The document discusses MAC protocols for wireless sensor networks. It begins by outlining issues in designing MAC protocols for ad-hoc wireless networks, such as bandwidth efficiency, quality of service support, synchronization, and the error-prone shared wireless medium. It then describes the design goals of MAC protocols. The document classifies MAC protocols into three categories: contention-based protocols, contention-based protocols with reservation mechanisms, and contention-based protocols with scheduling mechanisms. Several examples are provided for each category, including MACA, FAMA, and RTMAC protocols.
MAC PROTOCOLS FOR AD HOC WIRELESS NETWORKS
Issues in designing a MAC Protocol- Classification of MAC Protocols- Contention based protocols- Contention based protocols with Reservation Mechanisms- Contention based protocols with Scheduling Mechanisms – Multi channel MAC-IEEE 802.11
This document discusses MAC protocols for ad hoc wireless networks. It begins by outlining key issues in designing MAC protocols, such as bandwidth efficiency, quality of service support, and addressing hidden and exposed terminal problems. It then classifies MAC protocols into contention-based, contention-based with reservation mechanisms, and contention-based with scheduling mechanisms. Several example protocols are described for each category, including how they address the issues outlined earlier in the document.
This document discusses various MAC protocols for ad hoc wireless networks. It begins by outlining key issues in designing MAC protocols for these networks, such as bandwidth efficiency, quality of service support, and the hidden and exposed terminal problems. It then covers classifications of MAC protocols including contention-based, contention-based with reservation mechanisms, and contention-based with scheduling mechanisms. Specific protocols are discussed within each category.
This document discusses various MAC protocols for ad hoc wireless networks. It begins by outlining key issues in designing MAC protocols for these networks, such as bandwidth efficiency, quality of service support, and the hidden and exposed terminal problems. It then covers classifications of MAC protocols including contention-based, contention-based with reservation mechanisms, and contention-based with scheduling mechanisms. Specific protocols are discussed within each category.
This document discusses MAC protocols for ad-hoc wireless networks. It begins by outlining key issues in designing these protocols, such as bandwidth efficiency, quality of service support, and the hidden/exposed terminal problems. It then describes the classifications of MAC protocols, including contention-based, contention-based with reservation, and contention-based with scheduling mechanisms. Several example protocols are discussed for each classification, including how they address the issues and provide distributed channel access in ad-hoc networks.
This document discusses various MAC protocols for ad hoc wireless networks. It begins by outlining the key issues in designing such protocols, including bandwidth efficiency, quality of service support, and addressing hidden and exposed terminal problems. It then classifies MAC protocols into contention-based, contention-based with reservation, and contention-based with scheduling categories. Several examples of protocols are described for each category. The document provides an overview of the operation and key aspects of many MAC protocols proposed for ad hoc wireless networks.
The document discusses MAC protocols for ad hoc networks. It begins by outlining problems MAC protocols must address, such as bandwidth efficiency, hidden/exposed terminals, and mobility. It then classifies MAC protocols into contention-based without reservation, contention-based with reservation, and contention-based with scheduling. Examples are provided for each category, including MACA, BTMA, D-PRMA, and DPS. The document also covers MAC protocols that use directional antennas to improve throughput and reuse.
The document discusses MAC protocols for ad hoc networks. It begins by outlining problems MAC protocols must address, such as bandwidth efficiency, synchronization, and the hidden terminal problem. It then classifies MAC protocols into three categories: contention-based without reservation, contention-based with reservation, and contention-based with scheduling. Several example protocols are described for each category, including how they address issues like bandwidth utilization and collisions. The document also covers MAC protocols that use directional antennas and power control techniques.
MAC PROTOCOLS FOR AD HOC WIRELESS NETWORKS
Issues in designing a MAC Protocol- Classification of MAC Protocols- Contention based protocols- Contention based protocols with Reservation Mechanisms- Contention based protocols with Scheduling Mechanisms – Multi channel MAC-IEEE 802.11
This document discusses MAC protocols for ad hoc wireless networks. It begins by outlining key issues in designing MAC protocols, such as bandwidth efficiency, quality of service support, and addressing hidden and exposed terminal problems. It then classifies MAC protocols into contention-based, contention-based with reservation mechanisms, and contention-based with scheduling mechanisms. Several example protocols are described for each category, including how they address the issues outlined earlier in the document.
This document discusses various MAC protocols for ad hoc wireless networks. It begins by outlining key issues in designing MAC protocols for these networks, such as bandwidth efficiency, quality of service support, and the hidden and exposed terminal problems. It then covers classifications of MAC protocols including contention-based, contention-based with reservation mechanisms, and contention-based with scheduling mechanisms. Specific protocols are discussed within each category.
This document discusses various MAC protocols for ad hoc wireless networks. It begins by outlining key issues in designing MAC protocols for these networks, such as bandwidth efficiency, quality of service support, and the hidden and exposed terminal problems. It then covers classifications of MAC protocols including contention-based, contention-based with reservation mechanisms, and contention-based with scheduling mechanisms. Specific protocols are discussed within each category.
This document discusses MAC protocols for ad-hoc wireless networks. It begins by outlining key issues in designing these protocols, such as bandwidth efficiency, quality of service support, and the hidden/exposed terminal problems. It then describes the classifications of MAC protocols, including contention-based, contention-based with reservation, and contention-based with scheduling mechanisms. Several example protocols are discussed for each classification, including how they address the issues and provide distributed channel access in ad-hoc networks.
This document discusses various MAC protocols for ad hoc wireless networks. It begins by outlining the key issues in designing such protocols, including bandwidth efficiency, quality of service support, and addressing hidden and exposed terminal problems. It then classifies MAC protocols into contention-based, contention-based with reservation, and contention-based with scheduling categories. Several examples of protocols are described for each category. The document provides an overview of the operation and key aspects of many MAC protocols proposed for ad hoc wireless networks.
The document discusses MAC protocols for ad hoc networks. It begins by outlining problems MAC protocols must address, such as bandwidth efficiency, hidden/exposed terminals, and mobility. It then classifies MAC protocols into contention-based without reservation, contention-based with reservation, and contention-based with scheduling. Examples are provided for each category, including MACA, BTMA, D-PRMA, and DPS. The document also covers MAC protocols that use directional antennas to improve throughput and reuse.
The document discusses MAC protocols for ad hoc networks. It begins by outlining problems MAC protocols must address, such as bandwidth efficiency, synchronization, and the hidden terminal problem. It then classifies MAC protocols into three categories: contention-based without reservation, contention-based with reservation, and contention-based with scheduling. Several example protocols are described for each category, including how they address issues like bandwidth utilization and collisions. The document also covers MAC protocols that use directional antennas and power control techniques.
The document summarizes MAC protocols for wireless mesh networks. It begins with an introduction to wireless mesh network architectures and important definitions. It then discusses single channel MAC protocols like S-MAC, T-MAC, and a new TDMA-based protocol. It also covers multi-channel MAC protocols classifications and examples like CC-MMAC and SSCH MAC. The document provides detailed explanations of the mechanisms and concepts behind various single and multi-channel MAC protocols.
The document discusses wireless and mobile computing, specifically focusing on MAC (media access control) layer protocols for wireless networks. It provides an overview of MAC layer issues for wireless networks, classifications of MAC protocols (including contention-based, reservation-based, and scheduling-based), and design goals of MAC protocols such as distributed operation, quality of service support, bandwidth efficiency, and minimizing hidden and exposed terminal problems.
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...Wendy Hager
The document presents a multi-channel MAC protocol called SM that uses static channel assignment. Each mobile host is assigned a single channel and uses that channel for all transmissions following the IEEE 802.11 standard. However, several issues are identified when directly applying a single-channel protocol to a multi-channel system, including missing control packets, exposed terminals, and channel deadlocks. To address these issues, the document proposes a new dynamic multi-channel MAC protocol called DCA that flexibly assigns channels based on demand and requires only two transceivers per host.
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsIOSR Journals
This document presents a proposed multi-channel distribution scheme for mobile ad hoc networks (MANETs) and evaluates it through simulation. The proposed scheme assigns channels to nodes based on their node IDs to avoid control overhead from time synchronization. While neighboring nodes on the same channel is possible, the probability is low given random node distribution. The proposed scheme is compared to a single-channel scheme in ns-2 simulations. Results show the proposed technique has better performance.
Lecture 7 8 ad hoc wireless media access protocolsChandra Meena
1) The document discusses issues with media access control (MAC) protocols in ad hoc wireless networks, including problems like hidden terminals and exposed nodes.
2) It classifies MAC protocols as synchronous, asynchronous, receiver-initiated, or sender-initiated. The RTS-CTS handshake is presented as a solution to the hidden terminal problem.
3) However, the RTS-CTS approach has shortcomings like collisions when RTS and CTS messages are sent by different nodes or when multiple CTS messages are granted. Solutions to the exposed node problem are also discussed.
Mac protocols for ad hoc wireless networks Divya Tiwari
The document discusses MAC protocols for ad hoc wireless networks. It addresses key issues in designing MAC protocols including limited bandwidth, quality of service support, synchronization, hidden and exposed terminal problems, error-prone shared channels, distributed coordination without centralized control, and node mobility. Common MAC protocol classifications and examples are also presented, such as contention-based protocols, sender-initiated versus receiver-initiated protocols, and protocols using techniques like reservation, scheduling, and directional antennas.
This document summarizes research on medium access control (MAC) layer protocols for ad-hoc networks. It begins with an introduction to ad-hoc networks and their key properties. It then discusses important issues at the MAC layer for these dynamic networks, including limited bandwidth, errors, and changing topologies. Several MAC protocol classifications and examples are provided, such as power-aware, multiple channel, and quality of service protocols. The document concludes by discussing future research directions for addressing open problems at the MAC layer in ad-hoc networks.
The document discusses broadcast networks and medium access control (MAC) protocols. It introduces the concepts of broadcast networks, where a single shared medium allows all connected devices to receive messages. This leads to potential conflicts when multiple devices try to transmit simultaneously. MAC protocols are needed to coordinate transmissions and resolve conflicts. Common MAC protocols discussed include ALOHA, CSMA, CSMA/CD (Ethernet), and token passing (Token Ring). LAN standards like IEEE 802.3 that define MAC sublayer functions for CSMA/CD networks are also summarized briefly.
This presentation provides a comprehensive state-of-the-art study of wireless sensor networks(WSN) - based IoT MAC protocols, design guidelines that inspired these protocols,
as well as their drawbacks and shortcomings.
This document discusses several key issues related to designing and deploying ad hoc wireless networks, including medium access control, routing, multicasting, transport layer protocols, pricing schemes, and quality of service provisioning. It identifies challenges such as mobility, bandwidth constraints, error-prone channels, location-dependent contention, and limited resources. The document provides details on specific considerations and requirements for protocols in each of these areas to function effectively in an ad hoc wireless network environment.
A preamble-based approach for Providing QOS support in Wireless Sensor Networkdiala wedyan
The document discusses various MAC protocols for wireless sensor networks, including TDMA, Low Power Listening, XMAC, and BMAC protocols. It then describes a proposed Back off Preamble-based MAC protocol that uses different preamble lengths to prioritize medium access. The protocol is evaluated through simulation in OPNET Modeler, comparing its performance under different quality of service strategies for handling high and low priority traffic flows. The proposed protocol aims to provide reliable delivery and satisfy quality of service requirements for wireless sensor networks.
Distributed contention based mac protocol for cognitive radioIffat Anjum
Introduction
System Model
DC-MAC Design
Network Initialization
DC-MAC Working
Data Transfer on Home Channel
Data Transfer on a Foreign Channel
Performance Analysis
Conclusion
References
The three-way need for higher data rates, good quality of service and ubiquity in a converged all IP
communication cloud drives research in wireless communication. Wireless access networks are envisaged
candidates of the next generation wireless networks. The various access networks will be integrated with
other technologies including the wired backbone. The major issues in an all IP and converged networks
are: quality of service, seamless handover and network capacity. Emerging research seeks to address these
open research issues; for example the implementation of multi-channel and multi radio MAC protocols in
WMN. In this paper we analyze and evaluate the effectiveness of multi-channel and multi radio techniques
in WMN. The shortcomings of these schemes are highlighted and possible solutions are suggested. The
signalling delay metric is used for evaluation purposes. The focus is on the performance of the control
channel identified as the critical performance metric of multi-channel MAC protocols.
This document compares the TDMA and CSMA access techniques for a linear topology of sensor nodes. It first provides background on wireless sensor networks and discusses applications that use a fixed chain topology. It then explains that TDMA is generally more suitable than CSMA for a linear chain topology with a large number of nodes, periodic traffic, and relatively high traffic. The document reviews several existing MAC protocols designed for chain topologies and discusses their advantages and disadvantages. It focuses on comparing the throughput and delay of nodes in a linear topology using TDMA versus CSMA.
Thesis Presentation on Renewal theory based 802.15.6 latest.pptxssuserc02c1f
The document discusses the IEEE 802.15.4 MAC protocol. It describes the protocol's operational modes including non-beacon enabled mode using unslotted CSMA/CA and beacon-enabled mode using slotted CSMA/CA. It also discusses the superframe structure used in beacon-enabled mode including the contention access period, contention free period, and optional inactive period. Finally, it summarizes a research paper that proposes a 3-level renewal process model to analyze the contention access period performance metrics like throughput and service time.
The document compares MAC protocols in wired and wireless systems. In wired systems, protocols like Ethernet use CSMA/CD, allowing nodes to detect collisions. In wireless systems, hidden and exposed terminal problems occur, requiring protocols like MACA, MACAW, and 802.11 CSMA/CA to use RTS/CTS handshaking or polling to avoid interference between transmissions. The IEEE 802.11 standard defines distributed and point coordination function MAC methods for wireless LANs.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
The document summarizes MAC protocols for wireless mesh networks. It begins with an introduction to wireless mesh network architectures and important definitions. It then discusses single channel MAC protocols like S-MAC, T-MAC, and a new TDMA-based protocol. It also covers multi-channel MAC protocols classifications and examples like CC-MMAC and SSCH MAC. The document provides detailed explanations of the mechanisms and concepts behind various single and multi-channel MAC protocols.
The document discusses wireless and mobile computing, specifically focusing on MAC (media access control) layer protocols for wireless networks. It provides an overview of MAC layer issues for wireless networks, classifications of MAC protocols (including contention-based, reservation-based, and scheduling-based), and design goals of MAC protocols such as distributed operation, quality of service support, bandwidth efficiency, and minimizing hidden and exposed terminal problems.
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...Wendy Hager
The document presents a multi-channel MAC protocol called SM that uses static channel assignment. Each mobile host is assigned a single channel and uses that channel for all transmissions following the IEEE 802.11 standard. However, several issues are identified when directly applying a single-channel protocol to a multi-channel system, including missing control packets, exposed terminals, and channel deadlocks. To address these issues, the document proposes a new dynamic multi-channel MAC protocol called DCA that flexibly assigns channels based on demand and requires only two transceivers per host.
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsIOSR Journals
This document presents a proposed multi-channel distribution scheme for mobile ad hoc networks (MANETs) and evaluates it through simulation. The proposed scheme assigns channels to nodes based on their node IDs to avoid control overhead from time synchronization. While neighboring nodes on the same channel is possible, the probability is low given random node distribution. The proposed scheme is compared to a single-channel scheme in ns-2 simulations. Results show the proposed technique has better performance.
Lecture 7 8 ad hoc wireless media access protocolsChandra Meena
1) The document discusses issues with media access control (MAC) protocols in ad hoc wireless networks, including problems like hidden terminals and exposed nodes.
2) It classifies MAC protocols as synchronous, asynchronous, receiver-initiated, or sender-initiated. The RTS-CTS handshake is presented as a solution to the hidden terminal problem.
3) However, the RTS-CTS approach has shortcomings like collisions when RTS and CTS messages are sent by different nodes or when multiple CTS messages are granted. Solutions to the exposed node problem are also discussed.
Mac protocols for ad hoc wireless networks Divya Tiwari
The document discusses MAC protocols for ad hoc wireless networks. It addresses key issues in designing MAC protocols including limited bandwidth, quality of service support, synchronization, hidden and exposed terminal problems, error-prone shared channels, distributed coordination without centralized control, and node mobility. Common MAC protocol classifications and examples are also presented, such as contention-based protocols, sender-initiated versus receiver-initiated protocols, and protocols using techniques like reservation, scheduling, and directional antennas.
This document summarizes research on medium access control (MAC) layer protocols for ad-hoc networks. It begins with an introduction to ad-hoc networks and their key properties. It then discusses important issues at the MAC layer for these dynamic networks, including limited bandwidth, errors, and changing topologies. Several MAC protocol classifications and examples are provided, such as power-aware, multiple channel, and quality of service protocols. The document concludes by discussing future research directions for addressing open problems at the MAC layer in ad-hoc networks.
The document discusses broadcast networks and medium access control (MAC) protocols. It introduces the concepts of broadcast networks, where a single shared medium allows all connected devices to receive messages. This leads to potential conflicts when multiple devices try to transmit simultaneously. MAC protocols are needed to coordinate transmissions and resolve conflicts. Common MAC protocols discussed include ALOHA, CSMA, CSMA/CD (Ethernet), and token passing (Token Ring). LAN standards like IEEE 802.3 that define MAC sublayer functions for CSMA/CD networks are also summarized briefly.
This presentation provides a comprehensive state-of-the-art study of wireless sensor networks(WSN) - based IoT MAC protocols, design guidelines that inspired these protocols,
as well as their drawbacks and shortcomings.
This document discusses several key issues related to designing and deploying ad hoc wireless networks, including medium access control, routing, multicasting, transport layer protocols, pricing schemes, and quality of service provisioning. It identifies challenges such as mobility, bandwidth constraints, error-prone channels, location-dependent contention, and limited resources. The document provides details on specific considerations and requirements for protocols in each of these areas to function effectively in an ad hoc wireless network environment.
A preamble-based approach for Providing QOS support in Wireless Sensor Networkdiala wedyan
The document discusses various MAC protocols for wireless sensor networks, including TDMA, Low Power Listening, XMAC, and BMAC protocols. It then describes a proposed Back off Preamble-based MAC protocol that uses different preamble lengths to prioritize medium access. The protocol is evaluated through simulation in OPNET Modeler, comparing its performance under different quality of service strategies for handling high and low priority traffic flows. The proposed protocol aims to provide reliable delivery and satisfy quality of service requirements for wireless sensor networks.
Distributed contention based mac protocol for cognitive radioIffat Anjum
Introduction
System Model
DC-MAC Design
Network Initialization
DC-MAC Working
Data Transfer on Home Channel
Data Transfer on a Foreign Channel
Performance Analysis
Conclusion
References
The three-way need for higher data rates, good quality of service and ubiquity in a converged all IP
communication cloud drives research in wireless communication. Wireless access networks are envisaged
candidates of the next generation wireless networks. The various access networks will be integrated with
other technologies including the wired backbone. The major issues in an all IP and converged networks
are: quality of service, seamless handover and network capacity. Emerging research seeks to address these
open research issues; for example the implementation of multi-channel and multi radio MAC protocols in
WMN. In this paper we analyze and evaluate the effectiveness of multi-channel and multi radio techniques
in WMN. The shortcomings of these schemes are highlighted and possible solutions are suggested. The
signalling delay metric is used for evaluation purposes. The focus is on the performance of the control
channel identified as the critical performance metric of multi-channel MAC protocols.
This document compares the TDMA and CSMA access techniques for a linear topology of sensor nodes. It first provides background on wireless sensor networks and discusses applications that use a fixed chain topology. It then explains that TDMA is generally more suitable than CSMA for a linear chain topology with a large number of nodes, periodic traffic, and relatively high traffic. The document reviews several existing MAC protocols designed for chain topologies and discusses their advantages and disadvantages. It focuses on comparing the throughput and delay of nodes in a linear topology using TDMA versus CSMA.
Thesis Presentation on Renewal theory based 802.15.6 latest.pptxssuserc02c1f
The document discusses the IEEE 802.15.4 MAC protocol. It describes the protocol's operational modes including non-beacon enabled mode using unslotted CSMA/CA and beacon-enabled mode using slotted CSMA/CA. It also discusses the superframe structure used in beacon-enabled mode including the contention access period, contention free period, and optional inactive period. Finally, it summarizes a research paper that proposes a 3-level renewal process model to analyze the contention access period performance metrics like throughput and service time.
The document compares MAC protocols in wired and wireless systems. In wired systems, protocols like Ethernet use CSMA/CD, allowing nodes to detect collisions. In wireless systems, hidden and exposed terminal problems occur, requiring protocols like MACA, MACAW, and 802.11 CSMA/CA to use RTS/CTS handshaking or polling to avoid interference between transmissions. The IEEE 802.11 standard defines distributed and point coordination function MAC methods for wireless LANs.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Assessment and Planning in Educational technology.pptxKavitha Krishnan
In an education system, it is understood that assessment is only for the students, but on the other hand, the Assessment of teachers is also an important aspect of the education system that ensures teachers are providing high-quality instruction to students. The assessment process can be used to provide feedback and support for professional development, to inform decisions about teacher retention or promotion, or to evaluate teacher effectiveness for accountability purposes.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
14653128.ppt
1. UNIT-II
MAC PROTOCOLS FOR WIRELESS SENSOR
NETWORKS
Contents:
Issues in Designing a MAC protocol for Ad-hoc Wireless
Networks
Design goals of a MAC Protocol for Ad-hoc Wireless
Networks
Classifications of MAC Protocols
Contention-Based Protocols
Contention-Based Protocols with reservation Mechanisms
Contention-Based MAC Protocols with Scheduling Mechanisms
MAC Protocols that use Directional Antennas, Other MAC
1
2. INTRODUCTION TO MAC:
Nodes in an Ad-hoc wireless network share a common
broadcast radio channel. Since the radio spectrum is
limited, the bandwidth available for communication in
such networks is also limited.
Access to this shared medium should be controlled in
such a manner that all nodes receive a fair share of the
available bandwidth, and that the bandwidth is utilized
efficiently.
Characteristics of the wireless medium are completely
different from wired medium.
So a different set of protocols is required for controlling
access to the shared medium in such networks. This is
achieved by using Medium Access Control (MAC)
protocol.
2
3. Issues in Designing MAC Protocol for Ad-hoc
Wireless Networks:
Bandwidth Efficiency:
Since the radio spectrum is limited, the bandwidth available for
communication is also very limited. The MAC protocol must be
designed in such a way that to maximize this bandwidth
efficiency (the ratio of the bandwidth used for actual data
transmission to the total available bandwidth).
That is the uncommon bandwidth is utilized in an efficient
manner.
Quality of Service Support(QoS):
Providing QoS support to data sessions in Ad-hoc networks is
very difficult due to their characteristic nature of nodes mobility.
Most of the time, Bandwidth reservation made at one point of
time may become invalid once the node moves out of the region.
The MAC protocol for Ad-hoc wireless networks that are to be
used in such real-time applications must have resource
reservation mechanism take care of nature of the wireless
channel and the mobility of nodes.
3
4. Issues in Designing MAC Protocol for Ad-hoc
Wireless Networks:
Synchronization:
The MAC protocol must take into consideration the
synchronization between nodes in the network.
Synchronization is very important for bandwidth (time slot)
reservations by nodes achieved by exchange of control packets.
Hidden and Exposed Terminal Problems:
The hidden terminal problem refers to the collision of packets at
a receiving node due to the simultaneous transmission of those
nodes.
The exposed terminal problem refers to the inability of a node,
which is blocked due to transmission by a nearby transmitting
node, to transmit to another node.
Mobility of Nodes:
This is a very important factor affecting the performance
(throughput) of the protocol.
The MAC protocol obviously has no role to play in influencing
the mobility of the nodes.
4
5. Issues in Designing MAC Protocol for Ad-hoc
Wireless Networks:
Error-Prone Shared Broadcast Channel:
Due to broadcast nature of the radio channel (transmissions
made by a node are received by all nodes within its direct
transmission range) there is a possibility of packet collisions is
quite high in wireless networks.
A MAC protocol should grant channel access to nodes in such a
manner that collisions are minimized.
Distributed Nature/Lack of Central Coordination
Ad hoc wireless networks do not have centralized coordinators
because nodes keep moving continuously.
Therefore, nodes must be scheduled in a distributed fashion for
gaining access to the channel.
The MAC protocol must make sure that the additional overhead,
in terms of bandwidth consumption is not very high.
5
6. Design goals of a MAC Protocol for Ad-hoc Wireless
Networks:
The operation of the protocol should be distributed.
The protocol should provide QoS support for real-time traffic.
The access delay, which refers to the average delay experienced
by any packet to get transmitted, must be kept low.
The available bandwidth must be utilized efficiently.
The protocol should ensure fair allocation of bandwidth to
nodes.
Control overhead must be kept as low as possible.
The protocol should minimize the effects of hidden and exposed
terminal problems.
The protocol must be scalable to large networks.
It should have power control mechanisms.
The protocol should have mechanisms for adaptive data rate
control.
It should try to use directional antennas.
The protocol should provide synchronization among nodes.
6
7. Classifications of MAC Protocols:
Ad hoc network MAC protocols can be classified into three types:
Contention-based protocols
Contention-based protocols with reservation mechanisms
Contention-based protocols with scheduling mechanisms
Other MAC protocols
7
8. Classifications of MAC Protocols:
Contention-based protocols:
Sender-initiated protocols: Packet transmissions are initiated
by the sender node.
Single-channel sender-initiated protocols: A node that
wins the contention to the channel can make use of the
entire bandwidth.
Multichannel sender-initiated protocols: The available
bandwidth is divided into multiple channels.
Receiver-initiated protocols: The receiver node initiates the
contention resolution protocol.
Contention-based protocols with reservation mechanisms
Synchronous protocols: All nodes need to be synchronized.
Global time synchronization is difficult to achieve.
Asynchronous protocols: These protocols use relative time
information for effecting reservations.
8
9. Classifications of MAC Protocols:
Contention-based protocols with scheduling mechanisms:
Node scheduling is done in a manner so that all nodes are
treated fairly and no node is starved of bandwidth.
Scheduling-based schemes are also used for enforcing
priorities among flows whose packets are queued at nodes.
Some scheduling schemes also consider battery
characteristics.
Other protocols are those MAC protocols : These are not
strictly fall under the above categories.
9
10. Classifications of MAC Protocols:
Contention-based protocols :
Single-channel sender-initiated protocols:
EXAMPLES: MACAW, FAMA
MACAW: A Media Access Protocol for Wireless LANs is based on
MACA (Multiple Access Collision Avoidance) Protocol
MACA:-
When a node wants to transmit a data packet, it
first transmit a RTS (Request To Send) frame.
The receiver node, on receiving the RTS packet,
if it is ready to receive the data packet,
transmits a CTS (Clear to Send) packet.
Once the sender receives the CTS packet
without any error, it starts transmitting the
data packet.
If a packet transmitted by a node is lost, the
node uses the Binary Exponential Back-off
(BEB) algorithm to back-off a random interval
of time before retrying. The problem is solved
by MACAW
10
11. Classifications of MAC Protocols:
Contention-based protocols : …cntd
Single-channel sender-initiated protocols:
MACA EXAMPLES:
MACA avoids the problem of hidden terminals
A and C want to send to B
A sends RTS first
C waits after receiving
CTS from B
MACA avoids the problem of exposed terminals
B wants to send to A, C
to another terminal
now C does not have
to wait for it cannot
receive CTS from A
11
12. Classifications of MAC Protocols:
Contention-based protocols : …cntd
Single-channel sender-initiated protocols:
MACAW: (MACA for Wireless) is a revision of
MACA.
The sender transmits a RTS (Request To
Send) frame if no nearby station transmits a
RTS.
The receiver replies with a CTS (Clear To
Send) frame.
Neighbors
o see CTS, then keep quiet.
o see RTS but not CTS, then keep quiet
until the CTS is back to the sender.
The receiver sends an ACK when receiving an
frame.
o Neighbors keep silent until see ACK.
Collisions
o There is no collision detection.
o The senders know collision when they
don’t receive CTS.
o They each wait for the exponential back-
off time.
12
13. Classifications of MAC Protocols:
Contention-based protocols : …cntd
Single-channel sender-initiated protocols:
FAMA: Floor Acquisition Multiple Access Protocols.
Channel access consists of a carrier-sensing operation and a collision
avoidance
Carrier-sensing by the sender, followed by the RTS-CTS control packet
exchange.
Data transmission to be collision free, the duration of an RTS must be at
least twice the maximum channel propagation delay
Two FAMA protocol variants
RTS-CTS exchange with no carrier sensing (MACA)
RTS-CTS exchange with non-persistent carrier sensing (FAMA-NTR)
FAMA-NTR(Non-persistent Transmit Request)
Before sending a packet, the sender senses the channel
If channel is busy, the sender back-off a random time and retries later
If the channel is free, the sender sends RTS and waits for a CTS packet
If the sender cannot receive a CTS, it takes a random back-off and retries
later
If the sender receives a CTS, it can start transmission data packet
In order to allow the sender to send a burst of packets, the receiver is made
to wait a time duration τ seconds after a packet is received.
13
14. Classifications of MAC Protocols:
Contention-based protocols : …cntd
Multi-channel sender-initiated protocols:
Busy Tone Multiple Access Protocols (BTMA):
The transmission channel is split into two parts:
a data channel for data packet transmissions
a control channel used to transmit the busy tone signal
When a node is ready for transmission, it senses the channel to
check whether the busy tone is active.
If not, it turns on the busy tone signal and starts data
transmissions.
Otherwise, it reschedules the packet for transmission after some
random rescheduling delay.
Dual Busy Tone Multiple Access Protocol (DBTMAP) is an extension of
the BTMA scheme.
a data channel for data packet transmissions
a control channel used for control packet transmissions (RTS
and CTS packets) and also for transmitting the busy tones.
Use two busy tones on the control channel, BTt and BTr.
BTt : indicate that it is transmitting on the data channel
BTr: indicate that it is receiving on the data channel
Two busy tone signals are two sine waves at different
frequencies
14
15. Classifications of MAC Protocols:
Contention-based protocols : …cntd
Receiver-initiated protocols:
RI-BTMA: Receiver-Initiated Busy Tone Multiple Access Protocol
The transmission channel is split into two:
• a data channel for data packet transmissions
• a control channel used for transmitting the busy tone signal
A node can transmit on the data channel only if it finds the
busy tone to be absent on the control channel.
The data packet is divided into two portions: a preamble and
the actual data packet.
MACA-BI: MACA-By Invitation
By eliminating the need for the RTS packet it reduces the
number of control packets used in the MACA protocol which
uses the three-way handshake mechanism.
MARCH: Media Access with Reduced Handshake. 15
16. Classifications of MAC Protocols:
Contention-based protocols : …cntd
Receiver-initiated protocols:
16
17. Classifications of MAC Protocols:
Contention-based Protocols with Reservation Mechanism:
Contention occurs during the resource (bandwidth) reservation
phase.
Once the bandwidth is reserved, the node gets exclusive access to the
reserved bandwidth.
QoS support can be provided for real-time traffic.
Synchronous protocols:
Distributed Packet Reservation Multiple Access Protocol(D-PRMA)
It extends the centralized packet reservation multiple access
(PRMA) scheme into a distributed scheme that can be used in ad
hoc wireless networks.
PRMA was designed in a wireless LAN with a base station.
D-PRMA is a TDMA-based scheme. The channel is divided into
fixed- and equal-sized frames along the time axis.
17
18. Classifications of MAC Protocols: …cntd
Contention-based Protocols with Reservation Mechanism:
Synchronous protocols:
Collision Avoidance Time Allocation Protocol(CATA):
Support broadcast, unicast, and multicast transmissions
simultaneously.
Each frame consists of S slots and each slot is further divided into
five Control Mini-Slots
CMS1: Slot Reservation (SR)
CMS2: RTS
CMS3: CTS
CMS4: Not To Send (NTS)
DMS: Data transmission
18
19. Classifications of MAC Protocols: …cntd
Contention-based Protocols with Reservation Mechanism:
Synchronous protocols:
Hop Reservation Multiple Access Protocol (HRMA):
A multichannel MAC protocol which is based on half-duplex, very
slow frequency-hopping spread spectrum (FHSS) radios
Uses a reservation and handshake mechanism to enable a pair of
communicating nodes to reserve a frequency hop, thereby
guaranteeing collision-free data transmission.
Can be viewed as a time slot reservation protocol where each time
slot is assigned a separate frequency channel.
19
20. Classifications of MAC Protocols: …cntd
Contention-based Protocols with Reservation Mechanism:
Synchronous protocols:
Soft Reservation Multiple Access with Priority Assignment
(SRMA/PA):
Developed with the main objective of supporting integrated
services of real-time and non-real-time application in Ad-hoc
networks.
Nodes use a collision-avoidance handshake mechanism and a soft
reservation mechanism.
Five-Phase Reservation Protocol (FPRP)
A single-channel TDMA based broadcast scheduling protocol.
Nodes uses a contention mechanism in order to acquire time slots.
The protocol assumes the availability of global time at all nodes.
The reservation takes five phases:
Reservation,
Collision Report,
Reservation Confirmation,
Reservation Acknowledgement,
Packing And Elimination Phase.
20
21. Classifications of MAC Protocols: …cntd
Contention-based Protocols with Reservation Mechanism:
Synchronous protocols:
Five-Phase Reservation Protocol (FPRP)
Five-phase protocol:
Reservation request: send reservation request (RR) packet to dest.
Collision report: if a collision is detected by any node, that node
broadcasts a CR packet
Reservation confirmation: a source node won the contention will
send a RC packet to destination node if it does not receive any CR
message in the previous phase
Reservation acknowledgment: destination node acknowledge
reception of RC by sending back RA message to source
Packing and elimination: use packing packet and elimination packet.
21
22. Classifications of MAC Protocols: …cntd
Contention-based Protocols with Reservation Mechanism:
Asynchronous protocols:
MACA with Piggy-Backed Reservation (MACA/PR):
Provide real-time traffic support in multi-hop wireless networks
Based on the MACAW protocol with non-persistent CSMA
The main components of MACA/PR are:
A MAC protocol
A reservation protocol
A QoS routing protocol
Real-Time Medium Access Control Protocol (RTMAC)
Provides a bandwidth reservation mechanism for supporting real-
time traffic in ad-hoc wireless networks
RTMAC has two components
A MAC layer protocol is a real-time extension of the IEEE 802.11
DCF.
o A medium-access protocol for best-effort traffic
o A reservation protocol for real-time traffic
A QoS routing protocol is responsible for end-to-end reservation
and release of bandwidth resources.
22
23. Classifications of MAC Protocols:
Contention-based protocols with Scheduling Mechanism:
Protocols in this category focus on packet scheduling at the
nodes and transmission scheduling of the nodes.
The factors that affects scheduling decisions
• Delay targets of packets
• Traffic load at nodes
• Battery power
Distributed priority scheduling and medium access in Ad Hoc
Networks present two mechanisms for providing quality of
service (QoS)
• Distributed priority scheduling (DPS) – Piggy-backs the priority
tag of a node’s current and head-of-line packets to the control and
data packets
• Multi-hop coordination – Extends the DPS scheme to carry out
scheduling over multi-hop paths.
23
24. Classifications of MAC Protocols: …cntd
Contention-based protocols with Scheduling Mechanism:
• Distributed Wireless Ordering Protocol (DWOP)
• A media access scheme along with a scheduling mechanism
based on the distributed priority scheduling scheme
• Distributed Laxity-based Priority Scheduling (DLPS)
Scheme
• Scheduling decisions are made based on the states of
neighboring nodes and feed back from destination nodes
regarding packet losses
• Packets are recorded based on their uniform laxity budgets
(ULBs) and the packet delivery ratios of the flows. The laxity
of a packet is the time remaining before its deadline. 24
25. Classifications of MAC Protocols:
MAC Protocols that use directional Antennas:
MAC protocols that use directional antennas have several
advantages:
• Reduce signal interference
• Increase in the system throughput
• Improved channel reuse
MAC protocol using directional antennas
• Make use of an RTS/CTS exchange mechanism
• Use directional antennas for transmitting and receiving data
packets
Directional Busy Tone-based MAC Protocol (D-BTMA)
• It uses directional antennas for transmitting the RTS, CTS, data
frames, and the busy tones.
Directional MAC Protocols for Ad Hoc Wireless Networks
• DMAC-1: A directional antenna is used for transmitting RTS
packets and Omni-directional antenna for CTS packets.
• DMAC-1, both directional RTS and omni-directional RTS
transmission are used.
25
26. Classifications of MAC Protocols: …cntd
MAC Protocols that use directional Antennas:
26
27. Classifications of MAC Protocols: …cntd
Other MAC Protocols:
Multi-channel MAC Protocol (MMAC)
Multiple channels for data transmission
There is no dedicated control channel.
Based on channel usage channels can be classified into three
types: high, medium and low preference channels.
Multi-channel Carrier Sense Multiple Access(MCSMA) MAC
Protocol :
The available bandwidth is divided into several channels
Power Control MAC Protocol (PCM) for Ad Hoc Networks
Allows nodes to vary their transmission power levels on a per-
packet basis
Receiver-based Autorate Protocol (RBAR)
Use a rate adaptation approach
Interleaved Carrier-Sense Multiple Access Protocol (ICSMA)
The available bandwidth is split into tow equal channels
The handshaking process is interleaved between the two
channels.
27
28. Note: A directional antenna or beam antenna is an antenna which
radiates or receives greater power in specific directions allowing
for increased performance and reduced interference from
unwanted sources.
Note: Omnidirectional refers to the notion(feeling) of
existing in every direction. Omnidirectional antenna is that
radiates equally in all directions.
Note: Handshaking is the exchange of information between
two modems and the resulting agreement about which
protocol to use that precedes each telephone connection.
28