1 An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Network Gang Lu, Bhaskar Krishnamachari, and Cauligi Raghavendra.

Slides:



Advertisements
Similar presentations
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Advertisements

An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Network
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin.
CMPE280n An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin presented by Venkatesh Rajendran.
Investigating Mac Power Consumption in Wireless Sensor Network
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam.
Self Organization and Energy Efficient TDMA MAC Protocol by Wake Up For Wireless Sensor Networks Zhihui Chen; Ashfaq Khokhar ECE/CS Dept., University of.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 9th Lecture Christian Schindelhauer.
1 Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye Fabio Silva John Heidemann Presented by: Ronak Bhuta Date: 4 th December 2007.
An Energy-efficient MAC protocol for Wireless Sensor Networks
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo, David Culler (University of California, Berkeley) Special thanks to Wei Ye.
TiZo-MAC The TIME-ZONE PROTOCOL for mobile wireless sensor networks by Antonio G. Ruzzelli Supervisor : Paul Havinga This work is performed as part of.
On the Energy Efficient Design of Wireless Sensor Networks Tariq M. Jadoon, PhD Department of Computer Science Lahore University of Management Sciences.
Medium Access Control With Coordinated Adaptive Sleeping for Wireless Sensor Networks Debate 1 - Defense Joseph Camp Anastasios Giannoulis.
Efficient MAC Protocols for Wireless Sensor Networks
MAC Layer Protocols for Sensor Networks Leonardo Leiria Fernandes.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
1 Y-MAC: An Energy-efficient Multi-channel MAC Protocol for Dense Wireless Sensor Networks Youngmin Kim, Hyojeong Shin, and Hojung Cha International Conference.
Venkatesh Rajendran, Katia Obraczka, J.J. Garcia-Luna-Aceves
MAC Protocols and Security in Ad hoc and Sensor Networks
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks The First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003) November.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
Mobile Routing protocols MANET
An Energy Efficient MAC Protocol for Wireless Sensor Networks “S-MAC” Wei Ye, John Heidemann, Deborah Estrin Presentation: Deniz Çokuslu May 2008.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks (S-MAC) Wei Ye, John Heidemann, Deborah Estrin.
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks Medium Access Control (MAC) 21 February 2005.
AN ENERGY CONSUMPTION ANALYTIC MODEL FOR WIRELESS SENSOR MAC PROTOCOL ERIC MAKITA SEPTEMBRE
† Department of Computer Science – University of Rome “Sapienza” – Italy Protocolli MAC per reti di sensori Sistemi Wireless, a.a. 2009/2010 Un. of Rome.
Why Visual Sensor Network & SMAC Implementation Group Presentation Raghul Gunasekaran.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
Energy and Latency Control in Low Duty Cycle MAC Protocols Yuan Li, Wei Ye, John Heidemann Information Sciences Institute, University of Southern California.
A SURVEY OF MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
An Adaptive Energy-Efficient and Low- Latency MAC for Data Gathering in Wireless Sensor Networks Gang Lu, Bhaskar Krishnamachari, and Cauligi S. Raghavendra.
1 An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin IEEE infocom /1/2005 Hong-Shi Wang.
SNU Mobile Networks Lab. S-MAC (Sensor-MAC) T-MAC (Timeout-MAC) Kae Won, Choi Kyoung hoon, Kim.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
A+MAC: A Streamlined Variable Duty-Cycle MAC Protocol for Wireless Sensor Networks 1 Sang Hoon Lee, 2 Byung Joon Park and 1 Lynn Choi 1 School of Electrical.
SEA-MAC: A Simple Energy Aware MAC Protocol for Wireless Sensor Networks for Environmental Monitoring Applications By: Miguel A. Erazo and Yi Qian International.
KAIS T Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Network Wei Ye, John Heidemann, Deborah Estrin 2003 IEEE/ACM TRANSACTIONS.
A Throughput-Adaptive MAC Protocol for Wireless Sensor Networks Zuo Luo, Liu Danpu, Ma Yan, Wu Huarui Beijing University of Posts and Telecommunications.
Ubiquitous Networks Wakeup Scheduling Lynn Choi Korea University.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
Performance Evaluation of IEEE
Link Layer Support for Unified Radio Power Management in Wireless Sensor Networks IPSN 2007 Kevin Klues, Guoliang Xing and Chenyang Lu Database Lab.
Michael Buettner, Gary V. Yee, Eric Anderson, Richard Han
Turkmen Canli ± and Ashfaq Khokhar* Electrical and Computer Engineering Department ± Computer Science Department* The University of Illinois at Chicago.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
An Enhanced Cross-Layer Protocol for Energy Efficiency in Wireless Sensor Networks Jaehyun Kim, Dept. of Electrical & Electronic Eng., Yonsei University;
CS541 Advanced Networking 1 Contention-based MAC Protocol for Wireless Sensor Networks Neil Tang 4/20/2009.
Energy-Efficient, Application-Aware Medium Access for Sensor Networks Venkatesh Rajenfran, J. J. Garcia-Luna-Aceves, and Katia Obraczka Computer Engineering.
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
S-MAC Taekyoung Kwon. MAC in sensor network Energy-efficient Scalable –Size, density, topology change Fairness Latency Throughput/utilization.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
Z-MAC : a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min ACM SenSys Systems Modeling.
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
An Energy-efficient MAC protocol for Wireless Sensor Networks
Net 435: Wireless sensor network (WSN)
Ultra-Low Duty Cycle MAC with Scheduled Channel Polling
Gang Lu Bhaskar Krishnamachari Cauligi S. Raghavendra
Investigating Mac Power Consumption in Wireless Sensor Network
Presentation transcript:

1 An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Network Gang Lu, Bhaskar Krishnamachari, and Cauligi Raghavendra IEEE international workshop on algorithm for Wireless, Mobile, Ad hoc and Sensor networks WMAN, /4/2005 Hong-Shi Wang

2 Contents  Introduction and Related work  Data Forwarding Interruption Problem  DMAC Protocol  Performance Evaluation  Conclusions and Future Work

3 Introduction  TDMA-based protocol –Have advantage of energy conservation compared to contention protocols, because there is no contention- introduced overhead and collisions –But requires the nodes to form real communication clusters like LEACH  Managing inter-cluster communication and interference is not an easy task.  Contention-based protocol –simplicity –Energy consumption using this MAC is very high when nodes are in idle mode

4 S-MAC  Tries to reduce wastage of energy from all four sources of energy inefficiency –Collision – by using RTS and CTS –Overhearing – by switching the radio off when the transmission is not meant for that node (NAV) –Control overhead – by message passing –Idle listening – by periodic listen and sleep

5 Drawbacks of S-MAC  Active (Listen) interval –If message rate is less – energy is still wasted in idle-listening  S-MAC’ fixed duty cycle is NOT OPTIMAL

6 T-MAC  Basic idea –To utilize an active and a sleep cycle, similar to S-MAC –To introduce an adaptive duty cycle by dynamically ending the active part –An active period ends when no activation event has occurred for a time TA  Activation event –The reception of any data on the radio (RTS, CTS, DATA, ACK) –The sensing of communication on the radio (overhearing) –Difference in the duty cycle  S-MAC - fixed duty cycle  T-MAC – Dynamic duty cycle

7 The other features of T-MAC  RTS Retries  Overhearing Avoidance (option)  Future request-to-send (FRTS)  Taking priority on full buffers

8 Data Forwarding interruption Problem  The data forwarding interruption problem(DFI) exists in implicit adaptive listening techniques.  Nodes that are out of the hearing range of both the sender and the receiver are unaware of ongoing data transmissions, and therefore go to sleep until the next cycle/interval.  Packets will then have to be queued until the next active period, which increases latency.  So nodes out of the range go to sleep after their basic duty cycle, leading to interrupted data forwarding.

9 Data Forwarding interruption Problem  By adaptive listening, the next hop of the recevicer overhears the receiver’s ACK or CTS packet, then remains active an additional slot.  But other nodes still go to sleep after their active periods.  If source has multiple packets to send, those packets can only be forwarded two hops away every interval T.

10 Data Forwarding interruption Problem

11 DMAC Protocol Design Three main communication patterns in WSN applications. –Local data exchange and aggregation among nearby nodes. –The dispatch of control packets and interest packets from the sink to sensor nodes. –Data gathering from sensor nodes to sink. Scenario and Assumption. –Sensor nodes are fixed without mobility and a route to the sink is fairly durable, so that a data gathering tree remains stable for a reasonable length of time. –Flows in the data gathering tree are unidirectional from sensor nodes to sink. –Only one destination, the sink.

12 Staggered wakeup Schedule  An interval is divided into receiving, sending, and sleep periods. –In receiving state, a node is expected to receive a packet and send an ACK packet back to the sender. –In the sending state, a node will try to send a packet to its next hop and receive an ACK packet. –In sleep state, nodes will turn off radio to save energy.  The receiving and sending periods have the same length of u which is enough for one packet transmission and reception.  Depending on its depth d in the data gathering tree, a node skews its wake-up scheme du ahead from the schedule of the sink.

13 Staggered wakeup Schedule

14 Length of the sending and receiving slot μ = BP + CW + DATA + SP + ACK μ : length of the sending and receiving slot. BP : back off period. SP : a short period then transmits the ack packet. CW : a fixed contention window size. DATA : the packet transmission time.

15 Staggered wakeup Schedule Advantages of staggered wakeup schedule –Nodes on the path wake up sequentially to forward a packet to next hop, so sleep delay is reduced. –All nodes on the multihop path can increase their duty cycle promptly. –Since the active periods are now separated, contention is reduced. –Only node on the multihop path need to increase their duty cycle, while the other nodes can still operate on the basic low duty cycle to save energy.

16 Data delivery and Duty Cycle Adaptation in Multihop chain  When a node has multiple packets to send at a sending slot, it needs to increase its own duty cycle and requests other nodes on the multihop path to increase their duty cycle too.  DMAC piggyback a more data flag in the header to indicate the request for an additional active period with little overhead.  Before a node in its sending state transmits a packet, it will set the packets’s more data flag if –either its buffis not empty –or it received a packet from previous hop with more data flag set.  The receiver checks the more data flag of the packet it received, and if the flag is set, it also sets the more data flag of its ACK packet to the sender.

17 Data delivery and Duty Cycle Adaptation in Multihop chain  A node will decide to hold an additional active period if –either it sends a packet with the more data flag set and receive back an ACK packet with the more data flag set –or if it receives a packet with more data flag set  In DMAC, even if a node decides to hold an additional active period, it does not remain active for the next slot but schedules a 3u sleep then goes to the receiving state.

18 Data Prediction  In a data gathering tree, however, there is a chance that each source’s rate is small enough for the basic duty cycle, but the aggregated rate at an intermediate node exceeds the capacity of basic duty cycle. Assume A wins the channel and send a packet to node C. –Since the buffer of node A is now empty, the more data flag is not set. –C then goes to sleep after its sending slot without a new active period. –The packet of B would then have to be queued until next interval. –This results in sleep delay for packets from B. C B A

19 Data Prediction  Data Prediction Scheme in receiving state –If a node in receiving state receives a packet, it anticipates that its children still have packets waiting for transmission. –It then sleeps only 3u after its sending slot and switches back to receiving state. All following nodes on the path also receive this packet, and schedule an additional receiving slot. –In this additional slot, if no packet is received, the node will go to sleep directly without a sending slot. –If a packet is received during this receiving slot, the node will wake up again 3u later after the current sending slot.

20 Data Prediction  Data Prediction Scheme in sending state –If during its backoff period, it overhears the ACK packet from its parent in the data gathering tree, it knows that this sending slot is already taken by its brother but its parent will hold an additional receiving slot 3u later. –So it will also wake up 3u later after its sending slot. –In this additional sending slot, the node than can transmit a packet to its parent.

21 More-to-Send Packet  There is still a chance of interference between nodes on different branches of the tree. –Assume two nodes A and B are in interference range of each other with different parents in data gathering tree. –A wins the channel and transmits a packet to its parent. –Neither B nor its parent C holds additional active slots in this interval. –Data prediction scheme will not work.  Since C does not receive any packet in its receiving slot and B does not overhear ACK packet from C in its sending slot. D B A C

22 More-to-Send Packet  DMC propose the use of an explicit control packet, More-to- Send(MTS), to adjust duty cycle under the interference. –A MTS packet with flag set to 1 is called a request MTS. –A MTS packet with flag set to 0 is called a clear MTS.  A node sends a request MTS to its parent if either of these two conditions is true. –First, it can not send a packet because channel is busy. –Second, it received a request MTS from its children.  This is aimed to propagate the request MTS to all nodes on the path. A request MTS is sent only once before a clear MTS packet is send.

23 More-to-Send Packet  A node sends clear MTS to its parent if the following two conditions are true: –Its buffer is empty. –All request MTSs received from children are cleared and it sends a request MTS to its parent before and has not sent clear MTS.  A node which sends or received a request MTS will keep waking up periodically every 3u.  It switches back to the basic duty cycle only after it sent clear MTS to its parent or all previous received MTS from its children were cleared.

24 Performance Evaluation  3 Metrics to evaluate the performance of DMC : –Energy cost is the total energy cost to deliver a certain number of packets from sources to sink. –Latency is the end to end delay of packet. –Delivery ratio is the ratio of the successfully delivered packets to the total packets originating from all sources.

25 Performance Evaluation  Parameters : –u is set to 10 ms for DMAC and 11ms for DMAC/MTS –The active period is set to 20 ms for SMAC with adaptive listening. –All scheme have the basic duty cycle of 10%. –This means a sleep period of 180ms for DMAC and SMAC, 198ms for DMAC/MTS.

26 Multihop chain

27 Random Data gathering tree - Latency

28 Random Data gathering tree - Energy

29 Random Data gathering tree - Delivery ratio

30 Random Data gathering tree - Latency

31 Random Data gathering tree - Energy

32 Random Data gathering tree - Delivery ratio

33 Conclusions And Future Work Conclusions  DMAC achieves both energy savings and low latency  D-MAC Protocol –Data Gathering tree –Staggered wakeup Schedule –Duty Cycle adaptation –Data Prediction and More-to-Send Future Work  To implement this MAC on a Mote-based sensor network platform and evaluate its performance through real experiments.

34 The End  Thanks for your listening !