SlideShare a Scribd company logo
1 of 40
Download to read offline
Wireless Sensor Network UNIT-2
Medium Access Control Protocol
for Wireless Sensor Network
A K DANIEL
MTECH 2020-21
Topics of Discussion
➢ Introduction
➢ Power consumption in WSN’s
➢ Wireless MAC protocols
➢ Differences and Constraints
➢ Attributes to WSN
➢ Wireless Sensor network MAC protocols
➢ Summary
Introduction
Wireless Sensor Network?
➢ It’s a collection of devices “ sensor nodes”
➢ They are small, inexpensive, with constrained power
➢ They are organized in a cooperative network
➢ They communicate wirelessly
in multi hop routing
➢ Heavily deployment
➢ Changing network topology
Introduction ( Cont. )
Component and Schematic of Node
➢ Processor.
➢ Memory.
➢ RF Radio.
➢ Power Source.
➢ Sensor.
➢ GPS Control
Signal
Processor
Sensors
Wireless
Transmit
ter/
Receiver
Processing
And
Decision
Making
Power
Introduction ( Cont. )
Goal of Wireless Sensor Network
➢ Collect data at regular intervals.
➢ Then transform data into an electrical signal.
➢ Finally, send the signals to the sink or the base nod.
Types of Wireless Sensor Network
➢ Temperature sensor.
➢ Light sensor.
➢ Sound sensor.
➢ Vibration Sensor.
Introduction ( Cont. )
Communication pattern:
➢ Broadcast : Base station transmits message to all its immediate
neighbors.
➢ Converge cast : a group of sensors communicates to a specific sensor
➢ Local gossip: a sensor node sends a message to its neighboring nodes
within a range.
Introduction ( Cont. )
Applications of Wireless Sensor
Network
➢ Global scale
➢ Battle field
➢ Factories
➢ Buildings
➢ Homes
➢ bodies
Power consumption in WSN’s
The power consumption in WSN’s is
one of the biggest challenges
because:
➢ Sensors have a limited source of power and it’s hard to replace or
recharge “ e.g sensors in the battle field, sensors in a large forest.. Etc”.
Power consumption in WSN’s
Energy consumption
of typical node
components.
Source: MAC Essentials for Wireless Sensor Networks
Sources of power consumption
in WSN’s
1- useful power consumption:
➢ Transmitting or receiving data.
➢ Processing queries requests.
➢ Forwarding queries and data to the neighbours.
Source of power consumption in WSN’s
( Cont. )
2- wasteful power consumption:
➢ Idle listening to the channel “ waiting for possible traffic”.
➢ Retransmitting because of collision: “ e.g two packets arrived at the
same time at the same sensor”
➢ Overhearing: when a sensor received a packet doesn’t belong it”.
➢ Generating and handling control packets.
How to minimize the energy consumption
of sensor nodes while meeting the
application requirements?
➢ Use Protocols that aim mainly to increase the sleep periods as much as
possible
Power consumption in WSN’s
Idle
Sleep
Transmissio
n
Reception
Another problem in Wireless Network
Hidden/Exposed terminal problem
Wireless MAC Protocols
Conventional of MAC Protocols
IEEE 802.11
CSMA CSMA/CA
Wireless MAC Protocols (Cont.)
1- CSMA :
➢ Non Persistent: if the device detects activity on the channel, it
performs a back off by waiting before attempting to transmit.
➢ P- Persistent: if it detects activity on the channel, it continuous to
sense the channel instead of delaying.
➢ CSMA requires devices to remain in the receive state when not
transmitting
Disadvantages: the transceiver consumes energy too quickly.
Wireless MAC Protocols (Cont.)
2- CSMA/CA :
➢ Control messages were introduced such as ( RTS and CTS) to reserve
the channel
➢ The source first performs CSMA algorithm
➢ If it determines appropriate time for transmission, it sends RTS
➢ Then, the destination responds with CTS
Disadvantages: it might still have some collision in RTS
Wireless MAC Protocols (Cont.)
3-IEEE 802.11 :
➢ Infrastructure mode :devices communicate through a central entity called
an access point (AP) using the point coordination function (PCF),
➢ Ad hoc mode: devices communicate with each other directly using the
distributed coordination function (DCF)
➢ Both the PCF and DCF use a channel access mechanism similar to
CSMA/CA and use acknowledgments for reliability.
➢ In addition to physical carrier sensing, IEEE 802.11 devices perform virtual
carrier sensing “ NAV”
Wireless MAC Protocols (Cont.)
802.11 Data Transfer
Disadvantages:
➢ IEEE 802.11 devices consume large amounts of energy due to the high percentage
of time spent listening without receiving messages
Differences and Constraints
Traditional MAC protocol provides:
➢ High throughput
➢ Low latency
➢ Fairness
➢ Mobility But : have little consideration for energy
Improved MAC protocol provides:
➢ Best performance of smallest amount of energy
Attributes to Wireless Sensor Networks
The following attributes should be taken in WSN
Energy conservation
➢ Scalability and adaptively
➢ throughput
➢ Fairness
➢ Latency
MAC protocol must achieve
➢ Establish communication link between the sensor nodes
➢ To share the communication medium fairly and efficiently
primary
goal
less
important
Wireless Sensor Network MAC Protocols
Medium Access Control
Scheduled
MAC
Unschedule
d MAC
Unscheduled MAC protocols ( Cont. )
1- Unscheduled MAC:
Strategy:
➢ Before sending a message, a sensor listens to the medium. If it’s busy,
wait a random time then retry again and if it’s free then it will send the
message.
Unscheduled MAC protocols ( Cont. )
Advantages:
➢ It can adapt for changes “ in the node density, traffic load or the
topology” better than scheduled protocol.
➢ The sensors don’t have to be synchronized together.
Disadvantages:
➢ It’s worst than scheduled MAC protocols from the power saving
perspective, since all sensors listen to the channel.
Unscheduled MAC protocols ( Cont. )
1.1- PAMAS: stands for Power Aware Multi-Access
Strategy : It uses multiple transceivers on each node
PAMAS Data Transfer
Unscheduled MAC protocols ( Cont. )
Advantages:
➢ Prevent collision
Disadvantages:
➢ Multiple radio requirement
➢ Increase energy consumption
➢ Increase device complexity and cost
Unscheduled MAC protocols ( Cont. )
1.2- STEM: stands for Sparse Topology and Energy Management
Strategy:
➢ uses two different channels, the wakeup channel and the data channel,
➢ requires two transceivers in each node
STEM duty cycle for single node
Unscheduled MAC protocols ( Cont. )
1.2.1- STEM-B:
Strategy : sensor nodes wakes a neighbour by transmitting a beacon
(no RTS/CTS )
advantages:
➢ Lower Latency
Disadvantages:
➢ More complex
➢ High energy consumption
Unscheduled MAC protocols ( Cont. )
1.2.2- STEM-T:
Strategy : sensor nodes wakes a neighbour by transmitting a tone of
sufficient length that destination will have a high probability of sensing
➢ Busy tone contains no destination address
Disadvantages:
➢ High latency
➢ Results in overhearing
Unscheduled MAC protocols ( Cont. )
1.3- B-MAC:
Strategy :
➢ It uses a tone to wake up sleeping neighbouring similar to STEM-T
➢ It uses very long preambles for message transmission.
B-MAC Data Transfer
Unscheduled MAC protocols ( Cont. )
disadvantages:
➢ B-MAC suffers from the overhearing problem
➢ The long preamble dominates the energy usage.
Unscheduled MAC protocols ( Cont. )
1.4- Wise MAC:
Strategy : it uses similar technique in B-MAC but it attempt to reduce the
energy consumption by having sensor nodes remember the sampling offset
of their neighbour
Wise MAC Data Transfer
Unscheduled MAC protocols ( Cont. )
advantages:
➢ It decreases the amount of time a sensor node transmits preambles and
the number of sensor nodes that overhear each message
Disadvantages:
➢ the cost of an extra field in the ACK messages and the memory required
to store neighbor’s sampling offsets.
WSN MAC protocols ( Cont. )
2- Scheduled MAC:
Strategy : it attempts to reduce the energy consumption by coordinating
sensor nodes with a common schedule
scheduled MAC protocols ( Cont. )
Advantages:
➢ Saving the power from being wasted by turning off the radio out the
allocated time slot.
➢ Limits the collision, idle listing, and overhearing
Disadvantages:
➢ when sensor node enters net, must wait till they learn, some delay exist
➢ Cost of increased messages
➢ Not flexible to changes in sensor density or movements.
➢ All sensors should be well synchronized.
scheduled MAC protocols ( Cont. )
2.1 - S-MAC:
Strategy :
➢ the sensor node periodically goes to the fixed listen/sleep cycle.
➢ A time frame in S-MAC is divided into two parts: one for a listening
session and the other for a sleeping session.
scheduled MAC protocols ( Cont. )
S-MAC Frame Format
scheduled MAC protocols ( Cont. )
Disadvantages:
➢ energy is still wasted in this protocol during listen period as the sensor
will be awake even if there is no reception/transmission.
Questions?
Tute questions (Q1)
802.11 Data Transfer
Q1: Why IEEE 802.11 defines a SIFS shorter than a DIFS ?
ANS: SIFS (Short Inter Frame Spacing) has ‰
highest priority, for ACK, CTS,
polling response while DIFS (Distributed Inter Frame Spacing) has
lowest priority, for asynchronous data service. Having SIFS smaller than
DIFS prevents ACK and important control packets from getting killed.
Thank you

More Related Content

Similar to MAC Protocol.pdf

Unit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxUnit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxABYTHOMAS46
 
A preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor NetworkA preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor Networkdiala wedyan
 
Energy-efficient MAC protocols for wireless sensor networks: a survey
Energy-efficient MAC protocols for wireless sensor networks: a surveyEnergy-efficient MAC protocols for wireless sensor networks: a survey
Energy-efficient MAC protocols for wireless sensor networks: a surveyTELKOMNIKA JOURNAL
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksJerry Yoakum
 
Communication and Networking
Communication and NetworkingCommunication and Networking
Communication and NetworkingJay Nagar
 
Versatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor NetworksVersatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor NetworksMichael Rushanan
 
Networking Technologies Basic's complete notes
Networking Technologies Basic's complete notesNetworking Technologies Basic's complete notes
Networking Technologies Basic's complete notesIndrajaMeghavathula
 
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...IJEEE
 
A Proximity based Retransmission Scheme for Power Line Ad-hoc LAN
A Proximity based Retransmission Scheme for Power Line Ad-hoc LAN A Proximity based Retransmission Scheme for Power Line Ad-hoc LAN
A Proximity based Retransmission Scheme for Power Line Ad-hoc LAN ijdpsjournal
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkdeawoo Kim
 
UNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdfUNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdfMathavan N
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
 

Similar to MAC Protocol.pdf (20)

Unit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxUnit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptx
 
A preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor NetworkA preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor Network
 
Energy-efficient MAC protocols for wireless sensor networks: a survey
Energy-efficient MAC protocols for wireless sensor networks: a surveyEnergy-efficient MAC protocols for wireless sensor networks: a survey
Energy-efficient MAC protocols for wireless sensor networks: a survey
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
WSN
WSNWSN
WSN
 
WSN
WSNWSN
WSN
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Communication and Networking
Communication and NetworkingCommunication and Networking
Communication and Networking
 
Versatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor NetworksVersatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor Networks
 
Networking Technologies Basic's complete notes
Networking Technologies Basic's complete notesNetworking Technologies Basic's complete notes
Networking Technologies Basic's complete notes
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
 
A Proximity based Retransmission Scheme for Power Line Ad-hoc LAN
A Proximity based Retransmission Scheme for Power Line Ad-hoc LAN A Proximity based Retransmission Scheme for Power Line Ad-hoc LAN
A Proximity based Retransmission Scheme for Power Line Ad-hoc LAN
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Wireless Local Area Network
Wireless Local Area NetworkWireless Local Area Network
Wireless Local Area Network
 
Manet
ManetManet
Manet
 
Manet
ManetManet
Manet
 
UNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdfUNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdf
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
 

More from AbyThomas54

base-band_digital_data_transmission-Line coding - Copy.ppt
base-band_digital_data_transmission-Line coding - Copy.pptbase-band_digital_data_transmission-Line coding - Copy.ppt
base-band_digital_data_transmission-Line coding - Copy.pptAbyThomas54
 
ch24-congestion-control-and-quality-of-service.ppt
ch24-congestion-control-and-quality-of-service.pptch24-congestion-control-and-quality-of-service.ppt
ch24-congestion-control-and-quality-of-service.pptAbyThomas54
 
Amplitude Modulation.ppt
Amplitude Modulation.pptAmplitude Modulation.ppt
Amplitude Modulation.pptAbyThomas54
 
Unit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.pptUnit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.pptAbyThomas54
 
Wireless Networks 120719.ppt
Wireless Networks 120719.pptWireless Networks 120719.ppt
Wireless Networks 120719.pptAbyThomas54
 
Unit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.pptUnit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.pptAbyThomas54
 
WirelessTechnologies.pptx
WirelessTechnologies.pptxWirelessTechnologies.pptx
WirelessTechnologies.pptxAbyThomas54
 
WirelessTechnologies.pptx
WirelessTechnologies.pptxWirelessTechnologies.pptx
WirelessTechnologies.pptxAbyThomas54
 
Routing_Techniques_in_Wireless_Sensor_Ne.ppt
Routing_Techniques_in_Wireless_Sensor_Ne.pptRouting_Techniques_in_Wireless_Sensor_Ne.ppt
Routing_Techniques_in_Wireless_Sensor_Ne.pptAbyThomas54
 
Flooding_vs_Gossiping_By_Debraj_Paul.pptx
Flooding_vs_Gossiping_By_Debraj_Paul.pptxFlooding_vs_Gossiping_By_Debraj_Paul.pptx
Flooding_vs_Gossiping_By_Debraj_Paul.pptxAbyThomas54
 
WSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.pptWSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.pptAbyThomas54
 

More from AbyThomas54 (17)

base-band_digital_data_transmission-Line coding - Copy.ppt
base-band_digital_data_transmission-Line coding - Copy.pptbase-band_digital_data_transmission-Line coding - Copy.ppt
base-band_digital_data_transmission-Line coding - Copy.ppt
 
Diode.ppt
Diode.pptDiode.ppt
Diode.ppt
 
ch24-congestion-control-and-quality-of-service.ppt
ch24-congestion-control-and-quality-of-service.pptch24-congestion-control-and-quality-of-service.ppt
ch24-congestion-control-and-quality-of-service.ppt
 
AMnew.ppt
AMnew.pptAMnew.ppt
AMnew.ppt
 
Amplitude Modulation.ppt
Amplitude Modulation.pptAmplitude Modulation.ppt
Amplitude Modulation.ppt
 
Unit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.pptUnit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.ppt
 
Wireless Networks 120719.ppt
Wireless Networks 120719.pptWireless Networks 120719.ppt
Wireless Networks 120719.ppt
 
Unit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.pptUnit 1-VoWiFi1.ppt
Unit 1-VoWiFi1.ppt
 
WLAN.pptx
WLAN.pptxWLAN.pptx
WLAN.pptx
 
WirelessTechnologies.pptx
WirelessTechnologies.pptxWirelessTechnologies.pptx
WirelessTechnologies.pptx
 
WLAN.pptx
WLAN.pptxWLAN.pptx
WLAN.pptx
 
WirelessTechnologies.pptx
WirelessTechnologies.pptxWirelessTechnologies.pptx
WirelessTechnologies.pptx
 
Routing_Techniques_in_Wireless_Sensor_Ne.ppt
Routing_Techniques_in_Wireless_Sensor_Ne.pptRouting_Techniques_in_Wireless_Sensor_Ne.ppt
Routing_Techniques_in_Wireless_Sensor_Ne.ppt
 
Flooding_vs_Gossiping_By_Debraj_Paul.pptx
Flooding_vs_Gossiping_By_Debraj_Paul.pptxFlooding_vs_Gossiping_By_Debraj_Paul.pptx
Flooding_vs_Gossiping_By_Debraj_Paul.pptx
 
WSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.pptWSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.ppt
 
Vo ip
Vo ipVo ip
Vo ip
 
Ch02
Ch02Ch02
Ch02
 

Recently uploaded

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 

Recently uploaded (20)

★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 

MAC Protocol.pdf

  • 1. Wireless Sensor Network UNIT-2 Medium Access Control Protocol for Wireless Sensor Network A K DANIEL MTECH 2020-21
  • 2. Topics of Discussion ➢ Introduction ➢ Power consumption in WSN’s ➢ Wireless MAC protocols ➢ Differences and Constraints ➢ Attributes to WSN ➢ Wireless Sensor network MAC protocols ➢ Summary
  • 3. Introduction Wireless Sensor Network? ➢ It’s a collection of devices “ sensor nodes” ➢ They are small, inexpensive, with constrained power ➢ They are organized in a cooperative network ➢ They communicate wirelessly in multi hop routing ➢ Heavily deployment ➢ Changing network topology
  • 4. Introduction ( Cont. ) Component and Schematic of Node ➢ Processor. ➢ Memory. ➢ RF Radio. ➢ Power Source. ➢ Sensor. ➢ GPS Control Signal Processor Sensors Wireless Transmit ter/ Receiver Processing And Decision Making Power
  • 5. Introduction ( Cont. ) Goal of Wireless Sensor Network ➢ Collect data at regular intervals. ➢ Then transform data into an electrical signal. ➢ Finally, send the signals to the sink or the base nod. Types of Wireless Sensor Network ➢ Temperature sensor. ➢ Light sensor. ➢ Sound sensor. ➢ Vibration Sensor.
  • 6. Introduction ( Cont. ) Communication pattern: ➢ Broadcast : Base station transmits message to all its immediate neighbors. ➢ Converge cast : a group of sensors communicates to a specific sensor ➢ Local gossip: a sensor node sends a message to its neighboring nodes within a range.
  • 7. Introduction ( Cont. ) Applications of Wireless Sensor Network ➢ Global scale ➢ Battle field ➢ Factories ➢ Buildings ➢ Homes ➢ bodies
  • 8. Power consumption in WSN’s The power consumption in WSN’s is one of the biggest challenges because: ➢ Sensors have a limited source of power and it’s hard to replace or recharge “ e.g sensors in the battle field, sensors in a large forest.. Etc”.
  • 9. Power consumption in WSN’s Energy consumption of typical node components. Source: MAC Essentials for Wireless Sensor Networks
  • 10. Sources of power consumption in WSN’s 1- useful power consumption: ➢ Transmitting or receiving data. ➢ Processing queries requests. ➢ Forwarding queries and data to the neighbours.
  • 11. Source of power consumption in WSN’s ( Cont. ) 2- wasteful power consumption: ➢ Idle listening to the channel “ waiting for possible traffic”. ➢ Retransmitting because of collision: “ e.g two packets arrived at the same time at the same sensor” ➢ Overhearing: when a sensor received a packet doesn’t belong it”. ➢ Generating and handling control packets.
  • 12. How to minimize the energy consumption of sensor nodes while meeting the application requirements? ➢ Use Protocols that aim mainly to increase the sleep periods as much as possible Power consumption in WSN’s Idle Sleep Transmissio n Reception
  • 13. Another problem in Wireless Network Hidden/Exposed terminal problem
  • 14. Wireless MAC Protocols Conventional of MAC Protocols IEEE 802.11 CSMA CSMA/CA
  • 15. Wireless MAC Protocols (Cont.) 1- CSMA : ➢ Non Persistent: if the device detects activity on the channel, it performs a back off by waiting before attempting to transmit. ➢ P- Persistent: if it detects activity on the channel, it continuous to sense the channel instead of delaying. ➢ CSMA requires devices to remain in the receive state when not transmitting Disadvantages: the transceiver consumes energy too quickly.
  • 16. Wireless MAC Protocols (Cont.) 2- CSMA/CA : ➢ Control messages were introduced such as ( RTS and CTS) to reserve the channel ➢ The source first performs CSMA algorithm ➢ If it determines appropriate time for transmission, it sends RTS ➢ Then, the destination responds with CTS Disadvantages: it might still have some collision in RTS
  • 17. Wireless MAC Protocols (Cont.) 3-IEEE 802.11 : ➢ Infrastructure mode :devices communicate through a central entity called an access point (AP) using the point coordination function (PCF), ➢ Ad hoc mode: devices communicate with each other directly using the distributed coordination function (DCF) ➢ Both the PCF and DCF use a channel access mechanism similar to CSMA/CA and use acknowledgments for reliability. ➢ In addition to physical carrier sensing, IEEE 802.11 devices perform virtual carrier sensing “ NAV”
  • 18. Wireless MAC Protocols (Cont.) 802.11 Data Transfer Disadvantages: ➢ IEEE 802.11 devices consume large amounts of energy due to the high percentage of time spent listening without receiving messages
  • 19. Differences and Constraints Traditional MAC protocol provides: ➢ High throughput ➢ Low latency ➢ Fairness ➢ Mobility But : have little consideration for energy Improved MAC protocol provides: ➢ Best performance of smallest amount of energy
  • 20. Attributes to Wireless Sensor Networks The following attributes should be taken in WSN Energy conservation ➢ Scalability and adaptively ➢ throughput ➢ Fairness ➢ Latency MAC protocol must achieve ➢ Establish communication link between the sensor nodes ➢ To share the communication medium fairly and efficiently primary goal less important
  • 21. Wireless Sensor Network MAC Protocols Medium Access Control Scheduled MAC Unschedule d MAC
  • 22. Unscheduled MAC protocols ( Cont. ) 1- Unscheduled MAC: Strategy: ➢ Before sending a message, a sensor listens to the medium. If it’s busy, wait a random time then retry again and if it’s free then it will send the message.
  • 23. Unscheduled MAC protocols ( Cont. ) Advantages: ➢ It can adapt for changes “ in the node density, traffic load or the topology” better than scheduled protocol. ➢ The sensors don’t have to be synchronized together. Disadvantages: ➢ It’s worst than scheduled MAC protocols from the power saving perspective, since all sensors listen to the channel.
  • 24. Unscheduled MAC protocols ( Cont. ) 1.1- PAMAS: stands for Power Aware Multi-Access Strategy : It uses multiple transceivers on each node PAMAS Data Transfer
  • 25. Unscheduled MAC protocols ( Cont. ) Advantages: ➢ Prevent collision Disadvantages: ➢ Multiple radio requirement ➢ Increase energy consumption ➢ Increase device complexity and cost
  • 26. Unscheduled MAC protocols ( Cont. ) 1.2- STEM: stands for Sparse Topology and Energy Management Strategy: ➢ uses two different channels, the wakeup channel and the data channel, ➢ requires two transceivers in each node STEM duty cycle for single node
  • 27. Unscheduled MAC protocols ( Cont. ) 1.2.1- STEM-B: Strategy : sensor nodes wakes a neighbour by transmitting a beacon (no RTS/CTS ) advantages: ➢ Lower Latency Disadvantages: ➢ More complex ➢ High energy consumption
  • 28. Unscheduled MAC protocols ( Cont. ) 1.2.2- STEM-T: Strategy : sensor nodes wakes a neighbour by transmitting a tone of sufficient length that destination will have a high probability of sensing ➢ Busy tone contains no destination address Disadvantages: ➢ High latency ➢ Results in overhearing
  • 29. Unscheduled MAC protocols ( Cont. ) 1.3- B-MAC: Strategy : ➢ It uses a tone to wake up sleeping neighbouring similar to STEM-T ➢ It uses very long preambles for message transmission. B-MAC Data Transfer
  • 30. Unscheduled MAC protocols ( Cont. ) disadvantages: ➢ B-MAC suffers from the overhearing problem ➢ The long preamble dominates the energy usage.
  • 31. Unscheduled MAC protocols ( Cont. ) 1.4- Wise MAC: Strategy : it uses similar technique in B-MAC but it attempt to reduce the energy consumption by having sensor nodes remember the sampling offset of their neighbour Wise MAC Data Transfer
  • 32. Unscheduled MAC protocols ( Cont. ) advantages: ➢ It decreases the amount of time a sensor node transmits preambles and the number of sensor nodes that overhear each message Disadvantages: ➢ the cost of an extra field in the ACK messages and the memory required to store neighbor’s sampling offsets.
  • 33. WSN MAC protocols ( Cont. ) 2- Scheduled MAC: Strategy : it attempts to reduce the energy consumption by coordinating sensor nodes with a common schedule
  • 34. scheduled MAC protocols ( Cont. ) Advantages: ➢ Saving the power from being wasted by turning off the radio out the allocated time slot. ➢ Limits the collision, idle listing, and overhearing Disadvantages: ➢ when sensor node enters net, must wait till they learn, some delay exist ➢ Cost of increased messages ➢ Not flexible to changes in sensor density or movements. ➢ All sensors should be well synchronized.
  • 35. scheduled MAC protocols ( Cont. ) 2.1 - S-MAC: Strategy : ➢ the sensor node periodically goes to the fixed listen/sleep cycle. ➢ A time frame in S-MAC is divided into two parts: one for a listening session and the other for a sleeping session.
  • 36. scheduled MAC protocols ( Cont. ) S-MAC Frame Format
  • 37. scheduled MAC protocols ( Cont. ) Disadvantages: ➢ energy is still wasted in this protocol during listen period as the sensor will be awake even if there is no reception/transmission.
  • 39. Tute questions (Q1) 802.11 Data Transfer Q1: Why IEEE 802.11 defines a SIFS shorter than a DIFS ? ANS: SIFS (Short Inter Frame Spacing) has ‰ highest priority, for ACK, CTS, polling response while DIFS (Distributed Inter Frame Spacing) has lowest priority, for asynchronous data service. Having SIFS smaller than DIFS prevents ACK and important control packets from getting killed.