CS 410/510 Sensor Networks Portland State University
|
|
- Peregrine Butler
- 6 years ago
- Views:
Transcription
1 CS 410/510 Sensor Networks Portland State University Lecture 7 Energy Conservation and Harvesting 2/9/2009 Nirupama Bulusu 1
2 Source Acknowledgements Wei Ye and John Heidemann USC Information Sciences Institute Deborah Estrin Aman Kansal Mani Srivastava 2/9/2009 Nirupama Bulusu 2
3 Energy Conservation 2/9/2009 Nirupama Bulusu 3
4 Characteristics of a Sensor Network A special wireless ad hoc network Large number of nodes Battery powered Topology and density change Nodes for a common task In-network data processing Sensor-net applications Sensor-triggered bursty traffic Can often tolerate some delay Scalability & Self-configuration Energy efficiency Adaptivity Fairness not important Message-level Latency Adaptivity Trade for energy Speed of a moving object places a bound on network reaction time 2/9/2009 Nirupama Bulusu 4
5 Network-level Opportunities for Energy Conservation Radio Transmission Power Control Medium Access Control (MAC) Topology-control Routing 2/9/2009 Nirupama Bulusu 5
6 Radio Transmission Power Control Why adjust transmission power? Guarantee network connectivity Control network density/encourage spatial reuse Minimize transmission power => reduced energy consumption (also due to reduced contention) 2/9/2009 Nirupama Bulusu 6
7 Example Let R = 3r, energy consumption inversely proportional to d 2 Cost of transmitting a-d = 3 (a-b-c-d) R a b c d r 2/9/2009 Nirupama Bulusu 7
8 MAC and Its Classification Medium Access Control (MAC) When and how nodes access the shared channel Classification of MAC protocols Scheduled protocols Schedule nodes onto different sub-channels Examples: TDMA, FDMA, CDMA Contention-based protocols Nodes compete in probabilistic coordination Examples: ALOHA (pure & slotted), CSMA 2/9/2009 Nirupama Bulusu 8
9 MAC Attributes Collision avoidance Basic task of a MAC protocol Energy efficiency Scalability and adaptability Network size, node density and topology change Channel utilization Latency Throughput Fairness Primary Secondary 2/9/2009 Nirupama Bulusu 9
10 Energy Efficiency in MAC Design Energy is primary concern in sensor networks What causes energy waste? Collisions Control packet overhead Overhearing unnecessary traffic Long idle time bursty traffic in sensor-net apps Dominant factor Idle listening consumes % of the power for receiving (Stemm97, Kasten) 2/9/2009 Nirupama Bulusu 10
11 Scheduled Protocols Time Division Multiple Access (TDMA) Advantages No collisions Energy efficient easily support low duty cycles Disadvantages Poor scalability and adaptability Difficult to accommodate node changes Difficult to handle inter-cluster communication Requires strict time synchronization 2/9/2009 Nirupama Bulusu 11
12 Scheduled Protocols Polling A master plus one or more slaves (star topology) The master node decides which slave can send by polling the corresponding slave Only direct communication between the master and a slave A special TDMA without pre-assigned slots Examples IEEE infrastructure mode (CFP) Bluetooth piconets 2/9/2009 Nirupama Bulusu 12
13 Scheduled Protocols Self-Organization by Sohrabi and Pottie Have a pool of independent channels Frequency band or spreading code Potential interfering links select different channels Talk to neighbors in different time slots Sleep in unscheduled time slots Looks like TDMA, but actually FDMA or CDMA Any pair of two nodes can talk at the same time Low bandwidth utilization /9/2009 Nirupama Bulusu 13
14 Scheduled Protocols Bluetooth Target for wireless personal area network (WPAN) Short range, moderate bandwidth, low latency IEEE (MAC + PHY) is based on Bluetooth Nodes are clustered into piconet Each piconet has a master and up to 7 slaves scalability problem The master polls each slave for transmission Frequency-hopping CDMA between clusters Multiple connected piconets form a scatternet Different to handle inter-cluster communications 2/9/2009 Nirupama Bulusu 14
15 Scheduled Protocols Bluetooth (Cont.) How about Bluetooth radio with sensor networks? Scalability is a big problem Lack of multi-hop support No commercial Bluetooth radio supports scatternet so far Use two radios expensive and energy inefficient A node temporarily leave one piconet and joins another high overhead and long delay Connection maintenance is expensive even with a low-duty-cycle mode (Leopold et al.) 2/9/2009 Nirupama Bulusu 15
16 Scheduled Protocols LEACH: Low-Energy Adaptive Clustering Hierarchy by Heinzelman, et al. Similar to Bluetooth CDMA between clusters TDMA within each cluster Static TDMA frame Cluster head rotation Node only talks to cluster head Only cluster head talks to base station (long dist.) The same scalability problem 2/9/2009 Nirupama Bulusu 16
17 Contention-Based Protocols Contention-based protocols CSMA Carrier Sense Multiple Access Listening before transmitting Not enough for multi-hop networks (collision at receiver) a b c Hidden terminal: a is hidden from c s carrier sense CSMA/CA (CA stands for Collision Avoidance) RTS/CTS handshake before send data Other nodes (e.g. node c) backoff 2/9/2009 Nirupama Bulusu 17
18 Contention-Based Protocols Contention-based protocols (contd.) MACA Multiple Access w/ Collision Avoidance Add duration field in RTS/CTS informing other node about their backoff time MACAW improved over MACA RTS/CTS/DATA/ACK Fast error recovery at link layer IEEE Distributed Coordination Function (DCF) Largely based on MACAW 2/9/2009 Nirupama Bulusu 18
19 Contention-Based Protocols IEEE DCF: ad hoc mode Virtual and physical carrier sense (CS) Network allocation vector (NAV), duration field Binary exponential backoff RTS/CTS/DATA/ACK for unicast packets Broadcast packets are directly sent after CS Fragmentation support RTS/CTS reserve time for first (fragment + ACK) First (fragment + ACK) reserve time for second Give up transmission when error happens 2/9/2009 Nirupama Bulusu 19
20 Contention-Based Protocols Tx rate control by Woo and Culler Based on a special network setup A base station tries to collect data equally from all sensors in the network CSMA + adaptive rate control Promote fair bandwidth allocation to all sensors Nodes close to the base station forward more traffic, and have less chances to send their own data Helps in congestion avoidance 2/9/2009 Nirupama Bulusu 20
21 Scheduled vs. Contention Protocols Scheduled Protocols Contention Protocols Collisions No Yes Energy efficiency Scalability and adaptation Multi-hop communication Time synchronization Good Bad Difficult Strict Bad Good Easy Loose or not required 2/9/2009 Nirupama Bulusu 21
22 Energy Efficiency in Contention- Based Protocols Contention-based protocols need to work hard in all directions for energy savings Reduce idle listening support low duty cycle Better collision avoidance Reduce control overhead Avoid unnecessary overhearing 2/9/2009 Nirupama Bulusu 22
23 Energy-Efficient MAC Design PAMAS: Power Aware Multi-Access with Signalling by Singh and Raghavendra Improve energy efficiency from MACA Avoid overhearing by putting node into sleep Use separate control and data channels RTS, CTS, busy tone to avoid collision Probe packets to find neighbors transmission time Increased hardware complexity Two channels need to work simultaneously, meaning two radio systems. 2/9/2009 Nirupama Bulusu 23
24 Energy-Efficient MAC Design Piconet by Bennett, Clarke, et al. Not the same piconet in Bluetooth Low duty-cycle operation energy efficient Sleep for 30s, beacon, and listen for a while Sending node needs to listen for receiver s beacon first, then CSMA before sending data May wait for long time before sending 2/9/2009 Nirupama Bulusu 24
25 Energy-Efficient MAC Design Asynchronous sleeping by Tseng, et al. Extend PS mode to Multi-hops Nodes do not synchronize with each other Designed 3 sleep patterns ensure nodes listen intervals overlap, example: Periodically fully-awake interval: similar to S-MAC Problem on broadcast wake up each neighbor 2/9/2009 Nirupama Bulusu 25
26 Energy-Efficient MAC Design ZigBee Industry standard through application profiles running over IEEE radios Target applications are sensors networks, interactive toys, smart badges, remote controls, and home automation 2/9/2009 Nirupama Bulusu 26
27 Energy-Efficient MAC Design ZigBee (Cont.) Three devices specified Network Coordinator Full Function Device (FFD) Can talk to any device, more computing power Reduced Function Device (RFD) Can only talk to a FFD, simple for energy conservation CSMA/CA with optional ACKs on data packets Optional beacons with superframes Optional guaranteed time slots (GTS), which supports contention-free access 2/9/2009 Nirupama Bulusu 27
28 Energy-Efficient MAC Design ZigBee (Cont.) Low power, low rate (250kbps) at physical layer MAC layer supports low duty cycle operation Target node life time > 1 year 2/9/2009 Nirupama Bulusu 28
29 Case Study: S-MAC S-MAC by Ye, Heidemann and Estrin Tradeoffs Latency Fairness Major components in S-MAC Periodic listen and sleep Collision avoidance Overhearing avoidance Message passing Energy 2/9/2009 Nirupama Bulusu 29
30 Coordinated Sleeping Problem: Idle listening consumes significant energy! Solution: Periodic listen and sleep sleep listen listen sleep Turn off radio when sleeping Reduce duty cycle to ~ 10% (120ms on/1.2s off) Latency Energy 2/9/2009 Nirupama Bulusu 30
31 Coordinated Sleeping Schedules can differ Node 1 Node 2 listen sleep listen sleep listen sleep listen sleep Prefer neighboring nodes have same schedule easy broadcast & low control overhead Schedule 1 Schedule 2 Border nodes: two schedules or broadcast twice 2/9/2009 Nirupama Bulusu 31
32 Coordinated Sleeping Schedule Synchronization New node tries to follow an existing schedule Remember neighbors schedules to know when to send to them Each node broadcasts its schedule every few periods of sleeping and listening Re-sync when receiving a schedule update Periodic neighbor discovery Keep awake in a full sync interval over long periods 2/9/2009 Nirupama Bulusu 32
33 Coordinated Sleeping Adaptive listening Reduce multi-hop latency due to periodic sleep Wake up for a short period of time at end of each transmission RTS CTS CTS listen listen t1 t2 listen Reduce latency by at least half 2/9/2009 Nirupama Bulusu 33
34 Collision Avoidance S-MAC is based on contention Similar to IEEE ad hoc mode (DCF) Physical and virtual carrier sense Randomized backoff time RTS/CTS for hidden terminal problem RTS/CTS/DATA/ACK sequence 2/9/2009 Nirupama Bulusu 34
35 Overhearing Avoidance Problem: Receive packets destined for others Solution: Sleep when neighbors talk Basic idea from PAMAS (Singh, Raghavendra 1998) But we only use in-channel signaling Who should sleep? All immediate neighbors of sender and receiver How long to sleep? The duration field in each packet informs other nodes the sleep interval 2/9/2009 Nirupama Bulusu 35
36 Message Passing Problem: Sensor net in-network processing requires entire message Solution: Don t interleave different messages Long message is fragmented & sent in burst RTS/CTS reserve medium for entire message Fragment-level error recovery ACK extend Tx time and re-transmit immediately Fairness Energy Msg-level latency Other nodes sleep for whole message time 2/9/2009 Nirupama Bulusu 36
37 Implementation Platform Mica Motes (UC Berkeley) 8-bit CPU at 4MHz, 128KB flash, 4KB RAM 20Kbps radio at 433MHz TinyOS: event-driven Configurable S-MAC options Low duty cycle with adaptive listen Low duty cycle without adaptive listen Fully active mode (no periodic sleeping) 2/9/2009 Nirupama Bulusu 37
38 Experiments: Two-hop network Topology, measured energy consumption on source nodes Source 1 Source 2 Sink 1 Sink 2 Energy consumption (mj) S-MAC consumes much less energy than like protocol w/o sleeping At heavy load, overhearing avoidance is the major factor in energy savings At light load, periodic sleeping plays the key role Average energy consumption in the source nodes like protocol without sleep S-MAC w/o adaptive listen Overhearing avoidance Message inter-arrival period (second) 2/9/2009 Nirupama Bulusu 38
39 Energy Consumption over Multi-Hops Ten-hop linear network at different traffic load 3 S-MAC configurations At light traffic load, periodic sleeping has significant energy savings over fully active mode Adaptive listen saves more at heavy load by reducing latency Energy consumption (J) Energy consumption at different traffic load No sleep cycles 10% duty cycle without adaptive listen 10% duty cycle with adaptive listen Message inter-arrival period (S) 2/9/2009 Nirupama Bulusu 39
40 Latency as Hops Increase 12 Adaptive listen significantly reduces latency causes by periodic sleeping Latency under lowest traffic load 12 Latency under highest traffic load Average message latency (S) % duty cycle without adaptive listen 10% duty cycle with adaptive listen Average message latency (S) % duty cycle without adaptive listen 10% duty cycle with adaptive listen No sleep cycles Number of hops No sleep cycles Number of hops 2/9/2009 Nirupama Bulusu 40
41 Throughput as Hops Increase Adaptive listen significantly increases throughput Using less time to pass the same amount of data Effective data throughput (Byte/S) Effective data throughput under highest traffic load No sleep cycles 10% duty cycle with adaptive listen 10% duty cycle without adaptive listen Number of hops 2/9/2009 Nirupama Bulusu 41
42 Combined Energy and Throughput Periodic sleeping provides excellent 3 performance at 2.5 light traffic load No sleep cycles 2 With adaptive listening, S-MAC 1.5 achieves about the 1 10% duty cycle without same performance adaptive listen 0.5 as no-sleep mode 0 at heavy load Energy-time product per byte (J*S/byte) Energy-time cost on passing 1-byte data from source to sink 10% duty cycle with adaptive listen Message inter-arrival period (S) 2/9/2009 Nirupama Bulusu 42
43 #3: Topology Control Between MAC and routing Turn off as many nodes as possible Leave only enough on to keep a connected topology Ensures data can transit through network Topology control vs. MAC Operate at much coarser timescales Cycle radios on the order of minutes rather than seconds 2/9/2009 Nirupama Bulusu 43
44 Examples Geography-based Use physical location to infer network coverage. Divide physical area into grids, select one node per grid. Topology-based Directly measure network connectivity Select node in topology if two of its neighbors cannot talk to each other Energy savings depend on network density Node mobility 2/9/2009 Nirupama Bulusu 44
45 #4: Energy-efficient Routing Minimize energy cost per packet Balance energy consumption in the network. More in next lecture 2/9/2009 Nirupama Bulusu 45
46 Conclusion Energy conservation active area of research Current work Transmission power control MAC protocol design Topology control Routing 2/9/2009 Nirupama Bulusu 46
47 Energy Harvesting 2/9/2009 Nirupama Bulusu 47
48 Sources Chapter 9: Energy Harvesting Aman Kansal and Mani Srivastava Sensor-coordinated actuation for energy harvesting Mohammed Rahimi et al 2/9/2009 Nirupama Bulusu 48
49 Energy harvesting Batteries are too big Batteries do not last forever Methods exist to extract energy from the environment Thermoelectric (DARPA, JPL, Caltech) Micro-hydraulic transducer (DARPA, MIT) Solar cells Bio-fuel (University of Bristol) 2/9/2009 Nirupama Bulusu 49
50 Managing Harvested Energy It is different from battery energy Supply varies with time Need to adapt performance Supply varies with space Different nodes get different energy Need load sharing Supply is repetitive (does not die out) Opportunity to last forever Efficiency Concerns Match load to maximize transfer Supply direct when possible, instead of through battery 2/9/2009 Nirupama Bulusu 50
51 Example Which route to choose? source destination 2/9/2009 Nirupama Bulusu 51
52 Managing Harvested Energy Key issues Use available energy most efficiently Estimate achievable performance level Harvesting Technology Harvesting Circuit Scheduler Deployment Specific Choice Buffering (battery or ultra-capacitor) Consumption Arbitration Tracking availability Performance Scaling Network-wide task scheduling 2/9/2009 Nirupama Bulusu 52
53 Harvesting Circuit System Block Diagram Harvesting device Energy Tracker Consumption Arbiter Recharging circuit E Sub-module Power switching Sensor Node Energy storage Device data Harvesting Aware Power management 2/9/2009 Nirupama Bulusu 53
54 Scheduler Design Problem Existing Approach Kansal s Approach Environmental energy supply is variable Recharge battery and let the load use energy as desired Track environmental availability Supply is independent of demand Battery makes up for discrepancy, node dies when out of battery Scale performance; match availability; last forever 2/9/2009 Nirupama Bulusu 54
55 Source Characterization What is available from the variable environmental source? Leaky bucket like model for bursty energy supply E(t) is a (ρ,σ1,α2) source if for all T: E(t) integral over 0 to T is >= (ρt σ1) <= (ρt + σ2) 2/9/2009 Nirupama Bulusu 55
56 Interesting Questions Given the source parameters: What is the achievable application throughput or latency? Can the system last eternally at required performance level? What additional resources are required, if not? Considering efficiencies of batteries and other power modes, how should the tasks be scheduled? 2/9/2009 Nirupama Bulusu 56
57 Harvesting Theory Theorem: If a system is powered by a (ρ,σ1,σ2) source has energy capacity >= (σ1+ σ2) Operates at a constant power level ρ Then 1. It utilizes the energy source fully 2. Can survive forever 2/9/2009 Nirupama Bulusu 57
58 Performance control Learn energy environment parameters Predict Sustainable Performance level ρ = xp max + (1 x)p sleep Adapt Performance Sleep and active modes Dynamic voltage scaling Radio range control Sub-module power switching 2/9/2009 Nirupama Bulusu 58
59 Multi-server Harvesting How can a distributed system manage the harvested energy to maximize performance of the system as a whole? Energy resources vary across nodes Task-load differs at different nodes Some workload is shareable while some is not Consider one energy intensive task: routing data Determine environmental energy aware communication strategy 2/9/2009 Nirupama Bulusu 59
60 Routing Options Optimal routing is impractical Nodes share state information and coordinate performance adaptation actions Nodes adapt performance locally and routing protocol operates over sleepy nodes 2/9/2009 Nirupama Bulusu 60
61 Practical Networking Method Routing for an event monitoring sensor network Single sink (base station), multiple sources (node monitoring events) Must report event when it occurs; otherwise no data Measure energy and calculate duty-cycle locally Duty cycle determines latency of data relaying Sensor Sleep Timer Event detected Timer expired Sensor Node Snooze: Processor And radio sleeping 2/9/2009 Nirupama Bulusu 61
62 Communication with Sleep Mode Node can wake up if it has data to send How does a sleeping node receive data? 2/9/2009 Nirupama Bulusu 62
63 Routing Tree INIT Base station ACK Protocol Base station sends INIT Receiver sends ACK and forwards INIT Reverse path set up to base station Possibly shortest; but not necessarily lowest latency 2/9/2009 Nirupama Bulusu 63
64 Network-wide Performance Estimate network-wide latency constraint with observed environmental resource Central control over network latency is impractical Sending all latencies to base station reduces scalability Use in-network processing to compute path latency Receive path latencies from children Forward highest plus own latency 2/9/2009 Nirupama Bulusu 64
65 Conclusions Harvesting technologies can enable long system lifetime Proof-of-concept system and algorithms to exploit environmental energy demonstrated Methods are needed to measure and characterize energy sources Battery characterization is not sufficient Distributed methods are required to optimally adapt global performance Schedule tasks appropriately in space and time to enhance performance 2/9/2009 Nirupama Bulusu 65
WIRELESS sensor networking is an emerging technology
USC/ISI TECHNICAL REPORT ISI-TR-567, JANUARY 2003 1 Medium Access Control with Coordinated, Adaptive Sleeping for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin Abstract This paper proposes
More informationSENSOR-MAC CASE STUDY
SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle
More informationMAC in /20/06
MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationSensor Network Protocols
EE360: Lecture 15 Outline Sensor Network Protocols Announcements 2nd paper summary due March 7 Reschedule Wed lecture: 11-12:15? 12-1:15? 5-6:15? Project poster session March 15 5:30pm? Next HW posted
More informationMAC LAYER. Murat Demirbas SUNY Buffalo
MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random
More informationPresented by: Murad Kaplan
Presented by: Murad Kaplan Introduction. Design of SCP-MAC. Lower Bound of Energy Performance with Periodic Traffic. Protocol Implementation. Experimental Evaluation. Related Work. 2 Energy is a critical
More informationMedium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University
More informationEmbedded Internet and the Internet of Things WS 12/13
Embedded Internet and the Internet of Things WS 12/13 4. MAC Protocols Prof. Dr. Mesut Güneş Distributed, embedded Systems (DES) Institute of Computer Science Freie Universität Berlin Prof. Dr. Mesut Güneş
More informationAn Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol
An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,
More informationCSE 461: Wireless Networks
CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More informationIEEE Medium Access Control. Medium Access Control
IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference
More informationData Communications. Data Link Layer Protocols Wireless LANs
Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless
More informationAdvanced Networking Technologies
Advanced Networking Technologies Chapter 4 Medium Access Control Protocols (Acknowledgement: These slides have been prepared by Prof. Dr. Holger Karl) Advanced Networking (SS 16): 04 Medium Access Control
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationMedium Access Control in Wireless Networks
Medium Access Control in Wireless Networks Prof. Congduc Pham http://www.univ-pau.fr/~cpham Université de Pau, France MAC layer Routing protocols Medium Acces Control IEEE 802.X MAC GSM (2G) Channels Downlink
More informationWireless Sensor Networks 8th Lecture
Wireless Sensor Networks 8th Lecture 21.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Media Access Control (MAC) Controlling when to send a packet and when to listen for a packet
More informationAN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS
International Journal on Intelligent Electronic Systems, Vol.3, No.2, July 2009 7 Abstract AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS Lakshmanan M., Noor Mohammed V. 1 E-mail
More informationAnalysis of S-MAC/T-MAC Protocols for Wireless Sensor Networks
Analysis of S-MAC/T-MAC Protocols for Wireless Sensor Networks WOOCHUL LEE*, YUTAE LEE*, SOONGHEE LEE**, DONGIL KIM* *Department of Information and Communications Engineering Dong-Eui University, 996 Eomgwan-no,
More informationPrinciples of Wireless Sensor Networks. Medium Access Control and IEEE
http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 7 Stockholm, November 8, 2011 Medium Access Control and IEEE 802.15.4 Royal Institute of Technology - KTH Stockholm, Sweden e-mail:
More informationWireless Sensor Networks
Wireless Sensor Networks 1 Ch. Steup / J. Kaiser, IVS-EOS Ubiquitous Sensing 2 Ch. Steup / J. Kaiser, IVS-EOS IEEE 802.x Wireless Communication 3 Ch. Steup / J. Kaiser, IVS-EOS Wireless Technology Comparision
More informationComputer Communication III
Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost
More informationWireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1
Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationDelay Analysis of ML-MAC Algorithm For Wireless Sensor Networks
Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Madhusmita Nandi School of Electronics Engineering, KIIT University Bhubaneswar-751024, Odisha, India ABSTRACT The present work is to evaluate
More informationNetworking Sensors, I
Networking Sensors, I Sensing Networking Leonidas Guibas Stanford University Computation CS428 Networking Sensors Networking is a crucial capability for sensor networks -- networking allows: Placement
More informationIntelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang
Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationRahman 1. Application
Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More informationEnergy Efficient MAC Protocols Design for Wireless Sensor Networks
Energy Efficient MAC Protocols Design for Wireless Sensor Networks Francesco Chiti*, Michele Ciabatti*, Giovanni Collodi, Davide Di Palma*, Romano Fantacci *, Antonio Manes *Dipartimento di Elettronica
More informationCS 43: Computer Networks. 27: Media Access Contd. December 3, 2018
CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently
More informationUNIT IV. Data link layer protocols. Prof.Prasad S.Halgaonkar
UNIT IV Data link layer protocols Link Layer Frame synchronization. Data are sent in blocks called frames. The beginning and end of each frame must be recognized. Flow control. The sending station must
More informationPerformance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 3 March 2015, Page No. 10652-10656 Performance and Comparison of Energy Efficient MAC Protocol in Wireless
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area
More informationEL2745 Principles of Wireless Sensor Networks
EL2745 Principles of Wireless Sensor Networks www.kth.se/student/program-kurser/kurshemsidor/kurshemsidor/control/el2745 Lecture 5 Stockholm, February 2, 2012 Carlo Fischione Royal Institute of Technology
More informationMedium Access Control in Wireless Sensor Networks
Medium Access Control in Wireless Sensor Networks Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 1 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired)
More informationAMAC: Traffic-Adaptive Sensor Network MAC Protocol through Variable Duty-Cycle Operations
AMAC: Traffic-Adaptive Sensor Network MAC Protocol through Variable Duty-Cycle Operations Sang Hoon Lee, Joon Ho Park, and Lynn Choi Department of Electronics and Computer Engineering Korea University
More informationMedium Access Control in Wireless IoT. Davide Quaglia, Damiano Carra
Medium Access Control in Wireless IoT Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired) Wireless Assumptions
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationWPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/
WPAN/WBANs: ZigBee Dmitri A. Moltchanov E-mail: dmitri.moltchanov@tut.fi http://www.cs.tut.fi/ kurssit/elt-53306/ IEEE 802.15 WG breakdown; ZigBee Comparison with other technologies; PHY and MAC; Network
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN
More informationLecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University
Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?
More informationCSC8223 Wireless Sensor Networks. Chapter 5 Medium Access Control Protocols
CSC8223 Wireless Sensor Networks Chapter 5 Medium Access Control Protocols Goals of this chapter Controlling when to send a packet and when to listen for a packet are perhaps the two most important operations
More informationMAC protocols. Lecturer: Dmitri A. Moltchanov
MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based
More informationStrengthening Unlicensed Band Wireless Backhaul
be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism
More informationLogical Link Control (LLC) Medium Access Control (MAC)
Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform
More informationMAC Protocols 10/6/2008. References. Medium Access Control (MAC)
MAC Protocols AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE MAC LAYER PROTOCOLS FOR SENSOR NETWORKS AND THEIR BASIC CHARACTERISTICS References H. Karl and A. Willing. Protocols and
More informationPrinciples of Wireless Sensor Networks
Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 5 January 31, 2013 Carlo Fischione Associate Professor of Sensor Networks e-mail: carlofi@kth.se http://www.ee.kth.se/~carlofi/
More informationAd hoc and Sensor Networks Chapter 5: Medium access control protocols
Ad hoc and Sensor Networks Chapter 5: Medium access control protocols Holger Karl, Andreas Willig, "Protocols and Architectures for Wireless Sensor Networks," Wiley 2005 Goals of this chapter Controlling
More informationWireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet
More informationCOMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K.
COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K. Nisha Menon 2 1 Mar Baselios Christian College of Engineering and Technology,
More informationEnergy Management Issue in Ad Hoc Networks
Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management
More informationImproving IEEE Power Saving Mechanism
1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of
More informationWireless Local Area Networks. Networks: Wireless LANs 1
Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application
More informationEnergy Management Issue in Ad Hoc Networks
Wireless Ad Hoc and Sensor Networks (Energy Management) Outline Energy Management Issue in ad hoc networks WS 2009/2010 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management
More informationMobile and Sensor Systems
Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems
More informationWireless Networked Systems
Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)
More informationMULTIPLE ACCESS PROTOCOLS 2. 1
MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up
More informationWireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) Wireless MAC
Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Wireless MAC 2 1 Wireless MAC CSMA as wireless MAC? Hidden and exposed terminal problems make
More informationQoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks
QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks S. Shiney Lillia PG Student, Department of Computer Science and Engineering, National Institute of Technology Puducherry, Puducherry,
More informationAdvanced Computer Networks WLAN
Advanced Computer Networks 263 3501 00 WLAN Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Last week Outlook Medium Access COPE Short Range Wireless Networks:
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link
More informationstandards like IEEE [37], IEEE [38] or IEEE [39] do not consider
Chapter 5 IEEE 802.15.4 5.1 Introduction Wireless Sensor Network(WSN) is resource constrained network developed specially targeting applications having unattended network for long time. Such a network
More informationMajor Design Challenges. Sensor Network Characteristics. Crosslayer Design in Sensor Networks. Energy-Constrained Nodes. Wireless Sensor Networks
EE360: Lecture 14 Outline Sensor Networks Announcements Progress report deadline extended to 3/ (11:59pm) nd paper summary due March 7 (extended) Project poster session March 15 5pm? Overview of sensor
More informationLecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren
Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits
More informationMAC Essentials for Wireless Sensor Networks
MAC Essentials for Wireless Sensor Networks Abdelmalik Bachir, Mischa Dohler, Senior Member, IEEE, Thomas Watteyne, Member, IEEE, and Kin K. Leung, Fellow, IEEE Medium access control Part of the link layer
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 4 1 Announcements Project proposals. Due April 17 th. Submit by e-mail to katia@soe.ucsc.edu.
More informationMessage acknowledgement and an optional beacon. Channel Access is via Carrier Sense Multiple Access with
ZigBee IEEE 802.15.4 Emerging standard for low-power wireless monitoring and control Scale to many devices Long lifetime is important (contrast to Bluetooth) 10-75m range typical Designed for industrial
More informationMedium Access Control in Wireless Sensor Networks
Medium Access Control in Wireless Sensor Networks Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 1 Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired)
More informationWireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs
Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)
More informationMSIT 413: Wireless Technologies Week 8
MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same
More informationCSE 6811 Ashikur Rahman
Data Link layer Application Overview of IEEE 802.11 LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform address recognition and CRC validation.
More informationPower Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol
ARTICLE International Journal of Engineering Business Management Special Issue on Radio Frequency Identification and Wireless Sensor Networks Editor: Cristina Turcu Power Saving MAC Protocols for WSNs
More informationLecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy
Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision
More informationsensors ISSN
Sensors 2010, 10, 2752-2769; doi:10.3390/s100402752 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Article A Time Tree Medium Access Control for Energy Efficiency and Collision Avoidance
More informationWireless Local Area Networks (WLANs) Part I
Wireless Local Area Networks (WLANs) Part I Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationMobile Communications Chapter 7: Wireless LANs
Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.
More informationEmbedded Internet and the Internet of Things WS 12/13
Embedded Internet and the Internet of Things WS 12/13 4. MAC Protocols Prof. Dr. Mesut Güneş Distributed, embedded Systems (DES) Institute of Computer Science Freie Universität Berlin Prof. Dr. Mesut Güneş
More informationCS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017
CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,
More informationMAC protocols for ad hoc networks
MAC protocols for ad hoc networks Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2756/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of
More informationWP-PD Wirepas Mesh Overview
WP-PD-123 - Wirepas Mesh Overview Product Description Version: v1.0a Wirepas Mesh is a de-centralized radio communications protocol for devices. The Wirepas Mesh protocol software can be used in any device,
More informationOutline. MAC (Medium Access Control) General MAC Requirements. Typical MAC protocols. Typical MAC protocols
Outline Medium ccess ontrol With oordinated daptive Sleeping for Wireless Sensor Networks Presented by: rik rooks Introduction to M S-M Overview S-M Evaluation ritique omparison to MW Washington University
More informationLecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15
Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationLecture 8 Wireless Sensor Networks: Overview
Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam
More informationEnergy and Rate based MAC Protocol for Wireless Sensor Networks
Energy and Rate based MAC Protocol for Wireless Sensor Networks Rajgopal Kannan Ram Kalidindi S. S. Iyengar Department of Computer Science Louisiana State University Baton Rouge, LA 70803 Email: rkannan@bit.csc.lsu.edu
More informationCS4516 Advanced Computer Networks. Final Review
Final Review ------------------------------ Final Material Begins Here --------------------------- V. Local Area Networks A. "The Channel Allocation Problem" 1. assumptions B. LAN Performance Notation
More informationIEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall
IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06
More informationCSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology
CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part I Almost all wireless LANs now are IEEE 802.11
More informationEvent-driven MAC Protocol For Dual-Radio Cooperation
Event-driven MAC Protocol For Dual-Radio Cooperation Wireless and Mobile Communications Group (WMC) Department of Telecommunications Faculty of Electrical Engineering, Mathematics and Computer Science
More informationChapter 12 Multiple Access 12.1
Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationEnabling Technologies
Enabling Technologies Part 4 Mobile Ad Hoc Networking Wuhan University Why Enable? Reliable point-to-point communication via media access control (MAC) Challenges in medium share Categories of MAC protocols
More informationCS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - WiFi (contd.); 16 th Aug 2012 Instructor: Sridhar Iyer IIT Bombay Clicker-1: Wireless v/s wired Which of the following differences between Wireless and Wired affect a CSMA-based
More informationMAC. Fall Data Communications II 1
802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions
More information