Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer
|
|
- Georgina Lee
- 5 years ago
- Views:
Transcription
1 Politecnico di Milano Advanced Network Technologies Laboratory Beyond Standard MAC Sublayer
2 MAC Design Approaches o Conten&on based n Allow collisions n O2en CSMA based (SMAC, STEM, Z- MAC, GeRaF, etc.) o TDMA based n Slot Synchronous n Collision free (NAMA, TRAMA, TDMA- W, SPARE- MAC, etc.) o Hybrid Some type of activity periods scheduling to spare energy
3 Energy ConsumpBon o Overhearing n hearing someone else s transmissions o Idle Listening n radio in recep&on mode but nothing fetched o Collision n unsuccessfull transmission o Control Overhead n transmission (recep&on) of signalling packets
4 S- MAC: Sensor MAC o Problem: Idle Listening consumes significant energy o Solu&on: Periodic listen and sleep listen Sleep listen Sleep o During sleeping, radio is turned off o Reduce duty cycle to ~ 10% (Listen for 120ms and sleep for 2s) Latency Energy W. Ye, et. al., Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Networks, IEEE/ACM Trans. on Networking, June 2004.
5 S- MAC: RaBonale o Each node goes into periodic sleep mode during which it switches the radio off and sets a &mer to awake later o When the &mer expires it wakes up and listens to see if any other node wants to talk to it o The dura&on of the sleep and listen cycles are applica&on dependent and they are set the same for all nodes o Requires a periodic synchroniza&on among nodes to take care of any type of clock dri2
6 Periodic Sleep and Listen o All nodes are free to choose their own listen/ sleep schedules. o To reduce control overhead, only neighboring nodes are synchronized together. o They listen at the same &me and go to sleep at the same &me.
7 SynchronizaBon o SYNC packets are exchanged periodically to maintain schedule synchroniza&on. SYNC PACKET Sender Node ID Next Sleep Time o SYNCHRONIZATION PERIOD: Period for a node to send a SYNC packet. o Receivers will adjust their &mer counters immediately a2er they receive the SYNC packet
8 PERIODIC LISTEN AND SLEEP
9 Maintaining SynchronizaBon Listen interval is divided into two parts: one for receiving SYNC packets and other for receiving RTS (Request To Send)
10 Choosing and Maintaining Schedules o Each node maintains a schedule table that stores schedules of all its known neighbors o For ini&al schedule, DO: n A node first listens to the medium for a certain amount of &me (at least the synchroniza&on period) n If it does not hear a schedule from another node, it randomly chooses a schedule and broadcasts its schedule with a SYNC packet immediately n This node is called a Synchronizer n If a node receives a schedule from a neighbor before choosing its own schedule, it just follows this neighbor s schedule, i.e. becomes a Follower and it waits for a random delay and broadcasts its schedule
11 Coordinated Sleeping o In a large network, we cannot guarantee that all nodes follow the same schedule. o The node on the border will follow both schedules. o When it broadcasts a packet, it needs to do it twice, first for nodes on schedule 1 and then for those on schedule 2. Schedule 1 Schedule 2
12 Collision Avoidance o S- MAC is based on conten&on, i.e., if mul&ple neighbors want to talk to a node at the same &me, they will try to send when the node starts listening. n Similar to IEEE802.11, i.e. use RTS/CTS mechanism to address the hidden terminal problem n Perform carrier sense before ini&a&ng a transmission
13 Virtual Carrier Sensing DIFS source RTS SIFS SIFS DATA SIFS destination CTS ACK overhearing stations NAV (RTS) NAV (CTS) Random Backoff Control packets to probe the channel RTS, CTS contain the TX dura&on Overhearing sta&ons refrain from accessing the channel by secng the NAV (Network Alloca&on Vector) RTS (Request To Send) CTS (Clear To Send) 13
14 The Virtual Carrier Sensing RTS C CTS CTS Terminal C refrains from transmitting for all the duration of the communication A-B 14
15 What do You Think of S- MAC? o Open Discussion
16 SPARE MAC Overview o Dynamic TDMA structure featuring the concept of Recep6on Schedule (RS): n Set of &me slots during which a sensor periodically ac&vates for RECEIVING data o SPARE MAC philosophy: n Each sensor is assigned a RS n Each sensors knows the RS of all its poten&al receivers I ll be available for receiving at slot k at slot k
17 SPARE MAC OperaBon & ProperBes o Fully distributed and coordinated algorithms to: n Assign RS n Spread the assignment informa&on throughout 1- hop neighbors o Each sensors theore&cally ac&vates only when: n It has traffic to send and/or receive (limited idle listening) n It actually receives the traffic des&ned to itself only (limited overhearing) n In the WUS
18 SPARE MAC framing o Slot & Frame Synchronous 1 Signalling SubFrame (SSU) Data SubFrame (DSU) N WUS M o N: # of Signaling Slots (SS) within the SSU o M: # of Data Slots (DS) within the DSU o WUS: Wake Up Slot 1 Rowe et al., RT-Link: A Time-Synchronized Link Protocol for Energy Constrained Multi-Hop Wireless Networks, IEEE SECON 2006
19 Wake Up Reliable ReservaBon ALOHA (WRR- ALOHA) o GOAL: to distribute the RS assignment throughout 1 Hop neighbors o Relies upon the transmission of reliable Broadcast Signalling Packets (BSPs) within the SSU BSP Format ID 1 N 1 M o o Frame Information (FI) Reception Schedule Information (RSI) FI specifies the status of the N slots in the SSU as observed by the sensor o BUSY correct transmission o FREE no transmission or collision RSI specifies the o The RS chosen by the sensor o The RSs of all the 1 hop neighbors of the sensor
20 WRR- ALOHA: BSP reservabon and ACKs o A Signalling Slot is RESERVED if at least one FI says BUSY AVAILABLE otherwise R A A R A R Channel Status Built up by S1 S3 S3 S2 S2 FI from S3 FI from S2 S3 S2 S1 S4 S4 FI from S4 S3 S1 S2 S4 FI from S1 o AVAILABLE slots can be used for access o The transmission is successful if the slot is coded as BUSY with the same sta&on ID in all the received FI
21 WRR- ALOHA: Energy Efficiency o BSP transmission is triggered by the ac&vity perceived in the WUS o All the sensors are ac&ve in the WUS Node 3 Wakes Up Nodes go to sleep W 1 2 W W SSU DSU
22 RS Scheduling and Data Transfer o RS Assignment Solu&ons n 1 HOP AWARE: RS is chosen not to overlap with RS of 1 hop neighbors o Collision Recovery Algorithms (CRAs) n Binary Exponen&al Back- off: o access &me (in frames) a2er i consecu&ve collisions is = rand [1,2 k 10 2 i ] if i 10 otherwise
23 SPARE MAC Dimensioning o Performances depends on: n Frame Length n Traffic dynamics (collisions) n CRAs o Design should account for: n Energy consump&on n Delivery delays n Applica&on requirements
24 Maximum Achievable Data rate o The maximum achievable data rate (R max ) is given by: BRS R (1) max= NT + MT + T o Being: SS DS WUS n B RS the payload length of the RS [bit] n T SS T DS and T WUS the dura&on of SS, DS and WUS respec&vely [s] n N the number of slot within the SSU n M the number of slots within the DSU o Problem: how to set N and M?
25 Dimensioning Guidelines o N N min n N min depends on the topology of the WSN (all sensors within a two hop cluster must have a unique BSP) o Once N is fixed, e.g.: cluster clouds,n min =7 M M min M max where n M max depends on the data rate required by the specific applica&on (1) n M min depends on the specific topology (a sensors must not have the same RS as any other sensor within the same one hop cluster) e.g.: Grid, M min = 2
26 R max vs M Bandwidth SS length DS length WUS length 250 kb/s 50 byte 560 byte 9 byte o Maximum RS data rate decreases with M and N
27 Energy Analysis (1) o o o It is worth having quan&ta&ve means to determine the energy efficiency Assump&ons: 1. In the generic slot i a sensor can be: o Idle (id) o Receiving (rx) o Transmicng (tx) o Sleeping (sl) 2. Traffic generated by a specific sensor toward each receiver is Poisson distributed with parameters G t 3. Overall received traffic by a specific sensor is Poisson deistributed with parameter and G r 4. RS =1 From assump&on 2 and 3, the total offered traffic in transmission (G t* ) and recep&on (G r* ) is given by: G * r = e G G G G r r * t * t * G * G r 1 G r e t 1 = G t G * t
28 Energy Analysis (2) o The power consumed within a frame depends whether the sensor is: transmicng and/or receiving or idle o The probability for a sensor to be transmicng towards i out of R recipients in DSU is: p tx (i) p = rx R * * G t G t (N i) i (0) = e ( 1 e G ) e 0 i * * r G r p rx (1) = 1- e R, R M 1 o The probability for a sensor to be receiving from j є {0.1} in DSU is: o The joint probability of transmitting to i recipients and receiving from j transmitter in DSU is: p tx(i),rx(j) = p (i) p (j) tx rx 0 i R, j {0,1}
29 Energy Analysis (3) o o o o The average consumed energy in a frame can be es&mated as: E f j= 0 i= 0 being E(i; j) the energy consumed in a frame when transmicng to i recipients and receiving from j transmirers E(i, j) = e x y is the energy consumed in state y є {rx, tx, id, sl} in a slot of type x є {signalling (s), data (d), wake- up (w)} The average consumed power per frame is: = i e rx s 1 + R j e p tx s + (M i P = f E + f T frame tx(i),rx(j) (N i j)e sl d + i e E(i, j)e tx d sl s + j) + e j e id w rx d +
30 SimulaBon Analysis o Proofs with ns2.29 in fully connected WSNs (a) and covergecast WSNs (b) a) b) o The measured confidence index for all collected sta&s&cs is below 5% in 98% of all cases PARAMETER Simulation Run Length Bandwidth Packet Length SS length DS length WUS length Ptx Prx, Pid Psleep VALUE 1000 [s] 250 [kb/s] 512 [byte] 50 [byte] 560 [byte] 9 [byte] 24 [mw] 13.5 [mw] 5 [uw]
31 Power Model o Consumed power decreases with M
32 SPARE MAC vs SMAC o Objec&ve: spare energy o SPARE MAC outperforms SMAC in terms of consumed power
33 What do You Think of SPARE- MAC? o Open Discussion
INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster
INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise
More informationIncreasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More informationUtilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks
Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,
More informationUltra-Low Duty Cycle MAC with Scheduled Channel Polling
Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye and John Heidemann CS577 Brett Levasseur 12/3/2013 Outline Introduction Scheduled Channel Polling (SCP-MAC) Energy Performance Analysis Implementation
More informationAS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks
AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks By Beakcheol Jang, Jun Bum Lim, Mihail Sichitiu, NC State University 1 Presentation by Andrew Keating for CS577 Fall 2009 Outline
More informationWireless Networked Systems
Wireless Networked Systems CS 795/895 - Spring 2013 Lec #4: Medium Access Control Power/CarrierSense Control, Multi-Channel, Directional Antenna Tamer Nadeem Dept. of Computer Science Power & Carrier Sense
More informationAdaptation of MAC Layer for QoS in WSN
Adaptation of MAC Layer for QoS in WSN Sukumar Nandi and Aditya Yadav IIT Guwahati Abstract. In this paper, we propose QoS aware MAC protocol for Wireless Sensor Networks. In WSNs, there can be two types
More informationEnergy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks
Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wendi B. Heinzelman Department of Electrical and Computer
More informationFine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012
Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel
More informationUltra-Low Duty Cycle MAC with Scheduled Channel Polling
USC/ISI Technical Report ISI-TR-64, July 25. This report is superseded by a later version published at ACM SenSys 6. 1 Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye and John Heidemann
More informationJinbao Li, Desheng Zhang, Longjiang Guo, Shouling Ji, Yingshu Li. Heilongjiang University Georgia State University
Jinbao Li, Desheng Zhang, Longjiang Guo, Shouling Ji, Yingshu Li Heilongjiang University Georgia State University Outline Introduction Protocols Design Theoretical Analysis Performance Evaluation Conclusions
More informationLecture on Sensor Networks
Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU
More information% 4 (1 $ $ ! " ( # $ 5 # $ % - % +' ( % +' (( % -.
! " % - % 2 % % 4 % % & % ) % * %, % -. % -- % -2 % - % -4 % - 0 "" 1 $ (1 $ $ (1 $ $ ( # $ 5 # $$ # $ ' ( (( +'! $ /0 (1 % +' ( % +' ((!1 3 0 ( 6 ' infrastructure network AP AP: Access Point AP wired
More informationEnergy Efficient MAC Protocol with Localization scheme for Wireless Sensor Networks using Directional Antennas
Energy Efficient MAC Protocol with Localization scheme for Wireless Sensor Networks using Directional Antennas Anique Akhtar Department of Electrical Engineering aakhtar13@ku.edu.tr Buket Yuksel Department
More informationWUR-MAC: Energy efficient Wakeup Receiver based MAC Protocol
WUR-MAC: Energy efficient Wakeup Receiver based MAC Protocol S. Mahlknecht, M. Spinola Durante Institute of Computer Technology Vienna University of Technology Vienna, Austria {mahlknecht,spinola}@ict.tuwien.ac.at
More informationStarvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks
Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Jingpu Shi Theodoros Salonidis Edward Knightly Networks Group ECE, University Simulation in single-channel multi-hop
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 2 Medium Access Control (MAC) Schemes Course Instructor: Dr. Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents Why Multiple Access Random Access Aloha Slotted
More informationMobile Communications
COMP61242 Mobile Communications Lecture 7 Multiple access & medium access control (MAC) Barry Cheetham 16/03/2018 Lecture 7 1 Multiple access Communication links by wire or radio generally provide access
More informationIlenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello
Ilenia Tinnirello Ilenia.tinnirello@tti.unipa.it WaveLAN (AT&T)) HomeRF (Proxim)!" # $ $% & ' (!! ) & " *" *+ ), -. */ 0 1 &! ( 2 1 and 2 Mbps operation 3 * " & ( Multiple Physical Layers Two operative
More informationExercise Data Networks
(due till January 19, 2009) Exercise 9.1: IEEE 802.11 (WLAN) a) In which mode of operation is this network in? b) Why is the start of the back-off timers delayed until the DIFS contention phase? c) How
More informationIN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes
IN4181 Lecture 2 Ad-hoc and Sensor Networks Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes Outline: discuss impact of wireless Ad-hoc networks link layer: medium access control network layer:
More informationWireless Communication
Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Fine-Grained Channel Access in Wireless LAN (SIGCOMM 10) Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Physical-Layer Data Rate PHY
More informationCS434/534: Topics in Networked (Networking) Systems
CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/
More informationMedium Access Control
CMPE 477 Wireless and Mobile Networks Medium Access Control Motivation for Wireless MAC SDMA FDMA TDMA CDMA Comparisons CMPE 477 Motivation Can we apply media access methods from fixed networks? Example
More informationDOPPLER SHIFT. Thus, the frequency of the received signal is
DOPPLER SHIFT Radio Propagation Doppler Effect: When a wave source and a receiver are moving towards each other, the frequency of the received signal will not be the same as the source. When they are moving
More informationDesign of an energy efficient Medium Access Control protocol for wireless sensor networks. Thesis Committee
Design of an energy efficient Medium Access Control protocol for wireless sensor networks Thesis Committee Masters Thesis Defense Kiran Tatapudi Dr. Chansu Yu, Dr. Wenbing Zhao, Dr. Yongjian Fu Organization
More informationMultiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks
Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Bernhard Firner Chenren Xu Yanyong Zhang Richard Howard Rutgers University, Winlab May 10, 2011 Bernhard Firner (Winlab)
More informationAchieving Network Consistency. Octav Chipara
Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures
More informationHeterogenous Quorum-based Wakeup Scheduling for Duty-Cycled Wireless Sensor Networks
Heterogenous Quorum-based Wakeup Scheduling for Duty-Cycled Wireless Sensor Networks Shouwen Lai Dissertation submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial
More informationInternet of Things Prof. M. Cesana. Exam June 26, Family Name Given Name Student ID 3030 Course of studies 3030 Total Available time: 2 hours
Internet of Things Prof. M. Cesana Exam June 26, 2011 Family Name Given Name John Doe Student ID 3030 Course of studies 3030 Total Available time: 2 hours E1 E2 E3 Questions Questions OS 1 Exercise (8
More informationMedium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller
Wireless Networks: Medium Access Control Guevara Noubir Slides adapted from Mobile Communications by J. Schiller S200, COM3525 Wireless Networks Lecture 4, Motivation Can we apply media access methods
More informationLower Layers PART1: IEEE and the ZOLERTIA Z1 Radio
Slide 1 Lower Layers PART1: IEEE 802.15.4 and the ZOLERTIA Z1 Radio Jacques Tiberghien Kris Steenhaut Remark: all numerical data refer to the parameters defined in IEEE802.15.4 for 32.5 Kbytes/s transmission
More informationChapter 2 Overview. Duplexing, Multiple Access - 1 -
Chapter 2 Overview Part 1 (2 weeks ago) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (last week) Modulation, Coding, Error Correction Part 3
More informationThe Long Range Wide Area Network - LoraWAN
Politecnico di Milano Advanced Network Technologies Laboratory The Long Range Wide Area Network - LoraWAN https://www.lora-alliance.org/ 1 Lang Range Communication Technologies Wi-Fi HaLow 2 Cellular IoT
More informationENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationChapter 4: Directional and Smart Antennas. Prof. Yuh-Shyan Chen Department of CSIE National Taipei University
Chapter 4: Directional and Smart Antennas Prof. Yuh-Shyan Chen Department of CSIE National Taipei University 1 Outline Antennas background Directional antennas MAC and communication problems Using Directional
More informationEnergy-Efficient Communication Protocol for Wireless Microsensor Networks
Energy-Efficient Communication Protocol for Wireless Microsensor Networks Wendi Rabiner Heinzelman Anatha Chandrasakan Hari Balakrishnan Massachusetts Institute of Technology Presented by Rick Skowyra
More informationChapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA
Mobile Communications Chapter 3 : Media Access Motivation Collision avoidance, MACA SDMA, FDMA, TDMA Polling Aloha CDMA Reservation schemes SAMA Comparison Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/
More informationOptimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer
Optimal Clock Synchronization in Networks Christoph Lenzen Philipp Sommer Roger Wattenhofer Time in Sensor Networks Synchronized clocks are essential for many applications: Sensing TDMA Localization Duty-
More informationFiber Distributed Data Interface
Fiber istributed ata Interface FI: is a 100 Mbps fiber optic timed token ring LAN Standard, over distance up to 200 km with up to 1000 stations connected, and is useful as backbone Token bus ridge FI uses
More informationOutline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review
EEC-484/584 Computer Networks Lecture 8 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Homework #1 Review Protocol verification Example
More informationLecture 8 Mul+user Systems
Wireless Communications Lecture 8 Mul+user Systems Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Fall 2014 Outline Multiuser Systems (Chapter 14 of Goldsmith
More informationMultiple Access Methods
Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Multiple Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 16.11.2004 Content of presentation Protocol
More informationWireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN
Wireless LANs Mobility Flexibility Hard to wire areas Reduced cost of wireless systems Improved performance of wireless systems Wireless LAN Applications LAN Extension Cross building interconnection Nomadic
More informationMultiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic
1 Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, 6.4.2 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Medium Sharing Techniques Static Channelization FDMA TDMA Attempt to produce an orderly access
More informationMAC Protocol with Regression based Dynamic Duty Cycle Feature for Mission Critical Applications in WSN
MAC Protocol with Regression based Dynamic Duty Cycle Feature for Mission Critical Applications in WSN Gayatri Sakya Department of Electronics and Communication Engineering JSS Academy of Technical Education,
More informationLecture 8: Media Access Control
Lecture 8: Media Access Control CSE 123: Computer Networks Alex C. Snoeren HW 2 due NEXT WEDNESDAY Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing
More informationAn Adaptable Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks
An Adaptable Energy-Efficient ium Access Control Protocol for Wireless Sensor Networks Justin T. Kautz 23 rd Information Operations Squadron, Lackland AFB TX Justin.Kautz@lackland.af.mil Barry E. Mullins,
More informationMobile Computing. Chapter 3: Medium Access Control
Mobile Computing Chapter 3: Medium Access Control Prof. Sang-Jo Yoo Contents Motivation Access methods SDMA/FDMA/TDMA Aloha Other access methods Access method CDMA 2 1. Motivation Can we apply media access
More informationICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa
ICT 5305 Mobile Communications Lecture - 4 April 2016 Dr. Hossen Asiful Mustafa Media Access Motivation Can we apply media access methods from fixed networks? Example CSMA/CD Carrier Sense Multiple Access
More informationA MAC protocol for full exploitation of Directional Antennas in Ad-hoc Wireless Networks
A MAC protocol for full exploitation of Directional Antennas in Ad-hoc Wireless Networks Thanasis Korakis Gentian Jakllari Leandros Tassiulas Computer Engineering and Telecommunications Department University
More informationPW-MMAC: Predictive-Wakeup Multi-Channel MAC Protocol for Wireless Sensor Networks
26 UKSim-AMSS 8th International Conference on Computer Modelling and Simulation : Predictive-Wakeup Multi-Channel MAC Protocol for Wireless Sensor Networks Shagufta Henna Computer Science Department Bahria
More informationWi-Fi. Wireless Fidelity. Spread Spectrum CSMA. Ad-hoc Networks. Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering
Wi-Fi Wireless Fidelity Spread Spectrum CSMA Ad-hoc Networks Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering Outline for Today We learned how to setup a WiFi network. This
More informationCellular systems 02/10/06
Cellular systems 02/10/06 Cellular systems Implements space division multiplex: base station covers a certain transmission area (cell) Mobile stations communicate only via the base station Cell sizes from
More informationDiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers
DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers Kwang-il Hwang, Kyung-tae Kim, and Doo-seop Eom Department of Electronics and Computer Engineering, Korea University 5-1ga,
More informationAn Improved MAC Model for Critical Applications in Wireless Sensor Networks
An Improved MAC Model for Critical Applications in Wireless Sensor Networks Gayatri Sakya Vidushi Sharma Trisha Sawhney JSSATE, Noida GBU, Greater Noida JSSATE, Noida, ABSTRACT The wireless sensor networks
More informationWireless Intro : Computer Networking. Wireless Challenges. Overview
Wireless Intro 15-744: Computer Networking L-17 Wireless Overview TCP on wireless links Wireless MAC Assigned reading [BM09] In Defense of Wireless Carrier Sense [BAB+05] Roofnet (2 sections) Optional
More informationLecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage
Lecture 8: Media Access Control CSE 123: Computer Networks Stefan Savage Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing mechanisms Contention-based
More informationGuaranteeing the network lifetime in wireless sensor networks: A MAC layer approach
Computer Communications 3 (27) 2532 2545 www.elsevier.com/locate/comcom Guaranteeing the network lifetime in wireless sensor networks: A MAC layer approach Yongsub Nam a, Taekyoung Kwon b, *, Hojin Lee
More informationMedium Access Methods. Lecture 9
Medium Access Methods Lecture 9 Medium Access Control Medium Access Control (MAC) is the method that defines a procedure a station should follow when it needs to send a frame or frames. The use of regulated
More informationTIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS
TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering
More informationCellular Networks and Mobile Compu5ng COMS , Fall 2012
Cellular Networks and Mobile Compu5ng COMS 6998-11, Fall 2012 Instructor: Li Erran Li (lierranli@cs.columbia.edu) hlp://www.cs.columbia.edu/~lierranli/ coms6998-11/ 9/4/2012: Introduc5on to Cellular Networks
More informationECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III
ECE 333: Introduction to Communication Networks Fall 200 Lecture 5: Medium Access Control III CSMA CSMA/CD Carrier Sense Multiple Access (CSMA) In studying Aloha, we assumed that a node simply transmitted
More informationIEEE ax / OFDMA
#WLPC 2018 PRAGUE CZECH REPUBLIC IEEE 802.11ax / OFDMA WFA CERTIFIED Wi-Fi 6 PERRY CORRELL DIR. PRODUCT MANAGEMENT 1 2018 Aerohive Networks. All Rights Reserved. IEEE 802.11ax Timeline IEEE 802.11ax Passed
More informationA Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in ac Networks
1 A Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in 82.11ac Networks Seowoo Jang, Student Member, Saewoong Bahk, Senior Member Abstract The major goal of IEEE 82.11ac
More informationFunneling-MAC: A Localized, Sink-Oriented MAC For Boosting Fidelity in Sensor Networks
Funneling-MAC: A Localized, Sink-Oriented MAC For Boosting Fidelity in Sensor Networks Gahng-Seop Ahn, Emiliano Miluzzo, Andrew T. Campbell Se Gi Hong, Francesca Cuomo EE Dept., Columbia University CS
More informationSynchronization and Beaconing in IEEE s Mesh Networks
Synchronization and Beaconing in IEEE 80.s Mesh etworks Alexander Safonov and Andrey Lyakhov Institute for Information Transmission Problems E-mails: {safa, lyakhov}@iitp.ru Stanislav Sharov Moscow Institute
More informationEnhancement of Wide Bandwidth Operation in IEEE ac Networks
Enhancement of Wide Bandwidth Operation in IEEE 82.11ac Networks Seongho Byeon, Changmok Yang, Okhwan Lee, Kangjin Yoon and Sunghyun Choi Department of ECE and INMC, Seoul National University, Seoul, Korea
More informationENERGY-CONSTRAINED networks, such as wireless
366 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 7, NO. 8, AUGUST 8 Energy-Efficient Cooperative Communication Based on Power Control and Selective Single-Relay in Wireless Sensor Networks Zhong
More informationMobile and Sensor Systems. Lecture 6: Sensor Network Reprogramming and Mobile Sensors Dr Cecilia Mascolo
Mobile and Sensor Systems Lecture 6: Sensor Network Reprogramming and Mobile Sensors Dr Cecilia Mascolo In this lecture We will describe techniques to reprogram a sensor network while deployed. We describe
More informationPULSE: A MAC Protocol for RFID Networks
PULSE: A MAC Protocol for RFID Networks Shailesh M. Birari and Sridhar Iyer K. R. School of Information Technology Indian Institute of Technology, Powai, Mumbai, India 400 076. (e-mail: shailesh,sri@it.iitb.ac.in)
More informationData Dissemination in Wireless Sensor Networks
Data Dissemination in Wireless Sensor Networks Philip Levis UC Berkeley Intel Research Berkeley Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Sensor Networks Sensor networks
More informationSeminar on Low Power Wide Area Networks
Seminar on Low Power Wide Area Networks Luca Feltrin RadioNetworks, DEI, Alma Mater Studiorum - Università di Bologna Technologies Overview State of the Art Long Range Technologies for IoT Cellular Band
More informationPerformance of ALOHA and CSMA in Spatially Distributed Wireless Networks
Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,
More informationEvaluation of the 6TiSCH Network Formation
Evaluation of the 6TiSCH Network Formation Dario Fanucchi 1 Barbara Staehle 2 Rudi Knorr 1,3 1 Department of Computer Science University of Augsburg, Germany 2 Department of Computer Science University
More informationStochastic Modelling for Wireless Communication Networks-Multiple Access Methods.
Stochastic Modelling for Wireless Communication etworks-multiple Access Methods. By Hassan KHALIL U.U.D.M. Project Report 2003: **** Examensarbete i matematisk statistik 20 poäng Handledare och examinator:
More informationCognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks
Cognitive Wireless Network 15-744: Computer Networking L-19 Cognitive Wireless Networks Optimize wireless networks based context information Assigned reading White spaces Online Estimation of Interference
More informationDeployment Design of Wireless Sensor Network for Simple Multi-Point Surveillance of a Moving Target
Sensors 2009, 9, 3563-3585; doi:10.3390/s90503563 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Article Deployment Design of Wireless Sensor Network for Simple Multi-Point Surveillance
More informationData Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1
Data Gathering Chapter 4 Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Environmental Monitoring (PermaSense) Understand global warming in alpine environment Harsh environmental conditions Swiss made
More informationThe Armstrong Project Technical Report
The Armstrong Project Technical Report : A Localized, Sink-Oriented MAC For Boosting Fidelity in Sensor Networks Gahng-Seop Ahn, Emiliano Miluzzo, Andrew T. Campbell, Se Gi Hong, and Francesca Cuomo CU/EE/TAP-TR-26-8-3
More informationFeasibility and Benefits of Passive RFID Wake-up Radios for Wireless Sensor Networks
Feasibility and Benefits of Passive RFID Wake-up Radios for Wireless Sensor Networks He Ba, Ilker Demirkol, and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester
More information1. Introduction 1.2 Medium Access Control. Prof. JP Hubaux
1. Introduction 1.2 Medium Access Control Prof. JP Hubaux 1 Modulation and demodulation (reminder) analog baseband digital signal data digital analog 101101001 modulation modulation radio transmitter radio
More informationAdapting to the Wireless Channel: SampleRate
Adapting to the Wireless Channel: SampleRate Brad Karp (with slides contributed by Kyle Jamieson) UCL Computer Science CS M38 / GZ6 27 th January 216 Today 1. Background: digital communications Modulation
More informationEFFECT OF DUTY CYCLE ON ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS
EFFECT OF DUTY CYCLE ON ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS Jyoti Saraswat 1, and Partha Pratim Bhattacharya 2 Department of Electronics and Communication Engineering Faculty of Engineering
More informationMultiple Access Schemes
Multiple Access Schemes Dr Yousef Dama Faculty of Engineering and Information Technology An-Najah National University 2016-2017 Why Multiple access schemes Multiple access schemes are used to allow many
More informationDEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks
DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia Wireless Sensor Networks
More informationWireless Sensor Networks
DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia June 19, 2007 Wireless
More informationMedium Access Control Protocol for WBANS
Medium Access Control Protocol for WBANS Using the slides presented by the following group: An Efficient Multi-channel Management Protocol for Wireless Body Area Networks Wangjong Lee *, Seung Hyong Rhee
More informationLink Layer Support for Unified Radio Power Management In Wireless Sensor Networks
Washington University in St. Louis Washington University Open Scholarship All Computer Science and Engineering Research Computer Science and Engineering Report Number: WUCSE-26-63 26-1-1 Link Layer Support
More informationODMAC: An On Demand MAC Protocol for Energy Harvesting Wireless Sensor Networks
ODMAC: An On Demand MAC Protocol for Energy Harvesting Wireless Sensor Networks Xenofon Fafoutis DTU Informatics Technical University of Denmark xefa@imm.dtu.dk Nicola Dragoni DTU Informatics Technical
More informationMASTER OF SCIENCE IN ELECTRICAL ENGINEERING CLEVELAND STATE UNIVERSITY
DESIGN OF AN ENERGY EFFICIENT MAC PROTOCOL FOR SINK BASED WIRELESS SENSOR NETWORKS KIRAN TATAPUDI Bachelor of Technology in Electrical and Electronics Engineering Jawaharlal Nehru Technological University
More informationABSTRACT. XIA, HENG. Energy Consumption in UWB-based Wireless Sensor Networks: A Cross Layer Analysis. (Under the direction of Dr. Arne A. Nilsson.
ABSTRACT XIA, HENG. Energy Consumption in UWB-based Wireless Sensor Networks: A Cross Layer Analysis. (Under the direction of Dr. Arne A. Nilsson.) In recent years, technology advances have made possible
More informationPMAC: An adaptive energy-efficient MAC protocol for Wireless Sensor Networks
PMAC: An adaptive energy-efficient MAC protocol for Wireless Sensor Networks Tao Zheng School of Computer Science University of Oklahoma Norman, Oklahoma 7309 65 Email: tao@ou.edu Sridhar Radhakrishnan
More informationWireless Network Security Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like
More informationWireless Transmission & Media Access
Wireless Transmission & Media Access Signals and Signal Propagation Multiplexing Modulation Media Access 1 Significant parts of slides are based on original material by Prof. Dr.-Ing. Jochen Schiller,
More informationA survey on broadcast protocols in multihop cognitive radio ad hoc network
A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels
More informationAn Empirical Study of Harvesting-Aware Duty Cycling in Sustainable Wireless Sensor Networks
An Empirical Study of Harvesting-Aware Duty Cycling in Sustainable Wireless Sensor Networks Pius Lee Mingding Han Hwee-Pink Tan Alvin Valera Institute for Infocomm Research (I2R), A*STAR 1 Fusionopolis
More informationOPTIMAL ACCESS POINT SELECTION AND CHANNEL ASSIGNMENT IN IEEE NETWORKS. Sangtae Park, B.S. Thesis Prepared for the Degree of MASTER OF SCIENCE
OPTIMAL ACCESS POINT SELECTION AND CHANNEL ASSIGNMENT IN IEEE 802.11 NETWORKS Sangtae Park, B.S. Thesis Prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS December 2004 APPROVED: Robert
More informationPerformance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic
International Journal of Computer Science & Communication Vol. 1, No. 1, January-June 2010, pp. 67-71 Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic Dhiraj
More informationMultiple access techniques
Multiple access techniques Narrowband and wideband systems FDMA TDMA CDMA /FHMA SDMA Random-access techniques Summary Wireless Systems 2015 Narrowband and wideband systems Coherence BW B coh 1/σ τ σ τ
More information