The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks Medium Access Control (MAC) 17 February 2005.

Slides:



Advertisements
Similar presentations
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks Spread Spectrum and CDMA 24 February 2005.
Advertisements

SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin.
Medium Access Control in Wireless Sensor Networks.
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks WSN Routing II 21 March 2005.
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks Routing in WSNs 28 February 2005.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CMPE280n An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin presented by Venkatesh Rajendran.
Investigating Mac Power Consumption in Wireless Sensor Network
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
By Antonio Ruzzelli MANAGEMENT ISSUES FOR WIRELESS SENSOR NETWORKS, AN OVERVIEW:
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
A Survey on Energy Efficient MAC Protocol for Wireless Sensor Networks Huma Naushad.
1 Link Layer Message M A B Problem: Given a message M at a node A consisting of several packets, how do you send the packets to a “neighbor” node B –Neighbor:
An Energy-efficient MAC protocol for Wireless Sensor Networks
Medium Access Control in Wireless Sensor Networks USC/ISI Technical Report ISI-TR-580, October 2003 Wei Ye and John Heidemann.
On the Energy Efficient Design of Wireless Sensor Networks Tariq M. Jadoon, PhD Department of Computer Science Lahore University of Management Sciences.
Medium Access Control With Coordinated Adaptive Sleeping for Wireless Sensor Networks Debate 1 - Defense Joseph Camp Anastasios Giannoulis.
Efficient MAC Protocols for Wireless Sensor Networks
1 MAC Layer Design for Wireless Sensor Networks Wei Ye USC Information Sciences Institute.
Medium Access Control Sublayer
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
1 Radio and Medium Access Control 2 Radio Properties.
4-1 Last time □ Link layer overview ♦ Services ♦ Adapters □ Error detection and correction ♦ Parity check ♦ Internet checksum ♦ CRC □ PPP ♦ Byte stuffing.
An Energy Efficient MAC Protocol for Wireless Sensor Networks “S-MAC” Wei Ye, John Heidemann, Deborah Estrin Presentation: Deniz Çokuslu May 2008.
Wireless MAC Protocols for Ad-Hoc Networks Derek J Corbett Supervisor: Prof. David Everitt.
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks Medium Access Control (MAC) 21 February 2005.
Why Visual Sensor Network & SMAC Implementation Group Presentation Raghul Gunasekaran.
1 An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Network Gang Lu, Bhaskar Krishnamachari, and Cauligi Raghavendra.
1 Radio and Medium Access Control 2 Learning Objectives Understand important concepts about radio signals Understand radio properties of WSNs Understand.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks Energy Considerations in WSNs I 3 February 2005.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
A SURVEY OF MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
2/17/20051 Guest lecture for CS113, UCLA Medium Access Control in Wireless Sensor Networks Wei Ye USC Information Sciences Institute.
An Adaptive Energy-Efficient and Low- Latency MAC for Data Gathering in Wireless Sensor Networks Gang Lu, Bhaskar Krishnamachari, and Cauligi S. Raghavendra.
1 An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin IEEE infocom /1/2005 Hong-Shi Wang.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
KAIS T Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Network Wei Ye, John Heidemann, Deborah Estrin 2003 IEEE/ACM TRANSACTIONS.
A Throughput-Adaptive MAC Protocol for Wireless Sensor Networks Zuo Luo, Liu Danpu, Ma Yan, Wu Huarui Beijing University of Posts and Telecommunications.
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
MACs for sensor nets. review Aloha Slotted aloha CSMA Listen before sending Non/1/P-persistent P_r = (1-a)*a^CW / (1-a^CW) * a^-r Sum from 1 to CW is.
Link Layer Support for Unified Radio Power Management in Wireless Sensor Networks IPSN 2007 Kevin Klues, Guoliang Xing and Chenyang Lu Database Lab.
0.1 IT 601: Mobile Computing Wireless Sensor Network Prof. Anirudha Sahoo IIT Bombay.
CS541 Advanced Networking 1 Contention-based MAC Protocol for Wireless Sensor Networks Neil Tang 4/20/2009.
Wireless Networks: Physical and Link Layers Wired Typically point-to- point connections Interference effects are not significant Not power constrained.
A Bit-Map-Assisted Energy- Efficient MAC Scheme for Wireless Sensor Networks Jing Li and Georgios Y. Lazarou Department of Electrical and Computer Engineering,
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks Wireless Terms, FAQ & Glossary 27 January 2005.
Z-MAC : a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min ACM SenSys Systems Modeling.
How to minimize energy consumption of Sensors in WSN Dileep Kumar HMCL 30 th Jan, 2015.
Chapter 12 Media Access Control (MAC)
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
An Energy-efficient MAC protocol for Wireless Sensor Networks
SENSYS Presented by Cheolki Lee
Channel Allocation (MAC)
Multiple access.
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Investigating Mac Power Consumption in Wireless Sensor Network
Presentation transcript:

The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks Medium Access Control (MAC) 17 February 2005

The University of Iowa. Copyright© 2005 A. Kruger 2 Organizational Monday 4:30-5:20Room 4511 SC Thursday12:30-1:20Room 3220 SC Please note that the room numbers are different for Mondays and Thursdays. Monday5:20-6:20Room 1126 SC Thursday1:30-2:30Room 1126 SC OtherBy appointmentRoom 523C SHL Class Website Class Time Office Hours

The University of Iowa. Copyright© 2005 A. Kruger 3 Medium Access Control (MAC) Introduction One Approach (Be nice – share) –Avoid interference by scheduling nodes on sub- channels TDMA (Time-Division Multiple Access) FDMA (Frequency-Division Multiple Access) CDMA (Code-Division Multiple Access) Another Approach (Compete/contend) –Don’t pre-allocate transmission, compete => probabilistic coordination –ALOHA (Transmit. Collision? Yes, discard packet, retransmit later) –Carrier Sense (IEEE )

The University of Iowa. Copyright© 2005 A. Kruger 4 MAC Attributes Basic task of MAC protocol –Collision avoidance/minimization Energy efficiency –MAC layer controls radio. Radio often consume most energy Scalability and adaptivity –Nodes join, exit, rejoin, die, move to different location –Good MAC should accommodate such changes Channel utilization –Very important in cellular or wireless LAN –Often secondary in WSNs (Why?) Latency Throughput Fairness –Important in traditional cellular/wireless LAN, less important in WSNs (Why?)

The University of Iowa. Copyright© 2005 A. Kruger 5 MAC Attributes For WSNs, most important attributes of a good MAC are –Effective collision avoidance –Energy Efficiency –Scalability and adaptivity Other attributes are normally secondary –Fairness –Latency –Channel utilization

The University of Iowa. Copyright© 2005 A. Kruger 6 Energy Efficiency in MAC Protocols Motivation – Energy efficiency is very important in WSNs. Question – what causes energy waste from a MAC perspective? –Collision Collided packets are discarded, retransmission require energy Not a big issue in scheduled (TDMA, CDMA, FDMA) MAC protocols, but an issue in contention MAC protocols. –Idle listening Long distance (500 m or more) Tx energy consumption dominates, but in short-range communication Rx energy consumption can be close to Tx energy consumption MICA2 idle:receiving:transmission ratio at 1 mW is 433 MHz and 1mW Can be a dominant factor in WSN energy consumption

The University of Iowa. Copyright© 2005 A. Kruger 7 Energy Efficiency in Mac Protocols –Overhearing When a node receives packets that are destined for another node –Control packet overhead Sending, receiving, listening, all consumes energy –Adaptation Reconfiguring when nodes join leave

The University of Iowa. Copyright© 2005 A. Kruger 8 TDMA Overview Channel is divided into N slots (a frame) –Each node gets a time slot –It only transmits in its time slot –It only need listen during its time slot –Frame my be static – fix number of slots –Frames may be dynamically adjusted –Frequently used in cellular communications (i.e., GSM)

The University of Iowa. Copyright© 2005 A. Kruger 9 TDMA for WSNs Often used in WSNs Typically, nodes communicate with base station Major advantage of TDMA – supports low-duty-cycle operations on nodes –Large frames –Nodes only have to listen in their time slot Low duty-cycle =>low energy consumption

The University of Iowa. Copyright© 2005 A. Kruger 10 TDMA Disadvantages for WSNs Cluster paradigm (analogous to cell phones) One node is selected as the cluster head and acts as base station Nodes communicate only with head Direct peer-to-peer communication not energy efficient –Nodes must listen on all time slots, reducing energy Inter-cluster communication requires other MAC protocols Most important issue is limited scaling –When a new nodes joins the base station must reallocate slots and adjusting the frame size –This can take time and energy to propagate

The University of Iowa. Copyright© 2005 A. Kruger 11 Examples of Scheduled Protocols Sohrabi & Pottie –Homework/Exam (page 79 in book) Low-Energy Adaptive Clustering Hierarchy (LEACH) –Organize nodes into cluster hierarchies –TDMA within each cluster –Nodes only talk to node head –Position of head is rotated among nodes depending on remaining energy –Node then uses long-range/high-power communication to base –Nodes don’t need to know global topology –Nodes don’t need control information from base station

The University of Iowa. Copyright© 2005 A. Kruger 12 Scheduled Protocols Bluetooth –Designed for PAN, but attractive for WSNs –Bluetooth organizes itself into clusters, piconets –Frequency-hopping CDMA is used to handle inter- cluster interference –Within cluster, TDMA MAC protocol –Master-slave approach. Cluster head (master), other nodes are slaves. –Master uses polling to decide which salve can transmit –Only communication between master and one or more slaves are possible –Maximum number of nodes in a cluster is 8

The University of Iowa. Copyright© 2005 A. Kruger 13 Bluetooth

The University of Iowa. Copyright© 2005 A. Kruger 14 Bluetooth Power Classes Power Class Max Output Power Min Output Power Range mW (20dbm) 1mW~100 m mw (4dbm) 0.25mW+10m 31mW (0dbm)0.25mW1m

The University of Iowa. Copyright© 2005 A. Kruger 15 Energy Conservation in Scheduled MAC Protocols Collision free No need for idle listening TDMA naturally support low-duty cycle operation

The University of Iowa. Copyright© 2005 A. Kruger 16 Review Question True or false – With respect to WSN MACs, effective collision avoidance is less important than fairness. Describe and elaborate briefly (three sentences) what we mean by the term “latency” as an attribute of a WSN MAC. True or false – channel utilization is a crucial attribute of as WSN MAC True or false – energy waste from collisions are less in contention MAC protocols than in scheduled MAC protocols. List three scheduled MAC protocols. True or false – in WSN where low-power, short range radio transmission is used, idle listing contributes very little to the energy consumption budget of a node Briefly explain the term idle listening in WSNs One major issue in TDMA MAC protocols that of limited scaling. Explain in a 5-6 sentence paragraph. Describe the LEACH MAC protocol. Describe the Sohrabi & Pottie MAC protocol. What is the fundamental purpose of a MAC protocol?