SlideShare a Scribd company logo
1 of 112
SCHEDULE & CONTENTION
BASED MAC PROTOCOLS
Darwin Nesakumar A, M.E, (P.hD)
Assistant Professor
Department of ECE
R.M.K. Engineering College
Agenda
• Review of previous session
• Mediation Device Protocol
• Scheduled based protocols in WSN
• S-MACS
• Contention based protocols in WSN
• PAMAS Protocol
• Low duty Cycle and Wake up Concepts
• Quizzes
2Schedule based protocolsFriday, 28August 2020
Review of previous session
• Joinmyquiz.com
3Schedule based protocolsFriday, 28August 2020
Question
What is needed in schedule based MACs
Frequency Synchronization
Time Synchronization
Code Synchronization
Schedule based protocols 4Friday, 28August 2020
Answer for the Question
Time Synchronization
Schedule based protocols 5Friday, 28August 2020
Question
Risk of packet collisions occur in
Schedule based MACs
Contention based MACs
Schedule based protocols 6Friday, 28August 2020
Answer for the Question
Contention based MACs
Schedule based protocols 7Friday, 28August 2020
Question
The two options to shut up senders are to inform
potential interferers while a reception is on-going
and before a reception is on-going
TRUE
FALSE
Schedule based protocols 8Friday, 28August 2020
Answer for the Question
TRUE
Schedule based protocols 9Friday, 28August 2020
Question
Clusterhead uses FDMA
TRUE
FALSE
Schedule based protocols 10Friday, 28August 2020
Answer for the Question
FALSE
Schedule based protocols 11Friday, 28August 2020
Question
Role of clusterhead is _____________ to share
the burden
Distributed
Rotated
Converged
Schedule based protocols 12Friday, 28August 2020
Answer for the Question
Rotated
Schedule based protocols 13Friday, 28August 2020
Question
What is the percentage of nodes to become
clusterhead?
Schedule based protocols 14Friday, 28August 2020
Answer for the Question
5%
Schedule based protocols 15Friday, 28August 2020
Question
Inter cluster uses
TDMA
CDMA
Schedule based protocols 16Friday, 28August 2020
Answer for the Question
CDMA
Schedule based protocols 17Friday, 28August 2020
Question
Which transmission is used in advertisement phase?
Unicast
Multicast
Broadcast
Schedule based protocols 18Friday, 28August 2020
Answer for the Question
Broadcast
Schedule based protocols 19Friday, 28August 2020
Question
TDMA is being used for
Intra Cluster
Inter Cluster
Schedule based protocols 20Friday, 28August 2020
Answer for the Question
Intra Cluster
Schedule based protocols 21Friday, 28August 2020
Question
LEACH stands for
Schedule based protocols 22Friday, 28August 2020
Answer for the Question
Low-energy Adaptive Clustering Hierarchy
Schedule based protocols 23Friday, 28August 2020
Question
What are the two phases in LEACH Protocol?
Schedule based protocols 24Friday, 28August 2020
Answer for the Question
Set up phase
Steady State Phase
Schedule based protocols 25Friday, 28August 2020
IMPORTANT POINTS TO BE REMEMBER
MAC Protocols
• MAC – Medium Access Control
• They coordinate the times where a
number of nodes access a shared
communication medium.
• Main requirement – Energy efficiency
• Energy waste due to – Overhead,
Overhearing, Collisions and idle
listening
• Switch the transceiver into Sleep
Mode – Energy saving approach
• There are trade offs between energy
expenditure and delay, throughput
• MAC is first protocol above the Physical
layer (PHY)
• Fundamental task is to regulate the
access of number of nodes to a shared
medium
• Few traditional criteria are delay,
throughput, fairness
• Energy conservation is an issue in MAC
• MAC is apart of Data Link Layer (DLL) –
OSI reference model
• MAC protocol determines for a node the
points in time when it accesses the
medium to try to transmit a data,
control, or management packet to
another node (unicast) or to a set of
nodes (multicast, broadcast). 26Schedule based protocolsFriday, 28August 2020
IMPORTANT POINTS TO BE REMEMBER
MAC Protocols
• MAC is a part of Data Link Layer (DLL)
• DLL Responsibilities are
• Error Control – used to ensure
correctness of transmission and to
take appropriate actions in case of
transmission errors
• Flow control - regulates the rate of
transmission to protect a slow receiver
from being overwhelmed with data
• Main approach to conserve energy –
Put nodes in sleep state whenever
possible
• Low duty cycle, Wake up concepts
• Two types of MAC Protocols are
Contention based and schedule
based
• Contention based – It is a
communication protocol for
operating wireless
telecommunication equipment that
allows many users to use same radio
channel without pre coordination
• Schedule based - A schedule exists,
regulating which participant may use
which resource at which time
27Schedule based protocolsFriday, 28August 2020
SCHEDULE- VS. CONTENTION-BASED MAC
• Schedule-based MAC
– A schedule exists, regulating which participant may use which resource
at which time (TDMA component)
– Typical resource: frequency band in a given physical space (with a given
code, CDMA)
– Schedule can be fixed or computed on demand
• Usually: mixed – difference fixed/on demand is one of time scales
– Usually, collisions, overhearing, idle listening no issues
– Needed: time synchronization!
• Contention-based protocols
– Risk of colliding packets is deliberately taken
– Hope: coordination overhead can be saved, resulting in overall improved
efficiency
– Mechanisms to handle/reduce probability/impact of collisions required
– Usually, randomization used somehow
28Schedule based protocolsFriday, 28August 2020
IMPORTANT POINTS TO BE REMEMBER
LEACH Protocol
• Given: Dense network of nodes,
reporting to a central sink, each node
can reach sink directly
• Group of nodes – Cluster, controlled
by clusterhead
• Clusterheads organize CDMA code for
all member transmissions, TDMA
schedule to be used within a cluster
• CHs collect & aggregate data from all
cluster members, aggregates the data
from members and forwards to sink
using CDMA
• About 5% of nodes become clusterhead,
Role of clusterhead is rotated to share
the burden
• Two phases – Set up phase and steady
state phase
• Set up phase – Election of Clusterhead,
advertisement of Clusterhead to the
members via broadcasting
• Setup phase – CH assigns TDMA for
members, CDMA for transmitting the
data to sink
• TDMA – Intra Cluster
• CDMA – Inter Cluster
29Schedule based protocolsFriday, 28August 2020
IMPORTANT POINTS TO BE REMEMBER
LEACH Protocol
• Steady State Phase : CHs collect &
aggregate data from all cluster
members, report aggregated data to
sink using CDMA
• The cluster-head is maintained when
data is transmitted between nodes.
CH is responsible for creating and
maintaining a TDMA schedule; all the
other nodes of a cluster are member
nodes.
• To all member nodes, TDMA slots are
assigned, which can be used to
exchange data between the member
and the clusterhead.
• With the exception of their time slots,
the members can spend their time in
sleep state.
• The clusterhead aggregates the data of
its members and transmits it to the sink
node or to other nodes for further
relaying.
• Since the sink is often far away, the
clusterhead must spend significant
energy for this transmission.
• For a member, it is typically much
cheaper to reach the clusterhead than
to transmit directly to the sink
• There is no peer-to-peer
communication.
30Schedule based protocolsFriday, 28August 2020
IMPORTANT POINTS TO BE REMEMBER
LEACH Protocol
• Advantages
• Increases the lifetime of the network, Even drain of energy
• Distributed, no global knowledge required
• Energy saving due to aggregation by CHs
• TDMA- Nodes assigned with time slot for transmission and let them sleep at
all other times.
• Transmission schedules achieve no collisions occur at receivers and hence
no special mechanisms are needed to avoid hidden-terminal situations.
31Schedule based protocolsFriday, 28August 2020
IMPORTANT POINTS TO BE REMEMBER
LEACH Protocol
• The setup and maintenance of
schedules involves signaling traffic.
• If a TDMA variant is employed, time is
divided into comparably small slots
• Such schedules are not easily adapted
to different load situations on small
timescales.
• The schedule of a node (and possibly
those of its neighbors) may require a
significant amount of memory, which
is a scarce resource in several sensor
node designs.
Disadvantages
• LEACH assumes all nodes can transmit
with enough power to reach BS if
necessary (e.g., elected as CHs)
• Each node should support both TDMA &
CDMA
• Need to do time synchronization
• Nodes use single-hop communication
• LEACH would not be able to cover large
geographical areas of some square miles
or more, because a clusterhead two miles
away from the sink likely does not have
enough energy to reach the sink at all.
32Schedule based protocolsFriday, 28August 2020
SCHEDULE-BASED MAC
PROTOCOLS
33Schedule based protocolsFriday, 28August 2020
THE MEDIATION
DEVICE PROTOCOL
Friday, 28August 2020 Schedule based protocols 34
 It allows each node in a WSN to go into sleep mode periodically and to
wake up only for short times to receive packets from neighbor nodes.
 There is no global time reference, each node has its own sleeping
schedule, and does not take care of its neighbors sleep schedules.
To receive packets after wake up period
Upon each periodic wakeup, a node transmits a short query beacon,
indicating its node address and its willingness to accept packets from
other nodes.
The node stays awake for some short time following the query beacon, to
open up a window for incoming packets. If no packet is received during
this window, the node goes back into sleep mode.
THE MEDIATION DEVICE PROTOCOL
35Schedule based protocolsFriday, 28August 2020
Question
Upon each periodic wakeup, a node transmits a _______
query beacon, indicating its node address and its
willingness to accept packets from other nodes.
Short
Medium
Long
Schedule based protocols 36Friday, 28August 2020
Answer for the Question
Short
Schedule based protocols 37Friday, 28August 2020
To transmit packets after wake up period
 When a node wants to transmit a packet to a neighbor, it has to
synchronize with it. One option would be to have the sender actively
waiting for query beacon, but this wastes considerable energy for
synchronization purposes only.
 The dynamic synchronization approach achieves this synchronization
without requiring the transmitter to be awake permanently to detect the
destinations query beacon.
 To achieve this, a mediation device (MD) is used. We first discuss the
case where the mediation device is not energy constrained and can be
active all the time.
THE MEDIATION DEVICE PROTOCOL
38Schedule based protocolsFriday, 28August 2020
Question
What is the purpose of Mediation device?
Schedule based protocols 39Friday, 28August 2020
Answer for the Question
Dynamic synchronization
Schedule based protocols 40Friday, 28August 2020
• Because of its full duty cycle, the mediation device can receive the query beacons from
all nodes in its vicinity and learn their wakeup period
Protocol
• Sender A sends RTS to MD
• MD stores this information
• Receiver B sends query to MD
• MD tells reciever B when to
wake up
• B sends CTS to A (now in sync)
• A sends data
• B acknowledges
• B returns to old timing
41Schedule based protocolsFriday, 28August 2020
THE MEDIATION DEVICE PROTOCOL
Advantages
 It does not require any time synchronization between the
nodes, only the mediation device has to learn the periods of
the nodes.
 The protocol is asymmetric in the sense that most of the
energy burden is shifted to the mediation device, which so
far is assumed to be power unconstrained.
42Schedule based protocolsFriday, 28August 2020
Question
Mediation device is power constrained.
TRUE
FALSE
Schedule based protocols 43Friday, 28August 2020
Answer for the Question
FALSE
Schedule based protocols 44Friday, 28August 2020
THE MEDIATION DEVICE PROTOCOL
Disadvantages
 The nodes transmit their query beacons without checking for ongoing
transmissions
 If the node density is sufficiently low, this collision probability can be low
too. However, in case of higher node densities or unwanted
synchronization between the nodes, the number of collisions can be
significant.
 A possible solution to this is the following: When the MD registers
collisions, it might start to emit a dedicated reschedule control frame to
all colliding nodes.
45Schedule based protocolsFriday, 28August 2020
Question
When the MD registers collisions, it might start to
emit a dedicated reschedule control frame to ________
nodes.
All
Neighboring
Colliding
Schedule based protocols 46Friday, 28August 2020
Answer for the Question
Colliding
Schedule based protocols 47Friday, 28August 2020
THE MEDIATION DEVICE PROTOCOL
 All colliding nodes can hear this frame as long as the MD repeats it often
enough.
 Reception of this frame causes each node to randomly pick a new period
from a certain interval [a, b] indicated in the reschedule frame.
 If the MD continues to perceive collisions, it can enlarge the interval
accordingly
48Schedule based protocolsFriday, 28August 2020
Disadvantages
THE MEDIATION DEVICE PROTOCOL
The mediation device is energy unconstrained, which does not
conform to the idea of a “simply thrown out” wireless sensor network
There are sufficient mediation devices to cover all nodes. The
distributed mediation device protocol deals with these problems in a
probabilistic manner.
49Schedule based protocolsFriday, 28August 2020
Drawbacks
Question
Mediation device is energy _____________
Constrained
Unconstrained
Schedule based protocols 50Friday, 28August 2020
Answer for the Question
Unconstrained
Schedule based protocols 51Friday, 28August 2020
S-MAC PROTOCOL
Friday, 28August 2020 Schedule based protocols 52
S-MAC PROTOCOL
• S-MAC stands for Sensor – Medium Access Control
• S-MAC protocol provides mechanisms to avoid/ to bypass idle
listening, collisions, and overhearing. It does not require two
different channels.
• S-MAC adopts a periodic wakeup scheme, that is, each node
alternates between a fixed-length listen period and a fixed-length
sleep period according to its schedule.
• The listen period of S-MAC can be used to receive and transmit
packets.
• S-MAC attempts to coordinate the schedules of neighboring nodes
such that their listen periods start at the same time.
Friday, 28August 2020 Schedule based protocols 53
Question
Which of the following are true ?
1. S-MAC protocol provides mechanisms to avoid/ to
bypass idle listening, collisions, and overhearing.
2. S-MAC adopts a periodic wakeup scheme
3. S-MAC attempts to coordinate the schedules of neighboring
nodes
Schedule based protocols 54Friday, 28August 2020
Answer for the Question
All are true
Schedule based protocols 55Friday, 28August 2020
Question
S – MAC requires two different channels
channel
TRUE
FALSE
Schedule based protocols 56Friday, 28August 2020
Answer for the Question
FALSE
Schedule based protocols 57Friday, 28August 2020
S-MAC PROTOCOL
• A node x’s listen period is subdivided into three different phases
• Synchronization Phase
• RTS Phase
• CTS Phase
Friday, 28August 2020 Schedule based protocols 58
S-MAC PROTOCOL
• Synchronization Phase
• It is the first phase of S-MAC Protocol
• In this phase node x accepts SYNCH packets from its
neighbors.
• In these packets, the neighbors describe their own schedule and
x stores their schedule in a table (the schedule table).
• Node x’s SYNCH phase is subdivided into time slots and x’s
neighbors contend according to a CSMA scheme, that is, each
neighbor y wishing to transmit a SYNCH packet picks one of the
time slots randomly and starts to transmit if no signal was
received in any of the previous slots.
Friday, 28August 2020 Schedule based protocols 59
S-MAC PROTOCOL
• Synchronization Phase
• In the other case, y goes back into sleep mode and waits for x’s
next wakeup.
• In the other direction, since x knows a neighbor y’s schedule, x
can wake at appropriate times and send its own SYNCH packet to
y (in broadcast mode).
• It is not required that x broadcasts its schedule in every of y’s
wakeup periods. However, for reasons of time synchronization
and to allow new nodes to learn their local network topology, x
should send SYNCH packets periodically. The according period is
called synchronization period.
Friday, 28August 2020 Schedule based protocols 60
S-MAC PROTOCOL
• RTS Phase
• In this second phase x listens for RTS packets from neighboring
nodes.
• In S-MAC, the RTS/CTS handshake is used to reduce collisions of
data packets due to hidden-terminal situations.
• Again, interested neighbors contend in this phase according to a
CSMA scheme with additional backoff.
Friday, 28August 2020 Schedule based protocols 61
Question
In S-MAC, the __________________is used to reduce
collisions of data packets due to hidden-terminal
situations.
RTS/CTS handshake
RTS/CTS Milkshake
RTS/CTS legshake
Schedule based protocols 62Friday, 28August 2020
Answer for the Question
RTS/CTS handshake
Schedule based protocols 63Friday, 28August 2020
S-MAC PROTOCOL
• CTS Phase
• In the third phase node x transmits a CTS packet if an RTS packet
was received in the previous phase. After this, the packet
exchange continues, extending into x’s nominal sleep time.
• In general, when competing for the medium, the nodes use the
RTS/CTS handshake, including the virtual carrier-sense
mechanism, whereby a node maintains a NAV variable.
• The NAV (Network Allocation Vector – Virtual Carrier Sensing)
mechanism can be readily used to switch off the node during
ongoing transmissions to avoid overhearing.
• When transmitting in a broadcast mode (for example SYNCH
packets), the RTS and CTS packets are dropped and the nodes
use CSMA with backoff.
•
Friday, 28August 2020 Schedule based protocols 64
S-MAC PROTOCOL
• CTS Phase
• If we can arrange that the schedules of node x and its neighbors
are synchronized, node x and all its neighbors wake up at the
same time and x can reach all of them with a single SYNCH
packet.
• The S-MAC protocol allows neighboring nodes to agree on the
same schedule and to create virtual clusters.
• The clustering structure refers solely to the exchange of schedules;
the transfer of data packets is not influenced by virtual clustering.
Friday, 28August 2020 Schedule based protocols 65
Question
What are the three phases of listen period?
Schedule based protocols 66Friday, 28August 2020
Answer for the Question
Synchronization Phase
RTS Phase
CTS Phase
Schedule based protocols 67Friday, 28August 2020
• MACA’s idle listening is particularly unsuitable if average data rate
is low
• Most of the time, nothing happens
• Idea: Switch nodes off, ensure that neighboring nodes turn on
simultaneously to allow packet exchange
S-MAC PROTOCOL
• Only in these active periods, packet
exchanges happen
• Need to also exchange wakeup
schedule between neighbors
• When awake, essentially perform
RTS/CTS
• Use SYNCH, RTS, CTS phases
Wakeup period
Active period
Sleep period
For SYNCH For RTS For CTS
68Schedule based protocolsFriday, 28August 2020
S-MAC Synchronized islands
• Nodes try to pick up schedule synchronization from neighboring nodes
• If no neighbor found, nodes pick some schedule to start with
• If additional nodes join, some node might learn about two different
schedules from different nodes
– “Synchronized islands”
• To bridge this gap, it has to follow both schemes
Time
A A A A
C C C C
A
B B B B
D D D
A
C
B
D
E E E EE E E
69Schedule based protocolsFriday, 28August 2020
S-MAC PROTOCOL
• Given: Many radio channels, superframes of known length (not
necessarily in phase, but still time synchronization required!)
• Goal: Set up directional links between neighboring nodes
– Link: radio channel + time slot at both sender and receiver
– Free of collisions at receiver
– Channel picked randomly, slot is searched greedily until a
collision-free slot is found
• Receivers sleep and only wake up in their assigned time slots, once
per superframe
• In effect: a local construction of a schedule
70Schedule based protocolsFriday, 28August 2020
Timeout-MAC (T-MAC)
• In S-MAC, active period is of constant
length
• What if no traffic actually happens?
• Nodes stay awake needlessly long
• Idea: Prematurely go back to sleep
mode when no traffic has happened
for a certain time (=timeout) ! T-MAC
• Adaptive duty cycle!
• One ensuing problem: Early sleeping
• C wants to send to D, but is
hindered by transmission A! B
A B C D
CTS
May not
send
Timeout,
go back to
sleep as
nothing
happened
71Schedule based protocolsFriday, 28August 2020
B-MAC
• Clear Channel Assessment
– Adapts to noise floor by sampling channel when it is assumed to
be free
– Samples are exponentially averaged, result used in gain control
– For actual assessment when sending a packet, look at five
channel samples – channel is free if even a single one of them is
significantly below noise
– Optional: random backoff if channel is found busy
• Optional: Immediate link layer acknowledgements for received
packets
72Schedule based protocolsFriday, 28August 2020
B-MAC II
• Low Power Listening (= preamble sampling)
– Uses the clear channel assessment techniques to decide whether
there is a packet arriving when node wakes up
– Timeout puts node back to sleep if no packet arrived
• B-MAC does not have
– Synchronization
– RTS/CTS
– Results in simpler, leaner implementation
– Clean and simple interface
• Currently: Often considered as the default WSN MAC protocol
73Schedule based protocolsFriday, 28August 2020
CONTENTION-BASED
PROTOCOLS
Friday, 28August 2020 Schedule based protocols 74
CONTENTION-BASED PROTOCOLS
 If only one neighbor tries its luck, the packet goes through the channel.
 If two or more neighbors try their luck, these have to compete with each
other and in unlucky cases, for example, due to hidden-terminal
situations, a collision might occur, wasting energy for both transmitter
and receiver.
 Two important contention based protocols: (slotted) ALOHA and CSMA,
along with mechanisms to solve the hidden-terminal problem.
 In the following sections, we discuss variations of these protocols with
the goal to conserve energy. As opposed to some of the contention-
based protocols having a periodic wakeup scheme
 The protocols described in this section have no idle listening avoidance
and make no restrictions as to when a node can receive a packet. 75Schedule based protocolsFriday, 28August 2020
The PAMAS protocol (Power Aware Multi-
access with Signaling)
 Originally designed for ad hoc networks.
 It provides a detailed overhearing avoidance mechanism while it does not
consider the idle listening problem.
 The protocol combines the busy-tone solution and RTS/CTS handshake
similar to the MACA protocol
 A distinctive feature of PAMAS is that it uses two channels:
 Data channel (while the data channel is reserved for data packets)
 Control channel. (All the signaling packets (RTS, CTS, busy tones) are
transmitted on the control channel.
76Schedule based protocolsFriday, 28August 2020
PAMAS PROTOCOL
• Let us consider an idle node x to which a new packet destined to a
neighboring node y arrives.
• First, x sends an RTS packet on the control channel without doing any
carrier sensing. This packet carries both x’s and y’s MAC addresses.
• If y receives this packet, it answers with a CTS packet if y does not know
of any ongoing transmission in its vicinity. Upon receiving the CTS, x starts
to transmit the packet to y on the data channel.
• When y starts to receive the data, it sends out a busy-tone packet on
the control channel.
• If x fails to receive a CTS packet within some time window, it enters the
backoff mode, where a binary exponential backoff scheme is used (i.e., the
backoff time is uniformly chosen from a time interval that is doubled after
each failure to receive a CTS).
Friday, 28August 2020 Schedule based protocols 77
PAMAS PROTOCOL
• Now, let us look at the nodes receiving x’s RTS packet on the control
channel. There is the intended receiver y and there are other nodes; let z
be one of them.
• If z is currently receiving a packet, it reacts by sending a busy-tone packet,
which overlaps with y’s CTS at node x and effectively destroys the CTS.
Therefore, x cannot start transmission and z’s packet reception is not
disturbed.
• Since the busy-tone packet is longer than the CTS, we can be sure that the
CTS is really destroyed.
• We consider the intended receiver y. If y knows about an ongoing
transmission in its vicinity, it suppresses its CTS, causing x to back off.
Friday, 28August 2020 Schedule based protocols 78
PAMAS PROTOCOL
• Node y can obtain this knowledge by either sensing the data channel or
by checking whether there was some noise on the control channel
immediately after receiving the RTS. This noise can be an RTS or CTS of
another node colliding at y.
• In the other case, y answers with a CTS packet and starts to send out a
busy-tone packet as soon as x’s transmission has started.
• Furthermore, y sends out busy-tone packets each time it receives some
noise or a valid packet on the control channel, to prevent its neighborhood
from any activities.
Friday, 28August 2020 Schedule based protocols 79
PAMAS - Power Aware Multi access with
Signaling
• Idea: Combine busy tone with RTS/CTS
– Results in detailed overhearing avoidance, does not address idle listening
– Uses separate data and control channels
• Procedure
– Node A transmits RTS on control channel, does not sense channel
– Node B receives RTS, sends CTS on control channel if it can receive and does not
know about ongoing transmissions
– B sends busy tone as it starts to receive data
Time
Control
channel
Data
channel
RTS
A ! B
CTS
B ! A
Data
A ! B
Busy tone
sent by B
80Schedule based protocolsFriday, 28August 2020
PAMAS – Already ongoing transmission
• Suppose a node C in vicinity of A is already receiving a packet when A
initiates RTS
• Procedure
– A sends RTS to B
– C is sending busy tone (as it receives data)
– CTS and busy tone collide, A receives no CTS, does not send data
A
B
C
?
Time
Control
channel
Data
channel
RTS
A ! B
CTS
B ! A
No data!
Busy tone by C
Similarly:Ongoing
transmission near B destroys
RTS by busy tone
81Schedule based protocolsFriday, 28August 2020
PAMAS - Power Aware Multi access with signaling
Node X Node y
RTS
CTS
BusyTone
• First, x sends an RTS packet on the control
channel without doing any carrier sensing.
This packet carries both x’s and y’s MAC
addresses
• If y receives this packet, it answers with a
CTS packet if y does not know of any
ongoing transmission in its vicinity.
• Upon receiving the CTS, x starts to
transmit the packet to y on the data
channel. When y starts to receive the data,
it sends out a busy-tone packet on the
control channel.
• If x fails to receive a CTS packet within
some time window, it enters the backoff
mode, where a binary exponential backoff
scheme is used (i.e., the backoff time is
uniformly chosen from a time interval that
is doubled after each failure to receive a
CTS)
82Schedule based protocolsFriday, 28August 2020
Node X Node y
RTS
CTS
BusyTone
 If y knows about an ongoing transmission in
its vicinity, it with a CTS packet and starts to
send out a busy-tone packet as soon as x’s
transmission has started. suppresses its CTS,
causing x to back off.
 Node y can obtain this knowledge by either
sensing the data channel or by checking
whether there was some noise on the control
channel immediately after receiving the RTS.
 This noise can be an RTS or CTS of another
node colliding at y. In the other case, y
answers
 Furthermore, y sends out busy-tone packets
each time it receives some noise or a valid
packet on the control channel, to prevent its
neighborhood from any activities.
83Schedule based protocolsFriday, 28August 2020
When can a node put its transceivers
(control and data) into sleep mode?
Any time a node knows that it cannot transmit or receive packets because
some other node in its vicinity is already doing so.
This decision is easy if a node x knows about the length of an ongoing
transmission, for example from overhearing the RTS or CTS packets or the
header of the data packets on the data channel.
However, often this length is unknown to x, for example, because these
packets are corrupted or a foreign data transmission cycle starts when x is
just sleeping.
Additional procedures are needed to resolve this
84Schedule based protocolsFriday, 28August 2020
When can a node put its transceivers
(control and data) into sleep mode?
Suppose that x wakes up and finds the data channel busy. There are two
cases to distinguish:
Case 1
Either x has no own packet to send or x wants to transmit. In the first
case, x desires to go back into sleep mode and to wake up exactly when
the ongoing transmission ends to be able to receive an immediately
following packet.
Waking up at the earliest possible time has the advantage of avoiding
unwanted delays.
However, since x may not have overheard the RTS, CTS, or data packet
header belonging to the ongoing transmission, it runs a probing protocol
on the control channel to inquire the length of the ongoing packet.
85Schedule based protocolsFriday, 28August 2020
When can a node put its transceivers
(control and data) into sleep mode?
• Case 2
• x wakes up during an ongoing transmission and wants to transmit
a packet. Therefore, x has not only to take care of ongoing
transmissions but also of ongoing receptions in its vicinity.
• To find the time for the next wakeup, x runs the described
probing protocol for the set of transmitters, giving a time t when
the longest ongoing transmission ends.
Friday, 28August 2020 Schedule based protocols 86
LOW DUTY CYCLE
PROTOCOLS AND
WAKEUP CONCEPTS
Friday, 28August 2020 Schedule based protocols 87
LOW DUTY CYCLE PROTOCOLS
AND WAKEUP CONCEPTS
• Low duty cycle protocols try to avoid spending (much) time in the
idle state and to reduce the communication activities of a sensor
node to a minimum. In an ideal case, the sleep state is left only
when a node is about to transmit or receive packets.
• Periodic wake up scheme
• In this approach, nodes spend most of their time in the sleep mode
and wake up periodically to receive packets from other nodes.
• Specifically, a node A listens onto the channel during its listen
period and goes back into sleep mode when no other node takes
the opportunity to direct a packet to A.
Friday, 28August 2020 Schedule based protocols 88
LOW DUTY CYCLE PROTOCOLS
AND WAKEUP CONCEPTS
• Method 1
• Transmitter B must acquire knowledge about A’s listen periods to
send its packet at the right time, this task corresponds to a
rendezvous.
• Node A transmit a short beacon at the beginning of its listen period
to indicate its willingness to receive packets.
Friday, 28August 2020 Schedule based protocols 89
LOW DUTY CYCLE PROTOCOLS
AND WAKEUP CONCEPTS
• Method 2
• This method is to let node B send frequent request packets until
one of them hits A’s listen period and is really answered by A
Friday, 28August 2020 Schedule based protocols 90
LOW DUTY CYCLE PROTOCOLS
AND WAKEUP CONCEPTS
• Method 1 – B knows A’s listen time and send packets at right time
• Method 2 – B sends RTS to A’s listen period untill A answers (B
does not know A’s listen time)
• However, in either case, node A only receives packets during its
listen period.
• If node A itself wants to transmit packets, it must acquire the
target’s listen period.
• A whole cycle consisting of sleep period and listen period is also
called a wakeup period.
• The ratio of the listen period length to the wakeup period length is
also called the node’s duty cycle.
Friday, 28August 2020 Schedule based protocols 91
LOW DUTY CYCLE PROTOCOLS
AND WAKEUP CONCEPTS
By choosing a small duty cycle, the transceiver is in sleep mode most of
the time, avoiding idle listening and conserving energy.
By choosing a small duty cycle, the traffic directed from neighboring
nodes to a given node concentrates on a small time window (the listen
period) and in heavy load situations significant competition can occur.
Choosing a long sleep period (Small duty cycle) induces a significant
per-hop latency, since a prospective transmitter node has to wait an
average of half a sleep period before the receiver can accept packets.
In the multihop case, the per-hop latencies add up and create
significant end-to-end latencies. Sleep phases should not be too short
lest the start-up costs outweigh the benefits.
Friday, 28August 2020 Schedule based protocols 92
Question
What are the three periods available in periodic
wakeup scheme?
Schedule based protocols 93Friday, 28August 2020
Answer for the Question
Wake up period
Sleep Period
Listening Period
Schedule based protocols 94Friday, 28August 2020
Question
For small duty cycle, the sleep time of the node is
very long.
TRUE
FALSE
Schedule based protocols 95Friday, 28August 2020
Answer for the Question
TRUE
Schedule based protocols 96Friday, 28August 2020
Question
Sleep phase should be short or long ?
Schedule based protocols 97Friday, 28August 2020
Answer for the Question
Short
Schedule based protocols 98Friday, 28August 2020
Question
The ratio of the listen period length to the wakeup period length is
also called
Schedule based protocols 99Friday, 28August 2020
Answer for the Question
Node’s duty cycle
Schedule based protocols 100Friday, 28August 2020
Demand Assignment Protocols
• Resources are allocated on a short term basis
• Centralized and distributed versions are possible
• Central
– Nodes request a reource (e.g. time slot) from a central server
– Waits for ACK and then transmits
– Polling by central station is possible
– Central server to be switced on always
– Central node requires a lot of energy
– Central node may be rotated (LEACH) 101Schedule based protocolsFriday, 28August 2020
Distributed Demand Assignment
Protocols
• Token passing (IEEE 802.4) may be used
• Token is passed among stations in a logical ring
• Ring management needed
– Include/exclude nodes from the ring
– Correct lost tokens
• In WSNs, maintenance is difficult
– Channel errors
– Node xceiver must be switched on all the time (energy ..) due to
variable token delivery times
102Schedule based protocolsFriday, 28August 2020
Random Access Protocols
• Fully distributed
• ALOHA (more on this later)
• CSMA based
– Listen to the medium
– If idle, xmit
– If busy, wait (p persistent, non-persistent etc.)
• RTS/CTS based on MACAW protocol (more later)
103Schedule based protocolsFriday, 28August 2020
Main options Wireless medium access
Centralized
Distributed
Contention-
based
Schedule-
based
Fixed
assignment
Demand
assignment
Contention-basedSchedule-based
Fixed
assignment
Demand
assignment
104Schedule based protocolsFriday, 28August 2020
Centralized medium access
• Idea: Have a central station control when a node may access the
medium
– Example: Polling, centralized computation of TDMA schedules
– Advantage: Simple, quite efficient (e.g., no collisions), burdens
the central station
• Not directly feasible for non-trivial wireless network sizes
• But: Can be quite useful when network is somehow divided into
smaller groups
– Clusters, in each cluster medium access can be controlled
centrally – compare Bluetooth piconets, for example
! Usually, distributed medium access is considered
105Schedule based protocolsFriday, 28August 2020
Preamble Sampling
• So far: Periodic sleeping supported by some means to synchronize wake
up of nodes to ensure rendez-vous between sender and receiver
• Alternative option: Don’t try to explicitly synchronize nodes
– Have receiver sleep and only periodically sample the channel
• Use long preambles to ensure that receiver stays awake to catch actual
packet
– Example: WiseMAC
Check
channel
Check
channel
Check
channel
Check
channel
Start transmission:
Long preamble Actual packet
Stay awake!
106Schedule based protocolsFriday, 28August 2020
• Sensor Protocols for Information via Negotiation (SPIN)
• A Negotiation-Based Protocols for Disseminating Information in
Wireless Sensor Networks.
• Dissemination is the process of distributing individual sensor
observations to the whole network, treating all sensors as sink
nodes
• Replicate complete view of the environment
• Enhance fault tolerance
• Broadcast critical piece of information
SPIN -Sensor Protocols for Information
via Negotiation
107Schedule based protocolsFriday, 28August 2020
• Flooding is the classic approach for dissemination
• Source node sends data to all neighbors
• Receiving node stores and sends data to all its neighbors
• Disseminate data quickly
• Deficiencies
• Implosion
• Overlap
• Resource blindness
SPIN
108Schedule based protocolsFriday, 28August 2020
• Negotiation
• Before transmitting data, nodes negotiate with each other to
overcome implosion and overlap
• Only useful information will be transferred
• Observed data must be described by meta-data
• Resource adaptation
• Each sensor node has resource manager
• Applications probe manager before transmitting or processing
data
• Sensors may reduce certain activities when energy is low
SPIN
109Schedule based protocolsFriday, 28August 2020
• SPIN : A three-stage handshake protocol for point-to-point media
• ADV – data advertisement
• Node that has data to share can advertise this by transmitting
an ADV with meta-data attached
• REQ – request for data
• Node sends a request when it wishes to receive some actual
data
• DATA – data message
• Contain actual sensor data with a meta-data header
• Usually much bigger than ADV or REQ messages
SPIN (cont.)
110Schedule based protocolsFriday, 28August 2020
SPIN Protocol
111Schedule based protocolsFriday, 28August 2020
THANK YOU
112Schedule based protocolsFriday, 28August 2020

More Related Content

What's hot

Mac protocols
Mac protocolsMac protocols
Mac protocolsjuno susi
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewYoav Francis
 
Schedule Based MAC Protocol
Schedule Based MAC ProtocolSchedule Based MAC Protocol
Schedule Based MAC ProtocolDarwin Nesakumar
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolArunChokkalingam
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocolsDarwin Nesakumar
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingArunChokkalingam
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsnDeepaDasarathan
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksMd Waresul Islam
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
EC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv eceEC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv eceGOWTHAMMS6
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSNMahbubur Rahman
 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR) Pradeep Kumar TS
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architectureVidhi603146
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issuesMenaga Selvaraj
 

What's hot (20)

Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
 
Schedule Based MAC Protocol
Schedule Based MAC ProtocolSchedule Based MAC Protocol
Schedule Based MAC Protocol
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient Routing
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
EC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv eceEC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv ece
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR)
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architecture
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issues
 

Similar to Schedule and Contention based MAC protocols

1-4_Kwak-WBAN MAC Issues1.pptx
1-4_Kwak-WBAN MAC Issues1.pptx1-4_Kwak-WBAN MAC Issues1.pptx
1-4_Kwak-WBAN MAC Issues1.pptxVivekRastogi27
 
UNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdfUNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdfMathavan N
 
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...amin azari
 
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...INFOGAIN PUBLICATION
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkdeawoo Kim
 
Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3Easy n Inspire L
 
Energy Efficient MAC for Cellular-Based M2M Communications
Energy Efficient MAC for Cellular-Based M2M CommunicationsEnergy Efficient MAC for Cellular-Based M2M Communications
Energy Efficient MAC for Cellular-Based M2M Communicationsamin azari
 
Link Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoTLink Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoTPrasant Misra
 
An energy efficient mac protocol for wireless
An energy efficient mac protocol for wirelessAn energy efficient mac protocol for wireless
An energy efficient mac protocol for wirelessnabil_alsharafi
 
DCN-321-Chiwaya_Lesson7_DataElements_Switching.pdf
DCN-321-Chiwaya_Lesson7_DataElements_Switching.pdfDCN-321-Chiwaya_Lesson7_DataElements_Switching.pdf
DCN-321-Chiwaya_Lesson7_DataElements_Switching.pdfOscarKelvinNsitu
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Editor Jacotech
 

Similar to Schedule and Contention based MAC protocols (20)

1-4_Kwak-WBAN MAC Issues1.pptx
1-4_Kwak-WBAN MAC Issues1.pptx1-4_Kwak-WBAN MAC Issues1.pptx
1-4_Kwak-WBAN MAC Issues1.pptx
 
UNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdfUNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdf
 
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
 
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
 
Medium access control unit 3-33
Medium access control  unit 3-33Medium access control  unit 3-33
Medium access control unit 3-33
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
UNDERWATER SENSORS NETWORKS
UNDERWATER SENSORS NETWORKSUNDERWATER SENSORS NETWORKS
UNDERWATER SENSORS NETWORKS
 
Wsn protocols
Wsn protocolsWsn protocols
Wsn protocols
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
mac-adhoc.ppt
mac-adhoc.pptmac-adhoc.ppt
mac-adhoc.ppt
 
Ad-hoc.pdf
Ad-hoc.pdfAd-hoc.pdf
Ad-hoc.pdf
 
14653128.ppt
14653128.ppt14653128.ppt
14653128.ppt
 
Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3
 
Energy Efficient MAC for Cellular-Based M2M Communications
Energy Efficient MAC for Cellular-Based M2M CommunicationsEnergy Efficient MAC for Cellular-Based M2M Communications
Energy Efficient MAC for Cellular-Based M2M Communications
 
PROGRESS 1& 2.ppt
PROGRESS 1& 2.pptPROGRESS 1& 2.ppt
PROGRESS 1& 2.ppt
 
Link Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoTLink Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoT
 
An energy efficient mac protocol for wireless
An energy efficient mac protocol for wirelessAn energy efficient mac protocol for wireless
An energy efficient mac protocol for wireless
 
DCN-321-Chiwaya_Lesson7_DataElements_Switching.pdf
DCN-321-Chiwaya_Lesson7_DataElements_Switching.pdfDCN-321-Chiwaya_Lesson7_DataElements_Switching.pdf
DCN-321-Chiwaya_Lesson7_DataElements_Switching.pdf
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...
 
Mac adhoc
Mac adhocMac adhoc
Mac adhoc
 

More from Darwin Nesakumar

MG8591 - PRINCIPLES OF MANAGEMENT.pptx
MG8591 - PRINCIPLES OF MANAGEMENT.pptxMG8591 - PRINCIPLES OF MANAGEMENT.pptx
MG8591 - PRINCIPLES OF MANAGEMENT.pptxDarwin Nesakumar
 
Digital Electronics Fundamentals
Digital Electronics Fundamentals Digital Electronics Fundamentals
Digital Electronics Fundamentals Darwin Nesakumar
 
Feedback Amplifiers & Operational Amplifiers (OPAMP)
Feedback Amplifiers  & Operational Amplifiers (OPAMP)Feedback Amplifiers  & Operational Amplifiers (OPAMP)
Feedback Amplifiers & Operational Amplifiers (OPAMP)Darwin Nesakumar
 
Field Effect Transistor (FET)
Field Effect Transistor (FET)Field Effect Transistor (FET)
Field Effect Transistor (FET)Darwin Nesakumar
 
Bipolar Junction Transistor (BJT).pptx
Bipolar Junction Transistor (BJT).pptxBipolar Junction Transistor (BJT).pptx
Bipolar Junction Transistor (BJT).pptxDarwin Nesakumar
 
Semiconductor Diodes and Circuits
Semiconductor Diodes and CircuitsSemiconductor Diodes and Circuits
Semiconductor Diodes and CircuitsDarwin Nesakumar
 
Sensor Networks – Introduction & Architectures by Mr.Darwin Nesakumar, AP/EC...
Sensor  Networks – Introduction & Architectures by Mr.Darwin Nesakumar, AP/EC...Sensor  Networks – Introduction & Architectures by Mr.Darwin Nesakumar, AP/EC...
Sensor Networks – Introduction & Architectures by Mr.Darwin Nesakumar, AP/EC...Darwin Nesakumar
 
DSDV Protocols by Mr.Darwin Nesakumar A, AP/ECE, R.M.K.Engineering College
DSDV Protocols by Mr.Darwin Nesakumar A, AP/ECE, R.M.K.Engineering CollegeDSDV Protocols by Mr.Darwin Nesakumar A, AP/ECE, R.M.K.Engineering College
DSDV Protocols by Mr.Darwin Nesakumar A, AP/ECE, R.M.K.Engineering CollegeDarwin Nesakumar
 
Introduction to Routing Protocols of MANET
Introduction to Routing Protocols of MANET Introduction to Routing Protocols of MANET
Introduction to Routing Protocols of MANET Darwin Nesakumar
 
AODV - Ad hoc On-Demand Distance Vector Routing Protocols
AODV - Ad hoc On-Demand Distance Vector Routing Protocols AODV - Ad hoc On-Demand Distance Vector Routing Protocols
AODV - Ad hoc On-Demand Distance Vector Routing Protocols Darwin Nesakumar
 
Introduction to MANET By Mr.Darwin Nesakumar A,M.E.,(P.hD) AP/ECE, R.M.K.Engi...
Introduction to MANET By Mr.Darwin Nesakumar A,M.E.,(P.hD) AP/ECE, R.M.K.Engi...Introduction to MANET By Mr.Darwin Nesakumar A,M.E.,(P.hD) AP/ECE, R.M.K.Engi...
Introduction to MANET By Mr.Darwin Nesakumar A,M.E.,(P.hD) AP/ECE, R.M.K.Engi...Darwin Nesakumar
 
Applications and issues of MANET By Mr.Darwin Nesakumar A,M.E.,(P.hD) AP/ECE...
Applications and issues of  MANET By Mr.Darwin Nesakumar A,M.E.,(P.hD) AP/ECE...Applications and issues of  MANET By Mr.Darwin Nesakumar A,M.E.,(P.hD) AP/ECE...
Applications and issues of MANET By Mr.Darwin Nesakumar A,M.E.,(P.hD) AP/ECE...Darwin Nesakumar
 

More from Darwin Nesakumar (12)

MG8591 - PRINCIPLES OF MANAGEMENT.pptx
MG8591 - PRINCIPLES OF MANAGEMENT.pptxMG8591 - PRINCIPLES OF MANAGEMENT.pptx
MG8591 - PRINCIPLES OF MANAGEMENT.pptx
 
Digital Electronics Fundamentals
Digital Electronics Fundamentals Digital Electronics Fundamentals
Digital Electronics Fundamentals
 
Feedback Amplifiers & Operational Amplifiers (OPAMP)
Feedback Amplifiers  & Operational Amplifiers (OPAMP)Feedback Amplifiers  & Operational Amplifiers (OPAMP)
Feedback Amplifiers & Operational Amplifiers (OPAMP)
 
Field Effect Transistor (FET)
Field Effect Transistor (FET)Field Effect Transistor (FET)
Field Effect Transistor (FET)
 
Bipolar Junction Transistor (BJT).pptx
Bipolar Junction Transistor (BJT).pptxBipolar Junction Transistor (BJT).pptx
Bipolar Junction Transistor (BJT).pptx
 
Semiconductor Diodes and Circuits
Semiconductor Diodes and CircuitsSemiconductor Diodes and Circuits
Semiconductor Diodes and Circuits
 
Sensor Networks – Introduction & Architectures by Mr.Darwin Nesakumar, AP/EC...
Sensor  Networks – Introduction & Architectures by Mr.Darwin Nesakumar, AP/EC...Sensor  Networks – Introduction & Architectures by Mr.Darwin Nesakumar, AP/EC...
Sensor Networks – Introduction & Architectures by Mr.Darwin Nesakumar, AP/EC...
 
DSDV Protocols by Mr.Darwin Nesakumar A, AP/ECE, R.M.K.Engineering College
DSDV Protocols by Mr.Darwin Nesakumar A, AP/ECE, R.M.K.Engineering CollegeDSDV Protocols by Mr.Darwin Nesakumar A, AP/ECE, R.M.K.Engineering College
DSDV Protocols by Mr.Darwin Nesakumar A, AP/ECE, R.M.K.Engineering College
 
Introduction to Routing Protocols of MANET
Introduction to Routing Protocols of MANET Introduction to Routing Protocols of MANET
Introduction to Routing Protocols of MANET
 
AODV - Ad hoc On-Demand Distance Vector Routing Protocols
AODV - Ad hoc On-Demand Distance Vector Routing Protocols AODV - Ad hoc On-Demand Distance Vector Routing Protocols
AODV - Ad hoc On-Demand Distance Vector Routing Protocols
 
Introduction to MANET By Mr.Darwin Nesakumar A,M.E.,(P.hD) AP/ECE, R.M.K.Engi...
Introduction to MANET By Mr.Darwin Nesakumar A,M.E.,(P.hD) AP/ECE, R.M.K.Engi...Introduction to MANET By Mr.Darwin Nesakumar A,M.E.,(P.hD) AP/ECE, R.M.K.Engi...
Introduction to MANET By Mr.Darwin Nesakumar A,M.E.,(P.hD) AP/ECE, R.M.K.Engi...
 
Applications and issues of MANET By Mr.Darwin Nesakumar A,M.E.,(P.hD) AP/ECE...
Applications and issues of  MANET By Mr.Darwin Nesakumar A,M.E.,(P.hD) AP/ECE...Applications and issues of  MANET By Mr.Darwin Nesakumar A,M.E.,(P.hD) AP/ECE...
Applications and issues of MANET By Mr.Darwin Nesakumar A,M.E.,(P.hD) AP/ECE...
 

Recently uploaded

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 

Recently uploaded (20)

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 

Schedule and Contention based MAC protocols

  • 1. SCHEDULE & CONTENTION BASED MAC PROTOCOLS Darwin Nesakumar A, M.E, (P.hD) Assistant Professor Department of ECE R.M.K. Engineering College
  • 2. Agenda • Review of previous session • Mediation Device Protocol • Scheduled based protocols in WSN • S-MACS • Contention based protocols in WSN • PAMAS Protocol • Low duty Cycle and Wake up Concepts • Quizzes 2Schedule based protocolsFriday, 28August 2020
  • 3. Review of previous session • Joinmyquiz.com 3Schedule based protocolsFriday, 28August 2020
  • 4. Question What is needed in schedule based MACs Frequency Synchronization Time Synchronization Code Synchronization Schedule based protocols 4Friday, 28August 2020
  • 5. Answer for the Question Time Synchronization Schedule based protocols 5Friday, 28August 2020
  • 6. Question Risk of packet collisions occur in Schedule based MACs Contention based MACs Schedule based protocols 6Friday, 28August 2020
  • 7. Answer for the Question Contention based MACs Schedule based protocols 7Friday, 28August 2020
  • 8. Question The two options to shut up senders are to inform potential interferers while a reception is on-going and before a reception is on-going TRUE FALSE Schedule based protocols 8Friday, 28August 2020
  • 9. Answer for the Question TRUE Schedule based protocols 9Friday, 28August 2020
  • 10. Question Clusterhead uses FDMA TRUE FALSE Schedule based protocols 10Friday, 28August 2020
  • 11. Answer for the Question FALSE Schedule based protocols 11Friday, 28August 2020
  • 12. Question Role of clusterhead is _____________ to share the burden Distributed Rotated Converged Schedule based protocols 12Friday, 28August 2020
  • 13. Answer for the Question Rotated Schedule based protocols 13Friday, 28August 2020
  • 14. Question What is the percentage of nodes to become clusterhead? Schedule based protocols 14Friday, 28August 2020
  • 15. Answer for the Question 5% Schedule based protocols 15Friday, 28August 2020
  • 16. Question Inter cluster uses TDMA CDMA Schedule based protocols 16Friday, 28August 2020
  • 17. Answer for the Question CDMA Schedule based protocols 17Friday, 28August 2020
  • 18. Question Which transmission is used in advertisement phase? Unicast Multicast Broadcast Schedule based protocols 18Friday, 28August 2020
  • 19. Answer for the Question Broadcast Schedule based protocols 19Friday, 28August 2020
  • 20. Question TDMA is being used for Intra Cluster Inter Cluster Schedule based protocols 20Friday, 28August 2020
  • 21. Answer for the Question Intra Cluster Schedule based protocols 21Friday, 28August 2020
  • 22. Question LEACH stands for Schedule based protocols 22Friday, 28August 2020
  • 23. Answer for the Question Low-energy Adaptive Clustering Hierarchy Schedule based protocols 23Friday, 28August 2020
  • 24. Question What are the two phases in LEACH Protocol? Schedule based protocols 24Friday, 28August 2020
  • 25. Answer for the Question Set up phase Steady State Phase Schedule based protocols 25Friday, 28August 2020
  • 26. IMPORTANT POINTS TO BE REMEMBER MAC Protocols • MAC – Medium Access Control • They coordinate the times where a number of nodes access a shared communication medium. • Main requirement – Energy efficiency • Energy waste due to – Overhead, Overhearing, Collisions and idle listening • Switch the transceiver into Sleep Mode – Energy saving approach • There are trade offs between energy expenditure and delay, throughput • MAC is first protocol above the Physical layer (PHY) • Fundamental task is to regulate the access of number of nodes to a shared medium • Few traditional criteria are delay, throughput, fairness • Energy conservation is an issue in MAC • MAC is apart of Data Link Layer (DLL) – OSI reference model • MAC protocol determines for a node the points in time when it accesses the medium to try to transmit a data, control, or management packet to another node (unicast) or to a set of nodes (multicast, broadcast). 26Schedule based protocolsFriday, 28August 2020
  • 27. IMPORTANT POINTS TO BE REMEMBER MAC Protocols • MAC is a part of Data Link Layer (DLL) • DLL Responsibilities are • Error Control – used to ensure correctness of transmission and to take appropriate actions in case of transmission errors • Flow control - regulates the rate of transmission to protect a slow receiver from being overwhelmed with data • Main approach to conserve energy – Put nodes in sleep state whenever possible • Low duty cycle, Wake up concepts • Two types of MAC Protocols are Contention based and schedule based • Contention based – It is a communication protocol for operating wireless telecommunication equipment that allows many users to use same radio channel without pre coordination • Schedule based - A schedule exists, regulating which participant may use which resource at which time 27Schedule based protocolsFriday, 28August 2020
  • 28. SCHEDULE- VS. CONTENTION-BASED MAC • Schedule-based MAC – A schedule exists, regulating which participant may use which resource at which time (TDMA component) – Typical resource: frequency band in a given physical space (with a given code, CDMA) – Schedule can be fixed or computed on demand • Usually: mixed – difference fixed/on demand is one of time scales – Usually, collisions, overhearing, idle listening no issues – Needed: time synchronization! • Contention-based protocols – Risk of colliding packets is deliberately taken – Hope: coordination overhead can be saved, resulting in overall improved efficiency – Mechanisms to handle/reduce probability/impact of collisions required – Usually, randomization used somehow 28Schedule based protocolsFriday, 28August 2020
  • 29. IMPORTANT POINTS TO BE REMEMBER LEACH Protocol • Given: Dense network of nodes, reporting to a central sink, each node can reach sink directly • Group of nodes – Cluster, controlled by clusterhead • Clusterheads organize CDMA code for all member transmissions, TDMA schedule to be used within a cluster • CHs collect & aggregate data from all cluster members, aggregates the data from members and forwards to sink using CDMA • About 5% of nodes become clusterhead, Role of clusterhead is rotated to share the burden • Two phases – Set up phase and steady state phase • Set up phase – Election of Clusterhead, advertisement of Clusterhead to the members via broadcasting • Setup phase – CH assigns TDMA for members, CDMA for transmitting the data to sink • TDMA – Intra Cluster • CDMA – Inter Cluster 29Schedule based protocolsFriday, 28August 2020
  • 30. IMPORTANT POINTS TO BE REMEMBER LEACH Protocol • Steady State Phase : CHs collect & aggregate data from all cluster members, report aggregated data to sink using CDMA • The cluster-head is maintained when data is transmitted between nodes. CH is responsible for creating and maintaining a TDMA schedule; all the other nodes of a cluster are member nodes. • To all member nodes, TDMA slots are assigned, which can be used to exchange data between the member and the clusterhead. • With the exception of their time slots, the members can spend their time in sleep state. • The clusterhead aggregates the data of its members and transmits it to the sink node or to other nodes for further relaying. • Since the sink is often far away, the clusterhead must spend significant energy for this transmission. • For a member, it is typically much cheaper to reach the clusterhead than to transmit directly to the sink • There is no peer-to-peer communication. 30Schedule based protocolsFriday, 28August 2020
  • 31. IMPORTANT POINTS TO BE REMEMBER LEACH Protocol • Advantages • Increases the lifetime of the network, Even drain of energy • Distributed, no global knowledge required • Energy saving due to aggregation by CHs • TDMA- Nodes assigned with time slot for transmission and let them sleep at all other times. • Transmission schedules achieve no collisions occur at receivers and hence no special mechanisms are needed to avoid hidden-terminal situations. 31Schedule based protocolsFriday, 28August 2020
  • 32. IMPORTANT POINTS TO BE REMEMBER LEACH Protocol • The setup and maintenance of schedules involves signaling traffic. • If a TDMA variant is employed, time is divided into comparably small slots • Such schedules are not easily adapted to different load situations on small timescales. • The schedule of a node (and possibly those of its neighbors) may require a significant amount of memory, which is a scarce resource in several sensor node designs. Disadvantages • LEACH assumes all nodes can transmit with enough power to reach BS if necessary (e.g., elected as CHs) • Each node should support both TDMA & CDMA • Need to do time synchronization • Nodes use single-hop communication • LEACH would not be able to cover large geographical areas of some square miles or more, because a clusterhead two miles away from the sink likely does not have enough energy to reach the sink at all. 32Schedule based protocolsFriday, 28August 2020
  • 33. SCHEDULE-BASED MAC PROTOCOLS 33Schedule based protocolsFriday, 28August 2020
  • 34. THE MEDIATION DEVICE PROTOCOL Friday, 28August 2020 Schedule based protocols 34
  • 35.  It allows each node in a WSN to go into sleep mode periodically and to wake up only for short times to receive packets from neighbor nodes.  There is no global time reference, each node has its own sleeping schedule, and does not take care of its neighbors sleep schedules. To receive packets after wake up period Upon each periodic wakeup, a node transmits a short query beacon, indicating its node address and its willingness to accept packets from other nodes. The node stays awake for some short time following the query beacon, to open up a window for incoming packets. If no packet is received during this window, the node goes back into sleep mode. THE MEDIATION DEVICE PROTOCOL 35Schedule based protocolsFriday, 28August 2020
  • 36. Question Upon each periodic wakeup, a node transmits a _______ query beacon, indicating its node address and its willingness to accept packets from other nodes. Short Medium Long Schedule based protocols 36Friday, 28August 2020
  • 37. Answer for the Question Short Schedule based protocols 37Friday, 28August 2020
  • 38. To transmit packets after wake up period  When a node wants to transmit a packet to a neighbor, it has to synchronize with it. One option would be to have the sender actively waiting for query beacon, but this wastes considerable energy for synchronization purposes only.  The dynamic synchronization approach achieves this synchronization without requiring the transmitter to be awake permanently to detect the destinations query beacon.  To achieve this, a mediation device (MD) is used. We first discuss the case where the mediation device is not energy constrained and can be active all the time. THE MEDIATION DEVICE PROTOCOL 38Schedule based protocolsFriday, 28August 2020
  • 39. Question What is the purpose of Mediation device? Schedule based protocols 39Friday, 28August 2020
  • 40. Answer for the Question Dynamic synchronization Schedule based protocols 40Friday, 28August 2020
  • 41. • Because of its full duty cycle, the mediation device can receive the query beacons from all nodes in its vicinity and learn their wakeup period Protocol • Sender A sends RTS to MD • MD stores this information • Receiver B sends query to MD • MD tells reciever B when to wake up • B sends CTS to A (now in sync) • A sends data • B acknowledges • B returns to old timing 41Schedule based protocolsFriday, 28August 2020
  • 42. THE MEDIATION DEVICE PROTOCOL Advantages  It does not require any time synchronization between the nodes, only the mediation device has to learn the periods of the nodes.  The protocol is asymmetric in the sense that most of the energy burden is shifted to the mediation device, which so far is assumed to be power unconstrained. 42Schedule based protocolsFriday, 28August 2020
  • 43. Question Mediation device is power constrained. TRUE FALSE Schedule based protocols 43Friday, 28August 2020
  • 44. Answer for the Question FALSE Schedule based protocols 44Friday, 28August 2020
  • 45. THE MEDIATION DEVICE PROTOCOL Disadvantages  The nodes transmit their query beacons without checking for ongoing transmissions  If the node density is sufficiently low, this collision probability can be low too. However, in case of higher node densities or unwanted synchronization between the nodes, the number of collisions can be significant.  A possible solution to this is the following: When the MD registers collisions, it might start to emit a dedicated reschedule control frame to all colliding nodes. 45Schedule based protocolsFriday, 28August 2020
  • 46. Question When the MD registers collisions, it might start to emit a dedicated reschedule control frame to ________ nodes. All Neighboring Colliding Schedule based protocols 46Friday, 28August 2020
  • 47. Answer for the Question Colliding Schedule based protocols 47Friday, 28August 2020
  • 48. THE MEDIATION DEVICE PROTOCOL  All colliding nodes can hear this frame as long as the MD repeats it often enough.  Reception of this frame causes each node to randomly pick a new period from a certain interval [a, b] indicated in the reschedule frame.  If the MD continues to perceive collisions, it can enlarge the interval accordingly 48Schedule based protocolsFriday, 28August 2020 Disadvantages
  • 49. THE MEDIATION DEVICE PROTOCOL The mediation device is energy unconstrained, which does not conform to the idea of a “simply thrown out” wireless sensor network There are sufficient mediation devices to cover all nodes. The distributed mediation device protocol deals with these problems in a probabilistic manner. 49Schedule based protocolsFriday, 28August 2020 Drawbacks
  • 50. Question Mediation device is energy _____________ Constrained Unconstrained Schedule based protocols 50Friday, 28August 2020
  • 51. Answer for the Question Unconstrained Schedule based protocols 51Friday, 28August 2020
  • 52. S-MAC PROTOCOL Friday, 28August 2020 Schedule based protocols 52
  • 53. S-MAC PROTOCOL • S-MAC stands for Sensor – Medium Access Control • S-MAC protocol provides mechanisms to avoid/ to bypass idle listening, collisions, and overhearing. It does not require two different channels. • S-MAC adopts a periodic wakeup scheme, that is, each node alternates between a fixed-length listen period and a fixed-length sleep period according to its schedule. • The listen period of S-MAC can be used to receive and transmit packets. • S-MAC attempts to coordinate the schedules of neighboring nodes such that their listen periods start at the same time. Friday, 28August 2020 Schedule based protocols 53
  • 54. Question Which of the following are true ? 1. S-MAC protocol provides mechanisms to avoid/ to bypass idle listening, collisions, and overhearing. 2. S-MAC adopts a periodic wakeup scheme 3. S-MAC attempts to coordinate the schedules of neighboring nodes Schedule based protocols 54Friday, 28August 2020
  • 55. Answer for the Question All are true Schedule based protocols 55Friday, 28August 2020
  • 56. Question S – MAC requires two different channels channel TRUE FALSE Schedule based protocols 56Friday, 28August 2020
  • 57. Answer for the Question FALSE Schedule based protocols 57Friday, 28August 2020
  • 58. S-MAC PROTOCOL • A node x’s listen period is subdivided into three different phases • Synchronization Phase • RTS Phase • CTS Phase Friday, 28August 2020 Schedule based protocols 58
  • 59. S-MAC PROTOCOL • Synchronization Phase • It is the first phase of S-MAC Protocol • In this phase node x accepts SYNCH packets from its neighbors. • In these packets, the neighbors describe their own schedule and x stores their schedule in a table (the schedule table). • Node x’s SYNCH phase is subdivided into time slots and x’s neighbors contend according to a CSMA scheme, that is, each neighbor y wishing to transmit a SYNCH packet picks one of the time slots randomly and starts to transmit if no signal was received in any of the previous slots. Friday, 28August 2020 Schedule based protocols 59
  • 60. S-MAC PROTOCOL • Synchronization Phase • In the other case, y goes back into sleep mode and waits for x’s next wakeup. • In the other direction, since x knows a neighbor y’s schedule, x can wake at appropriate times and send its own SYNCH packet to y (in broadcast mode). • It is not required that x broadcasts its schedule in every of y’s wakeup periods. However, for reasons of time synchronization and to allow new nodes to learn their local network topology, x should send SYNCH packets periodically. The according period is called synchronization period. Friday, 28August 2020 Schedule based protocols 60
  • 61. S-MAC PROTOCOL • RTS Phase • In this second phase x listens for RTS packets from neighboring nodes. • In S-MAC, the RTS/CTS handshake is used to reduce collisions of data packets due to hidden-terminal situations. • Again, interested neighbors contend in this phase according to a CSMA scheme with additional backoff. Friday, 28August 2020 Schedule based protocols 61
  • 62. Question In S-MAC, the __________________is used to reduce collisions of data packets due to hidden-terminal situations. RTS/CTS handshake RTS/CTS Milkshake RTS/CTS legshake Schedule based protocols 62Friday, 28August 2020
  • 63. Answer for the Question RTS/CTS handshake Schedule based protocols 63Friday, 28August 2020
  • 64. S-MAC PROTOCOL • CTS Phase • In the third phase node x transmits a CTS packet if an RTS packet was received in the previous phase. After this, the packet exchange continues, extending into x’s nominal sleep time. • In general, when competing for the medium, the nodes use the RTS/CTS handshake, including the virtual carrier-sense mechanism, whereby a node maintains a NAV variable. • The NAV (Network Allocation Vector – Virtual Carrier Sensing) mechanism can be readily used to switch off the node during ongoing transmissions to avoid overhearing. • When transmitting in a broadcast mode (for example SYNCH packets), the RTS and CTS packets are dropped and the nodes use CSMA with backoff. • Friday, 28August 2020 Schedule based protocols 64
  • 65. S-MAC PROTOCOL • CTS Phase • If we can arrange that the schedules of node x and its neighbors are synchronized, node x and all its neighbors wake up at the same time and x can reach all of them with a single SYNCH packet. • The S-MAC protocol allows neighboring nodes to agree on the same schedule and to create virtual clusters. • The clustering structure refers solely to the exchange of schedules; the transfer of data packets is not influenced by virtual clustering. Friday, 28August 2020 Schedule based protocols 65
  • 66. Question What are the three phases of listen period? Schedule based protocols 66Friday, 28August 2020
  • 67. Answer for the Question Synchronization Phase RTS Phase CTS Phase Schedule based protocols 67Friday, 28August 2020
  • 68. • MACA’s idle listening is particularly unsuitable if average data rate is low • Most of the time, nothing happens • Idea: Switch nodes off, ensure that neighboring nodes turn on simultaneously to allow packet exchange S-MAC PROTOCOL • Only in these active periods, packet exchanges happen • Need to also exchange wakeup schedule between neighbors • When awake, essentially perform RTS/CTS • Use SYNCH, RTS, CTS phases Wakeup period Active period Sleep period For SYNCH For RTS For CTS 68Schedule based protocolsFriday, 28August 2020
  • 69. S-MAC Synchronized islands • Nodes try to pick up schedule synchronization from neighboring nodes • If no neighbor found, nodes pick some schedule to start with • If additional nodes join, some node might learn about two different schedules from different nodes – “Synchronized islands” • To bridge this gap, it has to follow both schemes Time A A A A C C C C A B B B B D D D A C B D E E E EE E E 69Schedule based protocolsFriday, 28August 2020
  • 70. S-MAC PROTOCOL • Given: Many radio channels, superframes of known length (not necessarily in phase, but still time synchronization required!) • Goal: Set up directional links between neighboring nodes – Link: radio channel + time slot at both sender and receiver – Free of collisions at receiver – Channel picked randomly, slot is searched greedily until a collision-free slot is found • Receivers sleep and only wake up in their assigned time slots, once per superframe • In effect: a local construction of a schedule 70Schedule based protocolsFriday, 28August 2020
  • 71. Timeout-MAC (T-MAC) • In S-MAC, active period is of constant length • What if no traffic actually happens? • Nodes stay awake needlessly long • Idea: Prematurely go back to sleep mode when no traffic has happened for a certain time (=timeout) ! T-MAC • Adaptive duty cycle! • One ensuing problem: Early sleeping • C wants to send to D, but is hindered by transmission A! B A B C D CTS May not send Timeout, go back to sleep as nothing happened 71Schedule based protocolsFriday, 28August 2020
  • 72. B-MAC • Clear Channel Assessment – Adapts to noise floor by sampling channel when it is assumed to be free – Samples are exponentially averaged, result used in gain control – For actual assessment when sending a packet, look at five channel samples – channel is free if even a single one of them is significantly below noise – Optional: random backoff if channel is found busy • Optional: Immediate link layer acknowledgements for received packets 72Schedule based protocolsFriday, 28August 2020
  • 73. B-MAC II • Low Power Listening (= preamble sampling) – Uses the clear channel assessment techniques to decide whether there is a packet arriving when node wakes up – Timeout puts node back to sleep if no packet arrived • B-MAC does not have – Synchronization – RTS/CTS – Results in simpler, leaner implementation – Clean and simple interface • Currently: Often considered as the default WSN MAC protocol 73Schedule based protocolsFriday, 28August 2020
  • 75. CONTENTION-BASED PROTOCOLS  If only one neighbor tries its luck, the packet goes through the channel.  If two or more neighbors try their luck, these have to compete with each other and in unlucky cases, for example, due to hidden-terminal situations, a collision might occur, wasting energy for both transmitter and receiver.  Two important contention based protocols: (slotted) ALOHA and CSMA, along with mechanisms to solve the hidden-terminal problem.  In the following sections, we discuss variations of these protocols with the goal to conserve energy. As opposed to some of the contention- based protocols having a periodic wakeup scheme  The protocols described in this section have no idle listening avoidance and make no restrictions as to when a node can receive a packet. 75Schedule based protocolsFriday, 28August 2020
  • 76. The PAMAS protocol (Power Aware Multi- access with Signaling)  Originally designed for ad hoc networks.  It provides a detailed overhearing avoidance mechanism while it does not consider the idle listening problem.  The protocol combines the busy-tone solution and RTS/CTS handshake similar to the MACA protocol  A distinctive feature of PAMAS is that it uses two channels:  Data channel (while the data channel is reserved for data packets)  Control channel. (All the signaling packets (RTS, CTS, busy tones) are transmitted on the control channel. 76Schedule based protocolsFriday, 28August 2020
  • 77. PAMAS PROTOCOL • Let us consider an idle node x to which a new packet destined to a neighboring node y arrives. • First, x sends an RTS packet on the control channel without doing any carrier sensing. This packet carries both x’s and y’s MAC addresses. • If y receives this packet, it answers with a CTS packet if y does not know of any ongoing transmission in its vicinity. Upon receiving the CTS, x starts to transmit the packet to y on the data channel. • When y starts to receive the data, it sends out a busy-tone packet on the control channel. • If x fails to receive a CTS packet within some time window, it enters the backoff mode, where a binary exponential backoff scheme is used (i.e., the backoff time is uniformly chosen from a time interval that is doubled after each failure to receive a CTS). Friday, 28August 2020 Schedule based protocols 77
  • 78. PAMAS PROTOCOL • Now, let us look at the nodes receiving x’s RTS packet on the control channel. There is the intended receiver y and there are other nodes; let z be one of them. • If z is currently receiving a packet, it reacts by sending a busy-tone packet, which overlaps with y’s CTS at node x and effectively destroys the CTS. Therefore, x cannot start transmission and z’s packet reception is not disturbed. • Since the busy-tone packet is longer than the CTS, we can be sure that the CTS is really destroyed. • We consider the intended receiver y. If y knows about an ongoing transmission in its vicinity, it suppresses its CTS, causing x to back off. Friday, 28August 2020 Schedule based protocols 78
  • 79. PAMAS PROTOCOL • Node y can obtain this knowledge by either sensing the data channel or by checking whether there was some noise on the control channel immediately after receiving the RTS. This noise can be an RTS or CTS of another node colliding at y. • In the other case, y answers with a CTS packet and starts to send out a busy-tone packet as soon as x’s transmission has started. • Furthermore, y sends out busy-tone packets each time it receives some noise or a valid packet on the control channel, to prevent its neighborhood from any activities. Friday, 28August 2020 Schedule based protocols 79
  • 80. PAMAS - Power Aware Multi access with Signaling • Idea: Combine busy tone with RTS/CTS – Results in detailed overhearing avoidance, does not address idle listening – Uses separate data and control channels • Procedure – Node A transmits RTS on control channel, does not sense channel – Node B receives RTS, sends CTS on control channel if it can receive and does not know about ongoing transmissions – B sends busy tone as it starts to receive data Time Control channel Data channel RTS A ! B CTS B ! A Data A ! B Busy tone sent by B 80Schedule based protocolsFriday, 28August 2020
  • 81. PAMAS – Already ongoing transmission • Suppose a node C in vicinity of A is already receiving a packet when A initiates RTS • Procedure – A sends RTS to B – C is sending busy tone (as it receives data) – CTS and busy tone collide, A receives no CTS, does not send data A B C ? Time Control channel Data channel RTS A ! B CTS B ! A No data! Busy tone by C Similarly:Ongoing transmission near B destroys RTS by busy tone 81Schedule based protocolsFriday, 28August 2020
  • 82. PAMAS - Power Aware Multi access with signaling Node X Node y RTS CTS BusyTone • First, x sends an RTS packet on the control channel without doing any carrier sensing. This packet carries both x’s and y’s MAC addresses • If y receives this packet, it answers with a CTS packet if y does not know of any ongoing transmission in its vicinity. • Upon receiving the CTS, x starts to transmit the packet to y on the data channel. When y starts to receive the data, it sends out a busy-tone packet on the control channel. • If x fails to receive a CTS packet within some time window, it enters the backoff mode, where a binary exponential backoff scheme is used (i.e., the backoff time is uniformly chosen from a time interval that is doubled after each failure to receive a CTS) 82Schedule based protocolsFriday, 28August 2020
  • 83. Node X Node y RTS CTS BusyTone  If y knows about an ongoing transmission in its vicinity, it with a CTS packet and starts to send out a busy-tone packet as soon as x’s transmission has started. suppresses its CTS, causing x to back off.  Node y can obtain this knowledge by either sensing the data channel or by checking whether there was some noise on the control channel immediately after receiving the RTS.  This noise can be an RTS or CTS of another node colliding at y. In the other case, y answers  Furthermore, y sends out busy-tone packets each time it receives some noise or a valid packet on the control channel, to prevent its neighborhood from any activities. 83Schedule based protocolsFriday, 28August 2020
  • 84. When can a node put its transceivers (control and data) into sleep mode? Any time a node knows that it cannot transmit or receive packets because some other node in its vicinity is already doing so. This decision is easy if a node x knows about the length of an ongoing transmission, for example from overhearing the RTS or CTS packets or the header of the data packets on the data channel. However, often this length is unknown to x, for example, because these packets are corrupted or a foreign data transmission cycle starts when x is just sleeping. Additional procedures are needed to resolve this 84Schedule based protocolsFriday, 28August 2020
  • 85. When can a node put its transceivers (control and data) into sleep mode? Suppose that x wakes up and finds the data channel busy. There are two cases to distinguish: Case 1 Either x has no own packet to send or x wants to transmit. In the first case, x desires to go back into sleep mode and to wake up exactly when the ongoing transmission ends to be able to receive an immediately following packet. Waking up at the earliest possible time has the advantage of avoiding unwanted delays. However, since x may not have overheard the RTS, CTS, or data packet header belonging to the ongoing transmission, it runs a probing protocol on the control channel to inquire the length of the ongoing packet. 85Schedule based protocolsFriday, 28August 2020
  • 86. When can a node put its transceivers (control and data) into sleep mode? • Case 2 • x wakes up during an ongoing transmission and wants to transmit a packet. Therefore, x has not only to take care of ongoing transmissions but also of ongoing receptions in its vicinity. • To find the time for the next wakeup, x runs the described probing protocol for the set of transmitters, giving a time t when the longest ongoing transmission ends. Friday, 28August 2020 Schedule based protocols 86
  • 87. LOW DUTY CYCLE PROTOCOLS AND WAKEUP CONCEPTS Friday, 28August 2020 Schedule based protocols 87
  • 88. LOW DUTY CYCLE PROTOCOLS AND WAKEUP CONCEPTS • Low duty cycle protocols try to avoid spending (much) time in the idle state and to reduce the communication activities of a sensor node to a minimum. In an ideal case, the sleep state is left only when a node is about to transmit or receive packets. • Periodic wake up scheme • In this approach, nodes spend most of their time in the sleep mode and wake up periodically to receive packets from other nodes. • Specifically, a node A listens onto the channel during its listen period and goes back into sleep mode when no other node takes the opportunity to direct a packet to A. Friday, 28August 2020 Schedule based protocols 88
  • 89. LOW DUTY CYCLE PROTOCOLS AND WAKEUP CONCEPTS • Method 1 • Transmitter B must acquire knowledge about A’s listen periods to send its packet at the right time, this task corresponds to a rendezvous. • Node A transmit a short beacon at the beginning of its listen period to indicate its willingness to receive packets. Friday, 28August 2020 Schedule based protocols 89
  • 90. LOW DUTY CYCLE PROTOCOLS AND WAKEUP CONCEPTS • Method 2 • This method is to let node B send frequent request packets until one of them hits A’s listen period and is really answered by A Friday, 28August 2020 Schedule based protocols 90
  • 91. LOW DUTY CYCLE PROTOCOLS AND WAKEUP CONCEPTS • Method 1 – B knows A’s listen time and send packets at right time • Method 2 – B sends RTS to A’s listen period untill A answers (B does not know A’s listen time) • However, in either case, node A only receives packets during its listen period. • If node A itself wants to transmit packets, it must acquire the target’s listen period. • A whole cycle consisting of sleep period and listen period is also called a wakeup period. • The ratio of the listen period length to the wakeup period length is also called the node’s duty cycle. Friday, 28August 2020 Schedule based protocols 91
  • 92. LOW DUTY CYCLE PROTOCOLS AND WAKEUP CONCEPTS By choosing a small duty cycle, the transceiver is in sleep mode most of the time, avoiding idle listening and conserving energy. By choosing a small duty cycle, the traffic directed from neighboring nodes to a given node concentrates on a small time window (the listen period) and in heavy load situations significant competition can occur. Choosing a long sleep period (Small duty cycle) induces a significant per-hop latency, since a prospective transmitter node has to wait an average of half a sleep period before the receiver can accept packets. In the multihop case, the per-hop latencies add up and create significant end-to-end latencies. Sleep phases should not be too short lest the start-up costs outweigh the benefits. Friday, 28August 2020 Schedule based protocols 92
  • 93. Question What are the three periods available in periodic wakeup scheme? Schedule based protocols 93Friday, 28August 2020
  • 94. Answer for the Question Wake up period Sleep Period Listening Period Schedule based protocols 94Friday, 28August 2020
  • 95. Question For small duty cycle, the sleep time of the node is very long. TRUE FALSE Schedule based protocols 95Friday, 28August 2020
  • 96. Answer for the Question TRUE Schedule based protocols 96Friday, 28August 2020
  • 97. Question Sleep phase should be short or long ? Schedule based protocols 97Friday, 28August 2020
  • 98. Answer for the Question Short Schedule based protocols 98Friday, 28August 2020
  • 99. Question The ratio of the listen period length to the wakeup period length is also called Schedule based protocols 99Friday, 28August 2020
  • 100. Answer for the Question Node’s duty cycle Schedule based protocols 100Friday, 28August 2020
  • 101. Demand Assignment Protocols • Resources are allocated on a short term basis • Centralized and distributed versions are possible • Central – Nodes request a reource (e.g. time slot) from a central server – Waits for ACK and then transmits – Polling by central station is possible – Central server to be switced on always – Central node requires a lot of energy – Central node may be rotated (LEACH) 101Schedule based protocolsFriday, 28August 2020
  • 102. Distributed Demand Assignment Protocols • Token passing (IEEE 802.4) may be used • Token is passed among stations in a logical ring • Ring management needed – Include/exclude nodes from the ring – Correct lost tokens • In WSNs, maintenance is difficult – Channel errors – Node xceiver must be switched on all the time (energy ..) due to variable token delivery times 102Schedule based protocolsFriday, 28August 2020
  • 103. Random Access Protocols • Fully distributed • ALOHA (more on this later) • CSMA based – Listen to the medium – If idle, xmit – If busy, wait (p persistent, non-persistent etc.) • RTS/CTS based on MACAW protocol (more later) 103Schedule based protocolsFriday, 28August 2020
  • 104. Main options Wireless medium access Centralized Distributed Contention- based Schedule- based Fixed assignment Demand assignment Contention-basedSchedule-based Fixed assignment Demand assignment 104Schedule based protocolsFriday, 28August 2020
  • 105. Centralized medium access • Idea: Have a central station control when a node may access the medium – Example: Polling, centralized computation of TDMA schedules – Advantage: Simple, quite efficient (e.g., no collisions), burdens the central station • Not directly feasible for non-trivial wireless network sizes • But: Can be quite useful when network is somehow divided into smaller groups – Clusters, in each cluster medium access can be controlled centrally – compare Bluetooth piconets, for example ! Usually, distributed medium access is considered 105Schedule based protocolsFriday, 28August 2020
  • 106. Preamble Sampling • So far: Periodic sleeping supported by some means to synchronize wake up of nodes to ensure rendez-vous between sender and receiver • Alternative option: Don’t try to explicitly synchronize nodes – Have receiver sleep and only periodically sample the channel • Use long preambles to ensure that receiver stays awake to catch actual packet – Example: WiseMAC Check channel Check channel Check channel Check channel Start transmission: Long preamble Actual packet Stay awake! 106Schedule based protocolsFriday, 28August 2020
  • 107. • Sensor Protocols for Information via Negotiation (SPIN) • A Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks. • Dissemination is the process of distributing individual sensor observations to the whole network, treating all sensors as sink nodes • Replicate complete view of the environment • Enhance fault tolerance • Broadcast critical piece of information SPIN -Sensor Protocols for Information via Negotiation 107Schedule based protocolsFriday, 28August 2020
  • 108. • Flooding is the classic approach for dissemination • Source node sends data to all neighbors • Receiving node stores and sends data to all its neighbors • Disseminate data quickly • Deficiencies • Implosion • Overlap • Resource blindness SPIN 108Schedule based protocolsFriday, 28August 2020
  • 109. • Negotiation • Before transmitting data, nodes negotiate with each other to overcome implosion and overlap • Only useful information will be transferred • Observed data must be described by meta-data • Resource adaptation • Each sensor node has resource manager • Applications probe manager before transmitting or processing data • Sensors may reduce certain activities when energy is low SPIN 109Schedule based protocolsFriday, 28August 2020
  • 110. • SPIN : A three-stage handshake protocol for point-to-point media • ADV – data advertisement • Node that has data to share can advertise this by transmitting an ADV with meta-data attached • REQ – request for data • Node sends a request when it wishes to receive some actual data • DATA – data message • Contain actual sensor data with a meta-data header • Usually much bigger than ADV or REQ messages SPIN (cont.) 110Schedule based protocolsFriday, 28August 2020
  • 111. SPIN Protocol 111Schedule based protocolsFriday, 28August 2020
  • 112. THANK YOU 112Schedule based protocolsFriday, 28August 2020

Editor's Notes

  1. Solutions to early sleeping as homework?
  2. Probing protocol of PAMAS as exercise?
  3. Das gibt eine SEHR schöne Übungsaufgabe!