Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 1 Presented by Fikret Sivrikaya Joint work with Costas Busch, Malik Magdon-Ismail,

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3f: Medium Access Control Protocols.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
TDMA Scheduling in Wireless Sensor Networks
Z-MAC: a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min Dept. of Computer Science, North Carolina State.
Routing Protocols for Sensor Networks Presented by Siva Desaraju Computer Science WMU An Application Specific Protocol Architecture for Wireless Microsensor.
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
Tradeoffs between performance guarantee and complexity for distributed scheduling in wireless networks Saswati Sarkar University of Pennsylvania Communication.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Efficient MAC Protocols for Wireless Sensor Networks
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Venkatesh Rajendran, Katia Obraczka, J.J. Garcia-Luna-Aceves
MAC Protocols and Security in Ad hoc and Sensor Networks
: Data Communication and Computer Networks
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Jamming-Resistant MAC Protocol1 A Jamming-Resistant MAC Protocol for Single-Hop Wireless Networks Baruch Awerbuch (JHU) Andrea W. Richa (ASU) Christian.
K. Banerjee, P. Basuchaudhuri, D. Sadhukhan and N. Das
DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad- Hoc Networks Injong Rhee (with Ajit Warrier, Jeongki Min, Lisong Xu) Department of Computer.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
Why Visual Sensor Network & SMAC Implementation Group Presentation Raghul Gunasekaran.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
MMAC: A Mobility- Adaptive, Collision-Free MAC Protocol for Wireless Sensor Networks Muneeb Ali, Tashfeen Suleman, and Zartash Afzal Uzmi IEEE Performance,
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Copyright © 2007 OPNET Technologies, Inc. CONFIDENTIAL - RESTRICTED ACCESS: This information may not be disclosed, copied, or transmitted in any format.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
0.1 IT 601: Mobile Computing Wireless Sensor Network Prof. Anirudha Sahoo IIT Bombay.
CS541 Advanced Networking 1 Contention-based MAC Protocol for Wireless Sensor Networks Neil Tang 4/20/2009.
DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad-Hoc Networks Injong Rhee (with Ajit Warrier, Jeongki Min, Lisong Xu) Department of Computer.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
Junchao Ma +, Wei Lou +, Yanwei Wu *, Xiang-Yang Li *, and Guihai Chen & Energy Efficient TDMA Sleep Scheduling in Wireless Sensor Networks + Department.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Exploring Random Access and Handshaking Techniques in Large- Scale Underwater Wireless Acoustic Sensor Networks Peng Xie and Jun-Hong Cui Computer Science.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Z-MAC : a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min ACM SenSys Systems Modeling.
MAC Protocols for Sensor Networks
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
2. Data Link Layer: Medium Access Control. Scheduling.
MAC Protocols for Sensor Networks
Data link layer divided into two functionality-oriented sublayers
Sidevõrgud IRT 4060/ IRT 0020 vooruloeng 6 / 20. okt 2004
SENSYS Presented by Cheolki Lee
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Services of DLL Framing Link access Reliable delivery
Ultra-Low Duty Cycle MAC with Scheduled Channel Polling
THE IEEE MAC SUB-LAYER – chapter 14
Communication Networks NETW 501
The Medium Access Control Sublayer
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Presentation transcript:

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 1 Presented by Fikret Sivrikaya Joint work with Costas Busch, Malik Magdon-Ismail, Bulent Yener Computer Science Department, Rensselaer Polytechnic Institute New York, USA

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 2 Outline Introduction –Sensor networks –MAC protocols –Previous work Model & Motivation Our Approach –LooseMAC Algorithm –TightMAC Algorithm Practical Considerations Summary & Future Work

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 3 Wireless Sensor Networks A large number of limited power sensor nodes Distributed, multi-hop, ad-hoc operation; no infra-sctructure, no central control point Collect and process data from a target domain and transmit information back to specific sites Usage scenarios… –disaster recovery –military surveillance –health administration –environmental monitoring.

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 4 Wireless Sensor Networks Each node has a transmission range, which determines its neighbors Representation of the network as a graph same transmission ranges  symmetric links  undirected graph

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 5 Interference / Collisions Interference on node b (“Hidden terminal problem”) a b c a b a b cd Interference on node b a and b interfere and hear noise only Packets which suffered collisions should be re-sent. Ideally, we would want all packets to be sent collision- free, only once…

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 6 MAC (Medium Access Control) Protocols Specify how nodes in a network access the shared communication channel. Two basic types –contention-based –contention-free Desired Properties of a Sensor Net. MAC Protocol –distributed –contention-free (collision free) –self-stabilizing –not require common global time reference

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 7 Previous Work Contention-based (random access) –ALOHA –CSMA (Carrier Sense Multiple Access) –IEEE Contention-free –FDMA –TDMA –CDMA Multi-layered approach –ASCENT (nodes decide themselves to be on or off) –S-MAC (virtual clusters based on common sleep schedules)

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 8 Notations Used… k-neighborhood of a node v:  k (v) k-neighborhood size of a node v:  k (v) = | k (v)| max k-neighborhood size (in the network):  k = max v  k (v) Let n be the number of nodes in the network 1-neighbors or “neighbors” of v 2-neighbors of v v

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 9 Our Approach TDMA-like framed approach frametime slot time

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 10 Our Approach LooseMAC –Same frame size at all nodes –Simple –Lower throughput (due to large frames) TightMAC –Nodes may have different frame sizes –More complex –Higher throughput (due to smaller frames)

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 11 LooseMAC – Basic Idea i j k Schedule nodes’ transmission times so that neighbor nodes do not transmit at the same time.  Repeatly select a random time slot until it is collision-free in the 2-neighborhood.  

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 12 LooseMAC - Hidden Terminal Problem i k j i reports the collision between j and k, so that they select new random slots.

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 13 Algorithm LooseMAC Algorithm LooseMAC(node i ) 1: Divide time into frames of size  ; 2: ready  FALSE; 3: while not ready do 4: Select a slot  i randomly in the frame; 5: Send a “beacon” message in slot  i ; 6: Listen for a period of  time slots; 7: if no collision is detected by i and no neighbor of i reports a conflict then 8: ready  TRUE;

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 14 A node leaves the network… j k  j   k i No problem!...

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 15 A node joins the network… j k  j   k i Problem!... j and k are now 2-neighbors and have conflicting time slots...

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 16 …remedy: “fresh” nodes When a node joins the network, it is in a special status called “fresh” A fresh node i informs its neighbors about its status by control messages When a neighbor node j of i receives this message, it becomes non-ready We guarantee that every neighbor of i receives the “fresh” control message from node i

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 17 Probability Analysis for Convergence Z i fails to become ready if one or more of the following occurs: 1. a neighbor of i coflicts with  i p 1 2. i hears a collision during Zp 2 3. i receives a conflict report during Z p 3 |Z| =  i ii Probability of failure = p 1 + p 2 + p 3 for some c Set   4  1 3  probability of failure  1/4

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 18 Convergence of LooseMAC For some constant c, if   c min{  1 3,  2 2 }, with probability at least 1-1/n: –all non-ready nodes become ready within  log n time slots –each node sends at most O(log n) control messages. Each message has size O(log n) bits: –sender ’ s id ( log n bits)+ fresh status (1 bit) + coflict report (1 bit) After convergence all transmissions are collision-free, and we define throughput of each node to be the inverse of its frame size; 1/ 

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 19 Algorithm TightMAC Nodes may have different frame sizes. Runs on top of LooseMAC. Motivation: “tighten” the frames to increase throughput.

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 20 FiFi FjFj sjsj TightMAC Frame Size Node i selects a frame size proportional to  i, where [ max 2-neighborhood size among i ’s 2-neighbors ] coincidence set C ji (s j ) Each node selects a frame size which is an exact power of 2

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 21 2-neighborhood size 2-neighborhood size calculation –receive ids from all neighbors, and broadcast them all –then a node receives ids of all 2-neighbors –take union; exact 2-neighborhood size, but high msg complexity Alternatively –receive ids from neighbors, and broadcast the count –then a node receives 1-neighbor counts from all neihbors –take the sum; an upper bound on the 2-neighborhood size, less msg complexity

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 22 How is  i calculated? send id send count (# of neighbors) send total send max  i  take max

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 23 Ready levels All 2-neighbors of a node i should be ready so that i can proceed to TightMAC phase. Introduce five “ready levels”; –ready-0 (a.k.a. ready) –ready-1 –ready-2 –ready-3 –ready-4 When all neighbors of i are ready-k, i becomes ready-(k+1).

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 24 Ready levels non-ready ready-0 (ready) ready-1 ready-2 ready-3 ready-4

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 25 Ready levels non-ready ready-0 (ready) ready-1 ready-2 ready-3 ready-4

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 26 Ready levels non-ready ready-0 (ready) ready-1 ready-2 ready-3 ready-4

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 27 Ready levels non-ready ready-0 (ready) ready-1 ready-2 ready-3 ready-4

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 28 Ready levels non-ready ready-0 (ready) ready-1 ready-2 ready-3 ready-4

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 29 Ready levels non-ready ready-0 (ready) ready-1 ready-2 ready-3 ready-4

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 30 Ready Levels - another view send id send count (# of neighbors) send total send max  i  take max ready ready-1 ready-2 ready-3 ready-4

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 31 Algorithm TightMAC Algorithm TightMAC(node i ) 1: repeat 2: Execute LooseMAC( i ) 3: until i becomes ready-4 4: Transmit neighborhood information and compute  i ; 5: Create the tight frame F i with |F i | = 2  log 6  i  ; 6: Inform neighbors for the relative position of F i, with respect to i ’s loose slot; 7: Execute FindTightSlot( i ); 8: Start using the tight frame; |F i | = 2  log 6  i   find smallest power k of 2 such that 2 k  6  i

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 32 Algorithm FindTightSlot Algorithm FindTightSlot(node i ) 1: while true do 2: with probability 1/  i : 3: Select a random slot s i in F i ; 4: Send the position of s i (relative to its loose slot); 5: Listen for a period of  time slots; 6: if no conflict is reported by any neighbor then 7: return s i ;

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 33 Complexity of TightMAC The network stabilizes within O(  1 2  log n) timeslots, with probability at least 1-1/  (n) Each node sends O(log n) messages Each message is of size O(log n) bits.

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 34 Practical Considerations How does a node detect collisions? –distinguish collisions from bakground noise by a threshold What if time slots are not alligned? –corectness not affected, performance affected only by a constant factor What about clock skew? –either run a simple clock skew algorithm –or re-run and self-stabilize whenever the skew causes collisions.

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 35 Summary and Future Work Presented distributed, contention-free, self- stabilizing MAC protocols for sensor networks. –LooseMAC –TightMAC Future research directions –Simulation analysis (e.g. for analyzing the effects of topology change rate) –Compare the performance with existing protocols

Fikret Sivrikaya Contention-Free MAC Protocols for Wireless Sensor Networks 36 References C. Busch, M. Magdon-Ismail, F. Sivrikaya, B. Yener, “Contention-Free MAC protocols for Wireless Sensor Networks.” Technical Report, Rensselaer Polytechnic Institute, Available at N. Abramson, “The ALOHA System - Another Alternative for Computer Communications.” Proceedings of the AFIPS Conference, vol. 37, pp , “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications.” IEEE standards , January W. Ye, J. Heidemann, D.Estrin, “Medium Access Control with Coordinated, Adaptive Sleeping for Wireless Sensor Networks.” [SMAC] IEEE/ACM Transactions on Net-working, vol. 12, no. 3, pp , June A. Cerpa, D. Estrin, “ASCENT: Adaptive Self-configuring Sensor Network Topologies.” Proceedings of INFOCOM’02, 2002.