SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Medium Access Control Protocols
For wireless Sensor Network
By:
Ahmed Shamel Noori
supervised by:
Dr.En. Muhammed Najm Al-Salam
3/10/2017
Outline
 Introduction
 Background
 Performance Requirements
 MAC Protocols :
 Contention-based
 Schedule-based
 Hybrid
 Conclusion
Introduction
Wireless Sensor Networks are typically composed of a large number
of low-cost, low-power, multifunctional wireless devices deployed
over a geographical area in an ad hoc fashion and without careful
planning. sensing devices are resource constrained and therefore are
only capable of a limited amount of processing and communication.
The choice of the medium access control protocol is the major determining factor in
WSN performance
the MAC protocol functionalities are provided by the lower sublayer of the data link
layer (DLL). The higher sublayer of the DLL is referred as the logical link control
(LLC) layer.
Background
The MAC sublayer resides directly above the physical layer. It supports the
following basic functions:
‱ Framing – Define the frame format and perform data encapsulation and
decapsulation for communication between devices.
‱ Reliability – Ensure successful transmission between devices. (by sending acknowledgement
(ACK) messages and retransmissions when necessary).
‱ Flow Control – Prevent frame loss (swamping) through overloaded recipient buffers.
‱ Error Control – Use error detection or error correction codes to control the
amount of errors present in frames delivered to upper layers.
‱ Medium Access – Control which devices participate in communication at any time. Medium
access becomes a main function of wireless MAC protocols since broadcasts easily cause data
corruption through collisions.
Why do we need MAC?
● Wireless channel is a shared medium.
● Radios transmitting in the same frequency band interfere with each other.
The role of Medium Access Control
● Controls when and how each node can transmit in the wireless channel.
● Solves the contention and collision.
Performance Requirements
In trying to determine the performance requirements of MAC protocols, the scope
of research has been very broad, issues such as :
 Delay: refers to the amount of time spent by a data packet in the MAC layer
before it is transmitted successfully.
 Throughput: typically defined as the rate at which messages are serviced by a
communication system. It is usually measured either in messages per second or
bits per second.
 Robustness: defined as a combination of reliability, availability, and
dependability requirements, reflects the degree of the protocol insensitivity to
errors and misinformation.
Performance Requirements
 Scalability: refers to the ability of a communications system to meet its
performance characteristics regardless of the size of the network or the number
of competing nodes.
 Stability: refers to the ability of a communications system to handle
fluctuations of the traffic load over sustained periods of time.
 Fairness: A MAC protocol is considered to be fair if it allocates channel
capacity evenly among the competing communicating nodes without unduly
reducing the network throughput.
 Energy: a sensor node is equipped with one or more integrated sensors,
embedded processors with limited capability, and short-range radio
communication ability.
Major Sources of Energy Wastes
● Control Packet Overhead
E.g., RTS/CTS
● Collision (RTS: Request To Send)
Retransmission (CTS: Clear To Send)
● Overhearing
The receiver of a packet is not the intended receiver of that packet
● Idle Listing
Listening to possible traffic that is not sent
Type of Multiple Access protocol
Fixed-Assignment Protocols ( Channelized protocol) In fixed-assignment strategies,
each node is allocated a predetermined fixed amount of the channel resources. his
category include frequency-division multiple access (FDMA), time-division multiple
access (TDMA), and code-division multiple access (CDMA).
Random Assignment Protocols In fixed-assignment schemes, each communicating
node is assigned a frequency band in FDMA systems or a time slot in TDMA systems.
This assignment is (static)
The ALOHA protocol (dynamic), also referred to as pure ALOHA, was one of the first
such media access protocols. improve the performance of pure ALOHA lead to the
development of several schemes, including carrier sense multiple access (CSMA),
carrier-sense multiple access with collision detection (CSMA/CD), and carrier-sense
multiple access with collision avoidance (CSMA/CA)
Type of Multiple Access protocol
PURE ALOHA
SLOTED ALOHA
 Every node senses the carrier before transmitting
 If the carrier is not clear, the node defers transmission for a specified period
Otherwise, transmits.
 While transmitting, the sender is listening to carrier and sender stops
transmitting if collision has been detected.
CSMA/CD (carrier sense multiple access/ collision detection)
Classification of MAC Protocols
Classification of MAC Protocols
 Contention-based protocols ( S-MAC , B-MAC )
1. S-MAC
 Basic Idea
Trades energy efficiency for lower throughput and higher latency
 Main Components
Periodic Listen and Sleep
Collision Avoidance
Overhearing Avoidance
Message Passing
Periodic Listen and Sleep
● Nodes periodically sleep
● Turn off radio when sleeping
● Reduce duty cycle to ~10%
● Trades energy efficiency for lower throughput and higher latency
Classification of MAC Protocols
Collision Avoidance
● Similar to IEEE 802.11
● Virtual Carrier Sense
● NAV (Network Allocation Vector)
● Physical Carrier Sense
● Four-way(steps) handshake
● RTS/CTS/DATA/ACK
Classification of MAC Protocols
Overhearing Avoidance
● The Basic Idea a node can go to sleep whenever its neighbor is talking with
another node.
● Who should sleep?
The immediate neighbors of sender and receiver.
● How do they know when to sleep?
By overhearing RTS or CTS.
● How long should they sleep?
NAV (Network Allocation Vector).
Classification of MAC Protocols
Message Passing
How to transmit a long message?
● Transmit it as a single long packet (Easy to be corrupted).
● Transmit as many independent packets (Higher Control Overhead & Longer Delay).
● Divide into fragments, but transmit all in burst.
Classification of MAC Protocols
Classification of MAC Protocols
2. B-MAC
 B-MAC is implemented in TinyOS.
 Major Feature: reconfigurable.
● Above B-MAC, one can implement an RTS-CTS scheme or a TDMS like
scheduling protocol.
 A small core of media access functionality
● arbitration, reliability, low power communication
2. B-MAC (Overview)
● Channel Arbitration
Clear Channel Assessment (CCA) & Backoffs
● Reliability
Link-layer acknowledgment
● Low Power Communication
Low Power Listening (LPL)
Classification of MAC Protocols
Classification of MAC Protocols
 Schedule-based MAC Protocols for WSNs
(Traditional TDMA MAC Protocols)
● Divide time into cycles
A cycle consists of several slots
● Advantages
Collision-Free, Low Idle Listing and Overhearing.
● Disadvantages
Synchronization, Low Channel Utilization
● An important Issue
Slot Assignment Strategy
Slot Assignment Strategy
A node should own a slot different from its one-hop and two-hop neighbors
Classification of MAC Protocols
Classification of MAC Protocols
 Hybrid (TDMA/CSMA)
● Z-MAC
● Funneling-MAC
1. Z-MAC (Zebra MAC)
● A hybrid TDMA and CSMA MAC scheme
● The main feature is its adaptability to the level of contention in the network
● under low contention, it behaves like CSMA, and
● under high contention, like TDMA
Classification of MAC Protocols
Funneling-MAC
● The authors propose a localized, sink-oriented funneling-MAC
● Localized
Using local TDMA scheduling in the intensity region only
● Sink-oriented
Manage TDMA scheduling
Compute and maintain the depth of the intensity region
Classification of MAC Protocols
Conclusion
● MAC Protocols in WSNs
● Energy Efficiency and Other Concerns
● Contention-based/Schedule-based/Hybrid
wireless sensor network

Weitere Àhnliche Inhalte

Was ist angesagt?

Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
Chandra Meena
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
Yara Ali
 
Wsn 08
Wsn 08Wsn 08
Wsn 08
hinalala
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
Habibur Rahman
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
rajivagarwal23dei
 
Transport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksTransport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networks
Rushin Shah
 

Was ist angesagt? (20)

WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC Protocol
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient Routing
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Traffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access ProtocolTraffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access Protocol
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architecture
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
Wsn 08
Wsn 08Wsn 08
Wsn 08
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Transport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksTransport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networks
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 

Andere mochten auch

wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
Eisha Madhwal
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
rajatmal4
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
Rushin Shah
 
SCiO Molecular Sensor from Consumer Physics: Mobile Spectrometer Dongle - tea...
SCiO Molecular Sensor from Consumer Physics: Mobile Spectrometer Dongle - tea...SCiO Molecular Sensor from Consumer Physics: Mobile Spectrometer Dongle - tea...
SCiO Molecular Sensor from Consumer Physics: Mobile Spectrometer Dongle - tea...
Yole Developpement
 
8279 in microprocessor
8279 in microprocessor8279 in microprocessor
8279 in microprocessor
Aisu
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
Piyush Mittal
 

Andere mochten auch (20)

wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
 
Arithmatic pipline
Arithmatic piplineArithmatic pipline
Arithmatic pipline
 
Consumer Physics SCiO Molecular Sensor Patent-to-Product Mapping Sample
Consumer Physics SCiO Molecular Sensor Patent-to-Product Mapping SampleConsumer Physics SCiO Molecular Sensor Patent-to-Product Mapping Sample
Consumer Physics SCiO Molecular Sensor Patent-to-Product Mapping Sample
 
fan speed control by using temperature sensor
fan speed control by using temperature sensorfan speed control by using temperature sensor
fan speed control by using temperature sensor
 
Instructions aeon labs door window sensor gen5
Instructions   aeon labs door window sensor gen5Instructions   aeon labs door window sensor gen5
Instructions aeon labs door window sensor gen5
 
Structural health monitoring
Structural health monitoringStructural health monitoring
Structural health monitoring
 
SCiO Molecular Sensor from Consumer Physics: Mobile Spectrometer Dongle - tea...
SCiO Molecular Sensor from Consumer Physics: Mobile Spectrometer Dongle - tea...SCiO Molecular Sensor from Consumer Physics: Mobile Spectrometer Dongle - tea...
SCiO Molecular Sensor from Consumer Physics: Mobile Spectrometer Dongle - tea...
 
Mit Vision-Sensoren Objekte und Szenarien erkennen und bewerten
Mit Vision-Sensoren Objekte und Szenarien erkennen und bewertenMit Vision-Sensoren Objekte und Szenarien erkennen und bewerten
Mit Vision-Sensoren Objekte und Szenarien erkennen und bewerten
 
DCMS AKCP Product Presentation
DCMS AKCP Product PresentationDCMS AKCP Product Presentation
DCMS AKCP Product Presentation
 
8279 in microprocessor
8279 in microprocessor8279 in microprocessor
8279 in microprocessor
 
paper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrokpaper presentation _ survey of wireless sensor netwrok
paper presentation _ survey of wireless sensor netwrok
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
Programação de Kits Lego NXT usando Linguagem Gråfica Nativa (ou NXT-G)
Programação de Kits Lego NXT usando Linguagem Gråfica Nativa (ou NXT-G)Programação de Kits Lego NXT usando Linguagem Gråfica Nativa (ou NXT-G)
Programação de Kits Lego NXT usando Linguagem Gråfica Nativa (ou NXT-G)
 
Surface Acoustic Wave (SAW) Wireless Passive RF Sensor Systems
Surface Acoustic Wave (SAW) Wireless Passive RF Sensor SystemsSurface Acoustic Wave (SAW) Wireless Passive RF Sensor Systems
Surface Acoustic Wave (SAW) Wireless Passive RF Sensor Systems
 
Contiki Operating system tutorial
Contiki Operating system tutorialContiki Operating system tutorial
Contiki Operating system tutorial
 

Ähnlich wie wireless sensor network

Demand assigned and packet reservation multiple access
Demand assigned and packet reservation multiple accessDemand assigned and packet reservation multiple access
Demand assigned and packet reservation multiple access
GowriLatha1
 

Ähnlich wie wireless sensor network (20)

Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
W13-L1&2.pptx
W13-L1&2.pptxW13-L1&2.pptx
W13-L1&2.pptx
 
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia NetworksA Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
 
Demand assigned and packet reservation multiple access
Demand assigned and packet reservation multiple accessDemand assigned and packet reservation multiple access
Demand assigned and packet reservation multiple access
 
Computer networks lan
Computer networks lanComputer networks lan
Computer networks lan
 
14653128.ppt
14653128.ppt14653128.ppt
14653128.ppt
 
Swayambhoo Presentation (2)
Swayambhoo Presentation (2)Swayambhoo Presentation (2)
Swayambhoo Presentation (2)
 
Ad-hoc.pdf
Ad-hoc.pdfAd-hoc.pdf
Ad-hoc.pdf
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...
 
The analysis of multichannel mac protocols
The analysis of multichannel mac protocolsThe analysis of multichannel mac protocols
The analysis of multichannel mac protocols
 
Mac
MacMac
Mac
 
ShortPaper
ShortPaperShortPaper
ShortPaper
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
CS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKSCS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKS
 
Frame relay
Frame relayFrame relay
Frame relay
 
Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3
 
Issues In Adhoc Wireless Network
Issues In Adhoc Wireless NetworkIssues In Adhoc Wireless Network
Issues In Adhoc Wireless Network
 
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
 

Mehr von A. Shamel

Mehr von A. Shamel (13)

Vmware Data Center Virtualization ESXI and vCenter
Vmware Data Center Virtualization ESXI and vCenterVmware Data Center Virtualization ESXI and vCenter
Vmware Data Center Virtualization ESXI and vCenter
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Foreigners Authentication Based on Multi-Biometric System for Iraq
Foreigners Authentication Based on  Multi-Biometric System for IraqForeigners Authentication Based on  Multi-Biometric System for Iraq
Foreigners Authentication Based on Multi-Biometric System for Iraq
 
Buses and protocol
Buses and protocolBuses and protocol
Buses and protocol
 
Serial connectors, Protocols , USB (universal serial bus)
Serial connectors, Protocols , USB (universal serial bus)Serial connectors, Protocols , USB (universal serial bus)
Serial connectors, Protocols , USB (universal serial bus)
 
Omnet sem
Omnet semOmnet sem
Omnet sem
 
Foc ch4
Foc ch4Foc ch4
Foc ch4
 
GSM & CDMA & OFDM
GSM & CDMA & OFDMGSM & CDMA & OFDM
GSM & CDMA & OFDM
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
 
Malicion software
Malicion softwareMalicion software
Malicion software
 
Analog communication
Analog communicationAnalog communication
Analog communication
 
Data base security and injection
Data base security and injectionData base security and injection
Data base security and injection
 
Adaptive filter
Adaptive filterAdaptive filter
Adaptive filter
 

KĂŒrzlich hochgeladen

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

KĂŒrzlich hochgeladen (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 

wireless sensor network

  • 1. Medium Access Control Protocols For wireless Sensor Network By: Ahmed Shamel Noori supervised by: Dr.En. Muhammed Najm Al-Salam 3/10/2017
  • 2. Outline  Introduction  Background  Performance Requirements  MAC Protocols :  Contention-based  Schedule-based  Hybrid  Conclusion
  • 3. Introduction Wireless Sensor Networks are typically composed of a large number of low-cost, low-power, multifunctional wireless devices deployed over a geographical area in an ad hoc fashion and without careful planning. sensing devices are resource constrained and therefore are only capable of a limited amount of processing and communication.
  • 4. The choice of the medium access control protocol is the major determining factor in WSN performance the MAC protocol functionalities are provided by the lower sublayer of the data link layer (DLL). The higher sublayer of the DLL is referred as the logical link control (LLC) layer. Background
  • 5. The MAC sublayer resides directly above the physical layer. It supports the following basic functions: ‱ Framing – Define the frame format and perform data encapsulation and decapsulation for communication between devices. ‱ Reliability – Ensure successful transmission between devices. (by sending acknowledgement (ACK) messages and retransmissions when necessary). ‱ Flow Control – Prevent frame loss (swamping) through overloaded recipient buffers. ‱ Error Control – Use error detection or error correction codes to control the amount of errors present in frames delivered to upper layers. ‱ Medium Access – Control which devices participate in communication at any time. Medium access becomes a main function of wireless MAC protocols since broadcasts easily cause data corruption through collisions.
  • 6. Why do we need MAC? ● Wireless channel is a shared medium. ● Radios transmitting in the same frequency band interfere with each other. The role of Medium Access Control ● Controls when and how each node can transmit in the wireless channel. ● Solves the contention and collision.
  • 7. Performance Requirements In trying to determine the performance requirements of MAC protocols, the scope of research has been very broad, issues such as :  Delay: refers to the amount of time spent by a data packet in the MAC layer before it is transmitted successfully.  Throughput: typically defined as the rate at which messages are serviced by a communication system. It is usually measured either in messages per second or bits per second.  Robustness: defined as a combination of reliability, availability, and dependability requirements, reflects the degree of the protocol insensitivity to errors and misinformation.
  • 8. Performance Requirements  Scalability: refers to the ability of a communications system to meet its performance characteristics regardless of the size of the network or the number of competing nodes.  Stability: refers to the ability of a communications system to handle fluctuations of the traffic load over sustained periods of time.  Fairness: A MAC protocol is considered to be fair if it allocates channel capacity evenly among the competing communicating nodes without unduly reducing the network throughput.  Energy: a sensor node is equipped with one or more integrated sensors, embedded processors with limited capability, and short-range radio communication ability.
  • 9. Major Sources of Energy Wastes ● Control Packet Overhead E.g., RTS/CTS ● Collision (RTS: Request To Send) Retransmission (CTS: Clear To Send) ● Overhearing The receiver of a packet is not the intended receiver of that packet ● Idle Listing Listening to possible traffic that is not sent
  • 10. Type of Multiple Access protocol
  • 11. Fixed-Assignment Protocols ( Channelized protocol) In fixed-assignment strategies, each node is allocated a predetermined fixed amount of the channel resources. his category include frequency-division multiple access (FDMA), time-division multiple access (TDMA), and code-division multiple access (CDMA). Random Assignment Protocols In fixed-assignment schemes, each communicating node is assigned a frequency band in FDMA systems or a time slot in TDMA systems. This assignment is (static) The ALOHA protocol (dynamic), also referred to as pure ALOHA, was one of the first such media access protocols. improve the performance of pure ALOHA lead to the development of several schemes, including carrier sense multiple access (CSMA), carrier-sense multiple access with collision detection (CSMA/CD), and carrier-sense multiple access with collision avoidance (CSMA/CA) Type of Multiple Access protocol
  • 14.  Every node senses the carrier before transmitting  If the carrier is not clear, the node defers transmission for a specified period Otherwise, transmits.  While transmitting, the sender is listening to carrier and sender stops transmitting if collision has been detected. CSMA/CD (carrier sense multiple access/ collision detection)
  • 16. Classification of MAC Protocols  Contention-based protocols ( S-MAC , B-MAC ) 1. S-MAC  Basic Idea Trades energy efficiency for lower throughput and higher latency  Main Components Periodic Listen and Sleep Collision Avoidance Overhearing Avoidance Message Passing
  • 17. Periodic Listen and Sleep ● Nodes periodically sleep ● Turn off radio when sleeping ● Reduce duty cycle to ~10% ● Trades energy efficiency for lower throughput and higher latency Classification of MAC Protocols
  • 18. Collision Avoidance ● Similar to IEEE 802.11 ● Virtual Carrier Sense ● NAV (Network Allocation Vector) ● Physical Carrier Sense ● Four-way(steps) handshake ● RTS/CTS/DATA/ACK Classification of MAC Protocols
  • 19. Overhearing Avoidance ● The Basic Idea a node can go to sleep whenever its neighbor is talking with another node. ● Who should sleep? The immediate neighbors of sender and receiver. ● How do they know when to sleep? By overhearing RTS or CTS. ● How long should they sleep? NAV (Network Allocation Vector). Classification of MAC Protocols
  • 20. Message Passing How to transmit a long message? ● Transmit it as a single long packet (Easy to be corrupted). ● Transmit as many independent packets (Higher Control Overhead & Longer Delay). ● Divide into fragments, but transmit all in burst. Classification of MAC Protocols
  • 21. Classification of MAC Protocols 2. B-MAC  B-MAC is implemented in TinyOS.  Major Feature: reconfigurable. ● Above B-MAC, one can implement an RTS-CTS scheme or a TDMS like scheduling protocol.  A small core of media access functionality ● arbitration, reliability, low power communication
  • 22. 2. B-MAC (Overview) ● Channel Arbitration Clear Channel Assessment (CCA) & Backoffs ● Reliability Link-layer acknowledgment ● Low Power Communication Low Power Listening (LPL) Classification of MAC Protocols
  • 23. Classification of MAC Protocols  Schedule-based MAC Protocols for WSNs (Traditional TDMA MAC Protocols) ● Divide time into cycles A cycle consists of several slots ● Advantages Collision-Free, Low Idle Listing and Overhearing. ● Disadvantages Synchronization, Low Channel Utilization ● An important Issue Slot Assignment Strategy
  • 24. Slot Assignment Strategy A node should own a slot different from its one-hop and two-hop neighbors Classification of MAC Protocols
  • 25. Classification of MAC Protocols  Hybrid (TDMA/CSMA) ● Z-MAC ● Funneling-MAC
  • 26. 1. Z-MAC (Zebra MAC) ● A hybrid TDMA and CSMA MAC scheme ● The main feature is its adaptability to the level of contention in the network ● under low contention, it behaves like CSMA, and ● under high contention, like TDMA Classification of MAC Protocols
  • 27. Funneling-MAC ● The authors propose a localized, sink-oriented funneling-MAC ● Localized Using local TDMA scheduling in the intensity region only ● Sink-oriented Manage TDMA scheduling Compute and maintain the depth of the intensity region Classification of MAC Protocols
  • 28. Conclusion ● MAC Protocols in WSNs ● Energy Efficiency and Other Concerns ● Contention-based/Schedule-based/Hybrid