This document provides an overview of various medium access control (MAC) protocols for wireless sensor networks. It discusses distributed and centralized MAC protocols, including DFWMAC, EY-NPMA, ISMA, RAP, RAMA, Zhang's and Acampora's proposals, and DTMP. It also covers hybrid access protocols like RRA, PRMA, RRA-ISA, DQRUMA, and MASCARA. Additionally, it summarizes MAC protocols like S-MAC, T-MAC, B-MAC, P-MAC, Y-MAC, and Z-MAC and discusses their key characteristics and performance results.
Fault Node Recovery Algorithm for a Wireless Sensor NetworkYogesh Vk
The WSN is made of nodes from a few to several hundred, where each node is connected to one or several sensors.
The basic components of a node are
o Sensor and actuator - an interface to the physical world designed to sense the environmental parameters like pressure and temperature.
o Controller - is to control different modes of operation for processing of data
o Memory - storage for programming data.
o Communication - a device like antenna for sending and receiving data over a wireless channel.
o Power Supply- supply of energy for smooth operation of a node like battery.
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...ijtsrd
The efficiency of a wireless sensor network depends on its life time. By conserving the energy of each sensor for increase in the network life time. The basic operations of a wireless sensor network are sensing 1 the data to the energy sink term is for next transmitting node. The communication or routing 2 process operation be allowed in any operations for all nodes 3 . We propose to select a specific collection of nodes for communication with considering the importance of wireless sensor where security 4 and power usage 5 is taken as top priority. O. Sampath | . P. Suryanarayana Babu "Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Heterogeneous Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd20281.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/20281/energy-efficient-routing-strategies-for-large-scale-wireless-sensor-in-heterogeneous-networks/o-sampath
An algorithm for fault node recovery of wireless sensor networkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This presentation is all about the wireless sensor networks, how they collect data using aggregation, and how they evaluate or calculate the parameters
Fault Node Recovery Algorithm for a Wireless Sensor NetworkYogesh Vk
The WSN is made of nodes from a few to several hundred, where each node is connected to one or several sensors.
The basic components of a node are
o Sensor and actuator - an interface to the physical world designed to sense the environmental parameters like pressure and temperature.
o Controller - is to control different modes of operation for processing of data
o Memory - storage for programming data.
o Communication - a device like antenna for sending and receiving data over a wireless channel.
o Power Supply- supply of energy for smooth operation of a node like battery.
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...ijtsrd
The efficiency of a wireless sensor network depends on its life time. By conserving the energy of each sensor for increase in the network life time. The basic operations of a wireless sensor network are sensing 1 the data to the energy sink term is for next transmitting node. The communication or routing 2 process operation be allowed in any operations for all nodes 3 . We propose to select a specific collection of nodes for communication with considering the importance of wireless sensor where security 4 and power usage 5 is taken as top priority. O. Sampath | . P. Suryanarayana Babu "Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Heterogeneous Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd20281.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/20281/energy-efficient-routing-strategies-for-large-scale-wireless-sensor-in-heterogeneous-networks/o-sampath
An algorithm for fault node recovery of wireless sensor networkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This presentation is all about the wireless sensor networks, how they collect data using aggregation, and how they evaluate or calculate the parameters
Introduction
Background
WSN Design Issues: MAC Protocols, Routing Protocols, Transport Protocols
Performance Modeling of WSNs: Performance Metrics, Basic Models, Network Models
Case Study: Simple Computation of the System Life Span
Practical Example.
Wireless Sensor Networks lecture presented in the Fall of 2005. Covering the following: data-dissemination schemes, media access control schemes, distributed algorithms for collaborative processing, and architecture for a wireless sensor network.
How to put these nodes together to form a meaningful network.
How a network should function at high-level application scenarios .
On the basis of these scenarios and optimization goals, the design of networking protocols in wireless sensor networks are derived
A proper service interface is required and integration of WSNs into larger network contexts.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
2. • Distributed MAC Protocols
– Distributed Foundation Wirelesss MAC
(DFWMAC)
– Eliminate Yield – Non-Preemptive Priority
Multiple Access (EY-NPMA)
• Centralized MAC Protocols
– Random Access
• Idle Sense Multiple Acces (ISMA)
• Randomly Addressed Polling (RAP)
• Resource Auction Multiple Access (RAMA)
– Guaranteed Access
• Zhang’s and Acampora’s Proposals
• Disposable Token MAC Protocol (DTMP)
3. – Hybrid Access
• Random Reservation Protocols (RRA)
• Packet Reservation Multiple Access (PRMA)
• Random Reservation Access – Independent Stations
Algorithm (RRA-ISA)
• Distributed Queuing Request Updated Multiple Access
(DQRUMA)
• Moble Access Scheme based on Contention and
Reservation for ATM (MASCARA)
4. Distributed Wireless Network
• ad hoc network
• No central administration
• Multi-hop wireless networks
• Wireless Sensor Nets
5. Centralized Wireless Network
• Last Hop Network
• Very common
– Corporate, Academic, and Cellular uses.
• Has a controlling Base Station, with variable
intelligence
– Wireless Access Point
– Cellular Tower
6. Centralized Wireless Network
• Last Hop Network
• Very common
– Corporate, Academic, and Cellular uses.
• Has a controlling Base Station, with variable
intelligence
– Wireless Access Point
– Cellular Tower
7. Characteristics of MAC Protocols in
Sensor Networks
• Energy Efficiency
• Scalability
• Adaptability
• Low Latency and Predictability
• Reliability
8. MAC Protocols in Sensor Networks
• ALOHA
• CSMA
– Persistent
• L persistent
• P persistent
– Non Persistent
16. Traffic-Adaptive Medium Access
• TRAMA assumes a time-slotted channel,
where time is divided into
– Periodic random access intervals (signaling slots)
• Neighbor Protocol (NP)
– Scheduled-access intervals (transmission slots)
• Schedule Exchange Protocol (SEP)
17. Overview
•Routing in WSNs is challenging due to distinguish
from other wireless networks like mobile ad hoc
networks or cellular networks.
•First, it is not possible to build a global
addressing scheme for a large number of sensor
nodes. Thus, traditional IP-based protocols may
not be applied to WSNs. In WSNs, sometimes
getting the data is more important than knowing
the IDs of which nodes sent the data.
•Second, in contrast to typical communication
networks, almost all applications of sensor
networks require the flow of sensed data from
18. 1
8
Overview
(cont.)
• Third, sensor nodes are tightly constrained in
terms of energy, processing, and storage
capacities. Thus, they require carefully resource
management.
• Fourth, in most application scenarios, nodes in WSNs
are generally stationary after deployment except for,
may be, a few mobile nodes.
• Fifth, sensor networks are application specific, i.e.,
design
requirements of a sensor network change with
application.
• Sixth, position awareness of sensor nodes is
important since data collection is normally based
on the location.
• Finally, data collected by many sensors in WSNs is
typically based on common phenomena, hence there
is a high probability that this data has some
redundancy.
19. 1
9
Overview
(cont.)
• The task of finding and maintaining routes in
WSNs is nontrivial since energy restrictions and
sudden
changes in node status (e.g., failure) cause
frequent and unpredictable topological
changes.
• To minimize energy consumption, routing
techniques proposed for WSNs employ some
well-known routing strategies, e.g., data
aggregation and in-network processing,
clustering, different node role assignment, and
data-centric methods were employed.
20. Overview
• Data-centric communication
• Data is named by attribute-
value pairs
• Different form IP-
style
communication
• End-to-end delivery service
• e.g.
• How many pedestrians do
you observe in the
geographical region X?
Event
Sources
2
0
Sink Node
Directed
Diffusion
A sensorfield
21. 2
1
Overview(cont.)
• Data-centric communication (cont.)
• Human operator’s query (task) is diffused
• Sensors begin collecting information about query
• Information returns along the reverse path
• Intermediate nodes aggregate the data
• Combing reports from sensors
• Directed Diffusion is an important milestone in
the data centric routing research of sensor
networks
23. 2
3
Overview
• In a hierarchical architecture, higher energy nodes
can be used to process and send the information
while low energy nodes can be used to perform
the sensing of the target.
• Hierarchical routing is mainly two-layer routing
where one layer is used to select cluster heads
and the other layer is used for routing.
• Hierarchical routing (or cluster-based routing),
e.g., LEACH, PEGASIS, TTDD, is an efficient
way to lower energy consumption within a
cluster and by performing data aggregation and
fusion in order to decrease the number of
transmitted messages to the base stations.
24. Y-MAC
• Y-MAC divides time into
– Frames
– Slots
• Each frame contains a broadcast period and a
unicast period
• Every node must wakeup at the beginning of a
broadcast period
30. 3
0
LEACH
• LEACH (Low-Energy Adaptive Clustering
Hierarchy), a clustering-based protocol that
minimizes energy dissipation in sensor
networks.
• LEACH outperforms classical clustering
algorithms by using adaptive clusters and
rotating cluster-heads, allowing the energy
requirements of the system to be distributed
among all the sensors.
• LEACH is able to perform local computation in
each cluster to reduce the amount of data that
must be transmitted to the base station.
• LEACH uses a CDMA/TDMA MAC to reduce
inter- cluster and intra-cluster collisions.
31. 3
1
LEACH(cont.)
• Sensors elect themselves to be local cluster-headsat
any given time with a certainprobability.
• Each sensor node joins a cluster-head thatrequires
the minimum communicationenergy.
• Once all the nodes are organized into clusters, each
cluster-head creates a transmission schedule forthe
nodes in itscluster
.
• In order to balance the energy consumption, the
cluster-head nodes are not fixed; rather
,thisposition
is self-elected at different timeintervals.
32. LEACH
1 0 0 m
叢 集 區
觀 測 區 域
B a s e S t a t i o n
S e n s o r ( N o n C l u s t e r H e a d )
S e n s o r ( C l u s t e r H e a d )
I n i t i a l D a t a
A g g r e g a t e d D a t a
~ 1 0 0 m
1
2
33. LEACH:AdaptiveClustering
• Periodic independent self-election
• Probabilistic
• CSMA MAC used to advertise
• Nodes select advertisement with strongest signal
strength
• Dynamic TDM
A
cycles
All nodes marked with a given symbol belong to the same cluster, and
the cluster head nodes are marked with a ● .
3
3
34. 3
4
Algorithm
• Periodic process
• Two phases per round:
• Setup phase
• Advertisement: Execute election algorithm
• Members join to cluster
• Cluster-head broadcasts schedule
• Steady-State phase
• Data transmission to cluster-head using
TDMA
• Cluster-head transfers data to BS
(Base Station)
35. Algorithm(cont.)
15
Advertisement
phase
Cluster setup phase Broadcast schedule
Time slot
1
Time slot
2
Time slot
3
Setup phase Steady-state phase
Self-election of cluster
heads
Cluster heads compete
with CSMA
Members
compete with
CSMA
Cluster head Broadcast
CDMA code to members
Fixed-length cycle
1
5
36. Algorithm Summary(cont.)
• Set-up phase
• Cluster heads assign a TDMA schedule for their
members where each node is assigned a time slot
when it can transmit.
• Each cluster communications using different CDMA
codes to reduce interference from nodes belonging
to other clusters.
• TDMA intra-cluster
• CDMA inter-cluster
• Spreading codes determined randomly
• Broadcast during advertisement phase
1
6
37. 1
7
Algorithm Summary
(cont.)
• Steady-state phase
• All source nodes send their data to their cluster
heads
• Cluster heads perform data aggregation/fusion
through local transmission
• Cluster heads send aggregated data back to the BS
using a single direct transmission
38. An Example of a
LEACHNetwork
• While neither of these diagrams is the optimum scenario, the
second is better because the cluster-heads are spaced out and
the network is more properly sectioned
1
8
Node
Cluster-Head Node
Node that has been cluster-head in the last 1/P
rounds
Cluster
Border
X
Good case scenario Bad case scenario
39. 3
9
Conclusions
• Advantages
• Increases the lifetime of the network
• Even drain of energy
• Distributed, no global knowledge required
• Energy saving due to aggregation by CHs
• Disadvantages
• LEACH assumes all nodes can transmit with enough
power to reach BS if necessary (e.g., elected as
CHs)
• Each node should support both TDMA & CDMA
• Need to do time synchronization
• Nodes use single-hop communication
51. S-MAC - Sensor MAC
• Nodes periodically sleep
• Trades energy efficiency for lower throughput
and higher latency
• Sleep during other nodes transmissions
Listen Sleep t
Listen Sleep
52. S-MAC
• Listen significantly longer than clock drift
• Neighboring nodes exchange SYNC msgs
• Exchanged timestamps are relative rather than
absolute
• RTS/CTS avoids hidden terminal
• Message passing provided
• Packets contain expected duration of message
• Every packet must be acknowledged
• Adaptive listening can be used so that potential
next hop nodes wake up in time for possible
transmissions
55. T-MAC - Timeout MAC
• Transmit all messages in bursts of variable
length and sleep between bursts
• RTS / CTS / ACK Scheme
• Synchronization similar to S-MAC
57. T-MAC Results
• T-MAC saves energy compared to S-MAC
• The “early sleeping problem” limits the maximum
throughput
• Further testing on real sensors needed
58. B-MAC - Berkeley MAC
• B-MAC’s Goals:
– Low power operation
– Effective collision avoidance
– Simple implementation (small code)
– Efficient at both low and high data rates
– Reconfigurable by upper layers
– Tolerant to changes on the network
– Scalable to large number of nodes
59. B-MAC’s Features
• Clear Channel Assessment (CCA)
• Low Power Listening (LPL) using preamble
sampling
• Hidden terminal and multi-packet mechanisms
not provided, should be implemented, if needed,
by higher layers
Sleep
t
Receive
Receiver
Sleep
t
Preamble
Sender Message
Sleep
60. B-MAC Interface
• CCA on/off
• Acknowledgements on/off
• Initial and congestion backoff in a per packet
basis
• Configurable check interval and preamble
length
61. B-MAC Lifetime Model
E Erx Etx Elisten Ed Esleep
Erx trxcrxbV
Etx ttxctxbV
Elisten Esample
1
ti
Ed tdcdataV
Esleep tsleepcsleepV
• E can be calculated if hardware constants, sample rate, number
of neighboring nodes and check time/preamble are known
• Better: E can be minimized by varying check time/preamble if
constants, sample rate and neighboring nodes are known
62. B-MAC Results
• Performs better than the other studied
protocols in most cases
• System model can be complicated for
application and routing protocol developers
• Protocol widely used because has good results
even with default parameters
63. P-MAC - Pattern MAC
• Patterns are 0*1 strings with size 1-N
• Every node starts with 1 as pattern
• Number of 0’s grow exponentially up to a threshold and then linearly up to N-1
• TR = CW + RTS + CTS + DATA + ACK
• N = tradeoff between latency and energy
64. Patterns vs Schedules
Local
Pattern Bit
Packet to
Send
Receiver
Pattern Bit
Local
Schedule
1 1 1 1
1 1 0 1-
1 0 * 1-
0 1 1 1
0 1 0 0
0 0 * 0
65. P-MAC Evaluation
• Simulated results are better than SMAC
• Good for relatively stable traffic conditions
• Adaptation to changes on traffic might be
slow
• Loose time synchronization required
• Needs more testing and comparison with
other protocols besides S-MAC
66. Z-MAC - Zebra MAC
• Runs on top of B-MAC
• Combines TDMA and CSMA features
CSMA
Pros
Simple
Scalable
Cons
Collisions due to
hidden terminals
RTS/CTS is
overhead
TDMA
Pros
Naturally avoids
collisions
Cons
Complexity of
scheduling
Synchronization
needed
67. Z-MAC Initialization
• Neighborhood discovery through ping messages
containing known neighbors
• Two-hop neighborhood used as input for a
scheduling algorithm (DRAND)
• Running time and message complexity of DRAND is
O(), where is the two-hop neighborhood size
• The idea is to compensate the initialization energy
consumption during the protocol normal operation
68. Z-MAC Time Slot Assignment
2a1
Fi 2a
1
l2a
si ( for: l 0,1,2...)
69. Z-MAC Transmission Control
The Transmission Rule:
• If owner of slot
– Take a random backoff within To
– Run CCA and, if channel is clear, transmit
• Else
– Wait for To
– Take a random backoff within [To,Tno]
– Run CCA and, if channel is clear, transmit
70. Z-MAC HCL Mode
• Nodes can be in “High Contention Level” (HCL)
• A node is in HCL only if it recently received an
“Explicit Contention Notification” (ECN) from a two-
hop neighbor
• Nodes in HCL are not allowed to contend for the
channel on their two-hop neighbors’ time slots
• A node decides to send an ECN if it is losing too many
messages (application ACK’s) or based on noise
measured through CCA
71. Z-MAC Receiving Schedule
• B-MAC based
• Time slots should be large enough for
contention, CCA and one B-MAC packet
transmission
• Slot size choice, like in B-MAC, left to
application
72. Z-MAC Results
• Z-MAC performs better than B-MAC when load is high
• As expected, fairness increases with Z-MAC
• Complexity of the protocol can be a problem
73. Conclusions
• Between the protocols studied, B-MAC still
seems to be the best one for applications in
general
• Application developers seem not to use B-
MAC’s control interface
• Middleware service could make such
optimizations according to network status