CSE 4215/5431: Mobile Communications Winter 2010

Slides:



Advertisements
Similar presentations
An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Network
Advertisements

S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin.
Medium Access Control in Wireless Sensor Networks.
CMPE280n An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin presented by Venkatesh Rajendran.
Investigating Mac Power Consumption in Wireless Sensor Network
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin -- Adapted the authors’ Infocom 2002 talk.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
1 Sensor MAC Design Requirements:  Energy efficiency  Simple operations  Working with a large number of sensors  Fair share of the channel among competing.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
1 Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye Fabio Silva John Heidemann Presented by: Ronak Bhuta Date: 4 th December 2007.
An Energy-efficient MAC protocol for Wireless Sensor Networks
Medium Access Control in Wireless Sensor Networks USC/ISI Technical Report ISI-TR-580, October 2003 Wei Ye and John Heidemann.
On the Energy Efficient Design of Wireless Sensor Networks Tariq M. Jadoon, PhD Department of Computer Science Lahore University of Management Sciences.
Medium Access Control With Coordinated Adaptive Sleeping for Wireless Sensor Networks Debate 1 - Defense Joseph Camp Anastasios Giannoulis.
Efficient MAC Protocols for Wireless Sensor Networks
MAC Layer Protocols for Sensor Networks Leonardo Leiria Fernandes.
1 MAC Layer Design for Wireless Sensor Networks Wei Ye USC Information Sciences Institute.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
MAC Protocols and Security in Ad hoc and Sensor Networks
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
An Energy Efficient MAC Protocol for Wireless Sensor Networks “S-MAC” Wei Ye, John Heidemann, Deborah Estrin Presentation: Deniz Çokuslu May 2008.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks (S-MAC) Wei Ye, John Heidemann, Deborah Estrin.
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks Medium Access Control (MAC) 21 February 2005.
Why Visual Sensor Network & SMAC Implementation Group Presentation Raghul Gunasekaran.
1 An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Network Gang Lu, Bhaskar Krishnamachari, and Cauligi Raghavendra.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
Medium Access Control With Coordinated Adaptive Sleeping for Wireless Sensor Networks Instructor : Dr Yingshu Li Presented By : D M Rasanjalee Himali Paper.
Fakultät Informatik – Institut für Systemarchitektur – Professur Rechnernetze Sensor Medium Access Control (S-MAC) Robin Dunn Supervisor: Dr. Waltenegus.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
A SURVEY OF MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
An Adaptive Energy-Efficient and Low- Latency MAC for Data Gathering in Wireless Sensor Networks Gang Lu, Bhaskar Krishnamachari, and Cauligi S. Raghavendra.
1 An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin IEEE infocom /1/2005 Hong-Shi Wang.
SNU Mobile Networks Lab. S-MAC (Sensor-MAC) T-MAC (Timeout-MAC) Kae Won, Choi Kyoung hoon, Kim.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
A+MAC: A Streamlined Variable Duty-Cycle MAC Protocol for Wireless Sensor Networks 1 Sang Hoon Lee, 2 Byung Joon Park and 1 Lynn Choi 1 School of Electrical.
SEA-MAC: A Simple Energy Aware MAC Protocol for Wireless Sensor Networks for Environmental Monitoring Applications By: Miguel A. Erazo and Yi Qian International.
KAIS T Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Network Wei Ye, John Heidemann, Deborah Estrin 2003 IEEE/ACM TRANSACTIONS.
Enhancement of the S-MAC Protocol for Wireless Sensor Networks Faisal Hamady Mohamad Sabra Zahra Sabra Ayman Kayssi Ali Chehab Mohammad Mansour IEEE ©
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
0.1 IT 601: Mobile Computing Wireless Sensor Network Prof. Anirudha Sahoo IIT Bombay.
CS541 Advanced Networking 1 Contention-based MAC Protocol for Wireless Sensor Networks Neil Tang 4/20/2009.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Ultra-Low Duty Cycle MAC with Scheduled Channel Polling (Wei Ye, Fabio Sliva, and John Heidemann) Advanced Computer Networks ECE Fall Presented.
S-MAC Taekyoung Kwon. MAC in sensor network Energy-efficient Scalable –Size, density, topology change Fairness Latency Throughput/utilization.
A Bit-Map-Assisted Energy- Efficient MAC Scheme for Wireless Sensor Networks Jing Li and Georgios Y. Lazarou Department of Electrical and Computer Engineering,
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
MAC Protocols for Sensor Networks
Duty Cycled MAC protocols for Wireless Sensor networks
MAC Protocols for Sensor Networks
Sensor Networks Katia Obraczka Winter 2005 MAC II
An Energy-efficient MAC protocol for Wireless Sensor Networks
SENSYS Presented by Cheolki Lee
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya Modified and Presented.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Ultra-Low Duty Cycle MAC with Scheduled Channel Polling
Medium Access Control in Wireless Sensor Networks
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Wireless LAN Simulation IEEE MAC Protocol
Outline 1. INTRODUCTION 2. PRELIMINARIES 3.THE PROPOSED PROTOCOL
CSE 4215/5431: Mobile Communications Winter 2011
Investigating Mac Power Consumption in Wireless Sensor Network
Chapter 6 Multiple Radio Access.
Medium Access Control Protocols Lecture 7 (Lecture material contributed by K. Langendoen(TUDelft) and W. Ye(USC/ISI)) September 23, 2004 EENG 460a /
Presentation transcript:

CSE 4215/5431: Mobile Communications Winter 2010 Suprakash Datta datta@cs.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cs.yorku.ca/course/4215 Some slides are adapted from the book website 1/15/2019 CSE 4215, Winter 2010

Some proposed protocols All demand assignment protocols All two phase protocols Reservation phase (minislots) Data transmission phase (slots) Differ in how reservation phase works 1/15/2019 CSE 4215, Winter 2010

Protocol 1 (RMAV) 1 reservation minislot every round D. Jeong, C. Hoi, and W. Jeon, “Design and performance evaluation of a new medium access control protocol for local wireless data communications,” IEEE/ACM Transactions on Networking, vol. 3, no. 6, pp. 742–752, 1995. 1 reservation minislot every round Adaptive change of backoff probability If collision, p doubled If idle p halved Else p unchanged Advantages and Disadvantages? 1/15/2019 CSE 4215, Winter 2010

Protocol 2 Adapt number of minislots each reservation round M. Abolelaze and R. Radhakrishnan, “The performance of a new wireless MAC protocol,” in 3G Wireless 2002. Adapt number of minislots each reservation round if the number of minislots with collisions is larger than the number of empty minislots, then the number of minislots are doubled in the next round. Else halve the number of minislots Advantages and Disadvantages? 1/15/2019 CSE 4215, Winter 2010

Performance - 1 At low arrival rates 1/15/2019 CSE 4215, Winter 2010

Performance - 2 At all traffic rates 1/15/2019 CSE 4215, Winter 2010

Questions? Are these algorithms similar? Are they making the right decisions? Can we do better? How? What about fairness? RMAC: a randomized adaptive medium access control algorithm for sensor networks, Suprakash Datta, SANPA, 2004. 1/15/2019 CSE 4215, Winter 2010

Rationale behind protocols A simple model for the problem Use balls and bins analysis from elementary discrete math (Combinatorial analysis) Can we analyze the problem and the algorithms? First, we need (to specify) a clean mathematical model 1/15/2019 CSE 4215, Winter 2010

Our model Network model: clustered, heterogeneous Node model: clock synchronization Traffic model: Random traffic Bursty traffic 2 state On-OFF model Performance metric: delay 1/15/2019 CSE 4215, Winter 2010

Analysis No node knows the number of sources contending for resources Can we estimate this number? How? We know Number of minislots Number of collisions Number of idle minislots Number of successful transmissions 1/15/2019 CSE 4215, Winter 2010

Maximum likelihood estimation Given number of sources, we can find expected values of number of collisions, idle, successful minislots Can we solve the inverse problem? Our result: MLE(#sources) = ns + 2nc What does this mean? 1/15/2019 CSE 4215, Winter 2010

Maximum likelihood estimation Intuitively: if MLE(#sources) > # minislots Increase #minislots else decrease #minislots RMAV: nc (=1) > ne (=0) Aboelaze et al: nc > ne MLE = ns + 2nc > N = nc + ne + ns Yields nc > ne !!! 1/15/2019 CSE 4215, Winter 2010

Questions? Are these algorithms similar? Are they making the right decisions? Can we do better? How? What about fairness? Need to decide on number of minislots Need to implement fairness 1/15/2019 CSE 4215, Winter 2010

Number of minislots Q1: if we predict n sources how many minislots should we have? Q2: How do we predict the number of sources? Using Queueing theory, we can solve Q1. Having #minislots = #predicted packets minimizes expected delay. Also max throughput = 1/N(e+S+1) 1/15/2019 CSE 4215, Winter 2010

Predicting number of sources Very difficult to do in practice Varies a lot with application We used a very simple linear model p(t + 1) = n(t) + a(n(t) − n(t − 1)). p(t) = number of minislots at time t a = smoothing factor n(t) = predicted #sources at time t 1/15/2019 CSE 4215, Winter 2010

Dealing with fairness Use piggybacked requests The algorithm rejects piggybacked requests with probability f f=1: original demand assignment, most fair, bad QoS to long sessions f=0: bad fairness, great QoS to long sessions. Designer can choose the desired f 1/15/2019 CSE 4215, Winter 2010

What next? Centralized algorithm Can this be made distributed? Do not need to worry about hidden terminals Can this be made distributed? 1/15/2019 CSE 4215, Winter 2010

SMAC Designed for sensor networks Major components in S-MAC slides adapted from www.cs.wmich.edu/wsn/cs691_sp03/ Major components in S-MAC Periodic listen and sleep Collision avoidance Overhearing avoidance Message passing 1/15/2019 CSE 4215, Winter 2010

Periodic Listen and Sleep Reduce long idle time Reduce duty cycle to ~ 10% (120ms on/1.2s off) Node 1 sleep listen Node 2 sleep listen Schedules can differ Prefer neighbors have same schedule — easy broadcast & low control overhead Latency Energy 1/15/2019 CSE 4215, Winter 2010

Periodic Listen & Sleep Nodes are in idle for a long time if no sensing event happens Put nodes into periodic sleep mode i.e. in each second, sleep for half second and listen for other half second 1/15/2019 CSE 4215, Winter 2010

Coordinated Sleeping Nodes coordinate on sleep schedules Schedule 1 Nodes periodically broadcast schedules New node tries to follow an existing schedule Schedule 1 Schedule 2 1 2 Nodes on border of two schedules follow both Periodic neighbor discovery Keep awake in a full sync interval over long time 1/15/2019 CSE 4215, Winter 2010

Choose & Maintain Schedule Each node maintains a schedule table that stores schedules of all its neighbors Nodes exchange schedules by broadcasting them to its neighbors Try to synchronize neighboring nodes together 1/15/2019 CSE 4215, Winter 2010

Collision Avoidance Adopt IEEE 802.11 collision avoidance Virtual carrier sense During field Network allocation vector (NAV) Physical carrier sense RTS/CTS exchange (for hidden terminal problem) Broadcast packets (SYNC) are sent without RTS/CTS Unicast packets (DATA) sent with RTS/CTS 1/15/2019 CSE 4215, Winter 2010

Overhearing Avoidance Problem: Receive packets destined to others Solution: Sleep when neighbors talk Basic idea from PAMAS (Singh, Raghavendra 1998) But we only use in-channel signaling Who should sleep? All immediate neighbors of sender and receiver How long to sleep? The duration field in each packet informs other nodes the sleep interval 1/15/2019 CSE 4215, Winter 2010

Example Who should sleep when node A is transmitting to B? All immediate neighbors of both sender & receiver should go to sleep 1/15/2019 CSE 4215, Winter 2010

Message Passing How to efficiently transmit a long message? Single packet vs. fragmentations Single packet: high cost of retransmission if only a few bits have been corrupted Fragmentations: large control overhead (RTS & CTS for each fragment), longer delay Problem: Sensor network in-network processing requires entire message 1/15/2019 CSE 4215, Winter 2010

Message Passing Energy Fairness Msg-level latency Solution: Don’t interleave different messages Long message is fragmented & sent in burst RTS/CTS reserve medium for entire message Fragment-level error recovery — ACK — extend Tx time and re-transmit immediately Other nodes sleep for whole message time Fairness Energy Msg-level latency 1/15/2019 CSE 4215, Winter 2010

Experiment Result Average source nodes energy consumption S-MAC consumes much less energy than 802.11-like protocol w/o sleeping At heavy load, overhearing avoidance is the major factor in energy savings At light load, periodic sleeping plays the key role 2 4 6 8 10 200 400 600 800 1000 1200 1400 1600 1800 Average energy consumption in the source nodes Message inter-arrival period (second) Energy consumption (mJ) 802.11-like protocol without sleep Overhearing avoidance S-MAC w/o adaptive listen 1/15/2019 CSE 4215, Winter 2010

Experiment Result (contd.) Percentage of time source nodes in sleep 1/15/2019 CSE 4215, Winter 2010

Experiment Result (contd.) Energy consumption in the intermediate node 1/15/2019 CSE 4215, Winter 2010

Effect of duty cycle Important tradeoff: 1/15/2019 CSE 4215, Winter 2010

S-MAC Conclusions Advantages: Disadvantages: Periodically sleep reduces energy consumption in idle listening Sleep during transmissions of other nodes Message passing reduces contention latency and control packet overhead Disadvantages: Reduction in both per-node fairness and increase in latency 1/15/2019 CSE 4215, Winter 2010