MAC Protocols for Energy Conservation in Wireless Sensor Network

Similar documents
AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

Analysis of S-MAC/T-MAC Protocols for Wireless Sensor Networks

Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks

EX-SMAC: An Adaptive Low Latency Energy Efficient MAC Protocol

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2

CSC8223 Wireless Sensor Networks. Chapter 5 Medium Access Control Protocols

Performance Comparison of Two Different Energy Conservation Mac Protocols

Reservation Packet Medium Access Control for Wireless Sensor Networks

A MAC Protocol with Little Idle Listening for Wireless Sensor Networks

SENSOR-MAC CASE STUDY

AMAC: Traffic-Adaptive Sensor Network MAC Protocol through Variable Duty-Cycle Operations

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks

MAC Essentials for Wireless Sensor Networks

COMPARISON OF CSMA BASED MAC PROTOCOLS OF WIRELESS SENSOR NETWORKS

A Survey on Scheduling Algorithms for Wireless Sensor Networks

COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K.

Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

A Survey on Medium Access Control Protocols based on Synchronous Duty Cycle Approach in Wireless Sensor Networks

Latency and Energy Efficient MAC (LEEMAC) Protocol for Event Critical Applications in WSNs

A Qos Based Mac Protocol for Wireless Multimedia Sensor Network

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

S-MAC Protocol for Wireless Sensor Network and Study of related work

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network

Presented by: Murad Kaplan

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS

Channel Adaptive MAC Protocol with Traffic-Aware Distributed Power Management in Wireless Sensor Networks-Some Performance Issues

Time Synchronization in Wireless Sensor Networks: CCTS

Embedded Internet and the Internet of Things WS 12/13

UNIT IV. Data link layer protocols. Prof.Prasad S.Halgaonkar

Wireless Sensor Networks 8th Lecture

Towards a classification of energy aware MAC protocols for wireless sensor networks

MAC LAYER. Murat Demirbas SUNY Buffalo

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

An Energy-Efficient MAC Protocol for Delay-Sensitive Wireless Sensor Networks

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

Embedded Internet and the Internet of Things WS 12/13

Priority-MAC: A Priority based Medium Access Control solution with QoS for WSN

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

A Survey on Underwater Sensor Network Architecture and Protocols

Advanced Networking Technologies

A Medium Access Control Protocol with Adaptive Parent Selection Mechanism for Large-Scale Sensor Networks

AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS

Chapter 3: Medium Access Control in Wireless Sensor Networks

A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK

PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED WIRELESS SENSOR NETWORKS

A Review on Improving Packet Analysis in Wireless Sensor Network using Bit Rate Classifier

CMPE 257: Wireless and Mobile Networking

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Keywords T MAC protocol, reduction function, wsn, contention based mac protocols, energy efficiency; Fig 1. Listen and sleep cycle in S MAC protocol

An adaptive energy-efficient and low-latency MAC for tree-based data gathering in sensor networks

Networking Sensors, I

RT-Link: A global time-synchronized link protocol for sensor networks Anthony Rowe, Rahul Mangharam, Raj Rajkumar

Ad hoc and Sensor Networks Chapter 5: Medium access control protocols

Reducing Inter-cluster TDMA Interference by Adaptive MAC Allocation in Sensor Networks

IRI-MAC: An Improved Receiver Initiated MAC Protocol for Wireless Sensor Network

Energy-Efficient, Application-Aware Medium Access for Sensor Networks

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

A REVIEW ON MAC PROTOCOLS IN WIRELESS BODY AREA NETWORKS

[Kaplieswar*, 5(4): April, 2016] ISSN: (I2OR), Publication Impact Factor: 3.785

CONCLUSIONS AND SCOPE FOR FUTURE WORK

Energy Consumption and Fault Tolerance in the MAC Protocols for WSN

Priority-Based Hybrid MAC for Energy Efficiency in Wireless Sensor Networks

Analysis of Contention Based Medium Access Control Protocols for Wireless Sensor Networks

Optimization of Energy Consumption in Wireless Sensor Networks using Particle Swarm Optimization

An Energy-Efficient MAC using Dynamic Phase Shift for Wireless Sensor Networks

Collision Free and Energy Efficient MAC protocol for Wireless Networks

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN:

WSN Routing Protocols

Subject: Adhoc Networks

Part I. Wireless Communication

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator

Energy Management Issue in Ad Hoc Networks

An Energy-Efficient MAC Protocol to Conserve Energy in Wireless Sensor Networks

Energy-Efficient, Collision-Free Medium Access Control for Wireless Sensor Networks

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

PW-MAC: An Energy-Efficient Predictive-Wakeup MAC Protocol for Wireless Sensor Networks

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

Energy Management Issue in Ad Hoc Networks

Analysis and Comparison of SMAC and TMAC Protocol for Energy Efficient Dynamic Topology in Sensor Network

A-MAC: A MAC Protocol Using Alternative Wakeup Schedules to Achieve Energy Efficiency for Wireless Sensor Networks *

Mobile Agent Driven Time Synchronized Energy Efficient WSN

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

QUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi

Event-driven MAC Protocol For Dual-Radio Cooperation

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

CS 410/510 Sensor Networks Portland State University

MAC in /20/06

IMPACT OF PACKET SIZE ON THE PERFORMANCE OF IEEE FOR WIRELESS SENSOR NETWORK

The MAC layer in wireless networks

A Framework to Minimize Energy Consumption for Wireless Sensor Networks

A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN

Sensor Deployment, Self- Organization, And Localization. Model of Sensor Nodes. Model of Sensor Nodes. WiSe

International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May ISSN

Multiple Access. Data Communications and Networking

INVESTIGATION ON DELAY AND POWER MINIMIZATION IN IEEE PROTOCOL USING CSMA-CA ALGORITHM

Transcription:

IJSTE - International Journal of Science Technology & Engineering Volume 3 Issue 05 November 2016 ISSN (online): 2349-784X MAC Protocols for Energy Conservation in Wireless Sensor Network Samir Kariya Assistant Professor Department of Computer Engineering SPCE Visnagar, Gujarat, India Archana Kurde Lecturer Department of Computer Engineering LDRP-ITR, Gandhinagar, Gujarat, India Abstract The advancement in technology for battlefields, irrigation, hospitals, schools need some improvement in the surveillance of these areas. This task has become feasible after easy availability of low cost hardware that forms a sensor network. In order to cover large areas, large number of sensors is to be deployed; this needs collaboration of sensors with each other. In this paper, MAC protocols to prolong network lifetime are presented along with their classification and comparison are described. Keywords: Data gathering tree, Duty cycle, Idle listening, Overemitting, Overhearing I. INTRODUCTION The sensor networks are getting prominent for the solutions it provides to real life problems. It is capable of measuring vector quantities like temperature and pressure of the area under consideration. The newly formed sensor networks are even more sophisticated, as they are equipped with CMOS cameras and microphones which can capture images of objects lying in front and record the voice. In order to measure these quantities in large areas, quite a high number of sensors are required to be deployed. The paper consists of architecture of sensor network followed by the issues encountered in it and then the existing proposed solutions for conserving energy of the nodes forming the sensor network. Types of Sensor Networks: Based on the number of nodes present in network, amount of data collected and to be transmitted on the network, several types of sensor networks are classified as below. Category 1 WSNs (C1WSNs): The sensor network consists of a forwarding node, which is a wireless router that supports dynamic routing for both the transmissions, namely wired and wireless regions of network. The actual sensors are connected with each other in mesh topology, in which multihop radio connections are used, whereas the actual sensor is utmost at distance of a one hop from the forwarding node. The military systems used for sensing border areas lie under this category [1]. Category 2 WSNs (C2WSNs): The actual nodes are connected to the forwarding nodes through either point-to-point or multipoint links using static routing for transmission. It includes a local control system. The actual terrestrial nodes and the forwarding nodes are connected through a landline or a point-to-point wireless link [1]. Applications of WMSN: The sensor networks are used in wide variety of applications such as video surveillance of any region for criminal activity like theft or violation of traffic rules, advanced parking systems, health care monitoring, environmental monitoring, person location system for searching a person in crowd, monitoring industrial automation system, etc [2]. II. CHALLENGES IN WMSN Strategy to conserve Energy: The general purpose of deploying sensors is to measure certain quantity in a region difficult for a human to reach directly. All such unfavourable locations do not offer any provision for charging the batteries of sensors, thus it becomes necessary for a sensor to conserve energy in order to prolong network life [3]. Deployment and Coverage: The coverage of area under interest depends upon the location of sensor and the number of sensors deployed in the region under consideration. This requires a pre-defined strategy for deployment and estimation of the area to be covered by finite number of sensors. All rights reserved by www.ijste.org 180

Network Architecture: The transmission of information among sensor takes place either periodically or whenever some event of interest occurs. In both the cases large amount of varying data is to be transmitted on the network, for this heterogeneous sensor nodes are introduced in network. Thus the network architecture should make the transmissions reliable, as retransmissions are costlier. Real- Time Transmission: For real time applications such as fire in forest, rescue operation after any natural calamity, etc are very delay intolerant. The available bandwidth is not capable of providing transmission within tight deadlines. Thus reliable transport protocols are required which can enhance life of network. Storage and Search of Information: The sensors are spread in vast region for monitoring, which results into generation of large amount of data. The storage of such a huge data and its searching is an important aspect to be considered for successful implementation of the network. III. ENERGY CONSERVATION USING MAC PROTOCOLS The transmission of a single bit requires energy equivalent to the energy consumed for processing thousands of operations. Thus the conservation of energy requires focusing on networking. An energy specific MAC layer protocol can resolve this problem [4]. Reasons Behind Wastage of Energy: 1) Retransmission of collided packets. 2) Overhearing: A node listening to the transmission intended for its neighbours or some other node in the network. 3) Overhead of control packet: The handshaking process and other synchronization packets needed for smooth transmission of actual data should be as less as possible. 4) Overemitting: Transmission destined for a node which is yet not ready to receive data. Properties of MAC Protocol for Sensor Network: 1) Protocol should be energy efficient to prolong network lifetime. 2) Protocol should be able to handle scalability and any change in topology of network. 3) Latency, throughput and utilization are secondary factors in terms of sensor network. 4) Fairness is not that much emphasized as all the nodes share a common target. Proposed MAC layer protocols: A wide range of energy efficient MAC protocols are described briefly, which are categorized into contention-based, TDMA-based, hybrid, and cross layer MAC protocols according to channel access policy. Sensor-MAC (S-MAC) Protocol: A sleep-listen schedule is followed by all the nodes periodically. Neighbours belonging to same virtual cluster may follow a common schedule which is exchanged at regular interval by SYNC packets sent to immediate neighbours. This duration of sending SYNC packet for a node is termed as Synchronization period. A sample sender-receiver schedule is shown below [5]. The carrier is sensed to avoid collision (represented by CS in below schedule). For unicast packets RTS/CTS is used. Long messages are fragmented in frames to reduce the energy consumed by reducing continuous listening periods. Fig. 1: Packet transmission schedule of S-MAC protocol The messages which are long and follow multihop destination path may suffer from long latency. This delay occurring due to sleep schedules is termed as sleep delay. The overhearing of nodes can be used to devise an adaptive listening technique. If a node overhears the transmission of its neighbour after waking up at the end of its sleep time and discovers that it the next hop for the transmission received by its neighbour, then it is ready to receive the transmission immediately. All rights reserved by www.ijste.org 181

The energy wastage due to idle listening of nodes is reduced due to sleep schedule. The nodes belonging to same virtual cluster share their schedules which reduces time synchronization overhead. If the node is not next hop for the packet received by neighbour then the Adaptive sleep schedule may lead to overhearing or idle listening. WiseMAC: All the nodes transmit on two channels; one is used for data transmission using TDMA and other for control messages using CSMA method. Non-persistent CSMA with preamble sampling is used for idle listening. Every packet transmitted by the node is followed by a preamble. If the node finds the channel busy after waking and samples the medium, the node receives until a packet arrives or the channel becomes idle again. By determining the sleep schedules of the neighbours of transmitting node, the length of preamble is set accordingly. The schedule of all neighbours is maintained by each node. Thus each node schedules its transmissions according to sleep schedule of neighbours so that the sampling of receiving nodes falls in between the preamble prior to data packet. Clock drift between source and destination is to be considered while setting dynamic preamble [6]. The lower bound for preamble length (T p = minimum (destination s sampling period (T w ), clock drift with destination)) Fig. 2: shows improvement in latency and performance of WiseMAC over SMAC. Disadvantage of WiseMAC: The neighbours of sender node have decentralized sleep schedules. Thus the listen schedule of all the nodes is different, and the neighbour of receiving node has to buffer the data packet for receiving node, this will enhance the latency and energy consumption. Due to use of non persistent CSMA for channel access, SMAC will face hidden terminal problem. Traffic-Adaptive MAC Protocol (TRAMA): TRAMA [7] is a TDMA based protocol, developed to reduce the energy consumption of classical TDMA. Time is divided into two categories, random access and scheduled-access periods. It is used to establish a two-hop topology, where channel is accessed based on contention. It is assumed that using the information passed by application layer, the MAC layer can calculate the transmission duration, which is termed as scheduled_interval. At time t, the node will calculate the number of slots having highest priority among the two-hop neighbours within the period [t, t + scheduled_interval]. The node schedules a packet to announce the intended receivers and the slots of these receivers. The schedule packet is a bitmap containing identities of the neighbours; length of bitmap is equal to the number of neighbours. Priority of a node on a slot is calculated with a hash function of node s and slot s identities. The node announces the slots it will use as well as the intended receivers for these slots with a schedule packet. The schedule packet indicates the intended receivers using a bitmap whose length is equal to the number of its neighbours. Bits correspond to one-hop neighbours ordered by their identities. Since the receivers of those messages have the exact list and identities of the one hop neighbours, they find out the intended receiver. Priority of a node on a slot is calculated with a hash function of node s and slot s identities. As compared to CSMA based protocols, higher percentage of sleep time and less collision probability is achieved. Less communication is performed for multicast and broadcast type of communication patterns because of the usage of bitmap for intended receivers. All rights reserved by www.ijste.org 182

The random access period is seven times smaller than transmission slot. For schedule exchanges during random access period, all the nodes are either in receiving or transmitting states. Thus the duty cycle is atleast 12.5% without considering the transmissions and receptions. Every node calculates priority of each of its two-hop neighbour on that slot, for every time slot, as the calculation changes with time, this calculation is to be repeated for each time slot. Sift: It is an event driven protocol. The first of R and N potential reports is very important part of messaging, which is to be relayed with low latency on sensing an event. For picking a slot within the slotted contention window, a non-uniform probability distribution function is used. Each node increases its transmission probability exponentially for the next slot, ff no node starts to transmit in the first slot of the window, assuming that the number of competing nodes is small [8]. Because of many traffic sources, the latency achieved is very low. There is a trade-off between energy consumption and latency. As the latency keeps more importance, slightly increased energy consumption is bearable, which can be tuned for decrementation. Due to listening to all slots before sending, the idle listening is increased. Nodes must listen till the end in order to contend for the next transmission which causes overhearing when there is an ongoing transmission. For slotted contention windows, the time should be synchronized system-wide. This increases the complexity for the protocols not utilizing time synchronization. Distributed MAC (DMAC): The mostly observed communication pattern within sensor networks is Convergecast. The unidirectional paths from source to sink can be represented as data gathering trees. Achieving very low latency along with energy efficiency is the principal aim of DMAC. Based on a data gathering tree, slots are assigned to sets of nodes, this technique is also used in slotted aloha algorithm. Hence, during the receive period of a node, all of its child nodes have transmit periods and contend for the medium [9]. By assigning subsequent slots to the nodes that are successive in the data transmission path, low latency is achieved. As compared to other sleep/listen period assignment methods, DMAC achieves very good latency. Certain scenarios, in which DMAC could be a strong candidate, the latency of network is crucial. When large number of nodes have same schedule, which try to send to same node, collision will occur as collision avoidance methods are not applied. In event-triggered sensor networks, this is a possible scenario. Apart from this, the data gathering tree is restricted as the data transmission paths may not be known in advance. Fig. 3: Sleep Schedule of DMAC Timeout-MAC (T-MAC) / Dynamic Sensor-MAC (DSMAC): High latency and lower throughput is achieved through static sleep-listen periods of S-MAC. The poor results of S-MAC protocol under variable traffic load are improved in Timeout-MAC (T-MAC) protocol [10]. When no activation event has occurred for a time threshold TA, listen period ends. As the nodes closer to the sink must relay more traffic, variable load in sensor networks are expected. The synchronization of the listen periods within virtual clusters is broken, even though under these variable loads T- MAC gives better results. Early sleeping problem occurs due to this. To decrease the latency for delay-sensitive applications, Dynamic Sensor-MAC (DSMAC) adds dynamic duty cycle feature to S-MAC. All nodes share their one-hop latency values and start with the same duty cycle, within the SYNC period. A receiver node All rights reserved by www.ijste.org 183

to shorten its sleep time and announces it within SYNC period, when it notices high value of average one-hop latency. As soon as a sender receives the sleep period decrement signal, it checks the queue for packets destined to that receiver node. When battery level of the sender node is above a specified threshold, if the sleep period decrement signal is received, it doubles its duty cycle. Fig. 4: Sleep Schedule of T-MAC and DSMAC To avoid affecting the schedules of neighbours, the duty cycle is doubled. DSMAC has better latency as compared to S-MAC. Also it has better average power consumption per packet. IV. CONCLUSION Table 1 represents a comparison of MAC protocols investigated. Table 1 Protocol S-MAC / T-MAC / DSMAC Comparison of MAC Protocols Comm. Pattern Time Synch. Needed Type Support Adaptivity to Changes No All CSMA Good WiseMAC No All np-csma Good TRAMA Yes All TDMA / CSMA Good SIFT No All CSMA/CA Good DMAC Yes Convergecast TDMA / Slotted Aloha Weak Indication of the assumption of protocol that the time synchronization is achieved externally is done by the column of Time Synchronization Needed. Ability to handle topology changes is depicted by adaptivity to Changes. Inspite of having various MAC layer protocols, proposed for sensor networks, no protocol is accepted as a standard. One of the reasons behind this is that choice of MAC protocol is application-dependent, thus there will not be one standard MAC protocol for sensor networks. REFERENCES [1] Sohraby, Kazem, Daniel Minoli, and Taieb Znati. Wireless sensor networks: technology, protocols, and applications. John Wiley & Sons, 2007. [2] Akyildiz, Ian F., Tommaso Melodia, and Kaushik R. Chowdhury. "A survey on wireless multimedia sensor networks." Computer networks 51.4 (2007): 921-960. [3] Ren, Xiaoxia, and Zhigang Yang. "Research on the key issue in video sensor network." Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on. Vol. 7. IEEE, 2010. [4] Demirkol, Ilker, Cem Ersoy, and Fatih Alagoz. "MAC protocols for wireless sensor networks: a survey." IEEE Communications Magazine 44.4 (2006): 115-121. [5] Ye, Wei, John Heidemann, and Deborah Estrin. "Medium access control with coordinated adaptive sleeping for wireless sensor networks." IEEE/ACM Transactions on networking 12.3 (2004): 493-506. [6] El-Hoiydi, Amre. "Spatial TDMA and CSMA with preamble sampling for low power ad hoc wireless sensor networks." Computers and Communications, 2002. Proceedings. ISCC 2002. Seventh International Symposium on. IEEE, 2002. [7] Rajendran, Venkatesh, Katia Obraczka, and Jose Joaquin Garcia-Luna-Aceves. "Energy-efficient, collision-free medium access control for wireless sensor networks." Wireless Networks 12.1 (2006): 63-78. [8] Jamieson, Kyle, Hari Balakrishnan, and Y. C. Tay. "Sift: A MAC protocol for event-driven wireless sensor networks." European Workshop on Wireless Sensor Networks. Springer Berlin Heidelberg, 2006. [9] Lu, Gang, Bhaskar Krishnamachari, and Cauligi S. Raghavendra. "An adaptive energy-efficient and low-latency MAC for data gathering in wireless sensor networks." Parallel and Distributed Processing Symposium, 2004. Proceedings. 18th International. IEEE, 2004. [10] Van Dam, Tijs, and Koen Langendoen. "An adaptive energy-efficient MAC protocol for wireless sensor networks." Proceedings of the 1st international conference on Embedded networked sensor systems. ACM, 2003. [11] Lin, Peng, Chunming Qiao, and Xin Wang. "Medium access control with a dynamic duty cycle for sensor networks." Wireless Communications and Networking Conference, 2004. WCNC. 2004 IEEE. Vol. 3. IEEE, 2004. All rights reserved by www.ijste.org 184