300 likes | 513 Views
Wireless Sensor Networks The MAC sublayer. Supervised by professor: Ivan Stojmenovic Done by: Yaser Fouad. Outline. Introduction The Medium Access Control sublayer Problem definition different Medium Access protocols overview Conclusion References. Characteristics of sensor networks.
E N D
Wireless Sensor NetworksThe MAC sublayer Supervised by professor: Ivan Stojmenovic Done by: YaserFouad
Outline • Introduction • The Medium Access Control sublayer • Problem definition • different Medium Access protocols overview • Conclusion • References
Characteristics of sensor networks • heavily deployment • Limited power • Changing network topology • Multihop routing and low range communications • Non uniform data distribution
The MACsublayer • Medium Access Control • Subdivision of the data link layer • Different from Multiple access • Measures of Performance for MAC protocols • Throughput efficiency • Stability • Scalability • Access delay • Power conservation
The MAC sublayer for WSN • Changes due to WSNs characteristics: • Throughput efficiency • Latency • Power consumption
Problem definition • How to preserve the energy to increase the lifetime of the WSN ? • Use Protocols that aim mainly to increase the sleep periods as much as possible
Other problems • Hidden/Exposed terminal problem • Deadlock/Livelock problem
MAC layer protocols for WSNs • Active research area for three decades • Different categorization criteria • One criteria is based on type of assignment • Some protocols use a combination
Sparce Topology and Energy Managemnt(STEM) • Reduction of power consumption is the main target • Designed mainly for networks with bursts of data • Uses two transceivers (one low power and one high power(
STEM continued • STEM-T • Single tone(simple) • High latency • Results in overhearing • STEM-B • More complex • Lower Latency • High energy consumption
Carrier Sense Multiple Access (CSMA) • Based on channel sensing • No controller needed • Two major categories: • Persistent and non persistent • Two variation of persistent came along after • P persistent • 1 persistent
CSMA continued • Major problem is the hidden/exposed terminal • A busy tone was suggested as a solution • Results in higher complexity • Another technique was suggested(CSMA/CA) • Based on RTS ,CTS and random back off • Might still have some collisions in RTS
Low Energy Adaptive Cluster Hierarchy (LEACH) • Based on some assumptions • Heavy deployment • Ability to contact the sink in one hop • Reduce Cluster head and following nodes • More load on cluster heads
LEACH continued • We have two phases for this protocol
Self-organizing Medium Access Control for Sensor networks(SMACS) • Distributed infrastructure algorithm • Based on some assumptions • Available spectrum is much larger • Most ofthe nodes are stationary • Uses unidirectional links • Uses four messages format for link building
SMACS continued • How links are built:
SMACS continued • SMACS protocol matlab simulation:
SMACS improvement • Problems with algorithm: • should accommodate largest depth(Latency and limitation on number of nodes) • Nodes wake up in their assigned slots even with no data (wasted power) • Suggestion( adaptive frame usage) A B C D E F Code 1 Code 2 Y X A B C D E F
802.15.4 • Expected to have commercial impact • Features • Based on low data rate communications • Scalable and self maintained • Enable low power and cost operation • Combines scheduled and contention based schemes • Divides nodes into two main categories • Reduced Function Device • Full Function Device
802.15.4 continued • Characteristics • RFDs can only communicate with the FFDs • Routing is done through FFDs communications • Slots are unidirectional • FFDs are awake much more than RFDs • Has two main modes of operation • Beaconed mode • Nonbeaconed mode
802.15.4 (Beaconed mode) • Frame structure
802.15.4 (Nonbeaconed mode) • No beacons and therefore no GTS • Depends mainly on CSMA/CA • Checks the channel once for being idle • Coordinators are always awake • Small active period after transmission for devices
Conclusion • Different protocols available • Medium Access is different from Multiple Access • All MAC protocols for WSN aim at reducing energy usage • Sleeping is the only state that consumes almost no energy • The 802.15.4 protocol has a potential to hit the commercial market
References • Ian F.Akyildiz, Weilian Su, YogeshSankarasubramaniam and ErdalCayirci, Georgia institute of technology,”A survey on sensor networks " IEEE communications magazine , August 2002 • Holger Karl, Andreas Willig, ”Protocols and Architectures for wireless sensor networks”, John Wiley &sons , Ltd , 2005 • G. Lu, B. Krishnamachari, and C. S. Raghavendra. Performance Evaluation of the IEEE 802.15.4 MAC • for Low-Rate Low-Power Wireless Networks. pages 701–706, Phoenix, AZ, April 2004. • K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie. Protocols for Self-Organization of a Wireless SensorNetwork. IEEE Personal Communications, 2000. • W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan. An Application-Specific Protocol Architecturefor Wireless Microsensor Networks. IEEE Transactions on Wireless Networking, 1(4): 660–670,2002.
My questions • Why did the 802.15.4 protocol adopt Carrier Sensing Multiple Access to work with? • Because CSMA doesn’t have significant overhead , suitable for scalability and doesn’t waste energy if no data is to be sent
My questions continued • If A FFD consumes 1 watt per day to remain active and receive data from nodes when working in the beaconed mode with an active period of 10 slots and the available power in its battery is 15 watts and it has on average 10 followers with an activity probability of 40%. what would you suggest to enable the FFD to function for at least 20 days period?
Solution: 1 day 1 watts 20 days 20watts >15 we should reduce the activity period to preserve power 10 slots 1 watts ?? slots 15/20 (total available power/number of days of operation) Number of slots needed=10*(15/20)=7.5 which should be floored to 7 because we have at least20 days number of active followers at a time=40%* number of followers =0.4*10=4 nodes then we should assign 4 slots to the GTS and 3 slots for the GAP period
My questions continued • for 802.14.5 with beacon mode. assuming the slot size to be able to accommodate a 50 kbyte frame define the procedure the RFD will follow to send: • A) 25Kbyte frame to the FFD • B) 100Kbyte frame to the FFD
Solution • Case A • since frame < available slot size • RFD sends a transmit request in the CAP period • Wait for the assigned slot number in the beacon • Wake up in the assigned slot and start transmitting • Case B • Since frame size >available slot size • A node uses slotted CSMA to transmit the frame in the CAP period • wait for immediate acknowledgment as it is not a preserved slot for it