Title: An energy efficient cycle stealing algorithm for best effort services in wireless sensor networks

Authors: Siddhartha Chauhan; Lalit Kumar Awasthi

Addresses: Department of Computer Science and Engineering, National Institute of Technology, Hamirpur (H.P.) – 177005, India ' Department of Computer Science and Engineering, National Institute of Technology, Hamirpur (H.P.) – 177005, India

Abstract: Wireless sensor networks (WSNs) are resource constrained networks that have wide variety of applications. Quality of service (QoS) requirement differs for different applications of WSNs. Most of the energy consumed by the nodes is for transmission and reception of the packets. Reducing the transmission of data packets reduces the energy consumption of nodes. In this paper, we have proposed two energy efficient protocols for data reporting in WSNs. The proposed protocols namely cycle stealing algorithm (CSA) and energy efficient cycle stealing algorithm (EECSA) have been designed for nodes having two sensors, capable of sensing two different parameters. CSA and EECSA have been designed to efficiently handle two different types of data generated, with varying QoS requirements. Nodes can be fine-tuned according to specific requirements of applications by specifying acceptable limit which greatly affects the transmission of new data packets. The proposed protocols steal transmission cycles of rate guaranteed services in order to push data packets of best effort service. Simulation results show that proposed protocols are capable of handling redundant (similar) data by reducing the transmission of similar data packets thus conserving energy.

Keywords: quality of service; QoS; wireless sensor networks; WSNs; best effort services; data reporting; data redundancy; energy efficiency; cycle stealing algorithm; simulation.

DOI: 10.1504/IJCNDS.2014.060624

International Journal of Communication Networks and Distributed Systems, 2014 Vol.12 No.3, pp.275 - 298

Received: 06 May 2012
Accepted: 24 Mar 2013

Published online: 23 Apr 2014 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article