UNIT IV. Data link layer protocols. Prof.Prasad S.Halgaonkar

Size: px
Start display at page:

Download "UNIT IV. Data link layer protocols. Prof.Prasad S.Halgaonkar"

Transcription

1 UNIT IV Data link layer protocols

2 Link Layer Frame synchronization. Data are sent in blocks called frames. The beginning and end of each frame must be recognized. Flow control. The sending station must not send frames at a rate faster then the receiving station can absorb them. Error control. Any bit errors introduced by the transmission system must be checked & corrected. Addressing. On a multipoint line, such as a LAN, the identity of the two stations involved in a transmission must be specified. Link management. The initiation, maintenance, and termination of a data exchange requires a fair amount of coordination and cooperation among stations.

3 MAC Layer Low duty cycle protocols and wakeup concepts

4 Generality on protocol energy assessment Energy consumption mainly due to the transceiver activity; Protocol energy assessment based on transceiver states: Transmit time; Receive time; Idle time (Sleeping time in sensor-nets); Switching time (USUALLY NOT ASSESSED); Switching energy negligible in ad-hoc wireless network protocol assessment (e.g. WiFi);

5 Switching in standard wireless networks Is defined as the transition time that elapses between the end of a transceiver state and the beginning of the following one; Possible switching states consist of: RX/TX and TX/RX TX/Sleep and Sleep/TX RX/Sleep and Sleep/RX State transition is fast little amount of energy is consumed. Switching energy is much smaller than total energy spent.

6 Sensor network characteristics Energy consumption: primary objective The wake-up concept Very low duty cycle (even less than 5%) Small packets smaller than in ad-hoc networks (e.g. temperature data is few bytes) Low data traffic per node Can we consider switching energy still negligible for low duty cycle sensor networks?

7 Saving Energy Various protocols have been implemented to solve the problem of energy in Sensor networks CSMA- Periodic Listen and Sleep; Contention during listening Low-Power Listening (LPL)- Asynchronous Listening Scheduled Listening (S-MAC)- Maintaining Synchronization

8 Low-Power Listening (LPL) Reference:

9 Scheduled Listening Reference:

10 Scheduled Listening and LPL Scheduled listening Advantage efficient transmission Disadvantages- Synchronization overhead Listen interval is too long in existing protocols Low-Power Listening Advantage minimizes listen cost when no traffic Disadvantage high costs on transmission

11 Contention-based protocols MACA (Multiple Access Collision Avoidance) S-MAC (Sensor Multiple Access Control), T-MAC (Timeout-MAC) Preamble sampling, B-MAC (Berkeley MAC) PAMAS (power aware multi-access protocol with signaling)

12 Distributed, contention-based MAC Basic ideas for a distributed MAC ALOHA no good in most cases Listen before talk (Carrier Sense Multiple Access, CSMA) better, but suffers from sender not knowing what is going on at receiver, might destroy packets despite first listening for a Receiver. Additionally needs some possibility to inform possible senders in its vicinity about impending transmission (to shut them up for this duration) Hidden terminal scenario: A B C D

13 Main options to shut up senders Receiver informs potential interferers while a reception is on-going By sending out a signal indicating just that Problem: Cannot use same channel on which actual reception takes place! Use separate channel for signaling Busy tone protocol Receiver informs potential interferers before a reception is on-going Can use same channel Receiver itself needs to be informed, by sender, about impending transmission Potential interferers need to be aware of such information, need to store it

14 Receiver informs interferers before transmission MACA Sender B asks receiver C whether C is able to receive a transmission Request to Send (RTS) Receiver C agrees, sends out a Clear to Send (CTS) Potential interferers overhear either RTS or CTS and know about impending transmission and for how long it will last Store this information in a Network Allocation Vector B sends, C acks! MACA protocol (used e.g. in IEEE ) NAV indicates busy medium A B C D RTS Data CTS Ack NAV indicates busy medium

15 RTS/CTS RTS/CTS improves performance, but do not solve hidden/exposed terminal problems Example problem cases: A B C D A B C D RTS RTS CTS RTS CTS RTS Data RTS Data CTS CTS Data Ack

16 MACA Problem: Idle listening Need to sense carrier for RTS or CTS packets In some form shared by many CSMA variants; e.g. not busy tones Simple sleeping will break the protocol IEEE solution: ATIM windows & sleeping Basic idea: Nodes that have data buffered for receivers send traffic indicators at pre-arranged points in time Receivers need to wake up at these points, but can sleep otherwise Parameters to adjust in MACA Random delays how long to wait between listen/transmission attempts? Number of RTS/CTS/ACK re-trials?

17 Sensor-MAC (S-MAC) MACA s idle listening is particularly unsuitable if average data rate is low Most of the time, nothing happens Idea: Switch nodes off, ensure that neighboring nodes turn on simultaneously to allow packet exchange (rendez-vous) Only in these active periods, packet exchanges happen Need to also exchange wakeup schedule between neighbors When awake, essentially perform RTS/CTS Use SYNCH, RTS, CTS phases Wakeup period Sleep period Active period For SYNCH For RTS For CTS

18 S-MAC synchronized islands Nodes try to pick up schedule synchronization from neighboring nodes If no neighbor found, nodes pick some schedule to start with If additional nodes join, some node might learn about two different schedules from different nodes Synchronized islands To bridge this gap, it has to follow both schemes A A A A A A B B B B B E E E E E E E C C C C C D D D D Time

19 Timeout-MAC (T-MAC) In S-MAC, active period is of constant length What if no traffic actually happens? Nodes stay awake needlessly long Idea: Prematurely go back to sleep mode when no traffic has happened for a certain time (=timeout)! T- MAC Adaptive duty cycle! One ensuing problem: Early sleeping C wants to send to D, but is hindered by transmission A! B Two solutions exist! A B C D CTS May not send Timeout, go back to sleep as nothing happened

20 Solutions for early sleeping Future request-to-send (FRTS) Taking priority on full buffers

21 Future-Request-To-Send (FRTS) The idea is to let other node know that we still have a message for it, but are ourselves prohibited from using the medium. The FRTS packet contains the length of time for which communication is blocked. The node that receives the FRTS packet knows that it will be the future target of an RTS packet and must be awake by that time. When C overhears CTS packets coming from node B it will send FRTS packet to inform node D to wakeup when A s transmission to B is finished.

22 To avoid collision at B between data packet from A and FRTS packet from C, A transmits data-send (DS) packet of size equal to FRTS packet. DS has no useful info. After sending DS packet, A transmits its data packet to B. FRTS may result in more energy loss during high traffic.

23 Taking priority on full buffers This means that when a node receives an RTS packet destined for it, it immediately sends its own RTS packet to another node, instead of replying with a CTS like normal. It has two effects. First, the node has an even higher chance of transmitting its own message, since it effectively wins the medium upon hearing a competing RTS; node C may transmit to node D after losing contention to node B.

24 Secondly, the full-buffer priority scheme introduces a limited form of flow control into the network, which is advantageous in a nodes-tosink communication pattern; node B is prevented from sending until node C has enough buffer space Advantages: Probability of early sleeping problem is reduced. The scheme introduces limited flow control in the network. T-MAC uses a threshold: a node may only use this scheme when it has lost contention at least twice.

25 Preamble Sampling So far: Periodic sleeping supported by some means to synchronize wake up of nodes to ensure rendez-vous between sender and receiver Alternative option: Don t try to explicitly synchronize nodes Have receiver sleep and only periodically sample the channel In preamble sampling, nodes save energy by keeping their radios off most of the time to reduce idle listening. To receive frames, nodes periodically wake up for a short time to sample the channel to check whether there is an ongoing transmission on the channel.

26 A transmission is detected when a node finds that a preamble is being transmitted, in which case it keeps its radio on to receive the data frame that is sent just after the preamble. The preamble is used to indicate that a data frame will be transmitted and is long enough to make sure that all potential receivers wake up at least once during its transmission Use long preambles to ensure that receiver stays awake to catch actual packet Example: WiseMAC Start transmission: Long preamble Actual packet Check channel Check channel Check channel Check channel Stay awake!

27 B-MAC Combines several of the above discussed ideas Takes care to provide practically relevant solutions Clear Channel Assessment Adapts to noise floor by sampling channel when it is assumed to be free Samples are exponentially averaged, result used in gain control For actual assessment when sending a packet, look at five channel samples channel is free if even a single one of them is significantly below noise Optional: random backoff if channel is found busy Optional: Immediate link layer acknowledgements for received packets

28 B-MAC II Low Power Listening (= preamble sampling) Uses the clear channel assessment techniques to decide whether there is a packet arriving when node wakes up Timeout puts node back to sleep if no packet arrived B-MAC does not have Synchronization RTS/CTS Results in simpler, leaner implementation Clean and simple interface Currently: Often considered as the default WSN MAC protocol

29 Power Aware Multiaccess with Signaling PAMAS Idea: combine busy tone with RTS/CTS Results in detailed overhearing avoidance, does not address idle listening Uses separate data and control channels Procedure Node A transmits RTS on control channel, does not sense channel Node B receives RTS, sends CTS on control channel if it can receive and does not know about ongoing transmissions B sends busy tone as it starts to receive data Control channel Data channel RTS A! B CTS B! A Busy tone sent by B Data A! B Time

30 PAMAS Already ongoing transmission Suppose a node C in vicinity of A is already receiving a packet when A initiates RTS Procedure A sends RTS to B C is sending busy tone (as it receives data) C A CTS and busy tone collide, A receives no CTS, does not send data? B Control channel Data channel Busy tone by C RTS A! B CTS B! A No data! Time Similarly: Ongoing transmission near B destroys RTS by busy tone

31 Schedule-based protocols LEACH (Low Energy Adaptive Clustering Hierarchy) SMACS TRAMA (Traffic Adaptive Medium Access)

32 Low-Energy Adaptive Clustering Hierarchy (LEACH) Given: dense network of nodes, reporting to a central sink, each node can reach sink directly Idea: Group nodes into clusters, controlled by clusterhead About 5% of nodes become clusterhead (depends on scenario) Role of clusterhead is rotated to share the burden Clusterheads advertise themselves, ordinary nodes join CH with strongest signal Clusterheads organize CDMA code for all member transmissions TDMA schedule to be used within a cluster In steady state operation CHs collect & aggregate data from all cluster members Report aggregated data to sink using CDMA

33 LEACH rounds Fixed-length round.. Setup phase Steady-state phase.... Time slot 1 Time slot 2.. Time slot n Time slot 1.. Advertisement phase Cluster setup phase Broadcast schedule Self-election of clusterheads Clusterheads compete with CSMA Members compete with CSMA

34 SMACS Given: many radio channels, superframes of known length (not necessarily in phase, but still time synchronization required!) Goal: set up directional links between neighboring nodes Link: radio channel + time slot at both sender and receiver Free of collisions at receiver Channel picked randomly, slot is searched greedily until a collisionfree slot is found Receivers sleep and only wake up in their assigned time slots, once per superframe In effect: a local construction of a schedule

35 SMACS link setup Case 1: Node X, Y both so far unconnected Node X sends invitation message Node Y answers, telling X that is unconnected to any other node Node X tells Y to pick slot/frequency for the link Node Y sends back the link specification Case 2: X has some neighbors, Y not Node X will construct link specification and instruct Y to use it (since Y is unattached) Case 3: X no neighbors, Y has some Y picks link specification Case 4: both nodes already have links Nodes exchange their schedules and pick free slots/frequencies in mutual agreement X Type1 (X, unconnected) Type2(X, Y, unconnected) Type3 (Y, --) Type4(LinkSpec) Message exchanges protected by randomized backoff Y

36 TRAMA (Traffic Adaptive Medium Access) Nodes are synchronized Time divided into cycles, divided into Random access periods Scheduled access periods Nodes exchange neighborhood information Learning about their two-hop neighborhood Using neighborhood exchange protocol: In random access period, send small, incremental neighborhood update information in randomly selected time slots Nodes exchange schedules Using schedule exchange protocol Similar to neighborhood exchange

37 TRAMA adaptive election Given: Each node knows its two-hop neighborhood and their current schedules How to decide which slot (in scheduled access period) a node can use? Use node identifier x and globally known hash function h For time slot t, compute priority p = h (x t) Compute this priority for next k time slots for node itself and all twohop neighbors Node uses those time slots for which it has the highest priority Priorities of node A and its two neighbors B & C t = 0 t = 1 t = 2 t=3 t = 4 t = 5 A B C

38 TRAMA possible conflicts When does a node have to receive? Easy case: one-hop neighbor has won a time slot and announced a packet for it But complications exist compare example What does B believe? A thinks it can send B knows that D has higher priority in its 2-hop neighborhood! Rules for resolving such conflicts are part of TRAMA A D B C Prio 100 Prio 95 Prio 79 Prio 200

39 Comparison: TRAMA, S-MAC Comparison between TRAMA & S-MAC Energy savings in TRAMA depend on load situation Energy savings in S-MAC depend on duty cycle TRAMA (as typical for a TDMA scheme) has higher delay but higher maximum throughput than contention-based S-MAC TRAMA disadvantage: substantial memory/cpu requirements for schedule computation

40 Sensor MAC(S-MAC) protocol for WSN

41 Design Considerations of WSN Primary attributes: Energy Efficiency often difficult to recharge or replace batteries prolonging the network lifetime is important Scalability Some nodes may die or new nodes may join Secondary attributes: Fairness, latency, throughput and bandwidth

42 Sources of Energy Inefficiency Collision Overhearing Control packet overhead Idle listening

43 Existing MAC Design Contention-based protocols IEEE Idle listening PAMAS heavy duty cycle of the radio, avoids overhearing, idle listening TDMA based protocols Advantages - Reduced energy consumption Problems requires real clusters, and does not support scalability

44 Design goal of S-MAC Reduce energy consumption Support good scalability Self-configurable

45 S-MAC Tries to reduce wastage of energy from all four sources of energy inefficiency Collision by using RTS and CTS Overhearing by switching the radio off when transmission is not meant for that node Control Overhead by message passing Idle listening by periodic listen and sleep

46 Is the improvement free of cost? No In exchange there is some reduction in perhop fairness and latency But does not reduce end-to-end fairness and latency Is it important for sensor networks?

47 Network Assumptions Composed of many small nodes deployed in ad hoc fashion Most communication will be between nodes as peers, rather than a single base station Nodes must self-configure

48 Application Assumptions Dedicated to a single application or a few collaborative application Involves in-network processing to reduce traffic and increase life time Applications will have long idle periods and can tolerate some latency

49 Components of S-MAC Periodic listen and sleep Collision and Overhearing avoidance Message passing

50 Periodic Listen and Sleep Each node goes into periodic sleep mode during which it switches the radio off and sets a timer to awake later When the timer expires, it wakes up Selection of sleep and listen duration is based on the application scenarios Neighboring nodes are synchronized together

51 Contd. Nodes exchange schedules by broadcast Multiple neighbors contend for the medium Once transmission starts, it does not stop until completed A B C D

52 Choosing and Maintaining Schedules Each node maintains a schedule table that stores schedules of all its known neighbors. To establish the initial schedule (at the startup) following steps are followed: A node first listens for a certain amount of time. If it does not hear a schedule from another node, it randomly chooses a schedule and broadcast its schedule immediately. This node is called a SYNCHRONIZER.

53 If a node receives a schedule from a neighbor before choosing its own schedule, it just follows this neighbor s schedule. This node is called a FOLLOWER and it waits for a random delay and broadcasts its schedule. If a node receives a neighbor s schedule after it selects its own schedule, it adopts to both schedules and broadcasts its own schedule before going to sleep.

54 Rules for Joining a New Node Listen for a long time until an active node is discovered Send INTRO packet to the active node Active node forwards its schedule table Treat all the nodes on table as potential neighbors and contact them later If possible follow the synchronizer s schedule else establish a random schedule and broadcast the schedule

55 Maintaining Synchronization Timer synchronization among neighbors are needed to prevent the clock drift. Done by periodic updating using a SYNC packet. Updating period can be quite long as we don t require tight synchronization. Synchronizer needs to periodically send SYNC to its followers. If a follower has a neighbor that has a different schedule with it, it also needs update that neighbor.

56 Time of next sleep is relative to the moment that the sender finishes transmitting the SYNC packet Receivers will adjust their timer counters immediately after they receive the SYNC packet Listen interval is divided into two parts: one for receiving SYNC and other for receiving RTS

57 Timing Relationship of Possible Situations

58 Collision Avoidance Similar to IEEE using RTS/CTS mechanism Perform carrier sense before initiating a transmission If a node fails to get the medium, it goes to sleep and wakes up when the receiver is free and listening again Broadcast packets are sent without RTS/CTS Unicast packets follow the sequence of RTS/CTS/DATA/ACK between the sender and receiver

59 Overhearing Avoidance Duration field in each transmitted packet indicates how long the remaining transmission will be. So if a node receives a packet destined o another node, it knows how long it has to keep silent. The node records this value in network allocation vector (NAV) and set a timer.

60 When a node has data to send, it first looks at NAV. If NAV is not zero, then medium is busy (virtual carrier sense). Medium is determined as free if both virtual and physical carrier sense indicate the medium is free. All immediate neighbors of both the sender and receiver should sleep after they hear RTS or CTS packet until the current transmission is over.

61 Message Passing A message is a collection of meaningful, interrelated units of data Transmitting a long message as a packet is disadvantageous as the re-transmission cost is high Fragmentation into small packets will lead to high control overhead as each packet should contend using RTS/CTS

62 Solution Fragment message in to small packets and transmit them as a burst Advantages Reduces latency of the message Reduces control overhead Disadvantage Node-to-node fairness is reduced, as nodes with small packets to send has to wait till the message burst is transmitted

63 Naming and Addressing

64 Names vs. addresses Name: Denote/refer to things Nodes, networks, data, transactions, Often, but not always, unique (globally, network-wide, locally) Ad hoc: nodes WSN: Data! Addresses: Information needed to find these things Street address, IP address, MAC address Often, but not always, unique (globally, network-wide, locally) Addresses often hierarchical, because of their intended use in, e.g., routing protocols Services to map between names and addresses E.g., DNS Sometimes, same data serves as name and address IP addresses are prominent examples

65 Fundamentals Unique Node Identifier (UID): It is a persistent data item unique for each node. E.g. Vendor name, product name, serial number MAC address: Used to distinguish between one-hop neighbors of a node. Imp. in contention based MAC protocols Including MAC add. Into unicast MAC packets, a node can determine which packets are not destined to it & go into sleep mode while such packet is in transit. OVERHEARING AVOIDANCE.

66 Network Address: It is used to find and denote a node over multiple hops; connected to routing. Network identifiers: In geographically overlapping WSN of the same type & working in same frequency band, distinguishing is done by network identifiers. E.g. medical body area sensor networks for clinical patients in the same room have to be distinguished to prevent confusion of sensor data belonging to different patients.

67 Resource identifiers: A name or resource identifier is represented in userunderstandable term or in the way that means something to the user. E.g. after reading an experienced reader knows that it refers to the web server In contrast, by looking at IP address , hardly anyone can draw conclusion.

68 Issues in address management Address allocation: Assign an entity an address from a given pool of possible addresses Distributed address assignment (centralized like DHCP does not scale) Address deallocation: Once address no longer used, put it back into the address pool Because of limited pool size Graceful or abrupt, depending on node actions Address representation Conflict detection & resolution (Duplicate Address Detection) What to do when the same address is assigned multiple times? Can happen e.g. when two networks merge Binding Map between addresses used by different protocol layers E.g., IP addresses are bound to MAC address by ARP

69 Uniqueness of addresses 1. Globally unique: A globally unique address or identifier is supposed to occur at most once all over the world. E.g. the 48-bit IEEE MAC addresses used in Ethernet and Token Ring networks. The binary representation of such addresses must be sufficiently large to accommodate all devices worldwide.

70 2. Networkwide unique: A networkwide unique address is supposed to be unique within a given network, but the same address can be used in different networks. By having different networks A and B, we mean that there is no pair of nodes a A and b B that can communicate

71 3. Locally unique: A locally unique address might occur several times in the same network, but it should be unique within a suitably defined neighborhood E.g. In a sensor network that have different sensor types like temperature, humidity, and light sensors. We might require that no two temperature sensors have the same address but a temperature and a humidity sensor may. In this case, the neighborhood is constituted by the sensors of the same type.

72 Address allocation and assignment The address assignment can happen a priori (e.g. during the manufacturing process or before network deployment) or on demand, by using an address assignment protocol. Such an on-demand address assignment protocol can be either centralized or distributed. In a centralized solution, there is one single authority/node taking care of (parts of) the address pool. In distributed solutions, there is no such exposed node. Instead, potentially all nodes play the same role in address assignment. Address release/deallocation plays an important role when networkwide or locally unique addresses are assigned on demand.

73 Duplicate Address Detection (DAD) In distributed address assignment networkwide uniqueness may not be granted at all times Strong DAD If address x is assigned to A at time t0 and to B at time t1, the conflict must be detected within t1+t, where T is some fixed time bound Weak DAD Duplicate addresses are tolerated as long as they do not distort ongoing sessions.

74 Address and name management in wireless sensor networks

75 MAC addresses are indispensable if the MAC protocol shall employ overhearing avoidance and go into sleep mode as often as possible. However, do MAC addresses need to be globally or networkwide unique? No, since the scope of a MAC protocol is communication between neighboring nodes and it is sufficient that addresses are locally unique within a two-hop neighborhood. This requirement ensures that no two neighbors of a selected node have the same MAC address. Locally unique addresses potentially are short but need an address assignment protocol.

76 How about higher-layer addresses, specifically network layer addresses, which for traditional routing protocols must be globally or networkwide unique? Fulfilling this requirement is a formidable task. This requirement is not really necessary in wireless sensor networks since after all the whole network is not a collection of individual nodes belonging to individual users but the nodes collaborate to process signals and events from the physical environment. Users ultimately are interested in the data and not in the individual or groups of nodes delivering them. Taking this a step further, the data can also influence the operation of protocols, which is the essence of data-centric networking.

Advanced Networking Technologies

Advanced Networking Technologies Advanced Networking Technologies Chapter 4 Medium Access Control Protocols (Acknowledgement: These slides have been prepared by Prof. Dr. Holger Karl) Advanced Networking (SS 16): 04 Medium Access Control

More information

CSC8223 Wireless Sensor Networks. Chapter 5 Medium Access Control Protocols

CSC8223 Wireless Sensor Networks. Chapter 5 Medium Access Control Protocols CSC8223 Wireless Sensor Networks Chapter 5 Medium Access Control Protocols Goals of this chapter Controlling when to send a packet and when to listen for a packet are perhaps the two most important operations

More information

Wireless Sensor Networks 8th Lecture

Wireless Sensor Networks 8th Lecture Wireless Sensor Networks 8th Lecture 21.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Media Access Control (MAC) Controlling when to send a packet and when to listen for a packet

More information

Ad hoc and Sensor Networks Chapter 5: Medium access control protocols

Ad hoc and Sensor Networks Chapter 5: Medium access control protocols Ad hoc and Sensor Networks Chapter 5: Medium access control protocols Holger Karl, Andreas Willig, "Protocols and Architectures for Wireless Sensor Networks," Wiley 2005 Goals of this chapter Controlling

More information

Chapter 7: Naming & Addressing

Chapter 7: Naming & Addressing Chapter 7: Naming & Addressing Goals of this chapter This short chapter looks at non-standard options for denoting the senders/receivers of messages Traditional (fixed, wireless, ad hoc): Denote individual

More information

Principal options and difficulties

Principal options and difficulties Principal options and difficulties Medium access in wireless networks is difficult mainly because of Impossible (or very difficult) to sende and receive at the same time Interference situation at receiver

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

Embedded Internet and the Internet of Things WS 12/13

Embedded Internet and the Internet of Things WS 12/13 Embedded Internet and the Internet of Things WS 12/13 4. MAC Protocols Prof. Dr. Mesut Güneş Distributed, embedded Systems (DES) Institute of Computer Science Freie Universität Berlin Prof. Dr. Mesut Güneş

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Chapter 3: Medium Access Control in Wireless Sensor Networks

Chapter 3: Medium Access Control in Wireless Sensor Networks 1 Chapter 3: Medium Access Control in Wireless Sensor Networks 3.1 Introduction A wireless sensor network (WSN) is a collection of different sensor nodes used to sense the environment for applications

More information

Presented by: Murad Kaplan

Presented by: Murad Kaplan Presented by: Murad Kaplan Introduction. Design of SCP-MAC. Lower Bound of Energy Performance with Periodic Traffic. Protocol Implementation. Experimental Evaluation. Related Work. 2 Energy is a critical

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

Networked Embedded Systems: PHY and MAC

Networked Embedded Systems: PHY and MAC Networked Embedded Systems: PHY and MAC Prof. António Grilo Instituto Superior Técnico (IST), Lisboa, Portugal Overview Principal options and difficulties Contention-based protocols Schedule-based protocols

More information

Wireless Sensor Networks Chapter 7: Naming & Addressing

Wireless Sensor Networks Chapter 7: Naming & Addressing Wireless Sensor Networks Chapter 7: Naming & Addressing António Grilo Courtesy: Holger Karl, UPB Goals of this chapter This short chapter looks at non-standard options for denoting the senders/receivers

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 4 1 Announcements Project proposals. Due April 17 th. Submit by e-mail to katia@soe.ucsc.edu.

More information

Networking Sensors, I

Networking Sensors, I Networking Sensors, I Sensing Networking Leonidas Guibas Stanford University Computation CS428 Networking Sensors Networking is a crucial capability for sensor networks -- networking allows: Placement

More information

WIRELESS sensor networking is an emerging technology

WIRELESS sensor networking is an emerging technology USC/ISI TECHNICAL REPORT ISI-TR-567, JANUARY 2003 1 Medium Access Control with Coordinated, Adaptive Sleeping for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin Abstract This paper proposes

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol ARTICLE International Journal of Engineering Business Management Special Issue on Radio Frequency Identification and Wireless Sensor Networks Editor: Cristina Turcu Power Saving MAC Protocols for WSNs

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

MAC protocols. Lecturer: Dmitri A. Moltchanov

MAC protocols. Lecturer: Dmitri A. Moltchanov MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based

More information

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

Medium Access Control in Wireless Sensor Networks

Medium Access Control in Wireless Sensor Networks Medium Access Control in Wireless Sensor Networks Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 1 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired)

More information

Medium Access Control in Wireless Sensor Networks

Medium Access Control in Wireless Sensor Networks Medium Access Control in Wireless Sensor Networks Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 1 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired)

More information

Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network

Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 3 March 2015, Page No. 10652-10656 Performance and Comparison of Energy Efficient MAC Protocol in Wireless

More information

Medium Access Control in Wireless IoT. Davide Quaglia, Damiano Carra

Medium Access Control in Wireless IoT. Davide Quaglia, Damiano Carra Medium Access Control in Wireless IoT Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired) Wireless Assumptions

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1 Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types

More information

MAC Essentials for Wireless Sensor Networks

MAC Essentials for Wireless Sensor Networks MAC Essentials for Wireless Sensor Networks Abdelmalik Bachir, Mischa Dohler, Senior Member, IEEE, Thomas Watteyne, Member, IEEE, and Kin K. Leung, Fellow, IEEE Medium access control Part of the link layer

More information

Reservation Packet Medium Access Control for Wireless Sensor Networks

Reservation Packet Medium Access Control for Wireless Sensor Networks Reservation Packet Medium Access Control for Wireless Sensor Networks Hengguang Li and Paul D Mitchell Abstract - This paper introduces the Reservation Packet Medium Access Control (RP-MAC) protocol for

More information

CS 410/510 Sensor Networks Portland State University

CS 410/510 Sensor Networks Portland State University CS 410/510 Sensor Networks Portland State University Lecture 7 Energy Conservation and Harvesting 2/9/2009 Nirupama Bulusu 1 Source Acknowledgements Wei Ye and John Heidemann USC Information Sciences Institute

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

MAC Protocols 10/6/2008. References. Medium Access Control (MAC)

MAC Protocols 10/6/2008. References. Medium Access Control (MAC) MAC Protocols AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE MAC LAYER PROTOCOLS FOR SENSOR NETWORKS AND THEIR BASIC CHARACTERISTICS References H. Karl and A. Willing. Protocols and

More information

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks : A TDMA Based Multi-Channel MAC Protocol using a Single Radio Transceiver for Mobile Ad Hoc Networks Jingbin Zhang, Gang Zhou, Chengdu Huang, Ting Yan, Sang H. Son, John A. Stankovic Department of Computer

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication Vol., Issue.3, May-June 0 pp--7 ISSN: - Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication J. Divakaran, S. ilango sambasivan Pg student, Sri Shakthi Institute of

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the

More information

Medium Access Control in Wireless Networks

Medium Access Control in Wireless Networks Medium Access Control in Wireless Networks Prof. Congduc Pham http://www.univ-pau.fr/~cpham Université de Pau, France MAC layer Routing protocols Medium Acces Control IEEE 802.X MAC GSM (2G) Channels Downlink

More information

MAC protocols for ad hoc networks

MAC protocols for ad hoc networks MAC protocols for ad hoc networks Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2756/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of

More information

Energy Efficiency and Latency Improving In Wireless Sensor Networks

Energy Efficiency and Latency Improving In Wireless Sensor Networks Energy Efficiency and Latency Improving In Wireless Sensor Networks Vivekchandran K. C 1, Nikesh Narayan.P 2 1 PG Scholar, Department of Computer Science & Engineering, Malabar Institute of Technology,

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May ISSN International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013 1859 Energy Efficient MAC Protocols For Wireless Sensor Networks: A Survey Muhammad man Riaz, Muhammad Nauman Qureshi

More information

Analysis of S-MAC/T-MAC Protocols for Wireless Sensor Networks

Analysis of S-MAC/T-MAC Protocols for Wireless Sensor Networks Analysis of S-MAC/T-MAC Protocols for Wireless Sensor Networks WOOCHUL LEE*, YUTAE LEE*, SOONGHEE LEE**, DONGIL KIM* *Department of Information and Communications Engineering Dong-Eui University, 996 Eomgwan-no,

More information

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists 3,900 116,000 120M Open access books available International authors and editors Downloads Our

More information

R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks

R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks Peng Xie and Jun-Hong Cui UCONN CSE Technical Report: UbiNet-TR06-06 Last Update: June 2007 Abstract Underwater sensor networks are

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks S. Shiney Lillia PG Student, Department of Computer Science and Engineering, National Institute of Technology Puducherry, Puducherry,

More information

AMAC: Traffic-Adaptive Sensor Network MAC Protocol through Variable Duty-Cycle Operations

AMAC: Traffic-Adaptive Sensor Network MAC Protocol through Variable Duty-Cycle Operations AMAC: Traffic-Adaptive Sensor Network MAC Protocol through Variable Duty-Cycle Operations Sang Hoon Lee, Joon Ho Park, and Lynn Choi Department of Electronics and Computer Engineering Korea University

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18

More information

Sensor Network Protocols

Sensor Network Protocols EE360: Lecture 15 Outline Sensor Network Protocols Announcements 2nd paper summary due March 7 Reschedule Wed lecture: 11-12:15? 12-1:15? 5-6:15? Project poster session March 15 5:30pm? Next HW posted

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks 1 Ch. Steup / J. Kaiser, IVS-EOS Ubiquitous Sensing 2 Ch. Steup / J. Kaiser, IVS-EOS IEEE 802.x Wireless Communication 3 Ch. Steup / J. Kaiser, IVS-EOS Wireless Technology Comparision

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN

More information

ECE 158A: Lecture 13. Fall 2015

ECE 158A: Lecture 13. Fall 2015 ECE 158A: Lecture 13 Fall 2015 Random Access and Ethernet! Random Access! Basic idea: Exploit statistical multiplexing Do not avoid collisions, just recover from them When a node has packet to send Transmit

More information

Aloha and slotted aloha

Aloha and slotted aloha CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender

More information

Embedded Internet and the Internet of Things WS 12/13

Embedded Internet and the Internet of Things WS 12/13 Embedded Internet and the Internet of Things WS 12/13 4. MAC Protocols Prof. Dr. Mesut Güneş Distributed, embedded Systems (DES) Institute of Computer Science Freie Universität Berlin Prof. Dr. Mesut Güneş

More information

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the

More information

AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS

AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS International Journal on Intelligent Electronic Systems, Vol.3, No.2, July 2009 7 Abstract AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS Lakshmanan M., Noor Mohammed V. 1 E-mail

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider Chapter 5 IEEE 802.15.4 5.1 Introduction Wireless Sensor Network(WSN) is resource constrained network developed specially targeting applications having unattended network for long time. Such a network

More information

CSE/EE 461 Section 2

CSE/EE 461 Section 2 CSE/EE 461 Section 2 Latency in a store-and-forward network 4ms, 10MB/s B How long does it take to send a 2kB packet from to B? 2ms, 10MB/s C 2ms, 10MB/s B What if it has to pass through a node C? Plan

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

Principles of Wireless Sensor Networks. Medium Access Control and IEEE http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 7 Stockholm, November 8, 2011 Medium Access Control and IEEE 802.15.4 Royal Institute of Technology - KTH Stockholm, Sweden e-mail:

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

ABSTRACT. Physical Implementation of Synchronous Duty-Cycling MAC Protocols: Experiences and Evaluation. Wei-Cheng Xiao

ABSTRACT. Physical Implementation of Synchronous Duty-Cycling MAC Protocols: Experiences and Evaluation. Wei-Cheng Xiao ABSTRACT Physical Implementation of Synchronous Duty-Cycling MAC Protocols: Experiences and Evaluation by Wei-Cheng Xiao Energy consumption and network latency are important issues in wireless sensor networks.

More information

Lecture on Sensor Networks

Lecture on Sensor Networks Lecture on Sensor Networks MAC Historical in radio Development Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

Rahman 1. Application

Rahman 1. Application Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information