SlideShare a Scribd company logo
1 of 28
1
Fatima Jinnah Women University Rawalpindi
Group members
 Attia Iqbal
 Hafsa Rashid
 Maria Sharif
2
Fatima Jinnah Women University Rawalpindi
TOPIC
Low Power MAC For Wireless Sensor
Networks
3
Fatima Jinnah Women University Rawalpindi
MAC
 Medium access control or media access control (MAC) layer is
the lower sublayer of the data link layer (layer 2) of the seven-
layer OSI model
4
Fatima Jinnah Women University Rawalpindi
Low power MAC for WSNs
 Networks that consists of sensors which are distributed in an ad
hoc manner
 Low-power MAC protocol, for low-traffic wireless sensor
network.
 Low power MAC for Wireless sensor networks consists of
protocols and algorithms
5
Fatima Jinnah Women University Rawalpindi
Types of MAC protocols
There are three types of mac protocols:
1. Fixed-allocation
2. Demand-based
3. Contention-based
6
Fatima Jinnah Women University Rawalpindi
Fixed-allocation MAC protocol
Share the common medium
It is suitable for sensor network that continuously monitor
and generate deterministic data traffic
Provide a bounded delay for each node
7
Fatima Jinnah Women University Rawalpindi
Demand-based MAC protocol
Channel is allocated according to the demand of the node
 Variable rate traffic can be efficiently transmitted
 Require the additional overhead of a reservation process
8
Fatima Jinnah Women University Rawalpindi
Contention-based MAC protocol
Random-access-based contention for the channel when
packets need to be transmitted
Suitable for bursty traffic
9
Fatima Jinnah Women University Rawalpindi
Subsystem of node
Each node of the sensor networks consist of three subsystem:
1. Sensor subsystem
2. Processing subsystem
3. Communication subsystem
10
Fatima Jinnah Women University Rawalpindi
Sensor subsystem: Senses the environment
Processing subsystem: Performs local computations on the
sensed data
Communication subsystem: Responsible for message
exchange with neighboring sensor nodes
11
Fatima Jinnah Women University Rawalpindi
Energy efficient wireless MAC protocol
There are four sources of energy waste:
1. Idle listening
2. Overhearing
3. Collisions
4. Protocol overhead
12
Fatima Jinnah Women University Rawalpindi
 Idle listening: Idle listening refers to the active listening to an
idle channel
 Overhearing: Receive packets destined to others
 Collisions: Multiple senders want to talk
 Protocol overhead: It refers to the packet headers and the
signaling required by the protocol in addition to the
transmission of data payloads
13
Fatima Jinnah Women University Rawalpindi
 Energy efficient system extends the WSN’s lifetime and
increases its computational capabilities
14
Fatima Jinnah Women University Rawalpindi
Duty-cycling
 It is a primary technique significantly improving the energy
efficiency of Wireless Sensor Networks (WSNs)
15
Fatima Jinnah Women University Rawalpindi
Types of duty-cycling
1. Synchronous duty-cycling
2. Asynchronous duty-cycling
16
Fatima Jinnah Women University Rawalpindi
 Synchronous duty-cycling: In synchronous duty-cycling, all
nodes have synchronized duty cycles
 Asynchronous duty-cycling: , In asynchronous duty-cycling,
nodes have their own duty cycles
17
Fatima Jinnah Women University Rawalpindi
Power consumption
 A large number of sensor nodes
 cheap batteries
18
Fatima Jinnah Women University Rawalpindi
Example
 Switching the RF(radio frequency) transceiver
19
Fatima Jinnah Women University Rawalpindi
Types of transmission
1. Uplink (from the sensor nodes to the access point)
2. Downlink (from the access point to the sensor nodes)
20
Fatima Jinnah Women University Rawalpindi
21
Uplink transmission
Access points can listen all the time to the channel
 Multiple access to the channel
Downlink transmission
Data transmission without requiring sensor nodes
continuously listen to the channel
Tradeoff between power consumption and transmission delay
Fatima Jinnah Women University Rawalpindi
 If the medium is found busy, a sensor node continues to listen
until a data frame is received or until the medium becomes idle
again
22
Fatima Jinnah Women University Rawalpindi
Researches about MAC
 Liao introduced a high performance low-power 32-bits MAC
with Single-Instruction-Multiple-Data (SIMD) feature.
 Elguibaly proposed a merged MAC operation and gave an
analytical overview of how his technique optimizes the MAC
hardware.
 Murakami et al. adopted the half array implementation to
design a high speed and area-effective MAC architecture.
Raghuneth et al. made use of a carry-save multiplier that can
simplify sign extension and saturation, and further applies it on
the MAC architecture to reduce the unit’s area and power
consumption.
23
Fatima Jinnah Women University Rawalpindi
 The 32-bit MAC unit architecture is very large, so the 8-bit
MAC unit architecture is used
24
Fatima Jinnah Women University Rawalpindi
Applications OF Low power MAC for WSNs:
Health care monitoring
Air pollution monitoring
Landslide detection
Water quality monitoring
Natural disaster prevention
Industrial monitoring
Area monitoring
25
Fatima Jinnah Women University Rawalpindi
References
1. http://www.slideshare.net/shikhathegreat/ppt-on-low-power-wireless-sensor-network-
5th-sem
2. Won, Myounggyu, Taejoon Park, and Sang H. Son. "Asym-MAC: A MAC Protocol for
Low-Power Duty-Cycled Wireless Sensor Networks with Asymmetric Links." IEEE
Communications Letters 18.5 (2014): 809-812.
3. Shi, Xiaolei, and Guido Stromberg. "SyncWUF: An ultra low-power MAC protocol for
wireless sensor networks." IEEE Transactions on Mobile Computing 6.1 (2007): 115-
125.
4. Abdelgawad, A. "Low power multiply accumulate unit (MAC) for future Wireless
Sensor Networks." Sensors Applications Symposium (SAS), 2013 IEEE. IEEE, 2013.
5. El-Hoiydi, Amre, and J-D. Decotignie. "WiseMAC: an ultra low power MAC protocol
for the downlink of infrastructure wireless sensor networks." Computers and
Communications, 2004. Proceedings. ISCC 2004. Ninth International Symposium on.
Vol. 1. IEEE, 2004.
26
Fatima Jinnah Women University Rawalpindi
27
Fatima Jinnah Women University Rawalpindi
28
Fatima Jinnah Women University Rawalpindi

More Related Content

What's hot

Scalability in wireless sensor networks
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networkssourabhshivtiwari
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless networkTeced Ce
 
Data retrieval in sensor networks
Data retrieval in sensor networksData retrieval in sensor networks
Data retrieval in sensor networksAcad
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey915086731
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksMshari Alabdulkarim
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksKarthik
 
Transport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksTransport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksRushin Shah
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor networkdakshata26
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkMuhammad Kaife Uddin
 
Ppt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semPpt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semshikhathegreat
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsnElham Hormozi
 
Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Yogesh Fulara
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksZaahir Salam
 
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Vinayak Kulkarni
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkeSAT Publishing House
 

What's hot (20)

Scalability in wireless sensor networks
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networks
 
wireless sensor network a survey
wireless sensor network a surveywireless sensor network a survey
wireless sensor network a survey
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless network
 
Data retrieval in sensor networks
Data retrieval in sensor networksData retrieval in sensor networks
Data retrieval in sensor networks
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
 
Unit 2-basic wireless sensor
Unit 2-basic wireless sensorUnit 2-basic wireless sensor
Unit 2-basic wireless sensor
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
Transport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksTransport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networks
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
 
Ppt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semPpt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th sem
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)Wireless sensor networks (Yogesh Chandra Fulara)
Wireless sensor networks (Yogesh Chandra Fulara)
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor network
 
Wsn ppt original
Wsn ppt originalWsn ppt original
Wsn ppt original
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 

Similar to Low power MAC for wireless sensor network

Online opportunistic routing using Reinforcement learning
Online opportunistic routing using Reinforcement learningOnline opportunistic routing using Reinforcement learning
Online opportunistic routing using Reinforcement learningHarshal Solao
 
A modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc networkA modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc networkDiksha Katiyar
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkijcsa
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksIOSR Journals
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksIOSR Journals
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksIOSR Journals
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksIOSR Journals
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...IJCNCJournal
 
Dynamic Spectrum Allocation in Wireless sensor Networks
Dynamic Spectrum Allocation in Wireless sensor NetworksDynamic Spectrum Allocation in Wireless sensor Networks
Dynamic Spectrum Allocation in Wireless sensor NetworksIJMER
 
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Editor IJCATR
 
overview of adhoc wireless networks.pptx
overview of adhoc wireless networks.pptxoverview of adhoc wireless networks.pptx
overview of adhoc wireless networks.pptxparuvathavardhinij
 
Ad hoc wireless networks-Overview
 Ad hoc wireless networks-Overview Ad hoc wireless networks-Overview
Ad hoc wireless networks-Overviewparuvathavardhinipra
 
The analysis of multichannel mac protocols
The analysis of multichannel mac protocolsThe analysis of multichannel mac protocols
The analysis of multichannel mac protocolspijans
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...IRJET Journal
 

Similar to Low power MAC for wireless sensor network (20)

Online opportunistic routing using Reinforcement learning
Online opportunistic routing using Reinforcement learningOnline opportunistic routing using Reinforcement learning
Online opportunistic routing using Reinforcement learning
 
A modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc networkA modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc network
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor network
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
 
K016136062
K016136062K016136062
K016136062
 
Cognitive Radio Networks
Cognitive Radio NetworksCognitive Radio Networks
Cognitive Radio Networks
 
PROGRESS 1& 2.ppt
PROGRESS 1& 2.pptPROGRESS 1& 2.ppt
PROGRESS 1& 2.ppt
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
 
A0110104
A0110104A0110104
A0110104
 
Dynamic Spectrum Allocation in Wireless sensor Networks
Dynamic Spectrum Allocation in Wireless sensor NetworksDynamic Spectrum Allocation in Wireless sensor Networks
Dynamic Spectrum Allocation in Wireless sensor Networks
 
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
 
overview of adhoc wireless networks.pptx
overview of adhoc wireless networks.pptxoverview of adhoc wireless networks.pptx
overview of adhoc wireless networks.pptx
 
Bf33335340
Bf33335340Bf33335340
Bf33335340
 
Bf33335340
Bf33335340Bf33335340
Bf33335340
 
Ad hoc wireless networks-Overview
 Ad hoc wireless networks-Overview Ad hoc wireless networks-Overview
Ad hoc wireless networks-Overview
 
The analysis of multichannel mac protocols
The analysis of multichannel mac protocolsThe analysis of multichannel mac protocols
The analysis of multichannel mac protocols
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
 

Recently uploaded

Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 

Recently uploaded (20)

Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 

Low power MAC for wireless sensor network

  • 1. 1 Fatima Jinnah Women University Rawalpindi
  • 2. Group members  Attia Iqbal  Hafsa Rashid  Maria Sharif 2 Fatima Jinnah Women University Rawalpindi
  • 3. TOPIC Low Power MAC For Wireless Sensor Networks 3 Fatima Jinnah Women University Rawalpindi
  • 4. MAC  Medium access control or media access control (MAC) layer is the lower sublayer of the data link layer (layer 2) of the seven- layer OSI model 4 Fatima Jinnah Women University Rawalpindi
  • 5. Low power MAC for WSNs  Networks that consists of sensors which are distributed in an ad hoc manner  Low-power MAC protocol, for low-traffic wireless sensor network.  Low power MAC for Wireless sensor networks consists of protocols and algorithms 5 Fatima Jinnah Women University Rawalpindi
  • 6. Types of MAC protocols There are three types of mac protocols: 1. Fixed-allocation 2. Demand-based 3. Contention-based 6 Fatima Jinnah Women University Rawalpindi
  • 7. Fixed-allocation MAC protocol Share the common medium It is suitable for sensor network that continuously monitor and generate deterministic data traffic Provide a bounded delay for each node 7 Fatima Jinnah Women University Rawalpindi
  • 8. Demand-based MAC protocol Channel is allocated according to the demand of the node  Variable rate traffic can be efficiently transmitted  Require the additional overhead of a reservation process 8 Fatima Jinnah Women University Rawalpindi
  • 9. Contention-based MAC protocol Random-access-based contention for the channel when packets need to be transmitted Suitable for bursty traffic 9 Fatima Jinnah Women University Rawalpindi
  • 10. Subsystem of node Each node of the sensor networks consist of three subsystem: 1. Sensor subsystem 2. Processing subsystem 3. Communication subsystem 10 Fatima Jinnah Women University Rawalpindi
  • 11. Sensor subsystem: Senses the environment Processing subsystem: Performs local computations on the sensed data Communication subsystem: Responsible for message exchange with neighboring sensor nodes 11 Fatima Jinnah Women University Rawalpindi
  • 12. Energy efficient wireless MAC protocol There are four sources of energy waste: 1. Idle listening 2. Overhearing 3. Collisions 4. Protocol overhead 12 Fatima Jinnah Women University Rawalpindi
  • 13.  Idle listening: Idle listening refers to the active listening to an idle channel  Overhearing: Receive packets destined to others  Collisions: Multiple senders want to talk  Protocol overhead: It refers to the packet headers and the signaling required by the protocol in addition to the transmission of data payloads 13 Fatima Jinnah Women University Rawalpindi
  • 14.  Energy efficient system extends the WSN’s lifetime and increases its computational capabilities 14 Fatima Jinnah Women University Rawalpindi
  • 15. Duty-cycling  It is a primary technique significantly improving the energy efficiency of Wireless Sensor Networks (WSNs) 15 Fatima Jinnah Women University Rawalpindi
  • 16. Types of duty-cycling 1. Synchronous duty-cycling 2. Asynchronous duty-cycling 16 Fatima Jinnah Women University Rawalpindi
  • 17.  Synchronous duty-cycling: In synchronous duty-cycling, all nodes have synchronized duty cycles  Asynchronous duty-cycling: , In asynchronous duty-cycling, nodes have their own duty cycles 17 Fatima Jinnah Women University Rawalpindi
  • 18. Power consumption  A large number of sensor nodes  cheap batteries 18 Fatima Jinnah Women University Rawalpindi
  • 19. Example  Switching the RF(radio frequency) transceiver 19 Fatima Jinnah Women University Rawalpindi
  • 20. Types of transmission 1. Uplink (from the sensor nodes to the access point) 2. Downlink (from the access point to the sensor nodes) 20 Fatima Jinnah Women University Rawalpindi
  • 21. 21 Uplink transmission Access points can listen all the time to the channel  Multiple access to the channel Downlink transmission Data transmission without requiring sensor nodes continuously listen to the channel Tradeoff between power consumption and transmission delay Fatima Jinnah Women University Rawalpindi
  • 22.  If the medium is found busy, a sensor node continues to listen until a data frame is received or until the medium becomes idle again 22 Fatima Jinnah Women University Rawalpindi
  • 23. Researches about MAC  Liao introduced a high performance low-power 32-bits MAC with Single-Instruction-Multiple-Data (SIMD) feature.  Elguibaly proposed a merged MAC operation and gave an analytical overview of how his technique optimizes the MAC hardware.  Murakami et al. adopted the half array implementation to design a high speed and area-effective MAC architecture. Raghuneth et al. made use of a carry-save multiplier that can simplify sign extension and saturation, and further applies it on the MAC architecture to reduce the unit’s area and power consumption. 23 Fatima Jinnah Women University Rawalpindi
  • 24.  The 32-bit MAC unit architecture is very large, so the 8-bit MAC unit architecture is used 24 Fatima Jinnah Women University Rawalpindi
  • 25. Applications OF Low power MAC for WSNs: Health care monitoring Air pollution monitoring Landslide detection Water quality monitoring Natural disaster prevention Industrial monitoring Area monitoring 25 Fatima Jinnah Women University Rawalpindi
  • 26. References 1. http://www.slideshare.net/shikhathegreat/ppt-on-low-power-wireless-sensor-network- 5th-sem 2. Won, Myounggyu, Taejoon Park, and Sang H. Son. "Asym-MAC: A MAC Protocol for Low-Power Duty-Cycled Wireless Sensor Networks with Asymmetric Links." IEEE Communications Letters 18.5 (2014): 809-812. 3. Shi, Xiaolei, and Guido Stromberg. "SyncWUF: An ultra low-power MAC protocol for wireless sensor networks." IEEE Transactions on Mobile Computing 6.1 (2007): 115- 125. 4. Abdelgawad, A. "Low power multiply accumulate unit (MAC) for future Wireless Sensor Networks." Sensors Applications Symposium (SAS), 2013 IEEE. IEEE, 2013. 5. El-Hoiydi, Amre, and J-D. Decotignie. "WiseMAC: an ultra low power MAC protocol for the downlink of infrastructure wireless sensor networks." Computers and Communications, 2004. Proceedings. ISCC 2004. Ninth International Symposium on. Vol. 1. IEEE, 2004. 26 Fatima Jinnah Women University Rawalpindi
  • 27. 27 Fatima Jinnah Women University Rawalpindi
  • 28. 28 Fatima Jinnah Women University Rawalpindi