Architectures and Applications for Wireless Sensor Networks (01204525) Medium Access Control Chaiporn Jaikaeo Department of Computer.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 5: Medium access control protocols Holger Karl.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 5: Medium access control protocols Holger Karl.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 8th Lecture Christian Schindelhauer.
An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Network
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin.
Medium Access Control in Wireless Sensor Networks.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 8th Lecture Faisal Aslam.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks 4th Week (Part I) Faisal Aslam.
Investigating Mac Power Consumption in Wireless Sensor Network
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up For Wireless Sensor Networks Zhihui Chen; Ashfaq Khokhar ECE/CS Dept., University of.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 9th Lecture Christian Schindelhauer.
An Energy-efficient MAC protocol for Wireless Sensor Networks
Medium Access Control in Wireless Sensor Networks USC/ISI Technical Report ISI-TR-580, October 2003 Wei Ye and John Heidemann.
Efficient MAC Protocols for Wireless Sensor Networks
MAC Layer Protocols for Sensor Networks Leonardo Leiria Fernandes.
1 MAC Layer Design for Wireless Sensor Networks Wei Ye USC Information Sciences Institute.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
Network Kernel Architectures and Implementation ( ) ) Medium Access Control and WPAN Technologies Chaiporn Jaikaeo Department.
1 Radio and Medium Access Control 2 Radio Properties.
Venkatesh Rajendran, Katia Obraczka, J.J. Garcia-Luna-Aceves
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 5: Medium access control protocols Holger Karl.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks The First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003) November.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
ECE 256, Spring 2008 Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So & Nitin Vaidya.
An Energy Efficient MAC Protocol for Wireless Sensor Networks “S-MAC” Wei Ye, John Heidemann, Deborah Estrin Presentation: Deniz Çokuslu May 2008.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks (S-MAC) Wei Ye, John Heidemann, Deborah Estrin.
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks Medium Access Control (MAC) 21 February 2005.
1 An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Network Gang Lu, Bhaskar Krishnamachari, and Cauligi Raghavendra.
1 Radio and Medium Access Control 2 Learning Objectives Understand important concepts about radio signals Understand radio properties of WSNs Understand.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 5: Medium access control protocols Holger Karl.
Versatile Low Power Media Access for Wireless Sensor Networks Sarat Chandra Subramaniam.
A SURVEY OF MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
Wireless LANs and PANs : Data Communication and Computer Networks Asst. Prof. Chaiporn Jaikaeo, Ph.D.
2/17/20051 Guest lecture for CS113, UCLA Medium Access Control in Wireless Sensor Networks Wei Ye USC Information Sciences Institute.
An Adaptive Energy-Efficient and Low- Latency MAC for Data Gathering in Wireless Sensor Networks Gang Lu, Bhaskar Krishnamachari, and Cauligi S. Raghavendra.
MAC Protocol for PAN. 2 Medium Access Control (MAC) Controlling when to send a packet and when to listen for a packet are perhaps the two most important.
1 Radio and Medium Access Control 2 Learning Objectives Understand important concepts about radio signals Understand radio properties of WSNs Understand.
SNU Mobile Networks Lab. S-MAC (Sensor-MAC) T-MAC (Timeout-MAC) Kae Won, Choi Kyoung hoon, Kim.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
KAIS T Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Network Wei Ye, John Heidemann, Deborah Estrin 2003 IEEE/ACM TRANSACTIONS.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
ECE 256, Spring 2009 __________ Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver __________________.
Medium Access Control in Wireless networks
0.1 IT 601: Mobile Computing Wireless Sensor Network Prof. Anirudha Sahoo IIT Bombay.
Energy-Efficient, Application-Aware Medium Access for Sensor Networks Venkatesh Rajenfran, J. J. Garcia-Luna-Aceves, and Katia Obraczka Computer Engineering.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
S-MAC Taekyoung Kwon. MAC in sensor network Energy-efficient Scalable –Size, density, topology change Fairness Latency Throughput/utilization.
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Z-MAC : a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min ACM SenSys Systems Modeling.
MAC Protocols for Sensor Networks
Wireless Sensor Networks 4. Medium Access
SENSYS Presented by Cheolki Lee
Wireless Sensor Networks
Department of Computer Science Southern Illinois University Carbondale CS441-Mobile & Wireless Computing IEEE Standard.
Medium Access Control and WPAN Technologies
Investigating Mac Power Consumption in Wireless Sensor Network
Presentation transcript:

Architectures and Applications for Wireless Sensor Networks ( ) Medium Access Control Chaiporn Jaikaeo Department of Computer Engineering Kasetsart University Materials taken from lecture slides by Karl and Willig

2 Overview Principal options and difficulties Principal options and difficulties Contention-based protocols Contention-based protocols Schedule-based protocols Schedule-based protocols IEEE IEEE

3 Difficulties Medium access in wireless networks is difficult, mainly because of Medium access in wireless networks is difficult, mainly because of  Half-duplex communication  High error rates Requirements Requirements  As usual: high throughput, low overhead, low error rates, …  Additionally: energy-efficient, handle switched off devices!

4 Requirements for Energy-Efficient MAC Protocols Recall Recall  Transmissions are costly  Receiving about as expensive as transmitting  Idling can be cheaper but is still expensive Energy problems Energy problems  Collisions  Overhearing  Idle listening  Protocol overhead Always wanted: Low complexity solution Always wanted: Low complexity solution

5 Main Options Wireless medium access CentralizedDistributed Contention- based Schedule- based Fixed assignment Demand assignment Contention- based Schedule- based Fixed assignment Demand assignment

6 Centralized Medium Access A central station controls when a node may access the medium A central station controls when a node may access the medium  E.g., Polling, computing TDMA schedules  Advantage: Simple, efficient Not directly feasible for non-trivial wireless network sizes Not directly feasible for non-trivial wireless network sizes But: Can be quite useful when network is somehow divided into smaller groups But: Can be quite useful when network is somehow divided into smaller groups Distributed approach still preferable Distributed approach still preferable

7 Schedule- vs. Contention-Based Schedule-based protocols Schedule-based protocols  FDMA, TDMA, CDMA  Schedule can be fixed or computed on demand  Usually mixed  Collisions, overhearing, idle listening no issues  Time synchronization needed Contention-based protocols Contention-based protocols  Hope: coordination overhead can be saved  Mechanisms to handle/reduce probability/impact of collisions required  Randomization used somehow

8 Overview Principal options and difficulties Principal options and difficulties Contention-based protocols Contention-based protocols  MACA  S-MAC, T-MAC  Preamble sampling, B-MAC  PAMAS Schedule-based protocols Schedule-based protocols IEEE IEEE

9 A Distributed, Contention-Based MAC Basic ideas Basic ideas  Receivers need to tell surrounding nodes to shut up  Listen before talk (CSMA)  Suffers from sender not knowing what is going on at receiver BC D Hidden terminal scenario: Also: recall exposed terminal scenario

10 How To Shut Up Senders Inform potential interferers during reception Inform potential interferers during reception  Cannot use the same channel  So use a different one  Busy tone protocol Inform potential interferers before reception Inform potential interferers before reception  Can use same channel  Receiver itself needs to be informed, by sender, about impending transmission  Potential interferers need to be aware of such information, need to store it

11 MACA Multiple Access with Collision Avoidance Multiple Access with Collision Avoidance Sender B issues Request to Send (RTS) Sender B issues Request to Send (RTS) Receiver C agrees with Clear to Send (CTS) Receiver C agrees with Clear to Send (CTS) Potential interferers learns from RTS/CTS Potential interferers learns from RTS/CTS  Store this information in a Network Allocation Vector (NAV) B sends, C acks B sends, C acks Used in IEEE Used in IEEE

12 RTS/CTS RTS/CTS helps, but do not solve hidden/exposed terminal problems RTS/CTS helps, but do not solve hidden/exposed terminal problems

13 MACA Problem: Idle listening Need to sense carrier for RTS or CTS packets Need to sense carrier for RTS or CTS packets  In some form shared by many CSMA variants; but e.g. not by busy tones  Simple sleeping will break the protocol IEEE solution: ATIM windows & sleeping IEEE solution: ATIM windows & sleeping  Idea: Nodes that have data buffered for receivers send traffic indicators at prearranged points in time  Receivers need to wake up at these points, but can sleep otherwise

14 Sensor-MAC (S-MAC) MACA unsuitable if average data rate is low MACA unsuitable if average data rate is low  Most of the time, nothing happens Idea: Switch off, ensure that neighboring nodes turn on simultaneously to allow packet exchange Idea: Switch off, ensure that neighboring nodes turn on simultaneously to allow packet exchange  Need to also exchange wakeup schedule between neighbors  When awake, perform RTS/CTS

15 Listen for SYNC tdtd Schedule Assignment Synchronizer   Listen for a mount of time   If hear no SYNC, select its own SYNC   Broadcasts its SYNC immediately Follower   Listen for amount of time   Hear SYNC from A, follow A’s SYNC   Rebroadcasts SYNC after random delay t d Sleep Listen Go to sleep after time t Sleep Listen Broadcasts A B Go to sleep after time t- t d

16 S-MAC Synchronized Islands Nodes learn schedule from other nodes Nodes learn schedule from other nodes Some node might learn about two different schedules from different nodes Some node might learn about two different schedules from different nodes  “Synchronized islands” To bridge this gap, it has to follow both schemes To bridge this gap, it has to follow both schemes Time AAAA CCCC A BBBB DDD A C B D E EEE EEE

17 Timeout-MAC (T-MAC) In S-MAC, active period is of constant length In S-MAC, active period is of constant length Idea: Prematurely go back to sleep mode after timeout Idea: Prematurely go back to sleep mode after timeout  Adaptive duty cycle One ensuing problem: Early sleeping One ensuing problem: Early sleeping  C wants to send to D, but is hindered by transmission A  B ABCD RTS CTS DATA May not send Timeout, go back to sleep as nothing happened ACK RTS

18 Preamble Sampling Alternative option: Don’t try to explicitly synchronize nodes Alternative option: Don’t try to explicitly synchronize nodes  Have receiver sleep and only periodically sample the channel Use long preambles to ensure that receiver stays awake to catch actual packet Use long preambles to ensure that receiver stays awake to catch actual packet  Example: B-MAC, WiseMAC Check channel Start transmission: Long preambleActual packet Stay awake!

19 B-MAC Very simple MAC protocol Very simple MAC protocol Employs Employs  Clear Channel Assessment (CCA) and backoffs for channel arbitration  Link-layer acknowledgement for reliability  Low-power listening (LPL)  I.e., preamble sampling Currently: Often considered as the default WSN MAC protocol Currently: Often considered as the default WSN MAC protocol

20 B-MAC B-MAC does not have B-MAC does not have  Synchronization  RTS/CTS  Results in simpler, leaner implementation  Clean and simple interface

21 Clear Channel Assessment "Carrier Sensing" in wireless networks "Carrier Sensing" in wireless networks Thresholding CCA algorithm Outlier detection CCA algorithm

22 PAMAS Power Aware Multi-Access with Signaling Power Aware Multi-Access with Signaling Idea: combine busy tone with RTS/CTS Idea: combine busy tone with RTS/CTS  Avoid overhearing  Does not address idle listening  Uses separate data and control channels Time Control channel Data channel RTS A  B CTS B  A Data A  B Busy tone sent by B

23 PAMAS Suppose a node C in vicinity of A is already receiving a packet when A initiates RTS Suppose a node C in vicinity of A is already receiving a packet when A initiates RTS A B C ? Time Control channel Data channel RTS A  B CTS B  A No data! Busy tone by C

24 Overview Principal options and difficulties Principal options and difficulties Contention-based protocols Contention-based protocols Schedule-based protocols Schedule-based protocols  LEACH  SMACS  TRAMA IEEE IEEE

25 LEACH Low-Energy Adaptive Clustering Hierarchy Low-Energy Adaptive Clustering Hierarchy Assumptions Assumptions  Dense network of nodes  Direct communication with central sink  Time synchronization Idea: Group nodes into “clusters” Idea: Group nodes into “clusters”  Each cluster controlled by clusterhead  About 5% of nodes become clusterhead (depends on scenario)  Role of clusterhead is rotated

26 LEACH Clusterhead Each CH organizes Each CH organizes  CDMA code for its cluster  TDMA schedule to be used within a cluster In steady state operation In steady state operation  CHs collect & aggregate data from all cluster members  Report aggregated data to sink using CDMA

27 LEACH rounds

28 SMACS Self-Organizing Medium Access Control for Sensor Networks Self-Organizing Medium Access Control for Sensor Networks Assumptions Assumptions  Many radio channels  Most nodes are stationary  Time synchronization Goal: set up directional links between neighboring nodes Goal: set up directional links between neighboring nodes

29 SMACS Links Each link is directional Each link is directional  A pair of nodes needs two links to exchange data  Radio channel + time slot at both sender and receiver  Free of collisions at receiver  Channel picked randomly, slot is searched greedily until a collision-free slot is found Receivers only wake up in their assigned time slots, once per superframe Receivers only wake up in their assigned time slots, once per superframe

30 TRAMA Traffic Adaptive Medium Access Protocol Traffic Adaptive Medium Access Protocol Assume nodes are time synchronized Assume nodes are time synchronized Time divided into cycles, divided into Time divided into cycles, divided into  Random access period  Scheduled access period Random Access Period Scheduled-Access Period time cycle Exchange and learn two-hop neighborsExchange and learn two-hop neighbors Exchange schedulesExchange schedules Used by winning nodes to transmit dataUsed by winning nodes to transmit data

31 TRAMA – Adaptive Election How to decide which slot (in scheduled access period) a node can use? How to decide which slot (in scheduled access period) a node can use?  For node id x and time slot t, compute p = h (x  t)  h is a global hash function  Compute p for next k time slots for itself and all two- hop neighbors  Node uses those time slots for which it has the highest priority t = 0 t = 1 t = 2 t=3 t = 4 t = 5 A B C

32 Comparison: TRAMA, S-MAC Comparison between TRAMA & S-MAC Comparison between TRAMA & S-MAC  Energy savings in TRAMA depend on load situation  Energy savings in S-MAC depend on duty cycle  TRAMA (as typical for a TDMA scheme) has higher delay but higher maximum throughput than contention-based S-MAC TRAMA disadvantage: substantial memory/CPU requirements for schedule computation TRAMA disadvantage: substantial memory/CPU requirements for schedule computation

33 Overview Principal options and difficulties Principal options and difficulties Contention-based protocols Contention-based protocols Schedule-based protocols Schedule-based protocols IEEE IEEE

34 IEEE IEEE standard for low-rate WPAN (LR-WPAN) applications IEEE standard for low-rate WPAN (LR-WPAN) applications  Low-to-medium bit rates  Moderate delays without too strict requirements  Low energy consumption Physical layer Physical layer  20 kbps over MHz  40 kbps over – 928 MHz  250 kbps over GHz MAC protocol MAC protocol  Single channel at any one time  Combines contention-based and schedule-based schemes  Asymmetric: nodes can assume different roles

35 868MHz / 915MHz PHY 2.4 GHz MHz Channel 0 Channels 1-10 Channels GHz 928 MHz902 MHz 5 MHz 2 MHz 2.4 GHz PHY IEEE PHY Overview Operating frequency bands Operating frequency bands

36 IEEE MAC Overview Device classes Device classes  Full function device (FFD)  Any topology  Network coordinator capable  Talks to any other device  Reduced function device (RFD)  Limited to star topology  Cannot become a network coordinator  Talks only to a network coordinator  Very simple implementation Slide 36Joe Dvorak, Motorola9/27/05

37 Network Topologies

38 Cluster Tree Network A special case of peer-to-peer topology A special case of peer-to-peer topology

39 Coordinators Roles Roles  Manage a list of associated devices  Allocate a short address to each device  Transmit beacons (in beaconed mode)  Exchange data with devices and peer coordinators Devices are associated with coordinators Devices are associated with coordinators  Forming a PAN, identified by a PAN identifier

40 Beaconed Mode Superframe structure Superframe structure GTS assigned to devices upon request GTS assigned to devices upon request

41 Data Transfer Device  coordinator Device  coordinator  If having allocated GTS, wake up and send  Otherwise, send during CAP  Using slotted CSMA Coordinator  device Coordinator  device  If having allocated GTS, wake up and receive  Otherwise, see picture

42 Slotted CSMA

43 Further protocols MAC protocols for ad hoc/sensor networks is one the most active research fields MAC protocols for ad hoc/sensor networks is one the most active research fields  Tons of additional protocols in the literature  E.g., STEM, mediation device protocol, many CSMA variants with different timing optimizations, protocols for multi-hop reservations (QoS for MANET), protocols for multiple radio channels, …

44 Summary Many different ideas exist for medium access control in MANET/WSN Many different ideas exist for medium access control in MANET/WSN Comparing their performance and suitability is difficult Comparing their performance and suitability is difficult Especially, clearly identifying interdependencies between MAC protocol and other layers/applications is difficult Especially, clearly identifying interdependencies between MAC protocol and other layers/applications is difficult  Which is the best MAC for which application? Nonetheless, certain “common use cases” exist Nonetheless, certain “common use cases” exist  IEEE DCF for MANET  IEEE for some early “commercial” WSN variants  B-MAC for WSN research not focusing on MAC