1.5.
3 WSN MAC
whatever layer come in exam first draw the protocol stack.
PHYICAL LAYER:
--The PHY layer is responsible for handling the modulation and demodulation of signals, as well as
encoding and decoding data for over-the-air transmission.
--It also manages tasks like signal strength measurement (e.g., RSSI), channel selection, and clear
channel assessment (CCA), which are essential for minimizing interference and ensuring reliable
communication.
--In Wireless Sensor Networks (WSNs), the Physical (PHY) layer operates typically in the 2.4 GHz ISM
band, which is a globally available, license-free frequency band commonly used
The sensor motes deployed in WSNs generally use CC2xxx series radios developed by Texas
Instruments, such as the CC2420 or CC2530. These radios are designed to comply with the IEEE
802.15.4 PHY standard, which is a low-power, low-data-rate wireless communication standard
tailored for sensor networks and IoT applications.
IEEE 802.15.4 provides a data rate of 250 kbps at 2.4 GHz, with a typical transmission range of 10 to
100 meters,
Why 802.15.4?
Low Power Consumption (ideal for battery-operated WSN)
Supports short-range, low-data-rate communication
Foundation for higher-layer protocols like ZigBee, 6LoWPAN
MAC(Medium Access Control) LAYER:
--The fundamental task of the MAC (Medium Access Control) protocol in Wireless Sensor Networks
(WSNs) is to avoid collisions, ensuring that two or more interfering nodes do not transmit at the
same time.
--the MAC (Medium Access Control) layer plays a critical role in managing how multiple sensor
nodes access the shared wireless communication medium. Since sensor nodes operate on
constrained energy budgets, the MAC protocol must minimize power consumption while ensuring
reliable data transmission. The primary functions of the MAC layer include collision avoidance,
channel access arbitration, synchronization, and energy-efficient scheduling.
--WSNs use radios compliant with the IEEE 802.15.4 standard, which provides a contention-based
MAC protocol based on CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance).
The MAC layer also support TDMA-based (Time Division Multiple Access) scheduling in
more synchronized networks, especially where latency and throughput guarantees are
required. Additionally, in dense deployments or in environments with mobile nodes, the
MAC layer must adapt to changing network topology and ensure that critical packets like
control messages or emergency data are given priority.
--the WSN MAC layer is designed to balance energy efficiency, latency, throughput, and
reliability.
MAC – Characteristics:
1.Energy Efficient: Designed to minimize power consumption, as sensor nodes have limited
battery life.
2.Small Code Size: Fits within the constrained memory of microcontrollers used in sensor
nodes.
3.Scalable: Should perform well regardless of network size (from few to thousands of
nodes).
--Size: Compact and lightweight, enabling quick and easy deployment.
--Node Density: Should handle high or varying numbers of nodes in a given area efficiently.
--Topology: Must support dynamic or static network topologies like star, tree, or mesh.
4.Adaptability: Capable of adjusting to changing environmental or network conditions (e.g.,
node failure, mobility).
MAC – Attributes
1.Fairness: Ensures all nodes get an equal opportunity to access the communication channel.
2.Throughput / Goodput:Measures how much useful data is successfully delivered over the
network.
3.Bandwidth Utilization: Efficiently utilizes the available wireless bandwidth without
causing congestion.
4. Latency: Keeps communication delays low to support time-sensitive applications.
5.Scalability: Supports growth in the number of nodes or data volume without significant
performance loss.
6. Energy Efficient: Critical attribute to extend node and network lifespan by minimizing
idle listening, collisions, and overhearing.
Types of Traffic
1. Broadcast:
A message is sent from one node to all other nodes in the network.
➤ Commonly used during network setup or software updates.
2. Local Gossip:
A node shares information with its immediate neighbors only.
➤ Useful for collaborative sensing or localized decisions.
3. Convergecast:
Data from multiple sensor nodes is sent and aggregated towards a single sink or
base station.
➤ Most common in WSNs used for monitoring.
4. Multicast:
A message is sent from one node to a specific group of nodes.
➤ Efficient when only part of the network needs the data (e.g., a cluster of sensors or
actuators).
MAC Protocol Types
1. Collision-Based MAC
o Nodes struggles for the channel before transmitting.
o Risk of packet collisions if two nodes transmit at the same time.
o Examples: CSMA (Carrier Sense Multiple Access), CSMA/CA.
oSuitable for low-traffic scenarios.
oEasier to implement but less efficient under high load.
2. Schedule-Based MAC
o Transmission is coordinated in time, avoiding collisions.
o Nodes are assigned specific time slots or schedules.
o Examples: TDMA (Time Division Multiple Access), FDMA
o High energy efficiency and collision-free, but requires tight time
synchronization.
o Better for periodic or continuous traffic and larger networks.
CSMA/CA – IEEE 802.11
In CSMA/CA, before sending data, a node senses the channel to check if it is idle. If the
channel is free, it uses a handshake mechanism involving RTS (Request to Send) and CTS
(Clear to Send) packets to avoid collisions, especially those caused by the hidden terminal
problem.
Process Flow:
1. Node A (Sender) sends an RTS packet to Node B (Receiver), indicating:
o Source ID (A)
o Destination ID (B)
o Duration of communication
2. Node B, upon receiving the RTS, replies with a CTS packet, also including:
o Source ID (B)
o Destination ID (A)
o Same duration of communication
3. Nodes C, D, and E overhearing the RTS or CTS will back off for the specified
duration, thus avoiding collisions.
This mechanism ensures that only the intended nodes communicate, while nearby nodes
remain silent, preventing interference.
MAC – Sources of Energy Wastage
In Wireless Sensor Networks (WSNs), energy efficiency is critical due to limited battery life.
Several factors contribute to energy wastage at the MAC (Medium Access Control) layer:
Collision:
When two or more nodes transmit simultaneously, their signals interfere, causing data
loss. Retransmissions consume extra energy.
Overhearing:
A node unnecessarily listens to packets that are not intended for it, wasting power.
Control Packet Overhead:
Protocols often require sending control messages like RTS, CTS, ACK, etc. These do
not carry actual data but still consume energy.
Idle Listening:
A node keeps its radio on, waiting for potential communication, leading to continuous
energy drain even when no data is received.
Over Emitting:
Transmitting data even when the receiver is not ready leads to wasted transmission
efforts and energy.
MAC – Schedule Based Protocols
Schedule-based MAC protocols pre-assign transmission times or frequencies to avoid
collisions, making them suitable for energy-efficient and delay-sensitive applications in
Wireless Sensor Networks (WSNs).
Types:
TDMA (Time Division Multiple Access)
Each node is assigned a specific time slot in a frame to transmit data, preventing
collisions.
FDMA (Frequency Division Multiple Access)
Each node transmits on a unique frequency band, reducing interference and ensuring
channel separation.
MAC – TDMA
TDMA, or Time Division Multiple Access, is a channel access method that allows
multiple users to share the same frequency channel by dividing the signal into different time
slots.
Example layout:
A B C D E F
↑ ↑ ↑ ↑ ↑ ↑
Slot1 Slot2 Slot3 ...
Each node (A–F) gets a unique time slot, ensuring no overlap in communication.
Pros:
o Collision-free
o Energy efficient (radios can sleep between slots)
Cons:
o Lack of flexibility in dynamic networks
o Requires time synchronization
MAC Protocols Classification (Based on Access Method)
Contention-Based Protocols (e.g., CSMA):
B-MAC
S-MAC
T-MAC
PAMAS
CCMAC
Sift
WISEMAC
Schedule-Based Protocols (e.g., TDMA):
D-MAC
LMAC
MSMAC
PMAC
ZMAC
FLAMA
MMSN
MCMAC
PEDMAC
LMAC (multi-channel)
Crankshaft
MHMAC
ZMAC is a hybrid protocol that combines contention-based and schedule-based approaches.
Topology Control (IT’S HALF):
Topology control protocols operate below the network layer.
Their primary objective is to optimize the connectivity and energy efficiency of
WSNs.
These protocols control sleep–wake cycles of sensor nodes.
They also exploit redundancy in dense deployments to reduce unnecessary
transmissions and prolong network lifetime.
Key Features of Topology Control
Sleep–Wake Scheduling:
Nodes take turns sleeping to conserve energy without losing coverage.
Selective Activation:
Only a subset of nodes remain active at any time while maintaining network
connectivity.
Dynamic Adjustment:
Adapt to changing conditions, such as node failures or mobility, in real time.
Topology Diagram
(You can redraw this with nodes labeled as A–L in a dense network)
mathematica
Copy code
A C D
B E
G H F
J I L K
The diagram represents a dense WSN deployment with potential redundant communication
paths.
Effects of Topology Control
Energy Saving:
By turning off redundant nodes and scheduling sleep cycles.
Over-Emitting Reduction:
Controls excessive transmissions that may lead to interference and energy drain.