Lecture on Sensor Networks

Similar documents
ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III

Local Area Networks NETW 901

DOPPLER SHIFT. Thus, the frequency of the received signal is

Medium Access Methods. Lecture 9

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

Exercise Data Networks

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling

Preamble MAC Protocols with Non-persistent Receivers in Wireless Sensor Networks

6.1 Multiple Access Communications

WUR-MAC: Energy efficient Wakeup Receiver based MAC Protocol

Chapter 2 Overview. Duplexing, Multiple Access - 1 -

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks

Mobile Communications

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage

Lecture 8: Media Access Control

Mobile Computing. Chapter 3: Medium Access Control

Active RFID System with Wireless Sensor Network for Power

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

ICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Jinbao Li, Desheng Zhang, Longjiang Guo, Shouling Ji, Yingshu Li. Heilongjiang University Georgia State University

Medium Access Control

Aloha with Preamble Sampling for Sporadic Traffic in Ad Hoc Wireless Sensor Networks

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009.

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling

Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

Wireless Intro : Computer Networking. Wireless Challenges. Overview

IEEE Wireless Access Method and Physical Specification

Chapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA

Medium Access Control Protocol for WBANS

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers

Energy Efficient MAC Protocol with Localization scheme for Wireless Sensor Networks using Directional Antennas

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Deployment Design of Wireless Sensor Network for Simple Multi-Point Surveillance of a Moving Target

TSIN01 Information Networks Lecture 9

CS434/534: Topics in Networked (Networking) Systems

Figure 1. LDC Mode Operation Example

FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL

FTSP Power Characterization

Wireless Networked Systems

Multiple Access Methods

A Wireless Communication System using Multicasting with an Acknowledgement Mark

Fiber Distributed Data Interface

Lower Layers PART1: IEEE and the ZOLERTIA Z1 Radio

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Battery Efficient Operation of Radio MAC Protocol

1. Introduction 1.2 Medium Access Control. Prof. JP Hubaux

PMAC: An adaptive energy-efficient MAC protocol for Wireless Sensor Networks

CANRF UHF Wireless CAN module

MACHINE TO MACHINE (M2M) COMMUNICATIONS-PART II

Comparison between Preamble Sampling and Wake-Up Receivers in Wireless Sensor Networks

Wireless hands-free using nrf24e1

% 4 (1 $ $ ! " ( # $ 5 # $ % - % +' ( % +' (( % -.

Multiple Access CHAPTER 12. Solutions to Review Questions and Exercises. Review Questions

Design of an energy efficient Medium Access Control protocol for wireless sensor networks. Thesis Committee

Wi-Fi. Wireless Fidelity. Spread Spectrum CSMA. Ad-hoc Networks. Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering

The Long Range Wide Area Network - LoraWAN

Bit Reversal Broadcast Scheduling for Ad Hoc Systems

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks

Lecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren

SourceSync. Exploiting Sender Diversity

ANT Channel Search ABSTRACT

RFID Multi-hop Relay Algorithms with Active Relay Tags in Tag-Talks-First Mode

An Empirical Study of Harvesting-Aware Duty Cycling in Sustainable Wireless Sensor Networks

COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section B

Coordination-free Repeater Groups in Wireless Sensor Networks Andreas Willig

Average Delay in Asynchronous Visual Light ALOHA Network

MAC Theory Chapter 7. Standby Energy [digitalstrom.org] Rating. Overview. No apps Mission critical

MAC Theory. Chapter 7

M2M massive wireless access: challenges, research issues, and ways forward

Feasibility and Benefits of Passive RFID Wake-up Radios for Wireless Sensor Networks

Seminar on Low Power Wide Area Networks

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks

Wireless Transmission & Media Access

06/02/2006. Sharing the Medium. Peter Rounce Room Notes Courtesy of Graham Knight P.A.

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

Design and development of embedded systems for the Internet of Things (IoT) Fabio Angeletti Fabrizio Gattuso

Continuous Monitoring Techniques for a Cognitive Radio Based GSM BTS

WirelessHART Modeling and Performance Evaluation

Internet of Things Prof. M. Cesana. Exam June 26, Family Name Given Name Student ID 3030 Course of studies 3030 Total Available time: 2 hours

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks

StarPlus Hybrid Approach to Avoid and Reduce the Impact of Interference in Congested Unlicensed Radio Bands

An Improved MAC Model for Critical Applications in Wireless Sensor Networks

Wireless Communications Lecture 4: Multiple Access Technologies

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS

Wireless Communication

An Opportunistic Frequency Channels Selection Scheme for Interference Minimization

Achieving Network Consistency. Octav Chipara

PW-MMAC: Predictive-Wakeup Multi-Channel MAC Protocol for Wireless Sensor Networks

An LED-to-LED Visible Light Communication System with Software-Based Synchronization

Cooperation in Random Access Wireless Networks

ABSTRACT. XIA, HENG. Energy Consumption in UWB-based Wireless Sensor Networks: A Cross Layer Analysis. (Under the direction of Dr. Arne A. Nilsson.

Using the Wake Up Receiver for Low Frequency Data Acquisition in Wireless Health Applications

Performance Analysis of Sensor Nodes in a WSN With Sleep/Wakeup Protocol

A Practical TDMA Protocol for Underwater Acoustic Networks Based on Relative Clock

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks

Cellular systems 02/10/06

Transcription:

Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. Genie Historical Aided Development time

with Preamble for Sporadic Traffic in Ad Hoc Wireless Sensor Networks by A. El-Hoiydi In contrast to regular the so-called idle-listening should be avoided by making the node oversleep periods of silence. What follows is a best-case estimation of 's potential for sensor networks. The so-called genie (a central node) wakes up nodes in time, just before the channel is no more idle (or prior to the arrival of a message). With this in mind the lower limit for the energy consumption can be estimated. The task of how to replace the central node by a good algorithm is still open. All nodes create no message b=1 1e gn The complementary event, an incoming message The node itself creates a message P GA =b 1 P TX b b 1 P RX

Energy efficiency of Example P base consumption = 8mA P TX P RX = 20mA = 6mA A frame length is 10ms, i. e. 100 frames/second with 10 nodes wanting to send once per second. g = 0.01 => b 1 = ~(1-0.99) = 0.01 g x 10 = 0.1 => b = ~(1-0.90) = 0.095 P RA = 0.01x(20+8) + (0.095-0.01) x (6+8) = 1.47mA b 1 =1 e 1g b=1 1e gn Battery with 2,000mAh will last for 2,000 x 60 x 60/1.47 = ~1,361 hours The theoretical upper limit for the lifetime is about 57 days. P GA =b 1 P TX b b 1 P RX

Energy efficient MAC protocols: with Preamble Idea: Here, nodes sleep in general. Controlled by their internal clock they wake up after every sleeping period (frame time) and monitor the channel for a certain amount of time. When there is no activity, they switch back to sleeping mode immediately. A node wants to send All participants have to be awake before a node can send its message to them. The sender creates an uninterrupted signal, the Preamble, which must at least last one sleeping period. The nodes wake up one by one, notice the activity on the channel and hence do not return to sleeping mode. After a full frame length the sender picked up all nodes and can now send the message. The sender expects an acknowledgment from the receiver. In case of an error the waste of another full sleeping cycle is avoided.

Energy efficient MAC protocols: with Preamble Destination PREAMBLE DATA ACK Source T P : Length of Preamble T D : Length of Message T S : Switching time T A : Time for ACK T P T D T S T A Switching time between sending and receiving

Energy efficient MAC protocols: with Preamble Energy efficiency of with Preamble A sending cycle lasts for T P, T D, T S and T A. On a first glance one could think, that a node needs two of these cycles to transmit a message without any collisions (-typcial 2-slot problem). But the given time T P +2T D +T S +T A is sufficient. Notice that a collision during the Preamble causes no problems (for the second sender). The depicted collision is still allowed. The later sender can transmit its message, because a collision during the preamble causes no problem. Notice the missing ACK from the receiver of the first message. earlier sender later sender T P T D T S T P 2T D T S T A T A

Energy efficient MAC protocols: with Preamble Energy efficiency of with Preamble The given values for T P,T D,T S and T A are fractions of a frame length, hence e.g. T P =1 makes sense to wake up all nodes. P S PAS =e gn T P 2T D T S T A b PAS =1 e gn T P T D T S T A b 1 PAS =1 e g T P T D T S T A P PAS =b 1 PAS P TX b PAS b 1 PAS P RX P' for a free critical phase P' for incoming message P' for message created by a sender Remark: The energy consumption for the short wake-up is not contained here. Average energy consumption

Slotted ALOHA: frame time critical timespan Time is divided into fixed intervals. Each interval lasts for exactly one frame time. It is only allowed to send at the beginning of a frame. Still, little mutual considerateness is implemented here. But the participants have to be synchronized. Advantage: The critical phase becomes shorter. frame time An intention to send that emerges here has to wait in any case until the next frame begins. Disadvantage: If two intentions to send emerge, the collision in the next frame is certain. Notice the still weak packet throughput. Furthermore, the next frame will even be waited for when nobody is sending, i.e. There is almost always a delay. How does the packet throughput for slotted improve? Remark: The critical phase is not the sent frame itself, but the preceding frame length. It is decided at that point, whether one or more senders want to occupy the upcoming frame. If a sender wins the frame no other sender will be added.

with carrier detection: 1-Persistent CSMA (Carrier Sense Multiple Access) The biggest problem of the -variants is that there is no consideration of other participants. The so-called carrier detection tackles this problem. A station waits until the channel is idle before it starts to send. Only then the packet will be issued. If a collision occurs the random timer based error correction applies and the station finally sends the packet once again again only if the channel is idle. If two stations intended to send at the same time, the one with the shorter waiting period after the collision will send its packet first. This procedure is called 1-Persistent CSMA, because the probability of sending when the channel is idle is 1.0. Advantage: Disadvantage: More flexible than slotted. A station does not necessarily have to wait until the end of the frame. Instead, a node (given good conditions) can start to send at any time. If two stations intend to send during a transmission, it is certain that there will be a collision at the beginning of the next frame. In this case there is no advantage compared to slotted ALOHA.

with carrier detection: Non-Persistent CSMA Different from 1-Persistent CSMA, the channel is not continuously monitored for the end of the current transmission. If the channel is not idle the station waits for a random amount of time. After this time, the station checks again whether the channel is idle. Advantage: The probability of two stations starting to send at the same time drops drastically (practically to zero), a collision is therefore highly unlikely. Hence the case of a repeated transmission on grounds of a collision (like with 1-Persistent CSMA) is in a way always anticipated. Disadvantage: Although e.g. two stations intend to send, no transmission begins after the end of the current one, because both of them wait for a random amount of time. The end of one period falling exactly together with the beginning of the next available frame is highly unlikely, but would be desirable. In any case, the average delay increases.

with carrier detection: Non-Persistent CSMA Nodes with intention to send Medium occupied Medium idle Random waiting-period Lazy phase on grounds of the waiting period

with carrier detection: CSMA/CD (CD=collision detection) A disturbed transmission can be detected early by the sender (= collision detection), especially in the case of cable based communication. Then it makes sense for both of the stations to interrupt the transmission to save valuable bandwidth that would otherwise be used for a packet that cannot be saved anyways.

Collision-free protocols: Bit Pattern Protocol Stations agree upon a short frame in front of the transmission. Every station has a narrow time window in which (on intention to send) a 1 (a signal) can be set. Afterwards, transmissions start in the so-arranged order. Advantage: Disadvantage: 1 2 3 4 5 1 0 0 1 0 Node 1 Node 4 N contention slots Collisions are completely avoided The N contention slots must always be waited for, even if only one station exists / intends to send. If N is very large, a part of the bandwidth is lost. A good synchronization is necessary..

Collision-free protocols: Procedure: Each station gets a (continuous) number which is e.g. (here) represented by 4 bits. Hence the number of time slots is reduced to 4. The following stations be awake: Station ID 2 0010 5 0101 9 1001 In the time slot of the first bit (2 0 ) stations 5 and 9 send a signal because their 2 0 bit is set. Station 2 is quiet on grounds of the unset bit, but knows at the same time that it is out of the race because its bit pattern does not match the already sent pattern any more. In the time slot of bit 2 1 nobody sends, so both stations 5 and 9 have another chance. But in the slot of bit 2 2 station 5 wins with a set bit. Time slot 2 3 is no more necessary since station and 2 are out of the race already. However, since no one can tell that for sure, this slot has to pase also. Advantage: Disadvantage: Short bit pattern Now as before, one bit pattern per frame length, uneven distribution of the right to send.