Collision avoidance multiple access in wireless sensor networks

Wang Jianwei, Zhao Yuping, Wang Dong, Timo Korhonen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Collision avoidance multiple access plays an important role in wireless sensor networks, especially for those composed of nodes having a simple access protocol functionality. Numerous protocols have been proposed for wireless sensor networks during the past decades. However, the majority of these proposals require too much actions to be taken by sensor nodes, which makes the sensor nodes too complex. In this paper, we focus on the sensor networks composed of simple function nodes and presented novel collision avoidance multiple access algorithms. Both suggested algorithms are based on two functional stages: the channel allocation stage and the actual data transmission by using TDMA and/or CDMA. Simulation results indicate that our algorithms significantly improve communication efficiency via collision avoidance scheme, comparing to existing proposals. In reference to this improvement, we will also address user-fairness of our algorithms.

Original languageEnglish (US)
Title of host publicationProceedings - 2007 IFIP International Conference on Network and Parallel Computing Workshops, NPC 2007
Pages529-534
Number of pages6
DOIs
StatePublished - 2007
Externally publishedYes
Event2007 IFIP International Conference on Network and Parallel Computing Workshops, NPC 2007 - Dalian, China
Duration: Sep 18 2007Sep 21 2007

Publication series

NameProceedings - 2007 IFIP International Conference on Network and Parallel Computing Workshops, NPC 2007

Conference

Conference2007 IFIP International Conference on Network and Parallel Computing Workshops, NPC 2007
Country/TerritoryChina
CityDalian
Period9/18/079/21/07

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Collision avoidance multiple access in wireless sensor networks'. Together they form a unique fingerprint.

Cite this