SlideShare a Scribd company logo
Medium Access Control Protocols
For wireless Sensor Network
By:
Ahmed Shamel Noori
supervised by:
Dr.En. Muhammed Najm Al-Salam
3/10/2017
Outline
 Introduction
 Background
 Performance Requirements
 MAC Protocols :
 Contention-based
 Schedule-based
 Hybrid
 Conclusion
Introduction
Wireless Sensor Networks are typically composed of a large number
of low-cost, low-power, multifunctional wireless devices deployed
over a geographical area in an ad hoc fashion and without careful
planning. sensing devices are resource constrained and therefore are
only capable of a limited amount of processing and communication.
The choice of the medium access control protocol is the major determining factor in
WSN performance
the MAC protocol functionalities are provided by the lower sublayer of the data link
layer (DLL). The higher sublayer of the DLL is referred as the logical link control
(LLC) layer.
Background
The MAC sublayer resides directly above the physical layer. It supports the
following basic functions:
• Framing – Define the frame format and perform data encapsulation and
decapsulation for communication between devices.
• Reliability – Ensure successful transmission between devices. (by sending acknowledgement
(ACK) messages and retransmissions when necessary).
• Flow Control – Prevent frame loss (swamping) through overloaded recipient buffers.
• Error Control – Use error detection or error correction codes to control the
amount of errors present in frames delivered to upper layers.
• Medium Access – Control which devices participate in communication at any time. Medium
access becomes a main function of wireless MAC protocols since broadcasts easily cause data
corruption through collisions.
Why do we need MAC?
● Wireless channel is a shared medium.
● Radios transmitting in the same frequency band interfere with each other.
The role of Medium Access Control
● Controls when and how each node can transmit in the wireless channel.
● Solves the contention and collision.
Performance Requirements
In trying to determine the performance requirements of MAC protocols, the scope
of research has been very broad, issues such as :
 Delay: refers to the amount of time spent by a data packet in the MAC layer
before it is transmitted successfully.
 Throughput: typically defined as the rate at which messages are serviced by a
communication system. It is usually measured either in messages per second or
bits per second.
 Robustness: defined as a combination of reliability, availability, and
dependability requirements, reflects the degree of the protocol insensitivity to
errors and misinformation.
Performance Requirements
 Scalability: refers to the ability of a communications system to meet its
performance characteristics regardless of the size of the network or the number
of competing nodes.
 Stability: refers to the ability of a communications system to handle
fluctuations of the traffic load over sustained periods of time.
 Fairness: A MAC protocol is considered to be fair if it allocates channel
capacity evenly among the competing communicating nodes without unduly
reducing the network throughput.
 Energy: a sensor node is equipped with one or more integrated sensors,
embedded processors with limited capability, and short-range radio
communication ability.
Major Sources of Energy Wastes
● Control Packet Overhead
E.g., RTS/CTS
● Collision (RTS: Request To Send)
Retransmission (CTS: Clear To Send)
● Overhearing
The receiver of a packet is not the intended receiver of that packet
● Idle Listing
Listening to possible traffic that is not sent
Type of Multiple Access protocol
Fixed-Assignment Protocols ( Channelized protocol) In fixed-assignment strategies,
each node is allocated a predetermined fixed amount of the channel resources. his
category include frequency-division multiple access (FDMA), time-division multiple
access (TDMA), and code-division multiple access (CDMA).
Random Assignment Protocols In fixed-assignment schemes, each communicating
node is assigned a frequency band in FDMA systems or a time slot in TDMA systems.
This assignment is (static)
The ALOHA protocol (dynamic), also referred to as pure ALOHA, was one of the first
such media access protocols. improve the performance of pure ALOHA lead to the
development of several schemes, including carrier sense multiple access (CSMA),
carrier-sense multiple access with collision detection (CSMA/CD), and carrier-sense
multiple access with collision avoidance (CSMA/CA)
Type of Multiple Access protocol
PURE ALOHA
SLOTED ALOHA
 Every node senses the carrier before transmitting
 If the carrier is not clear, the node defers transmission for a specified period
Otherwise, transmits.
 While transmitting, the sender is listening to carrier and sender stops
transmitting if collision has been detected.
CSMA/CD (carrier sense multiple access/ collision detection)
Classification of MAC Protocols
Classification of MAC Protocols
 Contention-based protocols ( S-MAC , B-MAC )
1. S-MAC
 Basic Idea
Trades energy efficiency for lower throughput and higher latency
 Main Components
Periodic Listen and Sleep
Collision Avoidance
Overhearing Avoidance
Message Passing
Periodic Listen and Sleep
● Nodes periodically sleep
● Turn off radio when sleeping
● Reduce duty cycle to ~10%
● Trades energy efficiency for lower throughput and higher latency
Classification of MAC Protocols
Collision Avoidance
● Similar to IEEE 802.11
● Virtual Carrier Sense
● NAV (Network Allocation Vector)
● Physical Carrier Sense
● Four-way(steps) handshake
● RTS/CTS/DATA/ACK
Classification of MAC Protocols
Overhearing Avoidance
● The Basic Idea a node can go to sleep whenever its neighbor is talking with
another node.
● Who should sleep?
The immediate neighbors of sender and receiver.
● How do they know when to sleep?
By overhearing RTS or CTS.
● How long should they sleep?
NAV (Network Allocation Vector).
Classification of MAC Protocols
Message Passing
How to transmit a long message?
● Transmit it as a single long packet (Easy to be corrupted).
● Transmit as many independent packets (Higher Control Overhead & Longer Delay).
● Divide into fragments, but transmit all in burst.
Classification of MAC Protocols
Classification of MAC Protocols
2. B-MAC
 B-MAC is implemented in TinyOS.
 Major Feature: reconfigurable.
● Above B-MAC, one can implement an RTS-CTS scheme or a TDMS like
scheduling protocol.
 A small core of media access functionality
● arbitration, reliability, low power communication
2. B-MAC (Overview)
● Channel Arbitration
Clear Channel Assessment (CCA) & Backoffs
● Reliability
Link-layer acknowledgment
● Low Power Communication
Low Power Listening (LPL)
Classification of MAC Protocols
Classification of MAC Protocols
 Schedule-based MAC Protocols for WSNs
(Traditional TDMA MAC Protocols)
● Divide time into cycles
A cycle consists of several slots
● Advantages
Collision-Free, Low Idle Listing and Overhearing.
● Disadvantages
Synchronization, Low Channel Utilization
● An important Issue
Slot Assignment Strategy
Slot Assignment Strategy
A node should own a slot different from its one-hop and two-hop neighbors
Classification of MAC Protocols
Classification of MAC Protocols
 Hybrid (TDMA/CSMA)
● Z-MAC
● Funneling-MAC
1. Z-MAC (Zebra MAC)
● A hybrid TDMA and CSMA MAC scheme
● The main feature is its adaptability to the level of contention in the network
● under low contention, it behaves like CSMA, and
● under high contention, like TDMA
Classification of MAC Protocols
Funneling-MAC
● The authors propose a localized, sink-oriented funneling-MAC
● Localized
Using local TDMA scheduling in the intensity region only
● Sink-oriented
Manage TDMA scheduling
Compute and maintain the depth of the intensity region
Classification of MAC Protocols
Conclusion
● MAC Protocols in WSNs
● Energy Efficiency and Other Concerns
● Contention-based/Schedule-based/Hybrid
wireless sensor network

More Related Content

PPTX
Wireless Sensor Network Routing Protocols
PDF
Lecture 19 22. transport protocol for ad-hoc
PPT
Sensor Protocols for Information via Negotiation (SPIN)
PPTX
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
PPTX
SPINS: Security Protocols for Sensor Networks
PPTX
Routing Protocols in WSN
PPTX
Mac protocols
PPTX
Cognitive radio networks
Wireless Sensor Network Routing Protocols
Lecture 19 22. transport protocol for ad-hoc
Sensor Protocols for Information via Negotiation (SPIN)
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
SPINS: Security Protocols for Sensor Networks
Routing Protocols in WSN
Mac protocols
Cognitive radio networks

What's hot (20)

PPTX
Contention based MAC protocols
PPTX
localization in wsn
PPT
Cognitive Radio
PPT
Wireless routing protocols
PPT
Localization in WSN
PPTX
MANET routing protocols Issues and Classifications
PPTX
Gsm channels concept
PPTX
Schedule and Contention based MAC protocols
DOCX
Improving coverage and capacity in cellular systems
PPT
GSM Architecture
PPT
Signaling system 7 (ss7)
PDF
Digital Cellular Technologies
PPTX
Routing protocols for ad hoc wireless networks
PPTX
PDF
Routing in Mobile Ad hoc Networks
PPT
Cellular network
PPTX
Hybrid wireless network -0th review
PPTX
Public Switched Telephone Network
Contention based MAC protocols
localization in wsn
Cognitive Radio
Wireless routing protocols
Localization in WSN
MANET routing protocols Issues and Classifications
Gsm channels concept
Schedule and Contention based MAC protocols
Improving coverage and capacity in cellular systems
GSM Architecture
Signaling system 7 (ss7)
Digital Cellular Technologies
Routing protocols for ad hoc wireless networks
Routing in Mobile Ad hoc Networks
Cellular network
Hybrid wireless network -0th review
Public Switched Telephone Network
Ad

Viewers also liked (20)

PPTX
wireless sensor network my seminar ppt
PPT
Wireless Sensor Networks
PPT
WIRELESS SENSOR NETWORK
PPTX
Wireless Sensor Networks
PPTX
Basics of Wireless sensor networks
PPSX
Power Saving in Wireless Sensor Networks
PPTX
Arithmatic pipline
PDF
Consumer Physics SCiO Molecular Sensor Patent-to-Product Mapping Sample
PPTX
fan speed control by using temperature sensor
PDF
Instructions aeon labs door window sensor gen5
PPTX
Structural health monitoring
PDF
SCiO Molecular Sensor from Consumer Physics: Mobile Spectrometer Dongle - tea...
PDF
Mit Vision-Sensoren Objekte und Szenarien erkennen und bewerten
PDF
DCMS AKCP Product Presentation
PPTX
8279 in microprocessor
PPT
paper presentation _ survey of wireless sensor netwrok
PPT
Security in wireless sensor networks
PDF
Programação de Kits Lego NXT usando Linguagem Gráfica Nativa (ou NXT-G)
PDF
Surface Acoustic Wave (SAW) Wireless Passive RF Sensor Systems
PPTX
Contiki Operating system tutorial
wireless sensor network my seminar ppt
Wireless Sensor Networks
WIRELESS SENSOR NETWORK
Wireless Sensor Networks
Basics of Wireless sensor networks
Power Saving in Wireless Sensor Networks
Arithmatic pipline
Consumer Physics SCiO Molecular Sensor Patent-to-Product Mapping Sample
fan speed control by using temperature sensor
Instructions aeon labs door window sensor gen5
Structural health monitoring
SCiO Molecular Sensor from Consumer Physics: Mobile Spectrometer Dongle - tea...
Mit Vision-Sensoren Objekte und Szenarien erkennen und bewerten
DCMS AKCP Product Presentation
8279 in microprocessor
paper presentation _ survey of wireless sensor netwrok
Security in wireless sensor networks
Programação de Kits Lego NXT usando Linguagem Gráfica Nativa (ou NXT-G)
Surface Acoustic Wave (SAW) Wireless Passive RF Sensor Systems
Contiki Operating system tutorial
Ad

Similar to wireless sensor network (20)

PPTX
Technical seminar
PPT
14653128.ppt
PPTX
Wireless sensor networks unit 3 ppt is rhere
PPT
mac-adhoc.ppt
PPT
Mac adhoc
PPT
Mac adhoc (1)
PPT
mac-adhoc.ppt
PDF
CS6003 ADHOC & SENSOR NETWORKS
PPTX
Wireless sensors networks protocols
PPTX
link-medium-access-control.pptx
PPTX
Swayambhoo Presentation (2)
PPTX
Week15 lec1
PDF
Mac protocols sensor_20071105_slideshare
PPTX
W13-L1&2.pptx
PPTX
The concept of the engineering and applications.pptx
PPT
Mac adhoc
PPTX
Mac protocols for ad hoc wireless networks
PDF
Link Layer Protocols for WSN-based IoT
PPTX
Media Access Control
Technical seminar
14653128.ppt
Wireless sensor networks unit 3 ppt is rhere
mac-adhoc.ppt
Mac adhoc
Mac adhoc (1)
mac-adhoc.ppt
CS6003 ADHOC & SENSOR NETWORKS
Wireless sensors networks protocols
link-medium-access-control.pptx
Swayambhoo Presentation (2)
Week15 lec1
Mac protocols sensor_20071105_slideshare
W13-L1&2.pptx
The concept of the engineering and applications.pptx
Mac adhoc
Mac protocols for ad hoc wireless networks
Link Layer Protocols for WSN-based IoT
Media Access Control

More from A. Shamel (13)

PPTX
Vmware Data Center Virtualization ESXI and vCenter
PPTX
Cybersecurity
PPTX
Foreigners Authentication Based on Multi-Biometric System for Iraq
PPTX
Buses and protocol
PPTX
Serial connectors, Protocols , USB (universal serial bus)
PPTX
Omnet sem
PPTX
Foc ch4
PPTX
GSM & CDMA & OFDM
PPTX
Security vulnerability
PPTX
Malicion software
PPT
Analog communication
PPTX
Data base security and injection
PPTX
Adaptive filter
Vmware Data Center Virtualization ESXI and vCenter
Cybersecurity
Foreigners Authentication Based on Multi-Biometric System for Iraq
Buses and protocol
Serial connectors, Protocols , USB (universal serial bus)
Omnet sem
Foc ch4
GSM & CDMA & OFDM
Security vulnerability
Malicion software
Analog communication
Data base security and injection
Adaptive filter

Recently uploaded (20)

PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Trump Administration's workforce development strategy
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Lesson notes of climatology university.
PPTX
master seminar digital applications in india
PPTX
Cell Structure & Organelles in detailed.
Microbial diseases, their pathogenesis and prophylaxis
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
O5-L3 Freight Transport Ops (International) V1.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
01-Introduction-to-Information-Management.pdf
Anesthesia in Laparoscopic Surgery in India
Orientation - ARALprogram of Deped to the Parents.pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Trump Administration's workforce development strategy
Final Presentation General Medicine 03-08-2024.pptx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Lesson notes of climatology university.
master seminar digital applications in india
Cell Structure & Organelles in detailed.

wireless sensor network

  • 1. Medium Access Control Protocols For wireless Sensor Network By: Ahmed Shamel Noori supervised by: Dr.En. Muhammed Najm Al-Salam 3/10/2017
  • 2. Outline  Introduction  Background  Performance Requirements  MAC Protocols :  Contention-based  Schedule-based  Hybrid  Conclusion
  • 3. Introduction Wireless Sensor Networks are typically composed of a large number of low-cost, low-power, multifunctional wireless devices deployed over a geographical area in an ad hoc fashion and without careful planning. sensing devices are resource constrained and therefore are only capable of a limited amount of processing and communication.
  • 4. The choice of the medium access control protocol is the major determining factor in WSN performance the MAC protocol functionalities are provided by the lower sublayer of the data link layer (DLL). The higher sublayer of the DLL is referred as the logical link control (LLC) layer. Background
  • 5. The MAC sublayer resides directly above the physical layer. It supports the following basic functions: • Framing – Define the frame format and perform data encapsulation and decapsulation for communication between devices. • Reliability – Ensure successful transmission between devices. (by sending acknowledgement (ACK) messages and retransmissions when necessary). • Flow Control – Prevent frame loss (swamping) through overloaded recipient buffers. • Error Control – Use error detection or error correction codes to control the amount of errors present in frames delivered to upper layers. • Medium Access – Control which devices participate in communication at any time. Medium access becomes a main function of wireless MAC protocols since broadcasts easily cause data corruption through collisions.
  • 6. Why do we need MAC? ● Wireless channel is a shared medium. ● Radios transmitting in the same frequency band interfere with each other. The role of Medium Access Control ● Controls when and how each node can transmit in the wireless channel. ● Solves the contention and collision.
  • 7. Performance Requirements In trying to determine the performance requirements of MAC protocols, the scope of research has been very broad, issues such as :  Delay: refers to the amount of time spent by a data packet in the MAC layer before it is transmitted successfully.  Throughput: typically defined as the rate at which messages are serviced by a communication system. It is usually measured either in messages per second or bits per second.  Robustness: defined as a combination of reliability, availability, and dependability requirements, reflects the degree of the protocol insensitivity to errors and misinformation.
  • 8. Performance Requirements  Scalability: refers to the ability of a communications system to meet its performance characteristics regardless of the size of the network or the number of competing nodes.  Stability: refers to the ability of a communications system to handle fluctuations of the traffic load over sustained periods of time.  Fairness: A MAC protocol is considered to be fair if it allocates channel capacity evenly among the competing communicating nodes without unduly reducing the network throughput.  Energy: a sensor node is equipped with one or more integrated sensors, embedded processors with limited capability, and short-range radio communication ability.
  • 9. Major Sources of Energy Wastes ● Control Packet Overhead E.g., RTS/CTS ● Collision (RTS: Request To Send) Retransmission (CTS: Clear To Send) ● Overhearing The receiver of a packet is not the intended receiver of that packet ● Idle Listing Listening to possible traffic that is not sent
  • 10. Type of Multiple Access protocol
  • 11. Fixed-Assignment Protocols ( Channelized protocol) In fixed-assignment strategies, each node is allocated a predetermined fixed amount of the channel resources. his category include frequency-division multiple access (FDMA), time-division multiple access (TDMA), and code-division multiple access (CDMA). Random Assignment Protocols In fixed-assignment schemes, each communicating node is assigned a frequency band in FDMA systems or a time slot in TDMA systems. This assignment is (static) The ALOHA protocol (dynamic), also referred to as pure ALOHA, was one of the first such media access protocols. improve the performance of pure ALOHA lead to the development of several schemes, including carrier sense multiple access (CSMA), carrier-sense multiple access with collision detection (CSMA/CD), and carrier-sense multiple access with collision avoidance (CSMA/CA) Type of Multiple Access protocol
  • 14.  Every node senses the carrier before transmitting  If the carrier is not clear, the node defers transmission for a specified period Otherwise, transmits.  While transmitting, the sender is listening to carrier and sender stops transmitting if collision has been detected. CSMA/CD (carrier sense multiple access/ collision detection)
  • 16. Classification of MAC Protocols  Contention-based protocols ( S-MAC , B-MAC ) 1. S-MAC  Basic Idea Trades energy efficiency for lower throughput and higher latency  Main Components Periodic Listen and Sleep Collision Avoidance Overhearing Avoidance Message Passing
  • 17. Periodic Listen and Sleep ● Nodes periodically sleep ● Turn off radio when sleeping ● Reduce duty cycle to ~10% ● Trades energy efficiency for lower throughput and higher latency Classification of MAC Protocols
  • 18. Collision Avoidance ● Similar to IEEE 802.11 ● Virtual Carrier Sense ● NAV (Network Allocation Vector) ● Physical Carrier Sense ● Four-way(steps) handshake ● RTS/CTS/DATA/ACK Classification of MAC Protocols
  • 19. Overhearing Avoidance ● The Basic Idea a node can go to sleep whenever its neighbor is talking with another node. ● Who should sleep? The immediate neighbors of sender and receiver. ● How do they know when to sleep? By overhearing RTS or CTS. ● How long should they sleep? NAV (Network Allocation Vector). Classification of MAC Protocols
  • 20. Message Passing How to transmit a long message? ● Transmit it as a single long packet (Easy to be corrupted). ● Transmit as many independent packets (Higher Control Overhead & Longer Delay). ● Divide into fragments, but transmit all in burst. Classification of MAC Protocols
  • 21. Classification of MAC Protocols 2. B-MAC  B-MAC is implemented in TinyOS.  Major Feature: reconfigurable. ● Above B-MAC, one can implement an RTS-CTS scheme or a TDMS like scheduling protocol.  A small core of media access functionality ● arbitration, reliability, low power communication
  • 22. 2. B-MAC (Overview) ● Channel Arbitration Clear Channel Assessment (CCA) & Backoffs ● Reliability Link-layer acknowledgment ● Low Power Communication Low Power Listening (LPL) Classification of MAC Protocols
  • 23. Classification of MAC Protocols  Schedule-based MAC Protocols for WSNs (Traditional TDMA MAC Protocols) ● Divide time into cycles A cycle consists of several slots ● Advantages Collision-Free, Low Idle Listing and Overhearing. ● Disadvantages Synchronization, Low Channel Utilization ● An important Issue Slot Assignment Strategy
  • 24. Slot Assignment Strategy A node should own a slot different from its one-hop and two-hop neighbors Classification of MAC Protocols
  • 25. Classification of MAC Protocols  Hybrid (TDMA/CSMA) ● Z-MAC ● Funneling-MAC
  • 26. 1. Z-MAC (Zebra MAC) ● A hybrid TDMA and CSMA MAC scheme ● The main feature is its adaptability to the level of contention in the network ● under low contention, it behaves like CSMA, and ● under high contention, like TDMA Classification of MAC Protocols
  • 27. Funneling-MAC ● The authors propose a localized, sink-oriented funneling-MAC ● Localized Using local TDMA scheduling in the intensity region only ● Sink-oriented Manage TDMA scheduling Compute and maintain the depth of the intensity region Classification of MAC Protocols
  • 28. Conclusion ● MAC Protocols in WSNs ● Energy Efficiency and Other Concerns ● Contention-based/Schedule-based/Hybrid