Professional Documents
Culture Documents
AWN Week-8
AWN Week-8
AWN Week-8
WSN
Dr. Rahim Khan
Assistant Professor
Department of Computer Science
Abdul Wali Khan University Mardan
Operations in WSN
•When to send
•When to listen
•Processing
Principal options and difficulties
· Medium access in wireless networks is difficult mainly
because of
· Impossible (or very difficult) to sende and receive at the same time
· Interference situation at receiver is what counts for transmission
success, but can be very different from what sender can observe
· High error rates (for signaling packets) compound the issues
· Requirement
· As usual: high throughput, low overhead, low error rates, …
· Additionally: energy-efficient, handle switched off devices!
Requirements for energy-efficient MAC
protocols
Recall
◦ Transmissions are costly
◦ Receiving about as expensive as transmitting
◦ Idling can be cheaper but is still expensive
Energy problems
◦ Collisions – wasted effort when two packets collide
◦ Overhearing – waste effort in receiving a packet destined for another node
◦ Idle listening – sitting idly and trying to receive when nobody is sending
◦ Protocol overhead
In random access methods, no station is superior to another station and none is assigned
the control over another. No station permits, or does not permit, another station to send.
At each instance, a station that has data to send uses a procedure defined by the protocol
to make a decision on whether or not to send.
Two Rules:
1. No transmission schedule
2. Which station should send
Main Problem: Collison
• When the station access the medium
• If busy then what
• If idle then what
• Success or failure????
• Conflict???
Pure ALOHA
The stations on a wireless ALOHA network are a maximum of 600 km apart. If we assume that
8
signals propagate at 3 × 10 m/s, we find
5 8
Tp = (600 × 10 ) / (3 × 10 ) = 2 ms.
K.
random variable.
10.
Figure 5 Vulnerable time for pure ALOHA protocol
Example 2
A pure ALOHA network transmits 200-bit frames on a shared channel of 200 kbps. What is the
Solution
Average frame transmission time Tfr is 200 bits/200 kbps or 1 ms. The vulnerable time is 2 × 1 ms =
2 ms. This means no station should send later than 1 ms before this station starts transmission and
no station should start sending during the one 1-ms period that this station is sending.
Slotted ALOHA
Time is divided into slots
Each device is bounded to transmit at the beginning
Misses (wait for next slot)
Collisions: only when two stations send simultaneously
Figure 6 Frames in a slotted ALOHA network
Note
A slotted ALOHA network transmits 200-bit frames on a shared channel of 200 kbps. What is the
Solution
The time needed for a signal to propagate from one end of the
medium to the other (represented by Tp)
Figure 9 Vulnerable time in CSMA
Persistence methods
A network using CSMA/CD has a bandwidth of 10 Mbps. If the maximum propagation time
(including the delays in the devices and ignoring the time needed to send a jamming signal, as we
see later) is 25.6 μs, what is the minimum size of the frame?
Solution
The frame transmission time is Tfr = 2 × Tp = 51.2 μs. This means, in the worst case, a station
needs to transmit for a period of 51.2 μs to detect the collision. The minimum size of the frame is 10
Mbps × 51.2 μs = 512 bits or 64 bytes. This is actually the minimum size of the frame for Standard
Ethernet.
12.31
Figure 14 Flow diagram for the CSMA/CD
12.32
Figure 15 Energy level during transmission, idleness, or collision
12.33
Figure 16 Timing in CSMA/CA
12.34
Note
station or a frame.
12.35
Note
In CSMA/CA, if the station finds the channel busy, it does not restart
it stops the timer and restarts it when the channel becomes idle.
12.36
Figure 17 Flow diagram for CSMA/CA
12.37
CONTROLLED ACCESS
Reservation
Polling
Token Passing
12.38
Figure 18 Reservation access method
12.39
Figure 19 Select and poll functions in polling access method
12.40
Figure 20 Logical ring and physical topology in token-passing access method
12.41
CHANNELIZATION
12.42
Note
12.43
Figure 21 Frequency-division multiple access (FDMA)
12.44
Note
guard bands.
12.45
Figure 22 Time-division multiple access (TDMA)
12.46
Note
12.47
Note
12.48
Figure 23 Simple idea of communication with code
12.49
Centralized medium access
Idea: Have a central station control when a node may access the medium
◦ Example: Polling, centralized computation of TDMA schedules
◦ Advantage: Simple, quite efficient (e.g., no collisions), burdens the central station
Contention-based protocols
◦ Risk of colliding packets is deliberately taken
◦ Hope: coordination overhead can be saved, resulting in overall improved efficiency
◦ Mechanisms to handle/reduce probability/impact of collisions required
◦ Usually, randomization used somehow
Distributed, contention-based MAC
Basic ideas for a distributed MAC
◦ ALOHA – not good in most cases
◦ Listen before talk (Carrier Sense Multiple Access, CSMA) – better, but suffers from sender not knowing
what is going on at receiver, might destroy packets despite first listening for a
! Receiver additionally needs some possibility to inform possible senders in its vicinity about
impending transmission (to “shut them up” for this duration)
receive a transmission
Request to Send (RTS) RTS
NAV indicates
◦ Store this information in a Network Allocation busy medium
Vector Ack
B sends, C acks
! MACA protocol (used e.g. in IEEE 802.11)
RTS/CTS
RTS/CTS improve, but do not solve A B C D A B C D
hidden/exposed terminal problems
RTS RTS
RTS
CTS CTS
RTS
CTS Data
Ack
MACA Problem: Idle listening
Need to sense carrier for RTS or CTS packets
◦ In some form shared by many CSMA variants; but e.g. not by busy tones
◦ Simple sleeping will break the protocol