EL2745 Principles of Wireless Sensor Networks

Similar documents
Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

Wireless Sensor Networks 7th Lecture

Advanced Networking Technologies

Wireless Sensor Networks 8th Lecture

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider

CHAPTER 4 CROSS LAYER INTERACTION

Wireless Sensor Networks

Communication In Smart Grid -Part3

Wireless Sensor Networks

Mobile Communications

ZigBee/ David Sanchez Sanchez.

CSC8223 Wireless Sensor Networks. Chapter 5 Medium Access Control Protocols

Topic 02: IEEE

Medium Access Control in Wireless Networks

Introduction to IEEE

Ad hoc and Sensor Networks Chapter 5: Medium access control protocols

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):

Outline. TWR Module. Different Wireless Protocols. Section 7. Wireless Communication. Wireless Communication with

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Principles of Wireless Sensor Networks

Simulation Analysis of IEEE Non-beacon Mode at Varying Data Rates

CS263: Wireless Communications and Sensor Networks

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

Matteo Petracca Scuola Superiore Sant Anna, Pisa

Fuzzy Duty Cycle Adaption Algorithm for IEEE Star Topology Networks

Message acknowledgement and an optional beacon. Channel Access is via Carrier Sense Multiple Access with

Performance Analysis of Guaranteed Time Slots Allocation in IEEE Protocol over Radio

Networked Embedded Systems: PHY and MAC

Lecture 16: QoS and "

Medium Access Control

Medium Access Control in Wireless Sensor Networks & challenges!

MAC LAYER. Murat Demirbas SUNY Buffalo

CHAPTER 1 INTRODUCTION

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Wireless Body Area Networks. WiserBAN Smart miniature low-power wireless microsystem for Body Area Networks.

CSE 461: Wireless Networks

Standard for wireless sensor networks. Developed and promoted by the ZigBee alliance

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Performance Evaluation of IEEE for Low-Rate Wireless Personal Area Networks

Data and Computer Communications. Chapter 13 Wireless LANs

Performance Investigation and Optimization of IEEE for Industrial Wireless Sensor Networks. Presented By: Aniket Shah

Wireless communication standards: What makes them unattractive for WSN:

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Improving IEEE for Low-latency Energy-efficient Industrial Applications

MAC in /20/06

Principles of Wireless Sensor Networks

ZIGBEE. Erkan Ünal CSE 401 SPECIAL TOPICS IN COMPUTER NETWORKS

Overview of the IEEE /4a standards for low data rate Wireless Personal Data Networks

Technical Report. On the use of the ZigBee protocol for Wireless Sensor Networks. Anneleen Van Nieuwenhuyse Mário Alves Anis Koubâa

Performance Analysis of Beacon Enabled IEEE Using GTS in Zigbee

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Computer Communication III

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

A Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications 28/05/2012

A Comprehensive Simulation Study of Slotted CSMA/CA for IEEE Wireless Sensor Networks

The MAC layer in wireless networks

Data Communications. Data Link Layer Protocols Wireless LANs

MAC Protocols 10/6/2008. References. Medium Access Control (MAC)

SENSOR-MAC CASE STUDY

IEEE : a Federating Communication Protocol for Time-Sensitive Wireless Sensor Networks Anis Koubaa Mário Alves Eduardo Tovar

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Fig. 1. Superframe structure in IEEE

Impact of IEEE n Operation on IEEE Operation

Multiple Access Links and Protocols

Topics. Introduction Architecture Node Types Network Topologies Traffic Modes Frame Format Applications Conclusion

Modeling a Beacon Enabled Cluster with Bidirectional Traffic

Zigbee protocol stack overview

Radio Networks. Riccardo Cavallari. Radio Networks Office: 3 rd floor, Main Building

IEEE MAC Protocol Study and Improvement

University of Alberta. Mansoureh Takaffoli. Master of Science. Department of Computing Science

Wireless Local Area Networks (WLANs) Part I

CARRIER SENSE MULTIPLE ACCESS (CSMA):

CS-541 Wireless Sensor Networks

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Sensor Network Protocols

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

CSMA based Medium Access Control for Wireless Sensor Network

Mobile Communications Chapter 7: Wireless LANs

Exercises of lecture Wireless Sensor Networks Winter 2006/2007 Sheet 4

Chapter 1 Basic concepts of wireless data networks (cont d)

Availability and End-to-end Reliability in Low Duty Cycle Multihop Wireless Sensor Networks

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

CMPE 257: Wireless and Mobile Networking

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Computational Model for Energy Aware TDMA-based MAC Protocol for Wireless Sensor Network System

Guide to Wireless Communications, 3 rd Edition. Objectives

Strengthening Unlicensed Band Wireless Backhaul

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS

ECE 4450:427/527 - Computer Networks Spring 2017

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Principal options and difficulties

A cluster based interference mitigation scheme for performance enhancement in IEEE

A Beacon Cluster-Tree Construction Approach For ZigBee/IEEE Networks

Delivering Voice over IEEE WLAN Networks

Does the IEEE MAC Protocol Work Well in Wireless Body Area Networks?

Wireless Communications

Unit 7 Media Access Control (MAC)

Transcription:

EL2745 Principles of Wireless Sensor Networks www.kth.se/student/program-kurser/kurshemsidor/kurshemsidor/control/el2745 Lecture 5 Stockholm, February 2, 2012 Carlo Fischione Royal Institute of Technology - KTH Stockholm, Sweden e-mail: carlofi@kth.se

Course content Part 1 Ø Ø Ø Ø Ø Ø Lec 1: Introduction Lec 2: Programming Lec 3: Sensor modelling Lec 4: Physical layer Lec 5: Mac layer Lec 6: Routing Part 2 Ø Ø Ø Ø Lec 7: Estimation Lec 8: Detection Lec 9: Positioning and localization Lec 10: Time synchronization Part 3 Ø Lec 11: Networked control systems 1 Ø Lec 12: Networked control systems 2 Ø Ø Lec 13: Security Lec 14: Summary

Previous lecture Process Controller Application Presentation Session Transport Routing MAC Phy How information is successfully transmitted and received over the wireless channel?

Today s lecture Process Controller Application Presentation Session Transport Routing MAC Phy When a node gets the right to transmit? What it the mechanism to get such a right?

Today s learning goals What is the Medium Access Control (MAC)? What are the options to design MACs? What is the MAC of IEEE 802.15.4?

Outline Definition and classification of MACs The IEEE 802.15.4 protocol

Medium Access Control - MAC MAC: mechanism for controlling when sending a packet and when listening for a packet MAC is one of the major component for energy expenditure Especially, idly waiting to receive packets wastes huge amounts of energy Typical power consumption of a node We study MAC schemes that are Suitable for WSNs Emphasize energy-efficient operation

Requirements for energy-efficient MAC protocols Remember Transmissions are costly Receiving about as expensive as transmitting Idle listening is still expensive Energy problems Collisions wasted effort when two packets collide Overhearing waste effort in receiving a packet destined for another node Idle listening sitting idly and trying to receive when nobody is sending Protocol overhead

Main options Wireless medium access Centralized Distributed Schedulebased Contentionbased Schedulebased Contentionbased Fixed assignment Demand assignment Fixed assignment Demand assignment

Centralized MAC A central station controls when a node may access the medium Ø Example: Polling, centralized computation of Time Division Multiple Access (TDMA) schedules Ø Simple and quite efficient (e.g., no collisions), but burdens the central station Not feasible for non-trivial wireless network sizes Can be quite useful when network is somehow divided into smaller clusters Ø In each cluster medium access can be controlled centrally

Schedule-based MAC Schedule- vs. contention-based MACs Ø A schedule regulates which participant may use which resource at which time, TDMA component Ø Schedule can be fixed or computed on demand Usually: mixed difference fixed/on demand is one of time scales Ø Collisions, overhearing, idle listening no issues Ø Time synchronization needed Contention-based protocols Ø Based on random techniques Ø Risk of colliding packets is deliberately taken Ø Hope: coordination overhead can be saved, resulting in overall improved efficiency Ø Mechanisms to handle/reduce probability/impact of collisions required

Distributed, contention-based MAC Hidden terminal scenario: A B C D Listen before talk (Carrier Sense Multiple Access, CSMA) suffers from sender not knowing what is going on at receiver, might destroy packets despite first listening for a clear channel Hidden terminal problem: a transmitter does not see another transmitter Exposed terminal problem: a transmitter senses another transmitter, which is not causing collisions at the receiver

Slotted ALHOA The slotted ALHOA is a random protocol working on top of TDMA Nodes synchronized If receiver sends a no acknowledgement packet, the transmitter tries to send again a packet after a random time p( probability that a node has a packet Probability of successful packet transmission: p(1 p) n 1

Outline Definition and classification of MACs The IEEE 802.15.4 protocol

IEEE 802.15.4 protocol architecture Now we study the MAC of the standard IEEE 802.15.4 IEEE 802.15.4 is the de-facto reference standard for low data rate and low power WSNs Characteristics: Ø low data rate for ad hoc self-organizing network of inexpensive fixed, portable and moving devices Ø high network flexibility Ø very low power consumption Ø low cost

The IEEE 802.15.4 protocol Application Presentation Session Transport IEEE 802.15.4 specifies two layers Ø Physical layer 2.4Ghz global, 250Kbps 915MHz America, 40Kbps 868MHz Europe, 20Kbps Ø Medium Access Control (MAC) layer Routing MAC Phy IEEE 802.15.5 does not specify the routing

IEEE 802.15.4 networks IEEE 802.15.4 network composed of Ø full-function device (FFD) Ø reduced-function device (RFD). A network includes at least one FFD The FFD can operate in three modes: Ø a personal area network (PAN) coordinator Ø a coordinator Ø a device An FFD can talk to RFDs or FFDs RFD can only talk to an FFD

IEEE 802.15.4 network topologies 3 types of topologies Ø star topology Ø peer-to-peer topology Ø cluster tree

Cluster-tree topology

IEEE 802.15.4 physical layer Frequency bands: 2.4-2.4835GHz Ghz, global, 16 channels, 250Kbps 902.0-928.0MHz, America, 10 channels, 40Kbps 868-868.6MHz, Europe, 1 channel, 20Kbps Features of the PHY layer Ø activation and deactivation of the radio transceiver Ø energy detection (ED) Ø link quality indication (LQI) Ø clear channel assessment (CCA) Ø transmitting and receiving packets across the wireless channel Ø dynamic channel selection by a scanning a list of channels in search of beacon, ED, LQI, and channel switching

IEEE 802.15.4 physical layer

Physical layer data unit The SFD indicates the end of the SHR and the start of the packet data PHR: PHY header PHY payload < 128 byte

IEEE 802.15.4 MAC The MAC provides two services: Ø data service Ø management service MAC features: beacon management, channel access, GTS management, frame validation, acknowledged frame delivery, association and disassociation.

Superframes Superframe structure: Ø format defined by the PAN coordinator Ø bounded by network beacons Ø divided into 16 equally sized slots Beacons Ø synchronize the attached devices, identify the PAN and describe the structure of superframes Ø sent in the first slot of each superframe Ø turned off if a coordinator does not use the superframe structure Superframe portions: active and an inactive Ø inactive portion: a node does not interact with its PAN and may enter a low-power mode Ø active portion: contention access period (CAP) and contention free period (CFP) Ø Any device wishing to communicate during the CAP shall compete with other devices using a slotted CSMA/CA mechanism Ø The CFP contains guaranteed time slots (GTSs).

IEEE 802.15.4 CSMA-CA A Carrier Sense Multiple Access/ Collision Avoidance (CSMA/CA) algorithm is implemented at the MAC layer If a superframe structure is used in the PAN, then slotted CSMA-CA is used in the CAP period If beacons are not used in the PAN or a beacon cannot be located in a beacon-enabled network, unslotted CSMA-CA is used

CSMA-CA Each device has 3 variables: NB, CW and BE. NB: number of times the CSMA/CA algorithm was required to backoff while attempting the current transmission. Ø It is initialized to 0 before every new transmission. BE: backoff exponent Ø how many backoff periods a device shall wait before attempting to assess the channel. CW: contention window length (used for slotted CSMA-CA), Ø Is the number of backoff periods that need to be clear of activity before the transmission can start. Ø It is initialized to 2 before each transmission attempt and reset to 2 each time the channel is assessed to be busy.

CSMA/CA Flow diagram to Transmit a packet with CSMA/CA in Slotted and Unslotted modalities

Guarantee Time Slot (GTS) Allocation The GTSs always appears at the end of the active superframe starting at a slot boundary immediately following the CAP. The PAN coordinator may allocate up to 7 GTSs. A GTS can occupy more than one slot period. SO <15. If SO=15, the superframe will not be active anymore after the beacon BO < 15. If BO=15, the superframe is ignored

Guaranteed Time Slots A GTS allows a device to operate within a portion of the superframe that is dedicated exclusively to it A device attempts to allocate and use a GTS only if it is tracking the beacons GTS allocation: Ø The management of the GTSs is undertaken by the PAN coordinator only. Ø A GTS is used only for communications between the PAN coordinator and a device. Ø The GTS direction is specified as either transmit or receive. Ø A single GTS can extend over one or more superframe slots.

Uplink MAC: beacon and non beacon-enabled Communication to a coordinator in a beacon-enabled network Communication to a coordinator in non-beacon-enabled network

Downlink MAC: Beacon and nonbeacon-enabled From a coordinator in a beacon-enabled PAN From a coordinator in a nonbeacon-enabled PAN

Conclusions Application Presentation Session Transport Routing MAC Phy We have seen a MAC classification, Ø TDMA, ALHOA, CSMA Seen in detail the prince protocol for WSNs, IEEE 802.15.4 Identifying interdependencies between MAC protocol and other layers/applications is difficult Ø Which is the best MAC for which application? Ø Need of a MAC engine that optimally selects the best MAC for given conditions

Next lecture Now that we know how nodes get the right to access the wireless medium, we would like to see how a message is routed over possible paths Routing protocols How a node decides to route a message? What are the mechanisms to get such a decision?