medium access control
play

Medium Access Control and WPAN Technologies 01204525 Wireless - PowerPoint PPT Presentation

Medium Access Control and WPAN Technologies 01204525 Wireless Sensor Networks and Internet of Things Chaiporn Ja Jaikaeo (c (chaiporn.j@ku.ac.th) Department of f Computer Engineering Kasetsart University Materials taken from lecture slides


  1. Medium Access Control and WPAN Technologies 01204525 Wireless Sensor Networks and Internet of Things Chaiporn Ja Jaikaeo (c (chaiporn.j@ku.ac.th) Department of f Computer Engineering Kasetsart University Materials taken from lecture slides by Karl and Willig Last updated: 2018-11-17 Cliparts taken from openclipart.org

  2. Overview • Principal options and difficulties • Contention-based protocols • Schedule-based protocols • Wireless Personal Area Networks Technologies 2

  3. Difficulties • Medium access in wireless networks is difficult, mainly because of ◦ Half-duplex communication ◦ High error rates • Requirements ◦ As usual: high throughput, low overhead, low error rates, … ◦ Additionally: energy-efficient, handle switched off devices! 3

  4. Energy-Efficient MAC: Requirements • Recall ◦ Transmissions are costly ◦ Receiving about as expensive as transmitting ◦ Idling can be cheaper but is still expensive • Energy problems ◦ Collisions ◦ Overhearing ◦ Idle listening ◦ Protocol overhead • Always wanted: Low complexity solution 4

  5. Main Options Wireless medium access Centralized Distributed Schedule- Contention- Schedule- Contention- based based based based Fixed Demand Fixed Demand assignment assignment assignment assignment 5

  6. Centralized Medium Access • A central station controls when a node may access the medium ◦ E.g., Polling, computing TDMA schedules ◦ Advantage: Simple, efficient • Not directly feasible for non-trivial wireless network sizes • But: Can be quite useful when network is somehow divided into smaller groups • Distributed approach still preferable 6

  7. Schedule- vs. Contention-Based • Schedule-based protocols ◦ FDMA, TDMA, CDMA ◦ Schedule can be fixed or computed on demand ◦ Usually mixed ◦ Collisions, overhearing, idle listening no issues ◦ Time synchronization needed • Contention-based protocols ◦ Hope: coordination overhead can be saved ◦ Mechanisms to handle/reduce probability/impact of collisions required ◦ Randomization used somehow 7

  8. Overview • Principal options and difficulties • Contention-based protocols • Schedule-based protocols • Wireless Personal Area Networks Technologies 8

  9. Distributed, Contention-Based MAC • Basic ideas ◦ Receivers need to tell surrounding nodes to shut up ◦ Listen before talk (CSMA) ◦ Suffers from sender not knowing what is going on at receiver Hidden terminal Also: recall scenario: exposed terminal scenario A B C D 9

  10. How To Shut Up Senders • Inform potential interferers during reception ◦ Cannot use the same channel ◦ So use a different one ◦ Busy tone protocol • Inform potential interferers before reception ◦ Can use same channel ◦ Receiver itself needs to be informed, by sender, about impending transmission ◦ Potential interferers need to be aware of such information, need to store it 10

  11. MACA A B C D • M ultiple A ccess with C ollision A voidance RTS • Sender B issues Request to Send (RTS) CTS • Receiver C agrees with Clear to Send ( CTS ) Data • Potential interferers learns NAV indicates from RTS/CTS busy medium NAV indicates • B sends, C acks busy medium • Used in IEEE 802.11 Ack 11

  12. Virtual Carrier Sensing A B C D RTS CTS NAV Data NAV ACK NAV → Network Allocation Vector (Virtual Carrier Sensing) 12

  13. Problems Solved? • RTS/CTS helps, but do not solve hidden/exposed terminal problems A B C D A B C D RTS RTS RTS CTS CTS RTS RTS Data Data CTS CTS Data Ack 13

  14. MACA Problem: Idle listening • Need to sense carrier for RTS or CTS packets ◦ Simple sleeping will break the protocol • IEEE 802.11 solution ◦ Idea: Nodes that have data buffered for receivers send traffic indicators at prearranged points in time ◦ ATIM - A nnouncement T raffic I ndication M essage ◦ Receivers need to wake up at these points, but can sleep otherwise 14

  15. Sensor-MAC (S-MAC) • MACA unsuitable if average data rate is low ◦ Most of the time, nothing happens • Idea: Switch off, ensure that neighboring nodes turn on simultaneously to allow packet exchange ◦ Need to also exchange Active period wakeup schedule Wakeup period between neighbors ◦ When awake, Sleep period perform RTS/CTS For SYNCH For RTS For CTS 15

  16. Schedule Assignment • Synchronizer ◦ Listen for a mount of time Listen ◦ If hear no SYNC, select its A Sleep Go to sleep after time t Listen for SYNC own SYNC ◦ Broadcasts its SYNC immediately Broadcasts • Follower ◦ Listen for amount of time ◦ Hear SYNC from A, follow Listen A’s SYNC B Go to sleep after time t- t d Sleep t d ◦ Rebroadcasts SYNC after random delay t d Broadcasts 16

  17. S-MAC Synchronized Islands • Nodes learn schedule from other nodes • Some node might learn about two different schedules from different nodes ◦ “Synchronized islands” • To bridge this gap, it has to follow both schemes A A A A A A B B B B B E E E E E E E C C C C C D Time D D D 17

  18. Preamble Sampling • Alternative option: Don’t try to explicitly synchronize nodes ◦ Have receiver sleep and only periodically sample the channel • Use long preambles to ensure that receiver stays awake to catch actual packet ◦ Example: B-MAC, WiseMAC, LoRa Start transmission: Long preamble Actual packet Check Check Check Check channel channel channel channel Stay awake! 18

  19. B-MAC • Very simple MAC protocol • Employs ◦ Clear Channel Assessment (CCA) and backoffs for channel arbitration ◦ Link-layer acknowledgement for reliability ◦ Low-power listening (LPL) ◦ I.e., preamble sampling • Currently: Often considered as the default WSN MAC protocol 19

  20. B-MAC • B-MAC does not have ◦ Synchronization ◦ RTS/CTS ◦ Results in simpler, leaner implementation ◦ Clean and simple interface 20

  21. Clear Channel Assessment • "Carrier Sensing" in wireless networks Thresholding CCA algorithm Outlier detection CCA algorithm 21

  22. Overview • Principal options and difficulties • Contention-based protocols • Schedule-based protocols • Wireless Personal Area Networks Technologies 22

  23. LEACH • L ow- E nergy A daptive C lustering H ierarchy • Assumptions ◦ Dense network of nodes ◦ Direct communication with central sink ◦ Time synchronization • Idea: Group nodes into “ clusters ” ◦ Each cluster controlled by clusterhead ◦ About 5% of nodes become clusterhead (depends on scenario) ◦ Role of clusterhead is rotated 23

  24. LEACH Clusterhead • Each CH organizes ◦ CDMA code for its cluster ◦ TDMA schedule to be used within a cluster • In steady state operation ◦ CHs collect & aggregate data from all cluster members ◦ Report aggregated data to sink using CDMA 24

  25. LEACH rounds Fixed-length round ……… .. ……… .. Setup phase Steady-state phase Time slot Time slot Time slot Time slot … .. … .. … .. 1 2 n 1 Advertisement phase Cluster setup phase Broadcast schedule Clusterheads Members compete with compete Self-election of CSMA with CSMA clusterheads 25

  26. TRAMA • Tr affic A daptive M edium A ccess Protocol • Assume nodes are time synchronized • Time divided into cycles, divided into ◦ Random access period ◦ Scheduled access period time cycle Random Access Period Scheduled-Access Period • Exchange and learn two-hop • Used by winning nodes to transmit data neighbors • Exchange schedules 26

  27. TRAMA – Adaptive Election • How to decide which slot (in scheduled access period) a node can use? ◦ For node id x and time slot t , compute p = h ( x  t ) ◦ h is a global hash function ◦ Compute p for next k time slots for itself and all two-hop neighbors ◦ Node uses those time slots for which it has the highest priority t = 0 t = 1 t = 2 t=3 t = 4 t = 5 A 14 23 9 56 3 26 B 33 64 8 12 44 6 C 53 18 6 33 57 2 27

  28. Overview • Principal options and difficulties • Contention-based protocols • Schedule-based protocols • Wireless Personal Area Networks Technologies 28

  29. IEEE 802.15.4 • IEEE standard for low-rate WPAN (LR-WPAN) applications ◦ Low-to-medium bit rates ◦ Moderate delays without too strict requirements ◦ Low energy consumption • Physical layer ◦ 20 kbps over 1 channel @ 868-868.6 MHz ◦ 40 kbps over 10 channels @ 905 – 928 MHz ◦ 250 kbps over 16 channels @ 2.4 GHz • MAC protocol ◦ Single channel at any one time ◦ Combines contention-based and schedule-based schemes ◦ Asymmetric: nodes can assume different roles 29

  30. 802.15.4 PHY Overview • Operating frequency bands Channel 0 Channels 1-10 2 MHz 868MHz / 915MHz PHY 868.3 MHz 902 MHz 928 MHz 2.4 GHz PHY Channels 11-26 5 MHz 2.4 GHz 2.4835 GHz 30

  31. 802.15.4 Device Classes • Full function device (FFD) ◦ Any topology ◦ Network coordinator capable ◦ Talks to any other device • Reduced function device (RFD) ◦ Limited to star topology ◦ Cannot become a network coordinator ◦ Talks only to a network coordinator ◦ Very simple implementation 31

  32. 802.15.4 Network Topologies 32

  33. 802.15.4 Beaconed Mode • Superframe structure Active period Inactive period Contention Guaranteed time access slots (GTS) period Beacon • GTS assigned to devices upon request 33

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend