PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks



Similar documents
A wireless sensor network for traffic surveillance

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

How To Make A Multi-User Communication Efficient

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

WiseMAC: An Ultra Low Power MAC Protocol for Multi-hop Wireless Sensor Networks

Mac Protocols for Wireless Sensor Networks

Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs).

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

Enhanced Power Saving for IEEE WLAN with Dynamic Slot Allocation

Security in Ad Hoc Network

EPL 657 Wireless Networks

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

TDMA Scheduling Algorithms for Sensor Networks

Adaptive DCF of MAC for VoIP services using IEEE networks

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

Protocolo IEEE Sergio Scaglia SASE Agosto 2012

Chapter 6: Medium Access Control Layer

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems

MAC Scheduling for High Throughput Underwater Acoustic Networks

FAMA/TDMA Hybrid MAC for Wireless Sensor Networks

Lecture 17: Wireless Networking"

Duty-Cycle MAC Protocols and Networking Overhaul

Implementation and Performance Evaluation of nanomac: A Low-Power MAC Solution for High Density Wireless Sensor Networks

CS263: Wireless Communications and Sensor Networks

A New MAC Protocol for Moving Target in Distributed Wireless Sensor Networks

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

THE development of media access control (MAC) protocols

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Figure 1. The Example of ZigBee AODV Algorithm

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

2.0 System Description

Performance Evaluation of The Split Transmission in Multihop Wireless Networks

Dynamic Load Balance Algorithm (DLBA) for IEEE Wireless LAN

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

DAG based In-Network Aggregation for Sensor Network Monitoring

Controlled Random Access Methods

MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card

SPI I2C LIN Ethernet. u Today: Wired embedded networks. u Next lecture: CAN bus u Then: wireless embedded network

Real-Time (Paradigms) (51)

VoIP in Mika Nupponen. S Postgraduate Course in Radio Communications 06/04/2004 1

Prediction of DDoS Attack Scheme

Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Drahtlose Kommunikation. Sensornetze

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

BodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks

An Overview of ZigBee Networks

Performance Evaluation of Wired and Wireless Local Area Networks

Energy Optimal Routing Protocol for a Wireless Data Network

Zigbee Network Performance

Lecture 7 Multiple Access Protocols and Wireless

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks

WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks

Internet of Things. Exam June 24

Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

VHICLE-TO-VEHICLE (V2V) communication can promote

Performance Evaluation of Priority based Contention- MAC in Mobile Ad-Hoc Networks

Easy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols.

PERFORMANCE ANALYSIS OF THE IEEE BASED ECG MONITORING NETWORK

Maximizing Range and Battery Life in Low-Cost Wireless Networks

Master s Thesis. Load Balancing Techniques for Lifetime Prolonging in Smart Metering System

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Random Access Protocols

Performance Evaluation of Proposed SEHEE- MAC for wireless Sensor Network in Habitat Monitoring

MAC Algorithms in Wireless Networks

Metrics for Detection of DDoS Attacks

Energy-Efficient, Collision-Free Medium Access Control for Wireless Sensor Networks

PROTOCOLS FOR INCREASING THE LIFETIME OF NODES OF AD HOC WIRELESS NETWORKS

A Non-beaconing ZigBee Network Implementation and Performance Study

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

Performance of Symmetric Neighbor Discovery in Bluetooth Ad Hoc Networks

Transcription:

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California, Berkeley 1

Outline Introduction Special class of sensor networks for traffic applications Pedamacs networks vs random access networks Pedamacs protocol Comparison with random access networks Suitability for traffic applications 2

Introduction Sensor networks are designed for particular applications unlike general purpose wireless networks Attraction is wireless, low-cost easy to deploy Limiting factor is power consumption; biggest power consumer is radio importance of MAC protocol Biggest cost will be deployment and maintenance lifetime will determine economic feasibility Work needed in signal processing, reliability, failures 3

Sensor networks for traffic < 100 m Intersection Parking lot Freeway Access point Sensor node Nodes generate data periodically (eg. 30 s) for transmission to access point (AP) that is connected to outside world Nodes are power- and energy-limited; access points are not 4

Current traffic sensing technology Loop detectors is the standard; loops last 10 years Closing lane to cut loops in freeway pavement is very disruptive Alternatives include: microwave side fired radar, video cameras Cost of these systems is $600-$1000 per detector (lane) per year Can sensor networks compete? 5

Sensor networks with two special characteristics 1. One distinguished node, Access Point or AP; sensor nodes or SN periodically (eg. 30 s) generate data for transmission to access point 2. SNs are power- and energy-limited but AP is not: Consequently Transmission AP SN is one-hop Transmission SN AP is multi-hop Two conditions satisfied in traffic applications < 100 m Intersection Parking lot Freeway Sensor node Access point 6

Performance criteria Power efficiency: radio is the biggest consumer; power wasted in collisions, idle listening (when no packets are received), overhearing unintended packets, transmission of control packets Real-time guarantee: needed for process control applications as in case of traffic control; network may not be used without such guarantee Congestion control: nodes near AP must transmit more data (from upstream nodes) Fairness: each node must transmit its data every period 7

Prototype Berkeley sensor node Assembled from off-the-shelf components (retail cost $100) 4Mhz, 8bit MCU (ATMEL) 512 bytes RAM, 8K ROM 900Mhz Radio (RF Monolithics) 10-100 ft. range Magnetic Sensor & Acoustic Sensor LED outputs Serial Port 1.5 x 1.5 8

Power consumption of Berkeley node Operation Transmitting one 37B packet Receiving one packet Listening to channel Radio in sleep mode Clocking energy Sampling sensor Power consumption 0.92 mj 0.60 mj 20.71 mj/sec 15 µj/sec 294 µj/sec 1.5 µj/sec 2 AA batteries provide 2200 mah or 0.25 mayear @ 3V 9

Radio waste Collision Overhearing Idle listening Transmission of control packets Congestion control 10

Reducing radio waste PHY and MAC Random back-off to reduce collision, intuitive congestion control 1 2 radios, one for wakeup signals, other for data avoids overhearing 2 RTS-CTS avoids collision 3, approximate TDMA 3,4, requires synchronization Use different channels or codes to reduce collision 4 Use short control packets Save between 10-70 percent power over random access 1 A. Woo, and D. Culler, A Transmission Control Scheme for Media Access in Sensor Networks, Proc. ACM Mobicom 2001, Rome, Italy, July 2001 2 C. Guo, L. C. Zhong, and J. M. Rabaey, Low-Power Distributed MAC for Ad Hoc Sensor Radio Networks, Proc. Internet Performance Symp. (Globecom 2001), November 2001 C. S. Raghavendra and S. Singh, PAMAS - Power Aware Multi-Access Protocol with Signalling for Ad Hoc Networks, Computer Communications Review, July 1998 3 W. Ye, J. Heidemann, and D. Estrin, An Energy-Ef cient MAC Protocol for Wireless Sensor Networks,IEEEINFOCOM 2002, June 2002 4 K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie, Protocols for Self-Organization of a Wireless Sensor Net-work, IEEE Personal Communications, October 2000, pp. 16-27 11

Pedamacs vs random access networks Pedamacs networks: Access point discovers network topology; nodes discover next hop Access point computes and broadcasts transmission schedule to all nodes (TDMA data) During data phase, node sleeps if it is not scheduled to listen or to transmit Random access networks: Access point and nodes discover next hop Nodes randomly transmit and constantly listen for incoming packets Refinements proposed to reduce node listening time 12

Power consumption in PEDAMACS vs random access 50 kbps; one packet every 30 sec; vertical scale is log 10 Listening in random access uses 1000X more power, and receiving uses 10X power than in Pedamacs 13

Lifetime of PEDAMACS vs random access network Two AA batteries: 2200 ma at 3 V Pedamacs network lasts 600 days, need 5X improvement Random access network lasts 10 days unsuited for traffic control 14

Pedamacs protocol Assumes 3 transmission ranges: Longest range reaches all nodes from AP AP and nodes have medium range to identify neighbors, interferers Nodes have minimum range (that guarantees connectivity) for data transmission Protocol phases Topology learning: Each node identifies neighbor, interferers, and parent in AP-rooted tree Topology collection: Each node sends this local topology information to AP Scheduling and transmission: AP calculates and broadcasts schedule. Each node transmits and listens at predetermined slots; sleeps in other slots 15

Protocol packet structure 16

Protocol phases AP Broadcasts topology learning pkt, w. current time, next time Starts flooding w. tree construction pkt Broadcasts topology collection pkt at next time Learns topolgy. Computes schedule; broadcasts scheduling pkt at next time Broadcasts topology learning pkt (if topology is outdated) or broadcast scheduling pkt Nodes Synchronize w. current time, record next time Increment hop count, identify parent, neighbors, interferers (signal > or < threshold) Synchronize w. current time, record next time, transmit local topology pkt Synchronize w. current time, record next time. Transmit/receive scheduled data pkt 17

Protocol phases AP Nodes Broadcast topology learning pkt Synchronize w. current time, record next time If topology errors Floods w. tree construction pkt Increment hop count, identify parent, nbrs, interferers CSMA Broadcast topology collection pkt at next time Synchronize, next time, transmit local topo. pkt CSMA + ACK Compute, broadcast scheduling pkt Transmit/receive data pkt on schedule If no topo errors 18

Topology learning current time next time AP broadcasts topology learning coordination packet to synchronize nodes and declare next time Tree construction packet flooded by sensor nodes using CSMA scheme AP sends the tree construction packet using medium range transmission Sensor nodes determine neighbors and interferers from received tree construction packets 19

Topology collection current time next time Each node transmit its local topology packet, listing its neighbors and interferers using CSMA scheme with implicit acknowledgement AP broadcasts topology collection coordination packet to synchronize nodes and declare next time AP has complete topology information 20

Scheduling phase Divided into time slots. Each node when to listen and when to transmit. Time slot carries one data packet. AP Slot number Nodes 1 packet s1 s2 1 packet 1 s2,s3 2 s1 1 packet s3 3 s1 21

Pedamacs scheduling problem (AP) At end of topology collection phase, tree, rooted at AP interference graph Construct conflict graph Neighbors in conflict graph should not transmit at same time is collection of links to be scheduled 22

Example of conflict graph 23

Scheduling problem Scheduling problem: Given interference graph, find minimum length frame during which each node can transmit one data packet Theorem: scheduling problem is NP complete Proof: reduce chromatic number problem to scheduling problem Note: chromatic number problem is to find smallest such that graph is colorable Theorem: min schedule is at least and at most Proof. One packet received per step. Worst case is complete, linear graph 24

Pedamacs schedule: obtain linear network 1. Obtain linear network from tree corresponds to all nodes at level 25

Pedamacs schedule: color linear network 1.Color linear network. Assign colors to each node. 2.Add colors so that nodes with same color form maximal nonconflicting set Theorem: Linear network coloring takes steps. If max level interference in is 26

Example 27

Pedamacs schedule: color original network 3. If nodes in linear network have same color, one node in original network at each corresponding level can transmit at the same time Create superslot of consecutive slots. In each superslot, there is transmission of one packet from each level. Size of superslot = number of colors Number of superslots is at most number of nodes 28

Example s1 AP s2 AP l1 Slot number Nodes 1(yellow) s1 2(blue) s3 s3 l2 colored linear network 3(yellow) s1 4(yellow) s2 Note: s2, s3 could have transmitted in same slot! 29

Special cases Max frame length Max frame length is superslot 30

Comparison of random access and Pedamacs networks Comparison via TOSSIM, a TinyOS simulator Need to select critical parameters for comparison Backoff-listening random access scheme Back-off window, listening window Transmission range Nodes randomly distributed inside unit circle 31

Simulation Pedamacs channel access mechanisms without backoff-listening (AP) with back-off listening (topology learning) with back-off listening + implicit ACK (topology collection) TDMA (nodes in scheduling phase) Random access channel mechanisms data packets from nodes to AP use back-off listening + implicit ACK flooding for topology discovery using back-off listening 32

Transmission range selection Minimum range that leaves network connected 33

Backoff & listening window selection for learning Percent of nodes reached by flooding from AP (topology learning): all nodes reached with large backoff window 34

Backoff & listening window selection for learning Max delay (bit times) experienced by tree construction packet during flooding depends on backoff window 35

Backoff & listening window selection for collection Percent nodes whose packets reach AP with ACK, w/o Ack 36

Pedamacs parameters Percent successfully scheduled nodes 37

Selecting ack window sizes for 30 nodes Back-off window size 32768, listening window size 1024 bit times 38

Pedamacs vs random access delay Random access delay excessive for traffic application 39

Lifetime of Pedamacs network vs packet period 40

Improvements in lifetime Pedamacs networks can be made redundant by placing multiple nodes in cluster-only one node is activated Additional hardware and more complex protocols can reduce idle and unintended listening in random access networks 41