CS 410/510 Sensor Networks Portland State University

Size: px
Start display at page:

Download "CS 410/510 Sensor Networks Portland State University"

Transcription

1 CS 410/510 Sensor Networks Portland State University Lecture 7 Energy Conservation and Harvesting 2/9/2009 Nirupama Bulusu 1

2 Source Acknowledgements Wei Ye and John Heidemann USC Information Sciences Institute Deborah Estrin Aman Kansal Mani Srivastava 2/9/2009 Nirupama Bulusu 2

3 Energy Conservation 2/9/2009 Nirupama Bulusu 3

4 Characteristics of a Sensor Network A special wireless ad hoc network Large number of nodes Battery powered Topology and density change Nodes for a common task In-network data processing Sensor-net applications Sensor-triggered bursty traffic Can often tolerate some delay Scalability & Self-configuration Energy efficiency Adaptivity Fairness not important Message-level Latency Adaptivity Trade for energy Speed of a moving object places a bound on network reaction time 2/9/2009 Nirupama Bulusu 4

5 Network-level Opportunities for Energy Conservation Radio Transmission Power Control Medium Access Control (MAC) Topology-control Routing 2/9/2009 Nirupama Bulusu 5

6 Radio Transmission Power Control Why adjust transmission power? Guarantee network connectivity Control network density/encourage spatial reuse Minimize transmission power => reduced energy consumption (also due to reduced contention) 2/9/2009 Nirupama Bulusu 6

7 Example Let R = 3r, energy consumption inversely proportional to d 2 Cost of transmitting a-d = 3 (a-b-c-d) R a b c d r 2/9/2009 Nirupama Bulusu 7

8 MAC and Its Classification Medium Access Control (MAC) When and how nodes access the shared channel Classification of MAC protocols Scheduled protocols Schedule nodes onto different sub-channels Examples: TDMA, FDMA, CDMA Contention-based protocols Nodes compete in probabilistic coordination Examples: ALOHA (pure & slotted), CSMA 2/9/2009 Nirupama Bulusu 8

9 MAC Attributes Collision avoidance Basic task of a MAC protocol Energy efficiency Scalability and adaptability Network size, node density and topology change Channel utilization Latency Throughput Fairness Primary Secondary 2/9/2009 Nirupama Bulusu 9

10 Energy Efficiency in MAC Design Energy is primary concern in sensor networks What causes energy waste? Collisions Control packet overhead Overhearing unnecessary traffic Long idle time bursty traffic in sensor-net apps Dominant factor Idle listening consumes % of the power for receiving (Stemm97, Kasten) 2/9/2009 Nirupama Bulusu 10

11 Scheduled Protocols Time Division Multiple Access (TDMA) Advantages No collisions Energy efficient easily support low duty cycles Disadvantages Poor scalability and adaptability Difficult to accommodate node changes Difficult to handle inter-cluster communication Requires strict time synchronization 2/9/2009 Nirupama Bulusu 11

12 Scheduled Protocols Polling A master plus one or more slaves (star topology) The master node decides which slave can send by polling the corresponding slave Only direct communication between the master and a slave A special TDMA without pre-assigned slots Examples IEEE infrastructure mode (CFP) Bluetooth piconets 2/9/2009 Nirupama Bulusu 12

13 Scheduled Protocols Self-Organization by Sohrabi and Pottie Have a pool of independent channels Frequency band or spreading code Potential interfering links select different channels Talk to neighbors in different time slots Sleep in unscheduled time slots Looks like TDMA, but actually FDMA or CDMA Any pair of two nodes can talk at the same time Low bandwidth utilization /9/2009 Nirupama Bulusu 13

14 Scheduled Protocols Bluetooth Target for wireless personal area network (WPAN) Short range, moderate bandwidth, low latency IEEE (MAC + PHY) is based on Bluetooth Nodes are clustered into piconet Each piconet has a master and up to 7 slaves scalability problem The master polls each slave for transmission Frequency-hopping CDMA between clusters Multiple connected piconets form a scatternet Different to handle inter-cluster communications 2/9/2009 Nirupama Bulusu 14

15 Scheduled Protocols Bluetooth (Cont.) How about Bluetooth radio with sensor networks? Scalability is a big problem Lack of multi-hop support No commercial Bluetooth radio supports scatternet so far Use two radios expensive and energy inefficient A node temporarily leave one piconet and joins another high overhead and long delay Connection maintenance is expensive even with a low-duty-cycle mode (Leopold et al.) 2/9/2009 Nirupama Bulusu 15

16 Scheduled Protocols LEACH: Low-Energy Adaptive Clustering Hierarchy by Heinzelman, et al. Similar to Bluetooth CDMA between clusters TDMA within each cluster Static TDMA frame Cluster head rotation Node only talks to cluster head Only cluster head talks to base station (long dist.) The same scalability problem 2/9/2009 Nirupama Bulusu 16

17 Contention-Based Protocols Contention-based protocols CSMA Carrier Sense Multiple Access Listening before transmitting Not enough for multi-hop networks (collision at receiver) a b c Hidden terminal: a is hidden from c s carrier sense CSMA/CA (CA stands for Collision Avoidance) RTS/CTS handshake before send data Other nodes (e.g. node c) backoff 2/9/2009 Nirupama Bulusu 17

18 Contention-Based Protocols Contention-based protocols (contd.) MACA Multiple Access w/ Collision Avoidance Add duration field in RTS/CTS informing other node about their backoff time MACAW improved over MACA RTS/CTS/DATA/ACK Fast error recovery at link layer IEEE Distributed Coordination Function (DCF) Largely based on MACAW 2/9/2009 Nirupama Bulusu 18

19 Contention-Based Protocols IEEE DCF: ad hoc mode Virtual and physical carrier sense (CS) Network allocation vector (NAV), duration field Binary exponential backoff RTS/CTS/DATA/ACK for unicast packets Broadcast packets are directly sent after CS Fragmentation support RTS/CTS reserve time for first (fragment + ACK) First (fragment + ACK) reserve time for second Give up transmission when error happens 2/9/2009 Nirupama Bulusu 19

20 Contention-Based Protocols Tx rate control by Woo and Culler Based on a special network setup A base station tries to collect data equally from all sensors in the network CSMA + adaptive rate control Promote fair bandwidth allocation to all sensors Nodes close to the base station forward more traffic, and have less chances to send their own data Helps in congestion avoidance 2/9/2009 Nirupama Bulusu 20

21 Scheduled vs. Contention Protocols Scheduled Protocols Contention Protocols Collisions No Yes Energy efficiency Scalability and adaptation Multi-hop communication Time synchronization Good Bad Difficult Strict Bad Good Easy Loose or not required 2/9/2009 Nirupama Bulusu 21

22 Energy Efficiency in Contention- Based Protocols Contention-based protocols need to work hard in all directions for energy savings Reduce idle listening support low duty cycle Better collision avoidance Reduce control overhead Avoid unnecessary overhearing 2/9/2009 Nirupama Bulusu 22

23 Energy-Efficient MAC Design PAMAS: Power Aware Multi-Access with Signalling by Singh and Raghavendra Improve energy efficiency from MACA Avoid overhearing by putting node into sleep Use separate control and data channels RTS, CTS, busy tone to avoid collision Probe packets to find neighbors transmission time Increased hardware complexity Two channels need to work simultaneously, meaning two radio systems. 2/9/2009 Nirupama Bulusu 23

24 Energy-Efficient MAC Design Piconet by Bennett, Clarke, et al. Not the same piconet in Bluetooth Low duty-cycle operation energy efficient Sleep for 30s, beacon, and listen for a while Sending node needs to listen for receiver s beacon first, then CSMA before sending data May wait for long time before sending 2/9/2009 Nirupama Bulusu 24

25 Energy-Efficient MAC Design Asynchronous sleeping by Tseng, et al. Extend PS mode to Multi-hops Nodes do not synchronize with each other Designed 3 sleep patterns ensure nodes listen intervals overlap, example: Periodically fully-awake interval: similar to S-MAC Problem on broadcast wake up each neighbor 2/9/2009 Nirupama Bulusu 25

26 Energy-Efficient MAC Design ZigBee Industry standard through application profiles running over IEEE radios Target applications are sensors networks, interactive toys, smart badges, remote controls, and home automation 2/9/2009 Nirupama Bulusu 26

27 Energy-Efficient MAC Design ZigBee (Cont.) Three devices specified Network Coordinator Full Function Device (FFD) Can talk to any device, more computing power Reduced Function Device (RFD) Can only talk to a FFD, simple for energy conservation CSMA/CA with optional ACKs on data packets Optional beacons with superframes Optional guaranteed time slots (GTS), which supports contention-free access 2/9/2009 Nirupama Bulusu 27

28 Energy-Efficient MAC Design ZigBee (Cont.) Low power, low rate (250kbps) at physical layer MAC layer supports low duty cycle operation Target node life time > 1 year 2/9/2009 Nirupama Bulusu 28

29 Case Study: S-MAC S-MAC by Ye, Heidemann and Estrin Tradeoffs Latency Fairness Major components in S-MAC Periodic listen and sleep Collision avoidance Overhearing avoidance Message passing Energy 2/9/2009 Nirupama Bulusu 29

30 Coordinated Sleeping Problem: Idle listening consumes significant energy! Solution: Periodic listen and sleep sleep listen listen sleep Turn off radio when sleeping Reduce duty cycle to ~ 10% (120ms on/1.2s off) Latency Energy 2/9/2009 Nirupama Bulusu 30

31 Coordinated Sleeping Schedules can differ Node 1 Node 2 listen sleep listen sleep listen sleep listen sleep Prefer neighboring nodes have same schedule easy broadcast & low control overhead Schedule 1 Schedule 2 Border nodes: two schedules or broadcast twice 2/9/2009 Nirupama Bulusu 31

32 Coordinated Sleeping Schedule Synchronization New node tries to follow an existing schedule Remember neighbors schedules to know when to send to them Each node broadcasts its schedule every few periods of sleeping and listening Re-sync when receiving a schedule update Periodic neighbor discovery Keep awake in a full sync interval over long periods 2/9/2009 Nirupama Bulusu 32

33 Coordinated Sleeping Adaptive listening Reduce multi-hop latency due to periodic sleep Wake up for a short period of time at end of each transmission RTS CTS CTS listen listen t1 t2 listen Reduce latency by at least half 2/9/2009 Nirupama Bulusu 33

34 Collision Avoidance S-MAC is based on contention Similar to IEEE ad hoc mode (DCF) Physical and virtual carrier sense Randomized backoff time RTS/CTS for hidden terminal problem RTS/CTS/DATA/ACK sequence 2/9/2009 Nirupama Bulusu 34

35 Overhearing Avoidance Problem: Receive packets destined for others Solution: Sleep when neighbors talk Basic idea from PAMAS (Singh, Raghavendra 1998) But we only use in-channel signaling Who should sleep? All immediate neighbors of sender and receiver How long to sleep? The duration field in each packet informs other nodes the sleep interval 2/9/2009 Nirupama Bulusu 35

36 Message Passing Problem: Sensor net in-network processing requires entire message Solution: Don t interleave different messages Long message is fragmented & sent in burst RTS/CTS reserve medium for entire message Fragment-level error recovery ACK extend Tx time and re-transmit immediately Fairness Energy Msg-level latency Other nodes sleep for whole message time 2/9/2009 Nirupama Bulusu 36

37 Implementation Platform Mica Motes (UC Berkeley) 8-bit CPU at 4MHz, 128KB flash, 4KB RAM 20Kbps radio at 433MHz TinyOS: event-driven Configurable S-MAC options Low duty cycle with adaptive listen Low duty cycle without adaptive listen Fully active mode (no periodic sleeping) 2/9/2009 Nirupama Bulusu 37

38 Experiments: Two-hop network Topology, measured energy consumption on source nodes Source 1 Source 2 Sink 1 Sink 2 Energy consumption (mj) S-MAC consumes much less energy than like protocol w/o sleeping At heavy load, overhearing avoidance is the major factor in energy savings At light load, periodic sleeping plays the key role Average energy consumption in the source nodes like protocol without sleep S-MAC w/o adaptive listen Overhearing avoidance Message inter-arrival period (second) 2/9/2009 Nirupama Bulusu 38

39 Energy Consumption over Multi-Hops Ten-hop linear network at different traffic load 3 S-MAC configurations At light traffic load, periodic sleeping has significant energy savings over fully active mode Adaptive listen saves more at heavy load by reducing latency Energy consumption (J) Energy consumption at different traffic load No sleep cycles 10% duty cycle without adaptive listen 10% duty cycle with adaptive listen Message inter-arrival period (S) 2/9/2009 Nirupama Bulusu 39

40 Latency as Hops Increase 12 Adaptive listen significantly reduces latency causes by periodic sleeping Latency under lowest traffic load 12 Latency under highest traffic load Average message latency (S) % duty cycle without adaptive listen 10% duty cycle with adaptive listen Average message latency (S) % duty cycle without adaptive listen 10% duty cycle with adaptive listen No sleep cycles Number of hops No sleep cycles Number of hops 2/9/2009 Nirupama Bulusu 40

41 Throughput as Hops Increase Adaptive listen significantly increases throughput Using less time to pass the same amount of data Effective data throughput (Byte/S) Effective data throughput under highest traffic load No sleep cycles 10% duty cycle with adaptive listen 10% duty cycle without adaptive listen Number of hops 2/9/2009 Nirupama Bulusu 41

42 Combined Energy and Throughput Periodic sleeping provides excellent 3 performance at 2.5 light traffic load No sleep cycles 2 With adaptive listening, S-MAC 1.5 achieves about the 1 10% duty cycle without same performance adaptive listen 0.5 as no-sleep mode 0 at heavy load Energy-time product per byte (J*S/byte) Energy-time cost on passing 1-byte data from source to sink 10% duty cycle with adaptive listen Message inter-arrival period (S) 2/9/2009 Nirupama Bulusu 42

43 #3: Topology Control Between MAC and routing Turn off as many nodes as possible Leave only enough on to keep a connected topology Ensures data can transit through network Topology control vs. MAC Operate at much coarser timescales Cycle radios on the order of minutes rather than seconds 2/9/2009 Nirupama Bulusu 43

44 Examples Geography-based Use physical location to infer network coverage. Divide physical area into grids, select one node per grid. Topology-based Directly measure network connectivity Select node in topology if two of its neighbors cannot talk to each other Energy savings depend on network density Node mobility 2/9/2009 Nirupama Bulusu 44

45 #4: Energy-efficient Routing Minimize energy cost per packet Balance energy consumption in the network. More in next lecture 2/9/2009 Nirupama Bulusu 45

46 Conclusion Energy conservation active area of research Current work Transmission power control MAC protocol design Topology control Routing 2/9/2009 Nirupama Bulusu 46

47 Energy Harvesting 2/9/2009 Nirupama Bulusu 47

48 Sources Chapter 9: Energy Harvesting Aman Kansal and Mani Srivastava Sensor-coordinated actuation for energy harvesting Mohammed Rahimi et al 2/9/2009 Nirupama Bulusu 48

49 Energy harvesting Batteries are too big Batteries do not last forever Methods exist to extract energy from the environment Thermoelectric (DARPA, JPL, Caltech) Micro-hydraulic transducer (DARPA, MIT) Solar cells Bio-fuel (University of Bristol) 2/9/2009 Nirupama Bulusu 49

50 Managing Harvested Energy It is different from battery energy Supply varies with time Need to adapt performance Supply varies with space Different nodes get different energy Need load sharing Supply is repetitive (does not die out) Opportunity to last forever Efficiency Concerns Match load to maximize transfer Supply direct when possible, instead of through battery 2/9/2009 Nirupama Bulusu 50

51 Example Which route to choose? source destination 2/9/2009 Nirupama Bulusu 51

52 Managing Harvested Energy Key issues Use available energy most efficiently Estimate achievable performance level Harvesting Technology Harvesting Circuit Scheduler Deployment Specific Choice Buffering (battery or ultra-capacitor) Consumption Arbitration Tracking availability Performance Scaling Network-wide task scheduling 2/9/2009 Nirupama Bulusu 52

53 Harvesting Circuit System Block Diagram Harvesting device Energy Tracker Consumption Arbiter Recharging circuit E Sub-module Power switching Sensor Node Energy storage Device data Harvesting Aware Power management 2/9/2009 Nirupama Bulusu 53

54 Scheduler Design Problem Existing Approach Kansal s Approach Environmental energy supply is variable Recharge battery and let the load use energy as desired Track environmental availability Supply is independent of demand Battery makes up for discrepancy, node dies when out of battery Scale performance; match availability; last forever 2/9/2009 Nirupama Bulusu 54

55 Source Characterization What is available from the variable environmental source? Leaky bucket like model for bursty energy supply E(t) is a (ρ,σ1,α2) source if for all T: E(t) integral over 0 to T is >= (ρt σ1) <= (ρt + σ2) 2/9/2009 Nirupama Bulusu 55

56 Interesting Questions Given the source parameters: What is the achievable application throughput or latency? Can the system last eternally at required performance level? What additional resources are required, if not? Considering efficiencies of batteries and other power modes, how should the tasks be scheduled? 2/9/2009 Nirupama Bulusu 56

57 Harvesting Theory Theorem: If a system is powered by a (ρ,σ1,σ2) source has energy capacity >= (σ1+ σ2) Operates at a constant power level ρ Then 1. It utilizes the energy source fully 2. Can survive forever 2/9/2009 Nirupama Bulusu 57

58 Performance control Learn energy environment parameters Predict Sustainable Performance level ρ = xp max + (1 x)p sleep Adapt Performance Sleep and active modes Dynamic voltage scaling Radio range control Sub-module power switching 2/9/2009 Nirupama Bulusu 58

59 Multi-server Harvesting How can a distributed system manage the harvested energy to maximize performance of the system as a whole? Energy resources vary across nodes Task-load differs at different nodes Some workload is shareable while some is not Consider one energy intensive task: routing data Determine environmental energy aware communication strategy 2/9/2009 Nirupama Bulusu 59

60 Routing Options Optimal routing is impractical Nodes share state information and coordinate performance adaptation actions Nodes adapt performance locally and routing protocol operates over sleepy nodes 2/9/2009 Nirupama Bulusu 60

61 Practical Networking Method Routing for an event monitoring sensor network Single sink (base station), multiple sources (node monitoring events) Must report event when it occurs; otherwise no data Measure energy and calculate duty-cycle locally Duty cycle determines latency of data relaying Sensor Sleep Timer Event detected Timer expired Sensor Node Snooze: Processor And radio sleeping 2/9/2009 Nirupama Bulusu 61

62 Communication with Sleep Mode Node can wake up if it has data to send How does a sleeping node receive data? 2/9/2009 Nirupama Bulusu 62

63 Routing Tree INIT Base station ACK Protocol Base station sends INIT Receiver sends ACK and forwards INIT Reverse path set up to base station Possibly shortest; but not necessarily lowest latency 2/9/2009 Nirupama Bulusu 63

64 Network-wide Performance Estimate network-wide latency constraint with observed environmental resource Central control over network latency is impractical Sending all latencies to base station reduces scalability Use in-network processing to compute path latency Receive path latencies from children Forward highest plus own latency 2/9/2009 Nirupama Bulusu 64

65 Conclusions Harvesting technologies can enable long system lifetime Proof-of-concept system and algorithms to exploit environmental energy demonstrated Methods are needed to measure and characterize energy sources Battery characterization is not sufficient Distributed methods are required to optimally adapt global performance Schedule tasks appropriately in space and time to enhance performance 2/9/2009 Nirupama Bulusu 65

WIRELESS sensor networking is an emerging technology

WIRELESS sensor networking is an emerging technology USC/ISI TECHNICAL REPORT ISI-TR-567, JANUARY 2003 1 Medium Access Control with Coordinated, Adaptive Sleeping for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin Abstract This paper proposes

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

MAC in /20/06

MAC in /20/06 MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Sensor Network Protocols

Sensor Network Protocols EE360: Lecture 15 Outline Sensor Network Protocols Announcements 2nd paper summary due March 7 Reschedule Wed lecture: 11-12:15? 12-1:15? 5-6:15? Project poster session March 15 5:30pm? Next HW posted

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

Presented by: Murad Kaplan

Presented by: Murad Kaplan Presented by: Murad Kaplan Introduction. Design of SCP-MAC. Lower Bound of Energy Performance with Periodic Traffic. Protocol Implementation. Experimental Evaluation. Related Work. 2 Energy is a critical

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

Embedded Internet and the Internet of Things WS 12/13

Embedded Internet and the Internet of Things WS 12/13 Embedded Internet and the Internet of Things WS 12/13 4. MAC Protocols Prof. Dr. Mesut Güneş Distributed, embedded Systems (DES) Institute of Computer Science Freie Universität Berlin Prof. Dr. Mesut Güneş

More information

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Advanced Networking Technologies

Advanced Networking Technologies Advanced Networking Technologies Chapter 4 Medium Access Control Protocols (Acknowledgement: These slides have been prepared by Prof. Dr. Holger Karl) Advanced Networking (SS 16): 04 Medium Access Control

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Medium Access Control in Wireless Networks

Medium Access Control in Wireless Networks Medium Access Control in Wireless Networks Prof. Congduc Pham http://www.univ-pau.fr/~cpham Université de Pau, France MAC layer Routing protocols Medium Acces Control IEEE 802.X MAC GSM (2G) Channels Downlink

More information

Wireless Sensor Networks 8th Lecture

Wireless Sensor Networks 8th Lecture Wireless Sensor Networks 8th Lecture 21.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Media Access Control (MAC) Controlling when to send a packet and when to listen for a packet

More information

AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS

AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS International Journal on Intelligent Electronic Systems, Vol.3, No.2, July 2009 7 Abstract AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS Lakshmanan M., Noor Mohammed V. 1 E-mail

More information

Analysis of S-MAC/T-MAC Protocols for Wireless Sensor Networks

Analysis of S-MAC/T-MAC Protocols for Wireless Sensor Networks Analysis of S-MAC/T-MAC Protocols for Wireless Sensor Networks WOOCHUL LEE*, YUTAE LEE*, SOONGHEE LEE**, DONGIL KIM* *Department of Information and Communications Engineering Dong-Eui University, 996 Eomgwan-no,

More information

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

Principles of Wireless Sensor Networks. Medium Access Control and IEEE http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 7 Stockholm, November 8, 2011 Medium Access Control and IEEE 802.15.4 Royal Institute of Technology - KTH Stockholm, Sweden e-mail:

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks 1 Ch. Steup / J. Kaiser, IVS-EOS Ubiquitous Sensing 2 Ch. Steup / J. Kaiser, IVS-EOS IEEE 802.x Wireless Communication 3 Ch. Steup / J. Kaiser, IVS-EOS Wireless Technology Comparision

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Madhusmita Nandi School of Electronics Engineering, KIIT University Bhubaneswar-751024, Odisha, India ABSTRACT The present work is to evaluate

More information

Networking Sensors, I

Networking Sensors, I Networking Sensors, I Sensing Networking Leonidas Guibas Stanford University Computation CS428 Networking Sensors Networking is a crucial capability for sensor networks -- networking allows: Placement

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Rahman 1. Application

Rahman 1. Application Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Energy Efficient MAC Protocols Design for Wireless Sensor Networks

Energy Efficient MAC Protocols Design for Wireless Sensor Networks Energy Efficient MAC Protocols Design for Wireless Sensor Networks Francesco Chiti*, Michele Ciabatti*, Giovanni Collodi, Davide Di Palma*, Romano Fantacci *, Antonio Manes *Dipartimento di Elettronica

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

UNIT IV. Data link layer protocols. Prof.Prasad S.Halgaonkar

UNIT IV. Data link layer protocols. Prof.Prasad S.Halgaonkar UNIT IV Data link layer protocols Link Layer Frame synchronization. Data are sent in blocks called frames. The beginning and end of each frame must be recognized. Flow control. The sending station must

More information

Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network

Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 3 March 2015, Page No. 10652-10656 Performance and Comparison of Energy Efficient MAC Protocol in Wireless

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area

More information

EL2745 Principles of Wireless Sensor Networks

EL2745 Principles of Wireless Sensor Networks EL2745 Principles of Wireless Sensor Networks www.kth.se/student/program-kurser/kurshemsidor/kurshemsidor/control/el2745 Lecture 5 Stockholm, February 2, 2012 Carlo Fischione Royal Institute of Technology

More information

Medium Access Control in Wireless Sensor Networks

Medium Access Control in Wireless Sensor Networks Medium Access Control in Wireless Sensor Networks Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 1 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired)

More information

AMAC: Traffic-Adaptive Sensor Network MAC Protocol through Variable Duty-Cycle Operations

AMAC: Traffic-Adaptive Sensor Network MAC Protocol through Variable Duty-Cycle Operations AMAC: Traffic-Adaptive Sensor Network MAC Protocol through Variable Duty-Cycle Operations Sang Hoon Lee, Joon Ho Park, and Lynn Choi Department of Electronics and Computer Engineering Korea University

More information

Medium Access Control in Wireless IoT. Davide Quaglia, Damiano Carra

Medium Access Control in Wireless IoT. Davide Quaglia, Damiano Carra Medium Access Control in Wireless IoT Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired) Wireless Assumptions

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov    kurssit/elt-53306/ WPAN/WBANs: ZigBee Dmitri A. Moltchanov E-mail: dmitri.moltchanov@tut.fi http://www.cs.tut.fi/ kurssit/elt-53306/ IEEE 802.15 WG breakdown; ZigBee Comparison with other technologies; PHY and MAC; Network

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

CSC8223 Wireless Sensor Networks. Chapter 5 Medium Access Control Protocols

CSC8223 Wireless Sensor Networks. Chapter 5 Medium Access Control Protocols CSC8223 Wireless Sensor Networks Chapter 5 Medium Access Control Protocols Goals of this chapter Controlling when to send a packet and when to listen for a packet are perhaps the two most important operations

More information

MAC protocols. Lecturer: Dmitri A. Moltchanov

MAC protocols. Lecturer: Dmitri A. Moltchanov MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

Logical Link Control (LLC) Medium Access Control (MAC)

Logical Link Control (LLC) Medium Access Control (MAC) Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

MAC Protocols 10/6/2008. References. Medium Access Control (MAC)

MAC Protocols 10/6/2008. References. Medium Access Control (MAC) MAC Protocols AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE MAC LAYER PROTOCOLS FOR SENSOR NETWORKS AND THEIR BASIC CHARACTERISTICS References H. Karl and A. Willing. Protocols and

More information

Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 5 January 31, 2013 Carlo Fischione Associate Professor of Sensor Networks e-mail: carlofi@kth.se http://www.ee.kth.se/~carlofi/

More information

Ad hoc and Sensor Networks Chapter 5: Medium access control protocols

Ad hoc and Sensor Networks Chapter 5: Medium access control protocols Ad hoc and Sensor Networks Chapter 5: Medium access control protocols Holger Karl, Andreas Willig, "Protocols and Architectures for Wireless Sensor Networks," Wiley 2005 Goals of this chapter Controlling

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K.

COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K. COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K. Nisha Menon 2 1 Mar Baselios Christian College of Engineering and Technology,

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

Wireless Local Area Networks. Networks: Wireless LANs 1

Wireless Local Area Networks. Networks: Wireless LANs 1 Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks (Energy Management) Outline Energy Management Issue in ad hoc networks WS 2009/2010 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) Wireless MAC

Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay)  Wireless MAC Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Wireless MAC 2 1 Wireless MAC CSMA as wireless MAC? Hidden and exposed terminal problems make

More information

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks S. Shiney Lillia PG Student, Department of Computer Science and Engineering, National Institute of Technology Puducherry, Puducherry,

More information

Advanced Computer Networks WLAN

Advanced Computer Networks WLAN Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider Chapter 5 IEEE 802.15.4 5.1 Introduction Wireless Sensor Network(WSN) is resource constrained network developed specially targeting applications having unattended network for long time. Such a network

More information

Major Design Challenges. Sensor Network Characteristics. Crosslayer Design in Sensor Networks. Energy-Constrained Nodes. Wireless Sensor Networks

Major Design Challenges. Sensor Network Characteristics. Crosslayer Design in Sensor Networks. Energy-Constrained Nodes. Wireless Sensor Networks EE360: Lecture 14 Outline Sensor Networks Announcements Progress report deadline extended to 3/ (11:59pm) nd paper summary due March 7 (extended) Project poster session March 15 5pm? Overview of sensor

More information

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits

More information

MAC Essentials for Wireless Sensor Networks

MAC Essentials for Wireless Sensor Networks MAC Essentials for Wireless Sensor Networks Abdelmalik Bachir, Mischa Dohler, Senior Member, IEEE, Thomas Watteyne, Member, IEEE, and Kin K. Leung, Fellow, IEEE Medium access control Part of the link layer

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 4 1 Announcements Project proposals. Due April 17 th. Submit by e-mail to katia@soe.ucsc.edu.

More information

Message acknowledgement and an optional beacon. Channel Access is via Carrier Sense Multiple Access with

Message acknowledgement and an optional beacon. Channel Access is via Carrier Sense Multiple Access with ZigBee IEEE 802.15.4 Emerging standard for low-power wireless monitoring and control Scale to many devices Long lifetime is important (contrast to Bluetooth) 10-75m range typical Designed for industrial

More information

Medium Access Control in Wireless Sensor Networks

Medium Access Control in Wireless Sensor Networks Medium Access Control in Wireless Sensor Networks Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 1 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired)

More information

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)

More information

MSIT 413: Wireless Technologies Week 8

MSIT 413: Wireless Technologies Week 8 MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same

More information

CSE 6811 Ashikur Rahman

CSE 6811 Ashikur Rahman Data Link layer Application Overview of IEEE 802.11 LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform address recognition and CRC validation.

More information

Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol ARTICLE International Journal of Engineering Business Management Special Issue on Radio Frequency Identification and Wireless Sensor Networks Editor: Cristina Turcu Power Saving MAC Protocols for WSNs

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

sensors ISSN

sensors ISSN Sensors 2010, 10, 2752-2769; doi:10.3390/s100402752 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Article A Time Tree Medium Access Control for Energy Efficiency and Collision Avoidance

More information

Wireless Local Area Networks (WLANs) Part I

Wireless Local Area Networks (WLANs) Part I Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

Embedded Internet and the Internet of Things WS 12/13

Embedded Internet and the Internet of Things WS 12/13 Embedded Internet and the Internet of Things WS 12/13 4. MAC Protocols Prof. Dr. Mesut Güneş Distributed, embedded Systems (DES) Institute of Computer Science Freie Universität Berlin Prof. Dr. Mesut Güneş

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

MAC protocols for ad hoc networks

MAC protocols for ad hoc networks MAC protocols for ad hoc networks Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2756/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of

More information

WP-PD Wirepas Mesh Overview

WP-PD Wirepas Mesh Overview WP-PD-123 - Wirepas Mesh Overview Product Description Version: v1.0a Wirepas Mesh is a de-centralized radio communications protocol for devices. The Wirepas Mesh protocol software can be used in any device,

More information

Outline. MAC (Medium Access Control) General MAC Requirements. Typical MAC protocols. Typical MAC protocols

Outline. MAC (Medium Access Control) General MAC Requirements. Typical MAC protocols. Typical MAC protocols Outline Medium ccess ontrol With oordinated daptive Sleeping for Wireless Sensor Networks Presented by: rik rooks Introduction to M S-M Overview S-M Evaluation ritique omparison to MW Washington University

More information

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15 Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Lecture 8 Wireless Sensor Networks: Overview

Lecture 8 Wireless Sensor Networks: Overview Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam

More information

Energy and Rate based MAC Protocol for Wireless Sensor Networks

Energy and Rate based MAC Protocol for Wireless Sensor Networks Energy and Rate based MAC Protocol for Wireless Sensor Networks Rajgopal Kannan Ram Kalidindi S. S. Iyengar Department of Computer Science Louisiana State University Baton Rouge, LA 70803 Email: rkannan@bit.csc.lsu.edu

More information

CS4516 Advanced Computer Networks. Final Review

CS4516 Advanced Computer Networks. Final Review Final Review ------------------------------ Final Material Begins Here --------------------------- V. Local Area Networks A. "The Channel Allocation Problem" 1. assumptions B. LAN Performance Notation

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11

More information

Event-driven MAC Protocol For Dual-Radio Cooperation

Event-driven MAC Protocol For Dual-Radio Cooperation Event-driven MAC Protocol For Dual-Radio Cooperation Wireless and Mobile Communications Group (WMC) Department of Telecommunications Faculty of Electrical Engineering, Mathematics and Computer Science

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Enabling Technologies

Enabling Technologies Enabling Technologies Part 4 Mobile Ad Hoc Networking Wuhan University Why Enable? Reliable point-to-point communication via media access control (MAC) Challenges in medium share Categories of MAC protocols

More information

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information