Principles of Wireless Sensor Networks

Similar documents
EL2745 Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider

CHAPTER 4 CROSS LAYER INTERACTION

Wireless Sensor Networks

Communication In Smart Grid -Part3

Mobile Communications

ZigBee/ David Sanchez Sanchez.

Topic 02: IEEE

Medium Access Control in Wireless Networks

Wireless Sensor Networks

Wireless Sensor Networks 7th Lecture

Advanced Networking Technologies

Introduction to IEEE

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Wireless Sensor Networks 8th Lecture

Outline. TWR Module. Different Wireless Protocols. Section 7. Wireless Communication. Wireless Communication with

Simulation Analysis of IEEE Non-beacon Mode at Varying Data Rates

CSC8223 Wireless Sensor Networks. Chapter 5 Medium Access Control Protocols

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

CS263: Wireless Communications and Sensor Networks

Principles of Wireless Sensor Networks

MAC LAYER. Murat Demirbas SUNY Buffalo

CHAPTER 1 INTRODUCTION

Matteo Petracca Scuola Superiore Sant Anna, Pisa

Fuzzy Duty Cycle Adaption Algorithm for IEEE Star Topology Networks

Ad hoc and Sensor Networks Chapter 5: Medium access control protocols

Wireless Body Area Networks. WiserBAN Smart miniature low-power wireless microsystem for Body Area Networks.

Medium Access Control in Wireless Sensor Networks & challenges!

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Performance Analysis of Beacon Enabled IEEE Using GTS in Zigbee

Technical Report. On the use of the ZigBee protocol for Wireless Sensor Networks. Anneleen Van Nieuwenhuyse Mário Alves Anis Koubâa

CSE 461: Wireless Networks

Standard for wireless sensor networks. Developed and promoted by the ZigBee alliance

Performance Analysis of Guaranteed Time Slots Allocation in IEEE Protocol over Radio

Message acknowledgement and an optional beacon. Channel Access is via Carrier Sense Multiple Access with

Performance Evaluation of IEEE for Low-Rate Wireless Personal Area Networks

Data and Computer Communications. Chapter 13 Wireless LANs

Wireless communication standards: What makes them unattractive for WSN:

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Performance Investigation and Optimization of IEEE for Industrial Wireless Sensor Networks. Presented By: Aniket Shah

Impact of IEEE n Operation on IEEE Operation

Improving IEEE for Low-latency Energy-efficient Industrial Applications

Principles of Wireless Sensor Networks

A Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications 28/05/2012

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Medium Access Control

Overview of the IEEE /4a standards for low data rate Wireless Personal Data Networks

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Lecture 16: QoS and "

Wireless Local Area Networks (WLANs) Part I

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

CS-541 Wireless Sensor Networks

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

IEEE MAC Protocol Study and Improvement

A Comprehensive Simulation Study of Slotted CSMA/CA for IEEE Wireless Sensor Networks

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Radio Networks. Riccardo Cavallari. Radio Networks Office: 3 rd floor, Main Building

ZIGBEE. Erkan Ünal CSE 401 SPECIAL TOPICS IN COMPUTER NETWORKS

SENSOR-MAC CASE STUDY

IEEE : a Federating Communication Protocol for Time-Sensitive Wireless Sensor Networks Anis Koubaa Mário Alves Eduardo Tovar

MAC in /20/06

WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS

Networked Embedded Systems: PHY and MAC

MAC Protocols 10/6/2008. References. Medium Access Control (MAC)

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Chapter 1 Basic concepts of wireless data networks (cont d)

A cluster based interference mitigation scheme for performance enhancement in IEEE

CSMA based Medium Access Control for Wireless Sensor Network

Topics. Introduction Architecture Node Types Network Topologies Traffic Modes Frame Format Applications Conclusion

Zigbee protocol stack overview

Modeling a Beacon Enabled Cluster with Bidirectional Traffic

University of Alberta. Mansoureh Takaffoli. Master of Science. Department of Computing Science

The MAC layer in wireless networks

Energy Efficient Clear Channel Assessment for LR-WPAN

CARRIER SENSE MULTIPLE ACCESS (CSMA):

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS

Computer Communication III

Multiple Access Links and Protocols

ECE 4450:427/527 - Computer Networks Spring 2017

Fig. 1. Superframe structure in IEEE

Exercises of lecture Wireless Sensor Networks Winter 2006/2007 Sheet 4

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

MeshMAC: Enabling Mesh Networking over IEEE through distributed beacon scheduling

IEEE Medium Access Control. Medium Access Control

Does the IEEE MAC Protocol Work Well in Wireless Body Area Networks?

WIRELESS SENSOR NETWORK

Energy and delay trade-off of the GTS allocation mechanism in IEEE for wireless sensor networks

Mohamed Khedr.

Data Communications. Data Link Layer Protocols Wireless LANs

Davide Quaglia Assistant CS depart University of Verona, Italy

Analysis, Simulations and Improvement Proposals of IEEE g-2012

Design and Implementation of a Multi-hop Zigbee Network

Availability and End-to-end Reliability in Low Duty Cycle Multihop Wireless Sensor Networks

Chapter 2 Enhanced Back-Off Technique for IEEE WSN Standard

IEEE MAC Sublayer (Based on IEEE )

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Emad Ebeid Ph.D. CS depart University of Verona, Italy

Transcription:

Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 5 January 31, 2013 Carlo Fischione Associate Professor of Sensor Networks e-mail: carlofi@kth.se http://www.ee.kth.se/~carlofi/ KTH Royal Institute of Technology Stockholm, Sweden

Course content Part 1 Ø Ø Part 2 Ø Ø Ø Ø Part 3 Ø Ø Ø Ø Lec 1: Introduction Lec 2: Programming Lec 3: The wireless channel Lec 4: Physical layer Lec 5: Mac layer Lec 6: Routing Lec 7: Distributed detection Lec 8: Distributed estimation Lec 9: Positioning and localization Lec 10: Time synchronization Part 4 Ø Lec 11: Networked control systems 1 Ø Lec 12: Networked control systems 2 Ø Lec 13: Summary and project presentations

Previous lectures Process Controller Application Presentation Session Transport Routing MAC Phy How information is modulated and transmitted over the wireless channel? What is the successful probability to receive bits?

Today s lecture Process Controller Application Presentation Session Transport Routing MAC Phy When a node gets the right to transmit messages? What it the mechanism to get such a right?

Today s learning goals What is the Medium Access Control (MAC)? What are the options to design MACs? What is the MAC of IEEE 802.15.4?

Outline Definition and classification of MACs TDMA, FDMA, CSMA, ALHOA Hidden and exposed terminals The IEEE 802.15.4 protocol

Medium Access Control - MAC MAC: mechanism for controlling when sending a message (packet) and when listening for a packet MAC is one of the major component for energy expenditure in WSNs Receiving packets is about as expensive as transmitting Idle listening for packets is also expensive Typical power consumption of a node

Problems for MACs 1. Collisions: wasted effort when two packets collide 2. Overhearing: waste effort in receiving a packet destined for another node 3. Idle listening: sitting idly and trying to receive when nobody is sending 4. Protocol overhead a packet

The hidden terminal problem Terminal, another word for node Hidden terminal problem: node A wants to send a packet to B node C wants to send a packet to D A B C D Transmit range: (depends on the channel, transmit power, ) distance past which the SNR is in outage) node A does not hear transmitter C sending packets that can be received by B and D

The exposed terminal problem Transmit range of B Carrier sense range of B Transmit range of C A B C D Carrier sense range: Carrier sense range of C (depends on the channel, transmit power, ) distance within which a transmitter can be heard/sensed at a receiver) Exposed terminal problem: B wants to send packet to A C wants to send packets to D transmitter B hears transmitter C which is not causing collisions at the receiver A. A is not in the transmit range of C transmitter C hears B, but D is not in the transmit range of B

Important MACs for WSNs TDMA Time Division Multiple Access Ø Time is divided into time slots Ø Every node is assigned to transmit at a time slot FDMA Frequency Division Multiple Access Ø As TDMA, but is the carrier frequency to be divided into slots CSMA Carrier Sense Multiple Access Ø A node listens (channel assessment) if the channel if free or busy from other transmissions Ø If free, transmit the packet; if busy, back-off the transmission ALHOA Ø If a node has a packet, it draws a random variable and transmits according to the outcome Schedule based MAC Contention based MAC

TDMA A central node decides the TDMA schedules simple and no packet collisions burdens the central station not feasible for large networks TDMA is useful when network is divided into smaller clusters In each cluster, MAC can be controlled at local head

Slotted ALHOA number of nodes attempting to transmit Node id Time slots The slotted ALHOA works on top of TDMA Nodes are synchronized p( probability that a node can transmit a packet Probability of successful packet transmission Probability that a slot is taken p(1 p) n 1

Schedule and contention-based MACs Schedule-based MACs (TDMA, FDMA) Ø A schedule regulates which node may use which slot at which time Ø Schedule can be fixed or computed on demand Ø Collisions, overhearing, idle listening no issues Ø Time synchronization needed Contention-based MACs (CSMA, ALHOA) Ø Based on random access Ø Risk of packet collisions Ø Mechanisms to handle/reduce probability/impact of collisions required

More in general Wireless medium access Centralized Distributed Schedulebased Contentionbased Schedulebased Contentionbased Fixed assignment Demand assignment Fixed assignment Demand assignment

Outline Definition and classification of MACs The IEEE 802.15.4 protocol Introduction Physical layer MAC layer

IEEE 802.15.4 protocol architecture Now we study the MAC of the standard IEEE 802.15.4 IEEE 802.15.4 is the de-facto reference standard for low data rate and low power WSNs Characteristics: Ø low data rate for ad hoc self-organizing network of inexpensive fixed, portable and moving devices Ø high network flexibility Ø very low power consumption Ø low cost

The IEEE 802.15.4 protocol Application Presentation Session Transport IEEE 802.15.4 specifies two layers Ø Physical layer 2.4Ghz global, 250Kbps 915MHz America, 40Kbps 868MHz Europe, 20Kbps Ø Medium Access Control (MAC) layer Routing MAC Phy IEEE 802.15.5 does not specify the routing

IEEE 802.15.4 networks IEEE 802.15.4 network composed of Ø full-function device (FFD) Ø reduced-function device (RFD). A network includes at least one FFD The FFD can operate in three modes: Ø a personal area network (PAN) coordinator Ø a coordinator Ø a device An FFD can talk to RFDs or FFDs RFD can only talk to an FFD

IEEE 802.15.4 network topologies 3 types of topologies Ø star topology Ø peer-to-peer topology Ø cluster tree

Cluster-tree topology

IEEE 802.15.4 physical layer Frequency bands: 2.4-2.4835GHz GHz, global, 16 channels, 250Kbps 902.0-928.0MHz, America, 10 channels, 40Kbps 868-868.6MHz, Europe, 1 channel, 20Kbps Features of the PHY layer Ø activation and deactivation of the radio transceiver Ø transmitting and receiving packets across the wireless channel Ø energy detection (ED, from RSS) Ø link quality indication (LQI) Ø clear channel assessment (CCA) Ø dynamic channel selection by a scanning a list of channels in search of beacon, ED, LQI, and channel switching

IEEE 802.15.4 physical layer

Physical layer data unit SFD indicates the end of the SHR and the start of the packet data PHR: PHY header PHY payload < 128 byte

IEEE 802.15.4 MAC The MAC provides two services: Ø data service Ø management service MAC features: beacon management, channel access, GTS management, frame validation, acknowledged frame delivery, association and disassociation.

Superframes Superframe structure: Ø format defined by the PAN coordinator Ø bounded by network beacons Ø divided into 16 equally sized slots Beacons Ø synchronize the attached nodes, identify the PAN and describe the structure of superframes Ø sent in the first slot of each superframe Ø turned off if a coordinator does not use the superframe structure Superframe portions: active and an inactive Ø inactive portion: a node does not interact with its PAN and may enter a low-power mode Ø active portion: contention access period (CAP) and contention free period (CFP) Ø Any device wishing to communicate during the CAP competes with other devices using a slotted CSMA/CA mechanism Ø The CFP contains guaranteed time slots (GTSs).

IEEE 802.15.4 CSMA/CA A Carrier Sense Multiple Access/ Collision Avoidance (CSMA/CA) algorithm is implemented at the MAC layer If a superframe structure is used in the PAN, then slotted CSMA-CA is used in the CAP period If beacons are not used in the PAN or a beacon cannot be located in a beacon-enabled network, unslotted CSMA-CA is used

CSMA/CA Each device has 3 variables: NB, CW and BE. NB: number of times the CSMA/CA algorithm was required to backoff while attempting the current transmission. Ø It is initialized to 0 before every new transmission. BE: backoff exponent Ø how many backoff periods a device shall wait before attempting to assess the channel. CW: contention window length (used for slotted CSMA/CA), Ø Is the number of backoff periods that need to be clear of activity before the transmission can start. Ø It is initialized to 2 before each transmission attempt and reset to 2 each time the channel is assessed to be busy.

CSMA/CA Flow diagram to transmit a packet with CSMA/CA in the modalities slotted (left, also called beacon modality) and unslotted (right, also called beaconless modality) s

Guarantee Time Slot, GTS The GTSs always appears at the end of the active superframe starting at a slot boundary immediately following the CAP. The PAN coordinator may allocate up to 7 GTSs. A GTS can occupy more than one slot period. SO <15. If SO=15, the superframe will not be active anymore after the beacon BO < 15. If BO=15, the superframe is ignored

GTS A GTS allows a device to operate within a portion of the superframe that is dedicated exclusively to it A device attempts to allocate and use a GTS only if it is tracking the beacons GTS allocation: Ø undertaken by the PAN coordinator only Ø a GTS is used only for communications between the PAN coordinator and a device Ø the GTS direction is specified as either transmit or receive Ø a single GTS can extend over one or more superframe slots

Uplink MAC: beacon and non beacon-enabled Communication to a coordinator in a beacon-enabled network Communication to a coordinator in non-beacon-enabled network

Downlink MAC: Beacon and nonbeacon-enabled From a coordinator in a beacon-enabled PAN From a coordinator in a nonbeacon-enabled PAN

Conclusions Application Presentation Session Transport Routing MAC Phy We have seen a MAC classification, Ø TDMA, ALHOA, CSMA Seen in detail the most popular protocol for WSNs, IEEE 802.15.4 Identifying interdependencies between MAC protocol and other layers/applications is difficult Ø Which is the best MAC for which application? Ø Need of a MAC engine that optimally selects the best MAC for given conditions

Next lecture Now that we know how nodes get the right to access the wireless medium, we would like to see how a message is routed over possible paths Routing protocols How a node decides to route a packet? What are the mechanisms to get such a decision?