• Keine Ergebnisse gefunden

Versatile Low Power Media Access for Wireless Sensor Networks

N/A
N/A
Protected

Academic year: 2021

Aktie "Versatile Low Power Media Access for Wireless Sensor Networks"

Copied!
23
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Versatile Low Power Media Access for Wireless Sensor Networks

SenSys’04 Joseph Polastre, Jason Hill, David Culler

Distributed Systems Seminar: Cyber Physical Systems Wilhelm Kleiminger, Institute of Pervasive Computing ETH Zurich

(2)

MAC Basics

(3)

Medium Access Control (MAC)

Nodes share a physical medium

Interference

Garbage, useless data, …

ALOHA 1971 (ALOHAnet)

Collision  back off and send later

Slotted ALOHA: Discrete timeslots

37% channel utilisation for slotted ALOHA

Does not scale to many nodes

© Kerne Erickson

(4)

IEEE 802.11 – CSMA/CA

Channel not full duplex

Cannot transmit and receive at the same time

Collision Avoidance – Listen before send!

Request to send - Clear to send (RTS-CTS)

Only allowed to send after receiving a CTS

Solves hidden terminal problem -- other nodes wait

Idle listening

Node continuously checking if channel is clear

Maximise bandwidth, minimise latency

(5)

CSMA/CA: Collision Avoidance

1.

sends a message to

2.

examines the medium

3.

sees s transmission

backs off… (2)

4.

Eventually, transmits…

B A

C

D

A B

C

C A

C

Note: In ALOHA,

sends first and then checks if there was a collision

C

(6)

Hidden Terminal Problem

1.

sends a message to

2.

examines the medium (at the same time)

3.

starts transmitting…

4.

receives data from both – interference!

A B C

A B

C C

B

RTS/CTS helps to overcome this as C would not start transmitting without first receiving a Clear-To-Send

(7)

Interlude:

MAC in Wireless Sensor Networks I

CSMA-CA?!

Idle listening =

Nodes run on battery

Usually up for months/years

Few transmissions (every second)

Idle listening major component of energy consumption

𝐸 = 𝐸𝑟𝑥+𝐸𝑡𝑥+𝑬𝒍𝒊𝒔𝒕𝒆𝒏+𝐸𝑠𝑎𝑚𝑝𝑙𝑖𝑛𝑔+𝐸𝑠𝑙𝑒𝑒𝑝

A good MAC protocol reduces 𝑬𝒍𝒊𝒔𝒕𝒆𝒏

(8)

Interlude:

MAC in Wireless Sensor Networks II

Critical issues

Low energy consumption

Scalability

Small code size

Zero configuration

What about?

Low latency

High bandwidth

Fairness??

Common problems

Overhearing

Idle listening

Infrastructural problems

Adverse network conditions

Changing network conditions

Faulty nodes

(9)

B-MAC

Implementation

(10)

B-MAC (Polastre et al. 2004)

Carrier Sense based system

With some ALOHA sugar (Preambles)

Only link layer protocol (OSI Layer 2)

Organisation, synchronisation, routing build above

No hidden terminal support

No message fragmentation

No enforced power policy

But… Interfaces

Allow services to tune B-MACs operation

(11)

B-MAC: Clear channel assessment (CCA) A node wants to transmit…

Sleep Insert into

FIFO Queue

10 items

Outliers below noise floor?

Yes

Exponentially weighted

average

No

Transmitting

“A valid packet could never have an outlier significantly below the noise floor”

(Polastre et al. 2004)

Sample Signal Strength

(12)

B-MAC: Low Power Listening (LPL)

Periodic channel sampling

Transmission of preambles  Indicate channel is used

Check every 100ms  Preamble length at least 100ms long (overhead)

Node wakes up Radio ON

Node sleeps

Activity?

Receiving packet

Check interval triggered

yes no

timeout*

packet received

* False positive from CCA

CCA

Link Layer ACK

(13)

B-MAC: Low Power Listening (LPL)

(14)

Other approaches

(15)

WiseMAC (El-Hoiydi et al. 2004)

MAC for downlink in infrastructure networks

Between nodes and access point

Similar to ALOHA

How it works

1. Access point learns sampling schedule of nodes

2. AP can predict when to send data for the nodes to receive it

More (energy) efficient than 802.15.4 / ZigBee

Star network topology (no multi hop)

(16)

S-MAC (Heidemann et al. 2002)

MAC Protocol for multi hop sensor networks

How it works

Node wakes up (periodically)

…listens to the channel (active period) 115ms

SYNC (Synchronising all nodes to a common schedule)

Transmission using RTS-CTS

…returns to sleep variable time

Duty cycle determined by sleep period

Network Allocation Vector

Knowledge about length of transmission = How long can I nap?

(17)

S-MAC: Problems

Protocol is complex

SYNCs can be a problem in a larger network

Higher maintenance cost (neighbours schedules)

Overhead (repeated rounds of synchronisation)

(18)

B-MAC

Results

(19)

LPL check time vs lifetime

(20)

B-MAC in comparison

(21)

Number of hops vs latency

(22)

B-MAC - Recap

Link Layer MAC Protocol (with ACKs)

Low Power Listening

Clear Channel Assessment

Modular approach

Control interfaces

Already implemented in tinyOS

Free to be used/modified/extended

(23)

References

Polastre J, Hill J, Culler D. Versatile Low Power Media Access for Wireless Sensor Networks. 2004.

El-Hoiydi A, Decotignie J-D. WiseMAC: An Ultra Low

Power MAC Protocol for the Downlink of Infrastructure Wireless Sensor Networks. 2004.

Heidemann J, Estrin D. An Energy-efficient MAC Protocol

for Wireless Sensor Networks. 2002.

Referenzen

ÄHNLICHE DOKUMENTE

The Tmote Sky module is a low power “mote” with integrated sensors, radio, antenna, microcontroller, and programming capabilities..

Due to the critical role of the server (it contains the testbed database, provides persistent storage for debug and application data from the SUT , runs the daemons that support

Specifically, a set of relevant performance metrics in WSNs are used to measure the de- gree of satisfaction of the QoS, namely, the end-to-end Packet Delivery Ratio (PDR)

With our current implementation of the proposed adaptive acknowledgement on-demand protocol for WSNs, the maximum number of sensor nodes that can operate in mixed ACK mode is limited

In order to improve the network coverage while maintaining the network lifetime and the convergence speed of data aggregation, the networking of sensors can be done in an ad-hoc

4.9 Effect of the variation among the tasks on the (a) network lifetime increase and (b) algorithm runtime for CSTA , CDTA and DOOTA task allocation algorithms in symmetric

Although there are many available energy harvesting products on the market, wireless energy transfer by using visible light communication that powers solar cell as well

Based on the requirements and constraints identified for the proposed short- ECC cryptosystem, it was stated that it is necessary to modify the standard ECC security algorithms