Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...Pallepati Vasavi
This document discusses various terminology related to the MAC sublayer, including:
1. The station model consisting of independent stations that generate frames for transmission.
2. The single channel assumption where a single channel is available for all communication.
3. The collision assumption where if two frames are transmitted simultaneously they will overlap and be garbled.
It then covers concepts such as carrier sensing, hidden and exposed terminals, and near and far terminals that create challenges for wireless networks. Finally, it introduces various multiple access methods including SDMA, FDMA, TDMA, and CDMA.
Mac protocols for ad hoc wireless networks Divya Tiwari
The document discusses MAC protocols for ad hoc wireless networks. It addresses key issues in designing MAC protocols including limited bandwidth, quality of service support, synchronization, hidden and exposed terminal problems, error-prone shared channels, distributed coordination without centralized control, and node mobility. Common MAC protocol classifications and examples are also presented, such as contention-based protocols, sender-initiated versus receiver-initiated protocols, and protocols using techniques like reservation, scheduling, and directional antennas.
This document discusses wireless sensor network applications and energy consumption. It provides examples of WSN applications including disaster relief, environment monitoring, healthcare, and more. It then discusses various factors that influence energy consumption in sensor nodes, including operation states, microcontroller usage, radio transceivers, memory, and the relationship between computation and communication. Specific power consumption numbers are given for different components like radios, sensors, and microprocessors. The goals of optimization for WSNs are discussed as quality of service, energy efficiency, scalability, and robustness.
Minimize energy per packet (or per bit)
Maximize network lifetime
Routing considering available battery energy
Maximum Total Available Battery Capacity
Minimum Battery Cost Routing (MBCR)
Min– Max Battery Cost Routing (MMBCR)
Conditional Max – Min Battery Capacity Routing (CMMBCR)
Minimize variance in power levels
Minimum Total Transmission Power Routing (MTPR)
How to put these nodes together to form a meaningful network.
How a network should function at high-level application scenarios .
On the basis of these scenarios and optimization goals, the design of networking protocols in wireless sensor networks are derived
A proper service interface is required and integration of WSNs into larger network contexts.
This document discusses different types of routing protocols for mobile ad hoc networks. It begins by classifying routing protocols into four categories: proactive (table-driven), reactive (on-demand), hybrid, and geographic location-assisted. It then provides more details on proactive protocols like DSDV, and reactive protocols like DSR and AODV. For DSDV, it describes how routing tables are regularly exchanged and updated when link breaks occur. For DSR and AODV, it explains how routes are discovered on-demand via route requests and replies. Key differences between DSR and AODV are also summarized.
This document discusses medium access control (MAC) protocols, which regulate access to a shared wireless medium between nodes. It covers key requirements for MAC protocols including throughput efficiency, fairness, and low overhead. It also describes challenges like the hidden terminal problem, exposed terminal problem, and sources of overhead from collisions, overhearing, and idle listening. Finally, it categorizes common MAC protocols as fixed assignment, demand assignment, and random access and notes additional energy conservation requirements for wireless sensor networks.
Distributed Operation
Synchronization
Hidden Terminals
Exposed terminals
Throughput
Access delay
Fairness
Real-time Traffic support
Resource reservation
Ability to measure resource availability
Capability for power control
Adaptive rate control
Use of directional antennas
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...Pallepati Vasavi
This document discusses various terminology related to the MAC sublayer, including:
1. The station model consisting of independent stations that generate frames for transmission.
2. The single channel assumption where a single channel is available for all communication.
3. The collision assumption where if two frames are transmitted simultaneously they will overlap and be garbled.
It then covers concepts such as carrier sensing, hidden and exposed terminals, and near and far terminals that create challenges for wireless networks. Finally, it introduces various multiple access methods including SDMA, FDMA, TDMA, and CDMA.
Mac protocols for ad hoc wireless networks Divya Tiwari
The document discusses MAC protocols for ad hoc wireless networks. It addresses key issues in designing MAC protocols including limited bandwidth, quality of service support, synchronization, hidden and exposed terminal problems, error-prone shared channels, distributed coordination without centralized control, and node mobility. Common MAC protocol classifications and examples are also presented, such as contention-based protocols, sender-initiated versus receiver-initiated protocols, and protocols using techniques like reservation, scheduling, and directional antennas.
This document discusses wireless sensor network applications and energy consumption. It provides examples of WSN applications including disaster relief, environment monitoring, healthcare, and more. It then discusses various factors that influence energy consumption in sensor nodes, including operation states, microcontroller usage, radio transceivers, memory, and the relationship between computation and communication. Specific power consumption numbers are given for different components like radios, sensors, and microprocessors. The goals of optimization for WSNs are discussed as quality of service, energy efficiency, scalability, and robustness.
Minimize energy per packet (or per bit)
Maximize network lifetime
Routing considering available battery energy
Maximum Total Available Battery Capacity
Minimum Battery Cost Routing (MBCR)
Min– Max Battery Cost Routing (MMBCR)
Conditional Max – Min Battery Capacity Routing (CMMBCR)
Minimize variance in power levels
Minimum Total Transmission Power Routing (MTPR)
How to put these nodes together to form a meaningful network.
How a network should function at high-level application scenarios .
On the basis of these scenarios and optimization goals, the design of networking protocols in wireless sensor networks are derived
A proper service interface is required and integration of WSNs into larger network contexts.
This document discusses different types of routing protocols for mobile ad hoc networks. It begins by classifying routing protocols into four categories: proactive (table-driven), reactive (on-demand), hybrid, and geographic location-assisted. It then provides more details on proactive protocols like DSDV, and reactive protocols like DSR and AODV. For DSDV, it describes how routing tables are regularly exchanged and updated when link breaks occur. For DSR and AODV, it explains how routes are discovered on-demand via route requests and replies. Key differences between DSR and AODV are also summarized.
This document discusses medium access control (MAC) protocols, which regulate access to a shared wireless medium between nodes. It covers key requirements for MAC protocols including throughput efficiency, fairness, and low overhead. It also describes challenges like the hidden terminal problem, exposed terminal problem, and sources of overhead from collisions, overhearing, and idle listening. Finally, it categorizes common MAC protocols as fixed assignment, demand assignment, and random access and notes additional energy conservation requirements for wireless sensor networks.
Distributed Operation
Synchronization
Hidden Terminals
Exposed terminals
Throughput
Access delay
Fairness
Real-time Traffic support
Resource reservation
Ability to measure resource availability
Capability for power control
Adaptive rate control
Use of directional antennas
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
Wireless sensor networks consist of large numbers of sensor nodes that monitor parameters and communicate wirelessly. The SPIN protocol family was developed to address the limitations of sensor nodes, particularly their limited energy, computation, and communication capabilities. SPIN uses meta-data negotiation and resource awareness to disseminate data between nodes more efficiently than flooding protocols. SPIN-1 is a simple three-stage handshake protocol that reduces energy costs. SPIN-2 builds upon SPIN-1 with an additional energy conservation heuristic to further prolong network lifetime. Evaluation shows SPIN consumes significantly less energy than flooding for data dissemination in wireless sensor networks.
SPINS: Security Protocols for Sensor NetworksAbhijeet Awade
This document summarizes the SPINS security protocols for sensor networks. It discusses two protocols: SNEP for basic node-to-base station security and μTESLA for authenticated broadcast. SNEP provides data confidentiality through symmetric encryption and data authentication using message authentication codes. μTESLA provides authentication for broadcast messages through disclosure of symmetric keys along a key chain. The document also gives examples of applications these protocols can enable, such as authenticated routing and pairwise key agreement between nodes.
This document discusses different types of sensor node hardware: augmented general-purpose computers, dedicated embedded sensor nodes, and system-on-chip devices. It notes that Berkley motes have gained popularity due to their small size, open source software, and commercial availability. The document also outlines programming challenges for sensor networks and different approaches like event-driven execution, node-level software platforms, and state-centric programming.
Routing protocols for ad hoc wireless networks Divya Tiwari
The document discusses routing protocols for ad hoc wireless networks. It outlines several key challenges for these protocols, including mobility, bandwidth constraints, error-prone shared wireless channels, and hidden/exposed terminal problems. It also categorizes routing protocols based on how routing information is updated (proactively, reactively, or through a hybrid approach), whether they use past or future temporal network information, the type of network topology supported (flat or hierarchical), and how they account for specific resources like power.
This document provides an overview of wireless sensor networks. It discusses key definitions, advantages, applications and challenges. Sensor networks can provide energy and detection advantages over traditional systems. They enable applications in various domains including military, environmental monitoring, healthcare and home automation. The document also outlines enabling technologies and discusses important considerations like network architectures, hardware components, energy consumption and optimization goals.
The document discusses several MAC protocols for ad hoc networks including MACA, MACAW, and PAMAS. MACA uses RTS and CTS packets to avoid collisions but does not provide ACK. MACAW is a revision of MACA that includes ACK. It significantly increases throughput but does not fully solve hidden and exposed terminal problems. PAMAS uses a separate signaling channel for RTS-CTS and a data channel. It allows nodes to power down transceivers when not transmitting to save energy.
This document discusses power aware routing protocols for wireless sensor networks. It begins by describing wireless sensor networks and how they are used to monitor environmental conditions. It then classifies routing protocols for sensor networks based on their functioning, node participation style, and network structure. Specific examples are provided for different types of routing protocols, including LEACH, TEEN, APTEEN, SPIN, Rumor Routing, and PEGASIS. Chain-based and clustering routing protocols are also summarized.
The document summarizes contention-based MAC protocols for wireless sensor networks. It discusses the PAMAS protocol, which provides detailed overhearing avoidance and uses two channels - a data channel and control channel. Signaling packets like RTS, CTS, and busy tones are transmitted on the control channel. It also covers concepts like low duty cycles, wake up mechanisms, and protocols like S-MAC that coordinate node schedules to reduce idle listening. Quizzes are included to test understanding of discussed concepts.
The document summarizes several routing protocols used in wireless networks. It discusses both table-driven protocols like DSDV and on-demand protocols like AODV. It provides details on how each protocol performs routing and maintains routes. It also outlines some advantages and disadvantages of protocols like DSDV, AODV, DSR, and TORA.
The document discusses key issues in designing ad hoc wireless routing protocols including mobility, bandwidth constraints from a shared radio channel, and resource constraints of battery life and processing power. It outlines problems like the hidden and exposed terminal problems that can occur on a shared wireless channel. It also provides ideal characteristics for routing protocols, noting they should be fully distributed, adaptive to topology changes, use minimal flooding, and converge quickly when paths break while minimizing overhead through efficient use of bandwidth and resources.
Sensor Networks Introduction and ArchitecturePeriyanayagiS
This document provides an overview of sensor networks and wireless sensor network architectures. It begins with an introduction to wireless sensor networks and their components. It then discusses the topics, challenges, and enabling technologies for WSNs. The document outlines the architecture of a sensor node and its goals. It provides examples of WSN applications and discusses sensor network deployment considerations. Finally, it addresses the design challenges, operational challenges, and required mechanisms for WSNs to meet their requirements.
Ad hoc wireless networks allow devices to connect and communicate with each other without a centralized access point. Nodes in an ad hoc network relay messages through intermediate hops to reach destinations. Examples include Bluetooth networks and wireless mesh networks. Issues in ad hoc networks include medium access control, routing with mobility and bandwidth constraints, and providing quality of service guarantees.
This document summarizes geographical routing in wireless sensor networks. It begins with an introduction to geographic routing protocols, which route packets based on the geographic position of nodes rather than their network addresses. It then discusses several specific geographic routing protocols, including Greedy Perimeter Stateless Routing (GPSR) and Geographical and Energy Aware Routing (GEAR). The document also covers topics like how nodes obtain location information, security issues in geographic routing like the Sybil attack, and concludes that geographic routing can enable scalable and energy-efficient routing in wireless sensor networks.
The document discusses ad-hoc networks and their key characteristics. It describes several challenges in ad-hoc networks including limited battery power, dynamic network topology, and scalability issues. It also summarizes several ad-hoc network routing protocols (e.g. DSDV, AODV, DSR), addressing both table-driven and on-demand approaches. Additionally, it outlines some ad-hoc MAC protocols like MACA and PAMAS that aim to manage shared wireless medium access.
This document discusses various techniques for energy efficient unicast routing in wireless sensor networks. It describes algorithms such as Dijkstra's algorithm, minimizing energy per packet, maximizing network lifetime, and routing based on available battery energy. Additional algorithms covered include minimum battery cost routing, minimum-max battery cost routing, and conditional max-min battery capacity routing. The document also discusses multipath unicast routing techniques including constructing disjoint and braided paths, and simultaneously transmitting over multiple paths.
Packet radio protocols allow multiple subscribers to access a shared channel for transmitting data packets. They use contention-based random access techniques like ALOHA. Pure ALOHA protocol has low efficiency due to partial packet collisions. Slotted ALOHA synchronizes transmissions to time slots to prevent partial collisions, improving efficiency. Performance is evaluated using metrics like throughput, which is highest at optimal channel load and drops off above and below this point.
This document summarizes several reactive routing protocols for mobile ad hoc networks (MANETs). Reactive protocols create routes only when needed by a source. Dynamic Source Routing uses route requests and replies to find paths, while Temporally-Ordered Routing Algorithm builds and maintains a directed acyclic graph rooted at destinations. Some protocols aim to improve quality of service or support real-time data streams through techniques like bandwidth estimation and mobility prediction. Source Routing with Local Recovery reduces overhead by allowing intermediate nodes to perform local error recovery using route caches when possible.
Fisheye State Routing (FSR) - Protocol OverviewYoav Francis
Overview of the Fisheye State Routing (FSR) for cellular networks, IDC 2012
By Yoav Francis and Nir Solomon
(Part of a performance comparison of various routing algorithms in cellular networks)
This document discusses MAC protocols for wireless sensor networks. It begins by explaining the role and classifications of MAC protocols, and then discusses specific considerations for WSNs, including balancing requirements, energy problems at the MAC layer, and the need for low complexity. It covers low duty cycle protocols that use periodic sleep and wakeup cycles to reduce energy consumption from idle listening. Specific protocols mentioned include S-MAC, the mediation device protocol, and wakeup concepts using cycled receivers and periodic wakeup schemes.
Versatile Low Power Media Access for Wireless Sensor NetworksMichael Rushanan
Media access control in wireless sensor networks must be small, efficient, and energy conscious. This presentation presented the findings of a paper from Berkley, "Versatile Low Power Media Access for Wireless Sensor Networks," where the authors present just such a MAC implementation called, BMAC. The presentation was delivered to a graduate students at Johns Hopkins University enrolled in Embedded Systems and Wireless Sensor Networks.
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
Wireless sensor networks consist of large numbers of sensor nodes that monitor parameters and communicate wirelessly. The SPIN protocol family was developed to address the limitations of sensor nodes, particularly their limited energy, computation, and communication capabilities. SPIN uses meta-data negotiation and resource awareness to disseminate data between nodes more efficiently than flooding protocols. SPIN-1 is a simple three-stage handshake protocol that reduces energy costs. SPIN-2 builds upon SPIN-1 with an additional energy conservation heuristic to further prolong network lifetime. Evaluation shows SPIN consumes significantly less energy than flooding for data dissemination in wireless sensor networks.
SPINS: Security Protocols for Sensor NetworksAbhijeet Awade
This document summarizes the SPINS security protocols for sensor networks. It discusses two protocols: SNEP for basic node-to-base station security and μTESLA for authenticated broadcast. SNEP provides data confidentiality through symmetric encryption and data authentication using message authentication codes. μTESLA provides authentication for broadcast messages through disclosure of symmetric keys along a key chain. The document also gives examples of applications these protocols can enable, such as authenticated routing and pairwise key agreement between nodes.
This document discusses different types of sensor node hardware: augmented general-purpose computers, dedicated embedded sensor nodes, and system-on-chip devices. It notes that Berkley motes have gained popularity due to their small size, open source software, and commercial availability. The document also outlines programming challenges for sensor networks and different approaches like event-driven execution, node-level software platforms, and state-centric programming.
Routing protocols for ad hoc wireless networks Divya Tiwari
The document discusses routing protocols for ad hoc wireless networks. It outlines several key challenges for these protocols, including mobility, bandwidth constraints, error-prone shared wireless channels, and hidden/exposed terminal problems. It also categorizes routing protocols based on how routing information is updated (proactively, reactively, or through a hybrid approach), whether they use past or future temporal network information, the type of network topology supported (flat or hierarchical), and how they account for specific resources like power.
This document provides an overview of wireless sensor networks. It discusses key definitions, advantages, applications and challenges. Sensor networks can provide energy and detection advantages over traditional systems. They enable applications in various domains including military, environmental monitoring, healthcare and home automation. The document also outlines enabling technologies and discusses important considerations like network architectures, hardware components, energy consumption and optimization goals.
The document discusses several MAC protocols for ad hoc networks including MACA, MACAW, and PAMAS. MACA uses RTS and CTS packets to avoid collisions but does not provide ACK. MACAW is a revision of MACA that includes ACK. It significantly increases throughput but does not fully solve hidden and exposed terminal problems. PAMAS uses a separate signaling channel for RTS-CTS and a data channel. It allows nodes to power down transceivers when not transmitting to save energy.
This document discusses power aware routing protocols for wireless sensor networks. It begins by describing wireless sensor networks and how they are used to monitor environmental conditions. It then classifies routing protocols for sensor networks based on their functioning, node participation style, and network structure. Specific examples are provided for different types of routing protocols, including LEACH, TEEN, APTEEN, SPIN, Rumor Routing, and PEGASIS. Chain-based and clustering routing protocols are also summarized.
The document summarizes contention-based MAC protocols for wireless sensor networks. It discusses the PAMAS protocol, which provides detailed overhearing avoidance and uses two channels - a data channel and control channel. Signaling packets like RTS, CTS, and busy tones are transmitted on the control channel. It also covers concepts like low duty cycles, wake up mechanisms, and protocols like S-MAC that coordinate node schedules to reduce idle listening. Quizzes are included to test understanding of discussed concepts.
The document summarizes several routing protocols used in wireless networks. It discusses both table-driven protocols like DSDV and on-demand protocols like AODV. It provides details on how each protocol performs routing and maintains routes. It also outlines some advantages and disadvantages of protocols like DSDV, AODV, DSR, and TORA.
The document discusses key issues in designing ad hoc wireless routing protocols including mobility, bandwidth constraints from a shared radio channel, and resource constraints of battery life and processing power. It outlines problems like the hidden and exposed terminal problems that can occur on a shared wireless channel. It also provides ideal characteristics for routing protocols, noting they should be fully distributed, adaptive to topology changes, use minimal flooding, and converge quickly when paths break while minimizing overhead through efficient use of bandwidth and resources.
Sensor Networks Introduction and ArchitecturePeriyanayagiS
This document provides an overview of sensor networks and wireless sensor network architectures. It begins with an introduction to wireless sensor networks and their components. It then discusses the topics, challenges, and enabling technologies for WSNs. The document outlines the architecture of a sensor node and its goals. It provides examples of WSN applications and discusses sensor network deployment considerations. Finally, it addresses the design challenges, operational challenges, and required mechanisms for WSNs to meet their requirements.
Ad hoc wireless networks allow devices to connect and communicate with each other without a centralized access point. Nodes in an ad hoc network relay messages through intermediate hops to reach destinations. Examples include Bluetooth networks and wireless mesh networks. Issues in ad hoc networks include medium access control, routing with mobility and bandwidth constraints, and providing quality of service guarantees.
This document summarizes geographical routing in wireless sensor networks. It begins with an introduction to geographic routing protocols, which route packets based on the geographic position of nodes rather than their network addresses. It then discusses several specific geographic routing protocols, including Greedy Perimeter Stateless Routing (GPSR) and Geographical and Energy Aware Routing (GEAR). The document also covers topics like how nodes obtain location information, security issues in geographic routing like the Sybil attack, and concludes that geographic routing can enable scalable and energy-efficient routing in wireless sensor networks.
The document discusses ad-hoc networks and their key characteristics. It describes several challenges in ad-hoc networks including limited battery power, dynamic network topology, and scalability issues. It also summarizes several ad-hoc network routing protocols (e.g. DSDV, AODV, DSR), addressing both table-driven and on-demand approaches. Additionally, it outlines some ad-hoc MAC protocols like MACA and PAMAS that aim to manage shared wireless medium access.
This document discusses various techniques for energy efficient unicast routing in wireless sensor networks. It describes algorithms such as Dijkstra's algorithm, minimizing energy per packet, maximizing network lifetime, and routing based on available battery energy. Additional algorithms covered include minimum battery cost routing, minimum-max battery cost routing, and conditional max-min battery capacity routing. The document also discusses multipath unicast routing techniques including constructing disjoint and braided paths, and simultaneously transmitting over multiple paths.
Packet radio protocols allow multiple subscribers to access a shared channel for transmitting data packets. They use contention-based random access techniques like ALOHA. Pure ALOHA protocol has low efficiency due to partial packet collisions. Slotted ALOHA synchronizes transmissions to time slots to prevent partial collisions, improving efficiency. Performance is evaluated using metrics like throughput, which is highest at optimal channel load and drops off above and below this point.
This document summarizes several reactive routing protocols for mobile ad hoc networks (MANETs). Reactive protocols create routes only when needed by a source. Dynamic Source Routing uses route requests and replies to find paths, while Temporally-Ordered Routing Algorithm builds and maintains a directed acyclic graph rooted at destinations. Some protocols aim to improve quality of service or support real-time data streams through techniques like bandwidth estimation and mobility prediction. Source Routing with Local Recovery reduces overhead by allowing intermediate nodes to perform local error recovery using route caches when possible.
Fisheye State Routing (FSR) - Protocol OverviewYoav Francis
Overview of the Fisheye State Routing (FSR) for cellular networks, IDC 2012
By Yoav Francis and Nir Solomon
(Part of a performance comparison of various routing algorithms in cellular networks)
This document discusses MAC protocols for wireless sensor networks. It begins by explaining the role and classifications of MAC protocols, and then discusses specific considerations for WSNs, including balancing requirements, energy problems at the MAC layer, and the need for low complexity. It covers low duty cycle protocols that use periodic sleep and wakeup cycles to reduce energy consumption from idle listening. Specific protocols mentioned include S-MAC, the mediation device protocol, and wakeup concepts using cycled receivers and periodic wakeup schemes.
Versatile Low Power Media Access for Wireless Sensor NetworksMichael Rushanan
Media access control in wireless sensor networks must be small, efficient, and energy conscious. This presentation presented the findings of a paper from Berkley, "Versatile Low Power Media Access for Wireless Sensor Networks," where the authors present just such a MAC implementation called, BMAC. The presentation was delivered to a graduate students at Johns Hopkins University enrolled in Embedded Systems and Wireless Sensor Networks.
Energy efficient mac protocols for wireless sensor networkijcsa
Wireless sensor network are the collection of individual nodes which are able to interact with physical
environment statically or dynamically by sensing or controlling physical parameter. Wireless sensor network
become a leading solution in many important applications such as intrusion detection, target tracking,
industrial automation etc. A major problem with WSN is to determining a most efficient protocol for
conserving energy of power source. The design of an energy- efficient Medium Access efficient Control
(MAC) protocol is one of the major issues in wireless sensor networks (WSN). In this paper we study some
characteristics of WSN that are important for the design of MAC layer protocols and give a brief introduction
of some newly come MAC protocols with reference to energy efficiency for WSN. In accordance with channel
access policies, MAC protocols are classified into four types, which are cross layer protocols, TDMA-based,
contention-based and hybrid, these are discussed in this paper.
Energy-efficient MAC protocols for wireless sensor networks: a surveyTELKOMNIKA JOURNAL
MAC Protocols enables sensor nodes of the same WSN to access a common shared
communication channel. Many researchers have proposed different solutions explaining how to design and
implement these protocols. The main goal of most MACs protocols is how to prolong lifetime of the WSN
as long as possible by reducing energy consumption since it is often impossible to change or to recharge
sensors’ batteries. The majority of these protocols designed for WSN are based on “duty-cycle” technique.
Every node of the WSN operates on two periods: active period and sleep period to save energy. Until now
(to our knowledge) there is no ideal protocol for this purpose. The main reason relies on the lack of
standardization at lower layers (physical layer) and (physical) sensor hardware. Therefore, the MAC
protocol choice remains application-dependent. A useful MAC protocol should be able to adapt to network
changes (topology, nodes density and network size). This paper surveys MAC protocols for WSNs and
discusses the main characteristics, advantages and disadvantages of currently popular protocols.
This presentation provides a comprehensive state-of-the-art study of wireless sensor networks(WSN) - based IoT MAC protocols, design guidelines that inspired these protocols,
as well as their drawbacks and shortcomings.
This document summarizes and evaluates different medium access control (MAC) protocols for wireless sensor networks. It describes four main MAC protocols:
1. Sensor-MAC (S-MAC) which aims to reduce energy waste from idle listening, collisions, overhearing and control packets. It uses periodic listen and sleep cycles, synchronized across nodes.
2. Timeout-MAC (T-MAC) which improves on S-MAC by using adaptive duty cycles and variable length active periods determined by a timeout mechanism. However, it suffers from an "early sleeping" problem.
3. Future request-to-send is proposed to address the early sleeping problem in T-MAC.
4. Dynamic sensor-MAC
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...INFOGAIN PUBLICATION
Energy potency could be a major demand in wireless sensing element networks. Media Access management is one in every of the key areas wherever energy potency is achieved by planning such MAC protocol that's tuned to the necessities of the sensing element networks. Applications have different necessities and one MAC protocol can't be best TDMA-based MAC (TDMAC) protocol that is specially designed for such applications that need periodic sensing of the sensing element field. TDMAC organizes nodes into clusters. Nodes send their knowledge to their cluster head (CH) and CHs forward it to the bottom station. CHs removed from the bottom station use multi-hop communication by forwarding their knowledge to CHs nearer than themselves to the bottom station each put down-cluster and intra-cluster communication is only TDMA-based that effectively eliminates each inter cluster further as intra-cluster interference.
This document discusses an enhancement to the S-MAC protocol called Enhanced S-MAC. S-MAC is a MAC protocol for wireless sensor networks that aims to improve power efficiency. Enhanced S-MAC further improves power efficiency by allowing nodes to adaptively turn their receivers on and off based on traffic load. It also addresses issues with clock synchronization and overhearing in the original S-MAC protocol. The document outlines related work on MAC protocols, problems encountered with implementing S-MAC, and how Enhanced S-MAC addresses these issues through adaptive listening modes and an improved synchronization protocol. It proposes to simulate Enhanced S-MAC to demonstrate improved power efficiency over standard S-MAC.
A preamble-based approach for Providing QOS support in Wireless Sensor Networkdiala wedyan
The document discusses various MAC protocols for wireless sensor networks, including TDMA, Low Power Listening, XMAC, and BMAC protocols. It then describes a proposed Back off Preamble-based MAC protocol that uses different preamble lengths to prioritize medium access. The protocol is evaluated through simulation in OPNET Modeler, comparing its performance under different quality of service strategies for handling high and low priority traffic flows. The proposed protocol aims to provide reliable delivery and satisfy quality of service requirements for wireless sensor networks.
A Literature Survey on Energy Efficient MAC Protocols For WSNIRJET Journal
This document summarizes several energy efficient MAC protocols for wireless sensor networks. It begins with an introduction to the importance of energy efficiency in wireless sensor networks due to limited battery power. Several causes of energy wastage in wireless sensor networks are then described, including collided packets, overhearing, control packet overhead, idle listening, and over emitting. The document then reviews eight different energy efficient MAC protocols that have been proposed to address these issues, including SMAC, TMAC, TEEM, μ-MAC, DEE-MAC, MR-MAC, Z-MAC, and AMAC. It concludes that various MAC protocols have been developed to efficiently manage energy usage in wireless sensor networks.
Survey on energy efficiency in wireless sensor network using mac protocol wit...Editor Jacotech
Dynamic feature evaluation and concept evaluation is major challenging task in the field of data classification. The continuity of data induced a new feature during classification process, but the classification process is predefined task for assigning data into class. Data comes into multiple feature sub-set format into infinite length. The infinite length not decided the how many class are assigned. Support vector machine is well recognized method for data classification. For the process of support vector machine evaluation of new feature during classification is major problem. The problem of feature evaluation decreases the performance of Support Vector Machine (SVM). For the improvement of support vector machine, particle of swarm optimization technique is used. Particle of swarm optimization controls the dynamic feature evaluation process and decreases the possibility of confusion in selection of class and increase the classification ratio of support vector machine. Particle of swarm optimization work in two phases one used as dynamic population selection and another are used for optimization process of evolved new feature.
This document proposes a Quorum-based Medium Access Control (QMAC) protocol to improve energy efficiency in wireless sensor networks. QMAC enables sensor nodes to sleep longer under light traffic loads by only waking up during scheduled "quorum times". Each node selects one row and column from a grid as its quorum set. This ensures any two nodes' quorums will intersect at some time, allowing communication while keeping individual duty cycles low. Results show QMAC conserves more energy and maintains low latency compared to existing protocols that require waking at every time frame regardless of traffic. QMAC selectively wakes sensor nodes only when needed to balance energy savings and communication ability.
Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum TechniquesIOSR Journals
This document proposes a Quorum-based Medium Access Control (QMAC) protocol to improve energy efficiency in wireless sensor networks. QMAC enables sensor nodes to sleep longer under light traffic loads by only waking up during assigned "quorum time frames". Each node selects one row and column from a grid as its quorum set. This ensures any two nodes' quorums will intersect at some time, allowing communication while keeping individual duty cycles low. Results show QMAC conserves more energy and maintains low latency compared to existing protocols that require nodes to wake up at every time frame regardless of traffic.
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...IOSR Journals
This document summarizes and compares four medium access control (MAC) protocols for wireless sensor networks: T-MAC, B-MAC, S-MAC, and DSMAC. It discusses the key constraints and characteristics of wireless sensor networks that impact MAC protocol design, including limited energy resources. For each protocol, it describes the protocol's operation, analyzes its power consumption and latency performance, and compares the protocols. It finds that T-MAC is more energy efficient than S-MAC due to its adaptive active period, but S-MAC has lower latency. DSMAC achieves lower power consumption than B-MAC through adaptive duty cycling.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...IJCNCJournal
Medium Access control (MAC) is one of the fundamental problems in wireless sensor networks. The performance of wireless sensor network depends on it. The main objective of a medium access control method is to provide high throughput, minimize the delay, and conservers the energy consumption by avoiding the collisions. In this paper, a general model for MAC protocol to reduce the delay, maximize throughput and conserve the energy consumption in channel accessing in high density randomly distributed wireless sensor network is presented. The proposed model is simulated using MATLAB. The simulation results show that the average delay for sensors with sufficient memory is lower than sensors without
memory. Further, the throughput of the channel access method with memory is better than without memory.
This slides about Wireless sensor network MAC protocol,
There are bunch of MAC protocol in research field.
It classify the MAC protocol and summarize the feature of typical sensor network MAC protcol
Similar to WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – S-MAC (20)
This document discusses the Foster-Seeley phase discriminator, which is a type of frequency discriminator used in FM receivers. It operates by comparing the phase difference between primary and secondary voltages in a transformer tuned to the center frequency. When the input frequency matches the center frequency, the phase difference is 90 degrees and the output is zero. If the input frequency increases or decreases from center, the phase difference changes and a positive or negative output voltage is produced, making it useful for demodulating FM signals. The Foster-Seeley discriminator provides good linearity but requires a transformer and limiter before it.
This document discusses a mathematical formula where Fin is initially set to 0, and variables XL and Xc are also set to 0. Then, Fin is set to its maximum value, XL is set equal to an unknown value, and Xc is set equal to an unknown value. The document also mentions three bullet points but provides no other context or values for the variables.
Introduction about Angle Modulation (FM&PM).pptxArunChokkalingam
The document discusses the benefits of meditation for reducing stress and anxiety. Regular meditation practice can help calm the mind and body by lowering heart rate and blood pressure. Making meditation a part of a daily routine, even if just 10-15 minutes per day, can have mental and physical health benefits over time by helping people feel more relaxed and better able to handle life's stresses.
Generation of DSB-SC using Diode Ring Modulator or chopper Modulator.pptxArunChokkalingam
This document discusses a ring modulator method for generating a double sideband suppressed carrier (DSB-SC) signal using amplitude modulation. It has advantages like a stable output and not requiring external power. The operation involves using diodes in a ring configuration to selectively pass or block the carrier signal depending on the polarity of the modulating signal. Coherent detection can then be used to recover the message signal from the DSB-SC by synchronizing the local carrier signal.
Generation of AM-DSB-SC using Balanced FET Modulator.pptxArunChokkalingam
This document discusses amplitude modulation using a balanced FET modulator. It begins by providing the mathematical representation of an AM-DSB-SC waveform. It then describes how a balanced FET modulator can be used to generate an AM-DSB-SC signal. Specifically, it explains that a balanced FET modulator uses two matched FETs in a differential amplifier configuration. The carrier signal is applied in phase to the gates, while the message signal is applied out of phase. This results in an output signal that is amplitude modulated by the message signal. The document concludes by noting that while a balanced FET modulator can heavily suppress the carrier, it cannot achieve 100% carrier suppression due to imperfect matching of the F
Comparison of Amplitude Modulation Techniques.pptxArunChokkalingam
This document discusses different types of amplitude modulation (AM) used in communication systems. It describes AM-DSB-FC, AM-DSB-SC, AM-SSB-SC, and vestigial sideband modulation (VSB), comparing their objectives to save transmitter power and bandwidth, transmission efficiency, bandwidth, number of channels supported, power consumption, difficulty of reconstruction, and applications. The key objectives of different AM techniques are to optimize power and bandwidth efficiency for various communication modes like radio, telegraphy, telephone and TV.
This document discusses reactive routing protocols in mobile ad hoc networks (MANETs), focusing on the Ad Hoc On-Demand Distance Vector (AODV) protocol. It describes how AODV works by broadcasting Route Request packets when a route is needed, and nodes responding with Route Reply packets if they have a valid route. Intermediate nodes store the address of previous nodes to forward packets. The document outlines the key components of Route Request and Route Reply packets, and notes advantages of AODV such as on-demand route establishment and use of destination sequence numbers, with drawbacks including control overhead and bandwidth consumption from periodic beaconing.
Proactive routing protocol
Each node maintain a routing table.
Sequence number is used to update the topology information
Update can be done based on event driven or periodic
Observations
May be energy expensive due to high mobility of the nodes
Delay can be minimized, as path to destination is already known to all nodes.
The document discusses multimedia components and their characteristics. It defines multimedia as the integration of multiple media forms, including text, graphics, audio, video, and more. The basic elements of multimedia are described as text, images, audio, video, and animation. Digital image representation and processing are also covered, including how images are formed, 1-bit and 8-bit images, and color images. Color images can be represented with 24-bit RGB values or 8-bit color indices mapped to a color lookup table.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
1. Dr.Arun Chokkalingam
Professor
Department of Electronics and Communication
RMK College of Engineering and Technology
Chennai.
UNIT III
WSN NETWORK MAC PROTOCOLS
Low Duty Cycle Protocols And Wakeup Concepts –
S-MAC
2. Content
WSN NETWORKING CONCEPTS AND PROTOCOLS
MAC Protocols for Wireless Sensor Networks,
Low Duty Cycle Protocols And Wakeup Concepts –
S-MAC,
4. Importance of MAC Protocols
Medium access control (MAC) protocols:
They coordinate the times where a number of nodes
access a shared communication medium.
5. Objectives of this Unit
The single most important requirement is energy efficiency
There are different MAC-specific sources of energy waste to consider:
1. Overhearing,
2. Collisions,
3. Overhead,
4. Idle listening.
We discuss protocols addressing one or more of these issues.
One important approach is to switch the wireless transceiver into a
sleep mode.
6. MAC Protocols for Wireless Sensor Networks
Specific requirements and design considerations for MAC protocols in
wireless sensor networks.
Balance of requirements
Energy problems on the MAC layer or Major Sources of Energy Waste
1. Collisions,
2. Overhearing,
3. Overhead,
4. Idle listening.
7. Cont.
Balance of requirements
The importance of energy efficiency for the design of MAC protocols is
relatively new and many of the “classical” protocols like ALOHA and
CSMA contain no provisions toward this goal.
Other typical performance figures like fairness, throughput, or delay
tend to play a minor role in sensor networks.
Important requirements for mac protocols are scalability and
robustness against frequent topology changes
8. Energy problems on the MAC layer
A nodes transceiver consumes a significant share of energy.
Transceiver can be in one of the four main states : transmitting,
receiving, idle and sleeping.
sleeping can be significantly cheaper than Idle state.
9. Major Sources of Energy Waste
1. Collisions,
2. Overhearing,
3. Overhead,
4. Idle listening.
12. Cont.
c) Ideal listening
Nodes listen to channel for possible traffic. If nothing is sensed then
most of the time nodes is ideal.
Ideal listening consume 50-100% energy required to receive packets.
d) Protocol overhead
Protocol overhead is induced by MAC-related control frames like, RTS and CTS
packets or request packets in demand assignment protocols, and furthermore
by per-packet overhead like packet headers and trailers.
13. Types of MAC Protocols
Low Duty Cycle Protocols And Wakeup Concepts –
S-MAC,
The Mediation Device Protocol
Contention based protocols – PAMAS,
Schedule based protocols – LEACH,
IEEE 802.15.4 MAC protocol,
14. Low duty cycle protocols and wakeup concepts
Low duty cycle protocols try to avoid spending (much) time in the
idle state and to reduce the communication activities of a sensor node
to a minimum.
wakeup radio-the sleep state is left only when a node is about to
transmit or receive packets.
15. periodic wakeup scheme
The cycled receiver approach, nodes spend most of their time in the sleep
mode and wake up periodically to receive packets from other nodes.
A node a listens onto the channel during its listen period and goes back into
sleep mode when no other node takes the opportunity to direct a packet to a.
A potential transmitter B must acquire knowledge about a’s listen periods to
send its packet at the right time
A whole cycle consisting of sleep period and listen period is also called a
wakeup period.
The ratio of the listen period length to the wakeup period length is also
called the node’s duty cycle.
16. Cont.
• By choosing a small duty cycle, the transceiver is in sleep mode
most of the time, avoiding idle listening and conserving energy.
• In heavy load situations significant competition can occur.
• Choosing a long sleep period induces a significant per-hop
latency,.
• In the multihop case, the per-hop latencies add up and create
significant end-to-end latencies.
• Sleep phases should not be too short in case the start-up costs
outweigh the benefits.
17. S-MAC (Sensor- Medium Access Control)
1. Periodic listen and sleep
2. Collision and overhearing avoidance
3. Message passing
Periodic listen and sleep
Every node sleep for some time and then walkup to see any other node
wants to talk to him
During sleep time node turn off its radio to save Energy
19. Maintaining Synchronization
Collision avoidance?
Schedules are periodically broadcasted to neighbour
Schedules are sent in SYNC packet.
Listen time is divided into two potions one for SYNC and another for
Data.