The most effective solution for energy saving in low-rate wireless sensor networks is maintaining each node in a doze state as long as possible. In order to guarantee network connectivity, the intervals at which the network sensors are turned on and off have to be coordinated. Therefore, synchronization is a very critical function for sensor networks. In this paper, we analyze the IEEE 802.15.4 MAC performance in sensor networks deployed in a chain topology. For this topology, critical inefficiencies can arise in case of multi-hop packet deliveries. We evaluate the impact of different synchronization schemes on the network performance, both in terms of network throughput and in terms of energy consumption. We also show how the synchronization function can be opportunistically configured in order to emulate a token-like access mechanism, able to significantly improve the network
Tinnirello, I., Giarrè, L., Mineo F. (2010). Opportunistic Synchronization for Improving IEEE 802.15.4 MAC Performance in Chain Topologies. ??????? it.cilea.surplus.oa.citation.tipologie.CitationProceedings.prensentedAt ??????? EVER, Monaco, France.
Opportunistic Synchronization for Improving IEEE 802.15.4 MAC Performance in Chain Topologies
TINNIRELLO, Ilenia;GIARRE, Laura;
2010-01-01
Abstract
The most effective solution for energy saving in low-rate wireless sensor networks is maintaining each node in a doze state as long as possible. In order to guarantee network connectivity, the intervals at which the network sensors are turned on and off have to be coordinated. Therefore, synchronization is a very critical function for sensor networks. In this paper, we analyze the IEEE 802.15.4 MAC performance in sensor networks deployed in a chain topology. For this topology, critical inefficiencies can arise in case of multi-hop packet deliveries. We evaluate the impact of different synchronization schemes on the network performance, both in terms of network throughput and in terms of energy consumption. We also show how the synchronization function can be opportunistically configured in order to emulate a token-like access mechanism, able to significantly improve the networkI documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.