mac venkatesh

Upload: amjadiitkust

Post on 06-Apr-2018

230 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 Mac Venkatesh

    1/42

    UNIVERSITY OF CALIFORNIASANTA CRUZ

    Energy-Efficient ChannelAccess Protocols

    Venkatesh Rajendran

    [email protected]

  • 8/3/2019 Mac Venkatesh

    2/42

    UC Santa Cruz

    2

    Introduction

    Sensor networks are a special class ofmultihop wireless networks.

    Ad-hoc deployment.

    Self-configuring.

    Unattended.

    Battery powered.

  • 8/3/2019 Mac Venkatesh

    3/42

    UC Santa Cruz

    3

    Network Architecture

    Sink Sink

    Thousands of nodes.

    Short radio range (~10m).

    Event-driven.

    Hierarchical deployment.

    Fault tolerance.

    Information Processing

  • 8/3/2019 Mac Venkatesh

    4/42

    UC Santa Cruz

    4

    MAC Protocols

    Regulate channel access in a sharedmedium.

    A

    C

    B Collision at B

    X

    No coordination(ALOHA)

  • 8/3/2019 Mac Venkatesh

    5/42

    UC Santa Cruz

    5

    CSM

    A

    Listen before transmittingStations sense the channel before transmittingdata packets.

    S R H

    X

    Collision at R

    Hidden Terminal Problem

  • 8/3/2019 Mac Venkatesh

    6/42

    UC Santa Cruz

    6

    CSM

    A with Collision Avoidance Stations carry out a handshake to

    determine which one can send a data

    packet (e.g.,M

    ACA, FAM

    A,IEEE802.11, RIMA).

    S R H

    RTSCTS

    Data

    ACK Backoff due to CTS

  • 8/3/2019 Mac Venkatesh

    7/42

    UC Santa Cruz

    7

    Idle Listening

    Tx

    Rx

    Idle Listen

    Idle Listen

    Tx

    Rx

    Sleep

    Sleep

    Sleep Scheduling

    Medium Access Energy-efficient channel access is important to prolong the

    life-time of sensor nodes.

    Conventional media-access control protocols waste energyby collisions, and idle listening.

    Radios have special sleep mode for energy conservation.

  • 8/3/2019 Mac Venkatesh

    8/42

    UC Santa Cruz8

    Achieving energy efficiency

    When a node is neither transmitting orreceiving, switch to low-power sleep

    mode. Prevent collisions and retransmissions.

    Need to know Tx, Rx and whentransmission event occurs.

    Scheduled-based(time-slotted) MAC Protocols

  • 8/3/2019 Mac Venkatesh

    9/42

    UC Santa Cruz

    9

    Contention-based Channel AccessProtocols: S-MAC & T-MAC

  • 8/3/2019 Mac Venkatesh

    10/42

    UC Santa Cruz10

    S-M

    AC [Ye etal] Features Collision Avoidance

    Similar to 802.11 (RTS/CTS handshake).

    Overhearing Avoidance

    All the immediate neighbors of the sender andreceiver goes to sleep.

    Message Passing Long messages are broken down in to smaller

    packets and sent continuously once the channelis acquired by RTS/CTS handshake.

    Increases the sleep time, but leads to fairnessproblems.

  • 8/3/2019 Mac Venkatesh

    11/42

    UC Santa Cruz

    11

    S-M

    AC Overview Time is divided in to cycles of listen

    and sleep intervals.

    Schedules are established such thatneighboring nodes have synchronoussleep and listen periods.

    SYNC packets are exchanged

    periodically to maintain schedulesynchronization.

  • 8/3/2019 Mac Venkatesh

    12/42

    UC Santa Cruz

    12

    S-M

    AC Operation

  • 8/3/2019 Mac Venkatesh

    13/42

    UC Santa Cruz

    13

    Schedule Establishment Node listens for certain amount of time. If it does not hear a schedule, it chooses a

    time to sleep and broadcast this

    information immediately. This node is called the Synchornizer. If a node receives a schedule before

    establishing its schedule, it just follows thereceived schedule.

    If a node receives a different schedule,after it has established its schedule, itlistens for both the schedules.

  • 8/3/2019 Mac Venkatesh

    14/42

    UC Santa Cruz

    14

    S-M

    ACIllustration

  • 8/3/2019 Mac Venkatesh

    15/42

    UC Santa Cruz

    15

    T-M

    AC[Dam etal]: S-M

    AC Adaptive Listen

  • 8/3/2019 Mac Venkatesh

    16/42

    UC Santa Cruz

    16

    T-M

    AC: Early Sleeping Problem

  • 8/3/2019 Mac Venkatesh

    17/42

    UC Santa Cruz

    17

    T-M

    AC/S-M

    AC Summary Simple contention-based channel

    access with duty cycle-based

    sleeping. Restricting channel contention to a

    smaller window negative effect onenergy savings due to collisions.

    Requires schedule co-ordination withone hop neighbors.

  • 8/3/2019 Mac Venkatesh

    18/42

    UC Santa Cruz

    18

    Scheduling-based Channel AccessProtocols: TRAMA and FLAMA

  • 8/3/2019 Mac Venkatesh

    19/42

    UC Santa Cruz

    19

    TRAMA: TRaffic-Adaptive Medium Access

    Establish transmission schedules in away that:

    is self adaptive to changes in traffic, nodestate, or connectivity.

    prolongs the battery life of each node.

    is robust to wireless losses.

  • 8/3/2019 Mac Venkatesh

    20/42

    UC Santa Cruz

    20

    TRAMA - Overview

    Single, time-slotted channel access. Transmission scheduling based on two-hop

    neighborhood information and one-hoptraffic information.

    Random access period Used for signaling: synchronization and updating

    two-hop neighbor information.

    Scheduled access period:

    Used for contention free data exchange betweennodes. Supports unicast, multicast and broadcast

    communication.

  • 8/3/2019 Mac Venkatesh

    21/42

    UC Santa Cruz

    21

    TRAM

    A Features Distributed TDMA-based channel

    access.

    Collision freedom by distributedelection based on Neighborhood-Aware Contention Resolution (NCR).

    Traffic-adaptive scheduling to

    increase the channel utilization. Radio-mode control for energy

    efficiency.

  • 8/3/2019 Mac Venkatesh

    22/42

    UC Santa Cruz

    22

    Time slot organization

  • 8/3/2019 Mac Venkatesh

    23/42

    UC Santa Cruz

    23

    Each node maintains two-hop neighborinformation.

    Based on the time slot ID and node ID, node

    priorities are calculated using a random hashfunction.

    A node with the highest two-hop priority isselected as the transmitter for the particular

    time slot.

    Neighborhood-aware contentionresolution (NCR)[Bao et al., Mobicom00]

  • 8/3/2019 Mac Venkatesh

    24/42

    UC Santa Cruz

    24

    A

    C

    D

    B E

    F

    3

    2

    15

    8

    9

    11C Winner

    G

    H

    I

    13

    3

    14NCR does not elect receivers and hence, nosupport for radio-mode control.

    NCR - Example

  • 8/3/2019 Mac Venkatesh

    25/42

    UC Santa Cruz

    25

    TRAMA Components

    Neighbor Protocol (NP). Gather 2-hop neighborhood information.

    Schedule Exchange Protocol (SEP). Gather 1-hop traffic information.

    Adaptive Election Algorithm (AEA). Elect transmitter, receiver and stand-by

    nodes for each transmission slot. Remove nodes without traffic from

    election.

  • 8/3/2019 Mac Venkatesh

    26/42

    UC Santa Cruz

    26

    Neighbor Protocol Main Function: Gather two-hop

    neighborhood information by using

    signaling packets. Incremental neighbor updates to

    keep the size of the signaling packetsmall.

    Periodically operates during randomaccess period.

  • 8/3/2019 Mac Venkatesh

    27/42

    UC Santa Cruz

    27

    Packet Formats

  • 8/3/2019 Mac Venkatesh

    28/42

    UC Santa Cruz

    28

    Schedule Exchange Protocol

    (SEP) Schedule consists of list of intended

    receivers for future transmission slots.

    Schedules are established based on thecurrent traffic information at the node.

    Propagated to the neighborsperiodically.

    SEP maintains consistent schedules forthe one-hop neighbors.

  • 8/3/2019 Mac Venkatesh

    29/42

    UC Santa Cruz

    29

    Schedule Packet Format

  • 8/3/2019 Mac Venkatesh

    30/42

    UC Santa Cruz

    30

    Adaptive Election Algorithm

    (AEA) Decides the node state as either

    Transmit, Receive or Sleep.

    Uses the schedule informationobtained by SEP and a modified NCRto do the election.

    Nodes without any data to send are

    removed from the election process,thereby improving the channelutilization.

  • 8/3/2019 Mac Venkatesh

    31/42

    UC Santa Cruz

    31

    Simulation Results

    Delivery Ratio

    Synthetic broadcasttraffic using Poissonarrivals.

    50 nodes, 500x500 area.

    512 byte data.

    Average node density: 6

  • 8/3/2019 Mac Venkatesh

    32/42

    UC Santa Cruz

    32

    Energy Savings

    Percentage Sleep Time Average Length of sleep interval

  • 8/3/2019 Mac Venkatesh

    33/42

    UC Santa Cruz

    33

    TRAMA Limitations

    Complex election algorithm and datastructure.

    Overhead due to explicit schedulepropagation.

    Higher queueing delay.

    Flow-aware, energy-efficient framework.

  • 8/3/2019 Mac Venkatesh

    34/42

    UC Santa Cruz

    34

    TRAMA Summary

    Significant improvement in delivery ratio inall scenarios when compared to contention-based protocols.

    Significant energy savings compared to S-MAC (which incurs more switching).

    Acceptable latency and traffic adaptive.

  • 8/3/2019 Mac Venkatesh

    35/42

    UC Santa Cruz

    35

    Flow-aware Medium Access

    Framework Avoid explicit schedule propagation.

    Take advantage of application.

    Simple election algorithm to suit systemswith low memory and processing power(e.g., 4KB ROM in Motes).

    Incorporate time-synchronization, flow

    discovery and neighbor discovery duringrandom-access period.

  • 8/3/2019 Mac Venkatesh

    36/42

    UC Santa Cruz

    36

    Flow Information

    Flow information characterizesapplication-specific traffic patterns.

    Flows can be unicast, multicast orbroadcast.

    Characterized by source, destination,duration and rate.

  • 8/3/2019 Mac Venkatesh

    37/42

    UC Santa Cruz

    37

    Example: Data Gathering

    Application

    A

    C

    E

    BD

    Sink

    Fb

    Fc

    Fd

    Fe

  • 8/3/2019 Mac Venkatesh

    38/42

    UC Santa Cruz

    38

    Flow Discovery Mechanism

    Combined with neighbor discoveryduring random-access period.

    Adapted based on the application. for data gathering application, flow

    discovery is essentially establishing thedata forwarding tree.

  • 8/3/2019 Mac Venkatesh

    39/42

    UC Santa Cruz

    39

    Example

    S

    Sink initiates neighbor discovery,flow discovery and timesynchronization.

    Broadcasts periodic SYNC packets.

    Potential children reply with

    SYNC_REQ.

    Source reinforces with another

    SYNC packet.

    Once associated with a parent,nodes start sending periodic SYNC

    broadcasts.

    A

    B

    C

    Sink

    SYNC

    SYNC_REQ

  • 8/3/2019 Mac Venkatesh

    40/42

    UC Santa Cruz

    40

    Election Process

    Weighted election toincorporate traffic adaptivity.

    Nodes are assigned weightsbased on their incoming and

    outgoing flows. Highest priority 2-hop node is

    elected as the transmitter.

    A node listens if any of itschildren has the highest 1-hop priority.

    Can switch to sleep modeif no transmission isstarted.

    S

    A

    B

    C

    Sinkws=0

    wc=1

    wc=1

    wa=3

  • 8/3/2019 Mac Venkatesh

    41/42

    UC Santa Cruz

    41

    Simulation Results (16 nodes, 500x500 area,CC1000 radio, grid topology, edge sink)

    Delivery Ratio Queueing Delay

  • 8/3/2019 Mac Venkatesh

    42/42

    UC Santa Cruz

    42

    FLAMA Summary

    Simple algorithm that can beimplemented on a sensor platform.

    Significant performance improvementby application awareness.