SlideShare a Scribd company logo
AD HOC AND WIRELESS SENSOR NETWORKS
Dr.Arun Chokkalingam
Professor
Department of Electronics and Communication
RMK College of Engineering and Technology
Chennai.
WSN-IEEE 802.15.4 -MAC Protocol
Content
• IEEE 802.15.4 MAC protocol,
Importance of MAC Protocols
Medium access control (MAC) protocols:
They coordinate the times where a number of
nodes access a shared communication medium.
Types of MAC Protocols
• Low Duty Cycle Protocols And Wakeup Concepts –
– S-MAC,
– The Mediation Device Protocol
• Contention based protocols – PAMAS,
• Schedule based protocols – LEACH,
• IEEE 802.15.4 MAC protocol,
802.15.4 General Characteristics
• The standard covers the physical layer and the MAC layer of a low-Data rate
Wireless Personal Area Network (WPAN).
• Star or Peer-to-Peer operation.
• Support for low latency devices.
• Fully handshake protocol for transfer reliability.
• Low power consumption.
• combines both schedule-based as well as contention-based schemes.
• The protocol is asymmetric in that different types of nodes with different roles
are used.
The targeted applications for IEEE 802.15.4 are in the area of wireless sensor networks, home
automation, home networking, connecting devices to a PC, home security, and so on.
Data rates of 250 kb/s
Data rates of 20 kb/s. Data rates of 40 kb/s
Operating frequency bands
• Most of these applications require only low-to-medium bitrates (up to some
few hundreds of kbps),
• The physical layer offers bitrates of
• 20 kbps (a single channel in the frequency range 868 – 868.6 MHz),
• 40 kbps (ten channels in the range between 905 and 928 MHz)
• 250 kbps (16 channels in the 2.4 GHz)
• There are a total of 27 channels available, but the MAC protocol uses only one of
these channels at a time; it is not a multichannel protocol.
05 2004Marco Naeve, Eaton Corp. Slide 9
Protocol Drivers
 Extremely low cost
 Ease of installation
 Reliable data transfer
 Short range operation
• Reasonable battery life
• Simple but flexible protocol
IEEE 802.15.4 MAC
Upper Layers
IEEE 802.15.4 SSCS
IEEE 802.2
LLC, Type I
IEEE 802.15.4
2400 MHz
PHY
IEEE 802.15.4
868/915 MHz
PHY
802.15.4 Architecture
Network architecture and types & roles of nodes
The standard distinguishes on the MAC layer
two types of nodes:
Full Function Device (FFD) can operate in three different roles:
1. PAN coordinator(PAN = Personal Area Network),
2. A simple coordinator
3. A device.
Reduced Function Device (RFD)
• operate only as a device.
Cont.
• A device node must be associated to a coordinator node and communicates directly to
the coordinator. (forming a star network.)
• Coordinators can operate in a peer-to-peer fashion
• Multiple coordinators can form a Personal Area Network (PAN).
A coordinator handles following tasks:
• It manages a list of associated devices.
• Devices are required to explicitly associate and disassociate with a coordinator using certain
signaling packets.
• It allocates short addresses to its devices.
• All IEEE 802.15.4 nodes have a 64-bit device address.
• When a device associates with a coordinator, it may request assignment of a 16-bit short
address to be used subsequently in all communications between device and coordinator.
• In the beaconed mode of IEEE 802.15.4, it transmits regularly frame beacon packets
announcing the PAN identifier, a list of outstanding frames, and other parameters.
• Furthermore, the coordinator can accept and process requests to reserve fixed time slots to
nodes and the allocations are indicated in the beacon.
•It exchanges data packets with devices and with peer coordinators.
Superframe Structure
• We start with the beaconed mode of IEEE 802.15.4.
Optional Frame Structure
15ms * 2n
where 0  n  14
GTS 3
GTS
2
Network
beacon
Transmitted by PAN coordinator. Contains network information,
frame structure and notification of pending node messages.
Beacon
extension
period
Space reserved for beacon growth due to pending node messages
Contention
period
Access by any node using CSMA-CA
Guaranteed
Time Slot
Reserved for nodes requiring guaranteed bandwidth.
GTS
1
0123456789101112131415
Slot
Battery life
extension
Contention Access Period Contention Free Period
• The coordinator of a star network operating in the beaconed mode organizes channel
access and data transmission with the help of a superframe structure.
• The superframe is subdivided into an active period and an inactive period.
• During the inactive period, all nodes including the coordinator can switch off their
transceivers and go into sleep state.
• The nodes have to wake up immediately before the inactive period ends to receive the next
beacon. The inactive period may be void.
• The active period is subdivided into 16 time slots.
• The first time slot is occupied by the beacon frame
• remaining time slots are partitioned into a Contention Access Period (CAP) followed by a
number (maximal seven) of Guaranteed Time Slots (GTSs).
Superframe structure
Cont
• The length of the active and inactive period as well as the length of a
single time slot and the usage of GTS slots are configurable.
• The coordinator is active during the entire active period.
• The associated devices are active in the GTS phase only in time slots
allocated to them; in all other GTS slots they can enter sleep mode.
• In the Contention Access Period (CAP), a device node can shutdown
its transceiver.
• Coordinators do much more work than devices and the protocol is
inherently asymmetric.
Guaranteed Time Slots (GTS) Management
GTS request
packets
GTS request
packets
ACK
ACK
the device is required to track the
coordinator’s beacons for some
specified time to approve GTS
GTS descriptor
GTS descriptor
Wait for approval
Guaranteed Time Slots (GTS) Management
• The coordinator allocates GTS to devices only by sending appropriate request packets during
the CAP.
• Flag in the request indicates whether the requested time slot is a transmit slot or a receive
slot.
• In a transmit slot, the device transmits packets to the coordinator .
• in a receive slot the data flows in the reverse direction.
• Another field in the request specifies the desired number of time slots in the GTS phase.
• The coordinator answers the request packet in two steps:
• An immediate acknowledgment packet confirms that the coordinator has received the request
packet properly but contains no information about success or failure of the request.
• After receiving the acknowledgment packet, the device is required to track the coordinator’s
beacons for some specified time
Cont
• If the coordinator has insufficient resources, it generates a GTS descriptor for (invalid) time
slot zero, indicating the available resources in the descriptors length field.
• the device may consider renegotiation.
• it concludes that the allocation request has failed.
• A GTS is allocated to a device on a regular basis until it is explicitly deallocated.
• The deallocation can be requested by the device by means of a special control frame.
• After sending this frame, the device shall not use the allocated slots any further.
• The coordinator can also trigger deallocation based on certain criteria. Specifically, the
coordinator monitors the usage of the time slot: If the slot is not used at least once within a
certain number of superframes, the slot is deallocated.
• The coordinator signals deallocation to the device by generating a GTS descriptor with start
slot zero.
Operational Models Of IEEE 802.15.4
Data Transfer Procedures
• first assume that a device wants to transmit a data packet to the
coordinator
If the device has an allocated transmit GTS, it wakes up just
before the time slot starts and sends its packet immediately
without running any carrier-sense or other collision-avoiding
operations.
Allocated transmit
GTS
coordinator
Device
Cont
• Second assume when the device does not have any allocated GTS slots
it sends its data packet during the CAP using a slotted
CSMA protocol
Transmit during
CAP
coordinator
Device
Cont
• data transfer from the coordinator to a device
If the device has allocated a receive GTS and when the
packet/acknowledgment/IFS cycle fits into these, the
coordinator simply transmits the packet in the allocated
time slot without further coordination.
Receive GTScoordinator
Device
Cont
• when the coordinator is not
able to use a receive GTS.
The handshake between
device and coordinator
• The coordinator announces a
buffered packet to a device by
including the devices address
into the pending address
field of the beacon frame.
Slotted CSMA-CA protocol
Slotted CSMA-CA protocol
The variable
NB - counts the number of backoffs, CW-
indicates the size of the current
congestion window,
BE- is the current backoff exponent.
CCA - Clear Channel Assessment
Upon arrival of a new packet to transmit,
these variables are initialized with NB 0,
CW 2, and BE macMinBE (with
macMinBE being a protocol parameter),
respectively.
Nonbeaconed mode/ unslotted CSMA-CA protocol
• In the nonbeaconed mode, the coordinator does not send beacon frames nor is there
any GTS mechanism.
• The lack of beacon packets takes away a good opportunity for devices to acquire time
synchronization with the coordinator.
• All packets from devices are transmitted using an unslotted CSMA-CA protocol.
• the device performs only a single CCA (Clear Channel Assessment) operation. If this
indicates an idle channel, the device infers success.
• Coordinators must be switched on constantly but devices can follow their own sleep
schedule.
• Devices wake up for two reasons:
(i) to send a data or control packet to the coordinators,
(ii) to fetch a packet from the coordinator
References
• https://www.youtube.com/watch?v=iKn0GzF5-IU
WSN-IEEE 802.15.4 -MAC Protocol

More Related Content

PPTX
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
PPTX
Wsn unit-1-ppt
PPTX
Schedule and Contention based MAC protocols
PPTX
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
PDF
clustering protocol in WSN:LEACH
PDF
EC8702 adhoc and wireless sensor networks iv ece
PDF
Wireless Sensor Networks UNIT-2
PPTX
Routing Protocols in WSN
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
Wsn unit-1-ppt
Schedule and Contention based MAC protocols
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
clustering protocol in WSN:LEACH
EC8702 adhoc and wireless sensor networks iv ece
Wireless Sensor Networks UNIT-2
Routing Protocols in WSN

What's hot (20)

PPTX
Mac protocols
PPTX
cellular concepts in wireless communication
PPTX
Packet radio protocol
PPTX
Contention based MAC protocols
PPTX
PDF
Sensor Networks Introduction and Architecture
PDF
Location Aided Routing (LAR)
PPT
Sensor Protocols for Information via Negotiation (SPIN)
PDF
Issues in routing protocol
PPTX
Geographic Routing in WSN
PPTX
Spread spectrum
PPTX
Demand Assigned Multiple Access
PPTX
MEDIUM ACCESS CONTROL
PDF
2.6 ethernet ieee 802.3
PPTX
Node level simulators
PPTX
PDF
Design Issues and Challenges in Wireless Sensor Networks
PPTX
wireless sensor network
PPTX
WIRELESS TRANSMISSION
PPTX
Csma cd and csma-ca
Mac protocols
cellular concepts in wireless communication
Packet radio protocol
Contention based MAC protocols
Sensor Networks Introduction and Architecture
Location Aided Routing (LAR)
Sensor Protocols for Information via Negotiation (SPIN)
Issues in routing protocol
Geographic Routing in WSN
Spread spectrum
Demand Assigned Multiple Access
MEDIUM ACCESS CONTROL
2.6 ethernet ieee 802.3
Node level simulators
Design Issues and Challenges in Wireless Sensor Networks
wireless sensor network
WIRELESS TRANSMISSION
Csma cd and csma-ca
Ad

Similar to WSN-IEEE 802.15.4 -MAC Protocol (20)

PPT
Zigbee 802-15-4
PPTX
Thesis Presentation on Renewal theory based 802.15.6 latest.pptx
PPT
WSN protocol 802.15.4 together with cc2420 seminars
PDF
8-ZigBee (2).pdf
PDF
B010630409
KEY
Wireless Communication And Mobile Network - ZigBee
PDF
Anfis Based Soft Gts Mechanism For Ieee 802.15.4 Wsn
PPT
Wireless Sensor Network
PPT
Zigbee
PPT
R,aouami wccs
PPTX
PDF
Wireless zigbee communicationtechnology
PDF
Wireless zigbee communication technology 141215052616-conversion-gate01
PDF
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
PDF
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
PPTX
Wireless LANs
PPT
PPT
Wireless & Mobile Networks Mobility Management Principles
PDF
Tutorial on IEEE 802.11 - MAC Protocols and Frames
PDF
Mediumaccesscontrol
Zigbee 802-15-4
Thesis Presentation on Renewal theory based 802.15.6 latest.pptx
WSN protocol 802.15.4 together with cc2420 seminars
8-ZigBee (2).pdf
B010630409
Wireless Communication And Mobile Network - ZigBee
Anfis Based Soft Gts Mechanism For Ieee 802.15.4 Wsn
Wireless Sensor Network
Zigbee
R,aouami wccs
Wireless zigbee communicationtechnology
Wireless zigbee communication technology 141215052616-conversion-gate01
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
Wireless LANs
Wireless & Mobile Networks Mobility Management Principles
Tutorial on IEEE 802.11 - MAC Protocols and Frames
Mediumaccesscontrol
Ad

More from ArunChokkalingam (14)

PPTX
FM - Ratio Detector.pptx
PPTX
FM-Foster - Seeley Discriminator.pptx
PPTX
FM-Balanced Slope Detector.pptx
PPTX
FM Demodulator Slope Detector.pptx
PPTX
Introduction about Angle Modulation (FM&PM).pptx
PPTX
Generation of DSB-SC using Diode Ring Modulator or chopper Modulator.pptx
PPTX
Generation of AM-DSB-SC using Balanced FET Modulator.pptx
PPTX
Comparison of Amplitude Modulation Techniques.pptx
PPTX
WSN-Routing Protocols Energy Efficient Routing
PPTX
AODV (adhoc ondemand distance vector routing)
PPTX
Destination Sequenced Distance Vector Routing (DSDV)
PPTX
Classifications of wireless adhoc networks
PPTX
MANET routing protocols Issues and Classifications
PPT
Multimedia Components
FM - Ratio Detector.pptx
FM-Foster - Seeley Discriminator.pptx
FM-Balanced Slope Detector.pptx
FM Demodulator Slope Detector.pptx
Introduction about Angle Modulation (FM&PM).pptx
Generation of DSB-SC using Diode Ring Modulator or chopper Modulator.pptx
Generation of AM-DSB-SC using Balanced FET Modulator.pptx
Comparison of Amplitude Modulation Techniques.pptx
WSN-Routing Protocols Energy Efficient Routing
AODV (adhoc ondemand distance vector routing)
Destination Sequenced Distance Vector Routing (DSDV)
Classifications of wireless adhoc networks
MANET routing protocols Issues and Classifications
Multimedia Components

Recently uploaded (20)

PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
Digital Logic Computer Design lecture notes
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
Construction Project Organization Group 2.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Welding lecture in detail for understanding
PPTX
Sustainable Sites - Green Building Construction
PDF
Well-logging-methods_new................
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Digital Logic Computer Design lecture notes
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Construction Project Organization Group 2.pptx
Foundation to blockchain - A guide to Blockchain Tech
Welding lecture in detail for understanding
Sustainable Sites - Green Building Construction
Well-logging-methods_new................
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
bas. eng. economics group 4 presentation 1.pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
UNIT 4 Total Quality Management .pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx

WSN-IEEE 802.15.4 -MAC Protocol

  • 1. AD HOC AND WIRELESS SENSOR NETWORKS Dr.Arun Chokkalingam Professor Department of Electronics and Communication RMK College of Engineering and Technology Chennai. WSN-IEEE 802.15.4 -MAC Protocol
  • 3. Importance of MAC Protocols Medium access control (MAC) protocols: They coordinate the times where a number of nodes access a shared communication medium.
  • 4. Types of MAC Protocols • Low Duty Cycle Protocols And Wakeup Concepts – – S-MAC, – The Mediation Device Protocol • Contention based protocols – PAMAS, • Schedule based protocols – LEACH, • IEEE 802.15.4 MAC protocol,
  • 5. 802.15.4 General Characteristics • The standard covers the physical layer and the MAC layer of a low-Data rate Wireless Personal Area Network (WPAN). • Star or Peer-to-Peer operation. • Support for low latency devices. • Fully handshake protocol for transfer reliability. • Low power consumption. • combines both schedule-based as well as contention-based schemes. • The protocol is asymmetric in that different types of nodes with different roles are used.
  • 6. The targeted applications for IEEE 802.15.4 are in the area of wireless sensor networks, home automation, home networking, connecting devices to a PC, home security, and so on.
  • 7. Data rates of 250 kb/s Data rates of 20 kb/s. Data rates of 40 kb/s
  • 8. Operating frequency bands • Most of these applications require only low-to-medium bitrates (up to some few hundreds of kbps), • The physical layer offers bitrates of • 20 kbps (a single channel in the frequency range 868 – 868.6 MHz), • 40 kbps (ten channels in the range between 905 and 928 MHz) • 250 kbps (16 channels in the 2.4 GHz) • There are a total of 27 channels available, but the MAC protocol uses only one of these channels at a time; it is not a multichannel protocol.
  • 9. 05 2004Marco Naeve, Eaton Corp. Slide 9 Protocol Drivers  Extremely low cost  Ease of installation  Reliable data transfer  Short range operation • Reasonable battery life • Simple but flexible protocol
  • 10. IEEE 802.15.4 MAC Upper Layers IEEE 802.15.4 SSCS IEEE 802.2 LLC, Type I IEEE 802.15.4 2400 MHz PHY IEEE 802.15.4 868/915 MHz PHY 802.15.4 Architecture
  • 11. Network architecture and types & roles of nodes The standard distinguishes on the MAC layer two types of nodes: Full Function Device (FFD) can operate in three different roles: 1. PAN coordinator(PAN = Personal Area Network), 2. A simple coordinator 3. A device. Reduced Function Device (RFD) • operate only as a device.
  • 12. Cont. • A device node must be associated to a coordinator node and communicates directly to the coordinator. (forming a star network.) • Coordinators can operate in a peer-to-peer fashion • Multiple coordinators can form a Personal Area Network (PAN).
  • 13. A coordinator handles following tasks: • It manages a list of associated devices. • Devices are required to explicitly associate and disassociate with a coordinator using certain signaling packets. • It allocates short addresses to its devices. • All IEEE 802.15.4 nodes have a 64-bit device address. • When a device associates with a coordinator, it may request assignment of a 16-bit short address to be used subsequently in all communications between device and coordinator. • In the beaconed mode of IEEE 802.15.4, it transmits regularly frame beacon packets announcing the PAN identifier, a list of outstanding frames, and other parameters. • Furthermore, the coordinator can accept and process requests to reserve fixed time slots to nodes and the allocations are indicated in the beacon. •It exchanges data packets with devices and with peer coordinators.
  • 14. Superframe Structure • We start with the beaconed mode of IEEE 802.15.4.
  • 15. Optional Frame Structure 15ms * 2n where 0  n  14 GTS 3 GTS 2 Network beacon Transmitted by PAN coordinator. Contains network information, frame structure and notification of pending node messages. Beacon extension period Space reserved for beacon growth due to pending node messages Contention period Access by any node using CSMA-CA Guaranteed Time Slot Reserved for nodes requiring guaranteed bandwidth. GTS 1 0123456789101112131415 Slot Battery life extension Contention Access Period Contention Free Period
  • 16. • The coordinator of a star network operating in the beaconed mode organizes channel access and data transmission with the help of a superframe structure. • The superframe is subdivided into an active period and an inactive period. • During the inactive period, all nodes including the coordinator can switch off their transceivers and go into sleep state. • The nodes have to wake up immediately before the inactive period ends to receive the next beacon. The inactive period may be void. • The active period is subdivided into 16 time slots. • The first time slot is occupied by the beacon frame • remaining time slots are partitioned into a Contention Access Period (CAP) followed by a number (maximal seven) of Guaranteed Time Slots (GTSs). Superframe structure
  • 17. Cont • The length of the active and inactive period as well as the length of a single time slot and the usage of GTS slots are configurable. • The coordinator is active during the entire active period. • The associated devices are active in the GTS phase only in time slots allocated to them; in all other GTS slots they can enter sleep mode. • In the Contention Access Period (CAP), a device node can shutdown its transceiver. • Coordinators do much more work than devices and the protocol is inherently asymmetric.
  • 18. Guaranteed Time Slots (GTS) Management GTS request packets GTS request packets ACK ACK the device is required to track the coordinator’s beacons for some specified time to approve GTS GTS descriptor GTS descriptor Wait for approval
  • 19. Guaranteed Time Slots (GTS) Management • The coordinator allocates GTS to devices only by sending appropriate request packets during the CAP. • Flag in the request indicates whether the requested time slot is a transmit slot or a receive slot. • In a transmit slot, the device transmits packets to the coordinator . • in a receive slot the data flows in the reverse direction. • Another field in the request specifies the desired number of time slots in the GTS phase. • The coordinator answers the request packet in two steps: • An immediate acknowledgment packet confirms that the coordinator has received the request packet properly but contains no information about success or failure of the request. • After receiving the acknowledgment packet, the device is required to track the coordinator’s beacons for some specified time
  • 20. Cont • If the coordinator has insufficient resources, it generates a GTS descriptor for (invalid) time slot zero, indicating the available resources in the descriptors length field. • the device may consider renegotiation. • it concludes that the allocation request has failed. • A GTS is allocated to a device on a regular basis until it is explicitly deallocated. • The deallocation can be requested by the device by means of a special control frame. • After sending this frame, the device shall not use the allocated slots any further. • The coordinator can also trigger deallocation based on certain criteria. Specifically, the coordinator monitors the usage of the time slot: If the slot is not used at least once within a certain number of superframes, the slot is deallocated. • The coordinator signals deallocation to the device by generating a GTS descriptor with start slot zero.
  • 21. Operational Models Of IEEE 802.15.4
  • 22. Data Transfer Procedures • first assume that a device wants to transmit a data packet to the coordinator If the device has an allocated transmit GTS, it wakes up just before the time slot starts and sends its packet immediately without running any carrier-sense or other collision-avoiding operations. Allocated transmit GTS coordinator Device
  • 23. Cont • Second assume when the device does not have any allocated GTS slots it sends its data packet during the CAP using a slotted CSMA protocol Transmit during CAP coordinator Device
  • 24. Cont • data transfer from the coordinator to a device If the device has allocated a receive GTS and when the packet/acknowledgment/IFS cycle fits into these, the coordinator simply transmits the packet in the allocated time slot without further coordination. Receive GTScoordinator Device
  • 25. Cont • when the coordinator is not able to use a receive GTS. The handshake between device and coordinator • The coordinator announces a buffered packet to a device by including the devices address into the pending address field of the beacon frame.
  • 27. Slotted CSMA-CA protocol The variable NB - counts the number of backoffs, CW- indicates the size of the current congestion window, BE- is the current backoff exponent. CCA - Clear Channel Assessment Upon arrival of a new packet to transmit, these variables are initialized with NB 0, CW 2, and BE macMinBE (with macMinBE being a protocol parameter), respectively.
  • 28. Nonbeaconed mode/ unslotted CSMA-CA protocol • In the nonbeaconed mode, the coordinator does not send beacon frames nor is there any GTS mechanism. • The lack of beacon packets takes away a good opportunity for devices to acquire time synchronization with the coordinator. • All packets from devices are transmitted using an unslotted CSMA-CA protocol. • the device performs only a single CCA (Clear Channel Assessment) operation. If this indicates an idle channel, the device infers success. • Coordinators must be switched on constantly but devices can follow their own sleep schedule. • Devices wake up for two reasons: (i) to send a data or control packet to the coordinators, (ii) to fetch a packet from the coordinator

Editor's Notes