Medium Access Control Protocol for Wireless Sensor Network Carleton University Presented by: Mohamed Ajal

Slides:



Advertisements
Similar presentations
IEEE CSMA/CA DCF CSE 6590 Fall /7/20141.
Advertisements

SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Lecture 5: IEEE Wireless LANs (Cont.). Mobile Communication Technology according to IEEE (examples) Local wireless networks WLAN a.
An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Network
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin.
Medium Access Control in Wireless Sensor Networks.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
CMPE280n An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin presented by Venkatesh Rajendran.
Investigating Mac Power Consumption in Wireless Sensor Network
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin -- Adapted the authors’ Infocom 2002 talk.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
An Energy-efficient MAC protocol for Wireless Sensor Networks
Medium Access Control in Wireless Sensor Networks USC/ISI Technical Report ISI-TR-580, October 2003 Wei Ye and John Heidemann.
On the Energy Efficient Design of Wireless Sensor Networks Tariq M. Jadoon, PhD Department of Computer Science Lahore University of Management Sciences.
Efficient MAC Protocols for Wireless Sensor Networks
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
Opersating Mode DCF: distributed coordination function
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
MAC Protocols and Security in Ad hoc and Sensor Networks
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks The First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003) November.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
An Energy Efficient MAC Protocol for Wireless Sensor Networks “S-MAC” Wei Ye, John Heidemann, Deborah Estrin Presentation: Deniz Çokuslu May 2008.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks (S-MAC) Wei Ye, John Heidemann, Deborah Estrin.
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks Medium Access Control (MAC) 21 February 2005.
AN ENERGY CONSUMPTION ANALYTIC MODEL FOR WIRELESS SENSOR MAC PROTOCOL ERIC MAKITA SEPTEMBRE
Why Visual Sensor Network & SMAC Implementation Group Presentation Raghul Gunasekaran.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
1 An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Network Gang Lu, Bhaskar Krishnamachari, and Cauligi Raghavendra.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
Chapter 6 Multiple Radio Access
A SURVEY OF MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
An Adaptive Energy-Efficient and Low- Latency MAC for Data Gathering in Wireless Sensor Networks Gang Lu, Bhaskar Krishnamachari, and Cauligi S. Raghavendra.
IEEE WLAN.
1 An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin IEEE infocom /1/2005 Hong-Shi Wang.
SNU Mobile Networks Lab. S-MAC (Sensor-MAC) T-MAC (Timeout-MAC) Kae Won, Choi Kyoung hoon, Kim.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
A+MAC: A Streamlined Variable Duty-Cycle MAC Protocol for Wireless Sensor Networks 1 Sang Hoon Lee, 2 Byung Joon Park and 1 Lynn Choi 1 School of Electrical.
KAIS T Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Network Wei Ye, John Heidemann, Deborah Estrin 2003 IEEE/ACM TRANSACTIONS.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
Michael Buettner, Gary V. Yee, Eric Anderson, Richard Han
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Medium Access Control in Wireless networks
CS541 Advanced Networking 1 Contention-based MAC Protocol for Wireless Sensor Networks Neil Tang 4/20/2009.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
S-MAC Taekyoung Kwon. MAC in sensor network Energy-efficient Scalable –Size, density, topology change Fairness Latency Throughput/utilization.
CSMA/CA Simulation  Course Name: Networking Level(UG/PG): UG  Author(s) : Amitendu Panja, Veedhi Desai  Mentor: Aruna Adil *The contents in this ppt.
© Robin Kravets, 2009 Energy Conservation in Wireless Networks.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
An Energy-efficient MAC protocol for Wireless Sensor Networks
SENSYS Presented by Cheolki Lee
Medium Access Control Protocol for Wireless Sensor Network
Investigating Mac Power Consumption in Wireless Sensor Network
Chapter 6 Multiple Radio Access.
Presentation transcript:

Medium Access Control Protocol for Wireless Sensor Network Carleton University Presented by: Mohamed Ajal

Topics of Discussion  Introduction  Power consumption in WSN’s  Wireless MAC protocols  Differences and Constraints  Attributes to WSN  Wireless Sensor network MAC protocols  Summary

Introduction Wireless Sensor Network?  It’s a collection of devices “ sensor nodes”  They are small, inexpensive, with constrained power  They are organized in a cooperative network  They communicate wirelessly in multi hop routing  Heavily deployment  Changing network topology

Introduction ( Cont. ) Component and Schematic of Node  Processor.  Memory.  RF Radio.  Power Source.  Sensor.  GPS Cont rol Signa l Proc essor Sen sors Wirel ess Tran smitt er/ Rece iver Proces sing And Decisi on Makin g Power

Introduction ( Cont. ) Goal of Wireless Sensor Network  Collect data at regular intervals.  Then transform data into an electrical signal.  Finally, send the signals to the sink or the base nod. Types of Wireless Sensor Network  Temperature sensor.  Light sensor.  Sound sensor.  Vibration Sensor.

Introduction ( Cont. ) Communication pattern:  Broadcast : Base station transmits message to all its immediate neighbors.  Converge cast : a group of sensors communicates to a specific sensor  Local gossip: a sensor node sends a message to its neighboring nodes within a range.

Introduction ( Cont. ) Applications of Wireless Sensor Network  Global scale  Battle field  Factories  Buildings  Homes  bodies

Power consumption in WSN’s The power consumption in WSN’s is one of the biggest challenges because:  Sensors have a limited source of power and it’s hard to replace or recharge “ e.g sensors in the battle field, sensors in a large forest.. Etc”.

Power consumption in WSN’s Energy consumption of typical node components. Source: MAC Essentials for Wireless Sensor Networks

Sources of power consumption in WSN’s 1- useful power consumption:  Transmitting or receiving data.  Processing queries requests.  Forwarding queries and data to the neighbours.

Source of power consumption in WSN’s ( Cont. ) 2- wasteful power consumption:  Idle listening to the channel “ waiting for possible traffic”.  Retransmitting because of collision: “ e.g two packets arrived at the same time at the same sensor”  Overhearing: when a sensor received a packet doesn’t belong it”.  Generating and handling control packets.

How to minimize the energy consumption of sensor nodes while meeting the application requirements?  Use Protocols that aim mainly to increase the sleep periods as much as possible Power consumption in WSN’s IdleSleepTransmissionReception

Another problem in Wireless Network Hidden/Exposed terminal problem

Wireless MAC Protocols Conventional of MAC Protocols IEEE CSMACSMA/CA

Wireless MAC Protocols (Cont.) 1- CSMA :  Non Persistent: if the device detects activity on the channel, it performs a back off by waiting before attempting to transmit.  P- Persistent: if it detects activity on the channel, it continuous to sense the channel instead of delaying.  CSMA requires devices to remain in the receive state when not transmitting Disadvantages : the transceiver consumes energy too quickly.

Wireless MAC Protocols (Cont.) 2- CSMA/CA :  Control messages were introduced such as ( RTS and CTS) to reserve the channel  The source first performs CSMA algorithm  If it determines appropriate time for transmission, it sends RTS  Then, the destination responds with CTS Disadvantages: it might still have some collision in RTS

Wireless MAC Protocols (Cont.) 3-IEEE :  Infrastructure mode :devices communicate through a central entity called an access point (AP) using the point coordination function (PCF),  Ad hoc mode: devices communicate with each other directly using the distributed coordination function (DCF)  Both the PCF and DCF use a channel access mechanism similar to CSMA/CA and use acknowledgments for reliability.  In addition to physical carrier sensing, IEEE devices perform virtual carrier sensing “ NAV”

Wireless MAC Protocols (Cont.) Data Transfer Disadvantages:  IEEE devices consume large amounts of energy due to the high percentage of time spent listening without receiving messages

Differences and Constraints Traditional MAC protocol provides:  High throughput  Low latency  Fairness  Mobility But : have little consideration for energy Improved MAC protocol provides:  Best performance of smallest amount of energy

Attributes to Wireless Sensor Networks The following attributes should be taken in WSN Energy conservation  Scalability and adaptively  throughput  Fairness  Latency MAC protocol must achieve  Establish communication link between the sensor nodes  To share the communication medium fairly and efficiently primary goal less important

Wireless Sensor Network MAC protocols Medium Access Control Scheduled MAC Unscheduled MAC

Unscheduled MAC protocols ( Cont. ) 1- Unscheduled MAC: Strategy:  Before sending a message, a sensor listens to the medium. If it’s busy, wait a random time then retry again and if it’s free then it will send the message.

Unscheduled MAC protocols ( Cont. ) Advantages:  It can adapt for changes “ in the node density, traffic load or the topology” better than scheduled protocol.  The sensors don’t have to be synchronized together. Disadvantages:  It’s worst than scheduled MAC protocols from the power saving perspective, since all sensors listen to the channel.

Unscheduled MAC protocols ( Cont. ) 1.1- PAMAS: stands for Power Aware Multi-Access Strategy : It uses multiple transceivers on each node PAMAS Data Transfer

Unscheduled MAC protocols ( Cont. ) Advantages:  Prevent collision Disadvantages:  Multiple radio requirement  Increase energy consumption  Increase device complexity and cost

Unscheduled MAC protocols ( Cont. ) 1.2- STEM: stands for Sparse Topology and Energy Management Strategy:  uses two different channels, the wakeup channel and the data channel,  requires two transceivers in each node STEM duty cycle for single node

Unscheduled MAC protocols ( Cont. ) STEM-B: Strategy : sensor nodes wakes a neighbour by transmitting a beacon (no RTS/CTS ) advantages:  Lower Latency Disadvantages:  More complex  High energy consumption

Unscheduled MAC protocols ( Cont. ) STEM-T: Strategy : sensor nodes wakes a neighbour by transmitting a tone of sufficient length that destination will have a high probability of sensing  Busy tone contains no destination address Disadvantages:  High latency  Results in overhearing

Unscheduled MAC protocols ( Cont. ) 1.3- B-MAC: Strategy :  It uses a tone to wake up sleeping neighbouring similar to STEM-T  It uses very long preambles for message transmission. B-MAC Data Transfer

Unscheduled MAC protocols ( Cont. ) disadvantages:  B-MAC suffers from the overhearing problem  The long preamble dominates the energy usage.

Unscheduled MAC protocols ( Cont. ) 1.4- Wise MAC: Strategy : it uses similar technique in B-MAC but it attempt to reduce the energy consumption by having sensor nodes remember the sampling offset of their neighbour Wise MAC Data Transfer

Unscheduled MAC protocols ( Cont. ) advantages:  It decreases the amount of time a sensor node transmits preambles and the number of sensor nodes that overhear each message Disadvantages:  the cost of an extra field in the ACK messages and the memory required to store neighbor’s sampling offsets.

WSN MAC protocols ( Cont. ) 2- Scheduled MAC: Strategy : it attempts to reduce the energy consumption by coordinating sensor nodes with a common schedule

scheduled MAC protocols ( Cont. ) Advantages:  Saving the power from being wasted by turning off the radio out the allocated time slot.  Limits the collision, idle listing, and overhearing Disadvantages:  when sensor node enters net, must wait till they learn, some delay exist  Cost of increased messages  Not flexible to changes in sensor density or movements.  All sensors should be well synchronized.

scheduled MAC protocols ( Cont. ) S-MAC: Strategy :  the sensor node periodically goes to the fixed listen/sleep cycle.  A time frame in S-MAC is divided into two parts: one for a listening session and the other for a sleeping session.

scheduled MAC protocols ( Cont. ) S-MAC Frame Format

scheduled MAC protocols ( Cont. ) Disadvantages:  energy is still wasted in this protocol during listen period as the sensor will be awake even if there is no reception/transmission.

conclusion  Several MAC protocols has been introduced for both wireless network and wireless sensor networks  All WSN MAC protocols are designed with the goal to conserve energy  There is no generic best MAC protocol

References [1] K. Kredo II, P. Mohapatra, “Medium Access Control in Wireless Sensor Networks”, in 29 June [2] A. Bachir, M. Dohler, T. Watteyne, and K. Leung, “ MAC Essentials for Wireless Sensor Networks, “ in IEEE [3] Salman Faiz Solehria, Sultanullah Jadoon, “ Medium Access Control Protocol for Wireless Sensor Network – a Survey“, in IEEE [4] K. LANGENDOEN, “MEDIUM ACCESS CONTROL IN WIRELESS SENSOR NETWORKS“.

Questions?

My questions (Q1) Data Transfer Q1: Why IEEE defines a SIFS shorter than a DIFS ? ANS: SIFS (Short Inter Frame Spacing) has ‰highest priority, for ACK, CTS, polling response while DIFS (Distributed Inter Frame Spacing) has lowest priority, for asynchronous data service. Having SIFS smaller than DIFS prevents ACK and important control packets from getting killed.

My questions (Q2) Data Transfer Q2: Suppose a device uses an MAC protocol to reserve the communication channel before transmitting. Suppose the device does sensing the channel and assumes the channel to be idle and wants to transmit 1000Bytes of data. Assume the transmission rate is 11 Mbps. Calculate the time required to transmit the frame and receive the Ack as function of SIFS and DIFS. Ignore the propagation delay and assume no bit error rate. The transmission rate = No. of bits/Transmission rate. Both a control frame and a frame without data is 32Bytes.

My questions (Q2 cont.) ANS: The time to transmit a control frame = (8*32)bits/11Mbps=23µsec The time to transmit the data frame including the header =(8*1000+8*32) bits/11Mbps=751µsec The total time to transmit the frame and receive the ACK = DIFS+RTS+SIFS+CTS+SIFS+ data frame +SIFS+ACK =DIFS+3SIFS+(3*23) µsec+751µsec =DIFS+3SIFS+820µsec Collision avoidance using the RTS and CTS

My questions(Q3 ) Q3-a: True or false : Before an station transmits a data frame, it must first send an RTS frame and receive a corresponding CTS frame? Q3-b: Describe how the protocol works?

My questions (Q3 cont.) ANS-a: False Collision avoidance using the RTS and CTS

My questions (Q3 cont.) ANS - b: 1. If initially the station senses the channel idle, it transmits its frame after a short period of time known as the Distributed Inter-frame Space (DIFS) 2. Otherwise, the station chooses a random backoff value and counts down this value (NAV counter) when the channel is sensed idle. While the channel is sensed busy, the counter value “NAV” remains frozen. 3. When the counter reaches zero (note that this can only occur while the channel is sensed idle), the station transmits the entire frame and then waits for an acknowledgement.

Thank you