Medium Access Control Protocols for Wireless Sensor Networks: Design Space, Challenges, and Future Directions

Similar documents
Advanced Networking Technologies

SENSOR-MAC CASE STUDY

Presented by: Murad Kaplan

MAC LAYER. Murat Demirbas SUNY Buffalo

Embedded Internet and the Internet of Things WS 12/13

MAC Essentials for Wireless Sensor Networks

WSN Routing Protocols

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CSC8223 Wireless Sensor Networks. Chapter 5 Medium Access Control Protocols

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

CSMA based Medium Access Control for Wireless Sensor Network

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks

Wireless Sensor Networks 8th Lecture

UNIT IV. Data link layer protocols. Prof.Prasad S.Halgaonkar

Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

Energy Management Issue in Ad Hoc Networks

Medium Access Control in Wireless Sensor Networks

Ad hoc and Sensor Networks Chapter 5: Medium access control protocols

Energy Management Issue in Ad Hoc Networks

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Medium Access Control in Wireless Sensor Networks

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Medium Access Control in Wireless IoT. Davide Quaglia, Damiano Carra

MAC in /20/06

Ferry Route Design with MAC Protocol in Delay Tolerant Networks

AMAC: Traffic-Adaptive Sensor Network MAC Protocol through Variable Duty-Cycle Operations

Local Area Networks NETW 901

Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired

RT-Link: A global time-synchronized link protocol for sensor networks Anthony Rowe, Rahul Mangharam, Raj Rajkumar

CMPE 257: Wireless and Mobile Networking

The MAC layer in wireless networks

Wireless MACs: MACAW/802.11

Wireless Medium Access Control Protocols

CMPE 257: Wireless and Mobile Networking

Subject: Adhoc Networks

Multiple Access Links and Protocols

Embedded Internet and the Internet of Things WS 12/13

WP-PD Wirepas Mesh Overview

COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K.

Energy Efficient MAC Protocols Design for Wireless Sensor Networks

Wireless Sensor Networks CS742

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

Chapter 3: Medium Access Control in Wireless Sensor Networks

Lecture 9. Quality of Service in ad hoc wireless networks

Event-driven MAC Protocol For Dual-Radio Cooperation

Medium Access Control in Wireless Networks

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network

Towards a classification of energy aware MAC protocols for wireless sensor networks

Routing protocols in WSN

MAC protocols. Lecturer: Dmitri A. Moltchanov

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS

EL2745 Principles of Wireless Sensor Networks

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

WIRELESS sensor networking is an emerging technology

Data Communications. Data Link Layer Protocols Wireless LANs

15-441: Computer Networking. Wireless Networking

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

MAC Protocols 10/6/2008. References. Medium Access Control (MAC)

Computational Model for Energy Aware TDMA-based MAC Protocol for Wireless Sensor Network System

Lesson 2-3: The IEEE x MAC Layer

The MAC layer in wireless networks

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks

Wireless Communications

Time Synchronization in Wireless Sensor Networks: CCTS

CMPE 257: Wireless and Mobile Networking

CHAPTER 4 CROSS LAYER INTERACTION

International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May ISSN

Computer Communication III

Reservation Packet Medium Access Control for Wireless Sensor Networks

Reduced-Frame TDMA Protocols for Wireless Sensor Networks

Message acknowledgement and an optional beacon. Channel Access is via Carrier Sense Multiple Access with

CSE 461: Wireless Networks

Impact of IEEE n Operation on IEEE Operation

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Lecture 16: QoS and "

CS 410/510 Sensor Networks Portland State University

MULTIPLE ACCESS PROTOCOLS 2. 1

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Real-Time (Paradigms) (47)

Principles of Wireless Sensor Networks

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

CHAPTER 5 PROPAGATION DELAY

Sensor Network Protocols

By Ambuj Varshney & Akshat Logar

Chapter 12 Multiple Access 12.1

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

MAC protocols for ad hoc networks

Data and Computer Communications. Chapter 13 Wireless LANs

Link Estimation and Tree Routing

Department of Electrical and Computer Systems Engineering

Multiple Access Protocols

ABSTRACT. Physical Implementation of Synchronous Duty-Cycling MAC Protocols: Experiences and Evaluation. Wei-Cheng Xiao

Transcription:

Medium Access Control Protocols for Wireless Sensor Networks: Design Space, Challenges, and Future Directions Pardeep Kumar and Mesut Güneş Institute of Computer Science Freie Universität Berlin, Germany {pardeep.kumar, mesut.guenes}@fu-berlin.de ABSTRACT This chapter provides an overall understanding of the design aspects of Medium Access Control (MAC) protocols for Wireless Sensor Networks (WSNs). A MAC protocol shares the wireless broadcast medium among sensor nodes and creates a basic network infrastructure for them to communicate with each other. It also has a direct influence on the network lifetime of WSNs as it controls the activities of radio, which is the most power-consuming component of resource-scarce sensor nodes. In this chapter, we first discuss the basics of MAC design for WSNs and present a set of important MAC attributes. Subsequently, we discuss the main categories of MAC protocols proposed for WSNs and highlight their strong and weak points. After briefly outlining different MAC protocols falling in each category, we provide a substantial comparison of these protocols for several parameters. Lastly, we discuss future research directions on open issues in this field that have mostly been overlooked. INTRODUCTION........................................ 1 MAC BASICS FOR WSNs................................... 3 MAC Services........................................ 3 MAC Challenges...................................... 4 Common MAC Approaches................................ 5 CLASSIFICATION OF MAC PROTOCOLS......................... 8 Contention Based MAC Protocols............................ 8 Scheduling Based MAC Protocols............................. 12 Channel Polling Based MAC Protocols.......................... 14 Hybrid MAC Protocols................................... 17 Comparison of Different MAC Protocols......................... 20 FUTURE RESEARCH DIRECTIONS............................. 21 CONCLUSION.......................................... 22 REFERENCES.......................................... 22 INTRODUCTION The pervasiveness, self-autonomy, and self-organization of low-cost, low-power, long-lived, and small-sized WSNs [1 6] have brought a new perspective to the world of wireless communication. This domain is destined to play a vital role to our future ubiquitous world as it extends the reach of cyberspace into physical and biological systems. Coupled with sensing, computation, and communication into a single tiny device, WSNs are emerging as an ideal candidate for several 1

2 daily-life applications, especially in monitoring and controlling domains. The demands placed on such type of networks are expending exponentially with the increase in their dimensions. The development of new hardware, software, and communication technology and continuous refinements of current approaches is also pushing this domain even further. Besides the development of new algorithms and protocols, many commercial hardware vendors are also engaged designing novel and efficient architectures for sensor nodes (The terms sensor node, node, wireless node, mote, and smart dust are used somewhat interchangeably). Figure 1 shows some of the sensor nodes used for deployment, experiment, and evaluation of different WSN related applications, whereas Table 1 gives hardware details in terms of microcontroller, radio chip, and memory available to these platforms. (a) Tmote Sky (b) MSB-A2 (c) Imote-2 Figure 1: Some of the common sensor platforms used by industrial and research organizations for several WSN related applications and testbeds. They differ from each other in processing, storage, and communication capabilities and are suitable for an application or the other. Tmote Sky MSB-A2 Imote-2 CPU TI MSP430 NXP LPC2387 PXA271 XScale Speed 8 MHz upto 72 MHz 13-416 MHz Radio Chipcon CC2420 Chipcon CC1100 Chipcon CC2420 Frequency 2.4 GHz 315/433/868/915 MHz 2.4 GHz Data Rate 250 kbps upto 500 kbps 250 kbps RX Current 18.8 ma 15.6 ma 18.8 ma TX Current 17.4 ma 28.8 ma 17.4 ma Modulation DSSS 2-FSK/GFSK/MSK/OOK/ASK DSSS Output Power +0 dbm +10 dbm +0 dbm Memory RAM 10 KB 98 KB 32 MB Flash 48 KB 512 KB 32 MB Table 1: Detailed hardware specifications of the WSN platforms shown in Figure 1. However, all these unique characteristics along with their limited resources have made WSNs challenging networks. Integrating sensing, processing, and communication functionalities into a sensor node has added a lot of complexities. Moving from sensors with only few hours of life time to one with many years of life time demands several iterations of energy efficient techniques. Shrinking the size of nodes requires small size transceivers. Mapping the overall system requirements down to individual device capabilities is not an easy task. Moreover, the direct interaction with the real world requires WSNs to respond accordingly. As a result, a detailed understanding of capabilities, requirements, constraints, and limitations of WSNs is required.

3 MAC BASICS FOR WSNs The MAC sublayer is the part of the data link layer specified in the communication protocol stack shown in Figure 2. It provides channel access mechanisms to several medium-sharing devices. On a wireless medium, which is broadcast in nature, when one device transmits, every other device in the transmission range receives its transmission. This could lead to an interference and collision of the frames when a transmission from two or more devices arrives at one point simultaneously. The nodes of WSNs also share a wireless medium and communicate with each other usually via multi-hop paths in a scattered, dense, and rough sensor field. A MAC protocol manages the shared-medium and creates a basic network infrastructure for nodes to communicate with each other. Thus it provides a self-organizing capability to the nodes and tries to enforce the singularity in the network by letting the sender and receiver communicate with each other in a collision-free fashion. Moreover, the typical requirement to increase lifetime of a WSN without the need of any power replacement and/or human interaction has prompted the development of novel protocols in all layers of the communication stack. However, prime gains can be achieved at the data link layer, where a MAC protocol directly controls the activities of radio, which is the most power-consuming component of resource-scarce sensor nodes. In brief, a MAC protocol for WSNs specifies how nodes employ radio, share the channel, avoid collision in correlated environments, response the inquirer timely, and survive for a long period. User Application layer Transport layer Network layer LLC Sublayer Data link layer MAC Sublayer Physical layer Physical medium Figure 2: The communication protocol stack. This five-layered simplified model is commonly applied to network research as apposite to the seven-layered OSI model. An end-user can use application- or task-specific software/algorithms at the application layer. The transport layer helps maintaining the sensor data flow. The network layer routes that data on an appropriate path. The Logical Link Control (LLC) sublayer of the data link layer provides framing, flow control, error control, and link management facilities, whereas the MAC sublayer shares the wireless medium and helps in energy aware operations for the nodes. The physical layer takes care of the radio, modulation, transmission, and reception of bits on a physical medium. MAC Services In general, the fundamental task of any MAC protocol is to regulate the fair access of nodes to a shared medium in an efficient way in order to achieve good individual throughput and better channel utilization [7]. However, dense deployment of nodes, collaboration among nodes rather than competition, dispersed applications, often decentralized control, and volatile communication links make WSNs quite a different type of networks. The responsibilities of a MAC protocol for

4 WSNs therefore differ considerably as of the other wired or wireless networks. On one hand, some relaxations may be granted to a MAC protocol for WSNs. For example, nodes in WSNs usually send very small frames and use the channel occasionally, either periodically or whenever an important event occurs. As a result, fairness is not as important as in other networks. In WSNs nodes remain idle or in sleep mode most of the time and rarely compete for the channel. Achieving good channel utilization is usually not considered as an important metric. The data flow in WSNs is usually unidirectional, i.e., from nodes to the sink and end-users generally focus on the collective information. On the other hand, a MAC protocol for WSNs has some extra responsibilities to deal with as well. First and foremost is the issue of energy conservation. In addition to that and as per application requirements, provision of timeliness, reliability, scalability, and non-synchronized operations may also play an important role in designing a MAC protocol for WSNs. Additionally, an ideal MAC protocol ensures self-stabilization, graceful adaptation to topology and traffic changes, an acceptable delivery ratio, low overhead, and low error rates for a WSN. MAC Challenges Factors like energy constraints, low transmission ranges, compact hardware, event- or task-based network behavior, self-configuration, and high redundancy make the MAC design for WSNs a complex task and force researchers to develop peculiar MAC protocols which are not common with traditional wireless networks. Additionally, by virtue of a wireless broadcast medium, WSNs inherit all the well-known problems of wireless communication and radio propagation in the shape of interference, fading, path loss, attenuations, noise, and high error-rates [8, 9]. As a MAC protocol sits directly above the physical (PHY) layer, therefore is directly influenced by all these effects. Consequently, designing a MAC protocol for WSNs involves a trade-off among several and often contradictory factors. Evidently, a lot of research work related to the MAC designing for WSNs revolves around energy efficiency. Other goals like latency, packet delivery ratio, adaptation to traffic conditions, and scalability are often traded-off for energy conservation. A MAC protocol has to mainly address the following sources of energy waste [10]. Idle listening: Since a node in WSNs does not know when it will receive a message, it keeps its radio in ready-to-receive mode, which consumes almost as much energy as in receive mode. In low traffic applications, this is usually a major source of energy waste. Collisions: A collision is a wasted effort when two frames collide and are discarded. A collision usually results in retransmission and drains more energy in transmitting and receiving extra packets. Overhearing: An overhearing occurs on the shared-medium when a node receives and processes a gratuitous packet that is not addressed for it. In heavy traffic situations, this could lead to a serious problem. Control packet overhead: An increase in the number and size of control packets results in overhead and energy waste for WSNs, especially when only a few bytes of real data are transmitted in each message. Such control signals also decrease the channel capacity. Over-emitting: An over-emitting or a deafness occurs due to the transmission of a message when the destination node is not ready to receive it.

5 Complexity: Computationally expensive algorithms and protocols increase the system complexity which, in result, may cause overhead and consume more energy. Duty cycling, which is discussed in the next section, is widely considered as the powerful mean to cope with most of the energy related issues in WSNs. However, this duty cycling results in high latency and low throughput and a deep consideration is required to select a proper duty cycle value. Along with energy efficiency, several applications of WSNs may need delay bound operations. However, unlike traditional distributed systems, the timeliness guarantee for WSNs is more challenging. They interact directly with the real world, where the physical events occur in an unpredictable manner with different traffic and delay requirements. Duty cycling, dynamic topology, and limited memory and computation power also restrict the design space we could trade off. As a result, many existing architectures and protocols for traditional wireless networks such as IEEE 802.11 and Bluetooth are not suitable for WSNs as they usually target higher data rates with less emphasis on energy issues. Therefore, novel MAC approaches supporting special requirements of these challenging networks are being developed. Common MAC Approaches There is not any generic best MAC protocol for WSNs; the design choice mainly depends on the nature of the application. The stringent design requirements of a MAC protocol for WSNs can be met by a plethora of approaches. The most widely used approaches in designing such MAC protocols with their implications are outlined below. Duty cycling: Though the application domain of WSNs is diverse and broad, environmental monitoring and surveillance have been the most visible applications of WSNs. The data traffic generated and processed by sensor nodes in such applications can be distinguished in two different classes; periodic traffic and event-based traffic. The periodic traffic class senses the environment usually at a regular interval and collects the information about temperature, air pressure, humidity, and/or light values of a physical object and report to the sink node [11 13]. In event-based traffic class, nodes do not follow a periodic monitoring mechanism, but report the sink node or sound an alarm when something significant occurs in the sensor field [14 16]. Nodes in this class remain idle most of the time but usually generate a burst of packets during that short time period when an event occurs. A WSN generally generates much less data traffic and sends very small data frames as compared to traditional wireless or wired networks. The sensor nodes therefore remain idle most of the time either waiting for their periodic turn to generate data or listening the idle channel for something to occur. Since the radio consumes as much energy during idle listening as in receiving data packets, switching it in low-power sleep mode and waking up shortly at a periodic interval can significantly conserve the energy of nodes. All these facts are sketched down in Figure 3 where a node periodically switches its radio between sleep and listen periods rather than constantly listening the idle channel. It turns to sleep mode for a sleep period t S and wakes up and checks the medium for a short listen period t L. The sum of the sleep period and the listen period is called a wake-up period t W, whereas the ratio of the listen period to the wake-up period t L /t W is called the duty cycle of a node. Though duty cycling significantly increases system lifetime of a dense WSN by reducing idlelistening and over-hearing, it has other implications too. The transceiver is usually kept in sleep mode most of the time which could end up in significant competition among neighbors at wake-up periods. This could ultimately lead to collisions, low throughput, and high latency specially in heavy load situations. The important question which arises here is to select an optimal value of duty cycle for an application. Choosing a long sleep period induces a significant per-hop latency, since a sending node has to wait an average of half a sleep period before the receiver can accept

6 Classical Traffic WSN Event Based Traffic Idle listening WSN Periodic Traffic Idle listening WSN Duty Cycling Sleeping t L t S t W Figure 3: Duty cycling in WSNs. Nodes in WSNs usually generate/process data at a very low rate as compared to other traditional networks. They use the channel occasionally, either periodically or whenever an important event occurs. Therefore, in order to reduce idle listening and overhearing, nodes perform duty cycling, remain in sleep mode most of the time, and wake up shortly to sense the channel. packets. Too short sleep phases, i.e., more frequent switching of radio between on and off modes also outweighs the benefits of duty cycling. Hence, the optimal selection of duty cycle value is a critical step towards achieving the desired system performance. Timeliness: While designing a MAC protocol for WSNs the timeliness factor is often ignored by researchers. With ever increasing applications of WSNs in many diverse fields, new concepts for offering timeliness related Quality of Service (QoS) are inevitable. Generally, timeliness related applications can be categorized into Hard Real-Time (HRT) and Soft Real-Time (SRT) based applications [17]. A deterministic end-to-end delay is required in HRT applications where a strict deadline is applied on the arrival of messages. Alternatively, a tolerable and probabilistic delay guarantee is supported in SRT applications. Limited resources, low node reliability, dynamic network topology, and direct interaction with the physical world makes HRT very difficult in WSNs. With a time scheduling mechanism, which is discussed later, a bounded and predictable delay in WSNs can be achieved. However, even in that case, along with other implications, the average queuing and access delay is much higher as a node has to wait for its allocated slot before accessing the medium. As a result, the probabilistic based SRT guarantee in many applications of WSNs is mostly permissible. Channel access methods: Acquiring and releasing the channel is the core in the design of any MAC protocol and in a dense and energy-limited WSNs its importance increases even more. Several channel access methods proposed in the literature are elaborated in the next section. Topology control: The goal of topology control is to build a reduced topology by dynamically changing transmitting range of nodes in order to save energy and preserve important network characteristics, such as connectivity and coverage [18]. Since transceivers are one of the primary sources of energy consumption in WSNs, topology control reduces energy consumption by forcing packets to travel through multiple hops. The topology control function is usually located between the

7 MAC layer and the network layer and interacts with both of them. Dynamic topology construction can also be exercised by turning unnecessary nodes off. The topology control mechanism reduces energy consumption by reducing collisions, contentions, and exposed terminal problems. However, idle listening, overall latency, complexity, and increased packet loss probability remain core issues with this mechanism. 1 2 3 4 n-1 n d d d d D Figure 4: A simple topology control example in WSNs, where nodes dynamically change their transmission power to save energy. They transmit packets via their adjacent neighbors rather than sending over the long distance. Figure 4 illustrates that energy consumption can be reduced by minimizing transmission range so that packets can only travel through multiple hops rather than a single long hop [7]. A linear network is considered in this example where n nodes are equally spaced by distance d. If node 1 directly communicates with node n over the total distance of D and if path loss exponent of 2 is assumed then the received power at a distance D can be given by the Friis free-space propagation model as follows: ( λ P r = P t Gt Gr 4 π D Where P t is the power at which the signal was transmitted, Gt and Gr are the antenna gains of the transmitter and receiver respectively, λ is the wavelength. This equation can be written as: P r = C P t D 2 C = ) 2 Gt Gr λ2 (4 π) 2 Where C is a transceiver-dependent constant. If we assume C = 1, then the required transmission energy to transmit the signal at a distance D for the node 1 is given by: P t = P r D 2 Alternatively, if node 1 chooses to transmit a packet to node n via its adjacent neighbors, i.e, over n 1 = h hops then the energy needed by each node to reach its immediate neighbor is given by: P t = P r d 2 Therefore, the power saving with multi-hop communication is given by: P s = P r D2 P r (h d)2 = h P r d2 h P r d 2 This shows that the larger the number of hops h the larger the power savings. However, with multihop communication (n 1) nodes process and hence consume energy as opposite to the only two nodes with the single-hop communication. Moreover, this is a very simplistic example as in reality factors like Bit Error Rate (BER) and probability of packet loss with the varying transmission distance also need to be considered. = h

8 Scheduling and synchronization: Many MAC protocols for WSNs assume that nodes follow a fix schedule to switch their radios between wake-up and sleep modes. They also assume that nodes are timely synchronized. However, in reality such time synchronization in dynamic and resourcelimited WSNs is very difficult to achieve as it induces a lot of overhead and may need extra hardware. Collisions and retransmissions increase dramatically if all nodes wake up simultaneously. Therefore, it is wise to use random and non-synchronized wake-up and sleep schedules for WSN nodes. Cross-layering: Most of the proposed MAC protocols for WSNs follow the traditional layered architecture, where they try to improve performance only at the respective layer. With very limited resources available for WSNs, a trend of cross-layer designing is emerging in order to achieve aggregate optimization among different layers. Unlike layered networks, WSNs can not afford significant layered overhead due to their limited energy, storage, and processing capabilities. Moreover, application-aware communication and low-power radio considerations motivate for the cross-layer architecture for WSNs. Recent studies in [19 23] affirm improvement in WSN performance by using cross-layering. Miscellaneous techniques: Along with common methods of MAC designing, some unconventional approaches have also been endeavored in the literature. Some researchers counsel for having two different channels with each node; the data channel and the control channel [24]. The data channel is always kept in sleep mode except when transmission of data and/or ACK packets occurs. However, control packets are only exchanged on the control channel. This approach does not need synchronization but it increases complexity in terms of hardware, cost, energy consumption, and handling of two transceivers at each node. The protocols proposed in [25, 26] suggest shifting transmission initiation from the sender to the receiver side. When the receiver is awake and ready to receive a frame, it sends a beacon and starts monitoring the channel for incoming frames for a while. When the sender receives a beacon, it sends the actual payload. Such schemes are in fact similar to the classical ones with only the difference of who is going to start the communication. Therefore, they carry all the common problems of this domain in one or the other way. Moreover, such protocols can not be used for broadcast and multicast communications and can increase latency and idle listening at the sender side. CLASSIFICATION OF MAC PROTOCOLS This section attempts to categorize MAC protocols for WSNs. These protocols can be classified depending on how nodes access the channel into the general categories of contention based, scheduling based, channel polling based, and hybrid protocols [27]. Figure 5 depicts this classification. Contention Based MAC Protocols With the contention-based Carrier Sense Multiple Access (CSMA) method, a transmitting node competes with its neighbors to acquire the channel. Before any transmission, it first senses the carrier. If the carrier is found idle, it starts with its transmission, otherwise defers the transmission for some random time usually determined by the back-off algorithm. Such MAC protocols consume less processing resources and are suitable for event-driven WSN applications. They are flexible to network scale and dynamics as no clustering and topology information is required. However with this approach, the transmission is purely handled by the sender and the problem of hidden- and exposed-terminal may occur resulting in collisions, overhearing, idle listening, and less throughput. In many proposals, authors consider that contention times are synchronized and are scheduled based, i.e., at each periodic interval, all neighboring nodes wake up simultaneously to exchange packets [28 30]. In that case, chances of collisions are very high as all neighboring nodes compete

9 Channel Access Methods Contention Based Scheduling Based Channel Polling Hybrid Based CSMA TDMA LPL Two radios RTS/CTS CDMA Preamble Samling LPL + CSMA CCA FDMA CSMA + TDMA Figure 5: Channel accessing taxonomy in WSNs. MAC protocols can be classified into four main categories depending on how nodes access the shared channel. for the channel simultaneously. This results in energy waste and higher delays as retransmission of packets is usually required. The formation and maintenance of synchronization in resource-limited WSNs is not an easy task, since it requires special hardware and/or algorithms and results in complexity and communication overhead. The Request To Send and Clear To Send (RTS/CTS) handshake is among the several approaches which have been proposed in order to minimize the hidden- and exposed-terminal problem in CSMA. The RTS/CTS handshake is initially performed between the sender and the receiver and then the actual data packet is sent. Unfortunately, this method is not fully able to eliminate the hidden-terminal problem and moreover, it incurs additional overhead in transmitting control packets. S-MAC The design of the Sensor-MAC (S-MAC) [28] was one of the first attempts to significantly reduce idle listening, collisions, and overhearing in WSNs by putting nodes in listen and sleep periods. Listen periods are normally of fixed size according to some PHY and MAC layer parameters, whereas the length of sleep periods depends on a predefined application based duty cycle parameter. S- MAC attempts to coordinate the schedules of neighboring nodes by letting nodes share common listen periods according to a schedule. This requires formation and maintenance of synchronization among nodes. In order to reduce the hidden-terminal effect, S-MAC uses the RTS/CTS handshake scheme for unicast messages. The listen period is further divided into two sub parts; the SYNC period and the Data period. During the SYNC period, a node accepts SYNC packet from its neighbors, stores in its schedule table, and adapts it. The data period is used to exchange data related messages which may include RTS, CTS, DATA, or ACK messages. To minimize costly retransmissions, S-MAC fragments long messages into short frames and sent them in a burst. The RTS/CTS is only required before transmitting the first short frame. S-MAC is rigid and optimized for a predefined set of workloads as there is no mean to adapt the length of listen and sleep periods with changing traffic conditions. As discussed earlier, the formation, maintenance, and compliance of synchronization has serious consequences in WSNs. Longer and fixed sleep periods of S-MAC have serious impact on system latency. It could be worsen if intermediate nodes on a route do not share a common schedule. To decrease latency, an adaptive listening mechanism is employed with S-MAC. A node who overhears the on-going transmission of its neighbors, wakes up just at the end of the transmission. It receives and processes the packet if the packet is destined for it, otherwise goes back to sleep mode.

10 Another drawback of S-MAC is the possibility of following more than one schedules, which results in more energy consumption via idle listening and overhearing. By following the same common schedule, nodes form a virtual cluster. Thus a S-MAC network is most likely to have several virtual clusters. Border nodes need to adapt to two or more different schedules for successful formation of virtual clusters. Thus, border nodes expend more energy than non-border nodes, since they need to maintain network connectivity among clusters. With fragmentation in S-MAC, overhead and retransmission can be reduced, but it comes at the expense of unfairness since a node reserves the channel for a whole burst duration. A neighboring node carrying delay bound data would have to wait longer to gain access of the channel. Several improvements and enhancements have been proposed to overcome the weaknesses of S- MAC, here we will discuss some of the popular variants of S-MAC. Most of these variants, by default, inherit overhead and complexity incurred in synchronizing their common listen and sleep schedules. T-MAC The Time-out MAC (T-MAC) [29] protocol improves the energy efficiency of S-MAC specially under variable traffic conditions by adaptively shorten the listen period. The listen period ends when no activation event has occurred for a threshold period TA unlike S-MAC where the listen period is always rigid one. This aspect frees the application from selecting an appropriate duty cycle value. The comparison between S-MAC and T-MAC shown in Figure 6 confirms this improvement. Although T-MAC has better results under variable loads, the synchronization of the listen periods within virtual clusters may partially break down. This could result in the early sleep problem for T-MAC. The early sleep happens when a node, specially third hop one, goes to sleep mode when a neighbor still has messages for it. However with T-MAC, Future Request To Send (FRTS) frames can be sent to the third hop nodes either to extend their TA expiration or to let them awake by the appropriate time. T-MAC saves more power than S-MAC and minimizes collisions and redundancy as nodes switch back to sleep mode if no activity is found for a TA time. But this comes at the cost of reduced throughput and higher latency. T-MAC also suffers from synchronization and scaling problems. S-MAC T-MAC TA TA TA Energy Saving, but Early Sleep Energy Saving Energy Saving Listen Sleep Transmit Receive Figure 6: T-MAC vs. S-MAC. T-MAC reduces energy consumption of S-MAC by adaptively terminating the listen period of a node if no activation event has occurred for a TA period. However, this early sleeping could result in packet loss, low throughput, and high latency.

11 DSMAC The Dynamic S-MAC (DSMAC) [30] improves latency of S-MAC by dynamically adjusting the duty cycle value of nodes as per traffic and energy conditions. All nodes start with the same duty cycle value and share their one-hop latency values in the SYNC period. When a node notices that the traffic has been increased or low latency is required, it adds extra active periods, shortens its sleep time, and sends an updated SYNC message to its neighbors. On receiving the updated SYNC message, a neighboring node checks its queue for packets destined to that node. If there is a one, it doubles its duty cycle provided that its battery level is above a specified threshold. The latency observed with DSMAC is better than S-MAC, but it uses less frame duration, and thus achieves less throughput at high traffic. The complexity in adapting the duty cycle value especially within a virtual cluster and under high traffic loads manifolds the already existing synchronization overhead. Global Schedule and Fast Path Algorithms As mentioned earlier, nodes in S-MAC may follow more than one schedule resulting in higher energy consumption by spending more time in active periods. To minimize the number of active schedules, the number of border nodes, and latency of S-MAC, two algorithms have been proposed [31]. The first algorithm called Global Schedule Algorithm (GSA) minimizes the number of active schedules of S-MAC. GSA uses age of the schedule to determine which schedule to keep. When a node has to select between more than one schedules, it selects the oldest one. Over the time, all nodes migrate toward the oldest common global schedule in the network. The second algorithm is called Fast Path Algorithm (FPA) that provides fast data forwarding paths by adding additional wake-up periods on the nodes along paths from sources to the sink. Given a source, sink, and the path between them, additional wake-up periods along the path are added such that they occur exactly when the previous-hop node is ready to send the packet. The experiment results achieved in [31] show that more than half of the nodes using S-MAC have more than one active schedules and that the GSA converges to one schedule in a network of 50 Mica2Dot nodes deployed in a linear fashion quite well. However, in addition to the synchronization overhead, nodes using GSA and FPA need more processing in deciding the fate of schedules and data forwarding paths. STEM The Sparse Topology and Energy Management (STEM) protocol [24] uses two different channels for each node, the wake-up channel and the data channel as shown in Figure 7. The wake-up channel only monitors for control signals, whereas the data channel is solely used for data packets and remains in sleep mode most of the time. On the wake-up channel the time is divided into fixed-length wake-up periods, which are further subdivided into listen and sleep periods. To gain the attention of the receiver, two different variants of STEM are used. In STEM-B, the transmitter tries to wake up the receiver by sending contention-free beacons on the wake-up channel each containing source and destination addresses. The sender sends these beacons at least for a complete wake-up period. However, it stops sending further beacons as soon as it receives an ACK frame from the receiver. In that case, both the sender and receiver switch on their transceiver for the data channel and start communicating. The non-targeted nodes can go back to sleep mode once they recognize that the packet is not addressed to them. In STEM-T, the transmitter sends a busy tone signal on the wake-up channel, but it contains no destination address and in result, all the neighbors may sense it and switch on their data channels. STEM-T looks very similar to the traditional channel polling based protocols except for using two separate channels instead of one. STEM-B cuts back the number of beacons to be sent as transmitters do not need to always send a beacon burst of full wake-up period length. However, more than one transmitter might send

12 Wake-up Channel Wake-up period Data Channel Listen period Sleep Data Beacon/ Busy tone Figure 7: The working of STEM. It uses two channels for each node, the wake-up channel is used to transmit and receive control packets and the data channel for data packets. A sender sends a beacon on the wake-up channel with the STEM-B and a busy tone with the STEM-T variant to pull in the intended receiver. A node turns to the data channel only if a beacon or a busy tone is found on the wake-up channel. a beacon simultaneously, resulting in a beacon collision. STEM-T uses a simpler and cheaper transceiver on the wake-up channel, but busy tones are sent for the maximum time. The nontargeted neighbors can receive busy tones and unnecessarily switch on transceiver for their data channels. On a whole, the employment of two different channels for each node is complex and expensive in itself. Scheduling Based MAC Protocols Scheduling based schemes assign collision-free links to each node in the neighborhood usually during the initialization phase. Links may be assigned as time slots (TDMA), frequency bands (FDMA), or spread spectrum codes (CDMA). However, due to the complexities incurred with FDMA and CDMA schemes, TDMA schemes are preferred as scheduling methods for WSNs. With TDMA schemes, the system time is divided into slots and each one is allocated to a node in the neighborhood. A schedule in such schemes regulates which participant may use which resource at what time. The schedule can be fixed or computed on demand (or a hybrid) and is typically regulated by a central authority. A node can only access its allocated time slot and does not need any contention with its neighbors. The cardinal advantages of scheduling based schemes include minimum collisions, less overhearing, and implicitly avoidance of idle listening. They also provide a bounded and predictable end-toend delay. However, the average queuing delay is much higher as a node has to wait for its allocated slot before accessing the channel. Overhead and extra traffic required in setting up and maintaining synchronization among nodes, no mean to adapt with varying traffic and topology conditions, reduced scalability, and low throughput are the major concerns with these schemes. Allocating conflict-free TDMA schedules is indeed a difficult task in itself. A peer-to-peer based communication is usually not possible as nodes are normally allowed to communicate only with the central authority. LEACH A mostly scheduled based Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol [32] divides a dense and homogeneous WSN into clusters each supervised by a cluster head. The cluster head is responsible for creating and maintaining TDMA schedules, communicating with its cluster members, and forwarding the received messages to the sink node. As the cluster head is always switched on, therefore the chances of a cluster head to die earlier are high. However, LEACH uses

13 a randomized rotation mechanism for selecting a cluster head. Each node can independently decide to become a cluster head with preference is given to the node who has not been cluster head for a long time. Thus LEACH tries to distribute the energy among nodes in an evenly manner. LEACH works in rounds and each round is divided into set-up and steady-state phases. The cluster formation occurs during the set-up phase where each cluster head broadcasts an advertisement message (ADV) using CSMA to invite its members. The cluster head then creates and broadcasts a TDMA schedule for nodes that have sent join-request (REQ) to it. In order to reduce intercluster interference, the cluster head chooses a random CDMA code for its members. Once the set-up phase is completed, the steady-state phase starts where a node can transmit data to its head by using its allocated slot. Upon receiving packets from its members, the cluster head aggregates and sends them to the sink node. The cluster head directly communicates with the sink using CSMA as LEACH does not allow any inter-cluster communication. A cluster head has to perform highly computational and energy consuming tasks. It prepares and maintains the TDMA schedule, remains awake for the whole round, aggregates data, and transmits it directly to the sink node. LEACH guarantees that each member node belongs to at most one cluster. However, due to an ADV collision, it can not guarantee that each member node belongs to a cluster. In that case, LEACH considers that all nodes are within the range of the sink node. The lack of such multi-hop communication capabilities severely limit the network scalability. The channel under-utilization occurs with LEACH as it considers that nodes always have data to send during their allotted time. Perfect correlation is assumed, which is hardly possible in WSNs. TRAMA The TRaffic-Adaptive Medium Access (TRAMA) protocol [33] is mostly a TDMA based protocol that creates schedules for time-synchronized nodes on a distributive manner based on traffic information. The system time is divided into cycles, each containing a random access and a scheduled access periods. The random access period consists of a collection of signalling slots, whereas the scheduled access period contains collection of data transmission slots. TRAMA consists of three components: a Neighbor Protocol (NP), a Schedule Exchange Protocol (SEP), and an Adaptive Election Algorithm (AEA). NP works during the random access period and is used to exchange one-hop neighbor information and to gather two-hop topology information for each node in the network. During SEP, a node transmits its current transmission schedule and also picks up schedules of its neighbors. To win a time slot, a node computes its own priority and the priority of all its two-hop neighbors for each time slot. AEA also works during the scheduled access and uses neighborhood and schedule information to select the transmitters and receivers for the current time slot, letting all other nodes to switch to low-power sleep mode. For an efficient channel utilization, AEA uses traffic based information that is exchanged among nodes during SEP and attempts to reuse slots that are not used by the selected transmitter. A node using TRAMA can have one of the three states: transmit, receive, and sleep. The state of a node is determined based on its two-hop neighborhood information and the schedules announced by its one-hop neighbors. A node is in transmit state if it has data to send with the highest priority among its contending set. If not, the node will consult the schedule sent by the current transmitter. If the transmitter have traffic destined for this node in the current slot, it will stay in receive mode otherwise can go to sleep mode. Reuse of time slots, utilizing neighborhood and traffic information, and hybrid scheme are the positive features of TRAMA. The simulation results presented in [33] show higher percentage of sleep time, less collision probability, and better data delivery with TRAMA as compared to S-MAC and IEEE 802.11. However, all nodes in TRAMA are defined to be either in receive or transmit states during the random access period for exchanging schedules. And for each time slot, every node calculates priorities for its own as well as for its two-hop neighbors. This results in significant computation, large queuing delays, and ineffective channel and memory utilization, since the two-

14 Signaling slots (random access) Transmission slots (scheduled access) Switching period Figure 8: Time slot organization of TRAMA. During the random access period, nodes perform contention-based channel acquisition and one-hop neighbor information is propagated by using signalling slots. Transmission slots are used for collision-free data exchange and schedule propagation among neighboring nodes. hop neighborhood in a dense WSN could be large enough. Therefore, TRAMA is usually practicable for networks having sufficient resources but are less delay sensitive. SMACS The Self-organizing Medium Access Control for Sensor networks (SMACS) protocol [34] is a distributive and infrastructure building protocol that forms a flat topology for WSNs. Nodes using SMACS discover their neighbors and establish transmission/reception schedules for communicating with them without the need of a global synchronization or clustering. SMACS combines the neighbor discovery phase with channel assignment phase and assigns the channel to a link immediately after the existence of the link is discovered instead of waiting to finish network-wide neighbor discovery process. To reduce collisions between adjacent links, each link operates on a random FDMA or CDMA code. Each node regularly executes a neighborhood discovery procedure and establishes a directional link to each discovered neighbor by assigning a time slot to that link. Each node maintains a TDMA-like superframe to communicate with known neighbors. The fixed-size superframe is further divided into smaller and variable size frames. The superframe helps a node maintaining its time slot schedules with all its neighbors such that nodes are required to direct their radios to the proper FDMA or CDMA code for the successful communication. SMACS avoids computation and communication overhead of transmitting neighborhood information to a central node by using a local scheme instead of a global assignment. Since the neighborhood discovery process is executed regularly, the protocol assumes to be efficiently adapt to all the topology changes. As a densely deployed WSN usually has low traffic load, nodes using SMACS will have highly populated schedules and have to wake up quite often just to discover that there is no packet destined to them. The length of a superframe is also a decisive factor. It should be large enough to accommodate the highest node degree in the network as a smaller superframe can not conciliate all the neighbors. With SMACS, a link between two nodes is directional and for a bidirectional communication between them, two such links are required. Channel Polling Based MAC Protocols With the channel polling scheme, also known as preamble sampling or Low Power Listening (LPL), a sending node prefixes data packets with extra bytes called a preamble and sends it over the channel to ensure that the destination node detects radio activity and wakes up before the actual payload is sent. On a wake-up, if radio activity is detected, the receiver turns on its radio to receive data packets. Otherwise, the node goes back to sleep mode until the next polling interval. To avoid

15 deafness, a sender prefixes preamble at least as long as the check interval of the receiver to ensure that the receiver wakes up and performs channel sampling at least once while the preamble is being sent [35]. Figure 9 shows an example how channel polling works in WSNs. Sender Check Interval Receiver Check Interval Wake-up Preamble Sleep Data Figure 9: Channel polling in WSNs. With the traditional channel polling scheme, a sender first sends an extended preamble that is at least as long as the check interval of the receiver to ensure that the receiver will be awake by the time when the data packet is sent. Channel polling protocols do not use common active/sleep schedules, and therefore do not need any synchronization or clustering. Receivers consume significantly less energy as they wake up for very short period of time but senders pay the price in sending long and extended preambles. For high traffic load this could lead to very costly collisions. Another issue with channel polling is the limitation of the duty cycle value. Lowering the duty cycle extends the check interval. That is good from the receiver point of view but it significantly increases the transmission cost in the shape of long and extended preambles at the sender side. Such extended and long preambles also result in unnecessary energy consumption both at the receiver and sender ends, overhearing at non-target receivers, and excessive latency at each hop. These issues can be tackled by using short preambles, adaptive duty cycle values, and minimizing redundancy [36]. Another issue with this scheme is related to the support of radio chip in sending an extended preamble prior to the data packet. Though the advanced packet-based radios (e.g., CC2420) frees the MAC layer from handling individual byte unlike the byte-level radios (e.g., CC1000), they make channel polling scheme difficult to apply as they lack the capability to stretch the length of the preamble [37]. For such packet-based radios, channel polling is implemented as a burst of contiguous packets each separated by a short spacing. B-MAC The channel polling scheme has been renamed as the Low Power Listening (LPL) in the Berkeley MAC (B-MAC) protocol [35]. It is one of the initial MAC protocols working on the channel polling mechanism, where each node can have independent awake and sleep periods. The sum of both these periods is called check interval. While transmitting, a node precedes the data packet with a preamble that is slightly longer than the check interval of the receiver. Nodes wake up at each awake period and sample the medium shortly. If it detects a preamble, it remains awake to receive the whole preamble. If the preamble is destined to this node, it further extends its wake-up time to receive the data packet; otherwise goes back to sleep mode. With the extended preamble, a sender is assured that at some point during the preamble sending, the receiver will wake up and detect the preamble. B-MAC uses Clear Channel Assessment (CCA) to determine whether the channel is clear. Instead of using a threshold, which is the common method for many CSMA protocols, B-MAC improves the quality of CCA by using an outlier detection method. When a node wants to transmit, it takes

16 a sample of the channel and searches for outliers. If an outlier is detected, B-MAC declares the channel is clear because a valid packet could never have an outlier significantly below the noise floor. Alternatively, if no outlier is found for five samples, B-MAC declares the channel is busy. With an extended preamble, B-MAC reduces duty cycle and minimizes idle listening, especially when there are no packet exchanges. It supports on-the-fly tuning of services by providing bidirectional interfaces to enable or disable services. However, during transmissions a preamble sent by the sender needs to be longer than the check interval of receivers. As a result, the overhead of preambles increases as the check interval increases. Such extended preambles also introduce excessive latency at each hop and increases energy consumption not only for the transmitter and the intended receiver, but also for non-targeted receivers once they overhear these long preambles. Only after receiving a full preamble, a node can know whether it is the actual node the packet is destined for. WiseMAC The WiseMAC [38] is the first protocol working on non-persistent CSMA (np-csma) with the channel polling mechanism. The basic functionality of WiseMAC is more or less similar to B- MAC. However, WiseMAC lets a node learn about the awake periods of its neighbors. A sending node sends a preamble just before the receiving node wakes up and hence keeps the preamble length at minimum. The receiver puts the time of its next awake period in the ACK frame. If a node finds the medium busy during the channel sampling, it continues to listen the medium until it receives a data packet or the medium becomes idle again. All nodes in a network sample the medium with a common basic cycle duration, but their awake and sleep periods are independent and left unsynchronized. WiseMAC uses short preambles for regular traffic and switches to longer preambles for infrequent communication. For very low traffic loads where the data packet can be smaller than the preamble, WiseMAC repeats the data frame instead of the extended preamble. With WiseMAC, over-emitting can occur if the receiver is not ready at the end of the preamble due to factors such as interference or collision. This over-emitting can increase further with the increase in the preamble and data packet size. As nodes are unsynchronized, the transmitter has to keep awake periods for each neighbor and in case of a broadcast communication, it has to deliver the same packet many times to each neighbor. This redundant transmission leads to higher latency and energy consumption for nodes. In addition, the hidden-terminal problem can spring up when one node transmits the preamble to a node that is already receiving packets from another node. WiseMAC does not provide a mechanism to adapt schedules of nodes to varying traffic patterns. AREA-MAC The Asynchronous Real-time Energy-efficient and Adaptive MAC (AREA-MAC) protocol [36] provides an application-specific optimized performance in terms of energy efficiency and latency for WSNs. AREA-MAC adapts preamble sampling for packet-based radios and sends out a stream of preambles instead of one long preamble. It incorporates the ACK mechanism by adding source and destination addresses in each preamble. Nodes using AREA-MAC have unsynchronized sleep and wake-up periods. They remain in sleep mode most of the time and wake up very shortly at each check interval to check the availability of a preamble on the channel. A node immediately sends a pre-ack frame to the sender if a preamble is found and the destination address of the preamble matches with its address. It then switches radio to receive mode to receive a data packet. A node goes back to sleep mode immediately if a preamble is not found or its address does not match with the destination address of the available preamble. However, for the broadcast communication, a node sends a pre-ack frame as soon as it receives the preamble without checking the destination address. A sending node transmits a burst of short