A Novel Hybrid-MAC Protocol for Densely Deployed Adhoc Machine-to-Machine Networks

International Journal of Electronics and Communication Engineering
© 2020 by SSRG - IJECE Journal
Volume 7 Issue 3
Year of Publication : 2020
Authors : Devesh Tyagi, Rajneesh Agrawal, Dr. Hari Mohan Singh
pdf
How to Cite?

Devesh Tyagi, Rajneesh Agrawal, Dr. Hari Mohan Singh, "A Novel Hybrid-MAC Protocol for Densely Deployed Adhoc Machine-to-Machine Networks," SSRG International Journal of Electronics and Communication Engineering, vol. 7,  no. 3, pp. 6-16, 2020. Crossref, https://doi.org/10.14445/23488549/IJECE-V7I3P102

Abstract:

This paper contains a new hybrid MAC framework, an instantiation related to medium access systems based on contention and reservations. We suppose that this instantiation is a framework consisting primarily of two parts. These are containment interval ‘CI’ & information interval ‘DTI.’ The length of CI follows the p-persistent CMA system. This facilitates channel access by M-2-M appliances. The effective systems gain slots of time & transmit packets of information after a dispute during DTI. In this suggested MAC-Hybrid protocol, the DTI period follows the Time-Division-Multiple-Access (TDMA) mechanism, enabling each M-2-M instrument to operate IEEE 802.11 DCF. A transmission system communicates within every TDMA time slot with its respective one-hop remote storage unit using the DCF protocol of IEEE 802.11 to reduce the different constraints of TDMA. The suggested hybrid-MAC protocol considerably enhances performances compared with slotting-ALOHA, p-persistent CSMA, and TDMA systems in the field of overall throughput, median delivery delay, channel supply, and power consumption.
Here the also suggestion of a new MAC protocol to enable more devices in every TDMA time slot is given. This protocol works with a single channel and transceiver, allowing spatial reuse to allow multiple M-2-M appliances to access the channel concurrently and considerably improve the hybrid MAC protocol’s performance. This MAC protocol inserts extra entry distances (AAIs) between control packet injection (RTS / CTS) and information packet transmission (DATA / ACK). If, in every time-slot during the ‘DTI of the hybrid-mac frame,’ M-2-M devices communicate with one another using this proposed MAC (instead of IEEE 802.11 – DCF suggested as in previous cases), a series of RTS / CTS interchanges between the device in the vicinity of the transmission / receiving device allowing potential concurrent data transmissions. This leads to important improved hybrid-MAC image performance relative to the IEEE 802.11 - MAC protocol.
Finally, with the number of simultaneous transmissions increasing within one TDMA slot of hybrid MAC-protocol, this results in the interference among M-2-M appliances in the local geographically interacting region. To reduce the interference and accommodate the more M-2-M appliances in a hybrid MAC framework, Multiple Beam Array-Medium Access Control (MBAA-MAC) interact mutually with the use of a MAC-protocol in every TDMA Time Slots of the hybrid MAC framework. This also makes the hybrid-MAC frame scalable and increases further, compared with IEEE 802.11 MAC-protocol; the output of hybrid-MAC frame.

Keywords:

TDMA, MAC Protocol, TDMA, open-system-interconnection, and distinctive service quality

References:

[1] J. W. M. Chen and F. Li, “Machine-to-Machine Communications: Architectures, Standards, and Applications,” KSII transaction on internet and information systems, Vol. 6, No. 2, pp. 480–497, Feb 2012.
[2] Y. Igarashi, M. Ueno, and T. Fujisaki, “Proposed Node and Network Models for an M-2-M Internet,” in World Telecommunications Congress (WTC), pp. 1–6, Mar. 2012.
[3] R. H. Glitho, “Application Architectures for Machine-to-Machine Communications: Research Agenda Vs. State-of-the-Art,” in 6th International Conference on Broadband and Biomedical Communications (IB2Com), pp. 1–5, Nov. 2011.
[4] R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, “GRS: The Green, Reliability, and Security of Emerging Machine-to-Machine Communications,” IEEE Communications Magazine, Vol. 49, No. 4, pp. 28–35, Apr. 2011.
[5] J. Zhang, L. Shan, H. Hu, and Y. Yang, “Mobile Cellular Networks and Wireless Sensor Networks: Toward Convergence,” IEEE Communications Magazine, Vol. 50, No. 3, pp. 164–169, Mar. 2012.
[6] Y. Zhang, R. Yu, S. Xie, W. Yao, Y. Xiao, and M. Guizani, “Home M-2-M networks: Architectures, Standards, and QoS Improvement,” IEEE Communications Magazine, Vol. 49, No. 4, pp. 44–52, Apr. 2011.
[7] Y. Zhang, R. Yu, M. Nekovee, Y. Liu, S. Xie, and S. Gjessing, “Cognitive Machine-to-Machine Communications: Visions and Potentials for the Smart Grid,” IEEE Network, Vol. 26, No. 3, pp. 6–13, May-Jun. 2012.
[8] Q. D. Vo, J. P. Choi, H. M. Chang, and W. C. Lee, “Green Perspective Cognitive Radio-based M-2-M Communications for Smart Meters,” in International Conference on Information and Communication Technology Convergence (ICTC), pp. 382–383, Nov. 2010.
[9] R. Yu, Y. Zhang, Y. Chen, C. Huang, Y. Xiao, and M. Guizani, “Distributed Rate and Admission Control in Home M-2-M Networks: A Non-cooperative Game Approach,” in IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 196–200, Apr. 2011.
[10] Y. B. Saied, A. Olivereau, and M. Laurent, “A Distributed Approach for Secure M-2-M Communications,” in 5th International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–7, May 2012.
[11] M. Sneps-Sneppe and D. Namiot, “About M-2-M Standards and Their Possible Extensions,” in 2nd Baltic Congress on Future Internet Communications (BCFIC), pp. 187–193, Apr. 2012.
[12] B. C. Villaverde, R. De Paz Alberola, A. J. Jara, S. Fedor, S. K. Das, and D. Pesch, “Service Discovery Protocols for Constrained Machine-to-Machine Communications,” IEEE Communications Surveys & Tutorials, Vol. 16, No. 1, pp. 41–60, January 2014.
[13] V. Galetic, I. Bojic, M. Kusek, G. Jezic, S. Desic, and D. Huljenic, “Basic Principles of Machine-to-Machine Communication Its Impact on Telecommunications Industry,” in Proceedings of the 34th International Convention (MIPRO), pp. 380–385, May 2011.
[14] Rajandekar and B. Sikdar, “A Survey of MAC Layer Issues and Protocols for Machine-to-Machine Communications,” IEEE Internet of Things Journal, Vol. 2, No. 2, pp. 175–186, April 2015.
[15] Demirkol, C. Ersoy, and F. Alagoz, “MAC Protocols for Wireless Sensor Networks: A Survey,” IEEE Communications Magazine, pp. 115–121, 2006.
[16] M. T. Islam, A. M. Taha, and S. Akl, “A Survey of Access Management Techniques in Machine Type Communications,” IEEE Communications Magazine, Vol. 52, No. 4, pp. 74–81, April 2014.
[17] Aijaz and A. Aghvami, “Cognitive Machine-to-Machine Communications for Internet-of-Things: A Protocol Stack Perspective,” IEEE Internet of Things Journal, Vol. 2, No. 2, pp. 103–112, April 2015.
[18] G. Wu, S. Talwar, K. Johnsson, N. Himayat, and K. D. Johnson, “M-2-M: From Mobile to Embedded Internet,” IEEE Communications Magazine, Vol. 49, No. 4, pp. 36–43, Apr. 2011.
[19] D. Niyato, L. Xiao, and P. Wang, “Machine-to-Machine Communications for Home Energy Management System in Smart Grid,” IEEE Communications Magazine, Vol. 49, No. 4, pp. 53–59, Apr. 2011.
[20] Z. M. Fadlullah, M. M. Fouda, N. Kato, A. Takeuchi, N. Iwasaki, and Y. Nozaki, “Toward Intelligent Machine-to-Machine Communications in Smart Grid,” IEEE Communications Magazine, Vol. 49, No. 4, pp. 60–65, Apr. 2011.
[21] S. Y. Lien, K. C. Chen, and Y. Lin, “Toward Ubiquitous Massive Accesses in 3GPP Machine-to-Machine Communications,” IEEE Communications Magazine, Vol. 49, No. 4, pp. 66–74, Apr. 2011.
[22] T. Taleb and A. Kunz, “Machine Type Communications in 3GPP networks: Potential, Challenges, and Solutions,” IEEE Communications Magazine, Vol. 50, No. 3, pp. 178–184, Mar. 2012.
[23] S. K. Tan, M. Sooriyabandara, and Z. Fan, “M-2-M Communications in the Smart Grid: Applications, Standards, Enabling Technologies, and Research Challenges,” Int. J. of Digital Multimedia Broadcasting, pp. 1–8, 2011.
[24] Bojic, G. Jezic, D. Katusic, S. Desic, M. Kusek, and D. Huljenic, “Communication in Machine-to-Machine Environments,” in Proceedings of the Fifth Balkan Conference in Informatics (BCI’12), pp. 283–286, 2012.
[25] S. Subhani, H. Shi, and J. F. G. Cobben, “A Survey of Technical Challenges in Wireless Machine-to-Machine Communication for Smart Grids,” in 50th International Universities Power Engineering Conference (UPEC), pp. 1–6, Sept 2015.
[26] G. Lawton, “Machine-to-Machine Technology Gears-up for Growth,” Computer, Vol. 37, No. 9, pp. 12–15, Sept. 2004.
[27] Z. Fan and S. Tan, “M-2-M Communications for e-health: Standards, Enabling Technologies, and Research Challenges,” in 6th International Symposium on Medical Information and Communication Technology (ISMICT), pp. 1–4, Mar. 2012.
[28] J. Rico, B. Cendon, J. Lanza, and J. Valino, “Bringing IoT to Hospital Logistics Systems Demonstrating the Concept,” in IEEE Wireless Communications and Networking Conference Workshops (WCNCW), pp. 196–201, Apr. 2012.
[29] M. Alsabaan, W. Alasmary, A. Albasir, and K. Naik, “Vehicular Networks for a Greener Environment: A Survey,” in IEEE Communications Surveys and Tutorials, Vol. 15, No. 3, pp. 1372–1388, 2013.
[30] S. T. Sheu, C. H. Chiu, S. Lu, and H. H. Lai, “Efficient Data Transmission Scheme for MTC Communications in LTE System,” in 11th International Conference on ITS Telecommunications (ITST), pp. 727–731, Aug. 2011.
[31] L. M. Jia and P. Li, “The System Architecture of Chinese RITS,” Proceeding for the Eastern Society for transportation Studies, vol. 5, pp. 1424–1432, 2005.
[32] Y. Zeng, N. Xiong, L. T. Yang, and Y. Zhang, “Cross-layer Routing in Wireless Sensor Networks for Machine-to-Machine Intelligent Hazard Monitoring Applications,” in IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 206–211, Apr. 2011.
[33] L. Cristaldi, M. Faifer, F. Grande, and R. Ottoboni, “An Improved M-2-M Platform for Multi-sensors Agent Application,” in Sensors for Industry Conference, Feb. pp. 79–83, 2005.
[34] K. Zheng, F. Hu, W. Wang, W. Xiang, and M. Dohler, “Radio Resource Allocation in LTE-Advanced Cellular Networks with M-2-M Communications,” IEEE Communications Magazine, Vol. 50, No. 7, pp. 184–192, Jul. 2012.
[35] M. Muhaidheen, “New Application of M-2-M in Railway Protection,” in International Conference on Conference on Computational Intelligence and Multimedia Applications, Vol. 4, pp. 110–114, Dec. 2007.
[36] Z. Fu, X. Jing, and S. Sun, “Application-based Identity Management in M-2-M System,” in International Conference on Advanced Intelligence and Awareness Internet (AIAI), pp. 211–215, Oct. 2011.
[37] Y. J. Kim, V. Kolesnikov, H. Kim, and M. Thottan, “SSTP: A Scalable and Secure Transport Protocol for Smart Grid Data Collection,” in IEEE Int. Conf. on Smart Grid Communications, pp. 161–166, Oct. 2011.
[38] Herstad, E. Nersveen, H. Samset, A. Storsveen, S. Svaet, and K. E. Husa, “Connected Objects: Building a Service Platform for M-2-M,” in 13th International Conference on Intelligence in Next Generation Networks (ICIN), pp. 1–4, Oct. 2009.
[39] S. Singh and K. L. Huang, “A Robust M-2-M Gateway for Effective Integration of Capillary and 3GPP Networks,” in the 5th IEEE International Conference on Advanced Networks Telecommunication Systems (ANTS), pp. 1–3, Dec. 2011.
[40] W. Sun and M. Song, “A General M-2-M Device Model,” in 2nd IEEE Symposium on Web Society (SWS), pp. 578–581, Aug. 2010.
[41] Sri Prasad and Sameera Bhanu, "Performance Assessment of Wireless Protocols for ATM Networks" SSRG International Journal of Mobile Computing and Application 3.1 (2016): 5-8.
[42] Mayakrishanan, Dr. K.S.Jeya chandran, "Comparison between Wireless Mesh and Adhoc Network in Cross Layer intend Approach" SSRG International Journal of Computer Science and Engineering 3.1 (2016): 9-12.
[43] Dr. S. Prasanakumar, "Work flow scheduling based Industrial Automation Using Closed Loop Wireless Control " SSRG International Journal of Industrial Engineering 1.1 (2014): 7-9.
[44] Dr. B Anjanee Kumar, N. Anuradha and M. Supriya , "Routing and securing the clustered step sized Wireless sensor Networks" SSRG International Journal of Mobile Computing and Application 4.1 (2017): 13-20.
[45] G.Arindam Gupta, Y.Richa Sharma and Dr.P.Nagaraja Rao, "Routine appraisal of Mac protocols for AdHoc Networks using directional Antenna" SSRG International Journal of Mobile Computing and Application 2.3 (2015): 8-12.