Professional Documents
Culture Documents
Ifet College of Engineering: Solved For Application Questions Part A (2 Marks)
Ifet College of Engineering: Solved For Application Questions Part A (2 Marks)
PART-B(16 MARKS)
3. Identify and explain the protocol that is used to achieve dynamic synchronisation in A
peer to peer communication.
The mediation device protocol is compatible with the peer-to-peer
communication mode of the IEEE 802.15.4 low-rate WPAN standard. It allows each
node in a WSN to go into sleep mode periodically and to wake up only for short times
to receive packets from neighbor nodes. There is no global time reference, each node
has its own sleeping schedule, and does not take care of its neighbors sleep schedules.
Upon each periodic wakeup, a node transmits a short query beacon, indicating its node
address and its willingness to accept packets from other nodes. The node stays awake
for some short time following the query beacon, to open up a window for incoming
packets. If no packet is received during this window, the node goes back into sleep
mode.
When a node wants to transmit a packet to a neighbor, it has to synchronize with it.
One option would be to have the sender actively waiting for query beacon, but this
wastes considerable energy for synchronization purposes only. The dynamic
synchronization approach achieves this synchronization without requiring the
transmitter to be awake permanently to detect the destinations query beacon.
To achieve this, a mediation device (MD) is used. We first discuss the case
where the mediation device is not energy constrained and can be active all the time.
Because of its full duty cycle, the mediation device can receive the query beacons from
all nodes in its vicinity and learn their wakeup periods. Suppose that node A wants to
transmit a packet to node B. Node A announces this to the mediation device by sending
periodically request to send (RTS) packets, which the MD captures. Node A sends its
RTS packets instead of its query beacons and thus they have the same period. Again,
there is a short answer window after the RTS packets, where A listens for answers.
After the MD has received A’s RTS packet, it waits for B’s next query beacon. The
MD answers this with a query response packet, indicating A’s address and a timing
offset, which lets B know when to send the answering clear to send (CTS) to A such
that the CTS packet hits the short answer window after A’s next RTS packet.
Therefore, B has learned A’s period. After A has received the CTS packet, it
can send its data packet and wait for B’s immediate acknowledgment. After the
transaction has finished, A restores its periodic wakeup cycle and starts to emit query
beacons again. Node B also restores its own periodic cycle and thus decouples from
A’s period.
Advantages:
• It does not require any time synchronization between the nodes, only the
mediation device has to learn the periods of the nodes.
• The protocol is asymmetric in the sense that most of the energy burden is
shifted to the mediation device, which so far is assumed to be power
unconstrained.
• The other nodes can be in the sleep state most of the time and have to spend
energy only for the periodic beacons. Even when a transmitter wants to
synchronize with the receiver, it does not have to wait actively for the query
beacon, but can go back to sleep and wait for the mediation device to do the
synchronization work. This way very low duty cycles can be supported.
Drawbacks:
• The nodes transmit their query beacons without checking for ongoing
transmissions and, thus, the beacons of different nodes may collide repeatedly
when nodes have the same period and their wakeup periods overlap.
• If the wakeup periods are properly randomized and the node density is
sufficiently low, this collision probability can be low too.
• However, in case of higher node densities or unwanted synchronization
between the nodes, the number of collisions can be significant.
6. (i)Choose an alternate for CSMA protocol for packet transmission and justify in A
what way it is better than CSMA protocol. (8)
The MACA protocol was proposed as an alternative to the traditional carrier
sense multiple Access (CSMA) protocols used in wired networks. In CSMA protocols,
the sender first senses the channel for the carrier signal. If the carrier is present, it
retries after a random period of time. Otherwise, it transmits the packet. CSMA senses
the state of the channel only at the transmitter. This protocol does not overcome the
hidden terminal problem. In a typical ad hoc wireless network, the transmitter and
receiver may not be near each other at all times. In such situations, the packets
transmitted by a node are prone to collisions at the receiver due to simultaneous
transmissions by the hidden terminals. Also, the bandwidth utilization in CSMA
protocols is less because of the exposed terminal problem. MACA does not make use
of carrier-sensing for channel access. It uses two additional signalling packets: the
request-to-send (RTS) packet and the clear-to-send (CTS) packet. When a node wants
to transmit a data packet, it first transmits an RTS packet. The receiver node, on
receiving the RTS packet, if it is ready to receive the data packet, transmits a CTS
packet. Once the sender receives the CTS packet without any error, it starts
transmitting the data packet. This data transmission mechanism is depicted in Figure
shown below.
If a packet transmitted by a node is lost, the node uses the binary exponential
back-off (BEB) algorithm to back off for a random interval of time before retrying. In
the binary exponential backoff mechanism, each time a collision is detected, the node
doubles its maximum back-off window. Neighbor nodes near the sender that hear the
RTS packet do not transmit for a long enough period of time so that the sender could
receive the CTS packet. Both the RTS and the CTS packets carry the expected duration
of the data packet transmission. A node near the receiver, upon hearing the CTS packet,
defers its transmission till the receiver receives the data packet. Thus, MACA
overcomes the hidden node problem. Similarly, a node receiving an RTS defers only
for a short period of time till the sender could receive the CTS. If no CTS is heard by
the node during its waiting period, it is free to transmit packets once the waiting
interval is over. Thus, a node that hears only the RTS packet is free to transmit
simultaneously when the sender of the RTS is transmitting data packets. Hence, the
exposed terminal problem is also overcome in MACA. But MACA still has certain
problems, which was why MACAW, described below, was proposed.
.
Example topology
In the example figure given above, the minimum energy route is A-B-E-H,
requiring 3 units of energy. The minimum hop count route would be A-D-H, requiring
6 units of energy. At a first glance, energy-efficient unicast routing appears to be a
simple problem: take the network graph, assign to each link a cost value that reflects
the energy consumption across this link, and pick any algorithm that computes least-
cost paths in a graph. The energy efficiency of a node is defined as the ratio of the
amount of data delivered by the node to the total energy expended. Higher energy
efficiency implies that a greater number of packets can be transmitted by the node with
a given amount of energy reserve. There are various aspects how energy or power
efficiency can be conceived of in a routing context.
Minimize energy per packet (or per bit)
The most straightforward formulation is to look at the total energy required to
transport a packet over a multihop path from source to destination (including all
overheads). The goal is then to minimize, for each packet, this total amount of energy
by selecting a good route. Minimizing the hop count will typically not achieve this goal
as routes with few hops might include hops with large transmission power to cover
large distances. But be aware of distance-independent, constant offsets in the energy-
consumption model. Nonetheless, this cost metric can be easily included in standard
routing algorithms. It can lead to widely differing energy consumption on different
nodes.