Beruflich Dokumente
Kultur Dokumente
Introduction
1.1 Aim
1.2 Motivation
Energy consumption is the main constraint seen in wireless sensor networks as the
operational lifetime corresponds directly to it. The remote and mobile nature of a WSN that
results in the inability to resupply power to the energy constrained nodes. Therefore
increasing the energy efficiency is the top priortity so that the lifetime of the WSN can be
extended.
A MAC protocol is required in sensor network to coordinate the sensor nodes’ access to the
shared medium. So many MAC protocols have been developed for wireless voice and data
communication networks.
In our study to determine a good MAC protocol for the wireless sensor networks, we have
considered the following attributes. The first is the energy efficiency. Another important
attribute is the scalability of a WSN, to the change in network size, node density and
topology. The network topology and size can change over time as well due to many reasons.
A good MAC protocol should easily accommodate such network changes. Other important
attributes include fairness, latency, throughput and bandwidth utilization.
A suitable medium access control (MAC) protocol can maximize the whole network lifetime.
This project focuses on a protocol solution that deals with MAC layer which will minimize
the energy consumption and the latency encountered while transmuting packets across the
network.
In Chapter 3, we compare the various MAC (Media Access Control) protocols and
analyze the essential components of an energy efficient MAC protocol.
In Chapter 5, Adaptive S-MAC protocol and how it addresses various issues not
solved by S-MAC, will be explained.
2.1 Introduction
Figure 1 A Wireless Sensor Network is shown here. This figure emphasizes the range of
applications in which a WSN is used. Various environments are studied and data is collected
which are then transmitted over long distance via the gateway.
Wireless Sensor Networks are networks that usually consist of a large number of
widely distributed sensing devices that are equipped to monitor physical or environmental
phenomena. These devices work autonomously and are logically linked by self-organizing
means.
The ideal wireless sensor is networked and scalable, consumes very little power, can
change its active time interval according to the traffic condition, capable of fast data
acquisition, costs little to purchase and install, and requires no real maintenance [1].
A wireless sensor network (WSN) generally consists of a base station (or “gateway”)
that can communicate with a number of wireless sensors via a radio link. Data is collected at
the wireless sensor node, compressed, and transmitted to the gateway directly or, if required,
Figure 2 This figure shows the simple breakdown of a WSN. The blue circles represent the
sensor nodes which collect data from the environment. Data is received at cluster heads
represented by green hexagons which in turn is connected to a gateway.
Besides WSNs should be able to function seamlessly without any human intervention
as it not viable to involve human support in harsh environment.
Power Consumption:
The nodes of Wireless Sensor Networks are usually battery powered because
of their size. This limits the lifetime of a sensor node and raises the topic of energy-
efficiency in all aspects.
Node size:
Miniaturization is the keyword in many studies about WSNs. Developing
smaller nodes, with the same or even more efficiency than bigger nodes is a
2.2 Working
Wireless Sensor Networks forms a class of special wireless ad hoc networks. A
wireless ad hoc network is a collection of wireless nodes that communicate directly over a
common shared medium. Therefore, every node is equipped with a wireless transceiver and
has to be able to act as a router, to process packets and to transmit data to its destinations.
The main difference between common ad hoc networks and Wireless Sensor
Networks is their area of application. For WSNs, the focus is more on monitoring and
collecting data, while common ad hoc networks focus more on the communication aspects.
2.2.1 Sensor node
Figure 3 A Sensor Node and its Components are exhibited in the figure. These components
gather process and transmit data and are internally linked by an operating system.
There are several hardware components that make up a typical sensor node:
1) Low-power embedded processor:
The computational tasks on a WSN device include the processing of both locally
sensed information as well as information communicated by other sensors. Currently,
primarily due to economic reasons, the embedded processors are often substantially
limited in terms of computational power (small MHz area). Due to the constraints of such
processors, devices typically run specialized component-based embedded operating
systems, such as TinyOS. They incorporate advanced low-power design techniques, such
as sleep modes and dynamic voltage scaling to provide energy savings.
2) Memory/storage:
In the storage, both, program memory (memory for the instruction set of the
processor) and data memory (for storing measured data and other local information, e.g.
the location of the node) are included. The size of the memory is often limited due to
economic reasons. With the ongoing price-reduction of memory devices, the quantities of
storage and memory used on sensor nodes increase over time.
3) Radio transceiver:
WSN devices include a low-rate, short-range wireless radio (10–100 kbps, <100m).
While currently quite limited in capability too, these radios are likely to improve in
sophistication over time – including improvements in cost, spectral efficiency, tunability,
and immunity to noise, fading, and interference. Radio communication is often the most
power-intensive operation in a WSN device, and hence the radio must incorporate
energy-efficient sleep and wake-up modes.
6) Power Source:
Usually, the power source is a small battery. The finite battery power is likely to be
the bottleneck in most WSN applications. However, in some applications, a couple of
nodes may be wired to continuous power source or energy harvesting techniques may
provide a small amount of renewed energy.
Figure 4 The schematic diagram of the components in a Sensor Node is shown here. All the
connections between components which were discussed earlier are shown.
The most common architecture followed in WSNs is the two-tier hierarchical cluster
architecture. In this topology, the nodes within a particular region collect data from the
Figure 5 Two tier hierarchical architecture followed by WSN is shown in this figure. The 1st
tier consists of sensor nodes grouped in form of clusters whereas the 2nd consists of cluster
heads.
3.1 INTRODUCTION
Networking unattended sensor nodes may have profound effect on the efficiency of
many military and civil applications such as target imaging, intrusion detection, weather
monitoring, security and tactical surveillance, distributed computing, detecting ambient
conditions such as temperature, movement, sound, light, or the presence of certain objects,
inventory control, and disaster management.
Wireless Sensor Networks are a class of wireless ad hoc networks that pose unique
design challenges for their developers. The sensor nodes are normally battery-powered and
therefore their lifetime is limited. Typically, these batteries also cannot be changed. Since
energy is a valuable resource in WSNs, energy-efficient routing is one of the most important
aspects of increasing the life span of sensors.
One of the factors, of energy-efficient routing, is the strategy of picking a route between two
nodes.
The challenges for the strategy are:
1) Number of transmissions:
The number of transmissions until a packet reaches its destination should be as small
as possible due to the fact that every transmission between two nodes uses energy. If the
strategy minimizes the re-transmissions, it will also minimize the energy consumption.
2) Balanced use of nodes:
The use of the nodes for the routing has to be balanced between all the nodes. If some
nodes are used distinctly more than others, their battery-power will decrease faster and
will expire sooner. Too many dead sensor nodes could result in a partition of the network,
which would make communication impossible.
3) Delay:
For many applications of WSNs, it is important that the delay of the transmission is
not too big. It is desirable, that the strategy comes to a compromise between overhead and
delay.
4) Balancing the previous aspects:
The routing strategy has to be aware of the energy resources that are left and has to
balance all the previous aspects to produce the best possible solution.
Collision: A collision can occur when a node receives two signals or more simultaneously
from different sources that transmit at the same time. This leads to corruption of data packets
at the receiver. Hence the transmitter got to send the packet again. Collision can be removed
in schedule-based MAC protocols however; it is a concern issue in contention-based
protocol.
Idle listening: A node doesn’t know when will be receiving a frame so it must maintain
permanently its radio in the ready to receive mode, as in the wireless network protocol (IEEE
802.11). This mode consumes a lot of energy, nearly equal to the one consumed in receipt
mode.
Overhearing: This happens when a node receives packets that are not destined for it or
when a redundant broadcast takes place.
Control packet overhead: The RTS/CTS (Request to Send /Clear to Send) used by some
protocols transport no information whereas their transmission consumes energy. Note that the
traffic generated by control frames in sensors network is far from being negligible, it could
represent until 70% of the global traffic. Hence it shows energy wastage due to control packet
overhead is not less in magnitude.
4.1 INTRODUCTION
The S-MAC protocol (Sensor MAC) is a protocol specifically designed for usage in
Wireless sensor networks and is designed by Wei Ye. S-MAC is a contention-based protocol,
designed to reduce energy consumption from the sources of energy loss: idle listening,
collision, overhearing and control overhead. Periodic sleep technique is used in this protocol
to achieve low duty cycle that reduces energy consumption significantly. It uses virtual
carrier sense technique to reduce collision avoidance and in-channel signaling to implement
overhearing avoidance. S-MAC fragments the long message into many small parts and
transmits them in burst to reduce contention and communication overhead.
It is a stable MAC protocol used specifically for the WSN. S-MAC reduces energy
consumption by allowing the nodes to periodically turn off their radio receivers (and any
other resources that have no work to do) and enter a low power sleep state. The duty cycle of
a node is the ratio of the time it is active (i.e. not in the sleep state) to the total time. The
lower the duty cycle, the lower is the power consumption of a sensor node. In S-MAC the
channel access is done using a scheme similar to the IEEE802.11 distributed coordination
function. However, unlike the IEEE 802.11 MAC protocol, the intervals during which
contention can occur are scheduled. S-MAC, therefore, combines the features of both
contention based as well as time scheduled protocols. Even though the contention interval in
S-MAC is scheduled, S-MAC requires much looser time synchronization than TDMA based
protocols. Furthermore, S-MAC does not suffer from the limited scalability generally
associated with TDMA schemes [9].
4.2 Working
S-MAC carries out energy conservation by making the nodes to periodically listen for
any communication for a short interval and then allowing them to sleep; if and only if the
node is not involved in data transmission, for the rest of a pre-determined duration (a frame).
The listen interval and the sleep interval for a node occur according to a schedule which can
of its own or it follows a schedule of another node. S-MAC follows a mechanism which
enables the nodes to learn the sleep schedules of the nodes in their neighborhood, and using
Figure 6 Basic Scheme of SMAC protocol is shown here. The entire lifetime of a WSN
consists of active and sleep time intervals which takes place one after another.
The S-MAC protocol’s main focus is to keep the active state of a node to a minimum. It
accomplishes this in various ways:
Scheduling.
Collision avoidance.
Overhearing avoidance.
Message passing.
Figure 7 SMAC Frame is shown in detail here. Here the listen interval consists of SYNC
pulse used for synchronization between two nodes, RTS and CTS pulses used for contention
purposes.
The listen interval is divided into three sub-intervals. Two of these intervals are used for an
exchange of RTS and CTS control frames to avoid the hidden terminal problem in the way the
RTS-CTS exchange is used in the IEEE 802.11 MAC protocol. The protocol uses both
physical and virtual carrier sensing for collision avoidance.
In virtual carrier sensing, the RTS and CTS frames carry a time field indicating the
remaining duration of the transmission of the message. The node records this value in a
variable called the network allocation vector (NAV) and sets a timer for it. The node
decrements the NAV value until it reaches zero. When a node has data to send, it first looks
at the NAV. If its value is not zero, the node determines that the medium is busy and goes
back to sleep
4.2.2 SCHEDULING
Since the nodes periodically sleep with their radios turned off, a node must know the
listen and sleep schedule of a neighbor with which it wishes to communicate. Nodes
exchange their schedules by periodically broadcasting a special control frame, the sync frame.
The protocol requires each node to broadcast a sync frame at least once in a predetermined
Once a node has chosen a schedule using the procedure described above, it continues to
broadcast this schedule in a sync frame at least once in a synchronization period.
S-MAC has an efficient method which it follows in order to pass large messages
around the network. Large messages that are transmitted as one large packet are inefficient as
this has a huge probability of failure in noisy environments. If packets are fragmented the
chances of failure are smaller, but this increases the control overhead as each packet needs a
RTS CTS packet. SMAC works around this by sending "bursts" of data using only one RTS
CTS pair. There is a possibility of a new node entering the range of the transmitting node and
this scenario might disrupt the current transmission. This way the node knows that a
transmission is in progress and will remain silent. Nodes on waking up will expect a clear
Figure 9 Overhearing Avoidance is shown using the above figure. In the above figure 9, A,
B, C, D, E, and F forms a multi-hop network where each node can only hear the
transmissions from its immediate neighbors.
Node A is currently transmitting a data packet to B. Node D should go to sleep since its
transmission interferes with B’s reception. Node E and F do not produce interference, so
they do not need to go to sleep. C is two-hop away from B, and its transmission does not
interfere with B’s reception, so it is free to transmit to its other neighbors like E. However, C
is unable to get any reply from E, e.g., CTS or data, because E’s transmission collides with
A’s transmission at node C. So C’s transmission is simply a waste of energy [4].
Sleep delay
This is an extra kind of delay in S-MAC caused by the nodes periodic sleeping.
Ds = Tframe/2 (1)
Where,
Tframe = Tlisten + Tsleep (2)
Es =Tsleep/Tframe
=1- (Tlisten/Tframe) (4)
So from equation 4 we can see, lesser the duty cycle more is the energy saving.
5.1 INTRODUCTION
In the earlier chapter we have studied SMAC protocol in detail and also have shown
the advantages SMAC protocol gives over the other MAC protocols. Even then we have seen
that the S-MAC protocol can only be implemented provided a trade-off is made between the
energy used for throughput and the latency. The throughput is reduced because only the
active part of the frame is used for communication. The latency is increased because a
message generating event may occur during the sleeping part. In this case, the message will
be queued until the start of the next active part.
To solve this problem, the ASMAC (ADAPTIVE SMAC) protocol was proposed.
ASMAC, which adds flexibility to S-MAC's duty cycle, can be adapted to the network traffic
state. A node will keep listening, and potentially transmitting, as long as it is in an active
period. Therefore, ASMAC is more energy efficient than S-MAC [2].
Figure 10 Example of SMAC protocol’s unnecessary active intervals are shown in the
above figure. Looking at the above figure we can see that S-MAC has unnecessary active
intervals. When burst messages are generated in part A and there are no messages in parts B
and C, unnecessary active intervals occur which decrease the energy efficiency.
Adaptive S-MAC is a protocol that dynamically changes the entire frame size by
adjusting the network frame states. The fundamental idea is to decide whether the interval is
to be spent in the active or sleep state by means of a two bit flag that records the data
generation, transmission and reception. In adaptive S-MAC, if the flag value is 0, in the next
active interval the node will sleep and when the flag value changes to 1 in this sleeping active
interval, in the next active interval node wakes up and can sense the messages. [3].
Figure 11 Basic working of AS-MAC protocol is shown. The figure 11 signifies that the
active interval is determined by the flag value. If the flag value is 0 in the previous active
interval, during the next active interval, node follows its sleeping schedule. On the other
hand, if the flag value is 1, then the next active interval has an active schedule [3].
. In the case where no message is generated, as in the case of Frames A, B and D, the
entire frame length is prolonged, whereas in the case where a message is generated, as in the
case of Frame C, the frame interval is reduced. In this manner, adaptive S-MAC can
dynamically control the entire frame length according to the network traffic state.
The above proposed adaptive S-MAC protocol is useful when the data rate is moderate or
low. The adaptive S-MAC gives better power conservation with increased latency due to the
lower duty cycle used when traffic load is low. In the lifetime of a WSN, during certain time
period, when the activity of the environment increases, the rate of the fundamental S-MAC
Henceforth in this report wherever AS-MAC protocol is mentioned, it will denote the
improved AS-MAC protocol proposed by us.
Figure 12 Moore state machine diagram for the AS-MAC protocol I shown in the given
figure. The above figure 11, the Moore machine has 5 states based on network traffic. Here 1
denotes the data being sensed by a WSN node and 0 data not sensed by the WSN in its active
period. The states are based on the duty cycles. The frame length of the WSN node depends
on the current state.
Table 1
Figure 13 Scenario 1 of AS-MAC protocol is shown. We can see that at state A when there’s
incoming data the node moves into state B and at this particular state if no data is received ,
then node moves back to state A.
Figure 14 Scenario 2 of AS-MAC protocol is shown. Here we see that the node moves all the
way into state C from state A, following the Moore state machine diagram. At state C it
doesn’t receive any data. So it moves back into state A.
5.2.2 Synchronization
When the node synchronizes with its neighbors, AS-MAC operates just like SMAC
protocol. Especially, when the SYNC packets are sent to the neighbors or the cluster head,
they contain the schedule .A node fundamentally stays in state A or has largest frame length.
But that does not matter because as soon as it gets SYNC packet from its neighbor it starts
following the schedule contained in the SYNC packet [3].
Figure 16 Synchronization of AS-MAC protocol is shown here. In the above figure it can
be seen that B has a different duty cycle and also has a clock drift with respect to A. So when
A is looking to communicate with B it sends a SYNC packet containing its schedule. B
updates its schedule upon receiving it.
Figure 17 Operation of a node with its neighbors following AS-MAC protocol is seen here.
The figure shows the schedules of the neighbor nodes in the case of transmission, after
synchronizing with the neighbors.
In State 1, node 3 sends a RTS packet to node 2 requesting permission to transmit. If node
2 is ready to receive the messages, it sends a CTS packet to node 3. As in State 2, nodes 2 and
3 send and receive DATA and ACK packets to each other. At this time, nodes 2 and 3 follow
the same schedule with their corresponding flag values and while staying in the same states,
so nodes 2 and 3 function using half or double of their usual frame size. In this situation,
nodes 1 and 4 enter sleep mode, because of the duration in the header of nodes 2 and 3's
DATA and ACK packets. As a result, nodes 0 and 5 don't send or receive messages and
maintain an established frame length.
When a node sends to its neighboring nodes using the S-MAC protocol, it takes
carrier sensing time and latency by the end of the sleep interval. Therefore, we can obtain the
latency of a single-hop communication experienced in the network as follows:
The sleep delay is a random variable from (0, Tf).Therefore the expression for average
delay of S-MAC is
E(D)= E(Tcs + Ttx + Ts)
For Adaptive S-MAC, as described above, we assume three duty cycle levels. Let pl,
p2 and p3 denote probabilities that Tf /2, Tf and 2 Tf are the adjusted duty cycles in
algorithm, respectively. We have
Simulation Parameters
Parameter Value
Table 2
The simulation parameters can vary with hardware aspects of the WSN nodes.
Depending on requirement and resources we can have different battery power, bandwidth etc
parameters.The purpose of the simulation is to compare between S-MAC and A-SMAC with
same parameters for both. The functionality of the protocol is more important than the
numerical values of parameters and results. If the protocol simulation gives desired results it
should definitely work for other simulation parameters also.
1400
SMAC
1200
Avereage Energy left in the nodes(millijoules)
1000
Without SMAC
800
600
400
200
0
0 20 40 60 80 100 120 140 160
Time of Simulation
Figure 18
Figure 18 compares the energy efficiencies of SMAC with IEEE 802.11 protocol.
By 100 second the battery power of IEEE 802.11 is exhausted but S-MAC nodes still
have a lot of residual energy left. From the graph above it can be seen that the energy
efficiency of S-MAC is more than 10 times that of IEEE 802.11.The time of exhaustion
for 802.11 can vary with the simulation parameters but the network employing 802.11
will always die before a WSN using S-MAC protocol.
2.5
1.5
0.5
0
0 10 20 30 40 50 60 70 80
Duty Cycle Percentage
Figure 19
Figure 19 is a plot of number of packets sent against the duty cycle. We can get an
idea about the latency of the WSN from this curve. This curve also shows the tradeoff
between duty cycle and the latency. As we increase the duty cycle more packets are sent
hence less the latency whereas as we move towards the right less packets are sent
indicating more latency. So lesser the duty cycle or time of listening, more is the power
conservation but latency performance depletes.
100
80
Percentage of Nodes Alive
60
40
20
0
0 100 200 300 400 500 600 700 800 900 1000 1100
Time of simulation in milliseconds
Figure 20
Figure 21
The curve is a plot of average power consumption of a node against packets per unit
time. The x axis shows the activity of the network. When the packets are less frequent the
AS-MAC adapts to lower frame length and hence the power consumption is much lesser than
the S-MAC. As packets per unit time increases, the frame length also increases and so is the
power consumption. Since a WSN is mostly inactive during its life time so we can say that
power conservation is more as compared to S-MAC. The power consumption is significantly
higher when activity is higher than about 15 packets per unit time. Though this should be
looked at qualitatively, as the values will differ with hardware and environment .When the
Figure 22
One of the primary objectives for implementing AS-MAC was to prevent loss of data.
The AS-MAC performs remarkably better than S-MAC here. With packet loss of AS-MAC
and S-MAC being almost same when packets are less frequent the packet loss of S-MAC
increases at a greater rate than that of AS-MAC. S-MAC finds it difficult to keep up with the
messages generated. It may be possible that at very high rate even AS-MAC will show high
packet loss. This is particularly useful when WSN is deployed in a very dynamic situation
where different data is generated very frequently. When the same kind of data is generated S-
MAC will do the job as there will be redundancy in data.
Figure 23
For the latency simulation we have considered carrier sense delay, transmission delay
and sleep delay. The sizes of RTS, CTS and bandwidth gives the carrier sense delay while the
packet size gives the transmission delay. The latency is about 50ms when there is no collision
and when a node looking to send a data doesn’t encounter the cluster head to be busy.
Delays can be categorized into two kinds of delays, the fixed delays and the variable
delays. Carrier sense delay and transmission delay are the fixed delays depending on
contention window size and packet size as well as the bandwidth of the system. The variable
delays are the sleep delay and the back off delay. The listen time is 300 milliseconds. These
delays can be large as the sleep period is in the order of seconds due to focus on power
conservation. So when a collision occurs the node goes to sleep and retransmits after it wakes
up. Longer listening time reduces the latency so when the packets per unit time are low the S-
MAC which has a larger duty cycle gives better latency performance. As the transmission
rate increases the AS-MAC reduces the sleep time enhancing its latency performance. When
The latency starts decreasing after 8 packets per unit time due to collisions and back off
delay. The AS-MAC gives a much lesser latency than S-MAC here. So for the latency aspect,
in a low activity region S-MAC performs better while AS-MAC performs better in a highly
active WSN.
The simulation of S-MAC protocol gave the expected results with improved energy
conservation, which is the primary issue in a WSN. Also in a WSN following S-MAC
protocol, there is a trade-off between energy efficiency and latency which varies according to
traffic conditions. The AS-MAC protocol when implemented takes care of both unnecessary
energy consumption as well as latency. It adds flexibility to the WSN in a manner not fully
provided by the conventional S-MAC protocol. Besides, ASMAC protocol provides a
solution to the secondary issue of packet loss. For the given simulation parameters the
ASMAC protocol was successfully implemented. Graphs were plotted using the various data
taken from the results of the simulation. Graphs were plotted for variation of power
consumption ,latency performance and packet loss with packets per unit time .From the
above results we can clearly say that ASMAC protocol provides better energy conserving
properties when compared to SMAC protocol.
[2] Wei Ye, Member, IEEE, John Heidemann, Member, IEEE, and Deborah Estrin, Fellow,
IEEE, “Medium Access Control With Coordinated Adaptive Sleeping for Wireless Sensor
Networks” , IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 3, JUNE 2004.
[3] Dae-Suk Yoo, Su-Sung Park, Seung Sik Choi and Se Hwa Park ,“Dynamic S-MAC
protocol for Wireless Sensor Networks based on Network Traffic States”, Proceedings of
APCC, October 2008,Tokyo,Department of Computer Science, University of Incheon.
Dohwa-dong Nam-gu Incheon, South Korea.
[4] Subah Ramakrishnan, Hong Huang, Manikanden Balakrishnan and John Mullen, “Impact
of Sleep in a Wireless Sensor MAC Protocol”, 60th Vehicular Technology ConferenceIEEE
VTS Fall 60th Vehicular Technology Conference IEEE Vehicular Technology Conference
No60, Los Angeles CA, Klipsch School of Electrical Engineering, New Mexico State
University, Las Cruces, USA.
[5]Suresh Singh and C.S. Raghavendra, “PAMAS protocol with signaling for Adhoc
networks”, Oregon State University,Corvallis.
[6] Tamer Nadeem and Ashok Agrawala, “Performance of IEEE 802.11 based Wireless
Sensor Networks in Noisy Environments”, Department of Computer Science, University of
Maryland.
[7] Anton Bilos and David Hardy, “Survey wireless sensor network MAC protocols”,
Technical University of Eindhoven, Eindhoven, The Netherlands.
[8] Ilker Demirkol, Cem Ersoy, and Fatih Alagöz, “MAC Protocols for Wireless Sensor
Networks: a Survey”.
[10] Wei Ye, Member, IEEE, John Heidemann, Member, IEEE, and Deborah Estrin, Fellow,
IEEE, “An Energy-Efficient MAC Protocol for Wireless Sensor Networks”.
[11] Victor Cionca, Thomas Newe and Vasile D˘adˆarlat, “TDMA Protocol Requirements for
Wireless Sensor Networks”, Electronic and Computer Engineering, University of Limerick,
Ireland.
[12] András Varga and Rudolf Hornig .“AN OVERVIEW OF THE OMNeT++
SIMULATION ENVIRONMENT”, OpenSim Ltd. , Budapest, Hungary.
[13] http://www.cs.berkeley.edu/˜awoo/smartdust/.
[15] Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David Culler and Kristofer Pister,
“System architecture directions for networked sensors,” in Proceedings of the 9th
International Conference on Architectural Support for Programming Languages and
Operating Systems, Cambridge, MA, USA, Nov. 2000, pp. 93–104, ACM.