Z-MAC: a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min Dept. of Computer Science, North Carolina State.

Slides:



Advertisements
Similar presentations
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
Advertisements

TDMA Scheduling in Wireless Sensor Networks
1 Z-MAC: Hybrid MAC for Wireless Sensor Networks Injong Rhee Department of Computer Science North Carolina State University With the following collaborators:
Z-MAC: a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min Dept. of Computer Science, North Carolina State.
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin.
Medium Access Control in Wireless Sensor Networks.
Presented by: Murad Kaplan.  Introduction.  Design of SCP-MAC.  Lower Bound of Energy Performance with Periodic Traffic.  Protocol Implementation.
CMPE280n An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin presented by Venkatesh Rajendran.
Investigating Mac Power Consumption in Wireless Sensor Network
U LTRA -L OW D UTY C YCLE MAC WITH S CHEDULED C HANNEL P OLLING Wei Ye, Fabio Silva John Heidemann Present By: Eric Wang.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin -- Adapted the authors’ Infocom 2002 talk.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 9th Lecture Christian Schindelhauer.
1 Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye Fabio Silva John Heidemann Presented by: Ronak Bhuta Date: 4 th December 2007.
An Energy-efficient MAC protocol for Wireless Sensor Networks
Medium Access Control in Wireless Sensor Networks USC/ISI Technical Report ISI-TR-580, October 2003 Wei Ye and John Heidemann.
Versatile low power media access for wireless sensor networks Joseph PolastreJason HillDavid Culler Computer Science Department University of California,Berkeley.
Medium Access Control With Coordinated Adaptive Sleeping for Wireless Sensor Networks Debate 1 - Defense Joseph Camp Anastasios Giannoulis.
Efficient MAC Protocols for Wireless Sensor Networks
MAC Layer Protocols for Sensor Networks Leonardo Leiria Fernandes.
1 MAC Layer Design for Wireless Sensor Networks Wei Ye USC Information Sciences Institute.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
1 Radio and Medium Access Control 2 Radio Properties.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks The First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003) November.
Lecture 10: Low Power MAC ECE 591. Deadline April 16—Oral Presentation of Interim Report (Progress) April 23 --Draft of Final Report May 5 – Final Report.
An Energy Efficient MAC Protocol for Wireless Sensor Networks “S-MAC” Wei Ye, John Heidemann, Deborah Estrin Presentation: Deniz Çokuslu May 2008.
BMAC - Versatile Low Power Media Access for Wireless Sensor Networks.
DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad- Hoc Networks Injong Rhee (with Ajit Warrier, Jeongki Min, Lisong Xu) Department of Computer.
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks Medium Access Control (MAC) 21 February 2005.
† Department of Computer Science – University of Rome “Sapienza” – Italy Protocolli MAC per reti di sensori Sistemi Wireless, a.a. 2009/2010 Un. of Rome.
Why Visual Sensor Network & SMAC Implementation Group Presentation Raghul Gunasekaran.
1 Radio and Medium Access Control 2 Learning Objectives Understand important concepts about radio signals Understand radio properties of WSNs Understand.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
Energy-Efficient Medium Access Control Koen Langendoen and Gertjan Halkes Delft University of Technology The Embedded Systems Handbook.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
Versatile Low Power Media Access for Wireless Sensor Networks Sarat Chandra Subramaniam.
A SURVEY OF MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
An Adaptive Energy-Efficient and Low- Latency MAC for Data Gathering in Wireless Sensor Networks Gang Lu, Bhaskar Krishnamachari, and Cauligi S. Raghavendra.
1 Radio and Medium Access Control 2 Learning Objectives Understand important concepts about radio signals Understand radio properties of WSNs Understand.
1 An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin IEEE infocom /1/2005 Hong-Shi Wang.
1 Media Access Control in Wireless Sensor Networks - II.
A+MAC: A Streamlined Variable Duty-Cycle MAC Protocol for Wireless Sensor Networks 1 Sang Hoon Lee, 2 Byung Joon Park and 1 Lynn Choi 1 School of Electrical.
KAIS T Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Network Wei Ye, John Heidemann, Deborah Estrin 2003 IEEE/ACM TRANSACTIONS.
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
Link Layer Support for Unified Radio Power Management in Wireless Sensor Networks IPSN 2007 Kevin Klues, Guoliang Xing and Chenyang Lu Database Lab.
0.1 IT 601: Mobile Computing Wireless Sensor Network Prof. Anirudha Sahoo IIT Bombay.
CS541 Advanced Networking 1 Contention-based MAC Protocol for Wireless Sensor Networks Neil Tang 4/20/2009.
Energy-Efficient, Application-Aware Medium Access for Sensor Networks Venkatesh Rajenfran, J. J. Garcia-Luna-Aceves, and Katia Obraczka Computer Engineering.
DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad-Hoc Networks Injong Rhee (with Ajit Warrier, Jeongki Min, Lisong Xu) Department of Computer.
Ultra-Low Duty Cycle MAC with Scheduled Channel Polling (Wei Ye, Fabio Sliva, and John Heidemann) Advanced Computer Networks ECE Fall Presented.
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Z-MAC : a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min ACM SenSys Systems Modeling.
1 Media Access Control in Wireless Sensor Networks - I.
MAC Protocols for Sensor Networks
Duty Cycled MAC protocols for Wireless Sensor networks
Z-MAC: Hybrid MAC for Wireless Sensor Networks
MAC Protocols for Sensor Networks
An Energy-efficient MAC protocol for Wireless Sensor Networks
Injong Rhee (with Ajit Warrier, Jeongki Min, Lisong Xu)
Wireless Sensor Networks 4. Medium Access
SENSYS Presented by Cheolki Lee
Ultra-Low Duty Cycle MAC with Scheduled Channel Polling
Presentation by Andrew Keating for CS577 Fall 2009
Injong Rhee (with Ajit Warrier, Jeongki Min, Lisong Xu)
Investigating Mac Power Consumption in Wireless Sensor Network
Chapter 6 Multiple Radio Access.
Presentation transcript:

Z-MAC: a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min Dept. of Computer Science, North Carolina State University SenSys’ 05 Presented by Seung-Min Jung Computer Architecture Laboratory

2 Contents Design of Z-MAC 2 Conclusion 4 Introductions 31 Performance Evaluation 33

3 What is Z-MAC?  A Hybrid MAC  Combine the strengths of CSMA and TDMA while offsetting their weakness  CSMA (Carrier Sense Multiple Access)  High channel utilization and low latency under low contention  Hidden terminal problem (collisions)  TDMA (Time Division Multiple Access)  No hidden terminal problem and high channel utilization under high contention  Not practical due to too many problems

4  Four important sources of wasted energy in WSN:  Idle Listening (required for all CSMA protocols)  Overhearing (since RF is a broadcast medium)  Collisions (Hidden Terminal Problem)  Control Overhead (e.g. RTS/CTS or DATA/ACK) MAC Energy Usage Existing MAC Protocols (S- MAC, B-MAC) Z-MAC Approach

5 Basic Idea of Z-MAC  Each sensor node owns a time slot.  A node may transmit at any time slot.  The owner has the higher priority to transmit data than the non-owners.  When a slot is not in use by its owner, non-owners can steal the slot.  Z-MAC behaves like  CSMA under low contention  TDMA under high contention.

6 # of Contenders Channel Utilization TDMA CSMA IDEAL Effective Throughput

7 Existing Approaches  Hybird (CSMA + TDMA)  S-MAC by Ye, Heidemann and USC Duty cycled Synchronized over macro time scales for neighbor communication  CSMA+Duty Cycle+LPL  B-MAC by Polastre, Hill and UC Berkeley Duty cycled, but Low power listen (LPL) –Clever way reducing energy consumption (similar to aloha preamble sampling)

8 Design of Z-MAC  Basic components  Setup phase  Transmission Control  Explicit Contention Notification  Receiving Schedule of Z-MAC  Local Time Synchronization

9 Basic components  Baseline – CSMA  Use Imprecise Topology and Timing Info in a robust way.  Combining CSMA with TDMA  Scalable and Efficient TDMA scheduling

10 Setup Phase  Including  neighbor discovery  slot assignment  local frame exchange  global time synchronization  => Do many things in the setup phase!  High overhead?  It runs only once during the setup phase and does not run until a significant change in the network topology

11 Setup Phase: Neighbor Discovery  Steps  Every node periodically broadcasts a ping to its one-hop neighbors.  A ping message contains the current list of its one-hop neighbors.  Through the process, each node gathers the information of its two-hop neighbors.  Implementation  Every node sends one ping at a random time in each second for 30 seconds.

12 Setup Phase: Slot Assignment  Using DRAND to assign time slots to every node.  DRAND is a distributed implementation of RAND, used for TDMA scheduling or channel assignment for wireless networks.  Ensuring no two nodes within a two-hop communication neighborhood are assigned to the same slot.  The slot number assigned to a node does not exceed the size of its local two-hop neighborhood (δ).  The running time and message complexity are also bounded by O(δ)

13 Setup Phase: Local Framing  Each node needs to decide on the period in which it can use the time slot for transmission.  The period is called the time frame of the node.  Time frame rule  S i : the slot number assigned to node i  F i : the maximum slot number within node i’s two-hop neighborhood  Set node i’s time frame to be 2 a, where a satisfies 2 a-1 ≤ F i ≤ 2 a – 1. That is, node i uses the S i -th slot in every 2 a time slots. i uses the s i -th slot in every 2 a time frame (i's slots are L * 2 a + s i, for all L=1,2,3,...)

14 Example 2 a-1 ≤ F i ≤ 2 a – 1 Node A a = 2 Node C a = 3 Network topology & the slot schedule of all nodes

15 Transmission Control  Two modes: low contention level (LCL) and high contention level (HCL).  Under LCL, non-owners are allowed to compete in any slot with low priority.  Under HCL, a node does not compete in a slot owned by its two-hop neighbors. To avoid being hidden terminal to the owners.  A node is in HCL only when it receives an explicit contention notification (ECN) messages within the last t ECN period.

16 Transmission Rule Node i acquires data to transmit Is node i the owner? Take a random backoff within period T o Is the channel clear? Wait until the channel is not busy Is node i in LCL? Is the current slot owned by its two-hop neighbor? Wait for T o and performs a random backoff within a contention window [T o, T no ] Transmit data!!! Postpone its transmission until the time slot is (1)not owned by a two-hop neighbor or (2) owned by itself NO YES NO

17 Explicit Contention Notification  ECN messages notify neighbors not to act as hidden terminals to the owner of each slot when contention is high.  How to estimate two-hop contention?  According to noise level of the channel High correlation between noise level and two-hop contention. Low noise indicates low contention.

18 Explicit Contention Notification  Steps:  When a transmitting node detects high contention The node sends a unicast message, one-hop ECN, to the destination which is experiencing contention. If there are multiple destinations, it broadcasts a message with information about the multiple destinations.  Assume node j receives one-hop ECN. If node j is the destination, it then broadcasts the ECN, two-hop ECN, to its one-hop neighbors. If not, it simply discards the one-hop ECN.  When a node receives a two-hop ECN, it sets the HCL flags.  ECN suppressing  Take random backoff before the transmission of a one-hop ECN.

19 Example S5, S2, S4 can compete as one-hop neighbors at slot 1

20 Local Time Synchronization  Time synchronization  Among Neighboring senders  Under high contention  Z-MAC adopts a technique from RTP/RTCP (real-time transport protocol).  The control message transmission rate is limited to a small fraction of session bandwidth.  In Z-MAC, a node sends one synchronization packet per every 100 data packets.

21 Performance Evaluations  Implementing Z-MAC in both ns-2 and Mica2/TinyOS.  Comparing the performance of Z-MAC with that of PTDMA(ns-2), Sift(ns-2) and B-MAC(ns-2 and TinyOS).  Three benchmarks  One-hop benchmark  Two-hop benchmark Two clusters, 7 and 8 sending nodes.  Multi-hop benchmark

22 One-hop Benchmark

23 Two-hop Benchmark Sources Sink

24 Multi-hop Benchmark

25 Default settings

26 Throughput  One Hop Utilization; Simulation Z-MAC B-MAC

27 Throughput  One Hop Throughput; Mica2 Experiment Z-MAC B-MAC

28 Throughput  Two Hop Utilization; Simulation Z-MAC B-MAC

29 Throughput  Multi-hop Throughput; Mica2 Experiment Z-MAC B-MAC MULTI-HOP

30 Throughput  Utilization Variation with Time Sync Error Z-MAC

31 Energy Efficiency Z-MAC HCL B-MAC MULTI-HOP

32 Conclusion  Z-MAC combines the strength of TDMA and CSMA  High throughput independent of contention.  Robustness to timing and synchronization failures and radio interference from non-reachable neighbors. Always falls back to CSMA.  Compared to existing MAC  It outperforms B-MAC under medium to high contention.  Achieves high data rate with high energy efficiency.

Questions? Office # : 5578

34 Supplement: Low Power Listening(1) Receive data Carrier sense Receiver Long PreambleData Tx Sender Check Interval  Similar to ALOHA preamble sampling  Wake up every Check-Interval  Sample Channel using CCA  If no activity, go back to sleep for Check-Interval  Else start receiving packet  Preamble > Check-Interval

35 Supplement: Low Power Listening(2) Receive data Carrier sense Receiver Long PreambleData Tx Sender Check Interval  Longer Preamble => Longer Check Interval, nodes can sleep longer  At the same time, message delays and chances of collision also increase  Length of Check Interval configurable by higher layers

36 Time period Time slice TDMA Scheduling : Using DRAND  Two nodes in the interference range assigned to different time slots.  Owners and non-owners C D A F B C D A E B E F Radio Interference Map Input Graph C D A E B F DRAND slot assignment

37 DRAND  Z-MAC requires a conflict-free transmission schedule or a TDMA schedule.  DRAND is a distributed TDMA scheduling scheme. Let G = (V, E) be an input graph, where V is the set of nodes and E the set of edges. An edge e = (u, v) exists if and only if u and v are within interference range. Given G, DRAND calculates a TDMA schedule in time linear to the maximum node degree in G.  DRAND is fully distributed, and is the first scalable implementation of RAND, a famous centralized channel scheduling scheme.

38 Local Time Synchronization  Trust factor(β t ):  R drift : the max clock drift rate of each node  ε clock : the max acceptable clock error  I synch = ε clock / R drift : the min synchronization interval required to achieve the max clock error  α synch : the max weight applying to the new clock value received  S : the avg. rate at which a node receives or sends synchronization messages   How to get new clock value?  C avg : weighted moving avg. clock value  C new : newly received clock value  C avg = (1- β t )C avg + β t C new