Exercises of lecture Wireless Sensor Networks Winter 2006/2007 Sheet 4

Similar documents
Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

The Link Layer and LANs. Chapter 6: Link layer and LANs

Aloha and slotted aloha

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

ECE/CSC 570 Section 001. Final test. December 11, 2006

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Ethernet. Introduction. CSE 3213 Fall 2011

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

ECE 4450:427/527 - Computer Networks Spring 2017

MAC LAYER. Murat Demirbas SUNY Buffalo

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

CMPE 257: Wireless and Mobile Networking

CS 455/555 Intro to Networks and Communications. Link Layer

Random Assignment Protocols

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

LAN PROTOCOLS. Beulah A AP/CSE

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Multiple Access Protocols

Principles of Wireless Sensor Networks

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

CMPE 257: Wireless and Mobile Networking

Wireless Sensor Networks 7th Lecture

ECE 358 MAC Examples. Xuemin (Sherman) Shen Office: EIT 4155 Phone: x

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

EE 122: Ethernet and

Chapter 5: Link layer

MAC Essentials for Wireless Sensor Networks

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

EL2745 Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Chapter 5 Link Layer and LANs

Wireless Sensor Networks 8th Lecture

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Medium Access Control in Wireless Sensor Networks

Multiple Access. Data Communications and Networking

CSC 4900 Computer Networks: The Link Layer

Medium Access Control in Wireless IoT. Davide Quaglia, Damiano Carra

Medium Access Control in Wireless Sensor Networks

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2

Mobile Communications Chapter 3 : Media Access

Data and Computer Communications

Chapter 6 Medium Access Control Protocols and Local Area Networks

Data Link Layer: Multi Access Protocols

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

CSE 461: Wireless Networks

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks

Links. CS125 - mylinks 1 1/22/14

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

CSCI 466 Midterm Networks Fall 2011

ECEN 5032 Data Networks Medium Access Control Sublayer

Medium Access Control

Presented by: Murad Kaplan

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

SENSOR-MAC CASE STUDY

CSE 461: Multiple Access Networks. This Lecture

Networks Homework # 2

Direct Link Networks (II)

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Unit 7 Media Access Control (MAC)

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

CSMA/CD (Collision Detection)

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K.

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Mohamed Khedr.

Data Communications. Automatic Repeat Request Medium Access Control

Lecture 05 Chapter 16 High Speed LANs

Chapter 5 Link Layer and LANs

Wireless MACs: MACAW/802.11

UNIT IV. Data link layer protocols. Prof.Prasad S.Halgaonkar

Sample Solution to Problem Set 3

CS 3640: Introduction to Networks and Their Applications

Multiple Access in Cellular and Systems

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

CPSC 441 Tutorial-19. Department of Computer Science University of Calgary

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks

CSC 401 Data and Computer Communications Networks

COMP 361 Computer Communications Networks. Spring Semester Final Examination Solution Key

Student ID: CS457: Computer Networking Date: 5/8/2007 Name:

MAC protocols. Lecturer: Dmitri A. Moltchanov

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Link Layer and Ethernet

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Student ID: CS457: Computer Networking Date: 5/8/2007 Name:

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Protocols for Multiaccess Networks

Computer Communication III

Transcription:

Christian Schindelhauer Freiburg, 26 Nov 2006 Due until 28 Nov 2006 Exercises of lecture Wireless Sensor Networks Winter 2006/2007 Sheet 4 SECTION 1: Wireless Sensor Transceiver, Energy 1. Energy is limited in wireless sensor network. Therefore, the energy supply and consumption scheme has to be designed as efficient as possible. State the requirements for the energy module of wireless sensor network. Answers: (a) Low self-discharge (b) Long shelf live (c) Capacity under load (d) Efficient recharging at low current (e) Good relaxation properties (seeming self-recharging) (f) Voltage stability (to avoid DC-DC conversion) 2. Consider a wireless sensor network with the energy consumption for each sensor node stated as follows: Idle mode: 0,05mA CPU computation (e.g. doing calculations): 9mA Sending of wireless data: 10mA Receiving of wireless data: 5mA Based on the following scenario: Each sensor node is equipped with the battery that provides an amount of energy of 1500 mah. Assume that every node is driven with the same voltage supplied by the battery. A measurement has to be taken every 200ms. For each measurement, sending is required only once per second, and each attempt to send a packet requires the node to receive one packet. Assume that a node knows exactly when a foreign packet will arrive. Every packet length is 250 bytes and the radio bandwidth is 9600 bits/s. A single measurement takes 5ms. (a) What is the lifetime of each node?

(b) There are several influences that are not taken into account in this example. State the influences and briefly explain whether and how they reduce or extend the lifetime of the sensor node. Answers: (a) Energy for CPU processing and computation 5 samples/second x 0,005 seconds (for each measurement) x 9mA = 0,225mAs Energy for radio transmission (involves both sending and receiving) (250 bytes x 8 bit)/(9600 bits/s) x (9mA (basic consumption) + 10 ma (for sending)) + (250 bytes x 8 bit)/(9600 bits/s) x (9mA (basic consumption) + 5mA (for receiving)) = 5/24s x19ma + 5/24s x 14mA = 6,875 mas Energy consumption in idle mode First, find out the idle time within 1 second. Active time includes 0,025s for computation and processing, and 0,4167s for radio transmission within 1 second. Therefore, idle time is (1-0,025-0,4167) = 0,5583. Idle energy consumption is: 0,5583s x 0,05 ma = 0,027915 mas Total energy consumption per second 0,225mAs + 6,875mAs + 0,027915 mas = ca. 7,127915 mas Battery provides 1500mAh = 1500x60x60 mas / 7,127915 = ca. 757.584s / (60x60x24) = 8,768 days (b) Influences extending the node lifetime: Compression of redundant data was not taken into account Influences reducing the node lifetime: Temperature has impacts on the energy supply Control packets caused by routing protocol and accumulation of data were not considered In general, the lifetime of the network is not equal to the lifetime of an average node Network partition happens if sensor nodes fail and in certain cases, communications cannot be achieved Battery does not provide 1.5V of capacity all the time Retransmission may happen due to packet collisions/channel noise that will cause transmission errors

SECTION 2: MAC Layer Provide short answers for the following questions. 1. Write four major sources of energy wastage and explain them very briefly. Answer: (a) Collision: A collision is followed by backoff or/and retransmission which result in wasting energy (b) Overhearing: A node hear the data distin to some other node (c) Control overhead (Protocol overhead): Protocol overhead is induced by MACrelated control frames like RTS/CTS and furthermore by per packet overhead like packet headers and trailers. (d) Idle listening: A node being in idel state (listening medium) but is not currently receiving anything. 2. Explain briefly (not more than three sentences) that why busy tone should not be stronger or weaker than data signal? Answer: If the busy tone is too strong, more nodes than necessary suppress their transmissions. If the busy tone is too week, a node within radio range of the reciever might start data transmission and destroy the reciever s signal. 3. Following figure shows steps a CSMA protocol follow at the sender side. Draw a similar diagram for the reciever side.

Choose between true and false for the following questions. 1. MAC protocols provides medium access control mechanism when a number of nodes compete for a shared communication medium? (True/False) 2. In WSN, if a sender sense that medium is free (and suppose that condition will hold) then is that means receiver will get its transmission without facing any collisions? (True/False)

3. In Ethernet, if a sender sense that medium is free (and suppose that condition will hold) then is that means receiver will get its transmission without facing any collisions? (True/False) 4. In pure ALOHA a sender after sensing the medium immediately sends the data packet.? (True/False) 5. In slotted ALOHA a sender can send only at the beginning of a time slot and wait otherwise? (True/False) 6. In persistent CSMA, a node wait for random amount of time after last collision before sensing the channel again? (True/False) 7. In p-persistent CSMA, a node decide to transfer with probability p on current time slot? (True/False)