23
10/6/2008 1 AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE MAC LAYER PROTOCOLS FOR SENSOR NETWORKS MAC Protocols LAYER PROTOCOLS FOR SENSOR NETWORKS AND THEIR BASIC CHARACTERISTICS References… 2 H. Karl and A. Willing. Protocols and Architectures for Wireless Sensor Networks. John Wiley & Sons, 2005. (General) C. Schurgers, V. Tsiatsis, S. Ganeriwal, and M. Srivastava. “Optimizing Sensor Networks in the Energy-Latency-Density Design Space”, in IEEE Trans. on Mobile Computing, Vol. 1, No. 1, pp. 70-80, January-March 2002. (STEM) W. Ye, J. Heidemann, and D. Estrin. “An Energy-Efficient MAC Protocol for Wireless Sensor Networks”, in the Proc. of IEEE INFOCOMM, pp. 1567-1576, June 2002.(S-MAC) E. H. Callaway,Jr. Wireless Sensor Networks: Architectures and Protocols, Auerbach Publications, Chapter 4, 2004. (The meditation device protocol) L. C. Zhong, R. Shah, C. Guo, and J. Rabaey. “An Ultra-Low Power and Distributed Access Protocol for Broadband Wireless Sensor Networks, in the Proc. of IEEE Broadband Wireless Summit, May 2001. (Wakeup radio) A. Woo and D. E. Culler. “A Transmission Control Scheme for Media Access in Sensor Networks”, in Proc. of the 7 th Annual Int’l Conf. on Mobile Computing and Networking (MobiCom), July 2001. (CSMA) S. Singh and C. S. Raghavendra. “PAMAS-Power Aware Multi-Access Protocol with Signaling for Ad Hoc Networks”, in ACM SIGCOMM Computer Communication Review, Vol. 28, Issue 3, pp. 5-26, July 1998. (PAMAS) W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan. “Energy-Efficient Communication Protocol for Wireless Microsensor Networks”, in the Proc. of the 33 rd Hawaii Int’l Conf. on System Sciences, Vol 2, 1o pp , January 2000. (LEACH) K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie. “Protocols for Self-Organization of a Wireless Sensor Network”, in IEEE Personal Communications, Vol. 7, issue 5, pp. 16-27, October 2000. (SMACS) V. Rajendran, K. Obraczka, and J. J. Garcia-Luna-Aceves. “Energy-Efficient Collusion-Free Medium Access Control for Wireless Sensor Networks”. In the Proc. of the 1 st Int’l Conf. on Embedded Networked Sensor Systems (SenSys), pp. 181-192, November 2003. (TRAMA) LAN/MAN Standards Committee of the IEEE Computer Society. IEEE Standard for … Part 15.4: Wireless Medium Access Control (MAC) and Physical (PHY) … October 2003. (IEEE 802.15.4 MAC) Medium Access Control (MAC)… 3 Typical of other networks as well, the transmission medium must be “shared” in WSN. This is known as “channel allocation” or “multiple access” problem. The objective of a MAC protocol is to regulate access t th h d i l di h th t th to the shared wireless medium such that the performance requirements of the “application” are met. MAC protocols have been extensively studied in (wireless) voice and data communications.

03MACProtocols - Department of Computer Science · {Protocols that explicitly attack the idle listening problem {Contention-based protocols are probabilistic as the nodes risk collusions

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 03MACProtocols - Department of Computer Science · {Protocols that explicitly attack the idle listening problem {Contention-based protocols are probabilistic as the nodes risk collusions

10/6/2008

1

A T T H E E N D O F T H I S S E C T I O N , Y O U S H O U L D H A V E A N U N D E R S T A N D I N G O F T H E M A C

L A Y E R P R O T O C O L S F O R S E N S O R N E T W O R K S

MAC Protocols

L A Y E R P R O T O C O L S F O R S E N S O R N E T W O R K S A N D T H E I R B A S I C C H A R A C T E R I S T I C S

References…2

H. Karl and A. Willing. Protocols and Architectures for Wireless Sensor Networks. John Wiley & Sons, 2005. (General)C. Schurgers, V. Tsiatsis, S. Ganeriwal, and M. Srivastava. “Optimizing Sensor Networks in the Energy-Latency-Density Design Space”, in IEEE Trans. on Mobile Computing, Vol. 1, No. 1, pp. 70-80, January-March 2002. (STEM)W. Ye, J. Heidemann, and D. Estrin. “An Energy-Efficient MAC Protocol for Wireless Sensor Networks”, in the Proc. of IEEE INFOCOMM, pp. 1567-1576, June 2002.(S-MAC)E. H. Callaway,Jr. Wireless Sensor Networks: Architectures and Protocols, Auerbach Publications, Chapter 4, 2004. (The meditation device protocol)L. C. Zhong, R. Shah, C. Guo, and J. Rabaey. “An Ultra-Low Power and Distributed Access Protocol for Broadband Wi l S N t k ” i th P f IEEE B db d Wi l S it M 2001 (W k di )Wireless Sensor Networks”, in the Proc. of IEEE Broadband Wireless Summit, May 2001. (Wakeup radio)A. Woo and D. E. Culler. “A Transmission Control Scheme for Media Access in Sensor Networks”, in Proc. of the 7th

Annual Int’l Conf. on Mobile Computing and Networking (MobiCom), July 2001. (CSMA)S. Singh and C. S. Raghavendra. “PAMAS-Power Aware Multi-Access Protocol with Signaling for Ad Hoc Networks”, in ACM SIGCOMM Computer Communication Review, Vol. 28, Issue 3, pp. 5-26, July 1998. (PAMAS)W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan. “Energy-Efficient Communication Protocol for Wireless Microsensor Networks”, in the Proc. of the 33rd Hawaii Int’l Conf. on System Sciences, Vol 2, 1o pp , January 2000. (LEACH)K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie. “Protocols for Self-Organization of a Wireless Sensor Network”, in IEEE Personal Communications, Vol. 7, issue 5, pp. 16-27, October 2000. (SMACS)V. Rajendran, K. Obraczka, and J. J. Garcia-Luna-Aceves. “Energy-Efficient Collusion-Free Medium Access Control for Wireless Sensor Networks”. In the Proc. of the 1st Int’l Conf. on Embedded Networked Sensor Systems (SenSys), pp. 181-192, November 2003. (TRAMA)LAN/MAN Standards Committee of the IEEE Computer Society. IEEE Standard for … Part 15.4: Wireless Medium Access Control (MAC) and Physical (PHY) … October 2003. (IEEE 802.15.4 MAC)

Medium Access Control (MAC)…3

Typical of other networks as well, the transmission medium must be “shared” in WSN. This is known as “channel allocation” or “multiple access” problem. The objective of a MAC protocol is to regulate access t th h d i l di h th t th to the shared wireless medium such that the performance requirements of the “application” are met.MAC protocols have been extensively studied in (wireless) voice and data communications.

Page 2: 03MACProtocols - Department of Computer Science · {Protocols that explicitly attack the idle listening problem {Contention-based protocols are probabilistic as the nodes risk collusions

10/6/2008

2

MAC protocols: Issues…4

Nodes need to exchange some information for the right to access the communication channel at any given time.This requires the use of the communication channel itself (recursive use?)!Spatial distribution of the nodes further complicates the p pproblem, as any information gathered by a node is at least as old as the time required for its propagation…Two intertwined factors influence the aggregate behavior of a distributed MAC:

the intelligence of the decision (to allow a node to transmit) made by the protocol the overhead involved

MAC protocols: Performance metrics…5

Delay—the amount of time a data packet spends in the MAC layerThroughput—the rate at which packets are servicedRobustness—combination of reliability, availability, and dependability requirementsp y qScalability—the ability to meet the performance requirements regardless the size of the networkStability—the ability to handle the traffic load over sustained periods of timeFairness—allocation of the channel capacity evenlyEnergy efficiency—paramount issue importance in WSNs

MAC protocols: Classification…6

MAC protocols

Fixed assignment

Demand assignment

Randomassignment

FDMA

TDMA

CDMA

SDMA

centralized

distributed

ALOHA

CSMA

Page 3: 03MACProtocols - Department of Computer Science · {Protocols that explicitly attack the idle listening problem {Contention-based protocols are probabilistic as the nodes risk collusions

10/6/2008

3

MAC protocols: Classification…27

Schedule based—regulating participants:Who may use which resource at which time (TDMA) Which frequency band can be used in a given physical space (with a given code, CDMA)Schedule can be fixed or computed on demand

Contention basedRisk of colliding packets is deliberately taken Coordination overhead can be saved, resulting in overall improved efficiencyMechanisms to handle/reduce probability/impact of collisions required Usually randomization used

MAC protocols: Fixed assignment…8

The available resources are allocated between the nodes; no competition…FDMA—used by radio systems to share the (radio) spectrum; requires frequency synchronizationTDMA—a digital technology that uses a single frequency channelCDMA—spread spectrum based scheme that allows multiple nodes to transmit simultaneouslySDMA—spatial separation of the nodes is used to separate their transmissions

MAC protocols: Demand assignment…9

To improve channel utilization by allocating the channel to contending nodes (near-)optimallyNeed a control mechanism to arbitrate access Centralized—polling

a master control devices queries each slave node in a predetermined order

Distributed—reservation and tokenSet a time slot for reservation messagesToken holder can transmit

Page 4: 03MACProtocols - Department of Computer Science · {Protocols that explicitly attack the idle listening problem {Contention-based protocols are probabilistic as the nodes risk collusions

10/6/2008

4

MAC protocols: Random assignment…10

Address the short comings of fixed (static) assignment schemesOriginally developed for long radio links and satellite communicationsALOHA—pure, slottedCSMA—CD, CA

Carrier Sensing ContentionNon-persistent CSMA, persistent CSMA, backoffBusy-tone, RTS/CTS

Hidden/exposed terminal problem…11

The hidden-terminal:Consider the following three nodes: A and B are in mutual range, and B and C are in mutual range. But A and C cannot hear each other, thus their packets may collide.

The exposed-terminal:The exposed terminal:B transmits a packet to A, and C wants to transmit a packet to D, but it cannot, because it hears B’s activity.

A B C D

RTS/CTS handshake…12

A B C D

RTS

CTS

Channel busy Channel

busy

Data

Ack

Page 5: 03MACProtocols - Department of Computer Science · {Protocols that explicitly attack the idle listening problem {Contention-based protocols are probabilistic as the nodes risk collusions

10/6/2008

5

RTS/CTS failure…13

A B C D

CTS

RTS

RTS

RTSData

CTS

RTS/CTS failure…214

A B C D

CTS

RTS

RTS

Data CTS

Data

MAC Protocols for WSNs…15

The balance of requirements is different in WSNs.Transmission is costly; receiving often has the same cost as transmission; idling can be cheaper but also as expensive as receiving; sleeping is almost free, but…

Energy problems on the MAC layer:Collusion

U l i d i i l i i Useless receive costs at destination, useless transmission costs at sender

OverhearingReceiving a packet addressed for someone elseSometimes good, though, when collecting information about the WSN

Protocol overheadMAC related control packets, …

Idle listeningCostly; useless in low network loads

Page 6: 03MACProtocols - Department of Computer Science · {Protocols that explicitly attack the idle listening problem {Contention-based protocols are probabilistic as the nodes risk collusions

10/6/2008

6

Energy conserving…16

A number of different MAC protocols are proposed for wireless sensor networks based on their ability to conserve energy:

Protocols that explicitly attack the idle listening problemContention based protocols are probabilistic as the nodes risk Contention-based protocols are probabilistic as the nodes risk collusions. Thus, these protocols have collusion avoidance mechanismsSchedule-based protocols, where only one node gets an opportunity based on an allocated slot

Idle listening: Low duty cycle protocols…17

Try to avoid spending much time in the idle state and to reduce the communication activities to a minimum.Periodic wakeup schemes

Cycled receiver; sleep periodically to receive packets (needs Cycled receiver; sleep periodically to receive packets (needs knowledge of the listeners)Observations:

Small duty cycle transmitter is in sleep mode mostlySmall duty cycle traffic to a given node is concentrated in a small time window; significant competition under heavy loadsLong sleep period significant per-hop latencyShort sleep periods high startup costs

Idle listening: STEM18

Sparse topology and energy management (STEM)Does not cover all aspects of a MAC protocol but provides a solution for idle listening problem and to provide fast transition into the transfer state, if necessary.Targets networks with wait-and-report behaviorg p“topology” in the name: as nodes enter and leave sleep mode, network topology changes.Key requirement: the network stays connected even if some nodes are sleepingNetwork states

Monitor stateTransfer state

Page 7: 03MACProtocols - Department of Computer Science · {Protocols that explicitly attack the idle listening problem {Contention-based protocols are probabilistic as the nodes risk collusions

10/6/2008

7

Idle listening: STEM…219

Two channelsWakeup—time slots (wakeup periods of length T)Data—for underlying MAC protocolListen period of length TRX << T and a sleep period

Wakeup period

Sleep period

Listen period

Wakeupchannel

Datachannel

Idle listening: STEM-B…20

The transmitter issues beacons on the wakeup channel periodically without carrier sensing

Beacon contains MACs for the sender and the receiver

Receiver sends an ACK on the wakeup channel on the receipt of the beaconp o b oBoth nodes switch transmitters and execute regular MAC protocolOther nodes receiving the beacon not destined to them, will continue sleepingBeacon is sent continuously for at least one full wakeup period

Idle listening: STEM-T…21

Transmitter sends a busy tone (no address information) on the control channel for a long time to hit on the receivers listen periodAll neighbor nodes switch on their data channelPacket exchange will start; all not-involved nodes will go back to sleep

Page 8: 03MACProtocols - Department of Computer Science · {Protocols that explicitly attack the idle listening problem {Contention-based protocols are probabilistic as the nodes risk collusions

10/6/2008

8

Idle listening: STEM: Discussion…22

In STEM-B beacon collusions cause the scheme to fall back to STEM-T; the transmitter transmits the beacons for the maximum time, then switches to the data channel and tries the conversation with the receiverA node entering into listen period remains silentLow load situations STEM-T is preferable over STEM-B (why?)Wakeup latency is related to wakeup time TSTEM-B can achieve half the wakeup latency of STEM-T if no collusions occur on the wakeup channel (how?)STEM-T can have energy consumption advantages

Idle listening: S-MAC…23

Developed at UCLA, sensor-MAC (S-MAC) protocol provides mechanisms to circumvent the key energy problemsAdopts a similar wakeup scheme as STEM, but

i l i l h lrequires only a single channelListen period can be used to receive and transmit

Wakeup period

Sleep period

Listen period

For SYNCH For RTS For CTS

Idle listening: S-MAC: Listen phases…24

SYNCH phaseNode x accepts SYNCH packets (describing their schedule) from its neighborsDivided into time slots

RTS phasepx listens for RTS packets from neighboring nodes (RTS/CTS procedure is used to reduce collisions of data packets due to hidden node problem

CTS phaseNode x transmits a CTS packet if an RTS packet is received in the previous phase. After this, packet exchange continues (into x’s sleep period)

Page 9: 03MACProtocols - Department of Computer Science · {Protocols that explicitly attack the idle listening problem {Contention-based protocols are probabilistic as the nodes risk collusions

10/6/2008

9

Idle listening: S-MAC: the protocol…25

When competing for the medium, the nodes use RTS/CTS handshake (including the virtual carrier sense mechanism via NAV); NAV can also be used to avoid overhearingWh b d ti ( SYNCH k t ) th d When broadcasting (e.g., SYNCH packets), the nodes use CSMA with backoffNeighbors agree on the same schedule (of time slots) and create virtual clusters

Idle listening: S-MAC: Virtual clusters…26

Node x listens for at least the globally known synchronization period.

x receives a SYNCH packet from a neighborAdopts the announced scheduleBroadcasts is in one of the neighbors’ next listen period

x picks a schedule and broadcasts iti h d ’ h d l d i h b d k ’x receives another node’s schedule during the broadcast packet’s

contention period; drops its own and follows the otherx receives a new schedule after its own

Some neighbors use his schedule—transmits its SYNCH and data packets according to both schedulesNo neighbor share its schedule—drops own and adopts the other

x periodically listens for a whole synchronization period to relearn its neighbors

Idle listening: S-MAC: Virtual clusters…227

A large multihop network is partitioned into “islands of schedule synchronization”Border nodes have to follow two or more schedules (more energy consumption!)Nodes spend much time in the sleep mode

Pay the price in latency; per-hop latency equals to the sleep period!

Adaptive-listening reduces the latency by half

Page 10: 03MACProtocols - Department of Computer Science · {Protocols that explicitly attack the idle listening problem {Contention-based protocols are probabilistic as the nodes risk collusions

10/6/2008

10

Idle listening: S-MAC: Synchronized islands…28

A A A A A

B B B B

A

B

28

TimeC C C C

D D D

C

D

E E E EE E E

Idle listening: S-MAC: Message passing…29

A message larger than a packet is meaningful to an applicationIn-network processing requires aggregating node to receive a message completelyBut, on wireless media, it is advisable to break a long gpacket into smaller onesSolution: Fragmentation:

A series of fragments is transmitted with a single RTS/CTS exchange between nodes A (sender) and B (receiver)B Acks each;Duration field (in “all” the packets) indicates the “remaining time” for the whole transaction

Idle listening: S-MAC: Message passing…230

The fragmentation scheme is similar to the one used in 802.11

In 802.11, CTS and RTS reserves the medium for only the time of the first fragment, and any other frames does it for the next fragmentgS-MAC can be unfair at times, but fairness has a lesser weight

T-MAC is a variation of S-Mac, where it adaptively shortens the listen period

Page 11: 03MACProtocols - Department of Computer Science · {Protocols that explicitly attack the idle listening problem {Contention-based protocols are probabilistic as the nodes risk collusions

10/6/2008

11

Idle listening: Mediation device protocol…31

Compatible with the P2P communication mode of the 802.15.4 WPAN standardEach node go into sleep periodically and wakeup for short periods to receive packets from neighborsNo global time, each node has its own scheduleAt wakeup, a node transmits a short query beacon with its node address; no packets? Go back to sleepDynamic synchronization is used

A meditation device

Idle listening: Wakeup radio…32

Ideally, a node is in receiving state when a packet is transmitted for it, and a node is in transmitting state when it has a packet to transmit. All other times, it should sleep no idle time!O d k MAC t l th One proposed wakeup MAC protocol assumes the presence of several data channels (it basically extends CSMA into multi-channel CSMA) A separate, ultra low power radio is used

Idle listening: Wakeup radio—The algorithm…33

A node wishing to transmit will randomly pick up a channel. If busy, will continue selecting a channel until found one, else set a timer for each and backoffThe node then transmits a wakeup signal over its

k di h l t th i ki it t wakeup radio channel to the receiver asking it to turn on its main radioDuring idle times, only the wakeup radio is turned on

Page 12: 03MACProtocols - Department of Computer Science · {Protocols that explicitly attack the idle listening problem {Contention-based protocols are probabilistic as the nodes risk collusions

10/6/2008

12

Idle listening: Wakeup radio—The algorithm…234

Problems:No such radio existsRanges of both radios much be identical

Shorter range for wakeup radio—not all potential nodes can be woken uppWider range for wakeup radio—potential hazard in addressing

The wakeup radio has to be able to carry information higher complexity

Contention-based: CSMA protocols…35

CSMA protocols are contention-based, where neighbors try their luck to transmit their packetsWoo and Culler consider a multihop network with a single or a few sinks with the same traffic pattern as STEMSTEM

Contention-based: CSMA—The protocol…36

Idle

Random Delay

C: …A: numtrials = 0

C: busy & numtrials = MaxA: failure

C: non or foreign CTS & numtrials = MaxA: failure

Listen

Await CTS

Await Ack

Backoff

C: idleA: send RTS

C: got CTSA: send data

C: got AckA: success

C: no Ack & numtrials < MaxA: numtrials++; set timer

C: non or foreign CTS & numtrials < MaxA: numtrials++; set timer

C: timeoutA: …

C: busy & numtrials < MaxA: numtrials++; set timer

Idle

C: no Ack & numtrials = MaxA: failure

Page 13: 03MACProtocols - Department of Computer Science · {Protocols that explicitly attack the idle listening problem {Contention-based protocols are probabilistic as the nodes risk collusions

10/6/2008

13

Contention-based: CSMA—The protocol…237

Energy saving measuresthe node’s transceiver can sleep

during the random delayin the backoff mode

Have been investigated:N d d lNo random delayRandom listening time vs constant listening timeFixed window backoff vs exponentially increasing backoff vsexponentially decreasing backoff vs no backoff

Protocols with random delay, fixed listen time, and a backoff algorithm with sleeping radio transceiver give the best throughput and lowest aggregate energy consumption

Contention-based: PAMAS…38

The Power Aware Multi-access with Signaling (PAMAS) is originally designed for ad hoc networks,

detailed overhearing avoid mechanismno idle listening solutionCombines busy tone with RTS/CTS handshakingCombines busy tone with RTS/CTS handshakingUses two channels: data and signaling

Contention based: PAMAS—The protocol…39

IdleAwait packet

1 time unitBEB

Await CTS

No packet or noise Packet to send; sendRTS to destinationif not transmitting

No CTS or Busy toneor unrelated RTS

d d d

New RTS;Send CTS*

Receive RTS;Send CTS*

Receive RTS;Send CTS*

Receive packet

Transmit packet

End of transmission

Receive CTSPacket receivedPacket is arriving;Transmit busy tone

Receive RTS;Send CTS*

*if data channel is idle andNo noise over signaling channel

Time expired and destinationis not transmitting; Send RTS

Receive other RTS; Transmit busy Tone. Ignore all CTSs received Ignore RTS/CTS transmissions

Busy tone > 2*CTS length

Page 14: 03MACProtocols - Department of Computer Science · {Protocols that explicitly attack the idle listening problem {Contention-based protocols are probabilistic as the nodes risk collusions

10/6/2008

14

Contention-based: PAMAS—To power off or...40

Conditions to power off:No packet to transmit and a neighbor is begins transmittingOne neighbor is transmitting and another is receiving

Two questions to answer:How long to power off?

When a packet transmission begins in the neighborhood, sleep lWh k if th d t h l i b b k t l b t h l ? When wakeup, if the data channel is busy, go back to sleep, but how long? Probe protocol

Send a probe(l) message l is max packet lengthDoes a binary search to determine when the last transmission ends

What happens if a neighbor wishes to transmit when sleeping?Nothing important…

Good power savingsSparse network, light load 20-30% (high load 10%; longer contention)Dense network, light load 60-70% (high load 30-40%)

Schedule-based: LEACH…41

The Low-energy Adaptive Clustering Hierarch (LEACH) assumes dense, homogeneous sensor network with energy constraint nodes and the base station is far away from the sensors themselvesN d titi d i t l t ith d di t d Nodes are partitioned into clusters, with a dedicated clusterhead node in each cluster (other nodes are member nodes)

Clusterhead

Member node

Schedule-based: LEACH…242

Randomized (and dynamic) rotation of clusterheadsSelf election with a certain probability

Self elected clusterheads broadcasts their status to othersNodes determine their clusterheadsOnce the cluster is formed, the clusterhead creates a Once the cluster is formed, the clusterhead creates a “schedule” for its nodes (nodes turn off their radios during other slots)

Local “data fusion” (data aggregation) to reduce energy dissipation and enhanced system lifetimeCompress data is sent to the base station

High energy operation, but only a few nodes operate

Page 15: 03MACProtocols - Department of Computer Science · {Protocols that explicitly attack the idle listening problem {Contention-based protocols are probabilistic as the nodes risk collusions

10/6/2008

15

Schedule-based: LEACH…343

The number of clusters is criticalFewer larger energy consumption (distance to the base is far)More more transmissions to the sink; larger energy consumptionp5% of the nodes being clusterheads is optimal

7x-8x energy reduction compared to direct communication

Schedule-based: LEACH—The algorithm…44

Broken up into rounds; each round has two phases:Setup phase

(Clusterhead) advertisement phaseCSMA MAC protocol: cluster heads advertise, nodes select

Schedule creationBased on the number of members the clusterhead creates and Based on the number of members, the clusterhead creates and broadcasts a TDMA schedule

Steady-state phaseNodes transmit during their allocated transmission time (uses minimal energy, because of the clusterhead selection) Nodes can sleep until their time (and has data to transmit)Clusterhead receives data, aggregates them, and send to base stationTo reduce interference clusters use different CDMA codes (and informs the members)

Schedule-based: LEACH—Rounds…45

Setup phase Steady-state phase

Fixed-length round

Advertisement phase

Cluster setup phase

Broadcast schedule

Time slot

1…Time

slot 2

Time slot

n

Time slot 1

…Self-election ofclusterheads

Clusterheads compete with CSMA

Members compete with CSMA

Page 16: 03MACProtocols - Department of Computer Science · {Protocols that explicitly attack the idle listening problem {Contention-based protocols are probabilistic as the nodes risk collusions

10/6/2008

16

Schedule-based: SMACS…46

Self-organizing Medium Access Control for Sensor Networks (SMACS)It is a protocol in a suite for organization, routing, management for MANETs to optimize for QoSIt is an infrastructure-building protocol that forms a flat topology for sensor networksSMACS is a distributed protocol which enables a collection of nodes to discover neighbors and establish schedules for communicating with them without the need of a “master” nodeNeighbor discovery and channel assignment phases are combined

Schedule-based: SMACS—Assumptions…47

The available spectrum is subdivided into many channels (and many CDMA codes are available)Each node can tune to an arbitrary channelMost of the nodes are stationary and remain as such for a long timelong timeEach node divides its time locally into fixed-length superframes of Tframe lengthSuperframes are subdivided into timeslots

F

BC

D

A

Schedule-based: SMACS—Self-organization…48

Non Synchronous scheduled communications

fx fx… …

Tframe

Trans. SLOT

Recv. SLOT

Node D

D and A find each other

fx fx… …Ta

Td

Node A

fy …

…Tc

Tb

Node B

Node Cfy

B and C find each other

Page 17: 03MACProtocols - Department of Computer Science · {Protocols that explicitly attack the idle listening problem {Contention-based protocols are probabilistic as the nodes risk collusions

10/6/2008

17

Schedule-based: SMACS—Node discovery…49

fy …

…Tc

Tb

Node B

Node Cfy

B and C find each other

c

Node B

Node C

Node G (not shown)

Initial listening timeType 1Type 2

Type 3

Type 3

Type 4

Type 1 Type 2

Schedule-based: SMACS—Nodes finding…50

Nodes wake up at random times, and listen to the channel for a random amount of timeA node (C) will transmit an invitation (TYPE 1) by the end of its initial listen time if not heard the same from othersNodes hearing the invitation (B and G, not shown), broadcast a response (TYPE 2) during the interval following the reception of TYPE 1 at a random timeIf responses don’t collide and heard by C, C must chose only one respondent (first)Node C sends TYPE 3 immediately after the interval following TYPE 1 to notify all y g yrespondents of the chosen oneNode G was not chose, it turns off its transmitter for a while and starts the search againIf C is already attached, it’ll transmit its schedule info along with the time its next superframe will start in the body of TYPE 3Node B compares the schedules and time offsets and arrives at a set of two free time intervals as the slots assigned to the link between B and CB sends this information with the randomly selected frequency band to node C in the body of TYPE 4After a pair of short test messages, the link is added to the nodes’ schedules permanently

Schedule-based: SMACS—Startup messages…51

TYPE 1A short invitation containing a node’s ID and number of attached neighbors (send by inviter)

TYPE 2Response to TYPE 1 by an invitee; gives the inviter and invitee’s IDs and invitee’s attached state

TYPE 3Response to TYPE 2; indicating which invitee is chosen. Depending on the node’s attached p g p gstate contains:

Inviter not attached: noneBoth attached; inviter’s schedule and frame epochInvitee not attached, inviter attached: proposed channel for the link

TYPE 4Response to TYPE 3; contains

None attached: channel determined by the inviteeInvitee not attached, inviter attached: noneInvitee attached, inviter not attached: channel determined by the inviteeBoth attached: channel determined from own and inviter’s schedule information

Page 18: 03MACProtocols - Department of Computer Science · {Protocols that explicitly attack the idle listening problem {Contention-based protocols are probabilistic as the nodes risk collusions

10/6/2008

18

Schedule-based: TRAMA…52

The Traffic-Adaptive Medium Access Protocol (TRAMA) reduces energy consumption by providing collision-free transmissions and low-power idle stateAssumes single time-slotted channel and uses a distributed election scheme to determine which node can transmit at a particular slotpDivides time into:

Random access: signaling slotsScheduled access: transmission slots

Consists of:Neighbor protocol (NP)Schedule exchange protocol (SEP)Adaptive election algorithm (AEA)

Schedule-based: TRAMA…253

NPPropagates one-hop neighbor information among neighboring nodes during random access period (contention based channel acquisition and signaling)

SEPExchange traffic-based information, or schedules (information on traffic originating from a node), with neighbors

AEASelects transmitters and receivers to achieve collision-free transmission using the information from NP and SEP

Random transmission collisionsTransmitters without receivers energy waste

Schedule-based: TRAMA—Packet contents…54

Type Sourceaddress

Destinationaddress DelNum Deleted

Node IDsAdded

Node IDsAddNum

Type Sourceaddress

Destinationaddress Timeout NumSlots Bitmap

Signal header

Data header

Schedule packet

… …

Reserved GiveupScheduleannouncement

Changeover Slot

N=4; 4 one-hop neighbors

Sourceaddress Timeout NumSlots BitmapsWidth … Bitmaps

Page 19: 03MACProtocols - Department of Computer Science · {Protocols that explicitly attack the idle listening problem {Contention-based protocols are probabilistic as the nodes risk collusions

10/6/2008

19

Schedule-based: TRAMA—NP…55

TRAMA starts in random access mode where each node selects a slot randomlyNodes can only join the network during the random access periods (occur more often in dynamic networks)NP gathers neighborhood information by exchanging small signaling packets carrying incremental small signaling packets, carrying incremental neighborhood updatesIf no updates, the signaling packets serve as “keep-alive” beaconsA node times out its neighbor if it does not hear from it for a certain period of timeThe updates are transmitted to ensure 99% probability of success

Schedule-based: TRAMA—SEP…56

Establishes and maintains traffic-based schedule information required by the transmitter (e.g. slot re-use) and the receiver (i.e. sleep state switching)A node’s schedule captures a window of traffic to be transmitted by the node; schedules have timeoutsNodes announce their schedule via schedule packetsThe intended receiver information is conveyed using a bitmapA schedule summary is also send during data transmission to minimize effects of packet loss in schedule disseminationNodes maintain schedule information for their one-hop neighbors, which is consulted when neededAn unused slot is called Changeover slot; all nodes listen during the Changeover slot of the transmitter to synchronize their schedule

Schedule-based: TRAMA—AEA…57

At any given time slot t during the scheduled access period, the state of a node u is determined based on its two-hop neighborhood information and the schedules of it’s one-hop neighbors; possible states are: transmit (TX) receive (RX) or sleep (SL)are: transmit (TX), receive (RX), or sleep (SL)

Node u is in TX state if (1) u has the highest priority among its contending set and (2) u has data to sendNode u is in RX state when it is the intended receiver of the current transmitterOtherwise the node can be turned off to SL state

Page 20: 03MACProtocols - Department of Computer Science · {Protocols that explicitly attack the idle listening problem {Contention-based protocols are probabilistic as the nodes risk collusions

10/6/2008

20

Schedule-based: TRAMA—Winners…58

The state of a node u depends on the Absolute Winnerand the schedules of its one-hop neighborsFrom node u’s perspective, the Absolute Winner at a time slot t can be:

Node u itselfNode v that lies in the two-hop neighborhood of node u in which case the Alternate Winner atx(u) is to be considered if hidden from node vNode w that lies in node u’s one-hop neighborhood

The Absolute Winner is the assumed transmitter unless the Alternative Winner is hidden from the Absolute Winner and it belongs to the Possible Transmitter Set

The IEEE 802.11.4 MAC protocol…59

The standard covers both the physical and the MAC layers of a low-rate Wireless Personal Area Network (WPAN)The (asymmetric) MAC protocol combines both contention-based and schedule-based schemescontention based and schedule based schemesTwo types of nodes:

Full Function Device (FFD); it can be a PAN coordinator, a simple coordinator, and a deviceA Reduced Function Device (RFD); can operate as only a device

A device must be associated with a FFD to form a star network.

The coordinator…60

Manages a collection of associated devicesDeals with device addressing

Assigns short addresses to its devices

Regularly transmits frame beacon packetsAnnounces the PAN identifier, list of outstanding frames, etc.

Exchanges data packets with devices and with peer coordinators

Page 21: 03MACProtocols - Department of Computer Science · {Protocols that explicitly attack the idle listening problem {Contention-based protocols are probabilistic as the nodes risk collusions

10/6/2008

21

The superframe…61

The coordinator operating in beacon mode organizes channel access and data transmission with the help of superframe structureThe lengths of the active and inactive periods as well as the length of a single time slot and the usage of GTS slots are configurable

A ti i d I ti i dActive period Inactive period

BeaconContention

access period(CAP)

Guaranteed time slots

(GTS)

GTS management…62

The coordinator allocates GTS to devices when receive requests packets (for a transmit or a receive slot) during the CAPAnswers the request packets in two steps:

An immediate acknowledgementAn immediate acknowledgementAfter receiving the acknowledgement, the device must track the coordinator’s beacons for a while to see when the required time slots are allocated. The device can use the slots as long as they are announced in the GTS descriptor

Allocates GTS to a node if has sufficient resources and, until resources become scarce and the GTS is explicitly deallocated

Devices can renegotiate if a GTS allocation request fails

Data transfer…63

If a device has an allocated transmit GTS, it wakes up just before the slot and sends its packet immediately

This is only possible if the allocated slots are large enough to hold the data, as well as the coordinator acknowledgment and appropriate InterFrame Spaces (IFSs)pp p p ( )Otherwise, the data is sent during the CAP using a slotted CSMA protocolThe coordinator always sends an acknowledgement packet

When the coordinator is unable to use a receive GTS (of the device), a simple handshake protocol is executed and the coordinator transmits the data

Page 22: 03MACProtocols - Department of Computer Science · {Protocols that explicitly attack the idle listening problem {Contention-based protocols are probabilistic as the nodes risk collusions

10/6/2008

22

Slotted CSMA-CA protocol…64

NB=0; CW=2;BE=macMinBE

Await next backoff period

boundaryCW--; CW=0?

SuccessTransmit data

Y

N

y

Random delay

Channelidle?

NB++; CW=2;BE=min(BE+1,a

MaxBE)

NB>MaxCSMA

Backoffs?

Failure

CCA on backoffperiod boundary

Y Y

N

N

Nonbeaconed mode…65

The coordinator does not send beacon frames, nor is there any GTS mechanism (time synchronization is disabled)All packets are transmitted using a unslotted CSMA-CA protocolCoordinators must always be on, but devices can follow their own sleep schedule and wake up when

To send a data/control packet to the coordinatorTo fetch a packet destined to self from the coordinator using the data request/acknowledgement/data/acknowledgement handshakeData request packet is sent through unslotted CSMA-CA mechanism (device must stay awake for a certain period of time)

IEEE 802.11 and Bluetooth…66

Given a number of wireless MAC protocols particularly IEEE 802.11 and Bluetooth) , why not use them?

Bluetooth is designed as a WPAN with one major applicationConnection of devices to a PCIt is already been tried for a wireless sensor network applicationDrawbacks:

Constantly need a master polling its slavesy p gLimited number of active slaves (8) per piconet

IEEE 802.11 family of protocols have several physical layers to share a single MAC protocol

Drawbacks:A node x must constantly be in listen mode since another node y may attempt transmitting to x at the same timeNodes need to overhear RTS/CTS to adjust their NAVs properlyTailored for higher bit ratesIt is a single-hop protocol for both infrastructure and ad hoc scenarios

Page 23: 03MACProtocols - Department of Computer Science · {Protocols that explicitly attack the idle listening problem {Contention-based protocols are probabilistic as the nodes risk collusions

10/6/2008

23

Summary…67

Protocol Flat/Clustered

# ofChannels

Idle listening

Overhearing Collusion

OverheadAvoidance

STEM Both 2 Periodic sleep STEM-B Depends on MAC

wakeup beacons

S-MAC Flat 1 Periodic sleep NAV RTS/CTS RTS/CTS; SYNC; …

M di ti Flat 1 Periodic sleep implicit No Mediator Mediation device

Flat 1 Periodic sleep implicit No Mediator service; …

Wakeup radio Flat ≥2 Wakeup signal Wakeup signal Multichannel CSMA

Wakeup radio

CSMA Flat 1 --- Sleep RTS/CTS RTS/CTS

PAMAS Flat 2 --- Yes RTS/CTS; busy tone

Signaling channel

LEACH Rotating clusters

1 TDMA TDMA TDMA Clusterformation; …

SMACS Flat Many TDMA TDMA TDMA Channel setup;…

TRAMA Flat 1 Scheduling Scheduling Scheduling NP; SEP