1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 9th Lecture 22.11.2006 Christian Schindelhauer.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Z-MAC: a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min Dept. of Computer Science, North Carolina State.
Routing Protocols for Sensor Networks Presented by Siva Desaraju Computer Science WMU An Application Specific Protocol Architecture for Wireless Microsensor.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 5: Medium access control protocols Holger Karl.
Architectures and Applications for Wireless Sensor Networks ( ) Medium Access Control Chaiporn Jaikaeo Department of Computer.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 5: Medium access control protocols Holger Karl.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 8th Lecture Christian Schindelhauer.
An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Network
An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin.
Medium Access Control in Wireless Sensor Networks.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 8th Lecture Faisal Aslam.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks 4th Week (Part I) Faisal Aslam.
Investigating Mac Power Consumption in Wireless Sensor Network
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up For Wireless Sensor Networks Zhihui Chen; Ashfaq Khokhar ECE/CS Dept., University of.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 12th Lecture Christian Schindelhauer.
UNIVERSITY OF CALIFORNIA SANTA CRUZ Energy-Efficient Channel Access Protocols Venkatesh Rajendran
On the Energy Efficient Design of Wireless Sensor Networks Tariq M. Jadoon, PhD Department of Computer Science Lahore University of Management Sciences.
1-1 Medium-Access Control. 1-2 Medium Access r Radio communication: shared medium. m Throughput, delay, and fairness. r MAC for sensor networks: m Must.
Medium Access Control With Coordinated Adaptive Sleeping for Wireless Sensor Networks Debate 1 - Defense Joseph Camp Anastasios Giannoulis.
Efficient MAC Protocols for Wireless Sensor Networks
MAC Layer Protocols for Sensor Networks Leonardo Leiria Fernandes.
1 MAC Layer Design for Wireless Sensor Networks Wei Ye USC Information Sciences Institute.
Network Kernel Architectures and Implementation ( ) ) Medium Access Control and WPAN Technologies Chaiporn Jaikaeo Department.
Venkatesh Rajendran, Katia Obraczka, J.J. Garcia-Luna-Aceves
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 5: Medium access control protocols Holger Karl.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks The First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003) November.
1 Adaptive QoS Framework for Wireless Sensor Networks Lucy He Honeywell Technology & Solutions Lab No. 430 Guo Li Bin Road, Pudong New Area, Shanghai,
An Energy Efficient MAC Protocol for Wireless Sensor Networks “S-MAC” Wei Ye, John Heidemann, Deborah Estrin Presentation: Deniz Çokuslu May 2008.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks (S-MAC) Wei Ye, John Heidemann, Deborah Estrin.
Wireless MAC Protocols for Ad-Hoc Networks Derek J Corbett Supervisor: Prof. David Everitt.
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks Medium Access Control (MAC) 21 February 2005.
† Department of Computer Science – University of Rome “Sapienza” – Italy Protocolli MAC per reti di sensori Sistemi Wireless, a.a. 2009/2010 Un. of Rome.
1 An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Network Gang Lu, Bhaskar Krishnamachari, and Cauligi Raghavendra.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
1 MAC Protocols that use Directional Antennnas. 2 Directional Antenna  Directional communication  Less Energy in the wrong direction Better Spatial.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 5: Medium access control protocols Holger Karl.
Chapter 6 Multiple Radio Access
Versatile Low Power Media Access for Wireless Sensor Networks Sarat Chandra Subramaniam.
A SURVEY OF MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
MAC Protocol for PAN. 2 Medium Access Control (MAC) Controlling when to send a packet and when to listen for a packet are perhaps the two most important.
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
1 An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin IEEE infocom /1/2005 Hong-Shi Wang.
SNU Mobile Networks Lab. S-MAC (Sensor-MAC) T-MAC (Timeout-MAC) Kae Won, Choi Kyoung hoon, Kim.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
A+MAC: A Streamlined Variable Duty-Cycle MAC Protocol for Wireless Sensor Networks 1 Sang Hoon Lee, 2 Byung Joon Park and 1 Lynn Choi 1 School of Electrical.
KAIS T Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Network Wei Ye, John Heidemann, Deborah Estrin 2003 IEEE/ACM TRANSACTIONS.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
Medium Access Control in Wireless networks
CS541 Advanced Networking 1 Contention-based MAC Protocol for Wireless Sensor Networks Neil Tang 4/20/2009.
Energy-Efficient, Application-Aware Medium Access for Sensor Networks Venkatesh Rajenfran, J. J. Garcia-Luna-Aceves, and Katia Obraczka Computer Engineering.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
S-MAC Taekyoung Kwon. MAC in sensor network Energy-efficient Scalable –Size, density, topology change Fairness Latency Throughput/utilization.
A Bit-Map-Assisted Energy- Efficient MAC Scheme for Wireless Sensor Networks Jing Li and Georgios Y. Lazarou Department of Electrical and Computer Engineering,
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Z-MAC : a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min ACM SenSys Systems Modeling.
MAC Protocols for Sensor Networks
Wireless Sensor Networks 4. Medium Access
Wireless Sensor Networks 5. Routing
SENSYS Presented by Cheolki Lee
Wireless Sensor Networks
Net 435: Wireless sensor network (WSN)
Medium Access Control and WPAN Technologies
Presentation transcript:

1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 9th Lecture Christian Schindelhauer

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Media Access Control (MAC)  Controlling when to send a packet and when to listen for a packet are perhaps the two most important operations in a wireless network –Especially, idly waiting wastes huge amounts of energy  This chapter discusses schemes for this medium access control that are –Suitable to mobile and wireless networks –Emphasize energy-efficient operation

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Overview  Principal options and difficulties  Contention-based protocols  Schedule-based protocols  IEEE

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Main options Wireless medium access Centralized Distributed Contention- based Schedule- based Fixed assignment Demand assignment Contention- based Schedule- based Fixed assignment Demand assignment

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No B-MAC (Berkeley MAC)  Combines several of the above discussed ideas –Takes care to provide practically relevant solutions  Clear Channel Assessment –Adapts to noise floor by sampling channel when it is assumed to be free –Samples are exponentially averaged, result used in gain control –For actual assessment when sending a packet, look at five channel samples – channel is free if even a single one of them is significantly below noise –Optional: random backoff if channel is found busy  Optional: Immediate link layer acknowledgements for received packets

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No B-MAC  Low Power Listening (= preamble sampling) –Uses the clear channel assessment techniques to decide whether there is a packet arriving when node wakes up –Timeout puts node back to sleep if no packet arrived  B-MAC does not have –Synchronization –RTS/CTS –Results in simpler, leaner implementation –Clean and simple interface  Currently: Often considered as the default WSN MAC protocol

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Multiple Access with Collision Avoidance (MACA)  Sender B asks receiver C whether C is able to receive a transmission Request to Send (RTS)  Receiver C agrees, sends out a Clear to Send (CTS)  Potential interferers overhear either RTS or CTS and know about impending transmission and for how long it will last –Store this information in a Network Allocation Vector  B sends, C acks  MACA protocol (used e.g. in IEEE )

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No CSMA  State diagram of CSMA sender

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Power Aware Multi-Access with Signaling – PAMAS  Idea: combine busy tone with RTS/CTS –Results in detailed overhearing avoidance, does not address idle listening –Uses separate data and control channels  Procedure –Node A transmits RTS on control channel, does not sense channel –Node B receives RTS, sends CTS on control channel if it can receive and does not know about ongoing transmissions –B sends busy tone as it starts to receive data Time Control channel Data channel RTS A ! B CTS B ! A Data A ! B Busy tone sent by B

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No PAMAS – Already ongoing transmission  Suppose a node C in vicinity of A is already receiving a packet when A initiates RTS  Procedure –A sends RTS to B –C is sending busy tone (as it receives data) –CTS and busy tone collide, A receives no CTS, does not send data A B C ? Time Control channel Data channel RTS A ! B CTS B ! A No data! Busy tone by C Similarly: Ongoing transmission near B destroys RTS by busy tone

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Overview  Principal options and difficulties  Contention-based protocols  Schedule-based protocols –LEACH –SMACS –TRAMA  IEEE

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Low-Energy Adaptive Clustering Hierarchy (LEACH)  Given: dense network of nodes, reporting to a central sink, each node can reach sink directly  Idea: Group nodes into “clusters”, controlled by clusterhead –Setup phase; details: later –About 5% of nodes become clusterhead (depends on scenario) –Role of clusterhead is rotated to share the burden –Clusterheads advertise themselves, ordinary nodes join CH with strongest signal –Clusterheads organize CDMA code for all member transmissions TDMA schedule to be used within a cluster  In steady state operation –CHs collect & aggregate data from all cluster members –Report aggregated data to sink using CDMA

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No LEACH rounds

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No SMACS Self-Organizing Medium Access Control for Sensor Networks  Given: many radio channels, super-frames of known length (not necessarily in phase, but still time synchronization required!)  Goal: set up directional links between neighboring nodes –Link: radio channel + time slot at both sender and receiver –Free of collisions at receiver –Channel picked randomly, slot is searched greedily until a collision-free slot is found  Receivers sleep and only wake up in their assigned time slots, once per superframe  In effect: a local construction of a schedule

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No TRAMA Traffic Adaptive Medium Access Protocol  Nodes are synchronized  Time divided into cycles, divided into –Random access periods –Scheduled access periods  Nodes exchange neighborhood information –Learning about their two-hop neighborhood –Using neighborhood exchange protocol: In random access period, send small, incremental neighborhood update information in randomly selected time slots  Nodes exchange schedules –Using schedule exchange protocol –Similar to neighborhood exchange  Adaptive Election Protocol –Elect transmitter, receiver and stand-by nodes for each transmission slot –Remove nodes without traffic from election

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No TRAMA – adaptive election  Given: Each node knows its two-hop neighborhood and their current schedules  How to decide which slot (in scheduled access period) a node can use? –Use node identifier x and globally known hash function h –For time slot t, compute priority p = h (x © t) –Compute this priority for next k time slots for node itself and all two-hop neighbors –Node uses those time slots for which it has the highest priority t = 0t = 1t = 2t=3t = 4t = 5 A B C Priorities of node A and its two neighbors B & C

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No TRAMA – possible conflicts  When does a node have to receive? –Easy case: one-hop neighbor has won a time slot and announced a packet for it –But complications exist – compare example  What does B believe? –A thinks it can send –B knows that D has higher priority in its 2- hop neighborhood!  Rules for resolving such conflicts are part of TRAMA

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Comparison: TRAMA, S- MAC  Comparison between TRAMA & S-MAC –Energy savings in TRAMA depend on load situation –Energy savings in S-MAC depend on duty cycle –TRAMA (as typical for a TDMA scheme) has higher delay but higher maximum throughput than contention-based S-MAC  TRAMA disadvantage: substantial memory/CPU requirements for schedule computation S-MAC:

19 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Thank you (and thanks go also to Holger Karl for providing slides) Wireless Sensor Networks Christian Schindelhauer 9th Lecture