Network Architecture - Department of Computer Engineering

advertisement
Network Kernel Architectures
and Implementation
(01204423) )
Medium Access Control
and WPAN Technologies
Chaiporn Jaikaeo
chaiporn.j@ku.ac.th
Department of Computer Engineering
Kasetsart University
Materials taken from lecture slides by Karl and Willig
Overview




Principal options and difficulties
Contention-based protocols
Schedule-based protocols
Wireless Personal Area Networks
Technologies
2
Difficulties

Medium access in wireless networks is
difficult, mainly because of



Half-duplex communication
High error rates
Requirements


As usual: high throughput, low overhead, low
error rates, …
Additionally: energy-efficient, handle switched
off devices!
3
Requirements for Energy-Efficient
MAC Protocols

Recall




Energy problems





Transmissions are costly
Receiving about as expensive as transmitting
Idling can be cheaper but is still expensive
Collisions
Overhearing
Idle listening
Protocol overhead
Always wanted: Low complexity solution
4
Main Options
Wireless medium access
Centralized
Schedulebased
Fixed
assignment
Demand
assignment
Contentionbased
Distributed
Schedulebased
Fixed
assignment
Contentionbased
Demand
assignment
5
Centralized Medium Access

A central station controls when a node may
access the medium





E.g., Polling, computing TDMA schedules
Advantage: Simple, efficient
Not directly feasible for non-trivial wireless
network sizes
But: Can be quite useful when network is
somehow divided into smaller groups
Distributed approach still preferable
6
Schedule- vs. Contention-Based

Schedule-based protocols


FDMA, TDMA, CDMA
Schedule can be fixed or computed on demand




Usually mixed
Collisions, overhearing, idle listening no issues
Time synchronization needed
Contention-based protocols



Hope: coordination overhead can be saved
Mechanisms to handle/reduce probability/impact of
collisions required
Randomization used somehow
7
Overview




Principal options and difficulties
Contention-based protocols
Schedule-based protocols
Wireless Personal Area Networks
Technologies
8
Distributed, Contention-Based MAC

Basic ideas


Receivers need to tell surrounding nodes to
shut up
Listen before talk (CSMA)

Suffers from sender not knowing what is going on
at receiver
Hidden
terminal
scenario:
A
B
C
D
Also: recall
exposed
terminal
scenario
9
How To Shut Up Senders

Inform potential interferers during reception


Cannot use the same channel
So use a different one


Busy tone protocol
Inform potential interferers before reception



Can use same channel
Receiver itself needs to be informed, by sender, about
impending transmission
Potential interferers need to be aware of such
information, need to store it
10
MACA
A






Multiple Access with
Collision Avoidance
Sender B issues
Request to Send (RTS)
Receiver C agrees with
Clear to Send (CTS)
Potential interferers
learns from RTS/CTS
B sends, C acks
Used in IEEE 802.11
B
C
D
RTS
CTS
Data
NAV indicates
busy medium
NAV indicates
busy medium
Ack
11
Virtual Carrier Sensing
A
B
C
D
RTS
CTS
NAV
Data
NAV
ACK
NAV
 Network Allocation Vector
(Virtual Carrier Sensing)
12
Problems Solved?

RTS/CTS helps, but do not solve
hidden/exposed terminal problems
B
A
D
C
Data
D
C
RTS
RTS
CTS
B
A
RTS
RTS
CTS
CTS
Data
RTS
CTS
Data
Ack
13
MACA Problem: Idle listening

Need to sense carrier for RTS or CTS
packets


Simple sleeping will break the protocol
IEEE 802.11 solution



Idea: Nodes that have data buffered for
receivers send traffic indicators at prearranged
points in time
ATIM - Announcement Traffic Indication
Message
Receivers need to wake up at these points, but
can sleep otherwise
14
Sensor-MAC (S-MAC)

MACA unsuitable if average data rate is low


Most of the time, nothing happens
Idea: Switch off, ensure that neighboring nodes
turn on simultaneously to allow packet exchange


Need to also exchange
wakeup schedule
between neighbors
When awake,
perform RTS/CTS
Active period
Wakeup period
Sleep period
For SYNCH
For RTS
For CTS
15
Schedule Assignment


Listen
A
Go to sleep after time t
Listen for SYNC
Synchronizer
Sleep


Broadcasts

B
td
Broadcasts
Go to sleep after time t- td
Follower

Listen
Sleep
Listen for a mount
of time
If hear no SYNC,
select its own SYNC
Broadcasts its
SYNC immediately


Listen for amount
of time
Hear SYNC from A,
follow A’s SYNC
Rebroadcasts SYNC
after random delay
td
16
S-MAC Synchronized Islands


Nodes learn schedule from other nodes
Some node might learn about two different
schedules from different nodes


“Synchronized islands”
To bridge this gap, it has to follow both schemes
A A
B
A
A
A
A
B
B
B
B
E
C
E
C
D
E
E
E
E
C
C
C
D
D
D
E
Time
17
Preamble Sampling

Alternative option: Don’t try to explicitly
synchronize nodes


Have receiver sleep and only periodically sample the
channel
Use long preambles to ensure that receiver stays
awake to catch actual packet

Example: B-MAC, WiseMAC
Start transmission:
Check
channel
Long preamble Actual packet
Check
channel
Stay awake!
Check
channel
Check
channel
18
B-MAC


Very simple MAC protocol
Employs



Clear Channel Assessment (CCA) and backoffs
for channel arbitration
Link-layer acknowledgement for reliability
Low-power listening (LPL)


I.e., preamble sampling
Currently: Often considered as the default WSN
MAC protocol
19
B-MAC

B-MAC does not have




Synchronization
RTS/CTS
Results in simpler, leaner implementation
Clean and simple interface
20
Clear Channel Assessment

"Carrier Sensing" in wireless networks
Thresholding
CCA algorithm
Outlier detection
CCA algorithm
21
Contiki LPL and LPP

Low-Power Listening (LPL)



Also known as ContikiMAC
Similar to B-MAC, but allowing packet-based
MAC such as IEEE 802.15.4
Low-Power Probing (LPP)


Receivers periodically broadcast a probe
Sender listens for probes from receivers before
transmitting
22
Overview




Principal options and difficulties
Contention-based protocols
Schedule-based protocols
Wireless Personal Area Networks
Technologies
23
LEACH


Low-Energy Adaptive Clustering Hierarchy
Assumptions




Dense network of nodes
Direct communication with central sink
Time synchronization
Idea: Group nodes into “clusters”



Each cluster controlled by clusterhead
About 5% of nodes become clusterhead (depends on
scenario)
Role of clusterhead is rotated
24
LEACH Clusterhead

Each CH organizes



CDMA code for its cluster
TDMA schedule to be used within a cluster
In steady state operation


CHs collect & aggregate data from all cluster
members
Report aggregated data to sink using CDMA
25
LEACH rounds
Fixed-length round
………..
Setup phase
Steady-state phase
…..
Advertisement phase
Cluster setup phase
Clusterheads
compete with
Self-election of
CSMA
clusterheads
………..
Time slot Time slot
Time slot Time slot
…..
…..
1
n
2
1
Broadcast schedule
Members
compete
with CSMA
26
TRAMA



Traffic Adaptive Medium Access Protocol
Assume nodes are time synchronized
Time divided into cycles, divided into


Random access period
Scheduled access period
time cycle
Random Access Period
• Exchange and learn two-hop
neighbors
• Exchange schedules
Scheduled-Access Period
• Used by winning nodes to
transmit data
27
TRAMA – Adaptive Election

How to decide which slot (in scheduled access
period) a node can use?

For node id x and time slot t, compute p = h (x  t)



h is a global hash function
Compute p for next k time slots for itself and all twohop neighbors
Node uses those time slots for which it has the highest
priority
A
B
C
t=0 t=1 t=2
14
23
9
33
64
8
53
18
6
t=3
56
12
33
t=4 t=5
3
26
44
6
57
2
28
Overview




Principal options and difficulties
Contention-based protocols
Schedule-based protocols
Wireless Personal Area Networks
Technologies
29
IEEE 802.15.4

IEEE standard for low-rate WPAN (LR-WPAN) applications




Physical layer




Low-to-medium bit rates
Moderate delays without too strict requirements
Low energy consumption
20 kbps over 1 channel @ 868-868.6 MHz
40 kbps over 10 channels @ 905 – 928 MHz
250 kbps over 16 channels @ 2.4 GHz
MAC protocol



Single channel at any one time
Combines contention-based and schedule-based schemes
Asymmetric: nodes can assume different roles
30
802.15.4 PHY Overview

Operating frequency bands
868MHz / 915MHz
PHY
2.4 GHz
PHY
2.4 GHz
Channel 0
Channels 1-10
868.3 MHz
902 MHz
Channels 11-26
2 MHz
928 MHz
5 MHz
2.4835 GHz
31
802.15.4 Device Classes

Full function device (FFD)




Any topology
Network coordinator capable
Talks to any other device
Reduced function device (RFD)




Limited to star topology
Cannot become a network coordinator
Talks only to a network coordinator
Very simple implementation
32
802.15.4 Network Topologies
33
802.15.4 Beaconed Mode

Superframe structure
Active period
Beacon

Contention
access
period
Inactive period
Guaranteed time
slots (GTS)
GTS assigned to devices upon request
34
802.15.4 GTS Data Transfer

Device  coordinator


If having allocated GTS,
wake up and send
Otherwise, send during CAP



If having allocated GTS,
wake up and receive
Otherwise, see picture
Device
Beacon
Data
request
Using slotted CSMA
Coordinator  device

Coordinator
Acknowledgement
Data
Acknowledgement
IEEE 802.15.4 Adopters

ZigBee




Requires battery life of at least two
years be certified
Applications: Industrial control,
embedded sensing, home automation
ZigBee RF4CE (Radio Frequency for
Consumer Electronics)
Nest (acquired by Google)


Learning thermostats,
Smoke and CO alarms
WiFi- and ZigBee-enabled
https://nest.com
36
Bluetooth Smart

Formally Bluetooth Low Energy (BLE)



Part of Bluetooth 4.0 Specification
Based on Nokia's Wibree technology
First smartphones to support  iPhone 4S

Now supported by most recent smartphones
http://redbearlab.com/blenano/
37
Bluetooth: Classic vs. Smart
Source: Bluetooth SIG
38
Bluetooth Compatibility
http://blog.laptopmag.com/just-what-is-bluetooth-4-0-anyway
39
Bluetooth Smart: Device Roles

Central device




Serves as a hub to one or more peripheral devices
Two central devices cannot directly communicate
Similar to IEEE 802.15.4's FFD
Peripheral device



Must be connected to a central device
Two peripheral devices cannot directly communicate
Similar to IEEE 802.15.4's RFD
40
ANT / ANT+ / NIKE+


Primarily used for fitness
monitoring devices
ANT / ANT+


open access multicast
wireless sensor network
NIKE+

Nike.com
Proprietary protocols on
2.4 GHz band
http://developer.sonymobile.com
41
WiFi/ZigBee/Bluetooth Coexistence

They all employ 2.4 GHz spectrum
WiFi vs. Zigbee
WiFi vs. Bluetooth
http://www.digikey.com/en/articles/techzone/2011/aug/comparing-low-power-wireless-technologies
42
Summary



Many different ideas exist for medium access control in
MANET/WSN
Comparing their performance and suitability is difficult
Especially, clearly identifying interdependencies between
MAC protocol and other layers/applications is difficult


Which is the best MAC for which application?
Nonetheless, certain “common use cases” exist



IEEE 802.11 DCF for MANET
IEEE 802.15.4 for some early “commercial” WSN variants
B-MAC for WSN research not focusing on MAC
43
Download