SMAC: An Energy-efficient MAC Protocol for Wireless Networks

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Medium Access Issues David Holmer
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 8th Lecture Christian Schindelhauer.
An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Network
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin.
Medium Access Control in Wireless Sensor Networks.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
CSMA/CA in IEEE Physical carrier sense, and Virtual carrier sense using Network Allocation Vector (NAV) NAV is updated based on overheard RTS/CTS/DATA/ACK.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks 4th Week (Part I) Faisal Aslam.
CMPE280n An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin presented by Venkatesh Rajendran.
Investigating Mac Power Consumption in Wireless Sensor Network
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
1 Power Management in IEEE Yu-Chee 1. Possible Access Sequences for a STA in PS Mode 2. PS in Infrastructure Network 3. PS in Ad.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin -- Adapted the authors’ Infocom 2002 talk.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
1 Power Management in IEEE Yu-Chee 1. Possible Access Sequences for a STA in PS Mode 2. PS in Infrastructure Network 3. PS in Ad.
1 Sensor MAC Design Requirements:  Energy efficiency  Simple operations  Working with a large number of sensors  Fair share of the channel among competing.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
1 Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye Fabio Silva John Heidemann Presented by: Ronak Bhuta Date: 4 th December 2007.
An Energy-efficient MAC protocol for Wireless Sensor Networks
1 Medium Access Control in Sensor Networks Huaming Li Electrical and Computer Engineering Michigan Technological University.
Medium Access Control in Wireless Sensor Networks USC/ISI Technical Report ISI-TR-580, October 2003 Wei Ye and John Heidemann.
1-1 Medium-Access Control. 1-2 Medium Access r Radio communication: shared medium. m Throughput, delay, and fairness. r MAC for sensor networks: m Must.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Efficient MAC Protocols for Wireless Sensor Networks
1 MAC Layer Design for Wireless Sensor Networks Wei Ye USC Information Sciences Institute.
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
MAC Protocols and Security in Ad hoc and Sensor Networks
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks The First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003) November.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
An Energy Efficient MAC Protocol for Wireless Sensor Networks “S-MAC” Wei Ye, John Heidemann, Deborah Estrin Presentation: Deniz Çokuslu May 2008.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks (S-MAC) Wei Ye, John Heidemann, Deborah Estrin.
Wireless MAC Protocols for Ad-Hoc Networks Derek J Corbett Supervisor: Prof. David Everitt.
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks Medium Access Control (MAC) 21 February 2005.
† Department of Computer Science – University of Rome “Sapienza” – Italy Protocolli MAC per reti di sensori Sistemi Wireless, a.a. 2009/2010 Un. of Rome.
Why Visual Sensor Network & SMAC Implementation Group Presentation Raghul Gunasekaran.
1 An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Network Gang Lu, Bhaskar Krishnamachari, and Cauligi Raghavendra.
Medium Access Control With Coordinated Adaptive Sleeping for Wireless Sensor Networks Instructor : Dr Yingshu Li Presented By : D M Rasanjalee Himali Paper.
Fakultät Informatik – Institut für Systemarchitektur – Professur Rechnernetze Sensor Medium Access Control (S-MAC) Robin Dunn Supervisor: Dr. Waltenegus.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
Multi-Channel MAC for Ad Hoc Networks: Handling Multi- Channel Hidden Terminals Using a Single Transceiver (MMAC) Paper by Jungmin So and Nitin Vaidya.
Chapter 6 Multiple Radio Access
1 An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin IEEE infocom /1/2005 Hong-Shi Wang.
SNU Mobile Networks Lab. S-MAC (Sensor-MAC) T-MAC (Timeout-MAC) Kae Won, Choi Kyoung hoon, Kim.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
KAIS T Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Network Wei Ye, John Heidemann, Deborah Estrin 2003 IEEE/ACM TRANSACTIONS.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
MACs for sensor nets. review Aloha Slotted aloha CSMA Listen before sending Non/1/P-persistent P_r = (1-a)*a^CW / (1-a^CW) * a^-r Sum from 1 to CW is.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Medium Access Control in Wireless networks
CS541 Advanced Networking 1 Contention-based MAC Protocol for Wireless Sensor Networks Neil Tang 4/20/2009.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
S-MAC Taekyoung Kwon. MAC in sensor network Energy-efficient Scalable –Size, density, topology change Fairness Latency Throughput/utilization.
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
MAC Protocols for Sensor Networks
An Energy-efficient MAC protocol for Wireless Sensor Networks
CSE 4215/5431: Mobile Communications Winter 2010
CSE 4215/5431: Mobile Communications Winter 2011
Investigating Mac Power Consumption in Wireless Sensor Network
Presentation transcript:

SMAC: An Energy-efficient MAC Protocol for Wireless Networks

Network assumptions §Composed of many small nodes deployed in an ad hoc fashion §Most communication will be between nodes as peers, rather than to a single base station §Nodes must self-configure

Application assumptions §Applications will have long idle periods and can tolerate some latency §Dedicated to a single application or a few collaborative applications §Involves in-network processing to reduce traffic and thereby increase the life-time §This implies that data will be processed as whole messages at a time in store-and-forward fashion §Hence packet or fragment-level interleaving from multiple sources only delays overall latency

Features of S-MAC The main features of S-MAC are: §Periodic listen and sleep §Collision and Overhearing avoidance §Message passing

Periodic Listen and Sleep §If no sensing event happens, nodes are idle for a long time §So it is not necessary to keep the nodes listening all the time §Each node go into periodic sleep mode during which it switches the radio off and sets a timer to awake later §When the timer expires it wakes up and listens to see if any other node wants to talk to it

§Duration of sleep and listen time can be selected based on the application scenario §We assume that the durations are set (i.e., they do not need to be determined through self- organization) §To reduce control overhead, neighboring nodes are synchronized (i.e. Listen and sleep together)

§Not all neighboring nodes can synchronize together §Two neighboring nodes (A and B) can have different schedules if they are required to synchronize with different node

§If a node A wants to transmit to node B, it just waits until B is listening §If multiple neighbors want to transmit at the same time (e.g., they want to transmit to the same node), they need to contend for the medium §Contention mechanism is the similar to IEEE CSMA/CA (i.e., using CSMA and RTS and CTS) §After they start data transmission, they do not go to periodic sleep until they finish transmission

Choosing and Maintaining Schedules §Each node maintains a schedule table that stores schedules of all its known neighbors. §To establish the initial schedule (at the startup) following steps are followed: l A node first listens for a certain amount of time. l If it does not hear a schedule from another node, it randomly chooses a schedule and broadcast its schedule immediately. l This node is called a SYNCHRONIZER.

§If a node receives a schedule from a neighbor before choosing its own schedule, it just follows this neighbor’s schedule. §This node is called a FOLLOWER and it waits for a random delay and broadcasts its schedule (i.e., the time when it will sleep) §If a node receives a neighbor’s schedule after it selects its own schedule, it adopts to both schedules (i.e., it will wake up at both times of its neighbors!) and broadcasts its own schedule before going to sleep. §Why “adopt” multiple schedules? Consider another option l Nodes to use schedules to define when they listen. l If a node wants to transmit to the neighbor, it must transmit when the node is listening. l However, broadcast becomes difficult, and broadcast is very common in networks l (perhaps we need to make protocols where broadcast is not so common) l (is broadcast really so common that nodes should wake up more often) l (on the other hand, we’ll soon see that nodes must be awake when their neighbors are awake)

Rules for Joining a New Node §Listen for a long time until an active node is discovered §Send INTRO packet to the active node §Active node forwards its schedule table §Treat all the nodes on table as potential neighbors and contact them later §If a synchronizer is found, then use its schedule, otherwise, use a random schedule and broadcast the schedule

Maintaining Synchronization §Timer synchronization among neighbors are needed to prevent the clock drift. §Done by periodic updating using a SYNC packet. §If a large guard time is used, then the updating period can be quite long. §Synchronizer needs to periodically send SYNC to its followers. §If a follower has a neighbor that has a different schedule with it, it also needs to receive updates from that neighbor.

§Time of next sleep is relative to the moment that the sender finishes transmitting the SYNC packet §Receivers will adjust their timer counters immediately after they receive the SYNC packet §Listen interval is divided into two parts: one for receiving SYNC and other for receiving RTS

Timing Relationship of Possible Situations

Collision Avoidance §Similar to IEEE using RTS/CTS mechanism §Perform carrier sense before initiating a transmission §If a node fails to get the medium, it goes to sleep and wakes up when the receiver is free and listening again l Note that is does not make sense. l You cannot sleep for the duration of a packet transmission. l Packet transmission take ~1ms, and we saw that sleeping takes 10s or 100s of ms. §Broadcast packets are sent without RTS/CTS §Unicast packets follow the sequence of RTS/CTS/DATA/ACK between the sender and receiver

Overhearing Avoidance §Duration field in each transmitted packet indicates how long the remaining transmission will be. §So if a node receives a packet destined o another node, it knows how long it has to keep silent. §The node records this value in network allocation vector (NAV) and set a timer.

§When a node has data to send, it first looks at NAV. §If NAV is not zero, then medium is busy (virtual carrier sense). §Medium is determined as free if both virtual and physical carrier sense indicate the medium is free. §All immediate neighbors of both the sender and receiver should sleep after they hear RTS or CTS packet until the current transmission is over. l Again, this doesn’t make sense

Message Passing §A message is a collection of meaningful, interrelated units of data §Transmitting a long message as a packet is disadvantageous as the re-transmission cost is high §Fragmentation into small packets will lead to high control overhead as each packet should contend using RTS/CTS

Solution §Fragment message in to small packets and transmit them as a burst §Advantages l Reduces latency of the message l Reduces control overhead §Disadvantage l Node-to-node fairness is reduced, as nodes with small packets to send has to wait till the message burst is transmitted

T-MAC – an enhanced S-MAC §SMAC problem: the duty cycle controls the data rate. §Idea: events happen in bursts – so stay awake after an event and sleep longer between events §Stay active, listening and sending while there is “something to do” for TA seconds §“Something to do” includes l Periodic listening scheduled event l Reception of radio transmission l Sensing collision (I.e., a loud signal that cannot be decoded (interference prone on ISM bands)) l End of transmission (of data or ACK) l A neighbors RTS/CTS exchange §A node that fails to get a CTS does not sleep, but waits and tries again. While the desired node may be asleep, it may also be overhearing another transmission. It will stay awake until TA sec after that transmission has completed. §Nodes only sleep during other transmissions if the packet is long… l This might not work… §A->B->C->D l If C wants to send to D, it might wait because it hears a CTS from B. However, d has not heard the CTS and goes to sleep. So when c transmits, d will be asleep. (Of course, if B wants to relay to c, then it can do so, but this may cause C’s buffer to fill. So C may stop sending CTSs to B. As B’s buffer fills it stops sending CTSs to A so c can transmit (back-pressure)