Uploaded by colob28736

WSN Notes

advertisement
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
UNIT I
PART I
Introduction to Sensor Networks
What is a Sensor?
•
A Sensor is a device that responds and detects some type of input from both the physical or
environmental conditions, such as pressure, heat, light, etc.
What is a Sensor Network?
•
•
A Sensor Network is an infrastructure comprised of sensing(measuring), computing and
communication elements that gives an ability to administrator to react, instrument and observe
the events in a specified environment.
Administrator: Typically, is a civil, governmental, commercial or industrial entity.
Environment: Can be the physical world, a biological system or an information technology(IT)
framework.
There are four basic components of sensor network:
1.
An assembly of distributed or localized sensors
2.
An interconnecting network
3.
A central point of information clustering
4.
A set of computing resources at the central point to handle data correlation, event trending, status
querying and data mining
•
•
What is Wireless Sensor Network?
•
Refers to a group of spatially dispersed and dedicated sensors for monitoring and recording the
physical conditions of the environment and organizing the collected data at a central location.
•
Wireless sensor networks are distributed network containing small, lightweight, large number of
sensor nodes.
•
Sensor nodes observe the system or environment.
Wireless Sensor Network Model
1
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
Sensor field is an area where nodes are deployed to collect information related to surrounding
environment.
•
Data dissemination and data gathering are two most important operations performed in sensor
networks
•
Sensors usually communicate with each other using multi-hop approach.
•
This flow of data ends at special nodes called base stations (sink)-Gateway sensor node.
•
Researcher’s see WSN as an exciting emerging domain of deeply networked systems of low
power wireless nodes with tiny amount of CPU and memory and a large federated networks for
high-resolution sensing of the environment.
•
The radar networks used in air traffic control, the national electric power grid, the nationwide
weather stations deployed over a region are specialized examples of WSN, also applicable in
fields of physical security, health care and commerce.
Sensor Node:
•
The WSN is built of "nodes" – from a few to several hundreds or even thousands, where each
node is connected to one (or sometimes several) sensors.
•
Sensor node is also known as a mote in a sensor network.
•
Each such sensor network node has typically several parts: a radio transceiver with an
internal antenna or connection to an external antenna, a microcontroller, an electronic circuit
for interfacing with the sensors and an energy source, usually a battery or an embedded form
of energy harvesting.
•
Sensor nodes are capable of performing some processing, gathering sensory information and
communicating with other connected nodes in the network.
•
Sensor nodes used in WSN monitor environment conditions like temperature, sound, humidity,
pressure, etc.
•
Sensor nodes are homogeneous and self-organized.
•
Each sensor node consists following subsystems:
2
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
1.
Sensor Subsystem:
Senses the environment.
2.
Processing Subsystem:
The central element of the node and the choice of a processor determines the
Trade-off between flexibility and efficiency.
3.
Communication Subsystem:
Exchanging message with neighbouring sensor node.
It is the most energy intensive subsystem and its power consumption should be
regulated.
4.
Power Subsystem:
An important aspect in the development of a wireless sensor node is ensuring that there is always
adequate energy available to power the system.
•
A sensor node might vary in size from that of a shoebox down to the size of a grain of dust.
•
The cost of sensor nodes is similarly variable, ranging from a few to hundreds of dollars,
depending on the complexity of the individual sensor nodes.
•
Sensors are classified into three categories:
1. Passive, omnidirectional sensors
2. Passive, narrow-beam sensors
3. Active sensors.
What are characteristic requirements of WSN?
1.
Types of Service:
- The service provided by a conventional communication network move bits from one place to
another.
- Whereas in case of WSN, bits move randomly in a network. Expectation from
WSN is to provide meaningful information and actions of given task.
3
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
2.
Quality of Service:
- In some cases packet delivery occasionally may be more than enough however in some other
cases very high reliability requirements exists. In some cases, delay might be important.
- The amount and quality of information should be relevant.
- Hence adapted quality concept such as reliable detection is important.
3.
Lifetime of WSN:
- Nodes have to rely on a limited energy supply.
- It is not possible to replace those energy sources in the field, while WSN is operating for a given
task time.
- Thus energy efficient operation of WSN is required.
4.
Fault Tolerance:
- WSN should be able to tolerate the fault in the nodes that may cause it to fail.
- Redundant operation is necessary/
5.
Scalability:
- As WSN deploys a large number of nodes, the protocols and architecture employed should be
able to scale the nodes.
6.
Wide range of densities:
- The number of nodes per unit varies for every WSN.
- Thus, the WSN must adapt to variable densities.
7.
Programmability:
- When new tasks are to given to the deployed nodes, the WSN must be programmable in order
to make the nodes react with flexibility towards the changes made.
8.
Maintainability:
- It is a important characteristic, as both WSN and the WSN environment keeps changing.
- WSN should adapt these changes.
What are Mechanism requirements for a WSN?
•
To fulfil the requirements some mechanisms are require.
•
Following are the mechanisms which will form typical parts of WSN:
1.
Multi-hop wireless communication:
- A direct communication between sender and receiver faces many problems such as required
power for transmission is very large.
- Thus using intermediate nodes as relays would reduce required power. Hence multi-hop
communication is necessary.
4
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
2.
Auto-configuration:
- The operational parameters of WSN configure autonomously.
3.
Energy efficient operation:
- Key method for long lifetime.
4.
Data centric:
- In WSN, data is combined from all nodes at a aggregation point and after processing redundant
nodes can be removed.
5.
Collaboration and in-network processing:
- Sometimes a single senor is unable to decide whether or not event has happened.
- At this time, collective work from all nodes is required.
- Data is processed within the network itself to achieve the collaboration.
6.
Locality:
- The principle of locality must be kept into consideration in order to have scalability.
7.
Exploit trade-offs:
- The WSN has to rely on a large degree on using various inbuilt trade-offs between mutually
conflicting goals.
Wireless Sensor Network Communication Architecture
•
The goal of WSN engineers is to develop a cost-effective standard based wireless networking
solution that supports low-to-medium data rates, has low power consumption and guarantees
Security and reliability.
•
The position of sensor node does not have to be predetermined, allowing random deployment in
inaccessible terrains or dynamic situations, however this also means that sensor network
protocols and algorithms must possess self-organizing capabilities.
5
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
Protocol stack for sensor network
•
The most common WSN architecture follows the OSI architecture Model.
•
The architecture of the WSN includes five layers and three cross layers.
•
Mostly in sensor n/w we require five layers, namely application, transport, n/w, data link &
physical layer.
•
The three cross planes are namely power management, mobility management, and task
management.
•
These layers of the WSN are used to accomplish the n/w and make the sensors work together in
order to raise the complete efficiency of the network.
COMMUNICATION PROTOCOLS:
1. Application Layer
The application layer is liable for traffic management and offers software for numerous
aapplications that convert the data in a clear form to find positive information.
2. Transport Layer
The function of the transport layer is to deliver congestion avoidance and reliability where a lot
of protocols intended to offer this function are either practical on the upstream.
3. Network Layer
The main function of the network layer is routing, it has a lot of tasks based on the application,
but actually, the main tasks are in the power conserving, partial memory, buffers, and sensor
don’t have a universal ID and have to be self-organized.
4. Data Link Layer
The data link layer is liable for multiplexing data frame detection, data streams, MAC, & error
control, confirm the reliability of point–point (or) point– multipoint.
5. Physical Layer
The physical layer provides an edge for transferring a stream of bits above physical medium.
This layer is responsible for the selection of frequency, generation of a carrier frequency, signal
detection, Modulation & data encryption.
MANAGEMENT PLANES:
1. Power management plane
- It manages the power level for sensing of sensor node, processing, generation and
reception which can be implemented by efficient power management at different protocol
layers.
2. Mobility management plane
- It performs configuration and reconfiguration of sensor nodes to generate and maintain
connectivity of network whenever node deploys and topology changes.
3. Task management plane
6
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
- The main function is task distribution among nodes in a sensing region to improve energy
efficiency and to increase the lifetime of network.
What are the operating environment and resource constraints in WSN?
1. Power consumption:
- As WSN has limited power, designer has to consider energy conservation constraint.
2. Communication:
- Due, to limited bandwidth, the network may use noisy channel and the communication is shift
into a unprotected frequency range affecting quality of service, security and network capacity.
3. Computation:
- Limited computing power and memory resources of WSN restricts on types of data processing
algorithms.
4. Uncertainty in measured parameters:
- Detected or collected data may be uncertain and may contain noise.
- Replacement of node may damage operation and individual readings.
Challenges in Designing Wireless Sensor Network:
1. Limited functional capability, including problems of size
- The size of sensor is important factor while designing WSN.
- The sensor has to comprise its basic components along with some special application
components if required.
- The sensors are supposed to as small as 1x1x1.
-With that they have to disposable, autonomous and adaptive to nature.
2. Power consumption
- The sensor node lifetime typically exhibits a strong dependency on battery life.
- Sensor node consumes power for sensing, communicating, processing.
3. Node costs
- A sensor network consists of large network of sensors.
- It follows that cost of an individual sensor is critical to overall financial metric of the sensor
Network.
4. Environmental factors
- Sensor networks are often expected to operate in an unattended fashion in dispersed and
7
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
Remote location.
- Such environment give rise to challenging management mechanisms.
5. Transmission channel factors
- Sensor network operate in a bandwidth and performance constrained multi-hop wireless
Communication.
- To facilitate global operation of these networks, the channel selected must be available
on global basis.
6. Topology management complexity and node distribution
- Deploying and managing a high number of nodes in a relatively bounded environment
requires special techniques.
- After deployment, topology can change at any moment due to change in sensor node
position change.
What are characteristics of Wireless Sensor Networks?
•
•
•
•
•
•
•
•
•
•
The consumption of Power limits for nodes with batteries
Capacity to handle with node failures
Scalability to large scale of distribution
Capability to ensure strict environmental conditions
Simple to use
Cross-layer design
Communication paradigm
Application specific
Dynamic topology
Deployment
What are applications of Wireless Sensor Networks?
•
•
•
•
•
•
•
•
Military Applications: Battlefield surveillance monitoring, missile guidance, etc.
Health Applications: Patient diagnosis and monitoring, monitoring physiological data, etc.
Environmental Applications: Detection of forest fires, flood, etc.
Home Applications: Ovens, refrigerators, vacuum cleaners, etc.
Commercial Applications: Vehicle tracking and detection, inventory control, traffic control, etc.
Area monitoring: Aircraft guidance
Logistics: Allow tracking of goods
Facility management: Management of wide range of facilities.
Advantages of Wireless Sensor Networks
The advantages of WSN include the following:
•
Network arrangements can be carried out without immovable infrastructure.
8
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
•
•
Apt for the non-reachable places like mountains, over the sea, rural areas and deep forests.
Flexible if there is a casual situation when an additional workstation is required.
Execution pricing is inexpensive.
It avoids plenty of wiring.
It might provide accommodations for the new devices at any time.
It can be opened by using a centralized monitoring.
Introduction to Mobile Ad-hoc networks(MANETs)
•
•
•
•
A continuously self-configuring, infrastructure-less
network of mobile devices
connected wirelessly.
Independent mobile nodes.
Mobile nodes communicate directly via radio waves whereas other mobile nodes requires an
intermediate nodes to route packets.
Nodes are both “host” and “router”.
What are the characteristics of MANETs?
•
•
•
•
•
•
Distributed operation
Dynamic topology
Multi-hop routing
Acts as autonomous terminal
Light weight terminal
Share physical medium
Advantages of MANETs:
•
•
•
•
•
Scalable
Less expensive compared to wired network
No central network administration.
Robust
Setup can be done at any place and at any time.
Limitations/Disadvantages of MANETs:
•
•
•
Lack of centralized network administration.
There is no verification system for anyone who has access to data.
Undefined physical boundary of the network.
Applications of MANETS:
•
•
•
•
Military: To keep updated information network between the soldiers, vehicles, etc.
Collaborative work: To exchange information on a given project in business.
Emergency services: Search and rescue operation, clinical help.
Commercial: Fire, flood, earthquake.
9
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
WIRELESS SENSOR NETWORK AND MOBILE AD-HOC NETWORK
•
Principle differences between MANETS and WSN:
1. Applications and Equipment:
• MANETs are connected to different equipment and have different applications than WSNs.
• MANETS have a powerful battery and they are used for voice communication because of
which equipment is required for access to remote infrastructure e.g. web server.
• Equipment varies with applications.
2. Application Specific:
• For wireless sensor networks it is possible to own the many number of possible combinations
of computing, sensing and communication technology.
• This variety is not large for MANETs.
3. Scale:
• As compared to ad-hoc networks, WSN has to scale to much large numbers of entities which
requires more scalable different solutions.
4. Environment interaction:
• Traffic interaction in both WSN and MANET is different.
• In WSNs, traffic interaction results in low data rates.
• While in MANETs data rate is higher.
5. Self-configurable:
• WSNs and MANETs are quite similar in configurability.
• Networks self-configure as per the application with the required energy trade-offs.
6. Energy:
• As compared to MANETs, WSNs are tight on energy requirement.
7. Quality of Service and Dependability:
• In MANETs each individual must be reliable.
• In WSNs, single node is next to inappropriate.
8. Simplicity and Resource Scarceness:
• As sensor nodes are simple and energy supply is limited the operating and networking software
should have to keep orders of magnitude simple as compared to desktop computers.
• MANETs require scalable, resource, efficient solutions.
9. Data Centric:
• In WSNs redundant operations will make data centric protocols attractive.
10
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
• This concept is unknown in MANETs.
10. Mobility:
• In MANETs, the mobility problems occur because nodes move around and need to handle
changing multi-hop routes in network.
• In WSNs, if the nodes are mobile, the problem of mobility arises.
Difference between WSNs and MANETs
Enabling Technologies for Wireless Sensor Network
•
•
•
•
The wireless sensor networks and be implemented using advances in technologies.
Miniaturization of hardware: Smaller size has driven down consumption of power. Reduced
size of chip and improved energy efficiency comes with reduction in cost required to make
redundant use of nodes affordable.
There is device for energy scavenging present in sensor node used for recharging the battery
with energy collected for environment.
The software is the counterpart to fundamental hardware technology.
11
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
UNIT I
PART II
Single Node Architecture:
•
•
•
•
•
•
The basic part of a wireless sensor network is a node.
It is necessary to discuss the principal tasks of a node – computation, storage,
communication, and sensing/ actuation – and which components are required to perform
these tasks.
Then, the energy consumption of these components is described: how energy can be stored,
gathered from the environment, and saved by intelligently controlling the mode of
operation of node components.
This control has to be exerted by an operating system like execution environment.
Building a wireless sensor network first of all requires the constituting nodes to be developed
and available.
These nodes have to meet the requirements that come from the specific requirements of a
given application: they might have to be small, cheap, or energy efficient, they have to be
equipped with the right sensors, the necessary computation and memory resources, and they
need adequate communication facilities.
Hardware Components
When choosing the hardware components for a wireless sensor node, evidently the application’s
requirements play a decisive factor with regard mostly to size, costs, and energy consumption of
the nodes – communication and computation facilities as such are often considered to be of
acceptable quality, but the trade-offs between features and costs is crucial.
In more realistic applications, the mere size of a node is not so important; rather, convenience,
simple power supply, and cost are more important.
A basic sensor node comprises five main components:
•
•
•
•
•
Controller A controller to process all the relevant data, capable of executing arbitrary code.
Memory Some memory to store programs and intermediate data; usually, different types of
memory are used for programs and data.
Sensors and actuators The actual interface to the physical world: devices that can observe
or control physical parameters of the environment.
Communication Turning nodes into a network requires a device for sending and receiving
information over a wireless channel.
Power supply As usually no tethered power supply is available, some form of batteries are
necessary to provide energy. Sometimes, some form of recharging by obtaining energy from
the environment is available as well (e.g. solar cells).
12
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
1.
Controller
• Microcontrollers:
Mostly suited in embedded systems.
Features: Flexible in connecting to other sensor nodes, low power consumption, freely
programmable.
Useful in WSN as they can reduce their power consumption of power by going into sleep states
where only controller parts are active.
• Digital Signal Processors:
It is a special case of programmable processors.
Designed for huge amount of data in signal processing applications.
Used in wireless sensor node to process data coming from wireless communication device to
obtain digital data stream.
• Field Programmable Gate Array:
FGPA processors can be reconfigured or reprogrammed.
It may take time and energy for reprogramming of FGPA at the same frequency as a
microcontroller can change between different programs.
• Application Specific Integrated Circuits:
Custom designed for a given application e.g. routers and switches of very high speed.
Costlier, superior solution as compared to other controllers.
2.
•
•
•
•
•
Memory
The memory component is fairly straightforward.
Evidently, there is a need for Random Access Memory (RAM) to store intermediate sensor
readings, packets from other nodes, and so on.
While RAM is fast, its main disadvantage is that it loses its content if power supply is
interrupted.
Program code can be stored in Read-Only Memory (ROM) or, more typically, in Electrically
Erasable Programmable Read-Only Memory (EEPROM) or flash memory (the later being
similar to EEPROM but allowing data to be erased or written in blocks instead of only a byte
at a time).
Flash memory can also serve as intermediate storage of data in case RAM is insufficient or
when the power supply of RAM should be shut down for some time. The long read and write
access delays of flash memory should be taken into account, as well as the high required
energy.
13
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
3.
Correctly dimensioning memory sizes, especially RAM, can be crucial with respect to
manufacturing costs and power consumption. However, even general rules of thumbs are
difficult to give as the memory requirements are very much application dependent.
Communication Device
Choice of transmission medium:
•
•
•
•
•
The communication device is used to exchange data between individual nodes.
In some cases, wired communication can actually be the method of choice and is frequently
applied in many sensor network like settings (using field buses like Profibus, LON, CAN, or
others).
The communication devices for these networks are custom off-the-shelf components.
In wireless communication the first choice to make is that of the transmission medium – the
usual choices include radio frequencies, optical communication, and ultrasound; other media
like magnetic inductance are only used in very specific cases.
Of these choices, Radio Frequency (RF)-based communication is by far the most relevant
one as it best fits the requirements of most WSN applications: It provides relatively long
range and high data rates, acceptable error rates at reasonable energy expenditure, and does
not require line of sight between sender and receiver. Thus, RF-based communication and
transceiver will receive the lion share of attention here.
3.1 Transceivers
• For actual communication, both a transmitter and a receiver are required in a sensor node.
• The essential task is to convert a bit stream coming from a microcontroller (or a sequence of
bytes or frames) and convert them to and from radio waves.
• The device used that combines both these tasks is called transceiver.
• Half-duplex operation is realized since transmitting and receiving at the same time on a
wireless medium is impractical in most cases.
• A range of low-cost transceivers is commercially available that incorporate all the circuitry
required for transmitting and receiving – modulation, demodulation, amplifiers, filters,
mixers, and so on.
• For a judicious choice, the transceiver’s tasks and its main characteristics have to be
understood.
TASKS AND CHARACTERISTICES
1. Service to upper layer
• A receiver has to offer certain services to the upper layers, most notably to the Medium
Access Control (MAC) layer. Sometimes, this service is packet oriented; sometimes, a
transceiver only provides a byte interface or even only a bit interface to the microcontroller.
In any case, the transceiver must provide an interface that somehow allows the MAC layer
to initiate frame transmissions and to hand over the packet from,
• In the other direction, incoming packets must be streamed into buffers accessible by the
MAC protocol.
2. Power consumption and energy efficiency
• The simplest interpretation of energy efficiency is the energy required to transmit and receive
a single bit.
• Also, to be suitable for use in WSNs, transceivers should be switchable between different
states, for example, active and sleeping.
14
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
The idle power consumption in each of these states and during switching between them is
very important.
3. Carrier frequency and Multiple channels
• It is often useful if the transceiver provides several carrier frequencies (“channels”) to choose
from, helping to alleviate some congestion problems in dense networks.
• Such channels or “subbands” are relevant.
4. State change time and energy
• A transceiver can operate in different modes.
• The time and the energy required to change between two such states are important figures of
merit. The turnaround time between sending and receiving, for example, is important for
various medium access protocols.
5. Data rate
• Carrier frequency and used bandwidth together with modulation and coding determine the
gross data rate.
• Typical values are a few tens of kilobits per second – considerably less than in broadband
wireless communication, but usually sufficient for WSNs.
• Different data rates can be achieved, for example, by using different modulations or changing
the symbol rate.
6. Modulations
• The transceivers typically support one or several of on/off-keying, ASK, FSK, or similar
modulations.
• If several modulations are available, it is convenient for experiments if they are selectable at
runtime even though, for real deployment, dynamic switching between modulations is not
one of the most discussed options.
7. Coding
• Some transceivers allow various coding schemes to be selected.
8. Transmission power control
• Some transceivers can directly provide control over the transmission power to be used; some
require some external circuitry for that purpose.
• Usually, only a Hardware components 23 discrete number of power levels are available from
which the actual transmission power can be chosen.
• Maximum output power is usually determined by regulations.
9. Noise figure
• The noise figure NF of an element is defined as the ratio of the Signal-to-Noise Ratio (SNR)
ratio SNRI at the input of the element to the SNR ratio SNRO at the element’s output:
•
NF = SNRI /SNRO
• It describes the degradation of SNR due to the element’s operation and is typically given in
dB: NF dB = SNRI dB − SNRO dB
10. Gain
• The gain is the ratio of the output signal power to the input signal power and is typically
given in dB. Amplifiers with high gain are desirable to achieve good energy efficiency.
11. Power efficiency
• The efficiency of the radio front end is given as the ratio of the radiated power to the overall
power consumed by the front end; for a power amplifier, the efficiency describes the ratio of
the output signal’s power to the power consumed by the overall power amplifier.
12. Receiver sensitivity
• The receiver sensitivity (given in dBm) specifies the minimum signal power at the receiver
needed to achieve a prescribed Eb/N0 or a prescribed bit/packet error rate.
15
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
• Better sensitivity levels extend the possible range of a system.
13. Range
• Range is considered in absence of interference; it evidently depends on the maximum transmission power,
on the antenna characteristics, on the attenuation caused by the environment, which in turn depends on the
used carrier frequency, on the modulation/coding scheme that is used, and on the bit error rate that one is
willing to accept at the receiver. It also depends on the quality of the receiver, essentially captured by its
sensitivity.
14. Blocking performance
• The blocking performance of a receiver is its achieved bit error rate in the presence of an
interferer.
• Evidently, blocking performance can be improved by interposing a filter between antenna
and transceiver.
• An important special case is an adjacent channel interferer that transmits on neighboring
frequencies. The adjacent channel suppression describes a transceiver’s capability to filter
out signals from adjacent frequency bands (and thus to reduce adjacent channel interference)
has a direct impact on the observed Signal to Interference and Noise Ratio (SINR).
15. Out of band emission
• The inverse to adjacent channel suppression is the out of band emission of a transmitter.
• To limit disturbance of other systems, or of the WSN itself in a multichannel setup, the
transmitter should produce as little as possible of transmission power outside of its prescribed
bandwidth, centered around the carrier frequency.
16. Carrier sense and RSSI
• In many medium access control protocols, sensing whether the wireless channel, the carrier,
is busy (another node is transmitting) is a critical information. The precise semantics of this
carrier sense signal depends on the implementation.
17. Frequency stability
• The frequency stability denotes the degree of variation from nominal center frequencies
when environmental conditions of oscillators like temperature or pressure change.
• In extreme cases, poor frequency stability can break down communication links, for example,
when one node is placed in sunlight whereas its neighbor is currently in the shade.
18. Voltage range
• Transceivers should operate reliably over a range of supply voltages. Otherwise, inefficient
voltage stabilization circuitry is required.
TRANSCEIVER STRUCTURE
A fairly common structure of transceivers is into the Radio Frequency (RF) front end and the
baseband part:
•
•
The radio frequency front end performs analog signal processing in the actual radio
frequency band, whereas
The baseband processor performs all signal processing in the digital domain and
communicates with a sensor node’s processor or other digital circuitry.
16
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
•
•
4.
Architecture of RF front end
Between these two parts, a frequency conversion takes place, either directly or via one or
several Intermediate Frequencies (IFs).
The boundary between the analog and the digital domain is constituted by Digital/Analog
Converters (DACs) and Analog/Digital Converters (ADCs).
The RF front end performs analog signal processing in the actual radio frequency band, for
example in the 2.4 GHz Industrial, Scientific, and Medical (ISM) band; it is the first stage of
the interface between the electromagnetic waves and the digital signal processing of the
further transceiver stages
The Power Amplifier (PA) accepts upconverted signals from the IF or baseband part and
amplifies them for transmission over the antenna.
The Low Noise Amplifier (LNA) amplifies incoming signals up to levels suitable for further
processing without significantly reducing the SNR [470]. The range of powers of the
incoming signals varies from very weak signals from nodes close to the reception boundary
to strong signals from nearby nodes; this range can be up to 100 dB. Without management
actions, the LNA is active all the time and can consume a significant fraction of the
transceiver’s energy.
Elements like local oscillators or voltage-controlled oscillators and mixers are used for
frequency conversion from the RF spectrum to intermediate frequencies or to the baseband.
The incoming signal at RF frequencies fRF is multiplied in a mixer with a fixed-frequency
signal from the local oscillator (frequency fLO). The resulting intermediate-frequency signal
has frequency fLO − fRF. Depending on the RF front end architecture, other elements like filters
are also present.
Sensors and Actuators
SENSORS
Sensors can be roughly categorized into three categories:
1. Passive, omnidirectional sensors: These sensors can measure a physical quantity at the
point of the sensor node without actually manipulating the environment by active probing
– in this sense, they are passive. Moreover, some of these sensors actually are selfpowered in the sense that they obtain the energy they need from the environment – energy
is only needed to amplify their analog signal. There is no notion of “direction” involved
in these measurements. Typical examples for such sensors include thermometer, light
sensors, vibration, microphones, humidity, mechanical stress or tension in materials,
chemical sensors sensitive for given substances, smoke detectors, air pressure, and so on.
17
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
Passive, narrow-beam sensors: These sensors are passive as well, but have a welldefined notion of direction of measurement. A typical example is a camera, which can
“take measurements” in a given direction, but has to be rotated if need be.
3. Active sensors: This last group of sensors actively probes the environment, for example,
a sonar or radar sensor or some types of seismic sensors, which generate shock waves by
small explosions. These are quite specific – triggering an explosion is certainly not a
lightly undertaken action – and require quite special attention.
2.
ACTUATORS
• Actuators are just about as diverse as sensors, yet for the purposes of designing a WSN, they
are a bit simpler to take account of: In principle, all that a sensor node can do is to open or
close a switch or a relay or to set a value in some way.
• Whether this controls a motor, a light bulb, or some other physical object is not really of
concern to the way communication protocols are designed.
Power supply of Sensor nodes
For untethered wireless sensor nodes, the power supply is a crucial system component. There
are essentially two aspects:
1. Storing energy and providing power in the required form
2. Attempting to replenish consumed energy by “scavenging” it from some node-external power
source over time.
• Storing power is conventionally done using batteries. As a rough orientation, a normal AA
battery stores about 2.2–2.5 Ah at 1.5 V.
• Battery design is a science and industry in itself, and energy scavenging has attracted a lot
of attention in research.
Storing energy: Batteries
• Traditional batteries:
The power source of a sensor node is a battery, either non-rechargeable (“primary batteries”)
or, if an energy scavenging device is present on the node, also rechargeable (“secondary
batteries”).
Energy scavenging
•
•
•
Fuel cells, micro heat engines, radioactivity – convert energy from some stored, secondary
form into electricity in a less direct and easy to use way than a normal battery would do. The
entire energy supply is stored on the node itself – once the fuel supply is exhausted, the node
fails
To ensure truly long-lasting nodes and wireless sensor networks, such a limited energy store
is unacceptable. Rather, energy from a node’s environment must be tapped into and made
available to the node – energy scavenging should take place.
Several approaches exist:
1. Photovoltaics:
• Solar cells can be used to power sensor nodes. The available power depends on
whether nodes are used outdoors or indoors, and on time of day and whether for
outdoor usage.
• The resulting power is somewhere between 10 µW/cm2 indoors and 15 mW/cm2
outdoors.
18
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
2.
•
3.
•
•
•
4.
•
5.
•
Single cells achieve a fairly stable output voltage of about 0.6 V (and have therefore
to be used in series) as long as the drawn current does not exceed a critical threshold,
which depends, among other factors, on the light intensity.
Hence, solar cells are usually used to recharge secondary batteries. Best trade-offs
between complexity of recharging circuitry, solar cell efficiency, and battery lifetime
are still open questions
Temperature gradients:
Differences in temperature can be directly converted to electrical energy.
Theoretically, even small difference of, for example, 5 K can produce considerable
power, but practical devices fall very short of theoretical upper limits.
Vibrations:
One almost pervasive form of mechanical energy is vibrations: walls or windows in
buildings are resonating with cars or trucks passing in the streets, machinery often
has low frequency vibrations, ventilations also cause it, and so on.
The available energy depends on both amplitude and frequency of the vibration and
ranges from about 0.1 µW/cm3 up to 10, 000 µW/cm3 for some extreme cases
(typical upper limits are lower).
Converting vibrations to electrical energy can be undertaken by various means, based
on electromagnetic, electrostatic, or piezoelectric principles.
Pressure variations:
Somewhat akin to vibrations, a variation of pressure can also be used as a power
source. Such piezoelectric generators are in fact used already.
Flow of air/liquid:
Another often-used power source is the flow of air or liquid in wind mills or turbines.
The challenge here is again the miniaturization, but some of the work on millimeter
scale MEMS gas turbines might be reusable.
Operating systems and execution environments
➢ Embedded operating systems
• The traditional tasks of an operating system are controlling and protecting the access to
resources (including support for input/output) and managing their allocation to different
users as well as the support for concurrent execution of several processes and communication
between these processes.
• These tasks are, however, only partially required in an embedded system as the executing
code is much more restricted and usually much better harmonized than in a general-purpose
system.
• An operating system or an execution environment for WSNs should support the specific
needs of these systems. In particular, the need for energy-efficient execution requires support
for energy management.
• All this requires
▪ an appropriate programming model,
▪ a clear way to structure a protocol stack, and
▪ explicit support for energy management – without imposing too heavy a burden on
scarce system resources like memory or execution time.
Programming Paradigms and Application Programming Interfaces
1. Concurrent programming:
19
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
concurrent execution is crucial for WSN nodes, as they have to handle data communing from
arbitrary sources – for example, multiple sensors or the radio transceiver – at arbitrary points
in time.
For example, a system could poll a sensor to decide whether data is available and process the
data right away, then poll the transceiver to check whether a packet is available, and then
immediately process the packet, and so on.
Such a simple sequential model would run the risk of missing data while a packet is processed
or missing a packet when sensor information is 46 Single-node architecture processed. This
risk is particularly large if the processing of sensor data or incoming packets takes substantial
amounts of time, which can easily be the case.
Hence, a simple, sequential programming model is clearly insufficient.
2. Process based concurrency:
• General-purpose operating systems support concurrent (seemingly parallel) execution of
multiple processes on a single CPU.
•
•
The data is not shared thus, no data corruption.
Each process requires its own stack space in memory, which fits ill with the stringent memory
constraints of sensor nodes.
3. Event based programming:
20
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
•
•
•
•
•
•
•
•
•
•
The idea is to embrace the reactive nature of a WSN node and integrate it into the design of
the operating system.
The system essentially waits for any event to happen, where an event typically can be the
availability of data from a sensor, the arrival of a packet, or the expiration of a timer.
Such an event is then handled by a short sequence of instructions that only stores the fact
that this event has occurred and stores the necessary information – for example, a byte
arriving for a packet or the sensor’s value – somewhere.
The actual processing of this information is not done in these event handler routines, but
separately, decoupled from the actual appearance of events. This event-based programming.
Such an event handler can interrupt the processing of any normal code, but as it is very
simple and short, it can be required to run to completion in all circumstances without
noticeably disturbing other code.
Event-based programming model distinguishes between two different “contexts”: one for
the time-critical event handlers, where execution cannot be interrupted and a second
context for the processing of normal code, which is only triggered by the event handlers.
INTERFACES TO OPERATING SYSTEM
Interface is boundary where two systems which are independent meet and communicate or
act with each other. There are many types of interfaces.
Interface is used to communicate with operating system.
In WSN “Application Programming Interface(API) is used which is a set of function,
protocols, commands and objects that programmers can use to generate software or interact
with external system.
Structure of Operating System and protocol stack
The traditional approach to communication protocol structuring is to use layering: individual
protocols are stacked on top of each other, each layer only using functions of the layer
directly below.
This layered approach has great benefits in keeping the entire protocol stack manageable, in
containing complexity, and in promoting modularity and reuse.
For the purposes of a WSN, however, it is not clear whether such a strictly layered approach
will suffice (the presentation here follows to some degree reference.
Cross-layer information exchange is but one way to loosen the strict confinements of the
layered approach. Also, WSNs are not the only reason why such liberations are sought.
Dynamic energy and power management
Switching individual components into various sleep states or reducing their performance by
scaling down frequency and supply voltage and selecting particular modulation and codes
were the prominent examples or improving energy efficiency.
21
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
To control these possibilities, decisions have to be made by the operating system, by the
protocol stack, or potentially by an application when to switch into one of these states.
Dynamic Power Management (DPM) on a system level is the problem at hand. One of the
complicating factors to DPM is the energy and time required for the transition of a
component between any two states.
If these factors were negligible, clearly it would be optimal to always & immediately go into
the mode with the lowest power consumption possible.
Introduction to TinyOS and nesC
•
•
•
•
•
•
•
•
•
•
•
The use of an event-based programming model as the only feasible way to support the
concurrency required for sensor node software while staying within the confined resources
and running on top of the simple hardware provided by these nodes.
The open question is how to harness the power of this programming model without getting
lost in the complexity of many individual state machines sending each other events.
In addition, modularity should be supported to easily exchange one state machine against
another. The operating system TinyOS along with the programming language nesC ,
addresses these challenges.
TinyOS supports modularity and event-based programming by the concept of components.
A component contains semantically related functionality, for example, for handling a radio
interface or for computing routes. Such a component comprises the required state
information in a frame, the program code for normal tasks, and handlers for events and
commands.
Both events and commands are exchanged between different components.
Components are arranged hierarchically, from low-level components close to the hardware
to high-level components making up the actual application.
Events originate in the hardware and pass upward from low-level to high-level components;
commands, on
the other hand, are passed from high-level to low-level components.
Figure below shows a timer component that provides a more abstract version of a simple
hardware time. It understands three commands (“init”, “start”, and “stop”) and can handle
one event (“fire”) from another component, for example, a wrapper component around a
hardware timer. It issues “setRate” commands to this component and can emit a “fired” event
itself.
The important thing to note is that, in staying with the event-based paradigm, both command
and event handlers must run to conclusion; they are only supposed to perform very simple
triggering duties.
The advantage is twofold: there is no need for stack management and tasks are atomic with
respect to each other. Still, by virtue of being triggered by handlers, tasks are seemingly
concurrent to each other.
22
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
•
•
it is not clear how a component could obtain feedback from another component.
The idea is to split invoking such a request and the information about answers into two
phases: The first phase is the sending of the command, the second is an explicit
information about the outcome of the operation, delivered by a separate event.
This split-phase programming approach requires for each command a matching event but
enables concurrency under the constraints of run-to-completion semantics – if no
confirmation for a command is required, no completion event is necessary.
structuring commands and events that belong together forms an interface between two
components.
The nesC language formalizes this intuition by allowing a programmer to define interface
types that define commands and events that belong together.
Figure below shows how the TimerComponent and an additional component HWClock can
be wired together to form a new component CompleteTimer, exposing only the StdCtrl and
Timer interfaces to the outside; Listing 2.2 shows the corresponding nesC code
23
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
Using these component definition, implementation, and connection concepts, TinyOS and
nesC together form a powerful and relatively easy to use basis to implement both core
operating system functionalities as well as communication protocol stacks and application
functions.
Overall, TinyOS can currently be regarded as the standard implementation platform for
WSNs.
CONCLUSION
It has shown the principal ways of constructing such nodes and has shown some numbers
on the performance and energy consumption of its main components – mainly the
controller, the communication device, and the sensors.
On the basis of these numbers, it will often be convenient to assume that a wireless sensor
node consists of two separate parts: One part that is continuously vigilant, can detect
and report events, and has small or even negligible power consumption. This is
complemented by a second part that performs actual processing and communication,
has higher, nonnegligible power consumption, and has therefore to be operated in a
low duty cycle. This separation of functionalities is justified from the hardware
properties as is it supported by operating systems like TinyOS.
Network Architecture:
•
•
•
•
Network architecture gives the basic principles of turning individual sensor nodes into a
wireless sensor network.
On the basis of the high-level application scenarios more concrete scenarios and the
resulting optimization goals of how a network should function are discussed.
On the basis of these scenarios and goals, a few principles for the design of networking
protocols in wireless sensor networks are derived – these principles and the resulting
protocol mechanisms constitute the core differences of WSNs compared to other network
types.
To make the resulting capabilities of a WSN usable, a proper service interface is required,
as is an integration of WSNs into larger network contexts.
24
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
1. Sensor Network Scenarios:
➢ Types of sources and sinks
•
•
•
•
A source is any entity in the network that can provide information, that is, typically a sensor
node; it could also be an actuator node that provides feedback about an operation.
A sink, on the other hand, is the entity where information is required.
There are essentially three options for a sink: it could belong to the sensor network as such
and be just another sensor/actuator node or it could be an entity outside this network.
For this second case, the sink could be an actual device, for example, a handheld or PDA
used to interact with the sensor network; it could also be merely a gateway to another larger
network such as the Internet, where the actual request for the information comes from some
node “far away” and only indirectly connected to such a sensor network.
Single-hop versus multi-hop networks
•
•
•
Different types of sinks and sources in single-hop network
The basics of radio communication and the inherent power limitation of radio
communication follows a limitation on the feasible distance between a sender and a
receiver. Because of this limited distance, the simple, direct communication between
source and sink is not always possible, specifically in WSNs.
To overcome such limited distances, an obvious way out is to use relay stations, with the
data packets taking multi hops from the source to the sink. This concept of multihop
networks is particularly attractive for WSNs as the sensor nodes themselves can act as such
relay nodes, foregoing the need for additional equipment.
While multihopping is an evident and working solution to overcome problems with large
distances or obstacles, it has also been claimed to improve the energy efficiency of
communication.
Multiple sources and/or multiple sinks. Note how in the scenario in the lower half, both sinks and active sources are
used to forward data to the sinks at the left and right end of the network
Multiple sinks and sources
•
•
So far, only networks with a single source and a single sink have been illustrated.
In many cases, there are multiple sources and/or multiple sinks present.
25
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
In the most challenging case, multiple sources should send information to multiple sinks,
where either all or some of the information has to reach all or some of the sinks.
➢ Three types of mobility
•
•
IN WSNs all participants are stationary.
But one of the main virtues of wireless communication is its ability to support mobile
participants.
• In wireless sensor networks, mobility can appear in three main forms:
Node mobility
• The wireless sensor nodes themselves can be mobile.
• Such mobility is highly application dependent.
• In examples like environmental control, node mobility should not happen; in livestock
surveillance (sensor nodes attached to cattle, for example), it is the common rule.
• In the face of node mobility, the network has to reorganize itself frequently enough to be
able to function correctly.
Sink mobility
•
•
The information sinks can be mobile.
The important aspect is the mobility of an information sink that is not part of the sensor
network, for example, a human user requested information via a PDA while walking in an
intelligent building.
Event mobility
• In applications like event detection and in particular in tracking applications, the cause of
the events or the objects to be tracked can be mobile.
• In such scenarios, it is (usually) important that the observed event is covered by a sufficient
number of sensors at all time.
• Hence, sensors will wake up around the object, engaged in higher activity to observe the
present object, and then go back to sleep.
• As the event source moves through the network, it is accompanied by an area of activity
within the network – this has been called the frisbee model.
26
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
2. Optimization goals and figures of merit
•
•
•
•
How to optimize a network?
How to compare these solutions?
How to decide which approach better supports a given application?
How to turn relatively imprecise optimization goals into measurable figures of merit?
Quality of Service
• QoS can be regarded as a low-level, networking-device-observable attribute – bandwidth,
delay, jitter, packet loss rate
• or as a high-level, user-observable, so-called subjective attribute like the perceived quality
of a voice communication or a video transmission.
• high-level QoS attributes in WSN highly depend on the application. Some generic
possibilities are:
1. Event detection/reporting probability
• the probability that an event that actually occurred is not detected or, more precisely,
not reported to an information sink that is interested in such an event
• not reporting a fire alarm to a surveillance station would be a severe shortcoming.
2. Event classification error
• If events are not only to be detected but also to be classified, the error in classification
must be small.
3. Event detection delay
• What is the delay between detecting an event and reporting it to any/all interested
sinks?
4. Missing reports
• In applications that require periodic reporting, the probability of undelivered reports
should be small.
5. Approximation accuracy
• For function approximation applications (e.g. approximating the temperature as a
function of location for a given area), what is the average/maximum absolute or
relative error with respect to the actual function?
6. Tracking accuracy
• Tracking applications must not miss an object to be tracked, the reported position
should be as close to the real position as possible, and the error should be small.
• Other aspects of tracking accuracy are, for example, the sensitivity to sensing gaps.
Energy efficiency
• The term “energy efficiency” is, in fact, rather an umbrella term for many different aspects of a
system, which should be carefully distinguished to form actual, measurable figures of merit.
27
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
The most commonly considered aspects are:
1. Energy per correctly received bit
➢ How much energy, counting all sources of energy consumption at all possible intermediate
hops, is spent on average to transport one bit of information (payload) from the source to
the destination?
2. Energy per reported (unique) event
➢ what is the average energy spent to report one event?
➢ Since the same event is sometimes reported from various sources, it is usual to normalize
this metric to only the unique events
3. Delay/energy trade-offs
➢ Some applications have a notion of “urgent” events, which can justify an increased energy
investment for a speedy reporting of such events.
➢ Here, the trade-off between delay and energy overhead is interesting.
4. Network lifetime
➢ the time during which it is able to fulfill its tasks
➢ It is not quite clear, however, when this time ends. Possible definitions are:
a) Time to first node death: When does the first node in the network run out of energy
or fail and stop operating?
b) Network half-life: When have 50 % of the nodes run out of energy and stopped
operating?
c) Time to partition: When does the first partition of the network in two (or more)
disconnected parts occur? This can be as early as the death of the first node (if that
was in a pivotal position) or occur very late if the network topology is robust.
5. Time to loss of coverage
➢ each point in the deployment region is observed by multiple sensor nodes
➢ A possible figure of merit is thus the time when for the first time any spot in the
deployment region is no longer covered by any node’s observations.
6. Time to failure of first event notification
➢ A network partition can be seen as irrelevant if the unreachable part of the network does
not want to report any events in the first place
•
The longer these times are, the better does a network perform.
Scalability
• The ability to maintain performance characteristics irrespective of the size of the network is
referred to as scalability.
• The need for extreme scalability has direct consequences for the protocol design.
• Architectures and protocols should implement appropriate scalability support rather than trying
to be as scalable as possible.
• Applications with a few dozen nodes might admit more efficient solutions than applications
with thousands of nodes; these smaller applications might be more common in the first place.
Robustness
• Related to QoS and somewhat also to scalability requirements, wireless sensor networks should
also exhibit an appropriate robustness.
• They should not fail just because a limited number of nodes run out of energy, or because their
environment changes.
28
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
A precise evaluation of robustness is difficult in practice and depends mostly on failure models
for both nodes and communication links.
Design principles for WSN
• Appropriate QoS support, energy efficiency, and scalability are important design and
optimization goals for wireless sensor networks.
• But these goals themselves do not provide many hints on how to structure a network such that
they are achieved.
1. Distributed organization
• Both the scalability and the robustness optimization goal, and to some degree also the other
goals, make it imperative to organize the network in a distributed fashion.
• . That means that there should be no centralized entity in charge – such an entity could, for
example, control medium access or make routing decisions, similar to the tasks performed by a
base station in cellular mobile networks.
• Disadvantage of centralized approach: It introduces exposed points of failure and is difficult to
implement in a radio network, where participants only have a limited communication range.
• The WSNs nodes should cooperatively organize the network, using distributed algorithms and
protocols. Self-organization is a commonly used term for this principle.
• To combine the advantages, one possibility is to use centralized principles in a localized
fashion by dynamically electing, out of the set of equal nodes, specific nodes that assume the
responsibilities of a centralized agent, for example, to organize medium access.
2. In-network processing
• When organizing a network in a distributed fashion, the nodes in the network are not only
passing on packets or executing application programs, they are also actively involved in
taking decisions about how to operate the network.
• It is possible to extend this concept by also taking the concrete data that is to be transported
by the network into account in this information processing, making in-network processing a
first-rank design principle.
I.
Data Aggregation:
• Suppose a sink is interested in obtaining periodic measurements from all sensors, but it
is only relevant to check whether the average value has changed, or whether the
difference between minimum and maximum value is too big.
• In such a case, it is evidently not necessary to transport are readings from all sensors to
the sink, but rather, it suffices to send the average or the minimum and maximum
value.
• Transmitting data is considerably more expensive than even complex computation
shows the great energy-efficiency benefits of this approach.
• The name aggregation stems from the fact that in nodes intermediate between sources
and sinks, information is aggregated into a condensed form out of information provided
by nodes further away from the sink.
29
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
Aggregation of data
II.
Distributed source coding and distributed compression:
• Aggregation condenses and sacrifices information about the measured values in order
not to have to transmit all bits of data from all sources to the sink.
• Is it possible to reduce the number of transmitted bits (compared to simply transmitting
all bits) but still obtain the full information about all sensor readings at the sink?
• It is related to the coding and compression problems known from conventional
networks, where a lot of effort is invested to encode, for example, a video sequence, to
reduce the required bandwidth.
• How can the fact that information is provided by multiple sensors be exploited to help
in coding?
• these sensors are embedded in a physical environment – it is quite likely that the
readings of adjacent sensors are going to be quite similar; they are correlated.
• Such correlation can indeed be exploited such that not simply the sum of the data
must be transmitted but that overhead can be saved here.
III.
Distributed and collaborative signal processing
• The in-networking processing approaches discussed so far have not really used the
ability for processing in the sensor nodes, or have only used this for trivial operations
like averaging or finding the maximum.
• When complex computations on a certain amount of data is to be done, it can still be
more energy efficient to compute these functions on the sensor nodes despite their
limited processing power, if in return the amount of data that has to be communicated
can be reduced.
• An example for this concept is the distributed computation of a Fast Fourier Transform
(FFT) [152]. Depending on where the input data is located, there are different
algorithms available to compute an FFT in a distributed fashion, with different tradeoffs between local computation complexity and the need for communication.
• Such distributed computations are mostly applicable to signal processing type
algorithms; typical examples are beamforming and target tracking applications.
IV.
Mobile code/Agent-based networking
• With the possibility of executing programs in the network, other programming
paradigms or computational models are feasible.
• One such model is the idea of mobile code or agent-based networking.
• The idea is to have a small, compact representation of program code that is small
enough to be sent from node to node.
30
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
This code is then executed locally, for example, collecting measurements, and then
decides where to be sent next.
3. Adaptive fidelity and accuracy
• when more sensors participate in the approximation, the function is sampled at more points and
the approximation is better. But in return for this, more energy has to be invested.
• it is up to an application to somehow define the degree of accuracy of the results (assuming that
it can live with imprecise, approximated results) and it is the task of the communication
protocols to try to achieve at least this accuracy as energy efficiently as possible.
• Moreover, the application should be able to adapt its requirements to the current status of the
network – how many nodes have already failed, how much energy could be scavenged from the
environment, what are the operational conditions (have critical events happened recently), and
so forth.
4. Data centricity
• Address data, not nodes
• In a wireless sensor network, the interest of an application is not so much in the identity of a
particular sensor node, it is much rather in the actual information reported about the physical
environment.
• This fact that not the identity of nodes but the data are at the center of attention is called datacentric networking.
• The set of nodes that is involved in such a data-centric address is implicitly defined by the
property that a node can contribute data to such an address.
• Data-centric networking allows very different networking architectures compared to traditional,
identity-centric networks.
• Also enables simple expressions of communication relationships – it is no longer necessary to
distinguish between one-to-one, one-to-many, many-to-one, or many-to-many relationships as
the set of participating nodes is only implicitly defined.
• Also supports a decoupling in time as a request to provide data does not have to specify when
the answer should happen – a property that is useful for event-detection applications, for
example.
5. Exploit location information
• Another useful technique is to exploit location information in the communication protocols
whenever such information is present.
• Once such information is available, it can simplify the design and operation of communication
protocols and can improve their energy efficiency considerably.
6. Exploit activity patterns
• Once an event has happened, it can be detected by a larger number of sensors, breaking into a
frenzy of activity, causing a well-known event shower effect.
• Hence, the protocol design should be able to handle such bursts of traffic by being able to
switch between modes of quiescence and of high activity.
31
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
7. Exploit heterogeneity
• Related to the exploitation of activity patterns is the exploitation of heterogeneity in the
network.
• Sensor nodes can be heterogenous by constructions, that is, some nodes have larger batteries,
farther-reaching communication devices, or more processing power.
• They can also be heterogenous by evolution, that is, all nodes started from an equal state, but
because some nodes had to perform more tasks during the operation of the network, they have
depleted their energy resources.
• heterogeneity in the network is both a burden and an opportunity
• The opportunity is in an asymmetric assignment of tasks, giving nodes with more resources or
more capabilities the more demanding tasks.
• The burden is that these asymmetric task assignments cannot usually be static but have to be
reevaluated as time passes and the node/network state evolves.
8. Component-based protocol stacks and cross-layer optimization
• Protocol components will also interact with each other in essentially two different ways.
• One is the simple exchange of data packets as they are passed from one component to another
as it is processed by different protocols.
• The other interaction type is the exchange of cross-layer information.
• This possibility for cross-layer information exchange holds great promise for protocol
optimization, but is also not without danger.
• Imprudent use of cross-layer designs can lead to feedback loops, endangering both functionality
and performance of the entire system.
Service interfaces of WSNs
Structuring application/protocol stack interfaces
• a component-based operating system and protocol stack already enables one possibility to treat
an application: It is just another component that can directly interact with other components
using whatever interface specification exists between them (e.g. the command/event structure
of TinyOS).
• This approach has several advantages: streamlined with the overall protocol structure, makes it
easy to introduce application-specific code into the WSN at various levels, and does not require
the definition of an abstract, specific service interface. such a tight integration allows the
application programmer a very fine-grained control over which protocols (which components)
are chosen for a specific task
• But this generality and flexibility is also the potential downside of this approach. The allowing
of the application programmer to mess with protocol stacks and operating system internals
should not be undertaken carelessly.
• Therefore, there is the design choice between treating the application as just another component
or designing a service interface that makes all components, in their entirety, accessible in a
standardized fashion.
• A service interface would allow to raise the level of abstraction with which an application can
interact with the WSN – instead of having to specify which value to read from which particular
sensor, it might be desirable to provide an application with the possibility to express sensing
tasks in terms that are close to the semantics of the application.
32
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
In this sense, such a service interface can hide considerable complexity and is actually
conceivable as a “middleware” in its own right.
Expressibility requirements for WSN service interfaces:
• Support for simple request/response interactions: retrieving a measured value from some sensor
or setting a parameter in some node. This is a synchronous interaction pattern in the sense that
the result (or possibly the acknowledgment) is expected immediately. In addition, the responses
can be required to be provided periodically, supporting periodic measurement-type
applications.
• Support for asynchronous event notifications: a requesting node can require the network to
inform it if a given condition becomes true, for example, if a certain event has happened. This
is an asynchronous pattern in the sense that there is no a priori relationship between the time the
request is made and the time the information is provided.
• Location – all nodes that are in a given region of space belong to a group.
• Observed value – all nodes that have observed values matching a given predicate belong to a
group. An example would be to require the measured temperature to be larger than 20◦ C.
• In-networking processing functionality has to be accessible.
• Any trade-offs regarding the energy consumption of any possible exchange of data packets
should be made explicit as far as possible.
3. Gateway concepts
The need for the gateways
• For practical deployment, a sensor network only concerned with itself is insufficient.
• The network rather has to be able to interact with other information devices, for example, a user
equipped with a PDA moving in the coverage area of the network or with a remote user, trying
to interact with the sensor network via the Internet.
•
The design of gateways becomes much more challenging when considering their logical design.
33
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
One option to ponder is to regard a gateway as a simple router between Internet and sensor
network.
it is the prevalent consensus that WSNs will require specific, heavily optimized protocols.
Thus, a simple router will not suffice as a gateway.
WSN to Internet communication
• Assume that the initiator of a WSN–Internet communication resides in the WSN
•
•
•
•
e, a sensor node wants to deliver an alarm message to some Internet host. The first problem to
solve is akin to ad hoc networks, namely, how to find the gateway from within the network.
If several such gateways are available, how to choose between them?
One option is to build an IP overlay network on top of the sensor network.
An ensuing question is which source address to use here – the gateway in a sense has to
perform tasks similar to that of a Network Address Translation (NAT) device.
Internet to WSN communication
• The case of an Internet-based entity trying to access services of a WSN is even more
challenging.
• This is fairly simple if this requesting terminal is able to directly communicate with the WSN.
• A terminal “far away” requesting the service, not immediately able to communicate with any
sensor node and thus requiring the assistance of a gateway node.
• First of all, again the question of service discovery presents itself – how to find out that there
actually is a sensor network in the desired location, and how to find out about the existence of a
gateway node?
• The requesting terminal can send a properly formatted request to this gateway, which acts as an
application-level gateway or a proxy for the individual/set of sensor nodes that can answer this
request; the gateway translates this request into the proper intrasensor network protocol
interactions.
34
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
WSN Tunneling
In addition to these scenarios describing actual interactions between a WSN and Internet
terminals, the gateways can also act as simple extensions of one WSN to another WSN.
The idea is to build a larger, “virtual” WSN out of separate parts, transparently “tunneling” all
protocol messages between these two networks and simply using the Internet as a transport
network.
This can be attractive, but care has to be taken not to confuse the virtual link between two gateway
nodes with a real link; otherwise, protocols that rely on physical properties of a communication
link can get quite confused (e.g. time synchronization or localization protocols).
Such tunnels need not necessarily be in the form of fixed network connections; even mobile
nodes carried by people can be considered as means for intermediate interconnection of WSNs
also studies a similar problem in a more general setting.
35
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
UNIT II
PART 1
Medium Access Control Protocols for WSN
•
•
•
•
•
•
•
•
•
•
•
•
•
Communication among wireless sensor nodes is usually achieved by means of a unique
channel.
It is the characteristic of this channel that only a single node can transmit a message at any
given time.
Therefore, shared access of the channel requires the establishment of a MAC protocol among
the sensor nodes.
The objective of the MAC protocol is to regulate access to the shared wireless medium such that the
performance requirements of the underlying application are satisfied.
Open Systems Interconnection (OSI) Reference Model (OSIRM)
the MAC protocol functionalities are provided by the lower sublayer of the data link layer
(DLL).
The higher sublayer of the DLL is referred as the logical link control (LLC) layer.
The subdivision of the data link layer accommodates the logic required to manage access to a
shared access communications medium.
The physical layer (PHY) functions:
A specification of the transmission medium and the topology of the network.
Defines the procedures and functions that must be performed by the physical device and the
communications interface to achieve bit transmission and reception.
Coordinates the various functions necessary to transmit a stream of bits over the wireless
communication medium.
The encoding and decoding of signals, preamble generation and removal to achieve
synchronization, and the transmission and reception of bits.
The MAC sublayer functions:
The assembly of data into a frame for transmission by appending a header field containing
addressing information and a trailer field for error detection.
The disassembly of a received frame to extract addressing and error control information to
perform address recognition and error detection and recovery.
36
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
The regulation of access to the shared transmission medium in a way commensurate with the
performance requirements of the supported application.
Fundamentals of MAC protocols
•
•
•
•
•
•
•
•
•
•
•
To reach agreement as to which node can access the communication channel at any given time,
the nodes must exchange some amount of coordinating information.
The exchange of this information, however, typically requires use of the communication
channel itself.
This recursive aspect of the multiaccess medium problem increases the complexity of the
access control protocol.
Any information explicitly or implicitly gathered by any node is at least as old as the time
required for its propagation through the communication channel.
Two main factors, the intelligence of the decision made by the access protocol and the
overhead involved, influence the aggregate behavior of a distributed multiple access protocol.
A trade-off between these two factors must be made.
Determining the nature and extent of information used by a distributed multipleaccess protocol
is a difficult task, but potentially a valuable one.
The information can be:
a. Predetermined: known to all communicating nodes.
b. Dynamic global: acquired by different nodes during protocol operation.
c. Local: known to individual nodes.
Predetermined and dynamic global information may result in efficient, potentially perfect
coordination among the nodes.
However, there usually is a high price to pay in terms of wasted channel capacity.
The use of local information has potential to reduce the overhead required to coordinate the
competing nodes, but may result in poor overall performance of the protocol.
Performance Requirements
1. Delay:
• refers to the amount of time spent by a data packet in the MAC layer before it is transmitted
successfully.
• depends not only on the network traffic load, but also on the design choices of the MAC
protocol.
• For time-critical applications, the MAC protocol is required to support delay-bound guarantees
necessary for these applications to meet their QoS requirements.
• Two types of delay guarantees can be identified, probabilistic and deterministic.
• Probabilistic delay guarantees are typically characterized by an expected value, a variance and a
confidence interval.
• Deterministic delay guarantees ensure a predictable number of state transitions between
message arrival and message transmission.
2. Throughput:
• y defined as the rate at which messages are serviced by a communication system.
• It is usually measured either in messages per second or bits per second.
37
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
3.
•
•
•
•
In wireless environments it represents the fraction of the channel capacity used for data
transmission.
Throughput increases as the load on the communication system increases initially.
After the load reaches a certain threshold, the throughput ceases to increase, and in some cases,
it may start to decrease.
An important objective of a MAC protocol is to maximize the channel throughput while
minimizing message delay.
Robustness
defined as a combination of reliability, availability, and dependability requirements
reflects the degree of the protocol insensitivity to errors and misinformation.
is a multidimensional activity that must simultaneously address issues such as error
confinement, error detection and masking, reconfiguration, and restart.
it depends strongly on the failure models of both the links and the communicating nodes.
4. Scalability
• refers to the ability of a communications system to meet its performance characteristics
regardless of the size of the network or the number of competing nodes.
• A common approach to achieve scalability is to avoid relying on globally consistent network
states
• Another approach is to localize interactions among the communicating nodes, through the
development of hierarchical structures and information aggregation strategies.
5. Stability
• refers to the ability of a communications system to handle fluctuations of the traffic load over
sustained periods of time.
• A stable MAC protocol, for example, must be able to handle instantaneous loads which exceed
the maximum sustained load as long as the long-term load offered does not exceed the
maximum capacity of the channel.
• the scalability of a MAC protocol is studied with respect to either delay or throughput.
• A MAC protocol is considered to be stable, with respect to delay, if the message waiting time is
bounded.
• a MAC protocol is stable if the throughput does not collapse as the load offered increases.
6. Fairness
• A MAC protocol is considered to be fair if it allocates channel capacity evenly among the
competing communicating nodes without unduly reducing the network throughput.
• To accommodate heterogeneous resource demands, communicating nodes are assigned
different weights to reflect their relative resource share.
• Proportional fairness is then achieved based on the weights assigned.
• A MAC protocol is considered to be proportionally fair if it is not possible to increase the
allocation of any competing node without reducing the service rate of another node below its
proportional fair share.
38
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
7. Energy efficiency
• A sensor node is equipped with one or more integrated sensors, embedded processors with
limited capability, and short-range radio communication ability.
• These sensor nodes are powered using batteries with small capacity.
• , recharging sensor batteries by energy scavenging is complicated and volatile.
• One possible approach to reducing energy consumption at a sensor node is to use low-power
electronics.
• Energy efficiency is one of the most important issues in the design of MAC protocol for
wireless sensor nodes.
• Several sources contribute to energy inefficiency in MAC-layer protocols:
a. Collision: occurs when two or more sensor nodes attempt to transmit simultaneously.
The need to retransmit a packet that has been corrupted by a collision increases energy
consumption.
b. Idle listening: A sensor node enters this mode when it is listening for a traffic that is
not sent.
c. Overhearing: occurs when a sensor node receives packets that are destined to other
nodes. Due to their low transmitter output, receivers in sensor nodes may dissipate a
large amount of power.
d. Control packet overhead: Control packets are required to regulate access to the
transmission channel. A high number of control packets transmitted, relative to the
number of data packets delivered indicates low energy efficiency.
e. Frequent switching: frequent switching between different operation modes may result
in significant energy consumption. Limiting the number of transitions between sleep
and active modes, for example, leads to considerable energy saving.
COMMON PROTOCOLS
•
•
The choice of the MAC method is the major determining factor in the performance of a WSN.
These strategies can be classified in three major categories: fixed assignment, demand
assignment, and random assignment.
1.
Fixed assignment:
In fixed-assignment strategies, each node is allocated a predetermined fixed amount of the
channel resources.
Each node uses its allocated resources exclusively without competing with other nodes.
Typical protocols that belong in this category include frequency-division multiple access
(FDMA), time-division multiple access (TDMA), and code-division multiple access (CDMA)
a. FDMA:
• The FDMA scheme is used by radio systems to share the radio spectrum.
• Based on this scheme, the available bandwidth is divided into subchannels.
• Multiple channel access is then achieved by allocating communicating nodes with
different carrier frequencies of the radio spectrum.
• The bandwidth of each node’s carrier is constrained within certain limits such that no
interference, or overlap, occurs between different nodes.
•
•
•
39
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
The scheme requires frequency synchronization among communicating nodes.
Communication is achieved by having the receiver tune to the channel used by the
transmitter.
b. TDMA:
• TDMA is digital transmission technology that allows a number of communicating nodes
to access a single radio-frequency channel without interference.
• This is achieved by dividing the radio frequency into time slots and then allocating
unique time slots to each communicating node.
• Nodes take turns transmitting and receiving in a round-robin fashion. It is worth noting,
however, that only one node is actually using the channel at any given time for the
duration of a time slot.
c. CDMA:
• CDMA is a spread spectrum (SS)–based scheme that allows multiple communicating
nodes to transmit simultaneously.
• Spread spectrum is a radiofrequency modulation technique in which the radio energy is
spread over a much wider bandwidth than that needed for the data rate.
• Systems based on spread spectrum technology transmit an information signal by
combining it with a noise like signal of a much larger bandwidth to generate a wideband
signal.
• Consequently, the signal transmitted occupies a larger bandwidth than that normally
required to transmit the original information. Using wideband noise like signals makes
it hard to detect, intercept, or demodulate the original signal.
2.
•
•
•
•
•
•
Demand Assignment Protocols:
The main objective of demand assignment protocols is to improve channel utilization by
allocating the capacity of the channel to contending nodes in an optimum or near-optimum
fashion.
Unlike fixed-assignment schemes, where channel capacity is assigned exclusively to the
network nodes in a predetermined fashion regardless of their current communication needs,
demand assignment protocols ignore idle nodes and consider only nodes that are ready to
transmit.
The channel is allocated to the node selected for a specified amount of time, which may vary
from a fixed-time slot to the time it takes to transmit a data packet.
Demand assignment protocols typically require a network control mechanism to arbitrate
access to the channel between contending nodes.
Furthermore, a logical control channel, other than the data channel, may be required for
contending stations to dynamically request access to the communication medium.
Demand assignment protocols may be further classified as centralized or distributed. Polling
schemes are representative of centralized control, whereas token- and reservation-based
schemes use distributed control.
a. Polling:
• A widely used demand assignment scheme is polling. In this scheme, a master control
device queries, in some predetermined order, each slave node about whether it has data
to transmit.
40
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
•
If the polled node has data to transmit, it informs the controller of its intention to
transmit. In response, the controller allocates the channel to the ready node, which uses
the full data rate to transmit its traffic.
If the node being polled has no data to transmit, it declines the controller’s request. In
response, the controller proceeds to query the next network node.
The main advantage of polling is that all nodes can receive equal access to the channel.
Preference can, however, be given to high-priority nodes by polling them more often.
The major drawback of polling is the substantial overhead caused by the large number
of messages generated by the controller to query the communicating nodes.
The efficiency of the polling scheme depends on the reliability of the controller.
b. Reservation:
• The basic idea in a reservation-based scheme is to set some time slots for carrying
reservation messages. Since these messages are usually smaller than data packets, they
are called minislots.
• When a station has data to send, it requests a data slot by sending a reservation message
to the master in a reservation minislot. In some schemes, such as in fixed-priorityoriented demand assignment, each station is assigned its own minislot.
• In other schemes, such as in packet demand assignment multiple access, stations
contend for access to a minislot using one of the distributed packet-based contention
schemes, such as slotted ALOHA.
• When the master receives the reservation request, it computes a transmission schedule
and announces the schedule to the slaves.
• In a reservation-based scheme, if each station has its own reservation minislot, collision
can be avoided. Moreover, if reservation requests have a priority field, the master can
schedule urgent data before delay-insensitive data.
3.
•
•
•
•
•
Random Assignment Protocols:
Random assignment strategies do not exercise any control to determine which communicating
node can access the medium next.
Furthermore, these strategies do not assign any predictable or scheduled time for any node to
transmit.
All backlogged nodes must contend to access the transmission medium.
Collision occurs when more than one node attempts to transmit simultaneously.
To deal with collisions, the protocol must include a mechanism to detect collisions and a
scheme to schedule colliding packets for subsequent retransmissions.
a. ALOHA:
• ALOHA is a simple random assignment protocol developed to regulate access to a
shared transmission medium among uncoordinated contending users.
• The protocol was originally developed for ground-based packet broadcasting networks
and was used to connect remote users to mainframe computers.
• Channel access in pure ALOHA is completely asynchronous and independent of the
current activity on the transmission medium.
41
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
•
•
A node is simply allowed to transmit data whenever it is ready to do so. Upon
completing the data transmission, the communicating node listens for a period of time
equal to the longest possible round-trip propagation time on the network.
This is typically the time it takes for the signal to travel between the two most distant
nodes in the network.
If the node receives an acknowledgment for data transmitted before this period of time
elapses, the transmission is considered successful.
The acknowledgment is issued by the receiving station after it determines the
correctness of the data received by examining the error check sum.
In the absence of an acknowledgment, however, the communicating node assumes that
the data are lost due to errors caused by noise on the communication channel or because
of collision, and retransmits the data.
If the number of transmission attempts exceeds a specified threshold, the node refrains
from retransmitting the data and reports a fatal error.
b. Slotted ALOHA:
• ALOHA is simple protocol that requires no central control, thereby allowing nodes to
be added and removed easily.
• Furthermore, under light-load conditions, nodes can gain access to the channel within
short periods of time.
• The main drawback of the protocol, however, is that network performance degrades
severely as the number of collisions rises rapidly with increased load.
• To improve the performance of pure ALOHA, slotted ALOHA was proposed. In this
scheme, all communication nodes are synchronized and all packets have the same
length.
• Furthermore, the communication channel is divided into uniform time slots whose
duration is equal to the transmission time of a data packet.
• Contrary to pure ALOHA, transmission can occur only at a slot boundary.
Consequently, collision can occur only in the beginning of a slot, and colliding packets
overlap totally in time.
c. CSMA:
• Despite this performance improvement, however, ALOHA and pure ALOHA remain
inefficient under moderate to heavy load conditions.
• This observation led to the development of a new class of media access schemes,
whereby before a transmission is attempted, a station that has a packet to transmit first
‘‘listens’’ to the channel to determine if it is busy. Carrier sensing forms the basis of
the CSMA protocol.
• CSMA operates both in continuous time, unslotted CSMA, and in discrete time, slotted
CSMA.
• Furthermore, the class of CSMA protocols can be divided into two categories,
nonpersistent CSMA and persistent CSMA, depending on the strategy used to acquire
a free channel and the strategy used to wait for a busy channel to become free.
• In nonpersistent CSMA protocol, when a node becomes ready to transmit a packet, it
first senses the carrier to determine if another transmission is in progress. If the
42
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
•
•
•
channel is idle, the node transmits its packet immediately and waits for an
acknowledgment.
In setting the acknowledgment timeout value, the node must take into account the
round-trip propagation delay and the fact that the receiving node must also contend for
the channel to transmit the acknowledgment.
Estimating the average contention time required for a successful transmission is
difficult, as it depends on the traffic load and the number of stations contending.
In the absence of an acknowledgment, before a timeout occurs, the sending node
assumes that the data packet is lost due to collision or noise interference.
The station schedules the packet for retransmission.
If the channel is busy, the transmitting node ‘‘backs off’’ for a random period of time
after which it senses the channel again.
Depending on the status of the channel, the station transmits its packet if the channel is
idle, or enters the back-off mode if the channel is busy.
This process is repeated until the data packet is transmitted successfully.
d. CSMA/CD:
• The CSMA scheme and its variants can result in smaller average delays and higher
throughput than with the ALOHA protocols.
• The main drawback of CSMA-based schemes, however, is that contending stations
continue transmitting their data packets even when collision occurs.
• To overcome the shortcomings of CSMA-based schemes and further reduce the
collision interval, networks using CSMA/CD extend the capabilities of a
communicating node to listen while transmitting.
• This allows the node to monitor the signal on the channel and detect a collision when it
occurs. More specifically, if a node has data to send, it first listens to determine if there
is an ongoing transmission over the communication channel.
• In the absence of any activity on the channel, the node starts transmitting its data and
continues to monitor the signal on the channel while transmitting.
• If an interfering signal is detected over the channel, the transmitting station immediately
aborts its transmission.
• This reduces the amount of bandwidth wasted due to collision to the time it takes to
detect a collision. When a collision occurs, each contending station involved in the
collision waits for a time period of random length before attempting to retransmit the
packet.
• The length of time that a colliding node waits before it schedules packet retransmission
is determined by a probabilistic algorithm, referred to as the truncated binary
exponential back-off algorithm. The algorithm derives the waiting time after collision
from the slot time and the current number of attempts to retransmit.
• The major drawback of CSMA/CD is the need to provision sensor nodes with
collision detection capabilities.
e. CSMA/CA:
• A Carrier sensing prior to transmission is an effective approach to increase the
throughput efficiency in shared-medium access environments.
43
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
Although applicable in wireless environments, the scheme is susceptible to two
problems, commonly referred to as the hidden- and exposed-node problems.
1. Hidden Node:
➢ A hidden node is defined as a node that is within the range of the destination node
but out of range of the transmitting node.
➢ To illustrate this example, consider Figure 5.2, where node B is within the
transmission range of nodes A and C. Assume that nodes A and C are outside their
mutual transmission ranges. Consequently, any transmission from either of the two
nodes will not reach the other node. Given this network configuration, assume that
node A needs to transmit a data packet to node B. According to the CSMA protocol,
node A senses the channel and determines that it is free. Node A then proceeds to
transmit its packet. Assume now that before node A completes its transmission to
node B, node C decides to transmit a data packet to node B. Using the CSMA
protocol, node C senses the channel and also determines that the channel is free,
since node C, which is outside the transmission range of node A, cannot hear the
signal transmitted by node A. As a result, both transmissions collide at node B,
thereby causing the loss of both data packets. Notice that neither node A nor node C
is aware of the collision, since it happens at the receiver.
Exposed Node:
➢ The exposed-node problem is also the result of the intrinsic property of the wireless
channel. An exposed node is a node that is within the range of the sender but out of
the range of the destination.
➢ To illustrate the exposed-node problem, consider the network depicted in Figure 5.3,
where node B is within the transmission range of nodes A and C, nodes A and C are
outside their mutual transmission ranges, and node D is within the transmission
range of node C. Assume that node B wants to transmit a message to node A. Node
B executes the CSMA protocol to sense the channel, determines that the channel is
free, and proceeds to transmit the data packet to node A. Assume now that node C
needs to send a packet to D. Node C follows the CSMA rule and first senses the
channel. Due to the ongoing transmission between nodes B and A, node C
determines that the channel is busy and delays the transmission of its packet to a
later time. It is clear, however, that this delay is unnecessary, since the transmission
from node C to node D would have been completed successfully, as node D is
outside the range of node B.
2.
44
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
Several approaches have been proposed to eliminate, or at least reduce, the impact of the
hidden- and exposed-node problems on the network throughput.
1. First approach: Based on the use of a busy tone
➢ The basic idea of the busy-tone approach stems from the observation that collisions
occur at the receiving node whereas CSMA is performed at the transmission node.
➢ The busy-tone approach requires the use of two separate channels: a data channel and a
control channel. The data channel is used to transmit data exclusively. The control
channel is used by the receiver to signal to the remaining nodes in the network that it is
in the process of receiving data.
➢ Immediately after the node starts to receive a data packet, which carries its address in
the destination address field, the node initiates the emission of an unmodulated wave on
the control channel, indicating that its receiver is busy.
➢ The node continues to transmit the busy tone at the same time that it is receiving the
data packet until the packet is fully received.
➢ Before transmitting a data packet, the sending node must first sense the control channel
for the presence of a busy tone. The node proceeds to transmit the data packet only if
the control channel is free.
➢ Otherwise, the sending node defers its transmission until the control channel is no
longer busy.
Advantage: The busy-tone approach solves both the hidden- and exposed-node problems,
assuming that the busy-tone signal is emitted at a level such that it is not too weak not to
be heard by a node within the range of a receiver and not too strong to force more nodes
than necessary to suppress their transmissions.
Drawback: A node’s need to operate in duplex mode, to be able to transmit and receive
simultaneously. This requirement increases the design complexity of a node significantly,
thereby increasing its cost and power consumption.
2. Second approach: Ready-to-send (RTS), Clear-to-send (CTS) handshake
➢ When a node intends to transmit a data packet, it first senses the carrier to determine if
another node is already transmitting.
➢ If no other transmissions are sensed, the node sends a short RTS packet to the intended
recipient of the data packet.
➢ If the recipient is, in fact, idle and senses that the medium is clear, it sends a short CTS
packet in reply.
➢ Upon receiving the CTS packet, the transmitting node sends the actual data packet to its
intended recipient.
45
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
➢ If after a predetermined period of time, the transmitting station does not receive a CTS
packet in reply to its RTS packet, it waits a random period of time before repeating the
RTS/CTS handshake procedure.
➢ In this scenario, node B intends to transmit a data packet to node C. It senses the
carrier to determine if any other node is already transmitting.
➢ After it determines that the channel is free, it transmits a RTS packet.
➢ In addition to the destination address, the packet also contains the duration field,
which indicates the time necessary to complete the transmission of the packet and
the receipt of the corresponding acknowledgment.
➢ In response, the intended recipient of the packet, node C in this case, transmits a
CTS packet, which contains the remaining time until the completion of the
transmission.
➢ Upon receiving the RTS packet, station A sets an internal timer to the remaining
time until completion of the data packet transmission and avoids transmitting any
packet until the timer expires.
➢ When node B receives the CTS packet, it proceeds to transmit its data packet.
➢ Upon receiving the CTS packet, node D sets an internal timer to the remaining time
until completion of the data and defers the transmission of any packets until the
timer expires.
MAC PROTOCOLS FOR WSNS
•
•
•
•
•
The need to conserve energy is the most critical issue in the design of scalable and stable MAC
layer protocols for WSNs.
Several factors contribute to energy waste, including excessive overhead, idle listening, packet
collisions, and overhearing.
Regulating access to the media requires the exchange of control and synchronization
information among the competing nodes. The explicit exchange of a large number of these
control and synchronization packets may result in significant energy consumption.
Long periods of idle listening may also increase energy consumption and decrease network
throughput its lifetime.
The retransmission of colliding packets is yet another source of significant energy waste.
46
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
A high number of these collisions may lead to severe performance degradation of the MAClayer protocol.
Excessive overhearing causes a node to receive and decode packets intended for other sensor
nodes, unnecessarily increases energy consumption and can severely degrade the network
throughput.
The main objective of most MAC-layer protocols is to reduce energy waste caused by
collisions, idle listening, overhearing, and excessive overhead.
These protocols can be categorized into two main groups: schedule- and contention-based
MAC-layer protocols.
➢ Scheduled based MAC layer:
➢ A class of deterministic MAC layer protocols in which access to the channel is based on
a schedule. Channel access is limited to one sensor node at a time.
➢ This is achieved based on pre allocation of resources to individual sensor nodes.
➢ Contention-based MAC-layer protocols:
➢ Avoid pre allocation of resources to individual sensors. Instead, a single radio channel is
shared by all nodes and allocated on demand.
➢ Simultaneous attempts to access the communications medium, however, results in
collision.
➢ The main objective of contention-based MAC layer protocols is to minimize, rather than
completely avoid, the occurrence of collisions.
• To reduce energy consumption, these protocols differ in the mechanisms used to reduce the
likelihood of a collision while minimizing overhearing and control traffic overhead.
Schedule-Based Protocols
• Schedule-based MAC protocols for WSNs assume the existence of a schedule that regulates
access to resources to avoid contention between nodes.
• Typical resources include time, a frequency band, or a CDMA code.
• The main objective of schedule-based MAC protocols is to achieve a high level of energy
efficiency in order to prolong the network lifetime. Other attributes of interest include
scalability, adaptability to changes in traffic load, and network topology.
• Most of the scheduled-based protocols for WSNs use a variant of a TDMA scheme whereby the
channel is divided into time slots.
• A set of N contiguous slots, where N is a system parameter, form a logical frame. This logical
frame repeats cyclically over time. In each logical frame, each sensor node is assigned a set of
specific time slots. This set constitutes the schedule according to which the sensor node
operates in each logical frame.
• Based on its assigned schedule, a sensor alternates between two modes of operation: active
mode and sleep mode.
• In the active mode, the sensor uses its assigned slots within a logical frame to transmit and
receive data frames.
• Outside their assigned slots, sensor nodes move into sleep mode. In this mode the sensor nodes
switch their radio transceivers off to conserve energy.
47
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
1. Self-Organizing Medium Access Control for Sensornets (SMACS):
• SMACS is a medium access control protocol to enable the formation of random network
topologies without the need to establish global synchronization among the network nodes.
• A key feature of SMACS is its use of a hybrid TDMA/FH method referred to as
nonsynchronous scheduled communication to enable links to be formed and scheduled
concurrently throughout the network.
• Each node in the network maintains a TDMA-like frame, referred to as a superframe, for
communication with known neighbors. The length of a superframe is fixed.
• SMACS requires that each node regularly execute a neighborhood discovery procedure to
detect neighboring nodes.
• Each node establishes a link to each neighbor discovered by assigning a time slot to this
link.
• The selection of time slots is such that the node talks only to neighbors at each time slot.
• However, since a node and its neighbors are not required to transmit at different slot times,
the link establishment procedure must ensure that no interference occurs between adjacent
links.
• This is achieved by randomly assigning a channel, selected from a large number of
channels (FDMA), or spreading code (CDMA) to each link.
METHODS OF LOCATION DISOVERY:
a. Indoor localization
• Uses a fixed infrastructure.
• Beacon nodes are placed in the field of observation.
• Beacon node is a special node with a bright light or floating object which sends signals to
other nodes. Fixed beacon nodes are typically places in indoors.
• From beacon nodes, distributed sensors receive beacon signals and they measures strength
of signal arrival angle and time difference between the arrival of different beacon signals.
• With the help of the measurements from different multiple beacons, the nodes estimate their
corresponding location.
• Instead of performing computations, the nodes estimate distances by looking into the
database.
• Only base station may carry the database because at each node storage of database is
impossible.
48
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
b.
•
•
•
•
Sensor network localization:
Some sensor nodes act as beacons in situation where no fixed infrastructure is available.
Using GPS, the beacon nodes have information of their location and they send periodic
beacons to other nodes.
Received signal strength indicator is used to estimate distance if RF signal is used in
communication.
For estimation of location depending on beacon nodes location some localization
techniques are required called multi lateration techniques.
Multi lateration techniques:
1. Atomic ML: If node in network receives three beacons, node can find its location by
mechanism similar to GPS.
2. Iterative ML: Some nodes are out of the range of three beacons. The node who finds its
location, transmits beacon and helps the other to find their location. The process goes on
iteratively.
3. Collaborative ML: When more than one node do not get at least three beacons each, such
nodes collaborate with each other.
2. Bluetooth:
• Bluetooth is an emerging technology whose primary media access control is a centralized
TDMA-based protocol.
• Bluetooth is designed to replace cables and infrared links used to connect disparate
electronic devices such as cell phones, headsets, PDAs, digital cameras, notebook
computers, and their peripherals with one universal short-range radio link.
• Bluetooth operates in the 2.45-GHz ISM frequency band. Its physical layer is based on a
pseudorandom frequency-hopping scheme with a hopping frequency of 1.6 kHz and a
scheme for hopping sequence allocation.
• A set of 79 hop carriers are defined with 1-MHz spacing. Each hop sequence defines a
Bluetooth channel, which can support 1 Mbps.
PICONET:
•
•
•
•
•
•
•
•
•
A group of devices sharing a common channel is called a piconet.
Each piconet has a master unit which controls access to the channel, and at most seven
slave devices as group participants.
Each channel is divided into 625-ms slots.
Each piconet is assigned a unique frequency-hopping pattern determined by the master’s
Bluetooth device address (48 bits) and clock.
All slave devices follow their piconet assigned hopping sequence.
Different piconets use different hopping sequences, thereby guaranteeing their coexistence.
Within a piconet, the master assigns each slave device a unique internal address of 3 bits.
Access to the channel is regulated using a slotted time-division duplex (TDD) protocol in
which the master uses a polling protocol to allocate time slots to slave nodes.
A Bluetooth frame, representing one polling epoch, consists of two slots during which a
packet can be exchanged between the piconet master and the slave being polled.
49
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
SCATTERNETS:
•
Piconets can be interconnected, via bridge nodes, to form larger ad hoc networks, referred
to as scatternets.
MODES IN BLUETOOTH:
• To reduce energy consumption, Bluetooth specifies four operational modes: active, sniff,
hold, and park
1. In the active mode, the slave listens for packet transmission from the master. On
receiving a packet, it checks the address and packet length field of the packet header.
If the packet does not contain its own address, the slave sleeps for the duration of the
remaining packet transmission. The intended slave, however, remains active and
receives the packet payload in the following reserved slot.
2. The sniff mode is intended to reduce the duty cycle of a slave’s listen activity. In
this mode, the master transmits to the slave only in specified periodic time slots
within a predefined sniff time interval. A slave in sniff mode listens for the master
transmissions only during the specified time slots for any possible transmission to
it.
3. In the hold mode, a slave goes into the sleep mode for a specified amount of time,
referred to as the hold time. When the hold time expires, the slave returns to the
active mode.
4. In the park mode, the slave stays in the sleep state for an unspecified amount of
time. The master has to awake the slave explicitly and bring it into the active
mode at a future time.
TYPES OF COMMUNICATIONS:
a. Intra piconet unicast, for slave-to-slave communication within a piconet
b. Intra piconet broadcast, to support broadcasting by a slave to all participants within its
piconet
c. Inter piconet unicast, for piconet-to-piconet communications
d. Inter piconet broadcast, for piconet-to-all scatternet node communications
3. Low-Energy Adaptive Clustering Hierarchy (LEACH)
• LEACH takes a hierarchical approach and organizes nodes into clusters.
• Within each cluster, nodes take turns to assume the role of a cluster head. LEACH uses
TDMA to achieve communication between nodes and their cluster head.
• The cluster head forwards to the base station messages received from its cluster nodes.
• The cluster head node sets up a TDMA schedule and transmits this schedule to all nodes in
its cluster. The schedule prevents collisions among data messages.
• Furthermore, the schedule can be used by the nodes to determine the time slots during
which they must be active.
• This allows each cluster node, except for the head cluster, to turn off their radio
components until its allocated time slots.
50
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
LEACH assumes that cluster nodes start the cluster setup phase at the same time and
remain synchronized thereafter.
One possible mechanism to achieve synchronization is to have the base station send out
synchronization pulses to the all the nodes.
CLUSTER NODES TO CLUSTER HEAD:
• To reduce intercluster interference, LEACH uses a transmitter-based code assignment
scheme.
• Communications between a node and its cluster head are achieved using direct-sequence
spread spectrum (DSSS), whereby each cluster is assigned a unique spreading code, which
is used by all nodes in the cluster to transmit their data to the cluster head.
• Spreading codes are assigned to cluster heads on a first-in, first-served basis, starting with
the first cluster head to announce its position, followed by subsequent cluster heads.
• Nodes are also required to adjust their transmit powers to reduce interference with nearby
clusters.
CLUSTER HEAD TO BASE STATION:
• Upon receiving data packets from its cluster nodes, the cluster head aggregates the data
before sending them to the base station.
• The communication between a cluster head and a base station is achieved using fixed
spreading code and CSMA.
• Before transmitting data to the base station, the cluster head must sense the channel to
ensure that no other cluster head is currently transmitting data using the base station
spreading code.
• If the channel is sensed busy, the cluster head delays the data transmission until the channel
becomes idle. When this event occurs, the cluster head sends the data using the base station
spreading code.
ADVANTAGES OF SCHEDULED BASED PROTOCOLS:
• schedule-based protocols are contention-free, and as such, they eliminate energy waste
caused by collisions.
• sensor nodes need only turn their radios on during those slots where data are to be
transmitted or received.
• . In all other slots, the sensor node can turn off its radio, thereby avoiding overhearing.
• This results in low-duty-cycle node operations, which may extend the network lifetime
significantly.
DISADVANTAGES OF SCHEDULED BASED PROTOCOLS:
• The use of TDMA requires the organization of nodes into clusters. This hierarchical
structure often restricts nodes to communicate only with their cluster head.
• peer-to-peer communication cannot be supported directly, unless nodes are required to listen
during all time slots.
• time synchronization among distributed sensor nodes is difficult and costly, especially in
energy-constrained wireless networks.
51
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
also require additional mechanisms such as FDMA or CDMA to overcome intercluster
communications and interference.
TDMA-based MAC-layer protocols have limited scalability and are not easily adaptable to
node mobility and changes in network traffic and topology.
Random Access Based Protocols:
• Traditional random-access MAC-layer protocols, also known as contention-based
protocols, require no coordination among the nodes accessing the channel.
• These protocols, however, are not well suited for WSN environments.
• The enhancement of these protocols with collision avoidance and request-to-send (RTS)
and clear-to-send (CTS) mechanisms improves their performance and makes them more
robust to the hidden terminal problem.
• The energy efficiency of contention-based MAC-layer protocols, however, remains low
due to collisions, idle listening, overhearing, and excessive control overhead.
• To address this shortcoming, efforts in the design of random-access MAC-layer protocols
focused on reducing energy waste in order to extend the network lifetime.
1. Sparse topology and energy management (STEM) protocol:
• The sparse topology and energy management (STEM) protocol trades latency for energy
efficiency.
• This is achieved using two radio channels: a data radio channel and a wake-up radio
channel.
• A variant of STEM uses a busy tone instead of encoded data for the wake-up signal.
• STEM is known as a pseudo asynchronous scheduled scheme.
• Based on this scheme, a node turns off its data radio channel until communication with
another node is desired.
• When a node has data to transmit, it begins transmitting on the wake-up radio channel.
• The wake-up signal channel acts like a paging signal.
• The transmission of this signal lasts long enough to ensure that all neighboring nodes are
paged.
• When a node is awakened from its sleeping mode, it may remain awake long enough to
receive a ‘‘session’’ of packets.
• A node can also be awakened to receive all of its pending packets before going into the
sleep mode again.
• The STEM protocol is general and can be used in conjunction with other MAC-layer
scheduling protocols.
• The scheme is, however, effective only in network environments where events do not
happen very frequently.
• If events occur frequently, the energy wasted by continuously transmitting wake-up signals
may offset, or may exceed, the energy gained in sleeping modes.
2. IEEE 802.11:
• A variety of IEEE 802.11-inspired contention-based protocols prevent overhearing by using
RTS and CTS packets.
52
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
A common feature of these protocols is to use the overhearing of RTS and CTS packet
exchange between two other contending nodes to force a contending node to go into sleep
mode.
These protocols also rely on synchronized schedules between neighboring nodes to avoid
idle listening. These protocols differ in the way they maintain low duty cycles and the way
they achieve energy efficiency, especially when the size of the data packets is of the same
order of magnitude as the size of the RTS and CTS packets.
They also differ in the mechanisms used to reduce packet latency, as a sending node may
have to wait a significant period of time before the receiver wakes up.
Finally, the protocols also differ in the level and the way in which they achieve fairness
among nodes.
3. Timeout-MAC (T-MAC):
• The timeout-MAC (T-MAC) is a contention-based MAC-layer protocol designed for
applications characterized by low message rate and low sensitivity to latency.
• To avoid collision and ensure reliable transmission, T-MAC nodes use RTS, CTS, and
acknowledgment packets to communicate with each other.
• the protocol uses an adaptive duty cycle to reduce energy consumption and adapt to traffic
load variations.
• The basic idea of the T-MAC protocol is to reduce idle listening by transmitting all
messages in bursts of variable length. Nodes are allowed to sleep between bursts.
• Based on the T-MAC protocol, nodes alternate between sleep and wake-up modes. Each
node wakes up periodically to communicate with its neighbors.
• A node keeps listening and potentially transmitting as long as it is in the active period. An
active period ends when no active event occurs for a predetermined time interval.
• Active events include the hearing of a periodic frame timer, the reception of data over the
radio, the sensing of an activity such as collision on the channel, the end of transmission of a
node’s own data packet or acknowledgment, and the end of a neighboring node’s data
exchange, determined through overhearing of prior RTS and CTS packets.
• At the end of the active period, the node goes into sleep mode.
4. Berkeley media access control (B-MAC):
• The Berkeley media access control (B-MAC) is a lower-power carrier-sense media access
protocol for WSNs.
• B-MAC uses clear channel assessment (CCA) and packet back-offs for channel arbitration,
link-layer acknowledgments for reliability, and listening for low-power communication.
• B-MAC does not provide direct support for multipacket mechanisms to address the hidden
terminal problem, handle message fragmentation, or enforce a particular low-power policy.
• However, in addition to the standard message interface, provides, B-MAC, a set of
interfaces that allow services to tune its operation. By exposing a set of configurable
mechanisms, protocols built on B-MAC make local policy decisions to optimize power
consumption, latency, throughput, fairness, or reliability.
• To achieve low-power operation, B-MAC employs an adaptive preamble sampling scheme
to reduce duty cycle and minimize idle listening.
• Each time the node wakes up, it turns on the radio and checks for activity.
53
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
If it detects activity, the node powers its radio transceiver up and stays awake for the time
required to receive the incoming packet.
After reception, the node returns to sleep.
If no packet is received within the specified timeout, the node goes to sleep. B-MAC
supports on the-fly reconfiguration and provides bidirectional interfaces for system services
to optimize performance, whether it is for throughput, latency, or power conservation.
SENSOR-MAC CASE STUDY
• The sensor-MAC (S-MAC) protocol is designed explicitly to reduce energy waste caused by
collision, idle listening, control overhead, and overhearing.
• The goal is to increase energy efficiency while achieving a high level of stability and
scalability.
• In exchange, the protocol incurs some performance reduction in per-hop fairness, and
latency S-MAC uses multiple techniques to reduce energy consumption, control overhead,
and latency, in order to improve application-level performance
PROTOCOL OVERVIEW:
• The protocol design assumes a large number of sensor nodes, with limited storage,
communication, and processing capabilities.
• The nodes are configured in an ad hoc, self-organized, and self-managed wireless network.
• Data generated by sensors are processed and communicated in a store-and-forward manner.
• The applications supported by the network are assumed to alternate between long idle
periods, during which no events occur, and bursty active periods, during which data flow
toward the base station through message exchange among peer sensor nodes.
• the applications are assumed to tolerate increased latency for an extended network lifetime.
• Typical applications that fall into this category include surveillance and monitoring of
natural habitats and protection of critical infrastructure.
• In these applications the sensors must be vigilant over long periods of time, during which
they remain inactive until some event occurs.
• The frequency at which these events occur is typically orders of magnitude slower than the
time it takes to transmit a message across the network toward the base station.
• S-MAC exploits the bursty profile of sensor applications to establish low-duty-cycle
operation on nodes in a multihop network and to achieve significant energy savings.
• During the long periods of time during which no sensing occurs, S-MAC nodes alternate
periodically between listening and sleep modes.
• Each node sets a wakeup time and sleeps for a certain period of time, during which its
radio is turned off. At the expiration of the timer, the node becomes active again.
• To further reduce control overhead while keeping message latency low, the protocol
uses coordinated sleeping among neighboring nodes.
• Periodic sleeping reduces energy consumption at the expense of increased latency.
• The importance of message latency strongly depends on the requirements of the sensing
application.
• S-MAC focuses on applications that can tolerate latency on the order of seconds.
• However, when nodes follow their schedule strictly, latency can increase significantly.
54
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
•
•
To address this shortcoming and keep message delay within the targeted-second-level
latency, S-MAC uses adaptive listening.
S-MAC design is focused on cooperating applications, such as monitoring and
surveillance applications.
The applications cooperate to achieve a common single task, such as protecting a critical
infrastructure.
The nature of these applications is such that at any particular point in time, one sensor
node may have a large amount of information to communicate to its neighbors.
To accommodate this requirement while further reducing overhead, S-MAC sacrifices
channel access fairness and uses the concept of message passing, whereby a node is
allowed to send a long message in burst.
Message passing reduces control overheard and avoids overhearing.
Periodic Listen and Sleep Operations:
• Periodically, nodes move into a sleep state during which their radios are turned off
completely.
• Nodes become active when there is traffic in the network.
•
•
•
•
•
•
•
Based on this scheme, each node sets a wake-up timer and goes to sleep for the specified
period of time.
At the expiration of the timer, the node wakes up and listens to determine if it needs to
communicate with other nodes.
The complete listen- and-sleep cycle is referred to as a frame.
Each frame is characterized by its duty cycle, defined as the listening interval-to-frame
length ratio.
Although the length of the listening interval can be selected independently by sensor
nodes, for simplicity the protocol assumes the value to be the same for all nodes.
Nodes are free to schedule their own sleep and listen intervals.
It is preferable, however, that the schedules of neighboring nodes be coordinated in
order to reduce the control overhead necessary to achieve communications between
these nodes.
Schedule Selection and Coordination:
• The neighboring nodes coordinate their listen and sleep schedules such that they all
listen at the same time and all sleep at the same time.
• To coordinate their sleeping and listening, each node selects a schedule and exchanges it
with its neighbors during the synchronization period.
• Each node maintains a schedule table that contains the schedule of all its known
neighbors.
• To select a schedule, a node first listens to the channel for a fixed amount of time.
55
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
•
•
At the expiration of this waiting period, if the node does not hear a schedule from
another node, it immediately chooses its own schedule.
The node announces the schedule selected by broadcasting a SYNC packet to all its
neighbors. This reduces the likelihood of SYNC packet collisions among competing
nodes.
If during the synchronization period the node receives a schedule from a neighbor before
choosing and announcing its own schedule, the node sets its schedule to be the same as
the schedule received.
if the node is aware of other neighboring nodes that have already adopted its schedule,
the node adopts both schedules.
The node is then required to wake up at the listen intervals of the two schedules adopted.
The advantage of carrying multiple schedules is that border nodes are required to
broadcast only one SYNC packet. The disadvantage of this approach is that border nodes
consume more energy, as they spend less time in the sleep mode.
Schedule Synchronization:
• Neighboring nodes need to synchronize their schedules periodically to prevent longterm clock drift. Schedule updating is accomplished by sending a SYNC packet.
• For a node to receive both SYNC packets and data packets, the listen interval is divided
into two subintervals.
• In the first case the sender sends only a SYNC packet; in the second the sender sends
only a data packet; and in the third the sender sends a SYNC packet in addition to the
data packet.
• Transmission of data packets uses the RTS/CTS handshake to secure exclusive access
to the channel during transmission of the data.
• This access procedure guarantees that the neighboring nodes receive both the
synchronization and data packets.
56
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
Adaptive Listening:
• If a sensor is to follow its sleep schedule strictly, data packets may be delayed at each
hop.
• To address this shortcoming and improve latency performance, the protocol uses an
aggressive technique referred to as adaptive listening.
• Based on this technique, a node that overhears, during its listen period, the exchange of
a CTS or RTS packet between a neighboring node and another node assumes that it
may be the next hop along the routing path of the overheard RTS/CTS packet, ignores
its own wake-up schedule, and schedules an extra listening period around the time the
transmission of the packet terminates.
• The overhearing node determines the time necessary to complete the transmission of
the packet from the duration field of the overheard CTS or RTS packet.
• Immediately upon receiving the data packet, the node issues an RTS packet to initiate
an RTS/CTS handshake with the overhearing node. Ideally, the latter node is awake, in
which case the packet forwarding process proceeds immediately between the two
nodes.
• If the overhearing node does not receive an RTS packet during adaptive listening, it
reenters its sleep state until the next scheduled listen interval.
Message Passing:
• To improve application-level performance, S-MAC introduces the concept of message
passing, where a message is a meaningful unit of data that a node can process.
•
•
•
•
•
•
•
Messages are divided into small fragments. These fragments are then transmitted in a
single burst.
The fragments of a message are transmitted using only one RTS/CTS exchange
between the sending and receiving nodes.
At the completion of this exchange, the medium is reserved for the time necessary to
complete the transfer of the entire message successfully.
Furthermore, each fragment carries in its duration field the time needed to transmit all
the subsequent fragments and their corresponding acknowledgments.
Upon transmitting a fragment, the sender waits for an acknowledgment from the
receiver.
If it receives the acknowledgment, the sender proceeds with transmission of the next
fragment.
If it fails to receive the acknowledgment, however, the sender extends the time required
to complete transmission of the segment to include the time to transmit one more
fragment and its corresponding acknowledgment and retransmits the unacknowledged
frame immediately.
57
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
UNIT II
PART 2
Routing Protocols for WSN
• WSNs have created new opportunities across the spectrum of human endeavors, including
engineering design and manufacturing, monitoring and control of environmental systems, forest
fire tracking, health care, battlefield surveillance, disaster management, and critical
infrastructure protection. Several applications involving sensed data collection and
dissemination
DATA AGGREGATION:
• In these applications, sensors are designed primarily to sense the environment and to record and
possibly process the sensor readings before forwarding the information collected, through the
base station toward the data sink and eventually, to where the application resides.
• The process of data collection and forwarding is either triggered by the occurrence of specific
events in the environment where the sensors are deployed or is initiated in response to a query
issued by the application supported.
• It is worth noting that in many cases it is useful to aggregate data collected by various sensors
before forwarding the data to the base station. Data aggregation reduces the number of
messages transmitted, leading to a significant decrease in energy consumption due to
communication.
DATA DISSEMINATION AND GATHERING:
Single-hop approach
• The way that data and queries are forwarded between the base station and the location
where the target phenomena are observed is an important aspect and a basic feature of
WSNs.
• A simple approach to accomplishing this task is for each sensor node to exchange data
directly with the base station.
•
A single-hop-based approach, however, is costly, as nodes that are farther away from the
base station may deplete their energy reserves quickly, thereby severely limiting the
lifetime of the network.
• This is the case particularly where the wireless sensors are deployed to cover a large
geographical region or where the wireless sensors are mobile and may move away from the
base station.
Multi-hop approach
• Such an approach leads to significant energy savings and reduces considerably
communication interference between sensor nodes competing to access the channel,
particularly in highly dense WSNs.
• Data forwarding between the sensors where data are collected and the sinks where data are
made available.
58
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
In response to queries issued by the sinks or when specific events occur within the area
monitored, data collected by the sensors are transmitted to the base station using multihop
paths.
In a multihop WSN, intermediate nodes must participate in forwarding data packets
between the source and the destination.
Determining which set of intermediate nodes is to be selected to form a data-forwarding
path between the source and the destination is the principal task of the routing algorithm.
ROUTING CHALLENGES AND DESIGN ISSUES IN WIRELESS SENSOR NETWORKS
• Meeting these design requirements presents a distinctive and unique set of challenges.
• These challenges can be attributed to multiple factors, including severe energy constraints,
limited computing and communication capabilities, the dynamically changing environment
within which sensors are deployed, and unique data traffic models and application-level quality
of service requirements.
1. Network Scale and Time-Varying Characteristics
• Due to the large number of conceivable sensor-based applications, the densities of the WSNs
may vary widely, ranging from very sparse to very dense.
• In these networks, the behavior of sensor nodes is dynamic and highly adaptive, as the need to
self-organize and conserve energy forces sensor nodes to adjust their behavior constantly in
response to their current level of activity or the lack thereof.
• sensor nodes may be required to adjust their behavior in response to the erratic and
unpredictable behavior of wireless connections caused by high noise levels and radio-frequency
interference, to prevent severe performance degradation of the application supported.
2. Resource Constraints
• Sensor nodes are designed with minimal complexity for large-scale deployment at a reduced
cost.
• Energy is a key concern in WSNs, which must achieve a long lifetime while operating on
limited battery reserves.
• Multihop packet transmission over wireless networks is a major source of power consumption.
• Reducing energy consumption can be achieved by dynamically controlling the duty cycle of the
wireless sensors.
• A question arises as to how to design scalable routing algorithms that can operate efficiently for
a wide range of performance constraints and design requirements.
59
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
The development of these protocols is fundamental to the future of WSNs.
3. Sensor Applications Data Models
• The data model describes the flow of information between the sensor nodes and the data sink.
• These models are highly dependent on the nature of the application in terms of how data are
requested and used.
• Several data models have been proposed to address the data-gathering needs and interaction
requirements of a variety of sensor applications.
• A class of sensor applications requires data collection models that are based on periodic
sampling or are driven by the occurrence of specific events.
• In other applications, data can be captured and stored, possibly processed and aggregated by a
sensor node, before they are forwarded to the data sink.
• Yet a third class of sensor applications requires bidirectional data models in which two-way
interaction between sensors and data sinks is required.
• The need to support a variety of data models increases the complexity of the routing design
problem
ROUTING STRATEGIES IN WIRELESS SENSOR NETWORKS
• Routing algorithms for ad hoc networks can be classified according to the manner in which
information is acquired and maintained and the manner in which this information is used to
compute paths based on the acquired information.
• Three different strategies can be identified: proactive, reactive, and hybrid.
1. Proactive routing strategies:
• also referred to as table driven, relies on periodic dissemination of routing information to
maintain consistent and accurate routing tables across all nodes of the network.
• The structure of the network can be either flat or hierarchical. Flat proactive routing strategies
have the potential to compute optimal paths.
• The overhead required to compute these paths may be prohibitive in a dynamically changing
environment.
• Hierarchical routing is better suited to meet the routing demands of large ad hoc networks.
2. Reactive routing strategies:
• Reactive routing strategies establish routes to a limited set of destinations on demand. These
strategies do not typically maintain global information across all nodes of the network.
• They must therefore, rely on a dynamic route search to establish paths between a source and a
destination.
• This typically involves flooding a route discovery query, with the replies traveling back along
the reverse path.
• The reactive routing strategies vary in the way they control the flooding process to reduce
communication overhead and the way in which routes are computed and reestablished when
failure occurs.
3. Hybrid routing strategies
• Hybrid strategies rely on the existence of network structure to achieve stability and scalability
in large networks.
60
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
In these strategies the network is organized into mutually adjacent clusters, which are
maintained dynamically as nodes join and leave their assigned clusters.
Clustering provides a structure that can be leveraged to limit the scope of the routing algorithm
reaction to changes in the network environment.
A hybrid routing strategy can be adopted whereby proactive routing is used within a cluster and
reactive routing is used across clusters.
The main challenge is to reduce the overhead required to maintain the clusters.
WSN ROUTING TECHNIQUES
• The design of routing protocols for WSNs must consider the power and resource limitations of
the network nodes, the time-varying quality of the wireless channel, and the possibility for
packet loss and delay.
• To address these design requirements, several routing strategies for WSNs have been proposed.
1. One class of routing protocols adopts a flat network architecture in which all nodes are
considered peers. A flat network architecture has several advantages, including minimal overhead
to maintain the infrastructure and the potential for the discovery of multiple routes between
communicating nodes for fault tolerance.
2. A second class of routing protocols imposes a structure on the network to achieve energy
efficiency, stability, and scalability. In this class of protocols, network nodes are organized in
clusters in which a node with higher residual energy, for example, assumes the role of a cluster
head. The cluster head is responsible for coordinating activities within the cluster and forwarding
information between clusters. Clustering has potential to reduce energy consumption and extend
the lifetime of the network.
3. A third class of routing protocols uses a data-centric approach to disseminate interest within
the network. The approach uses attribute-based naming, whereby a source node queries an attribute
for the phenomenon rather than an individual sensor node. The interest dissemination is achieved
by assigning tasks to sensor nodes and expressing queries to relative to specific attributes.
4. A fourth class of routing protocols uses location to address a sensor node. Location-based
routing is useful in applications where the position of the node within the geographical coverage of
the network is relevant to the query issued by the source node. Such a query may specify a specific
area where a phenomenon of interest may occur or the vicinity to a specific point in the network
environment.
1 Flooding and Its Variants:
•
•
•
•
•
•
Flooding is a common technique frequently used for path discovery and information
dissemination in wired and wireless ad hoc networks.
The routing strategy is simple and does not rely on costly network topology maintenance and
complex route discovery algorithms.
Flooding uses a reactive approach whereby each node receiving a data or control packet sends
the packet to all its neighbors.
After transmission, a packet follows all possible paths. Unless the network is disconnected, the
packet will eventually reach its destination.
as the network topology changes, the packet transmitted follows the new routes.
As shown in the figure, flooding in its simplest form may cause packets to be replicated
indefinitely by network nodes.
61
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
To prevent a packet from circulating indefinitely in the network, a hop count field is usually
included in the packet.
Initially, the hop count is set to approximately the diameter of the network.
As the packet travels across the network, the hop count is decremented by one for each hop that
it traverses. When the hop count reaches zero, the packet is simply discarded.
Drawbacks:
•
•
•
Despite the simplicity of its forwarding rule and the relatively low-cost maintenance that it
requires, flooding suffers several deficiencies when used in WSNs.
The first drawback of flooding is its susceptibility to traffic implosion. This undesirable effect
is caused by duplicate control or data packets being sent repeatedly to the same node.
The second drawback of flooding is the overlap problem to which it gives rise. Overlapping
occurs when two nodes covering the same region send packets containing similar information
to the same node.
62
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
The third and most severe drawback of flooding is resource blindness. The simple forwarding
rule that flooding uses to route packets does not take into consideration the energy constraints
of the sensor nodes.
2. Gossiping
• To address the shortcomings of flooding, a derivative approach, referred to as gossiping, has
been proposed.
• Similar to flooding, gossiping uses a simple forwarding rule and does not require costly
topology maintenance or complex route discovery algorithms.
• Contrary to flooding, where a data packet is broadcast to all neighbors, gossiping requires that
each node sends the incoming packet to a randomly selected neighbor.
• Upon receiving the packet, the neighbor selected randomly chooses one of its own neighbors
and forwards the packet to the neighbor chosen.
• This process continues iteratively until the packet reaches its intended destination or the
maximum hop count is exceeded.
• Gossiping avoids the implosion problem by limiting the number of packets that each node
sends to its neighbor to one copy.
3. Sensor Protocols for Information via Negotiation (SPIN)
• Sensor protocols for information via negotiation (SPIN) is a data-centric negotiation-based
family of information dissemination protocols for WSNs.
• The main objective of these protocols is to efficiently disseminate observations gathered by
individual sensor nodes to all the sensor nodes in the network.
• The main objective of SPIN and its related family members is to address the shortcomings of
conventional information dissemination protocols and overcome their performance
deficiencies.
• The basic tenets of this family of protocols are data negotiation and resource adaptation.
Data negotiation:
• Semantic-based data negotiation requires that nodes running SPIN ‘‘learn’’ about the content of
the data before any data are transmitted between network nodes.
• SPIN exploits data naming, whereby nodes associate metadata with data they produce and use
these descriptive data to perform negotiations before transmitting the actual data.
• A receiver that expresses interest in the data content can send a request to obtain the data
advertised. This form of negotiation assures that data are sent only to interested nodes, thereby
eliminating traffic implosion and reducing significantly the transmission of redundant data
throughout the network.
• the use of meta data descriptors eliminates the possibility of overlap, as nodes can limit their
requests to name only the data that they are interested in obtaining.
Resource adaptation:
• Resource adaptation allows sensor nodes running SPIN to tailor their activities to the current
state of their energy resources.
• Each node in the network can probe its associated resource manager to keep track of its
resource consumption before transmitting or processing data.
• When the current level of energy becomes low, the node may reduce or completely eliminate
certain activities, such as forwarding third party metadata and data packets.
63
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
The resource adaptation feature of SPIN allows nodes to extend their longevity and
consequently, the lifetime of the network.
Types of messages:
• To carry out negotiation and data transmission, nodes running SPIN use three types of
messages.
• The first message type, ADV, is used to advertise new data among nodes. A network node that
has data to share with the remaining nodes of the network can advertise its data by first
transmitting an ADV message containing the metadata describing the data.
• The second message type, REQ, is used to request an advertised data of interest. Upon
receiving an ADV containing metadata, a network node interested in receiving specific data
sends a REQ message the metadata advertising node, which then delivers the data requested.
• The third message type, DATA, contains the actual data collected by a sensor, along with a
metadata header. The data message is typically larger than the ADV and REQ messages.
• The latter messages only contain metadata that are often significantly smaller than the
corresponding data message. Limiting the redundant transmission of data messages using
semantic-based negotiation can result in significant reduction of energy consumption.
•
•
•
•
•
the data source, sensor node A, advertises its data to its immediate neighbor, sensor node B, by
sending an ADV message containing the metadata describing its data.
Node B expresses interest in the data advertised and sends a REQ message to obtain the data.
Upon receiving the data, node B sends an ADV message to advertise the newly received data to
its immediate neighbors.
Only three of these neighbors, nodes C, E, and G, express interest in the data.
These nodes issue a REQ message to node B, which eventually delivers the data to each of the
requesting nodes.
4. Low-Energy Adaptive Clustering Hierarchy:
• Low-energy adaptive clustering hierarchy (LEACH) is a routing algorithm designed to collect
and deliver data to the data sink, typically a base station.
• The main objectives of LEACH are:
-Extension of the network lifetime
-Reduced energy consumption by each network sensor node
-Use of data aggregation to reduce the number of communication messages
• To achieve these objectives, LEACH adopts a hierarchical approach to organize the network
into a set of clusters. Each cluster is managed by a selected cluster head.
64
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
The cluster head assumes the responsibility to carry out multiple tasks. The first task consists of
periodic collection of data from the members of the cluster.
Upon gathering the data, the cluster head aggregates it in an effort to remove redundancy
among correlated values.
The second main task of a cluster head is to transmit the aggregated data directly to the base
station. The transmission of the aggregated data is achieved over a single hop.
The third main task of the cluster head is to create a TDMA-based schedule whereby each node
of the cluster is assigned a time slot.
•
•
The basic operations of LEACH are organized in two distinct phases.
The first phase, the setup phase, consists of two steps, cluster-head selection and cluster
formation.
• The second phase, the steady-state phase, focuses on data collection, aggregation, and delivery
to the base station.
• The duration of the setup is assumed to be relatively shorter than the steady-state phase to
minimize the protocol overhead.
SETUP PHASE:
• At the beginning of the setup phase, a round of cluster-head selection starts.
• The cluster-head selection process ensures that this role rotates among sensor nodes, thereby
distributing energy consumption evenly across all network nodes.
• To determine if it is its turn to become a cluster head, a node, n, generates a random number, v,
between 0 and 1 and compares it to the cluster-head selection threshold, T(n).
• The node becomes a cluster head if its generated value, v, is less than T(n).
• The cluster-head selection threshold is designed to ensure with high probability that a
predetermined fraction of nodes, P, is elected cluster heads at each round.
65
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
•
•
•
•
•
•
Further, the threshold ensures that nodes which served in the last 1=P rounds are not selected in
the current round.
To meet these requirements, the threshold T(n) of a competing node n can be expressed as
follows:
The variable G represents the set of nodes that have not been selected to become cluster heads
in the last 1=P rounds, and r denotes the current round.
The predefined parameter, P, represents the cluster-head probability. It is clear that if a node
has served as a cluster head in the last 1=P rounds, it will not be elected in this round.
At the completion of the cluster-head selection process, every node that was selected to become
a cluster head advertises its new role to the rest of the network. Upon receiving the cluster-head
advertisements, each remaining node selects a cluster to join.
The selection criteria may be based on the received signal strength, among other factors. The
nodes then inform their selected cluster head of their desire to become a member of the cluster.
STEADY PHASE
Upon cluster formation, each cluster head creates and distributes the TDMA schedule, which
specifies the time slots allocated for each member of the cluster.
Each cluster head also selects a CDMA code, which is then distributed to all members of its
cluster. The code is selected carefully so as to reduce inter cluster interference.
The completion of the setup phase signals the beginning of the steady-state phase.
During this phase, nodes collect information and use their allocated slots to transmit to the
cluster head the data collected. This data collection is performed periodically.
4. Power-Efficient Gathering in Sensor Information Systems (PEGASIS):
• Power-efficient gathering in sensor information systems (PEGASIS) and its extension,
hierarchical PEGASIS, are a family of routing and information-gathering protocols for WSNs.
• The main objectives of PEGASIS are twofold.
• First, the protocol aims at extending the lifetime of a network by achieving a high level of
energy efficiency and uniform energy consumption across all network nodes.
• Second, the protocol strives to reduce the delay that data incur on their way to the sink.
• The network model considered by PEGASIS assumes a homogeneous set of nodes deployed
across a geographical area.
• Nodes are assumed to have global knowledge about other sensors’ positions. Furthermore, they
have the ability to control their power to cover arbitrary ranges.
• The nodes may also be equipped with CDMA-capable radio transceivers.
• The nodes’ responsibility is to gather and deliver data to a sink, typically a wireless base
station.
• The goal is to develop a routing structure and an aggregation scheme to reduce energy
consumption and deliver the aggregated data to the base station with minimal delay while
balancing energy consumption among the sensor nodes.
• Based on this structure, nodes communicate with their closest neighbors.
• The construction of the chain starts with the farthest node from the sink.
66
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
Network nodes are added to the chain progressively, starting from the closest neighbor to the
end node.
• Nodes that are currently outside the chain are added to the chain in a greedy fashion, the closest
neighbor to the top node in the current chain first, until all nodes are included.
• To determine the closest neighbor, a node uses the signal strength to measure the distance to all
its neighboring nodes.
• Using this information, the node adjusts the signal strength so that only the closest node can be
heard.
• A node within the chain is selected to be the chain leader. Its responsibility is to transmit the
aggregated data to the base station. The chain leader role shifts in positioning the chain after
each round.
Data aggregation:
• Data aggregation in PEGASIS is achieved along the chain. In its simplest form, the aggregation
process can be performed sequentially as follows.
• First, the chain leader issues a token to the last node in the right end of the chain. Upon
receiving the token, the end node transmits its data to its downstream neighbor in the chain
toward the leader.
• The neighboring node aggregates the data and transmits them to its downstream neighbor. This
process continues until the aggregated data reach the leader.
• Upon receiving the data from the right side of the chain, the leader issues a token to the left end
of the chain, and the same aggregation process is carried out until the data reach the leader.
• Upon receiving the data from both sides of the chain, the leader aggregates the data and
transmits them to the data sink.
•
•
•
•
•
•
•
In this example it is assumed that all nodes have global knowledge of the network and employ a
greedy algorithm to construct the chain.
it is assumed that nodes take turns in transmitting to the base station such that node i mod N,
where N represents the total number of nodes, is responsible for transmitting the aggregate data
to the base station in round i.
Based on this assignment, node 3, in position 3 in the chain, is the leader in round 3.
All nodes in an even position must send their data to their neighbor to the right.
At the next level, node 3 remains in an odd position.
Consequently, all nodes in an even position aggregate their data and transmit them to their right
neighbors.
At the third level, node 3 is no longer in an odd position.
67
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
Node 7, the only node beside node 3 to rise to this level, aggregates its data and sends them to
node 3. Node 3, in turn, aggregates the data received with its own data and sends them to the
base station.
5. Directed Diffusion:
• Directed diffusion is a data-centric routing protocol for information gathering and
dissemination in WSNs.
• The main objective of the protocol is to achieve substantial energy savings in order to extend
the lifetime of the network.
• To achieve this objective, directed diffusion keeps interactions between nodes, in terms of
message exchanges, localized within a limited network vicinity. Using localized interaction,
direct diffusion can still realize robust multipath delivery and adapt to a minimal subset of
network paths.
• This unique feature of the protocol, combined with the ability of the nodes to aggregate
response to queries, results into significant energy savings.
• The main elements of direct diffusion include interests, data messages, gradients, and
reinforcements.
• Directed diffusion uses a publish-and-subscribe information model in which an inquirer
expresses an interest using attribute–value pairs.
• An interest can be viewed as a query or an interrogation that specifies what the inquirer wants.
• Sensor nodes, which can service the interest, reply with the corresponding data.
• The main purpose of this exploratory interest message is to determine if there exist sensor
nodes that can service the sought-after interest. All sensor nodes maintain an interest cache.
• Each entry of the interest cache corresponds to a different interest.
• The cache entry contains several fields, including a timestamp field, multiple gradient fields for
each neighbor, and a duration field. e interest, reply with the corresponding data.
• A gradient can be thought of as a reply link pointing toward the neighboring node from which
the interest is received.
• Directed diffusion has the potential for significant energy savings.
• Its localized interactions allow it to achieve relatively high performance over unoptimized
paths.
• Furthermore, the resulting diffusion mechanisms are stable under a range of network dynamics.
Its data-centric approach obliterates the need for node addressing.
• The directed diffusion paradigm, however, is tightly coupled into a semantically driven queryon-demand data model.
• This may limit its use to applications that fit such a data model, where the interest-matching
process can be achieved efficiently and unambiguously.
6. Geographical Routing:
• The main objective of geographical routing is to use location information to formulate an
efficient route search toward the destination.
• Geographical routing is very suitable to sensor networks, where data aggregation is a useful
technique to minimize the number of transmissions toward the base station by eliminating
redundancy among packets from different sources.
68
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
In this new paradigm, an application may issue a query to inquire about a phenomenon within a
specific physical area or near the vicinity of a landmark.
For example, scientists analyzing traffic flow patterns may be interested in determining the
average number, size, and speed of vehicles that travel on a specific section of a highway.
The identity of the sensors that collect and disseminate information about traffic flow on a
specific section of the highway is not as important as the data content.
In addition to its compatibility with data-centric applications, geographical routing requires low
computation and communication overhead.
ROUTING SRATEGIES:
▪ The objective of geographical routing is to use location information to formulate a more
efficient routing strategy that does not require flooding request packets throughout a network.
1. Geocasting:
▪
▪
▪
▪
▪
▪
To achieve this goal, a data packet is sent to nodes located within a designated forwarding
region.
In this scheme, only nodes that lie within the designated forwarding zone are allowed to
forward the data packet.
The forwarding region can be statically defined by the source node, or constructed dynamically
by intermediate nodes to exclude nodes that may cause a detour when forwarding the data
packet.
If a node does not have information regarding the destination, the route search can begin as a
fully directed broadcast. Intermediate nodes, with better knowledge of the destination, may
limit the forwarding zone in order to direct traffic toward the destination.
The idea of limiting the scope of packet propagation to a designated region is commensurate
with the data-centric property of sensor networks, in which the interest in the data content,
rather than the sensor, provides the data.
The efficacy of the strategy depends largely on the way the designated forwarding is defined
and updated as data travel toward the destination. It also depends on the connectivity of the
nodes within a designated zone.
2.
▪
▪
▪
▪
▪
Position based routing protocols:
A second strategy used in geographical routing, referred to as position-based routing, requires a
node to know only the location information of its direct neighbors.
A greedy forwarding mechanism is then used whereby each node forwards a packet to the
neighboring node that is ‘‘closest’’ to the destination.
Several metrics have been proposed to define the concept of closeness, including the Euclidean
distance to the destination, the projected distance to the destination on the straight line joining
the current node and the destination, and the deviation from the straight direction toward the
destination.
Position-based routing protocols have the potential to reduce control overhead and reduce
energy, as flooding for node discovery and state propagation are localized to within a single
hop.
The efficiency of the scheme, however, depends on the network density, the accurate
localization of nodes, and more important, on the forwarding rule used to move data traffic
toward the destination.
69
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
▪
▪
▪
▪
▪
▪
▪
▪
▪
FORWARDING APPROACHES:
An important aspect of geographical routing is the rule used to forward traffic toward its final
destination.
In position-based routing, each node decides on the next hop based on its own position, the
position of its neighbors, and the destination node.
The quality of the decision clearly depends on the extent of the node’s knowledge of the global
topology. Local knowledge of the topology may lead to suboptimal paths.
The greedy routing scheme selects among its neighbors the one that is closest to the destination.
the node currently holding the message, node MH, selects node GRS as the next hop to forward
the message. It is worth noting that the selection process used in this scheme considers only the
set of nodes that are closer to the destination than the current message holder. If such a set is
empty, the scheme fails to progress forward.
In the most-forward-within-R strategy (MFR), where R represents the transmission range, a
node transmits its packet to the most forward among its neighbors toward the destination.
Based on this approach, the next hop selected by MH to forward the packet is node MFR.
The nearest-forward-progress scheme selects the nearest node with forward progress. Based on
this scheme, node NFP is selected by MH to forward the message to the destination.
The compass routing scheme selects the node with the minimum angle between the straight line
joining the current node and the destination and the straight line joining a neighbor and the
destination.
The low-energy forward scheme selects the node that locally minimizes the energy required,
expressed in terms of joules per meter, to progress forward toward the target.
70
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
▪
▪
▪
▪
▪
▪
▪
▪
▪
▪
▪
Despite its simplicity, the greedy approach to geographical routing may either fail to find a
path, even when one exists, or produce inefficient routes.
This typically occurs when, due to obstacles, for example, no neighboring node is closer to the
destination than is the current packet holder.
where node S1 needs to forward a packet to the destination D.
Based on the greedy approach, S1 must select the closest neighbor to destination as the next
hop to forward the packet.
However, nodes S2 and S3, are both farther away from the destination than is node S1.
The greedy approach is trapped in a local minimum (i.e., node S1) and fails to make forward
progress.
In WSN environments, where sensors are typically embedded in the environment or deployed
in inaccessible areas, voids are likely to occur. To circumvent voids, the well-known graph
traversal rule referred to as the right-hand rule has been suggested.
The rule states that when a packet arrives at a given node Ni from node Nj, the next hop to be
traversed by the packet is the node sequentially counterclockwise from node Ni with respect to
the (Ni; Nj) edge.
On graphs with edges that cross (i.e., nonplanar graphs), the right-hand rule may not traverse an
enclosed face boundary.
To remove crossing edges without partitioning the graph, the radio graph corresponding to the
WSN is transformed into a planar subgraph in which all cross edges are eliminated.
Upon the radio graph’s transformation, perimeter traversal, in which packets are routed along
the perimeter of the void, is used. This mode is also referred to as face traversal.
71
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
UNIT II
PART 3
Transport Control Protocols
Functions of Transport layer:
•
•
i.
▪
▪
▪
ii.
▪
▪
▪
iii.
▪
▪
•
•
•
•
The transport layer provides end-to-end segment transportation, where messages are segmented
into a chain of segments at the source and are reassembled back into the original message at the
destination nodes.
The transport layer does not concern itself with the underlying protocol structures for delivery
and/or with the mechanisms used to deliver the segments to the destination nodes.
TCP can be classified as either connection-oriented and connectionless. The connectionoriented protocol operation consists of the following three phases:
Connection establishment:
The sender issues a request message to establish a connection between itself and the
destination.
If the destination node is available and there is a path between source and the destination, a
connection will be established.
This connection is a logical link connecting the sender and the receiver.
Data transmission:
After a connection has been established, data transmission commences between the sender and
the receiver. During the information exchange, the rate at which either side is transmitting may
be adjusted.
This adjustment depends on the possible congestion (or lack thereof) in the network.
Since data may be lost in the process of transmission, the transport protocol may support packet
loss detection and loss recovery mechanisms.
Disconnect:
After completion of data exchange between the source and the destination, the connection is
torn down.
In some cases, unexpected events such as the receiver becoming unavailable in the midst of
data exchange may also lead to connection breakdown.
Transport protocols can also be classified as elastic or nonelastic.
TCP is an elastic protocol and UDP is a nonelastic protocol.
Elasticity in a protocol means that the data transmission rate can be adjusted by the sender.
Non-elasticity, on the other hand, implies that the transmission rate cannot be adjusted.
Features of Connection-oriented transport protocols:
•
Due to their features, connection-oriented protocols often provide more services than do their
connectionless counterparts.
72
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
Therefore, when the underlying network layer lacks reliable and effective transmission
services, and if the application has critical requirements for such delivery, connection-oriented
protocols are preferred.
• Depending on the application, the transport protocol may or not support the following features:
1. Orderly transmission:
• Within a communications network in general, and in a wireless sensor network in particular,
multiple paths may exist between a given source and destination.
• As a result, packets sent in a certain order by the source may not be received in the same order
at the destination.
• For most applications, packets must be reordered at the destination to represent the same order
as at the source. The transport protocol can provide the reordering.
• The common approach is for the protocol to include a field containing a sequential number of
the segments transmitted.
• For each segment transmitted, the sequence number increases by one. As a result, the receiver
can sort the received segments based on the sequence number.
2. Flow and congestion control:
• If the sender transmits segments with a higher rate than the receiver is able to handle and
process, the buffers at the receiver may overflow and congestion occurs.
• Congestion results in a loss of packets and reduction in overall system throughput.
• Therefore, some transport layers provide flow and congestion control service to coordinate the
suitable transmission rate between senders and receivers.
• The key in the process of congestion control is proper detection of congestion and notification
of the sender about the congestion state.
• Adjustment of the transmission rate is important after congestion detection. After the sender
adjusts its rate and after congestion abates, the transmission rate should be increased to keep up
with the link capacity.
3.
•
•
•
•
•
•
•
•
•
Loss recovery:
Network congestion can lead to data loss due to limited resources at sensor nodes.
However, some applications, such as the file transfer protocol (FTP), are loss-sensitive.
Although in a wireless environment, the link layer can recover from lost data resulting from bit
error, it cannot recover lost data as a result of congestion.
The link layer may not provide loss recovery functions in all circumstances.
Therefore, the transport protocol’s support for loss recovery is a very helpful feature.
An obvious approach to loss recovery is retransmission after detection of loss.
But important concerns would be how to detect loss and how to inform the sender about it.
The sequence number in the segment header can be used for this purpose.
When there is a gap in the sequence number received, it is an indication that segments have
been lost either from bit error or as a result of buffer overflow from congestion.
4. Quality of service:
• For real-time applications such as video on demand (VOD) and net meeting, which are realtime and delay-critical with a required bandwidth, the transport layer should provide high
throughput within the constraints of allocated bandwidth.
73
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
The transport protocol can incorporate QoS considerations into flow and congestion control.
TRANSMISSION CONTROL PROTOCOL(TCP):
•
•
•
TCP is the commonly used connection-oriented transport control protocol for the Internet.
Some applications, such as FTP and HTTP, reside on the TCP layer.
TCP uses network services provided by IP layer, with the objective of offering reliable, orderly,
controllable, and elastic transmission.
• TCP operation consists of three phases:
1. Connection establishment:
• A logical connection for TCP is established during this phase.
• A logical connection is an association between the TCP sender and receiver, identified uniquely
by the pair (IP address, TCP port identifier) of the TCP sender and receiver.
• There may be several connections between endpoints at the same time. These connections have
the same IP address, but they will have different TCP port identifiers.
• TCP uses a three-way handshake to establish a connection.
• During the handshake, the TCP sender and receiver will negotiate parameters such as initial
sequence number, window size, and others, and notify each other that data transmission can
begin.
2. Data transmission:
• TCP provides reliable and orderly transmission of information between the sender and the
receiver.
• TCP uses (accumulative) ACK to recover lost segments. The orderly transmission is realized
through the sequence number in the segment header.
• TCP supports flow control and congestion control through adjustment of transmission rate by
the sender.
• TCP uses a window-based mechanism to perform this task, where the sender maintains a
variable cwnd (congestion window).
• The TCP sender can transmit a number of segments less than or equal to cwnd. cwnd is updated
after receiving ACK from the receiver or after a timeout.
• Since ACK is used for both delivery notification and flow control, the two functions are
somewhat coupled. There are three phases in the process of congestion control in TCP, and
they will be explained later.
3. Disconnect:
• After completion of data transmission, the connection will be removed and the related resource
released.
Flow and congestion control in TCP:
A. Slow start:
• By default, all transmissions start with slow start. In this phase, the cwnd increases by one for
each ACK that is received for a segment transmitted. cwnd therefore increases if ACK is not
received due to segment loss.
74
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
B. Congestion avoidance:
• After cwnd reaches a maximum value (threshold), the system enters the congestion avoidance
state.
• In this state, cwnd is incremented by only 1/cwnd after each ACK is received.
• For each segment transmitted, the sender maintains a timer.
• If the timer expires before an ACK corresponding to the segment is received, system enters the
slow start phase again, and at the same time that cwnd is reset, the threshold is set to half of the
current cwnd, and the segment timer is doubled.
• The timer is updated based on round-trip time (RTT), which is estimated through the ACK. If
the sequence number acknowledged in two continuous ACKs are in sequence,
• TCP sender concludes that segments have been lost during transmission.
• In this case, the system state changes to fast recovery and fast retransmission (FRFT), and cwnd
will be halved at the same time.
C. FRFT:
• In the fast recovery and fast retransmission state, cwnd is updated using the same algorithm as
that used in the congestion avoidance state.
• The reason for the FRFT state is that generally, sporadic segment loss does not necessarily
mean that there is heavy congestion, and therefore there is no need to reset cwnd.
• However, a timeout usually indicates heavy congestion and/or link failure.
USER DATAGRAM PROTOCOL:
• UDP is a connectionless transport protocol.
• It exchanges datagrams without a sequence number, and if information is lost in the process of
exchange between the transmitter and the receiver, this protocol does not have the mechanisms
to recover it.
• Since it does not offer a sequence number in the datagrams it therefore does not guarantee
orderly transmission.
• It also does not offer capabilities for congestion or flow control. In circumstances where both
TCP and UDP are present, since UDP does not perform congestion or flow control, it may turn
out that it outperforms TCP.
MOBILE IP:
• Mobile IP is proposed as a global mobility management technique in the network layer to
provide terminal mobility in an all-IP network.
• The initial design of TCP/IP did not take mobility into consideration.
• The IP address is currently used both as a terminal identifier and to identify the terminal
location in that network. Addresses are used in the routing process as well.
• However, mechanisms are required to separate the two. Mobile IP, which is designed to solve
this problem, introduces two new entities and one new IP address.
• The new entities are (1) home agent (HA), the agent being located within the mobile terminal’s
home network (it is in charge of IP address management and packet forwarding on behalf of the
mobile terminal), and (2) foreign agent (FA), the agent being located at the network visited by
the mobile terminal.
• HA and FA have fixed IP addresses and can be addressed globally.
75
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
•
•
•
The new IP address introduced for mobility is care of address (COA), the IP address obtained
from FA after the mobile terminal enters a new network.
Mobile IP works as follows: When a terminal moves into a new network, it registers with the
FA of the new network and subsequently receives a COA.
At this time, either the terminal or the FA informs the terminal’s HA of the COA.
When a corresponding terminal sends packets to the mobile terminal, those packets are
forwarded to the HA, which will, in turn, forward them to the mobile terminal’s COA.
Packets from the mobile terminal to the corresponding terminal are sent directly to the
corresponding terminal.
Therefore, there is an asymmetrical routing process between the corresponding terminal and the
mobile terminal called the triangular routing, which leads to a longer path from the
corresponding terminal to the mobile and therefore to low efficiency.
In the process of mobility, since handoff results from movement and may cause packet loss and
TCP timeout, the TCP sender is forced to reduce its rate, which may lead to low throughput
even though physical link may offer sufficient bandwidth.
Feasibility of Using TCP or UDP for WSNs:
• Although TCP and UDP are popular transport protocols and deployed widely in the Internet,
neither may be a good choice for WSNs.
• For the most part, there is no interaction between TCP or UDP and the lower-layer protocols. In
wireless sensor networks, the lower layers can provide rich and helpful information to the
transport layer and enhance the badly needed system performance.
• Following are other problems that make either TCP or UDP unsuitable for implementation in
WSNs:
➢ TCP is a connection-oriented protocol. However, in WSNs, the number of sensed data for
event-based applications is usually very small.
➢ The three-way handshake process required for TCP is a large overhead for such a small volume
of data. In TCP, segment loss can potentially trigger window-based flow and congestion
control.
➢ This will reduce the transmission rate unnecessarily when, in fact, packet loss may have
occurred as a result of link error and there may be no congestion. This behavior will lead to low
throughput, especially under multiple wireless hops, which are prevalent in WSNs.
➢ TCP uses an end-to-end process for congestion control. Generally, this results in longer
response to congestion, and in turn, will result in a large amount of segment loss. The segment
loss, in turn, results in energy waste in the retransmission.
➢ A long response time to congestion results in low throughput and utilization of wireless
channels.
➢ TCP uses end-to-end ACK and retransmission when necessary. This will result in much lower
throughput and longer transmission time when RTT is long, as is the case in most WSNs.
➢ Sensor nodes may be within a different hop count and RTT from the sink. The TCP operates
unfairly in such environments. The sensor nodes near the sink may receive more opportunities
to transmit (which results in them depleting their energy sooner). This may also result in a
disconnect between more distant nodes and the sink.
• As a connectionless transport control protocol, UDP is also not suitable for WSNs.
76
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
➢ Because of the lack of flow and congestion control mechanisms in UDP, datagram loss can
result in congestion. From this point of view, UDP is also not energy efficient for WSNs.
➢ UDP contains no ACK mechanism; therefore, the lost datagrams can be recovered only by
lower or upper layers, including the application layer.
TRANSPORT PROTOCOL DESIGN ISSUES:
•
The design of transport protocols for WSNs should consider the following factors:
1. Perform congestion control and reliable delivery of data:
➢ WSNs need a mechanism for packet loss recovery, such as ACK and selective ACK used in
TCP.
➢ reliable delivery in WSNs may have a different meaning than that in traditional networks,
correct transmission of every packet is guaranteed.
➢ For certain sensor applications, WSNs only need to receive packets correctly from a
fraction of sensors in that area, not from every sensor node in that area.
➢ This observation can result in an important input for the design of WSN transport protocols.
➢ Also, it may be more effective to use a hop-by-hop approach for congestion control and loss
recovery since it may reduce packet loss and therefore conserve energy.
2. Simplify the initial connection establishment process:
➢ use a connectionless protocol to speed up the connection process, improve throughput, and
lower transmission delay.
➢ Most applications in WSNs are reactive, which means that they monitor passively and wait
for events to occur before sending data to the sink.
➢ These applications may have only a few packets to send as the result of an event.
3. Avoid packet loss:
➢ Transport protocols for WSNs should avoid packet loss as much as possible since loss
translates to energy waste.
➢ To avoid packet loss, the transport protocol should use an active congestion control (ACC)
at the cost of slightly lower link utilization.
➢ ACC triggers congestion avoidance before congestion actually occurs. As an example of
ACC, the sender (or intermediate nodes) may reduce its sending (or forwarding) rate when
the buffer size of the downstream neighbors exceeds a certain threshold.
4. The transport control protocols should guarantee fairness for a variety of sensor
nodes.
5. Cross-layer optimization:
➢ if a routing algorithm informs the transport protocol of route failure, the protocol will be
able to deduce that packet loss is not from congestion but from route failure.
➢ In this case, the sender may maintain its current rate.
EXAMPLES OF EXISTING TRANSPORT CONTROL PROTOCOLS
• Most examples can be grouped in one of the four groups: upstream congestion control,
downstream congestion control, upstream reliability guarantee, and downstream reliability
guarantee.
77
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
1. CODA (Congestion Detection and Avoidance):
• CODA is an upstream congestion control technique that consists of three elements: congestion
detection, open-loop hop-by-hop backpressure, and closed-loop end-to-end multisource
regulation.
• CODA attempts to detect congestion by monitoring current buffer occupancy and wireless
channel load.
• If buffer occupancy or wireless channel load exceeds a threshold, it implies that congestion has
occurred.
• The node that has detected congestion will then notify its upstream neighbor to reduce its rate,
using an open-loop hop-by-hop backpressure.
• The upstream neighbor nodes trigger reduction of their output rate using methods such as
AIMD.
• Finally, CODA regulates a multisource rate through a closed-loop end-to-end approach, as
follows:
(1) When a sensor node exceeds its theoretical rate, it sets a ‘‘regulation’’ bit in the ‘‘event’’
packet;
(2) If the event packet received by the sink has a ‘‘regulation’’ bit set, the sink sends an ACK
message to the sensor nodes and informs them to reduce their rate; and
(3) if the congestion is cleared, the sink will send an immediate ACK control message to the
sensor nodes, informing them that they can increase their rate.
• CODA’s disadvantages are its unidirectional control, only from the sensors to the sink; there is
no reliability consideration; and the response time of its closed-loop multisource control
increases under heavy congestion since the ACK issued from the sink will probably be lost.
2. ESRT (Event-to-Sink Reliable Transport)
• ESRT, which provides reliability and congestion control, belongs to the upstream reliability
guarantee group.
• It periodically computes a reliability figure (r), representing the rate of packets received
successfully in a given time interval.
• ESRT then deduces the required sensor reporting frequency (f) from the reliability figure (r)
using an expression such as f= G(r).
• Finally, ESRT informs all sensors of the values of (f) through an assumed channel with high
power. ESRT uses an end-to-end approach to guarantee a desired reliability figure through
adjusting the sensors’ reporting frequency. It provides overall reliability for the application.
• The additional benefit of ESRT is energy conservation through control of reporting frequency.
• Disadvantages of ESRT are that it advertises the same reporting frequency to all sensors (since
different nodes may have contributed differently to congestion, applying different frequencies
would be more appropriate) and considers mainly reliability and energy conservation as
performance measures.
3. RMST (Reliable Multi-segment Transport)
• RMST guarantees successful transmission of packets in the upstream direction.
• Intermediate nodes cache each packet to enable hop-by-hop recovery, or they operate in noncache mode, where only end hosts cache the transmitted packets for end-to-end recovery.
• RMST supports both cache and non-cache modes.
78
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
Furthermore, RMST uses selective NACK and timer-driven mechanisms for loss detection and
notification. In the cache mode, lost packets are recovered hop by hop through the intermediate
sensor nodes. If an intermediate node fails to locate the lost packet, or if the intermediate node
works in non-cache mode, it will forward the NACK upstream toward the source node.
RMTS is designed to run above directed diffusion, which is a routing protocol, in order to
provide guaranteed reliability for applications.
Problems with RMST are lack of congestion control, energy efficiency, and application-level
reliability.
4. PSFQ (Pump Slowly, Fetch Quickly)
• PSFQ distributes data from sink to sensors by pacing data at a relatively slow speed but
allowing sensor nodes that experience data loss to recover any missing segments from
immediate neighbors.
• This approach belongs to the group downstream reliability guarantee.
• The motivation is to achieve loose delay bounds while minimizing loss recovery by localizing
data recovery among immediate neighbors. PSFQ consists of three operations: pump, fetch, and
report.
• This is how PSFQ works: Sink broadcasts a packet to its neighbors every T time units until all
the data fragments have been sent out.
• Once a sequence number gap is detected, the sensor node goes into fetch mode and issues a
NACK in the reverse path to recover the missing fragment.
• The NACK is not relayed by the neighbor nodes unless the number of times that the NACK is
sent exceeds a predefined threshold.
• Finally, the sink can ask sensors to provide it with the data delivery status information through
a simple and scalable hop-by-hop report mechanism.
• PSFQ has the following disadvantages: It cannot detect packet loss for single packet
transmission; it uses a slow pump, which results in a large delay; and hop-by-hop recovery with
cache necessitates larger buffer sizes.
5. GARUDA:
• GARUDA [7.5] is in the downstream reliability group. It is based on a two-tier node
architecture; nodes with 3i hops from the sink are selected as core sensor nodes (i is an integer).
• The remaining nodes (noncore) are called second-tier nodes. Each noncore sensor node chooses
a nearby core node as its core node. Noncore nodes use core nodes for lost packet recovery.
• GARUDA uses a NACK message for loss detection and notification. Loss recovery is
performed in two categories: loss recovery among core sensor nodes, and loss recovery
between noncore sensor nodes and their core node.
• Therefore, retransmission to recover lost packets looks like a hybrid scheme between pure hop
by hop and end to end.
• GARUDA designs a repeated wait for first packet (WFP) pulse transmission to guarantee the
success of single or first packet delivery.
• Furthermore, pulse transmission is used to compute the hop number and to select core sensor
nodes in order to establish a two-tier node architecture.
• Disadvantages of GARUDA include lack of reliability in the upstream direction and lack of
congestion control.
79
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
6. ATP (Ad Hoc Transport Protocol):
• ATP works based on a receiver-and network-assisted end-to-end feedback control algorithm. It
uses selective ACKs (SACKs) for packet loss recovery.
• In ATP, intermediate network nodes compute the sum of exponentially distributed packet
queuing and transmission delay, called D.
• The required end-to-end rate is set as the inverse of D.
• The values of D are computed over all packets that traverse a given sensor node, and if it
exceeds the value that is piggybacked in each outgoing packet, it updates the field before
forwarding the packet.
• The receiver calculates the required end-to-end rate (inverse of D) and feeds it back to the
sender.
• Thus, the sender can intelligently adjust its sending rate according to the value received from
the receiver.
• To guarantee reliability, ATP uses selective ACKs (SACKs) as an end-to-end mechanism for
loss detection.
• ATP decouples congestion control from reliability and as a result, achieves better fairness and
higher throughput than TCP.
• However, energy issues are not considered for this design, which raises the question of
optimality of ATP for an end-to-end control scheme.
Problems with Transport Control Protocols
• The major functions of transport protocols for wireless sensors networks that should be
considered carefully in the design of these protocols are congestion control, reliability
guarantee, and energy conservation.
• Most of the existing protocols reviewed here and reflected in the literature provide either
congestion or reliability in either upstream or downstream (not both).
• Another problem with the existing transport protocols for wireless sensor networks is that they
only control congestion either end-to-end or hop-by-hop.
• Transport protocols studied so far provide either packet- or application-level reliability (if
reliability is provided at all). If a sensor network supports two applications, one that requires
80
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
packet-level reliability and the other application-level reliability, the existing transport control
protocols will face difficulty. Therefore, an adaptive recovery mechanism is required to support
packet- and application level reliability as well as for energy efficiency.
None of the existing transport protocols implement cross-layer optimization.
PERFORMANCE OF TRANSPORT CONTROL PROTOCOLS:
1. Congestion:
• two general approaches to congestion control are end to end and hop by hop.
• In an end-to-end approach such as conventional TCP, it is the source node’s responsibility to
detect congestion in either the receiver-assisted (ACK-based loss detection) mode or the
network-assisted mode (using explicit congestion notification).
• Therefore, rate adjustments occur only at the source node.
• In hop-by-hop congestion control, intermediate nodes detect congestion and notify the
originating link node.
• Hop-by-hop control can potentially eliminate congestion faster than the end-to-end approach,
and can reduce packet loss and energy consumption in sensor nodes.
2. Packet Loss Recovery:
• Generally, two methods are available for this purpose: cache and non-cache recovery.
• Non-cache recovery is an end-to-end ARQ (automatic repeat request) similar to the traditional
TCP. Cache-based recovery uses a hop-by-hop approach and relies on caching at the
intermediate nodes, with retransmissions between two neighboring nodes.
• In the non-cache case, however, retransmissions may occur in h hops, and therefore more total
energy is required.
• The cache point is defined as the node that copies transmitted packets locally for a certain time
period; and the loss point is defined as the node at which packets are dropped due to
congestion.
• In cache-based recovery, each packet is stored at every intermediate node that it visits until its
neighboring node receives the packet successfully, or when a timeout occurs (whichever is
sooner).
81
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
UNIT III
PART 1
Wireless Transmission and Medium Access Control
•
•
•
1
•
•
2
•
3
•
•
4
•
•
•
With regard to devices, the term wireless is used.
This only describes the way of accessing a network or other communication partners, i.e.,
without a wire.
The wire is replaced by the transmission of electromagnetic waves through ‘the air’ (although
wireless transmission does not need any medium). A communication device can thus exhibit
one of the following characteristics:
Fixed and wired:
This configuration describes the typical desktop computer in an office.
Neither weight nor power consumption of the devices allow for mobile usage. The devices use
fixed networks for performance reasons.
Mobile and wired:
Many of today’s laptops fall into this category; users carry the laptop from one hotel to the
next, reconnecting to the company’s network via the telephone network and a modem.
Fixed and wireless:
This mode is used for installing networks, e.g., in historical buildings to avoid damage by
installing wires, or at trade shows to ensure fast network setup.
Another example is bridging the last mile to a customer by a new operator that has no wired
infrastructure and does not want to lease lines from a competitor.
Mobile and wireless:
This is the most interesting case.
No cable restricts the user, who can roam between different wireless networks.
Most technologies discussed in this book deal with this type of device and the networks
supporting them. Today’s most successful example for this category is GSM with more than
800 million users.
Applications:
1. Vehicles:
• Today’s cars already comprise some, but tomorrow’s cars will comprise many wireless
communication systems and mobility aware applications.
• Music, news, road conditions, weather reports, and other broadcast information are received via
digital audio broadcasting (DAB) with 1.5 Mbit/s.
• Cars driving in the same area build a local ad-hoc network for the fast exchange of information
in emergency situations or to help each other keep a safe distance.
• In the future, cars will also inform other cars about accidents via the ad-hoc network to help
them slow down in time, even before a driver can recognize an accident.
• Buses, trucks, and trains are already transmitting maintenance and logistic information to their
home base, which helps to improve organization (fleet management), and saves time and
money.
82
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
2. Emergencies:
• Vital information about injured persons can be sent to the hospital from the scene of the
accident.
• Wireless networks are the only means of communication in the case of natural disasters such as
hurricanes or earthquakes. In the worst cases, only decentralized, wireless ad-hoc networks
survive.
3. Business:
•
•
A travelling salesman today needs instant access to the company’s database: to ensure that files
on his or her laptop reflect the current situation, to enable the company to keep track of all
activities of their travelling employees, to keep databases consistent etc.
With wireless access, the laptop can be turned into a true mobile office, but efficient and
powerful synchronization mechanisms are needed to ensure data consistency.
4. Replacement of wired networks:
•
•
•
In some cases, wireless networks can also be used to replace wired networks, e.g., remote
sensors, for tradeshows, or in historic buildings.
Due to economic reasons, it is often impossible to wire remote sensors for weather forecasts,
earthquake detection, or to provide environmental information.
Wireless connections, e.g., via satellite, can help in this situation. Tradeshows need a highly
dynamic infrastructure, but cabling takes a long time and frequently proves to be too inflexible.
5. Infotainment and more:
• wireless networks can provide up-to-date information at any appropriate location.
• The travel guide might tell you something about the history of a building (knowing via GPS,
contact to a local base station, or triangulation where you are) downloading information about a
concert in the building at the same evening via a local wireless network.
• You may choose a seat, pay via electronic cash, and send this information to a service provider
6.
Location dependent services:
•
In many cases, however, it is important for an application to ‘know’ something about the
location or the user might need location information for further activities. Several services that
might depend on the actual location can be distinguished:
Follow-on services: Using mobile computers, a follow-on service could offer, for instance, the
same desktop environment wherever you are in the world. All e-mail would automatically be
forwarded and all changes to your desktop and documents would be stored at a central location
at your company.
Location aware services: Imagine you wanted to print a document sitting in the lobby of a hotel
using your laptop. Your computer might then transmit your personal profile to your hotel which
then charges you with the printing costs.
Privacy: The two service classes listed above immediately raise the question of privacy. There
might be locations and/or times when you want to exclude certain services from reaching you
and you do not want to be disturbed. You want to utilize location dependent services, but you
might not want the environment to know exactly who you are.
•
•
•
83
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
FREQUUENICES IN RADIO TRANMISSION:
• Radio transmission can take place using many different frequency bands. Each frequency band
exhibits certain advantages and disadvantages.
•
•
•
•
•
•
•
Radio transmission starts at several kHz, the very low frequency (VLF) range. These are very
long waves. Waves in the low frequency (LF) range are used by submarines, because they can
penetrate water and can follow the earth’s surface. Some radio stations still use these
frequencies, e.g., between 148.5 kHz and 283.5 kHz in Germany.
The medium frequency (MF) and high frequency (HF) ranges are typical for transmission of
hundreds of radio stations either as amplitude modulation (AM) between 520 kHz and 1605.5
kHz, as short wave (SW) between 5.9 MHz and 26.1 MHz, or as frequency modulation (FM)
between 87.5 MHz and 108 MHz. The frequencies limiting these ranges are typically fixed by
national regulation and, vary from country to country.
Short waves are typically used for (amateur) radio transmission around the world, enabled by
reflection at the ionosphere. Transmit power is up to 500 Kw – which is quite high compared to
the 1 W of a mobile phone.
As we move to higher frequencies, the TV stations follow. Conventional analog TV is
transmitted in ranges of 174–230 MHz and 470–790 MHz using the very high frequency (VHF)
and ultra-high frequency (UHF) bands. In this range, digital audio broadcasting (DAB) takes
place. UHF is also used for mobile phones with analog technology (450–465 MHz), the digital
GSM (890–960 MHz, 1710–1880 MHz), digital cordless telephones following the DECT
standard (1880–1900 MHz), 3G cellular systems following the UMTS standard (1900–1980
MHz, 2020–2025 MHz, 2110–2190 MHz) and many more.
Super high frequencies (SHF) are typically used for directed microwave links ( pprox.. 2–40
GHz) and fixed satellite services in the C-band (4 and 6 GHz), Ku-band (11 and 14 GHz), or
Ka-band (19 and 29 GHz). Some systems are planned in the extremely high frequency (EHF)
range which comes close to infrared. All radio frequencies are regulated to avoid interference,
e.g., the German regulation covers 9 kHz–275 GHz.
The next step into higher frequencies involves optical transmission, which is not only used for
fiber optical links but also for wireless communications. Infrared (IR) transmission is used for
directed links, e.g., to connect different buildings via laser links. The most widespread IR
technology, infrared data association (IrDA), uses wavelengths of approximately 850–900 nm
to connect laptops, PDAs etc.
Finally, visible light has been used for wireless transmission for thousands of years. While light
is not very reliable due to interference, but it is nevertheless useful due to built-in human
receivers.
SIGNALS:
• Signals are the physical representation of data. Users of a communication system can only
exchange data through the transmission of signals.
84
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
Layer 1 of the ISO/OSI basic reference model is responsible for the conversion of data, i.e.,
bits, into signals and vice versa.
Signals are functions of time and location. Signal parameters represent the data values.
The most interesting types of signals for radio transmission are periodic signals, especially sine
waves as carriers.
•
Signal parameters are the amplitude A, the frequency f, and the phase shift φ.
•
The amplitude as a factor of the function g may also change over time, thus At , The frequency
f expresses the periodicity of the signal with the period T = 1/f. (In equations, ω is frequently
used instead of 2πf.) The frequency f may also change over time, thus ft , Finally, the phase
shift determines the shift of the signal relative to the same signal without a shift.
A typical way to represent signals is the time domain.
•
•
•
•
•
Here the amplitude A of a signal is shown versus time (time is mostly measured in seconds s,
amplitudes can be measured in, e.g., volt V). This is also the typical representation known from
an oscilloscope.
Here the amplitude of a certain frequency part of the signal is shown versus the frequency.
Shows one peak and the signal consists only of a single frequency part (i.e., it is a single sine
function).
Representations in the time domain are problematic if a signal consists of many different
frequencies (as the Fourier equation indicates). In this case, a better representation of a signal is
the frequency domain.
85
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
ANTENNAS:
• we have to couple the energy from the transmitter to the outside world and, in reverse, from the
outside world to the receiver. T
• his is exactly what antennas do. Antennas couple electromagnetic energy to and from space to
and from a wire or coaxial cable (or any other appropriate conductor).
• A theoretical reference antenna is the isotropic radiator, a point in space radiating equal power
in all directions, i.e., all points with equal power are located on a sphere with the antenna as its
center.
• The radiation pattern is symmetric in all directions. Shown in the figure.
•
•
such an antenna does not exist in reality. Real antennas all exhibit directive effects, i.e., the
intensity of radiation is not the same in all directions from the antenna.
The simplest real antenna is a thin, center-fed dipole, also called Hertzian dipole. The length of
the dipole is not arbitrary, but, for example, half the wavelength λ of the signal to transmit
results in a very efficient radiation of the energy.
•
A λ/2 dipole has a uniform or omni-directional radiation pattern in one plane and a figure eight
pattern in the other two planes. This type of antenna can only overcome environmental
challenges by boosting the power level of the signal. Challenges could be mountains, valleys,
buildings etc.
•
If an antenna is positioned, e.g., in a valley or between buildings, an omnidirectional radiation
pattern is not very useful. In this case, directional antennas with certain fixed preferential
transmission and reception directions can be used. shows the radiation pattern of a directional
antenna with the main lobe in the direction of the x-axis. A special example of directional
antennas is constituted by satellite dishes.
86
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
Several directed antennas can be combined on a single pole to construct a sectorized antenna. A
cell can be sectorized into, for example, three or six sectors, thus enabling frequency reuse.
•
Two or more antennas can also be combined to improve reception by counteracting the
negative effects of multi-path propagation.
These antennas, also called multi-element antenna arrays, allow different diversity schemes.
One such scheme is switched diversity or selection diversity, where the receiver always uses
the antenna element with the largest output.
Diversity combining constitutes a combination of the power of all signals to produce gain.
A more advanced solution is provided by smart antennas which combine multiple antenna
elements (also called antenna array) with signal processing to optimize the radiation/reception
pattern in response to the signal environment.
These antennas can adapt to changes in reception power, transmission conditions and many
signal propagation effects.
•
•
•
•
•
SIGNAL PROPAGATION:
•
•
•
Transmission range: Within a certain radius of the sender transmission is possible, i.e., a
receiver receives the signals with an error rate low enough to be able to communicate and can
also act as sender.
Detection range: Within a second radius, detection of the transmission is possible, i.e., the
transmitted power is large enough to differ from background noise. However, the error rate is
too high to establish communication.
Interference range: Within a third even larger radius, the sender may interfere with other
transmission by adding to the background noise. A receiver will not be able to detect the
signals, but the signals may disturb other signals.
PATH LOSS OF RADIO SIGNALS:
• In free space radio signals propagate as light does (independently of their frequency), i.e., they
follow a straight line (besides gravitational effects).
87
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
•
•
•
•
If such a straight line exists between a sender and a receiver it is called line-of-sight (LOS).
Even if no matter exists between the sender and the receiver (i.e., if there is a vacuum), the
signal still experiences the free space loss.
As soon as there is any matter between sender and receiver, the situation becomes more
complex. Most radio transmission takes place through the atmosphere – signals travel through
air, rain, snow, fog, dust particles, smog etc.
While the path loss or attenuation does not cause too much trouble for short distances, e.g., for
LANs, the atmosphere heavily influences transmission over long distances, e.g., satellite
transmission.
Radio waves can exhibit three fundamental propagation behaviors depending on their
frequency:
Ground wave (<2 MHz): Waves with low frequency follow the earth’s surface and can
propagate long distances. E.g. used in submarine communication.
Sky wave (2–30 MHz): Many international broadcasts and amateur radio use these short waves
that are reflected2 at the ionosphere. This way the waves can bounce back and forth between
the ionosphere and the earth’s surface, travelling around the world.
Line-of-sight (>30 MHz): Mobile phone systems, satellite systems, cordless telephones etc. use
even higher frequencies. The emitted waves follow a (more or less) straight line of sight. This
enables direct communication with satellites (no reflection at the ionosphere) or microwave
links on the ground. However, an additional consideration for ground-based communication is
that the waves are bent by the atmosphere due to refraction.
ADDITIONAL SIGNAL PROPATION EFFECTS:
• in real life, we rarely have a line-of-sight between the sender and receiver of radio signals.
• Mobile phones are typically used in big cities with skyscrapers, on mountains, inside buildings,
while driving through an alley etc. Hare several effects occur in addition to the attenuation
caused by the distance between sender and receiver, which are again very much frequency
dependent.
1 Blocking or Shadowing:
• The higher the frequency of a signal, the more it behaves like light. Even small obstacles like a
simple wall, a truck on the street, or trees in an alley may block the signal.
2 Reflection:
• If an object is large compared to the wavelength of the signal, e.g., huge buildings, mountains,
or the surface of the earth, the signal is reflected. The reflected signal is not as strong as the
original, as objects can absorb some of the signal’s power. Reflection helps transmitting signals
as soon as no LOS exists.
3 Refraction:
• the effect of refraction occurs because the velocity of the electromagnetic waves depends on the
density of the medium through which it travels.
• This is the reason for LOS radio waves being bent towards the earth: the density of the
atmosphere is higher closer to the ground.
88
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
4 Scattering:
• If the size of an obstacle is in the order of the wavelength or less, then waves can be scattered.
An incoming signal is scattered into several weaker outgoing signals.
5 Diffraction:
• this effect is very similar to scattering. Radio waves will be deflected at an edge and propagate
in different directions. The result of scattering and diffraction are patterns with varying signal
strengths depending on the location of the receiver.
MULTIPATH PROPAGATION:
• Together with the direct transmission from a sender to a receiver, the propagation effects
mentioned in the previous section lead to one of the most severe radio channel impairments,
called multi-path propagation.
• Due to the finite speed of light, signals travelling along different paths with different lengths
arrive at the receiver at different times.
• This effect (caused by multi-path propagation) is called delay spread: the original signal is
spread due to different delays of parts of the signal. This delay spread is a typical effect of radio
transmission, because no wire guides the waves along a single path as in the case of wired
networks.
•
•
The first effect is that a short impulse will be smeared out into a broader impulse, or rather into
several weaker impulses.
On the sender side, both impulses are separated. At the receiver, both impulses interfere, i.e.,
they overlap in time. Now consider that each impulse should represent a symbol, and that one
or several symbols could represent a bit. The energy intended for one symbol now spills over to
the adjacent symbol, an effect which is called intersymbol interference (ISI). The higher the
symbol rate to be transmitted, the worse the effects of ISI will be, as the original symbols are
moved closer and closer to each other.
89
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
MULTIPLEXING:
• Multiplexing is not only a fundamental mechanism in communication systems but also in
everyday life. Multiplexing describes how several users can share a medium with minimum or
no interference.
• One example, is highways with several lanes. Many users (car drivers) use the same medium
(the highways) with hopefully no interference (i.e., accidents).
• This is possible due to the provision of several lanes (space division multiplexing) separating
the traffic. In addition, different cars use the same medium (i.e., the same lane) at different
points in time (time division multiplexing).
1 Space division multiplexing:
• For wireless communication, multiplexing can be carried out in four dimensions: space, time,
frequency, and code.
• In this field, the task of multiplexing is to assign space, time, frequency, and code to each
communication channel with a minimum of interference and a maximum of medium utilization.
• The term communication channel here only refers to an association of sender(s) and receiver(s)
who want to exchange data.
• Shows six channels ki and introduces a three dimensional coordinate system. This system
shows the dimensions of code c, time t and frequency f. For this first type of multiplexing,
space division multiplexing (SDM), the (three dimensional) space si is also shown. The
channels k1 to k3 can be mapped onto the three ‘spaces’ s1 to s3 which clearly separate the
channels and prevent the interference ranges from overlapping. The space between the
interference ranges is sometimes called guard space. Such a guard space is needed in all four
multiplexing schemes presented.
2
•
•
•
Frequency division multiplexing:
Frequency division multiplexing (FDM) describes schemes to subdivide the frequency
dimension into several non-overlapping frequency band.
Each channel ki is now allotted its own frequency band as indicated. Senders using a certain
frequency band can use this band continuously.
Again, guard spaces are needed to avoid frequency band overlapping (also called adjacent
channel interference). This scheme is used for radio stations within the same region, where
each radio station has its own frequency.
90
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
3
•
•
•
•
4
•
•
•
This very simple multiplexing scheme does not need complex coordination between sender and
receiver: the receiver only has to tune in to the specific sender.
However, this scheme also has disadvantages. While radio stations broadcast 24 hours a day,
mobile communication typically takes place for only a few minutes at a time. Assigning a
separate frequency for each possible communication scenario would be a tremendous waste of
(scarce) frequency resources. Additionally, the fixed assignment of a frequency to a sender
makes the scheme very inflexible and limits the number of senders.
Time division multiplexing:
A more flexible multiplexing scheme for typical mobile communications is time division
multiplexing (TDM). Here a channel ki is given the whole bandwidth for a certain amount of
time, i.e., all senders use the same frequency but at different points in time.
Again, guard spaces, which now represent time gaps, have to separate the different periods
when the senders use the medium. In our highway example, this would refer to the gap between
two cars. If two transmissions overlap in time, this is called co-channel interference. (In the
highway example, interference between two cars results in an accident.)
To avoid this type of interference, precise synchronization between different senders is
necessary. This is clearly a disadvantage, as all senders need precise clocks or, alternatively, a
way has to be found to distribute a synchronization signal to all senders.
For a receiver tuning in to a sender this does not just involve adjusting the frequency, but
involves listening at exactly the right point in time. However, this scheme is quite flexible as
one can assign more sending time to senders with a heavy load and less to those with a light
load.
Code division multiplexing:
code division multiplexing (CDM) is a relatively new scheme in commercial communication
systems. First used in military applications due to its inherent security features.
Separation is now achieved by assigning each channel its own ‘code’, guard spaces are realized
by using codes with the necessary ‘distance’ in code space, e.g., orthogonal codes.
The main advantage of CDM for wireless transmission is that it gives good protection against
interference and tapping. Different codes have to be assigned, but code space is huge compared
91
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
to the frequency space. Assigning individual codes to each sender does not usually cause
problems.
The main disadvantage of this scheme is the relatively high complexity of the receiver. . A
receiver has to know the code and must separate the channel with user data from the
background noise composed of other signals and environmental noise.
MODULATION:
• Three different basic schemes are known for analog modulation: amplitude modulation (AM),
frequency modulation (FM), and phase modulation (PM).
block diagram of a radio transmitter for digital data
•
The first step is the digital modulation of data into the analog baseband signal according to one
of the schemes presented in the following sections. The analog modulation then shifts the
center frequency of the analog signal up to the radio carrier. This signal is then transmitted via
the antenna.
•
The receiver receives the analog radio signal via its antenna and demodulates the signal into the
analog baseband signal with the help of the known carrier. This would be all that is needed for
an analog radio tuned in to a radio station. (The analog baseband signal would constitute the
music.)
For digital data, another step is needed. Bits or frames have to be detected, i.e., the receiver
must synchronize with the sender. How synchronization is achieved, depends on the digital
modulation scheme. After synchronization, the receiver has to decide if the signal represents a
digital 1 or a 0, reconstructing the original data.
•
92
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
•
•
•
•
•
1 Amplitude Shift Keying:
The most simple digital modulation scheme. The two binary values, 1 and 0, are represented by
two different amplitudes.
In the example, one of the amplitudes is 0 (representing the binary 0). This simple scheme only
requires low bandwidth, but is very susceptible to interference.
Effects like multi-path propagation, noise, or path loss heavily influence the amplitude. In a
wireless environment, a constant amplitude cannot be guaranteed, so ASK is typically not used
for wireless radio transmission.
ASK can also be applied to wireless infra red transmission, using a directed beam or diffuse
light.
2 Frequency Shift Keying:
A modulation scheme often used for wireless transmission is frequency shift keying (FSK).
The simplest form of FSK, also called binary FSK (BFSK), assigns one frequency f1 to the
binary 1 and another frequency f2 to the binary 0. A very simple way to implement FSK is to
switch between two oscillators, one with the frequency f1 and the other with f2, depending on
the input.
3 Phase shift keying:
Phase shift keying (PSK) uses shifts in the phase of a signal to represent data.
shows a phase shift of 180° or π as the 0 follows the 1 (the same happens as the 1 follows the
0). This simple scheme, shifting the phase by 180° each time the value of data changes, is also
called binary PSK (BPSK).
A simple implementation of a BPSK modulator could multiply a frequency f with +1 if the
binary data is 1 and with –1 if the binary data is 0.
93
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
CELLULAR SYSTEMS
• Cellular systems for mobile communications implement SDM. Each transmitter, typically
called a base station, covers a certain area, a cell.
• Cell radii can vary from tens of meters in buildings, and hundreds of meters in cities, up to tens
of kilometers in the countryside. The shape of cells are never perfect circles or hexagons but
depend on the environment (buildings, mountains, valleys etc.), on weather conditions, and
sometimes even on system load.
• Advantages of cellular systems with small cells are the following:
1. Higher capacity:
• Implementing SDM allows frequency reuse. If one transmitter is far away from another, i.e.,
outside the interference range, it can reuse the same frequencies.
• As most mobile phone systems assign frequencies to certain users (or certain hopping patterns),
this frequency is blocked for other users. But frequencies are a scarce resource and, the number
of concurrent users per cell is very limited. Huge cells do not allow for more users.
• On the contrary, they are limited to less possible users per km2.
• This is also the reason for using very small cells in cities where many more people use mobile
phones.
2. Less transmission power:
• While power aspects are not a big problem for base stations, they are indeed problematic for
mobile stations.
• A receiver far away from a base station would need much more transmit power than the current
few Watts.
• But energy is a serious problem for mobile handheld devices.
3. Local interference only:
• Having long distances between sender and receiver results in even more interference problems.
• With small cells, mobile stations and base stations only have to deal with ‘local’ interference.
4. Robustness:
• Cellular systems are decentralized and so, more robust against the failure of single components.
• If one antenna fails, this only influences communication within a small area.
94
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
•
To avoid interference, different transmitters within each other’s interference range use FDM.
If FDM is combined with TDM, the hopping pattern has to be coordinated. The general goal is
never to use the same frequency at the same time within the interference range (if CDM is not
applied).
Two possible models to create cell patterns with minimal interference.
Cells are combined in clusters – on the left side three cells form a cluster, on the right side
seven cells form a cluster.
All cells within a cluster use disjointed sets of frequencies. On the left side, one cell in the
cluster uses set f1, another cell f2, and the third cell f3. In real-life transmission, the pattern will
look somewhat different. The hexagonal pattern is chosen as a simple way of illustrating the
model. This pattern also shows the repetition of the same frequency sets. The transmission
power of a sender has to be limited to avoid interference with the next cell using the same
frequencies.
95
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
UNIT III
PART 2
TELECOMMUNICATION SYSTTEMS
1.
Global System for Mobile Communication:
•
GSM is the most successful digital mobile telecommunication system in the world today. It is
used by over 800 million people in more than 190 countries.
In the early 1980s, Europe had numerous coexisting analog mobile phone systems, which were
often based on similar standards (e.g., NMT 450), but ran on slightly different carrier
frequencies.
To avoid this situation for a second generation fully digital system, the groupe spéciale mobile
(GSM) was founded in 1982. This system was soon named the global system for mobile
communications (GSM), with the specification process lying in the hands of ETSI (ETSI,
2002), (GSM Association, 2002).
The primary goal of GSM was to provide a mobile phone system that allows users to roam
throughout Europe and provides voice services compatible to ISDN and other PSTN systems.
GSM is a typical second generation system, replacing the first generation analog systems, but
not offering the high worldwide data rates that the third generation systems, such as UMTS, are
promising.
GSM has initially been deployed in Europe using 890–915 MHz for uplinks and 935–960 MHz
for downlinks.
SERVICES:
➢ GSM permits the integration of different voice and data services and the interworking with
existing networks.
➢ GSM has defined three different categories of services: bearer, tele, and supplementary
services.
I. Bearer services:
➢ GSM specifies different mechanisms for data transmission, the original GSM allowing for
data rates of up to 9600 bit/s for non-voice services.
➢ Bearer services permit transparent and non-transparent, synchronous or asynchronous data
transmission. Transparent bearer services only use the functions of the physical layer (layer
1) to transmit data.
➢ Non-transparent bearer services use protocols of layers two and three to implement error
correction and flow control. These services use the transparent bearer services, adding a
radio link protocol (RLP). This protocol comprises mechanisms of high-level data link
control (HDLC).
II. Tele Services:
➢ These comprise encrypted voice transmission, message services, and basic data
communication with terminals as known from the PSTN or ISDN (e.g., fax).
➢ However, as the main service is telephony, the primary goal of GSM was the provision of
high-quality digital voice transmission, offering at least the typical bandwidth of 3.1 kHz
of analog phone systems.
•
•
•
•
•
96
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
➢ Special codecs (coder/decoder) are used for voice transmission, while other codecs are
used for the transmission of analog data for communication with traditional computer
modems used in, e.g., fax machines.
➢ Another service offered by GSM is the emergency number. The same number can be used
throughout Europe.
➢ A useful service for very simple message transfer is the short message service (SMS),
which offers transmission of messages of up to 160 characters.
➢ The successor of SMS, the enhanced message service (EMS), offers a larger message size
(e.g., 760 characters, concatenating several SMs), formatted text, and the transmission of
animated pictures, small images and ring tones in a standardized way (some vendors
offered similar proprietary features before).
➢ The multimedia message service (MMS) was available.
III. Supplementary services:
➢ Typical services are user identification, call redirection, or forwarding of ongoing calls.
➢ Standard ISDN features such as closed user groups and multiparty communication may be
available.
➢ Closed user groups are of special interest to companies because they allow, for example, a
company-specific GSM sub-network, to which only members of the group have access.
System architecture:
• A GSM system consists of three subsystems, the radio sub system (RSS), the network and
switching subsystem (NSS), and the operation subsystem (OSS).
97
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
Radio subsystem:
•
•
•
•
•
The radio subsystem (RSS) comprises all radio specific entities, i.e., the mobile stations (MS)
and the base station subsystem (BSS).
Base station subsystem (BSS): A GSM network comprises many BSSs, each controlled by a
base station controller (BSC). The BSS performs all functions necessary to maintain radio
connections to an MS, coding/decoding of voice, and rate adaptation to/from the wireless
network part. Besides a BSC, the BSS contains several BTSs.
Base transceiver station (BTS): A BTS comprises all radio equipment, i.e., antennas, signal
processing, amplifiers necessary for radio transmission. A BTS can form a radio cell or, using
sectorized antennas, several cells (see section 2.8), and is connected to MS via the Um interface
(ISDN U interface for mobile use), and to the BSC via the Abis interface. The Um interface
contains all the mechanisms necessary for wireless transmission (TDMA, FDMA etc.) and will
be discussed in more detail below. The Abis interface consists of 16 or 64 kbit/s connections. A
GSM cell can measure between some 100 m and 35 km depending on the environment
(buildings, open space, mountains etc.) but also expected traffic.
Base station controller (BSC): The BSC basically manages the BTSs. It reserves radio
frequencies, handles the handover from one BTS to another within the BSS, and performs
paging of the MS. The BSC also multiplexes the radio channels onto the fixed network
connections at the A interface.
Mobile station (MS): The MS comprises all user equipment and software needed for
communication with a GSM network. An MS consists of user independent hard- and software
and of the subscriber identity module (SIM), which stores all user-specific data that is relevant
to GSM.3 While an MS can be identified via the international mobile equipment identity
(IMEI), a user can personalize any MS using his or her SIM, i.e., user-specific mechanisms like
charging and authentication are based on the SIM, not on the device itself.
Network and switching subsystem:
•
•
The “heart” of the GSM system is formed by the network and switching subsystem (NSS).
The NSS connects the wireless network with standard public networks, performs handovers
between different BSSs, comprises functions for worldwide localization of users and supports
charging, accounting, and roaming of users between different providers in different countries.
The NSS consists of the following switches and databases:
•
•
Mobile services switching center (MSC): MSCs are high-performance digital ISDN switches.
They set up connections to other MSCs and to the BSCs via the A interface, and form the fixed
backbone network of a GSM system. Typically, an MSC manages several BSCs in a
geographical region. A gateway MSC (GMSC) has additional connections to other fixed
networks, such as PSTN and ISDN. Using additional interworking functions (IWF), an MSC
can also connect to public data networks (PDN).
Home location register (HLR): The HLR is the most important database in a GSM system as
it stores all user-relevant information. This comprises static information, such as the mobile
subscriber ISDN number (MSISDN), subscribed services (e.g., call forwarding, roaming
98
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
restrictions, GPRS), and the international mobile subscriber identity (IMSI). Dynamic
information is also needed, e.g., the current location area (LA) of the MS, the mobile subscriber
roaming number (MSRN), the current VLR and MSC. As soon as an MS leaves its current LA,
the information in the HLR is updated. This information is necessary to localize a user in the
worldwide GSM network. All these user-specific information elements only exist once for each
user in a single HLR, which also supports charging and accounting
Visitor location register (VLR): The VLR associated to each MSC is a dynamic database
which stores all important information needed for the MS users currently in the LA that is
associated to the MSC (e.g., IMSI, MSISDN, HLR address). If a new MS comes into an LA the
VLR is responsible for, it copies all relevant information for this user from the HLR. This
hierarchy of VLR and HLR avoids frequent HLR updates and long-distance signaling of user
information. The typical use of HLR and VLR for user localization.
Operation subsystem:
•
•
•
•
•
The third part of a GSM system, the operation subsystem (OSS), contains the necessary
functions for network operation and maintenance.
The OSS possesses network entities of its own and accesses other entities via SS7 signaling.
Operation and maintenance center (OMC): The OMC monitors and controls all other
network entities via the O interface (SS7 with X.25). Typical OMC management functions are
traffic monitoring, status reports of network entities, subscriber and security management, or
accounting and billing. OMCs use the concept of telecommunication management network
(TMN) as standardized by the ITU-T.
Authentication centre (AuC): As the radio interface and mobile stations are particularly
vulnerable, a separate AuC has been defined to protect user identity and data transmission. The
AuC contains the algorithms for authentication as well as the keys for encryption and generates
the values needed for user authentication in the HLR. The AuC may, in fact, be situated in a
special protected part of the HLR.
Equipment identity register (EIR): The EIR is a database for all IMEIs, i.e., it stores all
device identifications registered for this network. As MSs are mobile, they can be easily stolen.
With a valid SIM, anyone could use the stolen MS. The EIR has a blacklist of stolen (or
locked) devices. In theory an MS is useless as soon as the owner has reported a theft.
Unfortunately, the blacklists of different providers are not usually synchronized and the illegal
use of a device in another operator’s network is possible (the reader may speculate as to why
this is the case). The EIR also contains a list of valid IMEIs (white list), and a list of
malfunctioning devices (gray list).
GSM Frame:
• Each of the 248 channels is additionally separated in time via a GSM TDMA frame, i.e., each 200 kHz carrier is
subdivided into frames that are repeated continuously.
•
The duration of a frame is 4.615 ms. A frame is again subdivided into 8 GSM time slots, where each slot
represents a physical TDM channel and lasts for 577 µs.
•
•
Each TDM channel occupies the 200 kHz carrier for 577 µs every 4.615 ms.
Data is transmitted in small portions, called bursts. contains 148 bits.
99
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
The first and last three bits of a normal burst (tail) are all set to 0 and can be used to enhance the receiver
performance.
•
The training sequence in the middle of a slot is used to adapt the parameters of the receiver to the current path
propagation characteristics and to select the strongest signal in case of multi-path propagation.
•
•
A flag S indicates whether the data field contains user or network control data.
Apart from the normal burst, four more bursts for data transmission: a frequency correction burst allows the MS
to correct the local oscillator to avoid interference with neighboring channels, a synchronization burst with an
extended training sequence synchronizes the MS with the BTS in time, an access burst is used for the initial
connection setup between MS and BTS, and finally a dummy burst is used if no data is available for a slot.
Logical Channels:
• GSM specifies two basic groups of logical channels, i.e., traffic channels and control channels:
1 Traffic channels (TCH):
➢ GSM uses a TCH to transmit user data (e.g., voice, fax).
➢ Two basic categories of TCHs have been defined, i.e., full-rate TCH (TCH/F) and half-rate
TCH (TCH/H). A TCH/F has a data rate of 22.8 kbit/s, whereas TCH/H only has 11.4 kbit/s.
2 Control Channels (CCH):
➢ Many different CCHs are used in a GSM system to control medium access, allocation of traffic
channels or mobility management.
➢ Three groups of control channels have been defined, each again with subchannels.
a. Broadcast control channel (BCCH):
A BTS uses this channel to signal information to all MSs within a cell. Information transmitted
in this channel is, e.g., the cell identifier, options available within this cell (frequency hopping),
and frequencies available inside the cell and in neighboring cells.
The BTS sends information for frequency correction via the frequency correction channel
(FCCH) and information about time synchronization via the synchronization channel (SCH),
where both channels are subchannels of the BCCH.
b. Common control channel (CCCH):
➢ All information regarding connection setup between MS and BS is exchanged via the CCCH.
For calls toward an MS, the BTS uses the paging channel (PCH) for paging the appropriate
100
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
➢
➢
➢
➢
➢
➢
➢
MS. If an MS wants to set up a call, it uses the random access channel (RACH) to send data to
the BTS.
The RACH implements multiple access (all MSs within a cell may access this channel) using
slotted Aloha. This is where a collision may occur with other MSs in a GSM system.
The BTS uses the access grant channel (AGCH) to signal an MS that it can use a TCH or
SDCCH for further connection setup.
c. Dedicated control channel (DCCH):
While the previous channels have all been unidirectional, the following channels are
bidirectional. As long as an MS has not established a TCH with the BTS, it uses the stand-alone
dedicated control channel (SDCCH) with a low data rate (782 bit/s) for signaling.
This can comprise authentication, registration or other data needed for setting up a TCH.
Each TCH and SDCCH has a slow associated dedicated control channel (SACCH) associated
with it, which is used to exchange system information, such as the channel quality and signal
power level.
Finally, if more signaling information needs to be transmitted and a TCH already exists, GSM
uses a fast associated dedicated control channel (FACCH).
The FACCH uses the time slots which are otherwise used by the TCH. This is necessary in the
case of handovers where BTS and MS have to exchange larger amounts of data in less time.
Protocols:
•
•
•
•
•
•
The main tasks of the physical layer comprise channel coding and error detection/correction,
which is directly combined with the coding mechanisms. Channel coding makes extensive use
of different forward error correction (FEC) schemes. The GSM physical layer tries to correct
errors, but it does not deliver erroneous data to the higher layer.
Signaling between entities in a GSM network requires higher layers.
LAPDm protocol has been defined at the Um interface for layer two.
LAPDm is a lightweight LAPD because it does not need synchronization flags or
checksumming for error detection. (The GSM physical layer already performs these tasks.)
LAPDm offers reliable data transfer over connections, re-sequencing of data frames, and flow
control.
The network layer in GSM, layer three, comprises several sublayers as Figure 4.7 shows. The
lowest sublayer is the radio resource management (RR). Only a part of this layer, RR’, is
implemented in the BTS, the remainder is situated in the BSC. The main tasks of RR are setup,
maintenance, and release of radio channels.
Mobility management (MM) contains functions for registration, authentication, identification,
location updating, and the provision of a temporary mobile subscriber identity (TMSI) that
101
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
replaces the international mobile subscriber identity (IMSI) and which hides the real identity of
an MS user over the air interface.
call management (CM) layer contains three entities: call control (CC), short message service
(SMS), and supplementary service (SS). SMS allows for message transfer using the control
channels SDCCH and SACCH (if no signaling data is sent).
CC provides a point-to-point connection between two terminals and is used by higher layers for
call establishment, call clearing and change of call parameters. This layer also provides
functions to send in-band tones, called dual tone multiple frequency (DTMF), over the GSM
network.
Localization and calling:
• One fundamental feature of the GSM system is the automatic, worldwide localization of users.
The system always knows where a user currently is, and the same phone number is valid
worldwide.
• To locate an MS and to address the MS, several numbers are needed:
Mobile station international ISDN number (MSISDN)
International mobile subscriber identity (IMSI)
Temporary mobile subscriber identity (TMSI)
Mobile station7 roaming number (MSRN)
• Case 1: Mobile terminated call:
•
Case 2: Mobile originated call:
102
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
Handover:
•
•
•
•
Cellular systems require handover procedures, as single cells do not cover the whole service
area, but, e.g., only up to 35 km around each antenna on the countryside and some hundred
meters in cities.
The smaller the cell size and the faster the movement of a mobile station through the cells (up
to 250 km/h for GSM), the more handovers of ongoing calls are required.
However, a handover should not cause a cut-off, also called call drop. GSM aims at maximum
handover duration of 60 ms.
Four possible handover scenarios in GSM:
Intra-cell handover:
➢ Within a cell, narrow-band interference could make transmission at a certain frequency
impossible. The BSC could then decide to change the carrier frequency (scenario 1).
Inter-cell, intra-BSC handover:
➢ This is a typical handover scenario. The mobile station moves from one cell to another, but
stays within the control of the same BSC. The BSC then performs a handover, assigns a
new radio channel in the new cell and releases the old one (scenario 2).
Inter-BSC, intra-MSC handover:
➢ As a BSC only controls a limited number of cells; GSM also has to perform handovers
between cells controlled by different BSCs.
➢ This handover then has to be controlled by the MSC (scenario 3).
Inter MSC handover:
➢ A handover could be required between two cells belonging to different MSCs. Now both
MSCs perform the handover together (scenario 4).
103
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
Security:
•
•
•
•
GSM offers several security services using confidential information stored in the AuC and in
the individual SIM (which is plugged into an arbitrary MS).
The SIM stores personal, secret data and is protected with a PIN against unauthorized use. (For
example, the secret key Ki used for authentication and encryption procedures is stored in the
SIM.)
The security services offered by GSM are explained below:
Access control and authentication:
➢ The first step includes the authentication of a valid user for the SIM. The user needs a
secret PIN to access the SIM. The next step is the subscriber authentication.
➢ This step is based on a challenge-response scheme as presented in section 4.1.7.1.
Confidentiality:
➢ All user-related data is encrypted.
➢ After authentication, BTS and MS apply encryption to voice, data, and signaling.
➢ This confidentiality exists only between MS and BTS, but it does not exist end-to-end or
within the whole fixed GSM/telephone network.
Anonymity:
➢ To provide user anonymity, all data is encrypted before transmission, and user identifiers
(which would reveal an identity) are not used over the air.
➢ Instead, GSM transmits a temporary identifier (TMSI), which is newly assigned by the
VLR after each location update. Additionally, the VLR can change the TMSI at any time.
Three algorithms have been specified to provide security services in GSM. Algorithm A3 is
used for authentication, A5 for encryption, and A8 for the generation of a cipher key.
DIGITAL ENHANCED CORDLESS TELECOMMUNICATION(DECT):
•
•
Another fully digital cellular network is the digital enhanced cordless telecommunications
(DECT) system specified by ETSI (2002, 1998j, k), (DECT Forum, 2002).
Formerly also called digital European cordless telephone and digital European cordless
telecommunications, DECT replaces older analog cordless phone systems such as CT1 and
CT1+.
104
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
•
•
•
•
DECT is mainly used in offices, on campus, at trade shows, or in the home. Furthermore,
access points to the PSTN can be established within, e.g., railway stations, large government
buildings and hospitals, offering a much cheaper telephone service compared to a GSM system.
DECT could also be used to bridge the last few hundred meters between a new network
operator and customers. Using this ‘small range’ local loop, new companies can offer their
service without having their own lines installed in the streets.
A big difference between DECT and GSM exists in terms of cell diameter and cell capacity.
While GSM is designed for outdoor use with a cell diameter of up to 70 km, the range of DECT
is limited to about 300 m from the base station (only around 50 m are feasible inside buildings
depending on the walls).
DECT can offer its service to some 10,000 people within one km.
DECT works at a frequency range of 1880–1990 MHz offering 120 full duplex channels.
Time division duplex (TDD) is applied using 10 ms frames.
The frequency range is subdivided into 10 carrier frequencies using FDMA, each frame being
divided into 24 slots using TDMA.
12 slots are used as uplink, 12 slots as downlink.
System Architecture:
• As the core of the DECT system itself is quite simple, all typical network functions have to be
integrated in the local or global network, where the databases home data base (HDB) and
visitor data base (VDB) are also located.
• Both databases support mobility with functions that are similar to those in the HLR and VLR in
GSM systems. Incoming calls are automatically forwarded to the current subsystem responsible
for the DECT user, and the current VDB informs the HDB about changes in location.
105
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
The DECT core network consists of the fixed radio termination (FT) and the portable radio
termination (PT), and basically only provides a multiplexing service.
FT and PT cover layers one to three at the fixed network side and mobile network side
respectively. Additionally, several portable applications (PA) can be implemented on a device.
Protocol Architecture:
• The layers covered by the standard: the physical layer, medium access control, and data link
control8 for both the control plane (C-Plane) and the user plane (U-Plane).
• An additional network layer has been specified for the C-Plane, so that user data from layer two
is directly forwarded to the U-Plane. A management plane vertically covers all lower layers of
a DECT system.
• The physical layer comprises all functions for modulation/demodulation, incoming signal
detection, sender/receiver synchronization, and collection of status information for the
management plane. This layer generates the physical channel structure with a certain,
guaranteed throughput. On request from the MAC layer, the physical layer assigns a channel
for data transmission.
• The standard TDMA frame structure used in DECT and some typical data packets. Each frame
has a duration of 10 ms and contains 12 slots for the downlink and 12 slots for the uplink in the
basic connection mode. If a mobile node receives data in slot s, it returns data in slot s+12. An
advanced connection mode allows different allocation schemes. Each slot has a duration of
0.4167 ms and can contain several different physical packets. Typically, 420 bits are used for
data; the remaining 52 µs are left as guard space. The 420 data bits are again divided into a 32
bit synchronization pattern followed by the data field D.
106
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
•
•
•
•
•
The medium access control (MAC) layer establishes, maintains, and releases channels for
higher layers by activating and deactivating physical channels. MAC multiplexes several
logical channels onto physical channels. Logical channels exist for signaling network control,
user data transmission, paging, or sending broadcast messages
The data link control (DLC) layer creates and maintains reliable connections between the
mobile terminal and the base station. Two services have been defined for the C-Plane: a
connectionless broadcast service for paging (called Lb) and a point-to-point protocol similar to
LAPD in ISDN, but adapted to the underlying MAC (called LAPC+Lc)
The network layer of DECT is similar to those in ISDN and GSM and only exists for the CPlane. This layer provides services to request, check, reserve, control, and release resources at
the fixed station (connection to the fixed network, wireless connection) and the mobile terminal
(wireless connection).
The mobility management (MM) within the network layer is responsible for identity
management, authentication, and the management of the location data bases.
Call control (CC) handles connection setup, release, and negotiation. Two message services,
the connection-oriented message service (COMS) and the connectionless message service
(CLMS) transfer data to and from the interworking unit that connects the DECT system with
the outside world.
TERRISTRIAL TRUNKED RADIO(TERA)
Trunked radio systems constitute another method of wireless data transmission.
These systems use many different radio carriers but only assign a specific carrier to a certain
user for a short period of time according to demand.
While, for example, taxi services, transport companies with fleet management systems and
rescue teams all have their own unique carrier frequency in traditional systems, they can share a
whole group of frequencies in trunked radio systems for better frequency reuse via FDM and
TDM techniques.
These types of radio systems typically offer interfaces to the fixed telephone network, i.e.,
voice and data services, but are not publicly accessible.
107
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
•
•
•
•
•
These systems are not only simpler than most other networks, they are also reliable and
relatively cheap to set up and operate.
TETRA offers two standards: the Voice+Data (V+D) service (ETSI, 1998l) and the packet data
optimized (PDO) service (ETSI, 1998m).
V+D offers circuit-switched voice and data transmission, PDO only offers packet data
transmission, either connection-oriented to connect to X.25 or connectionless for the ISO
CLNS (connectionless network service). The latter service can be point-to-point or point-tomultipoint, the typical delay for a short message (128 byte) being less than 100 ms.
TETRA also offers bearer services of up to 28.8 kbit/s for unprotected data transmission and
9.6 kbit/s for protected transmission. Examples for end-to-end services are call forwarding, call
barring, identification, call hold, call priorities, emergency calls and group joins.
The system architecture of TETRA is very similar to GSM. Via the radio interface Um, the
mobile station (MS) connects to the switching and management infrastructure (SwMI), which
contains the user data bases (HDB, VDB), the base station, and interfaces to PSTN, ISDN, or
PDN.
Each frame consists of four slots (four channels in the V+D service per carrier), with a frame
duration of 56.67 ms.
Each slot carries 510 bits within 14.17 ms, i.e., 36 kbit/s. 16 frames together with one control
frame (CF) form a multiframe, and finally, a hyperframe contains 60 multiframes.
To avoid sending and receiving at the same time, TETRA shifts the uplink for a period of two
slots compared to the downlink.
TETRA offers traffic channels (TCH) and control channels (CCH) similar to GSM.
INTERNATIONAL TELECMMUNICATION UNION
•
The International Telecommunication Union (ITU), the United National (UN) organisation
responsible for global telecommunication standards, has been working since 1986 toward
developing an international standard for wireless access to worldwide telecommunication
infrastructure. This standard is known as IMT 2000 or International Mobile
Telecommunications 2000 (2000 indicates target availability year 2000 as well as the
operational frequency band 2000 MHz range).
•
IMT2000 defines the third generation (3G) mobile telecommunication system which
exhibits the following characteristics:
➢ Seamless global mobility and service delivery.
➢ Integration of the wire line and wireless network to provide telecommunication services
transparently to the users.
➢ Defining global standards that are flexible enough to meet local needs and to allow current
regional/national systems to evolve smoothly towards third generation system.
•
The vision for an IMT200 system and its capabilities are:
➢
Common spectrum world-wide (1.8 GHz-2.2 GHz band)
➢
Multiple radio environment (cellular, cordless, satellite, LANs)
➢
Wide range of telecommunication services (voice, data, multimedia and internet)
➢
Flexible radio bearers for increased spectrum efficiency.
108
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
➢
➢
Data rates up to 2 Mbps for indoor environments.
➢
Maximum use of IN capabilities.
➢
Global seamless roaming.
➢
Enhanced security and performance.
➢
Integration of satellite and terrestrial systems.
IMT2000 service environments will address the full range of mobile and personal
communication application. The scope of IMT2000 services include:
➢
In building (pico cell)
➢
Urban (micro cell)
➢
Suburban (macro cell)
➢
Global (satellite)
➢
Communication types that include voice, data and images.
Radio aspects of IMT2000 are:
➢
Uplink frequency: 1885-2025 MHz
➢
Downlink frequency: 2110-2200 MHz
➢
Transmission mode: FDD for mobile and satellite applications and TDD for indoor and
pedestrian type
➢
applications.
➢
A significant element of IMT2000 is the need to achieve a major improvement in spectrum
efficiency compared to the currently available in the 2G mobile communication. In context of
managing the access the spectrum, sharing a common pool of spectrum between operators
and/or between terrestrial and satellite services is used to improve spectrum efficiency.
➢
Key features of the radio access for IMT 2000 are:
➢
High level of flexibility
➢
Cost effectiveness in all operating environments
➢
Commonality of design worldwide
109
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
➢
Operation within the designated IMT 2000 frequency band
➢
Global radio channels are scanned by IMT terminal to find the required information on
available networks/standards and services. These channels carry information like bands used
for IMT 2000, frequency rasters, modulation characteristics, guard bands, duplex direction and
spacing, list of application services etc.
➢
Network implementation of IMT 2000
➢
➢
➢
As a stand-alone network with gateway and internetworking units towards supporting
networks in particular towards PSTN, ISDN, Packet DATA Networks.
➢
It may be integrated with the fixed networks. In this functions needed to support specific
radio network requirements are integrated to the fixed networks. Base stations are
connected directly to a local exchange that can support IMT 2000 traffic by locally
integrated functions and by accessing functions in other network elements.
➢
Requirements for network functions must take into account the support of multimedia
services.
➢
IMT 2000 system should support global roaming and virtual home environment concept.
IMT 2000 service and network capabilities:
➢
Circuit and packet bearer capability up to 144 kbps in vehicular radio environment, up to
384 kbps for pedestrian radio environment and up to 2048 kbps for indoor and office radio
environment.
➢
Interoperability and roaming among the IMT 2000 family of systems.
➢
Service portability and support of virtual home environment.
➢
Multimedia terminals and services.
➢
Emergency and priority calls.
➢
Separation of call and bearer channel/connection control.
➢
User authentication and ciphering.
➢
User-network and network-network authentication.
➢
Geographic position/location service.
➢
Lawfully authorised electronic surveillance.
IMT 2000 interfaces for specifications by the ITU
➢
To ensure that systems belonging to different IMT 2000 family members can interoperate to
provide seamless global roaming and service delivery.
➢
MT-RAN interface requires the specifications not only of the physical radio interface but
also of layer 2 and layer 3 protocols as well as support some supplication protocol that may
be required across this interface.
➢
In the initial implementation of IMT 2000 family systems operators may prefer to use
RAN-CN interface based on existing wireless PCS systems.
➢
The UIM-MT interface represents the interface between removable user identity module
and the mobile terminal.
110
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
➢
The CN-CN interface is key interface for supporting global roaming across networks
belonging to different family members.
UNIVERSAL MOBILE TELECOMMUNICATION SYSTEM:
UMTS, short for Universal Mobile Telecommunications System, is a 3G networking standard used
throughout much of the world as an upgrade to existing GSM module.
1. UMTS makes use of WCDMA, a technology that shares much with CDMA networks used
throughout the world, though it is not compatible with them.
2. Base level UMTS networks are generally capable of downlink speeds as 384 kbps.
3. The UMTS architecture takes advantage of the existing GSM and GPRS networks which
serve as a core network in UMTS infrastructure.
The UMTS is made up of 3 main components:
a) User Equipment:
It is assigned to a single user and contains all the functions needed to access UMTS services. It
contains: – Mobile Equipment (ME) : It is a radio terminal which is used to connect the UMTS
subscriber with the fixed part of UMTS system via the radio interface Uu.
– UMTS Subscriber Identity Module (USIM): A smartcard which contains the subscriber identity,
authentication algorithms, encryption keys etc.
b) UMTS Terrestrial Radio Access Network (UTRAN):
It handles cell-level mobility. It is a system of base station and controller handling function related
to mobility. It contains:
1. Nodes B (Base Stations):
• It converts the data between Uu radio interface and the Iub interface connecting a Node B with
the RNC. • It performs physical level processing such as channel coding, data interleaving, rate
matching, modulation etc.
2. Radio Network Controllers (RNC):
111
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
• RNC’s controls and manages radio resources to Node B. • RNC performs the data-link layer
processing and participates in handover operations. • RNC is considered a single access point of
UTRAN for the core network. • It’s connected to a single MSC/VLR to route circuit-switched
traffic and to a single SGSN to route packet switched traffic.
c) Core Network (CN):
The core network is shared with GSM and GPRS. The CN contains functions for intersystem
handover, gateways to other networks and performs location management. It contains:
1. Home Location Register (HLR)
2. Mobile Station Controller / Visitor Location Register (MSC/VLR).
3. Gateway MSC: Connect UMTS to external circuit switch n/w (e.g PSTN)
4. Serving GPRS Support Node (SGSN): It serves the Packet-switched traffic.
5. Gateway GPRS Support Node (GGSN): Connects UMTS to external packet switched. (e.g.
Internet)
SATELLITE SYSTEMS
Applications:
Traditionally, satellites have been used in the following areas:
● Weather forecasting:
Several satellites deliver pictures of the earth using, e.g., infra red or visible light. Without the help
of satellites, the forecasting of hurricanes would be impossible.
● Radio and TV broadcast satellites:
Hundreds of radio and TV programs are available via satellite. This technology competes with
cable in many places, as it is cheaper to install and, in most cases, no extra fees have to be paid for
this service. Today’s satellite dishes have diameters of 30–40 cm in central Europe, (the diameters
in northern countries are slightly larger).
● Military satellites:
112
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
One of the earliest applications of satellites was their use for carrying out espionage. Many
communication links are managed via satellite because they are much safer from attack by
enemies.
● Satellites for navigation:
Even though it was only used for military purposes in the beginning, the global positioning system
(GPS) is nowadays well-known and available for everyone.
In the context of mobile communication, the capabilities of satellites to transmit data is of
particular interest.
● Global telephone backbones:
One of the first applications of satellites for communication was the establishment of international
telephone backbones. Instead of using cables it was sometimes faster to launch a new satellite (aka
‘big cable in the sky’). However, while some applications still use them, these, satellites are
increasingly being replaced by fiber optical cables crossing the oceans.
● Connections for remote or developing areas:
Due to their geographical location many places all over the world do not have direct wired
connection to the telephone network or the internet (e.g., researchers on Antarctica) or because of
the current state of the infrastructure of a country. Satellites now offer a simple and quick
connection to global networks.
●Global mobile communication:
The latest trend for satellites is the support of global mobile data communication. Due to the high
latency, geostationary satellites are not ideal for this task; therefore, satellites using lower orbits are
needed. The basic purpose of satellites for mobile communication is not to replace the existing
mobile phone networks, but to extend the area of coverage.
Basics:
•
Depending on its type, each satellite can cover a certain area on the earth with its beam (the socalled ‘footprint’.
113
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
•
•
•
•
•
•
•
•
Within the footprint, communication with the satellite is possible for mobile users via a mobile
user link (MUL) and for the base station controlling the satellite and acting as gateway to other
networks via the gateway link (GWL).
Satellites may be able to communicate directly with each other via intersatellite links (ISL).
Satellites orbit around the earth.
Depending on the application, these orbits can be circular or elliptical.
Satellites in circular orbits always keep the same distance to the earth’s surface following a
simple law:
The attractive force Fg of the earth due to gravity equals m·g·(R/r)2.
The centrifugal force Fc trying to pull the satellite away equals m·r·ω2.
The variables have the following meaning:
m is the mass of the satellite;
R is the radius of earth with R = 6,370 km;
r is the distance of the satellite to the centre of the earth;
g is the acceleration of gravity with g = 9.81 m/s2;
and ω is the angular velocity with ω = 2·π·f, f is the frequency of the rotation.
To keep the satellite in a stable circular orbit, the following equation must hold:
Fg = Fc , i.e., both forces must be equal.
Looking at this equation the first thing to notice is that the mass m of a satellite is irrelevant (it
appears on both sides of the equation).
Solving the equation for the distance r of the satellite to the center of the earth results in the
following equation: The distance r = (g·R2/(2·π·f)2)1/3
The inclination angle δ is defined as the angle between the equatorial plane and the plane
described by the satellite orbit. An inclination angle of 0 degrees means that the satellite is
exactly above the equator. If the satellite does not have a circular orbit, the closest point to the
earth is called the perigee.
The elevation angle ε is defined as the angle between the center of the satellite beam and the
plane tangential to the earth’s surface.
A so called footprint can be defined as the area on earth where the signals of the satellite can be
received.
114
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
Types of orbits:
1. Geostationary (or geosynchronous) earth orbit (GEO):
• GEO satellites have a distance of almost 36,000 km to the earth. Examples are almost all TV
and radio broadcast satellites, many weather satellites and satellites operating as backbones for
the telephone network.
2. Medium earth orbit (MEO):
• MEOs operate at a distance of about 5,000–12,000 km. Up to now there have not been many
satellites in this class, but some upcoming systems (e.g., ICO) use this class for various reasons.
3. Low earth orbit (LEO):
• While some time ago LEO satellites were mainly used for espionage, several of the new
satellite systems now rely on this class using altitudes of 500–1,500 km.
4. Highly elliptical orbit (HEO):
• This class comprises all satellites with noncircular orbits. Currently, only a few commercial
communication systems using satellites with elliptical orbits are planned. These systems have
their perigee over large cities to improve communication quality.
Routing:
• Routing in the fixed segment (on earth) is achieved as usual, while two different solutions exist
for the satellite network in space. If satellites offer ISLs, traffic can be routed between the
satellites.
• If not, all traffic is relayed to earth, routed there, and relayed back to a satellite.
• Assume two users of a satellite network exchange data. If the satellite system supports ISLs,
one user sends data up to a satellite and the satellite forwards it to the one responsible for the
receiver via other satellites.
• This last satellite now sends the data down to the earth. This means that only one uplink and
one downlink per direction is needed.
115
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
•
•
•
•
•
•
The ability of routing within the satellite network reduces the number of gateways needed on
earth.
If a satellite system does not offer ISLs, the user also sends data up to a satellite, but now this
satellite forwards the data to a gateway on earth.
Routing takes place in fixed networks as usual until another gateway is reached which is
responsible for the satellite above the receiver.
Again data is sent up to the satellite which forwards it down to the receiver. This solution
requires two uplinks and two downlinks.
Depending on the orbit and the speed of routing in the satellite network compared to the
terrestrial network, the solution with ISLs might offer lower latency.
The drawbacks of ISLs are higher system complexity due to additional antennas and routing
hard- and software for the satellites.
Localization:
• Localization of users in satellite networks is similar to that of terrestrial cellular networks. One
additional problem arises from the fact that now the ‘base stations’, i.e., the satellites, move as
well.
• The gateways of a satellite network maintain several registers. A home location register
(HLR) stores all static information about a user as well as his or her current location.
• The last known location of a mobile user is stored in the visitor location register (VLR).
Functions of the VLR and HLR are similar to those of the registers in, e.g., GSM.
• A particularly important register in satellite networks is the satellite user mapping register
(SUMR).
• This stores the current position of satellites and a mapping of each user to the current satellite
through which communication with a user is possible.
• Registration of a mobile station is achieved as follows.
• The mobile station initially sends a signal which one or several satellites can receive.
• Satellites receiving such a signal report this event to a gateway.
• The gateway can now determine the location of the user via the location of the satellites. User
data is requested from the user’s HLR, VLR and SUMR are updated.
• Calling a mobile station is again similar to GSM.
• The call is forwarded to a gateway which localizes the mobile station using HLR and VLR.
• With the help of the SUMR, the appropriate satellite for communication can be found and the
connection can be set up.
Handover:
• Compared to terrestrial mobile phone networks, additional instances of handover can be
necessary due to the movement of the satellites.
1. Intra-satellite handover:
➢ A user might move from one spot beam of a satellite to another spot beam of the same
satellite.
➢ Using special antennas, a satellite can create several spot beams within its footprint. The
same effect might be caused by the movement of the satellite.
2. Inter-satellite handover:
➢ If a user leaves the footprint of a satellite or if the satellite moves away, a handover to the
next satellite takes place.
116
TYBSC - CS SEM 6 [WIRELESS SENSOR NETWORKS AND MOBILE COMMUNICATION]
➢ This might be a hard handover switching at one moment or a soft handover using both
satellites (or even more) at the same time (as this is possible with CDMA systems).
➢ Inter-satellite handover can also take place between satellites if they support ISLs.
➢ The satellite system can trade high transmission quality for handover frequency.
➢ The higher the transmission quality should be, the higher the elevation angles that are
needed.
➢ High elevation angles imply frequent handovers which in turn, make the system more
complex.
3. Gateway handover:
➢ While the mobile user and satellite might still have good contact, the satellite might move
away from the current gateway.
➢ The satellite has to connect to another gateway.
4. Inter-system handover:
➢ While the three types of handover mentioned above take place within the satellite-based
communication system, this type of handover concerns different systems.
➢ Typically, satellite systems are used in remote areas if no other network is available.
➢ As soon as traditional cellular networks are available, users might switch to this type
usually because it is cheaper and offers lower latency.
➢ Current systems allow for the use of dual-mode (or even more) mobile phones but
unfortunately, seamless handover between satellite systems and terrestrial systems or vice
versa has not been possible up to now.
117
Download