A Novel Hybrid-MAC Protocol for Densely Deployed Adhoc Machine-to-Machine Networks
|International Journal of Electronics and Communication Engineering|
|© 2020 by SSRG - IJECE Journal|
|Volume 7 Issue 3|
|Year of Publication : 2020|
|Authors : Devesh Tyagi, Rajneesh Agrawal, Dr. Hari Mohan Singh|
How to Cite?
Devesh Tyagi, Rajneesh Agrawal, Dr. Hari Mohan Singh, "A Novel Hybrid-MAC Protocol for Densely Deployed Adhoc Machine-to-Machine Networks," SSRG International Journal of Electronics and Communication Engineering, vol. 7, no. 3, pp. 6-16, 2020. Crossref, https://doi.org/10.14445/23488549/IJECE-V7I3P102
This paper contains a new hybrid MAC framework, an instantiation related to medium access systems based on contention and reservations. We suppose that this instantiation is a framework consisting primarily of two parts. These are containment interval ‘CI’ & information interval ‘DTI.’ The length of CI follows the p-persistent CMA system. This facilitates channel access by M-2-M appliances. The effective systems gain slots of time & transmit packets of information after a dispute during DTI. In this suggested MAC-Hybrid protocol, the DTI period follows the Time-Division-Multiple-Access (TDMA) mechanism, enabling each M-2-M instrument to operate IEEE 802.11 DCF. A transmission system communicates within every TDMA time slot with its respective one-hop remote storage unit using the DCF protocol of IEEE 802.11 to reduce the different constraints of TDMA. The suggested hybrid-MAC protocol considerably enhances performances compared with slotting-ALOHA, p-persistent CSMA, and TDMA systems in the field of overall throughput, median delivery delay, channel supply, and power consumption.
Here the also suggestion of a new MAC protocol to enable more devices in every TDMA time slot is given. This protocol works with a single channel and transceiver, allowing spatial reuse to allow multiple M-2-M appliances to access the channel concurrently and considerably improve the hybrid MAC protocol’s performance. This MAC protocol inserts extra entry distances (AAIs) between control packet injection (RTS / CTS) and information packet transmission (DATA / ACK). If, in every time-slot during the ‘DTI of the hybrid-mac frame,’ M-2-M devices communicate with one another using this proposed MAC (instead of IEEE 802.11 – DCF suggested as in previous cases), a series of RTS / CTS interchanges between the device in the vicinity of the transmission / receiving device allowing potential concurrent data transmissions. This leads to important improved hybrid-MAC image performance relative to the IEEE 802.11 - MAC protocol.
Finally, with the number of simultaneous transmissions increasing within one TDMA slot of hybrid MAC-protocol, this results in the interference among M-2-M appliances in the local geographically interacting region. To reduce the interference and accommodate the more M-2-M appliances in a hybrid MAC framework, Multiple Beam Array-Medium Access Control (MBAA-MAC) interact mutually with the use of a MAC-protocol in every TDMA Time Slots of the hybrid MAC framework. This also makes the hybrid-MAC frame scalable and increases further, compared with IEEE 802.11 MAC-protocol; the output of hybrid-MAC frame.
TDMA, MAC Protocol, TDMA, open-system-interconnection, and distinctive service quality
 J. W. M. Chen and F. Li, “Machine-to-Machine Communications: Architectures, Standards, and Applications,” KSII transaction on internet and information systems, Vol. 6, No. 2, pp. 480–497, Feb 2012.
 Y. Igarashi, M. Ueno, and T. Fujisaki, “Proposed Node and Network Models for an M-2-M Internet,” in World Telecommunications Congress (WTC), pp. 1–6, Mar. 2012.
 R. H. Glitho, “Application Architectures for Machine-to-Machine Communications: Research Agenda Vs. State-of-the-Art,” in 6th International Conference on Broadband and Biomedical Communications (IB2Com), pp. 1–5, Nov. 2011.
 R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, “GRS: The Green, Reliability, and Security of Emerging Machine-to-Machine Communications,” IEEE Communications Magazine, Vol. 49, No. 4, pp. 28–35, Apr. 2011.
 J. Zhang, L. Shan, H. Hu, and Y. Yang, “Mobile Cellular Networks and Wireless Sensor Networks: Toward Convergence,” IEEE Communications Magazine, Vol. 50, No. 3, pp. 164–169, Mar. 2012.
 Y. Zhang, R. Yu, S. Xie, W. Yao, Y. Xiao, and M. Guizani, “Home M-2-M networks: Architectures, Standards, and QoS Improvement,” IEEE Communications Magazine, Vol. 49, No. 4, pp. 44–52, Apr. 2011.
 Y. Zhang, R. Yu, M. Nekovee, Y. Liu, S. Xie, and S. Gjessing, “Cognitive Machine-to-Machine Communications: Visions and Potentials for the Smart Grid,” IEEE Network, Vol. 26, No. 3, pp. 6–13, May-Jun. 2012.
 Q. D. Vo, J. P. Choi, H. M. Chang, and W. C. Lee, “Green Perspective Cognitive Radio-based M-2-M Communications for Smart Meters,” in International Conference on Information and Communication Technology Convergence (ICTC), pp. 382–383, Nov. 2010.
 R. Yu, Y. Zhang, Y. Chen, C. Huang, Y. Xiao, and M. Guizani, “Distributed Rate and Admission Control in Home M-2-M Networks: A Non-cooperative Game Approach,” in IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 196–200, Apr. 2011.
 Y. B. Saied, A. Olivereau, and M. Laurent, “A Distributed Approach for Secure M-2-M Communications,” in 5th International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–7, May 2012.
 M. Sneps-Sneppe and D. Namiot, “About M-2-M Standards and Their Possible Extensions,” in 2nd Baltic Congress on Future Internet Communications (BCFIC), pp. 187–193, Apr. 2012.
 B. C. Villaverde, R. De Paz Alberola, A. J. Jara, S. Fedor, S. K. Das, and D. Pesch, “Service Discovery Protocols for Constrained Machine-to-Machine Communications,” IEEE Communications Surveys & Tutorials, Vol. 16, No. 1, pp. 41–60, January 2014.
 V. Galetic, I. Bojic, M. Kusek, G. Jezic, S. Desic, and D. Huljenic, “Basic Principles of Machine-to-Machine Communication Its Impact on Telecommunications Industry,” in Proceedings of the 34th International Convention (MIPRO), pp. 380–385, May 2011.
 Rajandekar and B. Sikdar, “A Survey of MAC Layer Issues and Protocols for Machine-to-Machine Communications,” IEEE Internet of Things Journal, Vol. 2, No. 2, pp. 175–186, April 2015.
 Demirkol, C. Ersoy, and F. Alagoz, “MAC Protocols for Wireless Sensor Networks: A Survey,” IEEE Communications Magazine, pp. 115–121, 2006.
 M. T. Islam, A. M. Taha, and S. Akl, “A Survey of Access Management Techniques in Machine Type Communications,” IEEE Communications Magazine, Vol. 52, No. 4, pp. 74–81, April 2014.
 Aijaz and A. Aghvami, “Cognitive Machine-to-Machine Communications for Internet-of-Things: A Protocol Stack Perspective,” IEEE Internet of Things Journal, Vol. 2, No. 2, pp. 103–112, April 2015.
 G. Wu, S. Talwar, K. Johnsson, N. Himayat, and K. D. Johnson, “M-2-M: From Mobile to Embedded Internet,” IEEE Communications Magazine, Vol. 49, No. 4, pp. 36–43, Apr. 2011.
 D. Niyato, L. Xiao, and P. Wang, “Machine-to-Machine Communications for Home Energy Management System in Smart Grid,” IEEE Communications Magazine, Vol. 49, No. 4, pp. 53–59, Apr. 2011.
 Z. M. Fadlullah, M. M. Fouda, N. Kato, A. Takeuchi, N. Iwasaki, and Y. Nozaki, “Toward Intelligent Machine-to-Machine Communications in Smart Grid,” IEEE Communications Magazine, Vol. 49, No. 4, pp. 60–65, Apr. 2011.
 S. Y. Lien, K. C. Chen, and Y. Lin, “Toward Ubiquitous Massive Accesses in 3GPP Machine-to-Machine Communications,” IEEE Communications Magazine, Vol. 49, No. 4, pp. 66–74, Apr. 2011.
 T. Taleb and A. Kunz, “Machine Type Communications in 3GPP networks: Potential, Challenges, and Solutions,” IEEE Communications Magazine, Vol. 50, No. 3, pp. 178–184, Mar. 2012.
 S. K. Tan, M. Sooriyabandara, and Z. Fan, “M-2-M Communications in the Smart Grid: Applications, Standards, Enabling Technologies, and Research Challenges,” Int. J. of Digital Multimedia Broadcasting, pp. 1–8, 2011.
 Bojic, G. Jezic, D. Katusic, S. Desic, M. Kusek, and D. Huljenic, “Communication in Machine-to-Machine Environments,” in Proceedings of the Fifth Balkan Conference in Informatics (BCI’12), pp. 283–286, 2012.
 S. Subhani, H. Shi, and J. F. G. Cobben, “A Survey of Technical Challenges in Wireless Machine-to-Machine Communication for Smart Grids,” in 50th International Universities Power Engineering Conference (UPEC), pp. 1–6, Sept 2015.
 G. Lawton, “Machine-to-Machine Technology Gears-up for Growth,” Computer, Vol. 37, No. 9, pp. 12–15, Sept. 2004.
 Z. Fan and S. Tan, “M-2-M Communications for e-health: Standards, Enabling Technologies, and Research Challenges,” in 6th International Symposium on Medical Information and Communication Technology (ISMICT), pp. 1–4, Mar. 2012.
 J. Rico, B. Cendon, J. Lanza, and J. Valino, “Bringing IoT to Hospital Logistics Systems Demonstrating the Concept,” in IEEE Wireless Communications and Networking Conference Workshops (WCNCW), pp. 196–201, Apr. 2012.
 M. Alsabaan, W. Alasmary, A. Albasir, and K. Naik, “Vehicular Networks for a Greener Environment: A Survey,” in IEEE Communications Surveys and Tutorials, Vol. 15, No. 3, pp. 1372–1388, 2013.
 S. T. Sheu, C. H. Chiu, S. Lu, and H. H. Lai, “Efficient Data Transmission Scheme for MTC Communications in LTE System,” in 11th International Conference on ITS Telecommunications (ITST), pp. 727–731, Aug. 2011.
 L. M. Jia and P. Li, “The System Architecture of Chinese RITS,” Proceeding for the Eastern Society for transportation Studies, vol. 5, pp. 1424–1432, 2005.
 Y. Zeng, N. Xiong, L. T. Yang, and Y. Zhang, “Cross-layer Routing in Wireless Sensor Networks for Machine-to-Machine Intelligent Hazard Monitoring Applications,” in IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 206–211, Apr. 2011.
 L. Cristaldi, M. Faifer, F. Grande, and R. Ottoboni, “An Improved M-2-M Platform for Multi-sensors Agent Application,” in Sensors for Industry Conference, Feb. pp. 79–83, 2005.
 K. Zheng, F. Hu, W. Wang, W. Xiang, and M. Dohler, “Radio Resource Allocation in LTE-Advanced Cellular Networks with M-2-M Communications,” IEEE Communications Magazine, Vol. 50, No. 7, pp. 184–192, Jul. 2012.
 M. Muhaidheen, “New Application of M-2-M in Railway Protection,” in International Conference on Conference on Computational Intelligence and Multimedia Applications, Vol. 4, pp. 110–114, Dec. 2007.
 Z. Fu, X. Jing, and S. Sun, “Application-based Identity Management in M-2-M System,” in International Conference on Advanced Intelligence and Awareness Internet (AIAI), pp. 211–215, Oct. 2011.
 Y. J. Kim, V. Kolesnikov, H. Kim, and M. Thottan, “SSTP: A Scalable and Secure Transport Protocol for Smart Grid Data Collection,” in IEEE Int. Conf. on Smart Grid Communications, pp. 161–166, Oct. 2011.
 Herstad, E. Nersveen, H. Samset, A. Storsveen, S. Svaet, and K. E. Husa, “Connected Objects: Building a Service Platform for M-2-M,” in 13th International Conference on Intelligence in Next Generation Networks (ICIN), pp. 1–4, Oct. 2009.
 S. Singh and K. L. Huang, “A Robust M-2-M Gateway for Effective Integration of Capillary and 3GPP Networks,” in the 5th IEEE International Conference on Advanced Networks Telecommunication Systems (ANTS), pp. 1–3, Dec. 2011.
 W. Sun and M. Song, “A General M-2-M Device Model,” in 2nd IEEE Symposium on Web Society (SWS), pp. 578–581, Aug. 2010.
 Sri Prasad and Sameera Bhanu, "Performance Assessment of Wireless Protocols for ATM Networks" SSRG International Journal of Mobile Computing and Application 3.1 (2016): 5-8.
 Mayakrishanan, Dr. K.S.Jeya chandran, "Comparison between Wireless Mesh and Adhoc Network in Cross Layer intend Approach" SSRG International Journal of Computer Science and Engineering 3.1 (2016): 9-12.
 Dr. S. Prasanakumar, "Work flow scheduling based Industrial Automation Using Closed Loop Wireless Control " SSRG International Journal of Industrial Engineering 1.1 (2014): 7-9.
 Dr. B Anjanee Kumar, N. Anuradha and M. Supriya , "Routing and securing the clustered step sized Wireless sensor Networks" SSRG International Journal of Mobile Computing and Application 4.1 (2017): 13-20.
 G.Arindam Gupta, Y.Richa Sharma and Dr.P.Nagaraja Rao, "Routine appraisal of Mac protocols for AdHoc Networks using directional Antenna" SSRG International Journal of Mobile Computing and Application 2.3 (2015): 8-12.