang, Jiang Yuan, and Zhou Zhihua. Large-Scale Image Annotation via Random Forest Based Label Propagation[J]. Journal of Computer Research and Development, 2012, 49(11): 2289-2295.

Catalog

    Article views (1368) PDF downloads (342) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return