SlideShare a Scribd company logo
1 of 33
Versatile Low Power Media Access
for Wireless Sensor Networks
Presented by: Michael Rushanan
Disclaimer: All figures and tables were shameless taken from
Joseph Polastre et al.’s work, “Versatile Low Power Media
Access for Wireless Sensor Networks. They are not my own.
Background
• Media access control – part of layer 2.
Provides addressing and channel access
control mechanisms such that multiple
devices can communicate on a shared
medium (e.g., Ethernet).
• Carrier sense media access – transmitter
uses feedback from receiver to detect
the presence of a carrier wave prior to
transmission.
• Duty cycle - % time spent in active state
as a fraction of total time. D = pulse
duration/period.
Discussion
• Why is the duty cycle important in wireless sensor networks?
• In the context of this paper, assuming we have all read it,
what is meant by versatility and low power?
Versatile, Low Power?
• Wireless sensor network deployments need to reliably report
data while consuming the least amount of power possible.
– If you consume too much power, than the data might never make it in
a multihop network. Vital sensing of the physical environment might
never happen.
Versatile, Low Power?
• Mainwaring et al. show that MAC mechanisms must support
duty cycles of 1% while efficiently transferring workloads and
adapting to changing network conditions.
– These are ad-hoc networks, where nodes come and go. Conditions are
going to physically change (e.g., Rain) thus affecting the topology of
the network. Network links are unpredictable.
Versatility, Low Power?
• Volatility in link quality in wireless sensor networks is
important. “Gray areas” represent nodes that exceed 90%
reception with neighboring nodes of <50% reception.
• Effectively estimating link quality is essential.
• Snooping on traffic over broadcast medium is crucial for
determining cycles, unreachable routes, collision avoidance,
and providing link quality information. However, this is at the
cost of power.
Discussion
• What does B-MAC stand for?
• What is one high-level goal of B-MAC?
B-MAC
• To meet the demands of versatility and power, Polastre et al.
translate these high-level goals for B-MAC, their media access
protocol:
– Low Power Operation
– Effective Collision Avoidance
– Simple Implementation, Small Code/RAM Size
– Efficient Channel Utilization at varying Data Rates
– Reconfigurable By Network Protocols
– Tolerant to Changing RF/Networking Conditions
– Scalable to Large Number of Nodes
Discussion
• Can anyone list, at the item level, some of the related work
mentioned in the paper?
Previous Work
• Most MAC protocols for wireless sensor networks have been
based on conventional wireless protocols.
• This is unfortunate, however, as Intanagonwiwat et al. show
that 802.11 is inappropriate for low duty cycle sensor network
data deliver because it consumes as much energy when the
protocol is idle as it does when receiving data.
Previous Work
• DARPA Packet Radio Network (PRNET)
– One of the first ad-hoc multihop wireless networks.
– Packet-switched, store-and-forward radio communications to provide
reliable computer communications to
mobile hosts and terminals.
– PRNET had two media access protocols:
• Slotted Aloha: Pure ALOHA allowed each client
to send its data and collisions were handled with an
ack/retransmit. Slotted introduced discrete time- s
slots. Station could only send at the beginning.
• Carrier Sense Multiple Access.
– Much of MAC Functionality
(e.g., random delays, forwarding delays,
link quality estimation, and low duty cycle)
were first executed in PRNET.
Previous Work
• MAC Protocol Based On Workload
– Woo and Culler show that data, sent periodically in short packets in a
multihop network, achieve fairness and energy efficient transmission
via adaptive rate control protocol optimized for n-to-1 data reporting.
– Current MAC protocols are not suitable due to their inability to
support low-duty cycles.
• Preamble Sampling
– Hill and Culler present a low power technique by way of reduce idle
listening costs. The technique involves radio sampling for energy every
4s and then going back to sleep. This quick sample reduced duty cycle
of the radio to below 1%.
Previous Work
• S-MAC
– RTS/CTS (Ready-to-send, clear-to-send) scheme for wireless sensor
networks.
– Periodically sleeps, wakes up, listens to the channel, and then returns
to sleep.
– Active period static at 115ms, sleep period variable.
– The length of the sleep period dictates the duty cycle.
– At the beginning of each active period, nodes exchange sync info.
– Post SYNC, nodes can transfer data for remainder of active period
using RTS-CTS.
– Fragmentation uses the RTS-CTS scheme to reserve the channel, then
transmit packets in a burst.
Previous Work
• T-MAC
– Improves S-MAC’s energy usage by using a very short listening window
at the beginning of each active period.
– After SYNC, the short window allows send/receive RTS and CTS
packets. If no activity, the node simply returns to sleep.
– This adaptive duty cycle saves power at the cost of reduced
throughput and additional latency.
Discussion
• What is a major difference between S-MAC and B-MAC
mentioned in the paper?
B-MAC Implementation
• CSMA Protocol for low power wireless sensor networks.
• Flexible protocol for: target tracking, localization, triggered
event reporting, and multihop routing.
• Classical MAC protocols perform channel access arbitration
and tuned for a specific workload, such as S-MAC. B-MAC
contains a small core of media access functionality – clear
channel assessment (CCA).
• B-MAC is only a link protocol with network services (e.g.,
organization, synchronization, and routing built above it).
B-MAC Implementation
• Clear Channel Assessment and packet backoffs are used for
channel arbitration, link layer acknowledgements for
reliability, and low power listening (LPL) for low power
communication.
– For effective collision avoidance, determine if the channel is clear with
CCA.
– Ambient noise dependent upon the physical environment. Thus, signal
strength is sampled when the channel is clear (a noise floor is
computed).
B-MAC Implementation
• Handling Ambient Noise.
– Times when channel is clear: Right after sending a packet.
– Samples are entered into a queue. Median of queue is computed and
added to an exponentially weighted moving average with some decay
(glossing over details on purpose). This is used as a low pass filter.
• B-MAC searches for outliers in the received signal such that
the channel energy is significantly below the noise floor. If an
outlier exists, B-MAC declares the channel is clear since a valid
packet could never have an outlier significantly below the
noise floor.
B-MAC Implementation
Discussion
• Can you turnoff CCA?
• How are channel backoff times defined?
• What about channel congestion backoffs?
B-MAC Implementation
• B-MAC provides an optional link-layer ACK support.
– If ACK enabled, B-MAC immediately transfers an ACK code after
receiving a unicast packet.
– If transmitting node receives ACK, ACK bit is set in the sender’s
transmission message buffer.
• B-MAC duty cycles the radio through periodic channel
sampling called low power listening (LPL).
– Similar to sampling in Aloha.
– Each time a node wakes up, it turns on radio and checks for activity. If
activity: stays awake for time to receive. After reception, back to sleep.
If no activity: forced back to sleep based on timeout.
B-MAC Implementation
• Reliably receive data,
preamble length is matched
to the interval that the
channel is checked for activity.
• If channel checked every
100ms, then preamble must
be 100ms long for node to
wake up, detect activity,
receive preamble, and then
receive message.
Discussion
• Who can tell me what this figure is all about?
B-MAC Implementation
• Modeling Lifetime
– I admit it, I am lazy. Rather than regurgitate formulas here… there is
only one important one:
NRG_Consumed = NRG(rx) + NRG(tx) + NRG(listen/idle) + NRG(sleep)
Discussion
• Who can tell me what’s going on in these two graphs?
Discussion
• What did you think of the experimental method section?
– Was it necessary?
• What were some of the variables of the experimental setup?
Experimental Method
• Graphs, tables, and figures! Oh my!
Experimental Method
Micro-Benchmark Analysis
Micro-Benchmark Analysis
Micro-Benchmark Analysis
Micro-Benchmark Analysis
Discussion
• What were your thoughts of this paper?
• Prior to this paper, had anyone considered the duty-cycle and
how important the physical environment is with respect to
adhoc networks of WSNs?
• Security Question: From an attackers perspective, how might
you thwart a vital WSN?

More Related Content

What's hot

MANET routing protocols Issues and Classifications
 MANET routing protocols Issues and Classifications MANET routing protocols Issues and Classifications
MANET routing protocols Issues and ClassificationsArunChokkalingam
 
Mac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshareMac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshareChih-Yu Lin
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingArunChokkalingam
 
Swayambhoo Presentation (2)
Swayambhoo Presentation (2)Swayambhoo Presentation (2)
Swayambhoo Presentation (2)swayambhoo
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc networkshashi712
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocolsDarwin Nesakumar
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)hinalala
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsChandra Meena
 
Lect04 (1)
Lect04 (1)Lect04 (1)
Lect04 (1)hinalala
 
RF measurement and optimization Engineer EMERSON EDUARDO RODRIGUES
RF measurement and optimization Engineer EMERSON EDUARDO RODRIGUESRF measurement and optimization Engineer EMERSON EDUARDO RODRIGUES
RF measurement and optimization Engineer EMERSON EDUARDO RODRIGUESEMERSON EDUARDO RODRIGUES
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmnmmjalbiaty
 
Bandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingBandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingMeenakshi Paul
 

What's hot (20)

MANET routing protocols Issues and Classifications
 MANET routing protocols Issues and Classifications MANET routing protocols Issues and Classifications
MANET routing protocols Issues and Classifications
 
Mac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshareMac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshare
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient Routing
 
Swayambhoo Presentation (2)
Swayambhoo Presentation (2)Swayambhoo Presentation (2)
Swayambhoo Presentation (2)
 
Medium access control unit 3-33
Medium access control  unit 3-33Medium access control  unit 3-33
Medium access control unit 3-33
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
Performance and traffic management for WSNs
Performance and traffic management for WSNsPerformance and traffic management for WSNs
Performance and traffic management for WSNs
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
 
Module3 part1
Module3 part1Module3 part1
Module3 part1
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 
Mac adhoc
Mac adhocMac adhoc
Mac adhoc
 
Lect04 (1)
Lect04 (1)Lect04 (1)
Lect04 (1)
 
RF measurement and optimization Engineer EMERSON EDUARDO RODRIGUES
RF measurement and optimization Engineer EMERSON EDUARDO RODRIGUESRF measurement and optimization Engineer EMERSON EDUARDO RODRIGUES
RF measurement and optimization Engineer EMERSON EDUARDO RODRIGUES
 
Lte model drx
Lte model drxLte model drx
Lte model drx
 
Topic5
Topic5Topic5
Topic5
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
 
Bandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum SpreadingBandwidth Utilization Multiplexing and Spectrum Spreading
Bandwidth Utilization Multiplexing and Spectrum Spreading
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 

Viewers also liked

Viewers also liked (17)

4. lapis session presentation
4. lapis session presentation4. lapis session presentation
4. lapis session presentation
 
training report cover page
 training report cover page training report cover page
training report cover page
 
OSI 7 Layer model
OSI 7 Layer modelOSI 7 Layer model
OSI 7 Layer model
 
Introduction to the osi 7 layer model
Introduction to the osi 7 layer modelIntroduction to the osi 7 layer model
Introduction to the osi 7 layer model
 
OSI Layers
OSI LayersOSI Layers
OSI Layers
 
ISO OSI Model
ISO OSI ModelISO OSI Model
ISO OSI Model
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
7 osi layer
7 osi layer7 osi layer
7 osi layer
 
Circuit Switching
Circuit SwitchingCircuit Switching
Circuit Switching
 
Switching
SwitchingSwitching
Switching
 
Switching seminar ppt
Switching seminar pptSwitching seminar ppt
Switching seminar ppt
 
Circuit switching packet switching
Circuit switching  packet  switchingCircuit switching  packet  switching
Circuit switching packet switching
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniques
 
Osi model
Osi modelOsi model
Osi model
 
OSI Model
OSI ModelOSI Model
OSI Model
 
4G Technology
4G Technology4G Technology
4G Technology
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 

Similar to Versatile Low Power Media Access for Wireless Sensor Networks

UNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdfUNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdfMathavan N
 
performanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfperformanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfABYTHOMAS46
 
Unit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxUnit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxABYTHOMAS46
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...ArunChokkalingam
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
A preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor NetworkA preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor Networkdiala wedyan
 
Thesis Presentation on Renewal theory based 802.15.6 latest.pptx
Thesis Presentation on Renewal theory based 802.15.6 latest.pptxThesis Presentation on Renewal theory based 802.15.6 latest.pptx
Thesis Presentation on Renewal theory based 802.15.6 latest.pptxssuserc02c1f
 
High performance browser networking ch5,6
High performance browser networking ch5,6High performance browser networking ch5,6
High performance browser networking ch5,6Seung-Bum Lee
 
MAC Protocol.pdf
MAC Protocol.pdfMAC Protocol.pdf
MAC Protocol.pdfAbyThomas54
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkijcsa
 
Ec 2401 wireless communication unit 5
Ec 2401 wireless communication   unit 5Ec 2401 wireless communication   unit 5
Ec 2401 wireless communication unit 5JAIGANESH SEKAR
 
Passive Optical Networks: The MAC protocols
Passive Optical Networks: The MAC protocolsPassive Optical Networks: The MAC protocols
Passive Optical Networks: The MAC protocolsGiovanni Murru
 
L1 by-mr
L1 by-mrL1 by-mr
L1 by-mrwael-b1
 

Similar to Versatile Low Power Media Access for Wireless Sensor Networks (20)

UNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdfUNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdf
 
PROGRESS 1& 2.ppt
PROGRESS 1& 2.pptPROGRESS 1& 2.ppt
PROGRESS 1& 2.ppt
 
performanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfperformanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdf
 
Unit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxUnit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptx
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
1.CN-PPT.ppt
1.CN-PPT.ppt1.CN-PPT.ppt
1.CN-PPT.ppt
 
A preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor NetworkA preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor Network
 
Thesis Presentation on Renewal theory based 802.15.6 latest.pptx
Thesis Presentation on Renewal theory based 802.15.6 latest.pptxThesis Presentation on Renewal theory based 802.15.6 latest.pptx
Thesis Presentation on Renewal theory based 802.15.6 latest.pptx
 
High performance browser networking ch5,6
High performance browser networking ch5,6High performance browser networking ch5,6
High performance browser networking ch5,6
 
MAC Protocol.pdf
MAC Protocol.pdfMAC Protocol.pdf
MAC Protocol.pdf
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Wsn protocols
Wsn protocolsWsn protocols
Wsn protocols
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor network
 
Ec 2401 wireless communication unit 5
Ec 2401 wireless communication   unit 5Ec 2401 wireless communication   unit 5
Ec 2401 wireless communication unit 5
 
mn paper
mn papermn paper
mn paper
 
Passive Optical Networks: The MAC protocols
Passive Optical Networks: The MAC protocolsPassive Optical Networks: The MAC protocols
Passive Optical Networks: The MAC protocols
 
wsn
wsnwsn
wsn
 
L1 by-mr
L1 by-mrL1 by-mr
L1 by-mr
 

More from Michael Rushanan

Security and Privacy in Implantable Medical Devices
Security and Privacy in Implantable Medical DevicesSecurity and Privacy in Implantable Medical Devices
Security and Privacy in Implantable Medical DevicesMichael Rushanan
 
Reading Group Presentation: Web Attacks on Host-Proof Encrypted Storage
Reading Group Presentation: Web Attacks on Host-Proof Encrypted StorageReading Group Presentation: Web Attacks on Host-Proof Encrypted Storage
Reading Group Presentation: Web Attacks on Host-Proof Encrypted StorageMichael Rushanan
 
Reading Group Presentation: The Power of Procrastination
Reading Group Presentation: The Power of ProcrastinationReading Group Presentation: The Power of Procrastination
Reading Group Presentation: The Power of ProcrastinationMichael Rushanan
 
600.250 UI Cross Platform Development and the Android Security Model
600.250 UI Cross Platform Development and the Android Security Model600.250 UI Cross Platform Development and the Android Security Model
600.250 UI Cross Platform Development and the Android Security ModelMichael Rushanan
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecurityMichael Rushanan
 
Reading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love AndroidReading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love AndroidMichael Rushanan
 

More from Michael Rushanan (6)

Security and Privacy in Implantable Medical Devices
Security and Privacy in Implantable Medical DevicesSecurity and Privacy in Implantable Medical Devices
Security and Privacy in Implantable Medical Devices
 
Reading Group Presentation: Web Attacks on Host-Proof Encrypted Storage
Reading Group Presentation: Web Attacks on Host-Proof Encrypted StorageReading Group Presentation: Web Attacks on Host-Proof Encrypted Storage
Reading Group Presentation: Web Attacks on Host-Proof Encrypted Storage
 
Reading Group Presentation: The Power of Procrastination
Reading Group Presentation: The Power of ProcrastinationReading Group Presentation: The Power of Procrastination
Reading Group Presentation: The Power of Procrastination
 
600.250 UI Cross Platform Development and the Android Security Model
600.250 UI Cross Platform Development and the Android Security Model600.250 UI Cross Platform Development and the Android Security Model
600.250 UI Cross Platform Development and the Android Security Model
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
 
Reading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love AndroidReading Group Presentation: Why Eve and Mallory Love Android
Reading Group Presentation: Why Eve and Mallory Love Android
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Versatile Low Power Media Access for Wireless Sensor Networks

  • 1. Versatile Low Power Media Access for Wireless Sensor Networks Presented by: Michael Rushanan Disclaimer: All figures and tables were shameless taken from Joseph Polastre et al.’s work, “Versatile Low Power Media Access for Wireless Sensor Networks. They are not my own.
  • 2. Background • Media access control – part of layer 2. Provides addressing and channel access control mechanisms such that multiple devices can communicate on a shared medium (e.g., Ethernet). • Carrier sense media access – transmitter uses feedback from receiver to detect the presence of a carrier wave prior to transmission. • Duty cycle - % time spent in active state as a fraction of total time. D = pulse duration/period.
  • 3. Discussion • Why is the duty cycle important in wireless sensor networks? • In the context of this paper, assuming we have all read it, what is meant by versatility and low power?
  • 4. Versatile, Low Power? • Wireless sensor network deployments need to reliably report data while consuming the least amount of power possible. – If you consume too much power, than the data might never make it in a multihop network. Vital sensing of the physical environment might never happen.
  • 5. Versatile, Low Power? • Mainwaring et al. show that MAC mechanisms must support duty cycles of 1% while efficiently transferring workloads and adapting to changing network conditions. – These are ad-hoc networks, where nodes come and go. Conditions are going to physically change (e.g., Rain) thus affecting the topology of the network. Network links are unpredictable.
  • 6. Versatility, Low Power? • Volatility in link quality in wireless sensor networks is important. “Gray areas” represent nodes that exceed 90% reception with neighboring nodes of <50% reception. • Effectively estimating link quality is essential. • Snooping on traffic over broadcast medium is crucial for determining cycles, unreachable routes, collision avoidance, and providing link quality information. However, this is at the cost of power.
  • 7. Discussion • What does B-MAC stand for? • What is one high-level goal of B-MAC?
  • 8. B-MAC • To meet the demands of versatility and power, Polastre et al. translate these high-level goals for B-MAC, their media access protocol: – Low Power Operation – Effective Collision Avoidance – Simple Implementation, Small Code/RAM Size – Efficient Channel Utilization at varying Data Rates – Reconfigurable By Network Protocols – Tolerant to Changing RF/Networking Conditions – Scalable to Large Number of Nodes
  • 9. Discussion • Can anyone list, at the item level, some of the related work mentioned in the paper?
  • 10. Previous Work • Most MAC protocols for wireless sensor networks have been based on conventional wireless protocols. • This is unfortunate, however, as Intanagonwiwat et al. show that 802.11 is inappropriate for low duty cycle sensor network data deliver because it consumes as much energy when the protocol is idle as it does when receiving data.
  • 11. Previous Work • DARPA Packet Radio Network (PRNET) – One of the first ad-hoc multihop wireless networks. – Packet-switched, store-and-forward radio communications to provide reliable computer communications to mobile hosts and terminals. – PRNET had two media access protocols: • Slotted Aloha: Pure ALOHA allowed each client to send its data and collisions were handled with an ack/retransmit. Slotted introduced discrete time- s slots. Station could only send at the beginning. • Carrier Sense Multiple Access. – Much of MAC Functionality (e.g., random delays, forwarding delays, link quality estimation, and low duty cycle) were first executed in PRNET.
  • 12. Previous Work • MAC Protocol Based On Workload – Woo and Culler show that data, sent periodically in short packets in a multihop network, achieve fairness and energy efficient transmission via adaptive rate control protocol optimized for n-to-1 data reporting. – Current MAC protocols are not suitable due to their inability to support low-duty cycles. • Preamble Sampling – Hill and Culler present a low power technique by way of reduce idle listening costs. The technique involves radio sampling for energy every 4s and then going back to sleep. This quick sample reduced duty cycle of the radio to below 1%.
  • 13. Previous Work • S-MAC – RTS/CTS (Ready-to-send, clear-to-send) scheme for wireless sensor networks. – Periodically sleeps, wakes up, listens to the channel, and then returns to sleep. – Active period static at 115ms, sleep period variable. – The length of the sleep period dictates the duty cycle. – At the beginning of each active period, nodes exchange sync info. – Post SYNC, nodes can transfer data for remainder of active period using RTS-CTS. – Fragmentation uses the RTS-CTS scheme to reserve the channel, then transmit packets in a burst.
  • 14. Previous Work • T-MAC – Improves S-MAC’s energy usage by using a very short listening window at the beginning of each active period. – After SYNC, the short window allows send/receive RTS and CTS packets. If no activity, the node simply returns to sleep. – This adaptive duty cycle saves power at the cost of reduced throughput and additional latency.
  • 15. Discussion • What is a major difference between S-MAC and B-MAC mentioned in the paper?
  • 16. B-MAC Implementation • CSMA Protocol for low power wireless sensor networks. • Flexible protocol for: target tracking, localization, triggered event reporting, and multihop routing. • Classical MAC protocols perform channel access arbitration and tuned for a specific workload, such as S-MAC. B-MAC contains a small core of media access functionality – clear channel assessment (CCA). • B-MAC is only a link protocol with network services (e.g., organization, synchronization, and routing built above it).
  • 17. B-MAC Implementation • Clear Channel Assessment and packet backoffs are used for channel arbitration, link layer acknowledgements for reliability, and low power listening (LPL) for low power communication. – For effective collision avoidance, determine if the channel is clear with CCA. – Ambient noise dependent upon the physical environment. Thus, signal strength is sampled when the channel is clear (a noise floor is computed).
  • 18. B-MAC Implementation • Handling Ambient Noise. – Times when channel is clear: Right after sending a packet. – Samples are entered into a queue. Median of queue is computed and added to an exponentially weighted moving average with some decay (glossing over details on purpose). This is used as a low pass filter. • B-MAC searches for outliers in the received signal such that the channel energy is significantly below the noise floor. If an outlier exists, B-MAC declares the channel is clear since a valid packet could never have an outlier significantly below the noise floor.
  • 20. Discussion • Can you turnoff CCA? • How are channel backoff times defined? • What about channel congestion backoffs?
  • 21. B-MAC Implementation • B-MAC provides an optional link-layer ACK support. – If ACK enabled, B-MAC immediately transfers an ACK code after receiving a unicast packet. – If transmitting node receives ACK, ACK bit is set in the sender’s transmission message buffer. • B-MAC duty cycles the radio through periodic channel sampling called low power listening (LPL). – Similar to sampling in Aloha. – Each time a node wakes up, it turns on radio and checks for activity. If activity: stays awake for time to receive. After reception, back to sleep. If no activity: forced back to sleep based on timeout.
  • 22. B-MAC Implementation • Reliably receive data, preamble length is matched to the interval that the channel is checked for activity. • If channel checked every 100ms, then preamble must be 100ms long for node to wake up, detect activity, receive preamble, and then receive message.
  • 23. Discussion • Who can tell me what this figure is all about?
  • 24. B-MAC Implementation • Modeling Lifetime – I admit it, I am lazy. Rather than regurgitate formulas here… there is only one important one: NRG_Consumed = NRG(rx) + NRG(tx) + NRG(listen/idle) + NRG(sleep)
  • 25. Discussion • Who can tell me what’s going on in these two graphs?
  • 26. Discussion • What did you think of the experimental method section? – Was it necessary? • What were some of the variables of the experimental setup?
  • 27. Experimental Method • Graphs, tables, and figures! Oh my!
  • 33. Discussion • What were your thoughts of this paper? • Prior to this paper, had anyone considered the duty-cycle and how important the physical environment is with respect to adhoc networks of WSNs? • Security Question: From an attackers perspective, how might you thwart a vital WSN?

Editor's Notes

  1. LLC logical link control. Interface between LLC and physical layer.
  2. Attribution: www.purelink.ca
  3. Attribution: buffy.eecs.berkeley.edu.
  4. http://pdos.csail.mit.edu/decouto/papers/jubin87.pdf
  5. Preamble: signal used in network communication to synchronize transmission timing between two more more systems. Synonymous with introduction. Define a specific series of transmission criteria that says, hey I’m going to transmit.
  6. Authors claim: Although S-MAC achieves low power operation, it does not meet our goals of simple implementation, scalability, and tolerance to changing network conditions. As size of network increases, S-MAC must maintain an increasing number of schedules of surrounding nodes or incur additional overhead through repeated rounds of resync.
  7. Suffers from the same complexity and scaling problems of S-MAC.
  8. S-MAC is a not only a link protocol but also a network and organization protocol. It does channel arbitration with RTS-CTS, hidden terminal avoidance, synchronization with its neighbors, and message fragmentation for efficiently transferring bulk data.Applications must rely on S-MAC policy to adjust nodes and network changes.
  9. Berkley Media Access Control. Neither provides multi-packet mechanisms like hidden terminal support or message fragmentation nor enforces low power policy, it provides interfaces for tuning. Make local policy decisions to optimize power consumption, latency, throughput, fairness or reliability.
  10. A filter that passes low-frequency signals and attenuates (reduces the amplitude of) signals with freqencies higher than the cuttoff frequency.
  11. A filter that passes low-frequency signals and attenuates (reduces the amplitude of) signals with freqencies higher than the cuttoff frequency.Traditional threshold model takes one sample and compares to the noise floor. This leads to false negatives that lower the effective channel bandwidth.
  12. Top one, packet. Middle, busy when low. Outlier detection algorithm.
  13. Yes. MacControl interface. Can do this above B-MAC implementation. If CCA is enabled, B-MAC uses an intial channel backoff when sending a packet. That is, B-MAC does not set the backoff time, rather it uses an event to define the backoff. If none sent, random values will be used. After initial backoff, the outlier algorithm is ran to see if the channel is clear. If not clear, a cogestionbackoff event can be specified. Else Random.
  14. Use noise floor estimation not only for finding a clear channel on transmission but also for determining if the channel is active during LPL.
  15. You’re basically synchronizing all nodes on when to check for activity and thus reliably see activity when there is indeed activity.Idle listening is when sampling but no activity.Check interval can be adjusted per application and is supported via another B-MAC interface whereas S-MAC is not.
  16. These devices have limited ROM/RAM code size support. Plus you’re running TinyOS on there already. So to have B-MAC with additional protocol support, you’re going to use more space. However, this space is smaller than that of S-MAC.
  17. For the left one: Activity Check Interval and Node Size can be adjusted to increase node lifetime.For the right one both network density and LPL check interval affect duty cycle.
  18. The authors wanted to illustrate the effectiveness of B-MAC compared to other MACs. Mostly S-MAC. I didn’t feel much like regurgitating their context – so instead, lets just have a look at the pictorial data representations otherwise known as graphs.
  19. First table – different protocol overheads. B-MAC smaller in bytes of stuff sent. However, this isn’t fair.
  20. Duty cycle isn’t considered here at all. Throughput is basically a function of nodes contending for the channel. Because B-MAC has a smaller overhead, higher throughput is achievable than S-MAC.
  21. 10-node network. Power consumption of maintaining a given throughput (average # of bytes sent in 10sec). As throughput increases overhead of S-MAC’s SYNC causes power consumption to increase linearly.
  22. Small period data packets are most common… but can arise where large transfers are needed. S-MAC supports large fragmentation using RTS/CTS for channel reservation. Transmit from A and B to D and E through C routing.Interested in energy consumption per byte at C.
  23. Latency is directly affected by the overhead of the protocol.
  24. As latency increases, energy consumed decreases.
  25. Introduce noise, a bad node to generate congestion.