Unit 3
Unit 3
Slotted ALOHA
It is similar to pure aloha, except that we divide time into slots and sending of
data is allowed only at the beginning of these slots. If a station misses out the
allowed time, it must wait for the next slot. This reduces the probability of
collision.
CSMA
Carrier Sense Multiple Access ensures fewer collisions as the station is required
to first sense the medium (for idle or busy) before transmitting data. If it is idle
then it sends data, otherwise it waits till the channel becomes idle. However
there is still chance of collision in CSMA due to propagation delay. For example,
if station A wants to send data, it will first sense the medium. If it finds the
channel idle, it will start sending data. However, by the time the first bit of data
is transmitted (delayed due to propagation delay) from station A, if station B
requests to send data and senses the medium it will also find it idle and will
also send data. This will result in collision of data from station A and B.
CSMA/CD
Carrier sense multiple access with collision detection. Stations can terminate
transmission of data if collision is detected. For more details refer – Efficiency
of CSMA/CD.
CSMA/CA
Carrier sense multiple access with collision avoidance. The process of collisions
detection involves sender receiving acknowledgement signals. If there is just
one signal(its own) then the data is successfully sent but if there are two
signals(its own and the one with which it has collided) then it means a collision
has occurred. To distinguish between these two cases, collision must have a lot
of impact on received signal. However it is not so in wired networks, so
CSMA/CA is used in this case.
CSMA/CA Avoids Collision
● Interframe Space: Station waits for medium to become idle and if found
idle it does not immediately send data (to avoid collision due to
propagation delay) rather it waits for a period of time called Interframe
space or IFS. After this time it again checks the medium for being idle.
The IFS duration depends on the priority of station.
● Contention Window: It is the amount of time divided into slots. If the
sender is ready to send data, it chooses a random number of slots as
wait time which doubles every time medium is not found idle. If the
medium is found busy it does not restart the entire process, rather it
restarts the timer when the channel is found idle again.
● Acknowledgement: The sender re-transmits the data if
acknowledgement is not received before time-out.
What is the Controlled Access?
In controlled access, the stations seek data from one another to find which
station has the right to send. It allows only one node to send at a time, to avoid
the collision of messages on a shared medium. The three controlled-access
methods are:
● Reservation
● Polling
● Token Passing
I. Reservation
● In the reservation method, a station needs to make a reservation before
sending data.
● The timeline has two kinds of periods:
o Reservation interval of fixed time length
o Data transmission period of variable frames.
● If there are M stations, the reservation interval is divided into M slots,
and each station has one slot.
● Suppose if station 1 has a frame to send, it transmits 1 bit during the slot
1. No other station is allowed to transmit during this slot.
● In general, i th station may announce that it has a frame to send by
inserting a 1 bit into i th slot. After all N slots have been checked, each
station knows which stations wish to transmit.
● The stations which have reserved their slots transfer their frames in that
order.
● After data transmission period, next reservation interval begins.
● Since everyone agrees on who goes next, there will never be any
collisions.
The following figure shows a situation with five stations and a five-slot
reservation frame. In the first interval, only stations 1, 3, and 4 have made
reservations. In the second interval, only station 1 has made a reservation.
II. Polling
● Polling process is similar to the roll-call performed in class. Just like the
teacher, a controller sends a message to each node in turn.
● In this, one acts as a primary station(controller) and the others are
secondary stations. All data exchanges must be made through the
controller.
● The message sent by the controller contains the address of the node
being selected for granting access.
● Although all nodes receive the message the addressed one responds to it
and sends data if any. If there is no data, usually a “poll reject”(NAK)
message is sent back.
● Problems include high overhead of the polling messages and high
dependence on the reliability of the controller.
3. Channelization
In this, the available bandwidth of the link is shared in time, frequency and
code to multiple stations to access channel simultaneously.
● Frequency Division Multiple Access (FDMA) – The available bandwidth
is divided into equal bands so that each station can be allocated its own
band. Guard bands are also added so that no two bands overlap to avoid
crosstalk and noise.
● Time Division Multiple Access (TDMA) – In this, the bandwidth is shared
between multiple stations. To avoid collision time is divided into slots
and stations are allotted these slots to transmit data. However there is a
overhead of synchronization as each station needs to know its time slot.
This is resolved by adding synchronization bits to each slot. Another issue
with TDMA is propagation delay which is resolved by addition of guard
bands.
Survey routing protocols
The routing protocol is a process to select suitable path for the data to travel
from source to destination. The process encounters several difficulties while
selecting the route, which depends upon, type of network, channel
characteristics and the performance metrics.
The data sensed by the sensor nodes in a wireless sensor network (WSN) is
typically forwarded to the base station that connects the sensor network with the
other networks (may be internet) where the data is collected, analyzed and some
action is taken accordingly.
Routing challenges in WSNs
The design task of routing protocols for WSN is quite challenging because of
multiple characteristics, which differentiate them, from wireless
infrastructure-less networks. Several types of routing challenges involved in
wireless sensor networks. Some of important challenges are mentioned below:
● It is almost difficult to allocate a universal identifiers scheme for a big
quantity of sensor nodes. So, wireless sensor motes are not proficient of
using classical IP-based protocols.
● The flow of detected data is compulsory from a number of sources to a
specific base station.
● The created data traffic has significant redundancy in most of cases.
Because many sensing nodes can generate same data while sensing. So, it
is essential to exploit such redundancy by the routing protocols and
utilize the available bandwidth and energy as efficiently as possible.
Classification of routing protocols
A classification tree is shown below: The routing protocol for adhoc wireless
networks can be broadly classified into 4 categories based on
• Routing information update mechanism
• Use of temporal information for routing
• Routing topology
• Utilization of specific resources
Based on the routing information update mechanism Ad hoc wireless network
routing protocols can be classified into 3 major categories based on the routing
information update mechanism.
They are:
➢ Proactive or table-driven routing protocols:
• Every node maintains the network topology information in the form of routing
tables by periodically exchanging routing information.
• Routing information is generally flooded in the whole network.
• Whenever a node requires a path to a destination, it runs an appropriate
pathfinding algorithm on the topology information it maintains.
➢ Reactive or on-demand routing protocols
• Do not maintain the network topology information.
• Obtain the necessary path when it is required, by using a connection
establishment process.
➢ Hybrid routing protocols:
• Combine the best features of the above two categories.
• Nodes within a certain distance from the node concerned, or within a
particular geographical region, are said to be within the routing zone of the
given node.
• For routing within this zone, a table-driven approach is used.
• For nodes that are located beyond this zone, an on-demand approach is used
Survey routing protocols
Hierarchical Routing Protocols
● Description: In hierarchical routing, nodes are organized into groups,
often with a hierarchy of nodes that handle different tasks. Some nodes,
such as gateways or cluster heads, perform more complex routing tasks,
while others act as simple sensors or data producers.
● Divides the network into clusters or hierarchies to facilitate efficient data
aggregation and routing.
● Examples:
o LEACH (Low Energy Adaptive Clustering Hierarchy): A widely used
protocol where nodes are divided into clusters. Cluster heads
aggregate data from nodes in their cluster and communicate with
the sink or base station.
Geographical Routing Protocols
● Description: These protocols use the physical location of nodes (often
provided by GPS) to make routing decisions, reducing overhead caused
by maintaining a global network topology.
● Examples:
o Greedy Routing: Nodes forward data packets to the neighbor
closest to the destination based on geographical position.
Dynamic Routing:
Adapts routing paths based on real-time network conditions, such as traffic
load or topology changes.
● Examples: Protocols that dynamically adjust routes to avoid
congested or unreliable links.
Flat Routing Protocols
● Description: In flat routing, all nodes are treated equally, and each node
may participate in routing decisions.
● Examples:
o Flooding: A simple technique where each node broadcasts the
packet to all of its neighbors. However, this can cause redundancy
and network congestion.
Other Notable Protocols:
● AODV (Ad-hoc On-Demand Distance Vector): A reactive routing
protocol used in mobile ad-hoc networks.
● DSR (Dynamic Source Routing): Another reactive routing protocol
that uses source routing to find paths in mobile ad-hoc networks.
● EPR (Energy-Aware Peering Routing): Designed to reduce network
traffic and energy consumption in wireless body sensor networks.