Open Access

An Adaptive Time-Spread Multiple-Access Policy for Wireless Sensor Networks

EURASIP Journal on Wireless Communications and Networking20072007:064238

DOI: 10.1155/2007/64238

Received: 27 October 2006

Accepted: 13 March 2007

Published: 3 May 2007


Sensor networks require a simple and efficient medium access control policy achieving high system throughput with no or limited control overhead in order to increase the network lifetime by minimizing the energy consumed during transmission attempts. Time-spread multiple-access (TSMA) policies that have been proposed for ad hoc network environments, can also be employed in sensor networks, since no control overhead is introduced. However, they do not take advantage of any cross-layer information in order to exploit the idiosyncrasies of the particular sensor network environment such as the presence of typically static nodes and a common destination for the forwarded data. An adaptive probabilistic TSMA-based policy, that is proposed and analyzed in this paper, exploits these idiosyncrasies and achieves higher system throughput than the existing TSMA-based policies without any need for extra control overhead. As it is analytically shown in this paper, the proposed policy always outperforms the existing TSMA-based policies, if certain parameter values are properly set; the analysis also provides for these proper values. It is also shown that the proposed policy is characterized by a certain convergence period and that high system throughput is achieved for long convergence periods. The claims and expectations of the provided analysis are supported by simulation results presented in this paper.


Authors’ Affiliations

Department of Informatics, Ionian University
Department of Informatics & Telecommunications, University of Athens, Panepistimiopolis


  1. Hekmat R, Mieghem PV: Interference in wireless multi-hop ad-hoc networks and its effect on network capacity. Wireless Networks 2004,10(4):389-399.View ArticleGoogle Scholar
  2. IEEE 802.11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications. November 1997. Draft Supplement to Standard IEEE 802.11, IEEE, New York, January 1999.Google Scholar
  3. Karn P: MACA - a new channel access method for packet radio. Proceedings of the ARRL/CRRL Amateur Radio 9th Computer Networking Conference, September 1990, Ontario, Canada 134-140.Google Scholar
  4. Bharghavan V, Demers A, Shenker S, Zhang L: MACAW: a media access protocol for wireless LAN's. Proceedings of the ACM Conference on Communications Architectures, Protocols and Applications (SIGCOMM '94), August-September 1994, London, UK 212-225.View ArticleGoogle Scholar
  5. Fullmer CL, Garcia-Luna-Aceves JJ: Floor acquisition multiple access (FAMA) for packet-radio networks. Proceedings of the ACM Conference on Communications Architectures, Protocols and Applications (SIGCOMM '95), August-September 1995, Cambridge, Mass, USA 262-273.Google Scholar
  6. Deng J, Haas ZJ: Dual busy tone multiple access (DBTMA): a new medium access controlfor packet radio networks. Proceedings of IEEE International Conference on Universal Personal Communications (ICUPC '98), October 1998, Florence, Italy 2: 973-977.Google Scholar
  7. Nelson R, Kleinrock L: Spatial TDMA: a collision-free multihop channel access protocol. IEEE Transactions on Communications 1985,33(9):934-944.MathSciNetView ArticleGoogle Scholar
  8. Ephremides A, Truong TV: Scheduling broadcasts in multihop radio networks. IEEE Transactions on Communications 1990,38(4):456-460. 10.1109/26.52656View ArticleGoogle Scholar
  9. Wang G, Ansari N: Optimal broadcast scheduling in packet radio networks using meanfield annealing. IEEE Journal on Selected Areas in Communications 1997,15(2):250-260. 10.1109/49.552074View ArticleGoogle Scholar
  10. Tang Z, Garcia-Luna-Aceves JJ: A protocol for topology-dependent transmission scheduling inwireless networks. Proceedings of IEEE Wireless Communications and Networking Conference (WCNC '99), September 1999, New Orleans, La, USA 3: 1333-1337.Google Scholar
  11. Dukes PJ, Colbourn CJ, Syrotiuk VR: Topology-transparent schedules for energy limited ad hoc networks. Proceedings of the 4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW '06), March 2006, Pisa, Italy 85-90.Google Scholar
  12. Bertsekas D, Gallager R: Data Networks. 2nd edition. Prentice-Hall, Englewood Cliffs, NJ, USA; 1992.MATHGoogle Scholar
  13. Nanda S, Goodman DJ, Timor U: Performance of PRMA: a packet voice protocol for cellular systems. IEEE Transactions on Vehicular Technology 1991,40(3):584-598. 10.1109/25.97513View ArticleGoogle Scholar
  14. Toumpis S, Goldsmith AJ: New media access protocols for wireless ad hoc networks based on cross-layer principles. IEEE Transactions on Wireless Communications 2006,5(8):2228-2241.View ArticleGoogle Scholar
  15. Chlamtac I, Farago A: Making transmission schedules immune to topology changes in multi-hop packet radio networks. IEEE/ACM Transactions on Networking 1994,2(1):23-29. 10.1109/90.282605View ArticleGoogle Scholar
  16. Ju J-H, Li VOK: An optimal topology-transparent scheduling method in multihop packet radio networks. IEEE/ACM Transactions on Networking 1998,6(3):298-306. 10.1109/90.700893View ArticleGoogle Scholar
  17. Cai Z, Lu M, Georghiades CN: Topology-transparent time division multiple access broadcast scheduling in multihop packet radio networks. IEEE Transactions on Vehicular Technology 2003,52(4):970-984. 10.1109/TVT.2002.807634View ArticleGoogle Scholar
  18. Oikonomou K, Stavrakakis I: Analysis of a probabilistic topology-unaware TDMA MAC policy for ad hoc networks. IEEE Journal on Selected Areas in Communications 2004,22(7):1286-1300. special issue on Quality-of-Service Delivery in Variable Topology Network 10.1109/JSAC.2004.829345View ArticleGoogle Scholar
  19. Oikonomou K, Stavrakakis I: Analysis of topology-unaware TDMA MAC policies for ad-hoc networks under diverse traffic loads. ACM Mobile Computing and Communications Review 2005,9(4):25-38. 10.1145/1096166.1096171View ArticleGoogle Scholar
  20. Oikonomou K, Stavrakakis I: Throughput analysis of an aloha-based MAC policy for ad-hoc networks. A Poster Session During the 4th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net '05), June 2005, Ile de Porquerolles, FranceGoogle Scholar
  21. Guanghu Z, Jiandong L, Min S, Lei Z: Topology-transparent schedule with reservation and carrier sense for multihop ad hoc networks. IEEE Communications Letters 2006,10(4):314-316. 10.1109/LCOMM.2006.1613758View ArticleGoogle Scholar
  22. Guanghui Z, Jiandong L, Min S, Changle L, Lei Z: Topology-transparent reservation time division multiple access protocol with MIMO links in multihop ad hoc networks. IEEE Communications Letters 2006,10(5):411-413. 10.1109/LCOMM.2006.1633340View ArticleMATHGoogle Scholar
  23. Deng Y-C, Hsu C-C, Lin F-C: An adaptive medium access control protocol for reliable broadcast and unicast in ad hoc networks. IEICE Transactions on Information and Systems 2006,E89-D(2):527-535. 10.1093/ietisy/e89-d.2.527View ArticleGoogle Scholar
  24. Basagni S, Bruschi D: A logarithmic lower bound for time-spread multiple-access (TSMA) protocols. Wireless Networks 2000,6(2):161-163. 10.1023/A:1019129328897View ArticleMATHGoogle Scholar
  25. Miorandi D, Tan H-P, Zorzi M: Ad hoc networks with topology-transparent scheduling schemes: scaling laws and capacity/delay tradeoffs. Proceedings of the 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt '06), April 2006, Boston, Mass, USA 213-221.Google Scholar
  26. Gupta P, Kumar PR: The capacity of wireless networks. IEEE Transactions on Information Theory 2000,46(2):388-404. 10.1109/18.825799MathSciNetView ArticleMATHGoogle Scholar
  27. Toumpis S, Goldsmith AJ: Capacity regions for wireless ad hoc networks. IEEE Transactions on Wireless Communications 2003,2(4):736-748.View ArticleGoogle Scholar
  28. Kozat U, Koutsopoulos I, Tassiulas L: A framework for cross-layer design of energy-efficient communication with QoS provisioning in multi-hop wireless networks. Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04), March 2004, Hong Kong 2: 1446-1456.Google Scholar


© K. Oikonomou and I. Stavrakakis. 2007

This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.