Week 4 RI Medium Access Control of WSN
Week 4 RI Medium Access Control of WSN
• The Internet
• A network of networks
Sistem Komputer 2
Internet Engineering @lestariningati
Outline
• Introduction to MAC
• Case studies
• Summary
Sistem Komputer 3
Internet Engineering @lestariningati
Introduction to MAC
– Controls when and how each node can transmit in the wireless channel
– Radios transmitting in the same frequency band interfere with each other – collisions
Sistem Komputer 4
Internet Engineering @lestariningati
Application layer
Transport layer End-to-end reliability, congestion control
Sistem Komputer 5
Internet Engineering @lestariningati
• In wired link,
• In wireless
– Half-duplex mode
Sistem Komputer 6
Internet Engineering @lestariningati
– Battery powered
• Sensor-net applications
Sistem Komputer 7
Internet Engineering @lestariningati
Sistem Komputer 8
Internet Engineering @lestariningati
• Collision avoidance
• Energy efficiency
– One of the most important attributes for sensor networks, since most nodes are battery
powered
Sistem Komputer 9
Internet Engineering @lestariningati
• Nodes die
• Nodes move
Sistem Komputer 10
Internet Engineering @lestariningati
• Channel utilization
• Latency
• Throughput
– Goodput?
• Fairness
– Collisions
• Retransmission
Energy
– Computation complexity
– With Motes, radio and CPU are two major energy consumers
• Schedule-based protocols
• Contention-based protocols
– Advantages
• No collisions
– Disadvantages
Sistem Komputer 16
Medium Access Control in WSNs
Internet Engineering @lestariningati
– FDMA is used in nearly all first generation mobile communication systems, like AMPS (30 KHz
channels)
subChannel 1
Bandwidth
subChannel 2
subChannel 3
subChannel 4
Time
Sistem Komputer 17
Internet Engineering @lestariningati
• Users encoded by different codes (keys) coexist in time and frequency domains
• Master-slave configuration
– The master node decides which slave can send by polling the corresponding slave
– Examples
• Bluetooth piconets
• Bluetooth (Cont.)
• A node temporarily leave one piconet and joins another – high overhead and long delay
– Looks like TDMA, but actual multiple access is accomplished by FDMA or CDMA
– Similar to Bluetooth
• ALOHA
ALOHA, Slotted-ALOHA
• Mechanism
– Slotted Aloha additionally uses time-slots, sending must always start at slot boundaries
• Aloha
collision
sender A
sender B
sender C
t
• Slotted Aloha collision
sender A
sender B
sender C
t
a b c
Node a is hidden from c’s carrier sense
• Hidden terminals
– A is “hidden” for C
A B C
Sistem Komputer 27
Internet Engineering @lestariningati
• Exposed terminals
– C is “exposed” to B
A B C D
Sistem Komputer 28
Internet Engineering @lestariningati
– Based on CSMA/CA
– Add duration field in RTS/CTS informing other node about their backoff time
– RTS/CTS/DATA/ACK
– Fast error recovery at link layer
– Fragmentation support
– Assumption: all nodes are synchronized and can hear each other (single hop)
– Nodes in PS mode periodically listen for beacons & ATIMs (ad hoc traffic indication
messages)
Sistem Komputer 31
Internet Engineering @lestariningati
Sistem Komputer 32
Internet Engineering @lestariningati
• A base station tries to collect data equally from all sensors in the network
• Nodes close to the base station forward more traffic, and have less chances to send
their own data
• Superframe, Tframe
SMACS Operation
• Stationary nodes periodically broadcast a Broadcast Invitation (BI) message to invite other nodes to
join.
• A mobile node selects a BI from many BIs that it got, then reply with a Mobile Invite (MI) message
• If the stationary node accepts MI request, it selects slots for communication and replies with a
Mobile Response (MR) message.
• As the received SNR along the channel improves or degrades, mobile nodes request a connection
or disconnection (with an MD) based on predetermined threshold
Collisions No Yes
Sistem Komputer 37
Medium Access Control in WSNs
Internet Engineering @lestariningati
• Contention-based protocols need to work hard in all directions for energy savings
Sistem Komputer 39
Internet Engineering @lestariningati
E C A B D F
Sistem Komputer 41
Internet Engineering @lestariningati
PAMAS
• If any neighboring node is receiving a transmission, it responds with a busy tone; if a CTS is sent, it
collides with the busy tone. Then the sender will backoff and retry later.
• A node only powers off its data channel. The signaling interface stays on all the time
• Powering off radios does not have any effect on the message latency
• ZigBee
– Industry standard through application profiles running over IEEE 802.15.4 radios
– Target applications are sensors networks, interactive toys, smart badges, remote controls, and
home automation
Sistem Komputer 44
Medium Access Control in WSNs
Internet Engineering @lestariningati
• Network Coordinator
References
• [Ye+ 2002] W. Yei, et al., Energy-Efficient MAC Protocol for Wireless Sensor Networks, Proceedings of the Twenty First International Annual
Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2002), New York, NY, USA, June 23-27 2002.
• [Woo+ 2003] A. Woo et al., A Transmission Control Scheme for Media Access in Sensor Networks, Proceedings of the ACM/IEEE
International Conference on Mobile Computing and Networking, Rome, Italy, July 2001, pp. 221-235.
• [Van Dam+ 2003] T. V. Dam et al., An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks, ACM SenSys, Los Angeles, CA,
November, 2003.
• [Polastre+ 2004] J. Polastre et al., Versatile Low Power Media Access for Wireless Sensor Networks, In Proceedings of the Second ACM
Conference on Embedded Networked Sensor Systems (SenSys), November 3-5, 2004
• [Leopold + 2003] M Leopold, M. B. Dydensborg, and P. Bonnet, Bluetooth and Sensor Networks: A Reality Check, ACM SenSys, Los
Angeles, CA, November, 2003.
• [Heinzelman+ 2000]W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, Energy-efficient communication protocols for wireless
microsensor networks, in Proc. of the Hawaii International Conference on Systems Sciences, Jan. 2000.
• [Karn 1990] P. Karn, MACA: A new channel access method for packet radio, in Proc. of the 9th ARRL Computer Networking Conference,
London, Ontario, Canada, Sept. 1990, pp. 134–140.
• media access protocol for wireless lans,” in Proc. of the ACM SIGCOMM, London, UK, Sept. 1994, pp. 212–225.
• [Sohrabi+ 2000] K. Sohrabi et al., Protocols for Self-Organization of a Wireless Sensor Network,” IEEE Pers. Commun., Oct. 2000, pp. 16–27.
• [Bennett+ 1997] F. Bennett et al., Piconet: Embedded mobile networking,” IEEE Personal Communications Magazine, vol. 4, no. 5, pp. 8–15,
Oct. 1997.
• [Tseng+ 2002] Yu-Chee Tseng et al., Power-saving protocols for IEEE 802.11-based multi-hop ad hoc networks,” in Proc. of the IEEE
Infocom, New York, NY, June 2002, pp. 200–209.
• [Singh+ 1998] S. Singh et al., PAMAS: Power aware multi-access protocol with signalling for ad hoc networks,” ACM Computer
Communication Review, vol. 28, no. 3, pp. 5–26, July 1998.
Sistem Komputer 47