Upload
bhuvaneswari-balachander
View
216
Download
0
Embed Size (px)
Citation preview
8/2/2019 2_MAC&Net
1/60
Medium access layer forWireless Sensor Networks
T.G.Venkatesh
Electrical Engineering
Indian Institute of Technology
8/2/2019 2_MAC&Net
2/60
Issues in MAC protocols for WSN Issues
Energy efficiency Fairness of end to end flows
Related work IEEE802.11
High energy consumption when the nodes are in theidle mode
CSMA To improve the energy consumption by avoiding
overhearing among neighboring nodes TDMA
No contention-introduced overhead and collisions Not easy to manage the inter-cluster
communication and interference Not easy to dynamically change its frame length
and time slot assignment PAMAS
Power off radio when not actively transmitting andreceiving packet
8/2/2019 2_MAC&Net
3/60
Sensor MAC Requirements
High energy efficiency (High Throughput/energy Ratio)
High channel utilization (High throughput)
Low latency
Reliability
Scalability
Robustness and adaptability to changes
Channel conditions (highly time varying)
Sensor node failure (energy depletion, environmentalchanges)
High clock drift
8/2/2019 2_MAC&Net
4/60
Four important sources of wasted energy inWSN:
Idle Listening (consumes about 50 -100% of thepower)
Overhearing (since RF is a broadcast medium)
Collisions (Hidden Terminal Problem)
Control Overhead (e.g. RTS/CTS or DATA/ACK)
MAC Energy Usage
8/2/2019 2_MAC&Net
5/60
Power Measurements
8/2/2019 2_MAC&Net
6/60
Motivation
Duty cycle: ratio between listen timeto total listen sleep cycle
Central idea: reduce the duty cycle byturning off the radio for part of thetime
Approaches:
TDMA
Schedule contention periods
8/2/2019 2_MAC&Net
7/60
Medium Access Paradigms
Contention Based (CSMA)
Random-backoff and carrier-sensing
Simple, no time synch, and robust to network changes
High control overhead (for two-hop collision avoidance) High idle listening and overhearing overheads
Solve this by duty cycling
TDMA Based
Nodes within interference range transmit during different
times, so collision free Requires time synch and not robust to changes.
Low throughput and high latency even during low contention.
Low idle listening and overhearing overheads Wake up and listen only during its neighbor transmission
8/2/2019 2_MAC&Net
8/60
Existing MAC Protocols
Sensor-MAC (S-MAC) : Listen-sleep
Timeout-MAC (T-MAC) : Activation event
WiseMAC : Preamble Sampling
8/2/2019 2_MAC&Net
9/60
S-MAC
Main goal reduce powerconsumption
Three major components:
Periodic sleep-listen
Collision and overhearing avoidance
Message passing
8/2/2019 2_MAC&Net
10/60
S-MAC Design
Listen Period
Sleep/Wake schedule synchronization with neighbours
Receive packets from neighbours
Sleep Period
Turn OFF radio
Set timer to wake up later
Transmission
Send packets only during listen period of intended receiver(s)
Collision Handling
RTS/CTS/DATA/ACK
sleeplisten listen sleepsleeplistenlisten listenlisten sleep
8/2/2019 2_MAC&Net
11/60
S-MAC Design
Node 1
Node 2
sleeplisten listen sleep
sleeplisten listen sleep
Schedule 2
Schedule 1
Schedules can differ, prefer neighbouring nodes to havesame schedule
Border nodes may have to maintain more than oneschedule.
8/2/2019 2_MAC&Net
12/60
S-MAC Design
Maintaining Schedule
To update schedule by sending a SYNC packet periodically
8/2/2019 2_MAC&Net
13/60
S-MAC Design
Collision Avoidance
Problem : Multiple senders want to talk
Options: Contention vs TDMA
Solution :Similar to IEEE 802.11 ad hocmode (DCF) Physical and virtual carrier sense
Randomozed backoff time
RTS/CTS for hidden terminal problem RTS/CTS/DATA/ACK sequence
8/2/2019 2_MAC&Net
14/60
S-MAC Design
Overhearing Avoidance
Problem: Receive packets destined toothers
Solution : Sleep while neighbours talk
Who should sleep
All immediate neighbors of sender and receiver
How long to sleep The duration field in each packet informs the
other nodes the sleep interval
8/2/2019 2_MAC&Net
15/60
S-MAC Design
Message Passing Only one RTS packet and one CTS packet are used
To avoid large control overhead and long delay
ACK would be sent after each data fragment
To avoid fragment loss or error
To Prevent hidden terminal problem
After the neighbor node hears the RTS and CTS, itwill go to sleep for the time that is needed totransmit all the fragments (using the duration field)
8/2/2019 2_MAC&Net
16/60
Advantages/Disadvantages
Energy waste caused by idle listening is reduced bysleep schedules.
Sleep and listen periods are predefined and constantwhich decreases the efficiency of the algorithm under
variable traffic load.
8/2/2019 2_MAC&Net
17/60
Timeout-MAC (T-MAC)
Proposed to enhance the poor results of S-MAC protocolunder variable traffic load.
Listen period ends when no activation event has occurredfor a time threshold TA.
Reduce idle listening by transmitting all messages in burstsof variable length, and sleeping between bursts.
times out on hearing nothing.
8/2/2019 2_MAC&Net
18/60
S-MAC Vs T-MAC
The SMAC duty cycle ;The arrows indicatetransmitted and received messages; note that themessages come closer.
8/2/2019 2_MAC&Net
19/60
Advantages/Disadvantages
Gives better result under variable load.
Suffers from early sleeping problem node goes tosleep when a neighbor still has messages for it.
8/2/2019 2_MAC&Net
20/60
WiseMAC
All nodes defined to have two communicationchannels.
Data channel uses TDMA
Control channel uses CSMA
Preamble sampling used to decrease idle listeningtime.
Nodes sample the medium periodically to see if anydata is going to arrive.
8/2/2019 2_MAC&Net
21/60
WiseMAC
8/2/2019 2_MAC&Net
22/60
Advantages/Disadvantages
Dynamic preamble length adjustment results in betterperformance.
Conflict when one node starts to send the preamble to
a node that is already receiving another nodestransmission where the preamble sender is not withinrange. Hidden terminal problem
8/2/2019 2_MAC&Net
23/60
Other MAC Protocols
SIFT :Event Driven
TRAMA : Traffic Adaptive MAC, TDMA
Based
TRAFFIC ADAPTIVE MAC
8/2/2019 2_MAC&Net
24/60
TRAFFIC-ADAPTIVE MACPROTOCOLTRAMA
Time is divided into random-accessand scheduled-access (transmission)periods.
The random-access period is used toestablish two hop topologyinformation and
the channel access is contention-based within that period.
8/2/2019 2_MAC&Net
25/60
Dynamic Sensor MAC
8/2/2019 2_MAC&Net
26/60
D MAC
8/2/2019 2_MAC&Net
27/60
WSN MAC Comparison
MAC
Protocol
Type Adaptivity toChanges
Advantages Disadvantages
S-MAC CSMA,Contention
-based
Good Energy waste caused byidle listening is reduced by
sleep schedules.
Simplicity.
Sleep and listen periods are
predefined and constant, which
decreases the efficiency of the
algorithm under variable traffic
load.
T-MAC CSMA,Contention
based
Good Gives better results undervariable loads
Early sleeping problem.
WiseMAC CSMA,
Preamble basedGood Dynamic preamble length
adjustment results in better
performance under
variable traffic conditions.
Decentralized sleep-listen
scheduling results in different
sleep and wake-up times for
each neighbor of a node. Hidden
terminal problem
TRAMA TDMA/CSMA Good Higher percentage of sleeptime and less collision
probability is achieved
compared to CSMA based
protocols.
Without considering thetransmissions and receptions, the
duty cycle is at least 12.5 %,
which is a considerably high
value.
SIFT CSMA/CA,
Contention
Window-based
Good Very low latency isachieved with many traffic
sources.
Increased idle listening caused
by listening to all slots before
sending. System-wide time
synchronization is needed for
slotted contention windows.
8/2/2019 2_MAC&Net
28/60
Network Layer for WirelessSensor Networks
T.G.Venkatesh
Electrical Engineering
Indian Institute of Technology
8/2/2019 2_MAC&Net
29/60
Communication architecture ofsensor networks
Network layer:
Power efficiency is always an important
consideration. Sensor networks are mostly data
centric.
Data aggregation is useful only when it
does not hinder the collaborative effortof the sensor nodes.
An ideal sensor network has attribute-based addressing and location
awareness.
8/2/2019 2_MAC&Net
30/60
Communication architecture ofsensor networks
Several Network Layer Schemes for Sensor Networks
8/2/2019 2_MAC&Net
31/60
Communication architecture ofsensor networks
Maximum available power (PA) route:Route 2
Minimum energy (ME) route: Route 1Minimum hop (MH) route: Route 3Minimum PA node route: Route 3
Energy Efficient Routes
8/2/2019 2_MAC&Net
32/60
Communication architecture ofsensor networks
Interest Dissemination
Sinks broadcast the interest Sensor nodes broadcast the advertisements
Attribute-based naming
The areas where the temperature is over 70oF
The temperature read by a certain node
8/2/2019 2_MAC&Net
33/60
Communication architecture ofsensor networks
Data aggregation
Solve implosion and overlapProblem
Aggregation based on sameattribute of phenomenon
Specifics (the locations ofreporting sensor nodes) shouldnot be left out
8/2/2019 2_MAC&Net
34/60
Communication architecture ofsensor networks
Open research issues
New protocols need to be developed to addresshigher topology changes and higher scalability.
New internetworking schemes should be developed
to allow easy communication between the sensor
networks and external networks.
8/2/2019 2_MAC&Net
35/60
Protocol Classification (1)
Proactive First Compute all Routes;
Then RouteReactive
Compute Routes On-Demand
Hybrid First Compute all Routes;Then Improve While Routing
8/2/2019 2_MAC&Net
36/60
Protocol Classification (2)
Direct Node and Sink Communicate Directly
(Fast Drainage; Small Scale)
Flat (Equal) Random Indirect Route
(Fast Drainage Around Sink; Medium Scale)
Clustering (Hierarchical) Route Through Distinguished Nodes
8/2/2019 2_MAC&Net
37/60
Protocol Classification (3)
Unicast One-to-One Message Passing
Multicast (actually Local Broadcast)Node-to-Neighbors Message
Passing
Broadcast Full-Mesh Source to Everyone
8/2/2019 2_MAC&Net
38/60
Protocol Classification (4)
Low Energy Adaptive Clustering
8/2/2019 2_MAC&Net
39/60
1 - LEACH (1)
Protocol Highlights
Self-Organizing Adaptive Clustering
Cluster-Heads elect themselvesrandomly
Nodes die in random
Stationary Sink Localized Coordination
Data Fusion
Low Energy Adaptive ClusteringHierarchy
Low Energy Adaptive Clustering
8/2/2019 2_MAC&Net
40/60
1 - LEACH (2)
Main Drawbacks
Hot Spot Problem
(Nodes on a path from an event-congested area to the sink may drain)
Inadequate for Time-Critical
Applications Stationary Sink Maybe Unpractical
Basic Algorithm assumes any node can
communicate with sink limited scale
Low Energy Adaptive ClusteringHierarchy
Low Energy Adaptive Clustering
8/2/2019 2_MAC&Net
41/60
1 - LEACH (3)Main Procedures
Works in Rounds, each withSet-Up (Short) and Steady-State (Long)
Set-Up Phase - subdivided:
Advertisement (I am a Cluster-Head)
Cluster Set-Up (I am in your Cluster)
Schedule Creation (This is your slot)
Steady-State Phase:
Data Transmission using TDMA
Low Energy Adaptive ClusteringHierarchy
Low Energy Adaptive Clustering
8/2/2019 2_MAC&Net
42/60
1 - LEACH (4)
Main Procedures
Everyone uses the same channel
Different clusters use different CDMAcodes
Code chosen in random
Cluster-Head communicate with Sink
Can be extended to Hierarchical
Clustering
Low Energy Adaptive ClusteringHierarchy
Low Energy Adaptive Clustering
8/2/2019 2_MAC&Net
43/60
1 - LEACH (5)
Low Energy Adaptive ClusteringHierarchy
I
llustra
tions
Low Energy Adaptive Clustering
8/2/2019 2_MAC&Net
44/60
1 - LEACH (6)
Low Energy Adaptive ClusteringHierarchy
Illustrations
P Effi i t G th i i S I f ti S t
8/2/2019 2_MAC&Net
45/60
2 - PEGASIS (1)
Protocol Highlights
Token-Passing Chain-Based
Nodes die in random
Stationary Nodes and Sink
Every node have a global networkmap
Data Fusion
Greedy chain construction
Power-Efficient Gathering in Sensor Information Systems
Power Efficient Gathering in Sensor Information Systems
8/2/2019 2_MAC&Net
46/60
2 - PEGASIS (2)
Main Drawbacks
Stationary Nodes
Global Information
Limited Scale:
Information travels many nodes
Assumes any node cancommunicate with sink
Power-Efficient Gathering in Sensor Information Systems
Power Efficient Gathering in Sensor Information Systems
8/2/2019 2_MAC&Net
47/60
2 - PEGASIS (3)
Main Procedures:
Greedy Algorithm Construct Chain
Start at a node far from sink and gathereveryone neighbor by neighbor
Node i (mod N) is the leader in round i
Nodes passes token thru the chain to leaderfrom both sides
Each node fuse its data with the rest
Leader transmit to sink
Power-Efficient Gathering in Sensor Information Systems
Power Efficient Gathering in Sensor Information Systems
8/2/2019 2_MAC&Net
48/60
2 - PEGASIS (4)
Illustrations
Power-Efficient Gathering in Sensor Information Systems
Power Efficient Gathering in Sensor Information Systems
8/2/2019 2_MAC&Net
49/60
2 - PEGASIS (5)
Power-Efficient Gathering in Sensor Information Systems
Il
lustrat
ions Rounds Until Death
Sensor Protocol for Information via
8/2/2019 2_MAC&Net
50/60
3 - SPIN (1)Protocol Highlights
Network-wide Broadcast Limited by
Negotiation and using Local Communication Flooding problems solved:
Implosion same data from many neighbors Detection of overlapping regions Excessive resources consumption (Blindness)
Needs only Localized Information Data Fusion Two main protocols SPIN-PP & SPIN-BC
Sensor Protocol for Information viaNegotiation
Sensor Protocol for Information via
8/2/2019 2_MAC&Net
51/60
3 - SPIN (2)
Main Procedures
Broadcast - Limited Scale
every node handles O(n) messagesData is updated throughout
network unnecessary in manycases
Network lifetime - not clear
High degree nodes = High powerneeds
Sensor Protocol for Information viaNegotiation
Sensor Protocol for Information via
8/2/2019 2_MAC&Net
52/60
3 - SPIN (3)
Main ProceduresSPIN-PP (Point-to-Point Communication)
Data is described by meta-data ADV msg.
Node has data sends ADV to neighbors If neighbor do not have data sends REQ Node responds by sending the DATA
This process continues around the network Nodes may aggregate their data to ADV
In a Lossy Network ADV may be repeatedperiodically and REQ if not answered
Se so otoco o o at o aNegotiation
Sensor Protocol for Information via
8/2/2019 2_MAC&Net
53/60
3 - SPIN (4)
Main Procedures
SPIN-BC (Local Broadcast Communication)
ADV and DATA sending like PP (but in B.C.) Since only one REQ answer is needed, any
node waits a random interval and B.C. REQonly if none was received yet.
The rest like SPIN-PP
Negotiation
Sensor Protocol for Information via
8/2/2019 2_MAC&Net
54/60
ADVNode with data
Node with data advertises to all its neighbors
3 - SPIN (5)
Illustr
ation
s
Negotiation
Sensor Protocol for Information via
8/2/2019 2_MAC&Net
55/60
REQNode with data
Neighbor requests for data and it is sent
Illustr
ation
s
Negotiation
3 - SPIN (5)
Sensor Protocol for Information via
8/2/2019 2_MAC&Net
56/60
DATA Node with data
Node with data advertises to all its neighbors
3 - SPIN (5)
Illustrations
Negotiation
Sensor Protocol for Information via
8/2/2019 2_MAC&Net
57/60
Node with dataADV
Receiving node sends ADV to neighbors
I
llustra
tions
Negotiation
3 - SPIN (5)
Sensor Protocol for Information via
8/2/2019 2_MAC&Net
58/60
Node with data
Receiving neighbors requests for data.
REQ
Illustrat
ions
Negotiation
3 - SPIN (5)
Already
has data
(or dead)
Sensor Protocol for Information via
8/2/2019 2_MAC&Net
59/60
Node with data
DATA
Receiving node sends DATA to neighbors
Illustrations
Negotiation
3 - SPIN (5)
8/2/2019 2_MAC&Net
60/60