SlideShare a Scribd company logo
1 of 25
Dr.Arun Chokkalingam
Professor
Department of Electronics and Communication
RMK College of Engineering and Technology
Chennai.
UNIT III
WSN NETWORK MAC PROTOCOLS
Low Duty Cycle Protocols And Wakeup Concepts –
S-MAC
Content
WSN NETWORKING CONCEPTS AND PROTOCOLS
 MAC Protocols for Wireless Sensor Networks,
 Low Duty Cycle Protocols And Wakeup Concepts –
 S-MAC,
Medium Access Control (MAC) protocols
Importance of MAC Protocols
Medium access control (MAC) protocols:
They coordinate the times where a number of nodes
access a shared communication medium.
Objectives of this Unit
 The single most important requirement is energy efficiency
 There are different MAC-specific sources of energy waste to consider:
1. Overhearing,
2. Collisions,
3. Overhead,
4. Idle listening.
 We discuss protocols addressing one or more of these issues.
 One important approach is to switch the wireless transceiver into a
sleep mode.
MAC Protocols for Wireless Sensor Networks
 Specific requirements and design considerations for MAC protocols in
wireless sensor networks.
 Balance of requirements
 Energy problems on the MAC layer or Major Sources of Energy Waste
1. Collisions,
2. Overhearing,
3. Overhead,
4. Idle listening.
Cont.
 Balance of requirements
 The importance of energy efficiency for the design of MAC protocols is
relatively new and many of the “classical” protocols like ALOHA and
CSMA contain no provisions toward this goal.
 Other typical performance figures like fairness, throughput, or delay
tend to play a minor role in sensor networks.
 Important requirements for mac protocols are scalability and
robustness against frequent topology changes
Energy problems on the MAC layer
 A nodes transceiver consumes a significant share of energy.
 Transceiver can be in one of the four main states : transmitting,
receiving, idle and sleeping.
 sleeping can be significantly cheaper than Idle state.
Major Sources of Energy Waste
1. Collisions,
2. Overhearing,
3. Overhead,
4. Idle listening.
Cont.
Cont.
Cont.
c) Ideal listening
 Nodes listen to channel for possible traffic. If nothing is sensed then
most of the time nodes is ideal.
 Ideal listening consume 50-100% energy required to receive packets.
d) Protocol overhead
 Protocol overhead is induced by MAC-related control frames like, RTS and CTS
packets or request packets in demand assignment protocols, and furthermore
by per-packet overhead like packet headers and trailers.
Types of MAC Protocols
 Low Duty Cycle Protocols And Wakeup Concepts –
 S-MAC,
 The Mediation Device Protocol
 Contention based protocols – PAMAS,
 Schedule based protocols – LEACH,
 IEEE 802.15.4 MAC protocol,
Low duty cycle protocols and wakeup concepts
 Low duty cycle protocols try to avoid spending (much) time in the
idle state and to reduce the communication activities of a sensor node
to a minimum.
 wakeup radio-the sleep state is left only when a node is about to
transmit or receive packets.
periodic wakeup scheme
 The cycled receiver approach, nodes spend most of their time in the sleep
mode and wake up periodically to receive packets from other nodes.
 A node a listens onto the channel during its listen period and goes back into
sleep mode when no other node takes the opportunity to direct a packet to a.
 A potential transmitter B must acquire knowledge about a’s listen periods to
send its packet at the right time
 A whole cycle consisting of sleep period and listen period is also called a
wakeup period.
 The ratio of the listen period length to the wakeup period length is also
called the node’s duty cycle.
Cont.
• By choosing a small duty cycle, the transceiver is in sleep mode
most of the time, avoiding idle listening and conserving energy.
• In heavy load situations significant competition can occur.
• Choosing a long sleep period induces a significant per-hop
latency,.
• In the multihop case, the per-hop latencies add up and create
significant end-to-end latencies.
• Sleep phases should not be too short in case the start-up costs
outweigh the benefits.
S-MAC (Sensor- Medium Access Control)
1. Periodic listen and sleep
2. Collision and overhearing avoidance
3. Message passing
Periodic listen and sleep
 Every node sleep for some time and then walkup to see any other node
wants to talk to him
 During sleep time node turn off its radio to save Energy
Schedule maintenance
Maintaining Synchronization
 Collision avoidance?
 Schedules are periodically broadcasted to neighbour
 Schedules are sent in SYNC packet.
 Listen time is divided into two potions one for SYNC and another for
Data.
SYNC or data sending
data sending
Overhearing Avoidance
Message passing
RTS and CTS mechanism is used to send data
Reference
 https://www.youtube.com/watch?v=Q9nez9IMC3M
 https://www.youtube.com/watch?v=FmE1b7ETVd0

More Related Content

What's hot

Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....pptbalu008
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsDarwin Nesakumar
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSjuno susi
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-pptSwathi Ch
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksAbhijeet Awade
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
TDMA, FDMA, and CDMA
TDMA, FDMA, and CDMATDMA, FDMA, and CDMA
TDMA, FDMA, and CDMANajeeb Khan
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingArunChokkalingam
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...Pallepati Vasavi
 

What's hot (20)

Wsn 08
Wsn 08Wsn 08
Wsn 08
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....ppt
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
 
CELLULAR MOBILE RADIO SYSTEMS
CELLULAR MOBILE RADIO SYSTEMSCELLULAR MOBILE RADIO SYSTEMS
CELLULAR MOBILE RADIO SYSTEMS
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
 
IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
TDMA, FDMA, and CDMA
TDMA, FDMA, and CDMATDMA, FDMA, and CDMA
TDMA, FDMA, and CDMA
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient Routing
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
 
Data link layer
Data link layer Data link layer
Data link layer
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
 

Similar to WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – S-MAC

UNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdfUNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdfMathavan N
 
Versatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor NetworksVersatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor NetworksMichael Rushanan
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkijcsa
 
Energy-efficient MAC protocols for wireless sensor networks: a survey
Energy-efficient MAC protocols for wireless sensor networks: a surveyEnergy-efficient MAC protocols for wireless sensor networks: a survey
Energy-efficient MAC protocols for wireless sensor networks: a surveyTELKOMNIKA JOURNAL
 
Link Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoTLink Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoTPrasant Misra
 
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...INFOGAIN PUBLICATION
 
A preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor NetworkA preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor Networkdiala wedyan
 
A Literature Survey on Energy Efficient MAC Protocols For WSN
A Literature Survey on Energy Efficient MAC Protocols For WSNA Literature Survey on Energy Efficient MAC Protocols For WSN
A Literature Survey on Energy Efficient MAC Protocols For WSNIRJET Journal
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Editor Jacotech
 
Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques
Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum TechniquesWireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques
Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum TechniquesIOSR Journals
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...IOSR Journals
 
Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3Easy n Inspire L
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...IJCNCJournal
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkdeawoo Kim
 

Similar to WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – S-MAC (20)

UNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdfUNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdf
 
Versatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor NetworksVersatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor Networks
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor network
 
Energy-efficient MAC protocols for wireless sensor networks: a survey
Energy-efficient MAC protocols for wireless sensor networks: a surveyEnergy-efficient MAC protocols for wireless sensor networks: a survey
Energy-efficient MAC protocols for wireless sensor networks: a survey
 
Link Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoTLink Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoT
 
E044033136
E044033136E044033136
E044033136
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
 
mn paper
mn papermn paper
mn paper
 
A preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor NetworkA preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor Network
 
A Literature Survey on Energy Efficient MAC Protocols For WSN
A Literature Survey on Energy Efficient MAC Protocols For WSNA Literature Survey on Energy Efficient MAC Protocols For WSN
A Literature Survey on Energy Efficient MAC Protocols For WSN
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...
 
G017164448
G017164448G017164448
G017164448
 
Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques
Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum TechniquesWireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques
Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
 
Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3
 
Bf33335340
Bf33335340Bf33335340
Bf33335340
 
Bf33335340
Bf33335340Bf33335340
Bf33335340
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 

More from ArunChokkalingam

FM-Foster - Seeley Discriminator.pptx
FM-Foster - Seeley Discriminator.pptxFM-Foster - Seeley Discriminator.pptx
FM-Foster - Seeley Discriminator.pptxArunChokkalingam
 
FM-Balanced Slope Detector.pptx
FM-Balanced Slope Detector.pptxFM-Balanced Slope Detector.pptx
FM-Balanced Slope Detector.pptxArunChokkalingam
 
FM Demodulator Slope Detector.pptx
FM Demodulator Slope Detector.pptxFM Demodulator Slope Detector.pptx
FM Demodulator Slope Detector.pptxArunChokkalingam
 
Introduction about Angle Modulation (FM&PM).pptx
Introduction about Angle Modulation (FM&PM).pptxIntroduction about Angle Modulation (FM&PM).pptx
Introduction about Angle Modulation (FM&PM).pptxArunChokkalingam
 
Generation of DSB-SC using Diode Ring Modulator or chopper Modulator.pptx
Generation of DSB-SC using Diode Ring Modulator or chopper Modulator.pptxGeneration of DSB-SC using Diode Ring Modulator or chopper Modulator.pptx
Generation of DSB-SC using Diode Ring Modulator or chopper Modulator.pptxArunChokkalingam
 
Generation of AM-DSB-SC using Balanced FET Modulator.pptx
Generation of AM-DSB-SC using Balanced FET Modulator.pptxGeneration of AM-DSB-SC using Balanced FET Modulator.pptx
Generation of AM-DSB-SC using Balanced FET Modulator.pptxArunChokkalingam
 
Comparison of Amplitude Modulation Techniques.pptx
Comparison of Amplitude Modulation Techniques.pptxComparison of Amplitude Modulation Techniques.pptx
Comparison of Amplitude Modulation Techniques.pptxArunChokkalingam
 
AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) ArunChokkalingam
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networksArunChokkalingam
 
MANET routing protocols Issues and Classifications
 MANET routing protocols Issues and Classifications MANET routing protocols Issues and Classifications
MANET routing protocols Issues and ClassificationsArunChokkalingam
 

More from ArunChokkalingam (13)

FM - Ratio Detector.pptx
FM - Ratio Detector.pptxFM - Ratio Detector.pptx
FM - Ratio Detector.pptx
 
FM-Foster - Seeley Discriminator.pptx
FM-Foster - Seeley Discriminator.pptxFM-Foster - Seeley Discriminator.pptx
FM-Foster - Seeley Discriminator.pptx
 
FM-Balanced Slope Detector.pptx
FM-Balanced Slope Detector.pptxFM-Balanced Slope Detector.pptx
FM-Balanced Slope Detector.pptx
 
FM Demodulator Slope Detector.pptx
FM Demodulator Slope Detector.pptxFM Demodulator Slope Detector.pptx
FM Demodulator Slope Detector.pptx
 
Introduction about Angle Modulation (FM&PM).pptx
Introduction about Angle Modulation (FM&PM).pptxIntroduction about Angle Modulation (FM&PM).pptx
Introduction about Angle Modulation (FM&PM).pptx
 
Generation of DSB-SC using Diode Ring Modulator or chopper Modulator.pptx
Generation of DSB-SC using Diode Ring Modulator or chopper Modulator.pptxGeneration of DSB-SC using Diode Ring Modulator or chopper Modulator.pptx
Generation of DSB-SC using Diode Ring Modulator or chopper Modulator.pptx
 
Generation of AM-DSB-SC using Balanced FET Modulator.pptx
Generation of AM-DSB-SC using Balanced FET Modulator.pptxGeneration of AM-DSB-SC using Balanced FET Modulator.pptx
Generation of AM-DSB-SC using Balanced FET Modulator.pptx
 
Comparison of Amplitude Modulation Techniques.pptx
Comparison of Amplitude Modulation Techniques.pptxComparison of Amplitude Modulation Techniques.pptx
Comparison of Amplitude Modulation Techniques.pptx
 
AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing)
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networks
 
MANET routing protocols Issues and Classifications
 MANET routing protocols Issues and Classifications MANET routing protocols Issues and Classifications
MANET routing protocols Issues and Classifications
 
Multimedia Components
Multimedia Components Multimedia Components
Multimedia Components
 

Recently uploaded

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 

Recently uploaded (20)

9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 

WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – S-MAC

  • 1. Dr.Arun Chokkalingam Professor Department of Electronics and Communication RMK College of Engineering and Technology Chennai. UNIT III WSN NETWORK MAC PROTOCOLS Low Duty Cycle Protocols And Wakeup Concepts – S-MAC
  • 2. Content WSN NETWORKING CONCEPTS AND PROTOCOLS  MAC Protocols for Wireless Sensor Networks,  Low Duty Cycle Protocols And Wakeup Concepts –  S-MAC,
  • 3. Medium Access Control (MAC) protocols
  • 4. Importance of MAC Protocols Medium access control (MAC) protocols: They coordinate the times where a number of nodes access a shared communication medium.
  • 5. Objectives of this Unit  The single most important requirement is energy efficiency  There are different MAC-specific sources of energy waste to consider: 1. Overhearing, 2. Collisions, 3. Overhead, 4. Idle listening.  We discuss protocols addressing one or more of these issues.  One important approach is to switch the wireless transceiver into a sleep mode.
  • 6. MAC Protocols for Wireless Sensor Networks  Specific requirements and design considerations for MAC protocols in wireless sensor networks.  Balance of requirements  Energy problems on the MAC layer or Major Sources of Energy Waste 1. Collisions, 2. Overhearing, 3. Overhead, 4. Idle listening.
  • 7. Cont.  Balance of requirements  The importance of energy efficiency for the design of MAC protocols is relatively new and many of the “classical” protocols like ALOHA and CSMA contain no provisions toward this goal.  Other typical performance figures like fairness, throughput, or delay tend to play a minor role in sensor networks.  Important requirements for mac protocols are scalability and robustness against frequent topology changes
  • 8. Energy problems on the MAC layer  A nodes transceiver consumes a significant share of energy.  Transceiver can be in one of the four main states : transmitting, receiving, idle and sleeping.  sleeping can be significantly cheaper than Idle state.
  • 9. Major Sources of Energy Waste 1. Collisions, 2. Overhearing, 3. Overhead, 4. Idle listening.
  • 10. Cont.
  • 11. Cont.
  • 12. Cont. c) Ideal listening  Nodes listen to channel for possible traffic. If nothing is sensed then most of the time nodes is ideal.  Ideal listening consume 50-100% energy required to receive packets. d) Protocol overhead  Protocol overhead is induced by MAC-related control frames like, RTS and CTS packets or request packets in demand assignment protocols, and furthermore by per-packet overhead like packet headers and trailers.
  • 13. Types of MAC Protocols  Low Duty Cycle Protocols And Wakeup Concepts –  S-MAC,  The Mediation Device Protocol  Contention based protocols – PAMAS,  Schedule based protocols – LEACH,  IEEE 802.15.4 MAC protocol,
  • 14. Low duty cycle protocols and wakeup concepts  Low duty cycle protocols try to avoid spending (much) time in the idle state and to reduce the communication activities of a sensor node to a minimum.  wakeup radio-the sleep state is left only when a node is about to transmit or receive packets.
  • 15. periodic wakeup scheme  The cycled receiver approach, nodes spend most of their time in the sleep mode and wake up periodically to receive packets from other nodes.  A node a listens onto the channel during its listen period and goes back into sleep mode when no other node takes the opportunity to direct a packet to a.  A potential transmitter B must acquire knowledge about a’s listen periods to send its packet at the right time  A whole cycle consisting of sleep period and listen period is also called a wakeup period.  The ratio of the listen period length to the wakeup period length is also called the node’s duty cycle.
  • 16. Cont. • By choosing a small duty cycle, the transceiver is in sleep mode most of the time, avoiding idle listening and conserving energy. • In heavy load situations significant competition can occur. • Choosing a long sleep period induces a significant per-hop latency,. • In the multihop case, the per-hop latencies add up and create significant end-to-end latencies. • Sleep phases should not be too short in case the start-up costs outweigh the benefits.
  • 17. S-MAC (Sensor- Medium Access Control) 1. Periodic listen and sleep 2. Collision and overhearing avoidance 3. Message passing Periodic listen and sleep  Every node sleep for some time and then walkup to see any other node wants to talk to him  During sleep time node turn off its radio to save Energy
  • 19. Maintaining Synchronization  Collision avoidance?  Schedules are periodically broadcasted to neighbour  Schedules are sent in SYNC packet.  Listen time is divided into two potions one for SYNC and another for Data.
  • 20. SYNC or data sending
  • 23. Message passing RTS and CTS mechanism is used to send data
  • 24.