Download presentation
Presentation is loading. Please wait.
Published byAshley Shields Modified over 8 years ago
1
EM-MAC: A Dynamic Multichannel Energy-Efficient MAC Protocol for Wireless Sensor Networks ACM MobiHoc 2011 (Best Paper Award) Lei Tang 1, Yanjun Sun 2, Omer Gurewitz 3, and David B. Johnson 1 1 Department of Computer Science, Rice University, USA 2 Systems and Applications R&D Center, Texas Instruments, USA 3 Department of Communication Systems Engineering, Ben Gurion University, Israel
2
Outline Introduction System Model and Assumptions EM-MAC Protocol Design Evaluation on MICAz Motes Conclusion
3
Introduction Energy efficiency is crucial in wireless sensor networks (WSNs). Many energy-efficient wireless MAC protocols have been proposed that utilize duty cycling. In real world, WSN MAC protocols must operate under a number of significant challenges. collision or contention interference from wireless transmissions by other types of devices, such as Wi-Fi nodes, or jamming attack time synchronization
4
Goals This paper proposes a new multichannel energy-efficient MAC Protocol, called EM-MAC (Efficient Multichannel MAC). EM-MAC is a distributed protocol. is a asynchronous duty-cycling MAC protocol. utilizes the available multiple orthogonal radio channels common with many types of wireless devices. avoids jamming attack
5
System Model and Assumptions Each node equips with only one transceiver. The network is a multichannel environment. Nodes do not require to synchronize their clocks. There is no common control channel.
6
EM-MAC Overview k i j A A A A A A A
7
EM-MAC Overview S:S: 1 2 3 R:R: 1 2 3 DATA B B ACK B DATA B B ACK
8
EM-MAC How to choose the set of switching channels? How to avoid using congested channels and to be robust against wireless interference and jamming? How to address the rendezvous problem in an asynchronous environment?
9
How to choose the set of switching channels?
10
Switching Channel Selection Linear Congruential Generator (LCG) m>0 is a modulus, a is a multiplier, c is an increment, X n is the current seed, and X n+1 is the next seed. D. E. Knuth, “The Linear Congruential Method,” The Art of Computer Programming, Third Edition, Volume 2: Seminumerical Algorithm, pages 10-26. Addison-Wesley, 1997. A: 1, 4, 8, 11, 14, 2, 7, 12, 13, 15, 1, 2, … A: 1, 4, 8, 4, 8, 1, 1, 4, 8, 4, 4, 8, 1, 4, …
11
How to avoid using congested channels and to be robust against wireless interference and jamming?
12
Basic Concept Blacklisted Channel 1 4 8 A A: 1, 4, 8, 11, 14, 1, 4, 8, 11, 14, 1, 4, … 11 14 A A A A A A A A A Blacklist: 4, 8 A: 1, 11, 14, 1, 11, 14, 1, 11, …
13
Dynamic Channel Selection Detecting Channel Conditions Multichannel Rendezvous with Blacklisted Channels
14
Detecting Channel Conditions Badness metric (which is a non-negative metric) S:S: k i j R:R: k i j DATA B B ACK Both S and R decrease that channel’s badness metric by 1.
15
Detecting Channel Conditions S:S: k i j R:R: k i j DATA B B R increases that channel’s badness metric by 2. DATA B B B B Badness metric (which is a non-negative metric) S R
16
S:S: k i j R:R: k i j DATA B B ACK S increases that channel’s badness metric by 2. DATA ACK DATA ACK Detecting Channel Conditions Badness metric (which is a non-negative metric) S R
17
S:S: k i j R:R: k i j DATA B B R increases that channel’s badness metric by 2. B B retransmission Random backoff DATA Detecting Channel Conditions Badness metric (which is a non-negative metric)
18
S:S: k i j R:R: k i j DATA B B S increases that channel’s badness metric by 2. B B retransmission Random backoff DATA Detecting Channel Conditions ACK Badness metric (which is a non-negative metric)
19
Multichannel Rendezvous with Blacklisted Channels For each node When the badness metric of a channel is above a threshold C bad, the channel will be added to the node’s blacklist. If the next pseudorandomly chosen channel is on the node’s channel blacklist, the node stays on its current channel. The maximum number of channels allowed on a node’s blacklist is the total number of available channels minus 1. To enable potential senders to learn its blacklisted channels, a node R represents its blacklisted channels using a bitmap and embeds it in its wake-up beacons.
20
How to address the rendezvous problem in an asynchronous environment?
21
Adaptive Time Modeling t r =kt s +b (y=kx+b) t s : the current time of Sender t r : the current time of Receiver k: clock rate difference b: initial clock difference If k = 1, we have t r = t s +b. S and R have the same clock rate but have a time difference of b.
22
Adaptive Time Modeling t r =t s +b (assume k=1) S:S: 1 2 3 R:R: 1 2 3 DATA B B ACK DATA B B ACK b=tr–ts b=tr–ts
23
Exponential Chase Algorithm S:S: k i j R:R: k i j B DATA B B ACK wake-up advance time B
24
Evaluation on MICAz Motes The proposed EM-MAC is implemented on MICAz motes running TinyOS. Each wake-up interval for a node using EM-MAC was pseudorandomly chosen between 500 ms and 1500 ms. On average, a sender generates one new data packet every second. C bad is configured as 15. The sender wake-up advance time here is configured as 20 ms, The random number generator resetting interval is configured as 300 s.
25
Duty Cycles of Sender and Destination Multichannel: McMAC and Y-MAC Single Channel: PW-MAC, WiseMAC, RI-MAC, and X-MAC
26
Delivery Ratio and Delivery Latency Multichannel: McMAC and Y-MAC Single Channel: PW-MAC, WiseMAC, RI-MAC, and X-MAC
27
Performances of Rendezvous and with Large Clock Rate Difference
28
Performance with Wireless Interference and Jamming
29
Conclusion EM-MAC uses no control channel and enables a node to dynamically select the channels it switches among based on the channel conditions it senses. By effectively utilizing multiple orthogonal radio channels, EM-MAC is able to avoid using channels that are currently heavily loaded or are otherwise undesirable such as due to interference or jamming.
30
Thank You ~
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.