SlideShare a Scribd company logo
1 of 23
1
University of Freiburg
Computer Networks and Telematics
Prof. Christian Schindelhauer
Wireless Sensor
Networks
8th Lecture
21.11.2006
Christian Schindelhauer
schindel@informatik.uni-freiburg.de
University of Freiburg
Institute of Computer Science
Computer Networks and Telematics
Prof. Christian Schindelhauer
Wireless Sensor Networks 21.11.2006 Lecture No. 08-2
Media Access Control
(MAC)
Controlling when to send a packet and when to listen for a packet are
perhaps the two most important operations in a wireless network
– Especially, idly waiting wastes huge amounts of energy
This chapter discusses schemes for this medium access control that are
– Suitable to mobile and wireless networks
– Emphasize energy-efficient operation
University of Freiburg
Institute of Computer Science
Computer Networks and Telematics
Prof. Christian Schindelhauer
Wireless Sensor Networks 21.11.2006 Lecture No. 08-3
Overview
Principal options and difficulties
Contention-based protocols
Schedule-based protocols
IEEE 802.15.4
University of Freiburg
Institute of Computer Science
Computer Networks and Telematics
Prof. Christian Schindelhauer
Wireless Sensor Networks 21.11.2006 Lecture No. 08-4
Main options
Wireless medium access
Centralized
Distributed
Contention-
based
Schedule-
based
Fixed
assignment
Demand
assignment
Contention-
based
Schedule-
based
Fixed
assignment
Demand
assignment
University of Freiburg
Institute of Computer Science
Computer Networks and Telematics
Prof. Christian Schindelhauer
Wireless Sensor Networks 21.11.2006 Lecture No. 08-5
Centralized medium
access
Idea: Have a central station control when a node may access the medium
– Example: Polling, centralized computation of TDMA schedules
– Advantage: Simple, quite efficient (e.g., no collisions), burdens the central
station
Not directly feasible for non-trivial wireless network sizes
But: Can be quite useful when network is somehow divided into smaller
groups
– Clusters, in each cluster medium access can be controlled centrally –
compare Bluetooth piconets, for example
⇒ Usually, distributed medium access is considered
University of Freiburg
Institute of Computer Science
Computer Networks and Telematics
Prof. Christian Schindelhauer
Wireless Sensor Networks 21.11.2006 Lecture No. 08-6
Schedule- vs. contention-
based MACs
 Schedule-based MAC
– A schedule exists, regulating which participant may use which resource
at which time (TDMA component)
– Typical resource: frequency band in a given physical space (with a given
code, CDMA)
– Schedule can be fixed or computed on demand
• Usually: mixed – difference fixed/on demand is one of time scales
– Usually, collisions, overhearing, idle listening no issues
– Needed: time synchronization!
 Contention-based protocols
– Risk of colliding packets is deliberately taken
– Hope: coordination overhead can be saved, resulting in overall improved
efficiency
– Mechanisms to handle/reduce probability/impact of collisions required
– Usually, randomization used somehow
University of Freiburg
Institute of Computer Science
Computer Networks and Telematics
Prof. Christian Schindelhauer
Wireless Sensor Networks 21.11.2006 Lecture No. 08-7
Overview
Principal options and difficulties
Contention-based protocols
– MACA (Multiple Access with Collision Avoidance)
– S-MAC, T-MAC
– Preamble sampling, B-MAC
– PAMAS
Schedule-based protocols
IEEE 802.15.4
University of Freiburg
Institute of Computer Science
Computer Networks and Telematics
Prof. Christian Schindelhauer
Wireless Sensor Networks 21.11.2006 Lecture No. 08-8
Problems of the MACA-
Protocols
Hidden Terminal Problem
Exposed Terminal Problem
A B C
A B C D
University of Freiburg
Institute of Computer Science
Computer Networks and Telematics
Prof. Christian Schindelhauer
Wireless Sensor Networks 21.11.2006 Lecture No. 08-9
A
Distributed, contention-
based MAC
Basic ideas for a distributed MAC
– ALOHA – no good in most cases
– Listen before talk (Carrier Sense Multiple Access, CSMA) – better, but
suffers from sender not knowing what is going on at receiver, might
destroy packets despite first listening for a
⇒ Receiver additionally needs some possibility to inform possible senders
in its vicinity about impending transmission (to “shut them up” for this
duration
B C D
Hidden
terminal
scenario:
Also:
recall
exposed
terminal
scenario
University of Freiburg
Institute of Computer Science
Computer Networks and Telematics
Prof. Christian Schindelhauer
Wireless Sensor Networks 21.11.2006 Lecture No. 08-10
Main options to shut up
senders
Receiver informs potential interferers while a reception is on-going
– By sending out a signal indicating just that
– Problem: Cannot use same channel on which actual reception takes
place
⇒ Use separate channel for signaling
– Busy tone protocol
Receiver informs potential interferers before a reception is on-going
– Can use same channel
– Receiver itself needs to be informed, by sender, about impending
transmission
– Potential interferers need to be aware of such information, need to store
it
University of Freiburg
Institute of Computer Science
Computer Networks and Telematics
Prof. Christian Schindelhauer
Wireless Sensor Networks 21.11.2006 Lecture No. 08-11
Multiple Access with Collision
Avoidance (MACA)
 Sender B asks receiver C
whether C is able to receive a
transmission
Request to Send (RTS)
 Receiver C agrees, sends out a
Clear to Send (CTS)
 Potential interferers overhear
either RTS or CTS and know
about impending transmission
and for how long it will last
– Store this information in a
Network Allocation Vector
 B sends, C acks
⇒ MACA protocol (used e.g. in
IEEE 802.11)
A B C D
RTS
CTS
Data
Ack
NAV indicates
busy medium
NAV indicates
busy medium
University of Freiburg
Institute of Computer Science
Computer Networks and Telematics
Prof. Christian Schindelhauer
Wireless Sensor Networks 21.11.2006 Lecture No. 08-12
RTS/CTS
RTS/CTS ameliorate, but do not solve hidden/exposed terminal problems
Example problem cases:
A B C D
RTS
CTS
Data
A B C D
RTS
RTS
CTS
RTS
RTS
CTS
CTSData
Data
Ack
University of Freiburg
Institute of Computer Science
Computer Networks and Telematics
Prof. Christian Schindelhauer
Wireless Sensor Networks 21.11.2006 Lecture No. 08-13
MACA Problem: Idle
listening
Need to sense carrier for RTS or CTS packets
– In some form shared by many CSMA variants; but e.g. not by busy tones
– Simple sleeping will break the protocol
IEEE 802.11 solution: ATIM windows & sleeping
– Basic idea: Nodes that have data buffered for receivers send traffic
indicators at pre-arranged points in time
– Receivers need to wake up at these points, but can sleep otherwise
Parameters to adjust in MACA
– Random delays – how long to wait between listen/transmission attempts?
– Number of RTS/CTS/ACK re-trials?
– …
University of Freiburg
Institute of Computer Science
Computer Networks and Telematics
Prof. Christian Schindelhauer
Wireless Sensor Networks 21.11.2006 Lecture No. 08-14
STEM
Sparse Topology and Energy
Management Protocol
 Two channels
– Wakeup channel
• On the wakeup channel data is
announced
– Data Channel
• Otherwise the data channel is always
in sleep mode
 Status of a sensor
– Monitor state
• nodes are idle, no transmission
– Transfer state
 STEM-B
– Transmitter wakes up the receiver by a
beacon on the wakeup channel
– no RTS/CTS
 STEM-T
– Transmitter sends busy tone signal on the
wakeup channel to get the receiver‘s
attention
University of Freiburg
Institute of Computer Science
Computer Networks and Telematics
Prof. Christian Schindelhauer
Wireless Sensor Networks 21.11.2006 Lecture No. 08-15
Sensor-MAC (S-MAC)
MACA’s idle listening is particularly unsuitable if average data rate is low
–Most of the time, nothing happens
Idea: Switch nodes off, ensure that neighboring nodes turn on simultaneously to
allow packet exchange (rendez-vous)
–Only in these active periods, packet
exchanges happen
–Need to also exchange wakeup
schedule between neighbors
–When awake, essentially perform
RTS/CTS
Use SYNCH, RTS, CTS phases
Wakeup period
Active period
Sleep period
For SYNCH For RTS For CTS
University of Freiburg
Institute of Computer Science
Computer Networks and Telematics
Prof. Christian Schindelhauer
Wireless Sensor Networks 21.11.2006 Lecture No. 08-16
S-MAC synchronized
islands
Nodes try to pick up schedule synchronization from neighboring nodes
If no neighbor found, nodes pick some schedule to start with
If additional nodes join, some node might learn about two different
schedules from different nodes
– “Synchronized islands”
To bridge this gap, it has to follow both schemes
Time
A A A A
C C C C
A
B B B B
D D D
A
C
B
D
E E E EE E E
University of Freiburg
Institute of Computer Science
Computer Networks and Telematics
Prof. Christian Schindelhauer
Wireless Sensor Networks 21.11.2006 Lecture No. 08-17
S-MAC Frames
S-MAC adopts a message
passing concept
– long messages are broken
into small frames
– only one RTS/CTS
communication for each
messages
– each frame is
acknowledged
separately
– each frame contains the
information about the
message length
The NAV (not available)
variable of suppressed
neighbors is adjusted
appropriately
Problems: Fairness
University of Freiburg
Institute of Computer Science
Computer Networks and Telematics
Prof. Christian Schindelhauer
Wireless Sensor Networks 21.11.2006 Lecture No. 08-18
Timeout-MAC (T-MAC)
 In S-MAC, active period is of constant
length
 What if no traffic actually happens?
– Nodes stay awake needlessly long
 Idea: Prematurely go back to sleep
mode when no traffic has happened for
a certain time (=timeout) ! T-MAC
– Adaptive duty cycle!
 One ensuing problem: Early sleeping
– C wants to send to D, but is hindered
by transmission A! B
– Two solutions exist
A B C D
RTS
CTS
DATA
May not
send
Timeout,
go back to
sleep as
nothing
happened
ACK
RTS
University of Freiburg
Institute of Computer Science
Computer Networks and Telematics
Prof. Christian Schindelhauer
Wireless Sensor Networks 21.11.2006 Lecture No. 08-19
Mediation Device Protocol
 Goal: Avoid useless listening on the channel
for messages
 Uses: mediation device (MD) which is
available all the tim
 Protocol
– Sender B sends RTS to MD
– MD stores this information
– Receiver C sends query to MD
– MD tells reciever C when to wake up
– C sends CTS to B (now in sync)
– B sends data
– C acknowledges
– C returns to old timing
 Main disadvantage:
– MD has to be energy independent
– Solution: Distributed Mediation Device
Protocol
• Nodes randomly wake up and serve
as mediation device
 Problem: no guarantees on full coverage of
MD
University of Freiburg
Institute of Computer Science
Computer Networks and Telematics
Prof. Christian Schindelhauer
Wireless Sensor Networks 21.11.2006 Lecture No. 08-20
Preamble Sampling
So far: Periodic sleeping supported by some means to synchronize wake
up of nodes to ensure rendez-vous between sender and receiver
Alternative option: Don’t try to explicitly synchronize nodes
– Have receiver sleep and only periodically sample the channel
Use long preambles to ensure that receiver stays awake to catch actual
packet
– Example: WiseMAC
Check
channel
Check
channel
Check
channel
Check
channel
Start transmission:
Long preamble Actual packet
Stay awake!
University of Freiburg
Institute of Computer Science
Computer Networks and Telematics
Prof. Christian Schindelhauer
Wireless Sensor Networks 21.11.2006 Lecture No. 08-21
Preamble sampling - a
popular MAC mechanism
University of Freiburg
Institute of Computer Science
Computer Networks and Telematics
Prof. Christian Schindelhauer
Wireless Sensor Networks 21.11.2006 Lecture No. 08-22
Efficiency of Preamble
Sampling
Assumption: Event arrival is a Poisson process of rate λ
Analysis of expected energy as function of λ, Δ
23
University of Freiburg
Computer Networks and Telematics
Prof. Christian Schindelhauer
Thank you(and thanks go also to Holger Karl for providing slides)
Wireless Sensor Networks
Christian Schindelhauer
8th Lecture
21.11.2006
schindel@informatik.uni-freiburg.de

More Related Content

What's hot

Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
Wsn state-centric programming
Wsn   state-centric programmingWsn   state-centric programming
Wsn state-centric programmingAanchalKumari4
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applicationsDeepshika Reddy
 
Chap 5 (small scale fading)
Chap 5 (small scale fading)Chap 5 (small scale fading)
Chap 5 (small scale fading)asadkhan1327
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Accessanushkashastri
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocolPriya Kaushal
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...ArunChokkalingam
 
Diversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationDiversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationSahar Foroughi
 
Diversity techniques presentation material
Diversity techniques presentation materialDiversity techniques presentation material
Diversity techniques presentation materialNini Lashari
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolArunChokkalingam
 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR) Pradeep Kumar TS
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
Small scale fading
Small scale fadingSmall scale fading
Small scale fadingAJAL A J
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocolSuganthiN2
 

What's hot (20)

Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Wsn state-centric programming
Wsn   state-centric programmingWsn   state-centric programming
Wsn state-centric programming
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applications
 
Chap 5 (small scale fading)
Chap 5 (small scale fading)Chap 5 (small scale fading)
Chap 5 (small scale fading)
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Access
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocol
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
Diversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationDiversity Techniques in Wireless Communication
Diversity Techniques in Wireless Communication
 
Mac
MacMac
Mac
 
Diversity techniques presentation material
Diversity techniques presentation materialDiversity techniques presentation material
Diversity techniques presentation material
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR)
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Small scale fading
Small scale fadingSmall scale fading
Small scale fading
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocol
 

Viewers also liked

Energy Efficient Wireless Internet Access
Energy Efficient Wireless Internet AccessEnergy Efficient Wireless Internet Access
Energy Efficient Wireless Internet AccessScienzainrete
 
Problématique de l'énergie pour les réseaux de capteurs isolés Dominique Jute...
Problématique de l'énergie pour les réseaux de capteurs isolés Dominique Jute...Problématique de l'énergie pour les réseaux de capteurs isolés Dominique Jute...
Problématique de l'énergie pour les réseaux de capteurs isolés Dominique Jute...AFEIT
 
GOAT: Development of a Wireless Sensor Network analysis tool
GOAT: Development of a Wireless Sensor Network analysis toolGOAT: Development of a Wireless Sensor Network analysis tool
GOAT: Development of a Wireless Sensor Network analysis toolSergio Barrachina Muñoz
 
Issues of Wireless Sensor Networks
Issues of Wireless Sensor NetworksIssues of Wireless Sensor Networks
Issues of Wireless Sensor NetworksSouhaiel tekaya
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsmmjalbiaty
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networksahmad abdelhafeez
 
NETWORK ENERGY SAVING TECHNOLOGIES FOR GREEN WIRELESS ACCESS NETWORKS
NETWORK ENERGY SAVING TECHNOLOGIES FOR GREEN WIRELESS ACCESS NETWORKSNETWORK ENERGY SAVING TECHNOLOGIES FOR GREEN WIRELESS ACCESS NETWORKS
NETWORK ENERGY SAVING TECHNOLOGIES FOR GREEN WIRELESS ACCESS NETWORKSMadhav Thekkedath
 
Etat De L\'art Algo RéSeaux De Capteurs sans-fil
Etat  De L\'art Algo RéSeaux De Capteurs sans-filEtat  De L\'art Algo RéSeaux De Capteurs sans-fil
Etat De L\'art Algo RéSeaux De Capteurs sans-filmabrouk
 
Green radio communication
Green radio communicationGreen radio communication
Green radio communicationRajathgowda123
 
Presentation : Réseau de capteurs sans fil
Presentation : Réseau de capteurs sans fil Presentation : Réseau de capteurs sans fil
Presentation : Réseau de capteurs sans fil Nader Abdallah
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksMshari Alabdulkarim
 
Réseau de capteurs sans fils wsn
Réseau de capteurs sans fils wsnRéseau de capteurs sans fils wsn
Réseau de capteurs sans fils wsnAchref Ben helel
 

Viewers also liked (15)

Mac
MacMac
Mac
 
Energy Efficient Wireless Internet Access
Energy Efficient Wireless Internet AccessEnergy Efficient Wireless Internet Access
Energy Efficient Wireless Internet Access
 
Problématique de l'énergie pour les réseaux de capteurs isolés Dominique Jute...
Problématique de l'énergie pour les réseaux de capteurs isolés Dominique Jute...Problématique de l'énergie pour les réseaux de capteurs isolés Dominique Jute...
Problématique de l'énergie pour les réseaux de capteurs isolés Dominique Jute...
 
GOAT: Development of a Wireless Sensor Network analysis tool
GOAT: Development of a Wireless Sensor Network analysis toolGOAT: Development of a Wireless Sensor Network analysis tool
GOAT: Development of a Wireless Sensor Network analysis tool
 
Issues of Wireless Sensor Networks
Issues of Wireless Sensor NetworksIssues of Wireless Sensor Networks
Issues of Wireless Sensor Networks
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraints
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networks
 
Energy efficient routing protocol
Energy efficient routing protocolEnergy efficient routing protocol
Energy efficient routing protocol
 
NETWORK ENERGY SAVING TECHNOLOGIES FOR GREEN WIRELESS ACCESS NETWORKS
NETWORK ENERGY SAVING TECHNOLOGIES FOR GREEN WIRELESS ACCESS NETWORKSNETWORK ENERGY SAVING TECHNOLOGIES FOR GREEN WIRELESS ACCESS NETWORKS
NETWORK ENERGY SAVING TECHNOLOGIES FOR GREEN WIRELESS ACCESS NETWORKS
 
Etat De L\'art Algo RéSeaux De Capteurs sans-fil
Etat  De L\'art Algo RéSeaux De Capteurs sans-filEtat  De L\'art Algo RéSeaux De Capteurs sans-fil
Etat De L\'art Algo RéSeaux De Capteurs sans-fil
 
Green radio communication
Green radio communicationGreen radio communication
Green radio communication
 
Presentation : Réseau de capteurs sans fil
Presentation : Réseau de capteurs sans fil Presentation : Réseau de capteurs sans fil
Presentation : Réseau de capteurs sans fil
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
 
Réseau de capteurs sans fils wsn
Réseau de capteurs sans fils wsnRéseau de capteurs sans fils wsn
Réseau de capteurs sans fils wsn
 
Version 01
Version 01Version 01
Version 01
 

Similar to Wsn 08

Link Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoTLink Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoTPrasant Misra
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
MAC Protocol.pdf
MAC Protocol.pdfMAC Protocol.pdf
MAC Protocol.pdfAbyThomas54
 
Lect04 (1)
Lect04 (1)Lect04 (1)
Lect04 (1)hinalala
 
Energy-efficient MAC protocols for wireless sensor networks: a survey
Energy-efficient MAC protocols for wireless sensor networks: a surveyEnergy-efficient MAC protocols for wireless sensor networks: a survey
Energy-efficient MAC protocols for wireless sensor networks: a surveyTELKOMNIKA JOURNAL
 
NetSim Webinar on Cognitive Radio Networks
NetSim Webinar on Cognitive Radio NetworksNetSim Webinar on Cognitive Radio Networks
NetSim Webinar on Cognitive Radio NetworksSANJAY ANAND
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmnmmjalbiaty
 
1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-mainRahul Singh
 
Communication Networks basics and very important topic
Communication Networks basics and very important topicCommunication Networks basics and very important topic
Communication Networks basics and very important topicKAUSHIKKADIUM
 
ECE4331_class1.ppt
ECE4331_class1.pptECE4331_class1.ppt
ECE4331_class1.pptAlmolla Raed
 

Similar to Wsn 08 (20)

Manet
ManetManet
Manet
 
manet.ppt
manet.pptmanet.ppt
manet.ppt
 
Link Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoTLink Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoT
 
Manet
ManetManet
Manet
 
Manet
ManetManet
Manet
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
MAC Protocol.pdf
MAC Protocol.pdfMAC Protocol.pdf
MAC Protocol.pdf
 
AdHocTutorial.ppt
AdHocTutorial.pptAdHocTutorial.ppt
AdHocTutorial.ppt
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Lect04 (1)
Lect04 (1)Lect04 (1)
Lect04 (1)
 
Lect04
Lect04Lect04
Lect04
 
Energy-efficient MAC protocols for wireless sensor networks: a survey
Energy-efficient MAC protocols for wireless sensor networks: a surveyEnergy-efficient MAC protocols for wireless sensor networks: a survey
Energy-efficient MAC protocols for wireless sensor networks: a survey
 
NetSim Webinar on Cognitive Radio Networks
NetSim Webinar on Cognitive Radio NetworksNetSim Webinar on Cognitive Radio Networks
NetSim Webinar on Cognitive Radio Networks
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
 
1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main
 
Communication Networks basics and very important topic
Communication Networks basics and very important topicCommunication Networks basics and very important topic
Communication Networks basics and very important topic
 
ECE4331_class1.ppt
ECE4331_class1.pptECE4331_class1.ppt
ECE4331_class1.ppt
 
mn paper
mn papermn paper
mn paper
 

More from hinalala

Sensys ch5-mac
Sensys ch5-macSensys ch5-mac
Sensys ch5-machinalala
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)hinalala
 
Habibullah cdmabased
Habibullah cdmabasedHabibullah cdmabased
Habibullah cdmabasedhinalala
 
Fuessler wkmh03
Fuessler wkmh03Fuessler wkmh03
Fuessler wkmh03hinalala
 
Cm chou 20050124
Cm chou 20050124Cm chou 20050124
Cm chou 20050124hinalala
 

More from hinalala (9)

View
ViewView
View
 
Tr 97 67
Tr 97 67Tr 97 67
Tr 97 67
 
Topic5
Topic5Topic5
Topic5
 
Sensys ch5-mac
Sensys ch5-macSensys ch5-mac
Sensys ch5-mac
 
Mac adhoc
Mac adhocMac adhoc
Mac adhoc
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)
 
Habibullah cdmabased
Habibullah cdmabasedHabibullah cdmabased
Habibullah cdmabased
 
Fuessler wkmh03
Fuessler wkmh03Fuessler wkmh03
Fuessler wkmh03
 
Cm chou 20050124
Cm chou 20050124Cm chou 20050124
Cm chou 20050124
 

Wsn 08

  • 1. 1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 8th Lecture 21.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de
  • 2. University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21.11.2006 Lecture No. 08-2 Media Access Control (MAC) Controlling when to send a packet and when to listen for a packet are perhaps the two most important operations in a wireless network – Especially, idly waiting wastes huge amounts of energy This chapter discusses schemes for this medium access control that are – Suitable to mobile and wireless networks – Emphasize energy-efficient operation
  • 3. University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21.11.2006 Lecture No. 08-3 Overview Principal options and difficulties Contention-based protocols Schedule-based protocols IEEE 802.15.4
  • 4. University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21.11.2006 Lecture No. 08-4 Main options Wireless medium access Centralized Distributed Contention- based Schedule- based Fixed assignment Demand assignment Contention- based Schedule- based Fixed assignment Demand assignment
  • 5. University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21.11.2006 Lecture No. 08-5 Centralized medium access Idea: Have a central station control when a node may access the medium – Example: Polling, centralized computation of TDMA schedules – Advantage: Simple, quite efficient (e.g., no collisions), burdens the central station Not directly feasible for non-trivial wireless network sizes But: Can be quite useful when network is somehow divided into smaller groups – Clusters, in each cluster medium access can be controlled centrally – compare Bluetooth piconets, for example ⇒ Usually, distributed medium access is considered
  • 6. University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21.11.2006 Lecture No. 08-6 Schedule- vs. contention- based MACs  Schedule-based MAC – A schedule exists, regulating which participant may use which resource at which time (TDMA component) – Typical resource: frequency band in a given physical space (with a given code, CDMA) – Schedule can be fixed or computed on demand • Usually: mixed – difference fixed/on demand is one of time scales – Usually, collisions, overhearing, idle listening no issues – Needed: time synchronization!  Contention-based protocols – Risk of colliding packets is deliberately taken – Hope: coordination overhead can be saved, resulting in overall improved efficiency – Mechanisms to handle/reduce probability/impact of collisions required – Usually, randomization used somehow
  • 7. University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21.11.2006 Lecture No. 08-7 Overview Principal options and difficulties Contention-based protocols – MACA (Multiple Access with Collision Avoidance) – S-MAC, T-MAC – Preamble sampling, B-MAC – PAMAS Schedule-based protocols IEEE 802.15.4
  • 8. University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21.11.2006 Lecture No. 08-8 Problems of the MACA- Protocols Hidden Terminal Problem Exposed Terminal Problem A B C A B C D
  • 9. University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21.11.2006 Lecture No. 08-9 A Distributed, contention- based MAC Basic ideas for a distributed MAC – ALOHA – no good in most cases – Listen before talk (Carrier Sense Multiple Access, CSMA) – better, but suffers from sender not knowing what is going on at receiver, might destroy packets despite first listening for a ⇒ Receiver additionally needs some possibility to inform possible senders in its vicinity about impending transmission (to “shut them up” for this duration B C D Hidden terminal scenario: Also: recall exposed terminal scenario
  • 10. University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21.11.2006 Lecture No. 08-10 Main options to shut up senders Receiver informs potential interferers while a reception is on-going – By sending out a signal indicating just that – Problem: Cannot use same channel on which actual reception takes place ⇒ Use separate channel for signaling – Busy tone protocol Receiver informs potential interferers before a reception is on-going – Can use same channel – Receiver itself needs to be informed, by sender, about impending transmission – Potential interferers need to be aware of such information, need to store it
  • 11. University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21.11.2006 Lecture No. 08-11 Multiple Access with Collision Avoidance (MACA)  Sender B asks receiver C whether C is able to receive a transmission Request to Send (RTS)  Receiver C agrees, sends out a Clear to Send (CTS)  Potential interferers overhear either RTS or CTS and know about impending transmission and for how long it will last – Store this information in a Network Allocation Vector  B sends, C acks ⇒ MACA protocol (used e.g. in IEEE 802.11) A B C D RTS CTS Data Ack NAV indicates busy medium NAV indicates busy medium
  • 12. University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21.11.2006 Lecture No. 08-12 RTS/CTS RTS/CTS ameliorate, but do not solve hidden/exposed terminal problems Example problem cases: A B C D RTS CTS Data A B C D RTS RTS CTS RTS RTS CTS CTSData Data Ack
  • 13. University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21.11.2006 Lecture No. 08-13 MACA Problem: Idle listening Need to sense carrier for RTS or CTS packets – In some form shared by many CSMA variants; but e.g. not by busy tones – Simple sleeping will break the protocol IEEE 802.11 solution: ATIM windows & sleeping – Basic idea: Nodes that have data buffered for receivers send traffic indicators at pre-arranged points in time – Receivers need to wake up at these points, but can sleep otherwise Parameters to adjust in MACA – Random delays – how long to wait between listen/transmission attempts? – Number of RTS/CTS/ACK re-trials? – …
  • 14. University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21.11.2006 Lecture No. 08-14 STEM Sparse Topology and Energy Management Protocol  Two channels – Wakeup channel • On the wakeup channel data is announced – Data Channel • Otherwise the data channel is always in sleep mode  Status of a sensor – Monitor state • nodes are idle, no transmission – Transfer state  STEM-B – Transmitter wakes up the receiver by a beacon on the wakeup channel – no RTS/CTS  STEM-T – Transmitter sends busy tone signal on the wakeup channel to get the receiver‘s attention
  • 15. University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21.11.2006 Lecture No. 08-15 Sensor-MAC (S-MAC) MACA’s idle listening is particularly unsuitable if average data rate is low –Most of the time, nothing happens Idea: Switch nodes off, ensure that neighboring nodes turn on simultaneously to allow packet exchange (rendez-vous) –Only in these active periods, packet exchanges happen –Need to also exchange wakeup schedule between neighbors –When awake, essentially perform RTS/CTS Use SYNCH, RTS, CTS phases Wakeup period Active period Sleep period For SYNCH For RTS For CTS
  • 16. University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21.11.2006 Lecture No. 08-16 S-MAC synchronized islands Nodes try to pick up schedule synchronization from neighboring nodes If no neighbor found, nodes pick some schedule to start with If additional nodes join, some node might learn about two different schedules from different nodes – “Synchronized islands” To bridge this gap, it has to follow both schemes Time A A A A C C C C A B B B B D D D A C B D E E E EE E E
  • 17. University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21.11.2006 Lecture No. 08-17 S-MAC Frames S-MAC adopts a message passing concept – long messages are broken into small frames – only one RTS/CTS communication for each messages – each frame is acknowledged separately – each frame contains the information about the message length The NAV (not available) variable of suppressed neighbors is adjusted appropriately Problems: Fairness
  • 18. University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21.11.2006 Lecture No. 08-18 Timeout-MAC (T-MAC)  In S-MAC, active period is of constant length  What if no traffic actually happens? – Nodes stay awake needlessly long  Idea: Prematurely go back to sleep mode when no traffic has happened for a certain time (=timeout) ! T-MAC – Adaptive duty cycle!  One ensuing problem: Early sleeping – C wants to send to D, but is hindered by transmission A! B – Two solutions exist A B C D RTS CTS DATA May not send Timeout, go back to sleep as nothing happened ACK RTS
  • 19. University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21.11.2006 Lecture No. 08-19 Mediation Device Protocol  Goal: Avoid useless listening on the channel for messages  Uses: mediation device (MD) which is available all the tim  Protocol – Sender B sends RTS to MD – MD stores this information – Receiver C sends query to MD – MD tells reciever C when to wake up – C sends CTS to B (now in sync) – B sends data – C acknowledges – C returns to old timing  Main disadvantage: – MD has to be energy independent – Solution: Distributed Mediation Device Protocol • Nodes randomly wake up and serve as mediation device  Problem: no guarantees on full coverage of MD
  • 20. University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21.11.2006 Lecture No. 08-20 Preamble Sampling So far: Periodic sleeping supported by some means to synchronize wake up of nodes to ensure rendez-vous between sender and receiver Alternative option: Don’t try to explicitly synchronize nodes – Have receiver sleep and only periodically sample the channel Use long preambles to ensure that receiver stays awake to catch actual packet – Example: WiseMAC Check channel Check channel Check channel Check channel Start transmission: Long preamble Actual packet Stay awake!
  • 21. University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21.11.2006 Lecture No. 08-21 Preamble sampling - a popular MAC mechanism
  • 22. University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 21.11.2006 Lecture No. 08-22 Efficiency of Preamble Sampling Assumption: Event arrival is a Poisson process of rate λ Analysis of expected energy as function of λ, Δ
  • 23. 23 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Thank you(and thanks go also to Holger Karl for providing slides) Wireless Sensor Networks Christian Schindelhauer 8th Lecture 21.11.2006 schindel@informatik.uni-freiburg.de

Editor's Notes

  1. Solutions to early sleeping as homework?
  2. Das gibt eine SEHR schöne Übungsaufgabe!