Sift: A MAC Protocol for Event- Driven Wireless Sensor Networks Kyle Jamieson †, Hari Balakrishnan †, Y.C. Tay ‡ † MIT Computer Science and Artificial.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3f: Medium Access Control Protocols.
Medium Access Issues David Holmer
Multiple access What if multiple machines are sharing the same link?
An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Network
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
1 A Novel Topology-blind Fair Medium Access Control for Wireless LAN and Ad Hoc Networks Z. Y. Fang and B. Bensaou Computer Science Department Hong Kong.
On Optimizing Backoff Counter Reservation and Classifying Stations for the IEEE Distributed Wireless LANs.
KAIST Sift: A MAC Protocol for Event-Driven Wireless Sensor Networks Suho Yang (CS710: November 4, 2008) Kyle Jamieson, Hari Balakrishnan, Y.C. Tay LNCS.
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
Evaluate IEEE e EDCA Performance Tyler Ngo CMPE 257.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
A Transmission Control Scheme for Media Access in Sensor Networks Presented by Jianhua Shao.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Efficient MAC Protocols for Wireless Sensor Networks
MAC Layer Protocols for Sensor Networks Leonardo Leiria Fernandes.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
CSE 461 University of Washington1 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? – Explore with a simple model Assume no-one is.
protocol continued. DCF The basic idea is non-persistent. Can do an optimization: For a new packet (Q len = 0), the sender needs only wait for.
Delay Analysis of IEEE in Single-Hop Networks Marcel M. Carvalho, J.J.Garcia-Luna-Aceves.
Ethernet. Ethernet Goals Simplicity Low Cost Compatibility Address flexibility Fairness –All nodes have equal access to the network High speed Stability.
1 SenMetrics’05, San Diego, 07/21/2005 SOSBRA: A MAC-Layer Retransmission Algorithm Designed for the Physical-Layer Characteristics of Clustered Sensor.
A Virtual Collision Mechanism for IEEE DCF
2014 YU-ANTL Lab Seminar Performance Analysis of the IEEE Distributed Coordination Function Giuseppe Bianchi April 12, 2014 Yashashree.
Tuning the Carrier Sensing Range of IEEE MAC Jing Deng,Ben Liang and Pramod K. Varshney Univ. of New Orleans Globecom 2004.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Understanding the Real-World Performance of Carrier Sense MIT Computer Science and Artificial Intelligence Laboratory Networks and Mobile Systems
CSE 461 University of Washington1 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? – Explore with a simple model Assume no-one is.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
On Optimizing the Backoff Interval for Random Access Scheme Zygmunt J. Hass and Jing Deng IEEE Transactions on Communications, Dec 2003.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
Mitigating Congestion in Wireless Sensor Networks Bret Hull, Kyle Jamieson, Hari Balakrishnan Networks and Mobile Systems Group MIT Computer Science and.
Multiple Access.
Performance Analysis of IEEE Distributed Coordination Function (DCF) Author : Giuseppe Bianchi Presented by: 李政修 December 23, 2003.
Access Delay Distribution Estimation in Networks Avideh Zakhor Joint work with: E. Haghani and M. Krishnan.
PPR: Partial Packet Recovery for Wireless Networks Kyle Jamieson and Hari Balakrishnan MIT Computer Science and Artificial Intelligence Laboratory.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Token-DCF, COMSNET(2013) -> MOBICOM(2014). Introduction ▣ To improve standard MAC protocol of IEEE for WLAN. ▣ S-MAC, A-MAC, SPEED-MAC, and etc.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
2012 1/6 NSDI’08 Harnessing Exposed Terminals in Wireless Networks Mythili Vutukuru, Kyle Jamieson, and Hari Balakrishnan MIT Computer Science and Artificial.
Mitigating Congestion in Wireless Sensor Networks Bret Hull, Kyle Jamieson, Hari Balakrishnan MIT Computer Science and Artificial Intelligence Laborartory.
Medium Access in Sensor Networks. Presented by: Vikram Shankar.
COE-541 LAN / MAN Simulation & Performance Evaluation of CSMA/CA
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
The Medium Access Control Sublayer
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Z-MAC : a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min ACM SenSys Systems Modeling.
MAC Protocols for Sensor Networks
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
MAC Protocols for Sensor Networks
Wireless Sensor Networks 4. Medium Access
Medium Access Control MAC protocols: design goals, challenges,
MACAW: A Media Access Protocol for Wireless LAN’s
Idle sense.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Performance Evaluation of an Integrated-service IEEE Network
Enhanced Backoff Scheme in CSMA/CA for IEEE
Presentation transcript:

Sift: A MAC Protocol for Event- Driven Wireless Sensor Networks Kyle Jamieson †, Hari Balakrishnan †, Y.C. Tay ‡ † MIT Computer Science and Artificial Intelligence Laboratory ‡ Dept. of Computer Science, National University of Singapore

Types of Traffic in Sensor Networks Periodic traffic –Animal habitat monitoring –Indoor environment Temperature Room occupancy –Medical monitoring Patient vital signs Event-driven traffic –Failure of mechanical structures Water pipes Airplane wings –Medical emergencies –Vehicle tracking

Airplane Wing Example For critical systems, low latency is important!

Sift Focus of our work –Designing MAC protocol to handle event- driven workload Challenges –Low-latency –Good throughput –Good fairness

Problems for Traditional MAC 1.Spatially-correlated contention: correlation between geographical neighbors’ traffic. 2.Bursty traffic: the number of senders can quickly change. 3.Suppression (counter-intuitively) Suppression: often, not all sensing nodes need to report an event.

The Status Quo: CSMA Time Busy Medium MAC Goal: only one node transmit at a time Basis of existing sensornet MAC layers –B-MAC, S-MAC Timeslot: opportunity for a node to begin transmitting Process repeats after each packet

The Status Quo: CSMA Pick a timeslot chosen uniformly in [0, CW] Listen up to chosen slot –Transmit if nobody else started transmitting –Wait if somebody else started transmitting Time

Example: A Successful Transmission A and B happened to choose different slots –Node A chooses slot 4, hears nothing, transmits –Node B chooses slot 8, hears Node A, waits Success: exactly one node in first non-vacant slot Node A: Node B: Slot choice (slot #4) Slot choice (slot #8) Time

Example: A Collision A and B happened to choose slot 4 –Both listen and hear nothing –Both transmit simultaneously Collision: ≥ 2 nodes in first non-vacant slot Node A: Node B: Slot choice (slot #4) Time

High Contention Causes Collisions in CSMA Uniform distribution “fills up,” quickly Numerical simulation Unacceptable collision rate above ~15 transmitting sensors

Solving the Problem of Collisions in CSMA 1.Create more slots –Conventional approach –Called “binary exponential backoff” (BEB) 2.Change the way we pick slots –Sift takes this approach

Create More Slots: Binary Exponential Backoff (BEB) The basis for Ethernet, B-MAC, S-MAC, , MACAW, many other MAC layers Acknowledgement? Reduce CW Double CW and resend YesNo

Problems with BEB Takes time for every node to increase CW –Especially if traffic is spatially-correlated and bursty Waste backoff slots if collisions cause CW to increase –Especially with suppression BEB causes performance to suffer

Our Proposal: Sift Sift is a MAC protocol for sensor networks –Event-driven traffic –Low-latency requirements Sift’s Properties –Extremely simple –Offers up to 7-fold lower latency –Maintains good channel utilization (throughput)

Sift: Changing the Distribution Keep number of slots the same (simple) Use an increasing non-uniform slot selection probability distribution –Make collisions unlikely for large range of N 1.Reduce the chance of collisions Penalty: one packet- or RTS-time (ms) 2.Reduce wastage of backoff slots Penalty: one slot time (μs)

Balls and Bins Analogy Bin represents a backoff slot in the contention window –Bin height represents probability of picking that slot Ball represents a single node’s slot choice A Bins represent backoff slots →

Why an Increasing Slot-Selection Function? Bins represent backoff slots → Nodes choosing each slot →

Sift’s Slot Selection Distribution

Optimal Non-Persistent CSMA Performance With knowledge of number of nodes (IEEE J-SAC ’04) Numerical simulation

Sift Approaches Optimal Sift needs no knowledge of the number of nodes Numerical simulation Sift keeps success rate above this unacceptable range

Experimental Setup Simulation-based results (ns-2) Compare (BEB), Sift, and /copy –802.11/copy: send CW in each packet, copy overheard CW

Event-driven Traffic Pattern Event-based traffic pattern –Single-hop to one base station –N nodes sense and report an event –R ≤ N reports are required If a node hears ≥ R reports then it suppresses its own event report E.g. N=4, R=3 Base Station

Sift Outperforms When N is Large Experimental evaluation: R=1,16 R=16 R=1

Sift Outperforms as R Increases Experimental evaluation: N=128

Exploring Sift’s Performance Space Experimental evaluation

Hidden Terminal Experiment Setup Separate 128 sensors into mutually-hidden clusters –Nodes in one cluster cannot hear nodes in another All nodes send to the base station –Result: hidden terminal collisions at the base station Base Station

Sift Performs Well with Hidden Terminals Experimental evaluation: N=128, R=1

Sift Resilient to Jitter in Event Time Experimental evaluation: N=128, R=64

Sift Improves Fairness Eight nodes 64 nodes Experimental evaluation

Trace-Driven Experimental Setup Simulated vehicle tracking Captured live video from a street scene –Extract motion events from image analysis Event trace drives ns-2 simulation –128 sensors laid out in a grid over the scene –Sensors nearby each event send traffic in response to movement

Sift Outperforms When R is Large Trace-driven experimental evaluation

Related Work TDMA suffers in terms of latency –PTD (Mowafi et al.), TSMA (Chlamtac et al.) BEB-based protocols waste time in backoff –MACAW (Bharghavan et al.), S-MAC (Ye et al.), FAMA (Garcia-Luna-Aceves et al.) The HIPERLAN standard for wireless LANs uses noise bursts of exponentially-distributed length Periodic-sleeping and other MAC protocols can work with Sift –S-MAC (Ye et al.), B-MAC (Polastre) Sift is a composable MAC primitive

Conclusion Sift is a latency- (and sometimes throughput-) enhancing MAC for event- driven sensor networks Sift can be used as a building block in many MAC protocols

Detailed Experimental Parameters Average of five runs with different random number seeds for each run ARQ with 5 retransmit limit Control packets sent at 1 MBps; data at 2 MBps 20 μs slot time; 192 bit preamble; 30 byte packet CWmin=31, CWmax=1023

Sift Provides Good Throughput Two nodes 32 nodes

Optimal Non-Persistent CSMA Let s be a slot number, assume N ≥ 2 sensors transmitting. Define: “Collision Minimizing CSMA and its Applications to Wireless Sensor Networks.” IEEE J. Selected Areas in Comm. 22:6 (2004) pp