MAC Protocols 10/6/2008. References. Medium Access Control (MAC)

Size: px
Start display at page:

Download "MAC Protocols 10/6/2008. References. Medium Access Control (MAC)"

Transcription

1 MAC Protocols AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE MAC LAYER PROTOCOLS FOR SENSOR NETWORKS AND THEIR BASIC CHARACTERISTICS References H. Karl and A. Willing. Protocols and Architectures for Wireless Sensor Networks. John Wiley & Sons, (General) C. Schurgers, V. Tsiatsis, S. Ganeriwal, and M. Srivastava. Optimizing Sensor Networks in the Energy-Latency-Density Design Space, in IEEE Trans. on Mobile Computing, Vol. 1, No. 1, pp , January-March (STEM) W. Ye, J. Heidemann, and D. Estrin. An Energy-Efficient MAC Protocol for Wireless Sensor Networks, in the Proc. of IEEE INFOCOMM, pp , June 2002.(S-MAC) E. H. Callaway,Jr. Wireless Sensor Networks: Architectures and Protocols, Auerbach Publications, Chapter 4, (The meditation device protocol) L. C. Zhong, R. Shah, C. Guo, and J. Rabaey. An Ultra-Low Power and Distributed Access Protocol for Broadband Wireless Sensor Networks, in the Proc. of IEEE Broadband d Wireless Summit, May (Wakeup k radio) ) A. Woo and D. E. Culler. A Transmission Control Scheme for Media Access in Sensor Networks, in Proc. of the 7 th Annual Int l Conf. on Mobile Computing and Networking (MobiCom), July (CSMA) S. Singh and C. S. Raghavendra. PAMAS-Power Aware Multi-Access Protocol with Signaling for Ad Hoc Networks, in ACM SIGCOMM Computer Communication Review, Vol. 28, Issue 3, pp. 5-26, July (PAMAS) W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energy-Efficient Communication Protocol for Wireless Microsensor Networks, in the Proc. of the 33 rd Hawaii Int l Conf. on System Sciences, Vol 2, 1o pp, January (LEACH) K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie. Protocols for Self-Organization of a Wireless Sensor Network, in IEEE Personal Communications, Vol. 7, issue 5, pp , October (SMACS) V. Rajendran, K. Obraczka, and J. J. Garcia-Luna-Aceves. Energy-Efficient Collusion-Free Medium Access Control for Wireless Sensor Networks. In the Proc. of the 1 st Int l Conf. on Embedded Networked Sensor Systems (SenSys), pp , November (TRAMA) LAN/MAN Standards Committee of the IEEE Computer Society. IEEE Standard for Part 15.4: Wireless Medium Access Control (MAC) and Physical (PHY) October (IEEE MAC) 2 Medium Access Control (MAC) Typical of other networks as well, the transmission medium must be shared in WSN. This is known as channel allocation or multiple access problem. The objective of a MAC protocol is to regulate access to the shared wireless medium such that t the performance requirements of the application are met. MAC protocols have been extensively studied in (wireless) voice and data communications. 3 1

2 MAC protocols: Issues 4 Nodes need to exchange some information for the right to access the communication channel at any given time. This requires the use of the communication channel itself (recursive use?)! Spatial distribution of the nodes further complicates the problem, as any information gathered by a node is at least as old as the time required for its propagation Two intertwined factors influence the aggregate behavior of a distributed MAC: the intelligence of the decision (to allow a node to transmit) made by the protocol the overhead involved MAC protocols: Performance metrics Delay the amount of time a data packet spends in the MAC layer Throughput the rate at which packets are serviced Robustness combination of reliability, availability, and dependability requirements Scalability the ability to meet the performance requirements regardless the size of the network Stability the ability to handle the traffic load over sustained periods of time Fairness allocation of the channel capacity evenly Energy efficiency paramount issue importance in WSNs 5 MAC protocols: Classification 6 MAC protocols Fixed assignment Demand assignment Random assignment FDMA centralized ALOHA TDMA CDMA distributed CSMA SDMA 2

3 MAC protocols: Classification2 Schedule based regulating participants: Who may use which resource at which time (TDMA) Which frequency band can be used in a given physical space (with a given code, CDMA) Schedule can be fixed or computed on demand Contention based Risk of colliding packets is deliberately taken Coordination overhead can be saved, resulting in overall improved efficiency Mechanisms to handle/reduce probability/impact of collisions required Usually randomization used 7 MAC protocols: Fixed assignment The available resources are allocated between the nodes; no competition FDMA used by radio systems to share the (radio) spectrum; requires frequency synchronization TDMA a digital technology that uses a single frequency channel CDMA spread spectrum based scheme that allows multiple nodes to transmit simultaneously SDMA spatial separation of the nodes is used to separate their transmissions 8 MAC protocols: Demand assignment To improve channel utilization by allocating the channel to contending nodes (near-)optimally Need a control mechanism to arbitrate access Centralized polling a master control devices queries each slave node in a predetermined order Distributed reservation and token Set a time slot for reservation messages Token holder can transmit 9 3

4 MAC protocols: Random assignment 10 Address the short comings of fixed (static) assignment schemes Originally developed for long radio links and satellite communications ALOHA pure, slotted CSMA CD, CA Carrier Sensing Contention Non-persistent CSMA, persistent CSMA, backoff Busy-tone, RTS/CTS Hidden/exposed terminal problem The hidden-terminal: Consider the following three nodes: A and B are in mutual range, and B and C are in mutual range. But A and C cannot hear each other, thus their packets may collide. The exposed-terminal: B transmits a packet to A, and C wants to transmit a packet to D, but it cannot, because it hears B s activity. 11 A B C D RTS/CTS handshake 12 A B C D RTS CTS Data Channel busy Channel busy Ack 4

5 RTS/CTS failure 13 A B C D RTS CTS RTS Data RTS CTS RTS/CTS failure2 14 A B C D RTS CTS RTS Data CTS Data MAC Protocols for WSNs The balance of requirements is different in WSNs. Transmission is costly; receiving often has the same cost as transmission; idling can be cheaper but also as expensive as receiving; sleeping is almost free, but Energy problems on the MAC layer: Collusion Useless receive costs at destination, i useless transmission i costs at sender Overhearing Receiving a packet addressed for someone else Sometimes good, though, when collecting information about the WSN Protocol overhead MAC related control packets, Idle listening Costly; useless in low network loads 15 5

6 Energy conserving 16 A number of different MAC protocols are proposed for wireless sensor networks based on their ability to conserve energy: Protocols that explicitly attack the idle listening problem Contention-based protocols are probabilistic as the nodes risk collusions. Thus, these protocols have collusion avoidance mechanisms Schedule-based protocols, where only one node gets an opportunity based on an allocated slot Idle listening: Low duty cycle protocols 17 Try to avoid spending much time in the idle state and to reduce the communication activities to a minimum. Periodic wakeup schemes Cycled receiver; sleep periodically to receive packets (needs knowledge of the listeners) Observations: Small duty cycle transmitter is in sleep mode mostly Small duty cycle traffic to a given node is concentrated in a small time window; significant competition under heavy loads Long sleep period significant per-hop latency Short sleep periods high startup costs Idle listening: STEM 18 Sparse topology and energy management (STEM) Does not cover all aspects of a MAC protocol but provides a solution for idle listening problem and to provide fast transition into the transfer state, if necessary. Targets networks with wait-and-report behavior topology in the name: as nodes enter and leave sleep mode, network topology changes. Key requirement: the network stays connected even if some nodes are sleeping Network states Monitor state Transfer state 6

7 Idle listening: STEM2 Two channels Wakeup time slots (wakeup periods of length T) Data for underlying MAC protocol Listen period of length T RX << T and a sleep period 19 Wakeup period Listen period Wakeup channel Sleep period Data channel Idle listening: STEM-B The transmitter issues beacons on the wakeup channel periodically without carrier sensing Beacon contains MACs for the sender and the receiver Receiver sends an ACK on the wakeup channel on the receipt of the beacon Both nodes switch transmitters and execute regular MAC protocol Other nodes receiving the beacon not destined to them, will continue sleeping Beacon is sent continuously for at least one full wakeup period 20 Idle listening: STEM-T Transmitter sends a busy tone (no address information) on the control channel for a long time to hit on the receivers listen period All neighbor nodes switch on their data channel Packet exchange will start; all not-involved nodes will go back to sleep 21 7

8 Idle listening: STEM: Discussion 22 In STEM-B beacon collusions cause the scheme to fall back to STEM-T; the transmitter transmits the beacons for the maximum time, then switches to the data channel and tries the conversation with the receiver A node entering into listen period remains silent Low load situations STEM-T is preferable over STEM-B (why?) Wakeup latency is related to wakeup time T STEM-B can achieve half the wakeup latency of STEM-T if no collusions occur on the wakeup channel (how?) STEM-T can have energy consumption advantages Idle listening: S-MAC Developed at UCLA, sensor-mac (S-MAC) protocol provides mechanisms to circumvent the key energy problems Adopts a similar wakeup scheme as STEM, but requires only a single channel Listen period can be used to receive and transmit Wakeup period 23 Listen period Sleep period For SYNCH For RTS For CTS Idle listening: S-MAC: Listen phases 24 SYNCH phase Node x accepts SYNCH packets (describing their schedule) from its neighbors Divided into time slots RTS phase x listens for RTS packets from neighboring nodes (RTS/CTS procedure is used to reduce collisions of data packets due to hidden node problem CTS phase Node x transmits a CTS packet if an RTS packet is received in the previous phase. After this, packet exchange continues (into x s sleep period) 8

9 Idle listening: S-MAC: the protocol 25 When competing for the medium, the nodes use RTS/CTS handshake (including the virtual carrier sense mechanism via NAV); NAV can also be used to avoid overhearing When broadcasting (e.g., SYNCH packets), the nodes use CSMA with backoff Neighbors agree on the same schedule (of time slots) and create virtual clusters Idle listening: S-MAC: Virtual clusters Node x listens for at least the globally known synchronization period. x receives a SYNCH packet from a neighbor Adopts the announced schedule Broadcasts is in one of the neighbors next listen period x picks a schedule and broadcasts it x receives another node s schedule during the broadcast packet s contention period; drops its own and follows the other x receives a new schedule after its own Some neighbors use his schedule transmits its SYNCH and data packets according to both schedules No neighbor share its schedule drops own and adopts the other x periodically listens for a whole synchronization period to relearn its neighbors 26 Idle listening: S-MAC: Virtual clusters2 A large multihop network is partitioned into islands of schedule synchronization Border nodes have to follow two or more schedules (more energy consumption!) Nodes spend much time in the sleep mode Pay the price in latency; per-hop latency equals to the sleep period! Adaptive-listening reduces the latency by half 27 9

10 Idle listening: S-MAC: Synchronized islands 28 A A A A A A C B E B B B B E E E E E E C C C C D D D D Time 28 Idle listening: S-MAC: Message passing 29 A message larger than a packet is meaningful to an application In-network processing requires aggregating node to receive a message completely But, on wireless media, it is advisable to break a long packet into smaller ones Solution: Fragmentation: A series of fragments is transmitted with a single RTS/CTS exchange between nodes A (sender) and B (receiver) B Acks each; Duration field (in all the packets) indicates the remaining time for the whole transaction Idle listening: S-MAC: Message passing2 30 The fragmentation scheme is similar to the one used in In , CTS and RTS reserves the medium for only the time of the first fragment, and any other frames does it for the next fragment S-MAC can be unfair at times, but fairness has a lesser weight T-MAC is a variation of S-Mac, where it adaptively shortens the listen period 10

11 Idle listening: Mediation device protocol Compatible with the P2P communication mode of the WPAN standard Each node go into sleep periodically and wakeup for short periods to receive packets from neighbors No global time, each node has its own schedule At wakeup, a node transmits a short query beacon with its node address; no packets? Go back to sleep Dynamic synchronization is used A meditation device 31 Idle listening: Wakeup radio 32 Ideally, a node is in receiving state when a packet is transmitted for it, and a node is in transmitting state when it has a packet to transmit. All other times, it should sleep no idle time! One proposed wakeup MAC protocol assumes the presence of several data channels (it basically extends CSMA into multi-channel CSMA) A separate, ultra low power radio is used Idle listening: Wakeup radio The algorithm 33 A node wishing to transmit will randomly pick up a channel. If busy, will continue selecting a channel until found one, else set a timer for each and backoff The node then transmits a wakeup signal over its wakeup radio channel to the receiver asking it to turn on its main radio During idle times, only the wakeup radio is turned on 11

12 Idle listening: Wakeup radio The algorithm2 Problems: No such radio exists Ranges of both radios much be identical 34 Shorter range for wakeup radio not all potential nodes can be woken up Wider range for wakeup radio potential hazard in addressing The wakeup radio has to be able to carry information higher complexity Contention-based: CSMA protocols CSMA protocols are contention-based, where neighbors try their luck to transmit their packets Woo and Culler consider a multihop network with a single or a few sinks with the same traffic pattern as STEM 35 Contention-based: CSMA The protocol 36 Idle C: A: numtrials = 0 C: busy & numtrials = Max A: failure Random Delay C: non or foreign CTS & numtrials = Max A: failure Backoff C: timeout A: Listen C: idle A: send RTS C: busy & numtrials < Max A: numtrials++; set timer Await CTS C: non or foreign CTS & numtrials < Max A: numtrials++; set timer C: no Ack & numtrials < Max A: numtrials++; set timer C: no Ack & numtrials = Max A: failure C: got CTS A: send data Await Ack C: got Ack A: success Idle 12

13 Contention-based: CSMA The protocol2 Energy saving measures the node s transceiver can sleep during the random delay in the backoff mode Have been investigated: No random delay 37 Random listening time vs constant listening time Fixed window backoff vs exponentially increasing backoff vs exponentially decreasing backoff vs no backoff Protocols with random delay, fixed listen time, and a backoff algorithm with sleeping radio transceiver give the best throughput and lowest aggregate energy consumption Contention-based: PAMAS 38 The Power Aware Multi-access with Signaling (PAMAS) is originally designed for ad hoc networks, detailed overhearing avoid mechanism no idle listening solution Combines busy tone with RTS/CTS handshaking Uses two channels: data and signaling Contention based: PAMAS The protocol 39 New RTS; Send CTS * No packet or noise Await packet 1 time unit Receive RTS; Send CTS * Idle Receive RTS; Send CTS * Packet to send; send RTS to destination if not transmitting End of transmission Await CTS Receive RTS; Send CTS * No CTS or Busy tone or unrelated RTS BEB Time expired and destination is not transmitting; Send RTS Packet is arriving; Transmit busy tone * if data channel is idle and No noise over signaling channel Receive packet Packet received Receive CTS Transmit packet Busy tone > 2*CTS length Receive other RTS; Transmit busy Tone. Ignore all CTSs received Ignore RTS/CTS transmissions 13

14 Contention-based: PAMAS To power off or... Conditions to power off: No packet to transmit and a neighbor is begins transmitting One neighbor is transmitting and another is receiving Two questions to answer: How long to power off? When a packet transmission begins in the neighborhood, sleep l When wakeup, if the data channel is busy, go back to sleep, but how long? Probe protocol Send a probe(l) message l is max packet length Does a binary search to determine when the last transmission ends What happens if a neighbor wishes to transmit when sleeping? Nothing important Good power savings Sparse network, light load 20-30% (high load 10%; longer contention) Dense network, light load 60-70% (high load 30-40%) 40 Schedule-based: LEACH The Low-energy Adaptive Clustering Hierarch (LEACH) assumes dense, homogeneous sensor network with energy constraint nodes and the base station is far away from the sensors themselves Nodes are partitioned into clusters, with a dedicated di d clusterhead node in each cluster (other nodes are member nodes) 41 Member node Clusterhead Schedule-based: LEACH2 Randomized (and dynamic) rotation of clusterheads Self election with a certain probability Self elected clusterheads broadcasts their status to others Nodes determine their clusterheads Once the cluster is formed, the clusterhead creates a schedule for its nodes (nodes turn off their radios during other slots) Local data fusion (data aggregation) to reduce energy dissipation and enhanced system lifetime Compress data is sent to the base station High energy operation, but only a few nodes operate 42 14

15 Schedule-based: LEACH3 The number of clusters is critical Fewer larger energy consumption (distance to the base is far) More more transmissions to the sink; larger energy consumption 5% of the nodes being clusterheads is optimal 7x-8x energy reduction compared to direct communication 43 Schedule-based: LEACH The algorithm Broken up into rounds; each round has two phases: Setup phase (Clusterhead) advertisement phase CSMA MAC protocol: cluster heads advertise, nodes select Schedule creation Based on the number of members, the clusterhead creates and broadcasts a TDMA schedule Steady-state phase Nodes transmit during their allocated transmission time (uses minimal energy, because of the clusterhead selection) Nodes can sleep until their time (and has data to transmit) Clusterhead receives data, aggregates them, and send to base station To reduce interference clusters use different CDMA codes (and informs the members) 44 Schedule-based: LEACH Rounds 45 Fixed-length round Setup phase Steady-state phase Self-election of clusterheads Time slot 1 Time slot 2 Time slot n Time slot 1 Advertisement phase Cluster setup phase Clusterheads compete with CSMA Members compete with CSMA Broadcast schedule 15

16 Schedule-based: SMACS Self-organizing Medium Access Control for Sensor Networks (SMACS) It is a protocol in a suite for organization, routing, management for MANETs to optimize for QoS It is an infrastructure-building protocol that forms a flat topology for sensor networks SMACS is a distributed protocol which enables a collection of nodes to discover neighbors and establish schedules for communicating with them without the need of a master node Neighbor discovery and channel assignment phases are combined 46 Schedule-based: SMACS Assumptions The available spectrum is subdivided into many channels (and many CDMA codes are available) Each node can tune to an arbitrary channel Most of the nodes are stationary and remain as such for a long time Each node divides its time locally into fixed-length superframes of T frame length Superframes are subdivided into timeslots A 47 F B D C Schedule-based: SMACS Self-organization Non Synchronous scheduled communications 48 Trans. SLOT D and A find each other T frame Recv. SLOT fx fx Node D T d fx fx Node A T a fy Node B B and C find each other T b fy Node C T c 16

17 Schedule-based: SMACS Node discovery 49 fy Node B B and C find each other T b fy Node C T c Node B Initial listening time Type 1 Type 2 Type 3 Type 4 Node C Type 1 Type 2 Type 3 Node G (not shown) Schedule-based: SMACS Nodes finding 50 Nodes wake up at random times, and listen to the channel for a random amount of time A node (C) will transmit an invitation (TYPE 1) by the end of its initial listen time if not heard the same from others Nodes hearing the invitation (B and G, not shown), broadcast a response (TYPE 2) during the interval following the reception of TYPE 1 at a random time If responses don t collide and heard by C, C must chose only one respondent (first) Node C sends TYPE 3 immediately after the interval following TYPE 1 to notify all respondents of the chosen one Node G was not chose, it turns off its transmitter for a while and starts the search again If C is already attached, it ll transmit its schedule info along with the time its next superframe will start in the body of TYPE 3 Node B compares the schedules and time offsets and arrives at a set of two free time intervals as the slots assigned to the link between B and C B sends this information with the randomly selected frequency band to node C in the body of TYPE 4 After a pair of short test messages, the link is added to the nodes schedules permanently Schedule-based: SMACS Startup messages TYPE 1 A short invitation containing a node s ID and number of attached neighbors (send by inviter) TYPE 2 Response to TYPE 1 by an invitee; gives the inviter and invitee s IDs and invitee s attached state TYPE 3 Response to TYPE 2; indicating which invitee is chosen. Depending on the node s attached state contains: Inviter not attached: none Both attached; inviter s schedule and frame epoch Invitee not attached, inviter attached: proposed channel for the link TYPE 4 Response to TYPE 3; contains None attached: channel determined by the invitee Invitee not attached, inviter attached: none Invitee attached, inviter not attached: channel determined by the invitee Both attached: channel determined from own and inviter s schedule information 51 17

18 Schedule-based: TRAMA 52 The Traffic-Adaptive Medium Access Protocol (TRAMA) reduces energy consumption by providing collision-free transmissions and low-power idle state Assumes single time-slotted channel and uses a distributed election scheme to determine which node can transmit at a particular slot Divides time into: Random access: signaling slots Scheduled access: transmission slots Consists of: Neighbor protocol (NP) Schedule exchange protocol (SEP) Adaptive election algorithm (AEA) NP Schedule-based: TRAMA2 53 Propagates one-hop neighbor information among neighboring nodes during random access period (contention based channel acquisition and signaling) SEP Exchange traffic-based information, or schedules (information on traffic originating from a node), with neighbors AEA Selects transmitters and receivers to achieve collision-free transmission using the information from NP and SEP Random transmission collisions Transmitters without receivers energy waste Schedule-based: TRAMA Packet contents 54 Type Source address Destination address DelNum AddNum Deleted Node IDs Added Node IDs Signal header Source Type address Data header Destination address Timeout NumSlots Bitmap Source address Schedule packet Timeout NumSlots Bitmaps Width Bitmaps N=4; 4 one-hop neighbors Reserved Changeover Slot Giveup Schedule announcement 18

19 Schedule-based: TRAMA NP 55 TRAMA starts in random access mode where each node selects a slot randomly Nodes can only join the network during the random access periods (occur more often in dynamic networks) NP gathers neighborhood information by exchanging small signaling packets, carrying incremental neighborhood updates If no updates, the signaling packets serve as keep-alive beacons A node times out its neighbor if it does not hear from it for a certain period of time The updates are transmitted to ensure 99% probability of success Schedule-based: TRAMA SEP 56 Establishes and maintains traffic-based schedule information required by the transmitter (e.g. slot re-use) and the receiver (i.e. sleep state switching) A node s schedule captures a window of traffic to be transmitted by the node; schedules have timeouts Nodes announce their schedule via schedule packets The intended receiver information is conveyed using a bitmap A schedule summary is also send during data transmission to minimize effects of packet loss in schedule dissemination Nodes maintain schedule information for their one-hop neighbors, which is consulted when needed An unused slot is called Changeover slot; all nodes listen during the Changeover slot of the transmitter to synchronize their schedule Schedule-based: TRAMA AEA At any given time slot t during the scheduled access period, the state of a node u is determined based on its two-hop neighborhood information and the schedules of it s one-hop neighbors; possible states are: transmit (TX), receive (RX), or sleep (SL) Node u is in TX state if (1) u has the highest priority among its contending set and (2) u has data to send Node u is in RX state when it is the intended receiver of the current transmitter Otherwise the node can be turned off to SL state 57 19

20 Schedule-based: TRAMA Winners 58 The state of a node u depends on the Absolute Winner and the schedules of its one-hop neighbors From node u s perspective, the Absolute Winner at a time slot t can be: Node u itself Node v that lies in the two-hop neighborhood of node u in which case the Alternate Winner atx(u) is to be considered if hidden from node v Node w that lies in node u s one-hop neighborhood The Absolute Winner is the assumed transmitter unless the Alternative Winner is hidden from the Absolute Winner and it belongs to the Possible Transmitter Set The IEEE MAC protocol 59 The standard covers both the physical and the MAC layers of a low-rate Wireless Personal Area Network (WPAN) The (asymmetric) MAC protocol combines both contention-based and schedule-based schemes Two types of nodes: Full Function Device (FFD); it can be a PAN coordinator, a simple coordinator, and a device A Reduced Function Device (RFD); can operate as only a device A device must be associated with a FFD to form a star network. The coordinator Manages a collection of associated devices Deals with device addressing Assigns short addresses to its devices Regularly transmits frame beacon packets Announces the PAN identifier, list of outstanding frames, etc. Exchanges data packets with devices and with peer coordinators 60 20

21 The superframe The coordinator operating in beacon mode organizes channel access and data transmission with the help of superframe structure The lengths of the active and inactive periods as well as the length of a single time slot and the usage of GTS slots are configurable 61 Ati Active period id Inactive period Beacon Contention access period (CAP) Guaranteed time slots (GTS) GTS management The coordinator allocates GTS to devices when receive requests packets (for a transmit or a receive slot) during the CAP 62 Answers the request packets in two steps: An immediate acknowledgement After receiving the acknowledgement, the device must track the coordinator s beacons for a while to see when the required time slots are allocated. The device can use the slots as long as they are announced in the GTS descriptor Allocates GTS to a node if has sufficient resources and, until resources become scarce and the GTS is explicitly deallocated Devices can renegotiate if a GTS allocation request fails Data transfer 63 If a device has an allocated transmit GTS, it wakes up just before the slot and sends its packet immediately This is only possible if the allocated slots are large enough to hold the data, as well as the coordinator acknowledgment and appropriate p InterFrame Spaces (IFSs) Otherwise, the data is sent during the CAP using a slotted CSMA protocol The coordinator always sends an acknowledgement packet When the coordinator is unable to use a receive GTS (of the device), a simple handshake protocol is executed and the coordinator transmits the data 21

22 Slotted CSMA-CA protocol 64 NB=0; CW=2; BE=macMinBE N Await next backoff period boundary CW--; CW=0? Y Success Transmit data Random delay Failure Y Y CCA on backoff period boundary Channel idle? N NB++; CW=2; BE=min(BE+1,a MaxBE) NB>Max CSMA Backoffs? N Nonbeaconed mode 65 The coordinator does not send beacon frames, nor is there any GTS mechanism (time synchronization is disabled) All packets are transmitted using a unslotted CSMA-CA protocol Coordinators must always be on, but devices can follow their own sleep schedule and wake up when To send a data/control packet to the coordinator To fetch a packet destined to self from the coordinator using the data request/acknowledgement/data/acknowledgement handshake Data request packet is sent through unslotted CSMA-CA mechanism (device must stay awake for a certain period of time) IEEE and Bluetooth Given a number of wireless MAC protocols particularly IEEE and Bluetooth), why not use them? Bluetooth is designed as a WPAN with one major application Connection of devices to a PC It is already been tried for a wireless sensor network application Drawbacks: Constantly need a master polling its slaves Limited number of active slaves (8) per piconet IEEE family of protocols have several physical layers to share a single MAC protocol Drawbacks: A node x must constantly be in listen mode since another node y may attempt transmitting to x at the same time Nodes need to overhear RTS/CTS to adjust their NAVs properly Tailored for higher bit rates It is a single-hop protocol for both infrastructure and ad hoc scenarios 66 22

23 Summary 67 Idle Over Collusion Flat/ # of listening hearing Protocol Overhead Clustered Channels Avoidance STEM Both 2 Periodic sleep STEM-B Depends on MAC wakeup beacons S-MAC Flat 1 Periodic sleep NAV RTS/CTS RTS/CTS; SYNC; Mediation Flat 1 Periodic sleep implicit No Mediator device service; Wakeup radio Flat 2 Wakeup signal Wakeup signal Multichannel Wakeup radio CSMA CSMA Flat Sleep RTS/CTS RTS/CTS PAMAS Flat Yes RTS/CTS; busy tone Signaling channel LEACH Rotating clusters 1 TDMA TDMA TDMA Cluster formation; SMACS Flat Many TDMA TDMA TDMA Channel setup; TRAMA Flat 1 Scheduling Scheduling Scheduling NP; SEP 23

CSC8223 Wireless Sensor Networks. Chapter 5 Medium Access Control Protocols

CSC8223 Wireless Sensor Networks. Chapter 5 Medium Access Control Protocols CSC8223 Wireless Sensor Networks Chapter 5 Medium Access Control Protocols Goals of this chapter Controlling when to send a packet and when to listen for a packet are perhaps the two most important operations

More information

Advanced Networking Technologies

Advanced Networking Technologies Advanced Networking Technologies Chapter 4 Medium Access Control Protocols (Acknowledgement: These slides have been prepared by Prof. Dr. Holger Karl) Advanced Networking (SS 16): 04 Medium Access Control

More information

Wireless Sensor Networks 8th Lecture

Wireless Sensor Networks 8th Lecture Wireless Sensor Networks 8th Lecture 21.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Media Access Control (MAC) Controlling when to send a packet and when to listen for a packet

More information

Ad hoc and Sensor Networks Chapter 5: Medium access control protocols

Ad hoc and Sensor Networks Chapter 5: Medium access control protocols Ad hoc and Sensor Networks Chapter 5: Medium access control protocols Holger Karl, Andreas Willig, "Protocols and Architectures for Wireless Sensor Networks," Wiley 2005 Goals of this chapter Controlling

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

Principles of Wireless Sensor Networks. Medium Access Control and IEEE http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 7 Stockholm, November 8, 2011 Medium Access Control and IEEE 802.15.4 Royal Institute of Technology - KTH Stockholm, Sweden e-mail:

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 4 1 Announcements Project proposals. Due April 17 th. Submit by e-mail to katia@soe.ucsc.edu.

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

EL2745 Principles of Wireless Sensor Networks

EL2745 Principles of Wireless Sensor Networks EL2745 Principles of Wireless Sensor Networks www.kth.se/student/program-kurser/kurshemsidor/kurshemsidor/control/el2745 Lecture 5 Stockholm, February 2, 2012 Carlo Fischione Royal Institute of Technology

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

CS 410/510 Sensor Networks Portland State University

CS 410/510 Sensor Networks Portland State University CS 410/510 Sensor Networks Portland State University Lecture 7 Energy Conservation and Harvesting 2/9/2009 Nirupama Bulusu 1 Source Acknowledgements Wei Ye and John Heidemann USC Information Sciences Institute

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 5 January 31, 2013 Carlo Fischione Associate Professor of Sensor Networks e-mail: carlofi@kth.se http://www.ee.kth.se/~carlofi/

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

UNIT IV. Data link layer protocols. Prof.Prasad S.Halgaonkar

UNIT IV. Data link layer protocols. Prof.Prasad S.Halgaonkar UNIT IV Data link layer protocols Link Layer Frame synchronization. Data are sent in blocks called frames. The beginning and end of each frame must be recognized. Flow control. The sending station must

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider Chapter 5 IEEE 802.15.4 5.1 Introduction Wireless Sensor Network(WSN) is resource constrained network developed specially targeting applications having unattended network for long time. Such a network

More information

Embedded Internet and the Internet of Things WS 12/13

Embedded Internet and the Internet of Things WS 12/13 Embedded Internet and the Internet of Things WS 12/13 4. MAC Protocols Prof. Dr. Mesut Güneş Distributed, embedded Systems (DES) Institute of Computer Science Freie Universität Berlin Prof. Dr. Mesut Güneş

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks 1 Ch. Steup / J. Kaiser, IVS-EOS Ubiquitous Sensing 2 Ch. Steup / J. Kaiser, IVS-EOS IEEE 802.x Wireless Communication 3 Ch. Steup / J. Kaiser, IVS-EOS Wireless Technology Comparision

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

MAC Essentials for Wireless Sensor Networks

MAC Essentials for Wireless Sensor Networks MAC Essentials for Wireless Sensor Networks Abdelmalik Bachir, Mischa Dohler, Senior Member, IEEE, Thomas Watteyne, Member, IEEE, and Kin K. Leung, Fellow, IEEE Medium access control Part of the link layer

More information

Medium Access Control in Wireless Networks

Medium Access Control in Wireless Networks Medium Access Control in Wireless Networks Prof. Congduc Pham http://www.univ-pau.fr/~cpham Université de Pau, France MAC layer Routing protocols Medium Acces Control IEEE 802.X MAC GSM (2G) Channels Downlink

More information

Embedded Internet and the Internet of Things WS 12/13

Embedded Internet and the Internet of Things WS 12/13 Embedded Internet and the Internet of Things WS 12/13 4. MAC Protocols Prof. Dr. Mesut Güneş Distributed, embedded Systems (DES) Institute of Computer Science Freie Universität Berlin Prof. Dr. Mesut Güneş

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS Ge Ma and Dongyu Qiu Department of Electrical and Computer Engineering Concordia University, Montreal, QC, Canada tina0702@gmail.com,

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

AMAC: Traffic-Adaptive Sensor Network MAC Protocol through Variable Duty-Cycle Operations

AMAC: Traffic-Adaptive Sensor Network MAC Protocol through Variable Duty-Cycle Operations AMAC: Traffic-Adaptive Sensor Network MAC Protocol through Variable Duty-Cycle Operations Sang Hoon Lee, Joon Ho Park, and Lynn Choi Department of Electronics and Computer Engineering Korea University

More information

Reducing Inter-cluster TDMA Interference by Adaptive MAC Allocation in Sensor Networks

Reducing Inter-cluster TDMA Interference by Adaptive MAC Allocation in Sensor Networks Reducing Inter-cluster TDMA Interference by Adaptive MAC Allocation in Sensor Networks Abstract Tao Wu and Subir Biswas 1 Dept. of Electrical and Computer Engineering, Michigan State University wutao2@egr.msu.edu,

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Sensor Network Protocols

Sensor Network Protocols EE360: Lecture 15 Outline Sensor Network Protocols Announcements 2nd paper summary due March 7 Reschedule Wed lecture: 11-12:15? 12-1:15? 5-6:15? Project poster session March 15 5:30pm? Next HW posted

More information

Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol ARTICLE International Journal of Engineering Business Management Special Issue on Radio Frequency Identification and Wireless Sensor Networks Editor: Cristina Turcu Power Saving MAC Protocols for WSNs

More information

Presented by: Murad Kaplan

Presented by: Murad Kaplan Presented by: Murad Kaplan Introduction. Design of SCP-MAC. Lower Bound of Energy Performance with Periodic Traffic. Protocol Implementation. Experimental Evaluation. Related Work. 2 Energy is a critical

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

WIRELESS sensor networking is an emerging technology

WIRELESS sensor networking is an emerging technology USC/ISI TECHNICAL REPORT ISI-TR-567, JANUARY 2003 1 Medium Access Control with Coordinated, Adaptive Sleeping for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin Abstract This paper proposes

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS

AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS International Journal on Intelligent Electronic Systems, Vol.3, No.2, July 2009 7 Abstract AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS Lakshmanan M., Noor Mohammed V. 1 E-mail

More information

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1 Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types

More information

Reservation Packet Medium Access Control for Wireless Sensor Networks

Reservation Packet Medium Access Control for Wireless Sensor Networks Reservation Packet Medium Access Control for Wireless Sensor Networks Hengguang Li and Paul D Mitchell Abstract - This paper introduces the Reservation Packet Medium Access Control (RP-MAC) protocol for

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K.

COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K. COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K. Nisha Menon 2 1 Mar Baselios Christian College of Engineering and Technology,

More information

Medium Access Control in Wireless Sensor Networks

Medium Access Control in Wireless Sensor Networks Medium Access Control in Wireless Sensor Networks Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 1 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired)

More information

Wireless Sensor Networks 7th Lecture

Wireless Sensor Networks 7th Lecture Wireless Sensor Networks 7th Lecture 15.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Medium Access Control (MAC) Controlling when to send a packet and when to listen for a packet

More information

Medium Access Control in Wireless IoT. Davide Quaglia, Damiano Carra

Medium Access Control in Wireless IoT. Davide Quaglia, Damiano Carra Medium Access Control in Wireless IoT Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired) Wireless Assumptions

More information

Energy-Efficient, Collision-Free Medium Access Control for Wireless Sensor Networks

Energy-Efficient, Collision-Free Medium Access Control for Wireless Sensor Networks Energy-Efficient, Collision-Free Medium Access Control for Wireless Sensor Networks Venkatesh Rajendran, Katia Obraczka, J.J. Garcia-Luna-Aceves Department of Computer Engineering Jack Baskin School of

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network

Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 3 March 2015, Page No. 10652-10656 Performance and Comparison of Energy Efficient MAC Protocol in Wireless

More information

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists 3,900 116,000 120M Open access books available International authors and editors Downloads Our

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Analysis of S-MAC/T-MAC Protocols for Wireless Sensor Networks

Analysis of S-MAC/T-MAC Protocols for Wireless Sensor Networks Analysis of S-MAC/T-MAC Protocols for Wireless Sensor Networks WOOCHUL LEE*, YUTAE LEE*, SOONGHEE LEE**, DONGIL KIM* *Department of Information and Communications Engineering Dong-Eui University, 996 Eomgwan-no,

More information

Chapter 3: Medium Access Control in Wireless Sensor Networks

Chapter 3: Medium Access Control in Wireless Sensor Networks 1 Chapter 3: Medium Access Control in Wireless Sensor Networks 3.1 Introduction A wireless sensor network (WSN) is a collection of different sensor nodes used to sense the environment for applications

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

MAC protocols. Lecturer: Dmitri A. Moltchanov

MAC protocols. Lecturer: Dmitri A. Moltchanov MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based

More information

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

More information

Medium Access Control in Wireless Sensor Networks

Medium Access Control in Wireless Sensor Networks Medium Access Control in Wireless Sensor Networks Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 1 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired)

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Computational Model for Energy Aware TDMA-based MAC Protocol for Wireless Sensor Network System

Computational Model for Energy Aware TDMA-based MAC Protocol for Wireless Sensor Network System 6th WSEAS International Conference on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, Dec 29-31, 2007 489 Computational Model for Energy Aware TDMA-based MAC Protocol for Wireless

More information

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path

More information

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Research Manuscript Title A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Jaichitra.I, Aishwarya.K, P.G Student, Asst.Professor, CSE Department, Arulmigu Meenakshi Amman College of Engineering,

More information

Summary of Energy-Efficient Communication Protocol for Wireless Microsensor Networks

Summary of Energy-Efficient Communication Protocol for Wireless Microsensor Networks Summary of Energy-Efficient Communication Protocol for Wireless Microsensor Networks Juhana Yrjölä, Tik 58673B, jayrjola@cc.hut.fi 13th March 2005 Abstract Conventional routing protocols may not be optimal

More information

Sensor Deployment, Self- Organization, And Localization. Model of Sensor Nodes. Model of Sensor Nodes. WiSe

Sensor Deployment, Self- Organization, And Localization. Model of Sensor Nodes. Model of Sensor Nodes. WiSe Sensor Deployment, Self- Organization, And Localization Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley, 2007 5/20/2008 WiSeLab@WMU; www.cs.wmich.edu/wise

More information

Aloha and slotted aloha

Aloha and slotted aloha CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN

More information

Medium Access Control Sublayer Chapter 4

Medium Access Control Sublayer Chapter 4 Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 & February

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Outline. MAC (Medium Access Control) General MAC Requirements. Typical MAC protocols. Typical MAC protocols

Outline. MAC (Medium Access Control) General MAC Requirements. Typical MAC protocols. Typical MAC protocols Outline Medium ccess ontrol With oordinated daptive Sleeping for Wireless Sensor Networks Presented by: rik rooks Introduction to M S-M Overview S-M Evaluation ritique omparison to MW Washington University

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

Networked Embedded Systems: PHY and MAC

Networked Embedded Systems: PHY and MAC Networked Embedded Systems: PHY and MAC Prof. António Grilo Instituto Superior Técnico (IST), Lisboa, Portugal Overview Principal options and difficulties Contention-based protocols Schedule-based protocols

More information

Medium Access Control Protocols for Wireless Sensor Networks: Design Space, Challenges, and Future Directions

Medium Access Control Protocols for Wireless Sensor Networks: Design Space, Challenges, and Future Directions Medium Access Control Protocols for Wireless Sensor Networks: Design Space, Challenges, and Future Directions Pardeep Kumar and Mesut Güneş Institute of Computer Science Freie Universität Berlin, Germany

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

Energy Efficient MAC Protocols Design for Wireless Sensor Networks

Energy Efficient MAC Protocols Design for Wireless Sensor Networks Energy Efficient MAC Protocols Design for Wireless Sensor Networks Francesco Chiti*, Michele Ciabatti*, Giovanni Collodi, Davide Di Palma*, Romano Fantacci *, Antonio Manes *Dipartimento di Elettronica

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN: MAC Power Enhancement Using Overlapped Carrier Sense Multiple Access Chethan B.K 1, Vikhyath K.B 2 and Dr. M Siddappa 3 1 Department of Information Science & Engineering, Sri Siddhartha Institute of Technology,

More information

EX-SMAC: An Adaptive Low Latency Energy Efficient MAC Protocol

EX-SMAC: An Adaptive Low Latency Energy Efficient MAC Protocol EX-SMAC: An Adaptive Low Latency Energy Efficient MAC Protocol Chinmaya Ku. Mishra B.M.Acharya Kaberi Das Partha Sarathi Pati Abstract - In wireless sensor network the efficient use of energy leads to

More information

Towards a classification of energy aware MAC protocols for wireless sensor networks

Towards a classification of energy aware MAC protocols for wireless sensor networks WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2009; 9:1572 1607 Published online 4 February 2009 in Wiley InterScience (www.interscience.wiley.com).743 Towards a classification

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Networking Sensors, I

Networking Sensors, I Networking Sensors, I Sensing Networking Leonidas Guibas Stanford University Computation CS428 Networking Sensors Networking is a crucial capability for sensor networks -- networking allows: Placement

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information