Literature Review of MAC, Routing and Cross Layer Design Protocols for WSN

Literature Review of MAC, Routing and Cross Layer Design Protocols for WSN

Tayseer A. Al-Khdour, Uthman Baroudi
ISBN13: 9781466601017|ISBN10: 1466601019|EISBN13: 9781466601024
DOI: 10.4018/978-1-4666-0101-7.ch005
Cite Chapter Cite Chapter

MLA

Al-Khdour, Tayseer A., and Uthman Baroudi. "Literature Review of MAC, Routing and Cross Layer Design Protocols for WSN." Wireless Sensor Networks and Energy Efficiency: Protocols, Routing and Management, edited by Noor Zaman, et al., IGI Global, 2012, pp. 70-118. https://doi.org/10.4018/978-1-4666-0101-7.ch005

APA

Al-Khdour, T. A. & Baroudi, U. (2012). Literature Review of MAC, Routing and Cross Layer Design Protocols for WSN. In N. Zaman, K. Ragab, & A. Abdullah (Eds.), Wireless Sensor Networks and Energy Efficiency: Protocols, Routing and Management (pp. 70-118). IGI Global. https://doi.org/10.4018/978-1-4666-0101-7.ch005

Chicago

Al-Khdour, Tayseer A., and Uthman Baroudi. "Literature Review of MAC, Routing and Cross Layer Design Protocols for WSN." In Wireless Sensor Networks and Energy Efficiency: Protocols, Routing and Management, edited by Noor Zaman, Khaled Ragab, and Azween Bin Abdullah, 70-118. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-4666-0101-7.ch005

Export Reference

Mendeley
Favorite

Abstract

In this chapter, the authors present a literature review for MAC, routing, and cross layer design protocols proposed for WSN. This chapter consists of three sections. In the first section, the authors discuss in depth the most well-known MAC protocols for WSN. A comparison among theses protocols will be presented. Moreover, the major advantages and disadvantages of each protocol are discussed. The routing protocols for WSN are discussed in the second section. The discussed protocols are classified into data centric routing protocols, Hierarchical routing protocols, location based protocols, and QoS aware routing protocols. Moreover, A Classification of Routing Protocols based on the Application is presented in this section. In the third section, some cross layer design protocols are discussed. A comparison among the discussed protocols according to layers integrated, intended applications, cross-layer objectives, and the evaluation approach, is presented.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.