MAC Protocol
MAC Protocol
Sensor Networks
Dr. Om Jee Pandey
Wireless Sensor Networks (WSNs)
In WSNs, sensor nodes must operate for a number of years to make
applications economically viable
WSN must be resilient to errors of all kinds; nodes may die when running out
of energy; radio communication may be distorted by external interference;
and low-cost sensors may malfunction and produce erroneous readings
WSNs are in many aspects quite similar to MANETs and Wireless Mesh
Networks, but two distinct characteristics call for a different approach
Compared to today’s WLAN standards (55 Mbps and up), the bandwidth
provided by sensor node radios (10-250Kbps) is very low indeed
Another important factor for MAC design is the setup time needed to switch
the radio from sleep into receive/transmit mode
As a consequence, switching a radio into sleep mode only saves energy when
doing so for a long time
This, in turn, may delay sensor data from being injected into the network,
effectively increasing the end-to-end latency
MAC Design for WSN
The driving force behind WSN research is to develop systems that can operate
unattended for years, which calls for robust and energy efficient solutions
both at the hardware and software level
Since the radio is the component of a sensor node that consumes most
energy, it should be managed carefully
Usually, one has to be prepared to pay a price in terms of performance for the
desired reduction in energy consumption
Fortunately, many WSN applications are rather undemanding and can get by
with low bandwidth and long end-to-end latency. In addition, the resource
limitations imposed by typical node hardware call for solutions that require
minimal processing and have a small memory footprint. These considerations
limit the design space of medium access control
MAC Design for WSN
Many WSN-specific MAC protocols have been proposed, each shooting for a
different tradeoff between energy consumption and performance
All protocols, address the same sources of overhead and can be conveniently
grouped into three main classes based on the degree of organization between
nodes
Protocol overhead: MAC headers and control messages are considered overhead
because they do not contain useful application data yet consume energy. In the
case of WLAN traffic these costs can be amortized, but the small WSN payloads
shift the boundary considerably, which essentially rules out sophisticated
protocols that exchange detailed information
MAC Design for WSN
Most of these overheads are incurred by other contention-based protocols
too, although the relative importance may vary. For example, collisions can be
remedied at the expense of protocol overhead
These concerns show that by organizing nodes many of the classic sources of
overhead can be avoided, but only at the expense of introducing new ones
The classic S-MAC paper by Ye et al. in 2002 [1], in which they introduce Sensor
MAC, inspired the development of a whole string of energy efficient MAC
protocols
A slightly more complex organization is to divide time into slots. Slotted access
requires nodes to synchronize on some common time of reference such that
they can wake-up collectively at the beginning of each slot, exchange
messages when available, and then go back to sleep for the rest slot
Different MAC Protocols for WSN
S-MAC is the prime example from this class of slotted access, and improves on
CSMA/CA by implementing a fixed duty cycle and overhearing avoidance
The most complicated class schedules the channel access. Time is divided into
frames containing a fixed number of slots. Frame-based protocols differ in
how slots are assigned to nodes
Classic TDMA has an access point controlling this for a single cell. LMAC on the
other hand employs a distributed slot-selection mechanism that self-
organizes a multi-hop network into a conflict-free schedule
The increase in the degree of organization allows for tighter control of who is
communicating when, but at the expense of being less flexible to
accommodate changing conditions. Therefore, several hybrid protocols have
been developed aiming at combining the best of both worlds
MAC Protocols for WSNs
MAC protocols differ from typical WLAN access protocols in that they trade off
performance (latency and throughput) for a reduction in energy consumption
to maximize the lifetime of the network
This is in general achieved by duty cycling the radio, and it is the MAC layer
that controls when the radio is switched on and off
The historic development of, the three most common styles of medium access
control for WSNs: random, slotted, and frame-based organization
Random Access
This class of CSMA-style protocols does not restrict when nodes may access
the channel. This provides a lot of flexibility to handle different nodes
densities and traffic loads, so nothing has to be decided before deployment
and dynamic changes can be accommodated easily. Also, nodes need not
synchronize their clocks, making these protocols rather simple. The down side
of this relaxed, random access approach is that lots of energy is often wasted
due to idle listening and collisions
Handling collisions has been extensively studied before, both in wired and
wireless systems. Unfortunately, the standard solutions cannot be applied ‘out
of the box’ because of the tight WSN constraints. Collision Avoidance
signalling is considered prohibitive because of the short payloads, and
contention resolution by means of random backoff leads to overprovisioning
with nodes listening for long contention windows or to collapse when using
short windows
Random Access
The binary exponential backoff (BEB) procedure addresses the latter
concerns, but at the expense of considerable protocol complexity. A much
simpler approach was proposed as part of the Sift protocol
This greatly reduces the possibility of collisions (i.e., senders selecting the
same “slot” within the contention window) because the low chance of
selecting an early slot usually leads to just one lucky winner when many
compete, and with few competitors the chance of a collision is already low to
begin with. The optimal distribution depends on the number of competing
senders, which in practice is unknown
Low-Power Listening and Preamble Sampling
A low-level scheme in which nodes can periodically sense the channel (saving
energy) and still not lose any messages (due to sleeping most of the time)
The idea is to prepend each message with a kind of “busy tone” to alert
potential receivers about an upcoming message transfer
Nodes sensing a busy tone would then keep their radios on until the end of
the message. By making the busy tone longer than the sleep interval, a sender
is guaranteed to wake up the intended receiver
Low-Power Listening and Preamble Sampling
A convenient way to implement the busy tone is to stretch the length of the
standard preamble (part of the physical layer header)
The beauty of it is that the costs shift from the receiver (reduced idle
listening) to the sender (long preamble). Since there are many more receivers
than senders and the amount of traffic is low, a lot of energy is saved
Since the periodic sampling effectively occurs at the physical layer, it can be
combined with any MAC protocol in the link layer
Hill et al. combined it with CSMA and named it Low-Power Listening, LPL for
short. El-Hoiydi combined it with ALOHA and named it Preamble Sampling
Low-Power Listening and Preamble Sampling
The exact savings of these protocols depend on the ratio of the time it takes
to do a carrier sense and the length of the sleep interval
Note that for every scenario (data rate, node density) an optimal sleep
interval exists that balances the costs between receivers and sender
The B-MAC protocol allows for runtime configuration of the sleep interval to
provide the possibility for application developers to optimize their energy
savings
With a little bookkeeping, the need for sending out long preambles can be
largely avoided
Given that a node typically communicates with just a few nodes, or actually
just one (its parent), maintaining the phase offset of when a destination node
wakes up becomes feasible. The idea is to start transmitting a message just
before the intended receiver wakes up to sample the channel
This saves energy both at the sender, who sends out short preambles, as well
as at the receiver since the busy-waiting time for the start symbol is reduced
to half the length of the short preamble
Wake-up Radio Protocol
A radically different approach to reducing the idle listening overhead is to
equip nodes with a second ultra low-power radio used for simple signalling
By default, nodes sleep with the main radio turned off. They can be awoken
by sending a kind of wireless interrupt over the second radio, after which the
main radio is switched on to receive the message
The attractive idea of using a low-power wake-up radio was first coined by the
PicoRadio project detailing a design out of passive components consuming as
little as 100 µW
The down side of such extremely simple radios is that they are quite
susceptible to noise (generating false alarms) and use broadcast signals
(waking up all neighbors) because they cannot even encode a few address bits
specifying the identity of a target node
Slotted Access
The basic idea behind this class of contention-based protocols is to save
energy by having nodes agree on a common sleep/active pattern allowing
them to operate the radio at arbitrarily low duty cycles
Time is divided into slots, and nodes wake up at the beginning of each slot to
handle pending messages waiting for transmission
Apart from this issue, slotted protocols mainly differ in their policy on when to
switch back from active to sleep mode
S-MAC
The main contribution of Sensor-MAC protocol is that fixed duty-cycle
approach is both simple and effective in reducing idle listening overhead
The only complicated part is the synchronization of the nodes on the basic
slot structure shown in below figure
Once nodes have joined the (global) slot schedule they will start duty cycling
their radio switching it off after every active period
The S-MAC implementation for the Mica2 motes uses a fixed-length active
period of 300 ms and a configurable slot length in the order of 1-3 s
In this regard converge cast and event-based reporting leave S-MAC wasting
lots of energy
In principle the timeout mechanism will automatically adapt the duty cycle to
the actual traffic in a node’s neighborhood
T-MAC is a bit too aggressive in shutting down the radio, leaving messages
queued for the next slot, which effectively increases latency and reduces
throughput
Frame-based access
Provides flexibility even further by grouping slots into frames and scheduling in
detail who is to send in each slot
When scheduling senders only, nodes must listen in to all occupied slots, but can
still avoid most overhearing by shutting down the radio after the MAC (slot)
header has been received. In both variants (link and sender-based scheduling)
idle listening can be reduced to a simple check if the slot is used or not
Traffic Adaptive Medium Access (TRAMA)
Nodes regularly broadcast information about (long-term) traffic that flows
through them as well as the identities of their neighbors
A node learns the identities of all its two-hop neighbors, which is used to
compute a collision free schedule by means of distributed hash function that
determines the winner (i.e., sender) of each slot
The traffic load information of the one-hop neighbors is used to break ties in
favor of the busiest node. To reduce overhearing, a sender includes a bitmap in
each packet detailing the subsequent receivers it plans to be sending to in the
next 100 slots. If the actual traffic is lower than the initial estimate broadcasted
to all neighbors, a node releases its claims by zeroing out the remainder of the
bitmap. This allows others to take over and provides limited capabilities to adjust
to traffic fluctuations
Packet-based Radios
MAC design is greatly influenced by the capabilities of the underlying hardware
platform. In this respect it is important to observe the trend in cheap, low-power
radios to upgrade from byte-level interfaces (e.g., CC1000) to packet-level
interfaces (e.g., CC2420)
This transition can be largely attributed to the definition of the IEEE 802.15.4
standard for Low-Rate Wireless Personal Area Networks (WPANs)
This standard specifies a Physical and MAC layer for use in consumer electronics,
and its commercial potential has brought a new generation radios on the market
The MAC layer provides only limited support for multi-hop networking, but the
physical layer fits the WSN community rather well with higher data rates (up to
250Kbps) at the same energy consumption level as the previous generation
Packet-based Radios
The switch to packet-based radios is a mixed blessing. On the one hand it frees
the micro controller from handling every single byte to/from the radio, which
chews up most of the processing resources on simple 8-bit processors like the
ATmega128L. On the other hand, it makes life complicated because techniques
like low-power listening can no longer be applied due to the lack of control
needed to extend the length of the preamble
A crude solution is that, when a long preamble is needed, the message itself can
be sent out repeatedly. This works well for small messages and high-speed
radios, but reduces the granularity considerably making techniques like
scheduled channel polling less effective
On the other hand, the receive circuitry has become much more complex
making idle-listening an even more significant overhead.
For example, the CC2420 radio consumes more energy when receiving than
when sending (63 vs. 57 mW)
Also, because of the higher data rates, the relative cost of switching the radio
between send and receive mode has increased forcing MAC designers to pay
more attention to this issue
Thank You