Medium Access Control in Wireless Sensor Networks USC/ISI Technical Report ISI-TR-580, October 2003 Wei Ye and John Heidemann.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks Medium Access Control (MAC) 17 February 2005.
An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Network
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin.
Medium Access Control in Wireless Sensor Networks.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks 4th Week (Part I) Faisal Aslam.
CMPE280n An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin presented by Venkatesh Rajendran.
Investigating Mac Power Consumption in Wireless Sensor Network
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
1 Power Management in IEEE Yu-Chee 1. Possible Access Sequences for a STA in PS Mode 2. PS in Infrastructure Network 3. PS in Ad.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin -- Adapted the authors’ Infocom 2002 talk.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
1 Power Management in IEEE Yu-Chee 1. Possible Access Sequences for a STA in PS Mode 2. PS in Infrastructure Network 3. PS in Ad.
1 Sensor MAC Design Requirements:  Energy efficiency  Simple operations  Working with a large number of sensors  Fair share of the channel among competing.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
1 Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye Fabio Silva John Heidemann Presented by: Ronak Bhuta Date: 4 th December 2007.
An Energy-efficient MAC protocol for Wireless Sensor Networks
1 Medium Access Control in Sensor Networks Huaming Li Electrical and Computer Engineering Michigan Technological University.
1-1 Medium-Access Control. 1-2 Medium Access r Radio communication: shared medium. m Throughput, delay, and fairness. r MAC for sensor networks: m Must.
Medium Access Control With Coordinated Adaptive Sleeping for Wireless Sensor Networks Debate 1 - Defense Joseph Camp Anastasios Giannoulis.
Efficient MAC Protocols for Wireless Sensor Networks
1 MAC Layer Design for Wireless Sensor Networks Wei Ye USC Information Sciences Institute.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
1 Radio and Medium Access Control 2 Radio Properties.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
ECE 256, Spring 2008 Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So & Nitin Vaidya.
An Energy Efficient MAC Protocol for Wireless Sensor Networks “S-MAC” Wei Ye, John Heidemann, Deborah Estrin Presentation: Deniz Çokuslu May 2008.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks (S-MAC) Wei Ye, John Heidemann, Deborah Estrin.
Wireless MAC Protocols for Ad-Hoc Networks Derek J Corbett Supervisor: Prof. David Everitt.
CS E: Wireless Networks (Spring 2006) MAC Layer Discussion Leads: Abhijit Deshmukh Sai Vinayak Instructor: Srinivasan Seshan.
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks Medium Access Control (MAC) 21 February 2005.
Why Visual Sensor Network & SMAC Implementation Group Presentation Raghul Gunasekaran.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
1 Radio and Medium Access Control 2 Learning Objectives Understand important concepts about radio signals Understand radio properties of WSNs Understand.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
Medium Access Control With Coordinated Adaptive Sleeping for Wireless Sensor Networks Instructor : Dr Yingshu Li Presented By : D M Rasanjalee Himali Paper.
Fakultät Informatik – Institut für Systemarchitektur – Professur Rechnernetze Sensor Medium Access Control (S-MAC) Robin Dunn Supervisor: Dr. Waltenegus.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi- Channel Hidden Terminals Using a Single Transceiver (MMAC) Paper by Jungmin So and Nitin Vaidya.
Chapter 6 Multiple Radio Access
A SURVEY OF MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
2/17/20051 Guest lecture for CS113, UCLA Medium Access Control in Wireless Sensor Networks Wei Ye USC Information Sciences Institute.
1 An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin IEEE infocom /1/2005 Hong-Shi Wang.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
SEA-MAC: A Simple Energy Aware MAC Protocol for Wireless Sensor Networks for Environmental Monitoring Applications By: Miguel A. Erazo and Yi Qian International.
KAIS T Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Network Wei Ye, John Heidemann, Deborah Estrin 2003 IEEE/ACM TRANSACTIONS.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
MACs for sensor nets. review Aloha Slotted aloha CSMA Listen before sending Non/1/P-persistent P_r = (1-a)*a^CW / (1-a^CW) * a^-r Sum from 1 to CW is.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
0.1 IT 601: Mobile Computing Wireless Sensor Network Prof. Anirudha Sahoo IIT Bombay.
CS541 Advanced Networking 1 Contention-based MAC Protocol for Wireless Sensor Networks Neil Tang 4/20/2009.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
S-MAC Taekyoung Kwon. MAC in sensor network Energy-efficient Scalable –Size, density, topology change Fairness Latency Throughput/utilization.
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
Wireless Sensor Networks 4. Medium Access
An Energy-efficient MAC protocol for Wireless Sensor Networks
SENSYS Presented by Cheolki Lee
CSE 4215/5431: Mobile Communications Winter 2010
CSE 4215/5431: Mobile Communications Winter 2011
Investigating Mac Power Consumption in Wireless Sensor Network
Presentation transcript:

Medium Access Control in Wireless Sensor Networks USC/ISI Technical Report ISI-TR-580, October 2003 Wei Ye and John Heidemann

Outline  Introduction  Scheduled Protocols  Contention-based Protocols  S-MAC  Performance  Summary

Introduction  The role of medium access control (MAC) Controls when and how each node can transmit in the wireless channel  Why do we need MAC? Wireless channel is a shared medium Radios transmitting in the same frequency band interfere with each other – collisions

MAC Attributes and Trade-offs  Collision avoidance basic task of all MAC protocols  Energy efficiency important for sensor network  Scalability and adaptivity a good MAC protocol should accommodate the changes in size, density, and topology

MAC Attributes and Trade-offs  Channel utilization how well the entire bandwidth of the channel is utilized in communications  Latency Refers to the delay from when a sender has a packet to send until the packet is successfully received by the receiver  Throughput often measured in bits or bytes per second  Fairness

Energy Efficiency in MAC Protocols  Collision major problem in contention protocols, but is generally not a problem in scheduled protocols  Overhearing when a node receives packets that are destined to other nodes  Control packet overhead

Energy Efficiency in MAC Protocols  Idle listening Is a dominant factor of radio energy consumption often 50~100% of energy required for receiving Idle:Receiving:Transmission  Stemm and Katz : 1:1.05:1.4  Wavelan card : 1:2:2.5  Mica2 mote : 1:1:1.41

Classification of MAC Protocols  According to the underlying mechanism for collision avoidance, MAC protocols can be broadly divided into two groups Scheduled-based Protocols  Scheduled nodes onto different sub-channel  Ex: TDMA FDMA CDMA Contention-based Protocols  Nodes compete in probabilistic coordination  Ex: ALOHA CSMA

Scheduled Protocols: TDMA  TDMA divides the channel into N time slots  N slots comprises a frame, which repeats cyclically  Typically, mobile nodes communicate only with the base station (low-duty-cycle)

Scheduled Protocols: TDMA  Disadvantages Requires nodes to form clusters Inter-cluster communications and interference need to be handled by other approaches, such as FDMA or CDMA limited scalability and adaptivity

Example : LEACH  TDMA  organizes nodes into cluster hierarchies  Cluster head is rotated among nodes within a cluster depending on their remaining energy levels  Nodes in cluster only talks to head  Cluster heads talk to base station over a long-range levels

Example : Bluetooth  Designed for personal area networks (PAN) with target nodes as battery- powered PDAs, cell phones, and laptops  Organizes nodes into clusters, called piconets  Inter-cluster communication uses Frequency-hopping CDMA

Example : Bluetooth  Master use polling to decide which slave to transmit a special TDMA without pre-assigned slots  Each piconet has a master and up to 7 active slaves lack of scalability  Multiple connected piconets form a scatternet difficult to handle inter-cluster communications

Contention-based Protocols  A common channel is shared by all nodes and it is allocated on-demand  Advantages 1. scale more easily across changes in node density or traffic load 2. more flexible as topologies change (no need to form cluster) 3. do not require fine-grained time synchronizations as in TDMA protocols

Contention-based Protocols  Disadvantages inefficient usage of energy node listen at all times and collisions and contention for the media can waste energy  Overcoming this disadvantage is required if contention-based protocols are to be applied to long-lived sensor networks

Example : CSMA (Carrier Sense Multiple Access)  Listening (carrier sense) before transmitting  Send immediately if channel is idle  Backoff if channel is busy  non-persistent, 1-persistent and p- persistent In p-persistent CSMA, a node transmits with probability p if the medium is idle, and with probability (1-p) to back off and restart carrier sense

Hidden Terminal Problem

Example : CSMA / CA (collision avoidance)  Establish a brief handshake between sender and receiver before transmits bac RTS CTS Request to send Clear to send Still have problem, but greatly reduced (short)

Contention Protocols: MACA and MACAW  MACA Based on CSMA/CA Add duration field in RTS/CTS informing other node about their back-off time  MACAW Improved over MACA RTS/CTS/DATA/ACK Fast error recovery at link layer

Power save (PS) mode in IEEE DCF  Assumption: all nodes are synchronized and can hear each other (single hop)  Nodes in PS mode periodically listen for beacons & ATIMs (ad hoc traffic indication messages)

Power save (PS) mode in IEEE DCF  Beacon: timing and physical layer parameters All nodes participate in periodic beacon generation One node periodically broadcasts a beacon  ATIM: tell nodes in PS mode to stay awake for Rx ATIM follows a beacon sent/received Unicast ATIM needs acknowledgement Broadcast ATIM wakes up all nodes — no ACK

Power save (PS) mode in IEEE DCF

 Problems for multi-hop Clock synchronization Neighbor discovery  Tseng et al. proposed a resolution do not synchronize Listen intervals of two nodes periodically overlap Disadvantages  1.control overhead  2.longer delay

Contention Protocols: Piconet  Develop by Bennett et al. not the same piconet in Bluetooth use 1-persistent CSMA protocol each node sleeps autonomously beacon their ID when wake up Sending node needs to listen for receiver ’ s beacon first

Contention Protocols: PAMAS (Power Aware Multi-Access with Signalling )  Proposed by Singh and Raghavendra  Try to reduce the overhearing problem but not idle listening  Improve energy efficiency from MACA  Use two channels, one for data and one for control  Node who try to transmit probe in the control channel  If any neighbor answers the probe, the node will go back to sleep  Disadvantage 1. need two radio system 2. does not reduce idle listening

Case Study : S-MAC  Basic Scheme is similar to PS mode without assuming single-hop  Major components in S-MAC Periodic listen and sleep Collision avoidance Overhearing avoidance Massage passing

Scheduling  Establish low-duty-cycle operation About 1-10%  Every node are free to choose their own listen/sleep schedules  Periodically broadcast each schedule for few listen/sleep frame in a SYNC packet (synchronization)

Scheduling  Encourages neighboring nodes to adopt identical schedules When first configures, it listen for a sync period and adopts the first schedule it hears  Periodically perform neighbor discovery, listening for an entire frame, to discovery node on different schedules  the listen period is significantly longer than clock error or drift (loose sync)

Data Transmission  Collision avoidance is simmilar to IEEE DCF  Contention only happens at a receiver ’ s listen interval  Unicast packet: CSMA + RTS-CTS- DATA-ACK (MACAW)  Broadcast packet: CSMA only  Put duration field in each packet ease the overhearing problem

Message Passing  Problem: Sensor networks in-network processing requires entire message  Solution: Long message is fragmented & sent in burst  Only one RTS and CTS packet are used to reserve medium for entire message (by duration field)  Several fragments and ACKs (with duration field)  Fragment-level error recovery ACK for each fragment extend Tx time and re-transmit immediately  Other nodes sleep for whole message time

Adaptive listening  Problema -> b -> c  solution listen b->c listen a->b listen b->c a->b Overall multi-hop latency can be reduced by at least half

Performance Measure with Mica motes

Performance Only one message in the network at a time

Summary  This paper reviews MAC protocols for wireless sensor networks  It described both scheduled and contention-based MAC protocols  Finally, it presented S-MAC as an example