Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Medium Access Issues David Holmer
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Multiple access What if multiple machines are sharing the same link?
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 9 Introduction to Networks and the Internet.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Chap 4 Multiaccess Communication (Part 1)
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Medium Access Control NWEN302 Computer Network Design.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Medium Access Control Sub Layer
Chapter 6 Multiple Radio Access
Fundamentals of Computer Networks ECE 478/578
X. Li, W. LiuICC May 11, 2003A Joint Layer Design Smart Contention Resolution Random Access Wireless Networks With Unknown Multiple Users: A Joint.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
WLAN.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Medium Access Control in Wireless networks
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-layer Addressing.
Discovering Sensor Networks: Applications in Structural Health Monitoring Background Lecture Wireless Communications.
Summary Lecture: Part 4 Wireless Sensor Networks Discovering Sensor Networks: Applications in Structural Health Monitoring.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
MAC Protocols for Sensor Networks
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
MAC Protocols for Sensor Networks
Lecture 7 CSMA and Spread Spectrum Dr. Ghalib A. Shah
Communication Networks: Technology & Protocols
Module 3 Medium Access Control.
SENSYS Presented by Cheolki Lee
Net301 lecture9 11/5/2015 Lect 9 NET301.
The Medium Access Control Sublayer
7- chapter Seven Local Area Networks (LAN)
Chapter 6 Multiple Radio Access.
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications

Discovering Sensor Networks: Applications in Structural Health Monitoring Distributed networks of wireless sensor nodes –gather critical information about the physical world –communicate the information to remotely located decision makers Example applications: –smart farming –health applications for the elderly –environmental monitoring –monitoring the structural health of a building or bridge

Lecture Summary This lecture and corresponding lab introduced key concepts in Electrical and Computer Engineering through the implementation and testing of two random access medium access control protocols for wireless communications. In the background lecture we discussed: –Different uses of the radio spectrum –Basics of radio frequency (RF) communications –Medium access control for sharing a channel In this lecture, we will review what we learned in the lab and focus on the design decisions to be made in designing a random access protocol.

Wireless Communications Usually uses radio frequency signals to communicate. Varying frequencies from ~300 kHz to ~300 GHz. Access to the radio spectrum is managed by government agencies for the benefit of society. Uses include public safety, cellular telephones, broadcast television and radio, satellite communications, satellite navigation, and others. Baseband information signals are modulated and demodulated to the desired frequency band through the use of mixers, filters, and antennas. Medium access control protocols are used to share common radio channels. The two major classes of MAC protocols are random and scheduled. The two main types of random access protocols are those with carrier sensing (CSMA) and those without (Aloha).

Medium Access Design Goals Efficiency –Is the medium allocated to the maximal benefit of the users? –Is the medium ever wasted (e.g. idle time on the channel) even though some users have data to send? –Is there overhead associated with the sharing itself? Fairness –Is the medium shared equally between the users? –If appropriate, are priorities enforced on the medium?

Two Main Approaches to MAC Scheduled Access – Each user is allocated time to use the wireless medium. – Advantages: No contention. Extremely fair. – Disadvantages: Can be extremely inefficient due to idle time and overhead required to maintain and propagate the schedule. Random Access – Users access the medium on an as-needed basis. – Advantages: Extremely simple. Allocations are completely demand-driven. – Disadvantages: Contention can lead to inefficiency.

Engineering Design Problem Statement You will be asked to design a random access medium access control protocol for a wireless sensor network to be deployed to monitor the structural health of a bridge. Design decisions include: –Whether or not to employ carrier sensing (Aloha or CSMA) –Whether or not to use time slots –Feedback mechanism to determine the success or failure of packet transmissions –Randomization mechanism to reduce collisions –Adaptation mechanism for responding to network load –Possible mechanisms for avoiding hidden and exposed terminal problems

To Sense or Not to Sense? Aloha Less efficient (~18%) Less complex Can be implemented even if carrier sensing is impossible Examples – Satellite Communications – Cellular Registration CSMA More efficient (>80%) More complex Requires a system model that makes sensing possible Examples – WiFi – Bluetooth – Zigbee – Ethernet

Laboratory Summary In the lab, we tested the performance of Aloha and CSMA systems. –We emulated both random access strategies. –We tried different data rates and different numbers of transmitters. We saw the higher efficiency of CSMA. Trading complexity and system requirements for better performance. We saw that it was harder to achieve fairness in a heavily loaded system. Trading lower throughput for better fairness.

Slotted Time In Aloha systems, performance can be greatly enhanced if time is divided into “slots” of appropriate length for the data packets to be transmitted. Then transmissions are only permitted within a slot. –Why might this improve performance? –Why is this enhancement usually not effective for CSMA? –What would be the challenges associated with using a “slotted” protocol?

Feedback Mechanism In the lab, our test protocols had no feedback mechanism. Transmitters had no way to know whether or not their transmissions were successful. Analysis of Aloha and CSMA often assumes perfect, instantaneous feedback. In a real system, how can a transmitter be notified of the success (or failure) of its transmission? –Assume, unlike in the lab, that each transmission is intended for a single receiver. –The receiver needs to provide some kind of acknowledgement to the transmitter, if feedback is required.

Randomization Mechanism In the lab, our simple system did not randomize transmissions. –Increases the frequency of collisions, as nodes may collide repeatedly. Simple mechanism: –When a node wants to transmit, it flips an unfair coin. With probability p it transmits. With probability 1-p, it pauses for the amount of time that would be required to send a packet, then flips its coin again. –What should the value of p be? If p is too high, there will be too many collisions. If p is too low, then the channel will be idle. And, the appropriate value of p depends on how many nodes are trying to transmit! Other mechanisms: –Define a “window” of a particular length, then pick a random time within the window. –The appropriate length of the window also depends on the number of nodes trying to transmit.

Adaptation Mechanism In the previous slide, we saw that the randomization mechanism needs to adapt to the number of nodes trying to transmit. –But a transmitting node usually has no way to know how many other nodes are contending for the channel at the same time. –Thus, the node needs to adapt its randomization mechanism based on the information that it does have. Lots of Collisions ➔ Use a smaller transmit probability or a larger window. Lots of Idle Time ➔ Use a larger transmit probability or a smaller window.

Hidden and Exposed Terminals In wireless systems, performance is also impacted by the hidden terminal problem and the exposed terminal problem. Hidden Terminal Problem: –A is transmitting to B. C is out of range of A, and tries to initiate a transmission to B or to another node, causing a collision at B. Exposed Terminal Problem: –B is transmitting to A. C hears B’s transmission and delays its transmission to D, even though both transmissions could be completed simultaneously. Solutions exist, even in standards like , but are not widely used. A A B B C C A A B B C C D D

Random Access Applications Wireless communications technologies are critical to society. –Sensor Networks for Environmental, Healthcare, and Structural Monitoring –Public Safety Communications including police, fire, ambulance, and air traffic control. –Communications for business and commerce. Random access medium access control is applied in a wide variety of communications applications. –Zigbee (IEEE ) Wireless Sensor Networks –WiFi (IEEE ) Wireless Local Area Networks –Some components (location registration and call placement) of Cellular Networks –Satellite communications Random access medium access control design decisions differ by application requirements and operating conditions.