Presentation on theme: "Doc.: SubmissionBeelinker Technology Co.ltdSlide 1 Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Energy."— Presentation transcript:
doc.: SubmissionBeelinker Technology Co.ltdSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Energy Efficient MAC protocol for Low Energy Critical Infrastructure Networks] Date Submitted: [18 Sep, 2011] Source: [Hao Liu, Guolian Yao, Pingping Xu,] Company [Beelinker Technology Co., Ltd. Southeast University] Address [339 Linquan Road, Suzhou Industrial Park, Jiangsu , China] [ 2 Si Pai ou,Nanjing,210096,China] Voice:[ ， ], ] Re: [Respond for CFP] Abstract:[An Energy Efficient MAC Proposals for Low Energy Critical Infrastructure Networks applications] Purpose:[Presented to the IEEE k LECIM task group for consideration] Notice:This document has been prepared to assist the IEEE P It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release:The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P
doc.: SubmissionBeelinker Technology Co.ltdSlide 2 Introduction Combination of inputs –Ideas shared in May 2011 meeting –Idea discussion in July 2011 meeting –Test-bed based experiment results Reference documents: –P –P –Draft IEEE P e/D5.0, June 2011 July 2011
doc.: SubmissionBeelinker Technology Co.ltdSlide 4 LECIM Application requirements –Low power consumption, end point need to periodically go to sleep to conserve energy –Large number of nodes, >1000 endpoints, High channel access efficiency is required. –Unreliability of the channel conditions, Propagation path loss of at least 120 dB
doc.: SubmissionBeelinker Technology Co.ltdSlide 5 IEEE P e MAC-- Basic CSL Operation Challenges in K applications ： 1.Larger number of endpoints make high channel contention. Through 8 nodes test-bed based experiments, we observe that even 0.5 packet/s traffic with 50 bytes packet length (0.5kbps/s), large buffer accumulation takes place in nodes. 2.Imperfect channel condition led to packet lost during transmission, packets buffer schemes and retransmission is necessary. 3.It cost a long period for node to seize the channel again in duty-cycling operation, so the buffered packets need to be drained ASAP.
doc.: SubmissionBeelinker Technology Co.ltdSlide 6 Our Schemes- BT-MAC with MSP430 microcontroller has 10k bytes ram Current typical off-the-shelf nodes ( equipped with radio part ) Traditional program cost 1,500 bytes ram footprint, which used for variable allocation and operation system running. 8,500 bytes spare ram is available for buffer design Buffer design Consideration Maximal frame length of MPDU in IEEE standard is 128 bytes Total buffer capacity available in Telosb node: 8500/128=66, which is sufficient for buffer based MAC scheme design Telosb
doc.: SubmissionBeelinker Technology Co.ltdSlide 7 Our Schemes- BT-MAC listen ack Batch transmission ( Based on IEEE P e -- Basic CSL Operation ) (1)If a sender detect N packets in buffer, it launch batch transmission with high efficiency. (2)After receive the first ACK, sender transmit a bulk of packets, then wait a group ACK that acknowledge the series. (3)If packets lost caused by imperfect channel condition, sender retransmit the packets. ack Node A Node C wakeup Early ack to end preamble and invite the transmission. It also contains free buffer size information on the receiver dataN data1 data2data3 …… Group Ack to confirm the batch series. The packet which not received are reply to sender for retransmission Packet accumulated in buffer Batch packets number is embedded in the preamble data0
doc.: SubmissionBeelinker Technology Co.ltdSlide 8 MAC Protocol Description Reliability Transmission Consideration The first data packet has the information about how many packet need to send in current burst transmission. The first ACK includes the information about spare buffer space on the receiver, which can be used for batch transmission control. The second ACK is used for acknowledge which packets are received successfully, which is store in the bitmap field.
doc.: SubmissionBeelinker Technology Co.ltdSlide 9 Our Schemes- BT-MAC Packet buffer scheme Important packet parameters Nmax-- the maximum packets allowed in a batch transmission Ncur-- calculated packets number in a burst transmission Nbst-- current actual packets number in a burst transmission Qmax--maximum capacity of node Tmax—maximum time allowed by fairness requirement. 1.Nbst1 < Qmax- η2 2.Let 3.So 4.if Ncur >Nmax, Nbst=Nmax; else if Ncur≤ Nmax, Nbst=Ncur; K: Transmission speed, Lack: length of ACK packet, η2 : buffer length in the receiver Ldata: length of data packet, tsifs: interval of two consetive data packets sender receiver η2η2 η1η1 Qmax Nbst1
doc.: SubmissionBeelinker Technology Co.ltdSlide 10 Packet Structure modification Data0 packet Structure ACK0 packet Structure Extend the Frame of to support burst transmission and reliability transmission ACK1 packet Structure
doc.: SubmissionBeelinker Technology Co.ltdSlide 11 Experiment results Experiments senarios Senario: 8 nodes are deployed in a living room, each node is placed on top of a cup. Node 6 is the receiver.
doc.: SubmissionBeelinker Technology Co.ltdSlide 12 Thank you for your attention Any Questions ?