0% found this document useful (0 votes)
24 views21 pages

WSN Unit 2

The document discusses common MAC protocols, components of the Sensor MAC protocol, routing strategies, issues with the Transport Control Protocol in wireless sensor networks, and the architecture of WSN middleware. It provides details on CSMA, TDMA, and other MAC protocols, components of Sensor-MAC including sleep-wake scheduling, RTS/CTS handshaking, and adaptive scheduling. It also outlines proactive, reactive, and hierarchical routing protocols, limitations of TCP in WSNs, and key aspects of WSN middleware architecture including the OS layer and network/service layers.

Uploaded by

Gaurav bansode
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views21 pages

WSN Unit 2

The document discusses common MAC protocols, components of the Sensor MAC protocol, routing strategies, issues with the Transport Control Protocol in wireless sensor networks, and the architecture of WSN middleware. It provides details on CSMA, TDMA, and other MAC protocols, components of Sensor-MAC including sleep-wake scheduling, RTS/CTS handshaking, and adaptive scheduling. It also outlines proactive, reactive, and hierarchical routing protocols, limitations of TCP in WSNs, and key aspects of WSN middleware architecture including the OS layer and network/service layers.

Uploaded by

Gaurav bansode
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

UNIT II:

Answer the following


1. Explain in brief common MAC protocols used in WSN. (Apr 23)
Wireless Sensor Networks (WSNs) have specific requirements when it comes to
communication. They prioritize energy efficiency due to limited battery power
on sensor nodes. Here's a breakdown of some common MAC protocols used in
WSNs that address these constraints:
1. Carrier Sense Multiple Access (CSMA) based protocols:
Similar to WiFi's CSMA/CA (Carrier Sense Multiple Access with Collision
Avoidance), these protocols involve carrier sensing to detect if the channel is
busy before transmitting. This reduces collisions and wasted energy.
B-MAC (Berkeley MAC): A widely used, simple protocol for low-power
sensor networks. Nodes listen for a preamble before transmitting to avoid
collisions.
SMAC (Sensor-MAC): Employs a sleep-wake cycle to reduce idle listening.
Nodes schedule transmissions and use RTS/CTS (Request to Send/Clear to
Send) for handshake before data transfer.
2. Time-Division Multiple Access (TDMA) based protocols:
Nodes are assigned specific time slots for transmission, eliminating the need for
contention and reducing collisions. This approach is more predictable and
energy-efficient.
TDMA (Time Division Multiple Access): Nodes are allocated specific time
slots to transmit data packets. Offers predictable access but requires
synchronization among nodes.
TRAMA (Traffic-Responsive Medium Access): A dynamic TDMA protocol
where time slots are allocated based on traffic demands, improving efficiency.
3. Other Protocols:
IEEE 802.15.4: A physical and MAC layer standard specifically designed for
low-power wireless communication, often used as a foundation for building
custom protocols in WSNs.
ZigBee: A higher-level protocol built on top of 802.15.4, offering features like
mesh networking and security for WSN applications.

2. List and explain components of Sensor MAC. (Apr 23)


Sensor-MAC (SMAC) Protocol Components
Sensor-MAC (SMAC) is a medium access control (MAC) protocol specifically
designed for Wireless Sensor Networks (WSNs) to address their unique
challenges, particularly limited power on sensor nodes. Here's a breakdown of
its key components:
1. Sleep-Wake Schedule:
A core principle of SMAC is the concept of a sleep-wake schedule. Sensor
nodes alternate between sleep periods to conserve energy and active periods to
transmit or receive data.
This reduces idle listening, where nodes waste power by constantly checking for
incoming data when none is expected.
Nodes synchronize their sleep schedules to designated wake-up times for
periodic communication and data exchange.
2. Beacon Messages:
Beacon messages are short control packets used for synchronization and
scheduling purposes.
A designated node, often the base station, transmits beacon messages
periodically.
These beacons signal to sensor nodes when to wake up and prepare for
communication.
Beacon messages may also include additional information, such as time slots
allocated for specific nodes or data transmission requests.
3. Request To Send (RTS) and Clear To Send (CTS) Handshake:
To further reduce collisions and wasted transmissions, SMAC incorporates an
RTS/CTS handshake mechanism.
Before transmitting data, a node sends an RTS message to the intended recipient
and any neighboring nodes.
The recipient responds with a CTS message if the channel is clear.
Neighboring nodes that receive the RTS message can hold off transmissions to
avoid collisions within their range.
This handshake ensures a clear channel for data transfer and minimizes wasted
energy due to collisions.
4. Adaptive Scheduling:
SMAC can adapt to changing network conditions through a mechanism called
adaptive scheduling.
Nodes can estimate their backlog of data packets waiting for transmission.
Based on this estimation, nodes may request additional time slots in beacon
messages for increased data transmission opportunities when they have high
traffic.
This adaptive approach helps to balance energy efficiency with data delivery
requirements.
5. Overhearing and Collision Avoidance:
SMAC leverages the concept of overhearing to further optimize
communication.
Nodes can overhear transmissions between other nodes within their range.
By overhearing RTS/CTS handshakes, nodes can update their channel
reservation information and avoid scheduling transmissions during busy
periods.
This distributed collision avoidance mechanism helps to improve network
efficiency.

3. Explain Routing Strategies in Wireless Sensor Networks. (Apr 19) (Apr


23)
In Wireless Sensor Networks (WSNs), efficient data routing is crucial for
ensuring timely and reliable delivery of sensor data from nodes to the base
station. Here's an overview of common routing strategies in WSNs:
1. Proactive Routing Protocols:
These protocols establish routes between nodes and the base station before data
transmission is required. This allows for faster data delivery but comes at the
cost of increased overhead due to route maintenance.
OLSR (Optimized Link State Routing): Nodes periodically exchange routing
information with neighbors, allowing them to maintain a complete network
topology map.
Directed Diffusion: The base station broadcasts a message specifying the type
of data it's interested in. Nodes collaborate to establish and maintain reverse
paths towards the base station for that specific data type.
2. Reactive Routing Protocols:
Unlike proactive protocols, reactive protocols only establish routes on-demand
when a node has data to send. This reduces routing overhead but may introduce
delays when initiating communication.
AODV (Ad-hoc On-Demand Distance Vector Routing): Nodes discover
routes by flooding the network with route request packets when they need to
send data. The route with the shortest hop count is chosen.
DSDV (Destination-Sequenced Distance-Vector Routing): Nodes maintain
routing tables with next-hop information and sequence numbers for
destinations. This allows for loop-free routing and efficient route updates.
3. Hierarchical Routing Protocols:
These protocols divide the network into clusters with cluster heads aggregating
data from member nodes before forwarding it to the base station. This approach
reduces long-distance transmissions and improves scalability for large WSNs.
LEACH (Low-Energy Adaptive Clustering Hierarchy): Nodes periodically
elect cluster heads based on factors like residual energy. Cluster heads collect
data from members and transmit it to the base station.
TEEN (Threshold-sensitive Election Protocol): Similar to LEACH, but data
transmission is triggered when a certain threshold is met (e.g., reaching a
specific data level or exceeding a time limit).

4. Explain Transport Control Protocol. Explain its design issue. (Apr 23)
OR What are the issues need to consider to design transport protocols for
WSNs. (Apr 19)
Traditional Transport Control Protocol (TCP) and its Limitations in WSNs
Traditional TCP, a fundamental protocol in wired networks, is not ideally suited
for Wireless Sensor Networks (WSNs) due to several design issues:
1. Connection-Oriented Model: TCP establishes a connection with
handshakes before data transmission, which adds overhead and consumes
energy in resource-constrained sensor nodes.
2. Reliability Mechanisms: TCP employs retransmission timers and error
checking mechanisms to guarantee in-order delivery. While crucial for wired
networks, these features can be inefficient in WSNs with limited power and
potential packet loss due to factors beyond simple errors (e.g., signal fading).
Frequent retransmissions can drain battery life quickly.
3. Congestion Control: TCP uses congestion control mechanisms like window
adjustments to avoid overwhelming the network. However, congestion is less
common in WSNs with controlled data rates and limited nodes. These
mechanisms add complexity and overhead without significant benefits.
4. Header Size: TCP headers are relatively large compared to the small data
packets typically used in WSNs. This increases communication overhead and
reduces the payload size for actual sensor data.
Design Considerations for WSN Transport Protocols
Given the limitations of traditional TCP, designing transport protocols for
WSNs requires careful consideration of these key factors:
Energy Efficiency: Minimize control overhead and retransmissions to conserve
battery life on sensor nodes.
Scalability: The protocol should efficiently handle large-scale deployments
with many sensor nodes.
Reliability: Provide a balance between reliable data delivery and energy
consumption. Depending on the application, some data loss might be tolerable if
it significantly improves energy efficiency.
Real-Time vs. Non-Real-Time Data: The protocol should cater to both real-
time critical data (e.g., temperature readings for fire detection) and non-real-
time data (e.g., daily temperature averages) with appropriate delivery
guarantees.
Data Aggregation: Techniques for aggregating data from multiple nodes can
be employed to reduce the number of transmissions and conserve energy.
Limited Processing Power: The protocol should be lightweight and require
minimal processing overhead on sensor nodes with limited computational
resources.

5. Explain WSN Middleware Architecture.


WSN Middleware Architecture Explained
Wireless Sensor Networks (WSNs) consist of resource-constrained sensor nodes
that collect and transmit environmental data. WSN middleware acts as a bridge
between these sensor nodes and applications, providing a layer of abstraction
and essential services to simplify application development and improve network
efficiency. Here's a breakdown of the WSN middleware architecture:
Components:
Operating System (OS) or TinyOS Layer:
Provides a lightweight operating system specifically designed for sensor nodes
with limited memory and processing power. Examples include TinyOS,
ContikiOS.
Offers functionalities like task scheduling, power management, and basic
communication primitives.
Network Access Layer:
Handles low-level communication details like packet formatting, addressing,
and interaction with the physical radio layer.
May utilize standard protocols like IEEE 802.15.4 or ZigBee for
communication.
Data Management Layer:
Performs operations on sensor data, including:
In-network processing: Aggregating, filtering, or transforming data before
transmission to reduce communication overhead.
Data buffering: Storing data temporarily on nodes before forwarding it to the
base station.
Quality-of-Service (QoS) management: Prioritizing data transmission based on
importance or timeliness.
Resource Management Layer:
Monitors and manages resources on sensor nodes, including:
Power consumption: Optimizing communication and processing to conserve
battery life.
Memory management: Allocating memory efficiently for application needs.
Security: Implementing mechanisms to protect data and network integrity.
Task Management Layer:
Provides an interface for applications to interact with the network and access
sensor data.
Manages the execution of application tasks on sensor nodes.
Communication Layer:
Facilitates communication between sensor nodes and the base station, including:
Routing protocols: Efficiently routing data packets through the network.
Inter-middleware communication: Enabling communication between
middleware instances on different nodes.
Application Layer:
Runs on the base station or a server and interacts with the middleware to:
Collect and analyze sensor data.
Control network operation.
Visualize or manage sensor data.

6. Give the examples existing Transport Control Protocols for WSN. (Apr
23)
Traditional TCP is not ideal for WSNs, but several transport protocols have
been developed specifically for these networks, considering their unique
limitations. Here are some examples of existing Transport Control Protocols for
WSNs:
1. Lightweight Transport Protocols (LTPs):
μTP (micro-Transport Protocol): A lightweight protocol designed for low-
overhead data transfer. It offers reliable in-order delivery with congestion
control mechanisms but focuses on minimizing header size and processing
overhead.
Sequenced Packet Protocol (SPP): Provides reliable data delivery with
features like sequencing and error detection but keeps the protocol lightweight
for resource-constrained nodes.
2. Data-Centric Transport Protocols:
Directed Diffusion (DD): Focuses on content delivery rather than connection
management. Nodes advertise their data interests, and the network dynamically
establishes paths to deliver the desired data to the base station.
Contiguous Dissemination Service (CDS): Similar to Directed Diffusion, but
nodes actively request specific data types, and the network establishes delivery
paths accordingly.
3. Reliability-Aware Transport Protocols:
Reliable Energy-Aware Transport Protocol (REAT): Offers a balance
between reliability and energy efficiency. It adapts data retransmissions based
on the importance of the data and the remaining energy of the sender node.
PT-TCP (Probabilistic TCP): Provides probabilistic guarantees of data
delivery. It adjusts retransmission based on factors like packet loss rates and
energy levels, offering a trade-off between reliability and energy consumption.
4. Heterogeneous Transport Protocols:
HTAP (Heterogeneous Transport Architecture Protocol): Designed for
WSNs with a mix of nodes with different capabilities. It offers differentiated
transport services based on node types, allowing for efficient data transfer
considering resource constraints.
MQ-series protocols (e.g., MQ Telemetry Transport): These protocols are
message-oriented and well-suited for publish-subscribe communication patterns
in WSNs, where sensor nodes publish data to interested applications.

7. What are Requirements and design constraints for wireless MAC


protocols. (Apr 23)
Requirements and Design Constraints for Wireless MAC Protocols in
WSNs
Wireless Sensor Networks (WSNs) have unique characteristics that necessitate
specialized Medium Access Control (MAC) protocols compared to traditional
wireless networks. Here's a breakdown of the key requirements and design
constraints for MAC protocols in WSNs:
Requirements:
Energy Efficiency: Sensor nodes are often battery-powered, so minimizing
energy consumption during data transmission and idle listening is paramount.
The MAC protocol should optimize communication to extend node lifetime.
Scalability: WSNs can range from small deployments to large-scale networks
with hundreds or even thousands of nodes. The MAC protocol should function
efficiently and adapt to varying network sizes.
Fairness: All sensor nodes should have a fair chance to access the shared
wireless channel and transmit their data.
Low Latency: Depending on the application, some data might require timely
delivery. The MAC protocol should minimize delays, especially for critical
sensor data.
Reliability: While absolute reliability might not always be achievable, the
MAC protocol should strive to deliver data packets successfully with minimal
errors or losses.
Design Constraints:
Limited Resources: Sensor nodes have limited processing power, memory, and
battery life. The MAC protocol should be lightweight and require minimal
resources for operation.
Dynamic Topology: Sensor nodes may be mobile or have unreliable
connections due to environmental factors. The MAC protocol should adapt to
changes in network topology.
Limited Bandwidth: Wireless channels have inherently limited bandwidth
compared to wired networks. The MAC protocol should efficiently utilize the
available bandwidth for data transmission.
Hidden Terminal and Exposed Terminal Problems: These problems can
occur due to the limitations of wireless propagation. The MAC protocol should
consider mechanisms to mitigate them and avoid collisions.
Security: WSNs can be vulnerable to security threats. The MAC protocol
should incorporate security features if necessary for the application.

8. Discuss issues in designing MAC protocol for adhoc-networks. (Apr 23)


Ad hoc networks, also known as Mobile Ad-hoc Networks (MANETs), present
unique challenges when designing a Medium Access Control (MAC) protocol.
Unlike traditional infrastructure-based networks with a central access point, ad
hoc nodes need to collaborate and manage channel access themselves. Here's a
breakdown of some key issues to consider when designing a MAC protocol for
ad hoc networks:
1. Distributed Operation:
No central coordinator: Unlike WiFi with an access point, ad hoc nodes need a
distributed MAC protocol to avoid collisions when multiple nodes attempt to
transmit simultaneously. This requires efficient algorithms for fair channel
access and collision avoidance without a central authority.
2. Dynamic Topology:
Frequent changes: Nodes in ad hoc networks can join, leave, or move around
freely, leading to frequent changes in network structure. The MAC protocol
needs to adapt to this dynamic topology and maintain efficient communication.
3. Limited Resources:
Battery constraints: Mobile devices in ad hoc networks may have limited
battery power. The MAC protocol should be energy-efficient and minimize
control overhead for communication.
Processing limitations: Devices might have limited processing capabilities. The
protocol should be lightweight and require minimal processing power for
operation.
4. Hidden Terminal and Exposed Terminal Problems:
Hidden terminal: A node outside the transmission range of another node
(sender) might be within the range of a receiver, leading to collisions if both
nodes try to transmit simultaneously.
Exposed terminal: A node can be unaware of another node transmitting in its
range, leading to packet loss. Careful routing and MAC protocols can mitigate
these issues.
5. Security:
Open network: The absence of a central authority makes ad hoc networks more
vulnerable to security threats like eavesdropping, unauthorized access, and
denial-of-service attacks. Secure routing protocols and robust authentication
mechanisms are essential.
6. Scalability:
Network size: As the number of nodes in an ad hoc network increases,
managing communication and maintaining network performance becomes more
complex. The MAC protocol needs to be scalable to handle larger networks
efficiently.
7. Quality of Service (QoS):
Limited bandwidth: Wireless channels have inherently limited bandwidth
compared to wired networks. Guaranteeing QoS for real-time applications like
video streaming or voice calls can be challenging in ad hoc networks.
8. Fairness:
Ensuring all nodes have a fair chance to access the channel for data
transmission is important. The MAC protocol should prevent nodes with higher
power or better positions from dominating channel access.
9. Overhead vs. Performance:
Balancing the complexity of the protocol with its performance is crucial. Overly
complex protocols might introduce too much overhead, reducing efficiency.
However, a simple protocol might not provide adequate collision avoidance or
fairness.

9. Explain SPIN protocol. (Apr 19)


SPIN Protocol (Sensor Protocol for Information via Negotiation)
In Wireless Sensor Networks (WSNs), SPIN is a data-centric protocol that
facilitates efficient communication between sensor nodes and the base station.
Here's a breakdown of the key aspects of SPIN:
Core Concept:
Unlike traditional address-based routing where all nodes transmit data, SPIN
focuses on data naming and negotiation.
Sensor nodes use metadata to describe the data they sense (e.g., temperature,
humidity).
This metadata acts as a "name" for the data, allowing nodes to advertise what
data they have and negotiate data retrieval with interested parties.
Components:
Metadata: Descriptive information attached to sensor data, specifying its type,
source, and potentially other relevant details.
Advertisement Messages (ADV): Broadcasted by sensor nodes to advertise the
metadata of the data they possess.
Data Requests: Sent by the base station or other interested nodes to request
specific data based on the advertised metadata.
Working Mechanism:
Sensor nodes periodically sense the environment and generate data.
Each node attaches metadata to its data, describing its characteristics.
Nodes broadcast ADV messages containing the metadata to their neighbors.
The base station or other interested nodes listen for ADV messages.
If interested in specific data based on the metadata (e.g., temperature readings),
the receiver sends a Data Request message to the advertising node.
The node that advertised the data responds by transmitting the actual data
payload.
Benefits:
Reduced Network Traffic: Only interested nodes request data, minimizing
unnecessary transmissions and conserving energy.
Scalability: The protocol can efficiently handle large-scale deployments with
many sensor nodes.
Flexibility: Nodes can advertise and request various data types based on
application requirements.
Reduced Congestion: By eliminating unnecessary transmissions, SPIN helps to
avoid network congestion.
Limitations:
Overhead of Metadata: Creating and processing metadata can introduce some
overhead, especially for very small data packets.
Security Considerations: The protocol itself doesn't inherently address
security concerns. Additional mechanisms might be needed for secure data
transmission.

10. Explain periodic listen and sleep operation in S-MAC. (Apr 19)
S-MAC (Sensor-MAC) is a medium access control protocol designed
specifically for Wireless Sensor Networks (WSNs) to conserve energy on
battery-powered sensor nodes. A core principle of S-MAC is the concept of a
periodic listen and sleep operation, which significantly reduces idle listening
and extends node lifetime.
Here's a breakdown of this mechanism:
Sleep Schedule: Nodes alternate between sleep periods and active periods
based on a predetermined schedule. This schedule can be synchronized among
nodes or maintained locally.
Sleep Periods: During sleep periods, nodes conserve energy by powering down
most of their functionalities, including the radio transceiver. This significantly
reduces energy consumption compared to constantly listening for incoming
data.
Wake-up Periods: At designated times, nodes wake up and activate their radios
to participate in communication. This may involve:
Listening for Beacon Messages: The base station or a designated node
transmits beacon messages periodically. These beacons signal to sensor nodes
when to wake up and prepare for communication. Beacon messages may also
include additional information like scheduling details.
Data Transmission or Reception: Nodes can transmit any data they have
collected during the previous sleep cycle. They can also listen for incoming data
transmissions from other nodes.
Reduced Idle Listening: By sleeping during non-communication times, S-
MAC eliminates the energy wasted on idle listening, where nodes constantly
check for incoming data when none is expected. This is a significant advantage
compared to traditional protocols where nodes might continuously listen for
transmissions.
Benefits:
Energy Efficiency: The sleep-wake operation significantly reduces energy
consumption on sensor nodes, leading to extended network lifetime.
Scalability: The protocol can efficiently handle large-scale deployments with
many sensor nodes because it avoids unnecessary congestion from continuous
transmissions.
Predictable Communication: Scheduled communication periods ensure
reliable data exchange opportunities for sensor nodes.
Limitations:
Latency: Introducing sleep periods can introduce some delays in data delivery
compared to protocols with constant listening. However, for many WSN
applications focusing on environmental monitoring, slight delays might be
acceptable for the benefit of increased energy efficiency.
Synchronization: Maintaining synchronized sleep schedules across all nodes
can add complexity, especially for large deployments.

12. Explain different performance requirements of MAC protocol. (Apr 19)


Performance Requirements of MAC Protocols
In Wireless Sensor Networks (WSNs) and other wireless networks, Medium
Access Control (MAC) protocols play a critical role in ensuring efficient and
reliable communication. These protocols dictate how devices share the limited
wireless medium to avoid collisions and optimize data transmission. When
designing a MAC protocol, various performance requirements need to be
considered:
1. Energy Efficiency:
This is a primary concern in WSNs, where sensor nodes often have limited
battery power. The MAC protocol should minimize energy consumption during
data transmission, control overhead, and idle listening. Techniques like sleep-
wake schedules and collision avoidance mechanisms can help achieve this.
2. Throughput:
This refers to the amount of data successfully transmitted per unit time. The
MAC protocol should strive to achieve high throughput while maintaining
fairness and avoiding congestion. Balancing retransmissions with successful
transmissions is crucial.
3. Delay:
This refers to the time it takes for a data packet to travel from the sender to the
receiver. The MAC protocol should minimize delays, especially for real-time
applications where timely data delivery is critical. Techniques like low access
delays and efficient queuing mechanisms can help.
4. Fairness:
The MAC protocol should ensure all nodes have a fair chance to access the
channel and transmit their data. This prevents nodes with higher power or better
positions from dominating channel access. Techniques like round-robin
scheduling or carrier sense mechanisms can promote fairness.
5. Reliability:
The MAC protocol should aim to deliver data packets successfully with
minimal errors or losses. Mechanisms like acknowledgments, retransmissions,
and error correction can improve reliability. However, achieving high reliability
might come at the cost of increased overhead and energy consumption.
6. Scalability:
The MAC protocol should function efficiently and adapt to varying network
sizes. As the number of nodes in a network increases, the protocol should
continue to provide fair and efficient channel access. Techniques like
distributed coordination can help achieve scalability.
7. Security:
In some WSN applications, security is crucial to protect data from
eavesdropping, unauthorized access, or manipulation. The MAC protocol might
need to incorporate mechanisms for authentication and encryption, although this
can add complexity and overhead.
8. Real-Time vs. Non-Real-Time Support:
The MAC protocol should cater to different application requirements. Some
applications might prioritize real-time data delivery with low delays, while
others might focus on energy efficiency even if it introduces some latency. The
protocol should be adaptable to handle both types of traffic efficiently.

14. Explain directional busy-tone-based MAC protocol in detail (Apr 23)


Directional Busy-Tone Based MAC Protocol (BT-DMAC) for Wireless
Sensor Networks
In Wireless Sensor Networks (WSNs), where nodes often have limited battery
power and bandwidth, efficient medium access control (MAC) protocols are
crucial. Directional Busy-Tone MAC (BT-DMAC) is a protocol specifically
designed for WSNs utilizing directional antennas to improve network
performance and address limitations of traditional MAC protocols.
Here's a breakdown of BT-DMAC:
Core Concept:
BT-DMAC leverages directional antennas, allowing nodes to focus
transmissions and receptions in specific directions.
The protocol utilizes busy tones to signal ongoing transmissions, preventing
collisions and optimizing channel access.
Components:
Directional Network Allocation Vector (DNAV): A control structure
maintained by nodes, specifying the direction each node is allowed to transmit
during a certain time slot. This helps avoid conflicts and ensures efficient spatial
reuse of the channel.
Busy Tones: Omni-directional tones transmitted by both the sender and
receiver during an ongoing transmission. These tones notify neighboring nodes
of the occupied channel and direction, preventing them from initiating
transmissions in that direction.
Working Mechanism:
Nodes establish the DNAV based on network topology and communication
needs.
When a node has data to transmit, it negotiates with the intended receiver using
control packets.
Upon successful negotiation, the sender and receiver activate their directional
antennas and transmit busy tones simultaneously.
Neighboring nodes within the busy tone range can detect the tones and
direction, recognizing the channel as occupied and avoiding transmissions in
that direction.
Data transmission occurs between the sender and receiver using their directional
antennas.
After data transmission is complete, both nodes cease transmitting busy tones,
freeing up the channel for other transmissions.
Advantages of BT-DMAC:
Reduced Collisions: Busy tones effectively prevent collisions by notifying
neighboring nodes of ongoing transmissions and the direction of those
transmissions.
Improved Spatial Reuse: Directional antennas combined with DNAV enable
efficient channel reuse as nodes can transmit in different directions
simultaneously without interference.
Energy Efficiency: By reducing collisions and optimizing channel access, BT-
DMAC helps conserve energy on sensor nodes.
Reduced Hidden Terminal and Exposed Terminal Problems: The
directional nature of communication and busy tones mitigate these problems
that can occur in traditional omnidirectional MAC protocols.
Disadvantages of BT-DMAC:
Complexity: Implementing and managing directional antennas and DNAV can
be more complex compared to simpler omnidirectional protocols.
Overhead: Control packets for negotiation and busy tone transmissions
introduce some overhead compared to simpler MAC protocols.
Limited Network Scalability: As the network size increases, managing DNAV
and potential interference between multiple directional transmissions can
become more challenging.

15. Explain Single-Hop versus Multi-Hop Networks. (Apr 23)


In wireless networks, the way data travels between devices is determined by the
network's topology, specifically the number of "hops" a data packet takes to
reach its destination. Here's a breakdown of the key differences between single-
hop and multi-hop networks:
Single-Hop Networks:
Data Transmission: In a single-hop network, all devices are within direct
communication range of a central access point (AP) or hub. Data packets travel
only once, directly from the source device to the AP/hub. Examples include Wi-
Fi networks where your devices connect to a router, or Bluetooth connections
between two devices.
Range Limitation: The network's range is limited by the transmission power of
the AP/hub and the receiving devices. Obstacles can further reduce the effective
range.
Scalability: Expanding a single-hop network can be challenging. You would
need to add more APs/hubs, ensuring each device stays within range.
Simplicity: Single-hop networks are generally simpler to set up and manage
due to the centralized control of the AP/hub.
Latency: Data transfer typically experiences lower latency (delay) because
there's only one hop involved.
Multi-Hop Networks:
Data Transmission: In a multi-hop network, devices might not be within direct
range of the destination (e.g., the base station). Data packets travel through
multiple intermediate devices (relays) until they reach their final destination.
Examples include sensor networks, mesh networks, and some mobile ad-hoc
networks (MANETs).
Extended Range: Multi-hop networks can cover a much larger area compared
to single-hop networks. Each relay node extends the overall network reach.
Scalability: Expanding a multi-hop network is generally easier. You can add
more relay nodes to extend coverage without needing a central AP/hub in every
location.
Complexity: Multi-hop networks can be more complex to manage due to the
need for routing protocols to determine the best path for data packets across
multiple hops.
Latency: Data transfer might experience higher latency compared to single-hop
networks due to the additional hops involved.

16. How Congestion Detection and Avoidance works? (Apr 19)


Congestion detection and avoidance (CDA) is a technique used in various
network communication systems to prevent network congestion and maintain
smooth data flow. It involves two key mechanisms:
Congestion Detection: This involves identifying when network traffic reaches
a level that could lead to performance degradation. Here are some common
methods for congestion detection:
Buffer Occupancy: Monitoring the fill level of buffers in routers or network
devices. High buffer occupancy indicates a potential bottleneck where data is
accumulating faster than it can be forwarded.
Packet Loss Rate: Tracking the percentage of data packets that are dropped
due to congestion. An increase in packet loss suggests the network is
overloaded.
Queue Length: Observing the number of packets waiting in queues at routers
or network devices. Long queues indicate congestion points.
Delay Measurement: Monitoring the time it takes for data packets to travel
from source to destination. Increased delays can be a sign of congestion.
Congestion Avoidance: Once congestion is detected, various techniques can be
employed to prevent it from worsening:
Rate Limiting: Throttling the rate at which data is sent into the network,
preventing further overload.
Packet Dropping: Selectively dropping low-priority packets to free up
resources for more critical data.
Dynamic Routing: Adaptively changing data paths to avoid congested areas of
the network.
Window Adjustment: In protocols like TCP, adjusting the transmission
window size to control the amount of data a sender can send before receiving an
acknowledgment.

17. Explain TCP operation.


TCP, or Transmission Control Protocol, is a fundamental protocol in the TCP/IP
suite that enables reliable data transmission over a network. It ensures ordered
and error-free delivery of data streams between applications running on
different devices. Here's a breakdown of how TCP operates:
Core Concept:
TCP establishes a connection between two applications before data transfer.
This connection-oriented approach guarantees reliable and ordered delivery.
Unlike UDP (User Datagram Protocol) which sends data packets without
guarantees, TCP offers several mechanisms to ensure reliable data delivery.
Key Mechanisms:
Three-way Handshake: Establishes a connection between sender and receiver
before data transmission.
Sender sends a SYN (Synchronize) packet initiating the connection.
Receiver responds with a SYN-ACK (Synchronize Acknowledgement) packet
acknowledging the request and sending its own synchronization information.
Sender sends an ACK (Acknowledgement) packet confirming receipt of the
SYN-ACK, finalizing the connection establishment.
Sequencing: TCP assigns a sequence number to each byte of data sent. This
allows the receiver to reorder packets that might arrive out of order due to
network delays or retransmissions.
Acknowledgements (ACKs): The receiver sends ACKs back to the sender for
successfully received data packets. This allows the sender to track which data
has been received and identify any missing packets.
Retransmissions: If an ACK isn't received within a timeout period, the sender
assumes the packet was lost and retransmits it.
Flow Control: TCP uses a windowing mechanism to regulate the data flow
between sender and receiver. The receiver advertises a window size, indicating
the amount of data it's prepared to receive before needing an acknowledgement.
This prevents the sender from overwhelming the receiver with data.
Connection Termination: Once data transmission is complete, both sides can
initiate a four-way handshake to gracefully close the connection.

18. Explain feasibility of using TCP/UDP for WSN.


While TCP and UDP are fundamental protocols in network communication,
their design philosophies make them generally unsuitable for Wireless Sensor
Networks (WSNs) due to several key limitations:
TCP Limitations in WSNs:
Connection-Oriented: TCP establishes connections before data transfer,
introducing significant overhead compared to the small data packets typically
used in WSNs. The three-way handshake for connection establishment can be
wasteful for short data transmissions.
Reliability Mechanisms: TCP's focus on reliability with features like
sequencing, acknowledgments, and retransmissions comes at the cost of
increased overhead and energy consumption. In WSNs, where nodes often have
limited battery power, these mechanisms can significantly drain energy.
Window Management: TCP's flow control through windowing might not be
efficient for bursty data transmissions in some WSN applications. Additionally,
frequent retransmissions due to potential packet loss in wireless communication
can further burden the network.
UDP Limitations in WSNs:
Unreliable Delivery: UDP sends data packets without guarantees of delivery or
order. While this reduces overhead, it's not ideal for applications where data
integrity and order are important. Some WSN applications might require
confirmation of data reception.
No Congestion Control: UDP doesn't have built-in mechanisms to prevent
congestion. In WSNs with limited bandwidth, uncontrolled data floods from
multiple nodes can quickly overwhelm the network.
Alternative Approaches for WSNs:
Considering these limitations, WSNs often employ application-specific
protocols or adaptations of existing protocols that are more energy-efficient and
better suited for the unique characteristics of sensor networks. Here are some
examples:
Lightweight Protocols: Protocols like LEACH (Low-Energy Adaptive
Clustering Hierarchy) and PEGASIS (Power-efficient Gathering in Sensor
Information Systems) focus on data aggregation and efficient routing to
minimize data transmissions and conserve energy.
Data-Centric Protocols: These protocols, like SPIN (Sensor Protocol for
Information via Negotiation), prioritize data naming and negotiation, allowing
nodes to advertise and request specific data, reducing unnecessary
transmissions.
Custom Protocols: Depending on the specific application requirements,
developers might design custom protocols tailored for the data types,
communication patterns, and energy constraints of their WSN deployment.

19. Write a short note on SMACS.


SMACS: A recipe for digital transformation
SMACS stands for Social, Mobile, Analytics, and Cloud. It represents a
foundational approach to modern business strategy, emphasizing the importance
of integrating these four key technological areas:
Social: Leveraging social media platforms to connect with customers, build
brand awareness, and gather valuable user insights.
Mobile: Optimizing services and applications for mobile devices, recognizing
the increasing shift towards mobile browsing and interactions.
Analytics: Utilizing data analytics tools to extract insights from customer data,
user behavior, and market trends, enabling data-driven decision making.
Cloud: Adopting cloud computing solutions for data storage, processing power,
and software delivery, offering scalability, flexibility, and cost-effectiveness.
By effectively integrating these elements, businesses can:
Enhance customer engagement and reach new audiences through social media.
Provide seamless user experiences across various mobile devices.
Gain valuable insights from data to improve business operations and marketing
strategies.
Leverage the scalability and cost benefits of cloud computing.
20.Routing challenges and design issues
Routing Challenges and Design Issues in Wireless Sensor Networks
(WSNs)
Wireless Sensor Networks (WSNs) present unique challenges for routing data
compared to traditional wired networks. Here's a breakdown of the key
challenges and design considerations when developing routing protocols for
WSNs:
Challenges:
Limited Resources: Sensor nodes are typically battery-powered and have
limited processing capabilities and memory. Routing protocols need to be
energy-efficient and have a low computational footprint.
Dynamic Network Topology: Sensor nodes may be added, removed, or fail
over time. Routing protocols need to adapt to these changes dynamically and
maintain efficient communication paths.
Scalability: WSNs can involve a large number of nodes deployed over a wide
area. Routing protocols need to function effectively in such large-scale
deployments.
Limited Bandwidth: The wireless channel available for communication in
WSNs can be congested. Routing protocols need to optimize data transmission
to avoid congestion and ensure reliable delivery.
Data Aggregation: Sensor nodes often collect similar data. Routing protocols
can incorporate mechanisms for data aggregation at intermediate nodes to
reduce data redundancy and minimize the number of transmissions.
Security: WSNs can be vulnerable to security threats. Routing protocols need
to consider security measures to protect data integrity and confidentiality during
transmission.
Design Issues:
Trade-offs: WSN routing protocols often involve trade-offs between different
objectives. For example, a protocol might prioritize energy efficiency over data
delivery speed, or vice versa. The designer needs to consider the specific
application requirements to determine the optimal balance.
Proactive vs. Reactive Protocols: Proactive protocols establish routing paths
throughout the network periodically, while reactive protocols discover routes
on-demand when needed. Choosing the right approach depends on factors like
network traffic patterns and the need for real-time communication.
Data-Centric Routing: Some protocols focus on the data itself rather than
specific routes. Data packets may be forwarded based on the type of data they
contain, potentially reaching nodes with the capability to process that specific
data type.
Hierarchical Routing: Hierarchical routing organizes nodes into clusters with
cluster heads forwarding data towards the sink node. This can improve
scalability and reduce communication overhead in large networks.
Examples of Routing Protocols:
LEACH (Low-Energy Adaptive Clustering Hierarchy): A popular
hierarchical routing protocol that uses clustering to reduce energy consumption.
Directed Diffusion: A data-centric routing protocol where nodes advertise their
interest in specific types of data, allowing efficient routing of relevant data
packets.
Collection Tree Protocol (CTP): A tree-based routing protocol designed for
reliability and scalability in WSNs.

21.Routing Strategies in Wireless Sensor Networks,


In Wireless Sensor Networks (WSNs), efficient data routing is crucial for
collecting sensor data and ensuring network functionality. Here's an overview of
various routing strategies employed in WSNs:
Classification by Network Structure:
Flat Routing: All nodes have equal roles and capabilities. Routing information
is flooded throughout the network, leading to potentially high overhead. This
approach is simple but may not be scalable for large networks.
Hierarchical Routing: Nodes are organized into a hierarchy, with cluster heads
aggregating data from other nodes within their cluster before forwarding it to
higher levels or the sink node. This reduces communication overhead and
improves scalability.
Location-Based Routing: Utilizes the geographical location of nodes for
routing decisions. Nodes can forward data towards specific areas of interest or
the sink node based on location information. This can be efficient for
geographically aware applications.
Classification by Routing Approach:
Data-Centric Routing: Focuses on the type of data being transmitted rather
than specific routes. Nodes advertise their interest in certain data types, and data
packets are forwarded based on their content, potentially reaching nodes
equipped to handle that data. This approach is flexible but may require
additional overhead for interest propagation.
QoS-Aware Routing: Considers Quality of Service (QoS) parameters like
delay, bandwidth, and reliability during route selection. This is important for
real-time applications with strict latency requirements.
Multipath Routing: Utilizes multiple paths for data transmission, improving
fault tolerance and resilience to link failures. However, it can increase
complexity and overhead.
Popular Routing Protocols:
LEACH (Low-Energy Adaptive Clustering Hierarchy): A hierarchical
protocol that uses periodic clustering to reduce energy consumption. Cluster
heads aggregate data from member nodes, reducing the number of transmissions
to the sink.
Directed Diffusion: A data-centric protocol where nodes advertise interest in
specific data types. Data packets with matching content are then forwarded
towards interested nodes, enabling efficient data delivery.
Collection Tree Protocol (CTP): A tree-based protocol that constructs a
collection tree for routing data towards the sink node. It offers reliability and
scalability for WSNs.
Geographic Routing Protocols (GPSR, GEAR): Leverage location
information for routing decisions. Nodes forward data packets towards the sink
node's direction, improving efficiency for geographically aware deployments.

22. IEEE 802.15.4 LR-WPANs Standard Case Study

case Study: IEEE 802.15.4 LR-WPANs Standard


The IEEE 802.15.4 standard, also known as Zigbee, is a widely used protocol
for Low-Rate Wireless Personal Area Networks (LR-WPANs). This case study
examines the strengths and weaknesses of IEEE 802.15.4 in the context of
Wireless Sensor Networks (WSNs).
Strengths:
Low Power Consumption: IEEE 802.15.4 is designed for battery-powered
devices, featuring mechanisms like sleeping modes and short packet sizes to
minimize energy usage. This is crucial for WSNs where sensor nodes often
operate on limited battery power.
Low Cost: The simplicity of the standard translates to lower hardware and
software costs for devices that implement it. This makes IEEE 802.15.4 a cost-
effective solution for deploying large-scale sensor networks.
Low Data Rate: While seemingly a limitation, the low data rate of IEEE
802.15.4 helps conserve energy and reduces congestion in WSNs, where sensor
data often doesn't require high-speed transmission.
Security: The standard offers basic security features like encryption and
authentication to protect data confidentiality and integrity in WSNs.
Maturity and Interoperability: IEEE 802.15.4 is a mature standard with a
large ecosystem of interoperable devices from various vendors. This simplifies
deployment and integration in WSNs.
Weaknesses:
Limited Range: The standard has a relatively short communication range,
typically tens of meters. This may not be suitable for large-scale sensor
networks spread over a wide area.
Limited Bandwidth: The low data rate of IEEE 802.15.4 restricts the amount
of data that can be transmitted per unit time. This can be an issue for
applications requiring high-throughput data collection.
Scalability: While the standard supports a decent number of nodes, its
performance may degrade in very large and dense sensor networks due to
potential congestion and overhead.
Limited Quality of Service (QoS): The standard offers basic QoS features but
may not be suitable for applications with strict latency or reliability
requirements.
Applications:
IEEE 802.15.4 is well-suited for various WSN applications where low power
consumption, cost-effectiveness, and reliable data collection are priorities. Here
are some examples:
Smart Homes: Sensor networks for monitoring temperature, humidity, light
levels, occupancy, and security.
Industrial Automation: Monitoring industrial processes, equipment
performance, and environmental conditions.
Building Automation: Sensor networks for energy management, HVAC
control, and fire detection.
Wearable Sensors: Monitoring vital signs, activity levels, and environmental
parameters for health and fitness applications.
Smart Agriculture: Monitoring soil moisture, temperature, and crop health in
precision agriculture.

23. Transport Protocol Design Issues


In computer networking, the transport layer plays a crucial role in ensuring
reliable and efficient data delivery between applications on different hosts.
Here's a breakdown of some key design issues encountered when developing
transport protocols:
Reliability vs. Performance:
Reliability: Transport protocols strive to deliver data packets in the correct
order and without errors. This involves mechanisms like acknowledgements
(confirming successful reception), retransmissions (resending lost packets), and
error correction techniques.
Performance: However, these reliability mechanisms can introduce overhead
and latency (delay) in data transfer. The challenge lies in finding a balance
between guaranteeing reliable delivery and achieving good performance (fast
data transfer) for various applications.
Congestion Control:
Networks can become congested when too much data is trying to be transmitted
at once. Transport protocols need to implement congestion control mechanisms
to avoid overwhelming the network.
These mechanisms can involve techniques like:
Slow Start: Gradually increasing the transmission rate to probe for available
bandwidth.
Congestion Avoidance: Adjusting the data sending rate based on network
congestion signals.
Fast Retransmit/Recovery: Taking quicker actions to recover from packet
losses caused by congestion.
Flow Control:
Even if the network has sufficient capacity, the receiver may not be able to
handle data as fast as the sender transmits it.
Transport protocols need flow control mechanisms to regulate the data flow
between sender and receiver. This can be achieved by:
Windowing: The sender transmits data packets within a specific window size,
allowing the receiver to buffer them and acknowledge them as they are
processed.
Rate-based control: The receiver can advertise its buffer capacity or desired
data rate to the sender, allowing for adaptation.
Multiplexing and Demultiplexing:
The transport layer often needs to handle data streams from multiple
applications on a single host.
It needs to multiplex these data streams into a single data stream for
transmission over the network and demultiplex the received data stream back to
the appropriate application at the destination. This requires efficient port
management mechanisms to differentiate between different application data
flows.
Security:
Transport protocols can play a role in securing data transmission by providing
features like:
Encryption: Sc scrambling data to protect confidentiality during transmission.
Authentication: Verifying the identity of the sender and ensuring data integrity
(not tampered with).

You might also like