Micro-Power Wireless CSMA/CA Algorithm Improvement and Simulation Based on the Electric Power Business

Article Preview

Abstract:

In the micro-power wireless transmission of the electric system, positions among modes are relatively fixed, power business data is reported at specific time points, and time distribution presents great differences. Key technologies of IEEE802.15.4 MAC layer protocol is expounded, shortages of collision detection and CSMA/CA on power business support, etc. are discussed, self-adaptive low-power consumption CSMA/CA algorithm which is more suitable for business of the electric system are designed and improved, and the algorithm goes through simulation experiment against the business characteristics of micro-power wireless network of the electric system. The simulation result demonstrates the algorithm may be greatly adapted to changes of network traffic under a relatively fixed environment of network topology on the premise of low power consumption.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1640-1646

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Erosy DI, Alagoz FC. A Survey of MAC protocols for wireless sensor networks. Communications Magazine, 2006, 44 (4): 115-121.

DOI: 10.1109/mcom.2006.1632658

Google Scholar

[2] IEEE Standard for Part 15. 4: Wireless Medium Access Control Layer (MAC) and Physical Layer ( PHY) Specifications for Low Rate Wireless Personal Area Networks. June 16, (2011).

DOI: 10.1109/ieeestd.2006.232110

Google Scholar

[3] Y. Zhang, P. Xu, Z. Zhang, and G. Bi, Comments on Throughput Analysis of IEEE 802. 15. 4 Slotted CSMA/CA Considering Timeout Period, , IEEE lectron. Lett. V01. 42, No, 19, Sept. 2006, PP. 1127-1128.

DOI: 10.1049/el:20061521

Google Scholar

[4] Zhang Zhifeng, Lu Jiande. IEEE802. 15. 4 dynamic adaptive CSMA/CA algorithm design and simulation. Computer Technology and Development, 2010, 20 (9): 69-73.

Google Scholar

[5] Ji Cheng, Xu Youyun, Zheng Baoyu. Base on 802. 15. 4 Retreat improvement mechanism of the algorithm. Information Technology, 2008 (8): 8-12.

Google Scholar