Download presentation
Presentation is loading. Please wait.
1
Presenter: Gurjot Singh
Energy Conservation and Collision Avoidance by Controlled Access Protocol in WSN Presenter: Gurjot Singh
2
CHALLENGES There is a huge significance noticed for WSN since its inception. It is due to the variety of applications that WSN support. But WSN primarily suffers from less battery capability of nodes. Replacing the battery is not feasible. Due to this problem, the research fraternity, is trying to adopt the techniques which can minimize its consumption.
3
CHALLENGES Contd. Proper utilization of allocated bandwidth.
No coordination can lead to use of same channel by two nodes. It will result in collisions due to data transmission in same channel leading to: (a) Collisions (b) Wastage of Bandwidth (c) Loss of Energy at node end due to retransmissions
4
NEED A mechanism through which they can coordinate themselves to avoid collisions. A mechanism to conserve energy at node end.
5
MAC PROTOCOL The role of MAC protocol is to provide media access to various devices. Variety of MAC PROTOCOLS: Random Access Protocols Controlled Access Protocols
6
PRIME FOCUS Energy Conservation during MAC operation helps significantly to increase the node and network lifetime.
7
Limitations of Existing MAC Protocols
In random access protocols (CSMA etc.) problems like hidden node and exposed node problem exists. These issues results in great loss of energy due to collisions and also disrupt the operation. Back off slots are used in CSMA/CA to avoid collisions but it leads to more delay and possibility of data loss.
8
Fig. 1. Low power slotted CSMA/CA operation [1]
Fig. 2. Working Principle of ‘Poll’ mechanism [8]
9
Fig. 3. Operation of ‘MACA - BI’ Protocol [9]
PROPOSED TECHNIQUE: Receiver Initiated MAC Protocol is suggested. MACA-BI (Multiple Access with Collision Avoidance – By Invitation) is proposed. It is controlled access protocol where nodes can transmit data only by invitation. Fig. 3. Operation of ‘MACA - BI’ Protocol [9]
10
Challenges in the implementation
Threat: When secondary has data to transmit but primary is not initiating the communication. Every node has limited memory capability if delay in transmission will increase probability of losing the data will also increase.
11
Fig. 4. Operation of ‘MACA’ Protocol [9]
Solution advised MACA can be used to resolve this issue. It is a sender Initiated MAC protocol. Proposed protocol by author says: Hybrid technique = MACA(BI) + MACA (But one at a time) Fig. 4. Operation of ‘MACA’ Protocol [9]
12
Switching from MACA-BI to MACA
Whenever the transmitting node queue length increases or packet delay exceeds certain acceptance threshold.
13
Fig. 6. Flow Chart of Controlled Access Protocol using MACA-BI & MACA
14
TABLE I. Current & Power Consumption of node [4]
Fig. 9. Comparison of Energy consumption Fig. 8. Collisions in Controlled Access Protocol while MACA-BI in use
15
TABLE II. Lifetime (WSN) using Controlled & Random Access Protocol
Fig. 10. Lifetime Comparison TABLE II. Lifetime (WSN) using Controlled & Random Access Protocol
16
References Ashrafuzzamam K., “Energy and Throughput Optimal Operation Region in Slotted CSMA/CA Based WSN”, Communication Letters, IEEE, vol.16, no.9, pp , Kuntz R., Gallais A., and Noel T., “Medium access control facing the reality of WSN deployments”, ACM SIGCOMM Computer Commun. Rev., vol. 39, no. 3, pp. 22–27, 2009. Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications for low-rate Wireless Personal Area Networks (LRWPANs), IEEE Std Std., 2003. Merrett G.V., Weddell A.S., Lewis A.P., Harris N.R., Al- Hashimi B.M., and White N.M., “An Empirical Energy Model for Super capacitor Powered Wireless Nodes”, Computer Communications and Networks, vol.1, no.1, pp. 1-6, 2008.
17
Ling X. , Cheng Y. , Mark J. , and Shen X
Ling X., Cheng Y., Mark J., and Shen X., “A renewal theory based analytical model for the contention access period of IEEE MAC”, IEEE Trans. Wireless Commun., vol. 7, no. 6, pp – 2349, K. Ashrafuzzaman and Kwak K., “On the performance analysis of the contention access period of IEEE MAC”, IEEE Commun. Lett., vol. 15, no. 9, pp. 986–988, 2011. Pollin S., Ergen M., and Ergen S. C., et al., “Performance analysis of slotted carrier sense IEEE medium access layer”, IEEE Trans. on Wireless Communications, vol. 7, no.9, pp , Forouzan B. A., “Data Communication & Networking”, 4th ed., Mc Graw Hill, pp , 2007. Toh C. K., “Ad-Hoc Mobile Wireless Networks: Protocols and Systems”, Prentice Hall, 2001.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.