Wireless Sensor Networks 7th Lecture

Similar documents
Wireless Sensor Networks 8th Lecture

Advanced Networking Technologies

CSC8223 Wireless Sensor Networks. Chapter 5 Medium Access Control Protocols

EL2745 Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

Ad hoc and Sensor Networks Chapter 5: Medium access control protocols

Principles of Wireless Sensor Networks

Principal options and difficulties

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Aloha and slotted aloha

MAC LAYER. Murat Demirbas SUNY Buffalo

Data Link Layer: Collisions

Computer Networks Chapter 4: Medium Access Control (MAC)

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

ICE 1332/0715 Mobile Computing (Summer, 2008)

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Mobile Communications Chapter 3 : Media Access

Chapter 6 Medium Access Control Protocols and Local Area Networks

ECE 4450:427/527 - Computer Networks Spring 2017

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Wireless Medium Access Control Protocols

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Markov Chains and Multiaccess Protocols: An. Introduction

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

COMP/ELEC 429/556 Introduction to Computer Networks

Data Communications. Automatic Repeat Request Medium Access Control

Medium Access Control

COMMUNICATION NETWORKS NETW 501

Multiple Access. Data Communications and Networking

CSE 6811 Ashikur Rahman

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Chapter 3 MEDIA ACCESS CONTROL

Logical Link Control (LLC) Medium Access Control (MAC)

Exercises of lecture Wireless Sensor Networks Winter 2006/2007 Sheet 4

Packet multiple access and the Aloha protocol

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

Media Access Control. Networked Systems (H) Lecture 5

Rahman 1. Application

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Chapter 1 Basic concepts of wireless data networks (cont d)

ECEN 5032 Data Networks Medium Access Control Sublayer

Chapter 12 Multiple Access 12.1

Multiple-access protocols

Link Layer I: ALOHA, Time-, Frequency-, and Code Division. COS 463: Wireless Networks Lecture 4 Kyle Jamieson

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

SENSOR-MAC CASE STUDY

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Data Link Layer -2- Network Access

Networked Embedded Systems: PHY and MAC

The MAC layer in wireless networks

Multiple Access Protocols

Computer Communication III

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

EE 122: Ethernet and

Protocols for Multiaccess Networks

Data Link Layer -2- Network Access

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

The MAC layer in wireless networks

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

COS 140: Foundations of Computer Science

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

Multiple Access Links and Protocols

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

Random Assignment Protocols

CSMA based Medium Access Control for Wireless Sensor Network

Wireless Sensor Networks

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

CMPE 257: Wireless and Mobile Networking

CSE 461: Wireless Networks

Wireless Communications

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Local Networks. Lecture 4 6-Apr-2016

CSE 461: Multiple Access Networks. This Lecture

CS 3640: Introduction to Networks and Their Applications

TSIN01 Information Networks Lecture 3

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Power Laws in ALOHA Systems

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Multimedia Communication Services Traffic Modeling and Streaming

Contention Protocols and Networks

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

LAN PROTOCOLS. Beulah A AP/CSE

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

EP2210 FEP3210 Performance analysis of Communication networks. Topic 2 Medium access control (or multiple access protocols)

Medium Access Control

Link Layer and Ethernet

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

ECE 158A: Lecture 13. Fall 2015

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Transcription:

Wireless Sensor Networks 7th Lecture 15.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1

Medium Access Control (MAC) Controlling when to send a packet and when to listen for a packet are perhaps the two most important operations in a wireless network Especially, idly waiting wastes huge amounts of energy This chapter discusses schemes for this medium access control that are Suitable to mobile and wireless networks Emphasize energy-efficient operation Wireless Sensor Networks 15.11.2006 Lecture No. 07-2

Overview Principal options and difficulties Contention-based protocols Schedule-based protocols IEEE 802.15.4 Wireless Sensor Networks 15.11.2006 Lecture No. 07-3

Main options Wireless medium access Centralized Distributed Contentionbased Schedulebased Schedulebased Contentionbased Fixed assignment Demand assignment Fixed assignment Demand assignment Wireless Sensor Networks 15.11.2006 Lecture No. 07-4

Principal options and difficulties Medium access in wireless networks is difficult mainly because of Impossible (or very difficult) to send and receive at the same time Interference situation at receiver is what counts for transmission success, but can be very different from what sender can observe High error rates (for signaling packets) compound the issues Requirement As usual: high throughput, low overhead, low error rates, Additionally: energy-efficient, handle switched off devices! Wireless Sensor Networks 15.11.2006 Lecture No. 07-5

Requirements for energyefficient MAC protocols Recall Transmissions are costly Receiving about as expensive as transmitting Idling can be cheaper but is still expensive Energy problems Collisions wasted effort when two packets collide Overhearing waste effort in receiving a packet destined for another node Idle listening sitting idly and trying to receive when nobody is sending Protocol overhead Always nice: Low complexity solution Wireless Sensor Networks 15.11.2006 Lecture No. 07-6

Centralized medium access Idea: Have a central station control when a node may access the medium Example: Polling, centralized computation of TDMA schedules Advantage: Simple, quite efficient (e.g., no collisions), burdens the central station Not directly feasible for non-trivial wireless network sizes But: Can be quite useful when network is somehow divided into smaller groups Clusters, in each cluster medium access can be controlled centrally compare Bluetooth piconets, for example Usually, distributed medium access is considered Wireless Sensor Networks 15.11.2006 Lecture No. 07-7

Schedule- vs. contentionbased MACs Schedule-based MAC A schedule exists, regulating which participant may use which resource at which time (TDMA component) Typical resource: frequency band in a given physical space (with a given code, CDMA) Schedule can be fixed or computed on demand Usually: mixed difference fixed/on demand is one of time scales Usually, collisions, overhearing, idle listening no issues Needed: time synchronization! Contention-based protocols Risk of colliding packets is deliberately taken Hope: coordination overhead can be saved, resulting in overall improved efficiency Mechanisms to handle/reduce probability/impact of collisions required Usually, randomization used somehow Wireless Sensor Networks 15.11.2006 Lecture No. 07-8

Overview Principal options and difficulties Contention-based protocols MACA S-MAC, T-MAC Preamble sampling, B-MAC PAMAS Schedule-based protocols IEEE 802.15.4 Wireless Sensor Networks 15.11.2006 Lecture No. 07-9

ALOHA The simplest possible medium access protocol: Just talk when you feel like it Formally: Whenever a packet should be transmitted, it is transmitted immediately Introduced in 1985 by Abrahmson et al., University of Hawaii Goal: Use of satellite networks Packets are transmitted at arbitrary times Wireless Sensor Networks 15.11.2006 Lecture No. 07-10

ALOHA Analysis ALOHA advantages Trivially simple No coordination between participants necessary ALOHA disadvantages Collisions can and will occur sender does not check channel state Sender has no (immediate) means of learning about the success of its transmission link layer mechanisms (ACKs) are needed ACKs can collide as well Wireless Sensor Networks 15.11.2006 Lecture No. 07-11

ALOHA Performance Assume a Poisson arrival process to describe packet transmissions Infinite number of stations, all behave identically, independently Time between two attempts is exponentially distributed Let G be the mean number of transmission attempts per packet length All packets are of unit time length Then: For a packet transmission to be successful, it must not collide with any other packet How likely is such a collision? Question: How long is a packet vulnerable by other transmissions? Wireless Sensor Networks 15.11.2006 Lecture No. 07-12

ALOHA Performance A packet X is destroyed by another packet either Starting up to one packet time before X Starting up to immediately before the end of X Hence: Packet is successful if there is no additional transmission in two packet times Probability: P 0 = P (1 transmission in two packet times) = 2Ge -2G Throughput S (G) = 1 Packet / 2 time units * Probability = Ge -2G Optimal for G = 0.5! S = 1/(2e) ¼ 0.184 Wireless Sensor Networks 15.11.2006 Lecture No. 07-13

A slight improvement: Slotted ALOHA ALOHA s problem: Long vulnerability period of a packet Reduce it by introducing time slots transmissions may only start at the start of a slot Slot synchronization is assumed to be somehow available Result: Vulnerability period is halved, throughput is doubled S(G) = Ge -G Optimal at G=1, S=1/e Wireless Sensor Networks 15.11.2006 Lecture No. 07-14

Performance dependence on offered load For (slotted) ALOHA, closed form analysis of throughput S as function of G is simple S 1 1 G Ideal! Anything but a high-performance protocol In particular: throughput collapses as load increases! Wireless Sensor Networks 15.11.2006 Lecture No. 07-15

Problems for the MAC- Protocol Hidden Terminal Problem A B C Exposed Terminal Problem A B C D Wireless Sensor Networks 15.11.2006 Lecture No. 07-16

Thank you (and thanks go also to Holger Karl for providing slides) Wireless Sensor Networks Christian Schindelhauer schindel@informatik.uni-freiburg.de 7th Lecture 15.11.2006 17