SlideShare a Scribd company logo
1 of 10
Sensor-MAC(S-MAC)
 In S-MAC , the sensor node follows the schedule as listen-sleep mode.
 Each node maintains a schedule table
that stores the schedules of all its
known neighbors.
 The node first listens for a certain
amount of time. If it does not hear a schedule from another node, it randomly
chooses a time to go to sleep and immediately broadcasts its schedule in a SYNC
message, indicating that it will go to sleep after t seconds. We call such a
node a synchronizer, since it chooses its schedule independently and other
nodes will synchronize with it.
 If the node receives a schedule from a neighbor before choosing its own
schedule, it follows that schedule by setting its schedule to be the same. We call
such a node a follower. It then waits for a random delay td and rebroadcasts this
schedule, indicating that it will sleep in t- td seconds. The random delay is for
collision avoidance.
 If a node receives a different schedule after it selects and broadcasts its own
schedule, it adopts both schedules (i.e., it schedules itself to wake up at the
times of both is neighbor and itself). It broadcasts it own schedule before going
to sleep.
 In listen/sleep scheme, for listen
period a node send a SYNC packet
includes the address of the sender
and the time of its next sleep due to
update schedule.
 Receivers will adjust their timers
immediately after they receive the
SYNC packet.
 For receiver, The listen interval is
divide into two parts; SYNC and RTS
listening.
 if a sender wants to send a SYNC packet, it starts carrier sense when the
receiver begins listening. It randomly selects a time slot to finish its carrier
sense. If it has not detected any transmission by the end of the time slot, it wins
the medium and starts sending its SYNC packet at that time.
 CS stands for carrier sense. sender 1 only sends a SYNC packet. Sender 2 only
wants to send data. Sender 3 sends a SYNC packet and a RTS packet.
 Each node periodically broadcasts SYNC packets to its neighbors even if it has
no followers. This allows new nodes to join an existing neighborhood. The new
node follows the same procedure in the above subsection to choose its
schedule.
S-MAC Adaptive listening(2004)
 S-MAC proposes an important technique, called adaptive listen, to improve the
latency caused by the periodic sleep of each node in a multihop network.
 The basic idea is to let the node who overhears its neighbor’s transmissions
(ideally only RTS or CTS) wake up for a short period of time at the end of
the transmission.
 In this way, if the node is the next-hop node, its neighbor is able to immediately
pass the data to it instead of waiting for its scheduled listen time.
 If the node does not receive anything during the adaptive listening, it will go back
to sleep until its next scheduled listen time.
Synchronous channel polling(SCP-MAC)(2006)
 To send a packet, the sender adds
a preamble before the packet.
 This preamble is effectively a
wake-up signal, informing other
nodes a data packet is about to be
transmitted.
 The preamble must be at least as
long as the channel polling period to ensure all receivers will detect it.
 The performance of LPL is sensitive to the channel polling period, since longer
periods reduce receiver costs but increase sender costs.
 unlike LPL, SCP-MAC synchronizes the polling times (schedules) of all neighboring
nodes.
 a short wake-up tone is
required for senders to
guarantee rendezvous.
A sends to node B. When B
receives a packet during the first
regular polling.
 it adds n high frequency poll in
the same frame, immediately following its regular poll. (We define n below)
If A has more packets to send, it sends them in these adaptive polling times.
Spacing of adaptive slots is determined by the longest packet length that the
physical layer supports.
 If B finds none of its additional polls useful (such as if A had no additional data to
send) it transitions back to its regular, low-duty cycle polling period.
 If any of B’s additional slots were successfully used, B extends the adaptive polling
with n slots, allowing A to continue transmission.
 It also automatically plans an additional n in the next frame.
If the duration of the traffic burst is shorter than one regular polling period, such
process repeats at each hop, and the whole data can be transferred over N hops
using N polling periods.
Disadvantage:
Q-MAC(Query based network)(2006)
 In Q-MAC two types of sleep planning to suit query processing in a multi hop
network. It follows a (1) static sleep schedule when there is no query and (2)
dynamic sleep schedule when a query is transmitted.
 When there is no query, the nodes follow a static sleep schedule.
 The active time
period of the nodes
at different regions
are synchronized such
that the next hop
node is made active
before the current
node’s active period
is over.
 When the destination is
unknown to the sink, but it
may know the appropriate
region (e.g. temperature of a
node in north).In this case, the
sink can send the query to the
cluster head and the cluster
head can send it to the
destination.
 The node which forwards
the query packet will change
the sleep schedule as fully ‘on’
(sink)till it gets the data packet.
 When the destination node E
sends the data packet, the
intermediate nodes will change their radio to their usual schedule, after
forwarding the data packet. This dynamic schedule avoids the delay in
transmission.
 If the destination is known (i.e. how many hops away from a node), the schedule
can be changed dynamically based on the arrival time of the data.
The intermediate nodes calculate the time at which they have to forward the
data using the following details:
 The time at which the
query packet is forwarded,
The distance of the
destination node,
Time taken to transmit the
data packet for one hop
distance.
 The accurate wake up time
is hard to estimate and
each node is activated at
the reserved time and is
kept active for a timeout
period.
 If the packet is not
received within the
timeout period, the node
will switch off the radio.
 The sleep schedule if data
should be collected from
multiple destinations. In
this case, a multicast query
is sent to the destination
sensor nodes.
 There may be many number of packets to the sink for a single query, since
many nodes send the sensed information.
 The radio of the intermediate nodes is made on, after a particular period of
time.
 After all the data packets are transmitted, a control packet is sent towards the
sink, so that the intermediate nodes switch off the radio.
 The radio remains on until a control packet is received. The cluster head or a
special node is responsible to send this control packet.
Disadvantage:
DW-MAC(demand wakeup mac)(2008)
 DW-MAC assumes that
a separate protocol used
to synchronize the clocks
in sensor nodes during the
Sync period with required
precision.
 The basic concept of DW-
MAC is to wake up nodes
on demand during the
Sleep period of a cycle in
order to transmit or
receive a packet.
 In DW-MAC, medium access control and scheduling are fully integrated.
 DW-MAC sets up a one-to-one mapping between a Data period and the
following Sleep period.
 An SCH carries no timing information, and the transmission of an SCH simply
replaces RTS/CTS for medium access control thus minimize schedule overhead.
 Node A first contends for channel access and transmits an SCH during the Data
period.
 Transmission of the SCH starts T1time units after the beginning of the Data
period. Based on T1 and the duration of the SCH transmission,T3, nodes A and
B will both schedule their wakeup time toT2 from the beginning of the
following Sleep period, and will agree on a maximum wakeup duration of T4,
based on the ratio between TData and TSleep.
T2=T1*Tsleep/Tdata
where T2 defines after how much time from the beginning of the sleep the
sender and receiver will wake up.
Disadvantage:
• In DW-MAC, Data period and Sleep period are fixed, which results in that the
• system cannot dynamically adapt to different traffic loads.
• At the beginning of the sleep period , the initial data transmission takes too
long time to transmit .
• the interval between the two nodes data transmission may long interval to
transmit.
AS-MAC(Adaptive scheduling-MAC)(2010)
 AS-MAC is the enhance and modified format of DW-MAC scheme.
 In DW-MAC the durations of the Data period and Sleep period are static, but
AS-MAC designs a flexible Reserved Active Time (RAT) within the fixed
Adaptive Scheduling (AS) period, so that nodes can change the length of the
RAT in each operational cycle and be adaptive to the variable traffic load.
 A timer is employed to decide moment the nodes should sleep. The timer
expires when there is no transmission of SCH frames or transmission/collision in
its neighborhood for a period of time,T0
 T0 indicates maximum continuing amount of idle listening in the AS period.
.In 1st operation cycle(average traffic load case): after AS-Period starts, two
events occur. After the 2nd event, there is no new event within timeout T0
period. Thus node enters Sleep period after two events plus T0 time, thus early
enter to Sleep period. For this case,T0<RAT<preset AS-Period.
In 2nd operation cycle (high traffic load case): node keeps sensing five events in
succession, and the interval of any two events in succession is shorter than the
timeout T0 period. Thus node keeps Active mode till its full AS-Period. For this
case, RAT = pre-set AS-Period.
In 3rd operation cycle (low traffic load case): after AS-Period starts, there is no
single event. Thus after timeoutT0 period, node immediately enters Sleep mode.
For this case, RAT=T0
if the node has not sensed event happened inT0, it will go to sleep, staying awake
only for the period of TSYNC +T0 ,Since T0<<TDATA
In AS-MAC, The SCH frame also have added two parameters in the header of the
SCH compare to DW-MAC SCH.
The SCH also preserve the number of times the SCH has been sent as RTS
or/and CTS. The two parameters are RTS_RetryNo and CTS_RetryNo.
The purpose to introduce the two parameters, RTS_RetryNo and CTS_RetryNo, is
to avoid duplicate data transmission, thus reducing latency and energy
consumption.
Assume A needs to send a data packet to D through B and C as shown in fig.
 A sends an SCH (RTS) successfully to B and sets a timer to wait for SCH (CTS)
from B. Upon receiving the SCH (RTS) from A, B sends an SCH (CTS) to A which
at the same time serves as SCH (RTS) to C.
 However, A might lost the SCH (CTS) from B before the SCH (CTS) timer timeout
and interprets that its SCH (RTS) transmission failed.
 A sends another SCH (RTS) to B. In the mean time, after receiving the SCH (RTS)
from B, C will continue the forwarding to D.
 If the 2nd SCH (RTS) succeeds and A also receives SCH (CTS) from B, the DW-
MAC uses the 2nd time SCH (RTS) to schedule the data transmission.
 The advantages of SCH frame with tracked retry numbers are in three-folds:
o end-to-end delivery latency will be reduced as the 1st successful RTS is used
for mapping the data transmission.
o energy consumption can be reduced due to the avoidance of unnecessary
SCH frames transmission and
o improvement of the delivery latency and energy conservation will not
introduce perceivable overhead.
Disadvantage:
 Though the receiver don't know the data size when variable length data can
be transmit by sender then how it can calculate the wakeup time in sleep
period.
R-MAC(Routing Enhancement MAC protocol)(2007)
 An operational cycle of a sensor node in RMAC can be divided
into three stages:
SYNC, DATA, and
SLEEP.
 SYNC period,
synchronizes the
clocks on sensor
nodes with the
required precision.
 When a data packet is
to be sent to a destination node that is multiple hops away, a control frame
PION is sent during the DATA period to initiate the communication with the
downstream nodes.
 The dual function of a single PION frame is to confirm receipt of a PION from its
upstream node and to simultaneously request communication from a
downstream node.
 Node S first picks a random period from the contention window and waits for
the medium to be quiet for that period and an additional DIFS period (as in IEEE
802.11) before sending a PION to the next-hop node A.
 A gets the next-hop address for this destination from its own network layer. A
then waits a SIFS period before transmitting its own PION.
 The PION contains three addresses, apart from the final destination address: its
own address, the previous-hop address (S), and the new next-hop address(e.g B)
 This PION from A serves both as a CTS to S and as an RTS to B.
 when S receives A’s PION, S does not send its data frame immediately but waits
for the start of the SLEEP period to transmit the data frame.
 Node A stays awake to receive the data frame at the start of the SLEEP period,
and after node A receives the data frame, it sends an ACK frame to S. After
receiving the ACK, node S goes to sleep mode.
 If node A earlier received the confirmation PION from its next hop B in the DATA
period, A immediately relays the data frame to B. This data frame relaying
process continues at each hop until the final destination is reached.
Disadvantage:
• In SYNC period how the sensor node synchronize themselves that are not
clearly explained.
 Node A stays awake to receive the data frame at the start of the SLEEP period,
and after node A receives the data frame, it sends an ACK frame to S. After
receiving the ACK, node S goes to sleep mode.
 If node A earlier received the confirmation PION from its next hop B in the DATA
period, A immediately relays the data frame to B. This data frame relaying
process continues at each hop until the final destination is reached.
Disadvantage:
• In SYNC period how the sensor node synchronize themselves that are not
clearly explained.

More Related Content

What's hot

timing and synchronization
timing and synchronizationtiming and synchronization
timing and synchronizationMuhammad Ahsan
 
Importance of sliding window protocol
Importance of sliding window protocolImportance of sliding window protocol
Importance of sliding window protocoleSAT Publishing House
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)Hinal Lunagariya
 
Network performance overview
Network  performance overviewNetwork  performance overview
Network performance overviewMy cp
 
Importance of sliding window protocol
Importance of sliding window protocolImportance of sliding window protocol
Importance of sliding window protocoleSAT Journals
 
Synchronization Pradeep K Sinha
Synchronization Pradeep K SinhaSynchronization Pradeep K Sinha
Synchronization Pradeep K SinhaJawwad Rafiq
 
Multiple Access Techniques
Multiple Access TechniquesMultiple Access Techniques
Multiple Access Techniquesinayat khan
 
clock synchronization in Distributed System
clock synchronization in Distributed System clock synchronization in Distributed System
clock synchronization in Distributed System Harshita Ved
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidancegraphhoc
 
Csma(carriers sense-multiple-acess)
Csma(carriers sense-multiple-acess) Csma(carriers sense-multiple-acess)
Csma(carriers sense-multiple-acess) Rajan Kandel
 
Clock Synchronization (Distributed computing)
Clock Synchronization (Distributed computing)Clock Synchronization (Distributed computing)
Clock Synchronization (Distributed computing)Sri Prasanna
 
Synchronization in distributed systems
Synchronization in distributed systems Synchronization in distributed systems
Synchronization in distributed systems SHATHAN
 
Minimizing Hidden Node Problem in Vehicular Ad-hoc Network (VANET)
Minimizing Hidden Node Problem in Vehicular Ad-hoc Network (VANET)Minimizing Hidden Node Problem in Vehicular Ad-hoc Network (VANET)
Minimizing Hidden Node Problem in Vehicular Ad-hoc Network (VANET)Sanjiv Pradhan
 
Synchronization
SynchronizationSynchronization
SynchronizationSara shall
 

What's hot (20)

timing and synchronization
timing and synchronizationtiming and synchronization
timing and synchronization
 
Importance of sliding window protocol
Importance of sliding window protocolImportance of sliding window protocol
Importance of sliding window protocol
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
 
Network performance overview
Network  performance overviewNetwork  performance overview
Network performance overview
 
Importance of sliding window protocol
Importance of sliding window protocolImportance of sliding window protocol
Importance of sliding window protocol
 
Working of TCP
Working of TCP Working of TCP
Working of TCP
 
Synchronization Pradeep K Sinha
Synchronization Pradeep K SinhaSynchronization Pradeep K Sinha
Synchronization Pradeep K Sinha
 
Multiple Access Techniques
Multiple Access TechniquesMultiple Access Techniques
Multiple Access Techniques
 
clock synchronization in Distributed System
clock synchronization in Distributed System clock synchronization in Distributed System
clock synchronization in Distributed System
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
 
Synch
SynchSynch
Synch
 
Csma(carriers sense-multiple-acess)
Csma(carriers sense-multiple-acess) Csma(carriers sense-multiple-acess)
Csma(carriers sense-multiple-acess)
 
Clock Synchronization (Distributed computing)
Clock Synchronization (Distributed computing)Clock Synchronization (Distributed computing)
Clock Synchronization (Distributed computing)
 
Synchronization in distributed systems
Synchronization in distributed systems Synchronization in distributed systems
Synchronization in distributed systems
 
Week8 lec1-bscs1
Week8 lec1-bscs1Week8 lec1-bscs1
Week8 lec1-bscs1
 
Minimizing Hidden Node Problem in Vehicular Ad-hoc Network (VANET)
Minimizing Hidden Node Problem in Vehicular Ad-hoc Network (VANET)Minimizing Hidden Node Problem in Vehicular Ad-hoc Network (VANET)
Minimizing Hidden Node Problem in Vehicular Ad-hoc Network (VANET)
 
Chapter 6 synchronization
Chapter 6 synchronizationChapter 6 synchronization
Chapter 6 synchronization
 
Protocols
ProtocolsProtocols
Protocols
 
Synchronization
SynchronizationSynchronization
Synchronization
 
aloha
alohaaloha
aloha
 

Viewers also liked

IILIV_M4C4 Lezione 5. lavoro di rete e docente specializzato
IILIV_M4C4 Lezione 5. lavoro di rete e docente specializzatoIILIV_M4C4 Lezione 5. lavoro di rete e docente specializzato
IILIV_M4C4 Lezione 5. lavoro di rete e docente specializzatoraffaelebruno1
 
Xperwise abonnementen
Xperwise abonnementenXperwise abonnementen
Xperwise abonnementenXperwise
 
Derecho tributario actividad 11
Derecho tributario actividad 11Derecho tributario actividad 11
Derecho tributario actividad 11Mariagra19
 
Forces _______gravity
Forces  _______gravityForces  _______gravity
Forces _______gravityCaleb Nowland
 
presentacion de informatica
presentacion de informaticapresentacion de informatica
presentacion de informaticaNUSEFA
 
Actividad de Aprendizaje 2 - Geometría I
Actividad de Aprendizaje 2 - Geometría IActividad de Aprendizaje 2 - Geometría I
Actividad de Aprendizaje 2 - Geometría IAlain Serrano
 
HEM 2016
HEM 2016HEM 2016
HEM 2016Rick Xu
 
IILIV_M4C4 Lezione 4. successo formativo e valorizzazione della persona
IILIV_M4C4 Lezione 4. successo formativo e valorizzazione della personaIILIV_M4C4 Lezione 4. successo formativo e valorizzazione della persona
IILIV_M4C4 Lezione 4. successo formativo e valorizzazione della personaraffaelebruno1
 
RECURSO CONTENCIOSO TRIBUTARIO
RECURSO CONTENCIOSO TRIBUTARIORECURSO CONTENCIOSO TRIBUTARIO
RECURSO CONTENCIOSO TRIBUTARIOYojhan Paez
 
El Catàleg de paisatge de les Comarques Gironines. Els paisatges de la Garrotxa
El Catàleg de paisatge de les Comarques Gironines. Els paisatges de la GarrotxaEl Catàleg de paisatge de les Comarques Gironines. Els paisatges de la Garrotxa
El Catàleg de paisatge de les Comarques Gironines. Els paisatges de la GarrotxaPere Sala i Martí
 
Mirco hering devops for systems of record final
Mirco hering devops for systems of record finalMirco hering devops for systems of record final
Mirco hering devops for systems of record finalMirco Hering
 

Viewers also liked (17)

IILIV_M4C4 Lezione 5. lavoro di rete e docente specializzato
IILIV_M4C4 Lezione 5. lavoro di rete e docente specializzatoIILIV_M4C4 Lezione 5. lavoro di rete e docente specializzato
IILIV_M4C4 Lezione 5. lavoro di rete e docente specializzato
 
Twitter for development
Twitter for developmentTwitter for development
Twitter for development
 
Xperwise abonnementen
Xperwise abonnementenXperwise abonnementen
Xperwise abonnementen
 
Derecho tributario actividad 11
Derecho tributario actividad 11Derecho tributario actividad 11
Derecho tributario actividad 11
 
Forces _______gravity
Forces  _______gravityForces  _______gravity
Forces _______gravity
 
presentacion de informatica
presentacion de informaticapresentacion de informatica
presentacion de informatica
 
Actividad de Aprendizaje 2 - Geometría I
Actividad de Aprendizaje 2 - Geometría IActividad de Aprendizaje 2 - Geometría I
Actividad de Aprendizaje 2 - Geometría I
 
Contextualización de la enseñanza
Contextualización de la enseñanzaContextualización de la enseñanza
Contextualización de la enseñanza
 
Liquidacao na Noruega
Liquidacao na NoruegaLiquidacao na Noruega
Liquidacao na Noruega
 
HEM 2016
HEM 2016HEM 2016
HEM 2016
 
Tides
TidesTides
Tides
 
IILIV_M4C4 Lezione 4. successo formativo e valorizzazione della persona
IILIV_M4C4 Lezione 4. successo formativo e valorizzazione della personaIILIV_M4C4 Lezione 4. successo formativo e valorizzazione della persona
IILIV_M4C4 Lezione 4. successo formativo e valorizzazione della persona
 
RECURSO CONTENCIOSO TRIBUTARIO
RECURSO CONTENCIOSO TRIBUTARIORECURSO CONTENCIOSO TRIBUTARIO
RECURSO CONTENCIOSO TRIBUTARIO
 
El Catàleg de paisatge de les Comarques Gironines. Els paisatges de la Garrotxa
El Catàleg de paisatge de les Comarques Gironines. Els paisatges de la GarrotxaEl Catàleg de paisatge de les Comarques Gironines. Els paisatges de la Garrotxa
El Catàleg de paisatge de les Comarques Gironines. Els paisatges de la Garrotxa
 
Que es la copla
Que es la coplaQue es la copla
Que es la copla
 
Mirco hering devops for systems of record final
Mirco hering devops for systems of record finalMirco hering devops for systems of record final
Mirco hering devops for systems of record final
 
Acto juridico
Acto juridicoActo juridico
Acto juridico
 

Similar to Synchronous mac protocol study

multiacess protocol
multiacess protocolmultiacess protocol
multiacess protocolKanwal Khan
 
T mac protocol
T mac protocolT mac protocol
T mac protocolR Islam
 
Consider the TCP multiple acknowledgement scheme. A base station (BS.pdf
Consider the TCP multiple acknowledgement scheme. A base station (BS.pdfConsider the TCP multiple acknowledgement scheme. A base station (BS.pdf
Consider the TCP multiple acknowledgement scheme. A base station (BS.pdfkalerottnerheissst52
 
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...IEEEFINALSEMSTUDENTSPROJECTS
 
IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...
IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...
IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...IEEEGLOBALSOFTSTUDENTPROJECTS
 
Wireless LAN in Data Communication & Networking
Wireless LAN in Data Communication & NetworkingWireless LAN in Data Communication & Networking
Wireless LAN in Data Communication & NetworkingSweta Kumari Barnwal
 
Unit II GPS Signal Characteristics
Unit II GPS Signal CharacteristicsUnit II GPS Signal Characteristics
Unit II GPS Signal CharacteristicsGVNSK Sravya
 
LTE RACH Procedure
LTE RACH ProcedureLTE RACH Procedure
LTE RACH ProcedureAalekh Jain
 
Optimal multicast capacity and delay tradeoffs in mane ts
Optimal multicast capacity and delay tradeoffs in mane tsOptimal multicast capacity and delay tradeoffs in mane ts
Optimal multicast capacity and delay tradeoffs in mane tsJPINFOTECH JAYAPRAKASH
 
Jaimin chp-4 - media access sub-layer- 2011 batch
Jaimin   chp-4 - media access sub-layer- 2011 batchJaimin   chp-4 - media access sub-layer- 2011 batch
Jaimin chp-4 - media access sub-layer- 2011 batchJaimin Jani
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmnmmjalbiaty
 
5G PRACH Document-KPIs Improvemnt and understanding
5G PRACH Document-KPIs Improvemnt and understanding5G PRACH Document-KPIs Improvemnt and understanding
5G PRACH Document-KPIs Improvemnt and understandingQasimQadir3
 
WHAT IS MAC-1 presentation for information .pptx
WHAT IS MAC-1 presentation for information  .pptxWHAT IS MAC-1 presentation for information  .pptx
WHAT IS MAC-1 presentation for information .pptxSaqlainKhan39
 
multipleaccesstechniques-201110153309.pptx
multipleaccesstechniques-201110153309.pptxmultipleaccesstechniques-201110153309.pptx
multipleaccesstechniques-201110153309.pptx16115yogendraSingh
 
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...IOSR Journals
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Optimal Multicast Capacity and Delay T...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Optimal Multicast Capacity and Delay T...JAVA 2013 IEEE MOBILECOMPUTING PROJECT Optimal Multicast Capacity and Delay T...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Optimal Multicast Capacity and Delay T...IEEEGLOBALSOFTTECHNOLOGIES
 
Optimal multicast capacity and delay tradeoffs
Optimal multicast capacity and delay tradeoffsOptimal multicast capacity and delay tradeoffs
Optimal multicast capacity and delay tradeoffsIEEEFINALYEARPROJECTS
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...IEEEGLOBALSOFTTECHNOLOGIES
 

Similar to Synchronous mac protocol study (20)

multiacess protocol
multiacess protocolmultiacess protocol
multiacess protocol
 
T mac protocol
T mac protocolT mac protocol
T mac protocol
 
tow
towtow
tow
 
satellite communication- UNIT-V.pptx
satellite communication- UNIT-V.pptxsatellite communication- UNIT-V.pptx
satellite communication- UNIT-V.pptx
 
Consider the TCP multiple acknowledgement scheme. A base station (BS.pdf
Consider the TCP multiple acknowledgement scheme. A base station (BS.pdfConsider the TCP multiple acknowledgement scheme. A base station (BS.pdf
Consider the TCP multiple acknowledgement scheme. A base station (BS.pdf
 
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
 
IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...
IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...
IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...
 
Wireless LAN in Data Communication & Networking
Wireless LAN in Data Communication & NetworkingWireless LAN in Data Communication & Networking
Wireless LAN in Data Communication & Networking
 
Unit II GPS Signal Characteristics
Unit II GPS Signal CharacteristicsUnit II GPS Signal Characteristics
Unit II GPS Signal Characteristics
 
LTE RACH Procedure
LTE RACH ProcedureLTE RACH Procedure
LTE RACH Procedure
 
Optimal multicast capacity and delay tradeoffs in mane ts
Optimal multicast capacity and delay tradeoffs in mane tsOptimal multicast capacity and delay tradeoffs in mane ts
Optimal multicast capacity and delay tradeoffs in mane ts
 
Jaimin chp-4 - media access sub-layer- 2011 batch
Jaimin   chp-4 - media access sub-layer- 2011 batchJaimin   chp-4 - media access sub-layer- 2011 batch
Jaimin chp-4 - media access sub-layer- 2011 batch
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
 
5G PRACH Document-KPIs Improvemnt and understanding
5G PRACH Document-KPIs Improvemnt and understanding5G PRACH Document-KPIs Improvemnt and understanding
5G PRACH Document-KPIs Improvemnt and understanding
 
WHAT IS MAC-1 presentation for information .pptx
WHAT IS MAC-1 presentation for information  .pptxWHAT IS MAC-1 presentation for information  .pptx
WHAT IS MAC-1 presentation for information .pptx
 
multipleaccesstechniques-201110153309.pptx
multipleaccesstechniques-201110153309.pptxmultipleaccesstechniques-201110153309.pptx
multipleaccesstechniques-201110153309.pptx
 
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Optimal Multicast Capacity and Delay T...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Optimal Multicast Capacity and Delay T...JAVA 2013 IEEE MOBILECOMPUTING PROJECT Optimal Multicast Capacity and Delay T...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Optimal Multicast Capacity and Delay T...
 
Optimal multicast capacity and delay tradeoffs
Optimal multicast capacity and delay tradeoffsOptimal multicast capacity and delay tradeoffs
Optimal multicast capacity and delay tradeoffs
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
 

Recently uploaded

power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 

Recently uploaded (20)

power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 

Synchronous mac protocol study

  • 1. Sensor-MAC(S-MAC)  In S-MAC , the sensor node follows the schedule as listen-sleep mode.  Each node maintains a schedule table that stores the schedules of all its known neighbors.  The node first listens for a certain amount of time. If it does not hear a schedule from another node, it randomly chooses a time to go to sleep and immediately broadcasts its schedule in a SYNC message, indicating that it will go to sleep after t seconds. We call such a node a synchronizer, since it chooses its schedule independently and other nodes will synchronize with it.  If the node receives a schedule from a neighbor before choosing its own schedule, it follows that schedule by setting its schedule to be the same. We call such a node a follower. It then waits for a random delay td and rebroadcasts this schedule, indicating that it will sleep in t- td seconds. The random delay is for collision avoidance.  If a node receives a different schedule after it selects and broadcasts its own schedule, it adopts both schedules (i.e., it schedules itself to wake up at the times of both is neighbor and itself). It broadcasts it own schedule before going to sleep.  In listen/sleep scheme, for listen period a node send a SYNC packet includes the address of the sender and the time of its next sleep due to update schedule.  Receivers will adjust their timers immediately after they receive the SYNC packet.  For receiver, The listen interval is divide into two parts; SYNC and RTS listening.  if a sender wants to send a SYNC packet, it starts carrier sense when the receiver begins listening. It randomly selects a time slot to finish its carrier sense. If it has not detected any transmission by the end of the time slot, it wins the medium and starts sending its SYNC packet at that time.  CS stands for carrier sense. sender 1 only sends a SYNC packet. Sender 2 only wants to send data. Sender 3 sends a SYNC packet and a RTS packet.
  • 2.  Each node periodically broadcasts SYNC packets to its neighbors even if it has no followers. This allows new nodes to join an existing neighborhood. The new node follows the same procedure in the above subsection to choose its schedule. S-MAC Adaptive listening(2004)  S-MAC proposes an important technique, called adaptive listen, to improve the latency caused by the periodic sleep of each node in a multihop network.  The basic idea is to let the node who overhears its neighbor’s transmissions (ideally only RTS or CTS) wake up for a short period of time at the end of the transmission.  In this way, if the node is the next-hop node, its neighbor is able to immediately pass the data to it instead of waiting for its scheduled listen time.  If the node does not receive anything during the adaptive listening, it will go back to sleep until its next scheduled listen time. Synchronous channel polling(SCP-MAC)(2006)  To send a packet, the sender adds a preamble before the packet.  This preamble is effectively a wake-up signal, informing other nodes a data packet is about to be transmitted.  The preamble must be at least as long as the channel polling period to ensure all receivers will detect it.  The performance of LPL is sensitive to the channel polling period, since longer periods reduce receiver costs but increase sender costs.
  • 3.  unlike LPL, SCP-MAC synchronizes the polling times (schedules) of all neighboring nodes.  a short wake-up tone is required for senders to guarantee rendezvous. A sends to node B. When B receives a packet during the first regular polling.  it adds n high frequency poll in the same frame, immediately following its regular poll. (We define n below) If A has more packets to send, it sends them in these adaptive polling times. Spacing of adaptive slots is determined by the longest packet length that the physical layer supports.  If B finds none of its additional polls useful (such as if A had no additional data to send) it transitions back to its regular, low-duty cycle polling period.  If any of B’s additional slots were successfully used, B extends the adaptive polling with n slots, allowing A to continue transmission.  It also automatically plans an additional n in the next frame. If the duration of the traffic burst is shorter than one regular polling period, such process repeats at each hop, and the whole data can be transferred over N hops using N polling periods. Disadvantage: Q-MAC(Query based network)(2006)  In Q-MAC two types of sleep planning to suit query processing in a multi hop network. It follows a (1) static sleep schedule when there is no query and (2) dynamic sleep schedule when a query is transmitted.  When there is no query, the nodes follow a static sleep schedule.  The active time period of the nodes at different regions are synchronized such that the next hop node is made active before the current node’s active period is over.
  • 4.  When the destination is unknown to the sink, but it may know the appropriate region (e.g. temperature of a node in north).In this case, the sink can send the query to the cluster head and the cluster head can send it to the destination.  The node which forwards the query packet will change the sleep schedule as fully ‘on’ (sink)till it gets the data packet.  When the destination node E sends the data packet, the intermediate nodes will change their radio to their usual schedule, after forwarding the data packet. This dynamic schedule avoids the delay in transmission.  If the destination is known (i.e. how many hops away from a node), the schedule can be changed dynamically based on the arrival time of the data. The intermediate nodes calculate the time at which they have to forward the data using the following details:  The time at which the query packet is forwarded, The distance of the destination node, Time taken to transmit the data packet for one hop distance.  The accurate wake up time is hard to estimate and each node is activated at the reserved time and is kept active for a timeout period.  If the packet is not received within the timeout period, the node will switch off the radio.  The sleep schedule if data should be collected from multiple destinations. In this case, a multicast query is sent to the destination sensor nodes.
  • 5.  There may be many number of packets to the sink for a single query, since many nodes send the sensed information.  The radio of the intermediate nodes is made on, after a particular period of time.  After all the data packets are transmitted, a control packet is sent towards the sink, so that the intermediate nodes switch off the radio.  The radio remains on until a control packet is received. The cluster head or a special node is responsible to send this control packet. Disadvantage: DW-MAC(demand wakeup mac)(2008)  DW-MAC assumes that a separate protocol used to synchronize the clocks in sensor nodes during the Sync period with required precision.  The basic concept of DW- MAC is to wake up nodes on demand during the Sleep period of a cycle in order to transmit or receive a packet.  In DW-MAC, medium access control and scheduling are fully integrated.  DW-MAC sets up a one-to-one mapping between a Data period and the following Sleep period.  An SCH carries no timing information, and the transmission of an SCH simply replaces RTS/CTS for medium access control thus minimize schedule overhead.  Node A first contends for channel access and transmits an SCH during the Data period.  Transmission of the SCH starts T1time units after the beginning of the Data period. Based on T1 and the duration of the SCH transmission,T3, nodes A and B will both schedule their wakeup time toT2 from the beginning of the following Sleep period, and will agree on a maximum wakeup duration of T4, based on the ratio between TData and TSleep. T2=T1*Tsleep/Tdata where T2 defines after how much time from the beginning of the sleep the
  • 6. sender and receiver will wake up. Disadvantage: • In DW-MAC, Data period and Sleep period are fixed, which results in that the • system cannot dynamically adapt to different traffic loads. • At the beginning of the sleep period , the initial data transmission takes too long time to transmit . • the interval between the two nodes data transmission may long interval to transmit. AS-MAC(Adaptive scheduling-MAC)(2010)  AS-MAC is the enhance and modified format of DW-MAC scheme.  In DW-MAC the durations of the Data period and Sleep period are static, but AS-MAC designs a flexible Reserved Active Time (RAT) within the fixed Adaptive Scheduling (AS) period, so that nodes can change the length of the RAT in each operational cycle and be adaptive to the variable traffic load.  A timer is employed to decide moment the nodes should sleep. The timer expires when there is no transmission of SCH frames or transmission/collision in its neighborhood for a period of time,T0  T0 indicates maximum continuing amount of idle listening in the AS period. .In 1st operation cycle(average traffic load case): after AS-Period starts, two events occur. After the 2nd event, there is no new event within timeout T0 period. Thus node enters Sleep period after two events plus T0 time, thus early enter to Sleep period. For this case,T0<RAT<preset AS-Period. In 2nd operation cycle (high traffic load case): node keeps sensing five events in succession, and the interval of any two events in succession is shorter than the timeout T0 period. Thus node keeps Active mode till its full AS-Period. For this case, RAT = pre-set AS-Period.
  • 7. In 3rd operation cycle (low traffic load case): after AS-Period starts, there is no single event. Thus after timeoutT0 period, node immediately enters Sleep mode. For this case, RAT=T0 if the node has not sensed event happened inT0, it will go to sleep, staying awake only for the period of TSYNC +T0 ,Since T0<<TDATA In AS-MAC, The SCH frame also have added two parameters in the header of the SCH compare to DW-MAC SCH. The SCH also preserve the number of times the SCH has been sent as RTS or/and CTS. The two parameters are RTS_RetryNo and CTS_RetryNo. The purpose to introduce the two parameters, RTS_RetryNo and CTS_RetryNo, is to avoid duplicate data transmission, thus reducing latency and energy consumption. Assume A needs to send a data packet to D through B and C as shown in fig.  A sends an SCH (RTS) successfully to B and sets a timer to wait for SCH (CTS) from B. Upon receiving the SCH (RTS) from A, B sends an SCH (CTS) to A which at the same time serves as SCH (RTS) to C.  However, A might lost the SCH (CTS) from B before the SCH (CTS) timer timeout and interprets that its SCH (RTS) transmission failed.  A sends another SCH (RTS) to B. In the mean time, after receiving the SCH (RTS) from B, C will continue the forwarding to D.  If the 2nd SCH (RTS) succeeds and A also receives SCH (CTS) from B, the DW- MAC uses the 2nd time SCH (RTS) to schedule the data transmission.  The advantages of SCH frame with tracked retry numbers are in three-folds: o end-to-end delivery latency will be reduced as the 1st successful RTS is used for mapping the data transmission. o energy consumption can be reduced due to the avoidance of unnecessary SCH frames transmission and o improvement of the delivery latency and energy conservation will not introduce perceivable overhead.
  • 8. Disadvantage:  Though the receiver don't know the data size when variable length data can be transmit by sender then how it can calculate the wakeup time in sleep period. R-MAC(Routing Enhancement MAC protocol)(2007)  An operational cycle of a sensor node in RMAC can be divided into three stages: SYNC, DATA, and SLEEP.  SYNC period, synchronizes the clocks on sensor nodes with the required precision.  When a data packet is to be sent to a destination node that is multiple hops away, a control frame PION is sent during the DATA period to initiate the communication with the downstream nodes.  The dual function of a single PION frame is to confirm receipt of a PION from its upstream node and to simultaneously request communication from a downstream node.  Node S first picks a random period from the contention window and waits for the medium to be quiet for that period and an additional DIFS period (as in IEEE 802.11) before sending a PION to the next-hop node A.  A gets the next-hop address for this destination from its own network layer. A then waits a SIFS period before transmitting its own PION.  The PION contains three addresses, apart from the final destination address: its own address, the previous-hop address (S), and the new next-hop address(e.g B)  This PION from A serves both as a CTS to S and as an RTS to B.  when S receives A’s PION, S does not send its data frame immediately but waits for the start of the SLEEP period to transmit the data frame.
  • 9.  Node A stays awake to receive the data frame at the start of the SLEEP period, and after node A receives the data frame, it sends an ACK frame to S. After receiving the ACK, node S goes to sleep mode.  If node A earlier received the confirmation PION from its next hop B in the DATA period, A immediately relays the data frame to B. This data frame relaying process continues at each hop until the final destination is reached. Disadvantage: • In SYNC period how the sensor node synchronize themselves that are not clearly explained.
  • 10.  Node A stays awake to receive the data frame at the start of the SLEEP period, and after node A receives the data frame, it sends an ACK frame to S. After receiving the ACK, node S goes to sleep mode.  If node A earlier received the confirmation PION from its next hop B in the DATA period, A immediately relays the data frame to B. This data frame relaying process continues at each hop until the final destination is reached. Disadvantage: • In SYNC period how the sensor node synchronize themselves that are not clearly explained.