A Survey on MAC Protocols in WSN Ritesh Kumar

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 10 Number 11 - Apr 2014
A Survey on MAC Protocols in WSN
Ritesh Kumar#1 , Mritunjay Kumar Rai*2
#
M.Tech, Electronics and Communication Engineering, LPU, Jalandhar, Punjab, India
*
Associate Professor, Department of ECE, LPU, Jalandhar, Punjab, India
Abstract- A Wireless Sensor Network (WSN) is a collection of
several small, low powered, low cost sensor nodes. These sensors
are capable of performing multiple functions when applied at the
desired location. There are some Medium Access Control (MAC)
protocols for the WSN which are used to control the medium
access in the network. In this paper various MAC protocols are
discussed. The various characteristics of the MAC protocols are
also discussed.
Keywords- WSN, MAC, MAC protocols.
I.
by using the inter-mediate nodes between the source node and
the destination node. This way of transmission of data is
known as multi-hoping [4].
Internet
INTRODUCTION
Sink node
Nowadays there are so many small and tiny devices
are available which have the capability of sensing the data
from the surrounding environment and transmitting the sensed
data over a wireless medium. The creation of such capable
devices has led to a number of future applications to be
implemented. These sensing devices are called as sensors. So
we can compose a network by using such small sensors. The
network composed of such kind of devices is known as
wireless sensor network.
A wireless sensor network is the collection of nodes
organized in cooperative manner [4]. The nodes used in the
network are the sensor nodes which are used for the
communication by using the wireless media. The wireless
media may be either radio frequency waves, infrared medium
or any other media in which there is no use of the wires is
done. The sensor nodes are arranged randomly and the nodes
may communicate with each another to establish an ad-hoc
network [4]. In wireless sensor network the sensor nodes
monitor different conditions at different locations and
different conditions may be some kind of heat or
temperatures, stress, strain, level of noise, movement of
vehicle, the objects’ presence, the atmospheric conditions like
humidity, lightning condition etc, and any current
characteristics like the speed and direction of any object and
shape of objects [1].
A sensor node basically consists of a sensor module,
a battery, a processor and a radio device. A wireless sensor
network consist a large number of sensor nodes, and These
nodes are generally low power nodes and are capable to do
multiple functions, operate in an unmanned atmosphere with
the limited capability of computation and sensing [2]. These
sensor nodes are self-powered nodes and used to detect the
special events and process their data to a base station.
In case if a sensor node is unable to establish the
communication with any of the other node, then it means that
they are not within the range with one another. In such
situations, the data can be transmitted to the destination node
ISSN: 2231-5381
User
Sensor Nodes
Fig 1: Wireless Sensor Network
Some basic functions must be performed by the wireless
sensor network which is same for all the WSN. These basic
functions are [14]:
 Sensing.
 Processing.
 Storage of data.
 Communication.
There is no previously existing network infrastructure
required to form such kind of network. In such networks we
can add or remove the nodes as per requirement. This property
is known as the flexibility of the network. Due to this property
we have to deal with several forceful changes in the topology
of the network such as the path updation, updation of the tree
of the network etc. in a wireless sensor network the sensor
node collects and then send it to the sink. The data sink may
be connected to the world via internet where the information
may be required [4]. Basically sensor nodes are small and less
costly so they are used in large number. The resources are
limited because sensor nodes are small, limited energy,
bandwidth, and computational speed. The battery is limited so
the lifetime of the sensor node is also limited therefore this is
the reason that lifetime of the sensor network is limited. Thus
energy efficiency is a major issue for sensor networks [3].
In this paper we have introduced different sections. We
have briefly described about MAC in section II. The Different
MAC protocols used in WSN are explained in detail in section
III. There are some characteristics of the MAC protocols
http://www.ijettjournal.org
Page 537
International Journal of Engineering Trends and Technology (IJETT) – Volume 10 Number 11 - Apr 2014
related to the wireless sensor networks which are introduced
in section IV.
II.
MEDIA ACCESS CONTROL
The Media Access Control (MAC) is a protocol for
data communication. MAC is basically the sub-layer of data
link layer. The data link layer is the second layer in open
systems interconnection (OSI) model. The main functions of a
MAC sub-layer include taking decision when a node can
access the shared medium, framing, addressing and flow
control etc. It also resolves the probable conflicts between
competing nodes. It makes possible for several nodes in the
network to communicate within a multipoint network,
typically a local area network (LAN) or metropolitan area
network (MAN). The mechanism of addressing is known as
the MAC address or physical address. The MAC address is
generally a unique serial number that is assigned to every
network adapter. This address makes it feasible to deliver the
data packet to its destination within the network. The MAC
sub-layer provides an interface between the physical layer and
logical link control sub-layer of data link layer [10].
III.
MAC PROTOCOLS FOR WSN
MAC protocol in a WSN coordinates when and how
the nodes in the network access the wireless channel. Idle
listening, overhearing, collisions, and the control packets
overheads are the main sources of energy wastage [7].
Collisions happen if the two or additional nodes attempt to
transmit the data at same time. When a sensor node listens the
channel to check whether there is data related to it, idle
listening occurs. Overhearing occurs when a node receives the
message which is not destined to it but to any other node in
the network. Transmissions of the control packets may also
cause the wastage of energy because these packets do not
convey any useful data or information. These issues must be
carefully taken into consideration while designing the energy
efficient MAC protocols.
MAC protocols are basically divided into two classes
- contention-based MAC protocols and scheduled or schedule
based MAC protocols. Contention-based protocols are also
called as random protocols or unscheduled protocols [9].
These protocols enable nodes accessing the medium
independently from the other. They have more wastage of
energy, so in terms of use of energy resources they are
inefficient [5]. Schedule-based MAC protocols are also called
as collision-free protocols or contention-free protocols. These
protocols are more efficient in terms of energy as compared to
contention-based protocols.
A. CONTENTION BASED MAC PROTOCOLS
In contention based MAC protocols the medium
access is distributed. No central coordination in these
protocols for the nodes to access the medium. Some protocols
are discussed here.
ISSN: 2231-5381
1) Sensor MAC (S-MAC)
S-MAC refers to the Sensor-MAC [5]. Its function is
to place a node in a medium listening state. If a node listens
nothing then it transmits a SYNC packet with a schedule
which defines the sleeping and listening periods. All the nodes
receiving this sync packet will adopt that particular schedule.
A node maintains the table with the schedules of neighbouring
nodes. When the listen period starts, a node which is ready to
transmit a packet will have to execute a procedure. The
transmitting node will transmit a request to send (RTS) frame
and then the receiver node replies with a clear to send (CTS)
frame. All the nodes that are not involved in the
communication will go into the sleep state till the
communicating nodes are transmitting the data packets and
acknowledgement packets. Due to sleeping of nodes the
energy consumption reduces but it introduces the latency
because communication with sleeping nodes will have to wait
until they wake up [5]. S-MAC protocol is less energy
consuming. The reason behind this is that in S-MAC there is
sleep period. So during this period the nodes consume less
energy. The control messages like RTS and CTS cause the
overheads and increase energy consumption.
2) Berkeley MAC (B-MAC)
B-MAC refers to Berkeley Media Access Control for
low-power sensor networks [8]. It uses an adaptive preface for
the reduction in idle listening, which is a major source of
energy consumption in several protocols. When the node has a
packet to transmit, it has to wait during a backoff period
before checking the medium or the channel. If the medium is
free then only node transmits the packet otherwise a second
(congestion) backoff begins. Every node must check the
channel regularly by using low-power listening (LPL). If the
channel is found free and the node has no data, then the node
returns to sleep state [8]. The main benefit of using B-MAC in
wireless sensor network is that in this RTS, CTS, ACK, or any
other control messages frames are not used by default, but we
can be add them. In B-MAC the adaptive preface results in
large overheads [8].
3) Predictive Wake-up MAC (PW-MAC)
PW-MAC is the abbreviated from of Predictive
Wake-Up MAC [8]. It is the improvement on S-MAC and BMAC protocols. PW-MAC uses the pseudo random schedules.
Therefore all the nodes in the network will not wakeup and
will transfer the data at the same time. This helps in avoiding
the collisions. A node that has just woke-up transmits a short
beacon message. The other nodes receiving this beacon get
inform that it is wake up. Now sender can easily transmit the
data packet and also can request information from receiver.
The receiver information may include current time and current
seed (start value) for the pseudo random schedules used by the
receiver. With the help of seed in a linear congruential
generator (LCG), the transmitter node in PW-MAC can make
http://www.ijettjournal.org
Page 538
International Journal of Engineering Trends and Technology (IJETT) – Volume 10 Number 11 - Apr 2014
the prediction that when the receiver node will wake up [11].
The major benefit of using PW-MAC is that sleeping until the
receiver is wake up results in decrement in the duty cycles in
the sender. PW-MAC includes overhead because of beacons
and idle listening.
B. SCHEDULE BASED MAC PROTOCOLS
These protocols access the medium by defining a
schedule for the transmission, reception or being idle by the
nodes in the network. It means that a node can communicates
during specific allotted time slot and remain idle rest of the
time. Scheduling-base protocols use several approaches as
discussed below.
1) LOW-ENERGY ADAPTIVE CLUSTERING
HIERARCHY PROTOCOL (LEACH)
LEACH protocols include different characteristics
for communication in WSN [13]. These characteristics may
include routing, application, MAC, and physical
characteristics. LEACH acknowledges all the nodes are
synchronized. They can control their power of transmission,
and they can also reach one base station if required. The nodes
have also enough capability of processing for the
implementation of different MAC protocols and to perform
the signal processing function such that all information can be
assembled only in single message. Nodes are organized in
clusters and the cluster heads (CHs) are elected. After that
transmission of information starts. In each cluster direct
sequence spread spectrum (DSSS) with different code is used
in order to minimize the interference [13].
LEACH protocols help in saving the energy through
sleeping mode. Cluster head rotation increases the life span of
the network by equilibrate the rate of energy usage by all the
nodes in network. Therefore any node finishes its energy
resources after long time.
2) POWER EFFICIENT AND DELAY AWARE
PROTOCOL (PEDAMACS)
In PEDAMACS there is one access point (AP),
which is also called a sink. This sink has the ability to access
all sensor nodes in single hop [12]. However, the sensor nodes
may use one or more than one hop to approach the sink node.
There are three levels of transmission power defined to reach
three distances: maximum, medium, and minimum. The
protocol has the four different phases- topology learning,
topology collection, scheduling phase and adjustment [8].
Topology learning: In this phase, the access point initially
broadcasts a packet with maximum transmission power in
order to synchronize the nodes. Then, the access point
transmits another packet with medium power which is
retransmitted through the whole network. Therefore all the
nodes in the network get the information about the topology
held by the AP presently. With the help of using the strength
of received signal and interference models, each node can
easily identify its local neighbouring nodes. Since there is no
ISSN: 2231-5381
scheduling is done till now, so during topology learning
phase, the protocol uses a protocol which is almost similar to
802.11, with RTS and CTS frames.
Topology collection: During this phase, every node transmits
the topology information to AP by using minimum
transmission power. Therefore data may possibly transmit
through many numbers of hops. In topology collection phase
the protocol also utilise the carrier sense multiple access
(CSMA).
Scheduling phase: In this phase, the AP broadcasts the
schedule information. Thus each node in the network can
adjust their clocks and get information about the time slots
assigned to it for transmission and reception. A guard interval
between each time slot is used to compensate the nodes
synchronization errors.
Adjustment: During this phase, the AP make request and the
nodes transmit adjustment topology packets which indicate
any changes in neighbours or interferers. The nodes can also
transmit this information between scheduling phase inside the
data packets [12].
3) PRIORITY BASED MAC PROTOCOL (PRIMA)
This protocol utilizes the procedure as in LEACH
protocol to form the clusters and choose cluster heads [13]. It
also follows the same procedure to control the communication
and to keep synchronize each cluster. The CH will rotate
every fifteen minutes. Four different priorities are defined by
the PRIMA for information by establishing the application
layer to add two bits at the end of each packet. MAC layer
make the use of two different protocols which are- classifier
MAC (C-MAC) and channel access MAC (CAMAC). The CMAC attaches each packet to one of four different queues,
according to their priority. The second protocol which is
CAMAC, make use of carrier sense multiple access/collision
avoidance (CSMA/CA) and time division multiple access
(TDMA) slots. Random access slots are used in order to
permit the different sensor nodes for requesting a time slot and
CH to broadcast the different schedules. Node transmits the
data according to schedule by the use of TDMA slots with no
collisions.
IV.
CHARACTERISTICS OF MAC PROTOCOLS IN
WSN
The MAC protocols are designed to provide the access to
different nodes in the network. The MAC protocols must have
some characteristics. Some important characteristics are as
following:
1) Fairness: Since in the WSN there are a number on
different nodes which will access the medium
according to the need. So a MAC protocol should
provide the equal amount of resources to every node
in the network to increase the fairness of the network.
2) Energy efficient: Since there is limited energy source
in a wireless sensor network and the sensor nodes
have to operate by using these finite energy sources.
http://www.ijettjournal.org
Page 539
International Journal of Engineering Trends and Technology (IJETT) – Volume 10 Number 11 - Apr 2014
Therefore the MAC protocols must consider these
energy constraints and they must be energy efficient.
3) Reliability: The most common requirement in a
WSN is to get reliability. The MAC protocol used in
the network also affects the reliability of the WSN. A
MAC protocol is reliable if it can detect and recover
the transmission errors and collisions occurring in the
network.
4) Adaptability: Since a WSN is a self managing
network and in such kind of network changes occur
frequently. The changes may be in its topology, size,
traffic etc. So a MAC protocol must be able to adapt
these changes occur in the network without
significant overheads.
V.
[11]
[12]
[13]
[14]
L. Tang, Y. Sun, O. Gurewitz, and D. B. Johnson, “PWMAC: An
Energy-Efficient Predictive-Wakeup MAC Protocol for Wireless
Sensor Networks,” Proceedings of the IEEE INFOCOM, pp.
1305–1313, 2011.
S. C. Ergen and P. Varaiya, “PEDAMACS: Power Efficient And
Delay Aware Medium Access Protocol for Sensor Networks,”
IEEE Transactions on Mobile Computing, Volume 5, No. 7,
Article ID 1637439, pp. 920–930, 2006.
W.B. Heinzelman, A.P. Chandrakasan, and H. Balakrishnan, “An
Application-Specific Protocol Architecture for Wireless
Microsensor Networks,” IEEE Transactions on Wireless
Communications, Volume 1, No. 4, pp. 660–670, 2002.
Lewis Adams, “Capitalizing on 802.11 for Sensor Networks”,
Gainspan Corporation, 2007.
CONCLUSION
The wireless sensor network is a self configuring
network. The sensor nodes are deployed randomly in the
WSN. The sensor nodes are used for data sensing at any
desired location. The communication takes place through a
wireless medium in a WSN.
In this paper we have provided the brief introduction
about the WSN. There are several MAC protocols used in the
WSN. We have discussed some MAC protocols used in the
WSN. There are some characteristics of the MAC protocols
that must be possessed by these. These characteristics are also
discussed in brief.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
I.F. Akyildiz et al., “Wireless Sensor Networks: A Survey,
Computer Networks, pp. 393-422, Elsevier Science B.V, 2002.
K. Ramesh and Dr. K. Somasundaram, “A Comparative Study of
Cluster-Head Selection Algorithms in Wireless Sensor Networks”,
International Journal of Computer Science & Engineering Survey,
Volume 2, No. 4, pp. 153-164, November 2011.
Ewa Hansen et al., “Efficient Cluster Formation for Sensor
Networks”.
Sudhanshu Pant, Chauhan Naveen, Prashant Kumar “Effective
Cache based Policies in wireless Sensor Networks: A Survey”,
International Journal of Computer Applications (0975 – 8887)
Volume 11, No.10, December 2010, pp. 17-21.
Hnin Yu Shwe, Jiang Xiao - hong, and Susumu Horiguchi,
“Energy Saving in Wireless Sensor Networks”, Journal of
Communication and Computer, Volume 6, No. 5, Serial no. 54,
May 2009.
W. Ye, J. Heidemann, and D. Estrin, “Medium access control with
coordinated adaptive sleeping for wireless sensor networks,”
IEEE/ACM Transactions on Networking, Volume 12, No. 3, pp.
493–506, 2004.
Wei Ye And John Heidemann: “Medium Access Control In
Wireless Sensor Networks”, USC/ISI Technical Report ISITR580,www.isi.edu/~johnh/PAPERS/Ye03c.html, 2003.
Joseph Kabara and Maria Calle, “MAC Protocols Used by
Wireless Sensor Networks and a General Method of Performance
Evaluation”, International Journal of Distributed Sensor Networks
Volume 2012, Article ID 834784, pages 11.
Nukhet Sazak, Ismail Erturk, Etem Koklukaya, Murat Cakiroglu,
“An Energy Efficient MAC Protocol for Cluster Based Event
Driven WSN Applications”.
A. Karthikeyan, T. Shankar, V. Srividhya, R.V.L. Pravallika,
“Energy Efficient MAC Protocol for Energy Latency Tradeoff in
Wireless Sensor Network Traffic”, IEEE 2012.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 540
Download