Medium Access Control in Wireless Sensor Networks

Similar documents
Medium Access Control in Wireless IoT. Davide Quaglia, Damiano Carra

Medium Access Control in Wireless Sensor Networks

Data Link Layer: Overview, operations

Links. CS125 - mylinks 1 1/22/14

CS 455/555 Intro to Networks and Communications. Link Layer

The Link Layer and LANs. Chapter 6: Link layer and LANs

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

SENSOR-MAC CASE STUDY

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Multiple Access Links and Protocols

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Presented by: Murad Kaplan

Chapter 5 Link Layer and LANs

MAC LAYER. Murat Demirbas SUNY Buffalo

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Wireless Sensor Networks 8th Lecture

Medium Access Control in Wireless Networks

CSC 4900 Computer Networks: The Link Layer

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

ECE 4450:427/527 - Computer Networks Spring 2017

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Overview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer

Goals of Today s Lecture. Adaptors Communicating

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Embedded Internet and the Internet of Things WS 12/13

Data Link Layer: Multi Access Protocols

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

Data Link Layer Technologies

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

Advanced Networking Technologies

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

CS 4453 Computer Networks Winter

MULTIPLE ACCESS PROTOCOLS 2. 1

Message, Segment, Packet, and Frame Link-layer services Encoding, framing, error detection, transmission control Error correction and flow control

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

Data Communications. Data Link Layer Protocols Wireless LANs

Chapter 5 Link Layer and LANs

Redes de Computadores. Medium Access Control

Chapter 3: Medium Access Control in Wireless Sensor Networks

Chapter 5: Link layer

ADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks

CS 3640: Introduction to Networks and Their Applications

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks

CS 410/510 Sensor Networks Portland State University

CSC 401 Data and Computer Communications Networks

MAC in /20/06

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Physical and Data Link layers

SESAM: A Semi -Synchronous, Energy Savvy, Application-Aware Aware MAC

Mohamed Khedr.

Outline. MAC (Medium Access Control) General MAC Requirements. Typical MAC protocols. Typical MAC protocols

Link Layer: Retransmissions

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

CSCD 330 Network Programming

Multimedia Communication Services Traffic Modeling and Streaming

Frames, Packets and Topologies

Wireless Sensor Networks

UNIT IV. Data link layer protocols. Prof.Prasad S.Halgaonkar

Lecture 8 Link Layer: functionality, error detection, media access algorithm

CSE 461: Wireless Networks

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Energy Efficient MAC Protocols Design for Wireless Sensor Networks

SESAM: A Semi -Synchronous, Energy Savvy, Application-Aware Aware MAC SESAM. Outline. Michael Welzl

Chapter 12 Multiple Access 12.1

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Computer and Network Security

Link Layer. (continued)

CSC8223 Wireless Sensor Networks. Chapter 5 Medium Access Control Protocols

Link Layer and LANs. Our Goals. Link Layer

MAC Essentials for Wireless Sensor Networks

Media Access Control. Networked Systems (H) Lecture 5

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

CSCD 330 Network Programming Fall 2012

CS4516 Advanced Computer Networks. Final Review

Data Link Layer: Collisions

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Aloha and slotted aloha

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

3. Data Link Layer 3-2

Ad hoc and Sensor Networks Chapter 5: Medium access control protocols

Wireless Medium Access Control Protocols

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks?

Data and Computer Communications. Chapter 13 Wireless LANs

Exercises of lecture Wireless Sensor Networks Winter 2006/2007 Sheet 4

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

Medium Access Control

Inst: Chris Davison

Computer Communication III

Wireless Communications

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Strengthening Unlicensed Band Wireless Backhaul

Networking Link Layer

Transcription:

Medium Access Control in Wireless Sensor Networks Davide Quaglia, Damiano Carra LIVELLO DATALINK 2 1

Goals Reliable and efficient communication between two nodes on the same physical medium Cable (Wired) Wireless Assumptions from the lower physical layer: The concept of bit is defined Bits, if received, arrive in the same order in which they have been transmitted 3 Functionality Framing = Bit grouping into layer-2 PDUs Error checking Ack and retransmission of corrupted/lost PDUs (not in all protocols) Policy of use of the channel if more than 2 nodes share the same physical medium Node addressing Channel arbitration 4 2

Services provided to the upper network layer Un-acknowledged connection-less service (e.g. Ethernet/IEEE802.3) Acknowledged connection-less service (e.g. WiFi/IEEE802.11, IEEE802.15.4) Connection-oriented service (e.g. IEEE802.16) REMARK: the connection-oriented service is also acknowledged and furthermore it provides flow control 5 Framing Improve channel utilisation in case of more than two nodes sharing it Requested to check errors and recover PDUs Error detection must be performed on blocks of bits (e.g. CRC) The corrupted PDU can be retransmitted Issue: definition of start/end of frame 6 3

Framing 7 Start/end of frame We need to use symbols which are not used to send data otherwise a sequence of data bits could be considered erroneously a start/end of frame Physical signal configurations which are not used for data bits Specific configuration choices can improve bit synchronization between TX and RX Particular sequence of data bit values (FLAG) Bit stuffing/de-stuffing is needed to avoid FLAG simulation in the PDU Inter-packet gap minimum between 2 consecutive frames 8 4

Bit stuffing/de-stuffing Example taken from HDLC protocol Byte 01111110 is used as FLAG at the beginning/end of each frame The bits of the original frame are modified through stuffing After five 1 s a 0 is automatically inserted At the receiver the Data Link layer operates de-stuffing 9 Bit stuffing: example a) Original data from upper layer b) Data transmitted on the wire or over-the - air c) Data at the receiver after de-stuffing. 10 5

Error detection Some bits may have incorrect values at the RX Interference, low-level signal Often errors are not isolated but group into burst Hamming distance Redundant information must be added to the message to check errors m bits of the original message r bits of the code for error detection n=m+r bits transmitted on the channel Code rate = m/n Examples Parity Bit Checksum Circular Redundancy Check (CRC) 11 Parity bit At the TX a bit is appended to the message 1 if the amount of 1 in the message is even 0 if the amount of 1 in the message is odd At the RX if the amount of 1 is even then at least one bit flipped its values One bit or an odd number of bits (we cannot distinguish) Errors affecting an even number of bits are not detected 12 6

Check sum Extension of the concept of parity bit The message is decomposed into r bit words The words are summed and overflow is not taken into account The sum (another r-bit word) is appended to the message The sum is recomputed at the RX If it is different from the appended value an error occurred Errors are not detected if they affect different bits that do not change the sum 13 Circular Redundancy Check (CRC) The message is seen as the coefficients vector of a polynomy M(x) having degree m-1 Let R(x) be the remainder of the polinomial division x r M(x)/G(x) where G(x) is named generating polynomy By construction the polynomy x r M(x)-R(x) is exactly divided by G(x) and it is transmitted on the channel (m+r bit) At RX if the received sequence of bits is exactly divided by G(x) then it is considered correct 14 7

Channel access methods channel Point-to-point (e.g. serial cable) Point-Point Protocol Shared (bus, wireless) Random access CSMA/CD, CSMA/CA Controlled access Polling, token Multiplexing TDMA, FDMA, WDMA, CDMA 15 Point-to-point channel access In a point-to-point channel the arbitration is trivial since there are always two nodes 16 8

Limit of the point-to-point architecture In case of N nodes the number of point-topoint channels is N(N-1) with a quadratic cost increase A shared channel is needed 17 Access in case of shared channel Random access: the node which wants to transmit must wait for the channel to be free (carrier sense) Controlled access: Polling: a master asks to each other node if it has something to transmit Token: a token moves among the nodes; the node with the token can transmit for a given amount of time 18 9

Access in case of shared channel (2) Multiplexing: the physical channel is de-composed into logical channels used by nodes pairs as they were pointto-point channels De-composition methodology: Radio frequency for wireless (Frequency Division Multiplexing o FDM) o light color for optical fibers (Wavelength Division Multiplexing o WDM) Time interval (Time Division Multiplexing TDM) Frequency+time (Code Division Multiplexing CDM) 3G mobile and beyond 19 Problems in case of wireless transmission Interference and path loss Non-negligible bit error rate Collision management more complex Hidden node Exposed Node 20 10

Interference and path loss More devices use the same frequency band (since it is un-licensed) Other wireless nodes Remote controls Microwave owens The signal energy decreases as a function of the distance between TX and RX Obstacles (e.g., walls) Multiple reflections of the signal cause signal distorsion 21 Correct frame probability Probability to receive a correct bit Probability to receive a PDU of length N E.g., N = 1518 byte =12144 bit Caso Ethernet Caso WiFi P frame ok error ( 1 P bit ) = error ( 1 P ) N bit P errore bit = 10 10 P frame ok = 0.9999988 P errore bit = 10 4 P frame ok = 0.2968700 22 11

Limits of carrier sense: Hidden node and exposed node a) Hidden node b) Exposed node 23 Limit of collision detection (CSMA/CD) Collision Detection phase of CSMA/CD is not suitable A double radio interface (to send and sense concurrently) is expensive and useless since most of the collisions happen at the receiver --> Collision Avoidance --> Stop&Wait ack 24 12

Carrier sense CSMA/CA Collision avoidance via random back-off [optional] RTS/CTS 25 MEDIUM ACCESS CONTROL FOR WSN 26 13

Traditionally Fairness Latency Throughput MAC Challenges For Sensor Networks Power efficiency Scalability 27 Power consumption of carrier sense Expected life time of many WSN applications: Months or years Actual lifetime AA batteries: Max. 2000 mah CC2430 radio: 26.7mA in RX mode 2000mAh / 26.7mA = 75 hours = 3 days Keep radio asleep most of the time Ideal duty cycle: 0.1% - 1% 28 14

Texas Instruments CC2430 architecture 29 Power modes in TI CC2430 Time-out Time-out Interrupt 30 15

Power modes in TI CC2430 31 Example of power-efficient MAC 1 s in sleep mode (power mode 2) 0.5 µa 0.005 s in RX mode for carrier sense 26.7 ma 0.005 s in TX mode to send packet 28.1 ma Weighted current consumption (0.0005*1000+26.7*5+28.1*5)/(1010) ~ 0.27 ma With AA batteries: 2000mAh / 0.27 ma ~ 7359 hours ~ 307 days 32 16

Sources of energy waste Collision Retransmissions Idle listening Continuously sense the channel Overhearing Listen to packets addressed to other nodes Packet overhead Header Control packets (e.g., RTS/CTS) 33 Power Save Design Alternatives Wake-up radio A sleeping node can be woken at any time by a secondary receiver (wake-up radio) Asymmetric polling Timer-Based When a node enters sleep mode, it sets a timer to wakeup at a pre-determined time Hybrid Timer-Based plus Wake-up radio 34 17

Wake-up radio Add second, low-power receiver to wakeup the main system on-demand Low-power could be achieved by: Simpler hardware with a lower bit-rate and/or less decoding capability Periodic listening using a radio with identical physical layer as data radio 35 Wake-up radio Interrupt Ultra low-power sub-system 36 18

Asymmetric polling Implemented in IEEE802.15.4 Rules depend on the direction of the transfer 37 Timer-based MAC Scheduled contention (slotted access): Nodes periodically wake up together, contend for channel, then go back to sleep S-MAC Channel polling (random access): Nodes independently wake up to sample channel B-MAC, X-MAC TDMA (Time Division Multiple Access): Nodes maintain a schedule that dictates when to wake up and when they are allowed to transmit DRAND Hybrid: SCP, Z-MAC, 802.15.4 (contention access period + contention free period) 38 19

S-MAC (Sensor MAC) A node sleeps most of the time Periodically wake up for short intervals to see if any node is transmitting a packet Accept latency to extend lifetime 39 S-MAC: SYNC interval Listen time consists of two parts: SYNC and RTS In the SYNC interval some nodes periodically send SYNC packet to synchronize clocks They use CSMA/CA for channel contention Carrier sense Carrier SYNC sense C. Lu, Washington Univ. Saint Louis 40 20

S-MAC: RTS interval RTS/CTS is used to transmit data RTS CSMA/CA followed by RTS/CTS It lost contention C. Lu, Washington Univ. Saint Louis 41 S-MAC: data transmission RTS/CTS contain the expected data TX time Listeners not interested can sleep to save energy Sender does one RTS/CTS and then sends data for the rest of the frame Prefer application performance to node level fairness ACK every data packet Packet fragmentation for higher reliability C. Lu, Washington Univ. Saint Louis 42 21

Pros and Cons of S-MAC More power conserving than standard CSMA/CA During the listening interval, everyone needs to stay awake unless someone transmits Waste energy Time sync overhead RTS/CTS/ACK overhead Complex to be implemented 43 B-MAC (Berkeley MAC) Low Power Listening (LPL) Periodic preamble sampling Preamble > Sleep period No sync between nodes Hidden terminal avoidance and multi-packet mechanisms not provided Sender Sleep Preamble Message t Receiver Sleep Sleep Receive t 44 22

Pros and Cons of B-MAC No need for everybody to stay awake when there is no traffic Just wake up for preamble sampling and go back to sleep Better power conservation, latency and throughput than S-MAC Simpler to implement Low duty cycle longer preamble Little cost to receiver yet higher cost to sender Longer delay More contention 45 X-MAC: Early ACK Include destination address in short preambles Non-receiver avoids overhearing Receiver acknowledges preamble Sender stops sending preamble 46 23

Thoughts on X-MAC Better than B-MAC in terms of latency, throughput and power consumption Energy consumption due to overhearing reduced Simple to implement On average the preamble size is reduced by half compared to B-MAC Still considerable overhead 47 SCP-MAC Scheduled Channel Polling by everybody Avoid long preambles in LPL (Low Power Listening) supported by B-MAC Wake up tone Much shorter than preamble in LPL followed by data Assumption: the listening intervals must be synchronized 48 24

SCP-MAC (2) 49 Time Division Multiple Access (TDMA) Predictable delay, throughput and duty cycle Little packet losses due to contention Scheduling and time sync are difficult Slots are wasted when a node has nothing to send 50 25

TDMA Superframe 51 Z-MAC (Zebra MAC) Runs on top of B-MAC Rely on CSMA under light load Switch to TDMA under high contention 52 26

Z-MAC (Zebra MAC) CSMA Pros Simple Scalable Cons Collisions due to hidden terminals RTS/CTS is overhead TDMA Pros Naturally avoids collisions Cons Complexity of scheduling Synchronization needed 53 Thoughts on Z-MAC Good idea to combine strengths of CSMA and TDMA Complex Especially hard to implement TDMA part How to deal with topology changes? 54 27

IEEE 802.15.4 superframe 55 IEEE 802.15.4 superframe Beacon frame sent periodically by the coordinator It contains the superframe structure and the slottransmitter association map CAP: Contention Access Period CSMA/CA For new nodes to join & reserve slots and for delayinsensitive flows CFP: Contention Free Period TDMA for delay-sensitive flows GTS: Guaranteed Time Slot Inactive period: also the coordinator can sleep 56 28

MAC protocols supported by TinyOS CC1100: experimental B-MAC CC2420: X-MAC 57 29