Abstract

The importance of Wireless Sensor Network (WSN) increases due to deployment for geographical, environmental and surveillance purpose in war fields. WSN facing several challenges due to its complex nature including key problems, such as routing and medium access control protocols. Several approaches were proposed for the performance evaluation of WSN on the basis of these issues due to the fact that MAC layer access protocols have a great impact on the performance of WSN. In this paper, we investigated the performance evaluation of three well known MAC Access protocols, i.e. sensor medium access control protocol (SMAC), carrier sense multiple access with collision avoidance (CSMA/CA), and time division multiple access (TDMA) over adhoc on demand distance vector (AODV) routing protocol. The number of simulation scenarios were carried out by using NS- 2, the simulation metrics used are throughput, end-to-end delay and energy consumed. Simulation results showed that SMAC out perform CSMA/CA and TDMA by consuming less energy, less end to end delay and high throughput due to contention based approach to access the medium for transmission.

Highlights

  • The ad-hoc network is a network of self configuring mobile nodes that can communicate with each other without any centralized control

  • This paper investigates the behavior of the popular reactive routing protocol adhoc on demand distance vector (AODV) over varying Medium access control (MAC) protocols

  • Aggarwal et al (2012) worked on the security challenges faced by ad-hoc routing protocols and proposed (AODVSEC) by enhancing the scope of AODV for the provision of security and compared it with (AODV) and SAODV in normal situation as well as in the presence of three concerned attacks i.e Resource Consumption (RC) attack, Route Disturb (RD) attack, Route Invasion (RI) attack and Black hole (BH) attack

Read more

Summary

INTRODUCTION

The ad-hoc network is a network of self configuring mobile nodes that can communicate with each other without any centralized control. The routes are established at the time when a node wants to communicate with another node in the network. Routing table is maintained for every node in which the required information for communicating with other users in the network are stored. It reacts to the changes by maintaining only the active routes in the tables for a specified amount of expiration time [20]. The hop nodes will notify all the nodes by sending RERR messages, to keep the information updated [5] Due to this reactive approach, AODV was used as routing protocol in this study.

RELATED WORK
AND DISCUSSION
Scalability Scenario
Interval or Data Rate Scenario
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call