SlideShare a Scribd company logo
1 of 7
Download to read offline
TERM PAPER, CS5461/ECE5461, MOBILE NETWORKS, MICHIGAN TECHNOLOGICAL UNIVERSITY, SPRING 2015 1
Enhanced S-MAC protocol to improve the power
efficiency
Naveena Vemulapalli, Ruimin Zhang, Aliasghar Parandoosh, Zhaoxiang Jin
Abstract—Enhanced S-MAC is proposed to solve the fundamen-
tal problem in Wireless Sensor Network(WSN), how to keep the
network more power efficient. In order to minimize the energy
consumption, Enhanced S-MAC is devised to track the traffic
loading to adaptively turn on and off the receiver. There are issues
like clock synchronization, overhearing when we implemented
our protocol. In this proposal we would present all the necessary
techniques to solve these mentioned problems. Finally we simulate
our proposed mechanism and show how Enhanced S-MAC can
fit into the WSN application and optimize the power issue.
Keywords—Wireless Sensor Network, Power Efficiency, S-MAC,
MAC protocol, Adaptive listening mode
I. INTRODUCTION
Wireless sensor networking is a rapidly growing technol-
ogy. A wireless Sensor Network (WSN) distinguishes from
other wireless or wired networks through its capability of
interaction with the environment. Such networks have many
applications, such as environmental monitoring, smart spaces,
robotic exploration, search and rescue, smart environments and
localization system. WSNs usually include a large number of
nodes deployed in ad-hoc fashion to form a multi-hop wireless
network. Usually, all these nodes together carry out the same
task, for example keep tracking the temperature. Each node
may have one or more sensors, embedded processors, low-
power radios, and is operated with battery. Applications of
WSNs may require a large number of such smart nodes and
generally designed for long-term deployments without human
intervention. Consequently, energy efficient and scalability are
important design objectives.
Like all shared-medium networks, we need medium access
control (MAC) techniques to guarantee successful operation of
the system. The most fundamental job of the MAC protocol
is to avoid collisions from interfering nodes. Many MAC pro-
tocols have been developed, such as Time-Division Multiple
Access (TDMA), Code-Division Multiple Access (CDMA)
and contention-based protocols like IEEE 802.11 [1]. However,
they are not ideal for wireless sensor networking without
thinking much of energy efficiency and scalability.
S-MAC is a medium access control protocol designed for
wireless sensor networks. In addition to fulfilling the funda-
mental job, that avoids collisions from interfering nodes, S-
MAC puts emphasis on sensors’ energy consumption. The
reason behind it is that as stated above that all sensor nodes
are battery operated. In fact, we expect, in near future, that
these nodes become cheap enough so we discard them once
running out of battery. Therefore, we may prolong the network
life by reducing energy consumed by sensor nodes.
Four major sources are considered in S-MAC protocol for
causing inefficient use of energy as well as we can trade off
to reduce energy consumption. The first one is collision. If a
transmitted packet gets corrupted by other packets, it will be
discarded which in return would increase energy consumption
unnecessarily. S-MAC overcomes this problem with RTS-CTS
approach. The second reason is idle listening in which case
it listens to possible traffic that is not sent. Nodes with S-
MAC protocol are periodically put into sleep mode in order
to consume less energy. Each node, if it does not transmit or
receive nay data, turns off itself and sets a timer to wake itself
up at later time. This process happens periodically to make
sure no transmission is missed. The third source for energy
inefficiency is control overhead, i.e. sending and receiving
control packets which consumes energy too and less useful
data packets can be transmitted. S-MAC handles this issue
by a technique called message passing. In message passing,
we fragment a long message into many independent small
packets and transmit them in a burst. In this technique only
one RTS and one CTS are used. They reserve the medium
for transmitting all fragments. The last source is overhearing.
Overhearing occurs when a node receives a packet that is
destined to other nodes. Overhearing can be a major reason of
energy waste mainly with a high node density causing a heavy
traffic load. S-MAC tries to deal with this issue with a novel
idea of putting nodes to off mode (by switching their radio
off) when transmission is not meant for that node. S-MAC
tries to reduce the waste of energy from all above sources
while accepting some reduction in both per-hop fairness and
latency. Although per-hop fairness and latency are reduced, it
does not necessarily result in lower end-to-end fairness and
latency.
Fig. 1: The construction of the frame
Synchronization is a very big issue in S-MAC, since the
network size, topology and node density change over time and
TERM PAPER, CS5461/ECE5461, MOBILE NETWORKS, MICHIGAN TECHNOLOGICAL UNIVERSITY, SPRING 2015 2
individual nodes may have different clock drift. In S-MAC, a
node first waits for a random time. If it does not receive any
SYNC message it will start sending its own schedule. All other
nodes that receive this, should synchronize and change their
schedules to this one. This process will happen periodically.
A typical SYNC packet consists of Sender ID and Next-Time
Sleep of that particular node. In S-MAC, listening period will
be divided into two parts. One for sending/receiving SYNC
messages and one for sending/receiving Data communication.
Figure 1 illustrates this point. As we can see that Data
communication period consists of sending/receiving control
packets like ACKs, RTS-CTS packets and Data transmission.
The ratio of the listening time to the whole period is called
duty cycle.
The major problems in S-MAC are that first fixed duty
cycles prevent S-MAC to be adaptive to traffic load. In wireless
sensor networks, traffic load changes all the time. Fixed duty
cycles prevent S-MAC to further exploit energy savings during
light traffic load. In this paper, we enhance S-MAC protocol,
by adopting variable duty cycle, to save more energy in a
wireless sensor network with light traffic load. Second, in order
to turn different nodes into Sleep mode, it should have the
knowledge when it will wake up. In order to minimize the
listening time and shorten the transmission delay, trade-off is
needed to determine the schedule of each node. In our protocol
(Enhanced S-MAC), we have redesigned the synchronization
protocol such that we do not need any of these information to
initiate a transmission or synchronize nodes together. The rest
of this paper is as follows.
In section II we will talk about the related past protocols
proposed by other researchers. We divide their protocols into
three groups of Contention-based MAC protocol, TDMA-
based MACs and S-MAC protocols. In section III we will point
out all the problems we encounter when we implement the
protocol. In section IV & V we will explain our own protocol
and system model for it as well as we bring our experimental
results acquired from the Enhanced-SMAC. SectionVI will be
the Conclusion.
II. RELATED WORK
MAC is a very broad research area. It includes research
mainly in the area to reduce the power consumption. Most of
the MACs that are used at present are the contention based
MAC protocols and TDMA protocols [2] [4] [5] [6].
A. Contention based MAC protocol
The IEEE 802.11 is one of the contention based protocol.
It is mostly used in the ad-hoc networks that is in the wireless
networks. This type of protocols has many advantages because
of its simplicity, robustness it also avoids the hidden terminal
problem. This protocol has a very high energy consumption
especially in the idle mode. This problem arises when the
nodes are in the listening state even when there is no data
transfer. Due to this idle listening the power consumption is
very high. PAMAS (power aware multiple access signaling)
is an energy saving mode to avoid overhearing among the
neighboring nodes. We have used the similar technique in our
paper that is related to the PAMAS [4].
B. TDMA-based MACs
TDMA based protocols have more energy conservation than
the contention based MAC protocols. This type of proto-
col is based on reservation and scheduling. TDMA protocol
contains nodes in the form of clusters. These clusters can
only communicate with in the cluster. Managing the inter
cluster communication and interference is not an easy thing.
Moreover when we deal with the mobile network. It is not
easy for the TDMA based protocol to dynamically change
the frame length and the time slot according to the network.
Then they proposed a new protocol for the wireless sensor
networks. In this protocol every node has different schedules
to communicate with its neighbors. Every time slot it only
talks with only one neighbor. To avoid interference different
channels are assigned to the interfering links that is FDMA
or CDMA. One of the main drawback of this protocol is its
low bandwidth utilization. If a node wants to send packets to
only one neighbor then it cannot reuse the time slots that are
scheduled to the other neighbors.
The next technology that has been developed to avoid the
low bandwidth utilization in the previous one is to have to an
adaptive rate control mechanism in CSMA. The main goal of
this is to have a good and fair bandwidth allocation to all the
nodes in the network. Next existing technology is piconet [7]
which is closely related to S-MAC. It keeps all the nodes to
periodically sleep so as to reduce the energy consumption.
But this mechanism does not have any coordination and
synchronization among the nodes about the sleep and the listen
intervals. The main feature of this scheme is to have the
communication between the neighboring nodes by allowing
the nodes to broadcast the address when it wakes up from the
sleep state. If a sender wants to talk to a neighbor it must be
in the listening state until it receives the broadcast from the
neighbor. While S-MAC gets synchronized with the schedules
of the neighboring nodes to reduce the energy consumption
and the latency.
The power saving mode in the IEEE 802.11 is almost related
to the S-MAC operation. The only difference is 802.11 is
designed for the single-hop network where all nodes can hear
each other. S-MAC is designed for the multi-hop network.
In the S-MAC the sleep schedules of all the nodes are
synchronized together.
C. S-MAC protocol
S-MAC has many approaches so as to reduce the energy
consumption due to idle listening, collision, overhearing and
control overhead. S-MAC takes the assumption that all the
communications occur between the nodes that are close to
each other. Another assumption is that we consider all the
applications will have long idle periods and can resist latency.
The basic feature of S-MAC scheme is that every node
sets a timer and sleeps for some time and then wakes up to
see if any node wants to send the data. All the nodes in the
network can choose their own listen/sleep schedules but they
should be synchronized to the neighboring nodes. It is possible
that all the nodes cannot synchronize in a multi-hop network.
They exchange their schedules by periodically broadcasting
TERM PAPER, CS5461/ECE5461, MOBILE NETWORKS, MICHIGAN TECHNOLOGICAL UNIVERSITY, SPRING 2015 3
the SYNC packet to their neighboring nodes. If multiple
nodes want to talk with the same node to avoid collision,
avoidance S-MAC follows virtual and physical carrier sense.
Each packet contains the information about how much time
the transmission of the message will be. Every node records
this value and sets a timer. It is called the network allocation
vector. Before initiating the transmission every node looks at
its NAV and then starts the transmission if its NAV is zero.
NAV not equal to zero indicates that the medium is busy. This
type of sensing is called virtual carrier sensing. If the node fails
to get the medium it goes to sleep and wakes up again if when
the receiver is free and listening again. After the exchange of
the RTS/CTS the nodes will not sleep again until the data
transmission is complete.
In our Enhanced S-MAC protocol all nodes follow the
schedule of the dominant node and all the nodes are synchro-
nized only once before the data transmission. We know there
is a lot of energy waste due to the periodic synchronization
and scheduling which is removed in our Enhanced S-MAC
III. PROBLEM STATEMENT
In order to design a good mac protocol we have to consider
the following attributes. The first and the most important thing
is the energy consumption. We know that the sensor nodes
are powered with a battery and it is onerous to change or
replace the batteries frequently. Another important factor is
the adaptivity of the network to the changes in the traffic. A
good MAC protocol should give all of the above advantages. In
this paper we have presented the Enhanced S-MAC protocol
[2]. The main reasons for the increased power consumption
is that the nodes are in the idle state even when there is no
data transfer. In most of the present networks the nodes have
the fixed sleeping time and fixed listening time due to this
the nodes keep listening even in the idle state which wastes
a lot of power. If we change the listening time of the nodes
based on the traffic in the network then a lot of power can
be conserved. The next problem that is common in all the
wireless sensor network is the synchronization of the clock. It
is necessary for all the nodes in the network to synchronize
with each other in order to communicate with the nodes. For
the successful communication all the nodes should know the
sleep and listening times of their neighboring nodes. Therefore
synchronization is very important for communication. Next
major problem is the duty cycle, all the wireless sensor
networks that are present today have a fixed duty cycle. This
increases the power consumption in the nodes. This power
consumption is greatly reduced if we use the variable duty
cycle based on the traffic conditions.
IV. DESIGN SPACE
In order to further improve the power efficiency in Wireless
Sensor Network, we proposed our own MAC layer protocol
named as Enhanced S-MAC. The major difference between
our mechanism and S-MAC is we redesign the sync protocol
and adapt to a variable duty cycle for listening window.
We simplify the sync packet protocol by the clock drift by
which WSN can minimize the listening time for synchronous
functionality. The variable duty cycle can further reduce the
listening time by tracking the current traffic load. It may
introduce some new problems such as longer latency, but in our
application scenario we consider the latency as second priority
compared to power efficiency.
A. Sync Package
In wireless network, all the devices are isolated from each
other physically. There has no way to synchronize the clock
information through all the devices. That will not be a problem
if the receiver is always on since it will never miss a single
transaction except the conflictions. But in a WSN network it
will cause a substantial problem due to the clock drift.
Listen Period
0s 1s 2s 3s 4s
0s 1s 2s 3s 4s 5s
B
A
Fig. 2: Miss listening due to clock drift
In figure 2, there have 2 device nodes in the network, node
A and node B. Because of the clock drift the variation of their
own timers are getting larger and larger. In this example all
the devices are only wake up at the beginning of each second.
Thus if one node want to communicate with another, it has to
establish the link at the beginning of the second. Since they
have no ideas about the other one’s timer, they can not talk
to each other when one node is transmitting but the other is
sleeping.
What is missing here is synchronization. We can not count
on the clock accuracy since even two clocks are running
very close to each other, there may have a non-negligible
accumulative error which is big enough to cause the problem.
The concept of synchronization is to periodically reset all the
timers except the base one. Therefore no accumulative error
will be imposed.
In our project we propose an innovative mechanism to
deal with the synchronization problem. It is very easy to
implement and taking very short time to synchronize all the
nodes connected in the network. The protocol is designed
by the assumption that the clock drift is constant during the
operation, on the other words, the clock frequency of each node
will never change. For example, the node which is running
faster will always run faster.
With this assumption, one can easily find out that the fastest
timer will always be the first one to count down one second.
We select this fastest node to be our base node and all the
other nodes have to reset their timer when they receive the
sync package sent from the base node. Thus the frame starts
from the sync packet from base node and all the others will
be synchronized to this base node.
TERM PAPER, CS5461/ECE5461, MOBILE NETWORKS, MICHIGAN TECHNOLOGICAL UNIVERSITY, SPRING 2015 4
Base
A
B
Id=2;Gid=2
Id=3;Gid=3
Id=5;Gid=5
Broadcast the sync package
Fig. 3: Synchronization in Enhanced S-MAC
Figure 3 demonstrates how the synchronization works. Base
node broadcast the sync message to its neighbors node A and
node B, Then node A and B will continue to broadcast their
own sync messages to all their neighbors right after they reset
the timer. In order to avoid the duplication of the sync message,
we integrate the base node ID into the sync message which is
a unique ID for every nodes. So in each frame one node will
only broadcast sync message with the base node ID once and
it will never broadcast the same sync message again until the
end of this frame.
Base
A
B
Id=2;Gid=2
Broadcast the sync package
Id=3;Gid=2
Id=5;Gid=2
Fig. 4: Group ID in Enhanced S-MAC
There have ID and Gropu ID(GID) in Enhanced S-MAC. ID
is a unique tag number for each node and it never changes. The
GID is the same as ID when the node is booted up. Every time
the node broadcasts its sync message the GID will be included
in the message. When the node receives a sync message it
will check the GID with its own GID. If they are the same,
it can just ignore the message, elsewise it will update its own
GID with the one in the sync message and broadcast the sync
message to the network with the updated GID. By doing this
all the nodes will have the base node GID at the end of the
synchronization period. In figure 4 both node A and B are
synchronized to GID 2. Then they will broadcast the sync
message to their neighbors which base node can not touch.
B. adaptive listening window
In WSN, the traffic load is not as much as that in the Internet.
In some particular applications, the sensor makes a detection
every couple of minutes and then transfer the data back to the
access point. Beside the transaction time, the network keeps
idle most of the time. In order to further decrease the power
consumption, a mechanism is needed to dynamically adjust the
listening window so one node can deactivate itself when it is
not included in the communication.
Enhanced S-MAC is devised to solve this problem and the
idea is very simple, the node counts how long the channel is
silent. Silent in this scenario means there’s no traffic within
the range of the node. If the counter expires the node turn
itself off to sleeping mode until the next frame. Whenever the
traffic is detected during the listening mode, the node resets
the counter and stays in the listening mode. The timer is re-
activated once the channel returns back silent. In other words,
the node is automatically turned off after a certain amount of
silent time.
The motivation of this mechanism is all the nodes agree
to communicate at the beginning of the frame, it is high
possibility of hearing a traffic during that time. It is more likely
to receive packets and worth to open the listener to detect the
channel. Even the packet is not send to it, it should still keep
listening. Since the potential sender may lose the control of
channel in the competition, but it will retry it after the current
transaction. That is why all the nodes stay in listening mode
when they detect a transaction.
So how long should the timer count down to, it depends
on the channel competition time. In all cases it must be long
enough to catch the transaction. In 802.11 WLAN CSMA/CA
is implemented to avoid confliction. For all the nodes have
to occupy the channel before any transmission. In order to
compete the usage of the channel, all the nodes have to wait
at least DCF inter-frame spacing(DIFS) plus a random time
in contention window. So the timer should be set to at least
bigger than the DIFS plus the maximum value of CW. If the
clock drift is considered the timer is supposed to set a little
higher.
From the previous description, it is known that if the device
detects a transaction happen around it, even it has nothing
to do with this transaction, it will keep listening the channel
since later on it may be signaled to communicate with other
node. During this time, it is possible to turn it off with a
careful design. This is what we define before as overhearing
power saving. All the neighbors of the sender or the receiver
should be turned off to sleeping mode as long as the unrelated
transaction is still on.
It is obvious that all the neighbors of the receiver should be
silent due to the potential confliction happening on the receiver
TERM PAPER, CS5461/ECE5461, MOBILE NETWORKS, MICHIGAN TECHNOLOGICAL UNIVERSITY, SPRING 2015 5
side. It is also true for the neighbors of the sender. When the
sender transmits the data, all its neighbors can not receive a
clear signal other than the sender. Without the ability to listen
other nodes, it’s better to sleep rather than waste energy.
All the neighbors of the sender or the receiver can get
the CTS/RTS signal in which all the duration information is
allocated. When a node receive a CTS/RTS and find out that it
is not included in this transaction, it will set its own NAV(Net
Allocation Vector) and sleep. The NAV is used in 802.11 to
indicate the earliest to access the medium, but here the NAV
is used to set a sleep timer.
C. Priority Medium Access
As what we described before, there are two different types
of packets in the WSN, one is sync and the other is data. Sync
packet is always transmitted at the beginning of each frame.
It has tight time requirement which means they are preferred
to send at the same time. The data packets are not that urgent
compared with sync packets. So when Enhanced S-MAC is
designed, the two different priorities packets are proposed.
Figure 5 looks like a traditional 802.11 MAC protocol
except that it has two different contention windows, one for
the sync, another for the data. For each contention window
it has multiple time slots. When the device wants to compete
for the medium resource it generates a random back off delay
and the one has the shortest back off time can occupy the
channel. The rest of the devices have to compete again after
this transmission.
Obviously the sync packet has higher priority and is sup-
posed to deliver before all the data packets. Therefore the
contention window of sync packet is assigned ahead of the
data packet. Extra spacing is added between the sync and
data contention window due to the clock drift and other
unpredictable latency.
With this priority medium access, all the sync packets can
be transferred altogether at the beginning of frame. Each node
in the network will broadcast its sync packet once per frame
whenever its timer expires or receives other sync packet. It
is impossible for your neighbors to transfer a data packet
before you broadcast the sync packet. But the priority medium
access also has some side-effect. It delays the data transfer by
guaranteeing the priority sync transfer which is acceptable in
WSN environment.
D. Conclusion
In this section we represent our mechanism of Enhanced S-
MAC by 3 parts, innovative sync protocol, adaptive listening
scheduler and robust priority medium access. All these 3
techniques are devised and dedicated to the energy efficiency
problem in WSN. We creatively integrate them together as a
whole system which is super fit into the WSN applications.
V. EXPERIMENTAL RESULT
We implement a simulation environment which can evaluate
the performance of our protocol, Enhanced S-MAC. It is
written in Java based environment which is the easiest way
for programming. Java has a lot of API functions which is
handy to realize a virtual wireless network. Since there have
a lot of time events we integrate a lot timers to evaluate the
latency in the reality.
A
B
C
E
D
Fig. 6: The topology of the evaluated network
Figure 6 illustrates the topology of the simulated WSN.
There are 5 nodes in the network and only node C can talk
to all the other 4 nodes. Node A and B can not reach node
D and E and vice versa. In our simulation each node is a
identical object which models a real world product MPR2400
from Crossbow. MPR2400 is widely used in WSN like indoor
building monitoring and security. It can support large scale
sensor networks(more than 1000 points). It operates on the
frequency 2.4 to 2.48 GHz which is compatible with global
ISM band. Direct sequence spread spectrum is used to over-
come the interference and provide inherent data security.
Fig. 7: Block Diagram of MPR2400
Figure 7 is the block diagram of MPR2400 and it is
obvious that thie module is designed only for the transmission
function. It is flexible to integrate any kind of sensors to
build the wireless sensor system. Table I displays the current
TERM PAPER, CS5461/ECE5461, MOBILE NETWORKS, MICHIGAN TECHNOLOGICAL UNIVERSITY, SPRING 2015 6
DIFS
CW for sync CW for data
Medium busy
Fig. 5: Medium access and inter-transaction spacing
consumption in different operation modes. The receive mode
consumes 19.7mA current which is named as listening mode
in our proposal. The idle mode consumes 20uA current which
is named as sleeping mode in our proposal. It’s a little
confusing that the sleep mode in MPR2400 is different from
our definition. What we describe about sleeping mode in the
paper is just turn off the receiver but the controller is still on.
TABLE I: Current Draw
Transmit data rate 250 kbps
Receive mode 19.7mA
TX, -10 dBm 11mA
TX, -5 dBm 14mA
TX, 0 dBm 17.4mA
Idle mode, voltage regular on 20uA
Sleep mode, voltage regular off 1uA
Obviously it is very important to turn off the receiver
when there’s no traffic. It consumes about 1000 times power
in the listening mode than in the sleeping mode. Adaptive
listening mechanism can reduce the overall power consumption
dramatically.
In our simulation the listening mode is set to consume
19.7mA current and sleeping mode is set to consume 20uA.
When we calculate our total energy consumption, we time the
currents with the related time in corresponding modes. In order
to compare our results with the S-MAC(fixed 50% duty cycle)
and 802.11(always on), we have a simple assumption that S-
MAC has 50% duty cycle for the listening time and 802.11 is
always listening.
Tf
Tw sleepTd Ts
datasync
Fig. 8: The construction of the frame
Figure 8 illustrates each frame in Enhanced S-MAC proto-
col. The detail parameters are listed in table II. Each frame is
10S long and the reason why it’s longer than other common
protocols is the simulation granularity. In Java the timer is
configured at least 1mS interval. If we set the frame as 1S long
it’s hard to invoke very short events like syn which is used to
be less than 1mS. By enlarging the frame time it is easy to
simulate these short events since the whole scope is enlarged.
The receiver is turned on before the sync message due to the
clock drift. Tw is the time for wake up the receiver before the
next frame which is set to be 100mS. Td is the backoff time
for data transmission after the sync message. Ts is the sleeping
time. When the node doesn’t hear anything during Ts it turns
off the receive and put itself into the sleeping mode.
TABLE II: Timing parameter
Tf frame duration 10S
Tw wake up time 100mS
Td backoff time 10-15mS
Ts time to sleep 20mS
All the data results are presented in table III, It is clear
that all the duty cycles of listening time are highly associated
with the transmission loading. When the transmission rate
increases, the listening time expands which is our motivation
to develop Enhanced S-MAC protocol. We calculate all the 3
different protocols’ energy consumption and list them in table
IV. Further reducing the listening time can effectively help
energy dissipation. Enhanced S-MAC dynamically control the
listening time by detecting the traffic around it. S-MAC has a
fixed duty cycle which makes it less attractive when the traffic
is low which is quite common in WSN. 802.11 doesn’t concern
the power issue in this environment and it is designed to fit in
high performance wireless network.
VI. CONCLUSION
In this paper, we have enhanced the previous S-MAC
protocol to be more energy efficient. Nodes in our Enhanced
S-MAC protocol are smarter in their energy dissipation by
detecting surrounding communications and adjusting their
listening windows dynamically. The synchronization protocol
was redesigned and sync packages was granted high priority
to guarantee a delivery. The new synchronization protocol
takes less time and avoids accumulative errors caused by
TERM PAPER, CS5461/ECE5461, MOBILE NETWORKS, MICHIGAN TECHNOLOGICAL UNIVERSITY, SPRING 2015 7
TABLE III: Listening time for each node
data set 2986kB; Time 999.7S
node A 55.1S
node B 63.6S
node C 74.0S
node D 54.7S
node E 54.3S
data set 5916kB ; Time 997.5S
node A 89.4S
node B 88.7S
node C 130.1S
node D 81.4S
node E 93.8S
data set 12229KB ; Time 991.3S
node A 170.5S
node B 169.3S
node C 233.9S
node D 168.7S
node E 152.3S
TABLE IV: Energy consumption in 3 protocols
data set 2986kB; Time 999.7S
Enhanced S-MAC 1207.5 mAS
S-MAC 9857 mAS
802.11 19694 mAS
data set 5916kB ; Time 997.5S
Enhanced S-MAC 1922.6 mAS
S-MAC 9835.35 mAS
802.11 19650.75 mAS
data set 12229KB ; Time 991.3S
Enhanced S-MAC 3541.4 mAS
S-MAC 9774.2 mAS
802.11 19528.61 mAS
clock drift. We have built a Java-based simulation environment
to evaluate our Enhanced S-MAC. We simulated a wireless
sensor network, consisting two subnets with one node covered
by both. Our preliminary results show that our Enhanced S-
MAC might have good potential to dramatically reduce energy
consumption in a wireless sensor network with light traffic
load.
REFERENCES
[1] I. C. S. L. M. S. Committee et al., “Wireless lan medium access control
(mac) and physical layer (phy) specifications,” 1997.
[2] W. Ye, J. Heidemann, and D. Estrin, “An energy-efficient mac protocol
for wireless sensor networks,” in INFOCOM 2002. Twenty-First Annual
Joint Conference of the IEEE Computer and Communications Societies.
Proceedings. IEEE, vol. 3. IEEE, 2002, pp. 1567–1576.
[3] S. Singh and C. S. Raghavendra, “Pamaspower aware multi-access pro-
tocol with signalling for ad hoc networks,” ACM SIGCOMM Computer
Communication Review, vol. 28, no. 3, pp. 5–26, 1998.
[4] S. Singh, M. Woo, and C. S. Raghavendra, “Power-aware routing in
mobile ad hoc networks,” in Proceedings of the 4th annual ACM/IEEE
international conference on Mobile computing and networking. ACM,
1998, pp. 181–190.
[5] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-
efficient communication protocol for wireless microsensor networks,”
in System sciences, 2000. Proceedings of the 33rd annual Hawaii
international conference on. IEEE, 2000, pp. 10–pp.
[6] A. Woo and D. E. Culler, “A transmission control scheme for media
access in sensor networks,” in Proceedings of the 7th annual interna-
tional conference on Mobile computing and networking. ACM, 2001,
pp. 221–235.
[7] F. Bennett, D. Clarke, J. B. Evans, A. Hopper, A. Jones, and D. Leask,
“Piconet: Embedded mobile networking,” Personal Communications,
IEEE, vol. 4, no. 5, pp. 8–15, 1997.

More Related Content

What's hot

WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...ArunChokkalingam
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDushhyant Kumar
 
Local Restoration in Metro Ethernet Networks for Multiple Link Failures
Local Restoration in Metro Ethernet Networks for Multiple Link FailuresLocal Restoration in Metro Ethernet Networks for Multiple Link Failures
Local Restoration in Metro Ethernet Networks for Multiple Link FailuresEditor IJCATR
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...csandit
 
IJCTET2015123106
IJCTET2015123106IJCTET2015123106
IJCTET2015123106ijctet
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS Dushhyant Kumar
 
Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...ijctet
 
Efectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig beeEfectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig beeGregorio Toro Rivera
 
Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network drboon
 
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...ijwmn
 
Inter-Cell Interference Coordination for LTE-A - Sept 2011 Volker Pauli, Eiko...
Inter-Cell Interference Coordination for LTE-A - Sept 2011 Volker Pauli, Eiko...Inter-Cell Interference Coordination for LTE-A - Sept 2011 Volker Pauli, Eiko...
Inter-Cell Interference Coordination for LTE-A - Sept 2011 Volker Pauli, Eiko...Eiko Seidel
 
Ijeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networksIjeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networksKumar Goud
 
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...ijaia
 
1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-mainRahul Singh
 
Route Update Overhead Reduction in MANETS Using Node Clustering
Route Update Overhead Reduction in MANETS Using Node ClusteringRoute Update Overhead Reduction in MANETS Using Node Clustering
Route Update Overhead Reduction in MANETS Using Node ClusteringEditor IJCATR
 
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...Eiko Seidel
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...IRJET Journal
 

What's hot (18)

WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC Protocol
 
Local Restoration in Metro Ethernet Networks for Multiple Link Failures
Local Restoration in Metro Ethernet Networks for Multiple Link FailuresLocal Restoration in Metro Ethernet Networks for Multiple Link Failures
Local Restoration in Metro Ethernet Networks for Multiple Link Failures
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
 
IJCTET2015123106
IJCTET2015123106IJCTET2015123106
IJCTET2015123106
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...
 
Efectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig beeEfectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig bee
 
Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network
 
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
 
Inter-Cell Interference Coordination for LTE-A - Sept 2011 Volker Pauli, Eiko...
Inter-Cell Interference Coordination for LTE-A - Sept 2011 Volker Pauli, Eiko...Inter-Cell Interference Coordination for LTE-A - Sept 2011 Volker Pauli, Eiko...
Inter-Cell Interference Coordination for LTE-A - Sept 2011 Volker Pauli, Eiko...
 
Ijeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networksIjeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networks
 
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
 
1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main
 
Route Update Overhead Reduction in MANETS Using Node Clustering
Route Update Overhead Reduction in MANETS Using Node ClusteringRoute Update Overhead Reduction in MANETS Using Node Clustering
Route Update Overhead Reduction in MANETS Using Node Clustering
 
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
 

Similar to mn paper

Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networkspijans
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkijcsa
 
A Literature Survey on Energy Efficient MAC Protocols For WSN
A Literature Survey on Energy Efficient MAC Protocols For WSNA Literature Survey on Energy Efficient MAC Protocols For WSN
A Literature Survey on Energy Efficient MAC Protocols For WSNIRJET Journal
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...IJCNCJournal
 
Energy-efficient MAC protocols for wireless sensor networks: a survey
Energy-efficient MAC protocols for wireless sensor networks: a surveyEnergy-efficient MAC protocols for wireless sensor networks: a survey
Energy-efficient MAC protocols for wireless sensor networks: a surveyTELKOMNIKA JOURNAL
 
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...IJEEE
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Editor Jacotech
 
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...INFOGAIN PUBLICATION
 
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...pijans
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmnmmjalbiaty
 
Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks IJECEIAES
 

Similar to mn paper (20)

Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor network
 
01306496
0130649601306496
01306496
 
A Literature Survey on Energy Efficient MAC Protocols For WSN
A Literature Survey on Energy Efficient MAC Protocols For WSNA Literature Survey on Energy Efficient MAC Protocols For WSN
A Literature Survey on Energy Efficient MAC Protocols For WSN
 
Bf33335340
Bf33335340Bf33335340
Bf33335340
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
 
Energy-efficient MAC protocols for wireless sensor networks: a survey
Energy-efficient MAC protocols for wireless sensor networks: a surveyEnergy-efficient MAC protocols for wireless sensor networks: a survey
Energy-efficient MAC protocols for wireless sensor networks: a survey
 
ShortPaper
ShortPaperShortPaper
ShortPaper
 
PROGRESS 1& 2.ppt
PROGRESS 1& 2.pptPROGRESS 1& 2.ppt
PROGRESS 1& 2.ppt
 
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
 
R,aouami wccs
R,aouami wccsR,aouami wccs
R,aouami wccs
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
 
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
 
B031201016019
B031201016019B031201016019
B031201016019
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
 
Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks
 
Br33421423
Br33421423Br33421423
Br33421423
 

mn paper

  • 1. TERM PAPER, CS5461/ECE5461, MOBILE NETWORKS, MICHIGAN TECHNOLOGICAL UNIVERSITY, SPRING 2015 1 Enhanced S-MAC protocol to improve the power efficiency Naveena Vemulapalli, Ruimin Zhang, Aliasghar Parandoosh, Zhaoxiang Jin Abstract—Enhanced S-MAC is proposed to solve the fundamen- tal problem in Wireless Sensor Network(WSN), how to keep the network more power efficient. In order to minimize the energy consumption, Enhanced S-MAC is devised to track the traffic loading to adaptively turn on and off the receiver. There are issues like clock synchronization, overhearing when we implemented our protocol. In this proposal we would present all the necessary techniques to solve these mentioned problems. Finally we simulate our proposed mechanism and show how Enhanced S-MAC can fit into the WSN application and optimize the power issue. Keywords—Wireless Sensor Network, Power Efficiency, S-MAC, MAC protocol, Adaptive listening mode I. INTRODUCTION Wireless sensor networking is a rapidly growing technol- ogy. A wireless Sensor Network (WSN) distinguishes from other wireless or wired networks through its capability of interaction with the environment. Such networks have many applications, such as environmental monitoring, smart spaces, robotic exploration, search and rescue, smart environments and localization system. WSNs usually include a large number of nodes deployed in ad-hoc fashion to form a multi-hop wireless network. Usually, all these nodes together carry out the same task, for example keep tracking the temperature. Each node may have one or more sensors, embedded processors, low- power radios, and is operated with battery. Applications of WSNs may require a large number of such smart nodes and generally designed for long-term deployments without human intervention. Consequently, energy efficient and scalability are important design objectives. Like all shared-medium networks, we need medium access control (MAC) techniques to guarantee successful operation of the system. The most fundamental job of the MAC protocol is to avoid collisions from interfering nodes. Many MAC pro- tocols have been developed, such as Time-Division Multiple Access (TDMA), Code-Division Multiple Access (CDMA) and contention-based protocols like IEEE 802.11 [1]. However, they are not ideal for wireless sensor networking without thinking much of energy efficiency and scalability. S-MAC is a medium access control protocol designed for wireless sensor networks. In addition to fulfilling the funda- mental job, that avoids collisions from interfering nodes, S- MAC puts emphasis on sensors’ energy consumption. The reason behind it is that as stated above that all sensor nodes are battery operated. In fact, we expect, in near future, that these nodes become cheap enough so we discard them once running out of battery. Therefore, we may prolong the network life by reducing energy consumed by sensor nodes. Four major sources are considered in S-MAC protocol for causing inefficient use of energy as well as we can trade off to reduce energy consumption. The first one is collision. If a transmitted packet gets corrupted by other packets, it will be discarded which in return would increase energy consumption unnecessarily. S-MAC overcomes this problem with RTS-CTS approach. The second reason is idle listening in which case it listens to possible traffic that is not sent. Nodes with S- MAC protocol are periodically put into sleep mode in order to consume less energy. Each node, if it does not transmit or receive nay data, turns off itself and sets a timer to wake itself up at later time. This process happens periodically to make sure no transmission is missed. The third source for energy inefficiency is control overhead, i.e. sending and receiving control packets which consumes energy too and less useful data packets can be transmitted. S-MAC handles this issue by a technique called message passing. In message passing, we fragment a long message into many independent small packets and transmit them in a burst. In this technique only one RTS and one CTS are used. They reserve the medium for transmitting all fragments. The last source is overhearing. Overhearing occurs when a node receives a packet that is destined to other nodes. Overhearing can be a major reason of energy waste mainly with a high node density causing a heavy traffic load. S-MAC tries to deal with this issue with a novel idea of putting nodes to off mode (by switching their radio off) when transmission is not meant for that node. S-MAC tries to reduce the waste of energy from all above sources while accepting some reduction in both per-hop fairness and latency. Although per-hop fairness and latency are reduced, it does not necessarily result in lower end-to-end fairness and latency. Fig. 1: The construction of the frame Synchronization is a very big issue in S-MAC, since the network size, topology and node density change over time and
  • 2. TERM PAPER, CS5461/ECE5461, MOBILE NETWORKS, MICHIGAN TECHNOLOGICAL UNIVERSITY, SPRING 2015 2 individual nodes may have different clock drift. In S-MAC, a node first waits for a random time. If it does not receive any SYNC message it will start sending its own schedule. All other nodes that receive this, should synchronize and change their schedules to this one. This process will happen periodically. A typical SYNC packet consists of Sender ID and Next-Time Sleep of that particular node. In S-MAC, listening period will be divided into two parts. One for sending/receiving SYNC messages and one for sending/receiving Data communication. Figure 1 illustrates this point. As we can see that Data communication period consists of sending/receiving control packets like ACKs, RTS-CTS packets and Data transmission. The ratio of the listening time to the whole period is called duty cycle. The major problems in S-MAC are that first fixed duty cycles prevent S-MAC to be adaptive to traffic load. In wireless sensor networks, traffic load changes all the time. Fixed duty cycles prevent S-MAC to further exploit energy savings during light traffic load. In this paper, we enhance S-MAC protocol, by adopting variable duty cycle, to save more energy in a wireless sensor network with light traffic load. Second, in order to turn different nodes into Sleep mode, it should have the knowledge when it will wake up. In order to minimize the listening time and shorten the transmission delay, trade-off is needed to determine the schedule of each node. In our protocol (Enhanced S-MAC), we have redesigned the synchronization protocol such that we do not need any of these information to initiate a transmission or synchronize nodes together. The rest of this paper is as follows. In section II we will talk about the related past protocols proposed by other researchers. We divide their protocols into three groups of Contention-based MAC protocol, TDMA- based MACs and S-MAC protocols. In section III we will point out all the problems we encounter when we implement the protocol. In section IV & V we will explain our own protocol and system model for it as well as we bring our experimental results acquired from the Enhanced-SMAC. SectionVI will be the Conclusion. II. RELATED WORK MAC is a very broad research area. It includes research mainly in the area to reduce the power consumption. Most of the MACs that are used at present are the contention based MAC protocols and TDMA protocols [2] [4] [5] [6]. A. Contention based MAC protocol The IEEE 802.11 is one of the contention based protocol. It is mostly used in the ad-hoc networks that is in the wireless networks. This type of protocols has many advantages because of its simplicity, robustness it also avoids the hidden terminal problem. This protocol has a very high energy consumption especially in the idle mode. This problem arises when the nodes are in the listening state even when there is no data transfer. Due to this idle listening the power consumption is very high. PAMAS (power aware multiple access signaling) is an energy saving mode to avoid overhearing among the neighboring nodes. We have used the similar technique in our paper that is related to the PAMAS [4]. B. TDMA-based MACs TDMA based protocols have more energy conservation than the contention based MAC protocols. This type of proto- col is based on reservation and scheduling. TDMA protocol contains nodes in the form of clusters. These clusters can only communicate with in the cluster. Managing the inter cluster communication and interference is not an easy thing. Moreover when we deal with the mobile network. It is not easy for the TDMA based protocol to dynamically change the frame length and the time slot according to the network. Then they proposed a new protocol for the wireless sensor networks. In this protocol every node has different schedules to communicate with its neighbors. Every time slot it only talks with only one neighbor. To avoid interference different channels are assigned to the interfering links that is FDMA or CDMA. One of the main drawback of this protocol is its low bandwidth utilization. If a node wants to send packets to only one neighbor then it cannot reuse the time slots that are scheduled to the other neighbors. The next technology that has been developed to avoid the low bandwidth utilization in the previous one is to have to an adaptive rate control mechanism in CSMA. The main goal of this is to have a good and fair bandwidth allocation to all the nodes in the network. Next existing technology is piconet [7] which is closely related to S-MAC. It keeps all the nodes to periodically sleep so as to reduce the energy consumption. But this mechanism does not have any coordination and synchronization among the nodes about the sleep and the listen intervals. The main feature of this scheme is to have the communication between the neighboring nodes by allowing the nodes to broadcast the address when it wakes up from the sleep state. If a sender wants to talk to a neighbor it must be in the listening state until it receives the broadcast from the neighbor. While S-MAC gets synchronized with the schedules of the neighboring nodes to reduce the energy consumption and the latency. The power saving mode in the IEEE 802.11 is almost related to the S-MAC operation. The only difference is 802.11 is designed for the single-hop network where all nodes can hear each other. S-MAC is designed for the multi-hop network. In the S-MAC the sleep schedules of all the nodes are synchronized together. C. S-MAC protocol S-MAC has many approaches so as to reduce the energy consumption due to idle listening, collision, overhearing and control overhead. S-MAC takes the assumption that all the communications occur between the nodes that are close to each other. Another assumption is that we consider all the applications will have long idle periods and can resist latency. The basic feature of S-MAC scheme is that every node sets a timer and sleeps for some time and then wakes up to see if any node wants to send the data. All the nodes in the network can choose their own listen/sleep schedules but they should be synchronized to the neighboring nodes. It is possible that all the nodes cannot synchronize in a multi-hop network. They exchange their schedules by periodically broadcasting
  • 3. TERM PAPER, CS5461/ECE5461, MOBILE NETWORKS, MICHIGAN TECHNOLOGICAL UNIVERSITY, SPRING 2015 3 the SYNC packet to their neighboring nodes. If multiple nodes want to talk with the same node to avoid collision, avoidance S-MAC follows virtual and physical carrier sense. Each packet contains the information about how much time the transmission of the message will be. Every node records this value and sets a timer. It is called the network allocation vector. Before initiating the transmission every node looks at its NAV and then starts the transmission if its NAV is zero. NAV not equal to zero indicates that the medium is busy. This type of sensing is called virtual carrier sensing. If the node fails to get the medium it goes to sleep and wakes up again if when the receiver is free and listening again. After the exchange of the RTS/CTS the nodes will not sleep again until the data transmission is complete. In our Enhanced S-MAC protocol all nodes follow the schedule of the dominant node and all the nodes are synchro- nized only once before the data transmission. We know there is a lot of energy waste due to the periodic synchronization and scheduling which is removed in our Enhanced S-MAC III. PROBLEM STATEMENT In order to design a good mac protocol we have to consider the following attributes. The first and the most important thing is the energy consumption. We know that the sensor nodes are powered with a battery and it is onerous to change or replace the batteries frequently. Another important factor is the adaptivity of the network to the changes in the traffic. A good MAC protocol should give all of the above advantages. In this paper we have presented the Enhanced S-MAC protocol [2]. The main reasons for the increased power consumption is that the nodes are in the idle state even when there is no data transfer. In most of the present networks the nodes have the fixed sleeping time and fixed listening time due to this the nodes keep listening even in the idle state which wastes a lot of power. If we change the listening time of the nodes based on the traffic in the network then a lot of power can be conserved. The next problem that is common in all the wireless sensor network is the synchronization of the clock. It is necessary for all the nodes in the network to synchronize with each other in order to communicate with the nodes. For the successful communication all the nodes should know the sleep and listening times of their neighboring nodes. Therefore synchronization is very important for communication. Next major problem is the duty cycle, all the wireless sensor networks that are present today have a fixed duty cycle. This increases the power consumption in the nodes. This power consumption is greatly reduced if we use the variable duty cycle based on the traffic conditions. IV. DESIGN SPACE In order to further improve the power efficiency in Wireless Sensor Network, we proposed our own MAC layer protocol named as Enhanced S-MAC. The major difference between our mechanism and S-MAC is we redesign the sync protocol and adapt to a variable duty cycle for listening window. We simplify the sync packet protocol by the clock drift by which WSN can minimize the listening time for synchronous functionality. The variable duty cycle can further reduce the listening time by tracking the current traffic load. It may introduce some new problems such as longer latency, but in our application scenario we consider the latency as second priority compared to power efficiency. A. Sync Package In wireless network, all the devices are isolated from each other physically. There has no way to synchronize the clock information through all the devices. That will not be a problem if the receiver is always on since it will never miss a single transaction except the conflictions. But in a WSN network it will cause a substantial problem due to the clock drift. Listen Period 0s 1s 2s 3s 4s 0s 1s 2s 3s 4s 5s B A Fig. 2: Miss listening due to clock drift In figure 2, there have 2 device nodes in the network, node A and node B. Because of the clock drift the variation of their own timers are getting larger and larger. In this example all the devices are only wake up at the beginning of each second. Thus if one node want to communicate with another, it has to establish the link at the beginning of the second. Since they have no ideas about the other one’s timer, they can not talk to each other when one node is transmitting but the other is sleeping. What is missing here is synchronization. We can not count on the clock accuracy since even two clocks are running very close to each other, there may have a non-negligible accumulative error which is big enough to cause the problem. The concept of synchronization is to periodically reset all the timers except the base one. Therefore no accumulative error will be imposed. In our project we propose an innovative mechanism to deal with the synchronization problem. It is very easy to implement and taking very short time to synchronize all the nodes connected in the network. The protocol is designed by the assumption that the clock drift is constant during the operation, on the other words, the clock frequency of each node will never change. For example, the node which is running faster will always run faster. With this assumption, one can easily find out that the fastest timer will always be the first one to count down one second. We select this fastest node to be our base node and all the other nodes have to reset their timer when they receive the sync package sent from the base node. Thus the frame starts from the sync packet from base node and all the others will be synchronized to this base node.
  • 4. TERM PAPER, CS5461/ECE5461, MOBILE NETWORKS, MICHIGAN TECHNOLOGICAL UNIVERSITY, SPRING 2015 4 Base A B Id=2;Gid=2 Id=3;Gid=3 Id=5;Gid=5 Broadcast the sync package Fig. 3: Synchronization in Enhanced S-MAC Figure 3 demonstrates how the synchronization works. Base node broadcast the sync message to its neighbors node A and node B, Then node A and B will continue to broadcast their own sync messages to all their neighbors right after they reset the timer. In order to avoid the duplication of the sync message, we integrate the base node ID into the sync message which is a unique ID for every nodes. So in each frame one node will only broadcast sync message with the base node ID once and it will never broadcast the same sync message again until the end of this frame. Base A B Id=2;Gid=2 Broadcast the sync package Id=3;Gid=2 Id=5;Gid=2 Fig. 4: Group ID in Enhanced S-MAC There have ID and Gropu ID(GID) in Enhanced S-MAC. ID is a unique tag number for each node and it never changes. The GID is the same as ID when the node is booted up. Every time the node broadcasts its sync message the GID will be included in the message. When the node receives a sync message it will check the GID with its own GID. If they are the same, it can just ignore the message, elsewise it will update its own GID with the one in the sync message and broadcast the sync message to the network with the updated GID. By doing this all the nodes will have the base node GID at the end of the synchronization period. In figure 4 both node A and B are synchronized to GID 2. Then they will broadcast the sync message to their neighbors which base node can not touch. B. adaptive listening window In WSN, the traffic load is not as much as that in the Internet. In some particular applications, the sensor makes a detection every couple of minutes and then transfer the data back to the access point. Beside the transaction time, the network keeps idle most of the time. In order to further decrease the power consumption, a mechanism is needed to dynamically adjust the listening window so one node can deactivate itself when it is not included in the communication. Enhanced S-MAC is devised to solve this problem and the idea is very simple, the node counts how long the channel is silent. Silent in this scenario means there’s no traffic within the range of the node. If the counter expires the node turn itself off to sleeping mode until the next frame. Whenever the traffic is detected during the listening mode, the node resets the counter and stays in the listening mode. The timer is re- activated once the channel returns back silent. In other words, the node is automatically turned off after a certain amount of silent time. The motivation of this mechanism is all the nodes agree to communicate at the beginning of the frame, it is high possibility of hearing a traffic during that time. It is more likely to receive packets and worth to open the listener to detect the channel. Even the packet is not send to it, it should still keep listening. Since the potential sender may lose the control of channel in the competition, but it will retry it after the current transaction. That is why all the nodes stay in listening mode when they detect a transaction. So how long should the timer count down to, it depends on the channel competition time. In all cases it must be long enough to catch the transaction. In 802.11 WLAN CSMA/CA is implemented to avoid confliction. For all the nodes have to occupy the channel before any transmission. In order to compete the usage of the channel, all the nodes have to wait at least DCF inter-frame spacing(DIFS) plus a random time in contention window. So the timer should be set to at least bigger than the DIFS plus the maximum value of CW. If the clock drift is considered the timer is supposed to set a little higher. From the previous description, it is known that if the device detects a transaction happen around it, even it has nothing to do with this transaction, it will keep listening the channel since later on it may be signaled to communicate with other node. During this time, it is possible to turn it off with a careful design. This is what we define before as overhearing power saving. All the neighbors of the sender or the receiver should be turned off to sleeping mode as long as the unrelated transaction is still on. It is obvious that all the neighbors of the receiver should be silent due to the potential confliction happening on the receiver
  • 5. TERM PAPER, CS5461/ECE5461, MOBILE NETWORKS, MICHIGAN TECHNOLOGICAL UNIVERSITY, SPRING 2015 5 side. It is also true for the neighbors of the sender. When the sender transmits the data, all its neighbors can not receive a clear signal other than the sender. Without the ability to listen other nodes, it’s better to sleep rather than waste energy. All the neighbors of the sender or the receiver can get the CTS/RTS signal in which all the duration information is allocated. When a node receive a CTS/RTS and find out that it is not included in this transaction, it will set its own NAV(Net Allocation Vector) and sleep. The NAV is used in 802.11 to indicate the earliest to access the medium, but here the NAV is used to set a sleep timer. C. Priority Medium Access As what we described before, there are two different types of packets in the WSN, one is sync and the other is data. Sync packet is always transmitted at the beginning of each frame. It has tight time requirement which means they are preferred to send at the same time. The data packets are not that urgent compared with sync packets. So when Enhanced S-MAC is designed, the two different priorities packets are proposed. Figure 5 looks like a traditional 802.11 MAC protocol except that it has two different contention windows, one for the sync, another for the data. For each contention window it has multiple time slots. When the device wants to compete for the medium resource it generates a random back off delay and the one has the shortest back off time can occupy the channel. The rest of the devices have to compete again after this transmission. Obviously the sync packet has higher priority and is sup- posed to deliver before all the data packets. Therefore the contention window of sync packet is assigned ahead of the data packet. Extra spacing is added between the sync and data contention window due to the clock drift and other unpredictable latency. With this priority medium access, all the sync packets can be transferred altogether at the beginning of frame. Each node in the network will broadcast its sync packet once per frame whenever its timer expires or receives other sync packet. It is impossible for your neighbors to transfer a data packet before you broadcast the sync packet. But the priority medium access also has some side-effect. It delays the data transfer by guaranteeing the priority sync transfer which is acceptable in WSN environment. D. Conclusion In this section we represent our mechanism of Enhanced S- MAC by 3 parts, innovative sync protocol, adaptive listening scheduler and robust priority medium access. All these 3 techniques are devised and dedicated to the energy efficiency problem in WSN. We creatively integrate them together as a whole system which is super fit into the WSN applications. V. EXPERIMENTAL RESULT We implement a simulation environment which can evaluate the performance of our protocol, Enhanced S-MAC. It is written in Java based environment which is the easiest way for programming. Java has a lot of API functions which is handy to realize a virtual wireless network. Since there have a lot of time events we integrate a lot timers to evaluate the latency in the reality. A B C E D Fig. 6: The topology of the evaluated network Figure 6 illustrates the topology of the simulated WSN. There are 5 nodes in the network and only node C can talk to all the other 4 nodes. Node A and B can not reach node D and E and vice versa. In our simulation each node is a identical object which models a real world product MPR2400 from Crossbow. MPR2400 is widely used in WSN like indoor building monitoring and security. It can support large scale sensor networks(more than 1000 points). It operates on the frequency 2.4 to 2.48 GHz which is compatible with global ISM band. Direct sequence spread spectrum is used to over- come the interference and provide inherent data security. Fig. 7: Block Diagram of MPR2400 Figure 7 is the block diagram of MPR2400 and it is obvious that thie module is designed only for the transmission function. It is flexible to integrate any kind of sensors to build the wireless sensor system. Table I displays the current
  • 6. TERM PAPER, CS5461/ECE5461, MOBILE NETWORKS, MICHIGAN TECHNOLOGICAL UNIVERSITY, SPRING 2015 6 DIFS CW for sync CW for data Medium busy Fig. 5: Medium access and inter-transaction spacing consumption in different operation modes. The receive mode consumes 19.7mA current which is named as listening mode in our proposal. The idle mode consumes 20uA current which is named as sleeping mode in our proposal. It’s a little confusing that the sleep mode in MPR2400 is different from our definition. What we describe about sleeping mode in the paper is just turn off the receiver but the controller is still on. TABLE I: Current Draw Transmit data rate 250 kbps Receive mode 19.7mA TX, -10 dBm 11mA TX, -5 dBm 14mA TX, 0 dBm 17.4mA Idle mode, voltage regular on 20uA Sleep mode, voltage regular off 1uA Obviously it is very important to turn off the receiver when there’s no traffic. It consumes about 1000 times power in the listening mode than in the sleeping mode. Adaptive listening mechanism can reduce the overall power consumption dramatically. In our simulation the listening mode is set to consume 19.7mA current and sleeping mode is set to consume 20uA. When we calculate our total energy consumption, we time the currents with the related time in corresponding modes. In order to compare our results with the S-MAC(fixed 50% duty cycle) and 802.11(always on), we have a simple assumption that S- MAC has 50% duty cycle for the listening time and 802.11 is always listening. Tf Tw sleepTd Ts datasync Fig. 8: The construction of the frame Figure 8 illustrates each frame in Enhanced S-MAC proto- col. The detail parameters are listed in table II. Each frame is 10S long and the reason why it’s longer than other common protocols is the simulation granularity. In Java the timer is configured at least 1mS interval. If we set the frame as 1S long it’s hard to invoke very short events like syn which is used to be less than 1mS. By enlarging the frame time it is easy to simulate these short events since the whole scope is enlarged. The receiver is turned on before the sync message due to the clock drift. Tw is the time for wake up the receiver before the next frame which is set to be 100mS. Td is the backoff time for data transmission after the sync message. Ts is the sleeping time. When the node doesn’t hear anything during Ts it turns off the receive and put itself into the sleeping mode. TABLE II: Timing parameter Tf frame duration 10S Tw wake up time 100mS Td backoff time 10-15mS Ts time to sleep 20mS All the data results are presented in table III, It is clear that all the duty cycles of listening time are highly associated with the transmission loading. When the transmission rate increases, the listening time expands which is our motivation to develop Enhanced S-MAC protocol. We calculate all the 3 different protocols’ energy consumption and list them in table IV. Further reducing the listening time can effectively help energy dissipation. Enhanced S-MAC dynamically control the listening time by detecting the traffic around it. S-MAC has a fixed duty cycle which makes it less attractive when the traffic is low which is quite common in WSN. 802.11 doesn’t concern the power issue in this environment and it is designed to fit in high performance wireless network. VI. CONCLUSION In this paper, we have enhanced the previous S-MAC protocol to be more energy efficient. Nodes in our Enhanced S-MAC protocol are smarter in their energy dissipation by detecting surrounding communications and adjusting their listening windows dynamically. The synchronization protocol was redesigned and sync packages was granted high priority to guarantee a delivery. The new synchronization protocol takes less time and avoids accumulative errors caused by
  • 7. TERM PAPER, CS5461/ECE5461, MOBILE NETWORKS, MICHIGAN TECHNOLOGICAL UNIVERSITY, SPRING 2015 7 TABLE III: Listening time for each node data set 2986kB; Time 999.7S node A 55.1S node B 63.6S node C 74.0S node D 54.7S node E 54.3S data set 5916kB ; Time 997.5S node A 89.4S node B 88.7S node C 130.1S node D 81.4S node E 93.8S data set 12229KB ; Time 991.3S node A 170.5S node B 169.3S node C 233.9S node D 168.7S node E 152.3S TABLE IV: Energy consumption in 3 protocols data set 2986kB; Time 999.7S Enhanced S-MAC 1207.5 mAS S-MAC 9857 mAS 802.11 19694 mAS data set 5916kB ; Time 997.5S Enhanced S-MAC 1922.6 mAS S-MAC 9835.35 mAS 802.11 19650.75 mAS data set 12229KB ; Time 991.3S Enhanced S-MAC 3541.4 mAS S-MAC 9774.2 mAS 802.11 19528.61 mAS clock drift. We have built a Java-based simulation environment to evaluate our Enhanced S-MAC. We simulated a wireless sensor network, consisting two subnets with one node covered by both. Our preliminary results show that our Enhanced S- MAC might have good potential to dramatically reduce energy consumption in a wireless sensor network with light traffic load. REFERENCES [1] I. C. S. L. M. S. Committee et al., “Wireless lan medium access control (mac) and physical layer (phy) specifications,” 1997. [2] W. Ye, J. Heidemann, and D. Estrin, “An energy-efficient mac protocol for wireless sensor networks,” in INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, vol. 3. IEEE, 2002, pp. 1567–1576. [3] S. Singh and C. S. Raghavendra, “Pamaspower aware multi-access pro- tocol with signalling for ad hoc networks,” ACM SIGCOMM Computer Communication Review, vol. 28, no. 3, pp. 5–26, 1998. [4] S. Singh, M. Woo, and C. S. Raghavendra, “Power-aware routing in mobile ad hoc networks,” in Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking. ACM, 1998, pp. 181–190. [5] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy- efficient communication protocol for wireless microsensor networks,” in System sciences, 2000. Proceedings of the 33rd annual Hawaii international conference on. IEEE, 2000, pp. 10–pp. [6] A. Woo and D. E. Culler, “A transmission control scheme for media access in sensor networks,” in Proceedings of the 7th annual interna- tional conference on Mobile computing and networking. ACM, 2001, pp. 221–235. [7] F. Bennett, D. Clarke, J. B. Evans, A. Hopper, A. Jones, and D. Leask, “Piconet: Embedded mobile networking,” Personal Communications, IEEE, vol. 4, no. 5, pp. 8–15, 1997.