SlideShare a Scribd company logo
Sommaire
Protocol of synchronization
Design mac layer
outcomes
Conclusion
Introduction
3
Introduction
4
Introduction
The Wireless sensor networks are networks composed by a
large number of sensors nodes which are spread in the
environment to detect and activate their applications
The energy efficiency is one of the most important themes
in the field of the scientific research. The use of the wireless
sensor networks for diverse applications knew a very important
development.
The objective of this document is to realize a comparative
study between the existing protocols of the MAC layer of
synchronization and which are based on the contention.
5
what is a network sensors and what does it?
 We could define a sensor array as a set of interconnected
means by radio communication nodes, wherein each node must be
capable of self-without the need to configure any centralized
management
6
 The concept of wireless sensor networks is based on a simple
equation: sensor module + CPU + Radio = Thousands of potential
applications
Applications of Wireless Sensor Network
•
7
Protocol of synchronization
The synchronized protocols were created to coordinate the phases
of awakening of nodes so that they wake up at the same time and so
can exchange their data, with no connectivity problems.
• The channel contention is a serious problem in WSNs resulting in
collisions, re-transmissions. In this paper, we focus on the MAC
layer problem with contention protocols oriented saving energy and
latency
 Several protocols using the technique of synchronization were
proposed. The most important of them are described below:
8
Protocol of synchronization
Standard IEEE 802.11
9
This standard specifies the characteristics of the physical
layer, as well as the medium access control (MAC) protocols in the
link layer,and provides two protocols for the MAC layer:
Distributed Coordination Function (DCF) and Point
Coordination Function (PCF).It’s proposed to encourage cooperation
between different modes of access to the channel.
Protocol of synchronization
Standard IEEE 802.11
10
The standard IEEE 802.11 gives more priority than PCF mode
and DCF mode. After expiration of the PIFS, the base station has the
right to access the channel to disseminate scheduling channel
access time to all nodes.
Protocol of synchronization
Standard IEEE 802.15.4
11
This standard works on two modes :
The mode not-beacon using CSMA / CA not Slotted
The mode beacon, using CSMA / CA Slotted
A model master-slave is adopted. The FFD takes the role of a
PAN coordinator.
In the topology peer-to -peer, a FFD can speak to other FFD in
its range of radio and can spend messages to other FFD .
Protocol of synchronization
Standard IEEE 802.15.4
12
The super-frame is divided into an active part and an inactive
part. The first is divided into an interval of fixed size, that
contains a contention access period ( CAP) ,
Besides the coordinator raises no problem because both nodes
are active all the time.
Protocol of synchronization
Protocol S-MAC
13
T Is one of the first synchronized protocols which improves the
IEEE 802.11,and it consists of dividing the time in periods of fixed
duration T
During sleeping, the node turns off its radio, and sets a timer
to awake it later. All nodes are free to choose their own listen/sleep
schedules
. Established of the radio-on and the radio-off.S-MAC reduces the
listen time by putting nodes into periodic sleep state.
Protocol of synchronization
Protocol T-MAC
14
Timeout MAC (T-MAC) based on the protocol S-MAC and on the
attempts to limit the problems caused by this protocol.
. The Nodes choose their schedule as in S-MAC but the active
windows are not fixed in time, the interval of time varies according to
the traffic.
Adding package of control FRTS (future RTS) to indicate that the
transmission manages, and reduce the latency of the transmission
multi-soute..
Protocol of synchronization
protocol S-MAC and T-MAC
15
The following figure presents a Comparison between two periods
active / inactive for both protocols S-MAC and T-MAC
Protocol of synchronization
Protocol OB-MAC
16
The main point of the Overhearing Based is to reduce
the energy consumption, this includes two tasks:
Reduce the running time of the transceiver
Reduce the number of redundant communication.
We illustrate the operation of OB-MAC on both synchronization
protocols for access to S-MAC and IEEE 802.15.4 medium
Protocol of synchronization
Protocol OB-MAC on IEEE802.15.4
17
The figure 4 shows an example of operation of the OB-MAC in
the standard 802.15.4
Protocol of synchronization
Protocol OB-MAC on S-MAC
18
We apply OB-MAC on S-MAC because S-MAC is a typical
example of the family synchronized MAC ,and here is the protocol of
functioning
Free Powerpoint Templates
MAC layer design
Our contribution
Design mac layer?????
Simulation under NS ???
The laency??
20
 The objective of the MAC layer is decomposed into two parts: the first
part is the creation of the infrastructure of sensor networks.
Energy eficiency ??
 And the second part is the division of the communication channel in
an effective way for the transfer which respect the following criteria:
MAC layer design
Energy eficiency
 The energy consumption is a very important factor in the
WSN, they nodes are feed by batteries, but it is often very
difficult to change them .
The latency
 It is the interval of time between the times or event occurs
and the time or the base station receives the information of
this event.
 The NS project was launched in 1989 as a variant of the
simulator REAL network simulator. It’s evolves in the conger
of the contributions ofits users .
21
Simulation under NS
Simulation under NS2
22
, we find according after the results that the energy consumption
in the protocol IEEE802.11 is very raised with regard to the other
protocols such as IEEE802.15.4, S-MAC, T-MAC and the OB-MAC
Simulation under NS2
23
. We notice that the OB-MAC consumes less energy than to the
other protocols
Simulation under NS2
24
We notice that the IEEE802.11 gives a very important latency
comparing to the other protocols because the IEEE802.11 uses the
packages of control as RTS, CTS and ACK to avoid the problem of the
collision
Conclusion
Conclusion and
perspective
• In this paper, we presented and analyzed the functioning of
synchronization protocols medium access in the simulator as
well as in the real case. In the various protocols medium
access, the passive listening is always considered as a source
of wasting of energy.
 All WSN MAC protocols are designed with the goal to
conserve energy
 Choose the protocol OB-MAC and looking for collision
problems realize plate forme witch hard in labo
26
Thanks for yourThanks for your
attentionattention

More Related Content

What's hot

Mac
MacMac
Ason gmpls
Ason gmplsAson gmpls
5G NR Coverage Analysis for 700 MHz
5G NR Coverage Analysis for 700 MHz 5G NR Coverage Analysis for 700 MHz
5G NR Coverage Analysis for 700 MHz
Eiko Seidel
 
Lect04 (1)
Lect04 (1)Lect04 (1)
Lect04 (1)
hinalala
 
An energy efficient mac protocol for wireless
An energy efficient mac protocol for wirelessAn energy efficient mac protocol for wireless
An energy efficient mac protocol for wireless
nabil_alsharafi
 
CS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKSCS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKS
Kathirvel Ayyaswamy
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
Chandra Meena
 
can bus theory solution
can bus theory solutioncan bus theory solution
can bus theory solution
Md. Mashiur Rahman
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
juno susi
 
Towards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-function
Towards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-functionTowards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-function
Towards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-function
Eiko Seidel
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
shashi712
 
Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
KGunasekaran1
 
Thesis Slides
Thesis SlidesThesis Slides
Thesis Slides
loverainwalker
 
gmpls
gmplsgmpls
From GMPLS to OpenFlow Control & Monitoring of Optical Networks
From GMPLS to OpenFlow Control & Monitoring of Optical NetworksFrom GMPLS to OpenFlow Control & Monitoring of Optical Networks
From GMPLS to OpenFlow Control & Monitoring of Optical Networks
FIBRE Testbed
 
OLSR | Optimized Link State Routing Protocol
OLSR | Optimized Link State Routing ProtocolOLSR | Optimized Link State Routing Protocol
OLSR | Optimized Link State Routing Protocol
Jagannath University, Bangladesh
 
Computer networks ct2
Computer networks ct2Computer networks ct2
Computer networks ct2
Md. Mashiur Rahman
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
Kathirvel Ayyaswamy
 
Optimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADVOptimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADV
TELKOMNIKA JOURNAL
 
Mac
MacMac

What's hot (20)

Mac
MacMac
Mac
 
Ason gmpls
Ason gmplsAson gmpls
Ason gmpls
 
5G NR Coverage Analysis for 700 MHz
5G NR Coverage Analysis for 700 MHz 5G NR Coverage Analysis for 700 MHz
5G NR Coverage Analysis for 700 MHz
 
Lect04 (1)
Lect04 (1)Lect04 (1)
Lect04 (1)
 
An energy efficient mac protocol for wireless
An energy efficient mac protocol for wirelessAn energy efficient mac protocol for wireless
An energy efficient mac protocol for wireless
 
CS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKSCS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKS
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 
can bus theory solution
can bus theory solutioncan bus theory solution
can bus theory solution
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Towards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-function
Towards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-functionTowards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-function
Towards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-function
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
 
Thesis Slides
Thesis SlidesThesis Slides
Thesis Slides
 
gmpls
gmplsgmpls
gmpls
 
From GMPLS to OpenFlow Control & Monitoring of Optical Networks
From GMPLS to OpenFlow Control & Monitoring of Optical NetworksFrom GMPLS to OpenFlow Control & Monitoring of Optical Networks
From GMPLS to OpenFlow Control & Monitoring of Optical Networks
 
OLSR | Optimized Link State Routing Protocol
OLSR | Optimized Link State Routing ProtocolOLSR | Optimized Link State Routing Protocol
OLSR | Optimized Link State Routing Protocol
 
Computer networks ct2
Computer networks ct2Computer networks ct2
Computer networks ct2
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Optimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADVOptimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADV
 
Mac
MacMac
Mac
 

Similar to R,aouami wccs

mn paper
mn papermn paper
Ba2641224127
Ba2641224127Ba2641224127
Ba2641224127
IJMER
 
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksThe Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
IJMER
 
I046054549
I046054549I046054549
I046054549
IJERA Editor
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
pijans
 
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
ijaia
 
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
IJCNCJournal
 
A simulation model of ieee 802.15.4 in om ne t++
A simulation model of ieee 802.15.4 in om ne t++A simulation model of ieee 802.15.4 in om ne t++
A simulation model of ieee 802.15.4 in om ne t++
wissem hammouda
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
IJCNCJournal
 
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
pijans
 
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
Wendy Hager
 
B04020812
B04020812B04020812
Enhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
Enhancing Power Unbiased Cooperative Media Access Control Protocol in ManetsEnhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
Enhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
International Journal of Engineering Inventions www.ijeijournal.com
 
PROGRESS 1& 2.ppt
PROGRESS 1& 2.pptPROGRESS 1& 2.ppt
PROGRESS 1& 2.ppt
HarishJoshi872914
 
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
INFOGAIN PUBLICATION
 
A20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportA20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_Report
Panth Shah
 
Internet acess to rural areas using wifi altanai bisht , 1st year
Internet acess to rural areas using wifi   altanai bisht , 1st yearInternet acess to rural areas using wifi   altanai bisht , 1st year
Internet acess to rural areas using wifi altanai bisht , 1st year
ALTANAI BISHT
 
Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks
IJECEIAES
 
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
BRNSSPublicationHubI
 
CAN and TTP are the two wired network protocols used for distributed .pdf
CAN and TTP are the two wired network protocols used for distributed .pdfCAN and TTP are the two wired network protocols used for distributed .pdf
CAN and TTP are the two wired network protocols used for distributed .pdf
ssuserc77a341
 

Similar to R,aouami wccs (20)

mn paper
mn papermn paper
mn paper
 
Ba2641224127
Ba2641224127Ba2641224127
Ba2641224127
 
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksThe Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
 
I046054549
I046054549I046054549
I046054549
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
 
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
 
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
 
A simulation model of ieee 802.15.4 in om ne t++
A simulation model of ieee 802.15.4 in om ne t++A simulation model of ieee 802.15.4 in om ne t++
A simulation model of ieee 802.15.4 in om ne t++
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
 
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
 
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
 
B04020812
B04020812B04020812
B04020812
 
Enhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
Enhancing Power Unbiased Cooperative Media Access Control Protocol in ManetsEnhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
Enhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
 
PROGRESS 1& 2.ppt
PROGRESS 1& 2.pptPROGRESS 1& 2.ppt
PROGRESS 1& 2.ppt
 
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
 
A20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportA20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_Report
 
Internet acess to rural areas using wifi altanai bisht , 1st year
Internet acess to rural areas using wifi   altanai bisht , 1st yearInternet acess to rural areas using wifi   altanai bisht , 1st year
Internet acess to rural areas using wifi altanai bisht , 1st year
 
Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks
 
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
 
CAN and TTP are the two wired network protocols used for distributed .pdf
CAN and TTP are the two wired network protocols used for distributed .pdfCAN and TTP are the two wired network protocols used for distributed .pdf
CAN and TTP are the two wired network protocols used for distributed .pdf
 

Recently uploaded

[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 

Recently uploaded (20)

[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 

R,aouami wccs

  • 1.
  • 2.
  • 3. Sommaire Protocol of synchronization Design mac layer outcomes Conclusion Introduction 3
  • 5. Introduction The Wireless sensor networks are networks composed by a large number of sensors nodes which are spread in the environment to detect and activate their applications The energy efficiency is one of the most important themes in the field of the scientific research. The use of the wireless sensor networks for diverse applications knew a very important development. The objective of this document is to realize a comparative study between the existing protocols of the MAC layer of synchronization and which are based on the contention. 5
  • 6. what is a network sensors and what does it?  We could define a sensor array as a set of interconnected means by radio communication nodes, wherein each node must be capable of self-without the need to configure any centralized management 6  The concept of wireless sensor networks is based on a simple equation: sensor module + CPU + Radio = Thousands of potential applications
  • 7. Applications of Wireless Sensor Network • 7
  • 8. Protocol of synchronization The synchronized protocols were created to coordinate the phases of awakening of nodes so that they wake up at the same time and so can exchange their data, with no connectivity problems. • The channel contention is a serious problem in WSNs resulting in collisions, re-transmissions. In this paper, we focus on the MAC layer problem with contention protocols oriented saving energy and latency  Several protocols using the technique of synchronization were proposed. The most important of them are described below: 8
  • 9. Protocol of synchronization Standard IEEE 802.11 9 This standard specifies the characteristics of the physical layer, as well as the medium access control (MAC) protocols in the link layer,and provides two protocols for the MAC layer: Distributed Coordination Function (DCF) and Point Coordination Function (PCF).It’s proposed to encourage cooperation between different modes of access to the channel.
  • 10. Protocol of synchronization Standard IEEE 802.11 10 The standard IEEE 802.11 gives more priority than PCF mode and DCF mode. After expiration of the PIFS, the base station has the right to access the channel to disseminate scheduling channel access time to all nodes.
  • 11. Protocol of synchronization Standard IEEE 802.15.4 11 This standard works on two modes : The mode not-beacon using CSMA / CA not Slotted The mode beacon, using CSMA / CA Slotted A model master-slave is adopted. The FFD takes the role of a PAN coordinator. In the topology peer-to -peer, a FFD can speak to other FFD in its range of radio and can spend messages to other FFD .
  • 12. Protocol of synchronization Standard IEEE 802.15.4 12 The super-frame is divided into an active part and an inactive part. The first is divided into an interval of fixed size, that contains a contention access period ( CAP) , Besides the coordinator raises no problem because both nodes are active all the time.
  • 13. Protocol of synchronization Protocol S-MAC 13 T Is one of the first synchronized protocols which improves the IEEE 802.11,and it consists of dividing the time in periods of fixed duration T During sleeping, the node turns off its radio, and sets a timer to awake it later. All nodes are free to choose their own listen/sleep schedules . Established of the radio-on and the radio-off.S-MAC reduces the listen time by putting nodes into periodic sleep state.
  • 14. Protocol of synchronization Protocol T-MAC 14 Timeout MAC (T-MAC) based on the protocol S-MAC and on the attempts to limit the problems caused by this protocol. . The Nodes choose their schedule as in S-MAC but the active windows are not fixed in time, the interval of time varies according to the traffic. Adding package of control FRTS (future RTS) to indicate that the transmission manages, and reduce the latency of the transmission multi-soute..
  • 15. Protocol of synchronization protocol S-MAC and T-MAC 15 The following figure presents a Comparison between two periods active / inactive for both protocols S-MAC and T-MAC
  • 16. Protocol of synchronization Protocol OB-MAC 16 The main point of the Overhearing Based is to reduce the energy consumption, this includes two tasks: Reduce the running time of the transceiver Reduce the number of redundant communication. We illustrate the operation of OB-MAC on both synchronization protocols for access to S-MAC and IEEE 802.15.4 medium
  • 17. Protocol of synchronization Protocol OB-MAC on IEEE802.15.4 17 The figure 4 shows an example of operation of the OB-MAC in the standard 802.15.4
  • 18. Protocol of synchronization Protocol OB-MAC on S-MAC 18 We apply OB-MAC on S-MAC because S-MAC is a typical example of the family synchronized MAC ,and here is the protocol of functioning
  • 20. Our contribution Design mac layer????? Simulation under NS ??? The laency?? 20  The objective of the MAC layer is decomposed into two parts: the first part is the creation of the infrastructure of sensor networks. Energy eficiency ??  And the second part is the division of the communication channel in an effective way for the transfer which respect the following criteria:
  • 21. MAC layer design Energy eficiency  The energy consumption is a very important factor in the WSN, they nodes are feed by batteries, but it is often very difficult to change them . The latency  It is the interval of time between the times or event occurs and the time or the base station receives the information of this event.  The NS project was launched in 1989 as a variant of the simulator REAL network simulator. It’s evolves in the conger of the contributions ofits users . 21 Simulation under NS
  • 22. Simulation under NS2 22 , we find according after the results that the energy consumption in the protocol IEEE802.11 is very raised with regard to the other protocols such as IEEE802.15.4, S-MAC, T-MAC and the OB-MAC
  • 23. Simulation under NS2 23 . We notice that the OB-MAC consumes less energy than to the other protocols
  • 24. Simulation under NS2 24 We notice that the IEEE802.11 gives a very important latency comparing to the other protocols because the IEEE802.11 uses the packages of control as RTS, CTS and ACK to avoid the problem of the collision
  • 26. Conclusion and perspective • In this paper, we presented and analyzed the functioning of synchronization protocols medium access in the simulator as well as in the real case. In the various protocols medium access, the passive listening is always considered as a source of wasting of energy.  All WSN MAC protocols are designed with the goal to conserve energy  Choose the protocol OB-MAC and looking for collision problems realize plate forme witch hard in labo 26
  • 27. Thanks for yourThanks for your attentionattention

Editor's Notes

  1. is subdivided into three parts: (1) a contention access period during which nodes use a slotted CSMA/CA (2) a contention-free period containing a number of guaranteed time slots (GTS) that can be allocated by the coordinator to specific nodes and (3) an inactive period during which the end-devices and coordinator can go to sleep.
  2. Each node sleeps for some time, and then wakes up and listens to see if any other node wants to talk to it
  3. But, it does not solve the problem of the latency for the traffic of types convergcast
  4. The figure shows the energy consumption according to time
  5. The figure shows the energy consumption according to number of nodes.The sensors are randomly distributed
  6. . On the other hand, the latency in the protocol the OB-MAC is relatively constant if we increase the number of nodes in the network.