Abstract

In wireless sensor networks, the aim of storage protocols is to efficiently replicate data across nodes and to improve data collection and querying by sinks. Among them, in-network storage protocol...

Highlights

  • In the last decades, wireless sensor network (WSN) was widely studied in academic and industry worlds

  • Specific algorithms/ protocols are developed for WSN at physical, medium access control (MAC), routing, transport, and application layers.[1,2]

  • The main MAC protocols for WSN could be found in the study of Huang et al.,[3] whereas the most important routing protocols are presented by Guo and Zhang.[4]

Read more

Summary

Introduction

Wireless sensor network (WSN) was widely studied in academic and industry worlds. A wireless sensor node is a low-cost communicating electronic device, allowing the monitoring of its environment. Specific algorithms/ protocols are developed for WSN at physical, medium access control (MAC), routing, transport, and application layers.[1,2] The main MAC protocols for WSN could be found in the study of Huang et al.,[3] whereas the most important routing protocols are presented by Guo and Zhang.[4] Transport protocols for WSN are summarized in the study of Ghaffari.[5] application scenarios for WSN are presented by Borges et al.[6] In addition, various low-power technologies were standardized for WSN such as IEEE 802.15.47 covering physical and MAC levels. On top of IEEE 802.15.4, ZigBee standard[3] was proposed as routing and application protocol

Objectives
Methods
Findings
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.