Network Kernel Architectures and Implementation (01204423) ) Medium Access Control and WPAN Technologies Chaiporn Jaikaeo chaiporn.j@ku.ac.th Department of Computer Engineering Kasetsart University Materials taken from lecture slides by Karl and Willig Overview Principal options and difficulties Contention-based protocols Schedule-based protocols Wireless Personal Area Networks Technologies 2 Difficulties Medium access in wireless networks is difficult, mainly because of Half-duplex communication High error rates Requirements As usual: high throughput, low overhead, low error rates, … Additionally: energy-efficient, handle switched off devices! 3 Requirements for Energy-Efficient MAC Protocols Recall Energy problems Transmissions are costly Receiving about as expensive as transmitting Idling can be cheaper but is still expensive Collisions Overhearing Idle listening Protocol overhead Always wanted: Low complexity solution 4 Main Options Wireless medium access Centralized Schedulebased Fixed assignment Demand assignment Contentionbased Distributed Schedulebased Fixed assignment Contentionbased Demand assignment 5 Centralized Medium Access A central station controls when a node may access the medium E.g., Polling, computing TDMA schedules Advantage: Simple, efficient Not directly feasible for non-trivial wireless network sizes But: Can be quite useful when network is somehow divided into smaller groups Distributed approach still preferable 6 Schedule- vs. Contention-Based Schedule-based protocols FDMA, TDMA, CDMA Schedule can be fixed or computed on demand Usually mixed Collisions, overhearing, idle listening no issues Time synchronization needed Contention-based protocols Hope: coordination overhead can be saved Mechanisms to handle/reduce probability/impact of collisions required Randomization used somehow 7 Overview Principal options and difficulties Contention-based protocols Schedule-based protocols Wireless Personal Area Networks Technologies 8 Distributed, Contention-Based MAC Basic ideas Receivers need to tell surrounding nodes to shut up Listen before talk (CSMA) Suffers from sender not knowing what is going on at receiver Hidden terminal scenario: A B C D Also: recall exposed terminal scenario 9 How To Shut Up Senders Inform potential interferers during reception Cannot use the same channel So use a different one Busy tone protocol Inform potential interferers before reception Can use same channel Receiver itself needs to be informed, by sender, about impending transmission Potential interferers need to be aware of such information, need to store it 10 MACA A Multiple Access with Collision Avoidance Sender B issues Request to Send (RTS) Receiver C agrees with Clear to Send (CTS) Potential interferers learns from RTS/CTS B sends, C acks Used in IEEE 802.11 B C D RTS CTS Data NAV indicates busy medium NAV indicates busy medium Ack 11 Virtual Carrier Sensing A B C D RTS CTS NAV Data NAV ACK NAV Network Allocation Vector (Virtual Carrier Sensing) 12 Problems Solved? RTS/CTS helps, but do not solve hidden/exposed terminal problems B A D C Data D C RTS RTS CTS B A RTS RTS CTS CTS Data RTS CTS Data Ack 13 MACA Problem: Idle listening Need to sense carrier for RTS or CTS packets Simple sleeping will break the protocol IEEE 802.11 solution Idea: Nodes that have data buffered for receivers send traffic indicators at prearranged points in time ATIM - Announcement Traffic Indication Message Receivers need to wake up at these points, but can sleep otherwise 14 Sensor-MAC (S-MAC) MACA unsuitable if average data rate is low Most of the time, nothing happens Idea: Switch off, ensure that neighboring nodes turn on simultaneously to allow packet exchange Need to also exchange wakeup schedule between neighbors When awake, perform RTS/CTS Active period Wakeup period Sleep period For SYNCH For RTS For CTS 15 Schedule Assignment Listen A Go to sleep after time t Listen for SYNC Synchronizer Sleep Broadcasts B td Broadcasts Go to sleep after time t- td Follower Listen Sleep Listen for a mount of time If hear no SYNC, select its own SYNC Broadcasts its SYNC immediately Listen for amount of time Hear SYNC from A, follow A’s SYNC Rebroadcasts SYNC after random delay td 16 S-MAC Synchronized Islands Nodes learn schedule from other nodes Some node might learn about two different schedules from different nodes “Synchronized islands” To bridge this gap, it has to follow both schemes A A B A A A A B B B B E C E C D E E E E C C C D D D E Time 17 Preamble Sampling Alternative option: Don’t try to explicitly synchronize nodes Have receiver sleep and only periodically sample the channel Use long preambles to ensure that receiver stays awake to catch actual packet Example: B-MAC, WiseMAC Start transmission: Check channel Long preamble Actual packet Check channel Stay awake! Check channel Check channel 18 B-MAC Very simple MAC protocol Employs Clear Channel Assessment (CCA) and backoffs for channel arbitration Link-layer acknowledgement for reliability Low-power listening (LPL) I.e., preamble sampling Currently: Often considered as the default WSN MAC protocol 19 B-MAC B-MAC does not have Synchronization RTS/CTS Results in simpler, leaner implementation Clean and simple interface 20 Clear Channel Assessment "Carrier Sensing" in wireless networks Thresholding CCA algorithm Outlier detection CCA algorithm 21 Contiki LPL and LPP Low-Power Listening (LPL) Also known as ContikiMAC Similar to B-MAC, but allowing packet-based MAC such as IEEE 802.15.4 Low-Power Probing (LPP) Receivers periodically broadcast a probe Sender listens for probes from receivers before transmitting 22 Overview Principal options and difficulties Contention-based protocols Schedule-based protocols Wireless Personal Area Networks Technologies 23 LEACH Low-Energy Adaptive Clustering Hierarchy Assumptions Dense network of nodes Direct communication with central sink Time synchronization Idea: Group nodes into “clusters” Each cluster controlled by clusterhead About 5% of nodes become clusterhead (depends on scenario) Role of clusterhead is rotated 24 LEACH Clusterhead Each CH organizes CDMA code for its cluster TDMA schedule to be used within a cluster In steady state operation CHs collect & aggregate data from all cluster members Report aggregated data to sink using CDMA 25 LEACH rounds Fixed-length round ……….. Setup phase Steady-state phase ….. Advertisement phase Cluster setup phase Clusterheads compete with Self-election of CSMA clusterheads ……….. Time slot Time slot Time slot Time slot ….. ….. 1 n 2 1 Broadcast schedule Members compete with CSMA 26 TRAMA Traffic Adaptive Medium Access Protocol Assume nodes are time synchronized Time divided into cycles, divided into Random access period Scheduled access period time cycle Random Access Period • Exchange and learn two-hop neighbors • Exchange schedules Scheduled-Access Period • Used by winning nodes to transmit data 27 TRAMA – Adaptive Election How to decide which slot (in scheduled access period) a node can use? For node id x and time slot t, compute p = h (x t) h is a global hash function Compute p for next k time slots for itself and all twohop neighbors Node uses those time slots for which it has the highest priority A B C t=0 t=1 t=2 14 23 9 33 64 8 53 18 6 t=3 56 12 33 t=4 t=5 3 26 44 6 57 2 28 Overview Principal options and difficulties Contention-based protocols Schedule-based protocols Wireless Personal Area Networks Technologies 29 IEEE 802.15.4 IEEE standard for low-rate WPAN (LR-WPAN) applications Physical layer Low-to-medium bit rates Moderate delays without too strict requirements Low energy consumption 20 kbps over 1 channel @ 868-868.6 MHz 40 kbps over 10 channels @ 905 – 928 MHz 250 kbps over 16 channels @ 2.4 GHz MAC protocol Single channel at any one time Combines contention-based and schedule-based schemes Asymmetric: nodes can assume different roles 30 802.15.4 PHY Overview Operating frequency bands 868MHz / 915MHz PHY 2.4 GHz PHY 2.4 GHz Channel 0 Channels 1-10 868.3 MHz 902 MHz Channels 11-26 2 MHz 928 MHz 5 MHz 2.4835 GHz 31 802.15.4 Device Classes Full function device (FFD) Any topology Network coordinator capable Talks to any other device Reduced function device (RFD) Limited to star topology Cannot become a network coordinator Talks only to a network coordinator Very simple implementation 32 802.15.4 Network Topologies 33 802.15.4 Beaconed Mode Superframe structure Active period Beacon Contention access period Inactive period Guaranteed time slots (GTS) GTS assigned to devices upon request 34 802.15.4 GTS Data Transfer Device coordinator If having allocated GTS, wake up and send Otherwise, send during CAP If having allocated GTS, wake up and receive Otherwise, see picture Device Beacon Data request Using slotted CSMA Coordinator device Coordinator Acknowledgement Data Acknowledgement IEEE 802.15.4 Adopters ZigBee Requires battery life of at least two years be certified Applications: Industrial control, embedded sensing, home automation ZigBee RF4CE (Radio Frequency for Consumer Electronics) Nest (acquired by Google) Learning thermostats, Smoke and CO alarms WiFi- and ZigBee-enabled https://nest.com 36 Bluetooth Smart Formally Bluetooth Low Energy (BLE) Part of Bluetooth 4.0 Specification Based on Nokia's Wibree technology First smartphones to support iPhone 4S Now supported by most recent smartphones http://redbearlab.com/blenano/ 37 Bluetooth: Classic vs. Smart Source: Bluetooth SIG 38 Bluetooth Compatibility http://blog.laptopmag.com/just-what-is-bluetooth-4-0-anyway 39 Bluetooth Smart: Device Roles Central device Serves as a hub to one or more peripheral devices Two central devices cannot directly communicate Similar to IEEE 802.15.4's FFD Peripheral device Must be connected to a central device Two peripheral devices cannot directly communicate Similar to IEEE 802.15.4's RFD 40 ANT / ANT+ / NIKE+ Primarily used for fitness monitoring devices ANT / ANT+ open access multicast wireless sensor network NIKE+ Nike.com Proprietary protocols on 2.4 GHz band http://developer.sonymobile.com 41 WiFi/ZigBee/Bluetooth Coexistence They all employ 2.4 GHz spectrum WiFi vs. Zigbee WiFi vs. Bluetooth http://www.digikey.com/en/articles/techzone/2011/aug/comparing-low-power-wireless-technologies 42 Summary Many different ideas exist for medium access control in MANET/WSN Comparing their performance and suitability is difficult Especially, clearly identifying interdependencies between MAC protocol and other layers/applications is difficult Which is the best MAC for which application? Nonetheless, certain “common use cases” exist IEEE 802.11 DCF for MANET IEEE 802.15.4 for some early “commercial” WSN variants B-MAC for WSN research not focusing on MAC 43