Presenter: Gurjot Singh

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 9 Fundamentals.
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Chorus: Collision Resolution for Efficient Wireless Broadcast Xinyu Zhang, Kang G. Shin University of Michigan 1.
Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3f: Medium Access Control Protocols.
Medium Access Issues David Holmer
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Multiple access What if multiple machines are sharing the same link?
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
Medium Access Control in Wireless Sensor Networks.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
KING FAHD UNIVIRSITY OF PETROLEUM AND MIERALS ELECTRICAL ENGINEERING DEPARTMENT MAC Protocols in ad hoc networks Rami Bakhsh Mohammed Al-Farsi.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
A Survey on Energy Efficient MAC Protocol for Wireless Sensor Networks Huma Naushad.
Isolation of Wireless Ad hoc Medium Access Mechanisms under TCP Ken Tang,Mario Correa,Mario Gerla Computer Science Department,UCLA.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Opersating Mode DCF: distributed coordination function
1 SenMetrics’05, San Diego, 07/21/2005 SOSBRA: A MAC-Layer Retransmission Algorithm Designed for the Physical-Layer Characteristics of Clustered Sensor.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
K. Banerjee, P. Basuchaudhuri, D. Sadhukhan and N. Das
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Computer Networking Lecture 6 – MAC. 2 Readings [E.2] V. Bharghavan, A. Demers, S. Shenker, and L. Zhang. MACAW: A Media Access Protocol for.
A SURVEY OF MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
Fundamentals of Computer Networks ECE 478/578
Token-DCF, COMSNET(2013) -> MOBICOM(2014). Introduction ▣ To improve standard MAC protocol of IEEE for WLAN. ▣ S-MAC, A-MAC, SPEED-MAC, and etc.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
Improving the scalability of MAC protocols in Wireless Mesh Networks Mthulisi Velempini (Mr.)
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
Medium Access Control in Wireless networks
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
0.1 IT 601: Mobile Computing MAC Protocols Prof. Anirudha Sahoo IIT Bombay.
2012 1/6 NSDI’08 Harnessing Exposed Terminals in Wireless Networks Mythili Vutukuru, Kyle Jamieson, and Hari Balakrishnan MIT Computer Science and Artificial.
Medium Access in Sensor Networks. Presented by: Vikram Shankar.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
Network System Lab. Sungkyunkwan Univ. Differentiated Access Mechanism in Cognitive Radio Networks with Energy-Harvesting Nodes Network System Lab. Yunmin.
Wireless Networks Projects Roberto Riggio, PhD CREATE-NET Via Alla Cascata 56/c 38123, Povo (TN)
1 Wireless Networking Understanding the departure from wired networks, Case study: IEEE (WiFi)
MAC Protocols for Sensor Networks
Multiple Access Methods
Wireless Sensor Networks 4. Medium Access
Outline What is Wireless LAN Wireless Transmission Types
Wireless MAC.
Chapter 12 Multiple Access.
Medium Access Control MAC protocols: design goals, challenges,
Lab 7 – CSMA/CD (Data Link Layer Layer)
CT301 LECTURE 8.
Contention-based protocols with Reservation Mechanisms
SENSYS Presented by Cheolki Lee
MACAW: A Media Access Protocol for Wireless LANs
TCP and MAC interplay in Wireless Ad Hoc Networks
Subject Name: Computer Communication Networks Subject Code: 10EC71
Multiple Access Methods
Goal Control the amount of traffic in the network
Department of Computer Science Southern Illinois University Carbondale CS441-Mobile & Wireless Computing IEEE Standard.
He Xiaoben Further study of multi-hop communications - modeling the hidden terminal problem He Xiaoben
Performance Evaluation of an Integrated-service IEEE Network
Wireless LAN Simulation IEEE MAC Protocol
Subject Name: Adhoc Networks Subject Code: 10CS841
Multiple Access Methods
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Presenter: Gurjot Singh Energy Conservation and Collision Avoidance by Controlled Access Protocol in WSN Presenter: Gurjot Singh

CHALLENGES There is a huge significance noticed for WSN since its inception. It is due to the variety of applications that WSN support. But WSN primarily suffers from less battery capability of nodes. Replacing the battery is not feasible. Due to this problem, the research fraternity, is trying to adopt the techniques which can minimize its consumption.

CHALLENGES Contd. Proper utilization of allocated bandwidth. No coordination can lead to use of same channel by two nodes. It will result in collisions due to data transmission in same channel leading to: (a) Collisions (b) Wastage of Bandwidth (c) Loss of Energy at node end due to retransmissions

NEED A mechanism through which they can coordinate themselves to avoid collisions. A mechanism to conserve energy at node end.

MAC PROTOCOL The role of MAC protocol is to provide media access to various devices. Variety of MAC PROTOCOLS: Random Access Protocols Controlled Access Protocols

PRIME FOCUS Energy Conservation during MAC operation helps significantly to increase the node and network lifetime.

Limitations of Existing MAC Protocols In random access protocols (CSMA etc.) problems like hidden node and exposed node problem exists. These issues results in great loss of energy due to collisions and also disrupt the operation. Back off slots are used in CSMA/CA to avoid collisions but it leads to more delay and possibility of data loss.

Fig. 1. Low power slotted CSMA/CA operation [1] Fig. 2. Working Principle of ‘Poll’ mechanism [8]

Fig. 3. Operation of ‘MACA - BI’ Protocol [9] PROPOSED TECHNIQUE: Receiver Initiated MAC Protocol is suggested. MACA-BI (Multiple Access with Collision Avoidance – By Invitation) is proposed. It is controlled access protocol where nodes can transmit data only by invitation. Fig. 3. Operation of ‘MACA - BI’ Protocol [9]

Challenges in the implementation Threat: When secondary has data to transmit but primary is not initiating the communication. Every node has limited memory capability if delay in transmission will increase probability of losing the data will also increase.

Fig. 4. Operation of ‘MACA’ Protocol [9] Solution advised MACA can be used to resolve this issue. It is a sender Initiated MAC protocol. Proposed protocol by author says: Hybrid technique = MACA(BI) + MACA (But one at a time) Fig. 4. Operation of ‘MACA’ Protocol [9]

Switching from MACA-BI to MACA Whenever the transmitting node queue length increases or packet delay exceeds certain acceptance threshold.

Fig. 6. Flow Chart of Controlled Access Protocol using MACA-BI & MACA

TABLE I. Current & Power Consumption of node [4] Fig. 9. Comparison of Energy consumption Fig. 8. Collisions in Controlled Access Protocol while MACA-BI in use

TABLE II. Lifetime (WSN) using Controlled & Random Access Protocol Fig. 10. Lifetime Comparison TABLE II. Lifetime (WSN) using Controlled & Random Access Protocol

References Ashrafuzzamam K., “Energy and Throughput Optimal Operation Region in Slotted CSMA/CA Based WSN”, Communication Letters, IEEE, vol.16, no.9, pp.1524-1527, 2012. Kuntz R., Gallais A., and Noel T., “Medium access control facing the reality of WSN deployments”, ACM SIGCOMM Computer Commun. Rev., vol. 39, no. 3, pp. 22–27, 2009. Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications for low-rate Wireless Personal Area Networks (LRWPANs), IEEE Std. 802.15.4 Std., 2003. Merrett G.V., Weddell A.S., Lewis A.P., Harris N.R., Al- Hashimi B.M., and White N.M., “An Empirical Energy Model for Super capacitor Powered Wireless Nodes”, Computer Communications and Networks, vol.1, no.1, pp. 1-6, 2008.

Ling X. , Cheng Y. , Mark J. , and Shen X Ling X., Cheng Y., Mark J., and Shen X., “A renewal theory based analytical model for the contention access period of IEEE 802.15.4 MAC”, IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2340 – 2349, 2008. K. Ashrafuzzaman and Kwak K., “On the performance analysis of the contention access period of IEEE 802.15.4 MAC”, IEEE Commun. Lett., vol. 15, no. 9, pp. 986–988, 2011. Pollin S., Ergen M., and Ergen S. C., et al., “Performance analysis of slotted carrier sense IEEE 802.15.4 medium access layer”, IEEE Trans. on Wireless Communications, vol. 7, no.9, pp. 3359-3371, 2008. Forouzan B. A., “Data Communication & Networking”, 4th ed., Mc Graw Hill, pp. 380-381, 2007. Toh C. K., “Ad-Hoc Mobile Wireless Networks: Protocols and Systems”, Prentice Hall, 2001.