Medium Access Control in Wireless Networks

Similar documents
Medium Access Control in Wireless Sensor Networks & challenges!

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

Principles of Wireless Sensor Networks

Wireless Sensor Networks

EL2745 Principles of Wireless Sensor Networks

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

CHAPTER 4 CROSS LAYER INTERACTION

MAC LAYER. Murat Demirbas SUNY Buffalo

CSE 461: Wireless Networks

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider

Advanced Networking Technologies

Embedded Internet and the Internet of Things WS 12/13

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Computer Communication III

MAC in /20/06

SENSOR-MAC CASE STUDY

Mohamed Khedr.

Multiple Access Links and Protocols

Data Communications. Data Link Layer Protocols Wireless LANs

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Lecture 16: QoS and "

Topic 02: IEEE

Wireless Sensor Networks

ZigBee/ David Sanchez Sanchez.

MULTIPLE ACCESS PROTOCOLS 2. 1

Communication In Smart Grid -Part3

Medium Access Control in Wireless Sensor Networks

Medium Access Control in Wireless IoT. Davide Quaglia, Damiano Carra

CS 410/510 Sensor Networks Portland State University

Wireless Local Area Networks (WLANs) Part I

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Computer Networks. Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

CS263: Wireless Communications and Sensor Networks

Medium Access Control in Wireless Sensor Networks

Mobile and Sensor Systems

Mohammad Hossein Manshaei 1393

Strengthening Unlicensed Band Wireless Backhaul

Wireless Communications

Advanced Computer Networks WLAN

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

MAC. Fall Data Communications II 1

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Wireless Networked Systems

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Wireless Local Area Networks. Networks: Wireless LANs 1

ICE 1332/0715 Mobile Computing (Summer, 2008)

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Introduction to IEEE

Wireless Sensor Networks 8th Lecture

The MAC layer in wireless networks

CSC8223 Wireless Sensor Networks. Chapter 5 Medium Access Control Protocols

Wireless and Mobile Networks 7-2

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Presented by: Murad Kaplan

Analysis of Hybrid CSMA/CA-TDMA Channel Access Schemes with Application to Wireless Sensor Networks

Logical Link Control (LLC) Medium Access Control (MAC)

Ad hoc and Sensor Networks Chapter 5: Medium access control protocols

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

CSC 4900 Computer Networks: Wireless Networks

Unit 7 Media Access Control (MAC)

Embedded Internet and the Internet of Things WS 12/13

Rahman 1. Application

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea

3.1. Introduction to WLAN IEEE

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

IEEE MAC Sublayer (Based on IEEE )

Department of Electrical and Computer Systems Engineering

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

IEEE Medium Access Control. Medium Access Control

CS 332 Computer Networks Wireless Networks

Networking Sensors, I

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Chapter 6 Wireless and Mobile Networks

Local Area Networks NETW 901

Internet Structure. network edge:

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Lesson 2-3: The IEEE x MAC Layer

MSIT 413: Wireless Technologies Week 8

Chapter 3: Medium Access Control in Wireless Sensor Networks

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

CSE 6811 Ashikur Rahman

The MAC layer in wireless networks

Medium Access Control

Simulation Analysis of IEEE Non-beacon Mode at Varying Data Rates

Introduction to IEEE

Chapter 1 Basic concepts of wireless data networks (cont d)

Transcription:

Medium Access Control in Wireless Networks Prof. Congduc Pham http://www.univ-pau.fr/~cpham Université de Pau, France

MAC layer Routing protocols Medium Acces Control

IEEE 802.X MAC

GSM (2G) Channels Downlink Uplink 8 Time Slots per frame Duration of a TDMA frame = 4.62 ms 7 0 1 2 3 4 5 6 7 0 time

3G and beyond q 3G and beyond use CDMA techniques uplink Voice Data CDMA codes (Walsh) 1 2 3

Bluetooth, 802.15.1 q GFSK q BLUETOOTH 2 q π/4-dqpsk q 8DPSK q Master-slave, Piconet organization q Master will poll slaves for data

Wifi 802.11 Access Point q Uses CSMA/CA, a contentionbased access method

CSMA/CA q Collision Avoidance with RTS/CTS to limit the hidden terminal problem q DCF (Distributed Coordination Function) DIFS SIFS RTS DATA source destination SIFS CTS SIFS ACK Backoff others NAV (RTS) NAV (CTS) NAV (Données) wait random

CSMA/CA in image D i Time slot Successful DIFS Unsuccessful DIFS 0..(W-1) 802.11 mainly runs in infrastructure mode where a base station is the central point of the network DIFS DIFS DATA D j Stop counting if channel becomes busy DIFS DATA

What technology for small devices? q TDMA is possible but wastes a lot of resources, difficult to scale q FDMA is not very flexible for dynamic, spontaneous ad-hoc networks q CDMA is not very suitable for ad-hoc network, without master or base stations q Wifi consumes a lot of energy, but the contention-based access seems the most suitable

IEEE 802.15.4 in ISM 2.4GHz Low-power radio in the 2.4GHz band offering 250kbps throughput at physical layer Power transmission from 1mW to 100mW for range from 100m to about 1km is LOS BPSK, used as physical layer in ZigBee

Review of Medium busy time q Depends on the radio throughput q Examples with a 100-bytes pkt q 100 bytes = 800 bits q Ethernet 10Mbps: 800/10.10 6 =80us q Ethernet 100Mbps: 800/100.10 6 =8us q WIFI 11Mbps: 800/10.10 6 =72us q WIFI 54Mbps: 800/54.10 6 =14.8us q 802.15.4 350kbps: 800/250.10 3 =3.2ms q If 3.2ms is a 10-meter bus q 72us is a 20cm rule! q 14.8us is a 4cm toy car!

Principles q IEEE 802.15.4 MAC q To/From coordinator node q Peer-to-peer q The coordinator mode defines a star tolopogy and severals MAC mechanisms can be used: beacon and non-beacon mode, GTS, q Peer-to-Peer data transfer model allows any node to communicate with other nodes provided that they are in (radio) communication range. Only non-beacon unslotted CSMA/CA is used.

Supported topologies Figure from IEEE document standard on 802.15.4 Figure from IEEE document standard on 802.15.4

Non-beacon unslotted CSMA & CCA From Jennic DIFS DATA 802.15.4 CCA is somehow similar to WIFI DIFS interframe spacing From Jennic

Unslotted CSMA/CA in image q BE=macMinBE=3; <macmaxbe q NB=0; <macmaxcsmabackoff aunitbackoffperiod CCA: RSSI < -95dBm? Di (2BE-1).bp 802.15.4 runs mainly in WSN under the mesh topology where multi-hop routing will forward data to a sink Channel busy (2BE-1).bp DATA BE=BE+1 Dj (2BE-1).bp DATA Digi Xbee 802.15.4 MicaZ CC2420 TelosB CC2420

different from 802.11 CSMA/CA q Compared to IEEE 802.11, IEEE 802.15.4 always implements a backoff timer prior to any transmission and simply increases the backoff timer interval each time the channel is found busy for the same packet, without constantly checking the channel to know when it is going back to idle.

Reasons? q simply increasing the backoff timer interval is less energy consuming than determining the end of the current transmission, especially if the transmission of a packet can take a long time (802.15.4 usually runs at 250kbps while 802.11 runs at 11Mbps and above). q Another reason is because the node and traffic density of IEEE 802.15.4 networks is expected to be much smaller than those of WiFi networks. q 802.15.4 for WSN mainly runs under mesh topology (i.e. P2P and without central coordinator) with a shorter radio range (i.e. low transmit power), therefore the spatial reuse is higher, contributing again to decrease the traffic density at any given point in the network.

Beacon-enabled PAN q q q The standard allows the optional use of a superframe structure. The format of the superframe is defined by the coordinator. The superframe is bounded by network beacons sent by the coordinator (see Figure 4a) and is divided into 16 equally sized slots. Optionally, the superframe can have an active and an inactive portion (see Figure 4b). The beacon frame is transmitted in the first slot of each superframe. If a coordinator does not wish to use a superframe structure, it will turn off the beacon transmissions. Figure and text from IEEE document standard on 802.15.4

Beacons-mode and CAP q The beacons are used to synchronize the attached devices q Beacon-enabled PANs use a slotted CSMA-CA channel access mechanism, where the backoff slots are aligned with the start of the beacon transmission. q Any device wishing to communicate during the contention access period (CAP) between two beacons competes with other devices using a slotted CSMA-CA mechanism. Text from IEEE document standard on 802.15.4

Slotted CSMA In slotted CSMA-CA, two CCAs, each starting at the beginning of a backoff period, have to be performed

Hybrid access q q q For low-latency applications or applications requiring specific data bandwidth, the PAN coordinator may dedicate portions of the active superframe to that application. These portions are called guaranteed time slots (GTSs). The GTSs form the contention-free period (CFP), which always appears at the end of the active superframe starting at a slot boundary immediately following the CAP, as shown in Figure 5. All contention-based transactions is completed before the CFP begins. Also each device transmitting in a GTS ensures that its transaction is complete before the time of the next GTS or the end of the CFP. GTS mode needs a PAN coordinator which will allocate up to 7 GTS slots in the frame. Nodes can reserved a given number of GTS slots to send data to the PAN coordinator, which acts as the sink. Figure and text from IEEE document standard on 802.15.4

Superframe definition q q q The structure of the superframe is described by the values of macbeaconorder and macsuperframeorder. The MAC PIB attribute macbeaconorder, describes the interval at which the coordinator shall transmit its beacon frames. The value of macbeaconorder, BO, and the beacon interval, BI, are related as follows: for 0 BO 14, BI = abasesuperframeduration * 2 BO symbols. PANs that do not wish to use the superframe structure (referred to as a non beacon-enabled PAN) shall set both macbeaconorder and macsuperframeorder to 15. Transmissions use unslotted CSMA/CA and GTSs shall no be permitted. Figure and text from IEEE document standard on 802.15.4

Beacon, Data and ACK frame structure Figure and text from IEEE document standard on 802.15.4

802.15.4 data frame

802.15.4 Reliability q Data frames sent in unicast can required ACKs q ACKs must be sent 192us after frame reception (no CSMA/CA) q At the sender side there are 3 retries if no ACK have been received

802.15.4 MAC is far from perfect q Radio circuits, if always on, can consume all the battery s energy q WSN have a very sporadic behavior: idle for a long period of time, then burst of data q Passive listening, i.e. receiving a packet that is not for you, can consumes as much as energy than packet transmission!

Duty-cycled MAC based on CSMA(/CA), with optional beacons

Principles q q Alternate «listen» and «sleep» periods. In «sleep» period, the radio is shut off to save energy Note: most of duty-cycled MAC means dutycycling the radio module, not the MAC module q Optional beacons can be used as a «preamble» to inform the receiver of imminent data packet arrival. This preamble length should usually be at least longer than the sleep period (cf LPL) listeninterval sleepinterval listen sleep listen sleep listen Radio module cyclelength=listeninterval+sleepinterval listeninterval=dutycycle*cyclelength -> cyclelength=listeninterval/dutycycle sleepinterval=listeninterval/dutycycle-listeninterval -> sleepinterval=listeninterval*(1-dutycycle)/dutycycle

Example with optional beacons Network module If carrier sense == CLEAR, send beacons before DATA CS remainingbeaconstotx=(int)ceil(sleepinterval*beaconintervalfraction/beacontxtime) 0 beaconintervalfraction 1, could improve the way beacons are sent: back-toback, following a given listen TX pattern. MAC module Radio module SENDER beacon beacon beacon beacon sleep beacon DATA sleep listen TXsleep sleep beacon beacon DATA Wireless channel If Otherwise, pending packet resume to the transmit listen/sleep pattern TX If not in TX suspend the duty-cycled behavior, cancel any pending CS Therefore, extending the listen period to get the data. listen RECEIVER Radio module MAC module Network module

Multi-hop is challenging! listen TX sleep listen sleep listen listen sleep listen sleep listen listen sleep listen sleep listen listen sleep listen sleep listen

Synchronized MAC: SMAC, TMAC,...

S-MAC - Sensor MAC q Nodes periodically sleep such as duty-cycled approach q Proposes a synchronization mechanisms between neighboring nodes to leverage the issues related to unsynchronous duty-cycled approaches q Synchronization issues can become tough, nodes can be synchronized to 2 masters

Listen/Sleep Schedule Assignment Choosing Schedule (1) A Listen for SYNC Broadcasts Listen Go to sleep after time t Sleep Synchronizer Listen for a mount of time If hear no SYNC, select its own SYNC Broadcasts its SYNC immediately B t d Broadcasts Listen Go to sleep after time t- t d Sleep Follower Listen for a mount of time Hear SYNC from A, follow A s SYNC Rebroadcasts SYNC after random delay t d 42

Listen/Sleep Schedule Assignment Choosing Schedule (2) A B Listen for SYNC Broadcasts Listen Go to sleep after time t1 Listen t d Sleep Sleep 1. B receives A s schedule and rebroadcast it. 2. Hear different SYNC from C 3. Adapt both schedules Broadcasts Only need to broadcast once C Listen for SYNC Listen Go to sleep after time t2 Sleep Nodes only rarely adopt multiple schedules but 2 schedules is useful to enable data transfers between parts of the network 43

T-MAC - Timeout MAC q Transmit all messages in bursts of variable length and sleep between bursts q Synchronization similar to S- MAC but reduces the listening period if no activity is detected Delayed TX Assume re-tx

Low Power Listening MAC: LPL, BMAC, XMAC,...

Principles q Low Power Listening usually refers to the usage of a preamble to announce an imminent data packet q Can be similar to duty-cycled with beacon packet, but strictly speaking, LPL needs radio capabilities to listen for the preamble with a lower energy consumption q Need to distinguish preamble from noise floor

From R. Kuntz LPL illustrated

B-MAC Berkeley-MAC, based on LPL Improved LPL with Clear Channel Assessment Measures the SNR by taking a moving average when there seems to be no traffic Reduces the number of false negative Known problems Long preamples are constly for the sender High cost of collisions due to long preamples Still the overhearing problem overhearing

Overhearing avoidance qinclude destination address in short preambles qnon-receiver avoids overhearing

Early ACK Receiver acknowledges preamble à Sender stops sending preamble

Lot s of variants!! C. Cano, B. Bellalta, A. Sfairopoulou, M. Oliver. Low energy operation in WSNs: A survey of preamble sampling MAC protocols. Computer Networks, 55(2011). Elsevier

Lot s of variants, con t q Packet-dependent behavior q Duty-cycle length adaptation q Based on traffic load q Based on topology information q Adapted for broadcast traffic q Hash of data in short packets q Identify «best» receiver for early ACK q Combined with synchronized approaches