Skip to main content

Comparison of MAC Layer Performance of Reactive and Proactive Protocols for Different Mobility Conditions in WSN

  • Conference paper
Advances in Parallel Distributed Computing (PDCTA 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 203))

  • 1575 Accesses

Abstract

Wireless sensor networks are the most challenging networks for communication because of its resource constrained nature and the dynamical nature of network topographic anatomy. A lot of research is being going on in the diverse parts of the world for optimum utilization of communication resources in these special types of ad hoc networks. The utility and application domain of sensor networks ranges from commercial, public safety applications and military sector to be the most important ones. The magnificent challenges to the routing algorithms employed in such type of networks are due to the mercurial size of the network and its expandable topology that is quite dynamic in nature. The present paper offers a comparison and analysis of the packet drop at the MAC layer for different routing protocols under an experimental setup having different mobility condition based scenarios of the wireless sensor network application. The comparative study may have also an impact on the improvement of MAC layer performance for different simulation times of the experimental setup considering two of reactive as well as proactive protocols that are most widely used routing protocol in wireless sensor networks. Wireless sensor network application under consideration for the experimental is the battle field monitoring wireless sensor network and the comparative study has been performed for four different mobility patterns described as four different scenarios in the considered experimental application of wireless sensor networks.

The sensor network simulative electronic deception architecture used is for the battle field monitoring application of wireless sensor networks. The application provides support for sensing capabilities within the network nodes called as UGS (Unattended Ground Sensors).Mobile nodes gather data from battle field and direct it to the base station via mobile UGV (Unmanned Ground Vehicles).The performance of the MAC Layer varies with the different average jitter values for different simulation times in the network. Power usage model has been used to reliably represent an actual sensor hardware and sensor network oriented traffic pattern.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Toh, C.K., Royer, E.M.: A review of current routing protocols for ad hoc mobile wireless network, vol. 15, pp. 46–55 (April 1999)

    Google Scholar 

  2. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks, vol. 40, pp. 102–1148 (November 2002)

    Google Scholar 

  3. Santivanez, C., McDonald, B., Stavrakakis, I., Ramanathan, R.: Making link state routing scale for ad hoc network, doi:10.1145/501417.501420

    Google Scholar 

  4. Basagni, S., Conti, M., Giordano, S., Stojmenovic, I.: Mobile Ad Hoc Networking (2004)

    Google Scholar 

  5. Perkins, C., Royer, E.B., Das, S.: Ad hoc on-demand distance vector (AODV) routing, RFC 3561 (2003)

    Google Scholar 

  6. Chakeres, I., Perkins, C.: Dynamic MANET On-demand (DYMO) Routing, 12 (2008)

    Google Scholar 

  7. Qualnet, http://www.scalablenetworks.com

  8. Heinzeelman, W.B., Chandra Kasan, A., Bala Krishnan, H.: Energy-Efficient communication protocol for wireless micro-sensor networks, pp. 3005–3014 (2000)

    Google Scholar 

  9. Siva Rama Murthy, C., Manoj, B.S.: Ad hoc Wireless Networks: Architecture and protocols, 2nd edn. Prentice Hall, Englewood Cliffs

    Google Scholar 

  10. Mohanty, S., Patra, S.K.: Performance Analysis of Quality of Service Parameters for IEEE 802.15.4 Star Topology using MANET routing, ACM 978-1-60558-812-4 (2010)

    Google Scholar 

  11. Varshney, M., Bagrodia, R.: Detailed models of sensor networks simulations and their impact on network performance (2004)

    Google Scholar 

  12. Tsuchiya, P.F.: The Landmark Hierarchy: a new hierarchy for routing in very large networks, vol. 18, pp. 35–42 (1988)

    Google Scholar 

  13. Ren, H., Meng, M.Q.-H., Chen, X.: Investigating network optimization approaches in wireless sensor networks, pp. 2015–2021(2006)

    Google Scholar 

  14. Das, S.R., Castaneda, R., Yan, J., Sengupta, R.: Comparative performance evaluation of routing protocols for mobile ad hoc networks, pp. 153–161(1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pandey, M., Verma, S. (2011). Comparison of MAC Layer Performance of Reactive and Proactive Protocols for Different Mobility Conditions in WSN. In: Nagamalai, D., Renault, E., Dhanuskodi, M. (eds) Advances in Parallel Distributed Computing. PDCTA 2011. Communications in Computer and Information Science, vol 203. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24037-9_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24037-9_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24036-2

  • Online ISBN: 978-3-642-24037-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics