1 Radio and Medium Access Control 2 Radio Properties.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks Medium Access Control (MAC) 17 February 2005.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 8th Lecture Christian Schindelhauer.
An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Network
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
Medium Access Control in Wireless Sensor Networks.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Presented by: Murad Kaplan.  Introduction.  Design of SCP-MAC.  Lower Bound of Energy Performance with Periodic Traffic.  Protocol Implementation.
Investigating Mac Power Consumption in Wireless Sensor Network
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin -- Adapted the authors’ Infocom 2002 talk.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 9th Lecture Christian Schindelhauer.
1 Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye Fabio Silva John Heidemann Presented by: Ronak Bhuta Date: 4 th December 2007.
1 Link Layer Message M A B Problem: Given a message M at a node A consisting of several packets, how do you send the packets to a “neighbor” node B –Neighbor:
An Energy-efficient MAC protocol for Wireless Sensor Networks
Medium Access Control in Wireless Sensor Networks USC/ISI Technical Report ISI-TR-580, October 2003 Wei Ye and John Heidemann.
Versatile low power media access for wireless sensor networks Joseph PolastreJason HillDavid Culler Computer Science Department University of California,Berkeley.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Efficient MAC Protocols for Wireless Sensor Networks
MAC Layer Protocols for Sensor Networks Leonardo Leiria Fernandes.
1 MAC Layer Design for Wireless Sensor Networks Wei Ye USC Information Sciences Institute.
Medium Access Control Sublayer
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
MAC Protocols and Security in Ad hoc and Sensor Networks
ZigBee Module 구성도. IEEE LR-WPAN  Low power consumption  Frequent battery change is not desired and/or not feasible  Low cost  Otherwise,
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks The First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003) November.
An Energy Efficient MAC Protocol for Wireless Sensor Networks “S-MAC” Wei Ye, John Heidemann, Deborah Estrin Presentation: Deniz Çokuslu May 2008.
BMAC - Versatile Low Power Media Access for Wireless Sensor Networks.
Wireless MAC Protocols for Ad-Hoc Networks Derek J Corbett Supervisor: Prof. David Everitt.
Medium Access Control NWEN302 Computer Network Design.
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks Medium Access Control (MAC) 21 February 2005.
† Department of Computer Science – University of Rome “Sapienza” – Italy Protocolli MAC per reti di sensori Sistemi Wireless, a.a. 2009/2010 Un. of Rome.
1 Radio and Medium Access Control 2 Learning Objectives Understand important concepts about radio signals Understand radio properties of WSNs Understand.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Versatile Low Power Media Access for Wireless Sensor Networks Sarat Chandra Subramaniam.
A SURVEY OF MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
MAC Protocol for PAN. 2 Medium Access Control (MAC) Controlling when to send a packet and when to listen for a packet are perhaps the two most important.
1 Radio and Medium Access Control 2 Learning Objectives Understand important concepts about radio signals Understand radio properties of WSNs Understand.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
KAIS T Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Network Wei Ye, John Heidemann, Deborah Estrin 2003 IEEE/ACM TRANSACTIONS.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
Link Layer Support for Unified Radio Power Management in Wireless Sensor Networks IPSN 2007 Kevin Klues, Guoliang Xing and Chenyang Lu Database Lab.
Medium Access Control in Wireless networks
0.1 IT 601: Mobile Computing Wireless Sensor Network Prof. Anirudha Sahoo IIT Bombay.
CS541 Advanced Networking 1 Contention-based MAC Protocol for Wireless Sensor Networks Neil Tang 4/20/2009.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
S-MAC Taekyoung Kwon. MAC in sensor network Energy-efficient Scalable –Size, density, topology change Fairness Latency Throughput/utilization.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
Multiple Access Techniques PROF. MICHAEL TSAI 2016/5/6.
Z-MAC : a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min ACM SenSys Systems Modeling.
1 Media Access Control in Wireless Sensor Networks - I.
MAC Protocols for Sensor Networks
Z-MAC: a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min Dept. of Computer Science, North Carolina State.
MAC Protocols for Sensor Networks
Ultra-Low Duty Cycle MAC with Scheduled Channel Polling
Department of Computer Science Southern Illinois University Carbondale CS441-Mobile & Wireless Computing IEEE Standard.
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Investigating Mac Power Consumption in Wireless Sensor Network
Presentation transcript:

1 Radio and Medium Access Control

2 Radio Properties

3 Some Basic Concepts RSSI dbm Noise floor: see wikipedia CCA thresholding algorithms Duty cycle LPL

4 Signal Transmission Ref: Fig. 2.9 of “Wireless Communications and Networks” by William Stallings

5 Packet Reception and Transmission Ref: [Hardware_1] Figure 5

6 Signal An electromagnetic signal –A function of time –Also a function of frequency The signal consists of components of different frequencies

Physical Layer

8 dB dB (Decibel) –Express relative differences in signal strength –dB = 10 log 10 (p1/p2) –dB = 0: no attenuation. p1 = p2 –1 dB attenuation: 0.79 of the input power survives: 10 * log 10 (1/0.79) –3 dB attenuation: 0.5 of the input power survives: 10 * log 10 (1/0.5) –10 dB attenuation: 0.1 of the input power survives: 10 * log 10 (1/0.1)

9 dBm The referenced quantity is one milliwatt(mW) dBm = 10 log 10 (p1/1mW) 0 dBm: p1 is 1 mW -80 dBm: p1 is W = 10pW

10 Received Signal Strength Indicator (RSSI) The strength of a received RF signal Many current platforms provide hardware indicator –CC2420, the radio chip of MicaZ and TelosB, provides RSSI indicator and LQI (Link Quality Indicator)

11 LQI (Link Quality Indicator) A measure of chip error rate Error rate –The rate at which errors occur –Error 0 is transmitted while 1 is received 1 is transmitted while 0 is received

12 Noise Floor The measure of the signal created from the sum of all the noise sources and unwanted signals

13 Signal Noise Ratio (SNR) The ratio of the power in a signal to the power contained in the noise that is present Typically measured at the receiver Take CC2420 as the example: –Noise Floor: the RSSI register from the CC2420 chip when not receiving a packet For example -98dBm –The strength field from the received packet: RSSI of the received packet

14 Radio Spectrum Frequency Allocation

ref: [radio_1] Radio Irregularity Spherical radio range is not valid When an electromagnetic signal propagate, the signal may be –Diffracted –Reflected –Scattered Radio irregularity and variations in packet loss in different directions

[Radio_1] Figure 116 Radio Signal Property Anisotropic Signal Strength: Different path losses in different directions Figure 1: Signal Strength over Time in Four Directions

[Radio_1]: Figure 317 Radio Signal Property Anisotropic Packet Loss Ratio: Packet Reception Ratio (PRR) varies in different directions

[Radio_1]: Figure 418 Radio Signal Property Anisotropic Radio Range: The communication range of a mote is not uniform

19 Medium Access Control (MAC)

20 Introduction A radio channel cannot be accessed simultaneously by two or more nodes that are in a radio interference range –Nodes may transmit at the same time on the same channel Medium Access Control –On top of Physical layer –Control access to the radio channel

21 MAC Protocol Requirements Energy Efficiency –Sources of energy waste Collision, Idle Listening, Overhearing, and Control Packet Overhead Effective collision avoidance –When and how the node can access the medium and send its data Efficient channel utilization at low and high data rates –Reflects how well the entire bandwidth of the channel is utilized in communications Tolerant to changing RF/Networking conditions Scalable to large number of nodes Ref: [MAC_2] Section I, II

[MAC_3]: Section 422 Two Basic Classes of MAC Protocol – Slotted and Sampling Slotted Protocols –Nodes divides time into slots –Radio can be in receive mode, transmit mode, or powered off mode –Communication is synchronized –Data transfers occur in “slots” –TDMA, IEEE , S-MAC, T-MAC, etc. Also Ref: J. Polastre Dissertation – Section 2.4: final.pdf

23 Two Basic Classes of MAC Protocol – Slotted and Sampling Sampling Protocols –Nodes periodically wake up, and only start receiving data if they detect channel activity –Communication is unsynchronized –Data transfer wakes up receiver –Must send long, expensive messages to wake up neighbors –B-MAC, Preamble sampling, LPL, etc.

24 Slotted Protocol Example: Each node beacons on its own schedule Other nodes synchronize with the received Beacons Beacon Superframe Duration Beacon Frame Duration sleep Data Ack CSMA Contention Period

25 IEEE Superframe

26 Using RF Channel 15.4 SP wake for beacon period start radio send beacon Beacon beacon TX are messages pending? If yes, wake up send Data beacon RX send done TX first packet RX DataAck TX done Ack received send done reliability set packet received stop radio superframe complete Stop radio SP 15.4 Coordinator Neighbors Update schedule

27 Main MAC Protocols Wireless medium access Centralized Distributed Contention- based Schedule- based Fixed assignment Demand assignment Contention- based Schedule- based Fixed assignment Demand assignment

[MAC_2]: Figure 128 Scheduled Protocols TDMA divides the channel into N time slots

[MAC_2]: Section IV29 Contention-based Protocols A common channel is shared by all nodes and it is allocated on-demand A contention mechanism is employed Advantages over scheduled protocols –Scale more easily –More flexible as topologies change –No requirement to form communication clusters –Do not require fine-grained time synchronization Disadvantage –Inefficient usage of energy Node listen at all times Collisions and contention for the media

[MAC_2]: Section IV30 CSMA Listening before transmitting Listening (Carrier Sense) –To detect if the medium is busy Hidden Terminal Problem

[MAC_2]: Section IV31 Hidden Terminal Problem Node A and C cannot hear each other Transmission by node A and C can collide at node B On collision, both transmissions are lost Node A and C are hidden from each other

[MAC_2]: Section IV32 CSMA-CA CA –Collision Avoidance: to address the hidden terminal problem Basic mechanism –Establish a brief handshake between a sender and a receiver before transmission –The transmission between a sender and a receiver follows RTS-CTS-DATA-ACK

33 Centralized Medium Access Idea: Have a central station control when a node may access the medium –Example: Polling, centralized computation of TDMA schedules –Advantage: Simple, quite efficient (e.g., no collisions), burdens the central station Not directly feasible for non-trivial wireless network sizes But: Can be quite useful when network is somehow divided into smaller groups –Clusters, in each cluster medium access can be controlled centrally – compare Bluetooth piconets, for example ! Usually, distributed medium access is considered

34 Schedule- vs. Contention-based MACs Schedule-based MAC –A schedule exists, regulating which participant may use which resource at which time (TDMA component) –Typical resource: frequency band in a given physical space (with a given code, CDMA) –Schedule can be fixed or computed on demand Usually: mixed – difference fixed/on demand is one of time scales –Usually, collisions, overhearing, idle listening no issues –Needed: time synchronization!

35 Schedule- vs. Contention-based MACs Contention-based protocols –Risk of colliding packets is deliberately taken –Hope: coordination overhead can be saved, resulting in overall improved efficiency –Mechanisms to handle/reduce probability/impact of collisions required –Usually, randomization used somehow

36 Possible Solutions CSMA (Carrier Sense Multiple Access) –Advantage: No clock synchronization required No global topology information required –Disadvantage Hidden terminal problem: serious throughput degradation RTS/CTS can alleviate hidden terminal problem, but incur high overhead

37 Possible Solutions TDMA (Time-division multiple access) –Advantage Solve the hidden terminal problem without extra message overhead –Disadvantage It is challenging to find an efficient time schedule Need clock synchronization –High energy overhead Handling dynamic topology change is expensive Given low contention, TDMA gives much lower channel utilization and higher delay

38 # of Contenders Channel Utilization TDMA CSMA IDEAL Effective Throughput CSMA vs. TDMA Sensitive to Time synch. errors, Topology changes, Slot assignment errors. Do not use any topology or time synch. Info. Thus, more robust to time synch. errors and changes.

[MAC_2]: Section II.B39 Four important sources of wasted energy in WSN : –Idle Listening (required for all CSMA protocols) –Overhearing (since RF is a broadcast medium) –Collisions (Hidden Terminal Problem) –Control Overhead (e.g. RTS/CTS or DATA/ACK) MAC Energy Usage

40 B-MAC A set of primitives that other protocols may use as building block Provide basic CSMA access Optional link level ACK, no link level RTS/CTS CSMA backoffs configurable by higher layers Carrier Sensing using Clear Channel Assess (CCA) Sleep/Wake scheduling using Low Power Listening (LPL) Ref: Section 1, 3 of ref. [MAC_1] LPL: See Section 2.1 of ref. [Energy_1]

41 B-MAC Does not solve hidden terminal problem Duty cycles the radio through periodic channel sampling – Low Power Listening (LPL)

42 B-MAC Clear Channel Assessment - Before transmission – take a sample of the channel - If the sample is below the current noise floor, channel is clear, send immediately. - If five samples are taken, and no outlier found => channel busy, take a random backoff - Noise floor updated when channel is known to be clear e.g. just after packet transmission A packet arrives between 22 and 54ms. The middle graph shows the output of a thresholding CCA algorithm. ( 1: channel clear, 0: channel busy) Ref: Section 1, 3 of ref. [MAC_1]

[MAC_1]: Figure 343 A Trace of Power Consumption

44 B-MAC Low Power Listening Receive data Carrier sense Receiver Long PreambleData Tx Sender Check Interval  Similar to ALOHA preamble sampling  Wake up every Check-Interval  Sample Channel using CCA  If no activity, go back to sleep for Check- Interval  Else start receiving packet  Preamble > Check-Interval Goal: minimize idle listening

45 Low Power Listening Purpose –Energy cost = RX + TX + Listen –Save energy How –Duty cycle the radio while ensuring reliable message delivery –Periodically wake up, sample channel, and sleep The duty cycling receiver node performs short and periodic receive checks If the channel is checked every 100ms –The preamble must be at least 100 ms long for a node to wake up, detect activity on the channel, receive the preamble, and then receive the message.

Frame Format Page 36 of CC2420 Data Sheet

archive.com/tinyos- g07600.html TinyOS Implementation of CSMA o CC CCA Hardware –CC2420 has CCA as a pin that can be sampled to determine if another node is transmitting –See CC2420 Data Sheet – Figure 1 CC2420 Pinout Software –CC2420Transmit has the option to send the message with or without CCA See CC2420TransmitP.send();

du/pipermail/tinyos-help/2008- February/ html TinyOS Implementation of CSMA of CC Ack Hardware Ack –If MDMCTRL0.AUTOACK of CC2420 is enabled Software Ack –SACK strobe in CC2420ReceiveP can be used to set software ack