Lecture 14: WSN MAC Part 2

  • English
  • May 7, 2021
  • 0
Lecture 14: WSN MAC Protocols Part 2
Introduction: In this lecture, the author, Talha Ibn Aziz, is providing us with information about the wireless sensor networks. He starts of by explaining the protocols that are used; the first one being BMAC or also known as Berkeley Mac which is used with CSMA to send out packets.
BMAC is used specifically to monitor applications, but as stated in the lecture it can also be used for different services such as target tracking, localization, and triggered event reporting. The Lecture will include all of the following: Clear Channel Assessments (CCA), B-MAC Procedures, LEACH protocol, RI-MAC Protocol, MACA Procedure, RIMA-SP, and RIMA-DP.
You will learn what polling is and how it is used. Under the B-MAC procedure, it wakes up rem sleep after the time is interrupted, upon the stabilization of crystals oscillator where it is then ready to receive the modes. There are two phases in the Leach Idea: the setup phase where the clusters and heads are set up in this phase and steady-state phase where data transmission is continued in this phase.

Tag: ,

Lecture 14: WSN MAC Part 2 (Continued)

Lecture 15: WRAN And WiMAX

Be the first to comment “Lecture 14: WSN MAC Part 2”

(will not be shared)